Thursday, October 31, 2019
Islamic Insurance Law Dissertation Example | Topics and Well Written Essays - 15750 words
Islamic Insurance Law - Dissertation Example Conventional insurance has been a taboo for the Muslim world as the premium insurance companies offer, lack of correct knowledge by their customers and the way cost of damages has to be borne by some unconnected persons had hitherto been debated. Scholars have argued that the prevalent insurance system is not Shariah compliant as it involves uncertainty, gambling and riba (interest). Insurance companies take people's money and promise to give them back if a certain loss happens which involves a delay in the money dealing which makes it non-Islamic transaction. This means that 23% population of the world does not gel in the global finance system and gets no security in the case of any unforeseen damage. The growing socio-economic situation of the world has made it inevitable to drive a system which minimizes the risks but current interest-based insurance system is conflicting to the teachings of Shariah- the Islamic law. Takaful is the Islamic insurance system which has now taken its roots for more than two decades. It integrates the principles of Shariah with modern economics by mitigating the risks attached. Takaful industry is vibrant and growing on an enormous pace with a growth rate of 20%2. In the following dissertation, I have presented my research about Islamic insurance, how it works, its growing popularity and the need of its development Islamic as-well- as in non Islamic countries such as UK and Saudi Arabia. I have
Monday, October 28, 2019
The Impact of ICT on an Adult in Employment Essay Example for Free
The Impact of ICT on an Adult in Employment Essay My Dad needs his laptop in order to run his weekend disc jockey business. These needs include keeping up to date and accurate computerised accounts of booking forms, receipts and other references. He also keeps the CD collection stored on the Laptop. It is essential that he uses his laptop to run his disc jockey business. The above reasons are a good example of why he has a Laptop rather than a Desktop computer because he can use the laptop while he is on the move. The Intel Centrino mobile technology enables my Dad to connect to the Internet without any wires. He has also used the Laptop to produce a user friendly website to advertise our business on the web as well as in the Yellow Pages. He also makes regular price and administrative changes to the website in order to keep in competition with other local DJs around the area. My Dad also updates the website in design and layout, as well as including new pages and photos. This enables customers to browse the website to see our set up and how the business is run. They can then book at disco online and my Dad checks the e-mail to see if any bookings have been received. He will then send out the correct documentation to the customer to confirm the booking. Having the Laptop has affected his working style in many ways. Before he didnt have a laptop computer, his bookings were hand written and kept in a folder. This meant that any record could have been lost or misplaced quite easily. Without the laptop computer, our advertising was limited to the Yellow Pages and leaflets only. Now, we can advertise over the net, enabling customers to see what theyre getting and booking confidentially online. Also, the cataloguing system of our CD collection was handwritten, and searching for requests was a tough task. Now, the collection is computerised and in alphabetical order. The Laptop computer meets my Dads needs well for a number of reasons. For example, it has dramatically changed his working style and the way he goes about his work. Also, he can now order CDs and disco equipment online from our Walsall and Birmingham based stockists. He can also order online motor and car electrical parts from the wholesalers, which is situated in Cannock. He also orders from other stockists around the country. It is essential that my Dad needs Sky+ because he comes home from a stressful day at work to relax in front of the television. The ordinary terrestrial television didnt suit his needs and therefore, we had Sky + installed. This is a service that allows him to record programmes while watching another. It also enables the viewer to pause, fast forward and rewind live television. As he is a busy person, he doesnt have the time to go the shops. As this service is interactive, he can order many items off the digital shopping channels, like QVC, Ideal World, Bid TV and Price Drop TV. He also books holidays off the Sky TV Travel Shop and FTN, formally Thomas Cook TV. Also, a new interactive service is coming to all Sky viewers, where they can buy groceries and everyday items from their local supermarket and have it delivered directly their house. As he has two jobs, he is a very busy person and needs to shop in the least time consuming way. The interactive and shopping channels on the digital service is an ideal way of shopping quickly and in the comfort of his own home. Sky+ meets my Dads needs well for a number of reasons. For example, when he works over, we record his favourite programmes, which he can watch when he gets home. Also, he can pause any programme while he is preparing any food or drink or if he needs the toilet. The interactive service also helps him, as he doesnt go to the shops that regularly, he can buy off the shopping channels. The majority of his purchased items arrive in good condition, but in some cases, he has had to send some of the items back to the suppliers due to damage of wrong item being sent out to him. He has also has a case where the item got sent to the wrong address and another where the item got lost in the post. My Dads phone is the current smart phone brought to you by Nokia. It has a 1-mega-pixel camera, which has a built in 4x digital zoom. These photos are stored on to the memory card and can be printed off at any Kodak Kiosk. Above all, it has a video recorder, which can record for as long as you wish. The phone also contains a built in photo and video editing package, so you can delete any unnecessary parts of your video or photo. It has an 8-mega-byte internal memory with additional add-on memory via the upgradeable memory cards you can buy at any electrical retailer. It also has Bluetooth technology, an MP3 player and the phone can synchronise with your computer via the supplied USB cable. With this cable, you can download upgrade applications for your phone. You can also download pictures, logos, videos and ringtones. Additional add-ons are available from many phone and electrical retailers to enhance the capabilities of this Nokia smart phone. My Dad needs his mobile phone for many reasons. For example, as he is a mobile DJ and is away from home due to engineering contracts, it is essential that he uses his mobile phone in order to contact friends and family via voice calling or text messaging. The above methods also enable friends and family to contact him. He also uses it to play games on it and download additional software upgrades, MP3 files, videos, pictures, games and ringtones. This enables him to keep his phone up to date with other models. His phone also has an Infra-red port, which he can challenge friends, family or other people to a game of his or their choice depending on whose phone it is. The phone also has Bluetooth wireless technology, which enables him to send any data to other Bluetooth users at high speeds, which is formally known as Quickshare. You can buy many Bluetooth accessories for the Nokia 7610. For example, my Dad has purchased a Jabra BT800 Bluetooth headset. He has brought this so he can make and receive call while he is driving. He has also brought a Hewlett Packard Bluetooth Dongle, which enables him to download additional software upgrades, MP3 files, videos, pictures, games and ringtones from his laptop. However, to enable the above devices to work, you must connect the device to the mobile phone, and perform a non-authenticity activity, which enables the two devices to connect automatically. My Dads mobile phone meets his needs well in many ways. For example, he can use the phone while he is on the go, very handy and useful to contact engineering suppliers while he is out on contract. Also, he can receive calls from potential customers who want a disco, and my Dad can give them a price of the job and send the a booking form to confirm the bookings. Most of all, he can contact friends and family, or vice versa, to see how things are going.
Saturday, October 26, 2019
Concepts of Computer Networking
Concepts of Computer Networking CHAPTER 1: NETWORKING CONCEPTS NETWORKING BASICS: At its most elementary level, a computer network consists of two computers connected to each other by a cable that allows them to share data. All computer networking, no matter how sophisticated stems from that simple system. While the idea of connecting two computers by a cable may not seem extraordinary, inretrospect it has proven to be a major achievement in communications. Computer networking arose as an answer to the need to share data in a timely fashion. Personal computers are powerful tools that can process and manipulate large amounts of data quickly, but they do not allow users to share that data efficiently. Before networks, users needed either to print out documents or copy document files to a disk for others to edit or use them. If others made changes tothe document, there was no easy way to merge the changes. This was, and still is, known as working in a stand-alone environment. TYPES OF NETWORKS: Computer networks can be categorized in the following types. LOCAL AREA NETWORK (LAN): A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet . The most common type of local area network is an Ethernet LAN. The smallest home LAN can have exactly two computers; a large LAN can accommodate many thousands of computers. Many LANs are divided into logical groups called subnets. METROPOLITAN AREA NETWORK (MAN): MAN stands for metropolitan area network .It is a network of devices within an area of one to ten kilometers or with in a city. It may be a single network such as a cable television network or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN to LAN as well as device to device. WIDE AREA NETWORK (WAN): A WAN stand for wide area network .It is spread through out the world. A WAN that is wholly owned and used by a single company is often referred to as an enterprise network. It can connect computers and other devices on opposite sides of the world. A WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet. INTRANET: Anintranetis a privatecomputer networkthat usesInternet Protocoltechnologies to securely share any part of an organizations information or operational systems within that organization. The term is used in contrast tointernet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internalwebsite, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. EXTRANET: Anextranetis a private network that usesInternet protocols,networkconnectivity. An extranet can be viewed as part of a companysintranetthat is extended to users outside the company, usually via theInternet. It has also been described as a state of mind in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast,business-to-consumer(B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. INTERNETWORK: An Internetwork is a collection of two or more LANs connected by WANs. Internworks are referred to interchangeably as data networks or simply networks. The most popular internetwork is the Internet which is open to public. COMPONENTS OF NETWORK: A data communication system has two main components:- HARDWARE COMPONENTS: Devices and media are the physical elements or hardware of the network Hradware is often the visible components of the network platform such as a laptop, a PC or swtich etc used to connect the devices. Ocassionally some components might not be so visible. DEVICES: Devices of the network can be of two types that are the end devices and the intermediary devices, we explain both the types:- END USER DEVICES: An end use device refers to a piece of equipment that is either the ousce or the destination of a message on a network. Network users usaully only see or touch an end device, which is most often a computer. Another can generic term for an end device that sends or receives messages is a host. E.g host and end devices are Printers, Computers, Scanners, Webcams etc. INTERMEDIARY DEVICES: Intermediary devices connect the indivisual hosts to the network or can connect multiple networks to form an internetwork. Intermediary devices are not all the same. Some work inside the LAN to perfom switching functions and others help route messages between networks. Example of intermediary devices are Switches, Hubs and Routers etc. NETWORK MEDIA: Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. The three main types of media in use in a network are: COPPER: A twisted pair cable usually used as a medium inside a LAN environment. FIBEROPTICS: Made up of glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. WIRELESS: It connects local users through air using electromagnetic waves. SOFTWARE COMPONENTS: Software components can be divided in to two parts, services and processes. SERVICES: A network service provide information in responce to a request. Services include many of the common netowrk applications people use every day, like e-mail hosting services and web hosting services. For an instance we can take example of YAHOO enterprise, they provide mail services as well as web services, there are a number of companies offering these kind of services. PROCESSES: Processes provide the funtionality that directs and moves the messages through the network. Processes are less obvious to us ut are critical to the opeation of networks. For example viewing a webpage invokes one network process, clicking on a hyperlink causes a web browser to communicate with a web server, in the same way many network processes can take place at the same time. NETWORK TOPOLOGIES: Topology of a network is the geometrical representation of the relationship of all the links and linking devices to one another. PHYSICAL TOPOLOGIES: There are four basic physical topologies possible mesh, star, bus, and ring. MESH TOPOLOGY: In a mesh topology every device has a dedicated point to point connection to every other device .A fully connected mesh network therefore has n(n-1)/2 physical channels to link n devices . STAR TOPOLOGY: In star topology each device has a dedicated point to point connection only to a central controller usually called a hub . The devices are not directly connected to each other .Unlike a mesh topology ,a star topology does not allow direct traffic between devices the controller acts as an exchange : if one device wants to send data to another it sends the data to the controller which then relays the data to the other connected device. BUS TOPOLOGY: A bus topology on the other hand is multi point one long cable acts as a back bone to link all the devices in a network nodes are connected to the bus cable by drop lines and taps a drop line is a connection running between the devices and the main cable a tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. RING TOPOLOGY: In a ring topology each device has a dedicated point to point connection only with the two devices on either side of it . A signal is passed along the ring in one direction from device to device until it reaches to its destination protocols. LOGICAL TOPOLOGIES: The Logical topology defines how the systems communicate across the physical topologies. There are two main types of logical topologies: SHARED MEDIA TOPOLOGY: In a shared media topology, all the systems have the ability to access the physical layout whenever they need it. The main advantage in a shared media topology is that the systems have unrestricted access to the physical media. Of course, the main disadvantage to this topology is collisions. If two systems send information out on the wire at the same time, the packets collide and kill both packets. Ethernet is an example of a shared media topology. TOKEN BASED TOPOLOGY: The token-based topology works by using a token to provide access to the physical media. In a token-based network, there is a token that travels around the network. When a system needs to send out packets, it grabs the token off of the wire, attaches it to the packets that are sent, and sends it back out on the wire. As the token travels around the network, each system examines the token. When the packets arrive at the destination systems, those systems copy the information off of the wire and the token continues its journey until it gets back to the sender. When the sender receives the token back, it pulls the token off of the wire and sends out a new empty token to be used by the next machine. PROTOCOLS: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard. NETWORK PROTOCOLS: For devices to communicate over the network, they must follow different protocols that perform the many tasks to be completed. The protocols define the following: The format of the message The way intermediary dvices share information about the path to the destination The method to handle update messages between intermediary devices The process to initiate and terminate communications between hosts INTERACTION OF PROTOCOLS: Interaction between protocols can be clearly understood by a simple example, the way that a web server and a web client interacts. HTTP defines the formatting and content of the requests and responses exchanged between the client and server. Both the client and server implements HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the message are transported between the client and server. TCP is the transport protocol that divides the HTTP messages in to smaller pieces to be sent to the destination client, it is also responsible for controlling the size and rate at which messages are exchanged between the client and the server. Another protocol called IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and selecting the best path to the destination host. TECHNOLOGY INDEPENDENT PROTOCOLS: Protocols that guide the network data are not dependent on any specific technology to carry out the task. Protocols describe what must be done to communicate, not how the task is to be completed.This is the reason that enables different kind of devices such as telephones and computers to use the same network infrasturcture to communicate. PROTOCOLS AND REFRENCE MODELS: Networking professionals use two networking models to comminicate within the industry, they are protocol models and reference models. Both were created in the 1970s. A protocol model is a model that closely matches the structure of a particular protocol suite. The hierarhical set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols with in the protocol suite. A refrence model provides a common referecen for maintaining the consistency within alkl types ofn etwork protocols and services. The primary function of a refercen model is to aid in clearer understanding of the functions and process involved. The OPEN SYSTEMS INERCONNECTION (OSI) the most well known reference model. OSI MODEL: In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. APPLICATION LAYER: The topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference models application layer on the receiving computer. PRESENTATION LAYER: The presentation layer, defines the format used to exchange data among networked computers. Think of it as the networks translator. When computers from dissimilar systems need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computers application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. SESSION LAYER: The session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. TRANSPORT LAYER: The transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it. NETWORK LAYER: The network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. DATA LINK LAYER: The data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. The electrical representation of the data is known to this layer only. PHYSICAL LAYER: The bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers. TCP/IP MODEL: The TCP/IP protocol does not exactly match the OSI reference model. Instead of seven layers, it uses only four. Commonly referred to as the Internet Protocol Suite, TCP/IP is broken into the following four layers: NETWORK ACCESS: Network access layer communicates directly with the network. It provides the interface between the network architecture (such as token ring, Ethernet) and the Internet layer. INTERNET: The Internet layer, corresponding to the network layer of the OSI reference model, uses several protocols for routing and delivering packets. Router are protocol dependent, they function at this layer of the model and are used to forward packets from one network or segment to another. Several protocols work within the Internet layer. TRANSPORT: The transport layer, corresponding to the transport layer of the OSI reference model, is responsible for establishing and maintaining end-to-end communication between two hosts. The transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also handles retransmissions of packets. The transport layer can use either TCP or User Datagram Protocol (UDP) protocols depending on the requirements of the transmission. APPLICATION: Corresponding to the session, presentation, and application layers of the OSI reference model, the application layer connects applications to the network. It contains all the higher-level protocols. COMPARISON BETWEEN OSI MODEL AND TCP/IP MODEL: The OSI and TCP/IP reference models have much in common. Both are based on the concept of a stack of independent protocols. Also, the functionality of the layers is roughly similar. For example, in both models the layers up through and including the transport layer are there to provide an end-to-end, network-independent transport service to processes wishing to communicate. These layers form the transport provider. Again in both models, the layers above transport are application-oriented users of the transport service. The differece between OSI and TCP/IP model is that the Application layer of TCP/IP model operates at the upper three layers of OSI model, they are application layer, presentation layer and session layer, also the Network layer of TCP/IP model works at the lower two layers of OSI model that are, data link layer and physical layer. TCP/IP PROTOCOL The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexibility and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services. SOME IMPORTANT TCP/IP PROTOCOLS: INTERNET PROTOCOLv4 (IP): Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a header to the packet so that it can be routed through the network using dynamic routing tables. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for time to live). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network. IPV4 HEADER: The key fields of the ipv4 are as follows:- SOURCE ADDRESS: Senders ip address DESTINATION ADDRESS : Receivers ip address TIME TO LIVE (TTL): Numeber of hops a packet must traverse before getting discarded. TYPE OF SERVICE (TOS): It is for a sending host to specify a preference for how the datagram would be handled as it makes its way through an internet. PROTOCOL: This field defines the protocol used in the data portion of the IP datagram. FLAG AND FRAGMENT: A three-bit field follows and is used to control or identify fragments VERSION: Protocol version. INTERNET HEADER LENGTH: The second field (4 bits) is the Internet Header Length (IHL) telling the number of 32-bitwordsin the header. PACKET LENGTH: This 16-bit field defines the entire datagram size, including header and data, in bytes. ADDRESS RESOLUTION PROTOCOL (ARP): Before an IP packet can be forwarded to another host, the hardware address of the receiving machine must be known. The ARP determines hardware addresses (MAC addresses) that correspond to an IP address. If ARP does not contain the address in its own cache, it broadcasts a request for the address. All hosts on the network process the request and, if they contain a map to that address, pass the address back to the requestor. The packet is then sent on its way, and the new information address is stored in the routers cache. HEADER: Some important fields of ARPs header are as follows:- HARDWARE TYPE: This field specifies the Link Layer protocol type PROTOCOL TYPE: This field specifies the upper layer protocol for which the ARP request is intended HARDWARE LENGTH: Length of a hardware address PROTOCOL LENGTH: Length (in octets) of alogical addressof the specified protocol OPERATION: Specifies the operation that the sender is performing SENDER HARDWARE ADDRESS: Hardware (MAC) address of the sender. SENDER PROTOCOL ADDRESS: Upper layer protocol address of the sender. TARGET PROTOCOL ADDRESS: Hardware address of the intended receiver. TARGET HARDWARE ADDRESS: Upper layer protocol address of the intended receiver. TRANSMISSION CONTROL (TCP): The TCP is responsible for the reliable transmission of data from one node to another. It is a connection-based protocol and establishes a connection (also known as a session, virtual circuit, or link), between two machines before any data is transferred. To establish a reliable connection, TCP uses what is known as a three-way handshake. This establishes the port number and beginning sequence numbers from both sides of the transmission. HEADER: Following are some important fields of TCP header: SOURCE PORT: Identifies the sending port. DESTINATION PORT: Identifies the receiving port. SEQUENCE NUMBER: This is the initial sequence number. ACKNOWLEDGEMENT NUMBER: A 32 bit acknowledgement number. DATA OFFSET: Specifies the size of the TCP header in 32-bit words. USER DATAGRAM PROTOCOL (UDP): A connectionless protocol, the UDP, is responsible for end-to-end transmission of data. Unlike TCP, however, UDP does not establish a connection. It attempts to send the data and to verify that the destination host actually receives the data. UDP is best used to send small amounts of data for which guaranteed delivery is not required. While UDP uses ports, they are different from TCP ports; therefore, they can use the same numbers without interference. HEADER: Some key headers of UDP are as follows: SOURCE PORT: This field identifies the sending port. DESITNATION PORT: This field indentifies the receiving port LENGTH: A 16-bit field that specifies the length in bytes of the entire datagram CHECKSUM: The 16-bitchecksumfield is used for error-checking of the headeranddata. NETWORK ADDRESSING: There are millions of computers in use on the web and billions of messages traversing networks at any given time, so prper addresing is essential to make sure that the sent messages arrives intact at the proper destination. Addressing of data happens in three different layers of the OSI model. The PDU at each layer adds address information for use by the peer layer at the destination. CHAPTER 2: ROUTING Fundamentals ROUTING: Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data networks such as the Internet, and transportation networks. Our main concern will be routing in packet switched networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes; typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers with multiple network cards can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the routers memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths. TYPES OF ROUTING: STATIC ROUTING: Static routing is manually adding routes to the routing table, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes make sense and can even improve the performance of a network. Some of these include stub networks and default routes. DYNAMIC ROUTING: Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. Dynamic routing uses routing protocols for routing information automatically over the internertwork. STATIC VS DYNAMIC ROUTING: Before going further we need to examine the difference between static and dynamic routing. ROUTING PROTOCOLS: Before going in to the details of dynamic routing we must understand what are routing protocols. Routing protocols implement algorithms that tell routers the best paths through internetworks. Routing protocols provide the layer 3 network state update. In short, routing protocols route datagrams through a network. Routing is a layer 3 function, thus, routing and routed protocols are network-layer entities. Routing tables on the layer 3 router are populated by information from routing protocols. A routed protocol will enter an interface on a router, be placed in a memory buffer, then it will be forwarded out to an interface based on information in the routing table TYPES OF DYNAMIC ROUTING PROTOCOLS: Dynamic routing protocols can be divided in to the following broad catagories. CLASSFUL AND CLASSLESS ROUTING PROTOCOLS: CLASSFUL ROUTING PROTOCOLS: Classful routing protocols do not send subnet mask information in routing updates. This was at the time when network address were allocated on the basis of classes i.e A, B or C. These routing prtocols did not include subnet mask in routing update because the the network mask was determined by first octet of the network address. Classfull routing protocols can still be used in todays networks but they cannot be used in all situations because they do not include the subnet mask. Classfull routing protocols cannot be used where the network is subnetted using more then one subnet mask, in other words we can say that classfull routing protocols do not support variable-lenght subnet mask (VLSM). In the following figure the classfull version of the network support similar subnet masks i.e all /24. CLASSLESS ROUTING PROTOCOLS:
Thursday, October 24, 2019
Daniel Quinnââ¬â¢s Ishmael - Horrifying :: Quinn Ishmael Essays
Ishmael: Horrifying Among the people of your culture, which want to destroy the world? Which want to destroy it? As far as I know, no one specifically wants to destroy the world. And yet you do destroy it, each of you. Each of you contribute daily to the destruction of the world. This truth was stated by a gorilla named Ishmael who, through his experiences of being taken from the jungle, placed in a zoo in the 1930's, put in a menagerie, and bought by a private owner named Mr. Sokolow, had all the time in a world to think about the world around him. Daniel Quinn writes about the horrifying realities of our culture in a book called Ishmael, by stepping outside of the world as we know it and describing what he sees through a talking gorilla. Behind the bars of his cage, he was able to take a look at our culture as an outsider, to see things that we never could. This sagacious, passive, and extremely patient primate wanted to share this knowledge to others so as to stop man from destroying the world. So, he placed an ad in the paper and caught the attention of an eager student, the narrator, who was willing to save the world. Desperately confused, this everyday writer tries to step out of his culture and experience a whole new world. Day after day, this half ton gorilla, Ishmael, opens the narrators eyes and teaches him "how things came to be." He starts out by dividing man into two different cultures. He calls the people of our culture takers and the people of all other cultures leavers. Each culture has a story. In Ishmael's teachings, a story is a scenario interrelating man, the world, and the gods. This story is enacted by the people in a culture. In other words, people in a culture live as to make the story a reality. The first story Ishmael tells is that of the takers. Every story is based on a premise. The taker premise is that the world was made for man. If the world is made for man, then it belongs to him, and man can do what ever he pleases with it. It's our environment, our seas, our solar system, etc. The world is a support system for man. It is only a machine designed to produce and sustain human life.
Wednesday, October 23, 2019
Several interesting facts
Remarkable English poet T. S. Eliot hardly could imagine that his poems for children ââ¬Å"Old Possumââ¬â¢s Book of Practical Catsâ⬠will be known to millions of inhabitants of different continents as a basis of fantastic by its beauty classical musical ââ¬Å"Catsâ⬠(music of well-known composer A. L. Webber).Musical ââ¬Å"Catsâ⬠was so successful, that broke all records of theatrical longevity in Broadway and London. For the first time ââ¬Å"Catsâ⬠were presented to spectators in New London Theater in West-End (May 11, 1981) and already 8 years later they held the first record: musical became the most ââ¬Å"long-playingâ⬠performance in the history of British Theater. Musical is staged in London with unchangeable success after more then 8000 performances.In the long history of Broadway ââ¬Å"Catsâ⬠ââ¬â the only musical which was put on stage with unchangeable success for 18 years. From October 7 1982 this enchanting sight was presented for 7485 times. History of musical strikes with figures: musical was staged for more then 48 million people in 26 countries and 300 cities and profit from musical reached almost 2 milliards dollars.Show was presented at 10 languages, but always by its original name. It is interesting that questioning which made Mexican producers before start of the musical, stated that for spectators of any country word ââ¬Å"Catsâ⬠doesnââ¬â¢t need translation. Musical ââ¬Å"Catsâ⬠received the most prestigious theatrical awards: Oliver, Evening Standard, 7 Tony awards, Drama Desk, 7 national awards of Japan, 7 awards of Canada, etc.Why is musical ââ¬Å"Catsâ⬠so attractive for millions of people with different tastes and predilections? What makes spectators, who saw the musical once, to see it again and over again? What is ââ¬Å"Catsâ⬠?A bit of history.Actually, text and music plays great role in triumphal success of musical. In 1931 future Nobel Prize laureate T. S. Eliot started to write fairy-tale poems about cats for his small godsons. Old Possum, as he was called by his friends, managed to invent unusual names for cats and dogs of his friends. The book was published in 1939 and from those times it remains a favourite book for children and grown-ups, being re-edited in different languages and different countries.The idea to compose music for those poems came to composer Webber already in 1977. Webber liked those wonderful stories about cats, written in amazingly musical words, from his childhood, and composed several musical compositions for his friends. Some of them were presented with success during musical festival in Sidmonton, where Valerie Eliot got acquainted with Webber.She had shown to him unpublished poems from the book, particularly, poem about Grizabelle, which stroke Webber by dramatic image (Elliot didnââ¬â¢t include it into his book, because he considered it too sad for small children). In such a way idea to create a big musical- theatrical composition about fantastic world of cats, which relations remind human world of passions and contradictions, appeared.Phenomena of ââ¬Å"Catsâ⬠consists of many components, main of which, except of wonderful lyrics and charming music, are professionalism and talent of director, producer, choreographer and designer. Famous producer Cameron Mackintosh liked the idea of Webber and musical was created in extremely short terms ââ¬â 15 months.Mackintosh remembers several dramatic moments of that period: how prima of musical Judi Dench got trauma before the opening night; how long and without success they tried to find sponsors; how difficult was creation of mysterious enchanting spectacle from primary chaos.Trevor Nunn tells that he likes poems of Elliot ââ¬â childish poems for grown-ups, where in descriptions of definite cats you can find satirical gentle hints to their owners and to the whole English society in common. Cats are similar to us, people. They charm us, maybe because they help to understand us in their mysterious way.Book of Eliot is a collection of separate small poems, which are not connected. People, who created musical, faced a problem to unite those poems into one whole and not to loose the original idea of author. The figure of Grizabelle became the main figure of musical ââ¬â serious, touching and a bit tragic.Famous aria of Grizabelle ââ¬Å"Memoryâ⬠which is known also to those who never visited ââ¬Å"Catsâ⬠, during first 6 months only more then 7000 times was heard over British radio, and in American radio more then 1 million times. Besides, to listen to the aria 1 million times, youââ¬â¢ll need 5 years. ââ¬Å"Memoryâ⬠was recorder 600 times by more then 150 singers, and Barbra Streisand and Johnny Mathis are among those singers; Placido Domingo also sang in together with Natalie Cole during his world concert tour.Difficult make-up, shaggy wigs and tails create fantastic gallery of actors, and each of actors has his own character. Colored skin-tight costumes donââ¬â¢t bother motion, and it is very important for such choreography. Unbelievable plastics strikes as well as easiness of motion, but this is a result of many hours of rehearsals. The next difficult task was creation of scenic stage.Designer John Napier changed the hall into ââ¬Å"a big playground for catsâ⬠, which intrigues spectators before the musical starts. Youââ¬â¢ll not find here usual division of scene and spectatorââ¬â¢s rows. To create catsââ¬â¢ world Napier changed hall into a city scrap-heap, where all objects correspond to size of cats-actors (it means, they are several times bigger their own normal size). Not only in the stage, but also in the hall huge cans and tins, ragged tires, rusty bicycle wheels and kettles, spoiled shoes, etc (besides, quantity of objects is 2500 pieces!) are thrown in ââ¬Å"picturesqueâ⬠disorder.Over a long period of time inscription on a playbill o f Broadway theater Winter Garden said: ââ¬Å"Cats ââ¬â now and forever!â⬠. ââ¬Å"Catsâ⬠left Broadway, earned millions of dollars and won hundred thousands of spectatorsââ¬â¢ hearts all over the world. ââ¬Å"Catsâ⬠is an exciting combination of mystery, magic, poetry and dance ââ¬â continue their triumphal procession over the worlds, winning more and more fans after each stage. ââ¬Å"Catsâ⬠is a delightful, admirable, glorious, charming, captivating, killing, delectable musical ââ¬â a real masterpiece. It is the best musical which I managed to see in this genre. ââ¬Å"Catsâ⬠ââ¬â forever!
Tuesday, October 22, 2019
Raves essays
Raves essays El caso Country y la cultura rave en venezuela Carlos Alberto Ayala Galavà s carnet # 60340 7/11/00 Basicamente un rave es un lugar, o mejor dicho, una fiesta; donde generalmente asisten todo tipo de sujetos, desde 50 hasta 25.000 personas, se escucha mà ºsica electrnica hasta despus del amanecer. Son fiestas donde la gente se dirige a ser quien realmente es y todos son aceptados como lo que verdaderamente son. En un rave se puede llevar a cabo la actividad que sea placentera para cada quien, como hablar, bailar, sentarse, dormir, etc. Un rave no se puede definir, debido a que la escena cambia de paà s en paà s, de ciudad en ciudad e incluso de persona en persona; todo depende de la mà ºsica, el lugar y el pà ºblico; lo que siempre se mantiene es el lema de paz, amor, unidad y respeto. La à ºnica forma de expresar la filosofà a de la cultura rave en una palabra es PLUR. Es la abreviacin de Peace, Love, Unity and Respect (Paz, Amor, Unidad y Respeto). Es un peque Paz: La razn por la cual a los ravers nos gusta la mà ºsica que escuchamos y nos divierte la forma en la que bailamos, es porque nos ayuda a alcanzar un estado de paz interior en cada uno de nosotros. Ser capaz de bailar de esa manera nos devuelve a la edad de cuatro abamos llenos de ego y libertad, antes de que la conciencia se apoderara de nuestros actos. Amor: El amor est estrechamente relacionado con la paz, debido a la paz interna de cada individuo, existe un sentimiento de aprecio y admiracin hacia todas y cada una de las personas presentes en el recinto donde se lleva a cabo el evento. Por ejemplo, en el momento que te acercas a un extra bebiendo agua de una botella y el te ve ban sera sonreir y ofrecer...
Monday, October 21, 2019
Facts About the Japanese Attack on Pearl Harbor
Facts About the Japanese Attack on Pearl Harbor In the early morning of Dec. 7, 1941, the U.S. naval base at Pearl Harbor, Hawaii, was attacked by the Japanese military. At the time, Japans military leaders thought the attack would neutralize American forces, allowing Japan to dominate the Asia Pacific region. Instead, the deadly strike drew the U.S. into World War II, making it a truly global conflict. These are the most important facts that should be recalled about this historical event. What Is Pearl Harbor? Pearl Harbor is a natural deepwater naval port on the Hawaiian island of Oahu, located just west of Honolulu. At the time of the attack, Hawaii was an American territory, and the military base at Pearl Harbor was home to the U.S. Navys Pacific Fleet.à U.S.-Japan Relations Japan had embarked on an aggressive campaign of military expansion in Asia, beginning with its invasion of Manchuria (modern-day Korea) in 1931. As the decade progressed, the Japanese military pushed into China and French Indochina (Vietnam) and rapidly built up its armed forces. By the summer of 1941, the U.S. had cut off most trade with Japan to protest that nations belligerence, and diplomatic relations between the two nations were very tense. Negotiations that November between the U.S. and Japan went nowhere. Lead-Up to the Attack The Japanese military began laying plans to attack Pearl Harbor as early as January 1941. Although it was Japaneseà Admiral Isoroku Yamamotoà who initiated the plans for the attackà onà Pearl Harbor, Commander Minoru Genda was the plans chief architect. The Japanese used theà code nameà Operation Hawaii for the attack. This later changed to Operation Z. Six aircraft carriers left Japan for Hawaii on Nov. 26, carrying a total of 408 fighter craft, joining five midget submarines that had departed a day earlier. Japans military planners specifically chose to attack on a Sunday because they believed Americans would be more relaxed and thus less alert on a weekend. In the hours before the attack, the Japanese attack force stationed itself approximately 230 miles north of Oahu. The Japanese Strike At 7:55 a.m. on Sunday, Dec. 7, the first wave of Japanese fighter planes struck; the second wave of attackers would come 45 minutes later. In a little under two hours, 2,335 U.S. servicemen were killed and 1,143 were wounded. Sixty-eight civilians were also killed and 35 were wounded. The Japanese lost 65 men, with an additional soldier being captured. The Japanese had two major objectives: Sink Americas aircraft carriers and destroy its fleet of fighter planes. By chance, all three U.S. aircraft carriers were out to sea. Instead, the Japanese focused on the Navys eight battleships at Pearl Harbor, all of which were named after American states: Arizona, California, Maryland, Nevada, Oklahoma, Pennsylvania, Tennessee, and West Virginia. Japan also targeted nearby Army airfields at Hickam Field, Wheeler Field, Bellows Field, Ewa Field, Schoefield Barracks, and Kaneohe Naval Air Station. Many of the U.S. airplanes were lined up outside,à along with the airstrips, wingtip to wingtip, in order to avoid sabotage. Unfortunately, that made them easy targets for the Japanese attackers. Caught unawares, U.S. troops and commanders scrambled to get planes in the air and ships out of the harbor, but they were able to muster only a feeble defense, largely from the ground. The Aftermath All eight U.S. battleships were either sunk or damaged during the attack. Amazingly, all but two (the USS Arizonaà and the USS Oklahoma) were eventually able to return to active duty. The USS Arizonaà exploded when a bomb breached its forward magazine (the ammunition room). Approximately 1,100 U.S. servicemen died on board. After being torpedoed, theà USS Oklahomaà listed so badly that it turned upside down. During the attack, theà USS Nevadaà left its berth in Battleship Row and tried to make it to the harbor entrance. After being repeatedly attacked on its way, theà USS Nevadaà beached itself. To aid their airplanes, the Japanese sent in five midget subs to help target the battleships. The Americans sunk four of the midget subs and captured the fifth. In all, nearly 20 American naval vessels and about 300 aircraft were damaged or destroyed in the attack. The U.S. Declares War The day following the attack on Pearl Harbor, U.S. President Franklin D. Roosevelt addressed a joint session of Congress, seeking a declaration of war against Japan. In what would become one of his most memorable speeches, Roosevelt declared that Dec. 7, 1941, would be a date that will live in infamy.à Only one legislator, Rep. Jeanette Rankin of Montana, voted against the declaration of war. On Dec. 8, Japan officially declared war against the U.S., and three days later, Germany followed suit. World War II had begun.
Sunday, October 20, 2019
Abuse vs Discipline Essay Example
Abuse vs Discipline Essay Example Abuse vs Discipline Paper Abuse vs Discipline Paper Blake Moss Abuse Versus Discipline A mother spanks her child in a public parking lot. While a nearby citizen watches in horror and begins to dial 911. Is this wrong? Does the mother have authority to do this to her own child? Who gets to decide how the mother disciplines her child? Why here? These are the questions that come across the mind of todays society. Most people would agree that the child did something ââ¬Å"wrong,â⬠but opinion collide on how the mother should discipline the child. Parents from generations ago would not have thought twice about this incident. In todays era, as technology has progressed so has the ideas of child abuse and discipline. What is the difference between child abuse vs. child discipline? Then Versus Now Disciplining children in the 1950s has been seen as strict, harsh and oppressive . In fact, children were often meant to be seen but not heard. Back then , if a child forgot to say ââ¬Å"sirâ⬠or ââ¬Å"maamâ⬠behind their statement to a teacher or another adult, he or she had the possibility of taking a blow from a switch to the rear. This is a lot different from generations growing up today. Children are almost never taught proper manners when addressing higher authority figures. Some parents turn their heads at any sign of physical discipline. Statistics Statistics show a report of child abuse is made every ten seconds. Another shows that more than five children die from child abuse every day. That means everyday about 9,000 reports of child abuse are made. Children are less likely to die from child abuse if they are active in the community or attend a public school system. 80% of children who die from child abuse are under the age of four . The other 20% are in elementary schools. This dramatic difference is due to authorities and professionals helping to protect children. Why dont the children tell? Statistics say that over 90% of children who are sexually abused, know who their abuser is. Children are terrified of their abuser so, they protect abuser in hope that they wont hurt them or their family. 30% of the children who are abused will go on to abuse others later on in life. The abused have a 80% chance to developing some kind of psychological disorder. They have a higher risk of being sent to prison as will. Statistics show that 14% of all men in prison were abused as a child and that 36% of women in prison were abused. Abuse and Neglect by Law Child abuse by law in the Child Welfares Information Gateway in Missouri as ââ¬Å"Any physical injury inflicted on a child by other than accidental means by those responsible for the childââ¬â¢s care, custody, and control. â⬠This means that any physical punishment such as a bar of soap in the mouth, is seen as abuse. The person who put the soap in the childs mouth is abusing them. Neglect is defined in this article as well it is ââ¬Å"Failure to provide, by those responsible for the care, custody, and control of the child, proper or necessary support; education as required by law; nutrition; or medical, surgical, or any other care necessary for the childââ¬â¢s well-being. â⬠When the state says this, it does not define ââ¬Å"proper support. â⬠This leaves room for interpretation. In some parents mind if you do not celebrate a childââ¬â¢s ââ¬ËB+ââ¬â¢ grade then you are neglecting him or her. Is it correct for the state to tell parents how to discipline their children in certain ways? Abuse and Neglect by Definition The dictionary says child abuse is ââ¬Å"mistreatment of a child by a parent or guardian, including neglect, beating, and sexual molestation. â⬠By this definition the amount of the action is not defined. Also, beating and neglect are not defined; this leaves room for interpretation again. Some may interpret it as laying a hand on a child at all, where other may take it as leaving a bruise. Neglect can be defined as ââ¬Å"failure of caretakers to provide adequate emotional and physical care for a childâ⬠in the dictionary. This ââ¬Å"adequateâ⬠definition still has room for interpretation. This may mean enough to stay alive such as one meal a week, or it may mean three large meals a day. Who gets to make these interpretations? Is it the caretaker or parents or the child or is it the state? Discipline by Definition Discipline is ââ¬Å"the practice of training people to obey rules or a code of behavior, using punishment to correct disobedience. â⬠A question that comes to mine is; who gets define the amount of ââ¬Å"punishment? â⬠And who gets to decide the rules and code of behavior? Is it the parents or guardians, or is it the governmental agencies? If a child is doing something wrong and the parent chooses to ââ¬Å"swatâ⬠the child then they are violating the law because they are inflicting ââ¬Å"physical injury inflicted on the child. â⬠Is this wrong or is it right? Christians Opinion Proverbs 23:13-15 says ââ¬Å"Do not withhold discipline from a child; if you strike him with a rod, he will not die. If you strike him with the rod, you will save his soul from Sheol. My son, if your heart is wise, my heart too will be glad. â⬠This is not saying to beat until the child can not stand it is saying that if a parent uses physical discipline they will not die. Discipline your son, for there is hope; do not set your heart on putting him to death. â⬠This quote comes from Proverbs 19:18. So what is Christians view on discipline? It is okay to use physical and mental discipline. God elaborates throughout his holy book that He not only believes in physical discipline, but recommends it. He states this multiple tim es in the bible and shows many examples of it. He is not encouraging child abuse by any means. However, by the ideas of society now; God would find abuse alright. No Discipline What would a child grow up to be if he or she were never disciplined? Spoiled. If a child was never told ââ¬Å"Noâ⬠they would come to the conclusion that they were always correct. Even if that was not the case, a child would never quite know the meaning behind right and wrong. They would never learn to respect others and even worse themselves. Hard work would no longer play a major role in the development of life without discipline. In the movie ââ¬Å"A Christmas Storyâ⬠Ralph says a curse word in front of his father, and he is punished by a bar of soap in his mouth. Now in your opinion is this wrong? After Ralph is sent to bed his mother puts the bar of soap in her mouth for the same exact reason. She was brought up to believe that it is wrong to curse and she knows that it is only fair for her to also be punished. If the mother had never been punished by the soap she would of never learned to punish her children in the same manor. This is only one example why discipline is necessary. Children might not think that it is fair to get a spanking, but they learn their lesson. A child without any disciple will never know right from wrong or bad verses good. But, where is the fine line drawn between discipline and abuse? Side Effects Physical abuse and neglect have immediate and long-term effects on a childââ¬â¢s development. The long-term effects can be seen in higher rates of psychiatric disorders, increased rates of drug and alcohol abuse, and a variety of relationship difficulties. The most common perpetrators of child abuse and neglect are found in people who have been abused and neglected themselves. There is proof to show the connection between child abuse and the neglect and psychological, emotional, behavioral, and interpersonal disorders later in his or her life. Studies have shown that a child uses the parentââ¬â¢s state of mind to regulate the childââ¬â¢s own mental processes. A child needs a sensitive and responsible parent in order to form their own mind set into knowing right from wrong. Children who have been sexually abused are at significant risk of developing anxiety disorders, major depressive disorders alcohol abuse drug abuse and antisocial behavior. Children who were sexually abused, also have a higher risk of becoming a predator themselves later in life. In the novel ââ¬Å"A Child Called Itâ⬠by David Pelzer, you see the major physical abuse and neglect that he endured for many treacherous years. This book shows you how an abused mother continues the cycle of abuse on her own child. If you continue reading the novel series you come to a book called ââ¬Å"A Man Named Dave,â⬠throughout this book you see the exact troubles that a grown man struggles with in order to overcome the effects of child abuse. This series shows the horrendous cycle of abuse, not only affecting the child but, people they encounter for the rest of their life. The Effort to Stop AbuseKids Matter Inc. is a group of parents in Milwaukee trying to make child abuse and neglect extinct. The members come from all different types of professions such as, doctors and teachers. They are a small organization that puts volunteer energy into their neediest kids. This organization was formed in 2000 and has been growing rapidly ever since. Every Child Matters is another organization devoted to stopping child abuse by policies. This effort is a paper filled effort. They try to promote new policies to give children the necessary equipment to have a better tomorrow. They ensure that children have access to affordable, comprehensive health care services. They promote and expand the early-care and learning opportunities and after-school programs. Also they prevent violence against children in their homes and relive child poverty. Child Welfare is the most well know child abuse organization devoted to protecting children. This organization is sponsored through the government. It allows the group to actually step in and take the child from their home of abuse, into a home with love and affection. This agency helps protect children from their abusers. The Child Welfareââ¬â¢s website provides all kinds of information which regards to protecting children. They have state by state abuse definitions. This website has been helpful in trying to define ââ¬Å"child abuse by law. â⬠Also it shows the guide lines to mandatory reporting of child abuse. Mandatory Reports In the state of Missouri, professionals are the only people required to report abuse. This is the law in Missouri and in 33 other states. In Missouri, the professionals that they are meaning are medical, educational, religious, governmental, and photographers. Also, any other persons responsible for the care of children must report. Do these professionals know the difference? Sometimes they might be able to tell the main difference such as a red mark versus a deep bruise. It would be difficult for some professionals to tell because children are clumsy. The exceptions to these policies are two main people. They are the religious and governmental. For the religious, there is a ââ¬Å"Clergy-penitent privilege. â⬠This is to protect the people who talk to their priest. This protects them so the person who does the confessional does not have to suffer any more. The governmental exception is the ââ¬Å"Attorney-client privilege. â⬠This exception is only acceptable in 22 states. This privilege is specifically confirmed. Conclusion In conclusion children do need an understanding of discipline.. discipline allows the child to grow and learn there are boundaries in life. When discipline becomes beating a child nothing is learned. Abuse only teaches the child it is ok to abuse others. Parents determine the amount of discipline the exception to this is when the parent takes it to far and teaches or government agencies may step in. abuse can be stopped if the community will do its part and help raise children in a good structured environment
Saturday, October 19, 2019
Daffodil by Ted Hughes and I Wandered Lonely as a Cloud in contrast Essay
Daffodil by Ted Hughes and I Wandered Lonely as a Cloud in contrast - Essay Example Poetry connects beyond any particular framework of time period. Certain critics comment upon this connects as influence and others quote it as inspiring. William Wordsworth, the great pantheist and romantic poet wrote the poem, ââ¬ËI Wandered Lonely as a Cloudââ¬â¢ in the year 1804. The poem popularly came to be known as ââ¬ËThe Daffodilsââ¬â¢. In the year 1986, the very modern poet Ted Hughes inspired by the poem of Wordsworth had drawn allusion from the poem of Wordsworth and included the poem bearing the title, ââ¬ËDaffodilsââ¬â¢ in his collection of poems entitled, ââ¬ËFlowers and Insectsââ¬â¢. In the sleek edition by Ted Hughes when other poems could not become quite popular, very intriguingly the poem which eluded its title from the Romantic era of English literature drew considerable attention. Both the poems, written age apart, very interestingly pondered upon the impact of memories captivated by both the romantic and the modern poet, which essentially builds the matrix upon which the similarities between the poems can be evaluated and the difference in the perspective upon the same subject could be analysed. Thesis Statement The essay intends to discuss critically the essential similarities and differences inherent within the poem which evolves out on the context of the same subject. Contrast: I wandered Lonely as a Cloud and Daffodils At the outset, a thorough introspection through the poem by Wordsworth, ââ¬ËI wandered Lonely as a Cloudââ¬â¢ enables the readers to come to terms with the exclusive order well organised within the poetic scheme by Wordsworth. The narrator of Wordsworthââ¬â¢s poem is reminiscing upon the private moment encountered by him and evocation of his feelings on seeing the beautiful sight of daffodils on a field. The influence of the memory is so powerful for the narrator of Wordsworthââ¬â¢s poem that it is capable of making the ââ¬Ëpensiveââ¬â¢ mood of the narrator elevated. Taking the q ueue of a sombre simile, the poem begins ââ¬ËI wanderââ¬â¢d lonely as a cloudââ¬â¢. The metaphor of the poem is so strong that the field of dancing daffodils is assumed as the dancers on a dancing floor. The poet plays with the words to the extent within the poem that it seems the rhyming and the choice of words together are so much intended to make the lines of the poem dance together with the daffodils thereby evoking a strong imagery before the eyes of the readers (Woof, 2011). The main intention of the poem by Wordsworth is to make the readers feel the joy the narrator received on seeing the field of dancing daffodils. The surprise of the narrator is also being communicated by him when he comments upon his surprise at the ââ¬Ëwealth the show to me had broughtââ¬â¢. The poem closes with the trip of the narrator down his memory lane and aptly with a rejuvenating metaphor, ââ¬Ëand then my hear with pleasure fills, and dances with the daffodilsââ¬â¢ (The Wordswo rth Trust, 2012). The poem by Wordsworth focuses on the beauty and bounty the nature captivates and its ability to balm the bruises of a tired heart and elevate the pensive mood of a man. The poem by Ted Hughes is a seminal work. It is inspired by the poem of Wordsworth which captivates the daffodil flowers central to both the text. Hughesââ¬â¢ ââ¬ËDaffodilââ¬â¢ also narrates the memory of the narrator and his encounters with the flower daffodil. However, very contrastingly the berating of the narratorââ¬â¢s dead wife amid the reminiscence of daffodils builds a morbid tone of the poem quite contrasting to the poem of Wordsworth. The allusion of the title thus appears evidently ironic and a reader coming across the poem by Hughes for the first time will be misled because they wonââ¬â¢t find the familiarity of context and intonation with the
Friday, October 18, 2019
How to create competitive advantage for Chinese companies Dissertation
How to create competitive advantage for Chinese companies - Dissertation Example The Chinese firms have been internationalizing because of the motives both at the firm level and the national level. At the national level, the governmentââ¬â¢s intent to become the economic superpower and to utilize the foreign exchange reserves drove the Chinese firms to seek overseas opportunities. At the firm level, the Chinese firms were motivated to internationalize in order to acquire resources from the western countries in the form of knowledge, products, technology and strategic position to secure raw materials. However, they ventured into foreign markets without preparing themselves for the challenges that lie ahead. The first and foremost challenge is the Country-of-origin (COO) perception which lends a negative brand image in the minds of the consumers. Other challenges faced by Chinese firms include system inefficiency, technical challenges and capital constraints. Because of the cultural heritage there is excessive government intervention and bureaucracy. The Chinese managers have limited understanding of the local tastes, habits and preferences. They lack in service efficiency and they are conservative in spending on advertising and promotional activities. An evaluation of the theories and the strategy adopted by Haier can help the Chinese companies achieve competitive advantage. Findings reveal that the Chinese companies have to recognize that competitive advantage should be initially built on a smaller scale as small companies are better positioned to understand and satisfy customer needs. They can overcome the negative impact of COO by building a global brand through imagery, logos, slogans and other branding elements. Developing own brand is essential for emerging MNCs as they can face extinction against global companies if they enter the foreign market as the OEM. Targeting the lowest price position can ruin the brand image. Focusing on CSR activities to enhance the brand image can bring them at par with global brands. Incremental and sequential growth should be the strategy to enter foreign markets. Once established in the target market, the Chinese firms can then enter through mergers and acquisitions. The Chinese companies shou ld not focus on ownership as a pre-condition. Entering through alliances and joint ventures, help in controlling costs and enhancing learning opportunities. Overall, the study concludes that Haier pursued a different strategy for internationalization which other Chinese firms can emulate. Effective leadership, combined with global strategy of incremental growth, branding and innovation with investments in technology and developing core competencies can help the Chinese firms overcome the negative impact of the COO and compete against the global companies. The study concluded by suggesting other areas of research on the subject. Table of Contents Chapter I Introduction 1.1 Background 1 1.2 History of competition 3 1.3 Competitive advantage 3 1.4 The Chinese economy and the MNCs 4 1.5 Rationale for the study 5 1.6 Research aims and
Goat Farm Making Chees and Yoghurt Essay Example | Topics and Well Written Essays - 2500 words
Goat Farm Making Chees and Yoghurt - Essay Example It also involves taking into consideration the short-term and long-term goals. The visits to various goat dairy firms will also help one to learn various demands of the business and how to build goat milk houses, cheese plants, and yoghurt plants. These visits will also help to understand the challenges they are likely to encounter in the business (Hempler, 2002, p. 1). Individuals should consider location of their business. This will ensure that they are able to plan their marketing strategies and be able to determine the available market for the given products. Physical location of any business is an important aspect in marketing. It also determines the means of accessing markets for the products, which ensures business success. It is important to identify the target markets for the products which are being produced, as well as to assess the available markets. This can be achieved by carrying out a market viability survey. During the analysis, one is able to create good relationshi ps with the customers and gather responses from them regarding the products to be made. This ensures that the farmer is able to gauge and evaluate the returns they are likely to get from the business (Hempler, 2002, p. 1). ... An entrepreneur should identify equipment, materials and resources needed for the business and the potential supplier. This will ensure that the farm gets the necessary requirements at the right time. Ensure that the supplier of equipment and other materials is able to provide the farm with spare parts and repair services before having these equipment and materials installed in the farm. The equipment and items needed for the cheese and yoghurt plants should be approved by the department of agriculture and markets. The farmer should also seek help of an agricultural inspector. During these sessions it is important that one indicates what they intend to accomplish. This will help the inspector to give the farmer the best methods and means to apply in order to attain success (Roberts, 2001, p. 70). Consultations with the veterinary officer would also help the farmer select the suitable breeds for the business and provide more information on their health, vaccinations and feeding. Obtai ning insurance for the business is an important step in the process. Farmers should, therefore, ensure that they have adequate liability coverage and product liability (New Zealand Food Safety Authority, 2009, p. 18). Regulatory Framework The farmer should also consider various rules and restrictions regarding farmland. There are accepted agricultural practices which every farmer should ensure they are observed on their farms. According to Act 250 on the Land Use and Development, farmers should ensure that they obtain a permit allowing them to use the land. The farmer should also obtain a health permit from the ministry of health allowing them to produce cheese and yoghurt. They should obtain a manufacturing license and medical
Thursday, October 17, 2019
Combating Future Terrorism Essay Example | Topics and Well Written Essays - 2500 words
Combating Future Terrorism - Essay Example Domestic terrorism has been described as the violence focusing on populations or the nationââ¬â¢s facilities but have no foreign direction. Such activities of groups of terrorists or individuals are homegrown, meaning they have no external assistance, such as funding, to attack populations or government elements. On the other hand, international terrorism involves activities that are either or both foreign-sponsored and foreign-based. Under the FBIââ¬â¢s foreign classification, the activities of violence may either extend beyond the USââ¬â¢s national boundaries or originate from foreign countries. In this sense, the distinction between international and domestic terrorism is not based on where the violent acts take place but rather, on the responsible groupsââ¬â¢ or individualsââ¬â¢ origin (Enders & Sandler, 2006). Since the al-Qaeda led the 2001 September 11 attacks on the US, it has become difficult to clearly determine, define and predict the future characteristics of terrorism. Subsequently, the US has developed counter-terrorism strategies that will address any form of terrorist attacks aimed at its facilities and populations. Basing on the decision that foreign terrorism constitutes the greatest threat to the US, this paper will support the decision and discuss combating future terrorism using diversity, cultural and historic aspects. Terrorism, evidently, results from the interactions of human beings sharing an environment with other groups, individuals and governments. The government may or may not meet the expectations and needs of its people; the people increasingly and continuously identify with radicals founded on different reasons; the people may have experienced genuine or perceived trauma or discrimination, which may either be indirectly or first hand; the people may also have met charismatic leaders or heard of resonant messages that interconnect
Homlessness Research Paper Example | Topics and Well Written Essays - 1750 words
Homlessness - Research Paper Example adequate nighttime residence; and an individual who has a primary nighttime residence that is ââ¬â a supervised publicly or privately operated shelter designed to provide temporary living accommodations â⬠¦ an institution that provides a temporary residence for individuals intended to be institutionalized or a public or private place not designed for, or ordinarily used as, a regular sleeping accommodation for human beingsâ⬠(Federal, 2009). In other words, a homeless person is someone who does not have a regular, personal, secure place to sleep at night on a regular basis. This definition would also include people who live in their cars as this is not a ââ¬Ëfixedââ¬â¢ location nor is it a place ââ¬Ëdesigned for â⬠¦ regular sleeping accommodation for human beings.ââ¬â¢ This discussion will examine the homelessness issue including why and what type of people become homeless. It will also review agencies and programs offering assistance to individuals and f amilies living on the street. Thanks to recent public awareness campaigns by private and government agencies such as the National Coalition for the Homeless and the U.S. Department of Housing and Urban Development respectively, long-standing societal stereotypes of the homeless are gradually evaporating. Images of creatively clothed white-bearded old men leaning against an alley wall clutching a bottle wrapped in a brown paper bag have morphed into a family living in their car or a single mother and her children living in a shelter (Marsh & Kennett, 1999). This changing image of the homeless hasnââ¬â¢t come fast enough, though, to increase the level of awareness among the general population, creating a situation in which many of the nationââ¬â¢s homeless children go without necessary services and are forced to repeat the cycle into their own adulthood (Martijn & Sharpe, 2006). It is a matter of fact that the estimated half a million children that, at any one time, is homeless in America and their mothers r epresent
Meaning of a Communication Major Research Paper
Meaning of a Communication Major - Research Paper Example However, not at all times must the receiver be aware of the senderââ¬â¢s plan to communicate at the time of communication. History of Communication as a Discipline While communication is part of every human interaction, no other discipline makes this behavior its unique focus. The Handbook of Rhetorical and Communication Theory by Gehrke, Pat (2009, p. 5) tells notes that communication departments deal with"â⬠¦the pragmatics of human communicationâ⬠. According to John Waite Bowers, former president of the National Communication Association, the discipline has both humanistic and social science roots. From the ancient Greek and Roman rhetoricians Plato, Aristotle, Cicero and Augustine, we have one of the original liberal Arts. In recent times academics have added the methodologies of careful social science research to study communication behavior which use epistemology, perception and social organization theory (Wahl?Jorgensen, 2004). Communication is at the same time the oldest and the newest discipline. The Department of Rhetoric was replaced often by Department of Speech in college campuses just prior to World War I. After fifty years under that name; many departments started calling themselves ââ¬Å"Speech Communication" and currently many are "Communication" or "Communication Studies" or other combination which tries to capture both the central focus of the discipline as well as its concerns. Scholars concentrate on understanding, analyzing, interpreting, critiquing and correlating principles which account for human communication experiences and behavior Benson (1985).Concerns range from logic and critical thinking to social and psycholinguistic variables. What Communication Studies Entails Essentially, a communication major focuses on the study of rhetoric and language based on Latin and Greek, and how these could be used for the benefit of society (Packer & Robertson, 2006). Like other arts including history, archeology, philosophy, linguisti cs and religion, ancient teachings form the foundation for communication major studies. A major in communication studies equips a student with in-depth knowledge of nature of human communication. Furthermore, the student gets to learn symbol systems of communication, media, communication environments and the effects of communication. Core to rhetoric are logos, pathos and ethos (Fink & McPhee, 2005). In the contemporary setting, majoring in communication teaches one to use appropriate medium to effectively present arguments and deliver messages. Today, for example, political speeches and messages presented on mass media are pregnant with rhetoric. Majoring in communication also helps academics learn how common languages evolve over time to such an extent that they define communities distinguishing them from the one another. Some of the subjects encountered in communication major include the following: Public Address - The study of speakers and speeches, including the historical and social context of platforms, campaigns and movements, and how current speakers can learn skills and applications to their own creation and production of messages. Oral Interpretation and Performance of Literature ââ¬âThe traditional part of the discipline that studies literature through performance. Based on critical analysis of written text, skilled verbal and non verbal presentations the
Wednesday, October 16, 2019
Combating Future Terrorism Essay Example | Topics and Well Written Essays - 2500 words
Combating Future Terrorism - Essay Example Domestic terrorism has been described as the violence focusing on populations or the nationââ¬â¢s facilities but have no foreign direction. Such activities of groups of terrorists or individuals are homegrown, meaning they have no external assistance, such as funding, to attack populations or government elements. On the other hand, international terrorism involves activities that are either or both foreign-sponsored and foreign-based. Under the FBIââ¬â¢s foreign classification, the activities of violence may either extend beyond the USââ¬â¢s national boundaries or originate from foreign countries. In this sense, the distinction between international and domestic terrorism is not based on where the violent acts take place but rather, on the responsible groupsââ¬â¢ or individualsââ¬â¢ origin (Enders & Sandler, 2006). Since the al-Qaeda led the 2001 September 11 attacks on the US, it has become difficult to clearly determine, define and predict the future characteristics of terrorism. Subsequently, the US has developed counter-terrorism strategies that will address any form of terrorist attacks aimed at its facilities and populations. Basing on the decision that foreign terrorism constitutes the greatest threat to the US, this paper will support the decision and discuss combating future terrorism using diversity, cultural and historic aspects. Terrorism, evidently, results from the interactions of human beings sharing an environment with other groups, individuals and governments. The government may or may not meet the expectations and needs of its people; the people increasingly and continuously identify with radicals founded on different reasons; the people may have experienced genuine or perceived trauma or discrimination, which may either be indirectly or first hand; the people may also have met charismatic leaders or heard of resonant messages that interconnect
Tuesday, October 15, 2019
Meaning of a Communication Major Research Paper
Meaning of a Communication Major - Research Paper Example However, not at all times must the receiver be aware of the senderââ¬â¢s plan to communicate at the time of communication. History of Communication as a Discipline While communication is part of every human interaction, no other discipline makes this behavior its unique focus. The Handbook of Rhetorical and Communication Theory by Gehrke, Pat (2009, p. 5) tells notes that communication departments deal with"â⬠¦the pragmatics of human communicationâ⬠. According to John Waite Bowers, former president of the National Communication Association, the discipline has both humanistic and social science roots. From the ancient Greek and Roman rhetoricians Plato, Aristotle, Cicero and Augustine, we have one of the original liberal Arts. In recent times academics have added the methodologies of careful social science research to study communication behavior which use epistemology, perception and social organization theory (Wahl?Jorgensen, 2004). Communication is at the same time the oldest and the newest discipline. The Department of Rhetoric was replaced often by Department of Speech in college campuses just prior to World War I. After fifty years under that name; many departments started calling themselves ââ¬Å"Speech Communication" and currently many are "Communication" or "Communication Studies" or other combination which tries to capture both the central focus of the discipline as well as its concerns. Scholars concentrate on understanding, analyzing, interpreting, critiquing and correlating principles which account for human communication experiences and behavior Benson (1985).Concerns range from logic and critical thinking to social and psycholinguistic variables. What Communication Studies Entails Essentially, a communication major focuses on the study of rhetoric and language based on Latin and Greek, and how these could be used for the benefit of society (Packer & Robertson, 2006). Like other arts including history, archeology, philosophy, linguisti cs and religion, ancient teachings form the foundation for communication major studies. A major in communication studies equips a student with in-depth knowledge of nature of human communication. Furthermore, the student gets to learn symbol systems of communication, media, communication environments and the effects of communication. Core to rhetoric are logos, pathos and ethos (Fink & McPhee, 2005). In the contemporary setting, majoring in communication teaches one to use appropriate medium to effectively present arguments and deliver messages. Today, for example, political speeches and messages presented on mass media are pregnant with rhetoric. Majoring in communication also helps academics learn how common languages evolve over time to such an extent that they define communities distinguishing them from the one another. Some of the subjects encountered in communication major include the following: Public Address - The study of speakers and speeches, including the historical and social context of platforms, campaigns and movements, and how current speakers can learn skills and applications to their own creation and production of messages. Oral Interpretation and Performance of Literature ââ¬âThe traditional part of the discipline that studies literature through performance. Based on critical analysis of written text, skilled verbal and non verbal presentations the
Gravimetric Analysis Essay Example for Free
Gravimetric Analysis Essay The purpose of experiment 1, also named Gravimetric Analysis, is to study the use of analytical chemistry. Analytical chemistry is a branch of chemistry that involves determining what matter is and how much of it exists. It is the science of separating, identifying, and determining the components that make up a compound and determining a specific amount of that compound. There are two types of analytical chemistry: qualitative and quantitative. This experiment uses quantitative analysis to determine the amount of a substance, or several species, and measure it in numerical terms. More specifically, this experiment uses gravimetric analysis, a form of quantitative analysis that uses an analytical balance, an instrument that yields accurate and precise data, to measure the masses of several substances. Experiment 1 involves the precipitation of a complex compound called aluminum 8-hydroxyquinilinate, also called Alq3. In order for this precipitation to occur, an organic precipitating agent, 8-hydroxyquinilinate (abbreviated OxH) is used to react with aluminum ions to form this complex compound. For this reaction to take place, OxH must be deprotonated, so that its anion, Ox-, will bond with the aluminum ions (the OxH molecule itself will not react with aluminum ions). As a result, the pH of the solution has a major effect on the precipitation in this experiment. If the pH is too low and there is an excess of hydrogen ions, then by Le Chatelierââ¬â¢s principle, the equilibrium will shift to the left, creating more OxH molecules. Ox- will no longer be available and a precipitation will not occur. If the pH is too high and there is an excess of hydroxide ions, the aluminum ions will react with the hydroxide ions. There will be no aluminum to react in the precipitation. If the pH is neutral, OxH is not very soluble and may cause it to precipitate out itself. So in order for this precipitation in this experiment to take place, it is vital that a buffer solution of ammonium acetate is used to control the pH of the solution. Also, the less aluminum ions in the solution, the more it will precipitate. In order to do this, an excess of OxH is added to shift the reaction towards the precipitate form. However, OxH has a limited solubility in water, so too much of an excess cannot be added. In order for the precipitate to work best in this experiment, we would have to allow it to digest. This lets use filter the precipitate completely. We do this by drying the precipitate in an oven and letting it age overnight. This promotes the formation of fewer, larger, and more pure particles of the precipitate. In the end, we are trying to find the concentration of aluminum in the solution (millimole of aluminum per mililiter of solution). We do this by converting the mass of the precipitate into moles and using mole-to-mole ratio and stoichiometry; we find the moles of aluminum ions. We then divide this by the volume of the solution to find the molarity, or concentration, of the aluminum ions.
Monday, October 14, 2019
A Streetcar Named Desire | Analysis
A Streetcar Named Desire | Analysis A Streetcar Named Desire, a play by a Southern playwright Tennessee Williams, presents the problems of the United States after both wars and Great Depression. It also touches the issues of immigrant families and the old settlers. Although the play is situated in the South but the compelling manner in which he provides themes makes it rather universal. A Streetcar Named Desire has two strong characters Blanche DuBois and Stanley Kowalski that are concurrently similar and different. Both try to hide their own weakness but in a different way and try to get rid of their inner and also outer problem, but in a different way. Blanche DuBois arrives to her sisters apartment, which is located in New Orleanss part called Elysian Fields, to escape from her unpleasant reality. She and her sister Stella Kowalski are descendants of the old Southern aristocracy and they are descendants of the old immigrants. Even at the beginning of the play Blanche DuBois is considered to be a fallen woman in the eyes of others. She lost all family fortune and family estate Belle Reve, she was present her husbands suicide, her history of sexual relationships is very rich and she also has a serious drinking problem which she tries to cover up. Blanche is an opposite character to her sister Stella. According to their individual past they symbolize dark and light, dirty and clean characters. Blanche, who has very rich personal history which is a heavy burden to her and in fact forces her to leave a family estate behind and leave her hometown, in the play undertakes a process of cleaning herself and she tries to brush her life from every mistake she made and start new life. Underneath all the dirt and sins, there is an insecure, dislocated individual. In A Streetcar Named Desire there are several processes and action for that purpose. The cleaning does not include only personal history, reputation, her body but also relationships and the way she is treated. Blanches problems with men started when she got married too young a hidden homosexual, who committed suicide after the confrontation with his sexuality. During her carrier as a teacher she seduced or was seduced by many men including her student. Although she probably never was alone in her hometown but certainly she was lonely. Because of all her dirty and bad history of her, she wants to make a relationship in a right way. For Blanche a vision of marriage with Mitch means to escape from dirty and sinful past, to clean herself from the other men. In this case, the wearing of white dress, which is a colour of innocence, as a bride would symbolically clean her history with men. Mens exploitation of her sexuality has left her with a very poor reputation and with that came destitution. She believes she is an honorable lady of South who deserves to be treated that way but with all the gossips she cannot be. She tries to find a typical Southern gentleman who can save her and take care of her. This chivalric man is in the play represented by non-existing millionaire Shep Huntleigh. Blanche is depending on sexual admirations of men for it brings her almost lost self-esteem. In spite of every attempt for gaining normal marriage and dignity she fails again. Blanche will never be able to clean herself from the past and men because of her relying on them and putting her fate in their hands. The dependency and inability to see thing realistically leads to inevitable downfall rather than to purge. The strongest motif of the cleaning processes is bathing. Blanche bathes throughout the whole A Streetcar Named Desire. She claims that the hot water calms her nerves and in the Scene Two she says, à ¢Ã¢â ¬Ã ¦all freshly bathed and scented, and feeling like a brand new human being! So the cleaning is taken as a physical symbol on the one hand metaphorically and on the other hand literally. Her sexual experiences made her a dirty person and subconsciously she wants to get rid of her odious history. Her efforts to forget and clean herself cannot erase her past and because of that her bathing takes a long time, it is almost never done. Blanches constant bathing starts in the Scene Two. Stanley and Stella are talking about the lost of Belle Reve. Stella is satisfied with the Blanches answer that it had to be sacrificed. However, pragmatic Stanley wants to see all the papers concerning the family estate. He seemed to always hope of owning the estate or take an advantage from its sale. Stanley checks clothes in Blanches trunk and accuses Blanche that money from the sale is in her wardrobe now instead of in his pocket. While Blanche is bathing first facts about her history is revealing. She baths as she would like to wash her guilt of losing the Belle Reve. And behind her back others are deciding of her future. During bathing Blanche is singing. In Scene Two and Seven there is a popular ballad Its Only a Paper Moon. The lyrics Its a Barnum and Bailey world / Just as phony as it can be / But it wouldnt be make-believe / If you believed in me, describe the world where love is turn from reality into a phony fantasy. Love dos not exist in the real world and it is only imagined. It narrates Blanches life and her strong believe that her future happiness with Mitch lies in her behaviour. Blanche thinks that if she would try hard enough the hope would have become reality. The song very well accompanies the process of cleaning herself during bathing. Tennessee Williams use a juxtaposition of Blanches perception of her love life and the cruel reality, Blanches optimistic interpretation of the song with Stanleys mischievous revelations about her. Williams creates an ironic dramatic situation where Blanche is singing about, in fact, nonsense. As Blanche takes a bath Stanley tells Stella about her sisters sexual history. Other important thing is taking place behind Blanches back. Stanley tells Stella that he also told the whole history not only to her but also to Mich. Stella is now sure that Mitch will never marry Blanche because of that. While Blanche is bathing other important information about her reveals. On the outside Blanche appears to be fresh and temporarily renewed. However, she fails the process of cleaning herself from past and her reputation again. Stanley has objections against Blanches constant bathing. On a metaphorical level he shows his rejections towards Blanches processes of cleaning and purification. There is other song Blanche is using for getting rid of her past and becoming as innocent as she was when she has been still married. The Varsouviana Polka is the tune which she hears in her head. It is also a tune which she was dancing with her husband and when she last saw him alive. The song reminds Blanche times of innocence and the time when the decline of her life became. The day when Allen Grey committed suicide she saw him with other male friend in bed and pretended that nothing happened. However, during dancing on the tune of Varsouviana Polka she told him that she found him disgusting. The polka represents Blanches longing for innocence which is already lost. First Blanche hears it during the meeting of Stanley in the Scene One. Other appearance of the tune accompanies Blanches narration of her young husbands death. Since her mental decline begins she can hear the Varsouviana Polka constantly. For the purposes of process of cleaning she tires to move her miseries out of rea lity and focuses on her imaginary dream past world, she focuses on the becoming innocent again. In fact, her insanity is a token of regression to ideal imaginary environment. In conclusion, Blanche in A Streetcar Named Desire tries through various ways to get rid of the past, sins, mistakes, memories and reputation. She arrived in Elysian Fields, which is the place where souls come before they can come back to our world, we can assume that her journey will start all over again. So from the beginning it is clear that Blanche is going to fail. Her problems go hand in hand. Her troubles with man would be cleaned by a wearing of a white dress at her wedding with Mitch, Blanches obsessive bathing resembles plunging of souls, the processes of cleaning are very psychic because she hopes to get away her habitual sins, alcohol does not wash away memories and also the songs which accompanied washing of the sins away do not help. Blanche is forced to leave with all her mistakes back to the rough reality but from the fresh new start but to the same stained history and reputation. Literature Williams, Tennessee. A Streetcar Named Desire . New York: Signet, 1974.
Subscribe to:
Posts (Atom)