Sunday, December 29, 2019

Homeschooling Persuasive Essay - 1949 Words

In today’s world, there are many different options for students to go to school. There is public school, private school, charter school, contract school, and home schools. The question on many people’s minds is â€Å"Why home schooling over any other schooling?† Since 1970s there has been a dramatic growth in homeschooling for student’s kindergarten to twelfth grade students. Although White gives effective arguments, and includes no obvious recall of evidence, she builds her credentials from subjects who have personally experiences, controversial evidence, and then by connecting White’s analysis to conclusions to her reader’s choice of choosing whether home schooling is a quality education. In â€Å"Home Schooling: A Personal Decision,† Karen†¦show more content†¦White’s argument shows evidence on choice of home schooling, the experiences people have, challenges that are for students, and advantages of why home schoolin g is so great for each student. Home schooling can be very flexible for those students who do sports or activities such as ballet. Having the flexibility helps students have more energy than those in public school and worry less about their tests. Parents can be just as hard on their kids as any teacher or tutor can. â€Å"But that s changing. According to the National Center for Education Statistics, in 2004 about 1.1 million children (or 2.2 percent of all children aged 5 to 17) were home schooled, a jump of almost 30 percent from 1999† (3). Home schooling is just as demanding as traditional schools such as public or private schools. â€Å"Moms can be much harder teachers then most other teacher’s students have had before† (par. 4). This shows how home schooling can be beneficial for lots of students. White gives great examples of how home schooling can be great for students who want to express their talents and still have their high school diploma. While Whit e provides some compelling arguments for homeschooling, several of her arguments suffer from logical fallacies. There are so many reasons a person can go back and forth on what they school do and White has helped with some evidence of home schooling being a quality education for any student who chooses to so. She shares thisShow MoreRelatedPersuasive Essay On Homeschooling1609 Words   |  7 Pages Homeschooling is not a new concept to the United States, and for many centuries it was the only way for children to get an education. Many of our founding fathers were homeschooled, proving there is nothing wrong with homeschooling, and to this day it continues to provide children with an adequate education. Many parents believe that public school is satisfactory. However, they feel that homeschooling is a better option because it provides a safer environment for their children and more conduciveRead MorePersuasive Essay Homeschooling923 Words   |  4 Pageseffective style of school called homeschooling has emerged. Most of todays parents have gone to a public school because homeschooling was not very well known back when they were school aged. Since then, homeschooling has become much more popular and has been proven to be effective. Parents should consider homeschooling their kids as an alternative to sending them to a public school. While public schooling is the traditional way of receiving education, homeschooling is an alternative that must beRead MorePersuasive Essay On Homeschooling831 Words   |  4 PagesHomeschooling refers to the procedure of teaching kids from home instead of sending them to public or private schools. This is when they are taught by parents, brothers, sisters, a neighborhood friend, or online. Homeschooling is not for everybody and as we will see later the pros and cons of homeschooling. People say it is good because there is not busy work all the work can be done in a few hours. Then, people say it is bad because parents or whoever is teaching has to be with the kids all theRead MoreHomeschooling outline persuasive speech Essay860 Words   |  4 Pagesï » ¿Persuasive Speech Outline on Homeschooling General Purpose: I want to persuade my audience Specific Goal: I would like the audience to understand the advantage of why I strongly believe homeschooling is beneficial. Thesis: Homeschooling environment is an effective approach in education due to evidence of higher achievement on placement tests, success through college, engaged socially with activities outside homes, and students becoming active members of society. Organization Pattern: (StatementRead MorePhilosophy of Education Essays1644 Words   |  7 Pagesspin on the role of school in society is homeschooling. I think it has many good and bad features. One great aspect of homeschooling is it makes parents feel that their child is in a safe environment, and that they are able to shelter them from the things that they are exposed to in public schools. But, ironically, that is also the problem. Social development is a crucial part of any education, and in many cases, homeschooling hinders this. Homeschooling also allows children to have the freedom ofRead MoreThe Is Not Emotionally Healing Or Accepting Our Fate?990 Words   |  4 Pagesrewriting in academic essays and text. He sees this phrase as the best tool for writers to use when dealing with other people s ideas and motivations. There are steps you have to take to come to terms with someone else’s writing. First, you must define the project and what the purpose is. Without this key step, you do not really know what to come to terms with and are lost to the goals of the text to begin with. For example, if you read an essay about the benefits of homeschooling without defining the

Saturday, December 21, 2019

Descriptive Essay - Original Writing - 1462 Words

â€Å"Mom, please† I whined from across the room. â€Å"No Jamie, I told you before and I will tell you again, we are not going swimming in the ocean. It’s too dangerous with all of the shark spottings from only a mile away from shore.† â€Å"But I already bought a snorkel and I really want to go..† â€Å"Enough.† She interrupted. â€Å"If you want to use your new snorkel, go in the hotel pool while your father and I try and figure out restaurants worth trying for the next week.† â€Å"I thought this vacation was going to be fun.† I mumbled under my breath as I grabbed my snorkel and trudged down to the small, indoor pool near the lobby. I turned around, mesmerized by the waves of the ocean just across the street. The pool was empty, so I would have enough†¦show more content†¦This is incredible! I thought while swimming laps around the pool, needing to reach the surface for air. I could use this, I thought, if there is no way for me to drown, I can go to the ocean by myself without my parents telling me no! I jumped from the water, ripping the snorkel from my face, and raced towards the lobby. The water was swaying in rhythmic motions on the sand, the water slowly creeping onto the shore, then sinking back, leaving some rocks and shells that had been pulled in. As I placed the snorkel on my head, I felt the now familiar tickling sensation emerge and the hard slits forming. I practically dived into the waves, the salty water filling my neck, making me cough. I scratched my hand on the hard scales that had formed along the gills, and a couple drops of blood leaked into the open ocean. I didn’t think anything of it though. Swimming towards the bottom, I watched the many different species of fish swim along, fascinated by their many colors and sizes. One of the larger ones slyly swam right by where I was hiding along a coral reef, with shiny turquoise scales and a deep purple tail. I spotted one nearby with at least three rows of teeth, and I backed away, afraid that it would spot me. I didn’t realize, however, that I had backed into something even more frighten ing. A large shark was hovering behind me, it’s large nose sniffing the blood that had seeped from my hand. I slowly turned around and bolted, but he

Friday, December 13, 2019

Seven Approaches to Studying the Human Body Free Essays

When studying the human body, there are seven organizational approaches. Each approach studies the body in a different yet unique way and is used in the health care field. The approaches consist of; body planes and directions, body cavities, quadrants and regions, anatomy and physiology, microscopic and macroscopic, body systems and medical specialties. We will write a custom essay sample on Seven Approaches to Studying the Human Body or any similar topic only for you Order Now There are three body planes which use different directions: coronal, sagittal, and transverse planes. Coronal plane slices the body from head to toe giving a front and back view. There are two directions that are related with it; anterior posterior, moving from the outside of the body through the anterior part then the posterior section, and posterior anterior, which is its reverse. Sagittal plane cuts the body right down the middle giving a right and left view. Moving medially is to go inwards or towards the middle of the body from the outside and to go laterally is as if moving out or from the midline towards the outside of the body. Lastly, transverse plane divides the body giving a top and bottom sections. The top half is superior and the lower half is inferior. Moving cephalad is moving superiorly, and cuadad is moving inferiorly. Radiologists would use this approach when looking at x-rays or MRI scans to distinguish how the image was taken. There are five sections of hallow space, known as cavities, in the human body, all of which carry-over each other. Starting from the head is the cranial cavity that protects the brain, then the spinal cavity that travels down the middle of the back, then in the chest is the thoracic cavity where the lungs, heart and esophagus are, next is the abdominal cavity which is around the abdominal muscles and last is the pelvic cavity where the hip bones lay. An ultrasound technician would use this approach when projecting images from inside the body cavity onto the screen. The approach to use quadrants and regions is to divide up the abdominopelvic area into four parts, which are quadrants, and then into nine parts out of that which give you regions. (â€Å"Scribd. com†, 2010) This method can be used as a reference to where the organs are located in which area. For instance, in the left lower quadrant is the lower part of the kidney, part of the colon, and the left ovary for women. This type of diagram would help ith position the organs. In the health field, physicians refer to this during an internal exam. According to â€Å"Degreedirectory. org† (1999), anatomy studies the structure of organs and cells. Since cells are a microscopic size the best way to study, using this approach is with a microscope, which is, a tool used to examine cells. Physiology is the study of the function of organ and cells. Organs are of a macros copic size that means it can be seen with the naked eye. These approaches can be used in many ways in health care. An orthopedic would study muscles and tendons or an immunologist would study blood cells using a microscope. The human body is made up of several different types of systems. This means that each system is made up of a few organs, which synchronize with one another and work as a unit. Organs are unable to perform without the help of the other organs in their unit. All of the organs support one another to perform their functions. The gastrointestinal system breaks down the foods we eat into protein, vitamins, fats and carbohydrates, which is used for energy, growth and repair. The organs in the respiratory system are the nose, trachea and lungs. These organs help bring air into the body and eliminate the carbon dioxide. There is a system that acts as a defense called the lymphatic system and runs through the whole body. This system’s main function is to make white blood cells that act as disease fighting antibodies. The integumentary system consists of the skin, hair, nails, glands, and nerves. This system’s main function is to act like a barrier to guard the body from the outside world. The skeletal system protects the organs. It is made up of bones, ligaments, joints and tendons. It gives support and structure to the body and a place for muscle attachment and movement. In other words, it holds the body up. Without the skeletal system the human body would be unable to walk or stand up. The muscular system works with the skeletal system to control the movement of the human body. There are two types of muscles; ones that are voluntary such as moving an arm or leg and ones that are involuntary and act on their own such as the beating of a heat or stomach. How to cite Seven Approaches to Studying the Human Body, Essay examples

Thursday, December 5, 2019

Security in Cellular Networks and Security in Wireless Sensor Networks

Question: Describe about the security in cellular networks and security in wireless sensor networks? Answer: Introduction Networks are evolving in its shape and functionalities very rapidly. Other than traditional networks, now we can see, different kinds of data communication networks around us. In our day-to-day life, we use numerous amounts of networks. Other than computers, we can use mobile and other types of cellular devices to access the Internet. Thus there are various techniques behind these facilities. Certainly a network of cellular devices, will not have the same component of a computer network, but the functionalities are quiet similar. These cellular networks also facilitates voice communication along with data transmission, internetworking. Thus the technologies are more complex. On the other hand, cellular networks are quiet new now in terms of data communications. Advancement in information and communication technologies are making these networks more robust and functional still there is a long way to go. Other than the technologies and functionalities, a big issue with any type of information sharing network is security. For cellular network, security of the data is essential. A common IT buzzword in recent days is Internet of Things. Other than computers, mobiles etc. there are number of smart devices now a days. Those devices share data across network and Internet. These devices are tiny sensors and the networks they are connected to are generally wireless networks. A wireless sensor network will have limited objective and functionalities, but they also take part in internetworking, data communication etc. Thus it also has security issues. (Vacca, 2013) In the rest of this report, I will be discussing the security in cellular networks and wireless sensor networks in details. The technologies used in both cases will be critically reviewed and several security aspects will be discussed. Technical Description Topic 1 Security in Cellular networks Cellular communication has become an important part of the communication networks around the world. Other than using voice-based communication through cellular phones, now Internet can be accessed through cellular networks. Activities like monetary transactions, sending important communication messages etc. are now very common. Day by day new services are being added over cellular networks. Cellular networks are solely dependent on wireless communication media and networks. There are many advantages of cellular networks. But there are certain disadvantages and security issues too. Limitation of wireless communication media has imposed several difficulties on the implementation of security principles like confidentiality, integrity and authentication to the cellular networks. (Mishra, 2008) Generation and Technologies behind Cellular Networks Cellular networks are working since 1980s. There are a number of generations of cellular networks. Each generation has its own technologies, benefits and challenges. The generations so far are, 1G, 2G, 3G and 4G. 4G cellular networks are rolling out but currently; the mostly used cellular network is the use of 3G networks. During the 1980s, 1G networks were used. It has a maximum of 9.6 Mbps speed. It was known as Advanced Mobile Phone System or AMPS in US and Nordic Mobile Telephony or NMT in European countries. The data used to be transmitted in a continuous waveform through analog modulation technologies. 1G cellular networks had security issues like lack of encryption, misuse of frequency spectrum etc. Then 2G cellular networks came into the picture and still these networks are in use in various parts of the world. These networks are also called Personal Communication Services or PCS. In 2G, digital modulation had been introduced. It overcomes various limitations of 1G. Technologies like Code Division Multiple Access or CDMA, Time Division Multiple Access TDMA, digital AMPS, Global system for Mobile Communication or GSM communication, Personal Digital Cellular or PDC etc. are used in 2G, in different countries. 1G communication networks were improved into 2G cellular networks. But the improvements were mainly in case of voice communication. Data transmission was still poor. An improvement of 2G, called 2.5G helped in better data communication over 2G networks. It bridged the gap between 2G and 3G networks. Technologies like EVDO, High Speed circuit switched data or HSCSD, enhanced GPRS, and EDGE etc. are examples of 2.5G cellular networks. (Halonen, et al., 2004) Then it was 3G networks. It provides faster Internet surfing than previous generations, supports video telephony. The main technologies used in 3G cellular networks are, CDMA 2000, Wideband CDMA or WCDMA, Time Division Synchronous Code Division Multiple Access or TD-SCDMA. Before fully deployment of 3G cellular networks, 4G cellular networks have started to be introduced in various parts of the world. 4G cellular networks will provide faster data transmission than 3G. It is expected that it will support near about 20 Mbps data rates. 4G supports wide array of next generation Internet technologies like Mo-IP, IPv6 etc. It will be cheaper yet more powerful. It is capable of supporting communication among mobile vehicles up to 250km/hour speed. (Pierre, 2010) Technologies in 2G and 2.5G The most widely accepted cellular technology is 2G and its later version of 2.5G. Short Messaging Service or SMS is a service in cellular networks than transfers text based messages between two cell phones. Larger messages are broken down into pieces before transmitting. Some other technologies in 2G and 2.5G networks are, High-Speed Circuit-Switched Data or HSCSD It provides faster data transmission than GSM. The speed can go up to 115 Kbps. But, it cannot carry larger bursts of data. And, that is why; GPRS is more popular than HSCSD. General Packet Radio Service or GPRS GPRS provides data transmission for larger bursts of data. This is facilitated by addition of two components in the cellular networks. Those are Service GPRS support Node or SGSN and Gateway GPRS support Node or GGSN. SCGN helps in implementing security in the access control and mobility. On the other hand GGSN supports connection to external packet switched networks. (Heine Sagkob, 2003) Enhanced Data Rates for GSM Evolution or EDGE This is a standard used in GSM technology. It is based on GMSK modulation techniques and uses 8PSK modulation. The data rate can go up to 384 kbps. (Seurre, et al., 2003) Cellular Digital Packet Data or CDPD This is a data service based on transmission of data packets. It is also able to detect some idle voice channel and further use of those channels for traffic management without harming voice communication. There are different variations of this technology in different countries. For example CDMA is used in USA for primary 2G networks, CDMAOne or IS-95a is the primary CDPD technique. It was capable of serve number of users than GSM and TDMA. The speed can go from 14.4 kbps to 115.2 kbps with CDMATwo extension. In 2.5G cellular networks, there are two techniques of CDMA. Those are 1xEVDV and 1xEVDO. The former one is used for data and voice transmission based on one radio frequency channels. The other one is used for same purpose but through separate channels. (Arokiamary, 2009) Technologies in 3G cellular networks 3G are focused on mobile networking based on worldwide standard and through a common frequency band. A new mobile network infrastructure called International mobile telecommunications 2000 or IMT 2000 was developed for supporting 3G cellular networks worldwide. 3G can support data transmission rate up to 2Mbps in 2 GHz frequency range. The main objectives of 3G cellular networks were set as, Supporting a wide range of services for voice and data communication without limitations of the geographic location. Supporting coverage of the network over a wide area and accommodating different kind of mobile stations. Supporting and expanding the services beyond constraints like inefficient spectrum, radio transmission, system economics etc. Supporting best QoS. Supporting an open architecture for easy deployment of different types of application. Supporting a modular architecture so that the size and complexity of the systems becomes manageable. 3G technologies are based on UMTS. UTMS provides Radio Access Network or RAN and the core network or CN. A RAN can have GSM, GPRS systems with connection to packet switched CNs even circuit switched CNs. To transit into a 3G network, it needs to connect to UTRAN systems. A UTRAN system has several sub systems. Each of these sub systems will have a Radio Network Controller or RNC. These are connected to a number of Base Transceiver Stations or BTN. UTMS provides the basic security implementation in 3G networks. (Hu Qian, 2013) Security in Cellular networks There are different kinds of security issues and attacks in cellular networks. These issues are closely related to the architecture and technologies of different cellular networks. With the advancements of cellular networks through different generations, these issues and attacks have become more common that there are difficulties in conforming to the basic security principles of confidentiality, integrity and availability. The security issues in cellular networks are, Confidentiality As the scope and application of cellular phones and networks in sensitive data transmissions are rising up, the confidentiality of all the information is becoming a serious issue. Integrity Integrity of the data and voice communication through the cellular networks is an essential part. It ensures that data has been transmitted properly from the sender to the receiver and no data is lost or modified whilst transmission. Authentication There is huge number of subscribers in cellular networks. It needs authentication to ensure that each of these subscribers are legitimate. 3G networks allow communication from people to different parts of the world. There may be problems related to cross-regions and cross service providers. Authentication may become an issue in cellular networks. A good authentication method will help to overcome these issues. Other security concerns are related to proper access control, web services and operating systems used in the cellular devices etc. some of the security issues are, Access control Access control to the data in the cellular devices may become an issue if there is any restricted data sharing among devices and across the networks. Web services Web services in cellular devices makes the devices and data exposes the devices and data to risks related to HTTP protocols. For example, issues like denial of services or DoS, buffer overflow, viruses etc. Operating system Cellular devices are small devices. There are different kinds of operating systems on different platforms, vendors etc. compatibility among these heterogeneous operating systems is an issue and may open up several security loopholes or vulnerabilities. Location detection Due to the privacy protection issues of the user, the actual location of a cellular device needs to be hidden. But, as the cellular networks are moving towards IP based networks, there are common issues that link to access point location etc. and this is leading towards the compromise of privacy, location, detection and sharing. Content Download Cellular networks let the user download different type of content from different sources just like traditional computer networks and Internet. Whilst downloading, adware may affect the user, and that may become a security issue. While the content is downloading, another issue is digital rights management. Users may download copyrighted content such as music, images, video etc. and there may be violation of the digital rights. Malware and virus Malware and viruses have become a daunting issue in case of cellular networks and cellular devices also. Liberty is the first virus that affected cellular networks and this was a part of a large occurrence of denial of service or DoS. Security of cellular devices The physical security of a cellular device is also a security issue. As these devices contains data, so there may be unauthorized access to those data and breach of security. Different types of attacks Different types of security attacks also affect cellular networks. The infrastructure is open to different types of attacks. They are as follows; Denial of Services or DoS and Distributed DoS or DDoS. Jamming of channels Eavesdropping Unauthorized access Forgery of message Man in the middle Message replay Session hijacking Etc. Counter measures There are several counter measures of the security attacks in cellular networks. Some of those are, In case of 3G cellular networks, UTMS is common and good security architecture. It has been developed based on the security measurements in 2G networks. Thus the robustness of the 2G networks are retained. Further the security implementations are extended. (Kaaranen, 2005) Wireless application protocol or WAP. Interlayer security in 4G networks. Use of cryptographic algorithms in data communication. Use of firewalls and antivirus. Use of advanced OS like Android etc. that have in built security infrastructure. Critical Review Cellular networks are widely used for long time. There are lots of technology and security measurements available for cellular networks. Wireless communication channels have some inherent security issues. Those are more prone to various information security attacks. But in case of cellular networks, security seems to be an important consideration and there are several counter measurs available to different types of cellular networks. Technical Description Topic 2 Security in Wireless Sensor Networks A wireless sensor network is a wireless communication network of tiny actuators and sensors. Wireless sensor networks have some specific purpose and usually those are used for monitoring different attributes of the environment. The micro sensors are low power and low computing resource devices. In a remote wireless sensor network, huge numbers of sensors are deployed densely. These sensors nodes are used to perform signal processing, routing and data communication. These are self-configurable in nature, scalable and have longer lives. In spite of several advantages and applications of WSN, there are significant security concerns. (Liu Ning, 2007) Architecture of a Wireless Sensor Network A WSN has different constituting components. Those are, a. Sensor nodes These sensor nodes are called sometimes as motes. A node can perform specific monitoring activities or routing activities. Thus a router in a WSN will have additional routing functionalities. Nodes do not interfere with one another. b. Gateway A gateway supports communication between nodes and external network like Internet. c. Network manager A network manager configures the network, schedules the communication process, manages and monitors the routing process, routing table etc. d. Security manager It manages the generation of data, storage and management of the same securely. (Sohraby, et al., 2007) Security analysis of a WSN The nodes in a WSN are simple enough and that makes the WSN simpler and popular. But this simplicity makes these networks more vulnerable from the security view point. WSNs suffers from different kinds of security attacks. For example, eavesdropping, injection of bits, packet replay etc. To make a WSN secure, it needs successful implementation of all security principles like confidentiality, integrity and availability along with other kind of security mechanisms and techniques. (Lpez Zhou, 2008) Attackers can easily mock a legitimate sensor code, damage any node. All these are easy with the sensor nodes as there is very little scope to secure these nodes. Those are low power consuming and limited computing resource devices. Thus implementation of some security measurements on those devices is really challenging. Some of the important and common categories of security attacks on WSNs are, Denial of Service or DoS There are several attacking techniques to attack a WSN. In a DoS attack the WSN network is made unavailable to the legitimate users. Or the capacity of the network is reduced deliberately so that the network fails to perform its activities. Different techniques of DoD attacks are, Jamming in physical layer. This is done by sending an interfering radio signal to the radio frequencies of the WSN. Basically, it is a process of interrupting the WSN by sending some interfering signal. Tampering in physical layer by causing damage of nodes. For example, reverse engineering can be used for this purpose. Collisions, exhaustion, unfairness etc. in data link layer. Homing, spoofing, flooding, black holes etc. in networking layer. De-synchronization, flooding etc. in transport layer. Interrogation attack in data link layer. Sybil Sybil is malicious device illegitimately taking on multiple identities type of attacks in WSNs. A single node can have multiple presence in a WSN as a result of this attack. Thus, it will reduce the effectively and fault tolerance of the network. The routing protocols are ale affected by this attack. Sybil attack can happen in physical layer, data link layer and network layer. In data link layer, the technique is data aggregation and voting. Wormhole In this kind of attack, an adversary sits near the base station and creates a wormhole in the network. Under this attack, the messages from the adversary are tunneled to one part of the network through some low latency link, then those are replayed in other parts of the network. A compromised node can play the role of the adversary. This attack happens in network layer. This is basically a routing based attack to disrupt the whole network. Black hole Black hole or sink hole attacks are carried out by compromising a node that is more attractive to its neighbor nodes in terms of some routing algorithm implemented in that WSN. This kind of attacks can be a part of another attack like selective forwarding. This type of attacks happen in network layer. Routing Information Manipulation Attacks of this type happens due to manipulation of routing information of the network. Selective Forwarding This kind of attack happens in network layer. Malicious nodes work like black holes. Messages are dropped by those nodes. Or the adversary can use these nodes to forward selective messages to the network. Flooding with Hello Packets Hello packets are forwarded by different protocols in a WSN. This is for knowing which nodes are within the range of data transmission. There may be some laptop class attack that may broad case information with more transmission power and convince some other node that the node is within the range. As a result it may take part in data transmission of the victim network. This happens in network layer. Spoofing Spoofing of the acknowledgement messages is very common in a WSN. This special kind of spoofing is called acknowledgement spoofing. There are various other types of attacks. Some of those are, cloning, impersonation, eavesdropping, traffic analysis, mote class, laptop class invasive and non-invasive etc. Counter measures Several countermeasures have been taken to secure WSNs from these wide ranges of security attacks. But the inherent architecture and constraints of a WSN makes those more prone to attacks. Still there are counter measures to combat with these attacks. Some of those counter measures are, a. Link layer security for outsider attacks Simple encryptions and authentication at link layer can save from major outsider attacks. This is done by a globally shared encryption public key. Attacks like wormholes, flooding by hello packets etc. can be prevented in this way. Even if an advisory is stopped from joining to a network, he/she cannot stop from being attacking the network through wormholes kind of attacks. Other link layer security mechanisms like described above cannot save a WSN from insider attacks like black holes, selective packet forwarding etc. b. Countermeasures for Sybil attacks Insider attacks are originated from within the network. Sharing of a global key can help the insider attacker to masquerade any node. There should be verification of the entities. Public key cryptography can help in this case however, generation and verification of digital signatures is not possible by the sensor nodes. A possible solution is to use unique symmetric key by each node, acquired from some trusted base station. Protocols like Needham-Schroeder can be used for verification the identities. To prevent insider attacks from a stationery network is possible by enforcing limitations on some compromised node. c. Countermeasures for help packet flooding Verification of a bi-directional sink can be useful to prevent attacks from hello packet flooding. d. Countermeasure for wormhole and black home attacks These kind of attacks are difficult to deal with. When these two types of attacks are combined in some network, then it becomes more difficult. Wormholes use some out of band and private channel for attack. This is generally invisible to the rest of the part of the WSN. On the other hand black holes or sinkholes are difficult because in this cases, the adversary use remaining energy of the nodes. The routing topology is used and the verification is harder. Routes having minimum hop count to a base station, can be verified easily. But in case of a wormhole attack, the hop count may be completely misinterpreting. Sinkholes can be easily created as there is no defender to verify the identity. A detection technique for wormholes can be very time consuming and requires high synchronization. Thus is not usable in sensor networks. (Patil Szygenda, 2013) Other types of countermeasures can be, Use of probabilistic selection and leveraging of global knowledge. This is difficult to implement due to the self-organizing nature of the nodes. There may be authenticated flooding and broadcasting. Critical Review Wireless sensor networks are an emerging field. These are being used for various types of networks and applications. In most of the cases those are used for monitoring purpose. Sensor networks are also a type of wireless networks but there are inherent differences between sensor networks when compared to IP networks. Thus, there are several other specific issues related to sensor networks. There is no issues with performance of the sensor networks. But as already described, security is a serious issue with sensor networks and there is some relation of security to performance. Rather there is a trade of between these two. Conclusion In this paper, two topics in network security has been discussed in details. The topics are security in cellular networks and security in wireless sensor networks. Both of these networks are different than traditional computer networks, quite new in operation. Both of these are becoming stronger with researches and application. However, security is a common issue for both of these. Types of security attacks and counter measures are different in both of the cases. In this paper those security aspects and counter measures are discussed in details. References Arokiamary, V. J., 2009. Mobile Communications. s.l.:Technical Publications. Chandrasekhar, V. Andrews, J. G., 2009. Spectrum allocation in tiered cellular networks. IEEE Transactions on Communications, 57(10), pp. 3059-3068. Halonen, T., Romero, J. Melero, J., 2004. GSM, GPRS and EDGE Performance. s.l.:John Wiley Sons. Heine, G. Sagkob, H., 2003. GPRS. s.l.:Artech House. Hu, R. Q. Qian, Y., 2013. Heterogeneous Cellular Networks. s.l.:John Wiley Sons. Kaaranen, H., 2005. UMTS Networks. s.l.:John Wiley Sons. Liu, D. Ning, P., 2007. Security for Wireless Sensor Networks. s.l.:Springer Science Business Media. Lpez, J. Zhou, J., 2008. Wireless Sensor Network Security. s.l.:IOS Press. Mishra, A., 2008. Security and Quality of Service in Ad Hoc Wireless Networks. s.l.:Cambridge University Press. Nichols, R. K. Lekkas, P. C., 2002. Wireless security. New York: McGraw-Hill. Patil, H. K. Szygenda, S. A., 2013. Security for Wireless Sensor Networks using Identity-Based Cryptography. s.l.:CRC Press. Pierre, S., 2010. Next Generation Mobile Networks and Ubiquitous Computing. s.l.:Idea Group Inc. Seurre, E., Savelli, P. Pietri, P.-J., 2003. EDGE for Mobile Internet. s.l.:Artech House. Sohraby, K., Minoli, D. Znati, T., 2007. Wireless Sensor Networks. s.l.:John Wiley Sons. Vacca, J. R., 2013. Network and System Security. s.l.:Elsevier.