Saturday, August 31, 2019

Facility & Venue Management Essay

1.0 Design Context. The Currumbin Surf Life Saving Club (SLSC) as a whole is a well-designed multi storey local club, due to its modern but ‘beachy’ looking design traits, which reflects the surrounding up market area perfectly. The club has a capacity to seat around 200-250 guests from its sports bar to dining area. The club is situated in a prime spot right on top of Currumbin rocks resulting in undisrupted views of the Gold Coast. 2.0 Design Analysis 3.1 External Design Features. The club is constructed with concrete with the exterior of the club consisting of 3 colour blocks white, light tanned brown and dark green (representing Vikings). From the car park only the side of the building can be seen with top half Light tanned brown and bottom dark green. This colour scheme that can be seen from the car park does not look welcoming, as it is dark, boring and bold. From the beach and the ocean the whole club can be seen utilising the white paint on the external area where there is open plan windows and large balcony. The Surf Club site is on Currumbin beach with the club structure expanded on top of the rocks giving the club a competitive edge over most other clubs as it the closest to the surf and has undisrupted views of the coastline. Joined to the club is a large tall rock called ‘Elephant Rock’ which has been utilised quite strategically as a look out, which is another unique asset for the club. Apart form this large natural structure the surrounding space is undisrupted as the houses and shops are across the road from the beach. The general area of the site consists of the club, the car park and the rock lookout. The design aspects of the space outside are very minimal as the building resides on the beach so it is unsuitable for any large scale landscaping or gardens. The footpaths leading to the building join up and match the Council beach footpath ensuring that it flows. Large signage is erected on the entrance of the car park so incoming traffic can easily see what the building is also on the side of the building a large mural is painted of the ‘Currumbin Vikings’ logo. The location of this surf club is as close to the ocean any club could get which makes it a massive draw card for their members and guests. Though its position is appealing being so close to the ocean puts the surf club in a situation where the club is prone to adverse weather conditions such as cyclones, large swells and dangerous winds ultimately impacting on the structural integrity of the club. The car park is outside is maintained well as it must stand all the elements including tidal surges. The space has a capacity to fit around 50 cars also public parking within 100m. The club is situated along one of the Translink bus routes and has frequent services running north and south. Alternatively the clubs free shuttle can be utilised within a 5km radius (Currumbin Beach Vikings S.L.S.C) making it very accessible. The club is situated on the 2nd level with the main entrance above a set of fairly large stairs, which makes it impossible for special needs guests to ascend. The club has installed an electronic chair lift for people with special needs but to get to the chair lift there is no wheel chair ramp, they must be lifted up a smaller flight of stairs (5) making the chair lift impractical. 2.2 Internal Design Features. The internal design of the venue is quite spacious with the service areas situated on one side and bar tables and dining tables situated on the other side leading out to the open balcony giving all guests a view of the ocean. The interior is white in colour giving it a modern look; whilst they haven’t taken away the surf club feel utilising floor tiles with a sandy coloured wash giving the club a nice ‘beachy’ texture. The social facilities offered at the surf club consist of administration area, designated food ordering area and cafà ©, bar/drink service area, dining area, live sports entertainment area, gaming room (pokies) and toilets. The food ordering area is situated at the far end of the service area with the food menu situated in the middle of the club on a pole away from the ordering area so guests must look first then go up to order which causes congestion. The bar is quite large with 2 service areas with huge selection of beers and spirits also showcasing a wine selection area. The bar has a nice marble counter, which is complimented with a sleek scattered tile design. The sporting entertainment area is large with large flat screen and smaller screens with keno available. The gaming room is separate to the club and is accessed by a door to ensure under 18’s cannot enter. The manner in which the service counters have been positioned on one side of the venue has given the club more control over the club regarding guests and congestion within the club by creating a free flowing walkway between the service areas and tables allowing guests to easily walk in and out with out causing major congestion. Signage stating the exits within the club also ensures that guests are aware of their surroundings. The area in which guest can dine consists of inside with open plan windows looking towards Burleigh/Surfers Paradise and out on the balcony looking out to the ocean. As the club is on the beach night temperatures can be cool so adequate heating is available with gas stoves out on the balcony and heating inside. The balcony has large stationary umbrellas hanging down so guests are out of the direct sunlight but still utilising the natural light. As the club has the up stair function room it allows the club to be much more flexible and provide services to cater for new trends. This room also allows the club to create and have contingency plans in place to ensure that if something were to happen there would be room to cater for guests and ensure no major impacts on the club are caused. The clubs location, services and facilities give the venue a good edge in trying to obtain guests and income. The Currumbin area has a lot of cafà © styled restaurants so there is competition in the area making it important for the club to host events. The club hosts live local and national music acts every weekend (Currumbin Beach Vikings S.L.S.C), promotional days and the Vikings has nippers on during the summer so through out the year the club has various events to cater for all guests ensuring that the club is capturing as much income generations as possible. On inspection the club had no signs of vandalism, which showcases the clubs identity within the Currumbin community as being their local Surf Club. 3.0 Develop and Evaluate Solutions. 3.1 Problem: Colour Scheme of Building facing car park. The solutions established to enhance the front facing wall consist of firstly repainting the wall to coincide with the rest of the club or secondly creating a mural reflecting the beach and Vikings to put on the wall. The strengths of these solutions would help to improve the appeal of the club to members and the general public also giving the building a new and different vibe. The main weakness in regard to changes of the building would be member’s inertia to change as they associate the colours with the building. This problem is ranked number 1, as it would be easy and feasible for the club to adopt. 3.2 Problem: Building Site Prone to Adverse Weather Conditions. As this problem is of a natural nature it makes it difficult to create effective solutions but ensuring the right precautions are taken when preparing for the storms would be imports and monitoring these events would be a vital element in minimising damage also. These solutions will help to ensure that as little damage is done to the venue as possible also gives decision makers of the venue the ability to take quick action and increase protection if events are predicted to worsen. This problem is ranked number 4 in terms of relevance and feasibility, as it is hard to determine how severe the events may be. 3.3. Problem: Electronic Chairlift Situated above a Flight of Stairs. In order to fix this issue would be essential to construct a platform to join the electronic chairlift to the ground level or build a wheel chair ramp. The importance of this solution it would ensure that all guests are able to enjoy the services available at the club also it would help to improve relationships with these guests. The weaknesses to this solution consist of the construction would affect the entrance to the club and also the cost would be large. This problem is ranked number 3 due to the cost associated with the change. 3.4 Problem: Food Menu is not Clearly Visible.  The easiest and most effective way to fix this problem is to replace the current menu area or add to it by installing a menu board above the ordering area also complementing it by placing a menu board at the entrance of the venue. This will allow guests to easily see what is on the menu whilst waiting in line easing congestion and also gives general passers by an ide of what the club has to offer. The weaknesses could be the managers do not wish to have the men’s displayed in this manner also there would be a cost with fitting the structure. This problem is ranked number 2 as it is an easy fix and the costs would be minimal.

Friday, August 30, 2019

Grievance Procedure Essay

This document forms a template for organisations to compose a policy for Grievance. The working is largely standard but there is the opportunity for organisations to personalise the policy. This document is divided into three columns 1. Heading: for each sub section of the policy 2. Explanation: why the section is there and what it should contain 3. Section content: contains the wording to be used in the policy which can be added to/adjusted according to the needs and practices within the organisation. Instructions: Once you have completed content in the third column (headed ‘Section Content’), you can delete this introduction and the middle column (writing is in blue) leaving you with you policy. Some organisations may prefer a different format (e.g. non tabular), in which case, the content can be cut and pasted as required. The final policy will usually be approximately 3 sided of A4 in length. Name of organisation: Introduction This section sets out the way in which any grievances by employees against the organisation will be handled. Grievances which are raised by employees typically refer to matters relating to employment e.g. terms and conditions, job issues, work relationships. They are matters which it is reasonable to expect line management to be able to resolve. Creative Envelope Solutions recognises that from time to time employees may wish to seek for grievances relating to their employment. In this respect it is our policy to encourage free communication between employees and Clayton Down M.D. to ensure that problems can be resolved quickly to the satisfaction of all concerned. Principles (optional) Grievance Procedures must comply with the Arbitration and Conciliation Service (ACAS) Code of Practice 2009 and must follow the basic steps outlined below: Informal discussions Formal discussions Appeal Principles are guidelines on best practice for dealing with grievances. Publication of these guidelines is optional for this written procedure but even if you do not publish these principles, they must represent the way in which grievances are handled in order to comply with the ACAS Code. For point 5, there are three options for the person who would chair any appeal meeting. You may prefer to either select one of the following of keep options open and insert all three options: A manager more senior than the manager who took the decision at step 2 A trustee A suitable qualified external person Note: Where a second level of manager could be available to hear an appeal, Trustees should decide whether or not they wish to appoint one of their members to take all appeals as final arbiters of any dispute. This procedure sets out the informal and formal stages which must be followed to comply with the Arbitration and Conciliation Advisory Service (ACAS) Code of Practice 2009. In addition, the following principles will be followed in the consideration of all grievances under this procedure. 1. Each step must be followed through without unreasonable delay. 2. Both employee and employer must take reasonable steps to attend each meeting under the procedure and will have the opportunity to state their case. 3. Meeting will be at a reasonable time and location. 4. All relevant information will be provided to both employer and employee in advance of any meeting under the procedure. 5. The appeal meeting at step 3 will be chaired by Clayton Down M.D. 6. If the employee of their companion is disabled, reasonable adjustment will be made to enable them to participate fully. 7. Confidentiality will be maintained. Only those who need to know about grievance will be informed. 8. After the grievance and regardless of the outcome both parties will endeavour to work together in a  positive manner. Representation It is necessary for the statement in this section to be published as part of the procedure as it relates to the employee’s right to be represented or accompanied. It is wise to specify and limit who can accompany (if not, parents, solicitors etc could get involved at this stage). Even if your organisation does not recognise Trade Unions, employees may still belong to one and therefore it is wise to leave in the reference to being accompanied by a trade union representative. The employee has the right to be accompanied by a work colleague or trade union representative at the meetings at step 2 and step 3. This representative may take notes and seek clarification of any issues that arise. Informal Discussions This section encourages an informal approach to resolving grievances when they first occur. If you have a grievance about your employment you should speak to Clayton Down M.D. about it and discuss it informally to see if it can be resolved there and then. It is hoped that the majority of concerns will be resolved in this way. Formal Procedure This section describes what the employee and the organisation must do to complete formal consideration of the grievance. Steps 2 and 3 refer to response within a specific timescale and 5 working days is recommended. Option of who Step 3 – Appeal: see point 5 in Principles above. If the grievance is not settles through this internal process, organisations may request help and advice from ACAS regarding the use of mediation. Step 1 – Written statement by employee If you feel that the matter has not been resolved through informal discussions, you should set out your grievance in full in writing to your manager so that its consideration takes place in a more formal setting. Step 2 – Meeting Your STET will arrange to meet with you to endeavour to find a satisfactory solution and will aim to give you a written response within (insert timescale). If this is not possible, he or she will inform you of the reason for the delay and when you can expect a response. Step 3 – Appeal If you are not satisfied with the response you may put your grievance in writing to (insert title). That individual will arrange to meet with you and will give you a response within (insert timescale). If it is not possible, he or she will inform you of the reason for the delay and when you can expect a response. Step 3 is the final stage of the procedure and there is no further right of appeal. ACAS recommends organisations to consider using mediation if appropriate. Footnote: As recommended in the ACAS Code, where and employee raises a grievance during a disciplinary process, the disciplinary process may be temporarily suspended in order to deal with the grievance. However, where the disciplinary and grievance cases are related, it may be appropriate to deal with both cases concurrently.

Thursday, August 29, 2019

The Beautiful Country of Tanzania

The United Republic of Tanzania is located in Southeast Africa. The country includes the islands of Zanzibar and Pemba. Tanzania is a beautiful country with lovely beaches, mountains, national parks, and people. This is also the country where you can find Tanzanite, a dazzling blue stone that is astonishing everyone in the world one at a time. Arabs from Oman, who settled in Zanzibar in the 7th century A. D, first founded Tanzania. In the beginning of the 19th century, British and German explorers visited the mainland of Tanzania. The British then took over the country. After World War 1 was over, British rule came to and, but they were not given back their independence. After World War 2, they finally were granted independence and complete freedom from Britain. In 1954, Julius K. Nyerere made the Tanganyika National Union, which became the dominate political party. 1964, Neyerere proposed that Tanganyika and Zanzibar should merge into a single republic within the British Commonwealth. In 1964, the union changed their name to Tanzania, which we now know it as today. But within this, what it seems like, perfect country, there is an extreme issue that is causing problems with energy consumption, Biomass. Biomass is a renewable resource that can be cultivated by man, or grow wild. It is natures â€Å"store house† of solar energy and chemical resources. Ninety-two percent of energy used up in Tanzania comes from Biomass. Because of the lack of market mechanisms in the rural areas, and the result of imbalances in supply and demand, people are forced to use up all Biomass resources. This problem is especially growing in some urban areas, and if demand is met from natural forests in the peri-urban areas, a serious local deforestation may result. Also at the same time, open brush fires and wood clearing for non-energy needs are by far responsible for deforestation in the country. Forests are cleared for reasons which people think are good, but when they do this, it is really hurting them. When they ruin the forests for reasons such as agriculture, shelter, firewood, and many other reasons, people are forced to use other Biomass resources such as animal waste in rural households because the increasing depletion of wood. This can not go on forever and someone must find a solution to this. To enhance the Biomass resource, there is a need for â€Å"a holistic supply management approach which recognizes the competing uses of land†, which was said by a household energy speaker. Tanzania is presently trying to ensure enough supply and efficient use of energy throughout the country. This is known as â€Å"The Energy Policy of Tanzania†. The policies goal is to reconcile the need to ensure continuity and security of energy supply on one hand and the need to reduce the burden on the economy of energy imports on the other. This will include an approach that recognizes the competing uses of land. The main strategy would be to enhance the management of the existing resource base, and combine the growing of multi-purpose trees with other agricultural activities. This should show that fuelwood is just one of the many products that come out of the agricultural system. The policy also calls for the development of more appropriate land management practices and betters woodfuel technologies. Other goals are to get rid of hydroelectric sources, develop and use natural gas resources, and step up petroleum exploration activities. The people of Tanzania are going to be doing everything possible to improve the use of energy. If the situation there does not change, bad things are going to happen. Homes in Tanzania take in more energy then some businesses. If this does not change, pretty soon there will barely be enough energy for lights to work. After energy is consumed properly, life will be a lot easier for people to in Tanzania to live.

Wednesday, August 28, 2019

The distinction between ethics and the law in the context of Gary's Assignment

The distinction between ethics and the law in the context of Gary's business situation - Assignment Example With ethics, there is need for a good relationship with customer whether you are giving them what they need or you are short of what they need. With ethics, arrogance is not in the picture. With the law, it is necessary for your employees to give you value for your money but with ethics, offering service to you is on consensus where you both benefit from. Ordering them to work extra hours at the regular rate with no complain is a form of dictatorship baring in mind that they have responsibilities they have to meet especially for the single moms. There should be a point of negotiation where one airs their likes and dislikes for a peaceful coexistence between the owner of the business and the employees. Though the business has flourished, it is important for ethics to be upheld for the business to continue growing. This is because with such an attitude, Gary risks incurring losses due to hiring cost. People want to work where they are accepted and respected. Adopting a different view and different behavior will not only save him money, but will create an atmosphere conducive for his employees, customers and

Tuesday, August 27, 2019

Analysis of Financial Article Essay Example | Topics and Well Written Essays - 1000 words

Analysis of Financial Article - Essay Example The author believes that in all cases, fractal structures and non-periodic cycles were found, which accordingly suggests and provides evidence that capital markets have a non-linear system, which thus makes the EMH doubtful. The author begins the article by asserting that logarithms will be applied to analyze data instead of percentages as logarithms can calculate cumulative returns and percentages cannot. Thus, the steps to analyzing R/S for capital markets include first converting prices into logarithms and then applying the suggested equations. Then each capital market instrument and data is analyzed turn by turn to gauge volatility, cycles, and price changes. The author uses Hurst statistics to analyze various capital market instruments and implies at the end of the article that prices are reflections of investors’ concept of ‘fair value†. While some may believe this to be a single value, this can actually be a range of values which is based on information such as the earnings from an investment, the management system, the new products offered, and the economic environment in that area. After fundamental analysis and technical analysis of what other investors believe their counterparts are willing to pay, the price is automatically adjusted to what is perceived as fair price and thus other investors become attracted to the investment and begin to purchase it. A Hurst statistic of more than 0.5 suggests that new information and previous events may affect the future prices of securities while one, which is lower than 0.5 implies the opposite. The author claims that the capital markets have a fractal nature and thus models such as the CAPM, APT, and Black-Scholes model fail. It is mainly due to their simple assumptions and their lack of acknowledging the importance of time when making vital decisions. Hence, the author believes that fractal analysis is a better measure of the reality of capital markets and the outcomes of human decision maki ng. Fractal analysis is a reflection of the reality of life and how messy and complicated results can be. Thus, while it makes mathematics more difficult, it also explains the qualitative aspects of decision making and capital markets. It also gives capital markets a number of air values, cycles, trends, and recognizes the fact that there are innumerous possibilities. Thus, in the author’s point of view, fractal analysis is a better measure of the capital markets rather than the simple models as it accounts for a number of things, which are not accounted for in simple analysis. Hence, even though it is more complicated, the author encourages its use. The important points in the article are as follows: Logarithm returns are a better measure than percentages when calculating changes in price The author suggests that enough data is collected when the natural period of the system is visible and several cycles are available for analysis The first regression analysis is applied to the S&P 500 from 1950 to July 1958 The high value of H suggests the fractal position of the market The stock market results are not in accordance with the efficient market hypothesis The author suggests that market returns are persistent and have a fractal probability distribution The system is non-periodic and reinforces trends According to CAPM, a higher beta stock value is riskier than a lower beta stock value This is due to higher volatility The author suggests that high H values pose less risk and low H values may pose more risk High H values have less noise in the data while lower H values have more noise High H values may change abruptly Portfolio diversification reduces risk Market efficiency can be determined by the level of noise in the

Rhetorical Problem Solving Case Study Example | Topics and Well Written Essays - 500 words

Rhetorical Problem Solving - Case Study Example Additionally, for last quarter the sales dropped by 5%, when he goes for lunch he sometimes fails to report back to work and for the last one month Mason has been absent for seven days. Mason has reached his retirement years at sixty-two, but he has refused to retire voluntarily. He looks forward to retiring after three more years of work when he will be sixty-five years. However, Doakes has pointed out that Mason has been diligent on his duties all along until recently. His public relations have also been excellent before. Mason has been grooming Doakes to take his place when he retires, and this also explains the reason the recommendation job had to be given to me. My solution to this problem is to make Doakes assume Mason’s responsibilities, leave Mason’s salary as it is today and raise Doakes’ salary. One of the quickest solutions to this problem would be to retire him against his wishes, but this would be unfair to Mason because he has been of great service to the company for the last twenty-five years. His experience and loyalty for all those years is enough reason to keep him for extra three years. It is worthwhile noting that corporate social responsibility starts from the internal practice. Dealing with employees harshly or ignoring the feelings of the community hits companies very hard down the line. It is necessary that the company maintains good relationship with its workers, make the long-time serving workers feel valued as part of the company. While not every employee’s wishes will be respected in terms of extending their terms, Mason’s case is a special one and it has to be dealt with every caution possible with the fact that he has been very instrumental to the company for years. Am interested in knowing reason for Mason’s stay in the business for three extra years. It could be that he needs the salary, or he needs to complete a project he began. For either reason, it is for the best interest of the

Monday, August 26, 2019

Lean Production System Research Paper Example | Topics and Well Written Essays - 750 words

Lean Production System - Research Paper Example According to Pascal (2007) this production system has elevated many manufacturing companies over the years and it still has great significance in today’s corporate environment. Generally, this production system involves making a company efficient in terms of production and sleek provision of services to its consumers. The main reason as to why companies apply this system in their operation is to beat the stiff completion in the market and gain a greater competitive advantage. From a lean production system an organization is able to minimize the surplus and waste produced in an organization (Pascal, 2007). According to Wormack & Jones (2003) waste elimination was the first objective in the invention of both the Toyota Production System and the Lean Production System. The lean production system is governed by certain principles of which are aimed at reducing the production of waste in an organization. The principles include: Leveled production Pull system Continuous flow process ing 3Ms (Muda, Muri, Mura) Talk time Flexible workforce The 5Ss (sorting, sweeping, sifting, sustenance and spick and span). In leveled production the system aims at improving the company’s production on a single line of production. In this case an organization is made to produce more models of the same production. This is usually aimed at increasing the level in which the consumer’s needs and demands are catered for. To make it more efficient, different models of production are analyzed by determining the ratio of their demand (Pascal, 2007). From the ratios, the production then begins with a consideration of the demand level each model has. This reduces both shortage and waste of the produced goods. The pull system is like a backward movement of production where the consumers trigger the process. Without the demand of the consumer then there will be no production. For instance, a visit to McDonald in need of a burger, there is usually no burger ready yet until you or der. After you order the restaurant then begin the production of the burger. Generally, the system first considers demand before commencing with the production (Wormack & Jones, 2003). After the implementation of the pull system it is mandatory to have a continuous flow of processes. After demands from consumers, it is only logical if an organization can provide a smooth follow up with the process of production (Temple & Hunter, 2003). For this to be achievable every step in the production process should be well managed and formulated. The three Ms are word from the Japanese dictionary. Muda means non-valued added, mura means overburden and muri means unevenness. The three Ms are problems which hinder the effective application of the just in time production (Pascal, 2007). From the three Ms an organization has a clear picture on what to improve. Talk time refers to the time specified to complete a set of tasks. The talk time is usually governed by the consumer’s demand (Templ e & Hunter, 2003). For instance, if the time specified for the assembly of cars per day is 500 minutes and there are 100 cars to be assembled, the time taken to assemble one car should be five minutes. A flexible workforce is a staff that can be able to do any required operation at any given time. From a flexible workforce an organization makes it efficient to have the just in time production and have a well managed talk time. One company that has successfully implemented the Lean Production System is the Toyota

Sunday, August 25, 2019

Case discussion Study Example | Topics and Well Written Essays - 750 words

Discussion - Case Study Example According to Susan, John had bypassed her and several other women in previous promotion exercises. As the Vice President, Kyle had the responsibility of ensuring that the stalemate was resolved amicably. Since the stalemate was a multi-faceted affair, there was a need to encourage dialogue to ensure that any decisions arrived at were amicable and acceptable among all persons involved. However, despite having the responsibility to ensure an amicable resolution of the dispute was obtained, it was also Kyle’s responsibility to ensure that employees respected authority. In this regard, it would be Kyle’s responsibility to insist that John’s instructions ought to have been followed since he had the power to make the decisions that he had already made. It would be appropriate if Kyle were to reverse John’s decisions because some employees were unhappy with them, and especially because any decision that would be made would affect Westco directly. The existing organizational culture at Westco could also have contributed to the stalemate. Westo had an ‘open door’ policy, and Kyle, being the Vice President, had promised to take employee concerns seriously. These two aspects contributed significantly to the employees’ notion that they were entitled to disagree openly with John’s decisions. On the other hand, the organizational structure indicated that in the seniority order, Adam was more senior in the company as compared to Oscar. Similarly, Bob and Susan were at the same level. John had complete discretion to promote any of these employees. This is because he had the responsibility to promote and protect the company’s interests. Additionally, the employees’ rankings were not too far apart as to cause any significant protocol problems. The best employee to promote would have been the employee who, in John’s opinion, was most suitable to perform the job regardless of any other considerations. As a result,

Saturday, August 24, 2019

Who is responsible for an airline crash Should familes be compensated Research Paper

Who is responsible for an airline crash Should familes be compensated - Research Paper Example Air Crash Litigation. The Liability Environment in which the NTSB Operates. Web. Rand.org. Web. 01 April. 2014. . Annotation: The complexity of compensating victims has challenged legal practitioner and airline manufacturers as well as airline owners. This has resulted to the establishment of an independent body; the NTSB to investigate the causes of air plane crashes to ensure that there is fairness in arbitration and litigation of whom should compensate survivors and victim families. The NTSB is an important body because it carries out investigation into the causes of airline accident so as to lay claims on the right party. Response: The article ensures help us understand the parties involved in the process of litigation and also ensures that all parties understands their role in circumstances of an air crash. This helps prevent lawyers and insurance companies to swindle out or take advantage of the ignorance or lack of knowledge regarding compensations. Allen, Peter. Revealed: Pilot of Air France jet that crashed in Atlantic Ocean killing 228 people had just ONE HOUR sleep before the flight. Web. Dailymail.co.uk. 15 Mar. 2013. Web. 02 April. 2014. . Annotation: Allen reported that the Air France jet crashed in the Atlantic Ocean after the Pilot left the co-pilot to take charge of the Plane. The pilot had excused himself because he had had only an hour of sleep before taking the flight. This demonstrates the high level of negligence that is exposed to innocent lives while travelling to and from their destinations. The article helps us understand one of the causes of plane crash. Pilot negligence and mistakes has claimed the life of many passengers and this is

Friday, August 23, 2019

Fashion - customer service can help in build the loyalty of a brand Essay

Fashion - customer service can help in build the loyalty of a brand - Essay Example The paper "fashion - customer service can help in build the loyalty of a brand" talks about how the customer service can help in build the loyalty of a brand. The luxury fashion retailing sector of Hong Kong is exceptionally well developed hence one of the fashion capitals of Asia. The fast growing expenditure from Chinese tourists has turned Hong Kong into a regional distribution hub for popular designer brands around the world, providing a great variety of high-end fashion brands and luxurious products in the market. With the Chinese tourists continuing to pour in, the product demand is high. Many high-end retailers try to provide extra services to retain their customers. Top brands try to find ways to capitalize on the buying interest of their customers and provide quality customer service due to the limited space. Besides globalization, many prestigious retailers are turning their focus to generating a greater profit from their existing customer base by developing brand loyalty. Such ideas are also backed by a number of researchers. Homburg, Koschate & Hoyer (2005) stated that brands were benefited from brand-loyal customers due to repeated patronage and their tendency to pay premium prices for additional services. The findings of Graner and Sterling (2003) further strengthened the incentive for retailers to develop brand loyalty as they found that retaining 5% more customers would boost profits by 25% to 125%. Quality customer services provided by the business are essential.

Thursday, August 22, 2019

Why Marijuana Should Remain Illegal Essay Example for Free

Why Marijuana Should Remain Illegal Essay Specific Purpose:To teach my audience how to drive a stick shift car. Thesis Statement:By learning how to start a stick shift car, changing from first to fifth gear and reverse you would someday like to buy a stick shift car. Organizational Pattern:Chronological Introduction: Did you know that by knowing how to drive a Stick shift car you can save money on the initial price, maintenance, and fuel economy? How many of you guys could use an extra couple thousand. I am going to teach you how to drive a stick shift car and to do so you will need to know how to properly start the car, change the gears, and how to reverse the car. Body: 1. First, you will need to get in your car adjust your seat, so you can reach all three pedals. A. You will need to put your foot all the way down on the clutch. B. Then put your car in neutral so you can take your foot off the pedal 2. Second, you will need to put your foot on the clutch then put it in first gear with your foot on the clutch A. As you start to ease your foot off the pedal you need to start stepping on the gas your two feet must past each other at same time. B. Then you will completely take your foot off the clutch as you start to step on the gas you will no longer need your foot on the clutch. The process will repeat 3. Third, you will need to be at a full stop then you will need to put your car in neutral, A. Step on the clutch then push down on the knob till you feel a little nudge B. Then you will change the gear as you would do with your first gear C. You will need start to ease off clutch then step on gas pedal D. Finally you will need to come to a complete stop put your car in neutral and turn your car off. Step on the clutch then put your car in first gear and pull the hand break. Conclusion: Now that you all know how to start a stick shift car, change the gears and put it in reverse. Hope you guys can enjoy driving a stick shift car and also the benefits you get when you buy a stick shift car.

Wednesday, August 21, 2019

Putting India to Work Legally Essay Example for Free

Putting India to Work Legally Essay In order to remain India’s largest employer, they had to keep up with the explosive growth and competition in the telecommunications, financial services, and retail sectors. 2. ) Going forward, TeamLease has faced a few challenges along the road. First, TeamLease decided to move from a decentralized to a centralized structure for operations, causing fear and resistance from clients who were afraid of the loss of personalized services and fear from TeamLease employees who disliked the idea of relocating. TeamLease also had a difficult time filling open positions. Many people were registered with the government-run employment exchanges and many of these people were not fully qualified for the job. TeamLease also tried to partner with training companies but there was no training company that would accept their concept of paying for their services only after their trainee has been placed with a job. They also took a big hit during the 2009 recession causing the open job market to drop dramatically and as well as a decrease in client support. . ) The competitors that worry me the most are Addeco and Randstad. Addeco seems to be the largest HR staffing service company followed by Randstad. Addeco is a major threat with over 33,000 employees and 5,500 branches, in over 60 countries. Randstad has 28,700 employees, 3,500 branches, in over 40 countries. TeamLease on the other hand has 75,000 employees in 600 branches. TeamLease may have more employees, but Randstad and Adecco seems to have more qualified employees and are more spread out worldwide. TeamLeast has the least amount of branches among its top competitors.I believe that TeamLease should put more money into staffing and training in order to have more suitable and a more experienced staff in order to maintain competitive advantage. They should also try to increase or spread out more of their branches to other countries. TeamLease should also put more effort into marketing and their advertising campaign. Last, they should consider offering employee incentives such as days off or bonuses’.

Tuesday, August 20, 2019

What Is Empirical Knowledge Philosophy Essay

What Is Empirical Knowledge Philosophy Essay Posteriori knowledge, or empirical knowledge is propositional knowledge obtained by experience or sensorial information. Posteriori knowledge is a contrast to priori knowledge, which is knowledge that is gained through the apprehension of innate ideas, intuition or pure reason. Debate has focused on analyzing the nature of knowledge and how it relates to similar notions such as truth, belief, and justification. It also deals with the means of production of knowledge, as well as skepticism about different knowledge claims. The traditional analysis of empirical knowledge states that you know that P if and only if you have empirically justified true belief that P.  [1]   You dont know why or have any idea of why reaction A follows situation B but you have seen it happen so many times that you know that is what is going to happen. I know how to drive a car in so far as I know that I use the accelerator to go and brake to stop and use the steering wheel to manoeuvre. I can get from A to B. In that respect I know how it functions in practice, but have little knowledge how cars actually work. Is it important to have knowledge of how things work? A person who knows how a car works doesnt automatically know how to drive or may not be a better driver because of his particular knowledge. Many people and animals live quite a happy existence oblivious to knowledge or complicated thought process. I have gained knowledge over the last eighteen years without knowing about empirical knowledge. The notion of innate ideas proposes that certain knowledge is present from birth. Empiricists would not want to deny that all bachelors are unmarried is a truth independent of experience, however they would deny that such a truth could be innate. For empiricists, the mind is a blank slate, Tabula Rasa. They believe that when we learn or experience things, it is as if the mind is being written on. Rationalists believe that the mind is similar to a computer, in which the hardware already has some functions, innate ideas, before the software, specific knowledge is loaded onto it. John Locke believed that our experiences provided us with what he termed simple and complex ideas. A fine example of a simple idea may include the redness of a rose. We thereafter use these ideas in order to understand the world. An example Locke gives, is If someone burnt their hand on a flame but also on a extremely cold piece of ice, then one would form the conclusion that it is not heat that is responsible for the burns, but the difference in temperature. Thus, Locke thinks that the simple sensations and experiences for the basis for more abstract ideas. Locke believed that knowledge could be of certain types depending on how ideas could be compared. Locke considered that the idea of black could be contrasted with that of white; and other ideas which share a common source, such as light and fire, which often go together. These ways of building up information, Locke thought are the main means by which we turn simple ideas into complex ones. Locke considered that there are three main types of knowledge. Intuitive, Demonstrative and Sensitive. Intuitive knowledge, black is not white is the most certain form of knowledge because it is the most difficult to doubt, and Locke argues that they are so obvious that we except them intuitively, as a priori. Demonstrative knowledge is when we begin to put simple ideas together and form complex ones, demonstrating something. Comparing the heat of the sun to the heat of a fire, one would be able to demonstrate that they are both made of similar substances. Locke argues that this form of knowledge i s posteriori. Sensitive knowledge, Locke argues, is the most uncertain because it relies merely on the evidence of senses. If I look to see how many chairs there are in another room, I am relying on sensitive knowledge, which although considered a posteriori, can easily be mistaken Rationalists argue by asking the question, that if one was to reject the idea that all of our knowledge comes from rational principles, how could we tell which of our perceptions are real or true? Lockes answer to this lies in the existence of primary and secondary qualities that an object has. Applying this theory to a table, Locke considers the tables primary qualities to be its size and shape, whereas the tables secondary qualities are produced by powers in the object itself, which act on our senses to produce sensations and impressions. The colour, taste, and temperature of the table are all examples of a tables secondary qualities. George Berkeley pointed out that if all we ever see are primary or secondary qualities, how do we know that substance really exists? Berkley believed that there may be no such thing are matter, a view called Idealism. Berkley thought that Locke and other philosophers had potentially opened the door to atheism and scepticism by this view of knowledge. Berkley attempted to show that rather than sensations of objects arising from powers in the object itself, the experiences were actually in the perceiver. Berkley argues that the object does not need to possess any powers with which it produces effects on our senses, because the object does not exist apart from our perception of it. Berkley adopts the sceptical argument that we do not see objects as they really are. Berkleys main argument was intended to show that it is possible for something to exist without being perceived. Berkley argues that it we cannot imagine what the perception of something must be like, we cannot really say that it exists. Berkley uses the idea to attack the notion of substance or matter, for if all the qualities that we ascribe to it are either primary or secondary qualities, can we actually say that the substance itself exists? David Hume disagreed with such philosophers as Descartes that the mind contained innate ideas. He also disagreed with the idea that we could be certain about anything outside our experience or the true nature of the world. Hume divided knowledge into what he termed relations of ideas and matters of fact. Relations of ideas are analytic truths or priori statements that we cannot conceive of being otherwise, such as the statement 2 + 2 = 4 and All bachelors are unmarried. Matters of fact, however can be falsified. The statement The sun will rise tomorrow is extremely likely, however it is not impossible that it will not. considered the answer to this is to suggest the existence of what he calls primary and secondary qualities. Hume argues that all our knowledge of cause and effect came through habit. So, for instance, if we see the Sun rise it is not because it corresponds to some eternal and unchangeable law, but because we have seen it rise countless times what he terms, constant conjunction. Therefore, the more we have experienced things, the more certain they will be. Theoretical and practical knowledge and understanding and experience are different types of knowledge. I think there is an important distinction between knowing that and knowing how. People knew that things fell down long before they knew why or there was an explanation of gravitation. Such knowledge was empirical. Most assumed knowledge or studies of things are known as theories. Peoples ideas or take on things. Theory of evolution. Theory of relativity. Over time opinions are developed, they can be tested and become theories. Some theories become more certain and may become factual, but some remain doubtful or perceptions can alter, new light comes to ground that changes ones knowledge. Once it was thought that the earth was flat, and people could fall of the edge. Edmund Gettier called into question the theory of knowledge and the traditional definition of knowledge. Gettiers argument is that there are situations in which ones belief may be justified and true, yet fail to count as knowledge. He contended that while justified belief in a true proposition is necessary for that proposition to be known, it is not sufficient. According to Gettier, there are certain circumstances in which one does not have knowledge, even when all of the above conditions are met. Gettier proposed two thought experiments, which have come to be known as Gettier cases, as counter examples to the classical account of knowledge. He argued it is possible to arrive at an assumption based on belief which is deemed justified, but happens to be true only by chance, because the outcome was predicted for the wrong reason and so cant be classed to be knowledge. Responses to Gettier have been varied. Usually, they have involved substantive attempts to provide a definition of knowledge different from the classical one, either by redefining knowledge as justified true belief with some additional fourth condition, or as something else altogether. We are left a legacy of knowledge from those who have lived before us and thus accumulated knowledge over thousands of years. It would be impossible for any individual to experience all this knowledge first hand. I have learned that there is a difference between knowing that (facts and information) and knowing how (the ability to do something), because it is one thing to know what empirical knowledge is, but another to have the ability to convey this in an essay, to show this knowledge. In conclusion from continued observation things should become obvious. For things to become factual I guess they should be observed by several people and the same conclusion be deducted. Should one believe or trust other peoples conclusion of events? Or is it necessary to observe and test theories oneself in order to form ones own conclusions and gain knowledge. Im not really sure there is one conclusion to be made. It is possible to judge some things for ourselves but not all things because we dont have the means, time or inclination it would take forever, or longer ad infinitum. But is there such a thing as infinity anyway? One thing is certain I will never find out.

For Whom The Bell Tolls :: essays research papers

The Disillusionment of Hemingway with War Hemingway uses certain repetitive themes and ideas in his book, For Whom the Bell Tolls, which relate to the grander dogma that he is trying to teach. By using these reoccurring ideas, he is able to make clear his views on certain issues and make the reader understand his thoughts. The most notable of this reoccurring theme is that of war. Hemingway uses the war concept as paradoxical irony in this book, to tell the reader what the thinks about war. It is even more interesting to note that rather than this theme being derived from this war theme, the book is derived from this main theme.   Ã‚  Ã‚  Ã‚  Ã‚  Hemingway emphasized the fallacy of war by discussing how there are no real winners in war, that war is equal. What goes around comes around. That whereas one man may kill another, another man will come to kill the first man and so on, in a never-ending cycle of stupidity and futility. The setting of this book can be analyzed here; the Spanish Civil War in the 1920-30 time period is the setting for the book, on the battlefields in the Spanish countryside. The whole fascist/communist aspect is brought up since both sides are against one another. Here again, Hemingway doesn’t idealize either side, not referring to their political beliefs but to the fact that each side is very much the same. Both sides consist of sad, depressed fools who have been shipped off to war, content to live in peace and harmony with each other. It is here that Hemingway’s first satirical punch at war comes in, when he makes it clear that both sides are human, with no clear line separating the saints from the sinners.   Ã‚  Ã‚  Ã‚  Ã‚  Another thing that is connected to the war concept is that both sides are hopelessly disillusioned. A victory for any army is not truly a victory if it involves the loss of human life, and Hemingway seems to imply this as he pokes fun at the ongoings of the war. Atrocities are committed by otherwise compassionate, peaceful people since they are forced to do so by their respective sides. The author also satirizes the â€Å"illusion† that people have of war being glorious, heroic, etc., saying that even a victory is a defeat since so many lie dead in an effort to get that victory. He says that war is not all that, that war is in fact legalized murder, that has no place in human life.

Monday, August 19, 2019

Essay --

It may seem that the male characters in classical cinema are given power and control over female characters, but the relationships between characters in Billy Wilder’s 1944 noir Double Indemnity and Michael Curtiz’s 1945 drama Mildred Pierce are complex and do not conform to specific gender roles. Rather, both of these films feature female characters that are both controllers and the controlled. The characters Mildred Pierce and Phyllis Dietrichson hold both of these roles in their respective films but are inverses of each other: Mildred acts strongly and independently but is actually controlled emotionally and financially by others, while Phyllis is presented as submissive but is the grand manipulator. As such, these two films present different images of the â€Å"independent woman,† both of which are destined for failure. On the surface, it seems like Mildred Pierce undergoes a positive transformation and develops into an independent woman. At the beginning of Mildred’s first narrated flashback, she describes her life as little more than â€Å"cooking and washing and having children.† She works as a housewife. Her attire and environment reflect this: her first interaction in the flashback is with her husband in the kitchen with an apron on. Bert’s departure pressures Mildred to enter to workforce to support her family and their wants. Her wardrobe changes to represent this change, also, since she is usually seen in working clothes. She builds the motivation to start her own restaurant and eventually starts her own successful restaurant chain, and once again, her physical appearance changes in that she is dressed in fancy clothes. Once she understands that her marriage with Bert would hurt her financially, she actively seeks a divorce fr... ...nity and Mildred Pierce have two models of the â€Å"independent woman,† but both of them fail in the end. Mildred’s love interest dies and her daughter is sent to prison. Phyllis is murdered by Walter. It would seem that the messages of these films are represented by the failures of these women. Mildred could not escape her maternal instinct as it ruined her life. Phyllis treated people like tools and met a fatal end. â€Å"Independence from men,† then, is not the final goal for these women on the road to happiness. These films represent this trait as shallow, since not only do these failures arise, but Mildred and Phyllis never truly escape the â€Å"male gaze.† The notions of independence presented in these two films lead to disaster because they are incomplete; â€Å"independence from men† is a necessary step, but there is still more that the women in the films need to accomplish.

Sunday, August 18, 2019

John Lockes Second Treatise on Civil Government Essays -- Second Treat

Locke's Second Treatise of Government, by far, is his most influential and important piece of writing. In it he set forth his theory of natural law and natural right. He shows that there does exist a rational purpose to government, and one need not rely on "mysticism and mystery." Against anarchy, Locke saw his job as one who must defend government as an institution. Locke's object was to insist not only that the public welfare was the test of good government and the basis for properly imposing obligations on the citizens of a country, but also that the public welfare made government necessary. Locke believed that the mind is blank upon birth. As a person grows and develops, so does their mind. He urged individuals to formulate theories and to test them through experiments. The fundamental claim is that human knowledge begins with sense experience and primarily is derived from it. Locke begins his philosophical examination of knowledge by trying to disprove the claim that some of our knowledge is original, in the sense that it comes from ideas which are innate or inborn. Locke's attempted refutation depends on a questionable assumption: if an individual has an idea, then that individual would understand it and assent to its content. Also, Locke believed in religious freedom and the separation of church and state. He thought that God established divine law. This could be discovered by reasoning, and to disobey it was morally wrong. He also held the opinion that no one should dictate the form of another's religion. But Locke points out that there is widespread disagreement over the concept of God. Furthermore, it does not seem to be present at all in small children. We form ideas as the endpoint of the action of physical bodies on our own bodies. Locke points out that sometimes he uses 'idea' to refer to the end product, what exists in the mind, and sometimes he uses it to refer to the quality in the body which causes the idea. The ideas of sense are the first ideas we have. Once the mind begins to be populated with them, it can operate upon them. Locke classified ideas as simple and complex. All complex ideas are said to be made up, ultimately of simple ideas, and their complexity is the work of the mind. A simple idea is "one uncompounded appearance," said Locke. But it should be noted that the relation of simple to complex ideas is not... ...st of the members of the society. The government is given its power to act by the property owning portion of the population, not by the society as a whole. Another point that makes Locke's theory different is that society has the power to overthrow the government. Since a majority created it, they have the power to remove it. Locke stated that society could overthrow the government without returning to the state of nature because the social contract would still be in effect. All that was needed would be for the society to elect another government, by majority rule, to replace the old one. This introduces the idea that government should be accountable to the people. Locke was in favor of a limited government. The importance and autonomy of the individual in society was of very importance to Locke. The extent to which this was true is that people existed as individuals before societies and governments came into being. They each possessed certain rights, and all had the freedom to do as they pleased, unrestrained and with some restrictions placed upon them by God, according to Locke. This freedom of the individual was important, for it was the foundation for modern liberal democracy.

Saturday, August 17, 2019

Fences Research

The Impact of Physical and Psychological Boundaries in August Wilson’s Fences The early 1950’s was a time of enormous importance because of the Civil Rights Movement which emphasized equal rights for blacks and whites. According to the book Approaching Literature, this time period became very familiar to August Wilson, the author of the play Fences. Wilson, an African American man, was raised by his mother and his ex-convict father. For a short period of time, before moving back to his old neighborhood, Wilson lived in a primarily white neighborhood where he experienced the feeling of being on the â€Å"outside. When he was in the ninth grade he had a teacher that believed there was no way he could have written an intelligent, twenty page research paper on Napoleon Bonaparte, so she accused him of plagiarism. This incident pushed Wilson to drop out of high school and teach himself. From that point on, he began educating himself by reading through the section of black a uthors in the local library. Wilson had strong views and opinions about the rights of African Americans.So much so, that he wrote quite a few plays concerning this major part of history. (1024) In Wilson’s play, Fences, how does he use psychological and physical boundaries to show the emotional separations between his characters? Baseball becomes the most prominent image in Wilson’s play. Troy Maxson, the protagonist of the play, spent many years learning and playing this game. Sheri Metzger, the author of An Essay on Fences, believes that â€Å"Baseball defines Troy Maxson’s life and provides the measure of his success. (1) As we already know, in his prime, Troy was a great baseball player and he strongly believed that he was not given the opportunity to play in the major leagues because of the color of his skin. He constantly compared himself to the ball players that made it to the major leagues, such as Hank Aaron, saying â€Å"I can hit forty-three home ru ns right now† (1048) This not only represents the fence that restricts the achievements of blacks and their constant struggle in a white society, but also Troy’s psychological boundaries between himself and mainstream America.On a first analysis of the physical boundary that exists between father and son, Troy and Cory, we must look at their relationship. Their bond was typical of any teenage boy and his father; they generally got along. The boundary comes up in the play when Cory asks Troy to sign the papers that would allow him to go to college on a football scholarship. But when Troy refuses, claiming that â€Å"the colored guy got to be twice as good [as the white player] before he get on the team,† (1047) the boundary becomes very real.He also notes that even if they do let black players on the team, â€Å"They sit on the bench and don’t get used. † (1047) Troy is still so angry over what he sees as his own lost opportunities with baseball and the injustice of it all that he can’t take any pleasure in the fact that his own son is getting a once in a lifetime opportunity to play football in college, for free! He is still stuck in the past where he was refused a chance to play professional baseball. He is bitter because deep down he is afraid that his son will go on to be more successful than he ever was.The scene where Cory comes at his father with a baseball bat illustrates quite a different image of the traditional father-and-son backyard baseball game we see in movies or books. This shows the huge gap in their relationship and Troy’s need for control. According to Gerald Weales, the author of Review of Fences in the Commonweal, â€Å"Troy not signing the papers for Cory was a destructive act that lead to this final confrontation between the two. † (1) Troy feels the need to confine Cory within his authority, but Cory hates being stuck behind the fences his father has put up; so he escapes, leaving h is family behind.Yet, when Cory returns, we find that in his attempt to free himself he has become bound within the confines of a far more strict institution; the Marine Corps. Metzger argues that â€Å"Cory finally escaped his father’s authority, just to be placed under the authority of people far more strict and controlling. † (3) Another physical boundary exists between husband and wife, Troy and Rose. At the beginning of the play, Troy is building a fence for Rose although he sees absolutely no use for it.Because she’s so focused on keeping all the people she loves safe and inside its walls, Rose is completely unaware that the fence is actually pushing her loved ones away. Since spending time in prison, Troy views fences as restrictions or limitations, so he is in no hurry to build Rose’s fence. But as the play goes on we see that after eighteen years of marriage, Troy feels confined by the responsibility and loyalty that come with it and needs to bre ak out of those constraints. He wants so badly to be free from the ties of marriage that he has an affair with another woman, Alberta.Although, in his mind he broke free of those marital boundaries, realistically, he just put up yet another fence. Rose later finds out about this affair and then Troy tells her that Alberta died while giving birth to their daughter, Raynell. Troy, being the thoughtless man he is, begs Rose to take care of his illegitimate daughter. And Rose, being the kind woman she is, agrees to raise the child because she knows that Raynell is an innocent child who was simply born into a bad situation. Rose tells Troy, â€Å"Raynell will have a mother, but he will be a womanless man for the rest of his life. (1071) Later, after Alberta’s death, Troy finally completes the fence. But rather than finishing it for Rose, as originally intended, he does it for his own reasons of keeping out danger and death. Meanwhile, Rose is still trapped with the responsibiliti es and pressures that life brings. But towards the end of the play we see that she escapes Troy’s fence, only to exchange it for one established by the church. According to Metzger, â€Å"Religion provides its own fences and restraints, and for Rose, who decided to stay with Troy, the church offers a haven within its institutionalized walls. (1040) Rose willingly puts herself behind a fence that is a little more bearable, saying, â€Å"Jesus builds a fence around me every day. † (1040) There are also some psychological fences in this play that Troy has absolutely no control over. The mental hospital where Troy confines Gabriel offers one example of that kind of fence. Gabe, who suffered permanent brain damage as a result of injuries he received while serving in World War II, now thinks of himself as an angel. Although Troy views this fence as something that’s irritating and in his way, Gabe, unaware of all of this, continues on in his childlike innocence.Troy h as a guilty conscience because he institutionalized Gabe and then used his disability money to pay for the house that he now lives in. This incident further breaks down the relationship between Troy and Cory because when he finds out what his father has done, Cory treats him with open disrespect and tells him that he no longer counts. Once again, we see that Gabe simply isn’t aware of these things, therefore he’s unaffected by these events that dramatically change the others’ lives. Gabe’s persistence shows hope for the future. According to Joseph H.Wressling, the author of Wilson’s Fences, â€Å"Gabe, just like Rose, illustrates unconditional love. † (3) Now that Cory and Troy’s relationship has no chance of any reconciliation, Cory leaves and Troy loses any hope of ever seeing his son again before he dies. Cory doesn’t return again until the day of his father’s funeral when he finally meets his sister, Raynell. Cory, s till remembering the broken relationship with his father, did not want to attend the funeral. But Rose convinced him to go and pay his respects to his father because he never meant any harm. Troy had always said that he had given his children everything he could.Cory didn’t always agree with his father, but he overcame that and broke down a barrier and finally forgave his father. Before the funeral Troy’s simpleminded brother Gabe, with his trumpet, came to blow open the gates of Heaven for Troy’s arrival. His attempts at blowing his trumpet failed because there was no mouthpiece on it. But Gabe, in his childlike innocence improvises. He begins to dance about and sing to the Heavens for his brother. Finished with his dance and satisfied that the gates of Heaven are open and ready for Troy, Gabe says, â€Å"That’s the way that go! † (1083).Wilson uses many of his characters and their relationships to show their physical and psychological separations between each other and the world. By the end of Fences, all of Wilson’s characters are bound by a fence of some sort. Although Raynell stands behind the fence that her father finally finished, she is expected to go far beyond that boundary and strive for a better future than her father and everyone else. She shows that there is hope for the future. Works Cited 1. Metzger, Sheri. â€Å"An essay on Fences. † Drama for Students. Detroit: Gale. From Literature Resource Center. Web. 9 Nov. 2010. 2. Schakel, Peter J. and Jack Ridl. â€Å"August Wilson's Fences – A Form in Depth. †Ã‚  Approaching Literature: Writing Reading Thinking. Boston: Bedford/St. Martin's, 2008. 1024-083. Print. 3. Weales, Gerald. â€Å"Review of Fences in the Commonweal, Volume CXIV, no. 10, May 22, 1987, pp. 320-21. † Drama for Students. Ed. David M. Galens. Vol. 3. Detroit: Gale, 1998. From Literature Resource Center. Web. 9 Nov. 2010. 4. Wessling, Joseph H. â€Å"Wilsonâ€⠄¢s Fences. † Explicator 57. 2 (Winter 1999): 123-127. Rpt. In Contemporary Literary Criticism. Ed. Jeffrey W. Hunter. Vol. 222. Detroit: Gale, 2006. From Literature Resource Center. Web. 9 Nov. 2010.

Friday, August 16, 2019

Invisible Man Essay

1977- A character’s attempt to recapture or to reject the past is important in many plays, novels, and poems. Choose a literary work in which a character views the past with such feelings as reverence, bitterness, or longing. Show with clear evidence from the work how the character’s view of the past is used to develop a theme in the work. One’s past can be a frightening thing and for some is only a memory to be distanced. For the narrator in Ralph Ellison’s Invisible Man, past serves as a connection to his mistakes, his grandfather, and his racial roots. But when he begins to call New York his home, these are ties he is not certain he wants to keep. At times, he wants to sever and forget all of it as soon as possible. At other times, he longs for the familiarity of his past, whatever it may encompass. Things that might once have piqued his interest now seem nothing but a stereotype. However, one cannot exist in the present without having come from somewhere past and for this reason, his attempts to have less of a past, only further his progress toward invisibility. As an outstanding student at the premier Negro college in the south, the narrator is given the opportunity and the honor of chauffeuring one of the visiting board members around the town for an afternoon. But when he has a badly-timed lapse in judgment and agrees to show Norton the most unsophisticated regions of the town, he is expelled and sent to New York to â€Å"work† and gain funds for tuition, but in reality this is the last he will ever see of the college. However, for the narrator, out of sight doesn’t necessarily mean out of mind as he finds himself often comparing his current life to his days at the college and reflecting upon those fateful hours spent with Norton. Though he once bragged about his â€Å"college education†, he comes to realize it’s insignificance in his city life. The mistake resulting in his expulsion is at first a subject he feels quite bitter towards, but as time progresses, it is one he no longer holds contemptible. When he loses his status as a college student, he gains some degree of mediocrity. It is all too easy to become invisible when you appear to be no different than the crowd surrounding you. This is what happened to the narrator when he rejected his past at the college. When the narrator’s grandfather is on the verge of death, he leaves some ambiguous and haunting last words that confuse and occasionally torment the narrator for the remainder of the book. Though, he does not express this inner-turmoil to anyone, it is always there to serve as unpleasant and disconcerting reminder of what was. At college, and later in New York, he often thinks of these words, or rather commands, trying unsuccessfully to ascertain meaning from them. This mystery is one he never solves and as he comes to know quite well, it is difficult to live with unresolved and incomplete instructions. When he can’t follow through on these instructions meant to be paramount in his life, he finds it easier to be invisible than to live with this discrepancy, this thorn in his side. The narrator’s favorite food is yams. That’s not to say he doesn’t enjoy a bowl-full of grits or a table of fried chicken, but yams are a sweet, syrupy reminder of home for him. When he is in New York and is offered a bowl of grits by a white vendor, he becomes offended, seeing the suggestion as nothing but a racial stereotype. He is not one to be associated with such southern â€Å"black food† and he’ll have everyone know it. When, some months later, a Negro street vendor offers him a hot and delicious yam, he first denies it under the same premise, but walks back when the smell and nostalgia become too powerful, perhaps only accepting because of the skin color of the vendor. But even when the vendor addresses the narrator as â€Å"brother† he becomes offended saying â€Å"I’m no brother of yours.† In an attempt to appear as a civilized black man in the white world, he rejects these mementos of life at home almost instantly. The pressure to impress leads him quickly and ironically on the path toward invisibility. And as he finds, it is pretty easy for a black man to become invisible in white society so long as he stays in line and pretends to agree with them. At the conclusion of the book, we see the narrator living below the city, occupying the sewers, with no one even aware of his existence- or inexistence. Though he once thought himself an outstanding member of the black race, the way his hand of cards has been played in the game of life has resulted in his plunge from superiority. For the narrator, past serves as a connection to his mistakes, his grandfather, and his racial roots. In denying this past, he has denied himself. He has gained true invisibility.

Thursday, August 15, 2019

In what ways can ‘A Streetcar Named Desire’ be seen as a modern tragedy? Essay

The ways in which ‘A Streetcar Named Desire’ by Tennessee Williams can be seen as a modern tragedy, or indeed as any tragedy is a subject of much contention. The answer lies in one’s interpretation of the characters in the context of the genre; the tragedy is made or discarded depending on whether the audience’s sympathy lies with Blanche or Stanley. In order to explore these interpretations one must define the features of modern tragedy as opposed to the ancient Aristotelian definition. The two share some features, such as the violation of the ‘natural order’ of social or personal relationships (i.e. Oedipus’ incestuous relationship with his mother), and the focus on a tragic hero’s fall from status, respect, and in classical tragedies from power and wealth. However, there are also stark differences in modern tragedy where (especially in Williams’ plays) the hero is more likely to be feminine. Although this is not exclusive to modern tragedies – in Sophocles’ ‘Antigone’ the protagonist is female – it is certainly a feature. Social issues are also treated more personally as the epic scale of civil unrest present in most Aristotelian tragedies is discarded in favor of a focus on a single family unit as a microcosm of social behaviour. As a result, the characters themselves become far more complex – a far cry from Aristotle’s theory that characters should merely serve to advance the tragic plot. Broadly speaking then, ‘A Streetcar Named Desire’ certainly fits the prescriptions of a modern tragedy, not least as it contains several complex themes such as alienation, entrapment and the struggle between fantasy and reality. Written in 1947 soon after the Great Depression and a period of prohibition when the borders between social classes were becoming more blurred, these play on the very real threats of alcoholism and social decline. Blanche’s constant drinking becomes a symptom of her alienation from society, which was in turn caused by her estrangement from her late husband, Allen Grey. Stella asserts that Blanche â€Å"didn’t just love him but worshipped the ground he walked on† – a religious phrase that contrasts deeply with her later disgust of Grey’s homosexuality. For Williams, living as he did in the often deeply religious, homophobic south, Allen Grey’s suicide would have constituted a tragedy even when separated from the rest of the play. It certainly illustrates the close links that Williams draws between love, alienation and death; Grey’s separation from Blanche causes his death, which in turn leads to her own isolation. This isolation is further illustrated by the metaphor of light; Blanche constantly insists that the lights be dimmed â€Å"turn that over-light off!†, and even directly likens her love for Allen Grey to a â€Å"blinding light† – it is clear that the darkness is Blanche’s alienation, her punishment for driving him to suicide. Yet light also reveals Blanche’s struggle between fantasy and reality. She cannot bear to see herself in the harsh light of day – even â€Å"screams† during the final scene when Stanley rips the covering off the lamp, completely destroying Blanche’s already splintering fantasy world. This hysterical reaction demonstrates her dependence on the delusions of grandeur and romance that she only half-believes. Blanche is trapped by her own volition; a state echoed in many other of Williams’ tragedies including ‘The Glass Menagerie’, where the character of Amanda is similarly ensnared in a more glamorous past. The play also ascribes to another feature of modern tragedy; the focus on a very small, ordinary family unit as opposed to the monarchs in plays such as ‘Macbeth’ or ‘Hamlet’. It is clear that the clash of Stanley and Blanche is representative of a much bigger division between the old and the new America, and yet their placement in a tiny family setting emphasises their effect on the ‘ordinary American’ – Stella – who is caught in the crossfire of social differences. However merely dealing with these issues, as compelling as they are, only comprises a single aspect of the ways in which ‘A Streetcar Named Desire’ can be seen as a modern tragedy. Indeed, for the play to be called a tragedy at all a defining feature must be covered, and that is the existence of a ‘tragic hero’ whose presence drives the action forward. Therefore, our understanding of ‘A Streetcar Named Desire’ as a modern tragedy must to a large extent rely on whether we can interpret Blanche as Williams’ tragic heroine. She certainly bears a striking surface resemblance to the ancient tragic heroes in her evident fall from high to low, from Belle Reve to the Elysian Fields. This is made evident in her first entrance; her appearance is described as ‘incongruous’ and techniques such as the repetition of â€Å"Stella, oh Stella, Stella!† stress her hysterical inability to cope with her new surroundings. However even this is punctuated in the stage directions with â€Å"feverish vivacity† – suggesting a desperate or false behaviour at odds with the ancient definition of the tragic hero as an essentially noble character. This is emphasised later in the scene by the first suggestion of Blanche’s alcoholism as she â€Å"rushes† to the liquor closet â€Å"panting for breath†, and corroborated as evidence of her sordid affairs at the Hotel Flamingo is revealed. Indeed Blanche herself talks about the â€Å"rattle-trap streetcar† called Desire that â€Å"brought me here†, indicating that her downfall was caused by her own â€Å"brutal desire†. Yet if we do accept that Blanche has already completely fallen into poverty and alcoholism, then the play itself becomes the mere aftermath of a tragedy; the effect of a destroyed character upon her surroundings. Some critics would agree completely with this standpoint – indeed the director of the stage debut, Elia Kazan, portrayed Blanche as a â€Å"phony, corrupt, sick, destructive woman†Ãƒ ¯Ã‚ ¿Ã‚ ½ wrecking Stanley’s home who deserved – indeed needed – to be driven out. However, this view utterly destroys any tragic perception of ‘A Streetcar Named Desire’ by necessitating a total support of Stanley’s actions (â€Å"This makes Stanley right!†)1 – leading to a ‘happy ending’ wherein the Kowalski’s can proceed happily with their lives. While this may have been a suitable presentation for the still largely patriarchal 1940’s, in modern productions a new outlook must be considered. It cannot be ignored that Stanley (however justifiably) incapacitates Blanche both mentally and emotionally as he destroys her refined persona – â€Å"There isn’t a goddam thing but imagination!† – until she is reduced to â€Å"inhuman cries†, constituting Blanche’s fall from sanity as the basis for a tragic fall from high to low, as opposed to any material loss. Although it is true that Blanche is less of a hero possessing a tragic flaw than an anti-hero with a single redeeming feature – in this case her doomed relationship with Allen Grey that has fuelled her desires ever since – practically all of Blanche’s flaws can be explained (if not excused) by her tragic experiences. Her deception of Mitch is the desperation of a woman alone in a patriarchal society whose only chance of security is to attract a husband. Her alcoholism is merely a further coping mechanism, and her constant bathing an attempt to cleanse herself of her sordid affairs. This is consolidated by her wish to be buried â€Å"into an ocean as blue as my first lover’s eyes†, the reference to water again suggesting her desire to be purified and return to the happier days of her youth. Blanche’s tragedy is therefore not merely her fall from status, but her inability to move on from her past. As Dale Carnegie said: â€Å"One of the most tragic things I know about human nature is that all of us tend to put off living. We are all dreaming of some magical rose garden over the horizon, instead of enjoying the roses that are blooming outside our windows today.†2 Yet despite all this evidence providing sympathy with Blanche, Williams seems determined to keep the balance of right and wrong utterly ambiguous. For example in Scene Eight, soon after Blanche’s extremely poignant line â€Å"candles burn out in little boys’ and girls’ eyes† – a clear reference to her past with Grey – she calls Stanley a â€Å"healthy Polack†. This ignorant, racist comment distances Blanche again, and Stanley’s reply â€Å"what I am is a one hundred percent American†, would have immediately re-endeared him to the audience, especially at a time of such social integration. It is this uncertainty as to who we should support – Blanche or Stanley – that really questions the existence of a tragic hero in ‘A Streetcar named Desire’. Even the alternative, as stated by C.W.E. Bigsby, that â€Å"the real hero of the play, therefore, is Stella, for she alone is prepared to offer the necessary comfort†3 is a flawed argument. Although Stella is the most sympathetic character, this is not synonymous with heroic as she is ultimately subdued by Stanley into forcing Blanche away; a far cry from offering her ‘the necessary comfort’. Unlike in Shakespearian tragedies such as ‘Othello’ where the enemy is clearly portrayed, Williams blurs the distinctions between right and wrong until the play more resembles the tragedies of Sophocles, which are essentially concerned with the crisis of right versus right leading to an outcome in which no-one wins. So, although critics such as Joseph Wood Krutch state that â€Å"Tragedy must have a hero if it is not to be merely an accusation against, instead of a justification of the world in which it occurs†4 this is not necessarily true. ‘A Streetcar Named Desire’, along with many other Tennessee Williams’ plays such as ‘The Glass Menagerie’ is tragic not because it details the fall of a hero, but precisely because it contains no hero at all. Modern tragedy is itself an accusation against a grey, mundane world of ordinary people, for whom the only escape is through self-delusion, alcohol, sex or madness. In this respect ‘A Streetcar Named Desire’ becomes the ultimate example of modern tragedy as, after Blanche’s entire existence is shattered, the others merely resume their poker game. The entire play is built around this tragic indifference, both with the detached ending â€Å"This game is seven-card stud† and the very preface, where Williams foreshadows Blanche’s inevitable destruction with the words of Hart Crane, â€Å"And so it was that I entered the broken world.† Bibliography Williams, Tennessee. ‘A Streetcar Named Desire’, Pearson Education Limited 1995 (copyright Estate of the late Tennessee Williams 1947) Bigsby, Christopher W. E. ‘Tennessee Williams: Streetcar to Glory’, Harold Bloom Krutch, Joseph Wood. ‘The Tragic Fallacy’ 1929, in Tragedy: Vision and Form, Ed. Robert W. Corrigan, New York: Harper, 1981 Kazan, Elia. ‘Kazan on Directing’, Knopf Publishing Group, 2009 (copyright Frances Kazan) Carnegie, Dale. ‘How to Stop Worrying and Start Living’, Pocket Books; Revised edition, 1990 Aristotle. ‘Poetics’, Penguin Books Ltd, 1996 1 Kazan, Elia. ‘Kazan on Directing’, Knopf Publishing Group, 2009 (copyright Frances Kazan) 2 Carnegie, Dale. ‘How to Stop Worrying and Start Living’, Pocket Books; Revised edition, 1990 3 Bigsby, Christopher W. E. ‘Tennessee Williams: Streetcar to Glory’, Harold Bloom 4 Krutch, Joseph Wood. ‘The Tragic Fallacy’ 1929 in Tragedy: Vision and Form, Ed. Robert W. Corrigan, New York: Harper, 1981

Computer Networks

– Suresh Khanal Computer Networking Short Questions and Answer www. psexam. com Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: http://www. psexam. com contact: [email  protected] com Computer Networking: Short Questions and Answers Published by PS Exam Kalanki, Kathmandu Nepal www. psexam. com Copyright  ©2009 author.No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise except for personal and non-commercial use without the prior written permission of the author. About the Author Suresh Khanal is a native of Kathmandu, Nepal, where he works as a freelance developer, programmer and technical writer/editor. He has been involved in teaching computers science since 1998 and over the years has written several articles and tutorials on Office Appli cations and Web Programming.Khanal holds a Master's of Science Degree in Information Technology Science. In his spare time, he enjoys travelling, posting in forums and play online games. Table of Contents Transmission Media What is transmission media? What are the types of transmission media? Describe bound transmission media. Describe unbound transmission media. Bound Transmission Media Explain twisted pair cable. Explain Co-axial cable. Explain Fiber-Optics cable. 1 1 1 1 1 1 1 4 5 Match the following types of connectors with the cables to which they are used. Compare BNC with UTP Cables Unbound Transmission Media Explain Radio Wave. What is Microwave? List the Advantages of microwaves. What are the Disadvantages of Microwaves? Describe Infra Red. Computer Network What is a computer network? What are the advantages of Networking? Explain Network Services 8 9 9 10 11 11 11 12 12 12 13 What are the five major network services? What is Network Server? What is a client? What is a dedi cated server? What is workstation? What are dumb terminals? Types of Computer Network What is a LAN? What is MAN? What is WAN? Clarify Enterprise WANs.Clarify Global WANs. What are the two types of LAN? Protocols What is a protocol? What are the three major network protocols? Match the following protocols and their functions LAN Topologies What are the two network connection types? Explain Point-to-Point connection type. Explain multipoint connection. What are the basic LAN topologies? Explain Bus Topology. What are the advantages of bus topology? 13 13 13 14 14 14 15 15 16 16 16 17 17 18 18 18 19 20 20 20 21 21 21 23 What are the disadvantages of bus topology? What is Ring Topology? Point out the major advantages of Ring Topology.Point out the disadvantages of Ring Topology. Explain Star Topology. What are the benefits of Star Topology? What are the disadvantages of Star Topology? What are the popular topologies other than basic Topologies? Network Standards What is a Networking St andard? What are the four major industry standards? What is an Ethernet? How an Ethernet Worked? What is Medium Access Control of Ethernet? Explain Ethernet Frame. List some advantages of Ethernet. What are the disadvantages of Ethernet Cabling? What is ARCNet? List the advantages of ARCNet. What are the disadvantages of ARCNet?How does a Token-Passing Protocol works? 24 24 25 25 25 26 26 27 27 27 27 28 28 29 29 30 30 31 32 32 32 Explain Logical Ring Physical Star topology for Token-Passing Standard. 32 List some most useful advantages of Token Ring. 33 Point out the disadvantages of Token Ring. What do you mean by Beaconing and Auto-Reconfiguration? Network Architecture What is Network Architecture? What are the popular Network Architectures? Explain ISO's OSI Architecture Explain IBM's SNA Architecture Networking Model Explain Peer-to-Peer Networking Model. Explain Client/Server Networking Model.Network and Internet Terminologies NICs Hubs/Repeaters Bridges Router Switches Transce ivers Gateway Proxy Serer Firewall Node Wireless Network Internet WWW 34 34 34 34 35 35 36 37 37 37 38 38 39 39 40 41 42 42 43 43 43 43 45 45 IRC CU-SeeMe Telnet Gopher HTML Browsers Dialup Connection IP Address Domain Name URL Web Browsing or Surfing Search Engine Meta Search Engine Internet Access Extranet Intranet Web Index Hypertext Email Email address Inbox Outbox Trash CC 46 47 48 49 49 50 53 53 54 54 54 55 57 57 58 58 58 59 59 59 60 60 61 61 BCC Reply Forward Attachments Bounced Netiquette Emoticons 62 62 62 62 62 62 62 Table of FiguresFigure 1: UTP Cable 2 Figure 2: UTP Cable Connector 2 Figure 3: STP Cable 3 Figure 4: STP Cable Structure 3 Figure 5: Co-Axial Cable 4 Figure 6: Co-Axial Cable Structure 4 Figure 7: Co-Axial Cable Connectors 5 Figure 8: Fibre Optics Cable Structure 6 Figure 9: Fiber Optics Cable 6 Figure 10: AUI Connector 7 Figure 11: BNC Connector 7 Figure 12: RJ45 Connector 8 Figure 13: SC Connector 8 Figure 14: Comparison between Twisted Pairs and Co-Axial C able 9 Figure 15: Radio Wave Transmission 9 Figure 16: Microwave Transmission 10 Figure 17: Microwave Transmitter, Receiver and Repeater 10 Figure 18: Infrared Device Error!Bookmark not defined. Figure 19: Computer Network 12 Figure 20: Workstation 14 Figure 21: Dumb Terminal 15 Figure 22: Wide Area Network 16 Figure 23: Enterprise WAN 17 Figure 24: TCP/IP Structure 18 Figure 25: IPX/SPX Structure 19 Figure 26: Different LAN Topologies 20 Figure 27: Bus Topology 21 Figure 28: Bus Topology Network connected with other network 22 Figure 29: T Connector 22 Figure 30: Different Cable Terminators 23 Figure 31: Ring Topology 24 Figure 32: Star Topology 25 Figure 33: Star Topology 26 Figure 34: Tre Topology Error! Bookmark not defined. Figure 35: Mesh Topology Error! Bookmark not defined.Figure 36: Ethernet Network 29 Figure 37: ARCNet Board and Card 31 Figure 38: Network with MSAU 33 Figure 39: ISO's OSI Architecture 35 Figure 40: OSI an SNA Comparision 36 Figure 41: LAN NIC Card 38 Figur e 42: Hub 39 Figure 43: Bridge 40 Figure 44: Router 41 Figure 45: Switch 41 Figure 46: Transceiver 42 Figure 47: Gateway PC 43 Figure 48: Nework with Wireless Stations 44 Figure 49: Tim Berners Lee 45 Figure 50: Yahoo Chat 46 Figure 51: CU SeeMe 47 Figure 52: CU SeeMe Conferencing 48 Figure 53: Telnet Screen 48 Figure 54: Different Browsers Logo 50 Figure 55: Mozilla Firefox 51 Figure 56: Netscape Navigator 51 Figure 57: Internet Explorer 52 Figure 58: Google Chrome 52 Figure 59: IP Address Structure 53 Figure 60: IP Address and Subnet Mask 53Figure 61: Yahoo, Ask, MSN, Google Search Engines Figure 62: Alta Vista Search Engine Figure 63: Lycos Figure 64: Meta Search Engine Figure 65: Web Index Figure 66: Hypertext and Hyper Link Figure 67: Email Client Interface Figure 68: New Email Message Figure 69: Emoticons 55 56 56 57 58 59 60 61 63 Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: ht tp://www. psexam. com contact: [email  protected] com Computer Networking Short Questions and Answers Contribution of Suresh Khanal for PS Exam Transmission Media What is transmission media? Transmission media is a pathway through which data are transmitted in network.We use different types of cables or waves to transmit data. What are the types of transmission media? There are two types of transmission media namely: bound transmission media and unbound transmission media. Describe bound transmission media. Bound transmission media are the cables that are tangible or have physical existence and are limited by the physical geography. Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical cable. Describe unbound transmission media. Unbound transmission media are the ways of transmitting data without using any cables. These media are not bounded by physical geography.Microwave, Radio wave, Infra red are some of popular unbound transmission me dia. Bound Transmission Media Explain twisted pair cable. A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to reduce the interference. http://www. psexam. com Page 1 Contribution of Suresh Khanal for PS Exam Figure 1: UTP Cable Figure 2: UTP Cable Connector Page 2 http://www. psexam. com Contribution of Suresh Khanal for PS Exam We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).The twisted pair cable that is protected against electro-magnetic interference (EMI) is known as STP and the one which is not shielded against EMI is called Unshielded Twisted Pair. Figure 3: STP Cable 1–Jacket 2–Shield-braid 3–Shield-foil 4–Solid twisted pair 5–Drain wire Figure 4: STP Cable Structure http://www. psexam. com Page 3 Contribution of Suresh Khanal for PS Exam Explain Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is known as co-axial cable. The shield is usually connected to electrical ground to reduce electrical interference. Co-axial cables have broader bandwidth and thus suitable for audio, video data transmission. Figure 5: Co-Axial Cable Figure 6: Co-Axial Cable StructurePage 4 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 7: Co-Axial Cable Connectors Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data via concentrated bursts of laser beams which are carried through bundles of hair thin glass fibers. They have advantages over electronic cables in transmission speed and volume. This technology has revolutionized telecommunication applications which used electron ic cables. Fiber optics cables as free from electromagnetic interference as well as wire tapping. http://www. sexam. com Page 5 Contribution of Suresh Khanal for PS Exam Figure 8: Fibre Optics Cable Structure Figure 9: Fiber Optics Cable Page 6 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Match the following types of connectors with the cables to which they are used. Cable: (a) Thick Coax (100 Base 5), (b) UTP (10 Base-T), (c) Fiber Optics (10 Base-FL) (d) Thin Coax (100 Base 5) Connectors: (1) AUI, (2) BNC, (3) RJ45, (4) SC or ST Type Answer:- a -> 1, b -> 3, c -> 4, d -> 2 Figure 10: AUI Connector Figure 11: BNC Connector http://www. psexam. com Page 7 Contribution of Suresh Khanal for PS Exam Figure 12: RJ45 ConnectorFigure 13: SC Connector Compare BNC with UTP Cables BNC Derived from the thick Ethernet Coaxial Cable Flexibility of adding nodes Lower price and no need of Hub Difficult to locate faults Terminators needed The cabling is comparatively less relia ble Single segment length (node to node) up to 180 meters UTP Derived from telephone cable Decided by Hub ports Needs Hubs Introduction of Hub makes fault finding much easier Terminators not needed Inherently much reliable Single segment length up to 200 meters Page 8 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 14: Comparison between Twisted Pairs and Co-Axial Cable Unbound Transmission MediaUnbound transmission media extend beyond the limiting confines of cabling. They provide an excellent communication alternative for WANS. The lack of physical restrictions provides larger bandwidth as well as wide area capabilities. Unbound media typically operate at very high frequencies. The three types of unbound transmission media are: Radio wave, Micro wave, Infrared Explain Radio Wave. Although Radio waves are prevalent and well understood, we are just beginning to realize their enormous potential as a networking medium. Radio waves can operate on a single or mu ltiple frequency bands. Figure 15: Radio Wave Transmission http://www. psexam. com Page 9 Contribution of Suresh Khanal for PS Exam What is Microwave?Microwaves have been used in data communications for a long time. They have a higher frequency than radio waves and therefore can handle larger amounts of data. Microwave transmission is line of sight transmission. The transmit station must be in visible contact with the receive station. This sets a limit on the distance between stations depending on the local geography. Typically the line of sight due to the Earth's curvature is only 50 km to the horizon! Repeater stations must be placed so the data signal can hop, skip and jump across the country. Figure 16: Microwave Transmission Figure 17: Microwave Transmitter, Receiver and Repeater Page 10 http://www. psexam. comContribution of Suresh Khanal for PS Exam Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry large quantities of data due to their large bandwidth. List the Advantages of microwaves. a. They require no right of way acquisition between towers. b. They can carry high quantities of information due to their high operating frequencies. c. Low cost land purchase: each tower occupies only a small area. d. High frequency/short wavelength signals require small antennae. What are the Disadvantages of Microwaves? a. Attenuation by solid objects: birds, rain, snow and fog. b. Reflected from flat surfaces like water and metal. c. Diffracted (split) around solid objects. d.Refracted by atmosphere, thus causing beam to be projected away from receiver. Describe Infra Red. Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared communications use light, so they are not bound by the limitations of electricity. Figure 18: Infrared Device http://www. psexam. com Page 11 Contribution of Suresh Khanal for PS Exam Computer Network What is a computer network? Computer Network is a collection of distribut ed intelligent machines that are connected with each other with transmission media for the purpose of data sharing, communication and sharing of computer resources. Figure 19: Computer NetworkWhat are the advantages of Networking? The following are the distinct notes in favor of computer networking. a. The computers, staff and information can be well managed b. A network provides the means to exchange data among the computers and to make programs and data available to people c. It permits the sharing of the resources of the machine d. Networking also provides the function of back-up. e. Networking provides a flexible networking environment. Employees can work at home by using through networks ties through networks into the computer at office. Page 12 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain Network ServicesNetwork services are the thing that a network can do. The major networking services are ? ? ? ? ? File Services: This includes file transfer, stor age, data migration, file update, synchronization and achieving. Printing Services: This service produces shared access to valuable printing devices. Message Services: This service facilitates email, voice mails and coordinate object oriented applications. Application Services: This services allows to centralize high profile applications to increase performance and scalability Database Services: This involves coordination of distributed data and replication. What are the five major network services? Major Network Services are: a. b. c. d. e.File Services Print Services Message Services Application Services Database Services What is Network Server? Network Server is a computer in Network that is designated to provide one or more network service. For example file server, database server etc. What is a client? A computer in network that connects to the server and uses the network services to perform user's tasks is a client. http://www. psexam. com Page 13 Contribution of Suresh Khanal for PS Exam What is a dedicated server? A network server designated to provide one particular service is known as dedicated server. For example if a computer is assigned for database service only then that computer is known as dedicated database server. What is workstation?A workstation is a node in network that is more powerful and can handle local information processing or graphics processing. A workstation usually has an inexpensive, small hard disk to carry out local tasks. Figure 20: Workstation Some workstations that have no disk drive of their own is known as diskless-workstation or dumb terminals. They terminals completely rely on LAN for their access. Network operating system lets the node work as if all the resources at the server belong to the node itself. What are dumb terminals? Those Workstations that have no disk drive of their own and rely completely on LAN for their access are called dumb terminals.The network operating system lets these terminals work as if all th e resources at the server belong to the workstation itself. Page 14 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 21: Dumb Terminal Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). A LAN links a small group of functionally similar workstations within a local geographic area such as a series of adjacent cubicles or offices on the same floor. Once the network expands to include other floors or divers office within a metropolitan area, it becomes a MAN. Finally, a WAN is simply a LAN of LANs.WANs expand the boundaries of networking to a global or even galactic scale. What is a LAN? A LAN is a Local Area Network, within a single building or a specific confined space. LANs typically comprise only one transmission media type such as coaxial cable or twisted pair. LANs are characterized by comparatively high -speed communications. These high speeds are possible because LANs use one kind of cable which generally is limited to 5 km or less. http://www. psexam. com Page 15 Contribution of Suresh Khanal for PS Exam What is MAN? MAN stands for Metropolitan Area Networks. MAN is larger than a LAN and as its name implies, covers the area of a single city.MANs rarely extend beyond 100 KM and frequently comprise a combination of different hardware and transmission media. The two most important components of MANs are security and standardization. Security is important because information is being shared between dissimilar systems. Standardization is necessary to ensure reliable data communication. What is WAN? A wide area network is simply a LAN of LANs. WANs connect LANs that may be on opposite sides of a building, across the country or around the world. WANS are characterized by the slowest data communication rates and the largest distances. WANs can be of two types: an enterprise WAN and Globa l WAN. Figure 22: Wide Area NetworkClarify Enterprise WANs. An enterprise WAN connects an entire organization including all LANs at various sites. This term is used for large, widespread organizations such as corporations, universities and governments. Page 16 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 23: Enterprise WAN Clarify Global WANs. Global WANs also span the world but they do not have to connect LANS within a single organization. The Internet is an example of a global WAN. It connects diverse locations, organizations and institutions throughout the world. Global WANS can be public or private. Private WANs are called Intranet which belongs to an organization.Public WANs are open to everybody so that anybody can connect and use the resources and services available. What are the two types of LAN? There are basically two types of Local Area Networks namely: Arcnet and Ethernet. http://www. psexam. com Page 17 Contribution of Suresh Khanal for PS Ex am Protocols What is a protocol? The term protocol refers to a set of rules and procedures that govern the transmission of messages over a physical networking medium. The most common network protocols are: (a) TCP/IP, (b) IPX/SPX and (c) NetBEUE What are the three major network protocols? The three major network protocols are: 1. TCP/IP 2. IPX/SPX (Used in Novell Netware) 3. NetBEUE (Product of Microsoft Co. ) Figure 24: TCP/IP StructurePage 18 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 25: IPX/SPX Structure Match the following protocols and their functions (a) http, (b) pop, (c) ftp, (d) smtp, (e) MIME, 1. Send email messages 2. Transfer multimedia information 3. Send email attachment 4. Transfer files in servers and clients computers 5. Receive email messages Answer: (a) -> 2, (b) -> 5, (c) -> 4, (d) -> 1, (e) -> 3 http://www. psexam. com Page 19 Contribution of Suresh Khanal for PS Exam LAN Topologies The term topology defines the geographic arrangem ent of networking devices. It describes the actual layout of the network hardware.Given the location of workstations and peripherals, the goal of topology is to find the most economical and efficient way to connect all the users to the network resources while providing adequate capacity to handle user demands, maintain system reliability and minimize delay. Figure 26: Different LAN Topologies The selection of a topology for a network can not be done in isolation as it affects the choice of media and the access method used. Because it determines the strategy used in wiring a building for a network and deserves some careful study. What are the two network connection types? The two different network connection types are (a) point-to-point connection and (b) multipoint connection. Explain Point-to-Point connection type. A point-to-point connection is a direct link between two devices such as a computer and a printer.Most of today's point-to-point connections are associated with modems a nd PSTN (Public Switched Telephone Network) communications. Page 20 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain multipoint connection. A multipoint connection is a link between three or more devices. Historically, multipoint connections were used to attach central CPs to distributed dumb terminals. In today's LAN environments, multipoint connections link many network devices in various configurations. What are the basic LAN topologies? The three simple LAN topologies that are combined to form any practical topology are known as basic LAN topologies.They are, Bus Topology, Ring Topology and Star Topology. Explain Bus Topology. The physical Bus topology is the simplest and most widely used of the network designs. It consists of one continuous length of cable (trunk) and a terminating resistor (terminator) at each end. Data communication message travels along the bus in both directions until it is picked up by a workstation or server NIC. If the message is missed or not recognized, it reaches the end of the cabling and dissipates at the terminator. Figure 27: Bus Topology http://www. psexam. com Page 21 Contribution of Suresh Khanal for PS Exam All nodes on the bus topology have equal access to the trunk.This is accomplished using short drop cables or direct T-connectors. The number of devices and the length of the trunk can be easily expanded. Figure 28: Bus Topology Network connected with other network Figure 29: T Connector Page 22 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 30: Different Cable Terminators What are the advantages of bus topology? The advantages of physical bus topology are: a. It uses established standards and it is relatively easy to install. b. It requires less media than other topologies. http://www. psexam. com Page 23 Contribution of Suresh Khanal for PS Exam What are the disadvantages of bus topology?The disadvantages of bus topology are: a. The bus networks are difficult to reco nfigure, especially when the acceptable number of connections or maximum distances have been reached. b. They are also difficult to troubleshoot because everything happens on a single media segment. This can have dangerous consequences because any break in the cabling brings the network to its knee. What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Each device connects directly to the ring or indirectly through and interface device or drop cable. Message travel around the ring from node to node in a very organized manner.Each workstation checks the message for a matching destination address. If the address doesn't match the node simply regenerates the message and sends it on its way. If the address matches, the node accepts the message and sends a reply to the originating sender. Figure 31: Ring Topology Page 24 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Point out the major advantages of Ring Topology. The advantages of ring topologies are: a. They are very easy to troubleshoot because each device incorporates a repeater. b. A special internal feature called beaconing allows troubled workstations to identify themselves quickly. Point out the disadvantages of Ring Topology.The disadvantages of ring topologies are: a. It is considerably difficult to install and reconfigure ring topology b. Media failure on unidirectional or single loop causes complete network failure. Explain Star Topology. The physical star topology uses a central controlling hub with dedicated legs pointing in all directions – like points of a star. Each network device has a dedicated point-to-point link to the central hub. This strategy prevents troublesome collisions and keeps the lines of communications open and free of traffic. Figure 32: Star Topology http://www. psexam. com Page 25 Contribution of Suresh Khanal for PS Exam This topology, obviously, require a great deal of cabling.This design provides an excellent p latform for reconfiguration and troubleshooting. Changes to the network are as simple as plugging another segment into the hub and a break in the LAN is easy to isolate and doesn't affect the rest of the network. Figure 33: Star Topology What are the benefits of Star Topology? The benefits of star topology are: a. Relatively easy to configure. b. Easy to troubleshoot c. Media faults are automatically isolated to the failed segment. What are the disadvantages of Star Topology? The disadvantages are considered as follows: a. Requires more cable than most topologies. b. Moderately difficult to install. Page 26 http://www. sexam. com Contribution of Suresh Khanal for PS Exam What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (every device connected to all other devices), Cellular Topology (wireless point to pint and multipoint design), Tree Topology (Hierarchical connections of devices), Hyb rid topology (combination of two or more basic topologies). Figure 34: Tre Topology Figure 35: Mesh Topology Network Standards What is a Networking Standard? Protocol (the logical component) and Topology (the physical component) is combined together to create a networking standard.These standards are developed and controlled by the Institute of Electrical and Electronics Engineers (IEEE). What are the four major industry standards? The four major industry standards are (a) Ethernet, Token Ring, ARCNet and FDDI (Fiber Distributed Data Interface). http://www. psexam. com Page 27 Contribution of Suresh Khanal for PS Exam What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the various Islands. It was radio based design. Later, Robert Metacalfe went to Xeros's Palo Alto Research Center (PARC) laboratories and eliminated the radio portion and changed to co-axial cabling. Ethernet is ne of the most popular LAN technologies in use tod ay covering more than 85% of the networks. Ethernet system consists of three basic elements: 4. The physical medium use to carry Ethernet signals between computers on the network 5. A set of rules (protocols) embedded in each Ethernet interface that will decide how multiple computers on the network will have access to the data on the medium. 6. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. How an Ethernet Worked? The operation of Ethernet can be described in simple terms as follows: Each computer on the Ethernet Network, also known as a node, operates independently of all other nodes.All nodes attached to an Ethernet are connected to a shared medium over which the Ethernet signals travel serially, one data bit at a time. To send data a station first listens to the channel and when the channel is idle the station transmits its information in the form of an Ethernet frame, or packet. The Ethernet rules (protocol) are defined in such a way that every node gets a fair amount of frame transmission opportunity. Page 28 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 36: Ethernet Network As each Ethernet frame is sent out on the shared medium, the Ethernet interfaces inside the node look at the destination address.The interfaces compare the destination address of the frame with their own address. The Ethernet interface with the same address as the destination address in the frame will read the entire frame and all other network interfaces will ignore the information. What is Medium Access Control of Ethernet? The set of rules which ensures that every node in an Ethernet gets a fair amount of frame transmission opportunity, are called the â€Å"Medium Access Control† mechanism. The Medium Access Control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMD/CD). Explain Ethernet Frame. The heart of Ethernet system is the Ethernet Frame, which is used to deliver information between the computers.The frame consists of a set of bits organized into several fields. These fields include address fields, a data field and an error checking field that checks the integrity of the bits in the frame to make sure that the frame has arrived intact. http://www. psexam. com Page 29 Contribution of Suresh Khanal for PS Exam List some advantages of Ethernet. Ethernet's major advantages are: 1. It is an inexpensive way to achieve high speed LAN transmissions (10 to 100 MB/s) 2. It is a proven technology that supports various writing configurations. 3. It works well with a large number of LAN and micro-tomainframe applications. 4. It is easy to install. What are the disadvantages of Ethernet Cabling?The Ethernet cabling ahs the following disadvantages: 1. Ethernet is not a high-level performer in high-load environments. This protocol (CSMA/CD: Carrier Sense Multiple Access/Collision Detection) can slow down dramatically if hundreds of works tations are competing for the same cabling trunk 2. Its linear bus cabling system can sometimes make it difficult to isolate problems. Page 30 http://www. psexam. com Contribution of Suresh Khanal for PS Exam What is ARCNet? The Attached Resource Computer Network (ARCNet) standard was created in 1977 at the Data Point Corporation by a scientist – John Murphy. ARCNet uses the token-passing protocol over a star and bus topology.The star and bus topology combines the flexibility of a star with the simplicity and throughput of a bus. Thus, ARCNet standard has a unique protocol/topology combination: token-passing protocol and Distributed star/bus topology. Figure 37: ARCNet Board and Card http://www. psexam. com Page 31 Contribution of Suresh Khanal for PS Exam List the advantages of ARCNet. Here are some of the ARCNet's advantages: 1. It is extremely reliable. 2. ARCNet is easy to install and troubleshoot. 3. It has an excellent track record of interoperability for those using AR CNet components from various manufacturers. 4. ARCNet supports a variety of cable types including coaxial, UTP and Fiber Optics. 5.It is inexpensive and built to stay that way. What are the disadvantages of ARCNet? Here are some disadvantages of ARCNet: 1. Standard ARCNet is very slow (2. 5 Mb/s). It is almost seven times slower than Token Ring. 2. ARCNet was not designed with interconnectivity in mind. For many installations, it's difficult to go beyond the confines of single LAN. How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal called the token. A token is a 24-bit packet that circulates throughout the network from NIC to NIC in an orderly fashion. If a workstation wants to transmit a message, first it must seize the token.At that point, the workstation has complete control over the communications channel. The existence of only one token eliminates the possibility of signal collisions. This means that only one station can speak at a ti me. Explain Logical Ring Physical Star topology for Token-Passing Standard. It is sure that any break in the ring at any point will interrupt communications for all machines. To solve this problem, IBM developed a modified ring topology, which they called the logical ring Page 32 http://www. psexam. com Contribution of Suresh Khanal for PS Exam physical star. The central point of the physical star configuration is Token Ring hub called the multi-station access unit (MSAU, pronounced as masow).Workstations and servers attached to the MSAU through special STP adapter cables. IBM converted stars into a logical ring by connecting all MSAU hubs together through special ring-in (RI) and ring-out (RO) ports. Figure 38: Network with MSAU List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It offers excellent throughput under high-load conditions. b. Token Ring facilitates LAN-to-LAN mainframe connections especially for interfacing with IBM's broa der connectivity strategies. c. It has built-in troubleshooting mechanisms such as beaconing and auto-reconfiguration and may now be used with UTP cabling. http://www. psexam. com Page 33 Contribution of Suresh Khanal for PS Exam d.It has the most reliable protocol (token-passing), the most trouble-free configuration (physical star) and the fastest connectivity scheme (r or 16 mb/s). Point out the disadvantages of Token Ring. Few of the disadvantages of Token Ring are: a. Token Ring is very expensive. All topology components cost much more than other more popular standards. b. It is relatively proprietary. Token Ring's complexity is built into the hardware components. This means hat you need to choose a manufacturer and stick with it. c. Engineers must have considerable expertise to manage and troubleshoot token ring components. What do you mean by Beaconing and AutoReconfiguration?When a station does not receive a message from its nearest active upstream neighbor, it sends out a wa rning, otherwise known as a beacon. This beacon alerts everyone that something is wrong and helps to isolate the failure domain. When beacon occurs, the ring will attempt to fix the problem without your intervention. This process of self-healing is called auto-reconfiguration. Network Architecture What is Network Architecture? When two or more computer are connected with one another for the purpose of communicating data electronically, besides physical connection of computers, communication devices and system servers, a well defined standard known as architecture is required to establish cohesive communication between devices in Network. Page 34 http://www. psexam. om Contribution of Suresh Khanal for PS Exam What are the popular Network Architectures? The most popular architectures are: a. ISO Open System Architecture (OSI) b. IBM's System Network Architecture (SNA) Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks which means commonly used Internet product and services fit within the model. The OSI model describes seven layers of related functions that needed at each end, when a message is sent from one party to another party in a network.Each layer has its own set of special related function as follows: Figure 39: ISO's OSI Architecture http://www. psexam. com Page 35 Contribution of Suresh Khanal for PS Exam Layer 7 – Application Layer: Application programs that use the network. Layer 6 – Presentation Layer: Standardize data presented to the application. Layer 5 – Session Layer: Manages sessions between applications Layer 4 – Transport Layer: Provides error detection and correction Layer 3 – Network Layer: Provides data delivery across the physical connection Layer 2 – Data Link Layer: Provides data delivery across the physical connection Layer 1  œ Physical Layer: Defines the physical network media.Explain IBM's SNA Architecture SNA is a computer networking architecture that was developed by IBM to provide a network structure for IBM mainframe, midrange, and personal computer systems. SNA defines a set of proprietary communication protocols and message formats for the exchange and management of data on IBM host networks. Figure 40: OSI an SNA Comparision Page 36 http://www. psexam. com Contribution of Suresh Khanal for PS Exam SNA can be used for the following types of tasks: ? Terminal access to mainframe and midrange computer applications. File transfer of data between computer systems. Printing of mainframe and midrange data on SNA printers.Program-to-program communications that allow applications to exchange data over the network. ? ? ? SNA can be implemented in a networking infrastructure that uses either a hierarchical or peer-to-peer model. Networking Model Explain Peer-to-Peer Networking Model. A networking model whe re each workstation has equivalent capabilities and responsibilities is known as peer-to-peer model. There is no central server in this network and computers join hands to share files, printers and Internet access. It is practical for workgroups of a dozen or less computers making it common environments, where each PC acts as an independent workstation that stores data on its own disk but which can share it with all other PCs on the network.Software for peer-to-peer network is included with most modern desktop operating systems such as Windows and Mac OS. Explain Client/Server Networking Model. A networking model where one or more powerful computers (servers) provide the different network services and all other user's computers (clients) access those services to perform user's tasks is known as client/server networking model. Client-server networking model became popular in the late 1980s and early 1990s as many http://www. psexam. com Page 37 Contribution of Suresh Khanal for PS Ex am applications were migrated from centralized minicomputers and mainframes to networks of persona computers.The design of applications for a distributed computing environment required that they effetely be divided into two parts: client (front end) and server (back end). The network model on which they were implemented mirrored this client-server model with a user's PC (the client) typically acting as the requesting machine and a more powerful server machine to which it was connected via either a LAN or a WAN acting as the supplying machine. It requires special networking operating system. It provides user level security and it is more expensive. Network and Internet Terminologies NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network.The NIC provides a physical connection between the networking medium and the computers' internal bus, and is responsible for facilitating an â€Å"access method† to the network. Most NICs are designed f or a particular type of network, protocol and media, although some can serve multiple networks. Figure 41: LAN NIC Card Page 38 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality begins to deteriorate as segment exceeds their maximum length. A hub provides the signal amplification required to allow a segment to be extended a greater distance. Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports.Active hubs, also sometimes referred to as â€Å"multiport repeaters†, regenerate the data bits in order to maintain a strong signal. Figure 42: Hub Bridges The bridge function is to connect separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are different, then the packet is â€Å"forwarded† to the correct segment. Bridges are also called â€Å"store-and-forward† device because they look at the whole Ethernet packet before making filtering or forwarding decisions. ttp://www. psexam. com Page 39 Contribution of Suresh Khanal for PS Exam Figure 43: Bridge Router Routing achieved commercially popularity in the mid – 1980s – at a time when large-scale Internetworking began to replace the fairly simple, homogeneous environments. Routing is the act of moving information across an Internetwork from a source to a destination. It is often contrasted with bridging, which perform a similar function. Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex ne twork of many LANs.Page 40 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 44: Router Switches LAN switches are an expansion of the concept in LAN bridging, which controls data flow, handles transmission errors, provides physical addressing, and manages access to the physical medium. Switches provide these functions by using various link-layer protocols. LAN switches can link four, six, ten or more networks together. A storeand-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it to its destination. Figure 45: Switch http://www. psexam. com Page 41 Contribution of Suresh Khanal for PS Exam TransceiversTransceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a builtin 10BaseT or 10Base2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. Figure 46: Transceiver Gateway A Gateway is a device such as a mini or microcomputer capable of operating on a stand alone basis but which also provides connection for communication with the other computers and access to shared resources. Page 42 http://www. psexam. comContribution of Suresh Khanal for PS Exam Figure 47: Gateway PC Proxy Serer Also called a proxy or application level gateway. It is an application that breaks the connection between sender and receiver. Thus, it helps us to prevent hacker from obtaining Internet address and detail of a private network. Firewall Firewall is a method for keeping a network secure. It is mostly used in giving users access to the Internet in a secure fashion as well as to separate a company's public web server from its internal network. Node A node is a hardware device or group of devices or station in a network that link one or more other unit to the network. Wireless NetworkThe m ost and latest wireless LANs use electromagnetic airwaves either infrared or radio frequency to communicate information from one point to another without relaying on a physical connection. Radio waves are often referred to as radio carriers because they simply perform the function of delivering energy to a remote receiver. The http://www. psexam. com Page 43 Contribution of Suresh Khanal for PS Exam data being transmitted is superimposed on the radio carrier so that it can be accurately extracted at the receiving end. Multiple radio carriers can exist in the same space at the same time without interfering with each other if the radio waves are transmitted on different radio frequencies. Figure 48: Nework with Wireless StationsIn a typical WLAN configuration, a transmitter/receiver (transceiver) device, called an Access Point (AP), connects to the wired network from a fixed location using standard Ethernet cable. The Access Point receives, buffers, and transmits data between the WLAN and the Page 44 http://www. psexam. com Contribution of Suresh Khanal for PS Exam wired network infrastructures. A single Access Point can support a small group of users and can function within a range of less than one hundred to several hundred feet. The Access Point (or the antenna attached to the Access Point) is usually mounted high but may be mounted essentially anywhere that is practical as long as the desired radio coverage is obtained.The wireless network, printers or other peripherals can be shared through a connected PC. The devices then communicate using a set of reserved high-frequency radio waves. An Access Point device connects to a DSL or cable modem and enables high-rate (broadband) Internet access for the entire network. Internet Internet is the large worldwide network of computes that facilitates data communication services, file transfer, electronic mail, World Wide Web and newsgroup with common protocols. WWW Figure 49: Tim Berners Lee http://www. psexam. com Pa ge 45 Contribution of Suresh Khanal for PS Exam The WWW is the brainchild of Tim Berners Lee a CERN who had the idea of creating an electronic web of research information.The web is currently the fastest growing Internet information system, with new resources being added regularly. The web relies on a set of protocols, conventions and software to operate. The web is a distributed system of delivering linked documents over the Internet. It is called a distributed system because information can reside on different computers around the world. Yet be easily linked together using hypertext. The web uses hypertext to create links from together using hypertext. The web uses hyperte3xt to create links from one resource to another. A hypertext link is usually displayed by highlighted and underlined text on the page. A hypertext link or hyperlink can also be graphic that acts as a button linking to another resource. IRCInternet Relay Chat (IRC) is a system for sending public and private messa ge to other users in â€Å"real time† – that is, your message appears on the recipient's screen as soon as you type it. Figure 50: Yahoo Chat Page 46 http://www. psexam. com Contribution of Suresh Khanal for PS Exam CU-SeeMe CU-SeeMe is a video conferencing system that allows users to send and receive sound and pictures simultaneously over the Internet. Figure 51: CU SeeMe http://www. psexam. com Page 47 Contribution of Suresh Khanal for PS Exam Figure 52: CU SeeMe Conferencing Telnet It is a protocol or set of rules that enables a computer to connect another computer in network. It is also known as a remote login. The telnet operates on client-server principle. Figure 53: Telnet Screen Page 48 http://www. psexam. comContribution of Suresh Khanal for PS Exam Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the Internet. The Ghoper was created as a piece of software to utilize some of the services that were becoming available on the Internet. HTML HTML stands for Hyper Text Markup Language. It is a standard coding language used to create all web documents (pages). http://www. psexam. com Page 49 Contribution of Suresh Khanal for PS Exam Browsers Figure 54: Different Browsers Logo A browser is the Internet Client software that acts as an interface between the user and the inner-workings of the Internet, specifically the WWW.We can find graphical web browser that displays multimedia content of text, graphics, audio and video, and text web Page 50 http://www. psexam. com Contribution of Suresh Khanal for PS Exam browser that displays only text. Internet Explorer, Netscape, Firefox are graphical web browser and Lynx is a well known text browser. Figure 55: Mozilla Firefox Figure 56: Netscape Navigator http://www. psexam. com Page 51 Contribution of Suresh Khanal for PS Exam Figure 57: Internet Explorer Figure 58: Google Chrome Page 52 http://www. psexam. com Contribution of Suresh Khanal for PS Ex am Dialup Connection Dialup connection is a means of connecting user to another computer (ISP) or a network such as the Internet with a modem equipped computer. IP AddressIP Address is an identifier for particular machine on a particular network. It is part of scheme to identify computers on the Internet. IP addresses are a set of numbers separated with periods. Figure 59: IP Address Structure Figure 60: IP Address and Subnet Mask http://www. psexam. com Page 53 Contribution of Suresh Khanal for PS Exam Domain Name A domain name is a way to identify and locate computers connected to the Internet. This is a text name of a computer in network or Internet. Domain names are converted to IP Addresses to locate computers and resources. URL URL stands for Uniform Resource Locator that identifies a particular Internet resource.URL help the user to locate web page, gopher service, library catalog and image or text file locations. URLs are the standard addressing system of the www. A complete URL provides the web client with all the information it needs to contact a server and make a request for information. URLs are divided into three basic parts: Example: http://www. psexam. com/download. htm a. Protocol (http://) – The information appearing before the colon in any URL indicates the type of information server or protocol. For example http:// indicates that the server to be connected is a www server. b. Domain name (www. psexam. com) – The second piece of information is the address of the server. In this example psexam. om is the name of the machine at PS Exam in world wide web. c. Resource name (download. htm) – The third piece of information is the path to the actual document requested. In this example the URL indicates that the document in the system directory and is named download. htm. Web Browsing or Surfing Browsing or Surfing is the process of visiting different web sites on the Internet hosted by various organizations. Page 54 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Search Engine The search engine is an interactive tool to help people locate information via the www and it is interface between the user and underlying database.The most popular search engines are Alta Vista Exite, Lycos, Yahoo! , Google, Ask etc. Figure 61: Yahoo, Ask, MSN, Google Search Engines http://www. psexam. com Page 55 Contribution of Suresh Khanal for PS Exam Figure 62: Alta Vista Search Engine Figure 63: Lycos Page 56 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Meta Search Engine A web meta searcher is a tool that helps users to locate information available via the World Wide Web. Web meta-serchers provide a single interface that enables users to search many different search engines, indexes and databases simultaneously. Some meta search engines are Albany. net, Clnet (search. om), Cyberland, Eureaka! , Savvysearch and so on. Figure 64: Meta Search Engine Internet Access We can access to the Inte rnet in one of two basic ways, dialing into an Internet Service Provider's (ISP) computer or with a direct connection to an ISP. Connecting to ISP by dialing their hunting number (phone number) is called Dial-up connection. We require a username, password and ISP's hunting number to configure Dial up Connection. http://www. psexam. com Page 57 Contribution of Suresh Khanal for PS Exam Extranet An Extranet is a type of Intranet (Internal TCP/IP Network) that has been selectively opened to a firm's suppliers, customers. IntranetAn intranet can be defined as a network connecting an affiliated set of clients using standard internet protocols, esp. TCP/IP and HTTP or as an IP-based network of nodes behind a firewall, or behind several firewall connected by secure, possibly virtual, networks. Web Index A web index is designed to assist users in locating information on the World Wide Web. Web indexes are also referred to as catalogs or directories. A web index collects and organizes resour ces available via the www. Some of the web indexes are Yahoo! , Megallan, Apollo etc. Figure 65: Web Index Page 58 http://www. psexam. com Contribution of Suresh Khanal for PS Exam HypertextThe hypertext allows for the integration of text, graphics, audio and video on a web pate. This can make it very easy to browse and very exciting to view. A web page may have colorful graphics integrated with textual information. Links on a web page may take you to other web pages, recorded sonds, or digital video clips. A single click on any hyperlink allows you to follow the link to the specified resource. Figure 66: Hypertext and Hyper Link Email Electronic Mail (Email) is one of the most popular & powerful communication tools on the Internet. It is an efficient and effective means of network communication. Email allows you to communicate with people across the globe via electronic media (computer). Email addressAn Email Address identifies a person and the computer for the purpose of exchangin g electronic mail message. Example: [email  protected] com http://www. psexam. com Page 59 Contribution of Suresh Khanal for PS Exam The email address contains three parts: a. Username – The admin in example. b. Domain name of organization – The psexam in example c. Top Level Domain – The com in example Signature Figure 67: Email Client Interface Inbox It is an element of Email Application which collects all incoming mails. Outbox It is an element of Email Application which collects all outgoing mails, if it is created and sent in offline. Page 60 http://www. psexam. com Contribution of Suresh Khanal for PS Exam TrashThis is an element of Email Application that holds all the deleted emails. Figure 68: New Email Message CC CC stands for Courtesy copy or Carbon Copy. It is an element of Email used to specify the additional recipients when the mail sent needs to be acknowledged to them. http://www. psexam. com Page 61 Contribution of Suresh Khanal for PS Exam BCC BCC stands for Blank Carbon Copy. It is similar to CC but the address of other receivers will not be shown to the receiver. Reply A reply is the response of an email you receive. After you read a mail and need to reply it you can use this feature. Forward A mail received can be sent to be other recipients known as forwarding. AttachmentsThe documents created in other applications such as word, excel can be sent along with the email message. These documents that are sent with email is known as attachment. Documents, audio/video files, Zip files etc. can be sent as attachment along with email message. Bounced When a mail sent can't reach to destination and returns back, this is known as bounced. This happens often when the recipient's address is wrong or the server at the recipient's end is down or recipient's inbox is full. Netiquette It is essential for all users on the internet to recognize that they are responsible for their own individual actions while using the net. Netiquette is simply the use of common courtesy and polite behavior while using the net. EmoticonsThe convention of expressing feeling or a joke in symbolic form by user in Email or Chatting for example 🙂 for smiling 😉 for winking 🙠 for frowning etc are emoticons. Page 62 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 69: Emoticons http://www. psexam. com Page 63 Contribution of Suresh Khanal for PS Exam Wish you best of luck! Page 64 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Visit New PS Exam Better Interface and greater possibility to share and interact. Don’t forget to subscribe! http://new. psexam. com ICT Trends – A Blog about blogging Trace the path of Suresh Khanal in blogging, promoting and monetize blogs. http://www. icttrends. com http://www. psexam. com Page 65