Sunday, January 26, 2020

Wireshark Network Protocol Analyzer Information Technology Essay

Wireshark Network Protocol Analyzer Information Technology Essay Todays networks are typically very stable. The problem is they arent static. Management and users are constantly demanding new technologies, new services, and better performance, which inevitably require changing infrastructure, deploying new applications, and dealing with security. And in the process network administrator needs to control IT costs and minimize disruption to the organization and also need to be able to clearly see all aspects of network to accurately assess the impact of adding new technologies and services and to make sure it is delivering maximum performance. And now-a-days there are wide variety of software and hardware products available that help network system administrators manage a network. Network management covers a wide area as well as local area network which mainly based on three different principles, which are : Performance: reduce blockage in the network. Reliability: keeps the network and the services that the network provides up and available for all the users .It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Security: Makes the network protected from unauthorized users and outside world. Functions that are execute as part of network management accordingly include controlling, planning, allocating, deploying, coordinating, and monitoring the resources of a network, network planning, predetermined traffic routing to support load balancing, cryptographic key distribution authorization, configuration management, fault management, security management, performance management, bandwidth management, analytics. There are a variety of network monitoring tools available in the market to be used depending on the size and requirements of the organisation. OBJECTIVE The intention of this report is to have a in depth study and estimation of network management tools that allow us to observe and manage the performance and function of networks effectively and efficiently, to produce a short report detailing the benefits of implementing Network Management. The tools which have been used in this report are Fluke Protocol Inspector, Wireshark network protocol analyzer, SNMP Browser Utility and Network inspector. FLUKE OPTIVIEW ANALYZER AND WIRESHARK NETWORK PROTOCOL ANALYZER A network protocol analyzer is a vital part of a network administrators toolkit. Network protocol analysis is the truth serum of network communications. If you want to find out why a network device is functioning in a certain way, use a protocol analyzer to sniff the traffic and expose the data and protocols that pass along the wire. Fluke and Wireshark network protocol analyzer offers insights into what is happening not only over the WAN, but also on the local area network (LAN) at each location. Information pertaining to traffic flows, protocols, and even individual data packets can authorize the IT organization responsible for the network to keep it operating at peak performance. Fluke and wireshark are tools to admin computer networks and they helps in monitoring and troubleshooting the network. In addition, they also helps in observe the status of devices, errors, warnings, and changes. Fluke and wireshark, the network analyzers are fast performing and compatible with almost eve ry operating system of windows. To observe the activities and the performance of these network analyzer program, a small network has been assembled: Figure 2.1 TEST NETWORK The minimal equipment for using Protocol Inspector/analyzer to observe the performance and applications of a network properly, is made up of two routers, two switches and two hosts. A class B addressing scheme has been used on the network. Two routers namely R1 and R2 respectively represent two different sites. R1 is using 172.17.0.1/30, R2 is using 172.17.0.2/30 and both the routers are connected through 172.17.0.0/24. To make easily understand only two users have been used. User1 and user2 are respectively on 172.17.1.100 and 172.17.2.100. Summary View of Fluke OptiView Analyzer The program opens in the Summary View. This view shows several windows used by the tool. The Resource Browser window in the upper left corner shows the only monitoring network device. The Monitor View, which is in the main window on the upper right, monitors one resource per window in a variety of viewing options. The Stop (red colour tab) in the upper-left corner of the Monitor View window confirms that no monitoring is occurring. Figure 6.1 Start the Monitor / Capture process To start the monitoring / capturing process, use the Start button or Module -> Start from the menu system. The Utilization chart should start showing activity like the graphic below: Figure 6.2 The word ARM(green colour tab) should appear where Stop had been before. If opening the Module menu, notice that Stop is now an option while Start is muted. The tabs at the bottom of the window show the resulting data in a variety of forms. Click on each and note the result. Transmit (Tx), Alarms, and Alarm Log will be blank. The following is the Received (Rx) frames, which indicates that Broadcast and Multicast frames are being received, but they may not show any Unicasts. Figure 6.3 Using the console connection to the router, ping the monitoring host, and notice that Unicast frames appear. Unfortunately, the errors shown in the third column will not appear in the lab exercise unless a traffic generator like the Fluke Networks OptiView product has been added. Now ,for the Detail View window click on the Detail View button in the toolbar or double click anywhere on the Monitor View chart. This will open a second window that should look something like the following, after maximizing the Utilization / Errors Strip Chart (RX) window. In a detail view there are few options we can see : MAC Statistics Frame size distribution Protocol Distribution Host Table Network Layer Host table Application layer host table Host matrix Network layer matrix Expert view MAC STATISTICS Mac Statistics tells us about the module type and speed used on the system. It provides important information like Network utilization, total bytes of data received. It also provides the different types of frames travelling across the network. Figure 2.2 Mac Statistics As shown in Error: Reference source not found, the total numbers of 1,555 frames were received. Further more there were 152 broadcast frames, 322 multicast frames and 1,081 unicast frames sent over the network. There were no errors found and a total of 122,453 bytes of data was received with an effective 0.003% network utilisation. FRAME SIZE DISTRIBUTION Frames on a network are classified according to size. Frame size distribution tells us the frames across the network and their size. Figure 2.3 FRAME SIZE DISTRIBUTION The picture above shows the frame size distribution over the test network. On the basis of size frames have been classified in to 8 different categories. The maximum average frame size is 65-127. PROTOCOL DISTRIBUTION Protocol distribution tells the number of protocols operating over the particular network and also at what percentage a protocol is working in terms of transferring data. Figure 2.4 Protocol Distribution The figure above shows different types of protocols on the network and the percentage of each protocol on the right of the graph and on the left side are different tabs, by clicking on each one of them an individual percentage of each protocol can be monitored. HOST TABLE Host table gives us a picture of the traffic generation on the network and the MAC address of the devices receiving the traffic. It tells us the maximum traffic host and the minimum traffic host. Figure 2.4 HOST TABLE In the picture above it shows percentage of traffic based on the number of frames coming in to the host. On the right hand side it shows the MAC addresses of the different hosts. It also tells us about the broadcast and the STP traffic. NETWORK LAYER HOST TABLE The Network Layer Host Table tells us about the packets, errors and bytes for each station at network layer. It allows decoding the packets based on their network layer address. So it helps the network managers to troubleshoot at the host level. Figure 2.5 NETWORK LAYER HOST TABLE The figure above shows the packets coming in to the hosts at the network layer based on their IP addresses. It also tells us that there are 5 IP hosts and no IPX hosts on the network.  [1]   APPLICATION LAYER HOST TABLE Application layer host table tracks packets, errors and bytes on an application specific basis. It traces packet activity of a particular application. It helps network managers to monitor bandwidth utilization on the network. Figure 2.6 APPLICATION LAYER HOST TABLE The figure above shows the operation of the different applications by the host. It shows the usage of the bandwidth in percentage by each application. HOST MATRIX Host Matrix shows the communication between two or more MAC addresses/ hosts. Hosts could be talking to more than one host at the same time which can be defined by the graph below: Figure 2.7 HOST MATRIX Figure 2.7 shows different hosts communicating to each other and at what percentage they are sending and receiving data on the network, which helps an engineer in bandwidth allocation to various hosts on the network. NETWORK LAYER MATRIX Network Layer Matrix shows the total data packets between a pair of systems by the network layer protocol. It shows the protocol specific traffic between the hosts. Figure 2.7 NETWORK LAYER MATRIX The figure above shows the conversations between the different pair of hosts. It shows the communication between two IP addresses and their bandwidth utilization. EXPERT VIEW Expert view shows different kinds of data capturing on the network on a single screen where the network engineer can monitor the user activities to make the network more responsive and reliable. Figure 2.8 EXPERT VIEW OVERVIEW Figure 2.9 Expert View of Data Link layer Figure 2.10 EXPERT VIEW OF SESSION LAYER Figure 2.11 EXPERT VIEW OF NETWORK LAYER The figures above show the output of different layers of OSI model. It also shows the protocol distribution across the network and utilisation of the different applications for file transfers like HTTP, ARP and others. It also identifies errors and any broadcast or multicast on the network. PROTOCOL OPERATIONS Network inspector tool is also used to investigate the operation of different protocols like; ICMP TFTP TELNET DHCP RIP/OSPF/IGRP ICMP (internet Control Message Protocol) ICMP stands for Internet Control Message protocol. It is one of the very important internet protocols, it is used by the a network administrators to monitor network connections ICMP SUCCESSFUL PING ICMP is the tool used to check the connectivity also known as PING (Packet Internetwork Gropper) which sends and receives echo request. PING successful means that device is in a reachable distance, when host receives the echo request it reply to it this means the destination is reachable. This process is explained in the figures below Figure 0.1: ICMP ECHO REQUEST Figure 0 .1 shows it is an Echo request by the host 192.168.2.2 to the destination 192.168.1.2 all across the network. Figure 0.2: ICMP ECHO REPLY The Echo reply to the request is shown in the figure above. It is clearly visible that the 32 bit data packet was sent to the host 192.168.1.2 and the source 192.168.2.2 sends it as a reply the host 192.168.1.2 as the same 32 bytes which means no data was lost and both can communicate without loosing any data. ICMP PING TIMEOUT Another common message while trying to ping a host or address is Ping Timeout. Ping times out when destination IP address does not exist, network inspector displays the following result for ping time out. Figure 0.3: REQUEST TIMED OUT Figure 0 .3 shows that when the engineer tries to ping an address which does not exists on the network, ARP protocol broadcasts this request with MAC address FFFFFFFFFFF to find the destination address, but when it does not get any response because the address is not there on the network the Ping Request, Times out after some time. ICMP NETWORK UNRECHABLE Network Unreachable means the network which we are trying to reach is not available for communication. This could happen due to numerous reasons, if the interface is down for some reason, if in case of using RIP it is at a distance more than 15 hops from the source or if the destination address does not exist in the routing table of the router. Fluke network inspector helps network manager to find the reason behind the network failure as explained in the figures below n Figure 0.4: ECHO REQUEST FOR THE IP ADDRESS OUTSIDE THE NETWORK ADDRESS Figure 0.5: DESTINATION UNRECHABLE REPLY Figure 0 .4 explains a network engineer sending an Echo Request to the address 192.168.3.1 which is not within the network and Figure 0 .5 shows if the address is not on the network or routing table of the router it sends a message Host Unreachable. ICMP Ping Time Out is different from ICMP Ping Network Unreachable because when the host sends a data to an address, it then waits for the reply from the destination. If after some time the reply does not come back this means the data is going to the destination address but cannot receive any updates or data from that destination, it displays the message Request Timed out. On the other hand when host sends data to the address which does not has not entry in the routing table of any of the routers, the data will not be sent anywhere and the message comes out as Destination Host Unreachable TFTP TFTP or Trivial File Transfer Protocol is very easy and simple to implement as it takes very less memory. It is a connectionless service that uses UDP (User Datagram Protocol). It is faster than FTP. It is used on routers, switches and some hosts that support TFTP for the purpose of transferring the file. Figure 0.6: TFTP FILE COPYING Figure 0.7: TFTP In the above figure it is clearly visible that the source port is 56882 and destination port is 69 which is used for (Trivial File transfer). This diagram also proves that TFTP uses UDP to transfer of files along the network. In the second portion TFTP is captured where it shows the file transferred is sdm-config. TELNET Telnet is a utility to access a device remotely over the network. It can be used for many purposes. Telnet works with TCP/IP. Whenever we access a device remotely, a connection has to establish using a Three Way Handshake process. ESTABLISHING A TELNET SESSION Synchronization between hosts is done by an exchange of connection establishing segments that carry SYNs. The Synchronization requires each side to send its own (ISNs Initial Sequence Numbers) and to receive a conformation of it in an Acknowledgement (ACK) from the other host. Each host also receives each others ISN and send a conformation as ACK this process is called a Three Way Handshake THREE WAY HANDSHAKE Host A send its ISN (Seq = X) to start the session, it is received by the Host B who then send its own ISN (Seq = Y) and also sends (ACK = X+1) to Host A, when Host A receives the ACK it do the same as Host B adds 1 to the ISN received and send (ASK = Y+1) back to the Host B which establishes the TELNET session (see Figure 0 .72). Sends SYN SEQ = Y ACK = X + 1) Host A Host B Sends SYN (Seq = X) Receive SYN (Seq = X) Receive SYN SEQ = Y ACK = X +1) Sends ACK (ACK = Y +1) Receive ACK (ACK = Y +1) Figure 0.72: THREE WAY HANDSHAKE Diagram taken from CCNA 1 2 Companion Guide Figure 0.8: THREE WAY HANDSHAKE Figure 0 .8 shows the Three Way Handshake. Each host sends an ISN and in reply other host add 1 to it and sends it back as an acknowledgement. Fluke Network Inspector allows network administrator to see this process and monitor any unauthorized attempts. Figure 0.9: FIRST STAGE OF THREE WAY HANDSHAKE In Figure 0 .9 Client sends the request to synchronise its ISN to the telnet server, it then specifies its initial sequence and adds 1 to it. Figure 0.10: SECOND STAGE OF THREE WAY HANDSHAKE Figure 0 .10 shows that the ACK packet has been sent back to the host and at the same time another packet for its SYN has also been sent to establish a connection. Figure 0.11: THIRD STAGE OF THREE WAY HANDSHAKE Figure 0 .11 shows that the server just now received a packet from the host and the connection is now established between them for further more data transfers. DATA CAPTURING Fluke network inspector helps network manager to monitor and capture the data being transferred between the devices once the telnet session is active, though it can be a lengthy process to see the whole data but it can be really helpful in troubleshooting typical problems. Data is captured in only one letter at a time which can be seen in the following diagram. Figure 0.12: DATA CAPTURING In the figure above letter I has been captured which is a part of password while accesing the device remotely. Thus Fluke tool helps network engineer to monitor each and every bit of data travelling across the network. . Figure 0.13: LOGGED ON THROUGH TELNET Figure 0 .13 shows the successful remote log on to the router R2. Now here all the data transferred will be captured by the Fluke tool inspector. TERMINATING A TELNET SESSION Terminating a TELNET connection is a must for security reasons. It again takes Three Way Handshake process. This process can be monitored in Fluke Inspector as we will see this in the diagrams below (see Figure 0 .14). Figure 0.14: FIRST STAGE TERMINATION In Figure 0 .14 the request for the termination of the session has been sent, next figure will show the acknowledgment received by the server. Figure 0.15: SECOND STAGE TERMINATION In Figure 0 .15 server receives the request and sends an acknowledgment for the termination of the session. Figure 0.16: THIRD STAGE TERMINATION Figure 0 .16 shows the third and the last stage of terminating the telnet session. LIMITATIONS OF TELNET TELNET is not very secure process as it is over the internet and the data is not encrypted which can be easily hacked and the information can be lost. Secondly TELNET involves TCP/IP only, and hence is not compatible with other protocols. Unauthorised users can on to log on to the network and can damage the configuration files, which can affect the performance of the network and can result in less reliable network. To prevent this remote access can be restricted to certain ports so that only authorised individual can log on remotely which helps in reducing the chances of and intrusion on the network. DHCP (Dynamic Host Configuration Protocol) DHCP allows hosts on the network to obtain an IP address dynamically. Network engineer configures a DHCP server for the network defining a pool of IP address to be allocated to a particular range of hosts. Whenever a host requests an IP address, server automatically assigns the address. When a DHCP client comes online it sends a DHCP Discover broadcast message. After sending a DHCP Discover, client moves into a select state. Client then takes the offer from the DHCP server, it then receives the first response and sends the DHCP Request packet and asks for how long it can keep that address without renewing it, then server acknowledges the request and sends DHCP ACK packet. At this stage the client gets into the bound stage and starts using the IP address. The flow chart below (see Figure 0 .17) describes the whole process. Clint Boots Initialize State Select DHCP ACK DHCP Request Request DHCP Discover Bound Figure 0.17: FLOW CHART FOR DHCP Diagram taken from CCNA 1 2 Companion Guide DHCP DISCOVER Protocol Inspector tool can be used to monitor the whole process step by step. Figure 0.18: DISCOVER Figure 0 .18 shows the client has been discovered by a DHCP server by its broadcast. At this point it does not have any IP Address. DHCP OFFER DHCP server makes an IP address offer to the client. Figure 0.19: DHCP OFFER In Figure 0 .19 an offer made by server to accept 192.168.2.3 as an IP address. CLIENT REQUEST A request from the host is sent to the DHCP server for an IP address Figure 0.20: DHCP REQUEST In Figure 0 .20 host negotiates for the lease time for the IP address offered by the DHCP server. DHCP ACKNOWLEDGMENT DHCP server then sends an acknowledgment packet. Figure 0.21: ACKNOWLEDGMENT Figure 0 .21 shows the IP Address 192.168.2.3 has been accepted by the client as new IP address. DHCP RELEASE DHCP server issues an IP address to the client which can been seen in the Figure 0 .22 Figure 0.22: DHCP RELEASE RIP (Routing Information protocol) The Routing Information Protocol (RIP) is a dynamic routing protocol used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP) using the distance-vector routing algorithm. Devices running RIP sends the information of all the connected devices in the network every 30 seconds to keep the network reachable and connected. RIP has two versions. Fluke network inspector tool tells about the connected routers and the hops, with there IP address. All this information is very useful in troubleshooting. Figure 0.23: RIP ROUTING INFORMATION PROTOCOL Figure 0 .23 explains the routing process. It shows that the port used for routing is UDP 17. Only two routers are connected to each other. It also tells us which version or RIP is running and at what distance both router are as in HOPS COUNT as visible the first one is 1 Hop far from the host and second one is 2 Hops from the host it sends the routing information every 30 seconds. Another thing is that RIP can only support 15 Hops per network. SNMP (Simple Network Management Protocol) This protocol operates at the network layer of the OSI model where it exchanges the management information among the devices installed in the network. It is very clear from its name that this protocol is used to manage network devices such as routers, Switches Hubs, modems, and systems. It is used to monitor different user activities over the network. SNMP helps network engineer to monitor and identify any faults on the network and helps to solve these problem for better connectivity. A network managed by the SNMP consist of the following Managed devices: Devices used on the network such as Routers, Switches Hubs, modems, systems and servers etc. Agents: Agent is software which is used to operate the managed devices. Network-management systems: They provide the processing and memory required for the network management, there can be one or more network-management systems on a managed network GETIF UTILITY The SNMP operation can be monitored by the network engineer with the use of Protocol inspector and a utility called OPTIVIEW using a freely available browser utility called GETIF. GETIF is a network tool which is based on windows GUI; it is very helpful to gather the graphical information of SNMP devices. It provides information like Parameters, Interfaces Connected, Routing Tables, Trace Route and Network length. . GETIF PARAMETERS After loading up the GETIF utility type in the router IP address in the host name box of the parameter window the result will be as following. Figure 0.24: GETIF PARAMETER In Figure 0 .24 it is shown once the router IP Address has been typed in and START button has been pressed in the Parameter Tab of GETIF utility, it gives us the information like the router name and IP Address, router description, and also shows the SNMP port number which is 161. SNMP GET Fluke network inspector tool can be used with GETIF utility to see the data retrieved from SNMP agent. To retrieve this information select MBrowser tab on the GETIF window and then select the SNMP option from the graphical tree, it gives us all the required information shown below. Figure 0.25: SNMP GET SNMP SET When a single item is selected in MBrowser of GETIF utility, start the network protocol inspector to monitor the data transfer. When the name of the router is changed by using GETIF utility it will be shown on the Network Inspector Utility as well SNMP TRAP Fluke Network Inspector tool along with GETIF utility has the ability to diagnose the error on the network, To see the result on the Network Inspector tool if the network engineer can physically take the serial cable out from the router port and disconnect the communication in the network the Network Inspector tool identify this error and displays it on the tools screen for the network engineers urgent attention Figure 0.26: SNMP TRAP In Figure 0 .26 the status of the serial connection is show to down this is due to the serial cable being unplugged from the port. GRAPHYCAL MONITORING IN GETIF This is another option in GETIF utility to monitor the network bandwidth consumption and the percentage of the different protocols. It can be seen in the following figures. Figure 0.27: SNMP GRAPHYCAL MONITORING In Figure 0 .27 two graphs have been shown, in these graphs only ICMP packet has been monitored to show the operation of the protocol. In top half of the fig graph starts from the 0 and then gradually goes up due to the increase in the ICMP PINGs. A sudden drop can also be seen while the graph is increasing this is due to the term Request Timed Out in the ping in the second half you can see the decrease in the graph and this is due to when the pings were cancelled one by one. BENEFITS OF FLUKE NETWORK INSPECTOR TOOL Fluke Network Inspector allows network engineer to provide reliable, and desirable connectivity to the organisation, it saves time and money by effective resource management. It also provide better knowledge to the network engineer about the devices installed on the network which helps to find the faults and fix them easily. Fluke Network Inspector provides a solution for monitoring and analysing the network which can be very helpful to the organisations to get desirable and reliable connectivity of their network. It also allows the network engineer to protect the network from any unauthorized users and gives a freedom of managing the network remotely. Fluke Network Inspector Tool helps in performing major functions of the network management which includes: Fault Management Configuration Management Accounting Management Performance Management Security Management All these functions have been explained briefly in this report FAULT MANAGEMENT The process of identifying, diagnosing a problem on the network and resolving it is called fault management. The problem could be of any kind from faulty cables to defective hardware. In other words, it is a very important for the effective operations of a network and to provide the connectivity among the users of a company, An intelligent network engineer will detect the fault in the network in very less time and fix the problem fast. Fault management is a very reliable tool for providing the connectivity for the network. Fault management is very useful to the network administrator as they can keep an eye on the network from anywhere in the network and resolve the issues quickly. Apart from automatic updates about the fault on the network, network administrator can be informed by the users. Network administrator can send ping packets to identify the problem. If a network administrator cannot reach a certain device remotely like when administrator pings a device and gets no reply there could be number of reasons, fault management helps in finding solution to such problems, so that the network is available all the time. Whenever there is a fault on the network it will be known to the network operator by using SNMP (Simple Network Management Protocol) it also rate the problem as if the problem is of high risk to the network or to the low risk, but will keep on sending information to the network administrator about the fault in the network till the time it has be resolved and will send a notification of error resolved. CONFIGURATION MANAGEMENT Configuration management is all about handling the configurations of the network devices. It involves maintaining a database of the network devices, and providing reports of the data travelling over these devices. Keeping the record of the configured devices on the network is called configuration management. Configuration management can help a network administrator to install different software for the better communication among the network. The data base of the configuration management includes different entries like, the devices used, the version numbers and the device capabilities. By using configuration management a network administrator can increase the devices on the network, can provide or deny access to the certain number of users or a group on a particular network. Remote sites can be configured by using different techniques, access can be restricted to certain area of the network for specified users, or if required interfaces can be brought down or up by using the configuration. ACCOUNTING MANAGEMENT Account management helps in managing the utilization of network resources, which further leads to a more productive network. One of the functions of the accounting management is to distinguish between inter and intra -domain accounting data and route them to the respective device, for the session record containing Network Access Identifier, this packet can be routed by examining the NAI to save this packet to be broadcasted over the whole network and utilizing the bandwidth. Accounting management involves the monitoring of the users activities on the network at an individual or at a group level which helps in providing better communication and also reduces the fault generation which can cause loss of data. It allows network engineer to keep track of the bandwidth utilisation w

Saturday, January 18, 2020

Industrial And Organizational Psychology Paper Essay

The field of industrial and organizational (I/O) psychology has been studied since the infancy of psychology itself (Spector, 2008). In the beginning, I/O psychology was wholly concerned with the industrial side of the field—which concentrated on the management aspects of business and emphasized human resources—as opposed to the organization side, which is concerned with improving work conditions in the workplace. Yet, as the field has grown over the years it has come to include the full spectrum of industry and organization. Strictly speaking, I/O psychology is defined as, â€Å"†¦an applied field that is concerned with the development and application of scientific principles to the workplace† (Spector, 2008, p. 5). On a practical level, the aim of I/O psychology is to, â€Å"†¦improve the quality of the environment for employees as well as to increase the effectiveness and efficiency of employee behavior in that environment† (Barnes-Holmes et. al. , 2006, p. 56). The concise definition and practical application of I/O psychology are only the capstone to an understanding of the length and breadth of the field. A full examination of the evolution of I/O psychology as well as an explanation of the role that research and statistics play in I/O psychology are needed to form the foundation on which the capstone is placed. Evolution of I/O Psychology I/O psychology has its roots in the late 1800s and early 1900s when early psychologists were trying to apply the theories of psychology to the organization of business (Spector, 2008). Two scientists are attributed with the founding work of I/O psychology: Huge Munsterberg and Walter Dill Scott. Both were university professors that had an interest in employee selection and the application of new psychological tests to the subject of industry. In fact, two of I/O psychology’s foundational books, The Theory of Advertising (1903) and Psychology and Industrial Efficiency (1913) were written by Scott and Munsterberg, respectively. The methodological next step beyond Scott and Munsterberg came in 1911 when Frederick Winslow Taylor developed his theory of â€Å"Scientific Management†, which puts for a scientific procedure for the managing of production workers on the factory line. The field of I/O psychology took a leap in technological applicability when Frank Gilbreth, an engineer, and Lillian Gilbreth, a psychologists, combined the knowledgebase of their respective fields into one eclectic theory of human factors—which is wholly concerned with the design of technology for use by people (Spector, 2008). Ironically, it was the destruction of World War I (WWI) and World War II (WWII) that most furthered the development and relevance of I/O psychology. During WWI several psychologists, led by Robert Yerkes, produced the Army Alpha and Army Beta group tests, which were designed to gauge mental ability to the end of proper unit placement. Before WWII the APA proper was not concerned with the practice of psychology in the real-world, but limited itself to experimental psychology. However, in 1944 Division 14 of Industrial and Business Psychology was formed within the APA to address the need for a practice side of I/O psychology. In 1970 Division 14 was reorganized as the APA Division of Industrial and Organization Psychology and is today referred to as the Society for Industrial and Organizational Psychology (SIOP). Over the past century the field of I/O psychology has grown to include work conditions and work satisfaction—the organization side of the field—into the theoretical and academic body of research that the field encompasses. As an example, the current organizational explanation of individual goals and self-regulatory activities takes an integrative perspective, incorporating the person, the social situation, and environmental factors into one theoretical framework (Kanfer, 2005). Today I/O psychology is applied to both scientific research in the laboratory and practice in the field to deal with the issues and problems that affect businesses and organizations of the day. Research and Statistics in I/O Psychology There are two main settings in which I/O psychology takes place: research and practice (Spector, 2008). Both settings greatly overlap in the real-world, everyday work of I/O psychologists. The practice division of I/O psychology applies psychological principles to the work environment, business structure, and hiring practices of industries and organizations; whereas, the research division develops the aforementioned psychological principles to be used in the practice of I/O psychology. No matter the setting, I/O psychology utilizes the scientific method to determine the underlying psychological principles and applicable practices relevant to businesses and organizations. Four concepts necessary to the extrapolation of the cientific method onto the subject-matter of I/O psychology include: 1) the research question; 2) research design; 3) measurement and; 4) statistics. A research question that is testable through the avenues of the scientific method must be specific and usually includes precise theoretical predications about the outcome of the research—hypothesis. The great power of the scientific method comes through the manipulation of independent variables and subsequent observation of dependent variables to the end of unraveling the affects of confounding while simultaneously isolating causal and correlated variables. The basic structure of research design can be invasive—as in the case of control groups—or simply observational in nature. The several types of research design consist of: survey designs (questionnaires)—both cross-sectional and longitudinal, observational designs—both obtrusive and unobtrusive; and qualitative studies, which entail the use of non-quantitative data to substantiate psychological principles.

Friday, January 10, 2020

Apple a Day

An Apple a Day Keeps the Doctor Away Eating Healthy and exercise are essential to the health and well-being of all people. A healthy diet along with exercise can help you live longer, feel better about better food choices; provide you with more energy, help you stay at a healthy weight, and help you fight stress. Do you want to live longer and be healthier? Then make that first step and maximize the benefits from being active and eating healthier. It is important to make sure and eat fruits and vegetables daily, at least 5 servings.The best way to be healthier is to incorporate into your daily routine eating fresh fruits and vegetables such as: apples, bananas, strawberries, pineapple, blueberries, grapes, carrots, potatoes, peas, and broccoli. This list can go on and on and you will find there are plenty of fruit and vegetables that you will enjoy. â€Å"Vegetables and fruits are clearly an important part of a good diet. Almost everyone can benefit from eating more of them, but var iety is as important as quantity. No single fruit or vegetable provides all of the nutrients you need to be healthy.The key lies in the variety of different vegetables and fruits that you eat† (Willet, 2007, Harvard School of Public Health). Doctors and nutritionists highly promote fruits and vegetables because they offer many benefits to being healthy. They are excellent sources of essential nutrients, such as vitamins and anti-oxidants. People who eat diets rich in fruits and vegetables have a decreased risk of several chronic diseases, including cardiovascular disease, high blood pressure and diabetes. As the saying goes, â€Å"an apple a day keeps the doctor away. A healthy eating plan will protect against many health problems and improve the way our body functions. Annabel Bentley, BUPA assistant medical director, has this advice: â€Å"As one of the leading independent health and care providers in the country, BUPA is pleased to support this campaign. A balanced diet i s one of the best ways to maintain good health and help prevent the onset of some serious diseases. Eating well need not be expensive or complicated and this new campaign is geared to leading people towards the right things to eat. † Eating healthy can help in living a longer and healthier life.It can also strengthen your immune system, which can help in fewer sicknesses. The benefits from eating healthy go on and on and will improve your lifestyle dramatically. Proper eating can even help some have healthy lush looking hair, skin and nails and everyone wants to have beautiful skin, hair and nails. Eating healthy can help in feeling better within oneself. A healthy diet along with exercise will provide the body with more energy and make you feel better about yourself and can help fight stress and depression. Eating unhealthy can cause many health problems.Besides obesity and diabetes, there is high blood pressure, heart problems, breathing difficulty, anemia, and joint problem s all due to extra weight. Healthy eating can help protect people from cancer, heart attacks, diabetes and problems with blood pressure. Blood pressure is the force that pushes the blood from the heart through the arteries in the body. High blood pressure becomes dangerous because is makes the heart work too hard. Even when the pressure is only slightly raised for a long period of time it can damage arteries and cause organ damage.I personally have high blood pressure and the doctors are constantly advising me to eat better, exercise and lose weight and when I apply their council my blood pressure does improve dramatically. † High blood pressure is a primary risk factor for heart disease and stroke. As such, it is a condition that is important to control. Diet can be a very effective tool for lowering blood pressure. One of the most convincing associations between diet and blood pressure was found in the Dietary Approaches to Stop Hypertension (DASH) study.This trial examined the effect on blood pressure of a diet that was rich in fruits, vegetables, and low-fat dairy products and that restricted the amount of saturated and total fat. The researchers found that people with high blood pressure who followed this diet reduced their systolic blood pressure (the upper number of a blood pressure reading) by about 11 mm Hg and their diastolic blood pressure (the lower number) by almost 6 mm Hg—as much as medications can achieve† (Appel, Moore, Obarzanek,1997, clinical trial).By making sure to eat a balanced diet then the occasional fatty food or takeaway will not hurt, but it will become a problem if you eat fatty foods everyday. It can be easy to fall into the trap of eating takeaway food every night because most people have busy hectic lives and find that they do not have the time or energy to cook something healthy. â€Å"Junk food has become a pillar in modern society. It offers a quick fill, fast service, or you can bring it home to watch a m ovie with. From chips, pop, ice cream it goes on and on.There is no nutritional value in any of it. Even the canned produce should be considered junk food. Preservatives are jamming the tops of these containers of fruits in order for them to remain edible for months and months† (Healthy Eating, 2008, Health benefits of food). While it would be nice to take a pill and wake up 15 lbs lighter, the truth is that weight loss takes time and effort as well as a commitment to eating healthy everyday. The best way to begin to reduce the amount of weight people put on would be to reduce any un-necessary fat intake.Fat intake can be difficult to manage because fat makes food taste so much better. It is so tempting to grab a donut or candy bar when craving a snack, but it can be just as easy to grab an apple or a bag of carrots and your body and your health will reap better benefits from it. â€Å"Most people who work at eating better know that the salad bar can be a terrific way to eat out, eat great food and have a healthy meal. There are a few items that can tip the scales as far as fat and calories are concerned, especially if you are trying to watch your weight.A major offender is salad dressings. † Doctor Gourmet, (2008). Weight is such a sensitive subject for many people, young and old , which is why it+ does need to be addressed, because people today especially children are becoming obese at alarming rates. Many people think that it is just too difficult to eat healthy, or they do not know what to eat. â€Å"What you should eat is actually pretty simple. But you would not know that from news reports on diet studies, whose sole purpose seems to be to confuse people on a daily basis.When it comes down to it, though—when all the evidence is looked at together—the best advice on what to eat is relatively straightforward: Eat a plant-based diet rich in fruits, vegetables, and whole grains; choose healthy fats, like olive and canola oil; and red meat and unhealthy fats, like saturated and trans fats, sparingly. Most important of all is keeping calories in check, so you can avoid weight gain, which makes exercise a key partner to a healthy diet† (Willet, 2007, Harvard School of Public Health) As for keeping the weight off, avoid the elevator and take the stairs.If you take the stairs regularly, you will burn more calories. As you do it more often, you will learn that you have more energy. In order to be healthy, we need to learn what it means to eat healthy and to live healthy. The first step is making sure to eat plenty of fruits and vegetables on a daily basis and avoid unnecessary fats in our diet. The best way to avoid fats is by not eating fast food or junk food on a regular basis. Exercise needs to be a top riority in our lives to keep stress away and to feel energized, even if it is as simple as a walk in the park. When it comes to diet and exercise, you have to ask yourself a very important question. How mu ch do you care about yourself? It is up to all of us to make a commitment to set aside a little time each day for exercise. As far as eating healthy is concerned, just focus on each individual day. Do not go to the extreme, because this is setting you up for failure. Just make small changes throughout the day.At night, simply walk away from that huge slice of chocolate cake. It is all up to you to live a healthy lifestyle. Discipline, control and focus can be hard to maintain when it comes to eating healthy and exercising regularly. It can be hard, especially in the beginning, but it is essential that you be consistent. By being consistent it will get easier and easier to make necessary lifestyle changes. By making these positive lifestyle changes in your life it will go a long way in living a long healthy life for years to come.

Thursday, January 2, 2020

Essay on Psychoanalysis of Holden Caulfield - 2159 Words

Untitled â€Å"BPD has a higher incidence of occurrence than schizophrenia or bipolar disorder and is present in approximately 2% of the general public† (Johnston).Borderline Personality Disorder, or BPD, is an emotional disorder that creates unstable behavior and stress in an individual. Holden Caulfield, from J.D. Salinger’s, 1948 novel, The Catcher in the Rye has been psychoanalyzed by many readers. Psychoanalysis is insightfully looking at a characters action and behavior to better understand them psychologically. By psychoanalyzing Holden Caulfield’s behavior and thoughts, it becomes evident that he has Borderline Personality Disorder caused by his childhood trauma and neglect, and portrayed through symptoms that damage his relations†¦show more content†¦Holden never going to Allie’s funeral gives us insight into why Holden is still holding onto Allie. After Allie’s death, Holden still went through experiences that caused his BPD, neglect and separation. During the time following Allie’s death, Holden’s family was in great grieving, making Holden feel isolated and not getting the attention he needed to fully grow mentally as a child (â€Å"National Allegiance on Mental Health†). Holden also expresses twice, that his mother is still grieving over Allie’s death by stating his mother, â€Å"still isn’t over my brother Allie yet† (Salinger 155). Holden is also never close to anyone. He meets with his family a limited amount of time throughout the year, and is kicked out of schools, giving him no permanent guidance in his life. Holden constantly describes his expulsion as, getting â€Å"the ax† (107). He shows a continuous changing in guardians, because of his attachment to both Mr. Spencer and Mr. Antolini, both old school teachers from schools he flunked out of. He also dealt with the separation from D.B. his other brother, who moved to Hollywood, Holden seems to be very ins pired by him throughout the novel, but is mad that he left (1). Holden like many people with Borderline Personality Disorder are afraid of being alone, so the desperately try to avoid feeling lonely (â€Å"National Institute of Mental Health†). Holden in attempts to have some form of companyShow MoreRelatedPsychoanalysis of Holden Caulfield1173 Words   |  5 PagesPsychoanalysis is a psychoanalytical theory and therapy that aims to treat mental disorders by investigating the conscious and unconscious elements in a human mind by bringing fears to the conscious mind. According to Sigmund Freud, â€Å"The unconscious silently directs the thoughts and behavior of the individual† (Freud 95). Holden Caulfield, the main character in J.D Salinger’s novel, The Catcher in the Rye, is sixteen years old and does not act his own age for he is stuck in his own private worldRead MoreAnalysis Of Holden Uses Defense Mechanisms1157 Words   |  5 PagesLanguage, Period 1 08 March 2017 Consequently, Holden uses defense mechanisms, â€Å"as a means of preventing anxiety that would result from conscious awareness of disturbing impulses, wishes, or ideas arising from the id,† (Nevid 471). Nevid explains that according to Freudian theory, defense mechanisms reside in the unconscious part of the human brain because if people were conscious of every single problem, people wouldn’t be able to function. Therefore, Holden is subconsciously utilizing defense mechanismsRead MoreHolden Uses Defense Mechanisms1372 Words   |  6 PagesConsequently, Holden uses defense mechanisms, â€Å"as a means of preventing anxiety that would result from conscious awareness of disturbing impulses, wishes, or ideas arising from the id,† (Nevid 471). Nevid explains that according to Freudian theory, defense mechanisms reside in the unconscious part of the human brain because if people were conscious of every single problem, people wouldn’t be able to function. T herefore, Holden is subconsciously utilizing defense mechanisms in order to shield himselfRead MoreAnalysis Of Holden Caulfield s The Catcher Rye 1308 Words   |  6 Pagesscratch, while others perish into the rubble. The same can be said for Holden Caulfield, the protagonist of J.D. Salinger’s novel The Catcher in the Rye, a teenager that suffers and wallow in his misery behind the scene’s, yet lives a life of luxury and debauchery for all to witness. Psychoanalytical theory operates as a catalyst in analyzing and understanding Holden Caulfield in the narrative of The Catcher in the Rye. Holden is introduced as a defeatist, juvenile youngster that has just failed outRead MoreThe Catcher in the Rye: Holden Caulfields Mental Breakdown1384 Words   |  6 Pagesthe boy displays his critical and unhealthy mindset. Eventually he has a mental breakdown. Through psychoanalysis of Holden Caulfield, one may suggest that Allie s death, social development, and an identity cris is are large contributing factors in Holden s mental breakdown. Allie Caulfield is an important person to Holden and his death affects him greatly. In response to his brother s passing, Holden attempts to recover by using defense mechanisms as a shield against reality. The concept of defenseRead MoreHolden Caulfield Is The Narrator1845 Words   |  8 Pagesand 2 Holden Caulfield is the narrator. Holden was kicked out of his school, Pencey Prep, due to scanty grades. The reader’s are taken back to his last day at the school. It was Saturday, which meant game day for Pencey Prep. They were playing their rivals, Saxon Hall. Instead of being down at the game like every other student, Holden went to visit old Spencer. Mr. Spencer was Holden’s history teacher who had an idea that Holden would not be returning next semester. Spencer and Holden had aRead More Insurance for White Masculinity: Methods of Control to Ensure a Dominant Race3563 Words   |  15 Pageskeep himself in control. In J.D. Salinger’s the Catcher in the Rye, Holden Caulfield protects his ideal of an untainted white female to the point of physical conflict with Stradlater as Holden is afraid of Stradlater breaking his view of white female pureness. Jane Gallagher is Holden’s view of pureness as he remembers her in very innocent ways as a girl that â€Å"kept all her kings in the back row† during chess, and Holden desperately wants to hold onto these innocent memories of her. The ideaRead MoreSigmund Freud s Theory And Criticism1345 Words   |  6 PagesCriticism Spring 2015 Midterm Essays Freud and Literature At some point in life, everyone has heard the name Sigmund Freud. Sigmund Freud was born in 1856, and went on to become one of the most talked about theorists. He is known as the father of psychoanalysis and has left behind an everlasting legacy. There were two influential and sometimes controversial theories that Freud left behind. Sigmund Freud’s big legacy was his work with dreams and the unconscious. This work can relate to literature onRead MoreLiterary Analysis Of The Catcher Rye 1763 Words   |  8 Pages Campbell 1 English 150 Whetstine Literary Analysis The Catcher in the Rye Catcher in the Rye starts with the main character Holden Caulfield telling us about his life. It seems that Holden is a very troubled individual that is having problems dealing with the past and perhaps the prospect of growing up. He wants to talk but not sure anyone cares to listen. He eludes to the fact that he is in an institutionRead MoreThe Catcher in the Rye by JD Salinger: A Review1887 Words   |  8 Pagespublished in 1951. The novel deals with the themes of identity, belonging, connection, and alienation. The protagonist, Holden Caulfield, is a cynical sixteen year-old with prematurely gray hair that makes him appear older than his age. Holden is caught at the awkward age between adolescence and adulthood as he searches for his identity. Set in the 1940s, the story begins with Holden recovering from a breakdown stemming from his expulsion from Pencey Prep School. He has already flunked out of three