Featured Post

A Brief History of a Colony That Never Was

New Devon state was established on the north-west bank of the advanced USA in the Delaware river’s valley.â â It was the Indians w...

Monday, September 30, 2019

Oedipus The Great Essay

In the book Oedipus The King, there was a curse that stated that Oedipus was to kill his father, Laius, and marry his mother, Jocasta. So when Oedipus’ parents find out that Jocasta is pregnant they have the baby and give it to a man to take to the top of a mountain. But instead of the man taking the baby, Oedipus, to the mountain top he gave him to a family and the family then raised Oedipus. When Oedipus was older he was traveling to the town of Thebes when he ran across some people that demanded that Oedipus get off the road and let them get pass. Being himself Oedipus got mad and killed them all, what he did not know was that that was his father and when he got to Thebes he would marry his mother, the queen, and become the new king of Thebes. Oedipus always had trouble controlling his anger and in that moment it went all down hill. In Oedipus The King, written by Sophocles, Oedipus exhibits the following tragic flaws : he jumps to conclusions, he’s controlling, he has anger problems, and he’s too confident. The first tragic flaw of Oedipus is his problem of jumping to conclusions. In every bad situation with Oedipus, which happens to be quite frequent, he always assumes something before a conclusion ever occurs. He never just waits to see what someone has to say or to see what happens, it’s like he always controls the ending of every situation and he likes it until everything goes wrong. In the book Oedipus jumps to the conclusion that Tiresias is conspiring with Creon to keep the secret that they had killed King Laius. He does not consider the fact that they are looking out for him so that he wont expose himself. But Tiresias finally gets tired of the things that Oedipus is saying and he says, â€Å" I am going. But first I will say what I came here to say†¦ The man you are trying to find, with your threatening proclamations, the murderer of Laius that man is here in Thebes†¦ He will be revealed as brother and father of his children with whom he now lives, the son and husband of the woman who gave him birth, the murderer and marriage partner of his father. Go think this out. And if you find that I am wrong, then say I have no skill in prophecy†, Tiresias then leaves Oedipus standing there stunned(Oedipus the King pg. 40). After that Oedipus gets so upset and starts to yell and starts to tell the people of Thebes that Tiresias and Creon are lying. That they just want the blame off of themselves and on to him. He says this because he does not believe it and because he wants to make a scene and just wants to be the center of attention and he wants everyone on his side just in case something happens and he need someone to stick up for him. And because Oedipus is the king the people will listen to him because they trust him and they trust what he says when he says that he did not kill Laius. Another tragic flaw of Oedipus is the fact that he’s controlling. Oedipus controls, well he tries to control, everything that everyone does. He never wants anyone to say anything about Laius’ death or about his background. He tries to control every situation, every conversation and so forth. When he was talking to Tiresias, Tiresias decided to leave because his conversation with Oedipus was getting nowhere. Tiresias said, â€Å" I will go, then. Boy, lead me away†, and then Oedipus say, thinking he had to, said, â€Å" Yes take him away. While you’re here you are a hindrance, a nuisance; once out of the way you wont annoy me any more. † (Oedipus the King pg. 30 & 31). He thought that would make him seem in control of Tiresias life and the things he did in his life but Tiresias did not like that and he came back at Oedipus even harder making Oedipus go to his palace and think about what has just happened. The only logical thing that Oedipus could have been in control of was the town of Thebes because he was now the new king of Thebes, but everything was messed up when everyone found out that he had killed their previous king Laius. The next tragic flaw of Oedipus is his anger problems. In every situation with Oedipus he always ends up yelling at someone. He cant control his feelings and this problem will eventually end his life. Like with the conversation he was having with Creon they ended up having a screaming match because of Oedipus and his horrible tragic flaw of jumping to conclusions. Creon found out that Oedipus has put the death of their old king Laius in his and Tiresias’ hands. When Creon confronts Oedipus, Oedipus gets angry and says to Creon, â€Å" You! What are you doing here? Do you have the face to come to my palace-you who are convicted as my murderer, exposed as a robber attempting to steal my throne? †. He gets upset and has to have his wife/ mother, help get him under control and calmed down He acts like a little kid and the one person who can help keep him under control is his wife/ mother. Another tragic flaw of Oedipus is the fact that he is too confident. Its okay to be confident in yourself and what you do, but when you become too confident you can become cocky and sometimes over-bearing which indeed happens to Oedipus. Oedipus always goes around boasting about how he is king and that no one should step to him because he could have them killed, how he was the one to solve the riddle so he earned the the spot as king. With Oedipus, he takes the concept of being confident to a whole other level. He makes it seems as though being confident is something that should be thought about because it tears it whole world apart. So throughout Oedipus’ life he has been lied to and made and a fool of and mainly by himself. Oedipus’ problems are mainly because of his tragic flaws. His tragic flaws are the fact that he jumps to conclusions, he’s controlling, he has anger problems, and he’s too confident. Maybe some people may say that being confident is a good thing and that people should be confident but when you go to overboard and be outrageous with it, it just makes people hate you and try to make other people see that you are a horrible person and have a horrible personality.

Sunday, September 29, 2019

Buddhism & Converting To Taoism

Because the philosophical and spiritual principles involved in Taoism emphasize harmony and â€Å"creative quietude,† I would not forsee any kind of radical or major conflict which might occur in my life if I became a Taoist tomorrow morning. Becoming a Taoist is not like becoming a member of an organized church where it is necessary to attend specific services adn functions and the impact of Taoism on one's life is, to my understanding, rooted first in the personal and only secondarily in the public sphere. In fact, one might be a Taoist without nay one else even knowing the fact.The lack of dogma in Taoism means that it would never really be necessary to preach or proselytize to anyone about your beliefs. In the Toa' Te Ching, the verse which reads: â€Å"The tao that can be described / is not the eternal Tao. † (Tao) should be enough of a warning to any student of Taoism to remember that there is no one â€Å"truth;† no one â€Å"way† and so, unlike som e religions which stress preaching to others, Taoism, as a philosophical belief would require nothing like this kind of dogma or â€Å"witnessing.† The changes which I would expect and hope would happen in my life are based around the idea of giving up false ambitions and false self-images and allowing the natural ambitions and expressions of myself to emerge from where they have been â€Å"sleeping. † In America we are taught â€Å"no pain, no gain! † and this is a kind of philosophical burden that we all carry which is in conflict with another idea most of us simultaneously carry with us: that we want to be happy.The idea that we cannot gain unless we are in pain and that all gain is ultimately to create happiness is self-contradicting and it bears very little resemblance to the Taoist idea that â€Å"Freed from desire, you can see the hidden mystery. /By having desire, you can only see what is visibly real. † (Tao) but it is precisely this kind of reso lution to the contradictory impulses in Western society that I would hope Taoism would lead me through. The Taoist principles I would invoke, as mentioned, would be invoked primarily through action and not words.So, if someone found out that I often sought to be alone to meditate, or that I often followed intuition rather than â€Å"logic† in making decisions and that I sought to be emotionally and psychologically in touch with â€Å"Darkness born from darkness. / The beginning of all understanding. † (Tao), I expect I would be able to explain to them that my beliefs and practices were part of a larger, very ancient, philosophy with roots in the East and that through its tenants and practices I hoped to find harmony within myself and harmony with my surroundings: no more, no less.I think that practicing Taoist meditation and creative quietude would certainly result in a lessening of tension in my life. It would probably result in my having a more active imaginary and d ream-life, maybe a better sex life, and possibly even a better regiment of diet and exercise. The danger with any religion of philosophy is to look at it as a â€Å"cure all† to expect a miracle to come out of it immediately and change everything you don't like about yourself or your life.Another danger is obsession or the inability to see anything else but the dogma of one's religion or philosophy. I believe that Taoism is so genuinely free of dogma that it's basic ideas and practice would result in widening, rather than diminishing, my personality and personal disposition. I think I would find myself relaxed while others were getting tense. I think I would start slow with the more esoteric practices of sutra and yoga but lean very heavily at forst on the ideas and spiritual wisdom available in Taoist thought.

Saturday, September 28, 2019

Discussion 10- economics-pricing techniques Assignment

Discussion 10- economics-pricing techniques - Assignment Example The iPhone is one of Apple’s products that have value-added features such as smart iPhone, wireless internet communication devices, IPod, PDA, Computer and Camera. The success of Apple products is because the company focuses on adding value to the lives of its customers. The company ensures that it develops valuable commodities for its customers. Apple also creates the perception of scarcity of its products among consumers. Perception of scarcity attaches a value to these products hence making many people want to own Apple products. Apple products also target a particular market segment. This creates a perception of value and quality on every product Apple releases. People want to associate themselves with Apple products because they believe these Products will add value to their lives. Value addition is part of Apple’s business strategy. The best pricing techniques for Apple products is to use decoy prices and high reference prices for its new products. Decoys will ensure that the company wins stocking demands for its products and sells all its decoy commodities at higher prices. High reference prices for new products can ensure success in meeting the sales targets for that particular product. When introducing a new product into the market, Apple should set high references prices for that particular product. However, as the products remain in the market, their prices may gradually reduce. Apple uses pricing techniques such as references prices, branding, obscurity and bundling to remain top of the market (McGuigan, Moyer, & Harris,

Friday, September 27, 2019

RATEOFDECOMPOSITIONOFHYDROGENPEROXIDE Lab Report

RATEOFDECOMPOSITIONOFHYDROGENPEROXIDE - Lab Report Example Therefore, hydrogen peroxide appears to exhibit a metastable characteristic in solution or its pure state (Egan and Nills, 2005). Oxygen evolution is rapid at room temperature and in concentrated solutions the released heat may increase the temperature so that an explosion occurs. On heating, hydrogen peroxide decomposes and it may be explosive. The stability of hydrogen peroxide at room temperature is attributed to the fact that the first step in its thermolysis involves the splitting of the molecule into hydroxide radicals whose formation demands much heat. Catalysts such as silver, gold, platinum, manganese dioxide act as heterogeneous catalysts whereas ions such as I-, IO-, OH-,Fe3+ or copper act as homogenous catalysts. Catalysis of hydrogen peroxide decomposition by iron ions is an important in redox catalysis. The steps in the process as demonstrated by Evgenil, Oleg and Gerts (2005), gives data on the mechanisms of redox catalysis. This decomposition is also important in processes in living organisms. The decomposition may be represented as below; 25 mL of the ten†volume hydrogen peroxide was dilute to about 200 ml with distilled water. A Dewar flask was rinsed with distilled water and then with a few mL of the dilute H2O2 solution. Hydrogen peroxide solution was added into the Dewar flask, and the solution temperature noted at a constant value. 10 ml of Fe3+(a) catalyst solution was added into the beaker while stirring gently. A stop watch was used to keep track of time. Thirty seconds after the addition of the catalyst, 10 mL aliquot of the reaction solution was pipetted and transferred into an Erlenmeyer flask containing 18 mL of 2 M H2SO4. The acid provides an acid medium for the titration and also quenches the decomposition reaction. 10 mL samples were draw from the reaction mixture at 5 min intervals and titrated with potassium permanganate. The titration reaction follows the

Thursday, September 26, 2019

Love. Negligent Tort Coursework Example | Topics and Well Written Essays - 500 words

Love. Negligent Tort - Coursework Example There must have been a duty of care owed by the defendant to the plaintiff, the duty of care must have been breached, the breach must have resulted into a loss, and the immediate loss must have been attributable to the actions of the defendant (Miller and Gentz, 2009). Duty of care refers to a person’s obligation to refrain from causing harm to other members of the society and from infringing other people’s rights. The principle of duty of care therefore establishes fundamentals of peaceful coexistence in the society. The measure of degree of duty of care in the law of negligent tort is measured by the standard of a normally rational person. Further, determination of the duty of care relies on the capacity of the defendant. There are however certain exemptions to a person’s duty of care to other parties. Foreseeable risks and contributory negligence for instance reduces a defendant’s liability to exercise a duty of care to another person (Miller and Gentz, 2009). Negligent tort is further defined by failure to exercise a person’s duty of care to others. The breach of duty of care is also defined by normal standards of the defendant and the environment. A professional medical practitioner is for example more liable for breach of duty of care to a patient than an ordinary citizen under the same conditions is. The breach of duty of care must subsequently be supported by a resultant legal damage. The term legal damage means that the injury that is suffered by the plaintiff must be actionable before a legal system. This is because some losses may not be legally recognized (Miller and Gentz, 2009). The final element of a negligent tort is the proximate causation. This element defines the relationship between the damage suffered and the actions of the defendant. Negligent tort can only be instituted if the damage suffered by the plaintiff is attributable to the defendant’s breach of duty of care (Ramlogan, Persadie and

Wednesday, September 25, 2019

Risk Assessment and Return Memo Essay Example | Topics and Well Written Essays - 1250 words

Risk Assessment and Return Memo - Essay Example To create a portfolio, I have selected four stocks of different companies belonging from different companies after analyzing different companies. The investment strategy previously adapted by Casta Bonita Ceramics has been to achieve the highest possible returns. But this strategy of achieving the maximizing returns has a drawback as the management does not consider risk as an important element while investing in different investment opportunities or assets. Therefore the strategy has been changed and Casta Bonita Ceramics would not only analyze the returns of the stock but the risk of the investment as well. I have also followed a similar strategy by identifying the risks as well as the return of the stocks and I have tried to make sure that the portfolio achieves the maximum returns with minimum risk. I have examined different companies and one of the companies that I have considered is the Infoway Computers for investment purpose. By analyzing the company, the return and the fluct uations of the returns are identified and it has been found that the company offers high returns to its shareholders however the risk of the company is also high. Infoway Computers belong to the Information Technology and Telecommunications Industry, however I would still suggest keeping the stocks of Infoway Computers in the portfolio as the company is a large organization and it has been operating for years. Moreover, the company has a wonderful history and has a reputable name in the industry therefore I would recommend to invest in Infoway Computers over other firms in the industry like Transconduit Inc, and One Voice Telecom. Furthermore, I have calculated the beta of the company and after examining the beta of the company and other companies in the industry, my decision has been furthermore justified. Results found from beta also proved and supported by decision to invest in Infoway Computers. Besides this, I also analyzed Grand Capital Insurance, Western Connect Airlines, Des ktop Inc, Leviathan Defense Systems and Goldstein and Delaney Bank for investment opportunities. Western Connect Airlines was offering the lowest return on its stock and the stock had a lower risk when compared with others, therefore I recommended that investing in Western Connect Airlines would be a good idea. Moreover, Leviathan Defense Systems is another company to be invested after analyzing the risk and returns. In my analysis, two companies from the financial and insurance sector were also analyzed; Goldstein and Delaney Bank and Grand Capital Insurance. The reason to include companies from this sector was to make sure that the portfolio is well diversified. However I found out that Goldstein and Delaney Bank should be included in the portfolio as investing in Goldstein and Delaney Bank would reduce the overall risk of the portfolio although the company offers low returns but the risk of the company is also low and therefore it would reduce the overall risk of the portfolio. O ne of the main reasons why I do not want to invest in both the companies of the financial and insurance industry is that I want to diversify by investing in different industry. Moreover, this would allow me to reduce the systematic risk of the industry, although the risk cannot be eliminated completely but it can be reduced and diversifying the industry would be one of the ways to do it. The shares of Desktop Inc offer the highest return to the shareholders at a higher level of risk and this is the reason why I would not recommend

Tuesday, September 24, 2019

Respond to the article Essay Example | Topics and Well Written Essays - 250 words

Respond to the article - Essay Example Some address problems by acquainting themselves with the nature of the difficulty before coming to grips with it. Others seek external professional assistance, whereas others ignore the problem with the expectation it will go away (Cohen 2). In relation to want I found interesting in this article, I learnt that it is recommendable for young children particularly those in kindergarten to be taught on how to cope up with challenges associated with adversities so as to help them when under pressure. Some of the coping skills that I learnt to be crucial include the model â€Å"BASIC Ph†. In relation to this model, I learnt that it is important to inform young children about what we believe as a society, encouraging the expression of children’s feelings through pictures, and allowing children to take part in the social roles. Additionally, I learnt that transforming a frightening condition into an adventure, explaining to children what they need to know in addition to keeping children occupied during emergencies will aid them cope with pressures associated with

Monday, September 23, 2019

WHY YOUTH CULTURE ARE ATTRACTED BY FASHION Research Proposal

WHY YOUTH CULTURE ARE ATTRACTED BY FASHION - Research Proposal Example sis on sports, clothes, vocabulary dating and popular music set youths different from the other age groups, making them have what majority believe is a significant culture of their own. Within the youth culture, there exists’ many sophisticated, distinct and constantly changing youth subcultures. These subcultures’ values, styles, norms and behaviors vary broadly and differ from the known youth culture. This is a reasonable topic for it captures the varieties of fashion in the society. It would be a splendid idea to demonstrate what people of today think about the invasion of fashion in the society. I also chose this topic because many think youth culture does not exist. Through this research, I will prove that youth culture exists’. Youth culture is a recent field of study in modern history. Theories that explain the emergence of youth culture have been proposed by several theorists and philosophers. Youth culture theories suggest the effect of psychological, historical and economic factors amongst youths as the major cause of emergence of youth culture in the 20th century. Lury (2011), argues that schooling has been a big influence on the emergence of Youth culture. Age is seen as the major cause of separate youth cultures. Modern schooling has made it possible for interactions of youths who share experiences and definitions that facilitate the growth of a new youth culture (Lury, 2011). Frith (1984), notes that youth culture is amajor player in the development for an identity amongst youths in the modern times. Whenever youths do not have a clear role in their life, youth culture helps them to achieve a certain identity. Youth culture is hence a way in which youths reconcile confusion and identity issues. Fashion, is one of the most powerful youth cultures that have emerged in the 20th century. Fashion helps youths to identify with a certain class or culture and hence, fashion is a youth culture that helps in providing youths with an

Sunday, September 22, 2019

WGS final Assignment Example | Topics and Well Written Essays - 2500 words

WGS final - Assignment Example As seen in the work of Kirk & Okazawa-Rey, as the women grow up, they are socialized into women and even given descriptions on how a perfect female body should look like and how they are anticipated to live up to this reality (121-162). The women in turn completely change their views on how their bodies look like, design new model of their look and even change their beliefs on their exact identity. With this in mind, it is expected that the women will take into account what their bodies are made for and even attempt to determine how their bodies will change as they develop from one stage to another (Kirk & Okazawa-Rey 121-162). This thought is shared by Serdar who indicates that, the media has continually shaped the female body image (1). In her opinion, the author is wary of the extent in which the society sets socio-cultural standards that the women are expected to follow in the course of their development (Serdar 1). With the media emphasizing on the ideal body type and image, it is evident that lots of women will struggle to meet that standards of beauty that are, to a great extent, unattainable. One can easily relate to the plight of the women that constantly struggle to identify themselves with the beauty models in their televisions sets in the form of fashion models, advertisement queens and presenters of renowned shows. The response by the women being discontented about their physical appearance can then be understood from the perspective of Serdar. The society in this case, can be termed as one of factors that result to gender inequalities in the society. As far as this case point is concerned, th e women are forced to lead their lives as per the society not as per their beliefs. Kirk & Okazawa-Rey explain how the concept of the female appearance has created a beauty business that makes profits of billions every year

Saturday, September 21, 2019

Artistic Behavior in the Human Female Essay Example for Free

Artistic Behavior in the Human Female Essay The passage above comes from the article, â€Å"Artistic Behavior in the Human Female,† by Jean Robertson (2003, p. 24). Robertson (2003) argued that female artists define and interpret female sexuality in diverse and conflicting ways, and by using different artistic strategies. Robertson makes assumptions about the woman’s body as a contested terrain, wherein being a woman continues to be a subject of heated debate. For him, how female artists view themselves as women, and as artists, shape their depiction of â€Å"femininity† and â€Å"female sexuality† in their artworks. One of the quotes that Robertson mentioned in his text comes from Simon de Beauvoir. In her seminal book, â€Å"The Second Sex,† she stressed that: â€Å"One is not born a woman, but, rather, becomes one. † I want to reflect on de Beauvoir’s statement and Robertson’s belief about the woman’s body. I agree with de Beauvoir that social experiences and political conditions impact the construction of â€Å"being a woman. † Society shapes how women and men see femininity and gender roles through establishing gender roles and expectations. An example is when a girl is â€Å"conditioned† by her mother to be a â€Å"woman,† by telling her how she should act as a â€Å"woman. This includes educating her about the toys she can and cannot use, and the games she can and cannot play. The girl learns that she should act and think a certain way, in order to be â€Å"feminine. † She learns that she cannot be boisterous or get involved in sports, because that would be too â€Å"manly† for her. This girl is the perfect example of â€Å"becoming† a woman. On the other hand, I also agree that being a woman is a biological and individual construct. A woman is a product of her biology, whether she likes it or not. This is why women are also defined by their sexual organs. Their biology also determines their sex, as well as their gender. Furthermore, being a woman is a product of individual desires and needs. Any woman can define her womanhood the way she also wants it to. Robertson indicated the existence of the pluralities of femininity. It is true that a woman’s body is a contested terrain, and for me, what is wrong with that? Is it not also possible to have multiple femininities, instead of having only one approach to define and to interpret what it means to be a woman? There is nothing wrong, in my opinion, of having different ways of being a woman, because to deny one approach to womanhood undermines the very essence of being a free woman. Journal entry 2 In â€Å"A conversation about race and class,† Childers and Hooks (1990) argued that gender should be expanded to include issues of race and class. They said that: â€Å"†¦we should begin by talking about how we experienced the struggle to challenge and expand the category of gender† (pp. 61-62). For them, people cannot understand gender in its whole sense, if racial and class issues are overlooked in gender analysis. This reading challenged my view of gender, by asking me to see gender through a much broader lens. I have not considered that gender issues also intersect racial and class issues. On the other hand, Childers and Hooks (1990) compelled me to think about the politics of gender. This is related to our discussions about gender as a political object. The politics of gender demonstrate that there are hierarchies to the feminine gender that are experienced by many women. Power is also affected by one’s class and race. If white female women feel that there is a glass ceiling at the workplace, lower-class black and Hispanic women face a greater and heavier glass ceiling in society. Because of their class and race, they feel and experience multiple glass ceilings- the ceiling of racial discrimination, the ceiling of class discrimination, and the ceiling of gender discrimination. These ceilings, on top of one another, represent something more than just a hindrance to economic development, but resemble ceilings that are directly pressed on these women’s bodies. They could hardly breathe, because there are just too many ceilings that make it difficult for them to even survive. Now, I look gender as an amalgam of issues that women bring to gender discourse. As a result, race and issue not only expand gender discourse, but considering them has also broadened my understanding of gender and its diverse conflicts. Journal entry 3 When feminists speak about feminism, they mostly see the opposition between the feminine and the masculine- the yin and the yang. We also discussed the binary opposition in class, which heightened my knowledge of how women are reduced to the lower spectrum of the opposition. The binary opposition also exists in differentiating mothers from fathers. Mothers are put in pedestals, while fathers are forgotten and scorned. Laqueur (1990) complained about this binary opposition in â€Å"The Facts of Fatherhood. † This is an interesting article that argued about the repression of the history of fatherhood. Laqueur (1990) posited that while women enjoyed being the â€Å"natural† parent, fathers were regarded as mere providers, or even as a backdrop to the family. He stressed that it is time for fathers to reclaim their right to be part of the parenting history, wherein their contributions to the formation of society are recognized and respected. This polemical article amuses and interests me significantly. It amuses me because at the back of my mind, I felt gender discrimination in reverse. I believe that mothers have specials bonds with their children, but this belief, however, is marked by sexism. Do not fathers also share special bonds with their children? Laqueur (1990) challenged the notion of motherhood, because it undermined the importance of fatherhood. In my mind, it is better to not differentiate mothers from fathers, which is the same as stopping ourselves from differentiating women and men. Women and men have their own strengths and weaknesses and none is more superior. In the same line of thought, mothers and fathers are also equal. Let us just call motherhood and fatherhood as parenthood and give fathers their rightful place in the history and the practice of nurturing human society. Furthermore, this is also an interesting article, because it challenged me to talk about being a woman in relation to being a man. Being a woman has its multiplicities, and now, being a man has its pluralism too. For me, these multiplicities, acknowledged as part of gender analysis, render two steps forward for true gender equality. Journal entry 4 In â€Å"Criticizing Feminist Criticism,† Gallop, Hirsch, and Miller (1990) debated on the purposes and development of feminine criticism. Their main point is that feminist criticism writers have gone to the extreme, by pulverizing each other’s feminist views. They believe that this process is futile in understanding and improving the development of gender discourse and feminism. They asserted that feminism can be criticized in a more comprehensive manner, wherein there is no right or wrong feminism. I chose this article because it threads on sensitive issues, wherein the personal versus the collective idea of feminism clashes. Feminists have different worldviews about gender roles, sexuality, and femininity, and they criticize each other in different ways. I have never thought that feminist criticism has become too unconstructive. This is not my idea of criticism at all. I think about my own criticism of feminist criticism and I cannot help but agree that criticism is not about â€Å"thrashing† feminist theories (p. 350). Criticism is also about adding something to existing theories, in ways that can benefit the understanding of what it means to be a woman and how different understandings contribute to a wide range of feminism discourse. I earnestly believe also that feminists cannot define feminism in one way or several ways alone. Feminism should be viewed as a huge mess of ideas and values, different and special to women and groups, who fight for and because of different issues. Yes, it is a mess alright, because being a woman is a dynamic process that is also a part of being an individual and being a member of one’s race, class, and so on. Being a woman cannot ever be a tidy place, wherein women think the same and act the same. I would rather have it as a mess- wherein women are free to think and re-think feminism, in relation to their personal experiences and values. References Childers, M. Hooks, B. (1990). A conversation about race and class. In M. Hirsch E. F. Keller (Eds. ), Conflicts in feminism (pp. 60-81). New York, NY: Routledge. Gallop, J. , Hirsch, M. , Miller, N. K. (1990). Criticizing feminist criticism. In M. Hirsch E. F. Keller (Eds. ), Conflicts in feminism (pp. 349-369). New York, NY: Routledge. Laqueur, T. W. (1990). The facts of fatherhood. In M. Hirsch E. F. Keller (Eds. ), Conflicts in feminism (pp. 205-221). New York, NY: Routledge. Robertson, J. (2003). Artistic behavior in the human female. In B. Stirratt C. Johnson (Eds. ), Feminine persuasion: art and essays on sexuality (pp. 23-38). Bloomington, IN: Indiana University Press.

Friday, September 20, 2019

The Seven Layer Osi Model

The Seven Layer Osi Model Seven-layer OSI model is a logical layer and developed by the ISO international standardization organization. The purpose of this layer is to understand the transmission of data flows from source to destination and to identify problems during data transmission. The seven layers include Application, Presentation, Session, Transport, Network, Data link and Physical layer. The sequence of layer names to be remembered by this phrase All people seem to need data processing. The following is a general description of each layer. OSI reference model is now being considered as the main model for the internetworking and inter computing. The seven layers divide the task of data transmission in sub tasks and then complete the data transmission cycle. QUESTION 1 In the 1980s, the European-dominated International Standards Organization (ISO) began to develop its Open Systems Interconnection (OSI) networking suite. OSI has two major components: an abstract model of networking (the Basic Reference Model, or seven-layer model), and a set of concrete protocols. Briefly explain each of the seven OSI layer included their function and usage in data communication and networking. OSI Reference Model OSI reference model (Open Systems Interconnection) illustrates how information from a software application on a computer moves through a network medium to a software application on another computer. OSI reference model is conceptually divided into 7 layers where each layer has a specific network function, as described by figure 1.1 (with no physical media). This model was created based on a proposal made by the International Standards Organization (ISO) as a first step toward international standardization of protocols used at various layers. à ¯Ã‚ ¿Ã‚ ½This model is called ISO OSI (Open Systems Interconnection) Reference Model because this model is intended for sharing open systemà ¯Ã‚ ¿Ã‚ ½.[1] Open Systems can be interpreted as an open system to communicate with other systems. For his brief, we will call this model as the OSI model only. Figure 1.1. OSI Reference Model OSI model has seven layers. The principles used for the seven layers are: 1. A layer must be made when needed different levels of abstraction. 2. Each layer shall have certain functions. 3. The function of each layer should be chosen carefully in accordance with the provisions of international protocol standards. 4. Layer boundaries labored to minimize the flow of information through the interface. 5. The number of layers must be quite a lot, so that different functions do not need to be united in a single layer outside needs. However, the number of layers must also be cultivated as little as possible so that the network architecture does not become difficult to use. Below discuss about each layer of the OSI model sequentially, starting from the bottom layer. It should be noted that the OSI model itself is not network architecture, because this model does not explain the exact services and protocols to be used on any layer. OSI model only explains about what should be done by a layer. However, ISO has also established standards for all layers, although these standards do not constitute a reference model itself. Each layer has been declared as a separate international standard. Characteristics of the OSI Layers To seven layers of OSI reference model can be divided into two categories, namely upper and lower layers. The top layer of the OSI model deals with application issues and generally implemented only in software. The highest layer (application layer) is the cover prior to the user (users), both users and application layer processes interact with software applications that contain a communication component. The term upper layer is sometimes used to refer to some of the top layer of another coating layer in the OSI model. The bottom layer of the OSI model to control data transport issues. Physical layer and data link layer implemented in hardware and software. The layers below the others are generally only implemented in software. à ¯Ã‚ ¿Ã‚ ½The lowest layer, the physical layer is a layer of cover for the physical network medium (cable networks), and as responsible for the placement of information on the network mediaà ¯Ã‚ ¿Ã‚ ½.[2] The following table shows the separation of the two l ayers in the layers of the OSI model. Application Application Overlay Presentation Session Transport Data Transport Undercoat Network Data Link Physical Table 1.2 Separation of top layer and bottom layer of the OSI model Protocol OSI model provides a conceptual framework for communication between computers, but this model is not a method of communication. In fact communication can occur due to use of communication protocols. In the context of data networks, a protocol is a formal rules and agreements that determine how computers exchange information over a network medium. A protocol implements one or more of the layers of the OSI. A wide variation of the communication protocol, but all maintains the flow in one group: the LAN protocols, WAN protocols, network protocols, and routing protocols. LAN protocols operate at the physical and data link layer of the OSI model and define communication over various LAN media. WAN protocols operate at the third lowest layer of the OSI model and define communication over various WAN. Routing protocol is a network layer protocol that is responsible for determining the road and traffic arrangements. Finally, the network protocol is different from the upper layer protocols th at exist in a series of protocols. Layers of the OSI Model Physical Layer Physical Layer functions in the delivery of raw bits into the channel of communication. Design issues that must be considered here is to ensure that when one side sends data 1 bit, the data must be accepted by the other side as a bit too, and not 0 bit. The question that arises in this case is: how many volts should be used to declare a value of 1? And how many volts is also required for the number 0?. It takes a bit how microsecond will be exhausted? Is the transmission can be processed simultaneously in both directions? How many pins are owned by the network and what is the use of each pin? In general, design problems are found here related to the mechanical, electrical and procedural interfaces, and physical media which is under the physical layer. Data Link Layer The main task of the data link layer is as raw data transmission facility and transforms the data to a channel that is free from transmission errors. Before forwarded who work layer, data link layer perform this task by allowing the sender meme cage breaking input data into a number of data frames (usually numbering in the hundreds or thousands of bytes). Then the data link layer transmits these frames in sequence, and process the acknowledgment frames sent back by the recipient. Because the physical layer send and receive bit stream without regard to the meaning or architectural frame, then depending on the data link layer was to create and recognize frame boundaries it. This can be done by affixing a special bit to the beginning and end of the frame. If incidental bit patterns can be found in the data, it is necessary to pay special attention to ensure that the pattern is not incorrectly considered as the boundaries of the frame. The occurrence of noise in the channel can damage the frame. In this case, the data link layer software on the source machine to send back the broken frame. However, transmission of the same frame over and over again can cause duplication of frames. Duplicate frames need to be sent if an acknowledgment frame from the receiver who returned to the sender has been lost. à ¯Ã‚ ¿Ã‚ ½Depending on the layer is to overcome the problems that caused the destruction, loss and duplication of frames. The data link layer provides some service classes for the network layer. This service class can be distinguished in terms of quality and priceà ¯Ã‚ ¿Ã‚ ½.[4] Other problems that arise in the data link layer (and also most of the layers above it) are seeking the smooth process of data transmission from the sender to the recipient a slow speed. Mechanism of regulation of traffic data should allow the sender to know the amount of buffer space owned by the recipient at a certain moment. Often setting flow and error handling is done in an integrated manner. Channel that can send data in both directions also can be problematic. So therefore need to be considered for the data link layer software. Problems that can arise here is that the frames acknowledgement flowing from A to B compete with each other ahead of the flow from B to A. Settlement of the best (piggy backing) could have been used, then we shall discuss it in depth. Broadcast networks have an additional problem in the data link layer. The problem is in terms of controlling access to a shared channel. To fix this you can use a special sub layer of data link layer, called the medium acc ess sub layer. Network Layer Network layer serves to control operation of the subnet. Important design problem is how to determine the route packets from source to destination. Route can be based on static tables are linked to network. Route can also be determined at the beginning of a conversation such as a terminal session. Finally, the route can also be very dynamic; it can be different for each package. Therefore, the delivery route of a packet depends on network load at that time. If at the same time in a subnet there are too many packets, then there is the possibility of the packages arrive at the same time. This can lead to bottlenecks. Congestion control as it is also the task of the network layer. Because the sub net operators expect the good fortune of his job duties. There is often some accounting function built at the network layer. To make billing information, at least the software should calculate the number of packets or characters or bits that are sent by each customer. Accounting becomes more co mplicated, when a packet crosses a country that has a different rate. The move packets from one network to another can also cause problems that are not small. Addressing mode used by a network can be different from the methods used by other network. A network may be unable to receive the package at all because the packet size is too big. Protocol was be different, as well as others. Network layer has been given the task to solve all these problems, allowing different networks interconnected to each other. Transport Layer The basic function is the transport layer receives data from the session layer, split the data into pieces smaller if necessary, forwards the data to the network layer, and ensure that all pieces of data can arrive at the other side correctly. Moreover, all this must be done efficiently, and aims to protect the upper layers of the changes in hardware technology that can not be avoided. Under normal circumstances, the transport layer makes the network connection is different for each transport connection which is required by the session layer. When the transport connection requires a high throughput, then the transport layer can make a lot of network connections. Transport layer divide sending data to a number of networks to increase throughput. On the other hand, if the manufacture or maintenance of the network connection is quite expensive, transport layer can combine multiple transport connections to the same network connection. This is done to make this merger is not seen by the s ession layer. Transport layer also determines the type of service for the session layer, and in turn the type of service for users of the network. Type of the most popular transport layer is a channel error-free point to point that forward messages or bytes in accordance with the order delivery. However, there are also other types of transport services. The services are transport isolated messages that do not guarantee order of delivery, and broadcast messages to a number of purposes. Type of service determined when the connection starts. Transport layer is a layer end to end in fact, from source to destination. In other words, a program on the source machine to bring the conversation with the same program on the target machine. In the lower layers, there are protocols between the two machines and other machines that are close by. Protocol is not located in the outer or the source machines outer purpose machine, which may be separated by a router. The differences between layers 1 to 3 are intertwined and layer 4 to 7 are end to end. This can be explained as shown in Figure 1-1. In addition to merging multiple streams of messages into a single channel, transport layer must be careful in defining and deciding on the network connection. This process requires a naming mechanism, so that a process on a machine has a way to explain with whom the machine wants to talk. Also there should be a mechanism to regulate the flow of information, so that the flow of information from a fast host does not overwhelm a slow host. Such mechanism is called flow control and plays an important role in the transport layer (also in other layers). Flow control between hosts with different hosts by controlling the flow of the router with the router. Well find out later that the same principles used for both types of the control. Session Layer Session layer allows users to establish sessions with other users. A session in addition allows ordinary data transport, as did the transport layer, also provides special services for specific applications. A session is used to allow one user logs into a remote timesharing system or to move files from one machine to another to machine. A session layer service is to implement the dialogue control. Sessions can allow traffic to move in two directions at one time or only in one direction only. If at one time in traffic only in one direction only analogous to a single railway line, the session layer helps to determine who is entitled to use the channels turn at an instant. Service sessions are described as token management. For some protocols, it is important to ensure that both parties concerned do not perform surgery at the same time. To regulate this activity, the session layer provides tokens that can turn. Only a party that holds the token is allowed performs critical operations. Another session is a synchronization service. Take for example that can occur when trying to transfer files that lasted 2 hours from one machine to another machine with the possibility of having an interval of 1 hour between the two crashes that can occur. After each transfer is canceled, the transfer may need to be repeated again from scratch, and may experience another failure. To reduce the possibility of this problem, the session layer can insert a specific sign to the flow of data. Therefore, if a crash, only the data that is after the sign is to be transferred back. Presentation Layer Presentation layer performs certain functions that are required to ensure the discovery of a common solution for certain problems. Presentation Layer does not allow users to solve their own problems. Unlike the layers underneath are only moving the bits from one place to another place, presentation layer attention to syntax and semantics of information transmitted. One example is the encoding of data presentation service. Most users do not move a random string of binary bits. The users exchange data just as the name, date, amount of money, and bills. The items are expressed in the form of a string of characters, integer numbers, floating point numbers, a data structure formed from some simpler items. There is a difference between one computer to another computer in a given code to declare a string of characters (for example, ASCII and Unicode), integer (for example, complement and complement one two), and so forth. To allow the two computers that have different presentation to commun icate, data structures to be exchanged can be expressed by means of abstract, in accordance with standard encoding to be used on line. Presentation layer-data set and convert this abstract structure of representation that is used on a computer into a network standard representation, and vice versa. Application Layer Application layer consists of a variety of protocols. For example there are hundreds of incompatible terminal types in the entire world. Take the situation where full-screen editor is expected to work on a network with a variety of terminals, which each have different screen layouts, have a way different sequence of keystrokes for the insertion and deletion of text, move the sensor and so forth. One way to overcome such problems in data is to define an abstract network virtual terminal, so editors and other programs can be written for each corresponding. To handle each terminal type, one part of the software must be written to map the network virtual terminal functions to the actual terminal. For example, when moving the cursor editor virtual terminal into the left corner of the screen, the software should issue the appropriate command sequence to achieve the cursor. All virtual terminal software is in the application layer. Another application layer function is file transfer. File systems from one another have different naming conventions, how to express the lines of text are different, and so forth. Transfer files from a system different to other systems that require treatment to overcome the lack of this compatible. The task is also a job application layer, such as electronic mail, remote job entry, directory lookup, and various general purpose facilities and other special purpose facilities. CONCLUSION The process of sending a data to be sent to the recipient. Sender processes submitting data to the application layer, which then add the user application header, the AH (which may also be empty), the front end and submit the results to the presentation layer. Presentation layer can form these data in various ways and may just add a header at the front end, which is given by the session layer. It is important to remember that the presentation layer is not aware of the data which are marked AH by application layer is the data users really are. The process of granting this header repeated until the data reaches the physical layer, where data will be transmitted to other machines. On these machines, all headers were be removed one by one until reaching the admissions process. Figure1 .3 Examples of how the OSI model used The key here is that although the actual data transmission is each layer is programmed as though the transmission in question took place horizontally. For example, when transport layer delivery get a message from the session layer, transport layer will then affix the transport layer header and sends it to the receiver transport layer. INTRODUCTION Computer networks are a tool, known also as nodes, relating to media liaison. Node may consist of a computer, printer or other device to send and receive data generated by other nodes, nodes in the network. Media Liaison, also known as communication media. On this day, there are various types of networks, including local area network (LAN) and wide area network (WAN). The largest network in the world is the Internet. Edit Development. Network started with a small building, the connection about ten computers and a printer. The technology that exists at the time the computer is connected to limit the number and length of communications cable that can be allowed on the network. In the early nineties the communication cable can be pulled so far about 600 feet to the extension of approximately 30 computers only. This network is suitable for a small organization known as local area network (LAN). LANs typically connect devices in a building or a building. A LAN can be built only with two computers and a printer or can be extended only in one building to include audio and video software. LAN size is limited to a distance of several kilometers only. LAN with data rates from 4 Mbps to 100 Mbps. Network connections from different countries has established the development of LAN to the wide area network (WAN). WAN can be sending data, audio and video at distances up to cover a country or continent or around the world. QUESTION 2 Briefly explain at least four (4) topologies of networks and suggest how we implement these topologies in networking. MAIN BODY Network can be of any of the following three types: Local Area Network: Figure: 2.1 Local Area Network Local Area Network (LAN) is a limited range of geographical barriers such as a laboratory, a school or building. In a typical LAN configuration, one of the computers used as file server file server that functions to keep all the software that controls the network. All computers are connected to the server file known as a workstation. Computer workstation comprising a desktop computer specifications less than the server and also may have software on the disk severity. Cable used to connect the LAN via network card installed on each computer. Metropolitan Area Network: Figure : 2.2 Metropolitan Area Network Town Area Network (MAN) covers a wider geographical area as a region or city. Widespread area network connecting a number of Local Area Network in a place to enable sharing of information carried. Universities and government agencies Wide spread Area Network to communicate with the other communities and private industries. One example is the MAN MIND Network, located in Pasco County, Florida which enables communication between the Central Pasco Media Center Main Frame using a telephone line, coaxial cable, and wireless communication providers. Wide Area Network: Figure : 2.3 Wide Area Network Widespread Area Network (WAN) covers a wider area as a state, nation and world. To create a WAN requires systems across the sea or the use of microwave or satellite. Use WAN enables communication between the states can be implemented quickly. Configuring the WAN is complex and requires a hardware multiplexing multiplexer for LAN and MAN links for access to a comprehensive communications network such as the Internet. Network Topology: Figure : 3.1 Network Topology à ¯Ã‚ ¿Ã‚ ½A computer network system using communication line that connects computers to each otherà ¯Ã‚ ¿Ã‚ ½.[5] There are various methods that can be used for the communication and is known as topology. Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology. There are few types of topologies for computer networks, namely: Star Network Topology Figure :3.1.1 Star Network Topology Star topology is a network where all computers or other devices connected to the central distribution system, known as the Hub or Switch. Hub or Switch is responsible for managing the computer network. All messages or data that is sent to a central control hub for avoid collisions from occurring. There are two operations that used by the hub or switch that is operating broadcast and the operations of the transition switching. à ¯Ã‚ ¿Ã‚ ½Distribution operations, hub or switch will make the delivery of data received from one station to all the routes connecting them. In transition operations, the hub or switch will save the data received and sends the data through a receiving stationà ¯Ã‚ ¿Ã‚ ½.[3] Each node can be connected to the network and can be removed at any time without affecting the whole system of directly by. Furthermore, if one node does not work, it will not affect other computer networks. Any damage to the connection between the hub nodes will not affect the system as a whole, but if the damage occurred on the hub, the entire system will also be affected. The main weakness of this topology is that it requires a fairly high cost in view of all systems connected to it computers, scanners, printers, etc. requires its own cable. Ring Network Topology Figure :3.1.2 Ring Network Topology In local area networks where the ring topology is used, each computer is connected to the network in a closed loop or ring. The Messages or data to be transferred in order according to the same path in the same ring. Network technology was first used by IBM systems with Type I in the category of cable shielded Twisted Pair STP. Each data node will be checked by delivery location. If not the same node strike, it will be submitted to the next node and this will continue until the delivery address the same node strike. à ¯Ã‚ ¿Ã‚ ½As the data is transferred by the same route as the sequence of the potential for violations of data that appears to be similar to the network and can be removed at any time without affecting the whole system of directly byà ¯Ã‚ ¿Ã‚ ½.[6] However, one problem that arises is if a node fails, the entire network will probably also be affected. Arrangement of nodes in this topology is almost the same physically as star topology; only a logical was a ring. The attachment is required in this topology is called Multi Station Access Unit (MSAU). MSAU is installed in a ring-shaped network where it is more than one unit. If only one unit only used the physical topology is similar to the star connection. Bus Network Topology Figure :3.1.3 Bus Network Topology Bus topology, are also known as the Ethernet using a line length where each node in relation to him. Data will be sent by each node in the hope that it does not collide with data transmitted from other nodes. If it happens, the node will try again until successful. Weakness of the bus topology is in terms of maintenance. It is quite difficult to maintain in view of the connection is in the form of a series. In the event of damage to any line at any node, it will cause the entire system will not work. In addition to accurately locate points or nodes those are damaged. Each node can be connected to the network and can be removed at any time without affecting the whole system directly. Furthermore, if one node does not work nor does it affect other computer networks. The other advantage is there in this topology is that it uses a single cable and requires no additional hardware to build the network. But it does not require a very high cost for maintenance purposes. Tree Network Topology Figure :3.1.4 Tree Network Topology The tree topology is essentially a hybrid of the bus and star layouts. It is also known as a hierarchical topology and has a central root node that is connected to one or more nodes of a lower hierarchy. à ¯Ã‚ ¿Ã‚ ½In a symmetrical hierarchy, each node in the network has a specific fixed number of nodes connected to those at a lower levelà ¯Ã‚ ¿Ã‚ ½.[3] Apart from these basic types of network topologies, there are hybrid network topologies, which are composed of a combination of two or more basic topologies. These network mappings aim at harnessing the advantages of each of the basic topologies used in them. Network topologies are the physical arrangements of network nodes and wires. What is interesting is that the inanimate nodes and wires turn live for the transmission of information. Mesh Network Topology Figure :3.1.5 Mesh Network Topology In a full mesh network, each network node is connected to every other node in the network. Due to this arrangement of nodes, it becomes possible for a simultaneous transmission of signals from one node to several other nodes. In a partially connected mesh network, only some of the network nodes are connected to more than one node. à ¯Ã‚ ¿Ã‚ ½This is beneficial over a fully connected mesh in terms of redundancy caused by the point-to-point links between all the nodesà ¯Ã‚ ¿Ã‚ ½.[5] The nodes of a mesh network require possessing some kind of routing logic so that the signals and the data traveling over the network take the shortest path during each of the transmissions. CONCLUSION Topologies are essence of computer networks design. Efficient networks can only be built based on the complete knowledge and understanding of above mentioned topologies. Knowledge of every communication device is of equal importance to help you find the best option for your network requirements. Optimum networks can be built with complete knowledge and understanding of computer network devices and how they are designed, any mistake in choosing inappropriate techniques, device etc can only be the waste of time, resources and efforts. APPENDIX Figure 1.1. OSI Reference Model Application Application Overlay Presentation Session Transport Data Transport Undercoat Network Data Link Physical Table 1.2 Separation of top layer and bottom layer of the OSI model Figure1 .3 Examples of how the OSI model used Figure: 2.1 Local Area Network Figure : 2.2 Metropolitan Area Network Figure : 2.3 Wide Area Network Figure : 3.1 Network Topology Figure :3.1.1 Star Network Topology Figure :3.1.2 Ring Network Topology Figure :3.1.3 Bus Network Topology Figure :3.1.4 Tree Network Topology