Wednesday, December 25, 2019

Consequentialism, By John Stuart Mill Essay - 971 Words

Consequentialism is a broad ethical theory that describes one s actions to be good or bad depending solely upon the consequences of those actions. The distinguishing element of this theory from others is that the action itself has no value without analyzing the expected consequences, as explained by William H. Shaw in â€Å"Consequentialism†, â€Å"...when it comes to rightness or wrongness, nothing matters but the results of our actions† (Shaw 28). Then the question is, what exactly does it mean for a consequence to be deemed good ? Utilitarianism, a more specific form of consequentialism, answers this by describing a good action to be one that brings about the most happiness or well-being for everyone. John Stuart Mill states, â€Å"The creed which accepts as the foundation of morals â€Å"utility† or the â€Å"greatest happiness principle† holds that actions are right in proportion as they tend to promote happiness: wrong as they tend to produce the reverse of happiness† (Mill 7). This theory seems simple when applied to everyday situations. However, it can become tricky when applied to more complex, multi-faceted, situations. Obviously there are differentiating levels of happiness. For example, in a situation where it seems there may be no such thing as a happy outcome, the anticipated consequence that is deemed to be the lesser of two evils would be perceived to bring about the most well-being compared to the other choice. This theory may also seem difficult because it is based onShow MoreRelatedThe Pros And Cons Of Utilitarianism954 Words   |  4 PagesUtilitarianism Utilitarianism is the ethical belief that the happiness of the greatest number of people is the greatest good. Jeremy Betham and John Stuart Mill are two philosophers that were leading advocates for the utilitarianism that we study today. In order to understand the basis of utilitarianism, one must know what happiness is. John Stuart Mill defines happiness as the intended pleasure and absence of pain while unhappiness is pain and the privation of pleasure. Utilitarians feel the moralRead MoreUtilitarianism, By John Stuart Mill And Utilitarianism880 Words   |  4 Pagessometimes hard to define, but with John Stuart Mill and Utilitarianism it is a little bit easier. Utilitarianism is an easy one, for the reason that it is defined by the greatest happiness for everyone involved. Sometimes it does not always make everyone content, but if you look at it as a whole it makes sense. Mill says that we have to look at the bigger picture. One person’s happiness affects anotherâ€℠¢s and so on. Utilitarianism is a moral theory that John Stuart Mill, the philosopher, formulated toRead MoreUse Of Consequentialism, Desire Satisfaction Theory And Objective List Theory1345 Words   |  6 PagesConsequentialism is an approach to Ethics that argues that the morality of an action is reliant on the action s consequence (Mastin, 2008). This theory is based on two main principles, first, that the rightness or wrongness of an act depends solely on the results of it and secondly, that the better act is the one that produces more good as a consequence. What is meant by consequence here is everything that a certain action brings about, including the action itself. The good end required by an actionRead MoreJohn Stewart Mill’s Idea of Utilitarianism – Does It Still Exist Today?1255 Words   |  6 PagesJohn Stewart Mill’s Idea of Utilitarianism – Does it Still Exist Today? J.S Mill is a philosopher from the 1800’s, whose work typically seemed to be on the levels of political philosophy. Growing up, Stewart was hugely influenced by Jeremy Bentham as he was Bentham’s god son. This influence proved itself to be an important one as Stewart, just like his god father, began to focus his work around the idea of utilitarianism. In 1863, Stewart had an article called Utilitarianism published in FrasersRead More Immanuel Kants Ethics Of Pure Duty and John Stuart Mills Utilitarian Ethics Of Justice2753 Words   |  12 PagesImmanuel Kants The Grounding For The Metaphysics of Morals and John Stuart Mills Utilitarianism Immanuel Kant and John Stuart Mill are philosophers who addressed the issues of morality in terms of how moral traditions are formed. Immanuel Kant has presented one viewpoint in The Grounding For The Metaphysics of Morals that is founded on his belief that the worth of man is inherent in his ability to reason. John Stuart Mill holds another opinion as presented in the book, Utilitarianism thatRead MoreJohn Stuart Mill’s Theory of Utilitarianism1336 Words   |  5 Pagesmorally using John Stuart Mill’s theory of Utilitarianism and the Greatest Happiness Principle (GHP) and Immanuel Kant’s Deontology and his Formula of Universal Law (FUL). I will also explain why Kantian Deontology works better as a moral theory in the case of Tom and Mary. In John Stuart Mill’s, â€Å"Utilitarianism,† Mill describes his theory as, â€Å"†¦ not something to be contradistinguished from pleasure, but pleasure itself, together with the exemption of pain (2001, p. 9).† What Mill is describing canRead MoreHappiness And Happiness1736 Words   |  7 Pagesother but overall share the same concept of happiness. Key words:Utilitarianism, Modern utilitarianism, Classical Utilitarianism, Act/Rule utilitarianism, Jeremy Bentham, John Stuart Mill Utilitarianism The Utilitarianism philosophy’s concept is mainly characterized by two elements: happiness and consequentialism. According to the utilitarian philosophy, utilitarian happiness is most desired by humans and everything one does that contributes to happiness is considered good. EssentiallyRead MoreWho Is The Categorical Imperative?882 Words   |  4 Pageswith Kant. Zimmer also talks of John Stuart Mill, who by contrast argued that the rules of right and wrong should above all else achieve the greatest good for the greatest number of people even though particular individuals might be worse off as a result. John Stuart Mill, a British philosopher, studied Jeremy Bentham’s Utilitarian theory which, is based on the notion that behavioral laws should be guided by the principle of increasing pleasure not pain. Although Mill was impressed with Bentham’s theoryRead MoreAristotle s Ethics And Ethics Essay891 Words   |  4 Pagespeople desire a conclusive theory on ethic s. It is human nature to demand a clear path that does not meander into oblivion. Matters Ethics and Morality take twists and turns that seem to end in no specific action plan. Philosophers that came after J.S mill, Bentham, Kant, Aristotle and many more have strived to find a conclusive theory to Ethics. Ethics and any other branch of Philosophy has proven to be so problematic. Applicability of Ethics peddled by recent philosophers might prove to be as futileRead MoreMoral Judgements Are Morally Wrong?2025 Words   |  9 PagesAlternatively, consequentialism is the view that actions should be deemed morally right or wrong based on the outcomes an action has. A consequentialist would compare the end results of two different actions and their interest is in the conclusion of the action. Utilitarianism is a branch of consequentialism that believes that the best action is the one that promotes the most utility. This also means that actions need to present the most overall good for all and not just a single person. John Stuart Mill, a

Tuesday, December 17, 2019

Dr. Combs . . . . . . . Educators Preserve Technique Before

Dr. Combs Educators preserve technique before educating learners’ abilities effectively influence students. Ordinarily, the effectiveness of an educator entrusts dynamic various strategies educate learners. However, learners retain brilliant approach ahead of comprehending findings. I acquire a personal philosophy through reading chapter three chapter 4 in Foundations of American Education. My personal philosophy is Behaviorism seeing it is similar to the school I worked at as an Teacher’s Assistant. The ideas are similar to what I do currently. The ensuing paper presents my philosophy on special education seeing purpose of schooling, nature of learnings, curriculum,†¦show more content†¦For example, student tendency consume water subsequent exercising or searing. However, fervent stimuli taste considering water. Additionally, inadequacy prior to selective edibles through daytime/ Curriculum Accordinarly behaviorist curriculum consider students shall cultivate unconventional skills eminently affect environment. Learners curriculum entail diverse content programs and materials considering problematic solving skills. Therefore â€Å" teaching materials, instructional methods, and teacher-classroom behavior.(Wittrock 1987). Educators diverse strategies instruction attain an objective goals assist accomplishing authentic settings. Ordinarily, encourages learners comprehend distinctive subjects. Instructional Methods Educators behaviorism philosophy practice diverse instructional methods paired with reinforcement. For example, a student learning hence repose chair during cycle prior to ratify reinforcement. Teachers present various edibles seeing students stay seated. There are alternative prompt position manding popcorn. The various instructional methods is token economy, reinforcers, tangible items earned when a behavior that is acceptable is achieved. Children practiced various course typing, spelling, and math upon computer. Classroom ManagementShow MoreRelatedFactors Affecting Motivation to Learn English25117 Words   |  101 PagesFACULTY OF EDUCATION UNIVERSITI TEKNOLOGI MALAYSIA FACTORS CONTRIBUTING TO PROFICIENCY IN ENGLISH AS A SECOND LANGUAGE AMONG CHINESE STUDENTS IN JOHOR BAHRU BY OOI CHOON LEAN MP061113 EDUCATIONAL PSYCHOLOGY 581225-07-5846 SUPERVISOR ASSOC PROF DR AZIZI HJ YAHAYA ii ABSTRACT There has been an ongoing debate about the importance of the English language. Employers are lamenting that new graduates these days lack communicative proficiency in English. The purpose of this study is to determine

Monday, December 9, 2019

Network Security Plan and Implementation Report for GB

Question: Network Security Plan and Implementation Report for GB. Answer: Introduction Banking sector is one popular area where computer networks and IT systems are extensively used. Banks make use of IT network capabilities to improve their business outcomes and ensure efficiency in all their operations. In this report the network security implementation is analyzed for The Golden Bank (GB). The network security aspects are explored for security planning and for ensuring robust and adequate security measures are implemented in their systems. GB network is wide and big and faces lot of issues in maintaining and managing their IT network infrastructure. This is because the existing network found in their HQ, operations and branch offices use different protocols which are viewed as a security challenge since some of the native protocols are more vulnerable to latest attacks and viruses. Company Overview GB Headquarters is based in Tivoli which has 80 employees. There are two remote branch offices, one at Greenland and the second one at Faroe. In addition to this the operations building is located 60 Kms away from Tivoli and a warm backup storage site located 100 Kms away from Tivoli. In addition to this, there are 28 branch offices all connecting to operations office using frame relay or DSL links. All these 28 branch offices are similar in spread. GB also has 28 ATM machines which use SNA protocols to communicate with operations. Some file servers still run primitive IPX/SPX protocols and some of them use TCP/IP. The HQ and operations office and warm backup site use T3 leased line, HQ connects with Greenland and Faroe with T1 leased line. The warm site backup office is used for off-site data storage and this is done regularly to ensure protection. The bank also provides connectivity to outside vendors. The bank uses CISCO 2600 multiservice platform routers, has network attached sto rage (NAS), a combination of windows and Linux servers and desktops running Windows 8 OS. Each branch office, the operations office, remote offices and warm backup site has a LAN running on 10Base-T Ethernet, the LAN in HQ runs on 100Base-T Ethernet. Frame relay networks are used by branch offices and vendor to connect to operations center. Problems faced by GB: GB network is dependent on IPX/SPX, SNA and frame relay networks which the board feels is a bottleneck for further business growth. Further, GB is already pending huge amount of money in maintaining existing IT network and infrastructure with very less room for expansion. The bank also plans to expand its existing branch offices by 30% in which case the network must be scalable and flexible to accommodate more data volumes efficiently. GB also desires to have an efficient and high performing WAN/LAN with zero problems during their business operations. The scope of this report is to explore traditional WAN based solutions for managing all systems and LANs in GB through IP addressing, and to plug vulnerabilities in their servers, network devices and to protect all systems IT network infrastructure of GB from attacks and hackers. The security plans are explored and discussed for their importance in securing data and customer services in GB. Security plans and security measures will be implemented across all areas of GB operations to, Protecting all servers - web servers and database servers, NAS, servers in other offices/branches which connect to the operations center. Protection will also include individual systems and LANs at warm backup site, two remote offices, operations office and the LANs and individual systems found in all the 28 branch offices. Securing the network links between offices using appropriate encryption, decryption methods as needed. Providing redundancy at warm backup site for ensuring latest data is available from all the other offices to ensure business continuity. Positioning firewalls, proxies, DMZ, IDS/IPS, for protecting individual network devices, routers, switches, etc. Develop security implementation planning and test security vulnerabilities in the network. Network Design and Assumptions made The GB network consists of different networks all of them connected through some common routers and protocols. In order to secure the network in GB, the following general aspects are analyzed (Daya, 2008). They include, Network architecture for each network, security aspects on internet and so on. Types of attacks on servers, computers, networks, applications and data While access is provided on internet, the security measures to be implemented Understand the existing security, hardware, software, etc. GB requires cost effective high speed WAN links with accuracy between their offices. The internet can be considered as a network carrier, but since it is an open public network, GBs network packets on the internet are vulnerable to attacks. The option of VPN connectivity between operations center and branch office is considered instead of frame relay, because VPN (Ferguson Huston, 1998) can establish a more secure network compared to fame relay nets. A WAN network is essential for GB to connect all their sites and branch offices, ATMs and remote sites. WAN has the ability to connect multiple LANs (Rouse, 2007). The sites of GB are distributed however their database is centrally maintained and managed. At the same time, the data available on remote servers are also secured by real time backup at the warm backup site. In order to implement security measures at all LANs and WAN links along with devices, servers and individual computers, the top-down network design approach (Oppenheimer, 2011) is considered. The top-down approach begins with upper layers of the OSI model and moves down to further layers. In this approach the sessions layer and data transport layer is considered. The approach also takes into account GBs group structure, organization structure along with user and service authentication principles in order to fulfill certain controls in the network are fulfilled. The secured network for GB is designed to fulfill business goals that include, Improve productivity and communications along with providing data security to the organization. Reduce operational costs incurred for telecommunications and maximize business outputs Ensure information in the organization is highly protected for all employees in all locations of GB The network must also fulfill future information needs (Wen, 2001) and technical goals which is summarized as, Scalability: Scalability refers to the ability of the network to continue to function efficiently in spite of drastic changes in data flow volume or size. For good network performance in peak loads, scalability is important. Availability: Services and the network must be available at all time to users. Performance: Performance of a network is highly important to ensure GBs transactions are made efficiently and the network is able to work in its full capacity. Security: In enterprise networks, security is highly crucial particularly in enterprise networks because the computers keep connecting with other sites and also to the internet. Concerns related to security must be integrated in network design stages itself. It is important to devise a security plan and policies for the company to address the risks in deploying a secure project. The security plan must determine the consequences of an attack and make plans accordingly. The performance, availability and scalability are handled by the redundancy provided by T1 and T3 links between GBs offices and remote branches. Security is planned by establishing firewall and IDS at the periphery of the network and in internal LAN respectively. Security measures for user authentication and data encryption, establishing VPNs for connecting branch offices are considered in ensuring network security. Network Design and Architecture GB has one headquarters, two remote offices, an operations office, a warm site for offsite backup, remote offices and branches. Each office has a LAN with multiple users, routers for transferring packets and firewalls for authentication. The main router is located at operations site and warm site backup. This is the CISCO Immersive Tele-presence system as it can manage multiple protocols. The WAN plan for GB is shown in figure 1 with routers, firewalls and LAN at each location. All data passes through the main router in operations and routed to respective offices. For example, if any one branch office sends a packet to HQ, it is routed through main router. Figure 1: The WAN plan for GB Since, the entire LAN and WAN for GB is a TCP network, the router uses RIP protocol (Hendrick 1988) for routing packets from any one LAN to other LAN or subnet. For routing correctly RIP must be enabled in all routers. In the figure, the network addresses must be included in routing and interfaces participating in the WAN must be specified. This is done using the RIP command. RIP Version 2 is used to define routing tables in router. The network command is used to define connected subnets on routers. Subnets are included in routing updates because HQ has four subnets namely Finance, Accounting, Management and Administrative users. In addition to this each branch, remote offices, operations office and warm backup site, ATMs, outside support vendors are also available. RIP command must specify all IPs in each office and must also include network devices. In the GB networks, classful networks are also available in the form of outside support vendors. Classful network refer to IPs that use the GB network in addition to their existing IPs. Certain default routing updates are summarized in the network (Antoniou 2007) perimeter to establish a DMZ. RIP is used mainly to update routing tables automatically which is done as below: A router for example at remote office 1 (Faroe) may experience changes to an entry update in its routing table to include a new route. When the table in Faroe router is updated, this information is sent to other routers in the WAN to update tables automatically for this change In this way data packets across different locations in WAN is routed to their respective destinations Therefore RIP is used to define routing tables in routers in GB. IP addressing Network address in CIDR format is used for GB as it is a private IP. The private address 10.0.0.0 for GB will be subnetted across its locations by taking 3-bits as below: Number of subnets = 8 (23) Total number of hosts = 221 2 = 2097150 Subnet mask will be 255.254.0.0 The above is defined to expand the network in future. Table 1 shows the start and end IPs along with their broadcast address. Network Address First Address/n Last Address/n Broadcast Address 10.0.0.0 10.0.0.1/11 10.31.255.254/11 10.31.255.255 10.32.0.0 10.32.0.1/11 10.63.255.254/11 10.63.255.255 10.64.0.0 10.64.0.1/11 10.95.255.254/11 10.95.255.255 10.96.0.0 10.96.0.1/11 10.127.255.254/11 10.127.255.255 10.128.0.0 10.128.0.1/11 10.159.255.254/11 10.159.255.255 10.160.0.0 10.160.0.1/11 10.243.255.254/11 10.191.255.255 Table 1: GBs IP addressing scheme followed for their locations In the above table since HQ needs 80 IPs, the start address will be 10.160.1.1 and end with10.243.255.254. The router steps are given below: Router Network Address = 10.160.0.0/11 Password: gbwan Router Configuration Steps hostname hq hq(#) config t hq(config) interface fa0/1 hq(config-in) ip address 10.160.0.1 255.243.0.0 hq(config-in) no shutdown For VLAN Routing Branch office with Operations (one branch) operations(config) int fa0/0.1 operations(config-in) ip address 10.0.0.1 255.248.0.0 operations(config-in) no shutdown operations(config-in) encapsulation dot1q 2 VLAN Configuration for one branch vlan 2 name branch1 Likewise all 28 branch offices are defined, along with two remote offices at Faroe and Greenland. As each branch office, remote offices, and operations office have servers they must be defined in router. Similarly the warm back up site has network attached storage which must be taken into account in the routing table. Network Security Plan The main objective is to plan WAN security for GB due to increased threats and their use of old and obsolete protocols and systems. The network security plan is made by ensuring there is no disruption to their existing network and business operations. The following aspects are considered in GBs security plan: Identify all assets in GB along with the risks and vulnerabilities posed by each element Developing security policies and procedures for implementation Implement antivirus software in all systems (servers, PCs, etc) Testing and implementing security procedures in all GB locations Data confidentiality, privacy and integrity are highly important in WAN security. Confidentiality: In confidentiality, information contained in the network is private. The data stored in servers in GB networks is meant for private use and must be protected. Integrity: Data integrity is an important network security aspect as data is prevented from getting modified or corrupted by attackers. Non-repudiation: Ensures users will not deny using GB network. The above five aspects are highly important to be considered in order to have effective secured network system (Dowd, 1998). Physical security measures such as controlled user access by authentication process, establishing access levels in system and encryption are implemented (Oppenheimer 2011). User and access control measures will be implemented across all services, databases, servers and VPNs. The security aspects of RIPv2 protocol is also examined (Davis, 2006). Two authentication methods are available with this protocol namely plain-text and message digest 5 (MD5) (Khalid, et al., 2008). In routers plain-text is the default method, but they must be configured using MD5 because this method encrypts the password in router and secures the table. Hence, if a hacker is able to get access to physical environment the WAN can become unsecured (Parziale, et al., 2006). WAN authentication will occur when updates are received by a trusted source or router. Hence, in routers authentication ensures the entry of corrupt or malicious update, or denial of service (DoS) attacks (Rivest, 1992). Therefore, MD5 algorithm is used for authentication. From the above, the network security plan for GB network will consist of, A security plan consisting of standards, guidelines, policies, implementing IDS, procedures for managing incidents and so on are developed (Winkler, 2011). Security policies are defined for the entire GB network, which includes, accessing internet, user policies, privacy matters, etc (FCC, 2012). Developing the implementation strategy which outlines steps of the plan for action in GB. Gain support from management. Network security strategies and implementation is an organization wide activity. This must be supported by IT, business and all employees in GB. Training to staff, technical training to IT staff in managing the plan must be imparted. Finally the security systems are implemented. Implementing network security technology In the WAN firewalls are implemented in the periphery of the network to prevent outside attacks and when users access the internet. A general implementation of a firewall for GB is shown in figure 2. Firewalls are used in periphery of GB network and positioned at different places in the network to prevent IP address that do not meet the specified criteria in routing tables. Since GB network uses the internet for VPNs, security measures such as port address translation (PAT) are implemented to stop attacks from outside. Figure 2: An implementation of firewall Further, the main CISCO router will ensure packet filtering, and IDS is used in GB to enhance security of data because this is an additional layer of security to prevent attacks that pass through perimeter firewall. The positioning of IDS for GB is illustrated in figure 3. Figure 3: Use of IDS along with firewall for network security Network services in GB must be analyzed for its implications for users (Zwicky, 2001). For instance, if a user has database server access, the user must be examined for web server and access to file server. Security areas are classified as trust and untrusted areas. For instance, the internet is an untrust area. In GB network DMZ zones are defined to show if the network is fully secure or insecure. The DMZ zone will provide access to untrusted users, i.e., users gaining access from internet. Normally, web and mail servers fall in DMZ zone. Database servers, authentication servers, file servers and storage systems fall in the protected zone for GB. Virtual LANs (VLAN) are implemented to ensure protection of servers. The protocols implemented in GB for network management are ICMP, RCP, TCP/IP and SNMP for monitoring availability, utilization and latency in WAN (Leskiw, 2005). In addition to this the other protocols used in configuring network security and consistency include WMI, HTTP, UDP MD5, RIP v2. The next step is to define ACLs. For example, In ACL Administration is not allowed to access Management and Accounting Using extended list ip access-list extended vlan_administration deny ip 10.8.0.0 0.7.255.255 10.64.0.2 0.31.255.255 deny ip 10.8.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.2 ip access-group vlan_administration out Faroe not allowed to access warm site ip access-list extended vlan_faroe deny ip 10.32.0.0 0.7.255.255 10.64.0.2 0.31.255.255 permit ip 10.32.0.0 0.7.255.255 10.64.0.3 0.31.255.255 int fa0/0.4 ip access-group vlan_faroe out The ACL is configured in GB for all the sites. The deny ip command will ensure the hosts belonging to administration and Faroe fulfill the access conditions as required by GB. Testing The next stage is testing. The network and system configurations are considered in testing (Thai, 2012). In addition to this network penetration tests are done to prevent malicious IP from entering the network. The entire security technology is tested using Universal Threat Management System (UTMS) and software tool named Endian FW is used to monitor network traffic and view malicious behaviour. Testing can also be done using tool named CISCO flow, which is also sued for trouble-shooting (Kunth, 2011). The final implementation for network security is illustrated in figure 4. Figure 4: Network security implementation in GB To test packet transfer from any user IP to another remote IP on the network, ping command is used. The remote IP will respond as shown in screenshotfigure 5. Figure 5: Ping command and response from staff IP The network packet flow is illustrated in figure 6 for GB. Figure 6: Network packet flow in GB The intrusions are monitored from packet flows using UTMS and monitoring software. Conclusions In this report, the redesign of GB enterprise network is explored for ensuring network security to protect their systems and infrastructure. The security solution is achieved through the implementation of network planning, security planning and implementation of secured network to connect their offices with the enterprise network. The existing infrastructure for GB is examined for threats, attacks and performance impact on the network. The redesign of the network is explored by considering different aspects of business and IT operations. The aspects of implementing a security policy and operating procedures are emphasized. The security solution is shown in figure 1 to show the positioning of firewalls, routers and connectivity between different locations. The secured network is implemented using standard protocols with adequate scope for expansion in future. The security implementation is demonstrated using UTMS and Endian FW monitoring and network management software to test the des igned network. References Antoniou, Stelios (2007). How to configure RIP Version 2. Daya, B., (2008), Network Security: History, Importance, and Future. Florida, USA: University of Florida Department of Electrical and Computer Engineering. Davis, David (2006). Cisco administration 101: Know the basics about RIPv2. Dowd, P.W., (1998), Network security: it's time to take it seriously. Computer , 24-28. FCC (2012), Cyber Security Planning Guide. Federal Communications Commission. Ferguson, P. G. Huston, (1998), What is a VPN? Cisco Systems. Hedrick, C. (1988). Routing Information Protocol RFC1058. Network Working Group, Rutgers University. Khalid, S., T. Hatim, A. Elzoghabi and S. Mohammad (2008), Performance Evaluation of Secured Versus non-secured EIGRP Routing Protocol. Proceedings of SAM. pp.174-178. Kunath, A. (2011), Enterprise Network Testing . Indianapolis : Cisco press. Leskiw, Aaron (2015), Techniques for Monitoring WAN Links. Oppenheimer, Priscilla, (2011), Top-Down Network Design. 3rd ed. IN, USA: Cisco Systems Inc. Parziale, Lydia, David T. Britt, Chuck Davis, Jason Forrester, Wei Liu, Carolyn Matthews and Nicholas Rosselot (2006). TCP/IP Tutorial and Technical Overview. 8th ed. USA: IBM Corporation.

Sunday, December 1, 2019

Microscale Synthesis of Acetylsalicylic Acid free essay sample

Synthesis of Aspirin Ling Tecson Gamido, Mitchiko Mariel M. Mizukami Abstract Acetylsalicylic acid, or also known as aspirin is known to be a drug that relives people of pain and is commonly used even today. It is synthesized from salicylic acid and ethanoic anhydride, both of small quantities. Phosphoric acid was used as a catalyst in the synthesis to speed up the process. Esterification is involved and the final product is aspirin with the presence of acetic acid as the byproduct. In order to create the powder form of aspirin, the process of crystallization was conducted and was run through vacuum filtration. After running through the help of an electronic instrument, the result that was achieved in this experiment was met due to the presence of esters in the graph in Figure 5; with a peak of 1297. 89 at 1300-1100. There is also a match of 35. 48 with ethyl salicylate. The objective, which is to create aspirin, has been completed due to the results shown by the data provided by an electronic instrument. We will write a custom essay sample on Microscale Synthesis of Acetylsalicylic Acid or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A recommendation would be a more exact amount of reactants to be used. In this experiment, there was an excess of water and more acetic anhydride was used due to the salicylic acid not being able to dissolve at the amount of 0. mL. Overall, this was a successful experiment where aspirin was synthesized properly. The melting point, using the meltemp, was at 146? -158 ?. Introduction Aspirin is among the most fascinating and a versatile drug known to medicine and it is among the oldest. The first known use of an aspirin-like preparation can be traced to ancient Greece and Rome. Salicigen, an extract of willow and poplar bark, has been used as a pain reliever (analgesic) for centuries. In the middle of the last century it was found that salicigen is a glycoside formed from a molecule of salicylic acid and a sugar molecule. Acetylsalicylic acid (Aspirin) has been used as a drug that would lessen small pains within the body. It is considered as a salicylate drug. Aspirin is the product of synthesis between salicylic acid and ethanoic anhydride. Acetic acid is the byproduct of the reaction. Experimental 138 mg of salicylic acid, which is in powder form, is placed inside a test tube. After that, a boiling chip and a small drop of 85% phosphoric acid was added. In order to wash down the excess salicylic acid, 0. 3mL of acetic anhydride was used. The test tube containing the substance was shook to mix the substance. The reaction tube was heated in a steam bath for five minutes. The temperature of the steam bath and the substance stayed constant at 90? C. 0. 2mL of water was added to the mixture for decomposition of excess acetic anhydride. 0. 3mL of water was also added after the signs of reaction within the test tube. The test tube is placed in an ice bath. Crystallization took place; this is visible by the appearance of small diamond-like crystals floating within the mixture. After the crystallization is complete, vacuum filtration was done by pouring the mixture into a filter flask leaving the crystals from the crystallization of the mixture. Diagram Fig. 1 Figure 1. Aspirin Formation. This equation shows the main process of synthesis of acetylsalicylic acid. Salicylic acid + Ethanoic anhydride - Aspirin + Acetic acid. Fig. 2 Figure 2. Carbocation Formation. This shows the esterification of the Ethanoic anhydride with H+ causing the formation of a carbocation. This process is in equilibrium. Fig. 3 Figure 3. Formation of aspirin from carbocation. Due to the presence of the carbocation in Ethanoic anhydride, this caused a reaction with salicylic acid, hence creating the final product of Aspirin with acetic acid as its by product. Fig. 4 Figure 4. Crystallization. In this picture, the test tube containing the mixture is placed in an ice bath throughout the duration of the crystallization process. Fig. 5 Figure 5. Dehydration. The powder within the cone is the aspirin collected after the vacuum filtration. Result Fig. 6 Figure 6. Mass Spectrum IR result. Several peaks are seen at 1300-1100 which shows the presence ofesters which is present in the final product of the synthesis of aspirin. The value of % of transmittance is 1297. 89. These values were done with the help of an electronic instrument. Fig. 7 Figure 7. Infrared spectroscopy correlation library. This figure shows the presence of a match with ethyl salicylate with 35. 48 which is labelled to be 1st in the results provided by an electronic instrument. The index is 1779. Top 5 results 1. Ethyl Saliclate 2. Citral, 95%, mixture ofcis trans 3. Salicylic acid inKBR 4. 3,5-Dimethyl-2-cyclohexen-1-one 5. 2,6-Dimethyl-g-pyrone Discussion The followings are the peaks that are present in Acetylsalicylic acid (Aspirin): C=C (aromatic), 1600 – 1400 cm-1 C=O (ester), 1750 – 1730 cm-1 C=O (carboxylic acid), 1725 – 1700 cm-1 C-O (ester/carboxylic acid), 1300 – 1000 cm-1 O-H (carboxylic acids), 3300 – 2500 cm-1 The present of the pecks above determine the confirmation of aspirin in the synthesis result. As seen in the results, there were several peaks are seen at 1300-1100 which shows the presence of esters which is present in the final product of the synthesis of aspirin. The value of % of transmittance is 1297. 89. These values were attained with the help of an electronic instrument. The possible source of error may include the excess of acetic anhydride and the lack of accuracy when it comes to the amount of salicylic acid. Some remained at the side of the test tube used for reaction so this could be a cause of the result of the data. Conclusion The objective; which is to make aspirin from salicylic acid and acetic anhydride, has been achieved within this experiment. With the presence of carboxylic acid (which is active in the reaction of the synthesis) in the results done by an electronic instrument, it shows that the reaction went through the right direction. The proper techniques needed in the synthesis of aspirin and the physical properties of aspirin are determined and applied. The synthesis of aspirin by analysis of its melting point, IR and mass spectrum are confirmed. Recommendations A recommendation would be a more accurate and safer way of transporting the reactants inside a test tube. A small amount of salicylic acid was remaining on the walls of the test tube. Due to this, an increased amount of acetic anhydride was used for the experiment. This could have affected the yield of the final product. Through the vacuum filtration, some of the reaction mixtures were not able to properly go through the filtration since it was not able to properly go through the filter. References Microscale synthesis of acetylsalicylic acid. (n. d. ) Retrieved from http://www. docstoc. com/docs/23857240/Microscale-Synthesis-of-Acetylsalicylic-Acid(1) University of Colorado. (n. d. ) Retrieved from http://orgchem. colorado. edu/hndbksupport/specttutor/irchart. html Moor Park College. (n. d. ). Retrieved from http://sunny. moorparkcollege. edu/~chemistry/chemistry_1B_labs/experiment_fifteen. pdf Gettysburg College. (n. d. ) Retrieved from http://www. gannon. edu/resource/dept/sim/new/chemexp_files/Most_used_ChemLabs/PDF_Files/Analysis_of_Aspirin. pdf