Monday, February 17, 2020

Ethical manner Research Paper Example | Topics and Well Written Essays - 500 words

Ethical manner - Research Paper Example s of administration, which focus on individual employees and understanding of their behaviours before employment of strategies that are specific to such behaviours and thus effective in enhancing sustainable organizational development. One of the unethical issues that exist yet avoidable in the article is carelessness in the presentation of the work. The authors show negligence and make careless errors especially in terms of grammatical arrangements and issues of punctuation. On the other hand, subjectivity is an avoidable unethical issue in the research. As such, it is important for the researchers to be objective by avoiding any form of bias in the design of the study, data analysis, interpretation of data, and personal decisions (Resnik, 2011). It is also important to disclose any financial or personal interests to avoid negative influences of such aspects on the research process or findings. One of the parties that are likely to face injury in the study is the employees within the hotels. As such, since the study reviews the behaviour of these employees and their effect on organizational success, in response to the management, the exposure of identities of some of the employees that are believed to be negatively responding to management in their performance may risk dismissal from their jobs. On the other hand, some of the managers that may be marked as using poor management skills by the study may ruin their reputation especially before the organizations’ governing bodies and thus affect their relationships with top most management and even the employees. Carelessness in the presentation of data could lead to poor interpretation of the data and thus alter the initial intention of the study (Resnik, 2011). This could lead to initiation of interventions in the wrong variables. In addition, careless presentation of data could lead to questioning of the credibility of the paper, an aspect that would lead to neglecting of the content of the study by all

Monday, February 3, 2020

Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 words

Routing Protocol Security OSPFv2 - Dissertation Example Using MD5 method to make a comparison between the security measures often associated with the use of OSPF v2 Routing protocol, it worked quite well to implement a network structure, which made it possible to evaluate and assess the Project background research on OSPF v2 authentication security alongside highlighting the solution that was deemed reliable for the OSPF v2 authentication. Through the use of the Quagga software, a network was implemented, which helped in testing, as well as evaluating OSPF v2 authentication. This project clearly demonstrated that OSPF as an interior gateway protocol, can route the Internet Protocol into a single routing domain. It showed that OSPF can gather a link-state information from routers and be able to construct a network of topology maps, which are more often than not used for determining routing table that is often presented in the internet layer. It was also shown that OSPF was designed in such a way that it can support the variable length subn et masking, and it is also capable of detecting any change within a topology such as any link failure and be able to converge onto a loop-free routing structure within seconds. This project also demonstrated that the OSPF network might be subdivided into various routing areas for purposes of simplifying administration and optimization of traffic and for resource utilization. It also showed that OSPF does not make use of the TCP/IP transport protocol. It is instead encapsulated in the IP datagram. This contrasts with other related routing protocols such as the Border Gateway protocol and the Routing Information protocol. It also became apparent that Router within the same broadcast domain often link from adjacencies whenever they need to detect each other. Such a detection takes place whenever a Router gets to identify itself within the hello OSPF protocol packet. This is often referred to as the two-way state. this project, as well indicted that the OSPF makes use of the multicast, as well as the unicast in sending the link state updates and the hello packets. Recommendations for Future Research The current research demonstrated clearly that it is possible OSPF V2 Routing protocol can be used as an internet security measure. Given the focus of this study and previous studies on OSPF V2 Routing protocol and other earlier versions, it is worth recommending that there is need to migrate to IPv6 considering that the solution to the existing problem which is OSPFv2 routing is to transfer to OSPFv3 and use IPsec Protocol between sites (WAN. It has been indicated that OSPF protocol when operated on other versions such as on IPv4, it operates more securely between routers. This provides an option to use varied authentication methods to give allowance to routers that are trusted to participate in routing. Although it has been noted that OSPFv3, when running on IPv6, does not any more support the protocol-internal authentication, it relies on the IPv6 protocol security (Tanenbaum, 2003). As often is the case, the OSPF version 3 would help introduce some modifications to the given IPv4 protocol implementation. Other than the virtual links, virtually all neighbor exchanges often exclusively make use of the IPv6 link-local addressing (Cisco Systems Inc, 2009). It is widely known that the IPv6 protocol always do run per link, and not based upon the subnet. It is worth contenting that all the IP prefix information has