Monday, September 30, 2019

Letter to Me

Your highschool years are finally here. You may have heard these will be the best years of your life, but I might have to disagree. Unless you are looking forward to an overload of homework every night and making sure you copy all the notes everyday so you dont fail Mrs. Pormento's weekly biology test im sure you will feel the same. I always looked forward to wednesdays, we had gym with Mrs. Moore it was almost like a free period but her health class on the other hand was dreaded by many including myself. Im sure youll enjoy some of the same classes I did,my favorite was Mr. Hanleys english class senior year. Even though we joked around and and he made us laugh most of the period he somehow found a way to get serious and get back on track. Then after our work was done he would goof off some more. The worst class would have to be history with Mr. V, just the sound of his voice telling us to turn page 1092 and do numbers 1 to 10 when we had 8 days of school left would urke my nerves an d i know majority of the class felt the same. Weekend basketball games were exciting and it was somthing to do on a friday night. Now baseball games were never to interesting to me, regardless i never understood what was going on i just never liked many of the baseball players, they had a cockiness about them that made me barely able to stand the sight of them. Throughout these years you should alway have fun and always have a clear mind and NEVER worry about the rumors the other sections girls make up about you. I always just assumed they were jealous and had nothing else better to do, you should do the same. The most important thing here is your school work. No matter what you should always try your best and do all your assignments,handing them in on time would be even better no one can afford ten points off every day its late. Looking back if i could do it all over again i wouldnt change to many things,maybe just some of the friends i had. As the days go by you grow as a person and you realize who your real friends are. Thats why i always say worry about yourself and yourself only. I say this because everyone looks out for themselves and they arent preoccupied about you and your buisness so you need to stay on top of it and make these four years as easy as possible. Each day in highschool is just another lesson, not only a math lesson that you dont understand or another boring book in english class but there life lessons that will make you a better,wiser person. These lessons will show you who you really are and help you develop into the person that you will strive to be one day. Senior year will come much sooner than later and within a blink of an eye you will be at graduation walking down St. Marys church recieving your highschool diploma. Now lets talk about four years that might be a bit more appealing,college. Everyone brags that college is so much better than highschool and how you become independent during those four years but i guess ill jus see for myself in september. Apply to more than one college, dont make the same mistake i did. Believe me youll regret it big time. One more thing take it slow with Sister Anne and try not to make her life so difficult. Try to always keep in mind that she is eighty five years old and has had it with all of us kids who dont seem to listen very well. So make the best out of these next four years and succeed.

Sunday, September 29, 2019

Case Studies Abstract

Case Studies Abstract Alfredo Cano Abstract Innovative methods in language teaching may sometimes be slightly difficult for less experienced teachers. Case studies are a relatively new type of task-based activities for business English students. They have been used in language courses for some time now. It seems, however, that their full teaching potential has not been used yet. Teachers seem to be uncertain of how to use cases in class.The paper presents the main pedagogical aspects of using case studies in business English courses. It gives a short description of the structure of typical mini-cases included in recently published course-books of business English. It discusses the basic principles and techniques of using the case study method in class. The main aim of the paper is to present the advantages of the case study method as a new tool of developing learners’ linguistic and non-linguistic competence.Cases offer valuable teaching material that needs to be fully exploit ed. Suggestions given in teacher’s books can be supplemented by various innovative tasks aimed at developing the productive skills of speaking and writing. Cases are motivating for business English learners since they give them the authority to decide what to do to solve a real-life business problem (learners are in the role of managers). Learners can present their point of view, discuss its advantages and suggest a course of action.They have a chance to compete and to demonstrate their analytical and managerial skills. Doing the cases learners use language naturally. In the case study method language is a tool to solving a problem, it is a means of communicating in typical business situations. If teachers learn how to use cases more extensively in the future, they will certainly make the teaching process more effective and studentcentered. 1. Introduction The effectiveness of language teaching depends, among others, on teaching materials.Students and teachers need materials that can improve the language acquisition process and offer more opportunities to develop the productive language skills of speaking and writing. These skills, as opposed to the receptive skills of reading and listening comprehension, are more difficult to acquire and require much more practice and time. In her book on business English teaching Donna (2000) stresses the fact that if students believe that in a language course they do tasks relevant for their future professional communication, they are more motivated to learn.Case studies were first used in law to evidence verdicts given by judges and to teach law students. In the 30s of the 20th century cases were introduced in psychiatry. Case reports were written to document diseases and to consult the cases with other specialists. Today, all medical specialties use case reports for didactic and research purposes. Case studies started to be used in business in 1967 when Strauss and Glazer created their ‘grounded theoryâ€℠¢. In the mid-70s of the 20th century they were introduced in business schools.Harvard Business School has been using this method intensively to teach future managers how to solve real-life problems. Today, the case study method is widely used as a teaching and researching tool in medicine, psychology, anthropology, sociology, economics, management, finance and other sciences where the presentation and analysis of a real problem is of relevance in teaching and researching. The paper presents the case study method as an interesting and motivating teaching material that can be widely used in teaching business English to adult learners. 2.

Saturday, September 28, 2019

P2 and M1 for communication Essay

There are a wide range of skills we can use to communicate for example we send, receive, and process huge numbers of messages every day. But communication is about more than just exchanging information; it’s also about understanding the emotion behind the information. Communication can improve relationships at home, work, and in social situations by deepening your connections to others and improving teamwork and decision-making. It enables you to communicate even negative or difficult messages without creating conflict or destroying trust. Communication combines a set of skills including nonverbal communication, attentive listening, the ability to manage stress in the moment, and the capacity to recognize and understand your own emotions and those of the person you’re communicating with Argyles theory, communication cycle has six different stages that help you communicate you ideas.it also takes into consideration how you put your ideas across e.g. body language. An idea occurs, you have an idea that you want to communicate. Message coded, you think about how you are going to say what you are thinking. You put your thoughts into language or sing language. Message sent, you speak, sign, write or in some other way send a message. Message perceived, the other person has a sense of your message. They hear you words or see your symbols. Message decoded, the other person understands your message or what you have just said. This may not always be easy as they may make assumptions about your words and body language e.g. for example you went to the doctors and the doctor asked what wrong and you reply saying ‘I have a constant pain in my ear’. The doctor would need to keep the conversation going by rephrasing the question to something like so it’s your ear that’s hurting? This is to make sure you understood or got the right answer. Message understood, if all goes well your ideas will be understood. Argyles theory, communication cycle is a very useful thing to use when trying to communicate to sensitive patients. The communication cycle is a very useful cycle as it makes sure that you don’t say anything insensitive or hurtful to the person who is meant to be receiving the information. the communication cycle is also useful because there are a wide range of stages to help you communicate with others which helps you send someone information with them understanding what you are saying for example a doctor telling a patient when there next appointment is they could use the cycle to help them give the patient the information. But what do you think? Here is a diagram  of Argyles theory. Tuckmans theory In Tuckmans theory explains that as the team enters each stage they develop maturity, ability, relationships and the leader changes leadership style to fit in with the group.it also allows the team to look at the stages to see what stage they’re currently at. There are five different individual stages forming, storming, norming, performing and adjouring.Tuckmans stages are all necessary and inevitable in order for the team to grow, to face up to challenges, to tackle problems, to find solutions, to plan work, and to deliver results. Forming, the team is assembled and the task is allocated. The team members rend to behave independently as they don’t know each other and may feel intimidated. Individuals are also gathering information and impressions about eachother. Storming, the team starts to progress, addressing the task by suggesting ideas. Relationships may also be starting to develop. It is also essential that a team has a strong leadership. Depending on the culture of the organisation and individuals the conflict will be more or less supressed. As the team starts to move out of the storming stage they will enter the norming stage. This tends to be a step forward by the team agreeing on the rules and values by which they operate. By now the team should start to trust each other. After the arguments, they now have a better understanding of eachother and are able to appreciate each other’s skills and experience. Performing, at this stage the group will be filled with enthusiasm. The team will be able to function as a unit as they find ways to get the job done smoothly and effectively without inappropriate conflict. Some people don’t get up to this stage Adjouring, when team members are proud of what they have achieved and happy to have belonged together but at the same time they recognise that it is time to move on.tuckmans theory is a very useful theory as it gives you a range of information about team building, group skills and there stages. Overall, Tuckman’s Stages is a balanced group effort. And also shows how they’re progressing by maturing and building relationships. Here is a diagram of Tuckmans theory. Personally I think argyles theory is more effective and important than  Tuckmans theory as he gives you a load of communication skills to help you give people information. so it’s more than likely that the other person will understand the information they’re receiving. I don’t think Tuckmans theory is more important than Argyles because in Tuckmans theory he doesn’t give you much information about communication. But both theories are effective and are useful. Effective communication and interaction play an important role in the work of all health and social care professionals. For example, care professionals need to be able to use a range of communication and interaction skills in order to: work inclusively with people of different ages and diverse backgrounds, respond appropriately to the variety of care-related problems and individual needs of people who use care services, enable people to feel relaxed and secure enough to talk openly, establish trusting relationships with colleagues and people who use care services, ask sensitive and difficult questions, and obtain information about matters that might be very personal and sensitive. Nurses may have used their communication and interaction skills to find out about the symptoms of your health problems or may have given you advice or guidance on some aspect of your health behaviour or lifestyle. website Date Time http://www.studymode.com/essays/p-2-Discuss-The-2-Theories-1360439.html 29/09/2013 23:15 http://www.studymode.com/essays/Argyles-Communication-Cycle-And-Tuckman’s-Interaction-1092710.html 29/09/2013 23:19

Friday, September 27, 2019

Death Penalty Essay Example | Topics and Well Written Essays - 1000 words - 4

Death Penalty - Essay Example The truth is that when you for the right crimes the death penalty is a deterrent. But more than that, the death penalty is society’s ultimate sanction against those who commit the most heinous crimes. Its elimination is called for by people who in a general sense would tend to see criminals as victims, and refuse to actually see victims of crime at all. When you eliminate the ultimate price from the criminal justice system you simply are left with a bunch of sentencing requirement which varies only in tiny degrees: there is no way to express heartfelt anguish or outrage at a crime. Why the death penalty should continue in its present form is the subject of this essay. The death penalty is a deterrent to crime. Famous critics believe so (Mappes, 2007, 107). The reason why statistics may not always show this to be true—and are so open to misuse and manipulation by death penalty opponents is many homicides are not the first degree and do not involve a lot of premeditation. Many are caused by negligence or happen on the spur of the moment. For these sorts of crimes, capital punishment won’t be much of deterrence—and this fact will be reflected in the so-called statistics. But then again no public policy will provide much of deterrence for crimes that do not involve intention or are carried out on the spur of the moment. Indeed, I don’t believe there is much of a correlation between crime rates and the death penalty, to begin with. Murder is only a very small portion of crime statistics, and only a very small portion of murder would be deterred.

Thursday, September 26, 2019

Managerial Economics - Oligopoly Essay Example | Topics and Well Written Essays - 1250 words

Managerial Economics - Oligopoly - Essay Example This act of Holland Sweetener amounted to an attempt to dilute the monopoly and convert the US market into an oligopoly comprised of two major suppliers of Aspartame. In order to do this the major issue presented in the case study is that of pricing. Strategic pricing in order to win the major buyers so as to capture market share and maximize profits. Given the usual assumptions of an identical product, identical costs and the Bertrand variety of oligopoly in which the both Monsanto and Holland Sweetener simultaneously decide to quote the price either as high or low to Coke and Pepsi. Due to interdependence of the two sellers it becomes very important for each firm to decide strategically whether to quote a low or a high price. In Bertrand oligopoly strategy reduces to simultaneously setting prices in the hope that the competition does not change its set price. Such conflicting or non cooperating pricing strategies are increasingly being dealt with the constructs in Game Theory which not only introduced the idea that conflict could be mathematically analyzed but also provided the terminology with which to do it. Rasmussen (2001) traces the beginning of the theoretical development in field by quoting the relevant literature and by stating that the evolution of the arguments around the "Prisoner's Dilemma" construct (as in Tucker) and thereafter Nash's papers on the definition and existence of equilibrium further developed the field of the modern non-cooperative game theory. However important and simultaneous developments were taking place in cooperative game theory through the important contributions of Nash and Shapley on bargaining games and Gillies and Shapley on the core theory utilized in study of cartels. These developments are traced in several books on economics and Game Theory. (Thus if each firm acts independently, the result is a Nash equilibrium. Part of the definition of Nash equilibrium is that each player takes what the other players are doing as given when deciding what he should do; he holds their behavior constant and adjusts his to maximize his gains. But if one firm increases its output, the other firms must adjust whether they choose to or not. If they continue to charge the same price, they will find that they are selling less; if they continue to produce the same amount, the price they can sell it for will fall. The pay-off matrix from the case study can be given as in Table 1 below: Table 1: Pay-off Matrix of Monsanto and Holland Sweetener In this table Monsanto is represented as Player 1 and Holland Sweetener as the player 2.As per the assumptions the payoff have been categorized in various cells of the matrix. Player 1- Monsanto (Figures in $ Millions) Player 2- Holland SweetenerAn examination of the Table 1 reveals that following an independent strategy of pricing high Monsanto is likely to gain $300 million if Holland also priced high.However, its payoffs would plummet to $0 millions if

Gun Control Paper Essay Example | Topics and Well Written Essays - 1750 words

Gun Control Paper - Essay Example Would the "home of the brave" be a better place with a stricter gun policy Indeed, all we have to do is watch the news to know our country could use a few new gun laws. It seems that every day there are shootings all over the news in all regions in the United States. While some regions are more prone to gun violence than others, this is not acceptable for an entire nation to be victim to a weapon- especially if that weapon is legal. The United States certainly has an excess of gunfire amid its streets and alleys and compare that to England. As the administration has seen very recently, the English are much safer in their country than Americans are here. The Second Amendment has always given us the right to bear arms, and it's perhaps the most upheld Amendment. It is now that Englands's gun laws can be seen as truly beneficial. It has come time to take action; United States gun laws are antiquated. After witnessing the positive progress in England, the United States must follow suit a nd amend the Constitution and it must ban guns to reduce the level of violence England has, for the past ten years, become a much safer counter, largely because of successful gun laws. In 1996, England's gun policy grew much fiercer with the introduction of several new laws that resulted in the banning of handguns in March of 1998 (Gun Control Alliance). It simply took England to go through one school shooting before they realized the danger of handguns. Following the establishment of these laws, crime shootings have continuously dropped (Gun Control Alliance). Though England still carries a surplus of air guns, with which crime is still possible, violent shootings have drastically lowered. Though perhaps it is not possible to promote such restricting laws in the United States right away, the English example can be followed as one that, if adopted in the United States, will gradual make American society safer. Contrary to England, the United States has had a cultural obsession with guns that continues to this day. In the United States are popular not only on TV, but as collector's items, video game symbols, and on the streets as a power icon. Replica guns are just as realistic in appearance as their real counterparts (Gun Culture). In America, the gun is not simply a tool, but an item reflecting our culture. However disturbing this might seem, no policy can erase this from an entire generation's mind that have lived their entire lives with the acceptance of guns. A change in policy can, however, make the United States a safer place in the long run. The Second Amendment has always given Americans the right to bear arms: "the right of the people to keep and bear Arms, shall not be infringed" (The United States Constitution). From the English Common Law of 1689, to the early days of nationhood, to the present day the American Second Amendment has been nearly inviolable. To successfully enact a new gun policy, the Constitution has to be changed, so that there can be no Constitutional challenge to a new law. In order to have a gun policy akin to the English, drastic changes must take place. Procedure There are countless ways to introduce new laws into

Wednesday, September 25, 2019

Incorporating the Cost of Capital Research Proposal

Incorporating the Cost of Capital - Research Proposal Example On the other hand, A negative net present value is a bad management decision. Thus, management must not push through with the planned investment. The Net present value is arrived at by the following: The managers will invest in a capital asset only if the net cash inflows are more than cost of capital. The difference between the two is the net cash inflow. The entire articles gives evidences that this very popular formula is more than just a formula. The entire journal is devoted to giving importance to the factors of sales, variable expenses and costs, as well as fixed expenses an costs. Clearly, the objective of the paper is persuade managers of the importance of cost of capital in decision making activities. The objectives are correctly stated. The objective truly draws the reader to the reasons of managers in using the various components in the cost volume profit analysis. For, the article clearly explains how the sales, variable expenses and costs as well as fixed expenses contributed to the increase and decrease of net income. The article clearly shows that cost of capital is a very important tool in determining if it would be economically profitable to infuse more money into a high monetary value assets (Schneider,1). Obviously, the objectives are correctly stated. One of the key issues considered in the article shows that cost of capital is arrived at by by including the interest expense spend fo... the net present value in determining if it is profitable to invest large sums of money in a new equipment or other similar large funded investments. The articles states that Cost Volume Profit Analysis incorporates the cost of capital. Evidently, one of the key issues considered in the article shows that cost of capital is arrived at by by including the interest expense spend for borrowing money. Further, this same article also explains that there is a strong relationship between cost of capital and factors like net revenues, variable expenses and fixed expenses. In addition, the articles tells that managers would make better decisions if the cost of capital is included in the cost volume profit analysis. The article also tells that the manager's process improvement decisions must also include financial data under product mix and pricing. This formula is the mathematical representation of the economics of producing a product. The article shows that the investment is not good if the cost of capital is more than the net cash inflow from operating the investment. On the other hand, an investment in high value items is an excellent management decision if the net cash inflow exceeds the cost of the capital. The article also discusses that increases in variable costs will decrease profits. On the other hand, increases in net revenues increases profits. Further mathematical computat ions show that net profit is the difference between the net revenues and total expenses and costs. Truly, this same article also explains that there is a strong relationship between cost of capital and factors like net revenues, variable expenses and fixed

Tuesday, September 24, 2019

Why civil engineering Essay Example | Topics and Well Written Essays - 750 words

Why civil engineering - Essay Example Currently, I am also applying for a bachelor of Civil Engineering course in the UK which would provide me with more expertise and enable me to be a remarkable person in the field (Nesbit et al 7). Studying in the UK will also offer me the necessary exposure to mingle and share with students from across the world and learn new skills from them. I would develop a global perspective regarding building and construction before embarking on the pending family projects, which my father wants me to take over once he retires. Civil Engineering is a wide field. In my perspective, society cannot live without Civil Engineering because the complexity of design and management of the construction projects is not something everybody can do. This is evident from the complex and outstanding global infrastructures (Arumala 80). These include roads, airports and railways that make people’s life easier. People presently have realized the need of Civil Engineering because certain structures made by the non-experts have failed in the past, thus causing huge damage of life and property (Nesbit et al 13). I have witnessed this while helping my father in his office, as my father owns and manages diverse construction and building projects. This exposure has offered me vast experience, which I presently have before starting to pursue my bachelor’s degree. I am quite experienced in administering projects, which entails implementing adequate measures to ensure that the projects are completed within the deadline and adhere to the standards of quality established by the client (Arumala 81). Mainly, this by allocating the right and quality materials required for completion of each project as necessitated. However, this is a rigorous exercise, which entails vast knowledge, but under the surveillance of my father, I was able to administer each project

Monday, September 23, 2019

Cllinical Skils in haematology and bone marrow transplantion Nursing Essay

Cllinical Skils in haematology and bone marrow transplantion Nursing Module - Essay Example Although blood transfusion is an apparently acceptable treatment, this is not the final therapy for many types of anaemias, and they would need definitive therapies for those clinical indications. As a nurse, engaged in the care of such patients, work in this area needs considerable specialized clinical skills which are based on specific knowledge in this area. In this work, I will discuss the care of a patient with aplastic anaemia and explore the requisite clinical skills for such a patient on the basis of existing and current knowledge and also seek to examine the rationale of investigations, management, and nursing plans of such a patient from those perspectives and to investigate the alternative treatments in a patient with aplastic anaemia that I was assigned care of (Young, NS., 2002). Normal Erythropoiesis: Hematopoiesis is the process by which the formed elements of the blood or the cells in the blood are produced. The process is regulated through a series of steps beginning with the pluripotent hematopoietic stem cell. Stem cells are capable of producing red cells, all classes of granulocytes, monocytes, platelets, and the cells of the immune system. Commitment of the stem cell to the specific cell lineages appears not to be regulated by known exogenous growth factors or cytokines (Choi, JW., 2006). Rather, stem cells develop into differentiated cell types through incompletely defined molecular events that are intrinsic to the stem cell itself. Following differentiation, hematopoietic progenitor and precursor cells come increasingly under the regulatory influence of growth factors and hormones. For red cell production, erythropoietin (EPO) is the regulatory hormone. EPO is required for the maintenance of committed erythroid progenitor cells that, in the absence of the hormone, undergo programmed cell death. The regulated process of red cell production is

Sunday, September 22, 2019

The adversarial system in England and Wales Essay Example for Free

The adversarial system in England and Wales Essay The adversarial system of law involves a prosecutor defending his/ her clients in the court of law in the presence of a jury. The jury’s role is to make decisions that will be used in passing the sentence. In this system, the lawyers determine the rulings that are passed. â€Å"Lawyers play a central role in presenting each sides case (Mallenson 11). †This is because their intelligence in solving disputes will determine the sentence passed. Therefore, justice will be served when a prosecutor convinces both the judge and the jury that their defendant is innocent. The accused is not mandated to give evidence but should they choose to defend themselves, they will be cross examined by both parties. In England, the adversarial system is overly institutionalised. The prosecutor has to convince the jury beyond reasonable doubt that the accused committed the crime. The rule of law entails that the law enforcement agents can only make decisions and exercise their duties when as the law suggests. The rules of revealing evidence are developed based on the laws of England and Wales. The rules in this case give the judge limited power. Hence the roles played by judges in the adversarial system are passive since their duties are to ensure that both parties comply with the court rules and they will give direction on the way forward when disputes arise. The adversarial system, the rules of evidence are strict and the stand of prosecutors should be based on facts. For this reason, the cases are well prepared as prosecutors conduct intensive and extensive investigation prior to the court proceedings. The jury is also supposed to be impartial such that they represent what they consider as the truth so as to enable justice to be served. The adversarial system ensures fair trial as the state is not biased against the defendant. Key principles which govern the behaviour of advocates for the prosecution and the defence For advocates to perform well there are certain principles which they must follow. The key principles are the Expediency principle and the legality principles. The expediency principle also called opportunity principle which ensures that prosecutors need to be well disciplined and discrete so that they can represent the defendants impartially. This means that they are not supposed to handle cases just because they have been presented to the courts but because they want to bring about change and help justice take its course. The legality principle ensures that prosecutors have enough, reliable and valid evidence especially in the early stages. Moreover, the prosecutor is not supposed to be influenced by outside forces (Fionda 8). The key principles are father enhanced by other principles some of them are: The prosecutors should treat each case uniquely and not relate it to similar cases before. They must be fair, independent and should not be influenced by anyone or anything, they have to work in the interests of promoting fair justice and not to fulfil their personal ambitions, they have a responsibility of guiding and advising investigators whenever possible. They also review cases and ensure all evidence is presented to the courts. The prosecutors work is to assist the courts to reach a proper and fair sentence that is backed by sufficient evidence and facts so as to assist the courts to come up with a valid conclusion. They will do this by looking into various matters such as making sure they are conversant with the guidelines on the court procedures with regard to the case; do background research on the victims which will include if they have faced any previous charges. They will also need to make sure that there are fewer barriers that will influence their investigations for instance restraining orders. The prosecutor therefore is useful to the courts because they may tell the court how the victim should be sentenced depending on the crimes they have committed. This is because they prepare a plea and Sentence document before sentencing and they present it to the courts. The prosecutors will therefore ensure fair trial by following up court proceedings by constantly reviewing what is presented to the courts as correct and relevant. Fair trial is also furthered when they address new cases afresh by looking into all the supporting evidence so that they can argue their points in court. In enhancing equality, they do this by making sure that they are not influenced by other people or their personal feelings getting in the way of their work and they will present wrong judgements. They also make sure that the court legislators are informed of what is expected from them as they are constantly advised on the areas where they have doubts. â€Å"Adversarialism will only be valid if both sides are equally matched and every party is treated equally (Ian K, 4). † Presumption of innocence is the state of being considered innocent until the court says you are guilty. This is a right that every accused person is entitled to. The prosecutors therefore are the ones who help the courts prove that a person is ‘guilty’ or ‘not guilty’ beyond any reasonable doubt. The courts refer to as the burden of proof and will only take place when there is evidence. And the prosecutors do this by collecting and presenting the evidence. If the prosecutors or the court has doubt in the evidence presented, the prosecutors will have to be given extra time so that they present what is correct.

Saturday, September 21, 2019

Impacts Of Industrial Urbanization On Working People History Essay

Impacts Of Industrial Urbanization On Working People History Essay Urbanization is a social process in which a countrys organized communities become larger, more specialized. There are both negative and positive consequences of this process. It involves a lot of economic , technological demographic, political , environmental factors and it is inevitably accompanied by other changes in society. Before moving on to industrial urbanization and its impacts , history and life of native people would be discussed. A lot of Native peoples lived by hunting and gathering. Agriculture was established between the Iroquoian groups (Huron, Iroquois, Petun, Neutral).Clothing was provided from fur bearing animals and silver and copper was used to make ornaments. Trading was common at that time but there doesnt seem to have any specialized merchant class. French and british traders began to buy furs, and in return they offered iron tools, weapons and alcohol , all of which the native peoples valued highly. This resulted in economic and cultural changes among the native peoples, who were to play a critical role in the early fur trade. Canada was a largely per-industrial agricultural society at confederation in 1867. People belonged to large families and lived on farms. Farms were only source of income for them as they often supported entire families generation after generation. Urbanization process passed four major phases. Canada became an urban nation quite early as compared to others. The first stage began with the founding of Quebec in 1608. Quebec City, Montreal, Halifax and St Johns tended to be the administrative centers. From the mother country there were entrepots, collection agencies for colonial staples and distribution centers of manufactured goods. Primary connection was the overseas metropolis because of which there was lack of significant connections with other towns in the colonies. Dependence on water transport powered byu wind and sail was another common feature of urban centers during this period. Fishery and fur trade were exploited by permanent European settlers who came to Canada. Due to the reason that the climate and soil were not encouraging, agricultural progress was slow until the end of 17th century. English-speaking merchants engaged in the fur trade; after the Conquest (1759-60), when many British businessmen began to control a large portion of the fur trade from Montreal, they also quickly extended their interests throughout commerce and finance.. The population grew through natural increase and through immigration from Britain. The good agricultural land in the St Lawrence Valley had almost been taken up by 1820s. In 1821, after the North West Company merged with the Hudsons Bay Company the transcontinental fur trade was no longer managed from Montrà ©al. By that time Upper and Lower Canada had developed an immense trade in timber, which went first to Britain and then, after mid century, to the US and domestic buyers. Second phase of urbanization started in early 1800s and was marked by the increasing control of commercial interests. By dominating their immediate region several cities began to assume metropolitan functions. There was a move away from an exclusive reliance on staples export to a new concern for regional and inter regional commerce and small scale artisanal production for a local or regional market. Industrial revolution took place in 1815 and 1914. The use of new technologies in transportation was a third aspect of the economic reorientation. In this phase, the form of cities is not readily definable but a number of features distinguish them from both their predecessors and successors. The most important factor was transport which played an essential role in the development of bigger, functionally more specialized towns from 1830. National rail network was established in 1840s due to which a fully integrated urban system developed and the constraints of time and distance . This led to a period of great change in the structure of the urban system and the extent, characteristics and internal and external relations. There was no significant European population until the 1780s in the present-day Ontario, although its waterways were used by the fur traders. There was a beginning of settlement with the arrival of the United Empire Loyalists, British and American settlers, and British troops and officials. export trades in wheat, potash and timber developed and forest land was cleared. A few roads and canals were built, of which the most important were the Welland Canal and St Lawrence River canals. most good land in the province had been claimed by 1867, although not all of it was under cultivation. Quebec contained 3 towns, Montreal, Quebec and Trios-Rivieras at the conquest. With settlement and with the development of commerce and government a lot of towns appeared. much of central Canadas industry, including the 2 great industries, milling and lumbering, was dispersed through the countryside or in small villages in 1871. Rapid industrialization and urbanization occurred in both provinces after c onfederation. By 1911 half of Ontarios population lived in cities and towns. less than one-fifth of the Quebec population lived in cities at the time of confederation. Thirty years later the proportion surpassed one-third. Urbanization was undoubtedly the most salient phenomenon in Quebec at the start of the 20th century. Only 36% of the population lived in cities; thirty years later, that proportion had reached 60%. Due to development in industry there was an increased rate in growth of cities. in Montreal the phenomenon was particularly visible, then the industrial hub of Canada. Within thirty years, its population more than doubled, growing from 107,000 in 1871 to 268,000 in 1901 (or 325,000 counting the suburbs). Montreal became Canadas uncontested metropolis when it outgrew Quebec city from 1830 onwards. Population comprised of working class, yet the countrys most powerful businessmen lived there as well. Population growth was slower in Quebec city. Population was just under 60 ,000 in 1871 and still below 70,000 in 1901. In smaller cities such as Hull, Sherbrooke, Valley field, Saint-Hyacinth, Saint-Jerome and Magog industrialization became evident. The largest of these had populations of only 11,000-14,000, but they bore witness to an important transformation in Quebec society. In british north American railway fever came a little late which had a small population and much of its capital tied up in the expansion of its CANALS AND INLAND WATERWAYS. But it did not take long for politicians and entrepreneurs to realize the potential benefits. In 1841 ,the Province of Canada (1841) was an enormous country. Its roads were poor and its waterways were frozen for up to 5 months per year. GRAND TRUNK Railway was the most ambitious pre-Confederation railway project in Canada. It was a bold attempt by Montreal to capture the hinterland of Canada West and traffic from American states in the Great Lakes region. But unfortunately Canadians did not have enough money and technicians to build it. In the process of Industrialization the railways played an integral role, tying together and opening up new markets while, at the same time, themselves creating a demand for fuel, iron and steel, LOCOMOTIVES AND ROLLING STOCK. Wooding-up stations were required at regular intervals along the line and the pioneer wood burning locomotives had huge appetites. James of Toronto made first locomotive in Canada in 1853. (the Toronto No. 2 of the Ontario, Simcoe and Huron). As a consequence, railway greatly stimulated engineering particularly with the demand for BRIDGES and TUNNELS. There were a few inventions by Canadians, notably the first successful braking system (W.A. Robinson, 1868) and the rotary snowplough (J.W. Elliott, 1869; developed further by O. Jull), which made possible safe, regular travel in Canadian winters. Zone system was devised by the great railway engineer Sanford Fleming to over the confusion of clocks varying from community to community along the rail routes. Low rolling friction of iron-flanged wheels on iron rails and steam locomotion enabled George Stephenson (the first of the great railway engineers) to design and superintend the building of the Liverpool and Manchester Railway (1830), which began the railway age in England. steam locomotion, the standard gauge (1.435 m) and the rolled-edge rail (bellying out on the underside for strength) were the characteristics of the railway which were established in the early stage. Ind ustries such as tailoring and shoe making were becoming factory activities, and provincial governments began to regulate working conditions from 1870 to 1900. the industries in the cities eventually won the competition with the rural industries.Urbanization started in 19th century because of the industrialization that took place. Because of bad sanitary conditions and diseases, cities still needed many new people every now and again. But gradually with the passage of time there was an increase in number of people and cities. There were several types of cities: cities with textile industry, cities with heavy industry and administrative/commercial cities. Transportation was affected by industrial revolution. Bicycles, steamships and trains made it easier for people to move further away. The third phase, which began with the industrial era in the 1870s and lasted until the 1920s, saw the development of a national urban system that tended to concentrate power in major central Canadian cities, notably Montreal and Toronto. It attracted a steady supply of rural Canadians to the cities. The working poor was the new class that spawned instead. labor force, weak government protection, and social discrimination was faced by these families. Industrialization had caused Canadian cities to double, which brought wealth to the society, but that wealth was not shared. Although industrialization did provide thousands of jobs, it did not create an egalitarian society. With the arrival of railway numerous cities expanded or took advantage of railway development to consolidate their position in the economy. Montreal, for example, which was already the business and financial hub of British North America owing to its port installations, would extend its commercial influence over an increasingly larger zone following the arrival of the railway. The political economy of this industrial era was marked by the emergence of industrial capitalism and its counterpart, the industrial working class. The extent and nature of urban development was dependent on major improvements in the technological capacity of Canada. Science and engineering were systematically applied to transportation, communications, building methods and production. The outstanding physical characteristics of cities were the enormous spatial expansion of the suburbs and the tall office towers of the central core. The social landscape of cities was affected by the changing scale of development. A kind of giant ism prevailed, from the size of suburbs and the height of the buildings in the central core to the organization of new business enterprises and the building of enormous factories. Land use was increasingly specialized. Urbanization also affected cities less closely associated with the railway system. Saint John, New Brunswick, saw its population rise from 27,000 in 1840 to nearly 39,000 in 1861. The rise in population benefited from the growth in shipbuilding and maritime transportation, in particular. Due to this , the proportion of urban dwellers in the colonies as a whole went up from 13% in 1851 to 16% in 1861. The largest cities in British North America were Montreal, Quebec City, Saint John, Toronto, Halifax, Hamilton, Kingston, Ottawa and London on the eve of Confederation. Between 1896 and 1914, Central Canadas industrial advance was especially rapid when the whole nation experienced investment and export booms. A few industries such as carriage-making and blacksmithing declined after 1900. But soon after this new industries appeared like electrical equipment and chemicals in the 1890s, cars and aluminum after 1900, pulp and paper in. 1890-1914 Montreal and Toronto were the great cities of Central Canada by 1867. Montreal began as a port and a commercial centre. By 1900 it was producing large amounts of clothing and textile products, electrical equipment, railway rolling stock and many light industrial products. Finally by mid 19th century it was a place of industry. After 1867, Toronto after a slow and inauspicious beginning, developed after 1867 on similar lines, much of its early prosperity being based on Great Lakes shipping. Both cities had energetic banks and insurance companies and active stock exchanges. Immigrants were attracted to both cities from Europe and Italy. Cities of Central Canada were built by largely natural increase from britian between Confederation and 1914. Atlantic Canada Initially fur trading was common here but later on with serious economic development in the Atlantic provinces really began with the sea fisheries, whose markets were in Europe and later in the West Indies. Some francophone and anglophone migrants arrived during the 17th century on mainland, but the European population was small until the arrival of the Loyalists, partly because there was little good agricultural land. Scots settled on Cape Breton in early 19th century. Prosperity came from the fisheries, forests and maritime carrying trades. Western Canada In western Canada economic development began with fur trade. In 1812, settled agriculture began with Lord Selkirks RED RIVER COLONY. In 1880s the building of the Canadian Pacific Railway gave Manitoba a wheat economy. Prospects for development brightened as world prices rose, transport costs fell, methods of dryland farming improved, and more appropriate varieties of wheat became availablein 1890s. More progress was made and Prairie provinces enjoyed an immense expansion of the wheat economy, onto which was grafted, before 1914, a very much larger rail system, a network of cities and towns, coal mining and ranching. Because of this many migrants were attracted from many lands. T that time Alberta began to produce small quantities of oil and gas. In Early times most of the city dwellers got around on foot; only the richest could afford the services of a coachman or own their own horse but with the urban expansion , organized public transit came into being. In 1861, the first street cars appeared in Montreal and Quebec City. Then by 1982,electric streetcars made their appearance. At the start of 20th century , 46 urban centres had streetcar lines. Electric streetcars inaugurated in 1892 favoured the expansion of suburbs, since they allowed people to live further away from their places of work without having to travel long distances on foot Industrialization and urbanization brought about a lot of changes in work and family by early 20th century. The seniors who had retired and couldnt do any more work ended their lives in poor houses or old age homes, as they had come to be known. In the late 19th century the number of seniors who became poor increased as the process of industrialization began to affect Canadian society. More workers were needed as the factories were built in the cities. In the countryside the population grew to the point that people began to be forced off their farms into urban areas to work for wages. Later on, a revolutionary transformation occurred in human use of energy. Burning of wood to produce heat, plus human and animal muscle power were the biomass energy for human society. Then world entered the age of coal and steam power. It was the beginning of fossil fuel era and this is the era we live in today. the harnessing of steam power enabled humans to vastly multiply the energy generated from b urning coal, thereby greatly expanding the amount of energy. Petroleum was the second major fossil fuel by 1914. There was a significant development in communications and transport. Migration to long distances within continental spaces was done through steamships and railroads. Asian migrants, especially South Asians and Chinese, settled in many parts of the tropical world as well as in the Americas. Standard of living was increased and people were looking for more opportunities than they had in their native places. Another major environmental change was the enormous increase in population growth. The environmental impact of this dramatic population increase, combined with the surges in economic growth and energy consumption, was colossal. In Canada the earliest significant social piece of legislation was the Canadian Government Annuities (Act of 1908). It benefited and encouraged a lot of people to prepare financially for their retirement. With this facility, Canadians began to purchase various annuities for different amounts and leghts of time. There was a specific age when the recipient began to receive benefits from it. This system was carried out very nicely and all the costs were administered by the government. Federal civil servants were given pensions according to superannuation Act in 1870. Then the national pension programs were developed and enhanced more. In 1867, most of the Canadians did not retire. At that time Canada was predominantly an agricultural society. Majority of the population lived on farms and worked till old age as their was no other source of income. Canadian way of living was totally changed by urbanization and industrialization. With the invention of industries and new technology , farm life and family support system was completely dissolved. Before the old people had no choice except to work to earn their living but now they lived the rest of their live in old homes or poor houses.

Friday, September 20, 2019

Internet Protocol Version 4 Analysis

Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho Internet Protocol Version 4 Analysis Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho