Saturday, December 31, 2011

chapman

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on chapman. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality chapman paper right on time.

Out staff of freelance writers includes over 120 experts proficient in chapman, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your chapman paper at affordable prices with cheap essay writing service!






Essay on “On First Looking into


Chapman’s Homer”


Through reading, the reader can travel to different scenarios without moving from where he is. In this essay, we are going to explore form, subject matter, and technical resources that help to convey the theme, and, at the same time, help us to achieve travelling through reading.


Write my Essay on chapman cheap




In this sonnet, the author is trying to say that he is able to travel by reading and using his imagination. He do this in the first quatrain. This Petrarchan sonnet is divided in and octet and a sestet and the rhymes are ABBA ABBA CDCDCD.


In the octet, the author describes where the persona has been, and makes reference to some poets like Homer and Chapman. In the sestet he describes how he feels when he imagines a place, and he compares himself with different people. For example “....like some watchers of the skies/When a new planet swims into his ken”, or when he says “...like stout Cortez, when with eagle eyes/He star’d at the Pacific...” . Here we can see that he feel like Cortez or like atronomers, very excited of their discovery.


Only once a metaphor is used “(...)watcher of the skies(...)” meaning astronomers. The only figures of speech apart from metaphor is mental landscape, which help us to realise how he feels when he reads and travel through differnet parts, although he has never been in contact with that places “(...)Yet never did I breathe its pure serene(...)”.


As a conclusion, we can say that all the elements that Keats uses in this poem, show us how exciting can be reading in order to discover new places. Although we are not there, we are able if we want, the only thing we need is imagination and a good text.





Please note that this sample paper on chapman is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on chapman, we are here to assist you. Your cheap research papers on chapman will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Alcatraz Island

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Alcatraz Island. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Alcatraz Island paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Alcatraz Island, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Alcatraz Island paper at affordable prices with cheap essay writing service!



Alcatraz Island has a very extensive history. Not only did the island serve as


a federal penitentiary, but was once the most powerful fort west of the Mississippi River.


The island rises 40 meters and 55m. long, a mile off San Francisco Bay. The island’s strategic and isolated location made it an ideal defensive and disciplinary site. Alcatraz has housed convicts such as Al Capone, “Machine Gun” Kelly, and Robert “The Birdman.” Since the “the Rock” has closed, over 14 million people have visited the island.


Discovered by Spanish explorer Lt. Juan de Ayala in 1775, the island was


Help with essay on Alcatraz Island

cheap essay writing service



a barren sandstone rock inhabited only by seabirds. Lt. Ayala named the island “La isla de los Alcatraces,” or “island of the pelicans.” During 1848, California became U.S. property at the end of the Mexican-American War. Once gold was discovered in 184, the Gold Rush was on and San Francisco turned from a town of 00 occupants into a thriving city of thousands. Thus, more attention was brought upon the island.


During 185, Capt. Joseph Stewart and 86 men of Company H,


Third U.S. Artillery took command of Alcatraz. Over time, “the Rock” became a primary


fort to protect the coast from foreign invaders. By the late 1860’s, Alcatraz was mounted


with 111 cannons with barracks and fortifications built. In 107, the island ceased being a fortress because of increasingly obsolete defenses and became Pacific Branch, U.S. Military Prison. The Army recognized that the island’s cold 5F degree water and swift currents surrounding Alcatraz made it an ideal site for a prison. Over the next 50 years, additional cell blocks and buildings were erected to house over 600 prisoners. At various


times, “rebellious” American Indians were held on the island.


Because of the Great Depression of the 10’s, the military budget was cut and Alcatraz was transferred to the Bureau of Prisons by 1. Alcatraz was meant to become a special prison for kidnappers, racketeers, and individuals guilty of predatory crimes. Segregation was sought, and the remote site kept communication with the outside world at a minimum. James A. Johnston, a retired 1 year worker with the California Department of Justice, was appointed warden of Alcatraz for the next 14 years.


What led Alcatraz to have such notoriety was the high profile it housed. “The Rock” housed Al Capone from 14 to 1. Capone managed to corrupt officers and enlisted several inmates as personal servants. Due to syphilis, he was transferred to FCI Terminal Island in January of 1. George “Machine Gun” Kelly was shipped to Alcatraz in September of 14, because he held a wealthy Oklahoma man for ransom. Guards considered him a model inmate and very gentle person. Kelly suffered a mild heart attack in 151 and was transferred to Leavenworth Penitentiary. Robert “the Birdman” Stroud was another popular prisoner of “the Rock.” After shooting to death a bartender, Stroud was sent to Mcneil Island in 111. When he attacked a prison guard, he was transferred to Leavenworth. In 116, he once again attacked a prison guard by stabbing him in front of all the other inmates and thus killing him. Because of this, he was sentenced to death. Stroud wrote Mrs. Woodrow Wilson a letter and requested his sentence to be reduced. Eight days before his execution date, his sentence was commuted to life and transferred to Alcatraz. He got the nickname “the Birdman” from his keeping and studying of birds and Avian Diseases. In time, housing each inmate started to cost $100 per day. Plus, the prison was in need of repairs to keep Alcatraz up to date. On March 1, 16 the prison was closed due to cost effectiveness.


On November , 16, approximately 100 Indian people (about 80 of the Indians were UCLA students) boarded a charter boat, the Monte Cristo, to claim the island as their own. The “Indians of All Tribes” led by Richard Oakes, a Mohawk Indian, demanded that a cultural center, Indian University, and a museum to be established on the island. A council elected by the occupiers gave everyone who stayed on the island a job, ranging from security guards to cooking from day-care to laundry. The federal government insisted that the Indians leave but they prevailed. As student Indians began to return to school in 170, they were replaced by other urban Indians not involved in the original occupation. Oakes left the island after his 1 year old stepdaughter fell down a three stories down a stairwell to her death on January 5, 170. On June 10, 171 the final blow to the Indians occupation occurred. The federal government ordered FBI agents and special forces police to extract the 5 women, 4 children, and 6 unarmed men who were the only occupiers left of the island. Afterwards, 48 acres of land was returned to the Taos Indians, a Native American university was built near Davis, California, and many Native Americans were hired by federal agencies. The Alcatraz fiasco may have not been won by the Indians, but the event started a political movement that still continues today.


Alcatraz has faced a series of extensive events. The island and its buildings


have been through several uses. “The Rock” was once home to an army fortress and military prison more than a century ago. The island then became the well known federal penitentiary it is known for today. Most importantly, however, the Indians gained awareness for their people by non- violently claiming the island. This event gave way to the respect that Native Americans have now and are gaining every day.











Please note that this sample paper on Alcatraz Island is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Alcatraz Island, we are here to assist you. Your cheap research papers on Alcatraz Island will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Friday, December 30, 2011

God and School

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on God and School. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality God and School paper right on time.

Out staff of freelance writers includes over 120 experts proficient in God and School, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your God and School paper at affordable prices with cheap essay writing service!



What does this dollar; this nickel and this penny have in common? They all have the words “In God We Trust” written on the back. My question to you tonight is why can I carry these words in my pocket but not inside my school? As a high school student, in a public school, I would like to encourage you to help put God back in school.


These four words are what our country was founded on. Our forefathers came to this land in search of freedom of religion, speech, and a democratic government. President Eisenhower put this phrase on the US currency in the 150’s as a message to the Americans. He wanted to give them a sense of security. Our schools could definitely use that security today. Since prayer has been banned from schools there has been an increase in violence, teen pregnancies and drop out rates. Yet when any of these tragedies occur, fingers point quickly to God. But how can god help if he isn’t allowed in the building.


The right to pray should be protected by our first amendment, not limited by it. Arguments have been raised that a prayer to one person’s god might offend a bystander who believes in a different god. This is where our democratic government comes in. If an area is predominantly Orthodox Christian, then let them pray to God, if the area is mainly Muslim, let them pray to Allah, or if there is still a problem, don’t specify a God.


Another important issue is whether or not to teach about Jesus Christ in school. Textbook companies have every right to print history books with references to Jesus Christ in it. If you open a standard History book and turn to the index, you will find listings for Hitler, Buddha, Muhammad, and even the KKK, but you will not find anywhere a listing for Jesus Christ. If I have to sit and take notes on the teachings of Buddha in my American High School, then why can’t topics concerning my God be covered? In a standard Biology book, you will find an entire chapter devoted to evolution and the beliefs of Charles Darwin, and the Big Bang theory, but Creationism hardly gets it’s own page.


Cheap Custom Essays on God and School




Even if not taught as a correct religion, the Bible has several things to offer as teaching material. It sets a guide of moral and ethical standards. It teaches values such as love thy neighbor as thy self, and do unto others, as you would have them do unto you.


In conclusion, I want to tell you what you can do to help.


Number one for parents teach your children to always stand up for what they believe in. Proverbs 6 states “Bring your child up in the ways he should go and he shall not depart from it.”


Number two for students encourage your school’s administration to have a nationally recognized program such as a “see you at the pole rally” where students voluntarily meet at the flag pole for prayer before school


And Number three for teachers and faculty, obey the rule or your job is at stake, but talk to your principal or school board about adding a club at your school for students who believe. At my school we have a club called HOPE club where we meet every Friday morning for a short devotion and time of prayer.








Please note that this sample paper on God and School is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on God and School, we are here to assist you. Your cheap research papers on God and School will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Gore and Bush on public school education reform

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Gore and Bush on public school education reform. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Gore and Bush on public school education reform paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Gore and Bush on public school education reform, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Gore and Bush on public school education reform paper at affordable prices with cheap essay writing service!



Gore and Bush on public school education reform


With the importance of education being emphasized in our technologically advancing society, the next president of the United States faces an education system in need of drastic reform to continue to compete in the world market. Education standards between wealthy and poor areas of the country continue to remain drastically unequal in their scope, and it is vividly apparent that education standards must be reformed to ensure all students are offered the same opportunities for academic and economic success. The major question is, which of the two candidates, Al Gore or George W. Bush, has the correct game plan and ideology, to ensure future success for America’s children.


In comparing Al Gore and George W. Bush on education reform, the two men differ substantially on how education should be overseen in general. Al Gore favors national government supervision of education and its funding, curriculum, and accountability, while George W. Bush is pushing for a laissez faire or “hands off” federal government that would keep control of education in the hands of local government, where it has traditionally been.


While the federal government provides substantial funds to states for education, Bush believes that its role in education should be limited strictly to funding and accountability. While encouraging the distribution of federal funds for education, Bush is adamant that schools, especially those showing academic failure, need to display a notable degree of improvement to qualify for grants from the federal government. Bush believes schools that do not show considerable academic progress should have their funds revoked in the future and must demonstrate substantial progress to have the money reinstated (George W. Bush on Education par. 0). If revoked, these funds would then be awarded, in the form of a voucher, to the parents of the children enrolled in these failing schools so that they could have the option of transferring their children to either a charter, private, or other public school that would best benefit the child (Education par. 4). This type of redistribution would allow parents to tailor their child’s education to best fit any learning difficulties or special talents they wish to highlight and would keep control of education in the hands of the local sector. George W. Bush believes additional national influence over education would only serve to undermine the local efforts to change their school system and that local control allows educators to focus on the particular problems of their individual districts. This ideology has been the traditional path for education to follow and has served as the backbone to which the education system was built upon.


Do my essay on Gore and Bush on public school education reform CHEAP !




Al Gore, in contrast, is proposing a fifty percent increase in the amount of federal funds allocated towards education with additional national testing and standards to warrant their issuance. He favors increased national influence over education and feels it could produce a greater influence and change than the local and state governments could evoke. In his 5-point plan for keeping states and schools accountable for academic success, Al Gore would enact guidelines and testing to ensure education reform is progressing. This plan contrasts that of Bush by expanding solely on the public education system by funding existing schools and the opening of public charter or alternative schools. For schools that fail to show progress, they would be closed and then reopened under new management. Gore would encourage competition within the public school system by the development of charter schools and vocational schools, which would give students and parents a choice, and would encourage public learning institutions to improve their curriculum to appeal to a wider range of students. Additionally, a nationwide exam would be implemented to ensure students across the country were learning the same material at the same grade levels and would graduate based on academic progress and not on the basis of age. Bonuses and additional financial assistance would be issued to states that show significant and noteworthy advancements on test scores, so they could fund additional student programs. Last, Gore’s plan would create schools to cater to students who need a second chance, after-school programs geared towards academics, and a smaller student to teacher ratio (Al Gore on Education par. 14). While Al Gore’s plan is pioneering in its theory, the public school system is in need of major reform to improve its lagging test scores and poor morale among teachers and students. The tremendous influence that the national government is able to exude over the American population could provide the push that reform has needed for so many years.


To raise the expectations from public schools, George W. Bush is looking to implement a school voucher program that would allow parents to choose between public and private schools for their children. Parents of students who are enrolled in failing schools would be given the option to transfer to a different public school or for those parents who believe tutoring or private or charter school would benefit their children, they would receive their share of federal funds in the form of a voucher to assist them financially in the transfer (Ending par. ). This type of competition for schools to actively recruit their student body would force declining public institutions to improve their educational curriculum to match that of the private schools and would serve to raise the public expectations of schools. In his October 17th debate in St. Louis, George W. Bush proposed a method to further elevate public expectations when he stated, “I believe accountability encourages parental involvement. We need to say to people that if you cannot meet standards, there has to be a consequence…one of the consequences is we allow parents to have choices,” (George par. 1). As students are given choices for their future, more parents will change from the passive role they were taking to becoming more involved and active in their children’s education. This involvement can only prove positive as parents become increasingly aware of the need for improvement and change.


Al Gore believes education reform should focus primarily on the public education system and wants to improve our education standards solely in the public school sector. Opposed to the voucher system because he feels removes funds from public schools, Al Gore is proposing instead that schools that fail to remain accountable or improve should be closed as soon as possible and reopened under a new principal and faculty (Al Gore’s Plan to Save Our Schools par. 16). For the students of these failing schools, they will receive additional tutoring after school while the changes occur. To encourage competition in the public school system, Gore is proposing an increase in the number of charter schools available. Charter schools would focus on student bodies with a particular focus, such as discipline problems, special interests, or vocational training. Additionally, Gore would provide funds to economically challenged districts to aid in their search for high-quality educators to fill their schools (Al Gore’s Plan to Save Our Schools par. 1). These funds would give districts leverage by which to compete with other public schools as well as providing a quality education through well-paid, well-educated teachers. While Al Gore concentrates exclusively on improving the public school system, his plan for education reform provides for competition in the public school system and seeks to eliminate schools that fail to display significant improvement academically.


As school age children are increasingly being born into dual working families or single parent households, there is greater importance on giving these children the basics necessary to begin their academic careers. George W. Bush places considerable emphasis on eliminating illiteracy by teaching children the basics of reading early on in life. One major focus of the Bush campaign with regards to pre-education is the transfer of the Head Start program from the Department of Health and Human Services to the Department of Education and the implementation of the Reading First program, designed to ensure every child can read by the third grade (Where par. 7). Head Start was originally designed as a program for pre-reading skills and early learning opportunities (Ending par.10). Over the years, as the welfare system grew, Head Start became an entitlement for poor and disadvantaged children to provide them with academic help and a chance succeed scholastically. Its transfer to the Department of Education would allow additional funds to be allocated for its research and development, it could be monitored more closely, and its original purpose as a pre-reading and pre-learning program would be reinstated. Under Bush, 5 billion dollars would be set-aside over a five-year period to establish the Reading First program, an already successful Texas program now in its second year. This program is the centerpiece of the Bush plan for education reform and its goal is to ensure every child in America could read by the third grade. Early diagnosis of potential reading problems, substantial training for teacher instructing children to read, mandatory testing, and after school and tutoring programs would all be a part of this program. Each Head Start program would undergo a rigorous evaluation program to deem if the children enrolled were adequately prepared and for those who failed, their funding would be revoked and placed up for competitive bid (George par. 6).


The central objective of Al Gore’s pre-education plan is to make pre-school available for all children in the United States through tax credits, subsidies, and the expansion of the Head Start program. The first of the tax credits would pay up to fifty percent of child care expenses through age 1, and would work in conjunction with the already existing Child and Dependent Care Tax Credit. Another innovative program Gore is proposing is the After-School Tax Credit, an income based credit that would provide up to fifty percent credit for parents of children between the ages of six and sixteen, who enroll them in after-school care (Town par.8-10). Gore has also stated he would allocate 50 billion dollars over ten years to the states to offer free or subsidized pre-school to every 4-year old child and some -year olds. A major expansion of the enrollment in the Head Start program would enable it to serve at least one million children by the year 00, and provide educational experiences to disadvantaged children who would not otherwise have them (Al Gore on Education par. 6). Al Gore’s central focus of early education reform is targeted towards children and families who are economically disadvantaged and in keeping with his central theme of federal control over education, would implement tax credits and federal subsidies to ensure poor children were given the same opportunities as the average population.


Character education is a relatively new theory proposed in the education curriculum. It focuses on the development of a universal system of moral values to be taught to children by the schools. While character education is becoming a more accepted standard of educating our children, it is not without controversy. Advocates of teaching character education believe it can be discussed using literature and historical examples to teach uncontroversial moral beliefs, such as honesty, sacrifice, and integrity. Opponents of character education feel that because American society is so diverse, compressing moral ethics of right and wrong into a standard curriculum would only serve to alienate some sectors of the American public (Williams 18144). Nevertheless, the teaching of character education is an issue for today’s voters and the candidates involved.


George W. Bush has taken an active stance on the further implementation of character education by stating he will triple federal funds to at least 5 million a year for its development. Currently, federal guidelines limit the funding for character education to only ten states; however, Bush’s plan would provide funds to all fifty states (Education Policy par. 8). Furthering its use, Bush would require that character-building lessons be incorporated in after school programs, juvenile boot camps, and in the everyday educational system. Bush makes a strong push for the use of character development in order to return dwindling moral values to our children.


Al Gore has based part of his 5-point plan for keeping states and schools accountable for academic success, on the building of character education. In his plan, Gore first seeks to eliminate the outside influences of student failure such as poor teachers and school districts, and then bases the re-building of a successful education system on the implementation of character development and morale builders for both students and teachers (Al Gore on Education par. 14). For those students who fall through the cracks, Gore proposes second-chance schools, which would make character development a large portion of their curriculum. While Gore does not have a specific plan for expanding character development, he has underwritten its use in his general plan to reform public education.


With the two candidates for the presidential election are vehemently opposed in their beliefs as to how education reform would be best served, they both agree on the major issues desperately in need of change. Whichever candidate the people choose on Election Day will shape the next generations of American citizens drastically, as the current system continues to crumble and education reform rises to top priority in the national mood.


Bush-Cheney 000 Issues. 4 October 000. http//www.georgewbush.com/issues/socialsecurity.html. 11 pars.


Bush, George W. “Saving Social Security and Medicare.” Bush-Cheney 000 Issues. October 000. http//www.georgewbush.com /Media/PDFs/social_security_.pdf. 1-1.


Gore, Al. “Social Security and Retirement Security.” Gore-Lieberman 000 Issues. 5 October 000. http//www.algore.com/soci…and_retirement_ security/ret_agenda.html. 1-5.


Please note that this sample paper on Gore and Bush on public school education reform is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Gore and Bush on public school education reform, we are here to assist you. Your cheap research papers on Gore and Bush on public school education reform will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Thursday, December 29, 2011

Dating comparisons between the U.S. and Mexico

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Dating comparisons between the U.S. and Mexico. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Dating comparisons between the U.S. and Mexico paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Dating comparisons between the U.S. and Mexico, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Dating comparisons between the U.S. and Mexico paper at affordable prices with cheap essay writing service!



Dating comparisons between the U.S. and Mexico


The etiquettes of dating differ among the many existing cultures of this world, all of which base their values and morals upon their own structured societies, often following ancient customs. The United States and Mexico are no exceptions. Still, the most noticeable distinctions are all linked to our innermost desires, or the ego. In almost every case, differences in these dating rituals represent the levels of protection that parents offer to their children. Mexican families tend to be more protective by sending younger escorts along with the couple to prevent the male from misbehaving. This is very understandable since Mexicans place a greater emphasis on families being together. American families send couples in groups, but as they turn sixteen, they tend to date on their own, without parental supervision.


The process of finding a companion to accompany someone on a date is similar in the United States and Mexico in many ways. Friends can usually meet and arrange dates during social events such as church services, parties, or school hours. The male is typically the person who asks if a particular girl will join him on a date. Both countries also have cautious parents who often try to protect their children with mild forms of intimidation and ‘chaperoning’. Chaperoning, or other forms of supervision are used to make sure that the dating couple act responsibly on their date.


Despite the apparent similarities between our two societies, drastic differences dwell in our dating customs. One major difference is that Americans usually date at younger ages than do Mexicans. However, Mexicans usually send younger family members along on dates to prevent any rambunctious behavior from occurring, while the U.S. sends couples out in groups. Couples only date singularly when they are older and have won their independence from the restrictions set forth by their parents. Until then, Mexican families regularly introduce the boy to the girl’s mother to make sure that the boy “understands” the proper courtship restraints.


Write my Essay on Dating comparisons between the U.S. and Mexico cheap




The vast array of differences in these two cultures is, as I have already stated, due to the bonds shared between family members. The Hispanic communities uphold family values and place relatives in high regard. Thus, parents will send younger children from the family to accompany the couple, discouraging either party from insulting, cheating or ‘moving too fast’ with each other. This is entirely in an effort to protect both couples while they are on their date. Other dissimilarities are due to economic tribulations. Many Mexicans in the lower classes of society are unable to date because dating consumes too much time and money. Consequently, dating is a procedure that is related to cultural customs and other applicable situations. The variations in dating between the Mexican and American cultures are therefore due primarily to local traditions.


Please note that this sample paper on Dating comparisons between the U.S. and Mexico is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Dating comparisons between the U.S. and Mexico, we are here to assist you. Your cheap research papers on Dating comparisons between the U.S. and Mexico will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



war

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on war. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality war paper right on time.

Out staff of freelance writers includes over 120 experts proficient in war, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your war paper at affordable prices with cheap essay writing service!



The last quarter of the seventeenth century was a time of great violence through out the colonial region. Warfare and conflict was a constant. Most of the conflicts were between the Indians and the colonists. Armed conflicts between Indian peoples and the Puritans colonies raged for control of land and trade, and needed for lands increases especially after the tobacco become the most important investment trade in the new world, mainly in Virginia colony, tobacco provided Virginia colonists with the merchant commodity. Also tobacco provided Virginia company with the first return of investment, but tobacco required a great deal of hand labor so the company instituted what were called head right grants, award of large plantations to men on the condition that they the transport worker from England at their won cost, and that will raise the number of Virginia population and needed for land become important after what called the indentured servant. Men and women contracted to labor for a master for a fixed time with eligible to freedom due, clothing, food, tools, and after finishing their servant term they have the right to have a land and start their life. . The extraordinary expansion of Puritans settlement and their hunger for land, created pressures for further expansion into the Indian territories. So king Philip’s, a Nipmunk leader, convinced his people that they must break the peace and take up armed resistance against the Puritans.


At the same time as king Philip’s war, another English- Indian confrontation took place in the Chesapeake, Bacon’s Rebellion. At that time Chesapeake region was experiencing numerous changes. Population is growing because People live longer than the past; in the beginning 000 migrants go to the new world 000 were survived because of diseases from the swamp areas were they chose to live and settle James town. Also more food began to grown, swamps are being drained and that time servants ended their freedom due and start looking for their lands, so landlords and planter become in more critical situation because that will lead to lose off laborers and would raise the tobacco production and decrease the prices. Landlords used their political power to put new laws, by ended freedom due and limited servants rights to control them, and they instituted poll tax that every adult male should pay taxes (Gold, sliver, tobacco)


People needed more lands to live but most of the lands were been owned, so they start to move out and searched for land the only lands that they had were the native lands, so a conflict began between the landless and the tobacco planters. Bacon asked for help from Virginia governor William Berkeley to have lands. Bacons and his men move from James town to get the lands, after Berkeley promised to support them but he called Virginia militia on Bacon, so Bacon heard Berkeley’s idea, he turned around and drives Berkeley militia out and burned the town. The rebellion thus signaled a developing conflict between the frontier districts such as Bacon and the established tidewater region where the Indian problem had long since been settled.


Europe also experienced lot warfare and conflicts, especially between the two powerful countries France and England for control of North America, and they faced a war between them and the most powerful native tribe Iroquois, it was a bloody war, Europeans had been completely destroyed by the native tribe. Also Europe experienced Glorious revolution that had roots with the English revolution. The main reason of glorious revolution was the conflict between the catholic church and the protestant (Puritans). After Charles II, the head of the Catholic Church, died his brother James II took over the throne, he and his wife were catholic but his daughter were protestant, the king after age of 58 he had a son, the little Charles, the puritans didn’t like that, they chased the king and his family and kicked them out of England, and offered the throne to his daughter queen Mary II and her husband William of orange. At that time James raised army and moved to Ireland to get a support from them, the he moved to England to get his throne back but he defeated by William of orange and his army. The new world heard about James defeat and they get ride off his authority and Andiron who signed by king James. Puritans after that fond them selves without a government they forget their ideal about city on the hill.


Buy cheap war term paper

cheap term papers



Seventeenth century was filled with wars and conflicts to Europe and the new world.





Please note that this sample paper on war is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on war, we are here to assist you. Your cheap research papers on war will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Wednesday, December 28, 2011

Tabaco

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Tabaco. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Tabaco paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Tabaco, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Tabaco paper at affordable prices with cheap essay writing service!



Is tobacco a drug? Nicotine is a drug, and nicotine was purposely manipulated to enhance the addictive nature of cigarettes. The Federal Drug Administration (FDA) tried for years to build a case proving the Tobacco industry was manipulating the levels of nicotine in various brands to “Keep Them Coming Back” but couldn’t prove it until a Paralegal working for Brown an Williamson provided documentation supporting the allegations. With this new found proof and advent of more “Whistle Blowers” coming forward with new and more supporting evidence, the FDA now pursued the contention that cigarettes were in fact a delivery device for nicotine, a controlled substance


Dr. David Kessler, commissioner of the Food and Drug Administration, was relentless in his pursuit of the Tobacco industry. His name appears in almost all of the research material of the time. This makes sense considering his position at the FDA however it seemed he had a personal quest to fulfill. He had been noted to say, “Smoking is a pediatric disease that is a disease of children.” (cite) It had been recognized that secondary smoke would affect children of smokers, but the reference here was more to the effect smoking had on children or young adults. Advertising was directed at making it cool, sophisticated. This was a target demographic as far back as 110 (Cite Norma’s stuff here) so noticeably so, that laws were introduced to limit sales of cigarettes to minors.


Although it is clear cigarette smoking is physiologically addicting, the effects of nicotine don’t come into play for as much as two years. This begs the question “why” then do teens smoke until they’re hooked? Peer pressure led by advertising role models or from scenes in movies where the hero stops and has a smoke or a temptress seductively blows smoke in the face of her prey. Although at first the act of smoking is not particularly pleasurable it does in time have psychological links to rest and relaxation.


It had been a Tobacco industry axiom that brand loyalty in cigarette smokers was almost unwavering. The key here is to get the new comers to smoke your brand, and they will likely stay with your brand until it killed them. In 16, ,000 took up smoking every day. One in three of them would die of smoking related illness probably in their middle age. Aside from that, the tobacco giants had to keep up with the attrition lost to the quitters, 1. million quitters every year and 40,000 would die. So, the cigarette companies had to keep after the young people to keep their business alive.


Cheap Custom Essays on Tabaco




Although the deadly effects of smoking were known for decades the Tobacco industry managed to escape law suits until 16, then the hammer began to drop. A relentless FDA commissioner, lobby groups, pending lawsuits and trials in several states and finally the whistle blowers giving away the secrets. The walls were closing in, The Tobacco industry new it couldn’t survive, and remain whole if it was completely gutted and demonized so it agreed to negotiate a settlement before the witch hunt turned to a hysteric lynching. So they went to the negotiating table.








Reference Page


Eitzen, D. Stanley & Zinn, Maxine B. (1) Case Study The Tobacco Deal. In J. Post, A. Lawrence, & James Weber (Eds), Contemporary business issues with readings (pp. 40-40) New York McGraw-Hill Primis Custom Publishing


Hernandez, Debra G. (15) Restrictions on cigarette advertising. Editor &Publisher, 18, 1. Abstract retrieved on March , 00 from InfoTrac One File


Lacayo, Richard & Baumohl, Bernard (16) Put out the butt, junior. Time, 148 (11), 51. Abstract retrieved on March , 00 from EBSCOhost


Please note that this sample paper on Tabaco is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Tabaco, we are here to assist you. Your cheap research papers on Tabaco will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



The Beatles rise to fame.

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on The Beatles rise to fame.. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality The Beatles rise to fame. paper right on time.

Out staff of freelance writers includes over 120 experts proficient in The Beatles rise to fame., therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your The Beatles rise to fame. paper at affordable prices with cheap essay writing service!



The Beatles incerdible rise to fame, was a very gradual process which expanded over 4 years. The Beatles from 158 till 16, were continuily rejected by record labels and were confined to playing very poorly managed clubs and were subject to low pay.


During the early years of 158 and 15, the Beatles who comprised of John Lennon, Paul McCartney and George Harrison were just young hopefuls, who were dreaming of fame. They played in small cafes and clubs around Liverpool recieving very little pay and would often struggle to find a drummer to play with. After getting an offer to play in Hamburg in 160, the Beatles soon took residency in Hamburg on the street called the Reeperbahn. By this time the Beatles had got a new drummer named Pete Best, who had joined the group after passing an audition. The group had another new member called Stuart Sucliffe, who was a friend of John Lennon at art school. Sucliffe was their knew Bass player.


During their stint at Hamburg, from 160 till 16 the Beatles gradually begun to adopt their own style of music and they slowly begun to become recognised not only in Hamburg but in their home town of Liverpool.


The Beatles continued to play many clubs in Hamburg, often playing for long hours. Vut during this time the Beatles made a record with another singer named Tony Sheriden. The Beatles recorded a song named My Bonnie with Sheriden and also recorded a varitey of other songs. The Beatles however were soon kicked out Hamburg, after Paul and George were accused of playing in clubs under age. The Beatles soon left Hamburg, but left Stuart Sucliffe in Hamburg after he decided to stay in Hamburg with his grilfriend Astrid.


Write my Essay on The Beatles rise to fame. cheap




Upon their arrival in Liverpool, the word had got back to Liverpool from Hamburg,that they were a very good band. People were eager to see them, so in 161 the Beatles took residency in the Cavern Club. During their stint at the Cavern Club, the Beatles were very popular with the fans of the club, mostly becuase they played Rock n Roll.


One day a young man entered a record store in Liverpool, and asked for the record My Bonnie by the Beatles, the store clerk whose name was Brian Epstein, never heard of the band and promised the man he would try and get it. Withina few days, a number of other people had asked for the same record. Epstein was obviously confused and curious. He soon found out that the Beatles were a local band that played at the Cavern. He decided to pay them a visit. Brian Epstein was very impressed by this band and wanted to become their manager. This was the turning point in the Beatles rise to fame.


Upon becoming the Beatles manager, he quickly changed their image. He made the Beatles wear nice tidy suits, instead of leather jackets and pants that they had previously worn. He made them cut their hair and change their habits. Although the Beatles but especially John Lennon, felt akward about changing their image, they knew that in order to become successful they had to change their image.


The next step for the Beatles and Brian Epstein was to get a deal with a record label. The Beatles did auditons for many record labels such as Decca, but got contiunly rejected by them. Fearing that the Beatles would get nowhere, Brian Epstein arranged a last minute audition with EMI. The producer of this record label whose name was George Marin, liked the Beatles, not becuase of their music but becuase of their wit and humour. The Beatles audtioned with EMI and passed the auditons, and got some recording sessions with EMI. But before the Beatles could go any further, they were asked to replace their drummer. George Martin was not very impressed with Pete Best, and asked the Beatles to replace him. The Beatles eventually found their new drummer, his name was Ringo Starr.


With a new record deal and a new drummer, the Beatles rise to fame was gaining momentum. They released their first single Love Me Do in 16 which reached number 17 in the natioal charts. Although this was a positive start, EMI was still not convinced thet the Beatles were a hit group, but further recordings were booked. But in early 16, the Beatles had reached their goal. Their second single Please Please me reached number one in the national charts, and their frist album also named Please Please me was also released.


This marked the start of the Beatles rise to fame. They would go on to release many great songs, inculding 7 number one hits. Beatles anthology (000) apple crops


Please note that this sample paper on The Beatles rise to fame. is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on The Beatles rise to fame., we are here to assist you. Your cheap research papers on The Beatles rise to fame. will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Tuesday, December 27, 2011

NETWORK DESIGN

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on NETWORK DESIGN. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality NETWORK DESIGN paper right on time.

Out staff of freelance writers includes over 120 experts proficient in NETWORK DESIGN, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your NETWORK DESIGN paper at affordable prices with cheap essay writing service!



Acme Company is a worldwide company with offices in Los Angeles, Chicago, New York City, Miami, London, Frankfurt, Tokyo and Rio de Janeiro. Acme Company develops audio and video special effects for the entertainment and advertising industries. In Los Angeles, the corporate office, there are twenty-five people six in accounting, two in sales, five executives, and eight in administration. The Chicago office has four people two inside sales and two outside sales. The New York office has five people three inside sales and two outside sales. The Miami office has four people two inside sales and two outside sales. The London office has five people three inside sales and two outside sales. The Frankfurt office has three people one inside sales and two outside sales. The Tokyo office has five people three inside sales and two outside sales. The Rio de Janeiro office has five people as well one in marketing, two in sales and two designers.


We are updating on designs and implementations of our networks for the new millennium, which include telephony, computers to handle our constant stream of multimedia between our offices. ACME has servers in the Los Angeles, New York, London and Tokyo offices, and all locations have Internet access and full telephone services, such as voice with conferencing and speed dialing.








Help with essay on NETWORK DESIGN

cheap essay writing service



Business Problems


Companies are constantly growing and moving forward with changes in the entertainment and advertising industries. Companies expand with increase in customer base, increase in personnel, increase in sales and demands, and increase of operating hours. The network structures are constantly changing to reflect and to accommodate company growth.


Either more storage space has to ease the increase in customer database, or more help provided to give the customers what they want. Research has shown customers’ demands and designs relates to increased sales. Businesses have been changing from standard ‘eight to five’ to ‘always-open’, 4/7 to serve customers worldwide.


Higher number of transactions, higher volumes of data transmitting back and forth between offices placed companies at risks for virus attacks as well as hackers unauthorized entrance into a company’s network making it vulnerable. Adding Virtual Private Networks and firewalls to the paths between the Internet and its Intranet helps to protect important company information. By issuing more back-ups to smaller offices will lower downtime if disaster hits. Transferring data simultaneously to hot-sites, or a third party site such as Iron Mountain, will lower down time as well. Finally, setting up mirror image sites for disaster recovery in areas like Los Angeles and Japan would counter their natural disaster pattern.


ACME took some measures to make its network secure, such as adding symbols, numbers and letters into the equation as passwords for employees.





Overview Voice Network


No matter what line of business you are in and no matter how big or small your business may be, the telephone system is vital to a company’s success. It has to be simple and reliable, so that the business doesn’t have to spend unnecessary time and money taking care of it. And it has to be flexible so it can adapt to the needs as each business grows and changes. A PBX and a Centrex are the proposed solutions for this company.


In choosing a PBX, the company had to make one of the most important business decisions that a company would have ever had to make, one that would directly impact employee productivity and the business overall. Centrex is a powerful, flexible communications system which can be tailored to fit the calling needs of each office and then change as your business grows. It’s like having all the benefits of an advanced flexible phone system, minus all the investment, maintenance and headaches that go along with owning and managing your own system.


ACME has eight different offices that span across the globe. Each of the offices must be able to communicate via dialing a four digit extension or by direct dial. The Los Angeles office has been setup to use a PBX which will be the central host for all internal inbound calls. The PBX is connected to the Public Switched Network which has a direct connection to the outside world. Each of the other offices is either connected via a Point to Point ATM or a T connection. The type of connection is a dedicated line for each of the offices. London, Frankfurt, New York, Miami, Chicago, and Tokyo have been setup to use a Centrex in every individual office that is directly connected to each internal LAN in which all internal calls are routed via VoIP and routers.





Data Network Overview


Throughout each of the offices, depending on its needs, have certain requirements in order to function as a well oiled machine. Each office has a different setup because of the amount of people and its role that it plays for the company. Each of the eight will be discussed in further detail as to show how each is setup.


The overall WAN for the company has been interconnected by high speed data lines that are capable of transmitting 5 MB of information in just a short amount of time. Each of the following offices; Tokyo, Los Angeles, New York, and Frankfurt have been interconnected via the use of ATM. Every office has been setup for a 4 hour/7 days a week setup. In order to provide this type of service, dual ATM lines have been installed; one on a different MPOE to provide such redundancy. One of the two ATM lines that connect each office is the primary line and the other is a backup line that can be utilized in the event of an emergency outage. Each of the lines has a different service provider to ensure constant connection and reliability. Four of the eight offices that service the company, Chicago, Miami, Rio, and London are sales offices that are setup via a high speed T connection to a major hub of the WAN. The sales offices have a similar setup that can almost be mirrored to the larger offices. Each has a smaller scaled version of the larger offices. The four sales offices have been setup to be nearly maintenance free by providing dual T lines from two different carriers to each of the offices. With each of the offices now interconnected, they can show in detail how to justify and show cause for why each of the offices is connected in this fashion.


The Los Angeles office is the headquarters for the company where all traffic and all major transactions for the company take place. The Los Angeles office consists of fifty seven people. There are five people in accounting, two in HR, two in IT, ten Executives, one in legal, two in marketing, ten in sales, and twenty five in Graphic Arts.


In order to meet the needs of this amount of people, the network for the office has been arranged and configured in such a way as to provide the highest possible speed and with redundancy. Each of the workstations has been configured to utilize a gigabit Ethernet card and each is connected to a gigabit switch. Each of the servers in this facility has also been configured with a gigabit also in order to prove the highest possible transfer rate between server and workstation to allow large files to be transferred. Because of the amount of people and the size of the building, two server rooms were setup to provide service for both parts of the building. In order minimize the amount of bottlenecks between server rooms, a fiber line was run to connect each part to keep the network from slowing down at any given time. With the amount of critical information floating around the company via the network, a firewall has been setup to secure and block unnecessary traffic from the other offices and from the Internet also. The servers that are located at these sites handle data storage, email, the Intranet, accounting information, and basic network functions such as DNS, WINS, and DHCP for the clients. The data is backed up and off-sited by another company for safe keeping. The on-site intranet is managed and maintained here on this site. The data from this server is replicated to other intranet servers in Tokyo and in London to provide a redundancy and backup in the event that systems were to go down. Because each office has sales people with laptops the office has been setup with a VPN router to allow sales people to dial up and communicate with the other offices via email.


Tokyo, London, New York City, and Frankfurt are setup quite similar but are a reduced version of the corporate office because of the amount of people. Each of the offices internally are connected using gigabit equipment, have high speed internet connections with a firewall protecting each office. London because of available IT staff can backup and off-site backup data at their facility. The other sales offices such as Rio, Chicago, Miami, and Frankfurt do not have such a high speed and redundant setup. Because of the amount of people, this did not justify the reasoning for setting up such a network but could be considered, but only if the company were to grow in the future.


The types of protocols used within this company vary depending on what equipment and software utilized. All network workstations, servers, and routers use TCP/IP to communicate with each other internally. Because of how each of the offices is setup across the WAN, each router must be configured to use Routing Interface Protocol (RIP) to propagate table changes and IP over ATM to communicate over this type of medium to send data back and forth to the various offices. In order to use email each client must use the SMTP and TCP/IP protocol to receive email from the email sever. The internet and intranet servers host internal and external websites that must use HTTP, FTP, HTTPS to communicate to each of these clients. When each of the client workstations logs into the network Dynamic Host Configuration Protocol (DHCP) is used to issue IP address and other information to each of the clients. Simple Network Management Protocol (SNMP) is installed and utilized on each server and router to monitor the current status of each piece of equipment.








Network Security


Transit security and traffic regulation are two basic methods for network security. The Virtual Private Networks and Packet Level Encryption are options for transit security. Firewalls are widely used for traffic regulation.


When the offices send company information across networks, the information is of high value to their destinations, and if it were intercepted by an unauthorized recipient it would raise flags for the company to prevent these problems from occurring. Unfortunately, connecting systems to networks could open the system itself up to attacks. If a system is compromised, the risk of data loss is high. Therefore, ACME needs to find options to make networks secure. It can be useful to break network security into two general classes one method used to secure data as it transits between networks, and another to regulate what packets are allowed into the network. While both significantly affect the traffic going to and from a site, their objectives are quite different.


Several methods are available to encrypt traffic between a few coordinated sites. For transit security, two popular options are Virtual Private Networks (VPN) and Packet Level Encryption. Given the considerable expense in private leased lines, many organizations have been building VPNs. These provide the ability for two or more offices to communicate with each other in such a way that it looks like they are directly connected over a private leased line. The session between them over the Internet is private, and the link is encrypted and convenient for offices receive each other’s internal resources without showing company information to the rest of the world. A virtual private network is implemented at the lowest levels of the TCP/IP protocol that are using an existing TCP/IP connection. The advantages of VPNs are to allow private address space for more machines on networks as well as to allow the packet encryption or translation overhead to decrease the load placed on production machines with dedicated systems.


The other option would be Packet Level Encryption, which encrypt traffic at a higher layer in the TCP/IP stack. The advantages are that the processor overhead dealing with a VPN is eliminated, inter-operability with current applications is not affected, and it is much easier to compile a client program that supports application layer encryption than to build a VPN. It encrypts traffic at essentially any of the layers in the IP stack. It provides fairly transparent encryption to most network applications particularly at the TCP level.


It is important to note that both of these options could have performance impacts on the hosts that implement the protocols, and connect those hosts on the networks. The relatively simple act of encapsulating or converting a packet into a new form requires CPU-time and uses additional network capacity. Encryption can be a CPU-intensive process, and encrypted packets need to be padded to uniform length to guarantee the robustness with some algorithms. Lastly, both options impact on security are related, such as address allocation, fault tolerance and load balancing that needs to be considered before decision-making.


For traffic regulation, it is the most common form of network security on the Internet today. It regulates closely to which types of packets could move between networks. If a packet has malicious intention to a remote host, it would never reach to its destination, so the remote host will be unaffected. Traffic regulation provides screening between hosts and remote sites commonly with routers, firewalls and hosts.


In order to provide some level of separation between the organizations Intranet and the Internet, firewalls have been employed. A firewall is simply a group of components that collectively form a barrier between two networks. They are often a combination of routers, network segments, and host computers. A number of terms specific to firewalls and networking are going to be used throughout this section, so lets introduce them all together.


Bastion host A general-purpose computer used to control access between the internal (private) network (Intranet) and the Internet (or any other untrusted network). Many of the general-purpose features have been turned off, and in many cases, completely removed, in order to improve the security of the machine.


Router A special purpose computer for connecting networks together. Routers also handle certain functions, such as routing, or managing the traffic on the networks they connect.


Access Control List (ACL) Many routers now have the ability to selectively perform their duties, based on a number of facts about a packet that comes to it. This includes things like origination address, destination address, destination service port, and so on. These can be employed to limit the sorts of packets that are allowed to come in and go out of a given network.


Proxy This is the process of having one host act in behalf of another. A host that has the ability to fetch documents from the Internet might be configured as a proxy server, and host on the Intranet might be configured to be proxy clients. In this situation, when a host on the Intranet wishes to fetch the http//www.yahoo.com/ web page, for example, the browser will make a connection to the proxy server, and request the given URL. The proxy server will fetch the document, and return the result to the client. In this way, all hosts on the Intranet are able to access resources on the Internet without having the ability to direct talk to the Internet.


There are three basic types of firewalls, and I will consider each of them.


Application Gateways The first firewalls were application gateways, and are sometimes known as proxy gateways. These are made up of bastion hosts that run special software to act as a proxy server. This software runs at the Application Layer of the ISO/OSI Reference Model. Clients behind the firewall must be proxitized (that is, must know how to use the proxy, and be configured to do so) in order to use Internet services. Traditionally, these have been the most secure, because they dont allow anything to pass by default, but need to have the programs written and turned on in order to begin passing traffic. These are also typically the slowest, because more processes need to be started in order to have a request serviced.


Packet Filtering Packet filtering is a technique whereby routers have ACLs (Access Control Lists) turned on. By default, a router will pass all traffic sent it, and will do so without any sort of restrictions. Employing ACLs is a method for enforcing your security policy with regard to what sorts of access you allow the outside world to have to your internal network, and vice versa.


There is less overhead in packet filtering than with an application gateway, because the feature of access control is performed at a lower ISO/OSI layer (typically, the transport or session layer). Due to the lower overhead and the fact that packet filtering is done with routers, a packet filtering gateway is often much faster than its application layer cousins.


There are problems with this method since TCP/IP has absolutely no means of guaranteeing that the source address is really what it claims to be. As a result, we have to use layers of packet filters in order to localize the traffic. We cant get all the way down to the actual host, but with two layers of packet filters, we can differentiate between a packet that came from the Internet and one that came from the internal network.


Hybrid Systems In an attempt to marry the security of the application layer gateways with the flexibility and speed of packet filtering, systems that use the principles of both have been created. In some of these systems, new connections must be authenticated and approved at the application layer. Once this has been done, the remainder of the connection is passed down to the session layer, where packet filters watch the connection to ensure that only packets that are part of an ongoing (already authenticated and approved) conversation are being passed.


Security is a very difficult topic. Everyone has a different idea of what ``security is, and what levels of risk are acceptable. The key for building a secure network is to define what security means to you or your organization. Once that has been defined, everything that goes on with the network can be evaluated with respect to that policy. Projects and systems can then be broken down into their components, and it becomes much simpler to decide whether what is proposed will conflict with your security policies and practices.


The need for connectivity to the company network outside of the office has increased dramatically in the past several years. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that they all need. They need a way to maintain fast, secure and reliable communications wherever their offices are. Until just recently, this has meant the use of leased lines to maintain a wide area network. Leased lines, ranging from ISDN (integrated services digital network, 18 Kbps) to OC (Optical Carrier-, 155 Mbps) fiber, provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance, and security (About, Inc.). But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases. As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN to accommodate the needs of remote employees and distant offices.


There are two common VPN types; remote-access and site-to-site. A remote-access VPN may also be known as a virtual private dial-up network (VPDN), this is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN will outsource to an enterprise service provider (ESP). The ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a number to reach the NAS and use their VPN client software to access the corporate network.


A site-to-site VPN is accomplished by the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be either intranet-based or extranet based. An intranet-based VPN would be used if a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN (McDysan). An extranet-based VPN would be used when a company has a close relationship with another company they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.


A well-designed VPN uses several methods for keeping a company’s connection and data secure. A firewall provides a strong barrier between a private network and the Internet. Firewalls can be set to restrict the number of open ports, what type of packets are passed through, and which protocols are allowed through.


Secondly, an encryption method should be used when sending data over a public network. Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Most computer encryption systems belong in one of two categories either symmetric-key encryption or public-key encryption.


In symmetric-key encryption, each computer has a secret key or code that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that each computer that will be talking to each other have a copy of the key. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message (Cisco).


In public-key encryption uses a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. A very popular public-key encryption utility is called Pretty Good Privacy (PGP), which allows you to encrypt almost anything.


Another means of security comes by the way of IPSec (Internet Protocol Security). IPSec provides enhanced security features such as better encryption algorithms and more comprehensive authentication. IPSec has two encryption modes, tunnel and transport. Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. Only systems that are IPSec compliant can take advantage of this protocol. Also, all devices must use a common key and the firewalls of each network must have very similar security policies set up.


AAA (authentication, authorization and accounting) severs are used for more secure access in a remote-access VPN environment. When a request to establish a session comes in from a dial-up client, the request is proxied to the AAA server. AAA then checks the following Who you are (authentication), what you are doing (authorization) and what you actually do (accounting). The accounting information is especially useful for tracking client use for security auditing, billing, or report purposes (About Inc).


Depending on the VPN type (remote-access or site-to-site), that is used there needs to be a certain components to build the VPN. Such as desktop software for each remote user, dedicated hardware such as a VPN concentrator or secure PIX firewall, dedicated VPN server for dial-up services, NAS (network access server) used by service provider for remote-user VPN access, and VPN network and policy-management center. Because there is no widely accepted standard for implementing a VPN, many companies have developed solutions on their own. A VPN concentrator incorporates the most advanced encryption and authentication techniques available, Cisco VPN concentrators are built specifically for creating a remote-access VPN. They provide high availability, high performance and scalability. They also include components, called scalable encryption processing modules, which enable users to easily increase capacity and throughput.


A VPN-optimized router provides scalability, routing, security and QoS (quality of service). Based on the Cisco IOS (Internet Operating System) software, there is a router suitable for every situation. A PIX (private Internet exchange) firewall combines dynamic NAT (network address translation), proxy server, packet filtration, firewall, and VPN capabilities in a single piece of hardware


Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network. Tunneling requires three different protocols Carrier protocol, encapsulating protocol, and passenger protocol. Carrier protocol is the used by the network that the information is traveling over (About, Inc.). Encapsulating protocol is the protocol (GRE, IPSec, LF, PPTP, LTP) that is wrapped around the original data. The Passenger protocol (IPX, NetBeui, IP) is the original data being carried. Tunneling has amazing implications for VPNs. For example, a packet that uses a protocol not supported on the Internet (such as NetBeui) inside an IP packet and sends it safely over the Internet. A packet could be used that uses a private (non-routable) IP address inside a packet that uses a globally unique IP address to extend a private network over the Internet.


In a site-to-site VPN, GRE (generic routing encapsulation) is normally the encapsulation protocol that provides the framework for how to package the passenger protocol for transport over the carrier protocol, which is typically IP-based. This includes information on what type of packet is going to be encapsulated and information about the connection between the client and server. Instead of GRE, IPSec in tunnel mode is sometimes used as the encapsulating protocol. IPSec works well on both remote-access and site-to-site VPNs. IPSec must be supported at both tunnel interfaces be able to use. In a remote-access VPN, tunneling normally takes place using PPP. Part of the TCP/IP stack, PPP is the carrier for other IP protocols when communicating over the network between the host computer and a remote system. Remote-access VPN tunneling relies on PPP. Each of the protocols listed were built using the basic structure of PPP and are used by remote-access VPNs LF (Layer Forwarding), PPTP (Point-To-Point Tunneling Protocol), and LTP (Layer Tunneling Protocol).


The future with VPNs as in any technology is more, better, and faster, and that is what Cisco released this past May. Voice and video enabled VPN (VPN) provides cost effective, secure connectivity provided by site-to-site IPSec VPNs for delivering voice, video, and data IP networks. Integrating this solution provides a network infrastructure that enables the latest converged network applications like IP Telephony and Video. The key benefit to this new technology is to offer a decentralized office, such as home connectivity. Being able to offer off-site video-based training and other such affairs will accomplish the most important thing to the company saving the all mighty dollar. With the corporate culture what it is today where E-Commerce, telecommuting, increase in travel, and the decentralization of operations, the need for remote access in now more than ever. VPNs offer a way to keep costs in check. Using the relatively inexpensive bandwidth of the Internet or a service provider’s network to connect a user to a corporate network or carry traffic between sites can reduce recurring communications charges.


Virus Protection for a Company Wide Network


Viruses are a security problem that should be addressed with normal security solutions. These include, but are not limited to, establishing written policies to address common security issues, defining appropriate behavior and best practices and publishing them, devising both detection and defense in depth strategies, and clearly defining problem identification and cleanup methodologies (Convery, 00). To combat viruses, a consistent plan must be devised for the entire network. The company must define anti-virus strategies and policies, including what anti-virus products to use, how to distribute them, how to manage them, and when and where to deploy them.


The First Line of Defense


The first line of defense in any anti-virus program is the computer desktop. Since viruses can be introduced through removable media, shared network drives, email, web pages, web mail, ICQ and any other means of transferring files, protection at the desktop is critical to a successful virus defense. This means that all desktops must have anti-virus software installed and running and it must be updated routinely and regularly.


Typically, automated updates are controlled by the anti-virus protection software. Scripts can be written to automate the installation and updating of anti-virus software on the desktop (Schmehl, 00). By doing so the scripts run anytime a user logs onto the domain servers. Virus protection updates can also be made available through a company web site that allows file transfers, particularly useful for those running on a Mac or UNIX/Linux.


The Second Line of Defense


The second line of defense is to educate the users. Instructing users not to open suspect files, not to open suspect attachments, and not to implement a suspect virus infected machine is effectively communicating a standard practice that, believe it or not, most users will tend to follow. The one to do this instructional methodology should be the one that maintains the watchful eye on the network. This would be the network administrator or one of the network administrator staff. This watch dog should involve the users quickly in the fight against virus infection, but should not be the one to cry wolf every time a hoax winds its way inside. It is necessary for the users to establish a trust in this person so that in the true event of disaster, they will be responsive to his/her lead.


The Third Line of Defense


Viruses frequently take advantage of security holes and weaknesses in software, as well as insecure default configurations and “features” that haven’t been created with security in mind. According to SANS (Sans.org, 001), the same weaknesses are repeatedly exploited simply because they are seldom repaired, despite the fact that the fix is readily available. (Code Red is proof of this.)


To tackle this problem, the Windows Critical Update Notification Service can be installed so the users can be made aware of the need for updates. To cover critical cases, the install can be made to run during login.


In addition, registry changes can be made to prevent especially dangerous programs from running by default. For example, the default behavior of Visual Basic Scripts can be changed so that they open Notepad rather than running a script.


Summary of Virus Protection


Fighting viruses requires diligence and planning, but it is possible to keep the company relatively virus free. The cornerstone to a successful virus defense is company-wide policies and procedures that establish a unified approach to solving the virus problem. Then it takes a combination of desktop protection, user education, constant OS patching, defense in depth and innovative approaches to implement those policies and make them effective.


Red Cross for the Company Disaster Planning and Continuity


Disaster planning involves establishing hot sites, equipment, and material to support the backup of vital company data. Recovery and continuity in the event of a disaster involves more than these material things in that the resources need to have a method in order to continue the flow of the business process. The ability to bring the company back up on line within (hours/days) is vital to the continued success of the day to day business dealings. The important thing to consider is how well the company organizes its infrastructure to bend and shape into a new direction that even a sudden loss of a key player in the business may require.


Disasters take on many shapes and disguises natural disasters, man-made failures, business events, legal handcuffs, governmental red tape, riots, strikes, or market forces. These events are not the focus here. The focus should be on the repercussions felt by the company’s infrastructure as a result of these events. At the instant of disaster, different events create different secondary infrastructure effects (Nemzow, 17). How the company handles the continued operation is the goal.


Business Continuity Planning Tools


First of all, a planned method for restoration order must be in place at all levels of the company; at each site. This planned method will disclose the order of procedure for restoring the system, as a whole and in part, with regards to the company’s resources and agreed upon method. This helps to alleviate any convoluted discussion in the event of an emergency such that no misunderstandings occur as to what action is performed first.


Private firms offer insurance plans for business disasters, but that option tends to be expensive and when companies are on the tighter side of an economy, insurance payments tend to be the first cutback that occurs. Outsourced services are more commonly turned to in the recovery or replacement of damaged equipment. Key players may become incapacitated or even killed by the same disaster that damages the equipment. Planning for outsourcing agencies in the human capital must be realized too.


Advanced planning takes several forms. The simplest form up backup structuring is the use of hardware tools for media backup in the form of SANS off the main centers for doing business. Next to be considered is power protection provided by surge protectors and backup battery packs, and alternative communication lines in and out of the various business centers.


Magnetic or optical media are becoming less and less expensive making day to day backup solutions easily attainable. Media backup should be handled by all sites locally as well as remotely through hot-site mirroring. In both cases, backup should be readily accessible in the event of disaster, and that the network devices are available and compatible for recovery efforts. In addition, backup media should be tested for robustness of quality to handle a situation of rolling out for deployment in emergency events.


The next level of backup-tool justification includes communications line filters and emergency backup power supplies. First, batteries fail over time and surge protectors silently do their job without indicating that each surge literally wears them out (by burning away some of the metal oxide used to absorb the power spike). These items should be regularly checked and replaced.


It is also imperative to create a backup communications plan. This includes the redirection of routers to alternative paths in the LANs and WANs, secondary phone or data lines, and perhaps wireless service. This plan is necessary to include a know how for these secondary devices to come into play. New router tables may take hours to implement. Dial-up phone lines replacing a dedicated T- may not provide the necessary bandwidth that some of the offices need. Furthermore, people at the remote offices must know how to switch over in order to connect to affected office.


By incorporating all of these methods at each site and on the company as a whole, at the very least it can bring some sense of stability in that the course of recovery is already in place. Moreover, the losses can be measured by how soon the profits can start coming back in.


Conclusion Network Solution


In today’s economy, companies always must consider the cost of doing business. Certainly there could be more stringent plans, and most certainly more flexible ones. The primary focus here is to meet a goal as required by the company. It is to provide the necessary structure in meeting the speed requirements while not being a suggestion of overkill. Security and monitoring of the system is met; backup and recovery is met; company wide policies regarding each of these areas are suggested. The necessary resources regarding this system are readily available and, within a reasonable timeline, readily deployable.


This solution represents a company-wide installation that involves all players abroad and at the home office. It provides a method where all are involved yet when implemented, will run smoothly without disrupting the primary purposes of the company its uninterruptible business.





Please note that this sample paper on NETWORK DESIGN is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on NETWORK DESIGN, we are here to assist you. Your cheap research papers on NETWORK DESIGN will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!



Cultural relativism and protogoras

If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Cultural relativism and protogoras. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Cultural relativism and protogoras paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Cultural relativism and protogoras, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Cultural relativism and protogoras paper at affordable prices with cheap essay writing service!



If I were a cultural relativist, I would tell Protagoras that he must abide by his society’s law as it is what the majority of his society believes, making the law to torture his sister to death to be the true way he must deal with his sisters promiscuity. As the Adberan society is his culture, I would, as a Cultural Relativist, adivse Protagoras that he must accept his culture’s values and traditions and abide by them, putting aside his individual differences. If Protagoras is a member of the Adberan society, then he must accept their cultural values. According to Aberan culture, is it morally right for Protagoras to torture and murder his sister because she committed promiscuous behaviour which is fornwed upon by the majority of society, therefore as a Cultural Relativist, I would advise Protagoras to accept the law, and then he will not be considered immoral by his society for disobeying his culture. If he wants to maintain a position within his society, then Prodagoras should agree with them, as moral values demonstrate a connection to his community, which, ultimately, is his identity. As a Cultural Relativist, I would tell Protagoras to stop and think about the positives and negatives that will arise from his actions. For example, if he murders his sister, he will lose a beloved family member, but will gain social acceptance and happiness, not only for himself but also for every other person in his family, so I would ask him if losing one family member is worth gaining happiness for everyone else?


Please note that this sample paper on Cultural relativism and protogoras is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Cultural relativism and protogoras, we are here to assist you. Your cheap research papers on Cultural relativism and protogoras will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from cheap essay writing service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!