Monday, May 18, 2020

A Sociological Analysis Of Mean Girls Broken Down Into Two...

Mean Girls is about a girl named Cady who joins an elite social group at her new school known as the Plastics. While socializing with the Plastics, Cady develops a new, mean girl, personality and ends up sabotaging the group’s leader, Regina, and becomes the new leader of the Plastics. Regina retaliates by spreading the burn book, a book the Plastics filled with insults and gossip about other students, around the school leading to a riot and Cady takes the blame. Cady realizes that her new personality is wrong and apologizes to the school, makes amends with her old friends, and forms a truce with Plastics who disband and become regular students (Mean Girls, 2004). This paper will provide a sociological analysis of Mean Girls broken down into two sections. Section one will explain why a sociologist would find the movie interesting, examining the movie from a functionalist perspective, providing an example of private troubles and public issues, and comparing the movie to North American culture. Section two will discuss the themes of socialization and culture by explaining terms related to each section and applying them to the movie. Section One Why a Sociologist Would Find Mean Girls Interesting Sociologists concern themselves with social relations among individuals and groups within a particular society (Luton, 2015), so a sociologist would find this movie interesting because when analyzed through a sociological point of view it provides various examples of socialization,Show MoreRelatedAssessment And Utilization Of Learning Style2619 Words   |  11 Pageslearn, environmental elements, emotional elements, sociological patterns, physical elements, and psychological elements (Bastable, 2014). This literature review will focus on assessment and utilization of learning style preferences identified through the use of the Dunn and Dunn Learning Style Assessment to enhance education and training in both education systems and corporate America. Learning style preferences in education will be further broken down into the following subcategories: educators, adolescentRead MoreSociology Essay20437 Words   |  82 Pagesof Education Unit 2.2 Developments in Education from the 19th Century to 1997 Unit 2.3 Sociological Theories of Education Unit 2.4 Social Class and Educational Opportunity Unit 2.5 Gender and Educational Opportunity Unit 2.6 Ethnicity and Educational Opportunity Unit 2.7 Government Policy and Education Unit 2.8 Researching Education Module 3 Sociological methods Unit 3.1 Introduction to Sociological Methods Unit 3.2 Primary Sources (1): Quantitative Methods and Data: Social surveys, questionnairesRead MoreAlternative Learning Systems9735 Words   |  39 PagesArticles Sociology of the Prison Classroom: Marginalized Identities and Sociological Imaginations behind Bars Teaching Sociology 39(2) 165–178 Ó American Sociological Association 2011 DOI: 10.1177/0092055X11400440 http://ts.sagepub.com Kylie L. Parrotta1 and Gretchen H. Thompson1 Abstract The authors use sociology of the college classroom to analyze their experiences as feminists teaching sociology courses in the ‘‘unconventional setting’’ of prison. Reflective writing was used to chronicle experiencesRead MoreEconomic Growth And Development Of Development6644 Words   |  27 Pagesa view to proposing directions for future development. As I do these, I will examine the of this importance development for Africa. Development can be seen as the study of the causes and consequences of economic change in society. Development can mean different things to different people depending on the lens used in viewing it. It was seen as part of the geopolitical project to lure newly independent countries of the world away from communism to capitalist orientation of the countries of WesternRead MoreEffect of Broken Home19368 Words   |  78 PagesAcademic Perfomance of Students Coming from Broken Homes CHAPTER I INTRODUCTION Background of the Study: Broken homes are experience by some of the students not only with those in poverty line families but same goes to middle and higher class families. Parents chose to live separately regardless how their children feel and its impact to their lives, however, there are still parents in spite of the situation still supports and care of their children in their studies, and others. It is worthy toRead MoreFrom Extravagant Movie Theatres to Lowly Bomba Houses: Investigating the Degeneration of City Spaces Along Claro M. Recto Avenue, Manila10891 Words   |  44 Pagesrehabilitation efforts and projects to curtail the problems bedeviling the entire length of Recto. Key informant interviews and a review of pertinent historical data elucidate various perspectives highlighting the process of degeneration. An in-depth analysis of the key informants was compared and contrasted to the accessed and analyzed literature and historical data. The findings of the study include: the investigation of how Recto Avenue was once a developed and progressive city, teeming with extravagantRead MoreTracing Theoretical Approaches to Crime and Social Control: from Functionalism to Postmodernism16559 Words   |  67 Pages.................................................................. 60 Bibliography ............................................................................................................. 60-62 ABSTRACT This thesis engages in secondary analysis, and is designed to inform the reader of misconceptions associated with how we come to understand crime and the criminal within modern westernized capitalistic society. Typically the majority of persons tend to blame the criminal for his or herRead MoreSports17369 Words   |  70 PagesInstructor’s Manual Exercises in Sportscasting Linda K. Fuller, PhD Published by  © 2008 by Routledge, Taylor Francis Group. All rights reserved. No part of this work may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, microfilm, and recording, or by any information storage and retrieval system, without permission in writing from the publisher. Printed in the United States of America. Routledge, Taylor Francis Group, 270 MadisonRead MoreSports17363 Words   |  70 PagesInstructor’s Manual Exercises in Sportscasting Linda K. Fuller, PhD Published by  © 2008 by Routledge, Taylor Francis Group. All rights reserved. No part of this work may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, microfilm, and recording, or by any information storage and retrieval system, without permission in writing from the publisher. Printed in the United States of America. Routledge, Taylor Francis Group, 270 Madison AvenueRead MorePractical Guide to Market Research62092 Words   |  249 Pages All rights reserved Copyright  © Paul Hague Paul Hague is hereby identified as author of this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 This book is published by Grosvenor House Publishing Ltd 28–30 High Street, Guildford, Surrey, GU1 3HY. www.grosvenorhousepublishing.co.uk This book is sold subject to the conditions that it shall not, by way of trade or otherwise, be lent, resold, hired out or otherwise circulated without the author’s or publisher’s prior

Wednesday, May 6, 2020

The Capitalist Driven Society Of The United States

Kelly Mulquin Dr. Pratt Intro to Sociology 11/12/2014 In the capitalist-driven society of the United States, there is a constant impetus towards expansion, investment, and maximization of profits. While this system has helped the US become one of the wealthiest countries in the world it has also contributed to a widening gap between the wealthiest and poorest members of society. This essay will examine two of the poorest populations in the United States, the Central Appalachian region of Kentucky and the population in Camden, New Jersey through the lens of two 20/20 segments reported by Diane Sawyer: â€Å"Waiting on the World to Change† and â€Å"A Hidden America: Children of the Mountains†. This essay will examine the interplay between economic life and family structure in these regions, and how this interplay shapes individual behavior. In the early 20th century, both the Appalachian region and Camden were financially prosperous. Large-scale logging and coal mining firms brought wage-paying jobs and modern amenities t o Appalachia and Camden served as a major center for manufacturing and industry. Following World War II, the coal mining industry experienced major decline. Mechanical innovations that reduced the number of laborers needed, competition from cheaper fuels, and fewer accessible and profitable seams contributed to a major decline in the coal industry. The decline of this industry, once the major source of jobs and economic activity in the region, led to a spike inShow MoreRelatedThe Restrictive Nature Of Communism1193 Words   |  5 Pagesrestrictive nature of Communism contributes immensely to its lack of viability. In Friedrich Engels’ Communist Confession of Faith, Engels--a peer of Marx’s with whom he worked closely--outlines these restrictive qualities as positive aspects of Communist society. For instance, Engels asserts that, â€Å"Every individual strives to be happy. The happiness of the individual is inseparable from the happiness of all,† (Marx, Karl, F riedrich Engels). However, he then proceeds to define as essential shifts to the abolitionRead MoreMarx Theory Of Reserve Army Of Labour1500 Words   |  6 Pagesmigration. Marx theory of reserve army of labour is central to what he has to say about capitalism and workers wages; the proletariat. Most migrants in society today migrate to the US and end up working in factories where they manage machinery. Marx theory illustrates how capitalist industries consists of two parts - the machinery and the workers. Capitalist industries expand by sukingin their workers to operate the machinery, upping their wages and attracting more of them. By doing so the worker is necessaryRead MoreThe Mutual Relationship Of Politics And Economics994 Words   |  4 Pagespolitical foundation. As Sklar states in The Corporate Reconstruction and the Antitrust Law, â€Å"there is no society more ‘political’ than the ‘market society,’ that is, capitalist society.† (p. 88) Th e origins of a political economy are quite old, but the actual creation stems back hundreds of years to some of the earliest corporations. A political economy uses personal politics to give advantage to the market, specifically through law. The law lays the foundation for capitalist expansion, and corporationsRead MoreThe Political Terms Left And Right Were Devised During The French Revolution898 Words   |  4 Pagesradical ideology of the left is defined as political positions or activities that accepts or supports social equality, often in opposition to social hierarchy and social inequality. Often those of left wing ideology involve in concern for those in society who are perceived at a disadvantage relative to others and a belief that there are unjustified inequalities that need to be reduced or abolished. They propose a view of human beings living together harmoniously without great disparities in wealthRead MoreIdeology Of Intensive Mothering1229 Words   |  5 PagesThe pa triarchal institution of motherhood, exploits the tenets of the intensive mothering ideology, to conform mothers into the ideal consumer to further benefit the economy and the capitalist state. In contemporary society, the fear of being labeled a ‘bad’ mother has driven mothers to strive for unrealistic goals which reinforce the ideology of intensive mothering. Sharon Hays definition of intensive mothering helps define the qualities that must be attained to be a good mother. In Hays definitionRead MoreKarl Marx And The Productive Power1182 Words   |  5 Pagesbelieved that growth is driven by the progression of the productive power by human. This productive power was also the rise and fall of an economic structure according to how progression is supported and downcast. Marx suggest that through communism it is possible to eliminate the constraint that exploitation has on the society’s laborers. The mode of production involves the methods humans use to produce the resources to sustain the provision for survival and to improve society as a whole. The two componentsRead MoreEssay on The Industrial Revolution1326 Words   |  6 Pagesbusiness. In seeking competitive advantage, the United States has targeted a niche for itself at the top of the world economy: It has opted to use the highest technology, to have the most capital- and knowledge-intensive industries, and to produce the highest quality and highest value-added goods and services. Surfing the crest of this giant wave is not easy: To maintain its prosperity, the U.S. economy must be in a state of constant change, driven by a process of â€Å"creative destruction.† InefficientRead MoreKarl Marx s Theory Of Crime And Deviance1696 Words   |  7 PagesKarl Marx was a sociologist in the eighteenth century and was one of the first to develop and explain a conflict perspective on how society functions, he was a l iberal reformist who had more radical views about the origins of crime and deviance. He became popular in the US and UK during the 1970’s. Like many radical criminologists, he developed the perspective of the conflict theory that explained how some social interactions result in to conflict and how individuals engage in conflict daily toRead MoreAustralias Involvement in the Vietnam War Essay978 Words   |  4 Pagesof a combined fear of communism and the fall of freedom from danger in Australian democracy and society. The growing web of communism saw the fall of many countries closing in on Australia and New Zealand, and it was believed Robert Menzies’ government that they would find communism at Australia’s shores. Australians were anti-communist during the Vietnam War; due to a level of hype that the society, the media, and the government were exposed to. The â€Å"domino effect† was a popular analogy duringRead MoreGlobalization Has Transformed Our Economic Lives1609 Words   |  7 PagesSociology has looked at the way people interact with one another in groups, cultures, societies and organizations. An emerging topic in sociology that takes in a bigger and more worldly view is globalization. Globalization is defined as taking into account the way the world becomes more connected with itself through cultural, transportation and communication means. These international connections came before the time of capitalism and colonization itself. Long since then, countries have traded with

Network Organization Media And Connections â€Myassignmenthelp.Com

Question: Discuss About The Network Organization Media And Connections? Answer: Introduction A network is characterised as a gathering of at least two PC frameworks connected. There are many sorts of PC systems, including the accompanying: Local Area Network (LAN): The PCs are topographically near one another Wide Area Network (WAN): The PCs are more distant separated and are associated with phone lines or radio waves [1]. Campus Area Network (CAN): The PCs are inside a restricted geographic region, for example, a grounds or army installation. Metropolitan Area Network (MAN): Information arrange intended for a town or city. Home Area Network (HAN): A system contained inside a client's home that associates a man's advanced gadgets. Network Characteristics Notwithstanding these sorts, the accompanying qualities are additionally used to arrange diverse kinds of systems: Topology: The geometric course of action of a PC framework. Typical topologies incorporate a transport, star, and ring. Convention: The convention characterises a typical arrangement of standards and signs that PCs on the system used to impart. A standout amongst the most famous conferences for LANs is called Ethernet. Another common LAN convention for PCs is the IBM token-ring system. Engineering: Networks can be comprehensively named utilising either a distributed or a customer/server design. Figure 1: 7 Layers of the OSI Model (on left) and corresponding 4 Layers of the TCP/IP Model (Source: Created by Author) Open Systems Interconnection (OSI) Model The Open Systems Interconnection (OSI) display characterises a systems administration structure to execute conventions in layers, with control go starting with one layer then onto the next. It is fundamentally utilised today as an instructing apparatus. It thoughtfully isolates PC organise engineering into seven layers in a consistent movement [2]. The lower layers manage electrical signs, pieces of parallel information, and steering of this information crosswise over systems. More high amounts cover organise solicitations and reactions, the portrayal of information, and system conventions as observed from a client's perspective. The OSI demonstrate initially imagined as a standard engineering for building system frameworks and for sure, many mainstreams arranges innovations today mirror the layered plan of OSI. Physical Layer At Layer 1, the Physical layer of the OSI display is in charge of the last transmission of digital information bits from the Physical layer of the sending (source) gadget over system interchanges media to the Physical layer of the accepting (goal) gadget. Cases of Layer 1 advances incorporate Ethernet links and Token Ring systems. In addition, centre points and different repeaters are standard system devices that capacity at the Physical layer, as links connectors. At the Physical layer, information is transmitted utilising the flagging upheld by the physical medium: electric voltages, radio frequencies, or beats of infrared or customary light. Data Link Layer While getting information from the Physical layer, the Data Link layer checks for physical transmission blunders and bundles bits into information "outlines". The Data Link layer additionally oversees physical tending to plans, for example, MAC addresses for Ethernet systems, controlling access to any different system gadgets to the physical medium [3]. Since the Data Link layer is the entire most complex layer in the OSI demonstrate, it is regularly partitioned into two sections; the "Media Access Control" sublayer and the "Consistent Link Control" sub layer. Network Layer The Network layer includes the idea of steering over the Data Link layer. At the point when information touches base at the Network layer, the source and goal tend to contained inside each edge are analysed to decide whether the information has achieved its last goal. If the information has reached the final goal, this Layer 3 organises the information into parcels conveyed up to the Transport layer. Something else, the Network layer refreshes the purpose address and pushes the edge down to the lower layers [4]. To help to direct, the Network layer keeps up sensible tends to, for example, IP addresses for gadgets on the system. The Network layer additionally deals with the mapping between these original locations and physical locations. In IP organising, this mapping is proficient through the Address Resolution Protocol (ARP). Transport Layer The Transport Layer conveys information crosswise over system associations. TCP is the most widely recognised case of a Transport Layer 4 organise convention. Distinctive transport agreements may bolster a scope of discretionary capacities including mistake recuperation, stream control, and support for retransmission. Session Layer The Session Layer deals with the arrangement and stream of occasions that start and tear down system associations. At Layer 5, it is worked to help numerous sorts of connections that can be made progressively and keep running over individual systems. Presentation Layer The Presentation layer is the most straightforward in the capacity of any bit of the OSI show. At Layer 6, it handles sentence structure preparing of message information, for example, design transformations and encryption/unscrambling expected to help the Application layer above it. Application Layer The Application layer supplies arrange administrations to end-client applications. System administrators are usually conventions that work with client's information [5]. For instance, in a Web program application, the Application layer protocol HTTP bundles the information expected to send and get Web page content. This Layer 7 gives information to (and acquires information from) the Presentation layer. TCP/IP Protocol Architecture TCP/IP conventions guide to a four-layer calculated model known as the DARPA show, named after the U.S. government organisation that at first created TCP/IP. The four layers of the DARPA display are: Application, Transport, Internet, and Network Interface [6]. Each layer in the DARPA display relates to at least one layers of the seven-layer Open Systems Interconnection (OSI) demonstrate. Network Interface Layer The Network Interface layer (additionally called the Network Access layer) is in charge of setting TCP/IP parcels on the system medium and accepting TCP/IP bundles off the system medium. TCP/IP was intended to be free of the system get to strategy, outline arrangement, and medium. Like this, TCP/IP can be utilised to associate different system sorts [7]. These incorporate LAN advancements, for example, Ethernet and Token Ring and WAN innovations, for example, X.25 and Frame Relay. Freedom from a particular system change gives TCP/IP the capacity to be adjusted to new advances, for example, Asynchronous Transfer Mode (ATM). The Network Interface layer envelops the Data Link, and Physical layers of the OSI demonstrate. Note that the Internet layer does not exploit sequencing and affirmation benefits that may be available in the Data-Link layer. A sensitive Network Interface layer is accepted, and sound correspondences through session Foundation and the sequencing and confirmation of pa ckets is the duty of the Transport layer. Internet Layer The Internet layer is in charge of tending to, bundling, and directing capacities. The centre conventions of the Internet layer are IP, ARP, ICMP, and IGMP. The Internet Protocol (IP) is a routable convention in charge of IP tending to, steering, and the fracture and reassembly of bundles [7]. The Address Resolution Protocol (ARP) is in charge of the determination of the Internet layer deliver to the Network Interface layer address, for example, an equipment address. The Internet Control Message Protocol (ICMP) is in charge of giving symptomatic capacities and revealing blunders because of the unsuccessful conveyance of IP bundles. The Internet Group Management Protocol (IGMP) is in charge of the administration of IP multicast gatherings. Transport Layer The Transport layer is in charge of furnishing the Application layer with session and datagram correspondence administrations. The centre conventions of the Transport layer are Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). TCP gives a coordinated, association arranged, sound correspondences benefit. TCP is in charge of the foundation of a TCP association, the sequencing and affirmation of bundles sent, and the recuperation of parcels lost amid transmission . UDP gives a coordinated or one-to-numerous, connectionless, problematic correspondences benefit. UDP is utilised when the measure of information to be exchanged is little, when the overhead of setting up a TCP association is not wanted or when the applications or upper layer conventions give dependable conveyance. The Transport layer envelops the duties of the OSI Transport layer and a portion of the obligations of the OSI Session layer. Application Layer The Application layer gives applications the capacity to get to the administrations of alternate layers and characterises the conventions that applications use to trade information. There are numerous Application layer conventions, and new protocols are continually being created. The most generally known Application layer protocols are those utilised for the trading of client data: The Hypertext Transfer Protocol (HTTP) is utilised to exchange records that make up the Web pages of the World Wide Web. The File Transfer Protocol (FTP) is utilised for quick record exchange [8]. The Simple Mail Transfer Protocol (SMTP) is utilised for the exchange of email messages and connections. Telnet, a terminal imitating convention, is utilised for signing on remotely to organise has. Moreover, the accompanying Application layer conventions help encourage the utilisation and administration of TCP/IP systems: The Domain Name System (DNS) is utilised to determine a host name to an IP address. The Rou ting Information Protocol (RIP) is a steering convention that switches use to trade directing data on an IP internetwork. The Simple Network Management Protocol (SNMP) is utilised between a system administration comfort and system gadgets to gather and trade organise government data. Cases of Application layer interfaces for TCP/IP applications are Windows Sockets and NetBIOS. Windows Sockets gives a standard application-programming interface (API) under Windows 2000. NetBIOS is an industry standard interface for getting to convention administrations, for example, sessions, datagram, and name determination. More data on Windows Sockets and NetBIOS is given later in this section. Protocols existed beside TCP/IP or OSI AppleTalk Mac Computer built up the AppleTalk convention suite to execute document exchange, printer sharing, and mail benefit among Apple frameworks utilising the LocalTalk interface incorporated with Apple equipment [9]. AppleTalk ports to other system media, for example, Ethernet by the utilisation of LocalTalk to Ethernet spans or by Ethernet include sheets for Apple machines. AppleTalk is a multi-layered convention giving internetwork steering, exchange and information stream benefit, naming administration, and thorough record and print sharing. Also, some external applications exist for the AppleTalk conventions. To broaden the tending to the ability of AppleTalk arranges and give consistency the IEEE 802 standard, Apple Computer presented AppleTalk Phase 2 out of 1989. AppleTalk Phase 2 varies primarily in the scope of available system layer addresses and the utilisation of the IEEE 802.2 Logical Link Control (LLC) convention at the Data Link Layer. Recommending the cables for the network In a business premises, the Ethernet foundation is introduced in a moderately spotless, calm condition with links taken cover behind dividers, in roofs or under floors and system switches, equipment and availability parts shielded in secured zones [10]. In any case, mechanical offices exhibit an altogether different reality. Here, many if not most links, connectors, switches, and dynamic system parts are basic to machine mechanization, instrumentation and control frameworks, which places them in brutal and conceivably unsafe circumstances. Indeed, even the best Commercial-Off-The-Shelf (COTS)Ethernet frameworks are not made to deal with such conditions after some time. Rough conditions call for ruggedized links and just mechanical review Ethernet framework parts are assembled sufficiently extreme to withstand the dangers and dangers they are presented to for quite a while. Mechanical Ethernet Cable Selection: Flex and Environmental Factors The initial step is to comprehend the flex and natural prerequisites of the application: Bureau or control rooms/low vibration: For encased situations, where vibration is constrained. In these applications, a strong director is the correct decision, future-sealed with high transmission capacity ability [11]. Manufacturing plant floors/direct vibration: For the industrial facility floor and work zones where there are raised levels of vibration. Links are likewise prone to be presented to oil, chemicals, harsh taking care of, scraped spot, UV radiation, temperature varieties, and electronic clamour. On machine/high vibration: For use on machines, where vibration and temperatures are high to high. For this situation the need is for very adaptable cabling impervious to trailing and torsion, and additionally an abnormal state of network assurance against fluids. Choosing the right communication method In Synchronous Transmission, information streams in a full duplex mode as pieces or casings. Synchronization between the sender and beneficiary is vital with the goal that the sender knows where the new byte begins. Synchronous Transmission is productive, dependable and is utilised for exchanging a lot of information [12]. It gives the continuous correspondence between associated gadgets. Talk Rooms, Video Conferencing, telephonic discussions, and also eye to eye cooperation, are a portion of the cases of Synchronous Transmission. In Asynchronous Transmission information streams in a half-duplex mode, 1 byte or a character at any given moment. It transmits the information in a constant stream of bytes. All in all, the span of a character set is 8 bits to which an equality bit is included, i.e. a begin and a stop bit that gives the aggregate of 10 bits. It doesn't require a clock for synchronisation; rather it utilises the equality bits to advise the beneficiary how to decipher the in formation. It is necessary, quick, temperate and does not require a 2-way correspondence. Letters, messages, discussions, TVs and radios are a portion of the cases of Asynchronous Transmission. As the business network requires to send 500 bytes of data constantly every 0.5 seconds therefore the reliable and better transmission method synchronous transmission will be better productive in this case. References [1] Goralski, W., 2017.The Illustrated network: How TCP/IP works in a modern network. Morgan Kaufmann. [2] Nakanishi, A., Hatayama, K., Onoduka, T. and Kimura, T., 2015, October. An embedded system of TCP/IP communication by using FPGA. InConsumer Electronics (GCCE), 2015 IEEE 4th Global Conference on(pp. 489-492). IEEE. [3] Ensafi, R., Knockel, J., Alexander, G. and Crandall, J.R., 2014, March. Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. InPAM(pp. 109-118). [4] Conti, M. and Giordano, S., 2014. Mobile ad hoc networking: milestones, challenges, and new research directions.IEEE Communications Magazine,52(1), pp.85-96. [5] Pelletier, G., Sandlund, K. and West, M., 2013. RObust header compression (ROHC): a profile for TCP/IP (ROHC-TCP). [6] Vasilakos, A.V., Zhang, Y. and Spyropoulos, T. eds., 2016.Delay tolerant networks: Protocols and applications. CRC press. [7] Sidler, D., Alonso, G., Blott, M., Karras, K., Vissers, K. and Carley, R., 2015, May. Scalable 10Gbps TCP/IP stack architecture for reconfigurable hardware. InField-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual International Symposium on(pp. 36-43). IEEE. [8] Craft, P.K., Philbrick, C.M., Boucher, L.B., Higgen, D.A., Blightman, S.E. and Starr, D.D., Alacritech, Inc., 2013.TCP/IP offload device. U.S. Patent 8,539,112. [9] Rankin, J., Connectivity Systems Incorporated, 2016.Enhanced large data transmissions and catastrophic congestion avoidance over TCP/IP networks. U.S. Patent 9,350,663. [10] Kaur, D. and Singh, P., 2014. Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack.International Journal on Network Security,5(1), p.62. [11] Perlman, R., Kaufman, C. and Speciner, M., 2016.Network security: private communication in a public world. Pearson Education India. [12] Radhakrishnan, R., Edmonson, W.W., Afghah, F., Rodriguez-Osorio, R.M., Pinto, F. and Burleigh, S.C., 2016. Survey of Inter-Satellite Communication for Small Satellite Systems: Physical Layer to Network Layer View.IEEE Communications Surveys Tutorials,18(4), pp.2442-2473.