Wednesday, July 31, 2019
Moral psychology Essay
The articles in this special section express a common theme: the use of information technology in society is creating a rather unique set of ethical issues that requires the making of new moral choices on the part of society and has spawned special implications for its members. Technology itself is not the only, nor necessarily the most responsible, cause of these issues. All ethical questions arise initially out of human agency. Technology, due to its capability to augment mental and physical powers of human beings, does stand in the role of a coconspirator. The lure of power-enhancing capabilities makes technology an inducer of sorts, a necessary but not sufficient underpinning to many of the ethical issues we face today. An ethical issue is said to arise whenever one party in pursuit of its goals engages in behavior that materially affects the ability of another party to pursue its goals. When the effect is helpfulââ¬âgood, right, justââ¬âwe say the behavior is praiseworthy or exemplary. When, however, the effect is harmfulââ¬â bad, wrong, unjustââ¬âthe behavior is unethical. This purposeful theory of ethics is reflected in the issues discussed in these articles. For example, email and being online are applications of information technology, the lure of which is based on their ability to expand the scope, range, speed, and ease of interpersonal and corporate communications. Useful as they are, the schemes and the manifold of issues addressed leave one question unanswered: What moral guidance can be provided to the agents whose behavior create these issues? And, this question leads to others: How should the many knowledge workers, systems analysts, programmers, hardware designers, authors, executives, and so forth, who set in motion the actions which bring these issues to the fore, guide their own behavior? Knowing their technology-based actions will intercede in the course of human affairs, how should they direct them? The crucial point occurs when a moral agentââ¬âone that by definition has choicesââ¬âdecides to change the state of information or information technology in a human system. Changes in hardware, software, information content, information flow, knowledge-based jobs, and the rules and regulations affecting information are among the many things agents do that affect others. I call these crucial juncture points moments-of-truth. If those of us who make decisions in any of these areas are to behave ethically, we must be able to identify the significant momentsof-truth in which we participate and be able to reflect on the effects of our actions. We must use our moral imagination to guide our choices so that we can contribute positively toward making the kind of ethical world in which we want to live and want to bequeath to our future generations. How can we do this? The ACM Code of Ethics [1], as well as the schemes and other articles in this special section provide initial grist for the mill. More fundamental, however, is our conscience, aided by our understanding and expertise in information technology. If we have an inkling our behavior as information professionals might in some way harm others, we probably should examine our decisions a little more carefully and from an ethical point-of-view. Getting the Morally Relevant Facts The facts of an ethical situation can be summarized by four factors. The first factor is to clearly identify the moral agent. Whose actions will bring about the technology-induced change? The frameworks and discussions presented here will be helpful because they point to a variety of possible forms of agency. The next factor is the set of alternative courses-ofCOMMUNICATIONS OF THE ACM. December 1995/Vol. 38, No. 12 55 action available to the agent. These are the realworld acts that will have an effect on the human system under consideration. Acts have consequences, hence the third factor: a delineation of the results that are expected to occur if each act is taken. Finally, it is essential to identify the stakeholders who will be affected by the consequences of the acts. A stakeholder is any individual, group, organization, or institution that can affect as well as be affected by an agentââ¬â¢s actions. In a word, stakeholders have an interest in what an agent does [3]. These four factorsââ¬âagent, acts, results and stakeholdersââ¬âare the basic facts from which an ethical analysis proceeds. Applying Ethical Theories Renowned medical ethicist William F. May refers to the method of ethical reflection as corrective vision. ââ¬Å"Ethics supplies a type of corrective lens,â⬠he observes, ââ¬Å"and relies heavily on the distinction between what is and what ought to beâ⬠[4]. These four crucial factors serve to establish what is. For what ought to be we must turn to ethical theories. These theories are the prismsââ¬âthe optometristââ¬â¢s collection of lensesââ¬âthrough which we can observe reality and see the choices to make as we attempt to direct reality towards our ethical ideals. There are many, perhaps an infinity, of theories we might apply. The optics of ethics is very large indeed. We can be comforted in this effort, however, by the realization that the evolution of ethical thinking has resulted in four major themes. These are meta-lenses through which to look at an ethical situation. One theory emphasizes an agentââ¬â¢s duty. This theory seeks to create a good society by having people do the right things. As Immanuel Kant emphasized, there are prohibitions against taking some acts and obligations to take others. We have a prima facie or a priori duty, for example, to respect the autonomy of others according to one principle evolving out of this theory; any acts an agent might take that would invade a stakeholderââ¬â¢s privacy or right to choose for themselves should be avoided. More specifically, it is reasonable to assume members have a prima facie duty to adhere to the provisions of the ACM Code of Ethics. But, and this is a significant point, we may not always be obliged to do so. Subsequent theorists in this deontological vain, W. D. Ross in particular [5], have held that while these duties are compelling they are not definitive. When two or more duties come into conflict the agent must make a reasoned choice. For example, the advantages obtained from using email may be deemed to be more important than the exposure to loss of privacy it brings about. These moral losses, however, should be made explicit in making a moral choice. The same principle applies, as we will see, among theories themselves. The second great tradition is the pursuit of happiness. Applying this theory requires that we assess the consequences of the agentââ¬â¢s actions and deter56 December 1995/Vol. 38, No. 12 COMMUNICATIONS OF THE ACM mine how much pleasure or pain, good or bad, happiness or unhappiness, benefits or costs they inflict on stakeholders. The guiding principle, which originates with Bentham and Mill, is that an agent should choose an act resulting in the greatest good for the greatest number. The good society is reached according to this theory by doing good for others. However, since what is good for the collective-at-large may not be good for a given individual (or may violate a basic duty or right), advice emanating from this consequentialist tradition may conflict with advice deriving from other theories. A third great tradition is the pursuit of virtue. This theory focuses on improving the character or traits of the agent. The ancient Greeks averred that a moral person should take acts that enable and enhance the agentââ¬â¢s courage, prudence, temperance and justice. Their predecessors focused on accumulating individual power. ââ¬Å"Might is rightâ⬠formed the basis of their concept of virtue. One of their successors, St. Thomas Acquinas, drew on the Pauline tradition to add the more spiritual virtues of faith, hope and charity to the list. And, in the industrial age, industry, honesty, and trustworthiness were added because they were necessary for commercial relationships. All of these virtueoriented guides have the effect of creating a good society by having each agent be a good person. Finally, there is the tradition of the pursuit of justice. Justice requires that every stakeholder in the system should enjoy, so far as possible, an equal opportunity to develop his or her knowledge, skills and talents, and to reach his or her potentialities. This comes from fair dealing and right action and is usually based on rules that society has made, rules that should be the same for all and applied equally. The rules are based on criteria such as merit, need, work or other agreed-upon standards. The social contract theories to which several of the authors refer have emerged as a part of this tradition. The good society according to theories of justice is achieved by doing fairly, both in the fair allocation of privileges, duties, and goods, and in the meting out of punishments. When facing a moment-of-truth, one is well advised to view the situation through each of these ethical lenses. Each provides insight into the moral complexity of the issue being examined. Frequently, however, the guidance deriving from one of these theories will conflict with that of one or more of the others. This requires a moral judgment, one that shows how one theory or principle trumps another. The reasons behind the choice made should be grounded in at least one moral theory and justified accordingly. The pitting of facts against theories is a necessary ââ¬âand the most importantââ¬âaspect of deciding on an ethical issue. There are also four additional considerations to take into account: Who should decide? Who should benefit? How should the decision be made? And, how can the issue be prevented from arising in the future? Who Should Decide? Presumably if you are facing a moment-of-truth you are also engaged in a decision process. Should you go it alone? Often, not. Before an agent acts he or she should take into account the answers to two questions: 1) Which other stakeholders ought to participate in the making of this decision because of their knowledge, their values, or their interests? The voices of future generations should always be considered in this determination as well as the voices of contemporaries. 2) Which other stakeholders must take part in the decision and its implementation because of their institutional jobs, responsibilities or the resources they control? As debates on the basis of a ââ¬Å"just warâ⬠have concluded, a decision that does not carry legitimacy or a reasonable probability of success is unlikely to lead to a satisfactorily moral outcome. Who Should Benefit from the Decision? Many stakeholders may be affected by a decision. Some of these outcomes should have been considered during the application of ethical theories to the situation at hand. Nevertheless, before enacting a choice one should assure himself or herself the benefits of the decision flow to morally justifiable parties and that no undue harm is done. How Should the Decision be Made and Carried Out? From a stakeholderââ¬â¢s point-of-view a decision cannot be separated from the way it is made and delivered. Whenever possible, important moral decisions should be made as the result of due process. Beyond any legal requirements, the processes by which decisions are made should be fair and they should follow established procedures when applicable. It is essential the parties who are potentially harmed by decisions, as well as those who are benefited, recognize the legitimacy of the decision-making process. This, however, is not enough. Decisions should be carried out in a humane, moral way. During the trumping process just described, some ethical principles or dictates are relegated to a secondary position. But they do not go away. A decision should be framed and fulfilled in a manner which maximizes the accomplishment of all of the ethical principles identified. All decisions should be carried out with due respect, in the sense that they should preserve the dignity of all stakeholders involved to the extent possible. How Can the Issue be Prevented from Arising in the Future? Every decision becomes a precedent in the future. A decision that resolves an acute and pressing moral issue today may not look so good in light of the passage of time. It may create worse problems than the ones it solves. Or, our moral reflection may reveal flaws in our institutions that can beââ¬âperhaps, should beââ¬âchanged so the ethical issue at hand does not emerge again, at least in the same degree of intensity or severity. Thus, procedures and processes should be put in place, eliminating the root causes of this issue or handling it more effectively in the future. The essential question: In making this ethical decision, what sort of social transcript do we want to write? The last four considerations have a common thread: To be ethical, a decision-maker must think beyond just the facts and theories pertinent to the current issue. One must reach beyond the present and be sure to bring in additional voices, insure that ethical procedures are employed, adopt a humane style of conduct, and look to the future. Moving Ahead The articles in this issue form a rather gritty as well as a cerebral basis for getting on with the task of creating a good society in our information age. The ethics of being online, using tools such as email, and infusing of information technology into our lives in areas ranging from business process reengineering to installing large-scale systems are, arguably, among the most important ethical issues of our time. As good citizens in this information age we must be able to identify the crucial moments-of-truth in which our behavior as information professionals shapes the direction our society will take. By understanding the facts of each case, drawing on ethical traditions for guidance, and doing this with a concern for the broader implications of our actions, we can create the kind of ethical society we want. This is the challenge of our times [2]. C References 1. Anderson, R. E. , Johnson, D. G. , Gotterbarn, D. and Perrolle, J. Using the new ACM code of ethics in decision-making. Commun. ACM 36, 2 (Feb. 1993), pp 98ââ¬â107 2. Mason, R. O. , Mason, F. M. , and Culnan, M. J. Ethics of Information Management. Sage, Thousand Oaks, Calif. , 1995. 3. Mason, R. O. and Mitroff, I. Challenging Strategic Planning Assumptions. Wiley, New York, 1981. 4. May, W. F. The Physicianââ¬â¢s Covenant. Westminster Press, Philadelphia, 1983. 5. Ross, W. D. Moral Duties. Macmillan, London, 1969. Richard O. Mason is Carr P. Collins Professor of Management Information Sciences at the Edwin L. Cox School of Business, Southern Methodist University, Dallas, Tex. Parts of this article are based on material originally developed for Mason, R. , Mason, F. , and Culnan, M. Ethics of Information Management. Sage, Thousand Oaks, Calif. , 1995. Permission to make digital/hard copy of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, the copyright notice, the title of the publication and its date appear, and notice is given that copying is by permission of ACM, Inc. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or a fee. à © ACM 0002-0782/95/1200 $3. 50 COMMUNICATIONS OF THE ACM December 1995/Vol. 38, No. 12 57.
Tuesday, July 30, 2019
A number of factors disqualified the ââ¬Ëdeserted wifeââ¬â¢s equityââ¬â¢ from recognition as a property right in National Provincial Bank Ltd v Ainsworth [1965] AC 1175:
Introduction I suggest you look at the developing concepts of fairness, because this is why the MHA 1967 was developed. Proprietary Estoppel for cohabitees is becoming less prevalent due to the decisions in family home trust. Thus, fairness is at the centre of the approach, except the clear provision of a proprietary interest is necessary and not merely the provision of a roof over the otherââ¬â¢s head. This is common to Ainsworth, proprietary estoppel and the family home constructive trust. The rationale is that it would not be fair to impose a proprietary right without a proprietary intention. The case of National Provincial Bank Ltd v Ainsworth [1965] AC 1175 holds a limited approach to understanding non-occupierââ¬â¢s rights in property. National Provincial Bank Ltd v Ainsworth held that the common law right for the husband to provide a roof over the head of the deserted wife was merely in personam. This means selling the property to a third party will allow the husband to avoid his obligation to his deserted wife It is important to note that it predates the Matrimonial Homes Act 1967 (MHA 1967). The MHA 1967was developed to remedy the flaw in National Provincial Bank Ltd v Ainsworth, which indicates that the legislature recognised that the existing law with respect to deserted wifeââ¬â¢s equity and its enforceability against third parties was manifestly unfair. The law on proprietary estoppel provides that the third party find their rights will be interfered with. The elements of proprietary estoppel can result in an in personam right defeating an in rem right if the following element is fulfilled: Reasonable belief that the person will have interest in property Acts reasonably in reliance Gillet v Holt This is illustrated in a number of cases that have expressed that the main factor is that there is a clear expression of a proprietary right in the property (Thorner v Major [2009] UKHL 18). The case of Walsh v Singh [2010] 1 FLR 1658 held that conduct plus detriment is not enough is not enough to allow a claim for proprietary estoppel. In addition, the case of Negus v Bahouse [2008] 1 FCR 768 held that statement to provide a roof over the individualââ¬â¢s head or a determination to move in is not enough to allow a claim for proprietary estoppel. The Negus v Bahouse Case is, in part, applies the same formulaic approach, as The implication is that there has to be a clear expression of a proprietary right, in order for proprietary estoppel to be used. There are a series of cases on the constructive family home trust, which may change the goal posts on what an expression of a proprietary right when it comes to a spousal/partner interest. These cases are Oxley v Hiscock [2004] EWCA Civ 546, which identified that in family relationship there is an obligation to ensure that there is fairness in the rights of a non-property owning spouse/partner. In these cases the use of the constructive trust would be better for the family member who has relied on a property right inferred by the property owning spouse/partner ( The ââ¬Å"deserted wifeâ⬠(partner) has to show that she ââ¬Å"has any interest in it [the property] at allâ⬠(Stack v Dowden at 56). This means the intention is imputed through the relationship (i.e. relationship plus contribution = share in the property). Thus, both proprietary estoppel and the family home constructive trust has move away from the in personam right not trumping an in rem right. However, for this to work there has to be a clear expression of a proprietary interest and not merely providing a roof over the individualââ¬â¢s head (Negus v Bahouse cf. National Provincial Bank Ltd v Ainsworth for similarity). The impact of the fairness rulings in Oxley v Hiscock. Stock v Dowden and Jones v Kernott may change the mere expression argument if the nature of the relationship imputes an assumption of a proprietary right. Thus, potentially the obligation to provide a roof over the head of the other party is sufficient. Additional References to Consider on top of Proprietary Estoppel: Baroness Deech, ââ¬ËCohabitationââ¬â¢ [2010] Family Law 39 Fretwell, K ââ¬Å"Fairness is what justice really is: Kernott v Jones in the Supreme Courtâ⬠(2011) Family Law 41(7) Hayward, AP ââ¬Å"Family Property and the Process of Familialization of Property Lawâ⬠(2012) Child and Family Law Quarterly 24(3) McGhee, M ââ¬Å"Shifting the Scales of Social Justice in the Cohabitation Context: The Juridical Basis for the Varying of interests in Residential Propertyâ⬠(2012) Oxford University Law Journal 1(19) Mee, J ââ¬Å"Burns v Burns: The Villain of the Piece?â⬠in Probert, R, Herring, J and Gilmore, S Landmark Cases in Family Law (Hart, 2011) Mee, J ââ¬Å"Ambulation, Severance and the Common Intention Constructive Trustâ⬠(2012) Law Quarterly Review 128(500) Miles, J ââ¬Å"Charman v Charman (No 4) [2007] EWCA Civ 503 ââ¬â making sense of need compensation and equal sharing after Millar: MacFarlaneâ⬠(2008) Child and Family Law Quarterly 20(376) Pawlowski, M ââ¬Å"Joint ownership and the family homeâ⬠(2011) Property Law Review, 1(68) Probert, R ââ¬Å"Cohabitation: Current Legal Solutionsâ⬠(2009) Current Legal Problems 62(1) Probert, R ââ¬Å"Cohabitation in Twentieth Century England and Walesâ⬠(2004) Law and Policy 26(1) Smithdale, J ââ¬Å"Inference, Imputation, or BothConfusion Persists over Beneficial Interests in the Family Homeâ⬠(2011) CSLR 74, p 79
The Anti-Vietnam War Movement Was A Testament For American Nationalism
The Allied Forces won the Second World War. Democracy was restored. Peace soon reigned worldwide. But the victory became short-lived. Another ideology surfaced. A former ally, the Soviet Union spearheaded the campaign of communism globally. ââ¬Å"In 1946 President Harry Truman gave voice to the new geopolitical position of the United States by stating that America would, ââ¬Å"assist all free peoples against threats of revolution and attack from withoutâ⬠(Wiest, 2003). The Soviet menace continued. Russian troops gradually gobbled most countries in Eastern Europe into submission.The United States government fortified its military capability. The Soviet nation did the same. And the Cold War began. Communism spread like fire. Although the main focus of the threat was in Europe, destabilization plots escalated among some nations in South East Asia. Prior to the Second World War, France dominated most of the continent. Its colonies included Laos, Cambodia and Vietnam. When Japan e ntered the war, the French government lost its hold and influence. When events settled down, France wanted to regain the lands it formerly occupied.With the Japanese threat out of the picture, French exerted its influence all over again. Vietnam, being a former colony, came on the French list first. The colonizers controlled the Third World country before the Second World War. They thought that it would be easy to put Vietnam back under their fold. It was a different story this time. THE ROAD TO WAR Vietnam surprised the French effort to subdue and control them. A charismatic leader named Ho Chi Minh led the revolution against the foreign conquerors. Given a small chance of winning their independence, the Vietnamese guerilla group retreated to the jungles to regroup.The firepower of the French troops proved to be too much against the ill-equipped and ill-trained forces of Ho Chi Minh. Refusing to engage the enemy head on, the Vietnamese looked forward to a long harassing war that wo uld soon exhaust and later discourage their foes to simply fold up. The confrontation escalated and surprised the foreign legion about the strong determination of a small band of resistance. Significant events began to unravel in 1949. Mao Che-tung challenged the rule of democracy in China. The North Koreans battled the South for supremacy over the peninsula.ââ¬Å"President Dwight Eisenhower put the new position of the United States into words in his inaugural address in 1952 when he remarked that, ââ¬Å"the French in Vietnam are fighting the same war we are in Koreaâ⬠(Wiest, 2003). The United States felt the need to stretch its hands to prevent a communist takeover over the rest of the world. The uprising within the region inspired Ho Chi Minh and his followers. They fought back and inflicted serious casualties on the French side. Reeling from defeat after defeat, France loosened it hold on the colony. The situation divided Vietnam.The communist supporters rallied around th e North while the South directed its efforts to strengthen its grip on democracy. As communism gained momentum, Ho Chi Minh directed an attack against South Vietnam with the purpose of uniting the country once and for all. When France decided to give up its position in the war-torn nation, the United States Administration assumed the role of driving back the communist threat. ââ¬Å"The United States first became directly involved in Vietnam in 1950 when President Harry Truman started to underwrite the costs of France's war against the Viet Minhâ⬠(http://www.cyberessays. com/History/168. htm). In the beginning, the communist leader of Vietnam never intended to draw the Americans into a bloody engagement. But the involvement of the U. S. simply left Vietnam with no choice but to defend itself. As American troops gradually increased its number in the South, the Vietcong from the North instituted yet again a guerilla tactic to tire out the enemy. The U. S. government reasoned out that the main reason why it participated in the Vietnam debacle was to stave off the ideological threat of communism.With the withdrawal of the French forces after a series of stinging defeats, America had no choice but to intervene for the sake of democracy. AMERICAN INTERVENTION The Vietnam War was another thorn on the Americaââ¬â¢s pathway. At around that period, the government dealt with the instability brought about by racism, bigotry and equality. Upholding the human rights became the battle cry among the citizens throughout the country. Despite all the internal problems hounding the nation, the U. S. government solidified its stand in checking the communist threat.America knew that if the new found ideology remained unchecked, the world would be in peril. With no other country willing to challenge the Soviet aggression, the U. S. found enough reason to assume the responsibility in protecting democracy. Nations with strong and direct links with the United States reluctantl y supported the drive against communism. However, their involvement came in a variety of ways. Many countries pledged their support in ways other than committing combat troops. America contended itself with the medical and engineering battalions from cooperative nations to back its cause in Vietnam.As the United States went deep in its mission to prevent a communist takeover in the South, the number of troops it brought to the worsening war increased. Public outcry blasted the American policy in handling the situation in Vietnam. . ââ¬Å"Starting with teach-ins during the spring of 1965, the massive antiwar efforts centered on the colleges, with the students playing leading rolesâ⬠(http://www. cyberessays. com/History/168. htm). PUBLIC SENTIMENT In the beginning, the public were inspired by democratic ideals to defend freedom in every part of the globe. Support came rushing all over the states.American sentiments, limited primarily inside the corners of the homes of its citiz ens, eventually spilled out in the streets. Rallies and demonstrations soon became a common sight on the newspapers and the television. The media did a good job in motivating a public outcry. U. S. involvement in Vietnam inspired a spirit of nationalism on two fronts. Setting aside its internal racial discourse, the Americans worked together in its bid to eliminate the communist ideology in Asia once and for all. However, things became uneventful and the U. S. took on a new meaning for the word nationalism.Never since the attack on Pearl Harbor did the United States found itself rallying around the flag in its involvement in Vietnam. The government fueled talks about Americaââ¬â¢s new role in shaping the events and situations around the world. It went on to say that the U. S. Armed Forces had a duty and responsibility to fulfill not merely to the American people but to the entire humanity in general. Being the most sophisticated and most advanced nation globally, America must loo k at the bigger picture. No country wanted to fill in the shoes of promoting and maintaining peace and progress on earth.Most regimes simply wanted to reinforce its hold on power than do anything of significance and value. Americans took pride in uplifting their potentials and ideals to a level of unmatched ability. People valued their freedom too much. Because of this, they willed to do anything against the rule of oppression. These individuals believed in enforcing order all throughout the society. Only through a nation under control would growth and development materialize. The United States always looked ahead of its time. The future remained to be a distant goal.The citizens were willing to risk anything to fulfill its vision of a free and united country. When the Vietnam War erupted, many critics downplayed its significance to the star-spangled nation. But its modern role to promote global stability was too big to ignore. The spread of communism risked freedom to be conquered. Due to this grave danger, America was compelled to fight an external conflict. The citizens understood this, at least primarily, and supported the move in disarming the communist threat. The American people believed in its supremacy.It believed that the entire nation could achieve whatever there was out there to achieve. The government promised the citizens that the country was fighting a war far larger than it was widely perceived. It could never be denied that a victory of a communist regime would be a big blow to democracy. Being the leading staunch supporter of democratic ideals, the United States must assert its claim in proclaiming the freedom that the nation stood for. Every direction that the country steered itself into reflected the united front instilled among the Americans.It would be unfair if communism remained nullified and misunderstood in its concept. The ideology believed in the equal distribution of wealth and resources in the community. This vision of equal parta ke of the pie would be a welcome development if only it could be applied. Communism was patterned from the Socialist manifesto coined by Karl Marx. There was a preconceived notion that a communist rule would be progressive. Since the government controlled everything, its citizens were poised to be given equal rights and equal chances to shine in the society.But the truth was that a nation thrived not because of government intervention. No matter how good the governance of a country was, it would be difficult to subdivide opportunities equally. The growth and development of people relied on hard work. Government intervention maybe vital but prosperity resided in the ability of the citizens to make things happen. Freedom had no substitute. Unless suppressed, individuals have that capability to realize their dreams. America believed so much in their dreams. Its freedom was the vital factor in their progress as a nation.The ability to move around and weigh their options was what kept th e nation going. The law of the state shattered down all boundaries and borders which inhibit democratic ideals to pull through. Democracy valued the individual no end. The citizen was considered instrumental in making the wheels the freedom rolling. Regulations were enacted around the individual to allow a free reign of ideas to materialize. The American public openly supported its fight against communism. But as the Vietnam War drag on, the people saw that the situation was getting out of hand.The number of body bags which were coming home had increased. Americans felt that resources were being wasted in a foreign situation without the end in sight. Numerous draftees left for Vietnam and few would eventually make it back home. ANTI-WAR MOVEMENT The American people supported their governmentââ¬â¢s involvement in Vietnam. They were motivated to help a nation contain the repression of freedom. But somewhere along the line, more and more young American soldiers were killed. Many gro ups and organizations felt the need to review the superpower nationââ¬â¢s objective in winning the war in Vietnam.But the government hardly came up with a good explanation. The situation had gone bad to worst. And the public was looking at a war gone awry. The U. S. Administration could not address the different problems involved in the situation. Much more, it cannot give direct answers to the questions and concerns of the citizens. Numerous and contrasting groups around the United States rallied and gathered together each with causes of their own. Anti-government movements surfaced with the National Committee for a Sane Nuclear Policy when nuclear programs proliferated at the start of the Cold War.But the most aggressive campaigns against government regulations began with the rise of the radical Student Peace Union in 1959 although it went out of contention five years later. A more active group, the Students for a Democratic Society (SDS) continued upholding the cause. The orga nization was meant to assist the laborers, the intellectuals and the oppressed people. SDS later was taken over by student radicals during the 1950s. Sensing the disorientation and listless significance of life among Americans, the group voiced out its concern against the government. It actively pursued in valuing human rights in the society.It supported Lyndon Johnson in its bid for the presidency against Barry Goldwater in 1964. Social reforms were the main concern of the SDS. As the Vietnam War escalated, more and more young people were drafted from the Southern part of the country. The government also pulled out numerous individuals out from schools for a tour of duty in Vietnam. Civil Rights rallies continued to flourish. The public saw the gradual increase of enlisted men in the U. S. Armed Forces which revealed that American involvement in South East Asia was getting serious. Casualties began to pile up and replacements were seriously considered.It was 1965. The anti-war move ment which initially was limited inside the campus gained wide recognition throughout the country. ââ¬Å"The history of that movement is not only one of demonstrations, teach-ins, rallies and hundreds of other actions. It was also a history of internal debate over how and for what purpose to mobilize mass sentiment against the warâ⬠(Lorimer, 1991). When the bombing in North Vietnam began, demonstrations increased and anti-government activities moved on swiftly. Rallies and anti-war sorties gained prominence on every avenue of the United States.Faculty members joined the movement and immediately made an impact. A series of seminars were held to educate the public about the political, military and social effects of the Vietnam War. The march towards the capital city slowly gained numerous members. On April 1965, about 25, 000 people gathered in Washington D. C. to protest American involvement in Vietnam. Inspired by the turnout of events, campus editors formed a nationwide netw ork of media organizations that would circulate and educate various information and activities in connection with the anti-war movement.Pressure mounted on the Pentagon especially on Secretary of Defense Robert McNamara to end the war. The campaign gained more support from the religious community which sent out letters expressing their opinions and reactions about the turmoil in Vietnam. In 1966, the movement penetrated military branch and draft evasion became a major issue. Almost all sectors in the community had a hand one way or the other in keeping the youth out of the draft. Many individuals sought refuge in nearby countries such as Canada and Sweden to elude a trip to Vietnam.ââ¬Å"In a January 1967 article written for the Chicago Defender, Martin Luther King, Jr. openly expressed support for the antiwar movement on moral grounds. Reverend King expanded on his views in April at the Riverside Church in New York, asserting that the war was draining much-needed resources from do mestic programsâ⬠(Barringer, 1999). His views were not limited to religious matters alone. He tackled the moral effects of the ongoing war. As the number of recruits from the South increased in number, King voiced out his concern about the plight of the African-Americans in the United States.He assailed the governmentââ¬â¢s action to prolong the war by risking a huge chunk of the taxpayersââ¬â¢ money. The Johnson administration began feeling the pressure internally. McNamara was fired shortly after questioning the real objectives of the conflict. George Ball the Secretary of State handed out unsolicited advice to the president. The Vietnam War was taking too long. Cabinet members and government officials reviewed the political stance of the country. It was 1968. Election was on its way. Presidential candidates capitalized on the confusion of the current administration. The U. S.government turned out to be divided in its opinion and decision about the Vietnam situation. W ith no end in sight for the Vietnam offensive, the Tet American public opinion revealed that majority of the population now opposed the conflict. The Johnson presidency continued drafting young citizens for a tour of duty in South East Asia. Its policies about the war remained unchanged. The situation infuriated the anti-war movement across the American nation. ââ¬Å"The peace movement was often militant, and many on the campuses came to reject non-violence and fought heroically against the policeâ⬠(http://www. chss.montclair. edu/english/furr/Vietnam/riseandfall. html). Student activists clashed with police. The once peaceful rallies turned violent and blood spilled over. Protesters bloodied the streets and stormed the draft centers in different cities throughout the United States. Presidentââ¬â¢s Johnsonââ¬â¢s advisers reversed the administrationââ¬â¢s position on the Vietnamese issue and the presidency bowed out of contention. Anti-war dissidents grew bolder in it s actions. Fights soon erupted during public demonstrations. Protests continued and an estimated 500,000 people participated on the citizenââ¬â¢s second march to Washington.Active members rose from the ranks and went to the frontlines to lead the movement. However, the new frontrunners in the anti-war campaign gained little recognition from the American society. It was an age of expression. Majority of the general public declined its support due to the unacceptable and disturbing behavior of the protesters. The anti-war movement introduced a lifestyle which bannered the Sex, Drugs and Rock nââ¬â¢ roll theme. The situation turned complicated because of behavioral concerns. The protesters disrespected soldiers returning from Vietnam. American support for the movement faded a bit.Just when things subsided, an immediate turn of events angered the entire nation. Richard Nixon the newly-elected president planned the withdrawal of troops in 1970. But the war suddenly went ugly with a few shocking events. There was a public discomfort when news reported the involvement of American troops in the My Lai massacre. In addition, the United States entered a new trail in its bloody campaign when it invaded Vietnamââ¬â¢s neighboring country Cambodia. American sentiment across the nation was high. Academic institutions, Union groups and even some government agencies like the State department called for an end to hostilities.Violence went full gear when the National Guardsmen in Ohio killed a number of protesters at Kent State University. The public outcry was further driven out of proportion when true stories and coverage about American troop activities were revealed in the New York Times. Incompetence, disorganization, neglect, cruelty and abuses were directly associated with the behavior of the American military contingent. It was hardly the news all American citizens wanted to hear. The Nixon administration was quick to grasp the impending doom of prolonging the co nflict.On January 1973, the president announced the official statement which ended the American involvement in the Vietnam War. The anti-war movement was not without resistance. It was during President Johnsonââ¬â¢s presidency that protests and demonstrations rose to the public consciousness. The government conducted suppressive methods against the dissidents. Intelligence groups monitored the movements and activities of many protesters. The Central Intelligence Agency and the Federal Bureau of Investigation tracked down numerous figures involved with the demonstrations.Investigations even came to the point that conspiracy theories were framed by the communist groups to promote turmoil in America as a means of confusing and disorganizing the governmentââ¬â¢s focus on the war. But none of the framed stories were actually true. When America got itself involved in the Vietnam situation, a huge number of the population supported the governmentââ¬â¢s decision to intervene. Two y ears later, the publicââ¬â¢s backing percentage was down to around 30%. A surprising development soon emerged in the middle of the Vietnam conflict.Many Americans denounced the activities of the anti-war movement. However, due to the opposition to the war, most of the citizens joined the demonstrators in pressuring the government to end the escalating engagement. It was the image of the marchers and dissidents which the American public never liked. Drugs, alcohol and rock nââ¬â¢ roll were too much to handle especially in supporting a serious matter like the Vietnam War. ââ¬Å"The antiwar movement reached its zenith under President Richard M. Nixon. In October 1969, more than 2 million people participated in Vietnam Moratorium protests across the country.The following month, over 500,000 demonstrated in Washington and 150,000 in San Franciscoâ⬠(Barringer, 1999). The Kent State shootings and the invasion of Cambodia fueled one of the biggest protests in recent history. St udents from most universities and colleges joined hands with White House officials and blue collar workers to pressure the Nixon administration in ending the Vietnam War. Numerous arrests were made. Different groups came out in the open to lend their support. The complicated situation in the U. S. was coupled by the worsening American troop situation in Vietnam. Discipline vanished. Drugs became rampant.The morale was down. The way the Americans dealt the communist situation in the South East Asian region turned out to be disastrous. Never did it occur to them that a rag-tag band of guerrillas would take chances with superior firepower of the United States. As more and more troops came back home, demonstrations and protests gradually subsided. Troop withdrawal began in 1971. It was almost completed in 1975. The remaining anti-Vietnam War crowd continued to hound the government about other issues related to the war. The after effects of the bombing in Vietnam, the situation of the Vi etnamese civilians and the mismanagement of the U. S.funding for the conflict were some of the arguments used by the activists in continuing their marches. CONCLUSION ââ¬Å"The American movement against the Vietnam War was the most successful antiwar movement in U. S. historyâ⬠(Barringer, 1999). The conflict became a modern test of character for its people. Although it wasnââ¬â¢t the United Statesââ¬â¢s finest hour, victory could still be claimed. It showed the strength of the American public. In times of turmoil and disorder, no matter what circumstances or events were there, as long the interest of the nation was at stake, individuals gathered together to show unity and support for the Motherland.People owe so much to the land of their birth. It gave them life and liberty. Individuals from all corners settled their differences to unite and engage a common enemy. Americans portrayed a spirit of nationalism on two fronts. Primarily, citizens rallied around the flag righ t away when American involvement in Vietnam was announced. It was interesting to note how persons with different backgrounds could come together and work as one to achieve a specific objective. Americans held hands to fight for a cause. Citizens were instrumental in making the war possible.It sacrificed thousands of young American soldiers to battle an ideological threat. Moreover, the American people were also a vital factor in ending the war. As the war took longer than expected, the individuals behind the anti-Vietnam War movement reversed its previous decision to go on fighting. With numerous lives at stake, a united American front retrieved its troops from Vietnam and ended the conflict right there and then. Nationalism valued every American soldier. The interest of the nation was what drives the citizens to excel.No matter what was at stake, unity kept a country progressive and protected amidst the threat of external conflicts like the Vietnam War. ââ¬Å"The outpouring of str ong feelings and the tense atmosphere generated by the crisis make it easy to lose sight of some important aspects of this warââ¬âand all warsââ¬âwhich need to be dealt with on a personal and on a social levelâ⬠(Stew, 1991). BIBLIOGRAPHY Barringer, M.. The Anti-war Movement in the United States. Oxford UP. 1999. 4 November 2007. http://www. english. uiuc. edu/maps/vietnam/antiwar. html Lorimer, D.. Lessons of the Anti-Vietnam War Movement.New Course Publications. 1991. 4 November 2007. http://www. dsp. org. au/dsp/resist/r9viet. html Stew, C. The U. S. Soldier and the Anti-Vietnam War Movement. International Anarchism. 1991. 4 November 2007. http://flag. blackened. net/revolt/inter/seattle/vietnam. html Wiest, A.. The Vietnam War, 1956-1975. New York: Routledge. 2003. The Rise and Fall of the Anti-War Movement in the U. S.. 4 November 2007. http://www. chss. montclair. edu/english/furr/Vietnam/riseandfall. html Anti-Vietnam Movement in the U. S. 4 November 2007. http:/ /www. cyberessays. com/History/168. htm
Monday, July 29, 2019
Compare and Contrast two Poet Laureate from U.S. and England Research Paper
Compare and Contrast two Poet Laureate from U.S. and England - Research Paper Example Analyzing the reasons for the admiration and desirable positions of the poets, many are of the view it is a God given talent which is unfeasible for an ordinary one to attain. If such a one attempts poetry, it will turn absurd and cannot be treated as readable. The great epics like Iliad and Odyssey, written in poetic language undoubtedly unveil enchanting power of poetry. If one goes little further, one can see that the plays of Shakespeare still bewitch readers and audience with their tremendous poetic language. Therefore, one is obvious about the decisive role of poetry in influencing the majority and the appreciated positions of poets. Poet Laureate has been one such means to honor the great poets. It is an official position conferred to the respectable or the well talented poets for a particular period of time. The proposed paper aims to study the title ââ¬ËPoet Laureate,ââ¬â¢ identifying the popular poet laureates of the past centuries and attempting a comparative study b etween Poet Laureates from two different countries, specifically, England and The United States and make comparisons or contrasts, about them. Origin of the word ââ¬Ëlaureateââ¬â¢ It would be interesting for one to analyze the history of Poet Laureate before attempting a grave ââ¬Ëstudy on this topic. Researchers have identified the word ââ¬Ëlaureate has some historical importance. ... term ââ¬Å"laureateâ⬠comes from the use of bay laurel leaves in ancient Greece to create wreaths or crowns for heroes and the victors in athletic and literary competitionsâ⬠(Holman and Snyder). Thus, it is evident that the victor was given the wreath of laurel leaves and the word ââ¬Ëlaureateââ¬â¢ began to be used in the sense of ââ¬Ëvictorious.ââ¬â¢ Therefore, one can infer that ââ¬ËPoet Laureateââ¬â¢ became the title given to the most successful poet during a particular time period. Bob Holman and Margery Snyder observe, ââ¬Å"In the Middle Ages, ââ¬Å"Poet laureateâ⬠came to mean the poet chosen to serve a king or other noble patron by writing poems honoring the monarch and the state embodied in that monarchâ⬠(Holman and Snyder). The History of the tradition of the Poet Laureate The history of the English poet laureate dates back to the 12th century and the English Royal House of Plantagenet (The poet laureate). History identifies that t he poets during that time were known as ââ¬Ëversifiersââ¬â¢ and were privileged by the kings and awarded fees and pensions. Regarding the English tradition it is identifiable that the English Royal houses continued their patronage for centuries and later the Tudors and Stuarts followed it. The online article entitled, ââ¬Å"Poet Laureateâ⬠traces the history of poet laureate when writes thus, ââ¬Å"The position of Poet Laureate was informally created by Charles I for Ben Jonson in 1617, however, the title did not become an official royal office until it was conferred by letters patent on John Dryden in 1670â⬠(The poet laureate). The article adds, ââ¬Å"The position became the Poet Laureate of Great Britain in 1707, when The Act of Union created "Great Britain" as the political name of England, Scotland, and Wales.â⬠Some of the historical evidences
Sunday, July 28, 2019
ENVS Essay Example | Topics and Well Written Essays - 750 words
ENVS - Essay Example On the other hand, I used three Tissue papers and diverted then to garbage can. However, I have wasted a little juice in my glass. I used two more tissues. In the similar way, I have written down the weekly routine and the Assessment is as under. The weekly average of all my waste in combination and calculation becomes. At the end of the first day, I have thrown, one full egg, about 100 ml juice, 2 slice of the bread,100 gram of beef and little oil that is required to fry it. On the other hand, I have wasted 14 tissues, 3 notes papers and 5 computer papers. At the end of the second day, I have wasted one full egg; about 67 ml of juice, 2 and a half slice of bread, 67 gram of chicken and some oil to fry it. I have wasted 13 tissues, 4 notes paper and 2 computer papers. At the end of the second day, I have wasted one full egg; about 117 ml of juice, 2 and a half slice of bread, 132 gram of chicken and some oil to fry it. I have wasted 12 tissues, 5 notes paper and 6 computer papers. At the end of the second day, I have wasted one full egg; about 113 ml of juice, 1 and a half slice of bread, 106 gram of beef and some oil to fry it. I have wasted 11 tissues, 2 notes paper and 4 computer papers. At the end of the second day, I have wasted one full egg; about 109 ml of juice, 1 and a half slice of bread, 106 gram of chicken and some oil to fry it. ... I have wasted 17 tissues, 4 notes paper and 2 computer papers. Weekly Results In Packs My Food Waste 1 Littre Juice-16 slices of the Bread, 7 eggs, 375g Beef, 300 g Chicken and Half a litter oil, 212 ml of milk My Paper Waste Country Average 101 Tissues, 25 notes papers, 34 computer printed papers. 4 juice tetra packs Bottles and Plastic Can waste 3 milk bottles, 7 beverage bottles, 17 plastic bags, 8 plastic food cans. The pattern of the garbage shows that I am producing much waste but an Average person, in the country I live in, produces the similar quantity of the waste. There is need to change the way I live and the way, the food products are delivered. I am much surprised that I am producing such a massive amount of waste. There is need that I must reduce the waste by adopting the waste reducing tactics and planning. Most of the waste, I threw in the garbage, can be recycled. While, the food waste can be composted in order to extract the waste energy out of it. There is a need t o manage my food waste, as I am filing full glass with the juice while; I should fill half the glass and fill it again if I feel the necessity. In the similar way, I should take less slice of bread to reduce the waste. I realized that I am frying one egg daily in the breakfast just to fill the garbage. I should fry only one egg. In the similar way, I am filling full glass with the milk; I should fill half and take more if it is required. Beef and chicken should be cooked according to the need not more than the need. I realized that I use much tissue papers, I should use hand towel at home to reduce the need of tissue papers. On the other hand, the waste of computer printed papers and
Saturday, July 27, 2019
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS - Essay Example In their actions, hackers in the contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before. Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used. Social engineering is hackersââ¬â¢ equivalent of a con or a trick, which makes the target people or systems to think someone, something or an action, is safe, trustworthy and familiar while in reality it is not (Kiountouzis & Kokolakis, 2011). The most common of social engineering con tricks often involve the hacker sending an e-mail to the target person or system. This e-mail if first tailored so that it appears to have come from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, directs a computer to a malware, which is in turn downloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker em ploys the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks. Social engineering is today exploited by hackers to bring down or access othersââ¬â¢ computer/information networks and obtain information in the comfort of their homes provided they are sure their target will most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011). ... This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackersââ¬â¢ using social engineering. In this regard, the paper is a case study of an information security breach at one of the most renown IT security firms in the United States, the RSA. After addressing how RSA responded to the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a general understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection Motivation Theory This paper will employ the protection motivation theory to explain the role and importance of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techni ques. According to this theory employees will always protect themselves based on certain core factors. These factors include but are not limited to the probability of the occurrence of a security threat or breach, the suspected or expected severity of the threat, the vulnerability of the possible victims, the efficacy of the response/preventive mechanisms or behaviours. The motivation to protect oneself and property emanates from the evaluation of threats as well as the ability to cope with the threats or its effects. In the threat assessment context, employees of IS and IT companies are expected to be able to appraise the severity of possible social engineering threats and the seriousness of the situation once it occurs. On the other hand, the coping
Friday, July 26, 2019
FINANCIAL DEVELOPMENT IN A COUNTRY OF YOUR CHOICE Essay
FINANCIAL DEVELOPMENT IN A COUNTRY OF YOUR CHOICE - Essay Example However the modern UK banking and Finance owe their evolution to the Crown's dissolution of the monasteries which acted as money keepers in the 1530s.( Chen 1983:1400). Today the UK banking system is extremely advanced in terms of the globalization of its financial markets. The constant development and innovation in its financial operations and strategies has changed both its operational and structural financial landscape. Currently it is highly influenced by the Basel Committee (under the Bank of International Settlements) which was formed in response to the crises caused by the insolvency of Bankaus Herstatt and the problems caused by Nixon's announcement of the closure of the Golden Window ,has worked since 1974 to prevent such risks from injuring the health and wealth of such financial institutions. Of more importance however is the UK's current monetary policy which is aimed at delivering price stability which is a result of low inflation (with the Government's inflation target of 2%. expressed in terms of an annual rate of inflation based on the Consumer Prices Index (CPI).)Currently the Bank of England with its powers under the Bank of England Act 1998 has the role of the financial regulator and can set interest rates with little interference from the government.(expressed in terms of an annual rate of inflation based on the Consumer Prices Index (CPI). The decade of the nineties demonstrated low and relatively stable interest rates in contrast to the high and volatile interest rates which haunted the economy in the seventies.The interest rates also fell following the 9/11 incident,yet the UK financial sector saw definite booms with in the housing sector as interest rates increased in 2004.However the current low interest rates are affecting the system of bond markets, curre ncy markets and stock markets. This has also reportedly led to an increase in the to income ratio for consumers.Before the FSA (Financial Services Authority) became the statutory banking supervisor of the UK through the Financial Services and Markets Act 2000,UK bank supervision was the responsibility of the Bank of England. The Bank of England has been an informal supervisor for British Banks ever since the mid nineteenth century but the Bank of England Act 1979 confirmed these powers by granting it be able to approve or refuse authorization to carry out banking business in the UK. Employment and Inflation Recent statistics show that things are improving in terms of microeconomic indicators like that of employment and reduced inflation.The diagram below gives a rough estimate of the UK interest rates This is because during the past few years the UK has had much success in controlling interest rate fuelled inflationary problems. Employment in the UK reached 29 million in 2006 for the first time; the highest figure since comparable records began in 19711. New evidence from the Bank of England however Inflation Report2 suggests that UK has been hit by stagflation in its financial sector "In the central projection, higher energy and import prices push inflation above the target in the near term. Inflation then falls back to
Thursday, July 25, 2019
Personal Management Skills Essay Example | Topics and Well Written Essays - 1500 words - 1
Personal Management Skills - Essay Example This is the most suitable way of overcoming the limitations and challenges in my current skills. Through training, I will expand my knowledge in political, economic, social cultural and technological factors which determine the attainment of my goals and objectives. I aspire to gain more experience in leadership through seeking management positions in a reputable organization. Love, (2005, p. 42) explains that experience gives leaders connections and resources which enhance achievement of the target aims and objectives. Through work experience in leadership, I will acquire connection with prominent and influential people. Moreover, work experience will help me attain the financial resources which are required for effective attainment of goals. My personal aspirations are based on the knowledge that a leader requires personal management skills such as communication, interpersonal relations, proper time and resource management. Additionally, I am aware that there are political, economi c, social-cultural and technological factors in the environment which influence the success of leadership. Personal SWOT Analysis My Strengths According to Boone & Peborde (2008), planning, resource management, communication and organizational skills are required by a leader. Additionally, an effective leader should have ability for self development and overcoming challenges. My personal strengths make me suitable for leadership because apart from been excellent in managing people, I am a very responsible person and this enables me to effectively manage both financial and human resources. Riley & Mulford (2007, p. 81) points out that ability of a leader to take responsibility in the management of financial resources demonstrates that he or she would be relied upon in leadership. I am a serious individual when it comes to work and I act professionally in execution of all duties that I am responsible for. My experiences in leadership roles make me confident that my personal management skills are adequate for a leadership role. In University I was a leader of our student association for a period of one year. In this period I applied my personal strengths to effectively lead a group of eight executives My time management skills and adaptability are among my core strengths which proved to be very important in my leadership experience in University. As a president of the students association, I was able to make timely arrangements for meetings and projects. It is through my admirable adaptability that I was able to interact with students from diverse backgrounds and accommodate their different ideas. According to the assertions of Cameron (2002), leaders need to be flexible so that they would adapt to the divergent opinions of their followers. In my leadership experience I was enabled to apply my abilities and strengths to control, align and coordinate many activities associated with student activities. However, I consider my ability to learn fast as the most lucrat ive strength which helped me to be a successful leader of the studentââ¬â¢s association. This is because, I started as a novice leader but gained management and leadership skills very fast through quick leaning especially in professional communication and relationship with other officials and members of the association. My personal managem
Wednesday, July 24, 2019
Interactive media (critical reflection) Essay Example | Topics and Well Written Essays - 750 words
Interactive media (critical reflection) - Essay Example the audience has an opportunity of interacting with the actors and has a participative role whereby, they can offer their opinion on the theme of the work presented. Interactive theatre therefore has served to bring a paradigm shift in the traditional media landscape specifically in theatre. The interaction level in interactive theatre varies depending on the willingness of the audience to participate. This paper will offer a critical reflection on different aspects of interactive theatre and its relevance to culture and its pertinent effects on the media landscape. Interactive theatre offers the modern audience an opportunity to participate in emerging debates centred on material that is presented in theatres. Considering a theatre comprises of a large audience, the participation of the audience must be organized in a certain manner. The level of interaction varies on the decisions made by the actors and the contribution of the audience. In some cases, the audience is expected to complete the plot of a certain story while in others the audience is expected to offer a critical review of how the material was presented. The level of interaction is critical in making interactive theatre achieve its intended purpose. This form of theatre seeks to integrate the views of the audience with those of the producers and the actors. Passive spectators are transformed into active participants in interactive theatre (Evans 2013, p. 192). In a bid to understand the cultural relevance of interactive theatre, it is important to highlight the UNESCO definition of culture. According to this body, culture denoted, ââ¬Å"A set of distinctive spiritual, material, intellectual and emotional features of a social group.â⬠With such a definition of culture, if interactive theatre is to be culturally relevant, it must contribute to the spiritual, material, intellectual and emotional features of the society. Interactive theatre, exhibits a high level of cultural relevance (Jacobson & Hwang
A4 Essay Example | Topics and Well Written Essays - 2500 words
A4 - Essay Example 5). Before 1979, policies that came under the Labour and Conservative governments were more oriented towards greater equality and increased economic growth than on any other goal. The main legislation associated with equal opportunities at this time were the Equal Pay Act (1970, coming into force in 1975), the Sex Discrimination Act (1975) which specifically included education, and with respect to ââ¬Ëraceââ¬â¢ issues, the Race Relations Act (1976). All these Acts set legislation towards a range of policies which were initiated and developed by individual teachers, schools and local authorities, many of whom were anxious to see enacted the spirit as well as the letter of the legislation. Feminists played a significant role in inducing EU to emerge new strategies ensuring equality of opportunities regardless of gender, culture or race. The main concern however was to point the EU towards recognising inadequacies in schooling for girls. The school curriculum was followed by obsolete syllabuses and content were found to exclude the experiences of girls and women whether white or black. At secondary level, where choice was available, girls tended to opt for humanities, languages and social science, and boys for Science, Mathematics and technological subjects (Pratt et al. 1984). Also, students tended to be directed into traditionally male and female subjects and careers, and in the main, girlsââ¬â¢ careers were believed to be less important than boysââ¬â¢. The hidden or unwritten curriculum of schooling was also found to exert pressure on students and staff to conform in sex-specific ways. For example, there were different rules on uniform and discipline for girls and boys, and sexual harassment and verbal abuse were found to be common features of school life (Lees, 1987). These inequalities were felt by the teachers and advisory staff and by the early 1980s female teachers began to develop a range of strategies in order to counter
Tuesday, July 23, 2019
Knowledge Management, Social Networks and Innovation Essay - 4
Knowledge Management, Social Networks and Innovation - Essay Example Through this, organizations aim to acquire and create potentially useful knowledge that can be used to achieve maximum effective usage to influence the organizational performance positively. What has been learned is then embedded into the organizationââ¬â¢s fabric through organizational learning that is complementary to knowledge management (Easterby et al, 1999). A company like China Telecom happens to be the largest fixed-line service provider in China. It is also the third largest mobile telecommunication provider in the country. The company offers an attractive full range of integrated information, application services, and internet connection. It has over 200,000 staff members with branches in other regions of the Americas, Hong Kong, Europe and Macao. In order to stay competitive, the company accelerates creation of new products through optimal use of its worker base in a unified innovation process. To facilitate collaboration among employees, customers, and partners the company developed innovation platforms with Web portal interfaces. The portal in turn accepts ideas and innovative experiences from the enlarged community. The companyââ¬â¢s marketing team analyzes new acquired information that is gathered from the consumersââ¬â¢ Web 2.0 entries and uses the information to introduce and launch new products and services with the kn owledge that subscriber demand exists. The company embraces an open dialog with its customers, employees and partners through social tools that involve them in internal and external processes. By using social networking tools like social media tools, a culture of information sharing is encouraged within an organization. They provide a gateway for the exchange of current and relevant information across organizational silos and geographies. To drive a social change in the work force it is essential for organizations to build trust and encourage social interactions. Social networking tools also empower employees and
Monday, July 22, 2019
Leadership and Management Essay Example for Free
Leadership and Management Essay Education is a very important institution due to the role it plays in transmitting social skills and knowledge required of any member of the society (Hofman, Gray Daly, 2004). It is worth noting that the levels of development of a countrys education systems bears close correlation to the economic and social conditions that the said country will afford. It is therefore upon members of the society and the education system to ensure that members of the society achieve as much as possible from this system. High attainment in eduction is far much beneficial than low level education in the modern society due to the high level of educational attainment. A doctorate degree is currently what an undergraduate degree was in the 1990s (Hofman, Gray Daly, 2004). The level of educational attainment requires an individual to posses at least a masters degree to stand out among others. The need to stand above others and gain some advantage over them in the competitive job market is the main reason for my pursuance of a doctoral degree. In choosing educational leadership and management of higher institutions in Singapore the key consideration was my vocation. I have personally worked in the educational field in different capacity. Having served as an assistant head of international programs at Crestar institute, human resource management with a Christian association, lectured English at Kaplan city campus and being a full time consultant trainer at NTUC, my life has centred around management and higher institution of learning. Understanding the nature of higher education leadership and management in Singapore is therefore relevant to my career. Relevance of USQ Doctorate studies is about mastery and application of principles and theories studied in class. A doctorate graduate should be able to analyse and relate issues related to their area of specialisation by giving varied dimension. Doctorate graduates are expected to be above other levels not just in their approach to thinking but they must also display high levels of norms and values expected of the society (Mok, 2006). Mastery of principles that are relevant to the needs of the society, and the development of norms and values that are expected of the society are just but a few of the benefits expected of a USQ professional doctorate; it is thus clear that the program not only makes better specialists but also better members of the society by integrating the values of determination, team spirit and courage into the students. The role played by the education system just like any other social systems cannot be done by any other system. Propagation of social norms and development of skills that are relevant to the needs of the society are some of the objectives of the education system. Though the education systems is one of the oldest institution, the development of the higher educations sector in Singapore is a recent event. Singapores education system though quite organised as compared to its neighbours is faced with a number of challenges (Lee Fredriksen, 2008). Most challenges in the education system can be traced to the management and leadership of the education system. Despite the education system being a social systems it still falls prey to the effects of partisan politic. The involvement of the central government on educational matter cannot be avoided since the education system is under the governments care, however, the education system should be shielded from the negative effects of poor politics. Corruption lack of professional knowledge and nepotisms are some of the issue that affect the education systems at the low level. Researching on education management and leadership in higher education sector not only develops my research skills but also ensure awareness on issues that affect management and leadership of higher education sector and is therefore relevant to efficient delivery in future. Personal Capabilities Doctorate studies require good academic background and interest in the area of study. Determination defines me; level of education attainment and the nature of jobs that I have been involved in give me the experience and skills required to undertake a doctorate course. I am well versed in the management of the education system and problems faced by low level personnel like tutors and professors. My position places me in a situation where I can look at the issues from both the management and implementation level which is a capability that few have. My academic qualification is beyond question for I am a holder of a masters degree in education. I therefore possess the skills and qualification required of doctorate degree and there is no cause for worry on my abilities. Literature Review The education system thought critical to the development of the society is no stranger to controversy. Implementation of the education system goals has especially been under fire with some coming up with the view that the education system, just like any other social system is responsible for social reproduction (Kassem, Mufti Robinson, 2006). The education systems is seen by such critics as a tool used by those in power to ensure they maintain their position while disregarding the needs of the less empowered. It is quite true that commercialisation of education has led to increase in levels of educational attainment. Increase in levels of educational attainment is characterised by increase in the cost of acquiring higher education. The costs of education at a level that is relevant to the development of technical skills required by the job market is high and borders exploitation (Kassem, Mufti Robinson, 2006). Projection shows that the cost of education is likely to go up with increase in demand for education. This is blamed on commercialisation of education which has made it business like and therefore probe to the market forces of supply and demand the only differences being that the demand is always on a high. On the other hand, the commercialisation of education and strategies developed by the government and other stakeholders who are blamed for the problems facing education by social reproduction theorists is cited as the first step towards the development of the high education sector (Mok, 2006). Take China as an example, the reforms which included allowing privatisation of the higher education sector and formulation and implementation of cost sharing mechanism are cited as the key driving factors to the levels of development achieved (Mok, 2006).
Sunday, July 21, 2019
Investigating The Importance Of WAN Technologies Information Technology Essay
Investigating The Importance Of WAN Technologies Information Technology Essay Wide area network is very important to the global to do their work easily now days every companies trying to develop their business all over the world wide area network helps them to connect their network together .the companies need to design the network according to their needs and purpose because different type of networks are available for different purpose. According to this project the company network placed in different countries each network hold different application Different type of architecture models is available to design network one is peer to peer model and another one is client/server model most of the network designed by using client/server model. peer to peer model is connect two or more computers connected through network this model is unsafe because it is difficult to implement security policies .different network topologies are available to design network so we have to consider these topologies when design a network. Normally every companies using star topology to design their network because this topology have more advantage when compare with other topologies various hardware components need to design a network such as switches, routers, firewalls, server, linkect By using Ethernet technologies and other network technologies several LAN (local area network) is created in different countries then each subnet LAN was connected together via ATM cloud to make WAN (wide area network) In this project company network model was designed in opnet modeller to investigate the performance of a network looking at WAN technologies with varying traffic loads there are different type of link used to implement the traffic load the network was designed up to getting the final result LITERATURE REVIEW Computer network Computer network is more than one computers or group of computers and network devices are connected together for the purpose sharing information, file and data between each computer. Different type of devices need to design a computer network such as switches, hubs, routers, different link, firewall, server and work station Protocols are use to do sharing information, files, datas over the network there are two transmission technology available in computer network one is broadcast and another is point to point connection. Computer network classified according to network architecture (peer to peer model, client/server mode), network topology (star topology, ring topology, bus topology and mesh network topology).computer network it is classified as personal area network (PAN), local area network (LAN),metropolitan area network(MAN),wide area network(WAN),global area network(GAN) Computer network is very useful to the public because it has many applications such as access to remote information by using this application any one can do their work from anywhere in the world( ticket reservation ,shopping), communication between one to another through email, videoconferencing. Business application Different type of computer network Local area network (LAN) Local area network (LAN) is less number or group of computers and related devices such as printer, scanner etc that share a common communication line.lan is considered within a small geographical area such as a home, office building here LAN is designed by using Ethernet technology such as Ethernet cables, Ethernet switches and adapters. Local area network (LAN) performance features are depending on size of the network, network topologies and transmission technology. Advantage of LAN is cover small geographical area so transmission time is limited. Different type of topologies is support to create broadcast LAN network such as bus and ring based topologies. FIDD is used in the LAN for connect token ring. IEEE 802.11standad indicates the local area network technologies. [Andrew s] Metropolitan area network (MAN) Metropolitan area network (MAN) is developed version of LAN and this network also using same technologies as LAN, compare with LAN it cover large area (company offices and city).this network carrying voice signal and dates. MAN network contain few cables it dont have any switching elements, by using network technologies such as backbone technology, routers and switches it connect several LAN networks. DQDB (distributed queue dual bus) is MAN network standard by using this standard we can expand the network up to 30km and speeds of 34 to 155 Mbit/s Wide area network (WAN) Wide area network (WAN) comparatively covers wide geographical (country or continent) area and connecting number of local area network, local area network connected to a WAN through the public net work such as internet.WAN network can use is satellite system, WAN routers contain antenna by using antenna it can make data transmission. Switching device and transmission link are two separate mechanism of subnet in the WAN network. Different type of transmission link are available to carry the signals and data transmission from one system to another system over the WAN network such as twisted pair cable, coaxial cable and fiber optic cable. WAN is a collection of LAN, these LANs are connected via switching device router so each LAN must contain at least one router to interconnect. WAN network use backbone technology. Global area network (GAN) Global area network (GAN) is collection of different network such as WAN or MAN it covers the very large geographical area (unlimited area). Worldwide individual business companies use GAN network for their process. Network architecture model Client-server network model Client- server model is very useful and popular network model in the network architecture client and server devices are designed for the particular function in the computer network client server model mainly used in internet as well as local area network. Personal computers are client device in the network it is installed with required network software; database and files are stored in the server devices, server devices contain more memory, bigger disk drive than client devices The client server model client makes a request to server and server receives client request and response to their client request. Advantage of client-server model is centralised network model it means all users in the network are connected to a central server. Central server contains all user information and communication information. Configuration of data backup, security policies are easy in this model Peer to peer network model Peer to peer network is suitable for a small network in this model more than one computer or group of computers are connected through the network .peer nodes sharing their documents, audio, video file and datas in digital format a and also they sharing their resource without a dedicated server all connected peers act as either client or server. One system acts as server for one transaction while simultaneously act as client for another transaction in this model every client act as server and server act as client. It is complicated to apply security policies and access policies to the network because peer to peer network is a small contain few computers. Access permission and rights of users set individuality in peer to peer network. This model do not utilize centralized network model so it dont have any user information or communication information NETWORK TOPOLOGIES Different network topologies are available in computer networking they are star topology, bus topology, ring topology, tree topology and mesh topology these topologies help to design an excellent network. when design a network designer should have to choose which topology is suitable for the particular network Ring topology Ring topology is used to connect network devices in ring shape when these devices in ring shape each device has two neighbour devices for their message transaction this message transaction between neighbour only one direction. Ring topology use token passing system to their message transmission and access control. Main drawback of this method is any device fails in network ring that cause entire network transmission become failure this kind of network can manage and implement easily and it normally uses in office, school network different technologies are available to implement ring topology such as token ring and FDDI Star topology Most of the network use star topology because implementation and maintains of this network is easily this kind of networks use point to point connection between devices and central hub main advantage of star topology is any connection fail between device and hub that affect only particular device. This network devices use twisted pair Ethernet cable to connect with central device hub Bus topology Bus topology mainly used in LAN networks because these kinds of topology suitable for limited number of device bus topology use backbone to connect all devices together backbone function as connect different part of network and offering path to message transmission between network. Implementation of this topology is easy and inexpensive. It is possible to message transmission in both directions, to avoid message bouncing use termination at both end of the bus cable there is no need more cabling to connect devices. Main disadvantage of this topology is if backbone cable fails that affect whole network Tree topology Tree topology combines multiple several star topologies together into a bus by using point to point connection hub devices linked to the tree bus to develop network scalability bus/star topology in a hybrid approach. Implementation of this topology is very difficult, if backbone cable file whole network become failure advantage of this topology is each parts connected by point to point link and it supported by a number of hardware and software vendor. Network components Hardware and software components need to create a network there are different type of hardware components available in the network each of them configured for different function. Usually a network contains many components such as switch, router, server, firewall, hub, work stationest. Router Router is one of the important devices in the network it is used to connect more than one network together such as two WANs or two LANs and it allow data transmission between the networks. Routers having routing tables it contain information about network devices that uses to find the destination place of the network. Routers work at transport and network layer of the OSI reference model. Routers maintain traffic control in the network. Switch Switch is one of the hardware devices in the network it is used to connect network device such as server, workstation and printers together with in a local area network .switches work at the data link layer of the OSI reference model. Switches have a facility to check whether that the data received or not, delivering the messages to correct destination and also identifying that the particular data was transferred from which device (source) to other device (destination).`different type of Ethernet switches are available but in this network i have used Ethernet 16 port switches to connect network devices. Server In the client/server networking model a server receive requests from client in the same network or other network and response client request. There are different types of server with their related configuration. In this network i have used many servers such as database server, Email server, VoIP server, HTTP server, FTP server, file server, printer server and backup server. Firewall Main task of the firewall is preventing unprivileged user from accessing the network. There is different type of firewalls such as packet filter firewall, application gateway and proxy server each of them doing different job in the network .firewall implemented in some hardware devices. In this project i have used firewall router in a simulation. Open system interconnection (OSI) model OSI reference model is clearly defined how messages transmitted from source to destination in the networking. OSI reference model contain seven layers such as application layer, presentation layer, session layer, Trans port layer, network layer, data link layer and presentation layer. This model describes structure of a network for applying protocol on seven layers. Every layers doing different function. This model spited into tow part such as upper layers and lower layers. Upper layers associated with software and lower layers associated with hardware. Application layer Application layer is highest layer of OSI reference model. Main function of this layer is interface for users to relate with application and identifying end user, verify resource availability. By using application users can access information at application layer. Application layer providing some services such as file transfer, electronic mail and software services. Many Protocols are implemented in this layer such as file transfer protocol (FTP), hyper text transfer protocol (HTTP), simple mail transfer protocol (SMTP) and telnet. Presentation layer Presentation layer is sixth layer of the OSI reference model this layer receives all messages from application and sends those messages to session layer. Main function of this layer is converting the format of receiving and sending data format and also many functions are undertaking by this layer such as data compression, encryption, decryption, protocol conversation and encodes message for email transaction. Presentation layer providing some services such as simple mail transfer protocol (SMTP), telnet and file transfer protocol (FTP). At this layer data transmission starts with syntax and semantics format. Session layer Fifth layer of the OSI reference model is session layer it provides function to communicate between two nodes in the network this layer create, maintain and stop connection between the node and few protocols are implemented they are data link protocol (DLP), apple talk session protocol (ASP) and printer access control protocol (PAP) these protocols are mainly uses to multimedia messages. Transport layer Data link layer Data link layer is second layer of the OSI reference model the use of this layer is control and arranges all sending messages from software to network link. This layer makes some network setting such as data format setting, time setting and wire setting. it gives many services such as keep all messages are correct format when they transmit, maintain flow control when messages transmit over the link ,detecting error in physical layer and encoding messages for secure transaction. Physical layer Physical layer is lowest layer of the OSI reference model. This layer receives all messages from data link layer in the format of bits and converts into signal (electrical or electromagnetic signal).messages are sending to physical media via switches and wires TCP/IP model TCP/IP model contain four network layers such as application layer, transport layer, internet layer and network inter face layer. TCP/IP model and OSI reference models are providing similar services.TCP/IP model contain network communication protocol used to for different type data transmission between different networks. Simple mail transfer protocol (SMTP), used to Email transaction, file transfer protocol (FTP) used to file transaction etc. This model defines how particular protocols are implemented in a computer for data transmission over the network. End to end connectivity of the TCP/IP model define how datas received, routed and formatted at end nodes. TCP/IP application layer Application layer is higher level protocol of TCP/IP model this layer match to OSI reference model of session layer, application layer and presentation layer. This layer gives different services to user such as file transfer, email ect. Application layer contain many protocol such as simple mail transfer protocol (SMTP), file transfer protocol (FTP) and telnet. All datas are coded in this layer then these datas encapsulated into transport layer. Lower level layers of TCP/IP model treat by application layer. Transport layer Transport layer is third layer of TCP/IP model. This layer providing services these services are managed by the user datagram protocol (UDP) and transmission control protocol (TCP). TCP is connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. UDP is connection less and unreliable transmission. Error detection, error correction retransmission of datas is impossible in UDP it is suitable for audio and video transmission. Internet layer Internet layer is second layer of TCP/IP model this model used to transfer the message from source computer to destination computer. Internet protocol (IP) is main protocol of this layer. This protocol providing many services such as routing packets between source and destination. Internet protocols receive messages from network interface layer in the format of bit then make it into packets. Network interface layer is lowest layer of the TCP/IP model main function of this layer is by using protocol it create a connection to physical medium, error detection and packet framing are possible in this layer. This layer contain local area network (LAN) and wide area network (WAN) technologies such as token ring,X.25,ehhernet and frame relay. This layer responsible for physical devices such as wire, cables, network interface card and satellite links. Asynchronous transfer mode (ATM) Asynchronous transfer mode (ATM) contains three layers such as ATM adaption layer, ATM layer and physical layer. This model providing different type of function it used to transfer all type datas such as audio, video and text messages. Same time we can use ATM technology in different network (LAN. MAN and WAN). ATM model contain management, hyphenated and handshaking protocol, quality of services and flow control facilities. Hyphenated protocol is connection oriented; cell switched and point to point.ATM use different type of technologies to data transmission. Fixed -length cells model used to transfer variable frames this model use 48 bytes for data, 5bytes for overhead. ATM adaption layer ATM adaption layer is third layer of this model this model composed application layer, transport layer and session layer of OSI reference mode. There are two different types of layers in ATM adaption layer such as convergence sub layer and segmentation and reassembly sub layer. It is classified into five types of class for providing different type of services. According to this class of services Convergence sub layer receive messages from high level layer, identify the received message format, type finally arrange all messages for sending out. ATM layer ATM layer is second layer of this model this layer providing link between ATM adaption layer and physical layer to transmit cells between those two layers and also create virtual link, doing multiplex and de-multiplex of cells, creating cell header. ATM physical layer ATM physical layer is first layer of this model the main function of this layer is encapsulate all incoming cells in a proper format before transmit bit to the physical medium. Physical layer divided into two sub layers such as transmission convergence sub layer and physical medium dependent sub layer these sub layers are doing different function such as transmission convergence sub layer doing error correction, framing and de-framing of cells and physical medium dependent sub layer assign bit time and coding for the physical medium. Protocols Protocol is a set of rules it is used to transfer the message between one ends to another end. OSI reference model is clearly defined how messages transmitted from source to destination in the networking. This reference model contain seven layers each layers must contain one or more protocol for their message transmission. Internet protocol (IP) Main function of internet protocol (IP) is transmits message between one end to another end. When sends the messages via this protocol message divided into many parts each part contain IP address if end system and this small segment send different ways receiver receive this segment in different order. This protocol implemented in network layer of OSI reference model and internet layer of TCP/IP model so internet protocol (IP) support data transmission to upper level layers in OSI and TCP/IP reference model. This protocol is connection less protocol and we cant make sure about delivery of message. Now days two different version of internet protocols (IP) are available in the networking such as internet protocol version4 (IPV4) and internet protocol version6 (IPV6). Transmission control protocol (TCP) Transmission control protocol (TCP) applied in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission. This protocol is a connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. Message transmission via this protocol is very slow because of overhead (20bytes) for error correction/detection and acknowledgement. There are two types of buffers such as sending and receiving buffers these buffers are used to storage, flow control, error detection and correction. Same time messages can be transfer both direction in TCP it provides full duplex transaction and also multiplexing and de-multiplexing are possible in TCP. [Behrouz A.] User datagram protocol (UDP) User datagram protocol (UDP) installed in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission between the layers. This protocol is a connection less and unreliable transmission protocol. Message transmission via UDP is very fast because there is small header (8bytes).this protocol containing many drawbacks such as no error control and no flow control. Receiver cant identify whether this message is original or duplicate when message transfer via UDP. Encapulation and decapitation of messages are possible in UDP when messages transfer from source to destination. [Behrouz A.] Hyper text transfer protocol (HTTP) Main function of hyper text transfer protocol (HTTP) is access data from internet (www).this protocol is applied in application layer of OSI and TCP/IP reference model. It is describe the message transmission over the network from client to server and data format. This protocol use TCP for data transmission between client and server in this model the client first send request to server then server send response message to client. There is no secure message transmission because HTTP does not provide security HTTP provide security when it run over the secure socket layer This protocol messages can only understand by HTTP client and server. [Behrouz A.] File transfer protocol (FTP) File transfer protocol (FTP) is applied in application layer in TCP/IP model. Main function of this protocol is transferring datas from source to destination (client to server or server to client) in easy way.FTP protocol create two link between source and destination one is for message transmission other link for replay.FTP use three commands such as RETR command function of this command is copying files, STOR command function of this command is store the files and LIST command this is for list the files.FTP use different transmission mode to transfer the files such as compressed mode, stream mode and block mode .through the FTP protocol we can send text files, images and ASCII files.FTP use two different TCP port, port 20 is used transfer datas or files between client and server and port 21 is used to control transmission between them. [Behrouz A.] Simple mail transfer protocol (SMTP) Simple mail transfer protocol (SMTP) is installed in application layer in TCP/IP reference model. Function of this protocol is transferring the email messages between client and server and also it contains some commands these commands are used to transfer the datas between client and server. Some other protocols are support to email transmission with SMTP such as post office protocol (POP3) and internet mail access protocol (IMAP4) [Behrouz A.] Simple network management protocol (SNMP) Simple network management protocol (SNMP) is applied in application layer of TCP/IP reference model this type of protocol is used to manage the network for providing better network performance by regular testing system, protect the network from unwanted user by monitoring system. SNMP protocol defines the transaction between the manager and agent. SNMP manager verify the agent details by sending requesting message to agent. SNMP identify the packets exchange between manager and agent [Behrouz A.] Network transmission media A transmission media is necessary to transfer a signal form source to destination in the networking system. Signals are transfer via Guided and unguided transmission media now a days different type of guided transmission media support to carry the signal such as twisted pair cable, coaxial cable and fiber optic cable. Unguided transmission media it is radio wave, micro wave and infrared Twisted pair cable Twisted pair cable is one of the guided transmission media to carry the signal over the network. Analogy and digital signal can be carried by this cable. This cable contains two shield copper wire then these wires are sick together. This type of cables used in telecommunication system. Twisted pair cable not suitable for long expanse, repeaters is needed to use long distance, for small area it will work without amplification. Compare to other cables this type of cable is inexpensive. Two types of twisted pair cables are available one is unshielded twisted pair cable (UTP) another one is shield twisted pair cable (STP). [Andrew s] Coaxial cable Compare to twisted pair cable it is better shield cable it is suitable for carry the signal to long distance. This kind of cables used to carry the high frequency signals and broad band signals as well as this cable carries analogy and digital signal but using different cable. Coaxial cables providing functions in several ways one is baseband it use total bandwidth to carry the signals, another one is broad band it divide the bandwidth with signals. Centre core it is made by hard copper wire, this core is bounded by inner dielectric insulator, copper screen and plastic sheath. [Andrew s], [Michael] Fiber optics cable Fiber optic cables transfer the signal in the form of light beam. This type of cable is used to connect different cities and countries such as telephone connection because these cables are suitable for long distance. Two different types of fibre optic cables are available such as single mode fibber optic cable and multimode fiber optic cable and this cables contain two part such as inner class cylindrical core and outer class cladding Compare with other cables it has many advantage such as it can be used to long distance, signal transmission is very fast and loss of signal is very low. Disadvantage of this cable it is very expensive. [Michael] Quality of services Quality of services (QOS) contains many network technologies to develop a network. Quality of services gives expected result to the network and quality of services develop and determine data transfer, delay, and error rate and loss of cell in the network. It is very use full apply the quality of services to VOIP and video but implementation of quality if services to network is very difficult. Quality of service measure Type of Delay Different type of delay are occur in the network during the data transmission from one system to another system they are processing delay, queuing delay, transmission delay and propagation delay. Processing delay A data(1 bit) transmission time between the end systems (source to destination) it is called processing delay this delay may occur for the following reaction such as error datas transmitting from one system to router, network architecture, switching mode and also it include in configuration of network devices Propagation delay A data (1 bit) of transmission between the source and destination it is called propagation delay. This delay depends on distance between routers and propagation speed; it depends on the transmission media propagation delay calculated by dividing the distance by propagation speed Propagation delay= [Behrouz A] Queuing delay Datas or packets waiting in queue at intermediate device (router) for their transaction, when the network is busy router cant rout all the packet at same time it process these packet one by one so packets need to wait this waiting time is called queuing delay. Transmission delay Transmission delay is amount of time is needed to transfer one bit of data via transmission media. Transmission delay depends on bandwidth and size of the data. Transmission time= [Behrouz A] Jitter Voice over internet protocol (VOIP) Voice over internet protocol (VoIP) is used to communication purpose it means one person can transfer his information to another person through telephone call, voice and fax over the IP based network. To reduce the bandwidth waste VOIP use packet- switching method to telephone calls. Normally more bandwidth is needed to voice transmission but voice data is compressed to small for the transaction so it require small bandwidth. Main advantage of VOIP is reducing the cost of long distance calls, when compare with ordinary phone call for this reason every organization applying VOIP in their networks. IP telephone is used in the VOIP network because IP telephone designed with coder/decoder for convert the voice signal from analogy to digital signal and digital to analogy signal. Softwares and hardware components are helps to connect the phone with network. Different protocols are implemented in the VOIP network for support voice transaction such as RTP(real time transport protocol) it support the delay of audio, H.323 protocol used to multimedia transmission, H.235 protocol used to data encryption. ) [Michael] List of books 1) [Michael] MICHAEL A, WILLIAM M Networking explained, second edition ISBN 1-55558-252-4 2) [Behrouz A.] Behrouz A. Frozen, TCP/IP protocol Suite Fourth Edition ISBN 978-0-07-016678-3 3) [Andrew s] Andrew S.Tanenbaum, computer networks fourth edition ISBN 0-13-038488-7 4) [James F] James F.Kurose, Keith W.ROSE Computer networking, fourth edition, a top down approach ISBN -13:978-0-321-51325-0 ISBN -10:0-321-51325-8 5) [Behrouz A] Behrouz A.Forouzan, data communication and networking, fourth edition ISBN 007-125442-0 List of Internet and
Subscribe to:
Posts (Atom)