Wednesday, October 30, 2019

Principles and Contemporary of Mental Health Essay

Principles and Contemporary of Mental Health - Essay Example In this area, nurses receive specialized training in psychological therapies that builds on therapeutic alliance in dealing with challenging behavior which leads to administration of psychiatric medicine. In summary, mental health is a psychological state of well being in which one has an achievement of a satisfying amalgamation of one’s instinctual motivations tolerable to both oneself and one’s social locale; an apposite balance of leisure pursuits, love and work (Wilkin, 2003, p. 139). The Patient: Barker’s model In one of his theories, Barker wrote that a mental patient care should encompass a Meta theoretical approach. This is to say that several theories are necessary while dealing with mental patients. The application of this theory helped in taking care of the patients. First, there was demonstration of the nursing knowledge, the grand theory, where there was stating the empirical terms and hypotheses to demonstrate understanding of the theory of nursing. To demonstrate a clear understanding of the situation, I applied the Barker’s tidal model, which is philosophical in nature. With this model, I had to understand the fact that I knew little about the experiences of my patient. I took my patient as a mystery to be learnt and explored in developing a nurse-patient relationship and identify the needs. This characteristic of curiosity helps to understand more about the patient (Barker & Barker, 2005, p. 108). Secondly, the key to understanding my patient was taking them in with their resourcefulness in acknowledging the reality of my patient’s problems as the resources towards proper therapy. Other resources were within their social and interpersonal network, which I had to explore to help in proper therapy. Another important aspect that I had to consider was to understand the personal wishes of the patient. This laid emphasis on the importance of collaboration with the patient. This helped in identification of the needs of the patient. Respect to the needs also helped to ease therapy towards quick recovery. Mental health is more psychological and therapy has to be more collaborative through identification of what the patient deems important. However, this did not mean ignoring professional knowledge about the patient’s condition, but the wishes of the patient remained at the heart throughout the therapy session. Then there was viewing the patient’s condition as an opportunity, a natural signal indicating the need for services, my services. It was an opportunity for change and a chance for the patient to take a new opportunity in life. In mental health care, there are goals that professional nurses set to achieve. They are to be the end point of the nursing care process. I had to consider the fact that there are small steps which I needed to take in order to move away from the circumstances that brought my patient to the care setting. Finally, Barker’s model in practice helped m e to understand the fact that I had to identify the simplest possible action that helped to bring about the help necessary for the patient to get well from their condition. Basing On Evidence Because I had to administer psychotherapy basing on evidence, I had to employ several techniques that had to base on empirical relationship building, communication, dialogue and behavior change with a designation to improve mental

Monday, October 28, 2019

An Introduction To Network Topology

An Introduction To Network Topology In the context of a communication network, the term topology refers to that way in which the end points, or stations, attached to the network are interconnected or it is the arrangements of systems in a computer network. It can be either physical or logical. The physical topology refers that, a way in which a network is laid out physically and it will include the devices, installation and location. Logical topology refers that how a data transfers in a network as opposed to its design. The network topology can be categorized into bus, ring, star, tree and mesh. Hybrid networks (They are the complex networks, which can be built of two or more topologies). Bus Topology A Bus topology is characterized by the use of a multi point medium. A long and single cable acts as a backbone to connect all the devices in a network. In a bus topology, all computers or stations attach through the appropriate hardware interfacing known as a tap, directly to a bus network. Full duplex operation between the station and tap allows data to transmit onto the bus and received from the bus. A transmission from any station propagates the length of the medium in both directions and can be received by all other stations. At each end of the bus is a terminator, which absorbs any signal, removing it from the bus. Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. A bus network work best with a limited number of computers. Advantages Bus topology can install very easily on a network. Cabling will be less compare to other topologies because of the main backbone cable laid efficiently in the network path. Bus topology suited for a small network. If one computer fails in the network, the other computers are not affected they will continue to work. It is also less expensive than star topology. Disadvantages The cable length will limited and there by limits the number of stations. If the backbone cable fails, the entire network will goes down. It is very difficult to trouble shoot. Maintenance cost is very high in a long run. Terminators are required for both the ends of the cable. Ring topology The ring topology the network consists of dedicated point to point connection and a set of repeaters in a closed loop. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. It may be clock wise or anti clock wise. When a device receives a signal intend for another device, its repeater generates the bits and passes them along. As with the bus and tree, data are transmitted in frames. As a frame circulates past all the other stations, the destination station recognize its address and copies the frame into a local buffer as it goes by. The frame continues to circulate until it returns to the source station, where it is removed. These topologies are used in school campuses and some office buildings. tifsTemp 13.a.tif Figure (2) Bus topology Advantages It performs better than star topology under heavy work load For managing the connection between the computers, there is no need for the network server. It is cheaper than star topology because of less wiring. By adding the token ring in the network, can create large network. Very order network because all the devices has a access to the token ring and opportunity to transmit. Disadvantages A break in the ring (such as a disabled station) can disable the entire network. It is much slower than an Ethernet network with under normal load. Any moves, changes and adds of the devices can affect the network. Network connection devices like (Network adapter cards and MAU) are much more expense than Ethernet cards. Star Topology In a star topology, each station is directly connected to a common node called hub. Unlike a mesh technology, the devices are not directly linked to one another. A star topology does not allow direct traffic between devices. The controller act as an exchange, like if one device wants to send to another, it sends the data to the controller, which then relays the data to the connected device. In a star, each device needs only one link and one I/O port to connect it to any number of others. The star topology is used in local area networks (LAN) and sometimes high speed LAN often uses a star topology with central hub. Advantages If one link fails in the star topology, only that link is affected. All other links remain active. It is easy to identify the fault and fault isolation. Easy to expand the network in the star topology. No disruptions to the network when connecting or removing devices. It is very easy to manage because of its simplicity in the function. Disadvantages In a star topology, if the hub goes down, the entire network will fails. It requires more cable length compared to the linear bus topology. It is much more expensive than bus topology, because of the cost of the hubs. Tree Topology A tree topology is the generalization of the bus topology. It integrates the multiple star topologies together on to a bus. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point known as the head end. The branches in turn may have additional branches to allow quite complex layouts. A transmission from any station propagates throughout the medium and can be received by all other stations. This topology will allow for the expansion of an existing network. Advantages Tree topology is well supported by the hardware and software vendors. Point to point wiring for each and every segments of the network. It is the best topology for the branched networks. Disadvantages It is more expensive because more hubs are required to install the network. Tree topology is entirely depends upon the backbone line, if it fails then the entire network would fail. It is very difficult to configure and wire than other network topologies. In a tree topology, the length of network depends on the type of cable being used. Mesh Topology In a mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. To find the number of physical links in a fully connected mesh network with n nodes, we first consider that each node must be connected to other node. Node 1 must be connected to n-1nodes, node 2 must be connected to n-1nodes, and finally node n must be connected n-1 nodes. However, if each physical link allows communication in both directions, we can divide the number of links by 2.In other words we can say that in a mesh topology, we need n (n-1)/2. tifsTmp9.tif Figure (5 Mesh topology Suppose if we are connecting 15 nodes in a mesh topology, then the number of cables required; DA = n (n-1)/2 DA = Number of cables = 15 (15 1)/2 n = Node = 15*14/2 = 15*7 = 105 Therefore, the total number of cables required for connecting 15 nodes = 105. Advantages There is no traffic problem because of the dedicated link in the mesh network. Mesh topology is robust. If one link becomes unusable. It does not incapacitate the entire system. Point-to-point links make full identification and fault isolation easy. Security or privacy for data travels along the dedicated line. Network can be expanded without any disruptions to the users. Disadvantages Installation and reconnection are difficult. Large amount of cabling and the number of I/O ports required Sheer bulk of the wiring can be greater than the available space can accommodate. The hardware required to connect each link can be prohibitively expensive. Hybrid Topology A network can be hybrid, which uses two or more network topologies together in a network. For example, we can have a main star topology with each branch connecting several stations in a bus topology. The OSI Model The Open System Inter connection (OSI) reference model was developed by the International Organization for Standardization (ISO)2 as a model for a computer protocol architecture and as a frame work for developing protocol standards. The purpose of the OSI model is show how to facilitate communication between different systems without requiring changes to the logic of the underlying hardware and software. The OSI model is not a protocol; it is a model for understanding a network architecture that is flexible, robust and interoperable. The OSI model is a layered frame work for the design of network systems that allows communication between all types of computer systems. It consists of seven separate but related layers, each of which defines a part of the process moving information across a network. The seven layers of the OSI reference model can be divided into two categories: upper layers and lower layers. Upper Layers of the OSI Models are; Application layer Presentation layer Session layer The upper layers of the OSI model designate the application issues, presentation session stages and generally are implemented only in software. The highest layer, (the application layer) is close to the end user. These upper layers are act as an interface between the user and the computer. The term upper layer is sometimes used to refer to any layer above another layer in the OSI model. Examples of upper layer technologies in the OSI model are SNMP, FTP, and WWW etc. Lower Layers of the OSI Model Transport layer Network layer Data link layer Physical layer The lower layers of the OSI model provide network specific functions like data transport issues (flow control, addressing and routing). The lower layers of the OSI model (the physical layer and the data link layer) are implemented in hardware and software also. Examples of lower layer technologies in the OSI model are TCP, UDP, IP, IPX etc. Application layer The application layer enables the user, whether human or software, to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. The application layer provides specific services like network virtual terminal, file transfer, access and management, mail services and directory services. Network virtual terminal: A network virtual terminal is a software version of physical terminal, and it allows a user to log on to a remote host. File transfer, access and management: This application allows a user to access files in a remote host (to make changes, read data), to retrieve files from a remote computer for use in the local computer and to manage or control files in a remote computer locally. Mail services: The application provides the basis for e-mail forwarding and storage. Directory services: This application provides distributed database source and access for global information about various objects and services. Presentation layer The presentation layer is concerned with the syntax and semantics of the information exchanged between two systems. The presentation layer is responsible for the translation, compression and encryption. Messages are sending between the layers. Translation: The process in two systems are usually exchanging in the form of character strings, numbers, and so on. The information is changed into bit streams before being transmitted. The presentation layer at the sender changes the information from its sender dependent format into a common format. On the receiving machine, the presentation layer changes the common format into its receiver-dependent format. Encryption: Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform message back to its original form. Compression: Data compression reduces the number of bits contained in the information. It becomes particularly important in the transmission of multimedia such as text, audio and video. Session layer The session layer is the network dialog controller. It establishes, maintains and synchronizes the interaction among communicating systems. These layers have specific responsibilities include the following; Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between twp processes to take place in either half duplex (one way at a time) or full duplex (two ways at a time) mode. Synchronization: The session layer allows a process to add check points, or synchronization points, to a stream of data. Examples for session layers are MPEG, JPEG, MIDI, NCP etc. Transport layer The transport layer is responsible for process to process delivery of the entire message. The transport layer is responsible for the delivery of a message from one process to another. A process is an application program running on a host. The transport layer ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. It also has some specific responsibilities mentioned below; Service-point addressing: The transport layer includes a type of address called a service-point address (or port address). The network layer gets each packet to the correct computer,; the transport layer gets the entire message to the correct process on that computer. Segmentation and reassembly: A message is divided into transmittable segments, with each segment containing a sequence number. These numbers enable the transport layers to reassemble the message correctly upon arriving at the destination and to identify and replace packets that were lost in transmission. Connection control: The transport layer can be either connectionless or connection oriented. A connectionless transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. If a connection oriented transport layer make a connection with the transport layer at the destination machine first before delivering the packets. After all the data are transferred the connection is terminated. Flow control: The transport layer is responsible for the flow control. However, flow control at this layer is performed end to end rather than across a single link. Error control: Transport layer is also responsible for the error control. Error control at this layer is performed process-to-process rather than across a single link. The sending transport layer makes sure that the entire message arrives at the receiving transport layer without error. These layers using the TCP/IP and UDP protocols. Network layer The network layer is responsible for the source to destination delivery of a packet, possibly across multiple networks (links). This layer ensures that each packet gets from its point of origin to its final destination. Network layers also have other responsibilities include the following; Logical addressing: If a packet passes the network boundary, it needs another addressing system to help distinguish the source and destination systems. The network layer adds a header to the packet coming from the upper layer that, among other things, includes the logical addresses of the sender and receiver. Routing: When independent networks are connected to create internetworks or a large network, the connecting devices route or switch the packets to their final destination. Data link layer The data link transforms the physical layer, a raw transmission facility, to a reliable link. It makes the physical layer appear error-free to the upper layer. It also has other responsibilities include the following; Framing: The data link layer divides the stream of bits received from the network layer into manageable data units called frames. Physical addressing: The data link layer adds a header to the frame to define the sender and/or receive of the frame. If the frame is intend for a system outside the senders network, the receiver address is the address of the device that connects the network to the next one. Flow control: If the rate at which the data are absorbed by receiver is less than the rate at which data are produced in the sender, the data link layer impose a flow control mechanism to avoid overwhelming the receiver. Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved through a trailer added to the end of the frame. Access control: When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. Data link contains two sub layers; LLC (Logical Link Control) and MAC (Medium Access Control).LLC is the upper sub layer, which maintains and establishes the communication links to the device. And it also responsible for the frame error control and addressing.MAC is the lower sub layer of the data link layer. It controls how the devices sharing the media channel. Physical layer The physical layer coordinates the functions required to carry a bit stream over a physical medium. It deals with the mechanical and electrical specifications of the interface and transmission medium. It also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur. The physical layer is also concerned with the following: Physical characteristics of interface and medium: Physical layer defines the characteristics of the interface between the devices and the transmission medium. It also defines the type of transmission medium. Representation of bits: This layer data consists of a stream of bits with no interpretation. To be transmitted, bits must be encoded into signals electrical or optical. The physical layer defines the type of encoding. Data rate: The transmission rate the number of bits sent each second- is also defined by physical layer. In other words physical layer defines the duration of a bit, which how long it lasts. Synchronization of bits: The sender and receiver not only must use the same bit rate but also must be synchronized at the bit level. Line configuration: The physical layer is concerned with the connection of devices to the media. In a point-to-point configuration, two devices are connected through a dedicated link. In a multipoint configuration a link is shared among several devices. Physical topology: The physical topology defines how devices are connected to make a network. Devices can be connected by using a mesh topology, a star topology, a ring topology, a bus topology, or a hybrid topology. Transmission mode: The physical layer also defines the direction of transmission between two devices: simplex, half duplex, or full duplex.

Friday, October 25, 2019

Bridge to Terabithia :: essays research papers

Bridge to Terabithia† is set in rural Virginia in the mid-1970's. The story revolves around characters; the Aarons, the Burkes, the students and faculty in the elementary school. Jess Aaron, is one of the central characters. He has four sisters, two older and two younger leaving him in the middle. Brenda and Ellie are the older teenage sisters that have a strong bond with their mother and don’t pay much mind to Jess. Joyce Ann and May Belle are his little sisters that look up to Jess. Mr. Aarons is always away from home working in a city nearby leaving Mrs. Aarons to hold many of the responsibilities. Since she believes in the men taking care of the men jobs Jess always has work to do in place of his father. The girls never seem to have to do any work and Jess feels he is unappreciated and the black sheep of the family. The Burkes move from Washington D. C to rural Virginia. They are well off and move to the area to re-evaluate their family values. Leslie is the other main character who is looking for a sense of belonging and friendship. Bill and Judy are here parents that are writers. They are consumed with their work and don’t pay much attention until their book is completed. Jess and Leslie attend the same Elementary school where they become friends resulting from a race that Leslie won. The two become inseparable and have a special place in the woods called â€Å"Terabithia.† To get to their perfect imaginary world you must swing across the creek on a rope. The lake becomes flooded from the constant rainfall and starts to concern Jess. He continues to be quite and swing across the dangerous water since Leslie is so fearless and he doesn’t want to look like he is afraid of anything. Later, Jess’s music teacher invites him to spend a day in Washington D.C. while Leslie travels to Terabithia without him and the rope breaks and she drowns. Jess returns home that night to find out that his best friend Leslie is dead. Jess goes through the emotions of grieving, angry, to upset, from this incident. A few days later he returns to Terabithia so he can place a funeral wreath for Leslie. Without Jess knowing May Belle has followed him but cries for help since she was stuck in the creek.

Thursday, October 24, 2019

Criminal Justice Ethics

After reviewing the tutorial on criminal justice ethics, my answer on the case would have to be Report the incident to your supervisor. I choose this answer for the following reasons: 1. Partner did not use prudence when making the decision to interview the minors alone, with no parental contact and choosing not to videotape the interview/confession. Ethical decisions were not made while conducting the interview. 2. Honesty and justice for the teens were not being considered in the decision of my partner. 3.  My job as a criminal investigator is to protect the community, respect the rights of others and serve justice to the victims. When the investigator decided to take actions into his own hands and interview the minors with no parent or guardian present and no video for evidence it not only jeopardized the case, the department as well as the community. Although the minors do have a criminal history they have the right to be treated fair and by the laws set in place to protect them until proven guilty by a judge. These rights were taken from them when the investigator did not follow department policies. Although it may be clear that these teens were guilty of this crime it is now going to be very hard to prosecute them in court because the other investigator has broken rules and been dishonest. Since it is not mandatory for the parents to be present the investigator should have at least made sure to record the interview, insuring there was enough evidence to stand up in court. If there is not enough evidence when this trial goes to court it the case may be thrown out. I now feel like it is my duty to report my partner actions to the supervisor so there will at least be record of the incident should it be brought up in the future. This will protect me as well as the department should any circumstances come up as a result of his actions. My main goal is to make sure that if these teens are guilty they are not released back into the community where they may harm others. There are rules set in place within the department to prevent these situations from occurring for this very reason. In conclusion I feel that making the choice to Report the incident to my supervisor is the most beneficial to everyone involved. The victim should have some closure and sense of security knowing these criminals are off the streets. The teen suspects are now in custody and given the rights they deserve as well as possible after the poor judgment of the other investigator. We have two potentially violent criminals off the streets and out of the community preventing them from harming more innocent people. Last we have record of the incident to help protect both investigators and the department if needed.

Wednesday, October 23, 2019

Alexander Hamilton’s Financial Plan Essay

After the Revolutionary War, the United States was left with a $52 million dollar national debt as well as a $25 million dollar debt from the individual states. Alexander Hamilton developed a financial plan to  re establish the credit of the US by providing for the payment of the nation’s debts. Hamilton established the credit of the United States by paying off the national debt. One way he did this was by exchanging old war bonds for new Federal Reserve bonds. In the eyes of other countries, this proved that the United States was responsibly paying off its debts. This allowed the US to borrow money, and establish good credit once again. Good credit was extremely important to the United States because it was the basis for foreign trade, and was necessary for growth of the economy. Without good credit, the US could not borrow money, would not be able to fund businesses, and would not be able to keep a stable economy. Answer A is the correct choice because the main point of Hamilton’s financial plan was to pay off the national debt in order to restore the nation’s credit. Another way Hamilton proposed to pay the nation’s debts was to raise money through taxing. His plan increased taxes on imported goods, as well as placed a tax on items such as whiskey. This raise in taxes not only affected the rich but the poor as well because the tax related to a variety of items. As a result of the tax on whiskey, a group of poor farmers in Western Pennsylvania rebelled, resulting in the Whiskey Rebellion. Answer B is incorrect because the taxes placed by Hamilton’s plan affected not only those most able to pay, but the average citizen as well. One part of Hamilton’s plan that was not approved by Congress was to provide funding to manufacturers, in order to boost production and the economy. This plan failed in the end because of opposition from the South. He also proposed to create a â€Å"protective tariff† in order to protect US manufacturers from foreign competition. Answer C is incorrect because Hamilton’s plan favored industry over agriculture, not the other way around. Around the Time that Hamilton was creating his financial plan, the US adopted a policy of neutrality. The US did not allot money to any type of military buildup, or need any their military for defense. Answer D is incorrect because during the 1970’s the United States was in a time of neutrality. Therefore Hamilton did not need to spend money on national defense. Today, Hamilton’s financial plan still remains in effect. Federal Bonds are still issued by the government. A bond is purchased, and over a certain amount of time the bond matures into a larger amount at a profit to the holder. This allows the government to use the money owned by the bond holder until the bond is cashed in. These federal bonds now used in the 20th century were developed by Hamilton in the 1790’s. Alexander Hamilton created a financial plan to help establish the United State’s credit after the Revolutionary War. The main goal of his plan was to provide for the payment of the nation’s debts. He did this by reissuing bonds, creating a protective tariff to protect manufacturers, combining the debts of the states with the nation’s debts, and creating a national bank to control the US’s money.