Wednesday, July 31, 2019

Importance of Teamwork

Discuss the Importance of Teamwork for the Systems Analyst A systems analyst is in charge of the operating system and associated subsystems. In addition, he is responsible for identifying alternatives for optimizing computer resources. This necessitates a joint action with other persons, whether they are internal clients or external. If the system analyst carries out efficient teamwork, and harmonizes the contributions of all clients towards an agreed objective, his efficiency will be far greater than individual accomplishment. Teamwork refers to the mutual effort by a group of persons for achieving a common goal.On the other hand the system analyst designs new IT systems to ameliorate business efficiency and productivity. The systems analyst need to present their designs to clients and once the design is approved; they work closely with the user team to launch the solution. To achieve this, the systems analyst needs to work closely with the customers, examine the business model bein g currently used by the business and the flow of information in the organization. His findings are discussed again with the customer team and he devises an apposite improved IT based solution.During his work, the system analyst also draws up the outline of the new system, finds out and estimates the cost and specifies how the client will use the information. At each of these steps the systems analyst is required to team up with the potential users and use such a teamwork behavior that will lead to better performance (U. S. Department of Labor Bureau of Labor Statistics, 2006). The systems analyst usually has to evaluate and study the organizational culture of the client, he has to assess and understand the preferences of the team members of the client and review the current circumstances of the client organization.This is important for the systems analyst to liaison widely with the external or internal clients. For example, the systems analyst may have to liaison with the systems de alers to get the cost estimate correct and he has to liaison with the company managers to assess their needs correctly. The systems analyst has to translate client requirements into highly complex and detailed project briefs. This effort would not be possible unless he collaborated extensively with the users. This requires teamwork. Teamwork is also important because the systems analyst is often required to draw up proposals for modified or replacement systems.In addition, he is required to create logical and innovative solutions to complex problems. What the systems analyst is required to do is to identify options for potential solutions and evaluating them for both technical and business suitability. To draw up proposals for modified or replacement systems, teamwork is required to ascertain the preferences of the user team members. Further, to come up with logical and innovative solutions, the systems analyst must be able to get feedback from people outside the team.In short the s ystems analyst must be able to join forces with outside and inside people to successfully complete his project. While dealing with the client, the systems analyst must be able to get a wide range of views from the staff, peer groups, customers and senior management of the client organization, He must be able to take a wide outlook when he is setting behavioral goals for themselves. The systems analyst should improve the quality of these goals by joining forces the users and developers so that there is technical compatibility as well as client satisfaction.This co-ordination role of the systems analyst requires a high degree of teamwork. It is the responsibility of the systems analyst to ensure that the budgets are not exceeded and the deadlines are adhered to. In order to achieve these goals the systems analyst needs to identify and manage conflicting expectations of different person and even groups. For instance, he must be able to manage the conflict between the user requirements and budgetary constraints. In addition, he must be able to initiate and harmonize the dialogues between different groups, for example the client management and developers (U. S.Department of Labor Bureau of Labor Statistics, 2006). In practice the systems analyst needs to research, plan, maintain, troubleshoot, configure, install and upgrade operating systems. In addition, in several organizations he is required to troubleshoot, maintain, install, plan and upgrade hardware and software interfaces with the operating system. For this he needs to analyze and interpret the current or planned business procedures or problems. The system analyst needs to work independently as well as work towards the team goals of maintaining the operating systems as well as the systems in excellent condition.Moreover, he needs to understand the goals of the system users and meet their expectation. The users of the system should feel a sense of ownership towards the systems that they are using. They should feel committed to the systems that they have helped to create. This feeling can only be created if there is teamwork between the systems analyst and the users. The users of the system should collaborate with the systems analyst to use their abilities and knowledge to contribute to the success of the system. There are a number of routine tasks that a systems analyst needs to perform in the due course of his work.For example, he has to work with technical staff, such as networking to put into operation connectivity and compatibility among systems. Even for these tasks teamwork is very important. Moreover, teamwork is required of the systems analyst for assisting personnel of other departments in matters related to information technology, training new recruits in the use of computer resources and providing information technology orientation to new recruits. The systems analyst must gain the trust of all the users he is dealing with; only then will they express their opinion, conflicti ng views and enquiries.A systems analyst must make a sincere effort to be upright, truthful and honest. He should have active listening skills. He should aim towards participative decision-making and resolve problems constructively. Teamwork has become an important part of the job specification of a systems analyst and many organizations evaluate the teamwork skills when recruiting a systems analyst. Most systems analysts realize that teamwork is important because either the system is sufficiently complex that it takes a team with multiple skills to design, and a better system will result when a team approach is adopted.In short it is important that systems analysts learn to work in a team environment so that they will have teamwork skills so important for their jobs. To sum teamwork is very important for the systems analyst. He is required to regularly collect information, examine and evaluate current or planned systems. Each of these actions requires interaction with individuals a nd teaming up with diverse individuals. Even in his regular and mechanical responsibilities he needs to meet with people and get them involved in the IT process. Finally, even in case of multifarious support duties that are assigned to him, collaboration is essential.

Tuesday, July 30, 2019

Oil and Global Warming in Saudi Arabia Essay

Oil has been identified as a very important resource; it provides a lot of significant benefits to mankind. It is used for numerous purposes such as transportation, heating, electricity production, and industrial applications. It has a high energy density which makes it an efficient fuel source plus the fact that it is fairly easy to transport and store. Its versatility is of great importance, and this is proven by being by most valuable commodity in world trade (O’Rourke & Connolly, 2003,). According to Doyle, it is estimated that two billion dollars switch hands in petroleum transactions, making it the world’s first trillion dollar industry (cited in O’Rourke & Connolly, 2003). Oil is very profitable for corporations as well as for governments since oil taxes generate a lot of income. Oil is important for the national economic viability of Saudi Arabia as it accounts for more than 80 percent of total national exports. Other countries that are dependent on the oil business are Libya, Kuwait, Iran, and Venezuela (O’Rourke & Connolly, 2003). Environmental Effects of Oil Oil transport, refining, exploration, drilling, and extraction have had negative effects on the environment, but much attention has recently been focused on the negative environmental impacts of the use of oil. It is widely believed that burning fossil fuels contribute to global warming since carbon dioxide, an abundant greenhouse gas, is produced as oil is burned. Findings of the Intergovernmental Panel on Climate Change indicate that around three quarters of total carbon dioxide emissions come from fossil fuel use (O’Rourke & Connolly, 2003). To be able to fully understand the how oil use affects global warming, it is necessary to get a clear understanding of the greenhouse effect. The greenhouse effect is a natural phenomenon. Imagine a greenhouse and that is just how the greenhouse effect works. Greenhouse gases such as carbon dioxide, water vapor, methane, and ozone trap heat thereby slowing its escape from the atmosphere. The dramatic increase in the release of greenhouse gases has brought about an abnormal increase in the average world temperature already estimated at around 1 percent at the turn of the century. However, without the greenhouse effect, the Earth would be too cold to sustain the currently thriving ecosystems (West, 2008b). Due to the fact that oil is a widely used resource and that oil produces significant amounts of carbon dioxide as it â€Å"generates roughly 30 percent more carbon dioxide from every unit of energy produced,† it can be inferred that dependence on oil has extensively contributed to global warming (Barry & Frankland, 2001, p. 362). Importance of Oil to Saudi Arabia In all parts of the world, oil is considered as an important resource especially in modern life. â€Å"Any measures to reduce oil consumption were hampered by powerful opposition of certain governments and inter-governmental organizations† (Barry & Frankland, 2001, p. 362). Oil is particularly of great importance especially to members of Organization of Petroleum Exporting Countries (OPEC) since it constitutes a great part of the income of member countries. Saudi Arabia is a member of the OPEC including Algeria, Angola, Ecuador, Indonesia, Iran, Iraq, Kuwait, Libya, Nigeria, Qatar, United Arab Emirates, and Venezuela. Saudi Arabia may be considered as the most important oil producer since it produces large amounts of oil as it accounts for 13 percent of the world’s total oil output. It makes up 35 percent of the OPEC’s total oil production in 1991. Saudi Arabia has also been identified as the â€Å"swing producer† of oil since it has the capacity to affect the level of supply and demand as well as affect international oil prices. Oil is important to Saudi Arabian economy as figures in 1991 pointed out that oil accounted for 73 percent of the country’s revenues. 90 percent of total oil exports in 1991 come from Saudi Aramco (Country Studies). However, data from Beyond Petroleum Statistical Review of World Energy shows that despite the knowledge of the implication of oil in global warming, the consumption still increased—the 3163. 5 million tonnes consumed in 1992 jumped to 3462. 4 in 1999 (Beyond Petroleum, 2008). Carbon Dioxide and Climate Change Despite the great number of proponents pointing to global warming as a real environmental threat, Idso and Idso (2008) indicate that it is â€Å"highly unlikely† that increases in carbon dioxide emissions will lead to global warming. They cited numerous arguments that would disestablish the link between the global warming and greenhouse gas emissions. They primarily indicated that there is a â€Å"weak short-term correlation† between carbon dioxide and temperature increase. Thus, the emissions may not be the likely cause of any warming that is being experienced or will be experienced. Even as both temperature and carbon dioxide emissions have increased, this does not necessarily mean that the two are interrelated. To identify a clear causal relationship, the presumed cause must precede the presumed effect. Several cycles of increase and decrease must also be present in order to make a concrete judgment that the two factors indeed affect each other. They also indicated that â€Å"a strong negative climatic feedback† will prevent any catastrophic warming from manifesting. These play a major role in the planet’s climate system but are totally ignored by scientists lobbying for the existence of global warming. They cited numerous other factors that would disprove the existence of global warming. II. Saudi Arabia The Oil Industry The Saudi Arabia landscape is characterized by the presence of several multi-million dollars worth of infrastructure created to support the oil production capability of the country. These infrastructures are costly investments made by different companies. The effort to contain the emission of carbon dioxide from oil manufacturing and processing sources has different impacts, particularly in economics. Another â€Å"important issue concerns taxes and duties on oil products consumed in oil-importing countries as well as environmental taxes and duties on emissions of carbon dioxide, aimed at curbing oil demand and potentially harming oil exporters’ revenues† (Noreng, 2006, p. 16). Oil production felt a decline. In 2002, daily oil production in Saudi Arabia was 8,928 thousand barrels, and this steadily climbed to 11,114 thousand barrels in 2005. However, this dropped to 10,853 and 10,413 thousand barrels in 2006 and 2007, respectively. Last year, Saudi Arabia’s total oil output dropped by 440,000 barrels per day and is the largest decline in the world last year. In addition, the whole of the Middle East produced 25,176 thousand barrels daily in 2007. The Middle East is also the world’s largest oil producer and holds the highest share in the world’s remaining oil reserves at 21. 3 percent with 264. 2 thousand million barrels. In measuring oil consumption, Saudi Arabia does not consume as much with 2,154 thousand barrels daily. The United States is the largest oil consumer with a consumption rate 20,698 thousand barrels per day (Beyond Petroleum [BP], 2008). Saudi Aramco and the Environment Saudi Aramco or Arabian-American Oil Company, which is based in Saudi Arabia, is the world largest oil company. It produces the most quantity of oil and also leads the count with its oil reserves. It has 102 oil and gas fields within its grasp as of the middle part of 2007. Its oil reserves amount to 259. 9 billion barrels and it produces 8. 9 million barrels per day. Its oil exports for the year 2006 amount to 2,541,692,569 barrels (Country Studies, 2008). Saudi Aramco has unveiled that it would help fight global warming through cutting carbon dioxide emission in the oil and gas business. Experts indicated that persuading Saudi Aramco to fight against global warming is a big step forward since it is the world’s largest oil producer. Saudi Aramco president and Chief Executive Officer Abdallah Jum’ah told a panel from 163 nations in a meeting in Germany about expanding the Kyoto Protocol that â€Å"the petroleum industry should actively engage in policy debate on climate change as well as play an active role in developing and implementing carbon management technologies† (Hammond, 2006, n. p. ). He clearly indicated that national oil players such as Saudi Aramco can make great contributions in forwarding anti-climate change efforts. During the meeting, Robert Socolow from Princeton University also indicated that 40 percent of the increase in carbon dioxide emissions comes from the oil industry. He also indicated that the oil industry is the major cause of global warming. Aramco officials also stated that research and development effort have already leaned towards removing or reducing carbon dioxide omissions coming from oil (Hammond, 2006). Saudi Aramco has expressed that it cares for the environment such that it has an Environment Protection Department that provides leadership on environmental issues and its operations are always environmentally responsible. Saudi Aramco considers the environment as a basic responsibility and a company commitment. The company has developed a variety of operational requirement that give consideration to environmental impacts such as â€Å"sanitary codes, project environmental assessments, air and water quality standards, occupational health regulations, hazardous material communication guidelines, waste management procedures, and vital oil spill contingency plans† (Saudi Aramco, 2008). The Environmental Impacts of Oil Oil has always been an environmental issue. From searching for oil, refining it and until its usage, it is always regarded as an environmental threat. Oil exploration and drilling are the first phases in the oil life cycle. It is also referred to as the â€Å"upstream phase† (O’Rourke & Connolly, 2003, p. 593). Drilling and extracting oil affect the natural ecosystems, human health, as well as local cultures. It does not matter if the drilling is on-shore or off-shore; the effects are just the same. The physical modifications in the environment caused by oil exploration, drilling, and extraction are so devastating that they could be more harmful than a large oil spill. The more devastating effects of these are â€Å"deforestation, ecosystem destruction, chemical contamination of land and water, long-term harm to animal populations (particularly to migratory birds and marine mammals), human health, safety risks for neighboring communities and oil industry workers, and displacement of indigenous communities† (O’Rourke & Connolly, 2003, p. 593-594). Oil exploration requires heavy equipment, and moving these equipment results in deforestation and erosion. Mobile rigs used for temporary drillings can reach weights of over two million pounds. On the other hand, drillings make use of large amounts of water and also contaminate it in the process. It is released afterwards which leads to the contamination of land. Exploration and extraction have also been known to produce large volumes of drilling wastes and associated wastes. In addition, oil processes make use of a waste pit where chemicals and other wastes from the oil process are being dumped. Exposure of these oil pits is a threat to aquifers as well as to animals and birds. They can mistake the pits for water holes, therefore engorging themselves in chemical waste. Exploration, drilling, and extraction also lead to a variety of health risks for humans. These risks may arise from radioactive materials that have surfaced from drilling as well as the bioaccumulation of oil, mercury, and other hazardous elements in animals that are consumed by humans (O’Rourke & Connolly, 2003). Oil Spill Threat In order for oil to be delivered to different parts of the world, oil transport is necessary, and the main mode of oil transport is through oil tankers. However, moving oil using pipelines is becoming vastly popular. Oil currently accounts for half of all sea cargo and oil pipelines now spread more compared to railroads. Oil transport has also led to an environmental threat known as oil spills. Large oil spills receive much attention particularly because of media coverage; however, small cumulative spills go undocumented and measuring the amount of oil spillage from these proves to be significant. Accidents have been known to occur at all segments of transport as well as at each point of transfer. Also, since the 1960s, at least one large-scale oil spill has been documented every year (O’Rourke & Connolly, 2003). Ocean transport of crude oil and petroleum products accounted for 3,000 gallons spilled per billion ton-miles in 1983 and nearly 8,000 gallons per billion ton-miles in 1984. Pipeline spills contributed less than 100 gallons per billion ton-miles for both years. (O’Rourke & Connolly, 2003, p. 599) Oil spills have also been known to occur during extractions. A 2002 estimate by the National Academy of Sciences indicated that 38,000 tons of petroleum hydrocarbons from oil and gas operations were released into the world’s oceans (O’Rourke & Connolly, 2003, p. 595). Saudi Aramco Oil Spill Contingency Plan Saudi Aramco has always been responsible in handling oil spills such that it has developed a contingency plan against to help counter oil spills. Saudi Aramco’s first focus on handling oil spills is being self-sufficient. It â€Å"built specialized oil spill recovery and containment vessels, and purchased equipment and materials to combat spills† (Zaindin, 1996, p. 2). In 1989, it even designated a committee to review and assess the anti-oil spill capabilities of the company. The task force made recommendations which were called the Global Oil Spill Contingency Plan which (1) â€Å"establish[ed] an oil spill policy for [the company’s] worldwide operations,† (2) â€Å"direct[ed] Saudi Aramco and its affiliates to join major cooperatives and assign[ed] regional responsibility for oil spills† and (3) â€Å"require[d] the development, implementation, and maintenance of regional and owned tanker oil spill plans† (Zaindin, 1996, p. 2-3). Saudi Aramco has also established an Oil Spill Committee in 1990 and this committee instituted a policy for the prevention and cleanup of oil spills resulting from the company’s operations. The Global Oil Spill Coordination Group was created to put into action and coordinate company activities that address the oil spills. If an oil spill takes place, a Regional Oil Spill Coordinator cleans the oil spill with the aid of an Oil Spill Response Team. The director takes care of the spill and is responsible for safe and efficient control, cleanup operations, disposal, restoration, as well as documentation processes. The response team is always ready as they receive special regular trainings (Zaindin, 1996, p. 3-4). Equipment that could effectively handle small to medium-sized oil spills have been stationed at the vicinity of the Red Sea and in case of any large oil spills, additional resources will be brought to immediately address the threat. Saudi Aramco has also inked ties with organizations that provide cooperative assistance in case of oil spill, namely, the Oil Spill Response (OSR) Ltd. based in England, Clean Caribbean Cooperative (CCC), Marine Preservation Association (MPA), Marine Industry Repsonse Group (MIRG), and the Gulf Area Oil Companies Mutual Aid Organization (GAOCMAO) (Zaindin, 1996, p. 4). III. Involvement Saudi Arabia and Japan Saudi Arabia has been involved in a lot of international treaties. One of these treaties was signed with Japan when both countries, among other things, acknowledged the importance of the stability of the world oil market as well as the importance of adopting security measures against global warming (Ministry of Foreign Affairs of Japan, 2007). Both sides reaffirmed the importance of the stability of the world oil market. The Japanese side expressed its appreciation and understanding for the Saudi Arabia’s balanced oil policy, which is a secure and reliable source for providing oil supplies to the international markets in general, and to the Japanese market in particular†¦while stressing the significance to further promote bilateral cooperation in energy, based upon mutually complementary relationship between Saudi Arabia, with its largest hydrocarbon resource in the world, and Japan, with its advanced energy-related technologies. The Saudi side expressed its intention to continue to assure stable oil supply to Japan, and the Japanese side expressed its appreciation for this (Ministry of Foreign Affairs of Japan, 2007). Both sides [also] decided that the international community should adopt appropriate measures against a possible global warming, based on the principle of common but differentiated responsibilities as stated in the international agreements on climate change. In this regard, the Japanese side expressed its willingness to develop its cooperation in both levels of government and private sectors to promote the clean development mechanism (CDM) that contributes to combating the possible global warming as well as achieving sustainable developments in the Kingdom of Saudi Arabia. Both sides reaffirmed the importance of the roles of the private sectors in both countries for promoting CDM projects (Ministry of Foreign Affairs of Japan, 2007). Saudi Arabia should use the power of the law, as well as submit to the rule of international law, in order for efforts versus global warming to be successful. â€Å"Law plays an important role in environmental protection at both the international and the national levels† (Chopra, Leemans, & Kumar, 2005, p. 41). However, a drawback to this concept is the fact that Saudi Arabia itself shows signs of not being fully amenable to the stipulations of several international agreements and international laws on global warming. â€Å"Some OPEC countries (e. g. Saudi Arabia and Kuwait) also opposed the FCCC (Framework Convention on Climate Change) for fear of its potential impact on the price of crude oil† (Alexander & Fairbridge, 1999, p. 637). The Clean Air Act and Addressing Global Warming The Clean Air Act is a law that has been passed by some countries in a hope to control air pollution and greenhouse gas emissions. Numerous developed countries such as the United States, Canada, and the United Kingdom have adopted such laws and even some third world countries have done so. Saudi Arabia has yet to adopt such a law. In the United States, the Clean Air Act is a federal law which means that its coverage spans the whole country and it has been an effective tool in regulating greenhouse gas emissions. The Environment Protection Agency (EPA) plays a crucial role in regulating processes regarding the law such as setting limits on certain air pollutants. The Clean Air Act which resulted in reduced air pollution has improved human health as well as the status of the environment. Since 1970, the six common air pollutants have been reduced to 50 percent while air toxics from large industries including oil refineries have been reduced by 70 percent. Additionally, new cars are 90 percent cleaner and are expected to be a lot cleaner in the future. Ozone depleting chemicals such as CFC’s have also ceased production. This all happened while the economy prospered and energy and vehicle use increased (EPA, 2008). The same benefits could possibly be reaped if Saudi Arabia would adopt the same policies. The 2007 Climate Change Performance Index indicated that Saudi Arabia is at the bottom of the list when it comes to addressing global warming followed by the United States, China and Malaysia. Sweden, Britain and Denmark were identified as the countries that have been doing the most to prevent further global warming. Nevertheless, the report indicated that what Sweden, Britain and Denmark are doing are not enough to prevent further climate change. IV. Organizations Different organizations and alliances take part in addressing global warming, like the Kyoto Protocol and the WTO. While Saudi Arabia is an active international player, it is not always in agreement with the rest of the group. Referring to the act of non compliance to the Protocol’s instituted policies, Grosse (2005) stated that â€Å"Saudi Arabia has been among the non-Annex I countries that have been particular to the Protocol† (p. 155). â€Å"The issue of subsidies favoring the coal, nuclear renewables sector has been raised by Saudi Arabia in the WTO’s Committee on Trade and Environment,† according to Yamin and Depledge (2004, p. 256), in reaction to the WTO policies. The Kyoto Protocol The Kyoto Protocol is one doctrine that binds nations that have ratified it to help fight against global warming by reducing their emissions of six greenhouse gases, namely, carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFC’s and PFC’s. It was instituted in Kyoto, Japan on December 1997 and was opened for ratification on March 16 of the succeeding year. The main goal of the Kyoto Protocol is to reduce greenhouse gas emissions to 5. 2 percent below the 1990 greenhouse gas emission levels from 2008 to 2012. Countries that have bound themselves to the protocol must adopt certain policies and strategies in order to meet the specified emission targets. However, the protocol has been subject to a lot of debate because it exempts developing countries, such as China and India as well as Saudi Arabia, from having emissions cuts. The United States refused to ratify the Kyoto Protocol because of the exemption of the developing countries. US President George W. Bush also stated that they will not sign the protocol because it does not bind developing countries and that it would be harmful to the US economy (West, 2008a). Late in 2004, the government of Saudi Arabia has approved of the Kyoto Protocol, but being a developing country, Saudi Arabia is not bound to adopt any cuts on greenhouse emissions although it is expected that the Saudi Arabian government will suffer huge financial losses as the developed countries approve the protocol. According to Saudi Oil Minister Ali al-Naimi, the government will have accumulated losses amounting to $19 billion by 2010 because of the policies that the developed nations will adopt in order to reduce their emissions to meet the specified targets (Planet Ark, 2004). Carbon Capture and Storage Carbon Capture and Storage (CCS) is one approach that scientists are looking at which could probably help mitigate global warming. It has been regarded that CCS will reduce the costs associated with mitigating climate change as well as provide flexibility in attaining greenhouse gas reduction goals. CCS makes use of new technology. It collects and concentrates the carbon dioxide produced in industrial and energy related sources and transports it to a storage location where it will be kept away from the atmosphere. This would allow the use of fossil fuels such as oil with a minimum level of greenhouse emissions (Metz, Davidson, de Coninck, Loos, & Meyer, 2005). Geological storage is one form of CCS. It is done by injecting carbon dioxide in dense form into rock formations underground. Porous rock formations have great potential in storing carbon dioxide. Such rock formations may include those that previously hold oil and natural gas. This kind of carbon storage is already being used in three industrial sites, namely, the Sleipnir Project in the North Sea, the Weyburn Project in Canada and the In Salah Project based in Nigeria. Moreover, 30 megatons of carbon dioxide per year is injected for Enhanced Oil Recovery (EOR). This is mostly in Texas and the United States. This system of carbon capture and storage makes use of almost the same technology used for the exploration and production of gas (Metz, et al. , 2005). Geological storage may however be associated with some risks. Leakage from stored carbon dioxide may provide certain risks which are classified as either global risks or local risks. Global risk is identified as the release of carbon dioxide which will have significant effects on global warming. On the other hand, carbon dioxide leakage may also expose humans, ecosystems and groundwater to certain risks. These are the local risks (Metz, et al. , 2005). Annex 1 shows an overview of geological storage. Annex 1: Overview of Geological Storage Another type of carbon storage is ocean storage. It is done by injecting captured carbon dioxide at depths of greater than 1,000 m. under the ocean. This would isolate the carbon dioxide from the atmosphere for centuries. Consequently, the stored carbon dioxide will become part of the global carbon cycle. However, just like geological storage, ocean storage also has certain risks such that it can cause a great deal of harm. Studies have indicated that animals have been found with reduced rates of calcification, reproduction, growth, circulatory oxygen supply and mobility, and even an increased mortality rate. Annex 2 shows detailed information on Ocean Storage (Metz, et al. , 2005). Annex 2: Overview of Ocean Storage Mineral carbonation and industrial use is yet another form of carbon capture and storage. Mineral carbonation makes use of converting carbon dioxide into solid inorganic carbonates through some form of chemical reaction. Mineral carbonation is actually a natural earthly process called â€Å"weathering† but human intervention needs to hasten this process since it is too slow to become a viable carbon storage system. Industrial use involves using carbon dioxide â€Å"directly or as a feedstock for production of various carbon-containing chemicals† (IPCC, __, p. 39). Industrial use makes use of chemical and biological processes wherein carbon dioxide is utilized as a reactant. The industrial use of carbon dioxide can help keep carbon dioxide out of the atmosphere by instead diverting it into a â€Å"carbon chemical pool†, but this measure will only be of great benefit to preventing climate change if there is a significant amount of carbon dioxide taken away from the atmosphere. Refer to Annex 3 for more detailed information (Metz, et al. , 2005). Annex 3: Mineral Carbonation and Industrial Use Saudi Arabia and the Organization of Petroleum Exporting Countries (OPEC) have expressed support with the development of this technology. Norway also demonstrated great interest with Carbon Capture and Storage technology. Norwegian Oil and Energy Minister Aaslaug Haga has requested the support of the Saudi Arabian government in the development of CCS to which Saudi Oil Minister Ali al-Naimi responded eagerly. Dagens Naeringsliv quoted al Naimi saying that â€Å"both Saudi Arabia and Norway are concerned about the environment and want to reduce emissions with all possible means. CO2 capture and storage is an excellent way to reduce emissions† (Acher, 2008, n. p. ). These countries want carbon capture technology included in the Clean Development Mechanism so that industrialized countries can cooperate to help advance this technology (Acher, 2008). According to the European Technology Platform on Zero Emission Fossil Fuel Power Plants, it is the lack of funding which impales research on carbon capture which then limits its potential (Kanter, 2008). The King of Saudi Arabia announced that the Saudi Arabian government will shell out 300 million USD for research on climate change, and this includes Carbon Capture and Storage technology. Kuwait, Qatar, and the United Arab Emirates also made an assurance that each of them will be giving $150 million each tom support the Saudi Arabian endeavor (OPEC, 2007). Saudi Arabia shelling out that huge an amount of money for climate change research would indicate that the kingdom is now giving attention to climate change. The World Trade Organization Saudi Arabia is now also a part of the World Trade Organization (WTO) and has recently signed a bilateral trade agreement with the United States. The trade agreement came at a good time since Saudi Arabian imports have experienced a decline. The WTO has become a sign of respect and acceptance for Saudi Arabia particularly because it is the only GCC country and the largest oil producer (Zahid, 2005). Saudi Arabia initially did not join GATT, the WTO’s predecessor global trade agreement because oil, its sole export at the time, was not part of GATT (still not part of WTO). Later, as the Kingdom developed its downstream oil and petrochemical capacity, joining WTO became a key imperative in order to protect its exports from inordinate tariffs by mature, high-cost producer countries. (Zahid, 2005) For new aspirants at the WTO, rules may be harsh such that they will need to sign bilateral agreements with any member country that requests it, and the terms will have to be extended to other member countries. Afterwards, a multilateral agreement should be inked with all member countries before being admitted into the WTO (Zahid, 2005). According to Zahid, the WTO had some negative impacts on Saudi Arabia but the WTO may be likened to a medicine. â€Å"It is painful to swallow but it eventually makes you better† (Zahid, 2005, n. p. ). In the short term, the WTO will hurt Saudi Arabia, but in the long run, the Saudi Arabian economy will prosper because of the WTO such that there will be increased transparency, protection of copyrights, rule of law, and foreign investment. Saudi Arabia’s exports will also have access to WTO member countries (Zahid, 2005). The full impact of WTO will be a long and unfolding story for the country. We still need to know the details of the final agreement. WTO has given other countries long implementation periods and many exceptions. Also, we have to see what the final Saudi offer is in terms of tariffs, sectors, binding rates, etc. With this report, we start a series on what the WTO means for Saudi Arabia. (Zahid, 2005) On one point of view, it is regarded that the WTO can enforce better greenhouse gas reductions compared to the Kyoto Protocol. Peter Franklin of the Guardian proposes the: Negotiat[ion of] a successor to Kyoto and then let the WTO enforce it. Nations that failed to meet their carbon targets would have a proportionate tariff slapped on their imports. Such a system could even be used to deal with countries that refused to sign up to the new agreement. The WTO would unilaterally impose a target on each non-signatory nation, with their excess carbon emissions and consequent penalties being assessed in absentia. The export-led economies of China, India and other key Kyoto absentees would be particularly susceptible to such pressure (Franklin, 2006). The Kyoto Protocol has no fangs and this could be filled in by the WTO as those who do not approve of reducing greenhouse targets will have to suffer some consequences from the WTO. This could however be treated as a disrespect to a country’s sovereignty. In the long run, since the WTO would attract more foreign investment, foreign investments will also be encouraged in developing alternative, renewable energy solutions in Saudi Arabia. Consequently, CCS can thrive from a commercial point of view as the awareness of climate change would trigger interest in forwarding this technology for economic gains. The WTO system encourages a good government, which in turn will help in framing policies for increased participation in anti-climate change efforts. V. Problems and Solutions The planet’s worsening climate condition is partly the doing of the industrial cities in Saudi Arabia, from where carbon dioxide emissions from oil manufacturing and processing come from. The investment of Saudi Arabia in finding solutions for the problems posed by global warming is research and resources. Countries like Saudi Arabia allocate funds for studies. It focuses its studies on oil-related aspects of global warming management. It is important for countries to sponsor studies so that they can get first hand information about global warming and its implications. â€Å"Nations should foster the continued development of these epistemic communities not only to stimulate new avenues of research, but also to help create greater opportunities for consensus building and coordinated action† (Lee, 1995, p. 14). In reducing carbon dioxide emissions coming from oil, there are a variety of methods that could be adopted. One is eliminating subsidies to prevent increase in consumption levels. Simply saving up on energy use can help alleviate greenhouse emissions. Resorting to renewable energy sources provides great potential in dealing with this environmental threat since these renewable energy sources produce no amount of emissions whatsoever. For countries like Saud

My Proof of Theism

Introduction to Philosophy 200 Spring 2008 My Proof of Theism Jenny Wiggins In this essay, I plan to give proofs that defendtraditional theism. Traditional theism is defined by E. K. Daniel in his essay, A Defense of Theism, as: â€Å"there exists a being, God, who has all of the following attributes: God is omnipotent (all powerful), omniscient (all-knowing), supremely good (omnibenevolent), infinite, eternal, a being who possesses all perfections, transcendent to the natural universe, but the creator of the universe (Daniel, p. 259). † I find it ironic to prove theism in philosophy class. Even Greek philosophers believe in a higher power. The question that is not always agreed upon is which or what higher power to believe? That being said, since there are views that refute theism, I will also take some of these arguments and try to find their weakness. The first classical argument that I will put forth to argue the existence of God is the first cause argument also known as the cosmological argument. This argument simply says that everything has a cause, so if we proceed backwards to find every cause,we would never be able to stop. This is unintelligible. For one to think about it rationally there must be a first cause, a cause that in itself is uncaused. This uncaused being we will call God. Therefore, God exists. The first cause argument proposes that the universe is finite, which means it is limited, and to think of it as infinite would be unintelligible. It also says that the universe is contingent, by stating that each thing in it has a cause. Since the universe could not have caused itself, there must something uncaused that caused the universe. Daniel reformulates the first cause (cosmological) argument this way: P1: Everything in the universe is finite. P2: Whatever is finite is limited. P3: Hence, whatever is limited cannot be the cause of its own existence. P4: Everything in the universe is contingent. P5: Whatever is contingent is dependent on something else for its existence. P6: Hence, whatever is contingent cannot be the cause of its own existence. P7: The totality of things making up the universe is also finite and contingent. P8: Thus, the totality (universe) must also have a cause for its existence. P9: Since it cannot be the cause of its own existence, the cause must be something external to the universe. P10: That is, since the universe cannot contain the reason for its existence within itself, the reason for its existence must be something external to it. P11: Hence, there must exist an infinite and self-subsistent (non-contingent) being who is the cause of the universe. P12: Unlike that which is finite and contingent, such a being must exist necessarily. P13: Such a being is commonly called God. Conclusion: Therefore, there exists an infinite, necessary, and uncaused cause – God (Daniel, p. 68). A question to this argument may be: Do the attributes of finite and contingent, referring to the universe, necessarily need an uncaused being to have created its existence? The very definitions of finite and contingent rationally conclude, yes. If the claim that an infinite sequence of causes was untrue the universe would possibly not exist at all, because if even one of those causes were taken out all succeeding causes would cease to exist. I would also like to take a look at another classical argument which is the design argument also known as the teleological argument. The design argument says that the universe is created in such a way that everything is designed and adapted for a purpose (Daniel, p. 261). The fact that the universe and everything in it seems to be put there in an orderly fashion with things working together in order to give purpose and produce a means to an end, suggests that there was a maker. Consider my argument in defense of the teleological argument below: P1: If we examine an automobile of any kind, we can see that each part has a purpose and design. P2: We can also see that there is an order and complexity. P3: We find that the parts are arranged in such a way that they will operate together in order for us to drive the automobile. P4: This is certainly evidence of rationality and design. Conclusion: Hence, there exists a rational being that designed and brought the automobile into being. Daniel defends the teleological argument by reformulating it in this way: P1: Look out at the universe and the things within it. P2: The universe also shows evidence of design and purpose. P3: We detect orderliness and intricacy. P4: More importantly, we find purposiveness: a marvelous adaptation of means to ends. P5: An example of such purposeful adaptation is the existence of two sexes for the end of procreation or the structure of the eye for the end of seeing. P6: All this is also evidence of rationality and design. P7: Hence, there must exist a rational being who designed and brought the universe into existence. Conclusion: That is, there must exist a Cosmic Designer –God (Daniel, 269). An objection to the teleological argument could be: This earth is not well made; there are plenty of things that do not have adaptation of means to ends. An explanation for this is even though it seems that something does not have purpose for one reason or another it does, but we cannot understand it. Yet another objection may be can we hypothesize that in order to have something of an intricate design that there had to be an intelligent maker? The answer would be yes because a designer cannot make something intelligent by not being so himself. Last but not least I would like to look at the moral argument. This argument states that people have a sense of moral obligation, a feeling to do what is good and right, coming from outside of them. There is no explanation for the sense of completemoral obligation that a person feels other than there is a moral law giver transcendent of the universe. Therefore, such a moral law giver, God, must exist. Human needs and behavior do not explain the complete sense of obligation to do what is right or moral (Daniel, p. 261). Take for example the missionaries sense of obligation to do whatever is in their power humanly and spiritually to help others that they do not even know. The missionaries may possibly risk their very own lives by entering a violent situation just by feeling a complete moral obligation to do so. Another example may be of parents that forgive a murderer who has murdered their only child and they are unable to conceive a new child. These instances are examples of the moral argument. Our doing of good works and deeds by complete moral obligation that is felt to come from outside of ourselves at the forfeit of our own happiness makes no sense unless there is something outside of this universe that compels us to do so, I believe that that compelling force is God. An objection to the moral argument would be: Couldn’t our parents have simply brought us up to do what is morally right? It is not a sense in that one can be taught but a complete sense that will not fail. The decision we make may go against what we are taught as children. I will now take a look at the problem of evil which is most frequently used in the argument against theism. In H. J. McCloskey’s essay, God and Evil, he states the problem in this way, â€Å"Evil is a problem for the theist in that a contradiction is involved in the fact of evil on the one hand, and the belief in the omnipotence and perfection of God on the other. God cannot be both all-powerful and perfectly good if evil is real. † An argument can be formulated to disprove the existence of God in the following way: P1: God is a being that is both all-powerful and perfectly good. P2: An all-powerful being could eliminate all evil. P3: A perfectly good being would eliminate all the evil it has the power to eliminate. P4: Evil exists in the world. P5: Therefore, there is no being that is both all-powerful and perfectly good (McCloskey, p. 328). An argument that would refute the problem of evil is as follows: P1: Evil is necessary to appreciate goodness. P2: Evil is unreal. P3: Evil is necessary for the goodness of the world. The world is made better by the evil in it. P4: Evil is not due to God but to man’s misuse of the free will that God gave him (McCloskey & Hick, 332 &347). With regards to the latter of these two arguments one might think of the analogy of having something that you think is not good, losing it, and then realizing that what you hadwasn’t so bad in the first place. Most people learn lessons from the hardships that they face in life and go on to live an even better life. Man does not always make the most rational decisions in his life and those bad decisions usually have consequences. This is no evidence that there is not an all-powerful and perfectly good God. K. D. Ellis refutes theism in his essay, Why I Am an Agnostic, on the grounds that there are no good reasons, meaning no reliable empirical evidence or sound rational arguments, to believe that there is a God (Ellis, p. 296). He suggests that the classical arguments that are stated in Daniel’s essay, â€Å"may offer some support for the plausibility of the belief in a god, but they are not sufficiently strong enough to compel our assent to the conclusion that a god exists. † He also says that there is no knowledge in the statement, God exists (Ellis, p. 297). However, Ellis also refutes atheism because of the philosophical atheist’s main arguments flaw which is as follows: P1: There is no good reason for anyone to believe that God exists. Conclusion: Therefore, God does not exist. This way of arguing is an argument of ignorance. To say I know what you mean by the ideal of God as a transcendent entity, but, he does not exist. This argumentis fallacious. This is Ellis’ reason for refuting atheism (Ellis, p. 298). Ellis instead makes his stand with agnosticism, because there are no good arguments for God’s existence or refuting God’s existence. Both claims cannot be trueas he states, â€Å"I have tried to show that we cannot know which is true. † Therefore, he takes the position of traditional agnosticism (Ellis, p. 301).

Monday, July 29, 2019

Juvenile Crime Statistics Paper Essay Example | Topics and Well Written Essays - 500 words

Juvenile Crime Statistics Paper - Essay Example This figure was significantly less than the one recorded in previous years. There was an increase in juvenile crimes in 2005, 2006, and 2007, which made the law enforcers fear that the nation would witness a severe crime wave. The crime data collected in 2008 indicated that violent crimes had declined and young adults were being involved in simple assaults and drug offenses. According to Puzzanchera, (2009), most juveniles were being arrested for commission of crimes such as larceny, simple and aggravated assault. Minor crimes that were committed by juveniles during 2008 were property crimes. In relation to this, the FBI assesses trends in property crimes by monitoring offences such as theft of motor vehicle, larceny and burglary. These crimes increased during 2007-2008. According to Puzzanchera (2009), the number of juvenile female who were involved in the commission of crimes increased in 2008. Law enforcers were able to arrest over 600,000 females who were below the age of 18. During this year, females were arrested for robbery, simple assault, larceny and disorderly conduct. Moreover, during 2008, more female juveniles were arrested for commission of larceny whereas there was a decline in the number of males committing larceny. Puzzanchera (2009) indicates that minorities were highly involved in the commission of the aforementioned crimes. In all cases in which juveniles were arrested for the commission of violent crimes, half of the crimes involved black youth, 1% involved youth of Asian origin, 47% involved white juveniles and 1% involved youth of American Indian origin. In the commission of property crimes, two thirds of the arrested juveniles were white, while the rest were blacks with an insignificant number of Asian and Indian youth. In general, youths of black origin where represented in all instances of juvenile arrests. In 2008,

Sunday, July 28, 2019

Toasting the Rebellion Essay Example | Topics and Well Written Essays - 500 words

Toasting the Rebellion - Essay Example The examples of how such public display of Celebration shaped the formation of various revolutions are explained quite vividly in the text. Some of the examples are, The Boston Massacre, Boston Tea Party and The Stamp Act Riots. The text points out that despite the idea behind such Toasting and loud singing are revolutionary the act in itself have been carried out in a very peaceful manner on various occasions. Thus, the focus remained on affirmation of political and national identities rather than public outcry. The significance of Toasts and Singing were usually carried out by huge amounts of drinking and singing in famous public places like Tavern and coffeehouses. At first the tradition was to play and sing songs that are mainly patriotic, however later the tradition moved on to playing satirical Ballads especially on politico-administrations. Usually its significance lay in venting oneself out, and to display one’s spirit openly. Most of the time, such Toasts and songs we re utilized in exerting enough pressure by certain politico groups. A huge amount of nationalism and collective consciousness was created among the people of similar beliefs, or even drawing people on one’s belief, during that time.

Saturday, July 27, 2019

Advance process Engineering Assignment Example | Topics and Well Written Essays - 3500 words

Advance process Engineering - Assignment Example (I) Any value in a pump system can be taken as an outlet. Therefore, taking point j to be an outlet, it the head loss of the point can be calculated from the point j as; †¦(II) Therefore the flow velocities in the pumps will be given as; †¦. (III) †¦ (IV) †¦ (V) The friction factors in the respective pipes can be calculated using Colebrook equation as below †¦ (VI) †¦ (VII) †¦. (VIII) Question 3 a) i.) Such high pressure is needed to provide the propelling force of the gas and to reduce the volume of the gas being transported. ... This is achieved by putting a given quantity of a solid into appropriate conditions that result in solid/fluid mixture to have properties of a fluid. The relationship developed to predict the minimum fluidizing velocity is mainly based on experimental work, despite the fact that many of its important applications is in high temperature locations. According to the tests to show the relationship between fluidization over a range of given temperature, there is a marked discrepancy between prediction and the value of the measured velocity when physical properties values are used appropriating the operating conditions. There is a relationship between the pressure drop across the fluidized bed and buoyant weight per unit area in that the pressure drops is approximately equal to buoyant weight per unit area. There are two approaches in describing these two phenomena in which one considers the process of sedimentation occurring due to dense packing and the other considers the general velocit y of the particles. For either consideration, bed voidage is necessary at minimum fluidization. Voidage refers to the function to the particle distribution, particle size and particle shape. The voidage reduces with an increasing size distribution. Also, the operating temperature relates to the voidage in that as the bed voidage increases, there is a significant increase in operating temperature. During the experiment, the hot fluidized bed is contained in a 188 mm diameter stainless steel cylinder. The fluidization gas is then introduced into the bed through stainless steel distributor plates having a diameter of 0.5 and 1.0 mm drilled holes on a 6 mm 6 mm square pitch

Friday, July 26, 2019

Right Relationship Essay Example | Topics and Well Written Essays - 1500 words

Right Relationship - Essay Example â€Å"Cordelia : All bless’d secrets, All you unpublish’d virtues of the earth, Spring with my tears! be aidant and remediate (Shakespear,121)†. Evidently, It shows that, Cordelia has her morals so deeply rooted in her that she find no way to project her love and admiration for her father. King Lear on the other hand, is a fun and frolic person, who is more engaged in worldly pleasures than royal obligations. He wants to enjoy the luxurious and richness of his kingly status but ignores the responsibilities and duties coming along with it. Moreover, he proclaimed a test to verify the fatherly love of his daughters which shows that he is more of a displayer of love than a believer. Later due to the evil nature of certain characters in the play, King Lear and Cordelier gets captivated and end up in trouble. â€Å"Lear:Ask her forgiveness? Do you but mark how this becomes the house:‘Dear daughter, I confess that I am old;[Kneeling.]Age is unnecessary: on my kn ees I beg That you’ll vouchsafe me raiment, bed, and food† (Shakespear,68).Apparently, the play is portraying an evident transition in the nature of King Lear as he realizes his daughter’s true dedication and love for him. ... Lear: Out of my sight!† (Shakespeare,8 ). The above conversation shows that, he was a blind in his materialistic world and never could perceive the real beauty of love and affection. However, Cordelier was his favorite daughter but he never could understand her real feelings and emotions .The Shakespeare has portrayed Cordelia as a character who is entirely lovable with little or no traces of evil in her. It is when the evil characters of the play attempt to corner the King that he realizes the love and dedication of his affectionate daughter Cordelia. King Lear being blind to the real truth of nature banishes the two most powerful and loyal characters in the play in an ignorant manner. King Lear banishes his youngest daughter Cordelie for not giving a superfluous speech showing her love for him. Shakespeare shows in the act that a person blind to truth can no longer differentiate between good and evil and remains ignorant all his life. Apparently, all what Shakespeare is tryin g to do is to educate the people as to the value of virtue and vice. Is King Lear virtuous according to Aristotle’s concepts? King Lear can never be considered virtuous till the end of the play. He lives a blind life by giving no consideration for truth, morality and ethics. All his effort was in living as a joyous royal entity by forgetting his duties towards his children and the country.Shakespear in this play is trying to gauge the characters from the point of view of Aristotle. According to Shakespeare, a human nature has only two sides, either goodness or evilness. King Lear indeed fell in to the evil category, even though he developed goodness as to the ending stage

Thursday, July 25, 2019

Humidacure Essay Example | Topics and Well Written Essays - 1500 words

Humidacure - Essay Example The product is reliable, comfortable, palatable, and effective to treat flu, cold, and cough. The aim of having a product with pleasant flavours is to enhance an added advantage over other competitors in the market. The product does not only focus on treatment but expands out to reach people who enjoy taking products with flavours such as ginger, lemon, or orange. The product is good both in consistency and quality, which is more likely to attract many consumers in the market. As many people struggle to identify the best medicine that heals flue, cold, and cough, this product aims to provide consumers with adequate information on how to take the medicine and the various ways they can do to prevent the illness. With this, consumers will be in a better position to comprehend about their illness and evaluate ways to prevent it in future. Still, there will be contacts displayed in the product, which consumers can use to communicate to the company in case of any complication, and this wil l create trust and confidence of consumers on the benefits of using the product. 2.0 Situational analysis At this point, it is important to understand the internal and external factors that will be affecting the business as this will lead to a better understanding of what will influence the product future. The product will be affected by the government that has a strong control over the product manufacturing activities. The company may spend some resources to ensure that the product align with the health standards of law. Secondly, economic crisis may make consumers to cut down their spending on medicines and instead prefer to make drinks that heal the cold. With many products in the market, most consumers may be forced to purchase other products that may be cheaper than Humidacure. It is pertinent to note that, a culture has a strong effect on people’s perception and preferences. Natural ingredients are among the crucial aspects of culture, which marketers will put into cons ideration. The product will contain various ingredients that help in relieving cold, flu, and cough such as ginger, lemon, and orange just to name a few. A comprehensive marketing strategy will be crucial to understand how to address the external environment of the product. Extensive training will be conducted to those manufacturing and distributing the product to keep good relations with consumers and maintain quality product that attract consumers all over regardless of various challenges that may emerge such economic crisis. Customer satisfaction will be considered as the most vital thing for the company’s progress. MARKET ANALYSIS 3.0 Market Demographics The product targets adults from urban middle class segment. The reason for this group is that adults are more likely to purchase medicine than adolescents or teenagers. In most cases, parents purchase medicines for their kids. Still, this target group is most preferable in that most adults are more concern with their heal th and children’s health. 3.1 Market Summary The product is intended to use the combination of promotion advertisements where the focus will be placed on attracting clients to purchase the product while converting the first users of the product to frequent and potential users. To accomplish these, the product will be marketed via technology tools such as internet that will create awareness in many people. Still, this will create a strong

Wednesday, July 24, 2019

Criminology research proposal- To what extent is employee theft Proposal

Criminology - To what extent is employee theft effecting busness - Research Proposal Example This new aspect has threatened to derail business progress of many companies, with competitor firms easily finding ways to fix the subject firms using such secrets. Based on various statistics, as brought out by Walsh (2000), approximately 75% of employees have at one time or another been involved in employee theft, with a vast majority of the group having perpetrated the act multiple times. This, he notes, stems from mistreatment of an employee by the firm, a prospect that creates an urge of retaliation among the employees. In addition, the problem of employee theft has been proposed to result from underpayment of the workers. In some cases though, the employees are encouraged into adopting the vice due to lack of stringent regulatory and punitive measures. Indeed, the theft cases may hold long-standing effects on the economy and to the employees at personal levels. As such, it is often instrumental for appropriate response procedures to be adopted to withstand such cases. For instance, many firms have often been encouraged into adopting stringent regulations which, nevertheless, impact negatively on business performance. Therefore, it is nota ble that the measures adopted so far have been less effective considering the increase in incidences of theft and consequent collapses and insolvencies among many traditional firms. This study is based on various objectives around which the aspect of employee theft revolves. Firstly, the study seeks to determine the internal and external business factors that precipitate employee theft. The study also seeks to determine the probable impacts of the theft cases to social and economic setups within and without the firm, and the implications of such business factors to the economy of the UK. In addition, the study seeks to ascertain what globalization and technological advancement in business administration means to employee theft. Further, the

Military Defense Spending Research Paper Example | Topics and Well Written Essays - 1000 words

Military Defense Spending - Research Paper Example It is imperative to reduce the defence expenditure since it has minimal contribution to the economy. The decline in defence allocations will result in lower incomes for firms that operate in this industry. The reduction in defence budgets will lead to reduction of operations in the defence-contracting firms. Consequently, such entities will retrench employees to an extent that suit their income levels since they are profit oriented. The reduction in budgetary allocations will result in merging of firms as they attempt to consolidate their operations to reduce their overheads. The reduction in defence spending will result in contraction of the defence industry. Additionally, the reduction in defence spending will result in reduced foreign earning form this industry. The defence industry has few players. As such, the industry has few buyers and contractors. The main contractors include Lockheed, General Dynamic and Boeing. This implies that the industry is monopolistic and inelastic. T his state is due to the nature of their merchandise. Additionally, the above contracts are shrouded in secrecy due their sensitive nature. Thus, customers in this industry prefer certain contractors. (Burns). Evidently, the market forces that characterize other industries are absent. Thus, the cost of products in this industry is dependent on other factors rather than market forces (Dwivedi 54). Such factors include duration of executing the contract, the sensitivity of the technology and global alliances. The factors that drive prices in this industry are different since arms trade is a sensitive industry monitored globally. As such, governments do not licence many firms in this industry. The state of the current industry has benefits and disadvantages. First, the industry deals in sensitive merchandise hence, most governments prefer to keep the deals confidential. Additionally, proliferation of some of the weapons would lead to destabilization of global peace. Therefore, having fe w firms in this industry helps deal with black-market dealers. Having few firms in this industry implies that the present corporations will always get contracts. This means that there is minimal competition among the firms involved. The American government has made efforts to maintain competition among players in this industry by barring any merger of large defence firms since this would turn the industry into a monopoly. As such, the American government barred proposed unification between Boeing and Lockheed (Krieg). This would have resulted in the unification of the two principal aerospace contractors. The intervention of the American government was timely since these are the two leading firms in the industry. Therefore, allowing such a merger would have eliminated competition in totality (Krieg). Evidently, this sector ought to have additional players to make it more competitive. This applies to the large contracts that require massive capital outlay. However, this does not apply to smaller contracts since numerous firms have the capability to bid for such contracts making it competitive. However, competition does not vary cost of contracts. This is a key feature of this industry that will not change since defence-contracting firms use specialized

Tuesday, July 23, 2019

Written analysis of Enron Essay Example | Topics and Well Written Essays - 750 words

Written analysis of Enron - Essay Example lves a recent decision by Fair Work Australia (FWA) that the termination of the employment of an employee who has served for long in a firm as a result of breach of the golden safety rules was not harsh, unjust and unreasonable. Karratha Gas Plant site conducted activities in potentially hazardous conditions and had a system to mitigate these risks which require permits as part of the Golden Rules of the company. Mr. Chadwick was employed for 15 years by Woodside Energy Limited at this plant and was working as a maintenance technician. The plant operated with a work permit which formed part of the Golden Safety Rules and Chadwick had been issued with work permit for 7 days to perform hot work which required him to liaise with the control panel before commencing work at any time to ensure that work was done safely. Hours before the expiry of the permit, Mr. Chadwick and another employee arrived at the site before the opening of the permit hut and without consulting the higher management or the panel operator as was the requirement of the permit. They knew the permit hut would open in two hours’ time and thus he obtained a further permit later that day. He claimed that he knew the condition of the relevant permit and he had worked on the same LNG tank on previous occasions and therefore felt that he could meet the conditions without exposing himself or other people to danger. His employment was terminated for breaching the Golden Rule and this action was contested by Chadwick as being harsh, unjust and unreasonable in all contexts. The Deputy President McCarthy held that the Golden Rule had been obtained from standards which had been developed in the oil and gas industry back in 1988 after the Piper Alpha disaster in the North Sea that had led to the death of165 people. This disaster had involved an accumulation of management error and a failure of the permit to work that had not ensured good system of communication. In considering whether the termination was

Monday, July 22, 2019

Race or color Essay Example for Free

Race or color Essay â€Å"To live anywhere in the world today and be against equality because of race or color is like living in Alaska and being against snow†. This famous observation of William Faulkner sums up the present attitude of the people towards discrimination based on color. It is hard to believe that a few decades earlier, unimaginable atrocities have been meted out against a particular section of the society just because their skin color was considered inferior. The real life story, â€Å"Warriors don’t cry† written by Melba Patillo Beals highlights the invincible hurdles faced by a group of ten black students just to acquire a basic education on par with the other students. The events narrated in the book from chapter 12 to chapter 20 leaves one stoned about the heartless abuse that these children had to undergo. A separate army consisting of 1200 soldiers is employed to ensure the safety of these ten children on the first day of their school. Despite this arrangement, there is violence and a threat to the children’s lives, thanks to the fanatic hatred of the segregationists towards the black people. Braving all odds, Melba and her friends continue their education in the school, but every day they are tormented with abuses and unfair treatments even by the school authorities. These chapters give heart-wrenching details of the physical and mental violence against Melba and her friends. Even though a few white girls were sympathetic to Melba’s situation, they could not help her because of threats from the segregationists. It is difficult to believe that even the school authorities did not help their cause. They discriminated against her by excluding her from all festivities and events. Even on her birthday, when Melba defended herself from violence, she was suspended for attacking the whites. After reading the horrible and terrifying accounts of Melba, one cannot avoid admiring the grit and perseverance with which she and her friends pursued their education. After reading these chapters, I felt relieved and thankful for the fact that such discrimination is not existent today. The first African-American president of The United States, Mr. Obama is a proof of this advancement.

Sunday, July 21, 2019

SHCBK Protocol for Securing Ad Hoc Networks

SHCBK Protocol for Securing Ad Hoc Networks Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. Technology under development for wireless ad hoc networks has quickly become a crucial part of our life since it provides â€Å"anytime, anywhere† networking services for mobile users. Wireless ad hoc networks can be dynamically set up without relying on any pre-existing infrastructure, such as Public Key Infrastructure, and central management for communications. However, such infrastructure-less characteristic of the networks also makes them vulnerable to security attacks. Numerous protocols have been planned in order to attain a high degree of safety based on a mixture of human-mediated communication and an normal Dolev-Yao c ommunication medium. One of which is the Symmetrised Hash Commitment Before Knowledge protocol or the SHCBK protocol ( A. W. Roscoe and Long Nguyen, 2006). The protocol design seeks to optimise the amount of security that the humans can attain for a known quantity of work. This dissertation presents an implementation of the SHCBK protocol for securing ad hoc networks over Wi-Fi. Chapter 1 Introduction A wireless ad hoc network is a de-centralized wireless network. The network is called ad hoc for the reason that each hop is ready to send onward data for other hop, and so the resolving that which of hops will send the data to the forward hops is dynamically established on the network connectivity. This is in dissimilarity to wired networks in which routers execute the duty of routing. It is also in difference to organize the wireless networks. In which a particular node recognized as an admission point manages communication among other nodes. All taking part parties in an ad hoc network have the same opinion to recognize and send onward messages, to and from each other. With this type of elasticity, wireless networks have the capability to form anyplace, at any occasion, as long as two or more wireless users are enthusiastic to have the communicate between them. Mobile nodes inside an ad-hoc network move from one location to another. However, finding ways to model these movements i s not obvious. In order to evaluate an ad hoc network performance it is necessary to develop and use mobility models that accurately represent movements of the mobile nodes. In this paper we present performance evaluation of various entity mobility models in terms of the traveling patterns of mobile node. MANET is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes forward packets for each other, allowing communication among nodes outside wireless transmission range hop by hop. Due to dynamic infrastructure-less nature and be deficient in the centralized monitoring points, the ad hoc networks are susceptible to attacks. The Attacks on the ad- hoc network routing protocols can disturb the network performance and dependability. Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communica tions and ad-hoc. In communications mode all traffic is transmitted among The HOPs via an admission point which controls the network and gives it with the safety system. The most usually used normal for wireless networks is the 802.11 principles or Wi-Fi which in fact is not a standard but a entire relatives of principles using the same protocol. The safety in wireless networks by Wi-Fi consists of WEP, WPA and now lately WPA2 which is essentially a ended version of WPA. WPA was shaped as an middle safety system while WPA2 was finalized and experienced since the preceding system contained several serious weaknesses. Benefits and applications of ad-hoc Networks Ad-hoc networking need not want any admission points as contrasting to wireless networks in Communications mode. This makes them functional in a set of diverse applications. It is mainly used in Military applications and in save operations where the accessible communication communications Has been damaged or is unavailable, for example later than earthquakes and other disasters. But ad-hoc is these days also being used in a lot of commercial applications. Like we see that mobile phones and PDAs using the Bluetooth protocol system, seeing as it is quick and fairly simple to setup and doesnt need any additional tools. Characteristics and standards of ad-hoc As the wireless standard 802.11 does hold up ad-hoc networks, it is extremely limited since it doesnt offer routing among the nodes, so a hop can only arrive at the straight noticeable nodes in its place protocols similar to the Ad-hoc, On-demand Distance Vector protocol or Dynamic Source Routing protocol can not be used. These routing protocols are so called immediate routing protocols, sense that it gives a route to a target only when wanted. In difference the other usually used routing protocols on the Internet are practical sense that they will set up routes separately of the traffic in the network. This implies that the reactive network is quiet pending a connection that is wanted and thus lessens the overcrowding in the network. DSR is an even additional optimized protocol which doesnt need for the sending forwarding computers to have current routing tables but have a list of network addresses in the form of the packet. The protocol because of eavesdrops the limited network traffic and listens for this routing data and information included in the packets and adds it to its personal routing table. One of the major goals when scheming mobile ad-hoc networks where the nodes go about and the topology rapidly alters is to defend the network connectivity among the hops over potentially multi hop channels. To obtain multi hop connection you must offer one-hop connectivity throughout the link-layer and expand that to multi- hop connectivity throughout routing and data that is forwarding protocols in the network-layer. Many corporations make substantial investments in their wire- less infrastructure. For example, Microsofts IEEE 802.11 based Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy or else, to republish, to position on servers or to redistribute to lists, requires prior specific permission and/or a fee. Wireless (Wi-Fi) network consists of approximately 5,000 access points (APs) supporting 25,000 users each day in 277 buildings, covering more than 17 million square feet [10]. In addition to the equipment costs, the costs of planning, deploying, and maintaining such networks is substantial. Thus, it is important to develop infrastructure that improves the ability of Information Technology (IT) departments to manage and secure their wireless networks. In recent years, researchers have uncovered security vulnerability- ties in Wi-Fi networks [20]. They showed that the Wired Equiv- agency Protocol (WEP), the popular 802.11 security mechanism that most corporations were using at the time, was fundamentally flawed. In a series of highly publicized papers, they showed that 802.11 networks could be compromised easily. The community reacted quickly by developing and deploying alternate security so- lotions including VPNs, IEEE 802.1x [30], several variations of EAP [14], Smart cards, and more recently WPA [29]. Yet, the wire- less LAN (WLAN) security problem was not completely resolved. Last year, Microsoft conducted a series of interviews with WLAN administrators of several large and small organizations [10]. The goal of these interviews was to understand the difficulties involved in deploying and managing corporate WLANs. The issue of WLAN security came up repeatedly during these interviews. All administrators felt that WLAN security was a problem. They were unhappy with the quality of the tools they had at their disposal. Many of them would periodically walk around their buildings using WLAN scanning software looking for security vulnerabilities. Some hired expensive outside consultants to conduct security vulnerability analyses of their WLAN deployme nt, only to conclude that what they really needed was an on-going monitoring and alerting system. Most administrators believed that better systems to manage WLAN security are needed. Even after protocols such as IEEE 802.1x and WPA are deployed, corporate networks can be compromised by off-the-shelf 802.11 hardware and software. For example, an unauthorized AP can be connected to the corporate Ethernet, allowing unauthorized clients to connect to the corporate network. The rogue AP may be con- nected by a malicious person or, as is more often the case, by an employee who innocently connects an AP in his office without realizing that he is compromising the corporate network. A rogue AP can circumvent the elaborate security measures that the IT department may have put in place to protect the companys intellectual property. To test our assertion that people inadvertently compromise the security of their networks, we conducted an experiment in two large organizations that had secured their WLANs using one of the methods mentioned previously. We walked around with a WLAN- enabled laptop in a small section of the two campuses looking for APs to which we could connect. Chapter 2 SECURITY ATTACKS Here I attempts to provide a comprehensive overview of attacks and secure routing. It first analyzes the reason that ad hoc network is vulnerable to attacks. Then it presents the well known attacks and the popular secure protocols. Is out of its radio range, the cooperation of other nodes in the Network is needed. This is known as multi-hop communication. Therefore, each node must do something as both a host and a router at the same time. In most wireless networking environments in productive use today the users devices communicate either via some networking infrastructure in the form of base stations and a backbonenetwork,ordirectlywiththeirintended communication partner, e.g. by means of 802.11 in ad hoc networks In distinction a mobile ad-hoc network is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Every hop in the mobile ad-hoc networks is ready with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication area. Hops are more often share the same physical media. They broadcast and obtain signals at the same frequency band, and chase the same hopping series or spreading code. If the purpose node is not inside the broadcasting range of the sending node, then the sending node takes help of the intermediate hops to communicate with the purpose node by relaying the messages hop by hop. Fig.2 describes the Mobile ad-hoc network. In order for a node to forward a packet to a node that TYPES OF THE SECURITY ATTACKS Securing wireless ad hoc networks is a highly demanding issue. Due to dynamic scattered infrastructure-less nature and be deficient in of centralized monitoring points, the ad hoc networks are susceptible to a variety of attacks. Ad hoc networks have to manage with the same kinds of vulnerabilities as their wired counterparts. As well as with new vulnerabilities specific to the ad hoc context. In addition, conventional vulnerabilities are also accentuated by the ad hoc paradigm. Initially, the wireless channel is available for the both genuine network users and cruel attackers. The ad hoc networks are vulnerable to attacks ranging from static eavesdropping to active prying. Secondly, the be short of an online CA or Trusted Third Party adds the complexity to organize security mechanisms. Thirdly, mobile devices be inclined to have limited power consumption and calculation capabilities which make it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms Fourthly, in MANETs, therearemore probabilities for trusted node being compromised and then life form used by adversary to launch attacks on networks. Lastly, node mobility and recurrent topology changes enforce frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to discriminate between stale routing information and faked routing information. Ad -hoc networks attacks can be differentiated as passive and active. Passive attack signifies that the assailant does not send any message, but just listens to the channel. Passive attacks do not disturb the process of a protocol, but only makes the attempts to find out valuable information. Active attacks may either being directed to disturb the normal operation of a exact node or target the performance of the ad hoc network as a whole. For passive attacks, the attacker listens to the channel and packets that are containing clandestine information might be eavesdropped, which violates privacy. In a wireless environment it is usually not possible to notice this attack, as it does not create any new traffic in the network. Active attacks, counting injecting packets to unacceptable destinations into the network, deleting packets, changing the contents of packets, and impersonating other hops infringe ease of use, veracity, verification, and non-repudiation. Different from the passive attacks, active attacks can be detected and ultimately avoided by the legal nodes that contribute in an ad hoc network . We broadly classify these attacks as passive and active. The classification is important for understanding the strengths and limitations of the DAIR security management system. Eavesdropping Eavesdropping is a passive attack. The attacker passively listens to the traffic on the wireless network and gleans useful information. The listener may use sophisticated code breaking techniques. Countermeasures include use of better encryption techniques as well as physical security measures such as use of radio-opaque wallpaper. Passive attacks are difficult, if not impossible, to detect and we do not address them in this paper. Intrusion Any attack that allows a user to gain unauthorized access to the network is called an Intrusion attack. Intrusion attacks are active attacks and several such attacks are possible. An attacker can compromise the corporate network by gaining physical access to its wired network and connecting a wireless AP to it. The AP creates a â€Å"hole† through which unauthorized clients can connect, bypassing the elaborate security measures that the IT department may have put in place. A similar attack can be carried out by using ad-hoc wireless networks instead of APs. A corporate network may also be compromised when an attacker finds and uses an unsecured AP connected to the network by an unsuspecting employee. The widespread availability of inexpensive, easy-to- deploy APs and wireless routers has exacerbated this problem. As mentioned earlier, we found several unsecured APs in large organizations. The DAIR security management system can detect both rogue APs and rogue ad-hoc networks. Another way a corporate network can be compromised is when an attacker obtains the credentials (e.g., WEP passwords, IEEE 802.1x certificates) needed to connect to the corporate ne twork. The DAIR security management system can not currently detect such attacks. Denial of Service (DoS) Denial of Service attacks are active attacks. A diversity of DoS attacks are possible. Some DoS attacks exploit flaws in the IEEE 802.11 protocol. For example, a disassociation attack is where the attacker sends a series of fake disassociation or deauthentication messages, causing legitimate clients to disconnect from the AP. In a NAV attack, the attacker generates packets with large duration values in the frame header, thereby forcing legiti- mate clients to wait for long periods of time before accessing the network . In a DIFS attack, the attacker exploits certain timing- related features in the IEEE 802.11 protocol to aggressively steal bandwidth from legitimate users. In all three cases, the attacker transmits packets in an abnormal way, either by generating non-compliant packets, or by transmitting compliant packets at an abnormally high rate. The DAIR security management system can detect such attacks. DoS attacks are also possible by creating large amount of RF noise in the ne ighborhood of the network. The DAIR security management system can detect such attacks by comparing current observations with historical data observed from multiple vantage points. DoS attacks can also be mounted by gaining access to the corporate wired network and attacking the APs from the wired side. The DAIR system does not handle DoS attacks on the wired network. Phishing Phishing is an active attack. An attacker sets up a wireless AP that masquerades as a legitimate corporate AP (same SSID, per- haps even same BSSIDs). If the client does not use mutual authentication, it is possible for the attacker to lure unsuspecting legiti- mate users to connect to its AP. The attacker can then use a variety of techniques to extract private information (for example, sniff for passwords). The DAIR system can detect phishing attacks. How- ever, we do not describe solutions to phishing attacks in this paper. ACTIVE ATTACKS SECURITY ATTACKS Certain active attacks can be easily performed alongside an ad -hoc network. Understanding possible shape of attacks is for all time the first step towards increasing good safety solutions. Based on this danger analysis and the recognized capabilities of the potential attackers, several well recognized attacks that can target the operation of a routing protocol in an ad hoc network are discussed. Impersonation. In this kind of attack, nodes may be clever to join the network untraceable or can able to send the false routing data/information, camouflaged as some other trusted node. Wormhole. The wormhole attack involves the collaboration stuck between two attackers. One attacker gets the routing traffic at one point of the network and changes their path to another point in the network that shares a confidential communication link between the attackers, then selectively injects tunnel traffic back into the network. The two colluding assailant can potentially deform the topology and set up routes under the control over the wormhole link. Rushing attacks: The ROUTE REQUESTs for this Discovery sanded forwarded by the attacker can be the 1st to approach each neighbor of the target, then any way exposed by this Route Discovery will comprise a hop through the attacker. That is, when a neighbor of the target gets the hurried REQUEST from the attacker, and it forwards that REQUEST, and will not send onward any further REQUESTs from this Route Discovery. When non-attacking REQUESTs arrive later at these nodes, they will discard those legitimate REQUESTs. Blackmail: The attack incurs outstanding to be short of of genuineness and it grants stipulation for any node to corrupt other nodes legal information. Hops more often keep the data/ information of apparent malevolent nodes in a blacklist. This attack is pertinent alongside routing protocols that use mechanisms for the recognition of malicious nodes and spread messages that try to blacklist the criminal. An attacker may make such coverage messages and tell other nodes in the network to put in that hop to their blacklists and cut off legitimate nodes from the network. Chapter 3 Secure Routing The previously presented ad hoc routing protocols with no security contemplation assume that all participating nodes do not maliciously troublemaking the operation of the protocol. However, the continuation of malicious entities cannot be unnoticed in any system, particularly in open ones like ad hoc networks. Safe routing protocols manage with malicious nodes that can disturb the right performance of a routing protocol by changing routing information. By fabricating the wrong routing data or information and by impersonating other nodes. These safe routing protocols for ad hoc networks are either totally new stand-alone protocols, or in some cases incorporations of security mechanisms into obtainable protocols. Generally the obtainable safe routing protocols that have been future can be generally secret into two types, those that use hash chains, and those that in order to function require predefined trust relations. This method, jointly nodes can efficiently validate the legitimate traffic and distinguish the unauthenticated packets from outsider attackers. ROUTING PROTOCOL FOR AD-HOC NETWORK SECURITY SEAD: Safe Efficient Ad hoc Distance-vector routing protocol. A safe ad hoc network routing protocol that is established on the design of the Destination Sequenced Distance Vector routing protocol. To hold up employ of SEAD with hops of partial CPU processing abilities, and to guard against modification of the source address for a routing update and attacks in which an rejection of service attacks makes attempts to reason other nodes to use surplus network bandwidth or processing time of the network, efficient one way hash Chains but not cryptographic operations are used in the verification of the series number and the metric field of a routing table update message. When a node in SEAD sends a routing update, the node includes one hash value from the hash chain with each entry in that update. The nodes sets the purpose address in that entry to that target nodes address, the metric and series number to the values for that target in its routing table, and the hash value to the hash of the hash value conventional in the routing update entry from which it learned that route to that destination. When a node receives a routing inform, for each entry in that update, the node checks the verification on that entry, by the target address, sequence number, and metric in the conventional entry, together with the newest prior genuine hash value established by this node from that destinations hash chain. The hash value of each entry is hashed the right number of times and it is compared to the before authenticated v alue. Depending on this contrast the routing update is either established as authenticated, or discarded. Ariadne; Ariadne is a safe on-demand ad hoc routing protocol based on DSR that restricts attackers or the mutual hops from tampering with uncompromised routes containing of uncompromised hops, and also stops a lot of types of DOS attacks. In addition, Ariadne uses only extremely well-organized symmetric cryptographic primitives. To induce the objective of the authority of each field in a ROUTE REQUEST, the originator simply includes in the REQUEST a MAC computed with key over exclusive data. The object can with no trouble corroborate the authenticity and newness of the ROUTE REQUEST using the shared key. One-way hash functions are use to confirm that no hop was absent which is called per hop hashing. Three alternative methods to attain hop list verification. The TESLA protocol, digital signatures, and typical MACs. When Ariadne Route detection is used with TESLA, every node authenticates the original data in the REQUEST. The objective buffers and does not fire the REPLY awaiting midd le nodes can discharge the matching TESLA keys. Ariadne Route Discovery using MAC is the majority well-organized way of the three option verification mechanisms, but it asks couple wise communal keys among all nodes. The MAC list in the ROUTE REQUEST is computed by a key common among the object and the present node. The MACs are verified at the target and are not returned in the ROUTE REPLY. If Ariadne way detection is used with digital signatures, the MAC list in the ROUTE REQUEST becomes a signature list. SRP: The safe Routing Protocol consists of quite a lot of safety extensions that can be practical to existing ad hoc routing protocols as long as end-to-end verification. The one and only requirement of the future scheme is the sustained existence of a security association between the node initiating the query and the sought destination. The safety association is used to found a common secret between the two nodes, and the non mutable types of the exchanged routing messages are confined by this shared secret. The method is robust in the occurrence of a number of non-colluding nodes, and provides Routing Table Overflow: In a routing table spread out attack the malevolent node floods the network with bogus route formation packets to non existing nodes to overpower the routing protocol implementations in order to devour the resources of the participating nodes and interrupt the establishment of legal routes. The goal is to create enough routes to prevent new routes from being created or to engulf the protocol execution. Proactive routing protocols are more vulnerable to this attack, since they attempt to produce and preserve routes to all possible destinations. A spiteful node to apply this attack can simply send unnecessary route advertisements to the network. To apply this harasses in order to target a reactive protocol like AODV is to some extent more involved since two nodes are obligatory. The first node should make a genuine request for a route and the malicious node should reply with a forged address. Sleep Depravation: The sleep scarcity afflict aims at the utilization of store of a specific node by constantly keeping it busy in routing decisions. This attack floods the network with routing traffic in order to munch through battery life from the nodes and accessible bandwidth from the ad hoc network. The malicious node continually requirements for either existing or non-existing destinations forces the neighboring nodes to procedure and forward these packets and therefore munch through batteries and network bandwidth hindering the normal operation of the network. Location disclosure: Location disclosure is an attack that targets the solitude necessities of an ad hoc network. Through the use of traffic analysis techniques or with simpler probing and monitoring methods an attacker is able to discover the location of a node, and the structure of the network. If the locations of some of the intermediary nodes are known, one can gain information about the location of the destination node as well. Routing table poisoning: Routing protocols uphold tables which hold information on the subject of routes of the network. In poisoning attacks the malevolent nodes create and send untrue traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. One more option is injecting a RREQ package with a high sequence number. This will reason that all other legal RREQ packets with lower sequence number will be deleted. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops, bottlenecks and even partitioning sure parts of the network. Black Hole: A malicious node uses the routing protocol to insert fake route answers to the route needs it receives promotion itself as having the straight path to a target whose packets it needs to cut off. Once the fake route has been recognized the mean node is able to become a member of the lively route and intercept the communication packets. Network traffic is diverted through the malicious node for eavesdropping, or be a focus for all traffic to it in order to execute a DOS by dropping the received packets or the first step to a man-in-the-middle attack. While the safety requirements for ad hoc networks are the similar the ones for fixed networks, namely ease of use, privacy, reliability, validation, and non-repudiation mobile wireless networks are usually more susceptible to information and physical safety fears than fixed wired networks. Securing wireless ad hoc networks is chiefly tricky for many reasons as well as vulnerability of channels and nodes, nonattendance of communications, dynamically altering topology and etc.; The wireless channel is available to both legal network users and malicious attackers. The abstract of centralized management makes the traditional security solutions based on certification establishment and on-line servers unsuitable. A malicious attacker can willingly become a router and disturb network operations by deliberately disobeying the protocol specifications. The nodes can move arbitrarily and liberally in any way and systematize themselves arbitrarily. They can stick together or leave the network at any time. The network topology changes regularly, rapidly and randomly which considerably alters the status of trust among nodes and adds the complexity to routing among the mobile nodes. The egoism that nodes in ad hoc networks may tend to reject providing services for the advantage of other nodes in order to keep their own possessions introduces new security issues that are not address in the infrastructure-based network Chapter No 3 Distributed Security Scheme for Mobile Ad Hoc Networks In difference to fixed networks a central certification power is not possible in ad hoc networks. Distributing the functionality of certification power over number of nodes is a probable solution. This can be got by creating n shares for a clandestine key and distributing them to n different node. Key can be generating by combining the shares using doorsill cryptography methods. Mobile ad-hoc networks are extremely active. Topology differences and link crack occur fairly often. Therefore, we require a safety answer which is active, too. Any malicious or disobedient nodes can produce antagonistic attacks. These types of attacks can gravely injure essential aspects of safety, such as veracity, confidentiality and space to yourself of the node. Current ad-hoc routing protocols are totally unsure of yourself. Furthermore, obtainable safe routing mechanisms are either too luxurious or have impractical necessities. In ad hoc network, safety solution should separate the attackers and compro mised nodes in the network. Proactively dividing the attackers make it sure that they cannot carry on to attack and waste the network resources in future. A safety solution should have lessening transparency over. Attacks beside ad-hoc routing protocols can be categorize as active or passive. A passive attack does not upset the functioning of the protocol, but tries to discover valuable information by listening to traffic. An active attack inserts arbitrary packets and tries to upset the operation of the protocol in order to bound the accessibility, gain confirmation, or attract packets meant to other nodes. In ad hoc network disobedient node can advertise its accessibility. Nearby nodes changs its route table with the new route and ahead the packet through the disobedient node. Misbehaving node can alter or even drop the packet. So mobile nodes must be able to prove the reliability of a new neighbor before adding it to the route table. Also it is imperative to care for the data pac kets from eavesdropping. Once the cluster member link has reputable a secured link, they can further switch symmetric key and encrypt data packet to ensure data in private and integrity. CLUSTER-BASED TOPOLOGY Clustering is a method by which nodes are placed into groups, called clusters. A cluster head is designated for SHCBK Protocol for Securing Ad Hoc Networks SHCBK Protocol for Securing Ad Hoc Networks Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. Technology under development for wireless ad hoc networks has quickly become a crucial part of our life since it provides â€Å"anytime, anywhere† networking services for mobile users. Wireless ad hoc networks can be dynamically set up without relying on any pre-existing infrastructure, such as Public Key Infrastructure, and central management for communications. However, such infrastructure-less characteristic of the networks also makes them vulnerable to security attacks. Numerous protocols have been planned in order to attain a high degree of safety based on a mixture of human-mediated communication and an normal Dolev-Yao c ommunication medium. One of which is the Symmetrised Hash Commitment Before Knowledge protocol or the SHCBK protocol ( A. W. Roscoe and Long Nguyen, 2006). The protocol design seeks to optimise the amount of security that the humans can attain for a known quantity of work. This dissertation presents an implementation of the SHCBK protocol for securing ad hoc networks over Wi-Fi. Chapter 1 Introduction A wireless ad hoc network is a de-centralized wireless network. The network is called ad hoc for the reason that each hop is ready to send onward data for other hop, and so the resolving that which of hops will send the data to the forward hops is dynamically established on the network connectivity. This is in dissimilarity to wired networks in which routers execute the duty of routing. It is also in difference to organize the wireless networks. In which a particular node recognized as an admission point manages communication among other nodes. All taking part parties in an ad hoc network have the same opinion to recognize and send onward messages, to and from each other. With this type of elasticity, wireless networks have the capability to form anyplace, at any occasion, as long as two or more wireless users are enthusiastic to have the communicate between them. Mobile nodes inside an ad-hoc network move from one location to another. However, finding ways to model these movements i s not obvious. In order to evaluate an ad hoc network performance it is necessary to develop and use mobility models that accurately represent movements of the mobile nodes. In this paper we present performance evaluation of various entity mobility models in terms of the traveling patterns of mobile node. MANET is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes forward packets for each other, allowing communication among nodes outside wireless transmission range hop by hop. Due to dynamic infrastructure-less nature and be deficient in the centralized monitoring points, the ad hoc networks are susceptible to attacks. The Attacks on the ad- hoc network routing protocols can disturb the network performance and dependability. Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communica tions and ad-hoc. In communications mode all traffic is transmitted among The HOPs via an admission point which controls the network and gives it with the safety system. The most usually used normal for wireless networks is the 802.11 principles or Wi-Fi which in fact is not a standard but a entire relatives of principles using the same protocol. The safety in wireless networks by Wi-Fi consists of WEP, WPA and now lately WPA2 which is essentially a ended version of WPA. WPA was shaped as an middle safety system while WPA2 was finalized and experienced since the preceding system contained several serious weaknesses. Benefits and applications of ad-hoc Networks Ad-hoc networking need not want any admission points as contrasting to wireless networks in Communications mode. This makes them functional in a set of diverse applications. It is mainly used in Military applications and in save operations where the accessible communication communications Has been damaged or is unavailable, for example later than earthquakes and other disasters. But ad-hoc is these days also being used in a lot of commercial applications. Like we see that mobile phones and PDAs using the Bluetooth protocol system, seeing as it is quick and fairly simple to setup and doesnt need any additional tools. Characteristics and standards of ad-hoc As the wireless standard 802.11 does hold up ad-hoc networks, it is extremely limited since it doesnt offer routing among the nodes, so a hop can only arrive at the straight noticeable nodes in its place protocols similar to the Ad-hoc, On-demand Distance Vector protocol or Dynamic Source Routing protocol can not be used. These routing protocols are so called immediate routing protocols, sense that it gives a route to a target only when wanted. In difference the other usually used routing protocols on the Internet are practical sense that they will set up routes separately of the traffic in the network. This implies that the reactive network is quiet pending a connection that is wanted and thus lessens the overcrowding in the network. DSR is an even additional optimized protocol which doesnt need for the sending forwarding computers to have current routing tables but have a list of network addresses in the form of the packet. The protocol because of eavesdrops the limited network traffic and listens for this routing data and information included in the packets and adds it to its personal routing table. One of the major goals when scheming mobile ad-hoc networks where the nodes go about and the topology rapidly alters is to defend the network connectivity among the hops over potentially multi hop channels. To obtain multi hop connection you must offer one-hop connectivity throughout the link-layer and expand that to multi- hop connectivity throughout routing and data that is forwarding protocols in the network-layer. Many corporations make substantial investments in their wire- less infrastructure. For example, Microsofts IEEE 802.11 based Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy or else, to republish, to position on servers or to redistribute to lists, requires prior specific permission and/or a fee. Wireless (Wi-Fi) network consists of approximately 5,000 access points (APs) supporting 25,000 users each day in 277 buildings, covering more than 17 million square feet [10]. In addition to the equipment costs, the costs of planning, deploying, and maintaining such networks is substantial. Thus, it is important to develop infrastructure that improves the ability of Information Technology (IT) departments to manage and secure their wireless networks. In recent years, researchers have uncovered security vulnerability- ties in Wi-Fi networks [20]. They showed that the Wired Equiv- agency Protocol (WEP), the popular 802.11 security mechanism that most corporations were using at the time, was fundamentally flawed. In a series of highly publicized papers, they showed that 802.11 networks could be compromised easily. The community reacted quickly by developing and deploying alternate security so- lotions including VPNs, IEEE 802.1x [30], several variations of EAP [14], Smart cards, and more recently WPA [29]. Yet, the wire- less LAN (WLAN) security problem was not completely resolved. Last year, Microsoft conducted a series of interviews with WLAN administrators of several large and small organizations [10]. The goal of these interviews was to understand the difficulties involved in deploying and managing corporate WLANs. The issue of WLAN security came up repeatedly during these interviews. All administrators felt that WLAN security was a problem. They were unhappy with the quality of the tools they had at their disposal. Many of them would periodically walk around their buildings using WLAN scanning software looking for security vulnerabilities. Some hired expensive outside consultants to conduct security vulnerability analyses of their WLAN deployme nt, only to conclude that what they really needed was an on-going monitoring and alerting system. Most administrators believed that better systems to manage WLAN security are needed. Even after protocols such as IEEE 802.1x and WPA are deployed, corporate networks can be compromised by off-the-shelf 802.11 hardware and software. For example, an unauthorized AP can be connected to the corporate Ethernet, allowing unauthorized clients to connect to the corporate network. The rogue AP may be con- nected by a malicious person or, as is more often the case, by an employee who innocently connects an AP in his office without realizing that he is compromising the corporate network. A rogue AP can circumvent the elaborate security measures that the IT department may have put in place to protect the companys intellectual property. To test our assertion that people inadvertently compromise the security of their networks, we conducted an experiment in two large organizations that had secured their WLANs using one of the methods mentioned previously. We walked around with a WLAN- enabled laptop in a small section of the two campuses looking for APs to which we could connect. Chapter 2 SECURITY ATTACKS Here I attempts to provide a comprehensive overview of attacks and secure routing. It first analyzes the reason that ad hoc network is vulnerable to attacks. Then it presents the well known attacks and the popular secure protocols. Is out of its radio range, the cooperation of other nodes in the Network is needed. This is known as multi-hop communication. Therefore, each node must do something as both a host and a router at the same time. In most wireless networking environments in productive use today the users devices communicate either via some networking infrastructure in the form of base stations and a backbonenetwork,ordirectlywiththeirintended communication partner, e.g. by means of 802.11 in ad hoc networks In distinction a mobile ad-hoc network is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Every hop in the mobile ad-hoc networks is ready with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication area. Hops are more often share the same physical media. They broadcast and obtain signals at the same frequency band, and chase the same hopping series or spreading code. If the purpose node is not inside the broadcasting range of the sending node, then the sending node takes help of the intermediate hops to communicate with the purpose node by relaying the messages hop by hop. Fig.2 describes the Mobile ad-hoc network. In order for a node to forward a packet to a node that TYPES OF THE SECURITY ATTACKS Securing wireless ad hoc networks is a highly demanding issue. Due to dynamic scattered infrastructure-less nature and be deficient in of centralized monitoring points, the ad hoc networks are susceptible to a variety of attacks. Ad hoc networks have to manage with the same kinds of vulnerabilities as their wired counterparts. As well as with new vulnerabilities specific to the ad hoc context. In addition, conventional vulnerabilities are also accentuated by the ad hoc paradigm. Initially, the wireless channel is available for the both genuine network users and cruel attackers. The ad hoc networks are vulnerable to attacks ranging from static eavesdropping to active prying. Secondly, the be short of an online CA or Trusted Third Party adds the complexity to organize security mechanisms. Thirdly, mobile devices be inclined to have limited power consumption and calculation capabilities which make it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms Fourthly, in MANETs, therearemore probabilities for trusted node being compromised and then life form used by adversary to launch attacks on networks. Lastly, node mobility and recurrent topology changes enforce frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to discriminate between stale routing information and faked routing information. Ad -hoc networks attacks can be differentiated as passive and active. Passive attack signifies that the assailant does not send any message, but just listens to the channel. Passive attacks do not disturb the process of a protocol, but only makes the attempts to find out valuable information. Active attacks may either being directed to disturb the normal operation of a exact node or target the performance of the ad hoc network as a whole. For passive attacks, the attacker listens to the channel and packets that are containing clandestine information might be eavesdropped, which violates privacy. In a wireless environment it is usually not possible to notice this attack, as it does not create any new traffic in the network. Active attacks, counting injecting packets to unacceptable destinations into the network, deleting packets, changing the contents of packets, and impersonating other hops infringe ease of use, veracity, verification, and non-repudiation. Different from the passive attacks, active attacks can be detected and ultimately avoided by the legal nodes that contribute in an ad hoc network . We broadly classify these attacks as passive and active. The classification is important for understanding the strengths and limitations of the DAIR security management system. Eavesdropping Eavesdropping is a passive attack. The attacker passively listens to the traffic on the wireless network and gleans useful information. The listener may use sophisticated code breaking techniques. Countermeasures include use of better encryption techniques as well as physical security measures such as use of radio-opaque wallpaper. Passive attacks are difficult, if not impossible, to detect and we do not address them in this paper. Intrusion Any attack that allows a user to gain unauthorized access to the network is called an Intrusion attack. Intrusion attacks are active attacks and several such attacks are possible. An attacker can compromise the corporate network by gaining physical access to its wired network and connecting a wireless AP to it. The AP creates a â€Å"hole† through which unauthorized clients can connect, bypassing the elaborate security measures that the IT department may have put in place. A similar attack can be carried out by using ad-hoc wireless networks instead of APs. A corporate network may also be compromised when an attacker finds and uses an unsecured AP connected to the network by an unsuspecting employee. The widespread availability of inexpensive, easy-to- deploy APs and wireless routers has exacerbated this problem. As mentioned earlier, we found several unsecured APs in large organizations. The DAIR security management system can detect both rogue APs and rogue ad-hoc networks. Another way a corporate network can be compromised is when an attacker obtains the credentials (e.g., WEP passwords, IEEE 802.1x certificates) needed to connect to the corporate ne twork. The DAIR security management system can not currently detect such attacks. Denial of Service (DoS) Denial of Service attacks are active attacks. A diversity of DoS attacks are possible. Some DoS attacks exploit flaws in the IEEE 802.11 protocol. For example, a disassociation attack is where the attacker sends a series of fake disassociation or deauthentication messages, causing legitimate clients to disconnect from the AP. In a NAV attack, the attacker generates packets with large duration values in the frame header, thereby forcing legiti- mate clients to wait for long periods of time before accessing the network . In a DIFS attack, the attacker exploits certain timing- related features in the IEEE 802.11 protocol to aggressively steal bandwidth from legitimate users. In all three cases, the attacker transmits packets in an abnormal way, either by generating non-compliant packets, or by transmitting compliant packets at an abnormally high rate. The DAIR security management system can detect such attacks. DoS attacks are also possible by creating large amount of RF noise in the ne ighborhood of the network. The DAIR security management system can detect such attacks by comparing current observations with historical data observed from multiple vantage points. DoS attacks can also be mounted by gaining access to the corporate wired network and attacking the APs from the wired side. The DAIR system does not handle DoS attacks on the wired network. Phishing Phishing is an active attack. An attacker sets up a wireless AP that masquerades as a legitimate corporate AP (same SSID, per- haps even same BSSIDs). If the client does not use mutual authentication, it is possible for the attacker to lure unsuspecting legiti- mate users to connect to its AP. The attacker can then use a variety of techniques to extract private information (for example, sniff for passwords). The DAIR system can detect phishing attacks. How- ever, we do not describe solutions to phishing attacks in this paper. ACTIVE ATTACKS SECURITY ATTACKS Certain active attacks can be easily performed alongside an ad -hoc network. Understanding possible shape of attacks is for all time the first step towards increasing good safety solutions. Based on this danger analysis and the recognized capabilities of the potential attackers, several well recognized attacks that can target the operation of a routing protocol in an ad hoc network are discussed. Impersonation. In this kind of attack, nodes may be clever to join the network untraceable or can able to send the false routing data/information, camouflaged as some other trusted node. Wormhole. The wormhole attack involves the collaboration stuck between two attackers. One attacker gets the routing traffic at one point of the network and changes their path to another point in the network that shares a confidential communication link between the attackers, then selectively injects tunnel traffic back into the network. The two colluding assailant can potentially deform the topology and set up routes under the control over the wormhole link. Rushing attacks: The ROUTE REQUESTs for this Discovery sanded forwarded by the attacker can be the 1st to approach each neighbor of the target, then any way exposed by this Route Discovery will comprise a hop through the attacker. That is, when a neighbor of the target gets the hurried REQUEST from the attacker, and it forwards that REQUEST, and will not send onward any further REQUESTs from this Route Discovery. When non-attacking REQUESTs arrive later at these nodes, they will discard those legitimate REQUESTs. Blackmail: The attack incurs outstanding to be short of of genuineness and it grants stipulation for any node to corrupt other nodes legal information. Hops more often keep the data/ information of apparent malevolent nodes in a blacklist. This attack is pertinent alongside routing protocols that use mechanisms for the recognition of malicious nodes and spread messages that try to blacklist the criminal. An attacker may make such coverage messages and tell other nodes in the network to put in that hop to their blacklists and cut off legitimate nodes from the network. Chapter 3 Secure Routing The previously presented ad hoc routing protocols with no security contemplation assume that all participating nodes do not maliciously troublemaking the operation of the protocol. However, the continuation of malicious entities cannot be unnoticed in any system, particularly in open ones like ad hoc networks. Safe routing protocols manage with malicious nodes that can disturb the right performance of a routing protocol by changing routing information. By fabricating the wrong routing data or information and by impersonating other nodes. These safe routing protocols for ad hoc networks are either totally new stand-alone protocols, or in some cases incorporations of security mechanisms into obtainable protocols. Generally the obtainable safe routing protocols that have been future can be generally secret into two types, those that use hash chains, and those that in order to function require predefined trust relations. This method, jointly nodes can efficiently validate the legitimate traffic and distinguish the unauthenticated packets from outsider attackers. ROUTING PROTOCOL FOR AD-HOC NETWORK SECURITY SEAD: Safe Efficient Ad hoc Distance-vector routing protocol. A safe ad hoc network routing protocol that is established on the design of the Destination Sequenced Distance Vector routing protocol. To hold up employ of SEAD with hops of partial CPU processing abilities, and to guard against modification of the source address for a routing update and attacks in which an rejection of service attacks makes attempts to reason other nodes to use surplus network bandwidth or processing time of the network, efficient one way hash Chains but not cryptographic operations are used in the verification of the series number and the metric field of a routing table update message. When a node in SEAD sends a routing update, the node includes one hash value from the hash chain with each entry in that update. The nodes sets the purpose address in that entry to that target nodes address, the metric and series number to the values for that target in its routing table, and the hash value to the hash of the hash value conventional in the routing update entry from which it learned that route to that destination. When a node receives a routing inform, for each entry in that update, the node checks the verification on that entry, by the target address, sequence number, and metric in the conventional entry, together with the newest prior genuine hash value established by this node from that destinations hash chain. The hash value of each entry is hashed the right number of times and it is compared to the before authenticated v alue. Depending on this contrast the routing update is either established as authenticated, or discarded. Ariadne; Ariadne is a safe on-demand ad hoc routing protocol based on DSR that restricts attackers or the mutual hops from tampering with uncompromised routes containing of uncompromised hops, and also stops a lot of types of DOS attacks. In addition, Ariadne uses only extremely well-organized symmetric cryptographic primitives. To induce the objective of the authority of each field in a ROUTE REQUEST, the originator simply includes in the REQUEST a MAC computed with key over exclusive data. The object can with no trouble corroborate the authenticity and newness of the ROUTE REQUEST using the shared key. One-way hash functions are use to confirm that no hop was absent which is called per hop hashing. Three alternative methods to attain hop list verification. The TESLA protocol, digital signatures, and typical MACs. When Ariadne Route detection is used with TESLA, every node authenticates the original data in the REQUEST. The objective buffers and does not fire the REPLY awaiting midd le nodes can discharge the matching TESLA keys. Ariadne Route Discovery using MAC is the majority well-organized way of the three option verification mechanisms, but it asks couple wise communal keys among all nodes. The MAC list in the ROUTE REQUEST is computed by a key common among the object and the present node. The MACs are verified at the target and are not returned in the ROUTE REPLY. If Ariadne way detection is used with digital signatures, the MAC list in the ROUTE REQUEST becomes a signature list. SRP: The safe Routing Protocol consists of quite a lot of safety extensions that can be practical to existing ad hoc routing protocols as long as end-to-end verification. The one and only requirement of the future scheme is the sustained existence of a security association between the node initiating the query and the sought destination. The safety association is used to found a common secret between the two nodes, and the non mutable types of the exchanged routing messages are confined by this shared secret. The method is robust in the occurrence of a number of non-colluding nodes, and provides Routing Table Overflow: In a routing table spread out attack the malevolent node floods the network with bogus route formation packets to non existing nodes to overpower the routing protocol implementations in order to devour the resources of the participating nodes and interrupt the establishment of legal routes. The goal is to create enough routes to prevent new routes from being created or to engulf the protocol execution. Proactive routing protocols are more vulnerable to this attack, since they attempt to produce and preserve routes to all possible destinations. A spiteful node to apply this attack can simply send unnecessary route advertisements to the network. To apply this harasses in order to target a reactive protocol like AODV is to some extent more involved since two nodes are obligatory. The first node should make a genuine request for a route and the malicious node should reply with a forged address. Sleep Depravation: The sleep scarcity afflict aims at the utilization of store of a specific node by constantly keeping it busy in routing decisions. This attack floods the network with routing traffic in order to munch through battery life from the nodes and accessible bandwidth from the ad hoc network. The malicious node continually requirements for either existing or non-existing destinations forces the neighboring nodes to procedure and forward these packets and therefore munch through batteries and network bandwidth hindering the normal operation of the network. Location disclosure: Location disclosure is an attack that targets the solitude necessities of an ad hoc network. Through the use of traffic analysis techniques or with simpler probing and monitoring methods an attacker is able to discover the location of a node, and the structure of the network. If the locations of some of the intermediary nodes are known, one can gain information about the location of the destination node as well. Routing table poisoning: Routing protocols uphold tables which hold information on the subject of routes of the network. In poisoning attacks the malevolent nodes create and send untrue traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. One more option is injecting a RREQ package with a high sequence number. This will reason that all other legal RREQ packets with lower sequence number will be deleted. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops, bottlenecks and even partitioning sure parts of the network. Black Hole: A malicious node uses the routing protocol to insert fake route answers to the route needs it receives promotion itself as having the straight path to a target whose packets it needs to cut off. Once the fake route has been recognized the mean node is able to become a member of the lively route and intercept the communication packets. Network traffic is diverted through the malicious node for eavesdropping, or be a focus for all traffic to it in order to execute a DOS by dropping the received packets or the first step to a man-in-the-middle attack. While the safety requirements for ad hoc networks are the similar the ones for fixed networks, namely ease of use, privacy, reliability, validation, and non-repudiation mobile wireless networks are usually more susceptible to information and physical safety fears than fixed wired networks. Securing wireless ad hoc networks is chiefly tricky for many reasons as well as vulnerability of channels and nodes, nonattendance of communications, dynamically altering topology and etc.; The wireless channel is available to both legal network users and malicious attackers. The abstract of centralized management makes the traditional security solutions based on certification establishment and on-line servers unsuitable. A malicious attacker can willingly become a router and disturb network operations by deliberately disobeying the protocol specifications. The nodes can move arbitrarily and liberally in any way and systematize themselves arbitrarily. They can stick together or leave the network at any time. The network topology changes regularly, rapidly and randomly which considerably alters the status of trust among nodes and adds the complexity to routing among the mobile nodes. The egoism that nodes in ad hoc networks may tend to reject providing services for the advantage of other nodes in order to keep their own possessions introduces new security issues that are not address in the infrastructure-based network Chapter No 3 Distributed Security Scheme for Mobile Ad Hoc Networks In difference to fixed networks a central certification power is not possible in ad hoc networks. Distributing the functionality of certification power over number of nodes is a probable solution. This can be got by creating n shares for a clandestine key and distributing them to n different node. Key can be generating by combining the shares using doorsill cryptography methods. Mobile ad-hoc networks are extremely active. Topology differences and link crack occur fairly often. Therefore, we require a safety answer which is active, too. Any malicious or disobedient nodes can produce antagonistic attacks. These types of attacks can gravely injure essential aspects of safety, such as veracity, confidentiality and space to yourself of the node. Current ad-hoc routing protocols are totally unsure of yourself. Furthermore, obtainable safe routing mechanisms are either too luxurious or have impractical necessities. In ad hoc network, safety solution should separate the attackers and compro mised nodes in the network. Proactively dividing the attackers make it sure that they cannot carry on to attack and waste the network resources in future. A safety solution should have lessening transparency over. Attacks beside ad-hoc routing protocols can be categorize as active or passive. A passive attack does not upset the functioning of the protocol, but tries to discover valuable information by listening to traffic. An active attack inserts arbitrary packets and tries to upset the operation of the protocol in order to bound the accessibility, gain confirmation, or attract packets meant to other nodes. In ad hoc network disobedient node can advertise its accessibility. Nearby nodes changs its route table with the new route and ahead the packet through the disobedient node. Misbehaving node can alter or even drop the packet. So mobile nodes must be able to prove the reliability of a new neighbor before adding it to the route table. Also it is imperative to care for the data pac kets from eavesdropping. Once the cluster member link has reputable a secured link, they can further switch symmetric key and encrypt data packet to ensure data in private and integrity. CLUSTER-BASED TOPOLOGY Clustering is a method by which nodes are placed into groups, called clusters. A cluster head is designated for