Monday, January 27, 2020

Enigma and Lorenz Machines Their Contribution to Computing

Enigma and Lorenz Machines Their Contribution to Computing The purpose of this report is to understand the working of cryptography by studying the working of Enigma and Lorentz machines which were used by Germans during World War II. The report will also discuss the effect of the invention of this machines on modern day cryptography. Cryptography has been helping humans to transmit information in secured way but the popularity of cryptography was limited to certain individuals and it was not used widely. During World War II the demand of cryptography increased which resulted in invention of Lorentz and Enigma machine by Germans. The encrypted information was important to Britains to gain an edge over the Germans war strategies, hence a research center was constructed in Britains to decode the encoded information. The report discusses the working of Enigma and Lorentz machine and the various methods adopted by Britains to decode the encoded information. The report will conclude by studying the effect of the creation of the encrypting and decrypting machines on the modern-day computing. Cryptography play an important role in humans daily interaction with technological devices, with the advent of computing devices and internet it has become extremely important to hide private information. We often wonder how we can transfer money through internet or by using ATM cards. The sensitive personal information such as bank details are transferred securely through internet which is available to everyone. This paper tracks the events which contributed to the development of modern day cryptography and discusses the development in the field of cryptanalysis. Cryptography is the science of secretly transferring information from one point to another so that the information is reliably transferred from one point to another, which is unintelligible to all receiver of information except the intended user. The aim of the cryptography is to prevent eavesdroppers from understanding the message. (A. Eskicioglu and L. Litwin, 2001) The human want of secrecy of information has resulted in the invention of cryptography. Ciphers were created to hide personal information. The need to securely transmit information has increase with the advent of modern communication. Confidential information such as Business plan, financial transaction which are send over internet needs to be transferred in a secured way. Since, internet is available to everyone it important to encrypt the information which is being transferred (Zwicke, 2003). The basic working of encryption can be divided into three parts: Encryption: Cryptography works by modifies the original information (termed plain text in cryptography) which is in readable form to encrypted form (termed ciphertext in cryptography) which is not easily interpreted by unauthorized person. The encryption process scrambles the plaintext by combining it with a key which is a random sequence of letters or numbers and produces ciphertext. Transmission Once the information is encrypted it is transferred to the intended user by various methods. For example, it could be transferred by writing it on paper or can be send via complicated modern wireless system. Decryption: After the information is received by the intended person the person tries to decode the information with a key. The key is unique and usually only the receiver has the key to decode the information (An introduction to cryptography, n.d.). 3.1 Stream cipher Stream cipher is an encryption algorithm which encrypts one bit of data in one cycle of its operation. The stream cipher uses infinite stream of pseudorandom bits of key to encrypt the plaintext. The robustness of the stream cipher depends on the algorithm which is used to produce the key. Since, repetition in the key can cause the stream cipher to be easily predicted and the encrypted text could be easily decrypted (Villanueva, 2015). The working of the stream cipher is explained below: As discussed above encryption works by combining the plain text Xi with key Si to produce ciphertext Ci . The combining process uses modulo 2 operation which is the modulus between the bits of the plaintext and ciphertext. We can denote this mathematically as Ci = Xi à ¢Ã…  Ã¢â‚¬ ¢ Si To decrypt the message the same key stream is used which was used for encrypting the message. Mathematically this can be stated as Xi = Ci à ¢Ã…  Ã¢â‚¬ ¢ Si   (C. Paar, J. Pelzl) The diagram below summarizes the entire process: Figure 1 Encryption and decryption with stream cipher. Reprinted from Understanding cryptography, by C. Paar, J. Pelzl, (n.d.), Retrieved from http://bit.ly/2mEit9i Copyright by Springer-Verlag Berlin Heidelberg 2010 Enigma machine eliminated the human effort of encryption by automating the process of encryption. The use of enigma machine during World War II was done to secretly transmit the classified information to remote military units. The enigma was electro-mechanical machine which encoded the character stream to cypher text. The simplest version of the enigma machine had three motors which are interconnected with each other. It also has a plug board which is a board to interconnect letters to improve the encryption of the enigma machine. A keyboard was used to input the characters to be encoded by the machine. A light board was used to display the encrypted letter of the plaintext character. Figure 2 Enigma How the machine worked. Reprinted from The guardian website, by Hern, Alex, (2014, Nov 14), Retrieved from https://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game Copyright Simon Singh. 4.1  Working The working of enigma machine was simple. When the operator types the letter on keyboard electric signal is generated. The signal then passes through the plug board which substitutes the letter per the connection of the plug board. The signal then passes through the three rotors with internal wiring. This is where the actual encryption takes places. As mentioned above each motor consists of 26 steps of rotation before making one complete cycle. The arrangement of the three motors was such that when the first motor completes a full rotation the second motor would move by one step. The same step is applicable for third motor. After passing through the connection of motors the signal is then reflected and again passes thorough the plug board. After passing through the plug board the signal lights up the appropriate letter on the light board providing the encrypted letter of the plain text character. The Lorentz machine was developed by C. Lorentz in Berlin. In 1940s Germans saw the need to establish secured communication between German high command in Wà ¼nsdorf close to berlin and German army throughout Europe. With the invention of mechanical machine and electronic boards it became possible to build a machine capable of encrypting the message which was send to remote army. The Lorenz machine was used for sending tactical information (Smart, n.d.). Lorentz machine uses Lorentz cipher which was based on Baudot code. Lets discuss about the working of Baudot code. Baudot Code: It used five bit of data to encode characters. Baudot code was a standard means of communication via teleprinter. Since five bits were insufficient to represent all the characters on the keyboard. Hence the code was divided into two states called letter shifts and figures shifts. To toggle between the two states a control character was used, there were other characters which had special functions such as space. To understand the working of Baudot code lets take an example of encrypting the word Hello. The first step is to fill the Paper tape with holes and insert the paper tape into telegraph to send the message. To punch holes in the paper tape the position of the holes needs to be determined which was obtained from the Baudot code table. These holes were converted to bits and then transferred by teleprinter. Figure 3 The Baudot printing telegraphy system. Second Edition. Reprinted from Circuitousroot website, by Pendry, H, W. (1919) Retrieved from http://www.circuitousroot.com/artifice/telegraphy/tty/codes/ 5.1 Lorenz Cipher The Baudot code is taken as input by the Lorenz cipher. The Lorenz cipher consisted of 12 motors which are separated into 3 pairs. Each motor had different number of pins on it as shown in figure below: Figure 4 An Enigma machine rotor. Reprinted from Plus magazine website, by Ellis Claire. (2005, Mar 1). Picture retrieved from https://plus.maths.org/content/exploring-enigma Copyright by Simon Singh Each pin could store either 0 or 1 based on the configuration of the machine. The configuration of the machine (setting the starting position of each motor) was performed by the operator of the machine and the same configuration of the machine was used at the receiving end to decrypt the message. The Lorentz machine was divided into three pairs of motors as shown below: Figure 5 The internal working of the Lorentz cipher machine. Reprinted from the Rochester institute website, by Payne, Japnce. (n.d.), Retrieved from https://people.rit.edu/japnce/payne/images/rotorsall.png The three pair of motors are termed as K, M, and S. The description of each pair of motors is discussed below: K motors: These consist of 5 motors with following pin configuration K1=41, K2=31, K3=29, K4=26, K5=23. This set of motors shift by one pin for every character which was encoded. M motors: These consist of 2 motors with following pin configuration M1=61, M2=37. This set of motors shift by one pin for every character which was encoded. Further the output of the M motors decided whether the S motors should be rotated by one pin or should remain unchanged. S motors: These consist of 5 motors with following pin configuration S1=43, S2=47, S3=51, S4=53, S5=59. This set of motors shift by one pin based on the output of M motors. Working The 5 bits of the characters are first X-OR with the 5 bits of K motor. The output is then again X-OR with the 5 bits of S motors to get the cypher text. At the receiving end since the Lorentz cipher is a symmetric cipher, the same configuration is used to set up the Lorentz machine at receiving end and the encrypted message is decrypted. The mathematical formula of the encryption and decryption process is as follows: Suppose Message = M, Cipher text = C, Cypher = E M à ¢Ã…  Ã¢â‚¬ ¢ E = C (Encryption) C à ¢Ã…  Ã¢â‚¬ ¢ E = M (Decryption) (Smart, n.d.) Most of the technology that was in existence during World War II was like that which was used in World War I. The telegraph, which was type-printed using a typewriter was widely used commercially and by military personnel. In the late 1800s an Italian scientist, Guglielmo Marconi discovered the radio communication. However, it wasnt until the early 1900s that this technology was adopted for military purposes. It was the year 1914 and most major military powers of the world has started relying extensively on this technology but there was a problem there were no security mechanisms in place for a wireless signal to hide the messages being transmitted. The U.S. soon used a more sophisticated version of this technology as soon as Frequency Modulation was invented in 1920. Figure 6 Soldier during World War II using telegraphic switchboard Another important element of communication technology invented before and during the World War II was the RADAR technology. Developed by the U.S. navy for military use, these were signals sent in the microwave wavelength. It was an entirely new way of surveillance that enabled the allies to see in total darkness and find out about enemy ships in the distant sea or air.   Radar used small-short signals that were sent into a direction using an antenna. This would return the position and speed of an object which would serve as a critical early warning tool. Radar navigation implementation by the German bombers meant that the previous tactics of indiscriminate, area-based bombing was now replaced by more accurate precision targeting. Then there were the German fire control radars, Lichtenstein SN2 was mounted on top of airplanes and had an effective range of 2.5 miles. A methodology that had been in existence for a quite a while but was found of prime use during the World War II was Cryptography. Cryptography emerged as the saving grace to answer all questions about the immense need of secrecy. Cryptography had been in existence for over a thousand years but it wasnt until the early 19th century that mathematicians came together to build a machine that would be used for a very specific purpose send messages during times of war. During this period, Cypher machines were developed under extreme secrecy. These machines were of the mechanical and electromechanical kind. Out of the two, the later were developed by Germans into what they called the Enigma machine Allies and enemies developed and adopted the use of cryptographic communications of all sorts during this period. While Germans were focusing on techniques to build machines for encryption, the UK was busy trying to perform cryptanalysis on these machines. Numerous machines came out of Germany that used cryptography in its own unique way. FISH, as the UKs Bletchley Park codenamed them, were a series of German stream ciphers developed during the World War II era. The enigma in the early 1920s which was of the electro-mechanical sort that used a keyboard, rotors and a spindle to do the tricks. Another machine known as the Lorenz cipher was simultaneously developed as a form was a rotor stream cipher and started its use in military since 1941 in a SZ form. The tunny cipher as it was called was used for wireless telegraphy which eventually and unfortunately for the Germans, quite soon led to the interception of its messages. Poland came up with its own cryptographic machine called Bomba, which meant cryptographic bomb in Polish. While there is less information available about why it was named so, Bomba was a glorified Enigma machine in more ways than one. It was developed after the mathematician and its creator, Marian Rejewski studied by breaking apart an Enigma. Put simply, it was a multiple Enigma machine that used an electrical power aggregate of six Enigmas. Most countries like Poland, United States and the UK devoted their time and resources in cryptanalysis of these machines. Bletchley Park in England was extremely instrumental in bringing about a new era with the cryptanalysis or code breaking of messages that were being transmitted by the Germans during the World War II. The Lorenz machine was a stream cipher that encoded/streamed electrical pulses over a telephone line. The technique used was something we call XOR today which is an addition operation. A key property of XOR is that if one was to run the Ciphertext through the same key again, the original message could be found. The exploitation of this very concept of the Lorenz cipher led to its success cryptanalysis. One day after a 4000-letter message was sent out to Vienna, the sender who encodes the message received a response from the receiver asking to resend the message since they had not received the message. The sender reset the Lorenz machine and started to abbreviate a few words to make the process quicker. At this time, Bletchley Park had two copies of the same message and the prime mistake was that both were sent using the same key. The folks at Bletchley park were not just great mathematicians, but they also had an exceptional sense of awareness. They proceeded to add the two messages together, essentially cancelling out the keys. They were now left with two messages added together and then John Tiltman, an experience code breaker who not just able to figure out the message, but also figured out the key. John Tiltman gave this key to Bill Tutte, a young graduate from Cambridge who liked solving puzzles. He was able to out the length of the key by writing it down in rows with the aim to find out patterns. Bill Tutte found that the pattern of the wheel on the right had a period of 41. However, the pattern was not perfect and had an element of randomness which suggested that a wheel on the left was used that moved only sometimes. This information was enough for other mathematicians to jump onboard and fully figure out the Lorenz machine. The Enigma on the other hand had multiple variations in the structure of the machine throughout its useful life to be cracked at one go. The earlier versions of the Enigma were using a 3-rotor structure which was used as the main subject by the Polish Cipher Bureau. Marian Rejewski who worked for the bureau made significant developments in breaking the Enigma, without having much access to any of the official information about its inner workings. Rejewski developed a bomba machine in the process, this cryptanalysis machine was build using the observations Rejewski gathered that showed that the first three letters of a message were the same as the second three. Rejewskis method failed when in 1938 the Germans increased the rotors to include two additional ones. It was Alan Turing who developed a sophisticated Bombe that used statistics and the Bayes law for calculating the probability to narrow down on the number of possibilities. The bombe machines were also quickly updated to test the hypothesis. Figure 7 The British Bombe currently in display at the Bletchley Park Alan Turings Bombe was composed of drums which together simulated an enigma and each drum replicated the functioning of one rotor of the machine. The objective of the Turings bombe was to find out the key used by the Enigma, the starting position of the rotors and the steckers or plugs. The drums were designed to move from a set starting position every time. The movement was designed with the help of statistics and the Bayes law, hence the key space was greatly reduced thereby reducing the run time. Alan Turing has been regarded as one of the biggest contributors to defeating the German navy by helping the Allied Forced during the World War II. It is believed that the British employed 200 Bombes during the Second World War and collectively these Bombes decoded 4000 messages on any given day. The cryptanalysis of the Enigma is believed to have contributed to saving millions of lives and is identified as a prime reason why the war ended years before what it couldve lasted. Britains World War II codebreakers were centrally located at Bletchley Park, a code-breaking center run by the United Kingdom Government Code and Cypher School (GCCS). They primarily focused on deciphering German Enigma and Lorenz communications and producing Ultra intelligence (Hinsley, 1996). Ultra was the designation for high level encrypted Axis-power intelligence the codebreakers intercepted and decrypted (Hinsley, 1993). Ultra-intelligence generated by decrypted Enigma and Lorenz signals is credited with shortening the war, and without it the outcome of the war may have been different (Hinsley, 1996). The Enigma machine was the Germans primary encryption method during the war. Alan Turing, working at Bletchley Park in 1939, created the Bombe, which was an electromechanical machine used to decrypt Enigma ciphers (Smith, 2007). Gordon Welchman refined the Bombe in 1940 with a diagonal board, increasing the Bombes efficiency (Budiansky, 2000). Welchmans diagonal board addressed the plug board vulnerability in the Enigma. The Bombe was based on the Bomba, a Polish machine designed to break Enigma ciphers, which was created by Marian Rejewski (Kozaczuk, 1984). The creation of the functional Bombes led to Allies deciphering of Enigma signals. Beginning in 1940, Germany started developing more advanced machines that used the Lorenz cipher. The first was called the SZ40 machine, which was codenamed Tunny by the British codebreakers at Bletchley Park, and was followed by subsequent versions (SZ40A, SZ40B, and SZ42 (Copeland, 2006). These machines produced more complex ciphers than the Enigma, and were ultimately defeated by the 1+2 break in method created by Bill Tutte (Copeland, 2006). Multiple advanced decryption machines were designed to combat the Lorenz ciphers. First was the British Tunny Machine, which replicated the functions of the SZ40 machines. With the proper cam settings, it was able to produce clear text from cipher text that was input into it (Hinsley, 1993). Built on the Tunny machines, the Heath Robinson, or Robinsons, were created to automate the 1+2 break in (Copeland, 2006). They ran paper tapes to find the wheel settings of the Lorenz machine. Although they were functional, issues with keeping the paper tapes synchronized and slow processing speed limited their effectiveness (Copeland, 2006). Working on the Robinsons at Bletchley Park, Tommy Flowers was instrumental in the advancement of the Colossus computer. Colossus was capable of faster processing than the Robinsons due to processing electronically. This also allowed for only one paper tape, which did not have to be synchronized with another and could be run at a faster speed, around 5,000 characters per second (Copeland, 2006). Although the Colossus computer was created first, the American ENIAC was often credited for being the first electronic digital computer ever made. This was caused by Colossus being shrouded in secrecy after World War II. The term computer originally referred to a human operator who performed mathematical computations. As the need for more demanding and complex computations increased, a push for electronic or digital computing began (Copeland, 2006). Computers like Colossus and ENIAC were called program-controlled computers, in which programs each computer was to process were not stored in the computers memory they had to be manually programmed. For Colossus and ENIAC, this involved modifying wiring by hand using plugs and switches. Modern computers utilize a stored-program concept, in which the programs a computer runs are stored in that computers memory (Copeland, 2006). The concept of the modern computer started with Alan Turing in 1936. He described a universal computing machine, containing limitless memory that stored both data and programs. A scanner would process the data based on the selected program. The use of any program with the data allowed the computer to process any calculation a human could, making it universal. Being universal allowed the computer to switch from one task to another, as opposed to a completely different and unique machine needing to be created for each individual task (Copeland, 2006). Turings concept can be seen in modern computing today, where personal computers and mobile devices (smartphones, etcetera) store both data and programs, and can easily switch between different tasks based on the users needs. Programming to achieve a particular task is relatively simple in comparison installing a program in a modern computer is much less complex compared to rewiring something like the Colossus computer or creating a completely new machine entirely. As discussed, the Germans and Axis powers used Enigma and Lorenz ciphers heavily for their encrypted communications in World War II. The decryption of Enigma and Lorenz was key for the Allies and the development of Ultra intelligence, which likely shortened the war by years. In the end, the need for decrypting Enigma and Lorenz was the initial catalyst the eventually led to modern computing. Colossus, being the first electronic computer, spearheaded the push into the modern stored-program concept that computers and modern devices use today. Without this need for computing power, the world may well have progressed in a much different way. References Budiansky, S. (2000). Battle of Wits: The Complete Story of Codebreaking in World War II. Free Press: 1734. Cooper, S., Leeuwen, J. (2013). Alan Turing: His Work and Impact. Saint Louis, U.S.: Elsevier Science. Copeland, B., ed. (2006). Colossus: The Secrets of Bletchley Parks Codebreaking Computers. Oxford: Oxford University Press. Enigma Machine. (2006). In J. Merriman J. Winter (Eds.), Europe Since 1914: Encyclopedia of the Age of War and Reconstruction (Vol. 2, pp. 964-966). Detroit: Charles Scribners Sons. Retrieved from http://go.galegroup.com/ps/i.do?p=GVRLsw=wu=csuf_mainv=2.1it=rid=GALE%7CCX3447000319sid=exlibrisasid=50a327ace003888aadf98172a87c0eb6 Eskicioglu, A., Litwin, L. (2001). Cryptography. IEEE Potentials, vol. 20, no. 1, pp. 36-38. doi: 10.1109/45.913211 Hinsley, F. H. (1993). The Influence of ULTRA in the Second World War. Retrieved from https://web.archive.org/web/20120706194507/http://www.cl.cam.ac.uk/research/security/Historical/hinsley.html Hinsley, F. H. Stripp, A. (1993). Codebreakers: The Inside Story of Bletchley Park. Oxford: Oxford University Press. Kidwell, P. (2007). Technology and Culture. 48(3), pp. 663-664. Retrieved March 9, 2017, from JSTOR database. Kozaczuk, W. (1984). Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two. Frederick, MD: University Publications of America. Paar, C., Pelzl, J. (2010). Understanding Cryptography. Dordrecht, London, New York: Springer-Verlag. Smart, N. (n.d.). Cryptography: An Introduction. Retrieved from http://www.cryptocellar.org/files/NP_Smart_Cryptography.pdf Smith, M. (2007) [1998]. Station X: The Codebreakers of Bletchley Park. London: Pan McMillan Ltd. The Ohio State University Fisher College of Business. (n.d.). An Introduction to Cryptography. Retrieved from https://fisher.osu.edu/~muhanna.1/pdf/crypto.pdf Villanueva, J. (2015). An Introduction to Stream Ciphers and Block Ciphers. Retrieved from http://www.jscape.com/blog/stream-cipher-vs-block-cipher Welchman, G. (2005). The Hut Six Story: Breaking the Enigma Codes. Cleobury Mortimer, England: MM Baldwin. Zwicke, A. (2003). An Introduction to Modern Cryptosystems. SANS Institute. Retrieved from https://www.giac.org/paper/gsec/2604/introduction-modern-cryptosystems/104482

Sunday, January 19, 2020

Music and Musicians in the Renaissance Essay examples -- Exploratory E

Music and Musicians in the Renaissance If music be the food of love, play on! ~ Orsino, Twelfth Night In the Elizabethan Era (1558-1603) and the Jacobean Era (1603-1625), there was a fondness for spectacle and pageantry. At court, trumpets and drums resounded to announce mealtimes; in town, these instruments were used by theatre troupes to herald upcoming performances (Renaissance & Baroque Society of Pittsburgh, 2003, and Folkerth, 2002). Music, then, is applied boldly and lavishly in everyday life and in drama, an imitation of life. Musical Instruments The major classes of musical instruments used in the High and Late Renaissance include plucked strings, bowed strings, brass, double reeds, other winds, keyboards, and percussions (McGee, 1985). Lutes, drums, and trumpets were often used, but the instruments that were especially popular during the Renaissance include the bass viol, treble viol, viola, violin, tenor sackbut, cornetto, bass sackbut, curtal, tenor shawm, bass recorder, and harpsichord (McGee, 1985). Instrumental Music From the Early Renaissance to the High Renaissance, there was a movement from vocal music to a combination of vocal and instrumental music (Brown, 1976). There are seven categories of instrumental music: 1) vocal music played by instruments, 2) settings of pre-existing melodies, 3) variation sets, 4) ricercars, fantasias, and canzonas, 5) preludes, preambles, and toccatas for solo instruments, 6) dance music, and 7) songs composed specifically for lute and solo voice (Brown, 1976). Italy dominated the stage for instrumental music at this time, and it was not until the last decades of the sixteenth century that English instrumental music became popular (Brow... ...cobean periods. Works Cited Brown, Howard M. Music in the Renaissance. Englewood Cliffs, New Jersey: Prentice-Hall, Inc., 1976. Folkerth, Wes. The Sound of Shakespeare. London: Routledge, 2002. McGee, Timothy J. Medieval and Renaissance Music: A Performer’s Guide. Toronto: University of Toronto Press, 1985. Novak, Elaine Adams. Staging Shakespearean Theatre. Cincinnati, Ohio: Betterway Books, 2000. Renaissance & Baroque Society of Pittsburgh. â€Å"Shakespeare’s Top 40†. Available: http://www.rbsp.org/current_season/shakespeare.php, March 2003. Shirley, Frances Ann. Shakespeare’s Use of Off-Stage Sounds. Lincoln: University of Nebraska Press, 1963. University of Victoria. â€Å"Elizabethan Court Musicians†. Available: http://web.uvic.ca/shakespeare/Library/SLTnoframes/literature/courtmusicians.html, date unavailable. Accessed : March 4, 2003.

Saturday, January 11, 2020

Investigate if small villages can become suburbanised over time, and what factors will affect this

Aim: In this piece of coursework, my aim is to investigate if small villages can become suburbanised over time, and what factors will affect this. For this investigation, we have chosen to look at Pirbright, a small village just outside of surrey. Hypothesis: Is Pirbright a Suburbanised Village? To prove the hypothesis I will need to find out: * Where is Pirbright located? * What is it like? * How has it changed over the years? * What are the reasons? * What are the consequences of these changes for the long-term residents, the businesses and the new comers? Methods Of Research: In order to find answers to these questions and to prove the hypothesis I used various methods of research these will be: Questionnaire – We made up our own questionnaires in groups of four. The reason we thought this would be a good idea was so that we could get opinions from people who have been living in Pirbright and learn more about these people. We surveyed 10 different people and we tried to ask various types of people such as pensioners, young students and adults. In order to do this we asked at different times of the day. Walk To Investigate Services And Shops – We walked around Pirbright to investigate the different types of services they had to offer. Walk To Investigate Land Use And Location – We also walked to and around Pirbright to investigate the uses of land and the layout of the village. Environmental Quality Survey – This was a survey that had already been prepared for us. This helped us to decide whether or not the village was an attractive place to live. We completed the survey in different parts of the village. Research – I will find out any other information from resources such as the Internet. What is a Suburbanised Village? A Suburbanised village is a village that people from nearby towns and cities have moved into, gradually changing the character of the village and making it more urbanised. A suburbanised village change its functions from being a rural agricultural village to being a suburb of a town. Suburbanised villages can sometimes also be called commuter settlements or dormitory towns, this is because the village is used by residents who live and stay there to travel to work in nearby towns or cities. Since the 1980's people have been moving out of major cities such as London, -Reading and Guildford to get away from things such as crime, pollution and traffic congestion in cities. This is called counter urbanisation. The characteristics of a suburbanised village are; * Housing becomes more expensive leaving local people not being able to afford them. We would expect to find new houses built for newcomers, as well as old farmhouses that have been modernised for rich city commuters. * The need for more houses and extra services is required to cater to the needs of the newer residents * There are more newcomers than original residents; this can cause social problems within the village. * Cars, noise and litter cause more pollution than before. * The village is expanded to house more residents. * More cars cause congestion. * The village is forced to change to become more modern; this can also result in it becoming damaged. * People move to rural villages that are commuting distance from their place of work, so a suburbanised village must have access to railway and motorway links. * Newcomers will shop in cities and out of town shopping centres, so we would not expect to find medium or high order shops. People move into villages for many different reasons, these are; * People find towns and cities to be polluted, unattractive and very congested. * Wealthy commuters can afford to buy bigger and more attractive houses in villages and since transport links have improved these people can still easily commute to work in the city. * Retired people prefer to enjoy they leisure time in a peaceful and quieter environment. * People find it to be safer in villages. * There are newer houses being built, these sell for cheaper than they do in cities and towns. How can location affect the sub urbanisation of a village? The location of a village can be affected by its location. If a village were located near a large city, it would be easier to make use of the services provided in the city. This would be useful because there will be more services in the city such as hospitals, large shopping centres or a wider ranger of schools. If a village were located far away from a city it would be harder for the village residents because they would have to do with the only services provided in the village as it would be hard to get to the city. This would be inconvenient because usually there are not many services in a village. If a village were located near good roads that lead into the city it would be easier for people to get to the city, there probably would be a bus or some sort of public transport that would lead into the city. If a village is isolated with poor transport links it would make access in and out of the village difficult. This not only means that if would be for village residents to get to a city but also that visitors would find the village hard to get to. If a village is located on hilly land it would be difficult to build new buildings whereas if the village was built on flat land it would be easier to improve the village with new buildings and services. Where is Pirbright? The village that we are studying is called ‘Pirbright' it is located in Surrey, southeast England (see map below). Pirbright is located near Guildford, Bracknell, Woking, Farnborough and Camberley. The roads that connect these towns to Pirbright are A322, A3214, A320 and A323. These roads are good for commuters because they can travel to and from work in different towns quite easily. If they do not have cars then there are good rail links into other close by towns. There is no train station in Pirbright however the closest one is in Basingstoke. It takes approximately one hour to travel from Pirbright into central London. From the map below I can see that Pirbright very close to London and also to other cities, where good jobs are available. The land that Pirbright is built on is mainly countryside and there are many woodlands and open fields in and around the area. The land is mainly greenery and some areas are quite steep. The land is fertile, which makes it good for farming. There are also good communications in Pirbright. Map 1: Southeast England What is Pirbright like? Pirbright is a very attractive, yet small village. The population is approximately 3644 people, this has changed drastically over the past hundred years when there was only a few hundred people living in Pirbright. It has a large green in the centre of the village (see picture 1). The grass is always short and well kept. There are no signs of vandalism or litter. Around the green there are a few phone boxes and three bus stops, one going towards Woking and the other two going towards Guildford. The bus stops are connections to Guilford, Woking and other surrounding towns. There are a few shops around the green as well; these include a newsagent, a butcher, an antique shop and two pubs; The White Hart and The Royal Oak. There is a large pond and a children's playground on the green as well. Pirbright formally contained a post office, which was then forced to shut down because of robbery. This shows that the crime rate in Pirbright has increased. A mobile library visits Pirbright once a week. Picture 1: views of the green The church in Pirbright is called St Michael's church (see picture 2) and is around the green. There is only one school in Pirbright, Pirbright County Primary. It is only a primary school for five to eleven year olds. This means that when children are ready for high school they will have to travel to a nearby city or town. Most children travel to Guildford and Woking, as these are the closest and easiest to town to get to. Picture 2: St Michael's church Many attractive houses surround the green (see picture 3). These houses are mainly built before the 1940s. The houses are bigger in comparison to the sizes of housing in London, and are also much cheaper. An average three-bedroom house would cost approximately à ¯Ã‚ ¿Ã‚ ½385,000. The houses have extra garden space, bigger drive ways and more space to build extensions because the houses are spread out from each other. Picture 3: Houses around the green Below is a land-use map, to show the services available in Pirbright, and the ages of the houses. People in Pirbright We visited Pirbright on a typical mid-week afternoon to find out about the types of people that live there, we found out this information by asking people to fill out a questionnaire that we had designed. These are the results we came back with. I also did some extra research to find out facts and figures of Pirbright. People's opinions on Pirbright WHAT LEISURE ACTIVITIES ARE THERE IN THE AREA Tennis Karate Golf Cricket Bowles Dance WHAT DO YOU LIKE ABOUT PIRBRIGHT? Quiet Friendly People Plenty For Children To Do Peaceful Area Countryside Good Community WHAT DO YOU DISLIKE ABOUT PIRBRIGHT? Does Not Have a Post Office Is Not Sociable Services and Shops WHAT SERVICES ARE USED IN THE AREA WHO DO THEY CATER FOR? Newsagent Everyone in the village, most people use the newsagent everyday. Pubs Used mainly by adults, as a place to relax. Antique Shop Used by the wealthy residents, once only a few times a year. Butcher Used to provide food for all residents, used once a week. Mobile Library Used by anyone that wants it. Public Transport Used mainly by the retirees and students travelling to high school. Public Park Used by everyone in the village. Village Hall Used for meetings and clubs etc. dance clubs. Comparing Pirbright in 1871 to Pirbright today From the two maps I can see that Pirbright has drastically changed over the past 30 years. There was much more open space in 1871 but now a lot of that land has been used to build things such as houses and other services. The area that Pirbright occupies has expanded; more houses are being built so the village has had to expand to cater for the extra people. The land use has changed from mainly being farmland to having lots of houses and other buildings built on it. From the map of 1871 I can see that there were only a few houses whereas most of Pirbright is covered by houses now. More services have been added in Pirbright for example there used to be only one pub in 1871 but another one has been built now. Overall Pirbright has grown over the years and the open land has been used to build houses on. Conclusion After analysing the statistics and information about Pirbright I have come to a conclusion that all the evidence shows that Pirbright has become a suburbanised village. In 1915, we would have expected people to have jobs such as farmers, woodcutters, small village owners, ground keepers for private estates, housemaids and stable workers. The sort of people that would want to live there now are upper-class people as they do not usually have to work, retired people as they do not have to work either and people whom do not want to live in London, but still be based near London. The facts that point to the conclusion that Pirbright has become suburbanised are: * The population has greatly increased over time and is continuing to do so. Shown by the census figures. * The village has become larger. Many of the old houses are in the centre of the village and the newer ones have been built on the outskirts. This proves that new houses are being built for commuters and other residents wishing to move to Pirbright. This is shown in the land use map. * Most residents are middle ages and are high-skilled professionals – this proves that they are commuters as Pirbright does not offer and high-skilled professions. This is shown in the data that I collected on the field trip. * The home of most residents are detached or semi-detached. This proves that they are expensive and can only be afforded by wealthy commuters. * Most village residents own their own homes or are currently buying. This shows that the average Pirbright resident can afford houses; this is because mainly commuters live in Pirbright. * More then half of the residents own their own car. This also proves that a lot of commuters live in Pirbright, as they need a car to travel to work. * Most residents take their car to work, not public transport. * Most of the residents have lived in the village for 30 to 40 years. * The village is gradually becoming more modernised. The newcomers are transforming the village. * There are no high order shops, meaning residents have to visit a town or city for shopping centres. * Houses are becoming more expensive. The value is increasing as more people want to live in Pirbright and wealthy people can afford them. All these facts that I have stated link back to my theory on suburbanised villages, Pirbright has successfully gained nearly all the characteristics of a suburbanised village. Pirbright has gone from being a unknown small hamlet, to becoming a modern and attractive growing villages used mainly by commuters and retired people. I have found the main reason people move from large towns and cities into Pirbright is because it is a quiet and peaceful area. The long term residence will live closer to the village centre and the newer residence will be living on the edge as this will be where the new houses will be built. Evaluation I feel that this piece of coursework has greatly widened my knowledge of suburbanised villages. I did not thoroughly understand it at the beginning however after undertaking the research about the changes in Pirbright I have come to understand how and why small villages change their function to become urbanised. I feel I have done well in this coursework as I did a lot of research and used many new ICT skills that I have leant. I could improve the coursework by getting a broader range on data, I visited Pirbright on a working day therefore I did not get enough information about residents who may have been at work that day. To improve this now I would visit Pirbright on a weekend and carry out my research then. However overall I believe I have created a good report on how and why Pirbright has become suburbanised.

Friday, January 3, 2020

Wise Tips Dating Single Moms Need to Know Before...

Wise Tips Dating Single Moms Need to Know Before Introducing the Kids to the New Guy Dating when you have children can be very exasperating. You dont only think about how to go on with the date, you also think about what is going to be good for the children. After all, it is no longer just about you and him alone. Its also whether or not the kids will be cool enough to like your guy and vice versa. It is often worth any single parents trouble to note what it is their children might be thinking about the entire dating process. But it is also not to say that a single parent should just put any hopes for a real romantic date to rest. At any rate, the idea of meeting someone else should not be crippled by the fact that you have had kids who†¦show more content†¦Slow down and do not make the mistake of forcing it out on the children. It is better to take it slow and be successful later than to make haste and fail afterwards. 2. Reassure your children. It is important to stress out to the children that they will only have one mom and one dad. No one needs to replace anyone. This creates a win-win situation for everyone. The children will slowly understand the role your new boyfriend will play in their lives and it should not include replacing their daddy. It is good enough if your children like your new boyfriend so much to even recognize him as their step dad and starts calling him daddy. Thats not so bad if that is what you want to achieve at the end of the day. But you might want to avoid further hassle by confusing your child eventually when things do not go in that direction. Just reassure your children about having one mom and one dad. 3. Do not expect. Consider this rule of thumb. You cant force anyone to like anyone. Asking your children to be nice or to like someone is definitely going to spoil everything you have planned in mind. Allow everyone to meet and form their own opinions. 4. Come in groups. You might want to avoid going for uptight and formal meetings. This could potentially dismantle any positive vibe that could exist if you go for friendly and less formal scenarios. Try some gimmicks like having some BBQ party or a pool party. Introduce him as a friend and give the children the chanceShow MoreRelatedEssay on Fall of Asclepius95354 Words   |  382 PagesThey clawed at each other just to get out of all the infested areas around the world. There was problem about fleeing from infested areas. Everywhere was infested. There was no where anyone could go without encountering the walking plague. You know that phrase War is Hell? Well... its dead wrong. War at least has some organization to it. What was faced in the last days... by last days I mean the last days of civilization not life; itself. What was faced was hell. Everyone went ape shit insaneRead MoreManaging Information Technology (7th Edition)239873 Words   |  960 Pageson the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO Read MoreProject Managment Case Studies214937 Words   |  860 Pagesof Business Administration Baldwin-Wallace College Berea, Ohio John Wiley Sons, Inc. This book is printed on acid-free paper. @ Copyright O 2006 by John Wiley Sons, Inc. All rights reserved. Published by John Wiley Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permittedRead MoreProject Mgmt296381 Words   |  1186 PagesEdition Erik W. Larson Oregon State University Clifford F. Gray Oregon State University PROJECT MANAGEMENT: THE MANAGERIAL PROCESS Published by McGraw-Hill/Irwin, a business unit of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY, 10020. Copyright  © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior writtenRead MoreMarketing Mistakes and Successes175322 Words   |  702 PagesDESIGN DIRECTOR SENIOR DESIGNER SENIOR MEDIA EDITOR George Hoffman Lise Johnson Carissa Doshi Dorothy Sinclair Matt Winslow Amy Scholz Carly DeCandia Alana Filipovich Jeof Vita Arthur Medina Allison Morris This book was set in 10/12 New Caledonia by Aptara ®, Inc. and printed and bound by Courier/Westford. The cover was printed by Courier/Westford. This book is printed on acid-free paper. Copyright  © 2009, 2006, 2004, 2001, 1998, 1995, 1992, 1989, 1986, 1981, 1976 John Wiley SonsRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages Organizational Behavior This page intentionally left blank Organizational Behavior EDITION 15 Stephen P. Robbins —San Diego State University Timothy A. Judge —University of Notre Dame i3iEi35Bj! Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services: