Thursday, October 31, 2019

The Flood Myth Essay Example | Topics and Well Written Essays - 1000 words

The Flood Myth - Essay Example Comparative approaches to mythology had great popularity among the 18th-19th century scholars. Majority of the scholars believed that all myths showed signs of having originated from a single mythical theme. Noah’s ark is the vessel in Genesis (chapter 6-9) of the Bible where God saves Noah and his family plus a remnant of all animals in the world from the flood. Noah is given great instructions on how to build an ark by God. He is told to use gopher wood smeared inside and outside with pitch, with 3(three) decks and internal compartments: 300 cubits long, 50 wide and 30 high. The roof will have a ‘finished to a cubit upward’ and the entrance on the side. The myth describes that the ark is afloat throughout the flood before it comes to rest on Mount Ararat. The tale is repeated with variations in the Quran with the ark appearing as Safina Nuh. The Genesis flood myth is similar to many other flood myths from a variety of other different cultures. Noah and the biblical flood story originates from the Mesopotamian version of Epic of Gilgamesh because the Biblical mythology that’s currently found in Christianity, Islam, Mandeanism and Judaism shares overlapping co nsistency with by far older written stories from Mesopotamia of the great flood. Also, the early Hebrew people were known to have lived in the land of Mesopotamia, particularly at the time of the Babylonian captivity. The narrative from Hebrew differs from the Babylonian story in that the floods come as God’s judgment on wicked humans rather than as a result of the caprice of the gods. In the Gilgamesh epic, Utnapishtim tells Gilgamesh a secret tale/story that begins in the old city of Shuruppak on the banks of river Euphrates. The great gods (Anu, Ninurta, Ennugi, Ea and Enil) were sworn to secrecy about a plan to cause a flood. However, god Ea (Enki the Sumerian god) repeats the plan to

Tuesday, October 29, 2019

ORGANIZATIONAL ANALYSIS- THE ORGANIZATION Essay Example | Topics and Well Written Essays - 500 words

ORGANIZATIONAL ANALYSIS- THE ORGANIZATION - Essay Example Papworth Hospital also has the Chest Medical Unit that offers respiratory services (Papworth Hospital NHS Foundation Trust, 2013). It is a Public  NHS and has a tremendous relationship with the community due to its long service in the area. The philosophy of Papworth Hospital promotes a positive approach to review and diagnosis, ensuring that the patient accesses medical care in the most suitable setting by the best personnel (Papworth Hospital NHS Foundation Trust, 2013). This relates to team work from the staff who share work collectively for safe and effective clinical care. The hospital’s mission statement is to uphold its status as excellence center for diagnosis and treatment of patients. Papworth Hospital may be said to be a matrix organization as responsibilities are shared in the organization. The board members are involved in decision making, patients and the public are also included in consultations (Papworth Hospital NHS Foundation Trust, 2013). This form of communication explains the level of consultations within the organization. Papworth Hospital seems to have issues with its internal control systems. This means that the governance process must be changed to improve the risk management systems as well as come up with a framework that will ensure that all stakeholders play their role efficiently (Papworth Hospital NHS Foundation Trust, 2013). Nonetheless, the hospital is keen to constantly review its reports what allows to control activities in the organization as well as achieve the set goals. The hospital has a culture of reviewing risks in relation to the quality standards; thus, quality service provision efficiently (Papworth Hospital NHS Foundation Trust, 2013). Papworth Hospital nursing care delivery system involves modern matrons that ensure cleanliness of the patient environment as well as support the nurses in the wards efficiently (Papworth Hospital NHS Foundation Trust, 2014). Social workers help in discharging

Sunday, October 27, 2019

Networking And Routing Protocols

Networking And Routing Protocols At present, internet plays a vital role in many of our daily life. It made a dramatic revolution on communication which we enjoy today. The revolution offered web appliances, e-commerce, video conferences, online gaming and so on. All these became possible and operating on the backbone called networks. On the first hand, before discussing about routing and routing protocols well go through and networking. Initially U.S. government funded researches on sharing information within computers for scientific and military[1] purposes. Though there were many contributed to the foundation of internet J. C. R. Licklider was the first among them. As a leader of Information Processing Technology Office (IPTO) he demonstrated the concept of time sharing and promoted the researches and concepts on networking. Time sharing made a major evolution in the IT world. It became the basis for networking as well. Licks successors as leaders of IPTO, Ivan Sutherland and Bob Taylor influenced by Intergalactic Network lead the researches of Advanced Research Projects Agency (ARPA)s IPTO. The three people Paul Baran, Leonard Kleinrock and Donald Davies developed fundamentals for ARPANET with their own concepts such as packet switching and so on. After continuous researches on implementation of networks, the first ARPANET interconnected and became success in 1969. Being limited for military and research purposes by universities ARPANET has gone through several modifications and adopted many mechanisms. By 1990 networks gradually became for public and from their several other technologies emerged based on networks. When the networks used by general public, it began to grow massive and more complex. So there was a need for a man in the middle kind of device to handle the routes for networks. So that experts coined the device called router. Router is a networking device used to forward the data to an interface to route the data towards its destination. Again the network administrator had to do a hectic job of adding static routes and updating each and every route in a network. For instance, if a link goes down all the routers should be updated manually to cope with it. So to handle these messy situations experts came up with the routing protocols. Though there were plenty of contributors and technology shifts in various occasions in the industry, the above paragraphs covers the milestones in the history. Routing Concept Routing is the process of directing a packet towards the destination with the help of router. The router receives a packet from one interface, determine which interface to be forwarded based on routing algorithm and destination address and then send the packet to the interface. To route a packet the router should satisfy at least following, Router should know Destination address subnet mask Discover Neighbor routers where it can identify the routes for remote routers Identify all possible routes for all remote networks The best path for routing the packet The process of maintaining and verifying the routing table and routing information In general, routing can be categorized as static and dynamic routing. Static routing is the process of adding the routes manually in the router table. The Static routes have the administrative distance of 1 by default. IP route 172.16.30.0 255.255.255.0 172.16.20.2 Dest n/w subnet mask next hope Static routing has no overhead on router CPU or bandwidth of the link and secure compared to dynamic routing. However, static routing doesnt have fault tolerant and its a tedious job to add routes manually. In a wide area network, adding all the routes is definitely a hardest job. Then again when a topology changes or a link goes down again the network administrator have to run all over the place to update. However in some scenarios, static routing remains handy. For instance, in stub networks where all the traffic routed towards a gateway static routing is inevitable with default routes. So static routing consume less resources, easy to configure, more secure and can handle multiple networks. Default routing is a category of static routing where only the exiting interface is specified. IP route 0.0.0.0 0.0.0.0 serial1 Dest n/w Subnet Exit interface Administrative distance for default routing is 0. Default routing is used to send packets to remote networks when the router doesnt have information about it on routing table. The next crucial, widely used category is dynamic routing which is concerned in this project. Dynamic routing is the process of keeping the routing table up to date with instant updates from routing protocols. These protocols dynamically share the information and able to update the routing table when topology changes occur. Further, these protocols determine the best path based on metric calculations. So that dynamic routing protocols remain crucial in large scale corporate networks to update their routing tables. Dynamic routing protocols provide fault tolerance by broadcasting updates when links goes down or server shutdown. To update the router tables the routing protocols define the rules for communicating with the neighbor routers. The rules specify the method and algorithm to exchange information between neighbors. All in all though dynamic protocols consume more CPU power and bandwidth when compared, they are robust and more reliable in networks, especially large scale. Routin g protocols can be categorized in various ways based on their characteristics. Initially, protocols can be divided into routing and routed protocols. Routed protocols are responsible for actual data transfer. The protocols under this category are TCP/IP, IPX/SPX, and apple talk. Routing protocols exchange the routing information between routers. They include RIP, RIP v.2, IGRP, EIGRP, OSPF BGP and so on. Further dynamic protocols can be classified as, Interior gateway protocols (IGP) and Exterior gateway protocol(EGP) Class-full and Class-less Distance vector ,Link-state and hybrid protocols IGP and EGP are characterized based on autonomous system. Autonomous system (AS) is the collection of networks within one administrative domain. IGP protocols are used to exchange router information between same AS number and EGP is between different AS numbers. Rip, Rip v.2, IGRP, EGRP, OSPF, IS-IS come under IGP and BGP is under EGP. Class-full routing protocols do not advertise the subnet mask but class-full address in advertisement. Class-less protocols advertise subnet mask. RIP and IGRP are class-full and RIP v.2 EIGRP, OSPF and IS-IS are classless. The other important characterization is Distance vector, Link state and hybrid. Distance vector protocols Advertise periodically Advertise full routing table Advertise only for directly connected routers High convergence time Limited no of hops Suffer from routing loop Do not establish neighbor relationship Protocols RIP, IGRP Link state protocols Advertise only when network triggered Advertise only the update Flood the advertisement Convergence is low No limits in hop count and suitable for large network No routing loops Establish neighbor relation in formal way Protocols OSPF IS-IS Hybrid protocols Its a combination of both Distance vector and Link-state. EIGRP share such routing characteristics. Dynamic routing Protocols Routing Information Protocol (RIPv1) Routing information protocol version 1 known as RIP is the initial routing protocol to be implemented in ARPANET in 1967. As classified before RIP is a class-full, distance vector and interior gateway protocol (IGP). RIP was developed based on Bellman-Ford algorithm and use hop count as the metric value. It uses the lowest hop count to calculate the best path. Rip limits the number of hosts it supports in a network to prevent routing loops and maintain stability. It supports a maximum of 15 hops in a network. 16th hop is defined as in infinite administrative distance and they become unreachable and un-shareable. It uses broadcast address 255.255.255.255 to send updates between routers. Administrative distance for RIP is 120. Rip use several timers in the advertising and updating process. Routing update timer, route timeout timer, and route flush timer are the timers used by RIP. Routing update timer is used to determine the time interval between each update from rip implemented router. Usually a full update is sent every 30 seconds from router. This became a problem when all the routers simultaneously try to send updates every 30 seconds and consuming the bandwidth since they are synchronized. So that when the timer is reset random time is added in addition to the 30 seconds to prevent such congestion. Route timeout timer is the time frame until a record remains valid before it gets an update with same record. If the router doesnt get the update again within the time frame router marks the record for deletion and hold it until the flush time expire. After the flush time expires the record will be purged permanently from the table. Rip protocol preserve stability by limiting the number of hops to prohibit routing loops propagation. RIP implements split horizon, route poisoning and timing mechanisms to prevent erroneous information propagation. However, limitation on number of hops becomes a setback in large scale networks. Limiting only to class-full advertising is another drawback in RIP. Further, routing updates are not capable for authentication process which is a security concern with version1. Despite rip being emerged ages ago it still exists in routers. Because it is easy to configure, stable, suits well for stub networks and widely used. Routing Information Protocol (RIPV2) Rip version 2 was standardized and released in 1993 due to lack of some important features in version 1 as mentioned above. Version 2 is an enhancement for variable length subnet masking (VLSM). Ripv2 designed to support classless routing with subnet masks which was a critical update from earlier version. Version2 updates carry more information with simple authentication enabled on it. It uses multicast address 224.0.0.9 to send updates. Multicasting avoids the hosts which are not part of routing from receiving update. This version also maintains the maximum number of hops to 15. Open Shortest Path First (OSPF) Routing Protocol Open shortest past first (OSPF) plays a key role in IP networks for several reasons. It was drafted to be used with the internet protocol suite with high functionality as a non proprietary protocol. OSPF is an interior gateway routing protocol which routes packets between the same autonomous systems. It has an administrative distance of 110. It is designed to fully support VLSM (Variable Length Subnet Masking) or CIDR (Classless Inter-Domain Routing).Also it supports for manual summarized advertisement. Its a link state protocol. So it scales well[2], converges quickly and offer loop free routing. On a topology change or link down it converges quick enough to provide a new loop free route. It uses cost to calculate the metric value. The shortest path is calculated based on Dijkstra algorithm to find the best path. OSPF use multicast addresses for updates. The addresses are, 224.0.0.5 is for sending updates and 224.0.0.6 is to receive updates. OSPF maintains three types of tables namely, routing table, neighbor table and database table. It uses Hello protocol to establish neighbor relation and maintain a neighbor table. Hello protocols attributes are, Router ID Priority (default 1) Hello interval (10 sec) Dead interval (40 sec) Authentication bit Stub area flag Process ID The relationship is established based on the router ID. To establish a neighbor relationship timers (hello dead), network mask, area ID and authentication password should be same. It uses area to communicate among routers. OSPF can be configured as single area or multi-area network. Areas are introduced to constrain the flooding of update into a single area. An OSPF domain is split into areas and labeled with 32 bit identifiers to limit the updates and calculation of best path with Dijkstra algorithm into one area. Areas should be carefully designed and configured to group the hosts and routers to a logical area. Each area maintains its own link state database which is distributed via a connecting router to other networks. Such design reduces the traffic flow between areas and keeps the topology anonymous to other areas. In single area OSPF the entire interface in that network belongs to same network. The diagram below explains a configuration in single area OSPF. In multi-area, all other areas must connect to the back bone area (area 0) directly or virtually. The diagram below is a sample of multi-area configuration. A multiple area OSPF must contain at least one backbone / zero area and may have several non-backbones. Zero area remains as the core area for all the other areas. All the other areas connect to backbone area to get updated. OSPF allows configuring stub networks as well. In OSPF stub networks external updates are not flooded in to the stub area. This will result in reducing the size of database size and thereby memory consumption. When stub network area is configured default routing will be used to connect to the external areas. OSPF defines the following router states, Area border router (ABR) Autonomous system boundary router (ASBR) Internal router (IR) Backbone router (BR) The routers could play one or more roles as mentioned above in an OSPF network. The router identifier should be defined in a dotted decimal format to associate each OSPF instance with an ID. If it is not explicitly specified, the highest logical IP will be assigned as the router ID. Area border router (ABR) is the common router which placed on the edge of the backbone area to connect other areas via its interfaces. The ABR keeps a copy of the link state databases of both the backbone and of the areas which it is connected to in its memory. Autonomous system boundary router (ASBR) is the router which connects an autonomous system and a non-OSPF network. ASBR remains as a gateway to connect an AS to other routing protocol networks such as EIGRP, RIP, BGP, static and so on. It also used to exchange routes which it learned from other AS number through its own AS number. The router which has all its interfaces and neighbor relationship within an area is called as Internal Router (IR). All the routers which are part of the backbone area are backbone router (BR). It may be a backbone internal router or an area border router. ABR is also a BR since it is connected to backbone via a physical or logical link. From OSPF configurations the routers elect designated router (DR) and backup designated router (BDR). A designated router (DR) is elected on a multi-access network segment to exchange routing information with other routers. The job of the DR is multicasting the router update which it received to the other routers. So other routers listen only to the DR instead of listening to broadcast. DR elected to act as one-to-many instead of many-to-many routing update. So updates are sent only to the DR router and it updates all the routers within the segment. This election mechanism reduces the network traffic a lot. The router with the highest priority among the routers will be elected as the Designated Router. If more than one router has same priority Router ID will be used as the tie breaker. In multi access networks Backup designated router (BDR) must be elected next. BDR is a standby router for DR if DR becomes unavailable. The router which becomes the second in the election process will be the BDR. If both become unavailable the election process will be held again. The BDR receives updates from adjacent routers but doesnt multicast them. OSPF adjacency is established to share the routing updates directly to each other. Establishing adjacency depends on the OSPF configuration in routers. From OSPF configuration point of view networks can be categorized as, Broadcast multi-access In broadcast multi-access networks routers have direct access to all the routers via direct links. Some of the examples for Broadcast multi-access are Ethernet, and Token ring. Through Ethernet multiple devices are allowed to access the same network. So when an OSPF packet is sent on the network itll be broadcasted and all the routers will receive it. With OSPF DR and BDR should be elected for broadcast multi-access network. Non-broadcast Multi Access (NBMA) NBMA network allows data transmission over a virtual link or across a switching device between the hosts in the network. Typical examples for NBMA are X.25, ATM and Frame relay. In NBMA, all the devices are connected through a shared medium. It doesnt support broadcast or multicast. Instead, OSPF sends the hello packet to each router in the network one at a time. As a result OSPF should be configured specially and the neighbor relationship should be specified properly. Power Line Communication (PLC) is also categorized as Non-broadcast Multiple Access network. Point-to-point In Point-to-point connections, both routers endpoints are connected point to point to provide a single path for communication. High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) could be the examples for P2P. In point to point network, it may be a serial cable connecting the endpoints directly or a virtual link which connects two routers apart in greater distance. But both scenarios eliminate the need for election of DR and BDR in OSPF implementation. The neighbors will be identified automatically with P2P. Point-to-multipoint Point-to-multipoint topology refers to connecting a single interface of a router to multiple destination routers. All the devices in Point-to-multipoint will be in a same network. Conventionally the routers could identify their neighbors automatically in broadcast network. Enhanced Interior Gateway Routing Protocol (EIGRP) Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary, hybrid protocol owned by Cisco. It was developed by CISCO as a successor of IGRP. Though its not a version of IGRP; its completely different. It behaves as both link state and distance vector protocol. Its a classless protocol as well. Administrative distance for EIGRP is 90. It exercises a different algorithm from previous protocols which is known as Diffusing update algorithm (DUAL). DUAL algorithm ensures to find the best path with faster convergence and loop free routing. EIGRP supports unequal cost balancing as well. It uses multicast address 224.0.0.0 to send updates. EIGRP also use autonomous system number. It maintains three types of tables, Neighbor table maintains data about the neighboring routers which are directly connected and accessible. Hello packets with timers are employed to keep the record with precision. Topology table The topology table contains all the destinations advertised by its neighbor routers. It maintains the table as an aggregation of all advertised routes with adjoining metrics. In addition from the aggregation a successor and feasible successor will be identified and stored. The successor path is the best path to reach a destination based on the least sum of advertised distance from a neighbor and the distance to reach that neighbor. This route will be installed in the router. The optional feasible successor has the metric higher than successor, which qualify to be the next successor. This route doesnt get installed but kept in the topology table as an alternative. The router will automatically add the feasible route as successor when the successor becomes unavailable. The state of a route for destination can be marked as active or passive in the table. When the router find successor unavailable with no backup routes it query the neighbor routers. This state is called a s active and when it gets a reply it changes to passive state. This whole process ensures a loop free path for destinations. Routing table This table store the actual routes for all destinations. This table is build from the previous topology table calculation. A successor route and an optional feasible route will be stored in this table. Network Modelling Basically Network modelling is a main concept of network deployment into network planning, designing and implementation. Modelling is used to describe concept of the project. Network analysis and network designing should be defined before create network modelling. Define the requirements, objectives and problem areas should be created in network analysis part. So at this stage describe about the router and routing concept towards how they are using routing protocol to route the packets and how to configure with those routing protocols. After this stage implementation part considers all fulfil requirements. Finally design part where we define appropriate network deployment. Network modelling is giving a lot of helps to think more ideas to create best possible network model. Because of that I selected OPNET simulator in this project to create network models. OPNET Modeller 15.0 (Optimized Network Engineering Tools) Currently OPNET is one of the best tools among many network modelling tools in the network technologies. It provides us to designing network model using all kind of network equipments. Networking designers are gained better understanding of designing before development process. It helps to reduce time manner and expense of prototyping hardware equipments. We can able to analyse, measure the performance and behaviour of proposed Model system from event simulations. OPNET tool contains many features. There are main three editors in the OPNET Æ’ËÅ" Project Editor: It contains graphical interface of network topology nodes such as subnet, hub, switch, router, etc and much kind of links to communicate among those devices. All are designed with graphical user interface such as easy to end users. Æ’ËÅ" Node Editor: It is describe clear picture of internal architecture of the nodes by investigate the data flow between useful nodes. Node model can send, receive and create network traffic with other node model through the packets. Æ’ËÅ" Process Editor: It describes about the processes and events create by implementation of specific process operation on the network such as behaviour and functionality of the node model. During the simulation time each node model may create a process of any event, so that it gives the state of process and its functionality. Completely we cant compare simulated network with real world time traffic. But it will give some of information such as how much required bandwidth, where the jamming can occur and how to handle to avoid these problems.

Friday, October 25, 2019

Victorian Language Essay examples -- Victorian Era

Victorian Language The fact of the matter: â€Å"Nobody speaks at all like the characters in any novel, play or film. Life would be intolerable if they did; and novels, plays or films would be intolerable if the characters spoke as people do in life† (Abercrombie 1965). So what was the real way of speech? Fiction was generally thought to be an accurate portrayal of reality; â€Å"true life† (Chapman 1). It was unfavorable if it stressed credulity too far. Therefore, fiction is our main source of information; it is our main source to the reality of speech for the Victorians. Greater mobility and expansion of communication of the Victorian era brought together regional groups, thus increasing the complexity of the variations in the English language. Consequently, pronunciation evolved as an indicator of social prestige (Chapman 6-8). Two categories of speech developed: Standard and Non-Standard speech. Formation of Standard Speech vs. Non-Standard Speech The Education Act of 1870 established the school as a ‘melting pot’ for upper and middle class children and the speech boundary had to be resolved. Thus a uniform accent (Standard speech) was created and pupils who refused to accept this new accent or who could not adapt to this new way of speech were severely punished. Peer pressure was also an issue because the new boy would have to adapt to the new form of speech in order for his peers to accept him or to merely avoid bullies (Chapman 12). Non-Standard Speech This type of speech was also synonymous with lower class slang, â€Å"cockney† or the way in which the ‘uneducated’ communicated, specific to the East End (Chapman 19). The infamous â€Å"cockney† was native to the East End, as remains today. Cockney dialect allowed spelling and ... ... word ‘affidavit,’ yet Rogue Riderhood mispronounces it as an â€Å"Alfred David† (Dickens 12). Therefore, language in the Victorian era was important in ranking members of classes and occupations. Language had the potential to assess and reflect upon one’s regional, educational, occupational and family background. The distinctions in speech amongst three different social ranks are evident in the following excerpt from an adaptation of Elizabeth Gaskell’s North and South. Episode 1, Clip 3. http://www.bbc.co.uk/drama/northandsouth/episode1.shtml Works Cited Chapman, Raymond. Forms of Speech in Victorian Fiction. New York: Longman, 1994. Dickens, Charles. Our Mutual Friend. 1865. Introduction and notes Adrian Poole. New York: Penguin, 1997. Phillipps, K.C. Language and Class in Victorian England. Ed. David Crystal. New York: Basil Blackwell Inc, 1984.

Thursday, October 24, 2019

Background and Structure on the United Nations

Student Handout Background on the United Nations Basic Facts of the United Nations The United Nations was founded in 1945 with the mission to maintain world peace, develop good relations between countries, promote cooperation in solving the world’s problems, and encourage a respect for human rights. It uk/why-nations-fail-chapter-5-review/">provides the nations of the world a forum to balance their national interests with the interests of the global whole. It operates on the voluntary cooperation and participation of its member nations. Nothing can be accomplished without their agreement and participation.Currently, there are 191 member countries with different social, political, and economic systems. These countries agree to peacefully settle disputes, refrain from threatening or using force against each other, and refuse to help other nations that oppose the U. N. ’s mission. Headquartered in New York City, the U. N. is a separate and independent entity with its own f lag, post office and postage stamps, and its buildings sit on international territory. Six official languages are used at the U. N. – Arabic, Chinese, English, French, Russian, and Spanish. Creation of the United Nations The creation of the U.N. resulted from a long history to promote international cooperation. Nineteenth century European philosophers and statesmen like Immanuel Kant had proposed a federation of nations dedicated to protecting the rights of smaller countries caught up in struggles between larger ones. The federation would punish any nation that committed an act of aggression against another. This idea became a reality after World War I with the establishment of the League of Nations. The League was the brain-child of U. S. President Woodrow Wilson and some of the victorious European powers.During its operation from 1920 and 1946 it enjoyed a few notable successes but ultimately faltered when it couldn’t prevent World War II. It suffered from two major flaws: 1) several of the world’s most powerful and influential countries were not members, including the Untied States; 2) The League required unanimous agreement to oppose aggression. If any member disagreed, the League was powerless to act. Thus, when Germany, Italy, and Japan took military action against fellow members of the League in the late 1930s, they would not agree to take action against themselves to stop their aggression.In the end, the League failed in is primary mission to prevent another world war. While fighting the Axis powers of Germany, Italy, and Japan during World War II, United States President, Franklin Roosevelt, British Prime Minister Winston Churchill, and Soviet Premier Joseph Stalin met several times between 1941 and 1945 to develop an international peacekeeping organization with the goal of preventing future wars on the scale of World War II. In April of 1945, even before the war was officially over, representatives from 50 countries met in San Fr ancisco to create the charter for the United Nations.Similar to the League of Nations, the U. N. was created to promote international peace and prevent another world war. To avoid the structural failures of the League, the U. N. founders gathered the support of the world’s most powerful nations. U. S. participation was secured when the U. N. headquarters were located in New York City. To provide enough power to impose and enforce its will, a security council was developed with authority to take action against aggressor nations. To reassure powerful nations that their sovereignty would not be threatened, the U.N provided veto authority over its actions. The five victors of World War II – the U. S. Britain, France, the Soviet Union (which Russia gained at the break up of the U. S. S. S. ) and China – received this veto power. A veto provides any one of the five permanent Security Council members the authority to reject any U. N. resolution. The Structure and opera tion of the United Nations Accomplishments of the United Nations: During its 60-year history, the U. N. has achieved many remarkable accomplishments in fulfilling it goals.The U. N. has peacefully negotiated 172 peace settlements that have ended regional conflicts and is credited with participation in over 300 international treaties on topics as varied as human rights conventions to agreements on the use of outer space and the oceans. The U. N. has been involved in every major war and international crisis since its inception and has served as a catalyst for the prevention of others. It authorized the international coalitions that fought in the Korean War (1950-53) and the Persian Gulf War (1991).It provided a forum for mediation in the ArabIsraeli conflict resulting in numerous peace accords and keeping the conflict localized to the Middle East. During the Cuban Missile Crisis in 1962, the U. N. was used as a podium by the United States to challenge the Soviet Union’s placeme nt of nuclear missiles in Cuba. The embarrassment of public indictment was instrumental in forcing the Soviets to remove the missiles. U. N. military forces (provided by member states) have conducted over 35 peacekeeping missions providing security and reducing armed conflict.In 1988, the U. N. Peace-Keeping Forces received the Nobel Prize for Peace. The U. N. has also set up war crimes tribunals to try war criminals in the former Yugoslavia and Rwanda. The U. N. has also made great strides in raising the consciousness of human rights beginning with the â€Å"Universal Declaration of Human Rights† adopted by the General Assembly in 1948. The U. N. Commission on Human Rights through its investigations and technical assistance in promoting free and fair elections has helped many countries in the transition to democracy. The U. N. s intense attention to specific human rights abuses helped end apartheid in South Africa. In its humanitarian efforts, more than 30 million refugees f leeing war, persecution, or famine have received aid from the U. N. High Commissioner for Refugees. The International Court of Justice has helped settle numerous international disputes involving territorial issues, hostage-taking and economic rights. Since the end of the Cold War, the U. N. has become increasingly involved in providing humanitarian assistance and promoting improvements in the health of the world’s peoples.In addition to providing relief for humanitarian crises caused by international conflicts, the U. N. can also respond to emergencies caused by natural disasters such as floods and hurricanes. On a proactive level, the World Health Organization (WHO) and other U. N. affiliated groups have eliminated smallpox and are actively pursuing a battle against AIDS, tuberculosis, and malaria around the world. The WHO played a significant role in diagnosing and containing the spread of severe acute respiratory syndrome (SARS) in 2003. U. N. rograms, like the United Nati ons Children’s Fund (UNICEF) have saved and enriched the lives of the world’s children through immunization programs for polio, tetanus, measles, whooping cough, diphtheria and tuberculosis. The lives of over 3 million children a year have been saved. The U. N. operates under the principle that promoting economic and social development will help bring about lasting world peace. The United Nations Development Program provides economic assistance through expert advice, training, and limited equipment to developing countries.The U. N. Development Program coordinates all the U. N. efforts in developing nations and has had success in part because it is not perceived as an outside group threatening a developing countries’ authority or degenerating it to colonial rule. In addition to promoting workers rights and the right to organize and bargain for better pay and working conditions, the U. N. has also played a significant role in improving agricultural techniques and increasing crop yields in Asia, Africa and South America. The U.N. has also helped developing nations obtain funding projects through the International Bank for Reconstruction and Development, also known as the World Bank. A related U. N. agency, the International Monetary Fund (IMF) promotes international cooperation on monetary issues and encourages stable exchange rates among nations. Sources: Wikipedia Encyclopedia: http://en. wikipedia. org/wiki/History_of_the_United_Nations Encarta Encyclopedia: http://encarta. msn. com/encyclopedia_761564986/United_Nations. html

Wednesday, October 23, 2019

What Was the Renaissance Like

1 . What was the Renaissance like? Account for its main features. The term â€Å"Renaissance† is from the same French word, meaning â€Å"rebirth. † It comes from the Italian Reenactments, â€Å"Re† meaning â€Å"again† and â€Å"nascence† meaning â€Å"be born. † The Renaissance was a cultural movement that spanned roughly the 14th to the 17th century, beginning in Italy in the Late Middle Ages (Tuscany) and later spreading to the rest of Europe. Its influence affected literature, philosophy, art, politics, science, religion, and other aspects of intellectual enquiry.As a cultural movement, the Renaissance period encompassed a rebellion of lassie-based learning, the development of linear perspective in painting, and gradual but widespread educational reform. Traditionally, this intellectual transformation has resulted in the Renaissance being viewed as a bridge between the Middle Ages and the Modern era. Although the Renaissance saw revoluti ons in many intellectual pursuits, as well as social and political upheaval, it is perhaps best known for its artistic developments and the contributions of such polymaths as Leonardo dad Vinci and Michelangelo, who inspired the term â€Å"Renaissance man†.The leading intellectual trait of the era was the recovery, to a certain degree, of the secular and humane philosophy of Greece and Rome. Another humanist trend which cannot be ignored was the rebirth of individualism, which, developed by Greece and Rome to a remarkable degree, had been suppressed by the rise of a caste system in the later Roman Empire, by the Church and by feudalism in the Middle Ages. Medieval Christianity restricted individual expression, fostered self-abnegation and self-annihilation, and demented implicit faith and unquestioning obedience.Furthermore, the Church officially ignored man and nature. Http://www. Timpani. Com/renaissance. HTML Literature (characteristics): Emphasis on classical studies in t he expanding universities. -Increasing literacy among the laity. -Learning increased rapidly. -New schools were founded throughout Britain, in rural villages as well as cities. -Growth of a critical, skeptical type of scholarship, leading to scientific inquiry. -Increasing trade leads to individual wealth, general prosperity, nationalism, and materialism. -Gradual movement from unquestioned religious beliefs toward a more human- centered philosophy. Emphasis on human potential, not God's power, believing one's role in life should be action, not religious contemplation. Language: English had triumph over French as the spoken language. It became the language of scholarship, replacing Latin, and the language of theology. It had no bounds to its development. As regards vocabulary, much growth came from the learned words borrowed from Latin and Greek, but explorers and overseas tradesmen brought an influx of words from many foreign languages. New words were invented daily. Spelling was e rratic.In pronunciation, many words were stressed on different syllables from the ones currently emphasized. Changes in grammatical elements: -Pronouns: ye was replaced by you. -Verbs: the endings the changed to s. . Explain how the Philosophy of Humanism differs from the ideals held during the Middle English Period. Humanism is a system of thought that considers that solving human problems with the help of reason is more important than religious beliefs. It emphasizes the fact that the basic nature of humans is good. It is secular-minded – religion is no longer the orientation.Humanism was not a philosophy per SE, but rather a method of learning. In contrast to the medieval scholastic method, which focused on resolving contradictions between authors, humanists would study ancient texts in the original, typically Ritter in Latin or ancient Greek, and appraise them through a combination of reasoning and empirical evidence. A) Mention the key representatives among Humanists wri ters -Sir Thomas More: he was a humanist and lawyer, the first layman to become Chancellor. Best known for his work Utopia (no place or good place), which tells of an ideal state with the truly representative government.It was written in Latin, addressing to all scholars in Europe (names were in Greek). He describes his ideas of a perfect society. His work gave rise to the Utopian literature (new genre), presented as an ideal of perfection. Tyndale: was the first translator of the Renaissance, a defender of the faith who creates new words that didn't exist in English. His work as a translator was opposed in England and he was forced to live in Germany, where he produced the first English version of the Bible between 1525 and 1531 – King James: made the first authorized version of the Bible.He used an archaic language so as to sound formal, show respect, and create a more distant atmosphere. It was a collected work of all the previous translations. – Sir Thomas Eliot: w ith â€Å"The book named the Governor† -Protestant/Anglican: Tyndale, Coverall Protestant/Calvinist: Geneva Bible -Catholic: Today Bible b) Focus on Thomas More and explain why his Utopia is a Renaissance literary work Sir Thomas Mere's most famous work is essentially a dialogue between More, and an imaginary character Raphael Hathaway.In the conversation between the two men, More learns that Hathaway is a traveler who has been all over the world with America Vesuvius and had been left to explore the island of Utopia (nowhere). Hathaway explains how life in England has many evils in society in all aspects of life from political to social aspects. He then explains how the people of Utopia handled Hess everyday problems to make it the perfect nation. Sir Thomas Mere's Utopia is a satire – the name Raphael Hathaway meaner â€Å"dispenser of nonsense†-.The book also makes fun at many aspects of society in England during the time period such as the severity of crimin al law and the growing luxury of the wealthy class at the expense of the poor class's life of increased hardship. More can successfully accomplish the feat of criticizing the government because the character that is making the critical analysis of England is made up. By using this technique in Utopia, More can publicize his own thoughts on the nation thou being called out for treason to the crown. 3. Focus on the Sonnet Sonnet: short song, a lyrical poem in 14 lines. ) How does the Patriarchal sonnet compare to the Elizabethan sonnet? Patriarch wrote sonnets that consider love in an early renaissance sense; that is, they idealism the beloved lady, and they focus on the divine qualities she possesses, while lamenting the pain the speaker feels in not being with her. Each sonnet of fourteen lines considers one proposition in the opening octave of eight lines, and then considers the reverse or opposing view in the final sestets, or six lines. The switch from one view to its opposite is called the Volta.Shakespeare wrote sonnets in a much later period, and pokes fun at the idea that his beloved lady could possibly represent divine beauty. In addition, he took the English form of the sonnet, developed by the Earl of Surrey and Thomas Wyatt, which included a final rhyming pair of lines, called a rhyming couplet. Shakespeare then pursued the same proposition throughout the entire sonnet until the very end, often pushing the Volta to the final couplet. -Structure of the Sonnet Patriarchal sonnet: -Each line has 5 feet consisting of either one unstressed syllable followed by en stressed syllable (iambic pentameter).Each line has 10 syllables in all. -The poem is divided into two parts: the octave (8 lines – divided in two groups of 4 lines) and the sestets (6 lines – divided in two groups of 3 lines). -Between the octave and the sestets two main ideas are compared Octave: presentation, problem, argument, question. Sestets: solution, conclusion, answer. Or balance -The rhyme scheme at the end of each line of the octave is: baobab; the sestets often varies, CDC or ceded. Elizabethan, Shakespearean or English sonnet: -Each line is in iambic pentameter.The poem is divided into four parts: 3 quatrains (4 lines each) and a final couplet (2 lines). -The rhyme scheme is usually: ABA CDC fee / egg – Shakespeare. ABA Bcc CDC / e – Spencer. Http://suites 01 . Com/article/differences-between-the-patriarchal-and-the- Shakespearean-sonnet-a374838 b) Why can sonnets be equated to miniatures? C) Which is the function performed by the rhyming couplet in 16th century sonnets? The 6th-century sonnets were written to display the great cleverness, sophistication, and skill of the poet.Generally speaking, sonnets were more self- centered than their love rhetoric might initially suggest. Although they often purport to express private emotions from the poet to a beloved, they were usually meant not for private communication, but for â€Å"pu blic† consumption amongst a circle of Courtly readers. In other words, they were written to impress others rather than to convey genuine emotion. The great majority of 16th-century sonnets were written to explore unrequited romantic love. It was assumed that the speaker would be a besotted man and the beloved a resistant, disdainful, or otherwise unavailable woman.The speaker spends much of his time trying to persuade the beloved to sleep with him. Patriarch developed a number of conventions for describing love's varied pleasures and torments and the beauty of the beloved. Sonnets abound in wordplay: puns, double-entendre, multiple meanings, and clever figures of speech. The most common figures of speech used in 16th-century sonnets include the conceit, the blazon, and personification. Http://www. Lima. Ohio-state. Du/debarks/sonnet. HTML d) Which are the current themes in sonnets? Compare Patriarchal themes to Shakespearean themes. Courtly love: love as pain (unrequited); lov e as a labyrinth; love as passion stronger than will; loves as chains – you cannot escape. Art. -Time: poetry could stop the passage of time – preserve a particular moment. -Death. -Historical figures -Love at first sight, obsessive yearning and loveliness, frustration, love as parallel to feudal service; Patriarchal themes: The lady as ideally beautiful, ideally virtuous, miraculous, beloved in heaven, and destined to early death; Love as virtue, love as idolatry, love as sensuality; The god of love with his arrows, fires, whips, chains; War within the self- hope, fear, Joy, sorrow.Conceits, wit, urbane cleverness; disputations and scholastic precision; Allegory, personification; Wooing, exhortation, outcry; Praise, blame; self-examination, Self-accusation, self-defense; Repentance and the farewell to love. Shakespeare themes: One interpretation is that Shakespearean sonnets are in part a pastiche or parody of the three-centuries-old tradition of Patriarchal love sonn ets; Shakespeare consciously inverts conventional gender roles as delineated in Patriarchal sonnets to create a more complex and potentially troubling depiction of human love.He also violated many sonnet rules, which had been strictly obeyed by his fellow poets: he plays with gender roles, he speaks on human evils that do not eve to do with love, he comments on political events, he makes fun of love, he speaks openly about sex, he parodies beauty, and even introduces witty pornography e) Account for the main contributions made by renaissance consenters: Wyatt, Surrey, Lily, Sidney and Spencer. To do so, focus in the themes these consenters privilege and the main devices they employ. Provide 2 examples of their poetry. ** Wyatt: Betrayal is a prevalent theme in Watt's work.Typically, the narrator is the wronged person and the poem serves to expose betrayals involving affairs of the heart along with political and social treachery. In Watt's work, the fickle nature of women can rear it s head at any time and a courtier could be given the cold shoulder on the whim of the king – especially true in Henry Vic's time. For example, in ‘They Flee From Me', the narrator details being forsaken both by a woman he loved and by acquaintances who once sought his guidance. Watt's narrators experience lash out from the pain but also dejectedly accept their position.In ‘My Heart I Gave Thee', the narrator realizes that to pursue the one who wronged him is pointless. Still, the betrayed are not without their cutting words and extreme motions. ‘Lug! My Fair Falcon', believed to have been written during Watt's imprisonment, contains vivid imagery (like lice away from dead bodies they crawl') to illustrate the cruelty of betrayal. Even God abandons him. He follows Patriarchal theme of courtly love ** Henry Howard, Earl of Surrey The tight rhyme scheme is not Surrey's only sonic device: there's plenty of alliteration, too. Brittle beauty†, â€Å"tickle treasure†, â€Å"slipper in sliding†, â€Å"Jewel of Jeopardy† are among the most noticeable examples, but almost every line makes use of the device to some degree. Influenced by Wyatt, he popularizes English form of sonnet while adding the theme of nature. He did much to establish the tradition of courtly concerned with arts and letters. He translated the Amended, making first use of blank verse (unrushed iambic pentameter). ** John Lily He is best known for Pushes (puppyish – style) which has trivial and twisted plots but was read for its alliterative style and extravagant language.He is involved in the writing of Drama. He takes his imagery from classical learning. There are classical allusions, symmetry, parallelism, alliteration. People loved it so much that he wrote a second part of Pushes. * Sir Philip Sidney He was the first English literary critic. He argues that poetry has the function of both teaching and delighting. The great end of learning is the living of a virtuous life, and the inspired poet can lead readers to the highest truths. Prose: -Arcadia: as Lily, he uses the prose for ornamental use and has a twisted plot. Device used: pathetic fallacy, beyond personification.He gives inanimate objects willing and feelings of their own. He uses imagery from nature – sounds more fresh. Poetry: -Catastrophes and Stella: first sequence of related sonnets in English. Catastrophes (star lover) – Stella (star) *Edmund Spencer: He was the first important modern English poet. His poetry continues in the allegorical verse tradition of the Middle Ages. His allegories, however, were much more complex than previous ones on three levels: moral, historical, and personal. Allegories were suggested by the character's names: Vanity, Queen of Pride, Gluttony.Readers should be alert to the multilevel meaning of each character. Spencer divides a nine line stanza, rhyming Babcock, now known as the Spenserian stanza. The first eigh t lines of the stanza are in iambic pentameter, the last is an Alexandrine (iambic hexameter). Faerie Queen: culmination of allegorical tradition. It brings together history, folklore, patriotism, political thought, humanism, Protestant idealism, epic and romance, etc. Amaretto: a sonnet sequence f) Analyses The Hind by Wyatt and the sonnet that begins â€Å"Since brass, nor stone†¦ By Shakespeare. The Hind by Wyatt Wyatt uses the sonnet form, which he introduced to England from the work of Patriarch. The Patriarchal sonnet typically has 14 lines. The first 8 lines, or octet, introduce a problem or issue for contemplation and the remaining six lines, or sestets, offers a resolution or an opinion. Wyatt uses iambic manometer. This meaner that there are five pairs of syllables, each with the stress on the second syllable. It is the most common rhythm used in traditional poetry and was used by Shakespeare in his sonnets, poems and plays.Iambic pentameter, though a regular rhythm, was thought to be closest to ordinary speech patterns, so it is an attempt to imitate but also elevate the sounds of everyday conversation. By opening the poem with a question, the narrator challenges the reader. There is an invitation in his words, and the use of an exclamation mark at the end of the first line implies excitement at the idea. As hunting was a popular pastime in the court of Henry VIII, this suggests a poem along the lines of Henry Vic's own most famous lyric, ‘Pastime With Good Company.However, problem within the octet is revealed in line 2 as the poet tells us that he is no longer part of the hunt. An exclamation mark is used in line 2, again to emphasize emotion, but this time frustration and regret. This is a passionate yet contradictory introduction. Line 3 makes use of assonance to reveal the poet's earlier hunting efforts as Vain travail' which has tired him out to the point of physical pain. We can see that the memo is an extended metaphor for the end of a relationship. The metaphor is an excellent choice in terms of the Tudor court and the possible situation to which it is attributed.The poet is now at the tail end of the pursuit, although, he says in line 5 that his mind has not deviated from the hunt. Wyatt makes use of enjambment (breaking a phrase over more than one line of verse) and caesura (concluding a phrase within the first half of a line of verse) across lines six and seven to highlight the discord represented by the end of the relationship as he subverts and challenges his own chosen structure. In line 8, the poet uses the concluding line of the octet to stress the futility of his former quest. He uses the metaphor of catching the wind in a net to emphasize the pointlessness of his chase.The final sestets begins with line 9 reiterating the appeal to those who wish to join the hunt, but he continues in to line 10 to explain that the pursuit will be in vain for them too. Again there is an exclamation mark to indicate an intensity of feeling. Line 11 continues the extended metaphor as an explanation of why his hunt of this ‘hind', and that of others who pursue her, is so pointless. She has a bejewel collar, indicating she already has an owner. Her collar is adorned with the Latin phrase ‘Noel Me teenager' meaning touch me not'. This expression refers to a phrase spoken by Jesus to Mary Magdalene in the Bible.The design also includes the name of her owner – for Career's I am. ‘ If we identify the poem as referring to Anne Volley, then her new owner would be King Henry VIII; the pair were married around the time when this poem was composed and Wyatt could no longer compete for her affections. By describing Henry using the allusion of Caesar, Wyatt bestows on his monarch the qualities of a reputation of greatness and incisive rule. Caesar was, like Henry, a leader early in late teens, a handsome and strong young man and was significant in the political and aesthetic changes and developments of his realm.Both were literate, charismatic and influential. However, other less favorable parallels can be drawn. Both Caesar and Henry VIII incurred huge debt during their respective offices. There were many subjects who were held captive, sometimes executed, on charges of treason. Caesar faced questions regarding his sexuality and his unsuitable choices of women. Wyatt may also be alluding to these less appealing aspects of Caesar in his comparison if we see the suasion in the poem to be borne of frustration and anger. Http://www. Graveside. Mom/collected-poems-of-sir-Thomas-Wyatt/study- guide/sections/ Sonnet 64 discusses the â€Å"lofty towers I see down-razed,† the â€Å"brass† which is â€Å"eternal slave to mortal rage,† or a victim to war, and the destruction of â€Å"the kingdom of the shore† by the â€Å"hungry ocean. † Here again, â€Å"brass, nor stone, nor earth, nor boundless sea† can escape the ravages of ti me. Line 3 asks, â€Å"How with this rage shall beauty hold a plea,† characterizing beauty as the plaintiff in a legal dispute. Time is thus characterized as an unfair warrant, against which delicate beauty stands no chance in court.The legal terminology is continued in the following line with the use of the word â€Å"action. † The idea of time's â€Å"rage† links Sonnet 65 to the previous sonnet. In Sonnet 64, â€Å"brass† is described as an â€Å"eternal slave to mortal rage. † The term â€Å"rage† in association with time is also seen in Sonnet 13, which refers to the â€Å"barren rage of death's eternal cold. † Lines 6-8 present a metaphor of the seizure of a city, which would be the final destruction of war. In line 6, â€Å"the wrathful siege of battering days,† refers to ruin and