Tuesday, December 24, 2019

The Louisiana Of The United States - 1650 Words

In this country’s amazing history there have been very many important expeditions, encounterments, exchanges, and discoveries. Within this journey we see two very brave men that meet countless obstacles, converse between cultures, and explore some of the most beautiful land ever made. This land that was explored was called the Louisiana territory. The Louisiana Purchase was purchased in 1803 by Thomas Jefferson the president at that time. The Louisiana purchase was a land purchase between the United States and France, in which the U.S. gained around 827,000 square miles of land west of the Mississippi River for $15 million dollars. This was the greatest land deal in history. The Louisiana territory was sold to the U.S by the†¦show more content†¦No one knew what the land held, many thought there were volcanoes, mountains of salt, or even the extinct wooly mammoth. Even before holding national office Thomas Jefferson tried to organize several expeditions in the Louisiana territory. Meriwether Lewis was born August 18, 1774, in Charlottesville, Virginia, and was a boyhood neighbor of Thomas Jefferson. In 1794, Lewis joined the military and was commanded by Lieutenant William Clark. Lewis and Clark became good friends. In 1801 Jefferson, Lewis was asked by President Thomas Jefferson to act as his private secretary and he sent him the following letter, Your knowledge of the Western country, of the army, and of its interests and relations has rendered it desirable for public as well as private purposes that you should be engaged in that office. †¦. Lewis accepted the position. Soon after the President posed another offer to Meriwether Lewis- to lead an expedition into the land west of the Mississippi River. He asked him to gather information about plants, animals, and especially the people of the region- the indians. Lewis was very excited about the idea and agreed immediately. Lewis selected his old friend William Clark for his co-commander. Lewis’s invitation broke military protocol by proposing a dual command, but Lewis insisted that for the next two and a

Monday, December 16, 2019

Richard Neustadt Free Essays

Richard Neustadt: Presidential Power and the Modern Presidency Writing in 1960, Richard Neustadt is an important political theorist focusing on the US Presidency. Neustadt’s work was a reaction to the â€Å"old institutionalism† represented by writers like Edwin Corwin. Neustadt takes a behaviorist approach to understanding presidential power, and argues that the real functional power of the US president arises from his â€Å"power to persuade†. We will write a custom essay sample on Richard Neustadt or any similar topic only for you Order Now Neustadt acknowledges that the formal power of the US president is spelled out in the US Constitution but he argues that these formal powers do not adequately describe the real functional power of the president. For Neustadt the key to presidential power is the president’s ability to persuade other important actors to carry out what he wants done. Neustadt views the presidency as at the apex of a pyramid of governing power that provides the president with unique leverage and vantage points to bargain with and persuade others on implementing governing policy and direction. These other actors include cabinet officers and senior government bureaucrats, the congress, military leaders, leaders of state governments, party leaders, business leaders and even foreign leaders. Neustadt does not see the US government as one of â€Å"separated power† under the Constitution. Instead he claims that the Constitution actually â€Å"created a government of separated institutions sharing powers. â€Å" These separated institutions include the congress, federalism itself, the bill of rights and perhaps even the press as a fourth branch of government. Neustadt sees the formal powers of the president and congress as very intertwined such that neither can accomplish very much without the acquiescence of the other; and, that what one branch demands the other can resist. Neustadt notes, for example that Eisenhower claimed that the presidency was part of the legislative process, since he had the authority to veto or sign bills, etc. But Neustadt notes that when a president tries to command rather than persuade, such as when Truman nationalized the steel mills or fired MacArthur, or when Eisenhower sent the troops to Little Rock, Arkansas to enforce desegregation court orders, that there can be blowback that can neutralize presidential fiat and, ultimately, render presidential action inconclusive or effective. Neustadt sees relationships of mutual dependence between the various stakeholders and that the president depends upon the persons whom he would persuade. He notes a particular success story of persuasion when Truman worked with Republican senator Vandenberg to create the Marshall plan to rebuild Europe after WWII. That effort depended on mutual understanding, trust and a commitment to shared endeavor without which Vandenberg may have decided to wait for a Republican president to create a major new direction in US foreign policy. Neustadt sums up by arguing that for a president to have effective influence he must: (1) use the bargaining advantage that he has by virtue of his office to persuade other men that what he wants them to do is what their own responsibilities require of them (persuade them that his goals should be their own goals), 2) maintain a professional reputation in the minds of other men such that they respect his authority and ability, and (3) maintain his popular prestige such that those he bargains with believes that the public will view them favorably if they do what the president wants. In short, the president’s â€Å"power is the product of his vantage points in government, together with his reputation in the Washington community and his prestige outside. † Neustadt goes on to argue a presidents has to make proper choices and decisions, so as to preserve his reputation and prestige, or he will squander his ability to lead by losing his ability to persuade. How to cite Richard Neustadt, Papers

Sunday, December 8, 2019

OSPF Transport Instance Extensions

Question: Discuss about the OSPF Transport Instance Extensions. Answer: Introduction: The communication protocols are the basic set of rules which are applicable when there are two or more than two components in the network of the communication system (Kerenidis et al., 2015). The components or the entities transfer the data through several physical devices. The protocol or the set of rules are defined in such a manner that the, syntaxes and the semantics could be defined by them easily. The error recovery functions are also performed by these protocols. The protocols can be imposed by either the software or the hardware or can be done by collaborating both the hardware and the software. The protocols are necessary at all the levels of a telecommunication network. There are set of rules that are defined for the hardware. In addition to this the networking model also has several levels. A protocol is defined separately for the different levels in the networking models. These protocols are to be recognized and followed by the entities that are available at both ends of the connections. The analyzer is basically a program in associated with a collection of the hardware that are passing or logging the traffic activities at all the points of a digital network (Escobar et al., 2014). For analyzing the protocols an experimental model is to be used. The method can be used for gathering the evidences regarding the transitional states. The system is concerned in general with the utilization of the calculation methods for the functions. The network probe is one the analyzer tools that can be used for monitoring the real time traffic within the network. This is used for identifying the causes of the lag that the network is facing. The hub is the tool that can be used to connect with the server that is in-line with the hub. This can done as the data packets that are arriving in a single point can be distributed over to the other parts of the network (Naoui et al., 2014). This would increase the traffic of the network and it would be observed by all the nodes in the network. In a network that is comprising of the only the hub and the switches are absent in the network, the data or the traffic that would be transferred over the network would be visible to all the components of that network. In this situation the analyzer can be plugged in at any point within the network and the network attributes could be easily available. In the scenario that is provided is of a pharmaceutical firm. The firm is comprising of 11 workstations and a hub having 24 ports. To tap into the network a switch can be used at any point. This possible as because the devices are connected to the port with their MAC addresses. The data would b e transferred to only those devices. The machines would be connected to the switches with the help of their MAC addresses. The benefits of using a Switch are (Vilar, Marti Magne, 2015): A connection of a hub can be split and provided to various other sources in the network with the help of a switch. In addition to this the switches are capable of monitoring the network. In a real life scenario a switch is very essential for using in a network. The difference between the distance routing vector and the link state vector are (Ibrahim et al., 2014): Firstly the link state router is faster in converging while, the distance routing vector is slower than the link state vector in comparison. The robustness of the distance routing vector is more than the link state vector. The link state vector has huge infrastructural requirements, whereas the distance routing vector as requirements that are very small in comparison with the link state vector. The distance routing vector uses Bellman-Ford algorithm and the link state vector uses the shortest path first algorithm. The link state vector supports the class less as well as the class full subnets but only the class full subnets are supported by the distance routing vector. The link state vector can perform several functions such as creating the topology table, routing table and the neighbor table. But, the distance routing vector can only perform the task of creating the routing table. The memory requirements of the distance routing vector is less in comparison to the link state vector. It is easier to configure the distance vector. But the configuration of the link state vector is much more complex. The examples of some distance routing vector are IGRP and RIP. The examples of link state routing are IS-IS, OSPF. The total number of host addresses that are possible technically are 2046, but the required number of addresses are, 1024 per building. Hence, there remains a scope for more addresses per building. Therefore, it would not be a problem even if the number of addresses per building is increase from 1024. The QoS is the quality of the service in a TCP/IP network (Xu et al., 2015). It is the set of rules that is sued for setting the priority of the different operation that are to be performed in the network. It also performs the task of assigning the different type of tasks for the different components of the network. It also performs the task of providing the different order of priority to the different data packets. It also sets the priority of the different MAC addresses. In addition to this this the QoS also monitors the performances of the system. There are various kind of header files that are present in the data packets (Joshi et al., 2013). The header files provide various types of information for the network in order to obtain the information about the data packets. Some of the header files are IP Precedence, TOS, ECN and Diffserv. The IP Precedence provide the network status such as: The TOS is the type of services and defines the type of service of the data packets. The ECN is the Explicit Network Congestion. It provides the congestion notifications about the traffic in the network. The Diffserv is the differentiated services of the computer networks. It differentiates among the different task in the computer network. The main differences among the header files are the number of bits and their functionality. The IP Precedence consists of 3 bits, the TOS consists of 8 bits, the ECN is 1 bit only and the the Diffserv varies from 2-7 bits. In addition to this the IP precedence is used for the different status of the network, the TOS is used for the type of service, The ECN provides the network traffic report and the Diffserv provides the differentiated services information. References Das, N., Modi, H., Islam, S. (2014, September). Investigation on architectures for power system communications between substations using IEC 61850. InPower Engineering Conference (AUPEC), 2014 Australasian Universities(pp. 1-6). IEEE. Escobar, S., Meadows, C., Meseguer, J., Santiago, S. (2014). State space reduction in the Maude-NRL protocol analyzer.Information and Computation,238, 157-186. Ibrahim, D. M., Fahmy, M. M., ElTobely, T. E., Sallam, E. A. (2014). Enhancing the vector-based forwarding routing protocol for underwater wireless sensor networks: a clustering approach. InThe Tenth International Conference on Wireless and Mobile Communications (ICWMC). Joshi, J., Gupta, S., Gupta, P., Singh, N., Kumari, M. (2013). Multi Protocol Label Switching with Quality of Service in High Speed Computer Network.International Journal Of Engineering And Innovative Technology (IJESIT),2(2). Kerenidis, I., Laplante, S., Lerays, V., Roland, J., Xiao, D. (2015). Lower bounds on information complexity via zero-communication protocols and applications.SIAM Journal on Computing,44(5), 1550-1572. Naoui, A., Hadj, S. B., Naoui, A., Afilal, L. E., Abdelkrim, M. N. (2014). Performance Evaluation of Diagnosis System According to Various Structures of Networked Control System.International Journal on Sciences and Techniques of Automatic Control engineering-IJ-STA,8(1). Roy, A., Lindem, A., Mirtorabi, S. (2014). OSPF Transport Instance Extensions. Verdiere, A., Igarashi, Y., Lys, T., Lavenu, C., Yi, J., Herberg, U., ... Dean, J. (2016). The Lightweight On-demand Ad hoc Distance-vector Routing Protocol-Next Generation (LOADng). Vilar, R., Mart, J., Magne, F. (2015, September). Point to Multipoint Wireless Backhaul Systems for cost-effective small cell deployment. InMicrowave Conference (EuMC), 2015 European(pp. 1092-1095). IEEE. Xu, L., Yu, X., Feng, Y., Han, F., Hu, J., Tari, Z. (2015, March). A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection. InIndustrial Technology (ICIT), 2015 IEEE International Conference on(pp. 28-33). IEEE.