Back to Index Page

Part 2 The Search Report

Seach for three web pages on the topics of protocols


Web report 1.

http://www.cnr.colostate.edu/RES/rc/tes1.htm#Section1

Protocols and Models for Inventory, Monitoring, and Management

of Threatened and Endangered Plants

I chose this page because it sums up what protocols are about, there is a clear understanding of the objectives and methods to monitor and manage the threat to endangered plant species by agencies and management personnel looking after property, such as national parks and military land belonging to the United States Government .
The protocols are quite specific about the structure and goals but allow the agencies to adapt the methodology to suit the habitat and species.
Published by The College of Natural Resources at the Colorado State University so the authority of the page is assured and there is no obvious bias.
 

References.


Web report 2.

http://oac3.hsc.uth.tmc.edu/staff/snewton/tcp-tutorial/sec2.html
 

General description of the TCP/IP protocols


This page gives a general description of what TCP/IP is and describes the TCP/IP protocol and the different levels or “layers” more fully along with examples and diagram’s.
It is a tutorial for students at the Rutgers University and although it was published in 1994 only the detail of the protocol will have changed. The web page of the author S. E. Newton is no longer currant to check his/her authority but I assume it to be good and not bias.
I chose this site because it gives a really clear description of the protocol.
 

References.



Web report 3.

http://www.feinc.net/cs-proc.htm

Crime Scene Processing Protocol


I chose this page because it gives a methodical approach to the protocol, each step is set out in the order it is to be completed. It is written by M/Sgt Hayden B. Baldwin, Retired. Executive Director of the International Crime Scene Investigators Association, who as 30 years of experience of crime scene investigating. The page is aimed at crime scene technicians and gives guidance on each step of the protocol:  interview, examine, photograph, sketch and process. There may be some bias as these protocols are baste on one mans experience, someone else might approach the protocol differently.
 

References.



 

How the search was accomplished.


I used two search engines Yahoo and Google.
I noticed that although Yahoo is a subject based engine that is it groups sites into categories, it then uses Google to do the
keyword search (looks for a given word or phrase on a web page). So I could use Yahoo to search for the categories,
Internet, police etc. Google could then be used to define the search using keywords like "protocol and TCP/IP", then use the
boolean expressions (and, or, not) to narrow the search, for example: “Internet and protocol” then refine again once a phrase is not needed for example  “protocol not Internet”.
 
 

References.

Back to Index Page