Thursday, October 31, 2019

Google Case Study Research Paper Example | Topics and Well Written Essays - 5000 words

Google Case Study - Research Paper Example SWOT Analysis SWOT Analysis is the one of the most effective and widely used tool to conduct situational analysis. SWOT stands for Strength, Weakness, Opportunities and Threats. SWOT analysis takes into account both the internal and external environments of a firm. Internally, the framework analyses the strengths and weaknesses with respect to the various key dimensions such as productivity, human resources, finances, capacity, etc. Externally, the framework analyses the market trends, economic conditions, regulations, technology, etc (Ferrell & Hartline, 2008). The SWOT analysis of Google can lead to a very good understanding of the processes that are in place in Google and its positioning in terms of its competitors. Strengths Google has got various strengths in the industry that makes it stand out. The basic strengths that makes Google the market leader has been described here ïÆ'Ëœ Google is the innovator and the pioneer in the field of search engines thereby giving it a head start over the other competitors ïÆ'Ëœ The management style is open minded and Laissez Faire at its best. Thereby, the managerial decisions keep getting taken very fast that leads to avoidance of lag time and increased efficiency ïÆ'Ëœ Large amount of incumbent cash and steady cash flow ïÆ'Ëœ Although the switch value of the product is not much or almost nil, but the customers have shown immense amount of loyalty to the products of Google and Google as a brand The retention policies and the compensation policies at Google are some of the best in the world. Therefore, the attrition in Google is extremely low as compared to the general industry. This particular factor translates into the tapping of the intellectual capital for them which would allow for the better leverage of market conditions. This particular feature also results in the cost efficiency as a lesser amount of money has to spend in the rehiring process. The other factor that lowers the cost is the absence of training the new hires Most of the data is translated, thereby, it can be used by a large number of the international customers The products are compatible to most of the data platforms and hardware available in the market and therefore provide the competitive edge as there are no switching costs involved in the change from an existing platform being used by the user There is a strong amount of support that the company has been enjoying from the educational community maki ng it the medium of choice as a search engine The products are considered to be extremely chic by the urbane customers that add to its appeal It has got very high profile corporate interactions with the top notch companies like Sun and Apple that make the products extremely innovative and the user finds them easy to use. It also results in great amount of acceptance of the products aiming the corporate lines. As for example, the Sun intersperses the Google features with the Java runtime library(Boone & Kurtz,1995) It has already set up a number of channels in the telephone market that has only added to the market value of the product Google has been providing the service of free Wifi for the entire cities and the public areas which has led to its popularity among the various groups and the common public in general. It has led to very good public relations that have only resulted in the fostering of the growth.(Boon,2003) Google has entered

Tuesday, October 29, 2019

Quals Direct Knowledge Task Essay Example for Free

Quals Direct Knowledge Task Essay 1.1 Define the following types of abuse: • Physical abuse is defined as the use of physical force that may result in bodily injury Sexual abuse is any sort of non-consensual contact Emotional/Psychological abuse is a form of abuse characterized by a person subjecting or exposing another to behavior that may result in psychological trauma. Playing mind games, shouting and threatening behavior. Financial abuse telling you what you can and connot buy or requiring you to share or take control of your bank account and with holding monies from you. Institutional abuse is the mistreatment, neglect or inadequate care and support of adults in groups. Self neglect is failure of one adult to take care of himself or herself. Neglect by others ignoring the persons medical or physical care needs, Deliberate and unnecessary deprivation of a resource to the service user. Your assessor is happy with your answer to the above question. Good answer 1.2 Identify the signs/or symptoms associated with each type of abuse. physical abuse bruises withfound in different states of healing, small clusters indicating finger marks, friction burns from carpets, injuries inconsistent with explanation, reluctance to seek medical help Sexual abuse bruises and bleeding round the rectal and vaginal areas, stained or torn underclothes or night wear, love bites, overt sexual behavior or language not previously used or conversely fear of any type of physical contact.  Emotion/psychological abuse symptoms of stress, on set of bed wetting, anxiety, tearfulness, low self esteem, unexplained paranoia and lack of eye contact. Financial abuse suddenly unable to pay bills or purchase necessities, unexplained withdrawals from saving Institutional abuse lack of privacy around toileting and bathing, lack of giving a choice of food, bedtime, clothing Self neglect lack of attention to personal care needs, rashes, pressure sores, dirty clothing and or wet, weight loss. Neglect by others lack of attention given to personal care needs, failure to ensure privacy and dignity, dirty clothes, rashes, being left alone for long periods of time. Your assessor is happy with your answer to the above question. 1.3 Describe factors that may contribute to an individual being more vulnerable to abuse factors may include if the individual has a mental disability such as dementia or not having the mental capacity. If the individual is secluded or isolated or vulnerable there could be factors for the abuser which could include the abuser having lack of training, also abusing their power. Sometimes personal issues have a part to play which could include the carer/abuser being stressed or having a history of abuse and continuing the cycle. The factors include if one has low self esteem or self worth. if they have had abuse before, nobody to protect them, and the mentally ill. Other factors could be they may not be aware of their rights, may not be able to express themselves clearly. their home may unsuitable with no aids or adaptations to help give appropriate care. Your assessor is happy with your answer to the above question. Outcome 2 know how to respond to suspected or alleged abuse 2.1 Explain the actions to take if there are suspicions that an individual is being abused. Always report suspected or alleged abuse to the appropriate person(s), record the facts on appropriate paperwork, listen do not judge, stay calm and collected, do not tamper with any evidence. Appropriate persons to report suspected or alleged abuse would be to my manager first of all, police, social workers, family(if family is not the abuser) and possibly their doctor. Your assessor is happy with your answer to the above question. Who would be the appropriate person to report to? well answered 2.2 Explain the actions to take if an individual alleges that they are being abused Always establish what it is that has occured and report any suspicions to the appropriate manager. Reassuring the individual at all times take every allegation seriously. Always date the paperwork and have it signed by any witness (if any). take photos of any evidence if possible. Speak clearly and precise and avoid any leading questions. Your assessor is happy with your answer to the above question. 2.3 Identify ways to ensure that evidence of abuse is preserved Always record facts immediately dated and signed (by any witnesses also), report any evidence immediately to line manager, do not tamper with any evidence. Taking Photos if possible, and try avoiding any leading questions that may make them think alternatively to the situation. Your assessor is happy with your answer to the above question. What other steps might you take to preserve the evidence? You have mentioned some ways in the previous question could you ple those points and a few others you can think of. Outcome 3 Understand the national and local context of safeguarding and protection from abuse 3.1 Identify national policies and local systems that relates to safeguarding and protection from abuse National policies safeguarding vulnerable groups act 2006, the vetting and barring scheme run by the Independent Safeguarding Authority (ISA), Criminal Records Bureau, Human rights act 1998. Local Systems Safeguarding Adults Boards, Safeguarding policies and procedures for vulnerable adults. Data Protection Act 1998 Care standards Act 2000 Health and social care act 2008 The Equality Act 2010 No secrets, Department of Health 2000 Your assessor is happy with your answer to the above question. Amanda I can clearly see you get this question however The Police and CQC are not national polices or or local systems. This facts question fully http://www.ageuk.org.uk/Documents/EN-GB/Factsheets/FS78_Safeguarding_older_people_from_abuse_fcs.pdf?eps 3.2 Explain the roles of different agencies in safeguarding and protecting individuals from abuse The police their role is to safeguard vulnerable adults, investigate all reports of vulnerable adult abuse and protect and  uphold the rights of vulnerable adults. The CQC to monitor and provide guidance on what all health and social care providers must do to safeguard vulnerable adults from abuse, the safeguarding policies, procedures and systems developed are in place to prevent vulnerable adults from being abused. Social services Their role is to build managing safeguarding risks and benefits in care planning, review care plans, identify and respond to any concerns, lead and support enquiries in in the events of any abuse or neglect. Clinicians Report incidents of abuse neglect or undignified treatment, follow up referrals, consult patients taking responsibility for ongoing care, lead and support enquiries where there is need for clinical input. Health care provider Show leadership and routinely monitor activity, meet the required service quality standards, train staff in safeguarding procedures, investigate and respond effectively, take disciplinary action against staff who have abused or neglected people in their care. Social care and health commissioners Build safeguarding into commissioning strategies and service contracts, review and monitor services regulary, intervenewhere services fall below fundamental standards or abuse is taking place. Your assessor is happy with your answer to the above question. This leaflet will help you answer this question fully http://www.pasauk.org.uk/upload/public/featurebox/Safeguarding%20Adults.%20Roles%20and%20responsibilities%20in%20hea 3.3 Identify reports into serious failures to protect individuals from abuse A report about Orchid View care home in West Sussex that failed to ensure that the vulnerable adults were adequately protected from risks, including the risks of unsafe practice by its own staff. it was revealed that residents at Orchid View care home in Copthorne, west Sussex, were given  wrong doses of medication, left soiled and unattended because of a lack of staff and suffered because of serious failures in the homes management. There was institutional abuse throughout the home which lead to the deaths of 5 residents. After an investigation the CQC found it had failed to meet eight of it essential quality and safety standards. The inquest heard that Jean Halfpenny, 77, was given an overdose of blood-thinning drug warfarin while at Orchid View, Which had failed to monitor and administer her medication properly. One of the staff at the care home said she was asked to shred forms after Halfpenny had been admitted to hospital for bleeding. The coroner heard that the Orchid View manager Meera Reed, looked at the medication administration record (MAR) brought into the office by a nurse and said We cant send her to hospital wit those. they will shut us down. Five people were arrested, including some on suspicion of manslaughter by gross negligence in relation to Halfpennys death, but insufficient evidence existed to support a prosecution and the case was passed to a coroner. Your assessor is happy with your answer to the above question. Some good research has gonr into the answer for this question 3.4 Identify sources of information and advice about own role in safeguarding and protecting individuals from abuse My manager, colleagues My companies policies and procedures Local authority services department like social services The internet Care Quality Commission Books Independent Safeguarding Authority health and social care act 2015 Your assessor is happy with your answer to the above question. The 2015 Care Act perhaps? well answered Amanda Outcome 4 Understand ways to reduce the likelihood of abuse 4.1 Explain how the likelihood of abuse may be reduced by: • Working with person centred values • Encouraging ac choice and rights Person centred values include the individuality of the person, the rights of the individual, choice, privacy, independence, dignity, and the individual being respected. If person centred values are taken into consideration when supporting an individual there is less likely to be abuse as all the staff will be working in the same way. If a person is considered to have a say in what he or she wants and is at the centre of any decision, it will be more unlikely that there is abuse. I always put the service users i work with at the centre of any decision about them and they are an active partner in their own care. service user decide what to do, shower, wash or bath, what clothes they want to wear and are treated with dignity, respect, confidentiality and are able to make their own choices. Active participation is a way of working that recognises an individuals right to participate in the activities and relationships of everyday life as independently as possible. So if the individual participates actively in their daily activities, then the risk of abuse is low. For example I would prompt the service user to pick out what clothes they would like to wear, what meals they would like and encourage them to take part in preparing and cooking the meal the way they like it. Individuals are supported to make their choices in anything they want, like food or drink, what to wear, whether they want a bath, shower,, or wash. No individual will choose something that will hurt them self therefore abuse is reduced to the minimum. Individuals rights are promoted throughout the service, service user have the right to as they wish to do and if its what they want as long as it is not dangerous, a risk assesment will then be done to stop any abuse happening. I ensure that i promote service users rights and choices by allowing them to make their own choices and support them to have the same rights of anyone else. Your assessor is happy with your answer to the above question. Excellent answer 4 .2 Explain the importance of an accessible complaints procedure for reducing the likelihood of abuse The complaints procedure gives the complainant the right to be heard and supported to make their views known. an accessible complaints procedure is understandable and easy to use. It sets out clearly how to make a complaint, the steps that will be taken when the complaint is looked into. An accessible complaints procedure resolves complaints more quickly as the complainant feels that they are being listened to and their complaint is is taken seriously. Making sure that abuse will not be tolerated in any form and encourages the complainant to not accept this. If a staff member is being abused, it would be reported to the line manager as an informal grievance, employees should aim to resolve most grievences informally with their line manager and are therefor encouraged to discuss all matters openly as they occur. If the grievance cannot be settled informally then it should be raised through the formal procedure of a grievance. Formal Grievance should be raised with their line manager or next level of management if grievance is related to the line manager, in writing, at the earliest time. the manager will organise a meeting within 5 working days, Employees will be allowed to explain their complaint,and suggest a way it should be settled. meeting could be ajourned if the manager feels they need further advice. the manager will give full consideration to the complaint and confirm the outcome in writing. Your assessor is happy with your answer to the above question. You have looked at this question from the perspective of the client. How about the staff who may be getting abused please include colleagues in this answer Outcome 5 Know how to recognise and report unsafe practices 5.1 Describe unsafe practices that may affect the well being of individuals Unsanitary conditions can spread infection as cross-contamination can occur and can affect the well being of the individual and others. examples of these unsanity conditions can be dirty kitchen work surfaces and equipment, improper hand washing, not covering hair when cooking can pose a risk, as can not reporting faulty equipment when working or not, having cleaning materials can also be unsafe. Not having risk assessments in place when a service user hurts themselves, Staff not checking when service user is ill or unsteady on their feet. Staff not recording in the care plan any issues if a services is unwell or unable to support themselves as much, not monitoring their wellbeing. Other unsafe practice that can amount to abuse is leaving a service user on the toilet too long, ignoring or not listening to them.  Marks on the body not taken seriously and not listening to complaints can put them at more danger, harm and risk of abuse. staff that are untrained or have out of date training, unsanitary uniforms can spread infection to clients and other colleagues, Management giving their colleague/s a large work load, making them exhausted and having a lack of concentration. Your assessor is happy with your answer to the above question. You have looked at this question from the perspective of the client. How about the staff who may be getting abused please include colleagues in this answer 5.2 Explain the actions to take if unsafe practices have been identified If I identify unsafe practice then I must follow the whistle blowing procedure and report to the appropriate person. I will report to my manager immediately or if it involves my manager then I would report it to another appropriate person. I will monitor all unsafe practices and make sure that I record and report in full all the evidence, then I will talk to my manager as I am aware all unsafe practices are dangerous that could cause harm. Your assessor is happy with your answer to the above question. 5.3 Describe the action to take if suspected abuse or unsafe practices have been reported but nothing has been done If suspected abuse or unsafe practices have been reported but nothing has been done in response or if it has to do with my manager then I would report it to the next level or manager. Then I would report to the social worker and safeguarding team and to the care quality commission and even the police depending on the response i get. Your assessor is happy with your answer to the above question.

Sunday, October 27, 2019

The Structure Of Skeletal Muscle Biology Essay

The Structure Of Skeletal Muscle Biology Essay Skeletal Muscle is a form of fibrous tissue with the fibers arranged parallel to each other. A muscle fiber (cell) is surrounded by the endomysium. A group of these cells is wrapped by fascicles. Bundles of fascicles are covered by the perimysium and bundles of the perimysium are wrapped by the epimysium to form a muscle. The muscle fibers have contractile properties which enable them to move bony levers in order to produce skeletal movement1. The functional unit of the muscle fiber is the sacomere which consists of most importantly, actin and myosin. The actin and myosin are arranged such that during contraction, they can slide over each other thus shortening the muscle2. Muscles suffer from many diseases, one of which is polymyositis. This is an inflammatory myopathy that affects mainly the muscles of the thorax and those around the torso. It affects all age groups but has been noticed mainly in late childhood and early adulthood. The sypmtomps are nonspecific but results in general muscle weakness and the cause, though believed to be an invasion by the white blood cells, is not very clear10. 2.0 The Structure of Skeletal Muscle. In daily life, structures and arrangements of designs are dictated, to a large extent by the purpose and function for which the design is meant for. Knowing that skeletal muscle is made up mainly of fibrous tissues, the arrangement of these tissues and how they are bound together to maintain a particular shape in order to accomplish different purposes (mainly to generate force and produce movement) may to a large extent, define the structure of the muscle4. At a macro level, the skeletal muscle is composed of bundles of individual muscle fibers, the supporting structure called the basal lamina, and the connective tissue sheaths as shown in figure 1. These connective tissues bind the cells together giving them strength and partly providing mechanical protection2. We can examine these connective tissues and their functions as follows: 2.1 The basal lamina. This is an extracellular matrix that acts as a scaffold on which a cell sits. It has been realized that apart from providing structural support, the basal lamina can orient and constrain cell during the process of regeneartion3. 2.2 The endomysium. This is a fine sheath of connective tissue that surrounds each individual muscle cell. The endomysium consist of loosely interlacing fibers composed mainly of collagen4. 2.3 The perimysium and fascilces. The individual muscle fibers wrapped by the endomysium, are grouped together in what is called fascicles. A layer of fibrous tissue called the perimysium wraps each fascicle4. 2.4 The epimysium. This is the outside layer that finally wraps the whole muscle. It is composed of dense irregular connective tissue4. Figure 1 Source: http://www.web-books.com/eLibrary/Medicine/Physiology/Muscular/muscle_structure.jpg 3.0 The muscle cell Having described how individual muscle cells are organized into a muscle, it is imperative that we look at the structural composition of the cell itself. Just like many other cells in the body are specialized according to their functions, skeletal muscle cells are specialized to produce force and movement5. The skeletal muscle fiber is thus composed of mainly three structural elements:-the myofibrils, the sarcoplasmic reticulum and the mitochondria, each contributing a unique aspect of muscle function. The entire function of the muscle can be attributed to the shifts in proportions of these three structures6. 3.1 The Myofibrills. These are cylindrical specialized sub-units within the muscle fiber. They consist of two types of contractile protein filaments-the thin filaments referred to as actin and the thick filaments referred to as myosin. The two most important parameters of the myofibrils are their diameter which determines its strength and the fiber length which determines it contraction velocity and distance over which the fiber can contract. The myofibril consist of two filaments-actin and myosin6,2. 3.1.1 Actin (thin filament). Actin filaments are responsible for regulation of contraction. The actin filament is formed by a helical arranged of actin monomers which is an ambiguous protein2 (figure 2). Because of the helical nature, a long grove is formed along the filament and the protein troponin is located at intervals along the length of the actin filament. It is troponin which is responsible for turning on contraction2,7. Figure 2.The actin molecule. Source: http://www.ucl.ac.uk/~sjjgsca/Muscleslidingfilament1.gif 3.1.2 The Myosin (thick filament). Myosin filament is about 150nm long. It has a tail and two heads. The tail is formed by two helical shaped fibers that coil around each other. A collection of several of these helical tails together form a myosin filament (figure 3)4b. Figure 3. The myosin molecule. Source: http://webanatomy.net/anatomy/myosin.jpg. 3.2 The sarcoplasmic reticulum (SR). Groups of about 200 thick and thin filaments constitute a myofibril. Each myofibril is thus enclosed in a membrane called the sarcoplasmic reticulum8. The SR membrane stores and releases calcium during muscle contraction and relaxation. The SR can therefore be thought of as the functional unit of the myofibril9. 3.3 The mitochondria. Found within the cell cytoplasm, the mitochondria are responsible for generation of most of the cells energy by the production of adenosine triphosphate (ATP). There are several mitochondria distributed along the length of a myofibril4. 4.0 The mechanism of muscle contraction Muscle contraction can largely be attributed to the structure of actin and myosin, their arrangement within the SR and the interaction between them in order to produce force (Figure 4). This type of arrangement allows the thin actin filaments to slide in and out by the action pull of the myosin heads8b. Figure 4. Actin and myosin arrangement: Source: http://www.exrx.net/Images/ActinMyosin.gif Muscles are composed of a number of actin and myosin filaments arranged in series in a basic unit called the sacomere. The sacomere consists of a thick filament in the meddle and two thin filaments, one overlapping on each side. The heads of the thick filament attach to the thin filament at the overlap and these heads allow movement in only one direction. When activated, each thick filament head rachets repeatedly along the actin, pulling the two actins closer together. Since the actin are attached to the Z line (The distance between two Z lines form the sacomere), ends of the sacomere (Z lines) are pulled in and the sacomere shortens. The sacomeres are arranged in series so that when the muscle fiber contracts, all the sacomeres contract simultaneously transmitting the force to the end of the muscle. The whole process of contraction described above occurs when the muscle is electrically stimulated2b. 5.0 Muscle stimulation. Skeletal muscle cells are stimulated by the motor neurons of the somatic nervous system. The reception of the motor stimulus (action potential) opens the calcium channels allowing calcium which is stored in the SR to be released. The release of calcium causes the release of acetylcholine-Ach (neurotransmitter). The calcium binds to the troponin on the actin filament. Troponin then regulates the tropomyosin which obstructs binding sites for myosin. This allows the tropomyosin to move, unblocking the bonding site. Myosin then binds to the unblocked site on the actin and applies a pull. This will pull the Z bands towards each other thus shortening the sacomere, causing muscle contraction2b. However, as calcium is released, the ATP-dependent calcium pump is activated and it continuously pumps calcium back to the SR to be stored again. This leads to a drop in calcium level within the cytoplasm. When the calcium level is too low, the calcium binding action to troponin is terminated, releasing tropomyosin which again blocks the binding site. This stops the interaction between actin and myosin thus relaxing the muscle2b. 6.0 Muscle Diseases There are a number of muscular diseases and disorders ranging from acquired, familial to congenital. Limiting ourselves to one of the acquired disorders of the muscles, lets look at polymyositis. 6.1 Polymyositis (PM). PM is a type of muscle inflammatory myopathy. Just like the name suggests, this disease causes inflammation of the muscle fiber. Although the causes of the disease are not well understood, it is believed that PM begins when white blood cells, spontaneously invade muscles. This can result in severe muscle weakness. Polymyositis is a persistent disease characterized by periods of increased and reduced or no symptoms. PM affects mainly the muscles of the thorax and is more common in women than men. It is said to affect all age groups although is it commonly noted in early childhood or 20s10. Key pathologic and diagnostic features of the disease. Endomysial inflammation. This is the inflammation of the outer connective tissue that surrounds the muscle fiber. This is done by the white blood cells that leave the blood and enter the tissue, somehow confirming the earlier assertion that the PM begins when white blood cells invade muscles. Invasion of myofibers by autoaggressive lymphocytes. This is when the T lymphocytes begin to attack the intact myofibers. Unlike in muscle dystrophy where inflammation is associated with degenerating myofibers, the invasion of T lymphocytes causes inflammation of health myofibers in PM.This causes inflammation of healthy myofibers. Other diagnostic features that may not be exactly specific to PM include myofiber necrosis, myophagocytosis, myofiber atrophy and fibrosis, a feature of chronic PM10,11. 7.0 Conclusion Human movement is only possible because of the action of muscle contraction. Voluntary contraction of muscle is made possible by the somatic nervous system which sends out an action potential activating the contraction process. The process is accomplished by the sliding of myosin and actin over each other. Many diseases and disorders affect muscles, prominent among them is muscular polymyosis which causes inflammation of the muscles mainly around the torso. Its believed to be caused by the unwanted action of the white blood cells and the symptoms include muscle weakness.

Friday, October 25, 2019

Common Man as Tragic Hero in Death of a Salesman Essay -- Death Salesm

Common Man as Tragic Hero in Death of a Salesman What is tragedy? While the literal definition may have changed over the centuries, one man believed he knew the true meaning of a tragic performance. Aristotle belonged to the culture that first invented tragic drama – the ancient Greeks. Through this, he gave himself credibility enough to illustrate the universally necessary elements of tragic drama. In The Poetics, Aristotle gives a clear definition of a tragedy, writing that it is â€Å"an imitation, through action rather than narration, of a serious, complete, and ample action, by means of language rendered pleasant at different places in the constituent parts by each of the aids [used to make language more delightful], in which imitation there is also effected through pity and fear its catharsis of these and similar emotions.† Basically, Aristotle thinks a tragedy should be witnessed rather than related, use poetic imagery instead of dry language, and have a logical flow with an inevitable conclusion at the end tha t evokes a heightened emotional response from the audience. Ever since Aristotle applied logic to art in The Poetics, playwrights from all time periods and cultures have attempted to prove him wrong. Utilizing intuition and writing from the soul, many have succeeded and many have failed. However, the most commercially successful theatrical performances have tended to follow Aristotle’s rules of drama. Aristotle maintained that all tragedies be driven by plot and that the characters simply be plugged into the story line. Leading the charge is the Tragic Hero, the man (not woman) who ultimately suffers the tragic fate. As defined in The Poetics, the Tragic Hero is, â€Å"the man of much glory and good fortune... ...oman’s world and demonstrated the tragic possibilities that exist within a common man’s universe. In so doing, he expanded the definition of Tragic Hero and helped to revolutionize tragic drama beyond the twentieth century. Works Cited Epps, Preston H. (trans.). 1970. The Poetics of Aristotle. Chapel Hill, N.C.: The University of North Carolina Press. Guth, Hans P. and Gabriel L. Rico. 1993. Discovering Literature. â€Å"Tragedy and the Common Man† by Arthur Miller. Upper Saddle River, NJ: Prentice Hall. Murphy, Brenda and Susan C. W. Abbotson. Understanding Death of a Salesman: A Student Handbook to Cases, Issues and Historical Documents. The Greenwood Press â€Å"Literature in Context† series, Claudia Durst Johnson, series editor. Westwood, CT, London: 1999. Miller, Arthur. Death of a Salesman. 50th Anniversary ed. New York: Penguin Books, 1999. Common Man as Tragic Hero in Death of a Salesman Essay -- Death Salesm Common Man as Tragic Hero in Death of a Salesman What is tragedy? While the literal definition may have changed over the centuries, one man believed he knew the true meaning of a tragic performance. Aristotle belonged to the culture that first invented tragic drama – the ancient Greeks. Through this, he gave himself credibility enough to illustrate the universally necessary elements of tragic drama. In The Poetics, Aristotle gives a clear definition of a tragedy, writing that it is â€Å"an imitation, through action rather than narration, of a serious, complete, and ample action, by means of language rendered pleasant at different places in the constituent parts by each of the aids [used to make language more delightful], in which imitation there is also effected through pity and fear its catharsis of these and similar emotions.† Basically, Aristotle thinks a tragedy should be witnessed rather than related, use poetic imagery instead of dry language, and have a logical flow with an inevitable conclusion at the end tha t evokes a heightened emotional response from the audience. Ever since Aristotle applied logic to art in The Poetics, playwrights from all time periods and cultures have attempted to prove him wrong. Utilizing intuition and writing from the soul, many have succeeded and many have failed. However, the most commercially successful theatrical performances have tended to follow Aristotle’s rules of drama. Aristotle maintained that all tragedies be driven by plot and that the characters simply be plugged into the story line. Leading the charge is the Tragic Hero, the man (not woman) who ultimately suffers the tragic fate. As defined in The Poetics, the Tragic Hero is, â€Å"the man of much glory and good fortune... ...oman’s world and demonstrated the tragic possibilities that exist within a common man’s universe. In so doing, he expanded the definition of Tragic Hero and helped to revolutionize tragic drama beyond the twentieth century. Works Cited Epps, Preston H. (trans.). 1970. The Poetics of Aristotle. Chapel Hill, N.C.: The University of North Carolina Press. Guth, Hans P. and Gabriel L. Rico. 1993. Discovering Literature. â€Å"Tragedy and the Common Man† by Arthur Miller. Upper Saddle River, NJ: Prentice Hall. Murphy, Brenda and Susan C. W. Abbotson. Understanding Death of a Salesman: A Student Handbook to Cases, Issues and Historical Documents. The Greenwood Press â€Å"Literature in Context† series, Claudia Durst Johnson, series editor. Westwood, CT, London: 1999. Miller, Arthur. Death of a Salesman. 50th Anniversary ed. New York: Penguin Books, 1999.

Wednesday, October 23, 2019

Live and Let Live

The Hitchhikers Guide to the Internet 1 The Hitchhikers Guide to the Internet Ed Krol [email  protected] cso. uiuc. edu Get any book for free on: www. Abika. com Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet 2 This document was produced through funding of the National Science Foundation. Copyright (C) 1987, by the Board of Trustees of The University of Illinois. Permission to duplicate this document, in whole or part, is granted provided reference is made to the source and this copyright is included in whole copies. This document assumes that one is familiar with the workings of a non-connected simple IP network (e. . a few 4. 2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the â€Å"oral tradition† of the Internet to the point that that net can be connected to the Internet with little dang er to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not normally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions.This is especially true of terms for the glossary (definitions are not necessary). In the beginning there was the ARPAnet, a wide area experimental network connecting hosts and terminal servers together. Procedures were set up to regulate the allocation of addresses and to create voluntary standards for the network. As local area networks became more pervasive, many hosts became gateways to local networks. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long haul IP based networks (NASA, NSF, states†¦ ). These nets, too, interoperate because of IP.The collection of all of these interoperating networks is the Internet. Two groups do much of the research and information work of the Internet (ISI and SRI). ISI (the Informational Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI International provides information services for the Internet. In fact, after you are connected to the Internet most of the information in this document can be retrieved from the Network Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center.The ARPAnet is run by Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet BBN, Inc. under contract from DARPA. Their facility is called the Network Operations Center or NOC. Cornell University temporarily operates NSFnet (called the Network Information Service Center, NISC). It goes on to the -2regionals having similar facilities to monitor and keep watch over the goings on of their portion of the Internet. In addition, they all should have some knowledge of what is happening to the Internet in total.If a problem comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet†¦ ) and have a problem, you should contact your regional network operations center. 3 RFCs The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel ([email  protected] edu).He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFC's (e. g. RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability.RFC-793 (Transmission Control Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable.Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). Finally, as the Internet and technology have grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs Get any book for free on: www. Abika. comThe Hitchhikers Guide to the Internet on the topic. -3(Appendix B contains a list of what are considered to be the major RFCs necessary for understanding the Internet). 4 The Network Information Center The NIC is a facility available to all Internet users which provides information to the community. There are three means of NIC contact: network, telephone, and mail. The network accesses are t he most prevalent. Interactive access is frequently used to do queries of NIC service overviews, look up user and host names, and scan lists of NIC documents. It is available by using %telnet sri-nic. rpa on a BSD system and following the directions provided by a user friendly prompter. From poking around in the databases provided one might decide that a document named NETINFO:NUG. DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous FTP. An anonymous FTP would proceed something like the following. (The dialogue may vary slightly depending on the implementation of FTP you are using). %ftp sri-nic. arpa Connected to sri-nic. arpa. 220 SRI_NIC. ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 12:00 PDT Name (sri-nic. arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password.Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp; get netinfo:nug. doc 200 Port 18. 144 at host 128. 174. 5. 50 a ccepted. 150 ASCII retrieve of NUG. DOC. 11 started. 226 Transfer Completed 157675 (8) bytes transferred local: netinfo:nug. doc remote:netinfo:nug. doc 157675 bytes in 4. 5e+02 seconds (0. 34 Kbytes/s) ftp; quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFO:WHAT-THE-NIC-DOES. TXT)! Questions of the NIC or problems with services can be asked of or reported to using electronic mail. The following addresses can be used: [email  protected]ARPA requests [email  protected] ARPA General user assistance, document User registration and WHOIS updates Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] ARPA Hostname and domain changes and updates [email  protected] ARPA SRI-NIC computer operations [email  protected] ARPA Comments on NIC publications and services -4For people without network access, or if the number of documents is large, many of the NIC documents are available in printed form for a small charge. One frequently ordered document for starting sites is a compendium of major RFCs.Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact numbers). 5 The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek ([email  protected] nsf. net) is the NNSC user liaison. The NNSC, which currently has information and documents online and in printed form, plans to distribute news through network mailing lists, bulletins, newsletters, and online reports.The NNSC also maintains a database of contact points and sources of additional information about NSFnet component networks and supercomputer centers. Prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NN SC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors.Mail reflectors are special electronic mailboxes which, when they receive a message, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his â€Å"two cents† in sends a message with the comments to the reflector†¦. The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by [email  protected]NSF. NET, one sends a request to Get any book f or free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] NSF. NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFO:INTEREST-GROUPS-1. TXT, NETINFO:INTEREST-GROUPS-2. TXT, and NETINFO:INTEREST-GROUPS3.TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regional network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to each subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the scarcest. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus.That is, set up a reflector on a local machine which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sent to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to [email  protected] arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaster. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e. . , 192. 17. 5. 100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might choose to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6(many interconnected nets with fewer nodes each and a backbone). Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets.Class A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have thre e octets of network address and one of host. Class B is split two and two. Therefore, there is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats.Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4. 2BSD) could not deal with subnetted addresses. Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet switches. Some of these nodes have a limited capability to store and exchange routing i nformation (limited to about 300 networks).Therefore, it is suggested that any campus announce (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a mask which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways.For example, if a campus requires two networks internally and has the 32,000 addresses beginning 128. 174. X. X (a Class B address) allocated to it, the campus could allocate 128. 174. 5. X to one part of campus and 128. 174. 10. X to another. By advertising 128. 174 to the Internet with a subnet mask of FF. FF. 00. 00, the Internet would treat these two addresses as one. Within the campus a mask of FF. FF. FF. 00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you don't pass the subnet mask of FF. FF. 00. 0 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4. 2BSD systems require additional software. 4. 3BSD systems subnet as released. Other devices -7and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnetted portion of the network. As time passes and more systems become 4. 3BSD based, these problems should disappear. 7 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e. g. 4. 2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). 8Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below: Number of Networks When the Internet was designed it was to have about 50 connected networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly.By the summer of '88 the current PDP-11 core gateways will be replaced with BB N Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packets to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8-Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is correct. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks under different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of Get any book for free on: www. Abika. com T he Hitchhikers Guide to the Internet gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity & Congestion Many portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. 9 These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB).This board is composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are: Committee Chair Autonomous Networks Deborah Estrin End-to-End Services Bob Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler Performance & Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St.Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness & Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To appreciate the problem, watch a small child trying to find a table in a restaurant. From the adult point of view the structure of the dining room is seen and an optimal route easily chosen.The child, however, is presented with a set of paths between tables where a good path, let alone the optimal one to the goal is not discernible. *** A little more background might be appropriate. IP gateways (more correctly routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP header of the packet and the state of the network. Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Each interface on a router has an unique address appropriate to the network to which it is connected.The information in the IP header which is used is primarily the destination address. Other information (e. g. type of service) is largely ignored at this time. The state of the network is determined by the routers passing information among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm).This implies the nodes must have larger amounts of local storage and enough CPU to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the existing information (or you spend a large amount of the network capacity passing around megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is across the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. The adult algorithm, but rather than looking directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) field expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network.They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional†¦ ). -10Routing protocols in current use: Static (no protocol-table/default routing) Don't laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small network or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations.If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use static ro utes in the middle of a network 10 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes.If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. 11 RIP RIP is a routing protocol based on XNS (Xerox Network System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB†¦ ) and many BSD Unix systems BSD systems typically run a program called â€Å"routed† to exchange information with other systems running RIP. RIP works best for nets of small diameter where the links are of equal speed.The reason for this is that the metric used to determine which path is best is the hop-count. A hop is a traversal across a gateway. So, all machin es on the same Ethernet are zero hops away. If a router connects connects two networks directly, a machine on the other side of the router is one hop away†¦. As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the network. The diameter of a network is defined as the largest hop-count possible within a network. Unfortunately, a hop count of 16 is defined as infinity in RIP meaning the link is down.Therefore, RIP will not allow hosts separated by more than 15 gateways in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11reflected in the hop-count. So a one hop satellite link (with a . 5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it eve n more by throwing more packets on the queue for that link.The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD â€Å"routed†. Routed The ROUTED program, which does RIP for 4. 2BSD systems, Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet has many options. One of the most frequently used is: â€Å"routed -q† (quiet mode) which means listen to RIP information but never broadcast it.This would be used by a machine on a network with multiple RIP speaking gateways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert stat ic routes into â€Å"routed†, the â€Å"/etc/gateways† file and the â€Å"route add† command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the â€Å"route add† command is preferable to use.The reason for this is that the command adds the route to that machine's routing table but does not export it through RIP. The â€Å"/etc/gateways† file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is made in the â€Å"/etc/gateways† file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with â€Å"routed† is that you have very little control over what gets broadcast and what doesn't.Many times in larger networks where various parts of the network are under different administr ative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12type of reasonability checks are not available with â€Å"routed† and leave it usable, but inadequate for large networks. 12 Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a â€Å"Fuzzball† hich runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing toGet any book for free on: www. Abika. com The Hitchhikers Guide to the Internet do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not really feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. 13Exterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reachability protocol. It tells only if nets can be reached through a particular gateway, not how good the connection is. It is the standard by which gateways to local nets inform the ARPAnet of the net s they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link values understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreachable.A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4†¦ , so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do they interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site.The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net beco mes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more minutes). Mark Fedor of Cornell ([email  protected] tn. cornell. edu) attempted to solve these problems with a replacement for â€Å"routed† called â€Å"gated†. â€Å"Gated† talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Hello'ers.These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under configuration file control it can filter the conversion. For example, one can produce a Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local site's RIP space, it won't be passed through to the Hello side of the world.There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3†¦. Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat.If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using â€Å"gated†. -14â € ³Names† All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128. 174. 5. 50, a symbolic name register was set up at the NIC where people would say â€Å"I would like my host to be named ‘uiucuxc'†.Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe domain name service, a distributed data base system for mapping names into addresses. We must look a little more closely into what's in a name. First, note that an address specifies a particular connection on a specific network.If the machine moves, the address c hanges. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i. e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the root of the tree at the right. For example: 14 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet 15 uxc. cso. uiuc. edu is a machine called ‘uxc' (purely arbitrary), within the subdomains method of allocation of the U of I) and ‘uiuc' (the University of Illinois at Urbana), registered with ‘edu' (the set of educational institutions). A simplified model of how a name is resolved is that on the user's machine there is a resolver. The resolver knows how to contac t across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e. g. ‘edu').What root servers to use is an installation parameter. From the root server the resolver finds out who provides ‘edu' service. It contacts the ‘edu' name server which supplies it with a list of addresses of servers for the subdomains (like ‘uiuc'). This action is repeated with the subdomain servers until the final subdomain returns a list of addresses of interfaces on the host in question. The user's machine then has its choice of which of these addresses to use for communication. -15A group may apply for its own domain name (like ‘uiuc' above). This is done in a manner similar to the IP address allocation.The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reachable for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do maintenance on the database. If the machine is not convenient, that might not be done in a timely fashion.The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain (BIND) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other network hosts. BIND is integrated with 4. 3BSD and is used to lookup and store host names, addresses, mail agents, host information, and more. It replaces the â€Å"/etc/ho sts† file for host name lookup.BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to â€Å"[email  protected] Berkeley. EDU†. BIND can also be obtained via anonymous FTP from ucbarpa. berkley. edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on â€Å"/etc/hosts† Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet being up to date and complete. Within the . uiuc. edu domain, only a few hosts are included in the host table distributed by SRI.The remainder are listed locally within the BIND tables on uxc. cso. uiuc. edu (the server machine for most of the . uiuc. edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for interior hosts not directly reachable from the Internet. These hosts c an either be on non-advertised networks, or not connected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the â€Å"Name Server Operations Guide for BIND† in â€Å"UNIX System Manager's Manual†, 4. 3BSD release.There are a few special domains on the network, like SRINIC. ARPA. The ‘arpa' domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC. NSF. NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name.In actuality, the domain system is a much more general and complex system than has been descr ibed. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not merely IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. 16 What's wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways.Included in these modifications is support for the Internet protocols. In earlier versions (e. g. BSD 4. 2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ethernets and smaller Internets. There were deficiencies, however, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4. 3). Since it is the springboard from which many vendors have launched Unix implementations (either by porting the existing code or by using it as a model), many implementations (e. g.Ultrix) are still based on BSD 4. 2. Therefore, many implementations still exist with the BSD 4. 2 problems. As time goes on, when BSD 4. 3 trickles through Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet.It doesn't have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect, which politely says â€Å"I' ll deliver this message for you, but you really ought to use that gateway over there to reach this host†. BSD 4. 2 ignores these messages. This creates more stress on the gateways and the local network, since for every packet -17sent, the gateway sends a packet to the originator.BSD 4. 3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines.Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could pu t the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways don't know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers aren't used).So TELNET and FTP's of very short files work just fine and FTP's of long files seem to hang. On BSD 4. 2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4. 3 negotiates trailers, so it uses them on its local net and doesn't use them when going across the network. 17 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesn't receive an acknowledgement in a re asonable amount of time it retransmits the blocks.The determination of what is reasonable is done by TCP's retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmissions done unnecessarily. BSD 4. 2 had a retransmission algorithm which retransmitted quickly and often. This is exactly what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e. g. 56kb lines), it tends to retransmit too aggressively.Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmission algorithms do adapt to the delay of the network -18after a few packets, but 4. 2's adapts slowly in delay situations. BSD 4. 3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is on a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19Appendix A References to Remedial Information 18Quaterman and Hoskins, â€Å"Notable Computer Networks†, Communications of the ACM, Vol 29, #10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S. , Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz. rutgers. edu, directory pub/tcp-ip-docs, file tcp-ip-intro. doc. -20Appendix B List of Major RFCs RFC-768 RFC-791 RFC-792 RFC-793 RFC-821 User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Simple Mail Transfer Protocol (SMTP) Get any book for free on: www. Abika. com The Hitchhikers Guide to the InternetRFC-822 RFC-854 RFC-917 * RFC-919 * RFC-922 * Subnets RFC-940 * RFC-947 * RFC-950 * RFC-959 RFC-966 * Protocol RFC-988 * RFC-997 * RF C-1010 * RFC-1011 * Standard for the Format of ARPA Internet Text Messages Telnet Protocol Internet Subnets Broadcasting Internet Datagrams Broadcasting Internet Datagrams in the Presence of Toward an Internet Standard Scheme for Subnetting Multi-network Broadcasting within the Internet Internet Standard Subnetting Procedure File Transfer Protocol (FTP) Host Groups: A Multicast Extension to the Internet Host Extensions for IP Multicasting Internet Numbers Assigned Numbers Official ARPA-Internet Protocols 9 RFC's marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note: This list is a portion of a list of RFC's by topic retrieved from the NIC under NETINFO:RFC-SETS. TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways: RFC-882 RFC-883 RFC-973 RFC-974 RFC-1009 Domain Names – Concepts and Facilities Domain Names – Implement ation Domain System Changes andObservations Mail Routing and the Domain System Requirements for Internet Gateways -21Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 [email  protected] ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet[email  protected] NSF. NET -22Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total picture of the reachability to all networks known to the ARPAnet with EGP. They then redistribute reachability information to all those gateways speaking EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is th en passed to you via Hello, gated, RIP†¦. ount to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gateway increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a minimum amount of time (usually at least two minutes).This allows for the propagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from multiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being pr opagated because of gossip or counting to infinity. -23- 20 Get any book for free on: www. Abika. com

Tuesday, October 22, 2019

Growing up in China Historical Analysis

Growing up in China Historical Analysis The purpose of this paper will be to analyze the world historical process of growing up in China by examining Yan Phou Lee’s biographic adaptation of â€Å"When I was a boy in China†.Advertising We will write a custom term paper sample on Growing up in China Historical Analysis specifically for you for only $16.05 $11/page Learn More The author talks about their life from birth to growing up as a boy in China. The thesis statement for the essay will therefore be to examine the process and pattern of growing up as a male child in China from birth, to infancy and then to adulthood (marriage). The essay will look at how male and female children in China are treated and raised by their parents, relatives and the society as well as important periods of celebration in their lives. The primary source which is Yan Phou Lee’s biography offers an insightful look into the life of male children in China and it also presents various aspects of Chines e culture such as the Chinese calendar and Chinese months which is corroborated by other secondary sources used in the study. Lee’s biography supports the arguments made by the secondary sources with regards to how the Chinese count their months as well as the religious systems that exist in China which include Buddhism, Taoism and Confuciusm. Lee’s work however presents some controversial issues which might be viewed by many gender activists to be biased against women. He portrays the Chinese culture as one that is punitive to women by not offering them the same gratuities that are given to the male children. The evaluation of the historical process therefore offers the readers a look into the life of a male child growing up in China as well as the differences that exist in the society. In the first chapter of Lee’s biography, he talks about his birth and the cultural practices of the Chinese people when a child is born. Lee indicates that the Chinese calendar is different from that of the English calendar, an indication of the difference that exists between the Chinese and English cultures. According to Lee (7), the Chinese year is different from the English year because the months of the year are determined by the revolution of the moon around the earth. This is corroborated by Parise (215) who notes that time in China during the period of 1800 was usually determined by the number of accessions that the country had in terms of Emperors. Time was also determined by the number of cycles which were usually sixty years each and the cycle in which Lee was born was 1861 during the reign of Emperor Tung-che. Parise (215) also highlights the difference that exists between a Chinese calendar and English calendar where the months are referred as Regular Moon, Second Moon, Third Moon, Fourth Moon and so on instead of January, February, March and April. Every third year was termed as a leap year and it had an extra month so that it could make the l unar year to be equal to a solar year.Advertising Looking for term paper on asian? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Chinese culture places a lot of importance on the birth of male children as demonstrated by how the various members of Lee’s family celebrated when he was born. He alludes to the fact that the Chinese culture views men to be more important than women because Chinese men are more desirable since they are able to maintain the family’s honor once they decide to get married. This is not possible for a girl as they lose the family’s honor when they are married off to another family. Male children according to Lee were therefore seen to be more important especially amongst the elderly relatives of the family. When it came to the naming of children, parents picked names from the Chinese dictionary which encompassed the meaning of luck or fortune. Choosing names was an important activity for many Chinese parents as they believed that names had the power of warding off evil spirits (Lee 8). Fortune tellers were usually called upon by the parents of the child to predict their future as soon as they were born. Rich parents who had male newborns invested large sums of money to consult deities who had the power to ward off any malignant influences from the child’s future. The money was mostly used to buy gifts for the God of Longevity in return for the child’s protection and also provide guidance in periods or situations of difficulty or chaos. The rich parents also consulted blind fortune tellers who were paid to intercede for the child with a particular Chinese god or idol. Because of the large amounts of money rich parents were willing to spend for the future of their children, fortune-tellers, astrologers, priests and the lessees of temples made a lot of money when they participated in these mysterious activities. Poor families were also not left behin d as parents from poor backgrounds sacrificed their wealth so that the male child could have a positive future (Lee 10). Lee (10) described his day of christening to also be a day of celebration as many relatives and friends attended the ceremony with gifts and valuable trinkets that would be useful in his future life. This was a different case for the girls as their day of christening was usually marked by fewer gifts and less excitement than is usually exhibited in the case of boys. The presence of roast pig which is the national festive dish in China indicated that male children were more valued than the female children. According to Lee (11) no occasion was complete without the presence of roast pig which meant that all weddings, religious festivals, birthdays and ancestral celebrations incorporated roast pigs in the menu. After infancy, the male children were groomed to be obedient followers of their parents, grandparents and ancestors as it was required by Chinese culture. Chi ldren were not supposed to talk back to their parents even when defending themselves from being wrongfully accused. They were required to take the punishment without any objection as a sign of respect and compliance to Chinese cultures.Advertising We will write a custom term paper sample on Growing up in China Historical Analysis specifically for you for only $16.05 $11/page Learn More According to Lee (17) everyone in China is subject to somebody else which means that all children were subject to their parents and their parents were in turn subject to their own grandparents which demonstrated that subjectivity in Chinese culture was a continuous cycle. The magistrate during that time was seen to be the father of everyone he ruled over while the Emperor was subject to his citizens who in return had to show their subjectivity to their Emperor (Lee 18). Young Chinese boys usually engaged in various games and past times such as kite-flying where they designed kites that were six to seven feet long from wing to wing. The kites were of various colors and designs and the children flew them so as to catch and retain the wind. There was even a date set aside for kite flying which was the ninth day of the ninth month which usually fell in October according to the Chinese calendar. This day referred to as Kite Day saw the male children going up the hills in China to have a communion with the heavenly zephyrs after which they get to fly their kites made of rice-paper. The fun part during the whole event was when the male children made the kites fight in the sky which resulted in the display of dragon designed kites of different colors engaging in combat (Lee 38). Apart from kite flying, other past time games that the children engaged in included kicking the shuttlecock which was a favorite past time game for many teenage boys and gentlemen. The shuttlecock was made up of a bunch of feathers stuck together by small round pieces of leather and the n tied together with a piece of string. Players would serve the shuttlecock to each other while at the same time making sure not to drop it hence the name kicking the shuttlecock. Other games and past times Chinese boys engaged in included penny-tossing and cricket fighting which were mostly done by the older boys and men (Lee 38). Once the male child reached a school going age, they were either taken to schools that were run by private gentlemen since the government of China provided education to advanced students only. But because the qualification for gaining office employment was education, the government encouraged many parents to take their children to school. This ordinance saw many schools being established in various corners of China where classes were held in people’s private homes or in the halls of Chinese temples. These temples were usually chosen because of the tablets that were used for deceased ancestors which could serve the purpose of writing desks and table s. Only boys attended these schools because the girls went to schools that were operated by their families.Advertising Looking for term paper on asian? Let's see if we can help you! Get your first paper with 15% OFF Learn More But the type of education was similar for both girls and boys except that girls were usually schooled until they were twelve years old while the boys went to school until they were sixteen or seventeen years old. After this age they viewed by their parents, grandparents and village elders to be ready for marriage (Lee 55). When it came to marriage, the male children on acquiring a wife were meant to continue living with their parents. This was not so for the girls as societal cultures and beliefs expected them to live with their husband’s parents. Such an arrangement however usually had its downside because most of the domestic squabbles and infidelity that occurred within the home were usually caused by this. This custom is however still being practiced as every generation is educated by their ancestors on the domestic arrangements for the male children once they get married. The success of such arrangements has all been placed on the son and husband of the family where they are required to be strict disciplinarians when it comes to managing the affairs of the home. Chinese culture also depended on the male figure during such arrangements as men were able to prevent domestic brawls which commonly occurred between the mother-in-law and the new bride (Lee 32). The predominant religion in China is different from the rest of the world which can mostly be attributed to their different calendar. The Chinese calendar is not divided into weeks or months but it is divided into moons which as mentioned earlier are calculated according to cycles. The Chinese do not believe in Christianity and they therefore do not celebrate Christian holidays such as Easter or Christmas. Their religion was divided into three systems the first of Confucianism which was the religion taught by the great philosopher Confucius. This religion prescribed to the notion that mankind had to perform certain duties such as being obedient to parents, honoring and serving members of the societ y and living harmoniously with one’s relatives or spouse. Confucianism never taught its subjects about the existence of God because Confucius himself did not believe in the existence of a higher authority. He instead taught his followers to pursue goodness and everything that was good in the world by viewing. The gods worshipped under Confucianism included the five great mountains, heaven and earth and the spirits that existed in the wind (Lee 64). The second religious system in China was referred to as Taoism which focused on philosophical teachings and Buddhist doctrines. This religion however degenerated into a sect where the sect leaders prayed on people’s superstitious fears so that they could earn some money. Taoist priests who were the leaders of Taoism were usually called upon by families to intercede for individuals that were possessed by an evil spirit. The role of the Taoist priest in such a situation was to offer up vows to the gods so that the person could be able to recover. Because of the poor religious standing, Taoist followers worshipped everything imaginable because they believed that every object or living organism had a spiritual counterpart in the next world. The gods that were worshipped under the Taoist religion included gods of war, literature, medicine and worldly possessions (Lee 66). Buddhism, which is currently the most predominant religion in China, came about during the time of Christ when an embassy sent by the Emperor of the Han dynasty to investigate Jesus’ teachings came across Buddha in India while they were on their way to India. The ambassadors assumed that he was the great sage they were looking for and decided to stay on so that they could listen to his teachings. Once the great Buddha died, they decided to return to China with his books which contained all the religious teachings of the religion. Buddhism began to pick up as a religion in China where Buddhist priests and nuns lived separate from the rest of the society in monasteries and convents. On joining the monastery, the Buddhist priests were required to shave their heads completely and don a costume that would allow them to be easily identifiable (Ling and Liu 1). Under the Buddhist religion, Chinese people believed that wealth and happiness were easily acquired from the priests so they offered them money which would be used to buy oil and incense for Buddha. The god in return would meet the wishes and desires of the people who prescribed to the religion. These three religious systems formed the background of religion in the country where the Chinese society was willing to worship everything and anything rather than nothing. Apart from these religious systems, the Chinese society worshipped gods and goddesses where each idol had a special holiday in the Chinese calendar. For example the Goddess of Mercy had a dozen days in the Chinese calendar that were dedicated to her where the sacred days would see followers convergi ng to celebrate her (Ling and Liu 1). The religious systems of Taoism and Buddhism were however despised by the educated classes of Chinese society but they always consulted the Taoist and Buddhist priests in cases of sickness or death. This demonstrated that the religious instinct of most Chinese people was strong where they could worship anything in the event they were in need of a higher intervention. The presence of temples instead of churches in most Chinese neighborhoods signified the embodiment of the highest level of architectural skill in the country. The idols who resided in these temples represented the superiority of idolatry in the country when compared to idol worshipping in India and Egypt. These three systems of religion in China however failed when it came to the religious training of young children. Religious knowledge was usually passed on to young girls and boys through their parents where they were told to worship particular idols with objection or questioning ( Lee 71). Lee, Yan Phou. When I was a boy in China. Boston: Lothrop Publishing Company, 2007 Ling, H., and Liu, J. Buddhism in China. China: China Intercontinental Press, 2005. Parise, Frank. The book of calendars. New York: Gorgias Press, 2002

Monday, October 21, 2019

Free Essays on Cultural Differences In Parenting

Cultural Differences in Parenting Raising a child can be very difficult and it seems that parents, caregivers and siblings alike sometimes forget that children need to learn how to become adults from us and our examples. That they are not just little adults needing redirection. In my opinion, there are certain characteristics a devoted parent should have. Parental expectations vary from culture to culture, and whether a person belongs to a majority or minority ethnic group, there are variations between and within the groups. Culture usually applies to patterns of behavior that are linked to characteristics among the groups including origin, physical appearance, family structure and gender roles. However I still believe there are fundamental parallels between all cultural backgrounds. For instance, being a good example is part of what I consider to be a crucial part of parenting. Amongst some Asian families, the older children will be expected to take on responsibility for their younger siblings. This is why it is absolutely imperative that we not only hold ourselves up to be acknowledged for personal gain, but for the enhanced experience children get under our influence. Yet again, in Western cultural context, this scenario could be perceived as bullying by an older sibling. Showing again the gap between cultures. One’s upbringing is also the product of economic and social circumstances. In an affluent family for example, with a fair amount of living space, money, books and toys, a well-behaved child my be energetic, inquiring, active and out going. However in a low-income working family, living in smaller accommodations in the city, a well-mannered child may be the quiet one. This situation, I feel brings up the issue of unconditional love. Loving your child unreservedly and never allowing room for doubt in their minds of your love is something that I consider a vital part of successful parenting. I know that a... Free Essays on Cultural Differences In Parenting Free Essays on Cultural Differences In Parenting Cultural Differences in Parenting Raising a child can be very difficult and it seems that parents, caregivers and siblings alike sometimes forget that children need to learn how to become adults from us and our examples. That they are not just little adults needing redirection. In my opinion, there are certain characteristics a devoted parent should have. Parental expectations vary from culture to culture, and whether a person belongs to a majority or minority ethnic group, there are variations between and within the groups. Culture usually applies to patterns of behavior that are linked to characteristics among the groups including origin, physical appearance, family structure and gender roles. However I still believe there are fundamental parallels between all cultural backgrounds. For instance, being a good example is part of what I consider to be a crucial part of parenting. Amongst some Asian families, the older children will be expected to take on responsibility for their younger siblings. This is why it is absolutely imperative that we not only hold ourselves up to be acknowledged for personal gain, but for the enhanced experience children get under our influence. Yet again, in Western cultural context, this scenario could be perceived as bullying by an older sibling. Showing again the gap between cultures. One’s upbringing is also the product of economic and social circumstances. In an affluent family for example, with a fair amount of living space, money, books and toys, a well-behaved child my be energetic, inquiring, active and out going. However in a low-income working family, living in smaller accommodations in the city, a well-mannered child may be the quiet one. This situation, I feel brings up the issue of unconditional love. Loving your child unreservedly and never allowing room for doubt in their minds of your love is something that I consider a vital part of successful parenting. I know that a...