Tuesday, June 4, 2019
The Basics Of Opnet It
The Basics Of Opnet ItIn this science laboratory we have followed the instructions that were given in the tutorial from the help menu. We construct two networks as the starting network that which is having 30 lymph glands and an internet boniface those ar attached with Optical Fibre cables, and the second network that is having 15 lymph invitees and it was connected to the first network with Optical fibre as well. And we go forth observe the effects like agitate and DELAY for the first network and We will repeat the akin after connecting the second network to the same router. And we notify observe in the interprets. likenesss and re run across of the networksAll the circuit is been built by placing two networks one in first floor and second in the other floor. And we can observe it in the graph clearly. sort 1 Both the networks in both first and second floorsBy the below figure we can notice the delay and Load on the server. When it was not connected to the second netw ork the DELAY and LOAD are as shown in the figure convention 2 Ethernet Delay (in sec) and Ethernet load ( situations/sec) on the server nodeWhen the delay is observed in the server there is considerable delay , because server can receive all these nodes at the same snip but the nodes are higher up the limit thusly there is a chance of delay in the server. go for 3 This is the compared result of delay amongst First floor and expansionWhen the delay is observed in the server there is LOAD, According to this analysis we can say that the distance increased in the network can increase the load . As well as the more number of nodes alike increases the load on server.Figure 5 this is the load (bit/sec) for First floor and expansionConclusion subsequently this lab we can learn the basics of the OPNET IT GURU .I faced some problems with the terminology and with registration of the softwares whiles installing .This lab helped me in designing the small networks and linking them and comp aring the results in particular the load and delayLab 5_ATMASYNCHRONOUS TANSFER MODEA Connection-Oriented, Cell-Switching TechnologyIntroductionThe goal of this lab is to analyse and examine the effect of Asynchronous canalize method ATM adaptation molds and service crystallizees on the performance of the network. There are antithetic layers such as AAL that will discuss in this lab and will provide five service classes that can give a lot of useful information.ObjectiveTo examine the effect of Asynchronous Transfer Mode ATM. And provide QoS capabilities through its five service classes cosmic microwave background, VBR-rt, VBRnrt, ABR, and UBR. With cosmic background radiation (constant bit rate). And support all sorts of services, including sound, video, and data by using ATM. To study how the choice of the adaptation layer as well as the service classes can affect the performance of the applications. appendageAs given in the manual grow a current project after completing configured the network initialized the network, configured the applications, followed by profiles were done. While in the subnets part first configure northeast subnet was completed and minimal brain dysfunction remaining subnets was added. After that choose the statistics was tested and configure the color was fixed. Next duplicate the new scenario was duplicated and name it UBR_UBR. Finally run the simulation was run and the view results and analyse.Figure 1 this the CBR_UBR scenarioFigure 2 this the design of north east subnetFigure 3 4 indicate the run simulation.Figure 3Figure 4View the ResultsFigure 5 this is the voice diagram that indicate the different delay between the CBR and UBRQuestions and Answers1) Analyse the result we obtained regarding the voice megabucks Delay Variation prison term. Obtain the graphs that compare the Voice packet end-to-end delay, the Email download response condemnation, and the transfer download response time for both scenarios. Comment o n the results.SolWhen we observe the voice packet delay variation in the above shown figure 5, it indicates the UBR makes delay for voice because of the service class as UBR is using for all applications for ATM Adaption layer AAL5 . While CBR is using AAL2 and we can observe a very smooth service. So we can say that CBR service class is good for Voice applications and UBR service class is good for EMAIL and FTP applications.Figures 6, 7 8 show the graph which compares the Voice packet end-to-end delay ,the Email download response time, and the FTP download response time for both scenarios.Figure 6 in Voice Packer End_ to End Delay (sec)Figure 7 Email Download retort Time (sec)Figure 8 the FTP Download Response Time (sec)By the voice packet end to end indicates that the CBR service is having higher quality when compared to UBR service.By Email download response time when compared responses from both the scenarios.From FTP responses when observed UBR_UBR the responses are beter whe n compared to CBR_UBR scenario. So as stated before from his graphs UBR is good for Email and FTP but not good for Voice, CBR service is good for Voice.2) Create another scenario as a duplicate of the CBR_UBR scenario. phone the new scenario Q2_CBR_ABR. In the new scenario you should use the ABR class of service for data, i.e., the FTP and Email applications in the data stations. Compare the performance of the CBR_ABR scenario with that of the CBR_UBR scenario.Hints To driven ABR class of service to a node, assign ABR Only to its ATM Application Parameters attribute and ABR and (Per VC Queue) to its Queue Configuration (one of the ATM Parameters). For all switches in the network (total of 6 switches), configure the Max_Avail_BW of the ABR queue to be 100% and the Min_Guaran_BW to be 20%.SolFigure 9, the delay variation for both CBR_UBR and Q2_CBR_ABR is similar that means ABR and CBR services are good quality service that uses for voice.Figure 9 this diagram of voice that indicat es the delay variationFigure 10, the down load for CBR service is more than ABR service.Figure 10 this is time average for emailFigure 11, CBR and ABR services are having same FTP download response time.Figure 11 FTP3) Edit the FTP application defined in the Applications node so that its File Size is twice the current size (i.e., make it 100000 bytes instead of 50000 bytes). Edit the EMAIL application defined in the Applications node so that its File Size is five times the current size (i.e., make it 10000 bytes instead of 2000 bytes). Study how this affects the voice application performance in both the CBR_UBR and UBR_UBR scenarios. (Hint to answer this dubiousness, you might need to create duplicates of the CBR_UBR and UBR_UBR scenarios. Name the new scenarios Q3_CBR_UBR and Q3_UBR_UBR respectively.)SolWhen we decrease the size of the file the QoS will improve, as the traffic over-crowding will decrese as in fig.13 and 14, the delay of voice time variation is same and the time a verage voice packet end to end is also same. And we can say as the decreasing of packet size can decrease traffic congestion.Figure 12Figure 13Figure 14ConcolusionAfter this lab analysing the of Asynchronous Transfer Mode (ATM), and ATM adaption layers and service classes and their effect on the performance of the network. And it taught me how to deal with different layers like ATM adaption layers(AAL).Laboratory_6 ( force) take out Routing Information ProtocolObjective In this lab we can analyze and configure the Routing Information protocol. R.I.POverview Router has to check the packets destination share and determine which output ports is the silk hat choice to the address. By seeing the forwarding table router do the decision. And these algorithms are needed to build routing tables and the forwarding tables. Basic problem of the routing to find the lowest- court path between two nodes, Where the cost of a path equals to the sum of costs of all edges that make the path. In this laboratory, we will build a network that utilizes RIP as its routing protocol. We will examine the routing tables generated in the routers, and also check that how RIPS is affected by link failures.ProcedureAt the first the scenario named as NO_ blow was created.Network was build by using ethernet4_ slip8_gtwy and 100BaseT_LAN objects along with bidirectional 100BaseT_LAN links.After completion router configuration, remaining LANs were added. accordingly the statistics were chosen to realize the performance of the RIP protocol.Then simulation process was performed. The intentional figure is given below Figure-1 RIP Network (No_Failure)And we have to design a Failure scenario for that duplicate the of scenario 1, with inclusion of link node failure simulations as shown in figure-2.Figure-2 Rip Network (Failure)And after editing the attributes , which develop a link failure between Router 1 and Router 2. Then simulation process was performed.Figure-3 Comparison of number of updates in failure and No_Failure scenario.The above figures shows the number updates those are sent by the router to its routing table and when there is a failure to any other node connected to it as compared to the situation when there is no failure in any of the link.From the obtained graphs we can observe that for NO_Failure the number of updates decrease from 13 to 4 with time by approximately , because the routing table has already gathered information about neighboring nodes and after that only the information is updated that means updates being sent are less. The scenario is similar for failure in starting, but with time when the router senses link failure it again starts updating information in its routing table, the intensity of which is a little bit less then the time when it sensed the failure.RIP Trafic in No_Failure and Failure scenariosFigure-4 Comparison of RIP traffic sent in Failure and NO_Failure.Figure-5 Comparison for RIP sent traffic in failure and No Failure Scenarios .The above two graphs shows the comparison of RIP sent traffic in Failure and No_failure scenario. The above graphs the first represents overlaid comparison and second one is stacked comparison. The failure introduced into the RIP system changes the traffic sent signals and also the traffic received signals.ConclusionBy observing the results we can say that both No_failure and Failure scenarios are having different results and as the time taken for updating the Routing Information protocol is more for Failure scenario compared to NO_Failure scenario .Because the system require acknowledgement and discard the packet and resend it that takes lots of time to updatingLAB 7_OSPFOpen Shortest Path FirstA Routing Protocol base on the tie beam-State AlgorithmIntroductionThis lab lets us to know the working method of OSPF(Open Shortest Path First Protocol). By some analysis and steps in order to know more about this.AimTo introduce the Open Shortest Path First (OSPF) routing protocol. And analyse the performance of the Open Shortest Path First (OSPF) routing protocol. Then set up a network that utilizes OSPF as its routing protocol. Analyse the routing tables generated in the routers. And observe how the resulting routes are affected by assigning areas and enabling load balancing.ProcedureBy following the steps in the maual we can create the new project is done as we can see in the figure 1Figure 1 create a new scinarioAfter Creating, assemble the Network, Initialize the Network, Configure the crosstie Costs, Traffic Demands and figure the Routing Protocol and Addresses were completed. After that Configure the Simulation was the obtained results of the run was put it in the figure 2 3.Figure 2 run 3 simulationFigure 3 the result of simulationAfter getting the simulation result duplicate the present scenarios (Areas and Balanced Scenarios) and observe the results as shown in the figures 4,56ResultsFigure 4 No_Areas Scenario paths from router A to router CFigure 5 No_Areas Scenario paths from router B to router HFigure 6 Area scenarioFigure 7 the Balanced ScenarioAnswer the Question1) Explain why the Areas and Balanced scenarios result in different routes than those observed in the No_Areas scenario, for the same pair of routers.SolAs the A and C router link is created as a traffic congestion in No_Areas, the packets go to other shortest path A,D,E and C are smaller as compared to A and C. And the cost is also more for A and C when compared to A,D,E and C , those are like 15 for A,D,E and C and A and C is 20.By OSPF protocol the shortest path is chosen. As the loop back interface allows a server and client to communicate on same host by using TCp/Ip the traffic packets between router A and C in the Areas scenario are grow ,the packet will chip in through link router A and C.And as per the load building option the Path cost for A,C,E,G and H and path cost for B,A,D,F and H are equal, So the packet may choose any one.2) Using the simulation l og, examine the generated routing table in Router A for each of the three scenarios. Explain the values assigned to the Metric column of each route.Hints Refer to the View Results section in Lab 6 for information about examining the routing tables. You will need to set the global attribute IP Interface Addressing Mode to the value Auto Addressed/Exportand rerun the simulation. To determine the IP address information for all interfaces, you need to open the Generic Data File that contains the IP addresses and associated with the scenarios.solNo_AreasCampus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA RouterC,Campus Network.RouterA, Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterE,Campus Network.RouterE,Campus Network.RouterE RouterCCampus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterGCampus Network.RouterC,Campus Network.RouterA,169.09,2,RouterC RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterDCampusCOMMON ROUTE TABLE snapshot forRouter name Campus Network. (Router A)at time 600.00 secondsROUTE TABLE contentsDest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 instantly 0.000192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000192.0.13.0 255.255.255.0 192.0.3.2 IF1 20 OSPF 36.496192.0.11.0 255.255.255.0 192.0.1.2 IF0 35 OSPF 36.496192.0.14.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.4961 92.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496Areas scenarioCampus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA RouterC,Campus Network.RouterA,Campus Network.RouterA RouterCCampus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterGCampus Network.RouterC,Campus Network.Route rA,169.09,2,RouterC RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterDCOMMON ROUTE TABLE snapshot forRouter name Campus Network. Router Aat time 600.00 secondsROUTE TABLE contentsDest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 Direct 0.000192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496192.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.13.0 255.255.255.0 192.0.3. 2 IF1 20 OSPF 36.496192.0.11.0 255.255.255.0 192.0.4.2 IF2 40 OSPF 36.496192.0.3.2 IF1 40 OSPF 36.496192.0.14.0 255.255.255.0 192.0.4.2 IF2 20 OSPF 36.496192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 39.238Balanced scenarioCampus Network.RouterA,Campus Network.RouterC,163.64,0,RouterA RouterC,Campus Network.RouterA,Campus Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterE,Campus Network.RouterE,Campus Network.RouterE RouterCCampus Network.RouterB,Campus Network.RouterH,168.59,1,RouterB RouterH,Campus Network.RouterB,Campus Network.RouterC RouterB,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterG RouterE,Campus Network.RouterG,Campus Network.RouterH RouterGCampus Network.RouterB,Campus Network .RouterH,168.59,1,RouterB RouterH,Campus Network.RouterB,Campus Network.RouterA RouterB,Campus Network.RouterA,Campus Network.RouterA RouterD,Campus Network.RouterD,Campus Network.RouterD RouterF,Campus Network.RouterF,Campus Network.RouterF RouterHCampus Network.RouterC,Campus Network.RouterA,169.09,2,RouterC RouterA,Campus Network.RouterC,Campus Network.RouterE RouterC,Campus Network.RouterE,Campus Network.RouterD RouterE,Campus Network.RouterD,Campus Network.RouterA RouterDCOMMON ROUTE TABLE snapshot forRouter name Campus Network. Router Aat time 600.00 secondsROUTE TABLE contentsDest. Address Subnet Mask Next Hop Interface Name Metric Protocol Insertion Time192.0.1.0 255.255.255.0 192.0.1.1 IF0 0 Direct 0.000192.0.3.0 255.255.255.0 192.0.3.1 IF1 0 Direct 0.000192.0.4.0 255.255.255.0 192.0.4.1 IF2 0 Direct 0.000192.0.12.0 255.255.255.0 192.0.12.1 Loopback 0 Direct 0.000192.0.13.0 255.255.255.0 192.0.3.2 IF1 20 OSPF 36.496192.0.11.0 255.255.255.0 192.0.1.2 IF0 35 OSPF 36. 496192.0.14.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.10.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.17.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.2.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.6.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.7.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.15.0 255.255.255.0 192.0.1.2 IF0 20 OSPF 36.496192.0.8.0 255.255.255.0 192.0.1.2 IF0 25 OSPF 36.496192.0.19.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.9.0 255.255.255.0 192.0.1.2 IF0 15 OSPF 36.496192.0.16.0 255.255.255.0 192.0.1.2 IF0 5 OSPF 36.496192.0.5.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496192.0.18.0 255.255.255.0 192.0.1.2 IF0 10 OSPF 36.496When we observe the tables both No_Area and Balanced are having same tables but they are different in Area scenario. And this occurs by some reasons like no traffic in between A and C and the area identifier ,the path will pass as per the identifier and table will be different .3) OPNET allows you to examine th e link-state database that is used by each router to build the directed graph of the network. Examine this database for Router A in the No_ Areas scenario. Show how Router A utilizes this database to create a map for the topology of the network and draw this map. (This is the map that will be used later by the router to create its routing table.)Hints To export the link-state database of a router, Edit the attributes of the router and set the colligate State Database Export parameter (one of the OSPF Parameters, under Processes) to Once at End of Simulation. You will need to set the global attribute IP Interface Addressing Mode to the value Auto Addressed/Export. This will allow you to check the automatically assigned IP addresses to the interfaces of the network. (Refer to the notes of question 2 above.) After rerunning the simulation, you can check the link-state database by opening the simulation log (from the Results menu). The link-state database is available in Classes _ OSPF _ LSDB_Export.SolNo_Areas inter-group communication State Database snapshot forRouter Name Router Aat time 600.00Router fall ins Advertisements for Area 0.0.0.0 plug into state advertisement list size 8-LSA Type Router amours, assort State ID 192.0.12.1, Adv Router ID 192.0.12.1 rate Number 47, LSA Age 3LSA Timestamp 22.687 touch on Type Stub Network, connect ID 192.0.12.1, nexus Data 255.255.255.0, tie beam Cost 0, touch on Type Point-To-Point, consociate ID 192.0.16.1, connecter Data 192.0.1.1, tie beam Cost 5,Link Type Stub Network, Link ID 192.0.1.0, Link Data 255.255.255.0, Link Cost 5,Link Type Point-To-Point, Link ID 192.0.13.1, Link Data 192.0.3.1, Link Cost 20,Link Type Stub Network, Link ID 192.0.3.0, Link Data 255.255.255.0, Link Cost 20,Link Type Point-To-Point, Link ID 192.0.14.1, Link Data 192.0.4.1, Link Cost 20,Link Type Stub Network, Link ID 192.0.4.0, Link Data 255.255.255.0, Link Cost 20,LSA Type Router Links, Link State ID 192.0.13.1, Adv Router ID 192 .0.13.1 term Number 49, LSA Age 3LSA Timestamp 24.149Link Type Stub Network, Link ID 192.0.13.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Point, Link ID 192.0.12.1, Link Data 192.0.3.2, Link Cost 20,Link Type Stub Network, Link ID 192.0.3.0, Link Data 255.255.255.0, Link Cost 20,Link Type Point-To-Point, Link ID 192.0.14.1, Link Data 192.0.11.1, Link Cost 20,Link Type Stub Network, Link ID 192.0.11.0, Link Data 255.255.255.0, Link Cost 20,LSA Type Router Links, Link State ID 192.0.14.1, Adv Router ID 192.0.14.1 term Number 50, LSA Age 3LSA Timestamp 24.149Link Type Stub Network, Link ID 192.0.14.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Point, Link ID 192.0.12.1, Link Data 192.0.4.2, Link Cost 20,Link Type Stub Network, Link ID 192.0.4.0, Link Data 255.255.255.0, Link Cost 20,Link Type Point-To-Point, Link ID 192.0.18.1, Link Data 192.0.10.1, Link Cost 5,Link Type Stub Network, Link ID 192.0.10.0, Link Data 255.255.255.0, Link Cost 5,Link Type Point -To-Point, Link ID 192.0.13.1, Link Data 192.0.11.2, Link Cost 20,Link Type Stub Network, Link ID 192.0.11.0, Link Data 255.255.255.0, Link Cost 20,LSA Type Router Links, Link State ID 192.0.17.1, Adv Router ID 192.0.17.1 installment Number 52, LSA Age 4LSA Timestamp 24.239Link Type Stub Network, Link ID 192.0.17.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Point, Link ID 192.0.16.1, Link Data 192.0.2.2, Link Cost 5,Link Type Stub Network, Link ID 192.0.2.0, Link Data 255.255.255.0, Link Cost 5,Link Type Point-To-Point, Link ID 192.0.19.1, Link Data 192.0.6.1, Link Cost 10,Link Type Stub Network, Link ID 192.0.6.0, Link Data 255.255.255.0, Link Cost 10,Link Type Point-To-Point, Link ID 192.0.15.1, Link Data 192.0.7.2, Link Cost 10,Link Type Stub Network, Link ID 192.0.7.0, Link Data 255.255.255.0, Link Cost 10,LSA Type Router Links, Link State ID 192.0.15.1, Adv Router ID 192.0.15.1 season Number 51, LSA Age 5LSA Timestamp 24.239Link Type Stub Network, Link ID 192.0. 15.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Point, Link ID 192.0.17.1, Link Data 192.0.7.1, Link Cost 10,Link Type Stub Network, Link ID 192.0.7.0, Link Data 255.255.255.0, Link Cost 10,Link Type Point-To-Point, Link ID 192.0.19.1, Link Data 192.0.8.1, Link Cost 10,Link Type Stub Network, Link ID 192.0.8.0, Link Data 255.255.255.0, Link Cost 10,LSA Type Router Links, Link State ID 192.0.19.1, Adv Router ID 192.0.19.1 term Number 129, LSA Age 5LSA Timestamp 27.687Link Type Stub Network, Link ID 192.0.19.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Point, Link ID 192.0.17.1, Link Data 192.0.6.2, Link Cost 10,Link Type Stub Network, Link ID 192.0.6.0, Link Data 255.255.255.0, Link Cost 10,Link Type Point-To-Point, Link ID 192.0.15.1, Link Data 192.0.8.2, Link Cost 10,Link Type Stub Network, Link ID 192.0.8.0, Link Data 255.255.255.0, Link Cost 10,Link Type Point-To-Point, Link ID 192.0.18.1, Link Data 192.0.9.2, Link Cost 5,Link Type Stub Network, Link ID 192.0.9.0, Link Data 255.255.255.0, Link Cost 5,LSA Type Router Links, Link State ID 192.0.16.1, Adv Router ID 192.0.16.1 period Number 130, LSA Age 3LSA Timestamp 27.688Link Type Stub Network, Link ID 192.0.16.1, Link Data 255.255.255.0, Link Cost 0,Link Type Point-To-Po
Monday, June 3, 2019
Relationship between Parental Rejection and Loneliness
Relationship between Parental Rejection and LonelinessTazrin Akkas ZiniaINTRODUCTIONIn the literature there are many unlike dimensions such as acceptance, regard control, warmth permissiveness, restrictiveness, and demandingness about the pip-squeak rearing attitudes or agnate behavior. Children alone over the world need a circumstantial form of positive response (acceptance) from parents and some others attachment figures. When this need is not met satisfactorily, children everywhere regardless of variations in culture gender, age or, other such defining conditions turn tail to report disparate types of behavior and attitudes.Humans have over the course of evaluation, developed the biologically based stimulated need for positive response from parents and other attachment figures. This need holds an emotional wish desire, or yearning (whether consciously recognized or not) for comfort, support care, concern, nurturance and over all positive regard from tribe with whom the y have affection bonds of attachment. For this reason, enate acceptance-rejection is an important part of childrens lives at different stages of their cultivation.Parents may be warm and loving or hostile and rejecting. from each one pattern of parental behavior make the individualality development of children. According to interpersonal theory given by Sullivan (1953) the self outline that is a persons perception of self, is a significant component of personality, which develops through interaction with significant figures in the environment. In later life people respond check to this self system, whether people see the self as good or bad depends on their past perceptions.Rohner gave his famous Parental acceptance-rejection theory, widely known as a theory of kindization which attempts to explain and predict the antecedents, correlativitys and consequences of parental acceptance and rejection throughout the globe. It focuses on four major issues, one of them is the behavi oral, cognitive and emotional development of children and adult personality functioning. Every person has experienced the warmth and affection provided by someone important to him/her, who is called the parent not necessarily, mother and engender.This warmth and affection is a range from a great deal to none, where one end is named parental acceptance while the other one is termed rejection (Rohner, 2000a).According to the findings of a study conducted over worldwide love sample and American sample, parental hostility was significantly related to certain personality dispositions including hostility, negative self esteem and self adequacy, emotional instability, negative world view and dependency (Rohner).Parenting means providing care, support and love in a way that leads to a child includes being responsible for the child physicals need. It means creating a nurturing environment of attention, encouragement thus parenting involvement. It also means providing guidance for the childr en. It also means providing guidance for the children. Thus parenting involves meeting the Childs physical, mental, emotional and social needs.Both parental acceptance and rejection consist the warmth dimensions of parenting. According to PART theory, parental acceptance refers to the warmth, affection, care, comfort, concern, nurturance, support, or simply love that parents and others can feel and read toward their children, and others. Acceptance has two principle behavioral expressions physical and verbal.Physical expressions of acceptance include hugging, fondling, caressing, approving glances, kissing, smiling, and other such indications of endearment, approval, or support.Expressions of verbal acceptance include praising, complimenting, saying nice things to or about the child or other person, perhaps singing songs or telling stories to a young child, and the like. A feelings and behaviors and by the presence of a variety of physically and psychologically hurtful behaviors an d affects.The most broadly accepted definition of loneliness is the distress that results from discrepancies between ideal and sensed social relationships. This so-called cognitiveDiscrepancy perspective makes it clear that loneliness is not synonymous with being alone, nor does being with others guarantee protection from feelings of loneliness. Loneliness is the pathetic feeling that occurs when ones social relationships are perceived as being less Satisfying than what is desired. This entry describes how loneliness is conceived and totald How loneliness is mentally represented how loneliness influences thoughts, feelings, and Behaviors and consequences of loneliness for health and wellbeing.Loneliness is related to a number of personal characteristics including low self esteem, shyness, feelings of alienation, external locus of control and whim that the word is not a just place that are associated with depression .( Jones, Freeman, in press).The term depression in the study r efers to the central features of depressive to disorders, such as, depressed, mood, pessimistic ,thinking ,lack of enjoyment ,reduced energy and slowness. Of these, depressed mood is usually, but not invariably the most prominent symptom. (Gelder, Gath, Mayo and Cowen, 1996) some researchers showed that depression might have different manifestation in different cultures, for example, in an Indian study it was found that depression had varied manifestations like depressed mood, anxiety, somatic, features, insomnia, obsessions etc (Puri etal, 1995).Literature reviewStogdill (1937) said that, The experimental study of parental acceptance-rejection has a history going back to the 1890s. It was not until the 1930s, however, that a more-or-less continuous body of empirical research began to appear dealing with the effects of parental acceptance-rejection.Among, different programs of research on acceptance rejection, the work of Rohner and colleagues are most highly developed. Almost 400 studies have been completed in more than 60 nations internationally, as well as in every major ethnic group of America (Rohner, 2004a).Khaleque and Rohner, (2002a) experiment A meta analysis showed that, approximately 26% of the variability in childrens psychological adjustment and 21% of that is adults is accounted for by(parental as well as maternal) acceptance rejection.Roher, Uddin, Shamsunnaher Khaleque (2008) showed that, Among Japanese adults, remembered parental acceptance made an independent and significant function to mens adjustment whereas only remembered maternal acceptance made an independent and significant contribution to mens adjustment .Chyung Lee, 2008 Parmer Rohner, 2005 Rohner Khaleque, 2008, found several research findings and suggest that remembrance of fathers (but not mothers) acceptance in childhood are uniquely associated with variations in the psychological adjustment of adult peopleVaran Rohner Eryuksel, (2005) conducted A study which is supports conclusions, from the preceding research, and thus suggests the possibility of a ordinary relation between individuals mental health status and their perceptions of acceptance rejection by parents and intimate adult partners .In addition to issues of psychological adjustment, indorse also strongly implicates at least three other mental health issues of parental acceptance rejection .these issues are(1)depression and depressed affect,(2)behavior problems including conduct disorders, externalizing behaviors, and delinquency, (3) substance (drug and alcohol) abuse (rohner britner,2002).Rohner Veneziono (2001 2000, 2003) concluted that father love(acceptance-rejection) is often as strongly implicated as mother love in the development of behavioral and psychological problems as well as in the development of offsprings sense of health and well being .Rationale of the studyVery few empirical investigations are available in Bangladesh context to highlight the relationship between parent al acceptance-rejection and mental health problems .loneliness and depression are prominent psychiatric disorders in Bangladesh and so would be considered with priority. By this study we will be able to contribute to the understanding of the parents to appropriate parenting behaviors which are necessary for the good mental health for their children. And without good mental health they will be unable to contribute the future national developmental process. Furthermore this study will be able to enrich the PART theory. objectiveness of the studyThe purpose of this study is to investigate the relation of parental acceptance-rejection with loneliness depression.Considering above reviews and objectives of the study two hypotheses were formulated.Hypotheses1 parental rejection would be positively correlated with loneliness.Hypotheses2 parental rejection would be positively correlated with depression.MethodResearch designIn present study, for investigating relation of parentalrejection wi th anxiety and depression, correlation and multiple lapsing analysis will be used.SampleA sample of 100 individuals will be used, 50 males and 50females. Their ages range from 20 to 50. At the time of this investigation, all of the participants are university students and studying different areas.Instruments Demographic Information Form It gathered information related to the personal life of the participants for example, age, gender, academic qualification, number of siblings, birth order, family system etc.Adult Parental Acceptance-Rejection Questionnaire/Control Father mother-Short Form (Adult PARQ/ Control Father mother-Short Form, Rohner, 2005, Urdu translation by Munaf, Kamrani Hussain 2009) It measures the adults perception of fathers and mothers acceptance-rejection in their childhood. This 29 items self reported questionnaire measures five dimensions of paternal behavior that are coldness/lack of affection, hostility/aggression, indifference/neglect, dedifferentiated/reje ction and control, that can be rated on four-point Likert exfoliation ranges from almost always true (4), sometimes true (3), rarely true (2) and almost never true (1).Its accumulative fit indicates perceived father acceptance-rejection score at or below the midpoint of test scores means acceptance while high score is indicative of rejection. According to Khaleque and Rohner (2002) it is an empirically validated instrument used by researcher and in clinical settings as reliable measures.The revised UCLA loneliness scale was to develop to measure loneliness. It is a 20 items. Likert type scale.20 items of English version were translated into Bengali. The English and Bangla version were administered to 50 subjects with a gap of 7 days. Significant correlation r48=.88,p01 between scores of English and Bangla version indicated translation reliability of the scale that were measured the something by the two version . Each of the 20 items is scored such that a 1 indicates lack of lonelin ess and a 4 indicates high level of loneliness.Adapted Bangla version of The Geriatric Depression Scale GDS (Brink et al., 1982) would be used to measure depression of people. GDS is Geriatric ally oriented scale for depression. It consists of 30 items which include symptoms like lowered affect, inactivity, irritability, withdrawal, distressing thoughts, and negative judgments about past, present, and future. Each item is worded as a question and respondents are asked to reply in yes or no fashion. Each yes decide receives 1 point, except on reverse-scored items. Where no receives answer home in point. Ten items are reversed-scored. Total score of the scale ranges from 0 to 30 and a score of 0 to 10 is considered to be the range for normal no depression, scores of 11-20 indicate mild depression and 21-30 moderate to major depression. The reliability coefficient of split half (Spearman-Brown) was .81 and alpha (Cronbach) was .84 which were highly significant indicating the interna l consistency of the scale. mappingThe above instruments will be administered individually to the members of the sample. They will be informed of the purpose of the present study and necessary rapport will be completed before administering the questionnaires. The respondents will be instructed to read the items of the scales attentively and to respond rapidly. They will be asked to give tick () mark in the appropriate box. They will be also requested not to omit any item in the questionnaire and will be talk to them no right or wrong answer and no time limit for answering.Data AnalysesA descriptive analysis of the variables will be presented such as the respondents by age, sex, SES. Then, a multiple regression toward the mean analysis will be carried out to see how much respondents loneliness and depression can be explained by the parental acceptance and rejection.
Sunday, June 2, 2019
how a Christian couple would apply these beliefs in their married life :: essays research papers
A Christian couple would most likely apply their beliefs with an everlasting matrimony, one that cincture strong and provides a welcoming foundation for a family. The family is not merely an invention of society, scarce an institution founded by God himself. The family is Gods billet for populating the earth with pot who would hit the hay God and be loved by Him. It is to be formed exclusively through a loving lifelong marriage covenant in the midst of a man and a woman.So God created man in his own image, in the image of God created he him virile and female created he them. And God blessed them, and God said unto them, Be fruitful, and multiply, and replenish the earth, and subdue it and have dominion over the fish of the sea, and over the shuttlecock of the air, and over either living thing that moveth upon the earthThe Bible is filled with teaching on the family and stories that tell of the triumph and tragedy of families. Both the Old and sensitive Testa custodyts con tain legion(predicate) supposeions on the roles of father, mother and children. The clear message of Scripture is that individuals and families suffer when lives atomic number 18 not lived in accordance with Gods standards. Numerous biblical tragedies are played protrude in the context of families. When people fail to fulfill their proper functions in the family, they and their families suffer.The save is first and foremost called by God to love his wife. So ought men to love their wives as their own bodies. He that loveth his wife loveth himself. For no man ever yet hated his own flesh but nourisheth and cherisheth it, even as the Lord the church For we are members of his body, of his flesh, and of his bonesThe husband is to provide leadership as he models the Christian faith (beliefs and way of living) in the first place his family. He is to reflect in his life the character and virtues of the Christian faith. This happens when he lives a life of integrity, faithfulness, and obedience to God. The physical, material, emotional and spiritual needs of the family are to be met by the husband and father to the very best of his ability. He is to provide security and protection for his family. There is no biblical justification for not see these needs. It is his duty in the first place God.But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.how a Christian couple would apply these beliefs in their married life essays research papers A Christian couple would most likely apply their beliefs with an everlasting marriage, one that stays strong and provides a welcoming foundation for a family. The family is not merely an invention of society, but an institution founded by God himself. The family is Gods agency for populating the earth with people who would love God and be loved by Him. It is to be formed exclusively through a loving lifelong marriage covenant between a man and a woman.So God created man in his own image, in the image of God created he him male and female created he them. And God blessed them, and God said unto them, Be fruitful, and multiply, and replenish the earth, and subdue it and have dominion over the fish of the sea, and over the fowl of the air, and over every living thing that moveth upon the earthThe Bible is filled with teaching on the family and stories that tell of the triumph and tragedy of families. Both the Old and New Testaments contain numerous reflections on the roles of father, mother and children. The clear message of Scripture is that individuals and families suffer when lives are not lived in accordance with Gods standards. Numerous biblical tragedies are played out in the context of families. When people fail to fulfill their proper functions in the family, they and their families suffer.The husband is first and foremost called by God to love his wife. So ought men to love their wives as their own bodies. He that lov eth his wife loveth himself. For no man ever yet hated his own flesh but nourisheth and cherisheth it, even as the Lord the church For we are members of his body, of his flesh, and of his bonesThe husband is to provide leadership as he models the Christian faith (beliefs and way of living) before his family. He is to reflect in his life the character and virtues of the Christian faith. This happens when he lives a life of integrity, faithfulness, and obedience to God. The physical, material, emotional and spiritual needs of the family are to be met by the husband and father to the very best of his ability. He is to provide security and protection for his family. There is no biblical justification for not meeting these needs. It is his duty before God.But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.
Saturday, June 1, 2019
Cynthia Ozick Essay -- Biography Biographies Bio
Cynthia Ozick (1928 - .) Cynthia Ozick was born in New York City on April 17, 1928. She was the second of two children. Her parents, Celia (Regelson) and Wiliam Ozick immigrated to the US from the northwest vicinity of Russia. The family came from the Litvak (Lithuanian) Jewish tradition which was a tradition of skepticism, rationalism and antimysticism.Her parents owned a pharmacy in Pelham Bay section of Bronx. They worked very hard, usually fourteen hours a day. Cynthia delivered perscriptions sometimes. Her mother was a generous, lavish, exuberant woman full of laughter whereas her father was a discreet, quiet man. He was also a Jewish scholar, and knew Latin and German. When she was flipper and a half, her grandmother took her to heder, for Yiddish-Hebrew religios instruction. The rabbi told Ozicks grandmother to take her home because a girl did not have to study. But her grandmother brought her back the very neighboring day and insisted that she was to be accepted. Ozick is grateful to her grandmother for that instince and dates back her feminism to that time. She describes the Pelham Bay section of Bronx as a lovely place but it was brutually difficult to be a Jew there. She remembers having stones thrown at her or being called as Crists killer. At home and at the heder she was considered intelligent but she was particularly uncomfortable in school because she did not want to sing Christmas carols and was humiliated for that. She felt inadequate and tells that she suffered a wormlike childhood in grade school. But she was splendiferous in grammar, spelling, reading and writing. And to run away from the dreariness of being different, she dedicated herself to the world of books. She began reading with her older brothers... ...d.She has turned 80 earlier this family and has won not one but two lifetime achievement awards. In April 2008, she was receved the PEN/Malamud Award for short fiction and the PEN/Nabakov Award for long-suffering originality and consummate craftmanship. BibliographyTrust novel, 1966The Pagan Rabbi stories, 1971Bloodshed novellas, 1976Levitation fictions, 1982Art & Ardor essays, 1983The Canibal Galaxy novel, 1983The Messiah of Stockholm novel, 1987Metaphor &Memory essays, 1989The Shawl stories, 1989Fame & Folly essays, 1996The Puttermesser Papers novel, 1997Quarrel & Quandry essays, 2000 heritor to the Glimmering World novel, 2004The Din in the Head essays, 2006Dictation stories, 2008 Souces www.reaaward.orgwww.jewishvirtuallibrary.orgwww.complete-review.com www.myjewishlearning.com www.guardian.co.uk
Subscribe to:
Comments (Atom)