Wednesday, December 25, 2019

Celebrity Endorsed Advertising - 2343 Words

In today s world of fiercely competitive and highly fragmented market, every company tries to maximise the share of its target market segment to optimise its profit. To achieve this goal, companies try a combination (or mix) of various marketing tools and techniques as their marketing strategy. Advertising is one of the important components of the communication mix through which companies convey their offerings to present and potential customers and general public as well. This essay will discuss the various aspects of celebrity endorsement as a prevailing advertising technique along with critical evaluation of the phenomenon of multiple celebrity endorsement as a marketing tool and the and will conclude with taking on overview of†¦show more content†¦Furthermore there are other researches as well which suggest that the approach of using a celebrity to endorse a product can not be viewed as a general practice of using any celebrity for any product endorsement. Pornpitakpan (2003), while discussing match-up hypothesis, describes the results of a study by Erdogen et al (2001) which suggests that British advertising agency managers considered various criteria like celebrity- target audience match, celebrity-product match, overall image of the celebrity, cost of hiring the celebrity, celebrity trustworthiness, controversy risk, celebrity familiarity, celebrity prior endorsements, celebrity likeability, risk of celebrity overshadowing the brands, celebrity expertise, celebrity profession and celebrity physical attractiveness. A match between the target market and the endorser is important for effectively transmitting right message to target audience. For example, the advertisements which are produced by Pepsi, are mostly targeted for youths and so the celebrity endorsers that they use in their advertisements are young personalities. The match up hypothesis goes true for the multiple celebrity advertising as well. A good example of this is the Pulse Polio campaign taken up in India to eradicate the polioShow MoreRelatedThe Consumer Attitudes Towards Brands Essay1316 Words   |  6 Pagesrevealed that there are declining returns attached with involving celebrities in advertising campaigns. For instance, the demands for remunerations by celebrities are rising with many celebrities endorse several brands at the same time and may at times, shift their endorsement to competing brands. The recent negative publicity generated by some celebrities increase the risk of negative returns; however, since the use of celebrities for brand promotion is constantly practiced by sponsors, it depictsRead MoreCelebrity Endorsement Marketing Campaigns1497 Words   |  6 PagesOctober 20, 2008 Celebrity Endorsement Marketing Campaigns Celebrity endorsement is a billion dollar industries today (Kambitsis et al., 2002) with companies signing deals with celebrities hoping that they can help them stand out from the clutter and give them a unique and relevant position in the mind of the consumer. According to Solomon (2002), the reasons for using celebrity endorsement involves its potential to create awareness, positive feelings towards their advertising and brand. ResearchRead MoreHerbal Essences: In Pursuit of Beautiful Hair Essay1396 Words   |  6 Pagesstyles of the time. Herbal Essences was only making their target audience natural so as to attempt to reach the largest amount of consumers. About thirty years after the original debut of the Herbal Essences shampoo product, a drastic change in advertising became noticeable. Because an entirely new generation had appeared and society had changed in every aspect, beauty needs were different. In a 2002 magazine advertisement for Jane, Herbal Essences appears with a completely different approach to attractingRead MoreEffective Use of Celebrity Endorsement as an Advertising Strategy2892 Words   |  12 Pagesunderstanding of effective use of celebrity endorsement as an advertising strategy. The types of sources covered when conducting this research included journals, articles, books and dissertation which relevant to the celebrity endorsement. There are four main parts need to be emphasis, first is the history and background, second is evaluation of three theories model; which consists of TEARS model shows celebrity play an important role in facilitating advertising effectively, The Meaning TransferRead More Celebrity Puppe ts Essay1086 Words   |  5 PagesCelebrity Puppets The concept of using sports stars to market non-sport items has soared to new heights. Every corporation in the world is trying to get the edge over their competitors. The classic example is that of the â€Å"Cola Wars.† During the 1980s, Pepsi and Coca Cola began an advertising slugfest, in which Pepsi emerged victorious by using Madonna and Michael Jackson as puppets in their commercials. These two companies, as well as thousands of others, have taken advantage of exposing celebritiesRead MoreEffective Use of Celebrity Endorsement as an Advertising Strategy2878 Words   |  12 Pagesunderstanding of effective use of celebrity endorsement as an advertising strategy. The types of sources covered when conducting this research included journals, articles, books and dissertation which relevant to the celebrity endorsement. There are four main parts need to be emphasis, first is the history and background, second is evaluation of three theories model; which consists of TEARS mode l shows celebrity play an important role in facilitating advertising effectively, The Meaning TransferRead MoreImpact of Celebrity Endorsements on Brand Image1321 Words   |  6 PagesImpact of Celebrity Endorsements on Brand Image Introduction Celebrities are people who enjoy public recognition by a large share of a certain group of people. Whereas attributes like attractiveness, extraordinary lifestyle or special skills are just examples and specific common characteristics that are observed and celebrities generally differ from the social norm and enjoy a high degree of public awareness. The term Celebrity refers to an individual who is known to the public actors e.gRead MoreLiterature Review Celebrity Chef4456 Words   |  18 PagesLiterature search, methodology used 5 2.3. Description of sub-topics 6 3. SUMMARY OF LITERATURE REVIEWED 8 4. A REVIEW OF CELEBRITY ENDORSEMENT 9 4.1. Effectiveness of celebrity endorsement 9 4.2. The consumer 10 4.2.1. Association to celebrity endorsement 11 4.2.2. Perception of association 12 4.2.3. Attitudes towards the endorser 12 4.3. Positive or negative effects of celebrity endorsement 13 4.4. Purchase intentions 14 5. CONCLUSION 15 5.1. Implications for practitioners 15 5.2. ImplicationsRead MoreQualitative Research and Celebrity Endorsement24767 Words   |  100 PagesThe Effectiveness of Celebrity Endorsement in India Abstract   The practice of celebrities being used for rendering services other than performing their actual job as either an actor or an athlete, such as endorsements has proliferated over time. Despite the cost and the risks involved with this technique of advertising, it is been used quite extensively in the present era. The instrument of celebrity endorsement has nowadays become a pervasive element in advertising and communication managementRead MoreEffectiveness Of Celebrity Endorsement On Consumer Brand Preference2728 Words   |  11 Pages Effectiveness of Celebrity Endorsement on Consumer Brand Preference Submitted by Aakash Pandya Table of Contents 1. Introduction 3 1.1 Background of the Study 3 1.2 Research Problem 5 1.3 Research Objective 6 1.4 Significance of the study 6 II. Literature Review 7 2.1 Hypothesis 8 2.2 Significance of the study 9 III Research Methodology 10 3.1 Research Design 10 3.2 Population 10 3.3 Sample Size and Sampling Method 10 3.4 Data Collection 11 3.5 Analysis and discussion

Tuesday, December 17, 2019

William Shakespeare s Poetry Of Love - 1612 Words

â€Å"But, soft! What light through yonder window breaks? It is the east, and Juliet is the sun.† (Romeo and Juliet 2.2 1-3). As you are aware this session will focus on the poetry of William Shakespeare. Shakespeare was a world-renowned poet and playwright. Shakespeare had a romantic heart and his poetry is shaped by love. His poems usually depict the passion and sacredness of relationships. By comparing two poems from William Shakespeare it is shown how he has been able to articulate the poetic theme of love. This seminar will analyze and explore two of Shakespeare’s poems focusing on the particular theme of love. Shakespeare deals with deep and enduring love, as he applies his past experiences to his poems. Shakespeare’s poems Sonnet 116 and Sonnet 130 are based around the romantic pursuits of his life, and they have similar context but deliver different meanings of what true love is. Throughout Shakespeare’s various relationships and career pathways he was able to find a deep awareness and admiration of love. Shakespeare was famous around the 16th century, where he gained a celebrated recognition for his poetry and playwriting skills. â€Å"Shakespeare wrote 154 sonnets, likely composed over an extended period from 1592 to 1598.† (Mabillard, A. 2000). Shakespeare’s romantic and romantic poetry elevated him to a high status of bachelordom; he was sort after by various ladies of England. â€Å"†¦ He married Anne Hathaway and they had three children †¦ There has been speculation that heShow MoreRelatedComparing And Contrasting Two Sonnets1141 Words   |  5 Pages ‘Sonnet 116’ by William Shakespeare and ‘What Lips My Lips Have Kissed, And Where, And Why† by Edna St. Vincent Millay are both sonnets that discuss companionship and a glimpse of each poet’s experiences. In ‘Sonnet 116â€⠄¢, Shakespeare illustrates how capability is weakened by its metaphysical stereotype and ideals such as, love, while on the contrary, in ‘What Lips My Lips Have Kissed, And Where, And Why† Millay feeds on the chaos between the ideal of love and its harsh reality, heartbreakRead MoreThe Flea By William Shakespeare, Emily Dickinson, And John Donne1521 Words   |  7 PagesPoetry has remained a visceral form of self expression for centuries. Consequently, poetry has no means of resisting the constant shifts in style, prose, and content that come with the times. This is showcased in the works by famous poets like William Shakespeare, Emily Dickinson, and John Donne. William Shakespeare is credited to be a wordsmith ahead of his time for crafting some of the most well known works in literature, Emily Dickinson is considered one of America’s leading female poets of theRead MoreThe Sonnet By Sir Thomas Wyatt1167 Words   |  5 Pagespeople are familiar with poetry; th ey understand their basic concepts and know that some differ in their size and how they rhyme. What some people may not know is that poems are categorized and there are many different types of groups within poetry. There are various types of poetry -- which include the sonnet. The sonnet was introduced by an Italian poet named Francesco Petrarch (1304-1374) who introduced the creation in the 13th century (Applebee 295). He wrote over 300 love sonnets, a great numberRead MoreWilliam Shakespeare s Romeo And Juliet1264 Words   |  6 Pagesdramatist in English literature, Shakespeare occupies a well-known position in the world of talented authors. His canon contains thirty-seven plays, written in the late sixteenth and early seventeenth centuries. Additionally, throughout the years, they continue to sustain critical attention, with the majority of his works circling tragedies, one being Romeo and Juliet. William Shakespeare s Romeo and Juliet speaks to the timeless appeal of star-cros sed lovers. Their love in the beginning borders uponRead MoreThe Sonnet Is Derived From The Italian Word1662 Words   |  7 Pagessong†. The history of the sonnet can be traced back to Italian origin where it influenced the rest of the world becoming a widely used strict poetic form for famous sonneteers. The sonnet sprung around the 13th century, according to the Folger Shakespeare Library it became significant in Italy when Francesco Petrarch first used it. This essay will discuss the Petrarchan sonnet, Spenserian sonnet and the Shakespearean sonnet. We like to think of the sonnet as a typical English form but the sonnetRead MoreWilliam Shakespeare s Sonnet 116981 Words   |  4 PagesWilliam Shakespeare was born in April of 1564. His exact date of birth is unknown. By the time he passed away on April 23, 1616 he was regarded worldwide as the greatest writer in the English language. He was a playwright, poet, and actor. Unfortunately, he passed away at an early age of fif ty-two and the world will never know what other great works he would have produced. â€Å"To the world, he left a lasting legacy in the form of 38 plays, 154 sonnets, and two narrative poems† (â€Å"The Life of WilliamRead MoreLiterature and Other Arts1033 Words   |  5 Pagesanomalous, a form as Friedrich Nietzsche’s Thus Spake Zarathustra was interpreted in Richard Staruss’ music – of course, also assure the logics for most songs. The majority of ballets and modern types of dances are written based only on stories and poetry; in tone occasions, music and dancing â€Å"go along† with a text which is read by a speaker or sang by a choir. The mid 19th century represents the â€Å"peek† of literary, historical, and anecdotal painting despite the Surrealists , this â€Å"statement† inRead MoreJohn Donne as an Innovative Poet1012 Words   |  5 PagesJohn Donne s position as a revered and respected poet is not unjustified. The depth and breath of literary works written about him along with the esteemed position he held among his comtemporaries is evidence of his popularity. As a metaohysical poet his poetry was frequently abstract and theoritical and he utilised poetry to display his learning and above all his wit. He was most certainly an innovative love poet who moved away from the Shakespearian focus on form intensely literary style. He wasRead MoreWilliam Shakespeare s Othello And The English Language1649 Words   |  7 PagesPoet, playwright, actor and dramatist, William Shakespeare is one of the most influential and greatest writers up to this day in poetry and the English language. Known, for hi s many acclaimed works such as his famous plays, â€Å"Othello,† â€Å"King Lear,† and â€Å"Romeo and Juliet† etc. More than four hundred years have passed and William Shakespeare’s work still alive as if it was during the early ages of Shakespeare work. Shakespeare influenced ranges from literature, theater, films and even the English languageRead MoreShakespeare s Sonnets Of William Shakespeare1006 Words   |  5 Pageshis death, the works of William Shakespeare have become well-renowned. One could say that through his work, the subjects of which he wrote and the author himself have become immortalized, receiving acclaim from scholars around the world. One such collection of work that has gained fame and admiration is his sonnets. Shakespeare’s 154 sonnets have received much speculation and criticism over the years regarding their intent and subjects. Although some believe Shakespeare to be the narrator of the

Monday, December 9, 2019

Auditing Networthy Assurance Acknowledgement

Question: Describe about the Auditing for Networthy Assurance Acknowledgement. Answer: Introduction Auditing and Assurance Services assume noteworthy part in acknowledgment of the innate business hazard inside the association. Auditing and Assurance Services assist the business association with knowing their lacks in keeping record of their business exchange and additionally introducing data from record of the monetary occasions, which happened during the time inside the association (Anderson, 2006). The embraced report is about the examining report of a standout amongst the best Australian organization, One Tel, which is gave way inside the six years of its operation inside the field of media transmission. Here the about the elements, which assume imperative part in surveying the intrinsic dangers are examined. Main body Discussion on factors contributing to increased inherent risk assessment There are numerous factors that have essential commitment to the expanded danger evaluation at the financial report level. A portion of the essential variables are deficient structure of the business association, absence of expert morals and also inadequacies in the corporate administration procedure of the association. The top level administration of the organization alongside the key money personals was adulterated (Aven, 2010). The examiners of One. Tel BDO and Ernst Young both were deficient with regards to honesty and one-sided to the administration and the key budgetary expert of the organization. It can be expected that amid the vital business hazard appraisal the elements like wrong structure of the business, lacking of business ethics and inadequacy in the corporate governance might be recognized as all these are the fundamental reason of the collapse of One. Tell and reason for the liquidation of the organization (Ruhnke and Schmidt, 2014). Identification of recognized factors during strategic business risk assessment As per the money related explanation of the organization, it can be seen that in a decisive balance sheet proclamation of the organization that the risk of the organization is reliably expanding in the cash flow statement (Shapiro, 2006). It is watched that the working expense of the organization is much more prominent than the working benefits in contrast with the receipts from the clients the installment to the suppliers and representatives is much more noteworthy and reason for the misfortune in the working of the business to the organization (Centner, 2014). An organization and the administration staffs of that specific organization must have the comparable targets for the fate of the organization. Nonetheless, it can't be seen in all cases, it is frequently watched that the points of the proprietors and administration staffs of an organization is contrast from the goals of the shareholders of the organization and in these cases the issues emerges. This specific circumstance is a lluded Principle Agent Problem (Damodaran, 2008). The organization One. Tel face comparative sorts of issue and it is the primary driver of the breakdown of the organization. Discussion on inherent risk factors and their role in increased inherent risk assessment The awful corporate governance of the One Tell Company identified as the key reason of the liquidation of the organization. The poor administration structure of the organization is likewise one of the imperative reasons of its liquidation. It is watched that in 1998, the leading body of the Company was made out of just four individuals (Heinrichs, 2012). Who were non official chief of the organization. Among the four chiefs, three of them were liable to the consistently race. Additionally, the fourth one was Jodee Rich, the CEO of One. Tel organization, who was not take out by the shareholders of the organization. Consummation of the year 1998 the leading group of the organization was reached out to have eight individuals. In addition, among the 8 board individuals three were the secondary classmate of the Jodee Rich the CEO of the organization. The budgetary and also the review advisory group of One Tell included with 2 individuals who are close of the CEO of the organization. It is watched that despite of the huge compensation of 2.3 million AUD and reward of 82.5 million AUD for the 3 official chiefs, the executives get installment of another reward of 14.2 million AUD when the organization caused loss of 292 million AUD in 2000 (Iverson, 2013). It is distinguished that that for covering the data to the general population proposals rewards were show as postponed costs alongside the set up expense of the organization in Europe as the vital arrangement of worldwide development of the organization. Assess the risks as high medium or low The organization has high risks and additionally, low surrender strategy with kind incentive for the new purchasers won't not be carried out in the little market of Australia. In Australia, there are 6 telecom service providers of cell telephone and the second greatest number in examination whatever other nation over the world (JordaÃÅ'Æ’o and Sousa, 2010). Other than this, the consumption of the organization was part of its monetary limit. The business system of the organization was vigorously relied on upon the huge organizations Telstra and Optus and the two organizations are the contenders of the organization One Tell. One Tell was exchanging intemperate telephone limit, which are secured from Telstra and Optus and the organization offered modest bundles to the clients (Paramasivan and Subramanian, 2009). Identification of the influential factors for effective decision making The other powerful considers that help effective basic leadership are in this way charging framework disappointment. It is evident in the reviewing procedure that the expectations of the senior IT laborers at this organization are amazingly faulty (McPhee, 2014). The improvement work force were given rewards on the premise of convenient creation and build up of new projects alongside the framework. Along these lines, the preparing and additionally conveyance of the solicitations to the purchasers was deferred and in this way the organization was not able track the receipts from the buyers (Merna and Al-Thani, 2008). The charging arrangement of the organization was composed deficiently and not observed for the long time. Conclusion Clearly the breakdown of the Company One Tell can't be indicated any of the gatherings. There was missing of the structure of the organization, inadequacies in the expert morals alongside the corporate administration, which can be reprimanded for the breakdown of the organization. The general population ought to be considered in charge of their activity alongside the choices appropriate reporting of the money position and in addition the interior control of the organization must be observed and analyzed standard premise to represent the progressions alongside the development of the business association. References Anderson, T. (2006).Perspectives on strategic risk management. Kge, Denmark: Copenhagen Business School Press. Aven, T. (2010).Misconceptions of risk. Chichester: Wiley. Centner, T. (2014). Have US Legislatures Fully Considered Causal Factors in Assigning Liability for Inherent Risk Accidents?.Journal of Business Systems, Governance Ethics, 6(1). Damodaran, A. (2008).Strategic risk taking. Upper Saddle River, N.J.: Wharton School Pub. Heinrichs, D. (2012).Risk habitat megacity. Heidelberg: Springer-Verlag Berlin Heidelberg. Iverson, D. (2013).Strategic risk management. Singapore: Wiley. JordaÃÅ'Æ’o, B. and Sousa, E. (2010).Risk management. New York: Nova Science Publishers. McPhee, J. (2014).Mastering Strategic Risk. Hoboken, New Jersey: Wiley. Merna, T. and Al-Thani, F. (2008).Corporate risk management. Chichester, England: Wiley. Paramasivan, C. and Subramanian, T. (2009).Financial management. New Delhi: New Age International (P) Ltd., Publishers. Ruhnke, K. and Schmidt, M. (2014). Misstatements in Financial Statements: The Relationship between Inherent and Control Risk Factors and Audit Adjustments.AUDITING: A Journal of Practice Theory, 33(4), pp.247-269. Shapiro, A. (2006).Multinational financial management. New York: J. Wiley Sons.

Sunday, December 1, 2019

A Wizard Of EarthseA Essay Analysis Essay Example

A Wizard Of EarthseA Essay Analysis Paper Essay on â€Å"A Wizard of Earthsea† Interesting trilogy will, perhaps, not so much for children as for adults, which has long been boring to read about the endless wanderings, the philosophy of the search of his â€Å"I† of the tensions between the characters. More precisely, the book is not interesting modern children, for the future generation can not claim. For the child is too heavy feeding and little attractive for The orderly plot. More to their liking Harry Potter I -. A great kid. Not modern, but my book is not brought into raptures. In simple terms – the idea was good, but the implementation has pumped For those who have not read.. Ursula K. Le Guin has created a seemingly simple book in the style of fantasy, about wizards, dragons, travel, battles and solving puzzles. It seems to be like everyone else, nothing new. But inside, the author tried to teach the reader how to live in harmony with the whole universe, not even being a wizard. Quite openly, she said that every little molecule of which includes everything in the world – is an important part of the infinite life of the mechanism. The book teaches us to think about the consequences and understand what constitutes a global balance. To live in the â€Å"first demand† state, as I call it. No frills, and to the extent possible. And then everything will be fine †¦ â€Å"A Wizard of Earthsea† Review â€Å"A Wizard of Earthsea† Review â€Å"A Wizard of Earthsea† Review We will write a custom essay sample on A Wizard Of EarthseA Essay Analysis specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on A Wizard Of EarthseA Essay Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on A Wizard Of EarthseA Essay Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Of course, dear Ursula K. Le Guin is not the first one to explain or at least tries to explain such important questions. And this trilogy was written quite a while already. Perhaps the phrase â€Å"Times have changed,† not so deceitful. But! .. Fantasy, in my opinion, this is not the genre in which it is necessary to go into such deep thoughts. Perhaps the moral and ethical problems of coexistence of man and the universe, it is better demonstrates the science fiction, well, or just fiction, I do not share them too. And it was she who has the greatest influence on the minds of readers. A Wizard Of EarthseA Essay Sample Because the method of â€Å"do not tear this flower because it tiny, but very important piece of our world and its fragile stalk supports important for all of us a balance in the universe!† Already does not work. And it works: â€Å"You have destroyed a poisonous flower that had to eat out the dinosaur, because of which subsequently died triblablazavry that their faeces was maintained soil fertility, due to the death of which we now can not grow food on the land and create it from the tubes †¦ â€Å"Phew †¦. Bradbury who read, will understand what I mean. fantasy genre owes more to entertain than to teach. Confrontation between good and evil. Here is a suitable subject for fantasy! Fight for your love, too, will fit! And no deeper. My opinion. Otherwise out some tedious tale with a claim to the moral and ethical morals. And then it turns out neither one nor the other. But what conclusion I would not do, and the writer received the award and is recognized as a classic in its genre †¦ For it to her honor and praise. To summarize †¦ began to read avidly, finished with great tension. But the trilogy can be read as a whole, and individually in each story. Perhaps after reading experience will be very different.

Tuesday, November 26, 2019

The Haunting Truth Behind The Lake by Edgar Allan Poe

The Haunting Truth Behind The Lake by Edgar Allan Poe Poe first published â€Å"The Lake† in his 1827 collection Tamerlane and Other Poems, but it appeared again two years later in the collection Al Aaraaf, Tamerlane, and Minor Poems with a mysterious dedication added to the title: â€Å"The Lake. To–.† The subject of Poes dedication remains unidentified to this day. Historians have suggested  Poe wrote the poem about Lake Drummond- and that he might have visited Lake Drummond with his foster mother, but the poem was published after her death. The lake outside Norfolk, Virginia, also known as the Great Dismal Swamp, was said to have been haunted by two past lovers. The supposed ghosts were not thought of as malicious or evil, but tragic- the boy had gone mad in the belief the girl had died. A Haunted Lake Lake Drummond was said to be haunted by the spirits of a young Native American couple who lost their lives on the lake. The young woman reportedly died on their wedding day, and the young man, driven mad by visions of her paddling on the lake, drowned in his attempts to reach her. According to one report, local legend says that if you go into the Great Dismal Swamp late at night youll see the image of a woman paddling a white canoe on a lake with a lamp. This woman became known locally as the Lady of the Lake, which has given inspiration to a slew of famous writers over the years. Robert Frost was said to have visited the central Lake Drummond in 1894 after suffering a heartbreak from splitting up with a longtime lover, and he later told a biographer that he had hoped to get lost in the wilderness of the swamp, never to return. Although the haunting stories may be fictional, the beautiful scenery and lush wildlife of this Virginia lake and surrounding swamp draw many visitors every year. Poes Use of Contrast One of the things that stands out in the poem is the way Poe contrasts the dark imagery and danger of the lake with a feeling of contentment and even pleasure in the thrill of his surroundings. He refers to the loneliness as lovely, and later describes his delight at waking to the terror on the lone lake. Poe draws on the legend of the lake to tap into its inherent dangers, but at the same time he revels in the beauty of the nature surrounding him. The poem closes with Poes exploration of the circle of life. Though he refers to death in a poisonous wave, he describes its location as Eden, an obvious symbol for the emergence of life. Full Text of The Lake. To In spring of youth, it was my lotTo haunt of the wide world a spotThe which I could not love the less–So lovely was the lonelinessOf a wild lake, with black rock bound,And the tall pines that towered around.But when the Night had thrown her pallUpon that spot, as upon all,And the mystic wind went byMurmuring in melody–Then–ah then I would awakeTo the terror of the lone lake.Yet that terror was not fright,But a tremulous delight–A feeling not the jewelled mineCould teach or bribe me to define–Nor Love- although the Love were thine.Death was in that poisonous wave,And in its gulf a fitting graveFor him who thence could solace bringTo his lone imagining–Whose solitary soul could makeAn Eden of that dim lake.

Friday, November 22, 2019

Battle of Eniwetok in World War II

Battle of Eniwetok in World War II Following the US victory at Tarawa in November 1943, Allied forces pressed forward with their island-hopping campaign by advancing against Japanese positions in the Marshall Islands. Part of the Eastern Mandates, the Marshalls had been a German possession and were given to Japan after World War I. Though held as part of the outer ring of Japanese territory, planners in Tokyo decided after the loss of the Solomons and New Guinea that the chain was expendable. With this in mind, what forces were available were moved to the area to make the islands capture as costly as possible. Commanded by Rear Admiral Monzo Akiyama, Japanese troops in the Marshalls consisted of the 6th Base Force which originally numbered around 8,100 men and 110 aircraft. While a relatively large force, Akiyamas strength was diluted by the requirement to spread his command over all of the Marshalls. Also, much of Akiyamas command consisted labor/construction details or naval troops with little infantry training. As a result, Akiyama could only muster around 4,000 effective. Anticipating that the assault would strike one of the outlying islands first, he positioned the majority of his men on Jaluit, Millie, Maloelap, and Wotje. Armies Commanders United States Vice Admiral Harry W. HillBrigadier General Thomas E. Watson2 regiments Japan Major General  Yoshimi Nishida3,500 men American Plans In November 1943, American airstrikes commenced eliminating Akiyamas air power, destroying 71 aircraft. These were partially replaced by reinforcements brought in from Truk during the following weeks. On the Allied side, Admiral Chester Nimitz initially planned a series of attacks on the outer islands of the Marshalls, but upon receiving word of Japanese troop dispositions through ULTRA radio intercepts elected to change his approach. Rather than assault where Akiyamas defenses were strongest, Nimitz ordered his forces to move against Kwajalein Atoll in the central Marshalls.   Attacking on January 31, Rear Admiral Richmond K. Turners 5th Amphibious Force landed elements of Major General Holland M. Smiths V Amphibious Corps on the islands that formed the atoll.   With support from Rear Admiral Marc A. Mitschers carriers, American forces secured Kwajalein in four days.   Capture of Engebi With the rapid capture of Kwajalein, Nimitz flew out from Pearl Harbor to meet with his commanders.   The resulting discussions led to the decision to immediately move against Eniwetok Atoll, 330 miles to the northwest.   Initially scheduled for May, the invasion of Eniwetok was assigned to Brigadier General Thomas E. Watsons command which was centered on the 22nd Marines and 106th Infantry Regiment.   Advanced to mid-February, plans for capturing the atoll called for landings on three of its islands: Engebi, Eniwetok, and Parry.   Arriving off Engebi on February 17, Allied warships commenced bombarding the island while elements of the  2nd Separate Pack Howitzer Battalion and the 104th Field Artillery Battalion landed on adjacent islets (Map). The next morning, the 1st and 2nd Battalions from Colonel John T. Walkers 22nd Marines began landing and moved ashore.   Encountering the enemy, they found that the Japanese had centered their defense in a palm grove in the islands center.   Fighting from spider holes (concealed foxholes) and the underbrush, the Japanese proved difficult to locate.   Supported by the artillery landed the previous day, the Marines succeeded in overwhelming the defenders and secured the island by that afternoon.   The next day was spent eliminating the remaining pockets of resistance. Focus on Eniwetok and Parry With Engebi taken, Watson shifted his focus to Eniwetok.   Following a brief naval bombardment on February 19, the 1st and 3rd Battalions of the 106th Infantry moved towards the beach.   Encountering fierce resistance, the 106th was also hampered by a steep bluff which blocked their advance inland.   This also caused traffic issues on the beach as AmTracs were unable to move forward.   Concerned about the delays, Watson instructed the 106ths commander, Colonel Russell G. Ayers, to press his attack.   Fighting from spider holes and from behind log barriers, the Japanese continued to slow Ayers men.   In an effort to quickly secure the island, Watson directed the 3rd Battalion of the 22nd Marines to land early that afternoon. Hitting the beach, the Marines were quickly engaged and soon bore the brunt of the fight to secure the southern part of Eniwetok.   After pausing for the night, they renewed their attack in the morning and eliminated enemy resistance later in the day.   In the northern part of the island, the Japanese continued to hold out and were not overcome until late on February 21.   The extended fight for Eniwetok compelled Watson to alter his plans for the attack on Parry.   For this part of the operation, the 1st and 2nd Battalions of the 22nd Marines were withdrawn from Engebi while the 3rd Battalion was pulled from Eniwetok.    In an effort to expedite Parrys capture, the island was subjected to an intense naval bombardment on February 22.   Led by the battleships USS Pennsylvania (BB-38) and USS Tennessee (BB-43), Allied warships hit Parry with over 900 tons of shells.   At 9:00 AM, the 1st and 2nd Battalions moved ashore behind a creeping bombardment.   Encountering similar defenses to Engebi and Eniwetok, the Marines steadily advanced and secured the island around 7:30 PM.   Sporadic fighting lasted through the following day as the last Japanese holdouts were eliminated. Aftermath The fighting for Eniwetok Atoll saw Allied forces sustain 348 killed and 866 wounded while the Japanese garrison incurred losses of 3,380 killed and 105 captured.   With key objectives in the Marshalls secured, Nimitzs forces briefly shifted south to aid General Douglas MacArthurs campaign in New Guinea.   This done, plans moved forward for continuing the campaign in the Central Pacific with landings in the Marianas.   Advancing in June, Allied forces won victories at Saipan, Guam, and Tinian as well as a decisive naval triumph at the Philippine Sea.

Thursday, November 21, 2019

Assessing Performance and Developing Employees(HRM) Essay

Assessing Performance and Developing Employees(HRM) - Essay Example But it is not perfect; with inaccuracies in the scoring system and subjectivity involved in few parameters it has scope of improvement. ‘Performance Preview’ is one of the methods which Samuel Culbert describes as an approach to better performance reviews. He also talks how this system can improve by putting the CEO right in the front of the steering wheel to see for himself the relationships between bosses and subordinates. The HR is using performance review as its own toy right now and holding up to company secrets, but if there is trust and relationship on the basis on which things can change. The scoring system needs to be more objective with transparency and set rules of how much score can be given when. The subjectivity can be avoided in each BSC parameter by law of averages. Culbert’s views are one of an extremist I feel. Performance review is a real chance where a good subordinate can showcase his work; a good boss can affect positivity and motivation. Obj ectives can be set and continuous improvement can be achieved by a performance review and then continued with a performance preview. Not every boss is motivated by money and not every HR person secretive and conspiring against the subordinate.

Tuesday, November 19, 2019

The Arab League's Role in the Syrian Civil War Article

The Arab League's Role in the Syrian Civil War - Article Example There is also the theme of government response and the consequences that such consequences carried. This theme makes it very important to discuss the overall concept of political authority and power utilization. This is because from every indication, the response of the government as an authority and holder of power was something that dragged the Syrian Civil War to levels it can currently be found (Zartman, 2012). Cooperation and interferences that were received both internally and externally from the Arab League were also highlighted as an important theme in the article. Finally, the future of Syria was an important theme raised in the article that leaves the reader thinking if there is any hope at all for Syria from the current position it finds itself. The major theoretical position outlined in the article was international relations. As explained by Carlsnaes (2012), international relations encompass the relationships that exists among countries as exemplified through the roles of sovereign states, international organizations, non-governmental organizations, and even multinational corporations. The article clearly shows how each of these stakeholders played critical roles in the Syrian Civil War. Most of these roles were discussed under â€Å"External cooperation and interference† section of the article and clearly outlined the positive and negative outcomes with international relations. By emphasizing more on the role of the Arab League, it is very easy for the reader to get a sense of urgency for change with ongoing development of Foreign Policy Analysis. This is because the author constantly expressed mixed feelings about the impact of the real roles of the Arab League as it was not very clear whether the Arab League re gistered their presence for the purpose of serving its long awaited ambition for independence and unity or whether the regional body was there to focus directly on stopping the war. Into the future, it is important that

Sunday, November 17, 2019

Analysis of Comments on a New York Times Article Essay Example for Free

Analysis of Comments on a New York Times Article Essay The article, â€Å"Forced From Executive Pay to Hourly Wage,† which was written by Michael Luo and was published in the New York Times last February 28, 2009, basically told the story of people who used to earn five or six-figure amounts per year, are now being paid hourly minimum wages. One example in the article was the case of Mark Cooper, who used to earn $70,000 as a security manager for Fortune 500 Company in the United States and who oversees a budget of $1. 2 million. Nine months ago, he lost his job and now he is earning $12 an hour in his job at his friend’s janitorial services company. Although the article itself is appealing enough, it is also interesting to note the readers’ comments about it. As of now, there are 300 comments about the article and upon reviewing most of them, it can be surmised that each reader who commented had significantly different viewpoints and opinions about the story told in the New York Times article. Evidently, these readers adhere to different moral codes which are seen through their responses. In general, the readers who commented on the article can be divided into two groups: one group lauded the brave act of Mark Cooper while the other criticized the style of writing and the subtle message that New York Times writer used in the article. One of the reader’s who praised the article story admired the courage of Mr. Cooper as he was able to lower his pride and found ways to provide for his family even if it means that he has to scrub toilets and have his salary dramatically reduced from five figures to an hourly wage without any benefits. In a sense, this group highly regarded the value of hard work and starting all over again in a dignified way. Most of their comments basically indicated that Mr. Cooper is not alone and that there are hundreds of Americans who have similar â€Å"riches to rags† stories. These readers, based on their comments, also believed that there is no shame being poor as long as one has a dignified and lawful job. On other hand, the other group of readers who commented on the article criticized the New York Times for insinuating that those who work blue-collar jobs are lower forms of human beings than those who work white-collar ones. They see the article as discriminating to Americans who have been living their lives below the poverty line for a long time even before the current economic crisis. For example, one reader lamented that article more or less showed that a $12-an-hour job is an indecent way of living, which is not true. In addition, one reader did not feel sorry for Mr. Cooper and commented that he had a lot to be thankful for because he lives in an above average house and was able to live a rich life. To this reader, the economic crisis makes everyone in America equal because they are struggling to make ends meet. However, what’s common in all the readers’ responses is that they could all relate to the difficulties experienced by the people depicted in the article. In fact some of the readers, who are evidently from different walks of life, shared their own stories in their comments. In other words, the single factor that binds all the readers who commented is the hardship brought about by the financial crisis in America. In a way, the article’s comments show two things: one is that there are a lot of Americans who are so used to a good life that they are seemingly caught off-guard when a devastating financial crisis like this hits them and the other is that due to the crisis, most Americans would be willing to take on any job just to survive. But the comments also indicated that Americans are more unified in achieving a common goal which is to recover from the devastating effects of the crisis and rebuild their lives. Works Cited Luo, Mark. â€Å"Forced From Executive Pay to Hourly Wage. † 28 February 2009. New York Times. 4 March 2009 http://www. nytimes. com/2009/03/01/us/01survival. html? pagewanted=1_r=2sq=executive%20janitorst=csescp=1.

Thursday, November 14, 2019

The Role of the Catholic Church In The New World Essay -- American Ame

The Role of the Catholic Church In The New World The Catholic Church during the Middle Ages played an all encompassing role over the lives of the people and the government. As the Dark Ages came to a close the ideas of the Renaissance started to take hold, and the church's power gradually began to wain. The monarchies of Europe also began to grow, replacing the church's power. Monarchies, at the close of the Middle Ages and the dawn of the Renaissance, did not so much seek the guidance of the church as much as it sought their approval. However, the Church during the Age of Discovery was still a major influence. The discovery of the New World and its previously unknown inhabitants presented new problems in the Catholic Church in the late 14th and early 15th century. When Spain's rulers and emissaries decided to physically conquer and populate the New World, and not just trade with it, the transplantation of Christian institutions followed. The church established contact with the New World, and made it a goal to establish the Catholic doctrines among the native population there. The Catholic Church and the Spanish monarch, however, looked upon the native population in the New World as souls to be saved. They did not consider or treat the Indians as equals. The implanting of Christianity in the New World, and the treatment of the native population by the missionaries and christian conquerors was detrimental to New World. Through men such as Cortez and Las Casas accounts of the conversions have been recorded. One of the reasons for this was the alliance of the Catholic Church with the Spanish monarchy. The status of the Indians was disregarded as the Christian conquers and missionaries who wanted to convert them subjected the... ...d to work toward goals that they did not fully understand. Through the writings of Las Casas, it is seen how the Indians were slaughtered needlessly, and how they were baptised without regard to their feelings. Cortez paved the way for missions to be founded in the New World supposedly for the good of the Indian population. This, however, also turned against them. The Catholic Church role in the lives of the native population was a negative one due to its alliance with the Spanish monarchy and its forced conversion of the Indians. Works Cited: Terrar, Toby. "Catholic Mission History and the 500th Anniversary of Christopher Columbus's Arrival," Giles, Thomas S. "How Did Native Americans Respond to Christianity?" Christian Histoy Issue 35 Vol. XI, No. 3. Ricard, Robert. The Spiritual Conquest of Mexico Los Angeles: University of California Press, 1966.

Tuesday, November 12, 2019

Cycle of Violence and Child Abuse Intergenerational Transmission

The â€Å"cycle of violence hypothesis† is a theory that mainly seeks to clarify why and how the behavior of an individual who commits family and domestic violence may transform dramatically with time. Furthermore, this theory provides an understanding of the reasons why an individual who has been a victim of either domestic or family violence would go on facing the violent situation (Finkelman, 1995). The term â€Å"intergeneration transmission† refers to the occurrence of something between generations.It further described as a process that allows for people to recognize the modalities of conflict that relate to the generations which preceded the birth of an individual (American Heritage Dictionary, 2006). It is the objective of this paper to explain in detail the â€Å"cycle of violence† hypothesis as it relates to the intergenerational transmission of mistreating children. The â€Å"cycle of violence† hypothesis relates to the intergenerational transmis sion of mistreating children as exhibited via the principles of social learning theory.Here a parent that is usually physically punitive would most likely have a child that becomes aggressive because that is the kind of response pattern the child has been accustomed to (Kalverboer, Genta, & Hopkins, 1999). This theory puts it that violent actions are learnt through positive reinforcement patterns and is more often than not imitated. It is important to note that when a child grows up with such a parent, the child will exercise such kind of an approach in raising their own offspring, thus this cycle of violence is in a position to persist through to the future generations.In addition to this, a parent plays that most crucial role in the life a child (Tomison, 1996). Genetic components of aggressive behavior (Kalverboer, Genta, & Hopkins, 1999) equally result in a cycle of violence in which children are maltreated and it is generational. Under this, it is assumed that the predispositio n of a parent for violence is inherited by a child. This inherited predisposition perpetuates the cycle of maltreatment especially towards children thus increasing the probability of such children subsequently maltreating their own children.Thus the cycle is fueled in the sense that through genes, generations of abusive parents persist. The interaction of environmental and genetic factors is a major factor to consider when relating the cycle of violence to intergenerational transmission of mistreating children. A mere genetic predisposition simply puts a person at the risk of expressing violent behavior but then it takes the interaction of environmental and genetic factors to actually produce the greatest risk of the display of violent behavior (Kalverboer, Genta, & Hopkins, 1999).When a child has inherited the genes of abusive character from the parents, it is the surrounding environment that fuels the degree of this behavior because of the experiences and thus they are carried for ward to their children. As a consequence, the cycle of violent behavior in terms of child maltreatment is perpetrated (Tomison, 1996). According to a research done on intergenerational transmission of abuse, an examination was done where by the history of a parent in terms of abuse in relation to their abusive behavior toward the children was hypothesized (Pearsa & Capaldi, 2001).Furthermore, the effect of the extent of an abuse and the possibility of the concerned individual becoming abusive were equally considered. From this study it was reported that the parents who had an abusive childhood were more likely to take part in abusive behavior in the next generation. These findings illustrate that the â€Å"cycle of violence† has a great link to the intergenerational transmission of mistreating children (Tomison, 1996).Much as there is a lot of evidence to connect the cycle of violence to the intergenerational transmission of mistreating children it is important to note that n ot all people who experience an abusive childhood become abusive parents in future. In addition, the cycle of violence can be broken via social support programs especially to the single parents (Langeland & Dijkstra, 2006). Another way through which this vice can be eradicated is via the support from the spouse who realizes the partner could have been a victim of abuse in their childhood.It is also important to consider positive moves such as focusing on interventions that would prevent the cycle of violence from persisting through to other generations. References: American Heritage Dictionary. (2006). The American Heritage ® Dictionary of the English Language, Fourth Edition . New york: Houghton Mifflin . Finkelman, B. (1995). Child Abuse: Short- and long-term effects. London: Taylor & Francis. Kalverboer, A. F. , Genta, M. L. , & Hopkins, J. B. (1999). Current issues in developmental psychology: biopsychological perspectives.New Mexico: Springer. Langeland, W. , & Dijkstra, S. ( 2006). Breaking the intergenerational transmission of child abuse: Beyond the mother-child relationship. Child Abuse Review , 4 (1). Pearsa, K. C. , & Capaldi, D. M. (2001). Intergenerational transmission of abuse: a two-generational prospective study of an at-risk samplesmall star, filled. Child Abuse & Neglect , 25 (11). Tomison, A. M. (1996). Intergenerational Transmission of Maltreatment. Retrieved May 10, 2010, from http://www. aifs. gov. au/nch/pubs/issues/issues6/issues6. html

Saturday, November 9, 2019

Computer Networks

– Suresh Khanal Computer Networking Short Questions and Answer www. psexam. com Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: http://www. psexam. com contact: [email  protected] com Computer Networking: Short Questions and Answers Published by PS Exam Kalanki, Kathmandu Nepal www. psexam. com Copyright  ©2009 author.No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise except for personal and non-commercial use without the prior written permission of the author. About the Author Suresh Khanal is a native of Kathmandu, Nepal, where he works as a freelance developer, programmer and technical writer/editor. He has been involved in teaching computers science since 1998 and over the years has written several articles and tutorials on Office Appli cations and Web Programming.Khanal holds a Master's of Science Degree in Information Technology Science. In his spare time, he enjoys travelling, posting in forums and play online games. Table of Contents Transmission Media What is transmission media? What are the types of transmission media? Describe bound transmission media. Describe unbound transmission media. Bound Transmission Media Explain twisted pair cable. Explain Co-axial cable. Explain Fiber-Optics cable. 1 1 1 1 1 1 1 4 5 Match the following types of connectors with the cables to which they are used. Compare BNC with UTP Cables Unbound Transmission Media Explain Radio Wave. What is Microwave? List the Advantages of microwaves. What are the Disadvantages of Microwaves? Describe Infra Red. Computer Network What is a computer network? What are the advantages of Networking? Explain Network Services 8 9 9 10 11 11 11 12 12 12 13 What are the five major network services? What is Network Server? What is a client? What is a dedi cated server? What is workstation? What are dumb terminals? Types of Computer Network What is a LAN? What is MAN? What is WAN? Clarify Enterprise WANs.Clarify Global WANs. What are the two types of LAN? Protocols What is a protocol? What are the three major network protocols? Match the following protocols and their functions LAN Topologies What are the two network connection types? Explain Point-to-Point connection type. Explain multipoint connection. What are the basic LAN topologies? Explain Bus Topology. What are the advantages of bus topology? 13 13 13 14 14 14 15 15 16 16 16 17 17 18 18 18 19 20 20 20 21 21 21 23 What are the disadvantages of bus topology? What is Ring Topology? Point out the major advantages of Ring Topology.Point out the disadvantages of Ring Topology. Explain Star Topology. What are the benefits of Star Topology? What are the disadvantages of Star Topology? What are the popular topologies other than basic Topologies? Network Standards What is a Networking St andard? What are the four major industry standards? What is an Ethernet? How an Ethernet Worked? What is Medium Access Control of Ethernet? Explain Ethernet Frame. List some advantages of Ethernet. What are the disadvantages of Ethernet Cabling? What is ARCNet? List the advantages of ARCNet. What are the disadvantages of ARCNet?How does a Token-Passing Protocol works? 24 24 25 25 25 26 26 27 27 27 27 28 28 29 29 30 30 31 32 32 32 Explain Logical Ring Physical Star topology for Token-Passing Standard. 32 List some most useful advantages of Token Ring. 33 Point out the disadvantages of Token Ring. What do you mean by Beaconing and Auto-Reconfiguration? Network Architecture What is Network Architecture? What are the popular Network Architectures? Explain ISO's OSI Architecture Explain IBM's SNA Architecture Networking Model Explain Peer-to-Peer Networking Model. Explain Client/Server Networking Model.Network and Internet Terminologies NICs Hubs/Repeaters Bridges Router Switches Transce ivers Gateway Proxy Serer Firewall Node Wireless Network Internet WWW 34 34 34 34 35 35 36 37 37 37 38 38 39 39 40 41 42 42 43 43 43 43 45 45 IRC CU-SeeMe Telnet Gopher HTML Browsers Dialup Connection IP Address Domain Name URL Web Browsing or Surfing Search Engine Meta Search Engine Internet Access Extranet Intranet Web Index Hypertext Email Email address Inbox Outbox Trash CC 46 47 48 49 49 50 53 53 54 54 54 55 57 57 58 58 58 59 59 59 60 60 61 61 BCC Reply Forward Attachments Bounced Netiquette Emoticons 62 62 62 62 62 62 62 Table of FiguresFigure 1: UTP Cable 2 Figure 2: UTP Cable Connector 2 Figure 3: STP Cable 3 Figure 4: STP Cable Structure 3 Figure 5: Co-Axial Cable 4 Figure 6: Co-Axial Cable Structure 4 Figure 7: Co-Axial Cable Connectors 5 Figure 8: Fibre Optics Cable Structure 6 Figure 9: Fiber Optics Cable 6 Figure 10: AUI Connector 7 Figure 11: BNC Connector 7 Figure 12: RJ45 Connector 8 Figure 13: SC Connector 8 Figure 14: Comparison between Twisted Pairs and Co-Axial C able 9 Figure 15: Radio Wave Transmission 9 Figure 16: Microwave Transmission 10 Figure 17: Microwave Transmitter, Receiver and Repeater 10 Figure 18: Infrared Device Error!Bookmark not defined. Figure 19: Computer Network 12 Figure 20: Workstation 14 Figure 21: Dumb Terminal 15 Figure 22: Wide Area Network 16 Figure 23: Enterprise WAN 17 Figure 24: TCP/IP Structure 18 Figure 25: IPX/SPX Structure 19 Figure 26: Different LAN Topologies 20 Figure 27: Bus Topology 21 Figure 28: Bus Topology Network connected with other network 22 Figure 29: T Connector 22 Figure 30: Different Cable Terminators 23 Figure 31: Ring Topology 24 Figure 32: Star Topology 25 Figure 33: Star Topology 26 Figure 34: Tre Topology Error! Bookmark not defined. Figure 35: Mesh Topology Error! Bookmark not defined.Figure 36: Ethernet Network 29 Figure 37: ARCNet Board and Card 31 Figure 38: Network with MSAU 33 Figure 39: ISO's OSI Architecture 35 Figure 40: OSI an SNA Comparision 36 Figure 41: LAN NIC Card 38 Figur e 42: Hub 39 Figure 43: Bridge 40 Figure 44: Router 41 Figure 45: Switch 41 Figure 46: Transceiver 42 Figure 47: Gateway PC 43 Figure 48: Nework with Wireless Stations 44 Figure 49: Tim Berners Lee 45 Figure 50: Yahoo Chat 46 Figure 51: CU SeeMe 47 Figure 52: CU SeeMe Conferencing 48 Figure 53: Telnet Screen 48 Figure 54: Different Browsers Logo 50 Figure 55: Mozilla Firefox 51 Figure 56: Netscape Navigator 51 Figure 57: Internet Explorer 52 Figure 58: Google Chrome 52 Figure 59: IP Address Structure 53 Figure 60: IP Address and Subnet Mask 53Figure 61: Yahoo, Ask, MSN, Google Search Engines Figure 62: Alta Vista Search Engine Figure 63: Lycos Figure 64: Meta Search Engine Figure 65: Web Index Figure 66: Hypertext and Hyper Link Figure 67: Email Client Interface Figure 68: New Email Message Figure 69: Emoticons 55 56 56 57 58 59 60 61 63 Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: ht tp://www. psexam. com contact: [email  protected] com Computer Networking Short Questions and Answers Contribution of Suresh Khanal for PS Exam Transmission Media What is transmission media? Transmission media is a pathway through which data are transmitted in network.We use different types of cables or waves to transmit data. What are the types of transmission media? There are two types of transmission media namely: bound transmission media and unbound transmission media. Describe bound transmission media. Bound transmission media are the cables that are tangible or have physical existence and are limited by the physical geography. Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical cable. Describe unbound transmission media. Unbound transmission media are the ways of transmitting data without using any cables. These media are not bounded by physical geography.Microwave, Radio wave, Infra red are some of popular unbound transmission me dia. Bound Transmission Media Explain twisted pair cable. A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to reduce the interference. http://www. psexam. com Page 1 Contribution of Suresh Khanal for PS Exam Figure 1: UTP Cable Figure 2: UTP Cable Connector Page 2 http://www. psexam. com Contribution of Suresh Khanal for PS Exam We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).The twisted pair cable that is protected against electro-magnetic interference (EMI) is known as STP and the one which is not shielded against EMI is called Unshielded Twisted Pair. Figure 3: STP Cable 1–Jacket 2–Shield-braid 3–Shield-foil 4–Solid twisted pair 5–Drain wire Figure 4: STP Cable Structure http://www. psexam. com Page 3 Contribution of Suresh Khanal for PS Exam Explain Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is known as co-axial cable. The shield is usually connected to electrical ground to reduce electrical interference. Co-axial cables have broader bandwidth and thus suitable for audio, video data transmission. Figure 5: Co-Axial Cable Figure 6: Co-Axial Cable StructurePage 4 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 7: Co-Axial Cable Connectors Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data via concentrated bursts of laser beams which are carried through bundles of hair thin glass fibers. They have advantages over electronic cables in transmission speed and volume. This technology has revolutionized telecommunication applications which used electron ic cables. Fiber optics cables as free from electromagnetic interference as well as wire tapping. http://www. sexam. com Page 5 Contribution of Suresh Khanal for PS Exam Figure 8: Fibre Optics Cable Structure Figure 9: Fiber Optics Cable Page 6 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Match the following types of connectors with the cables to which they are used. Cable: (a) Thick Coax (100 Base 5), (b) UTP (10 Base-T), (c) Fiber Optics (10 Base-FL) (d) Thin Coax (100 Base 5) Connectors: (1) AUI, (2) BNC, (3) RJ45, (4) SC or ST Type Answer:- a -> 1, b -> 3, c -> 4, d -> 2 Figure 10: AUI Connector Figure 11: BNC Connector http://www. psexam. com Page 7 Contribution of Suresh Khanal for PS Exam Figure 12: RJ45 ConnectorFigure 13: SC Connector Compare BNC with UTP Cables BNC Derived from the thick Ethernet Coaxial Cable Flexibility of adding nodes Lower price and no need of Hub Difficult to locate faults Terminators needed The cabling is comparatively less relia ble Single segment length (node to node) up to 180 meters UTP Derived from telephone cable Decided by Hub ports Needs Hubs Introduction of Hub makes fault finding much easier Terminators not needed Inherently much reliable Single segment length up to 200 meters Page 8 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 14: Comparison between Twisted Pairs and Co-Axial Cable Unbound Transmission MediaUnbound transmission media extend beyond the limiting confines of cabling. They provide an excellent communication alternative for WANS. The lack of physical restrictions provides larger bandwidth as well as wide area capabilities. Unbound media typically operate at very high frequencies. The three types of unbound transmission media are: Radio wave, Micro wave, Infrared Explain Radio Wave. Although Radio waves are prevalent and well understood, we are just beginning to realize their enormous potential as a networking medium. Radio waves can operate on a single or mu ltiple frequency bands. Figure 15: Radio Wave Transmission http://www. psexam. com Page 9 Contribution of Suresh Khanal for PS Exam What is Microwave?Microwaves have been used in data communications for a long time. They have a higher frequency than radio waves and therefore can handle larger amounts of data. Microwave transmission is line of sight transmission. The transmit station must be in visible contact with the receive station. This sets a limit on the distance between stations depending on the local geography. Typically the line of sight due to the Earth's curvature is only 50 km to the horizon! Repeater stations must be placed so the data signal can hop, skip and jump across the country. Figure 16: Microwave Transmission Figure 17: Microwave Transmitter, Receiver and Repeater Page 10 http://www. psexam. comContribution of Suresh Khanal for PS Exam Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry large quantities of data due to their large bandwidth. List the Advantages of microwaves. a. They require no right of way acquisition between towers. b. They can carry high quantities of information due to their high operating frequencies. c. Low cost land purchase: each tower occupies only a small area. d. High frequency/short wavelength signals require small antennae. What are the Disadvantages of Microwaves? a. Attenuation by solid objects: birds, rain, snow and fog. b. Reflected from flat surfaces like water and metal. c. Diffracted (split) around solid objects. d.Refracted by atmosphere, thus causing beam to be projected away from receiver. Describe Infra Red. Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared communications use light, so they are not bound by the limitations of electricity. Figure 18: Infrared Device http://www. psexam. com Page 11 Contribution of Suresh Khanal for PS Exam Computer Network What is a computer network? Computer Network is a collection of distribut ed intelligent machines that are connected with each other with transmission media for the purpose of data sharing, communication and sharing of computer resources. Figure 19: Computer NetworkWhat are the advantages of Networking? The following are the distinct notes in favor of computer networking. a. The computers, staff and information can be well managed b. A network provides the means to exchange data among the computers and to make programs and data available to people c. It permits the sharing of the resources of the machine d. Networking also provides the function of back-up. e. Networking provides a flexible networking environment. Employees can work at home by using through networks ties through networks into the computer at office. Page 12 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain Network ServicesNetwork services are the thing that a network can do. The major networking services are ? ? ? ? ? File Services: This includes file transfer, stor age, data migration, file update, synchronization and achieving. Printing Services: This service produces shared access to valuable printing devices. Message Services: This service facilitates email, voice mails and coordinate object oriented applications. Application Services: This services allows to centralize high profile applications to increase performance and scalability Database Services: This involves coordination of distributed data and replication. What are the five major network services? Major Network Services are: a. b. c. d. e.File Services Print Services Message Services Application Services Database Services What is Network Server? Network Server is a computer in Network that is designated to provide one or more network service. For example file server, database server etc. What is a client? A computer in network that connects to the server and uses the network services to perform user's tasks is a client. http://www. psexam. com Page 13 Contribution of Suresh Khanal for PS Exam What is a dedicated server? A network server designated to provide one particular service is known as dedicated server. For example if a computer is assigned for database service only then that computer is known as dedicated database server. What is workstation?A workstation is a node in network that is more powerful and can handle local information processing or graphics processing. A workstation usually has an inexpensive, small hard disk to carry out local tasks. Figure 20: Workstation Some workstations that have no disk drive of their own is known as diskless-workstation or dumb terminals. They terminals completely rely on LAN for their access. Network operating system lets the node work as if all the resources at the server belong to the node itself. What are dumb terminals? Those Workstations that have no disk drive of their own and rely completely on LAN for their access are called dumb terminals.The network operating system lets these terminals work as if all th e resources at the server belong to the workstation itself. Page 14 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 21: Dumb Terminal Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). A LAN links a small group of functionally similar workstations within a local geographic area such as a series of adjacent cubicles or offices on the same floor. Once the network expands to include other floors or divers office within a metropolitan area, it becomes a MAN. Finally, a WAN is simply a LAN of LANs.WANs expand the boundaries of networking to a global or even galactic scale. What is a LAN? A LAN is a Local Area Network, within a single building or a specific confined space. LANs typically comprise only one transmission media type such as coaxial cable or twisted pair. LANs are characterized by comparatively high -speed communications. These high speeds are possible because LANs use one kind of cable which generally is limited to 5 km or less. http://www. psexam. com Page 15 Contribution of Suresh Khanal for PS Exam What is MAN? MAN stands for Metropolitan Area Networks. MAN is larger than a LAN and as its name implies, covers the area of a single city.MANs rarely extend beyond 100 KM and frequently comprise a combination of different hardware and transmission media. The two most important components of MANs are security and standardization. Security is important because information is being shared between dissimilar systems. Standardization is necessary to ensure reliable data communication. What is WAN? A wide area network is simply a LAN of LANs. WANs connect LANs that may be on opposite sides of a building, across the country or around the world. WANS are characterized by the slowest data communication rates and the largest distances. WANs can be of two types: an enterprise WAN and Globa l WAN. Figure 22: Wide Area NetworkClarify Enterprise WANs. An enterprise WAN connects an entire organization including all LANs at various sites. This term is used for large, widespread organizations such as corporations, universities and governments. Page 16 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 23: Enterprise WAN Clarify Global WANs. Global WANs also span the world but they do not have to connect LANS within a single organization. The Internet is an example of a global WAN. It connects diverse locations, organizations and institutions throughout the world. Global WANS can be public or private. Private WANs are called Intranet which belongs to an organization.Public WANs are open to everybody so that anybody can connect and use the resources and services available. What are the two types of LAN? There are basically two types of Local Area Networks namely: Arcnet and Ethernet. http://www. psexam. com Page 17 Contribution of Suresh Khanal for PS Ex am Protocols What is a protocol? The term protocol refers to a set of rules and procedures that govern the transmission of messages over a physical networking medium. The most common network protocols are: (a) TCP/IP, (b) IPX/SPX and (c) NetBEUE What are the three major network protocols? The three major network protocols are: 1. TCP/IP 2. IPX/SPX (Used in Novell Netware) 3. NetBEUE (Product of Microsoft Co. ) Figure 24: TCP/IP StructurePage 18 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 25: IPX/SPX Structure Match the following protocols and their functions (a) http, (b) pop, (c) ftp, (d) smtp, (e) MIME, 1. Send email messages 2. Transfer multimedia information 3. Send email attachment 4. Transfer files in servers and clients computers 5. Receive email messages Answer: (a) -> 2, (b) -> 5, (c) -> 4, (d) -> 1, (e) -> 3 http://www. psexam. com Page 19 Contribution of Suresh Khanal for PS Exam LAN Topologies The term topology defines the geographic arrangem ent of networking devices. It describes the actual layout of the network hardware.Given the location of workstations and peripherals, the goal of topology is to find the most economical and efficient way to connect all the users to the network resources while providing adequate capacity to handle user demands, maintain system reliability and minimize delay. Figure 26: Different LAN Topologies The selection of a topology for a network can not be done in isolation as it affects the choice of media and the access method used. Because it determines the strategy used in wiring a building for a network and deserves some careful study. What are the two network connection types? The two different network connection types are (a) point-to-point connection and (b) multipoint connection. Explain Point-to-Point connection type. A point-to-point connection is a direct link between two devices such as a computer and a printer.Most of today's point-to-point connections are associated with modems a nd PSTN (Public Switched Telephone Network) communications. Page 20 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain multipoint connection. A multipoint connection is a link between three or more devices. Historically, multipoint connections were used to attach central CPs to distributed dumb terminals. In today's LAN environments, multipoint connections link many network devices in various configurations. What are the basic LAN topologies? The three simple LAN topologies that are combined to form any practical topology are known as basic LAN topologies.They are, Bus Topology, Ring Topology and Star Topology. Explain Bus Topology. The physical Bus topology is the simplest and most widely used of the network designs. It consists of one continuous length of cable (trunk) and a terminating resistor (terminator) at each end. Data communication message travels along the bus in both directions until it is picked up by a workstation or server NIC. If the message is missed or not recognized, it reaches the end of the cabling and dissipates at the terminator. Figure 27: Bus Topology http://www. psexam. com Page 21 Contribution of Suresh Khanal for PS Exam All nodes on the bus topology have equal access to the trunk.This is accomplished using short drop cables or direct T-connectors. The number of devices and the length of the trunk can be easily expanded. Figure 28: Bus Topology Network connected with other network Figure 29: T Connector Page 22 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 30: Different Cable Terminators What are the advantages of bus topology? The advantages of physical bus topology are: a. It uses established standards and it is relatively easy to install. b. It requires less media than other topologies. http://www. psexam. com Page 23 Contribution of Suresh Khanal for PS Exam What are the disadvantages of bus topology?The disadvantages of bus topology are: a. The bus networks are difficult to reco nfigure, especially when the acceptable number of connections or maximum distances have been reached. b. They are also difficult to troubleshoot because everything happens on a single media segment. This can have dangerous consequences because any break in the cabling brings the network to its knee. What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Each device connects directly to the ring or indirectly through and interface device or drop cable. Message travel around the ring from node to node in a very organized manner.Each workstation checks the message for a matching destination address. If the address doesn't match the node simply regenerates the message and sends it on its way. If the address matches, the node accepts the message and sends a reply to the originating sender. Figure 31: Ring Topology Page 24 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Point out the major advantages of Ring Topology. The advantages of ring topologies are: a. They are very easy to troubleshoot because each device incorporates a repeater. b. A special internal feature called beaconing allows troubled workstations to identify themselves quickly. Point out the disadvantages of Ring Topology.The disadvantages of ring topologies are: a. It is considerably difficult to install and reconfigure ring topology b. Media failure on unidirectional or single loop causes complete network failure. Explain Star Topology. The physical star topology uses a central controlling hub with dedicated legs pointing in all directions – like points of a star. Each network device has a dedicated point-to-point link to the central hub. This strategy prevents troublesome collisions and keeps the lines of communications open and free of traffic. Figure 32: Star Topology http://www. psexam. com Page 25 Contribution of Suresh Khanal for PS Exam This topology, obviously, require a great deal of cabling.This design provides an excellent p latform for reconfiguration and troubleshooting. Changes to the network are as simple as plugging another segment into the hub and a break in the LAN is easy to isolate and doesn't affect the rest of the network. Figure 33: Star Topology What are the benefits of Star Topology? The benefits of star topology are: a. Relatively easy to configure. b. Easy to troubleshoot c. Media faults are automatically isolated to the failed segment. What are the disadvantages of Star Topology? The disadvantages are considered as follows: a. Requires more cable than most topologies. b. Moderately difficult to install. Page 26 http://www. sexam. com Contribution of Suresh Khanal for PS Exam What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (every device connected to all other devices), Cellular Topology (wireless point to pint and multipoint design), Tree Topology (Hierarchical connections of devices), Hyb rid topology (combination of two or more basic topologies). Figure 34: Tre Topology Figure 35: Mesh Topology Network Standards What is a Networking Standard? Protocol (the logical component) and Topology (the physical component) is combined together to create a networking standard.These standards are developed and controlled by the Institute of Electrical and Electronics Engineers (IEEE). What are the four major industry standards? The four major industry standards are (a) Ethernet, Token Ring, ARCNet and FDDI (Fiber Distributed Data Interface). http://www. psexam. com Page 27 Contribution of Suresh Khanal for PS Exam What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the various Islands. It was radio based design. Later, Robert Metacalfe went to Xeros's Palo Alto Research Center (PARC) laboratories and eliminated the radio portion and changed to co-axial cabling. Ethernet is ne of the most popular LAN technologies in use tod ay covering more than 85% of the networks. Ethernet system consists of three basic elements: 4. The physical medium use to carry Ethernet signals between computers on the network 5. A set of rules (protocols) embedded in each Ethernet interface that will decide how multiple computers on the network will have access to the data on the medium. 6. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. How an Ethernet Worked? The operation of Ethernet can be described in simple terms as follows: Each computer on the Ethernet Network, also known as a node, operates independently of all other nodes.All nodes attached to an Ethernet are connected to a shared medium over which the Ethernet signals travel serially, one data bit at a time. To send data a station first listens to the channel and when the channel is idle the station transmits its information in the form of an Ethernet frame, or packet. The Ethernet rules (protocol) are defined in such a way that every node gets a fair amount of frame transmission opportunity. Page 28 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 36: Ethernet Network As each Ethernet frame is sent out on the shared medium, the Ethernet interfaces inside the node look at the destination address.The interfaces compare the destination address of the frame with their own address. The Ethernet interface with the same address as the destination address in the frame will read the entire frame and all other network interfaces will ignore the information. What is Medium Access Control of Ethernet? The set of rules which ensures that every node in an Ethernet gets a fair amount of frame transmission opportunity, are called the â€Å"Medium Access Control† mechanism. The Medium Access Control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMD/CD). Explain Ethernet Frame. The heart of Ethernet system is the Ethernet Frame, which is used to deliver information between the computers.The frame consists of a set of bits organized into several fields. These fields include address fields, a data field and an error checking field that checks the integrity of the bits in the frame to make sure that the frame has arrived intact. http://www. psexam. com Page 29 Contribution of Suresh Khanal for PS Exam List some advantages of Ethernet. Ethernet's major advantages are: 1. It is an inexpensive way to achieve high speed LAN transmissions (10 to 100 MB/s) 2. It is a proven technology that supports various writing configurations. 3. It works well with a large number of LAN and micro-tomainframe applications. 4. It is easy to install. What are the disadvantages of Ethernet Cabling?The Ethernet cabling ahs the following disadvantages: 1. Ethernet is not a high-level performer in high-load environments. This protocol (CSMA/CD: Carrier Sense Multiple Access/Collision Detection) can slow down dramatically if hundreds of works tations are competing for the same cabling trunk 2. Its linear bus cabling system can sometimes make it difficult to isolate problems. Page 30 http://www. psexam. com Contribution of Suresh Khanal for PS Exam What is ARCNet? The Attached Resource Computer Network (ARCNet) standard was created in 1977 at the Data Point Corporation by a scientist – John Murphy. ARCNet uses the token-passing protocol over a star and bus topology.The star and bus topology combines the flexibility of a star with the simplicity and throughput of a bus. Thus, ARCNet standard has a unique protocol/topology combination: token-passing protocol and Distributed star/bus topology. Figure 37: ARCNet Board and Card http://www. psexam. com Page 31 Contribution of Suresh Khanal for PS Exam List the advantages of ARCNet. Here are some of the ARCNet's advantages: 1. It is extremely reliable. 2. ARCNet is easy to install and troubleshoot. 3. It has an excellent track record of interoperability for those using AR CNet components from various manufacturers. 4. ARCNet supports a variety of cable types including coaxial, UTP and Fiber Optics. 5.It is inexpensive and built to stay that way. What are the disadvantages of ARCNet? Here are some disadvantages of ARCNet: 1. Standard ARCNet is very slow (2. 5 Mb/s). It is almost seven times slower than Token Ring. 2. ARCNet was not designed with interconnectivity in mind. For many installations, it's difficult to go beyond the confines of single LAN. How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal called the token. A token is a 24-bit packet that circulates throughout the network from NIC to NIC in an orderly fashion. If a workstation wants to transmit a message, first it must seize the token.At that point, the workstation has complete control over the communications channel. The existence of only one token eliminates the possibility of signal collisions. This means that only one station can speak at a ti me. Explain Logical Ring Physical Star topology for Token-Passing Standard. It is sure that any break in the ring at any point will interrupt communications for all machines. To solve this problem, IBM developed a modified ring topology, which they called the logical ring Page 32 http://www. psexam. com Contribution of Suresh Khanal for PS Exam physical star. The central point of the physical star configuration is Token Ring hub called the multi-station access unit (MSAU, pronounced as masow).Workstations and servers attached to the MSAU through special STP adapter cables. IBM converted stars into a logical ring by connecting all MSAU hubs together through special ring-in (RI) and ring-out (RO) ports. Figure 38: Network with MSAU List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It offers excellent throughput under high-load conditions. b. Token Ring facilitates LAN-to-LAN mainframe connections especially for interfacing with IBM's broa der connectivity strategies. c. It has built-in troubleshooting mechanisms such as beaconing and auto-reconfiguration and may now be used with UTP cabling. http://www. psexam. com Page 33 Contribution of Suresh Khanal for PS Exam d.It has the most reliable protocol (token-passing), the most trouble-free configuration (physical star) and the fastest connectivity scheme (r or 16 mb/s). Point out the disadvantages of Token Ring. Few of the disadvantages of Token Ring are: a. Token Ring is very expensive. All topology components cost much more than other more popular standards. b. It is relatively proprietary. Token Ring's complexity is built into the hardware components. This means hat you need to choose a manufacturer and stick with it. c. Engineers must have considerable expertise to manage and troubleshoot token ring components. What do you mean by Beaconing and AutoReconfiguration?When a station does not receive a message from its nearest active upstream neighbor, it sends out a wa rning, otherwise known as a beacon. This beacon alerts everyone that something is wrong and helps to isolate the failure domain. When beacon occurs, the ring will attempt to fix the problem without your intervention. This process of self-healing is called auto-reconfiguration. Network Architecture What is Network Architecture? When two or more computer are connected with one another for the purpose of communicating data electronically, besides physical connection of computers, communication devices and system servers, a well defined standard known as architecture is required to establish cohesive communication between devices in Network. Page 34 http://www. psexam. om Contribution of Suresh Khanal for PS Exam What are the popular Network Architectures? The most popular architectures are: a. ISO Open System Architecture (OSI) b. IBM's System Network Architecture (SNA) Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks which means commonly used Internet product and services fit within the model. The OSI model describes seven layers of related functions that needed at each end, when a message is sent from one party to another party in a network.Each layer has its own set of special related function as follows: Figure 39: ISO's OSI Architecture http://www. psexam. com Page 35 Contribution of Suresh Khanal for PS Exam Layer 7 – Application Layer: Application programs that use the network. Layer 6 – Presentation Layer: Standardize data presented to the application. Layer 5 – Session Layer: Manages sessions between applications Layer 4 – Transport Layer: Provides error detection and correction Layer 3 – Network Layer: Provides data delivery across the physical connection Layer 2 – Data Link Layer: Provides data delivery across the physical connection Layer 1  œ Physical Layer: Defines the physical network media.Explain IBM's SNA Architecture SNA is a computer networking architecture that was developed by IBM to provide a network structure for IBM mainframe, midrange, and personal computer systems. SNA defines a set of proprietary communication protocols and message formats for the exchange and management of data on IBM host networks. Figure 40: OSI an SNA Comparision Page 36 http://www. psexam. com Contribution of Suresh Khanal for PS Exam SNA can be used for the following types of tasks: ? Terminal access to mainframe and midrange computer applications. File transfer of data between computer systems. Printing of mainframe and midrange data on SNA printers.Program-to-program communications that allow applications to exchange data over the network. ? ? ? SNA can be implemented in a networking infrastructure that uses either a hierarchical or peer-to-peer model. Networking Model Explain Peer-to-Peer Networking Model. A networking model whe re each workstation has equivalent capabilities and responsibilities is known as peer-to-peer model. There is no central server in this network and computers join hands to share files, printers and Internet access. It is practical for workgroups of a dozen or less computers making it common environments, where each PC acts as an independent workstation that stores data on its own disk but which can share it with all other PCs on the network.Software for peer-to-peer network is included with most modern desktop operating systems such as Windows and Mac OS. Explain Client/Server Networking Model. A networking model where one or more powerful computers (servers) provide the different network services and all other user's computers (clients) access those services to perform user's tasks is known as client/server networking model. Client-server networking model became popular in the late 1980s and early 1990s as many http://www. psexam. com Page 37 Contribution of Suresh Khanal for PS Ex am applications were migrated from centralized minicomputers and mainframes to networks of persona computers.The design of applications for a distributed computing environment required that they effetely be divided into two parts: client (front end) and server (back end). The network model on which they were implemented mirrored this client-server model with a user's PC (the client) typically acting as the requesting machine and a more powerful server machine to which it was connected via either a LAN or a WAN acting as the supplying machine. It requires special networking operating system. It provides user level security and it is more expensive. Network and Internet Terminologies NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network.The NIC provides a physical connection between the networking medium and the computers' internal bus, and is responsible for facilitating an â€Å"access method† to the network. Most NICs are designed f or a particular type of network, protocol and media, although some can serve multiple networks. Figure 41: LAN NIC Card Page 38 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality begins to deteriorate as segment exceeds their maximum length. A hub provides the signal amplification required to allow a segment to be extended a greater distance. Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports.Active hubs, also sometimes referred to as â€Å"multiport repeaters†, regenerate the data bits in order to maintain a strong signal. Figure 42: Hub Bridges The bridge function is to connect separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are different, then the packet is â€Å"forwarded† to the correct segment. Bridges are also called â€Å"store-and-forward† device because they look at the whole Ethernet packet before making filtering or forwarding decisions. ttp://www. psexam. com Page 39 Contribution of Suresh Khanal for PS Exam Figure 43: Bridge Router Routing achieved commercially popularity in the mid – 1980s – at a time when large-scale Internetworking began to replace the fairly simple, homogeneous environments. Routing is the act of moving information across an Internetwork from a source to a destination. It is often contrasted with bridging, which perform a similar function. Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex ne twork of many LANs.Page 40 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 44: Router Switches LAN switches are an expansion of the concept in LAN bridging, which controls data flow, handles transmission errors, provides physical addressing, and manages access to the physical medium. Switches provide these functions by using various link-layer protocols. LAN switches can link four, six, ten or more networks together. A storeand-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it to its destination. Figure 45: Switch http://www. psexam. com Page 41 Contribution of Suresh Khanal for PS Exam TransceiversTransceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a builtin 10BaseT or 10Base2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. Figure 46: Transceiver Gateway A Gateway is a device such as a mini or microcomputer capable of operating on a stand alone basis but which also provides connection for communication with the other computers and access to shared resources. Page 42 http://www. psexam. comContribution of Suresh Khanal for PS Exam Figure 47: Gateway PC Proxy Serer Also called a proxy or application level gateway. It is an application that breaks the connection between sender and receiver. Thus, it helps us to prevent hacker from obtaining Internet address and detail of a private network. Firewall Firewall is a method for keeping a network secure. It is mostly used in giving users access to the Internet in a secure fashion as well as to separate a company's public web server from its internal network. Node A node is a hardware device or group of devices or station in a network that link one or more other unit to the network. Wireless NetworkThe m ost and latest wireless LANs use electromagnetic airwaves either infrared or radio frequency to communicate information from one point to another without relaying on a physical connection. Radio waves are often referred to as radio carriers because they simply perform the function of delivering energy to a remote receiver. The http://www. psexam. com Page 43 Contribution of Suresh Khanal for PS Exam data being transmitted is superimposed on the radio carrier so that it can be accurately extracted at the receiving end. Multiple radio carriers can exist in the same space at the same time without interfering with each other if the radio waves are transmitted on different radio frequencies. Figure 48: Nework with Wireless StationsIn a typical WLAN configuration, a transmitter/receiver (transceiver) device, called an Access Point (AP), connects to the wired network from a fixed location using standard Ethernet cable. The Access Point receives, buffers, and transmits data between the WLAN and the Page 44 http://www. psexam. com Contribution of Suresh Khanal for PS Exam wired network infrastructures. A single Access Point can support a small group of users and can function within a range of less than one hundred to several hundred feet. The Access Point (or the antenna attached to the Access Point) is usually mounted high but may be mounted essentially anywhere that is practical as long as the desired radio coverage is obtained.The wireless network, printers or other peripherals can be shared through a connected PC. The devices then communicate using a set of reserved high-frequency radio waves. An Access Point device connects to a DSL or cable modem and enables high-rate (broadband) Internet access for the entire network. Internet Internet is the large worldwide network of computes that facilitates data communication services, file transfer, electronic mail, World Wide Web and newsgroup with common protocols. WWW Figure 49: Tim Berners Lee http://www. psexam. com Pa ge 45 Contribution of Suresh Khanal for PS Exam The WWW is the brainchild of Tim Berners Lee a CERN who had the idea of creating an electronic web of research information.The web is currently the fastest growing Internet information system, with new resources being added regularly. The web relies on a set of protocols, conventions and software to operate. The web is a distributed system of delivering linked documents over the Internet. It is called a distributed system because information can reside on different computers around the world. Yet be easily linked together using hypertext. The web uses hypertext to create links from together using hypertext. The web uses hyperte3xt to create links from one resource to another. A hypertext link is usually displayed by highlighted and underlined text on the page. A hypertext link or hyperlink can also be graphic that acts as a button linking to another resource. IRCInternet Relay Chat (IRC) is a system for sending public and private messa ge to other users in â€Å"real time† – that is, your message appears on the recipient's screen as soon as you type it. Figure 50: Yahoo Chat Page 46 http://www. psexam. com Contribution of Suresh Khanal for PS Exam CU-SeeMe CU-SeeMe is a video conferencing system that allows users to send and receive sound and pictures simultaneously over the Internet. Figure 51: CU SeeMe http://www. psexam. com Page 47 Contribution of Suresh Khanal for PS Exam Figure 52: CU SeeMe Conferencing Telnet It is a protocol or set of rules that enables a computer to connect another computer in network. It is also known as a remote login. The telnet operates on client-server principle. Figure 53: Telnet Screen Page 48 http://www. psexam. comContribution of Suresh Khanal for PS Exam Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the Internet. The Ghoper was created as a piece of software to utilize some of the services that were becoming available on the Internet. HTML HTML stands for Hyper Text Markup Language. It is a standard coding language used to create all web documents (pages). http://www. psexam. com Page 49 Contribution of Suresh Khanal for PS Exam Browsers Figure 54: Different Browsers Logo A browser is the Internet Client software that acts as an interface between the user and the inner-workings of the Internet, specifically the WWW.We can find graphical web browser that displays multimedia content of text, graphics, audio and video, and text web Page 50 http://www. psexam. com Contribution of Suresh Khanal for PS Exam browser that displays only text. Internet Explorer, Netscape, Firefox are graphical web browser and Lynx is a well known text browser. Figure 55: Mozilla Firefox Figure 56: Netscape Navigator http://www. psexam. com Page 51 Contribution of Suresh Khanal for PS Exam Figure 57: Internet Explorer Figure 58: Google Chrome Page 52 http://www. psexam. com Contribution of Suresh Khanal for PS Ex am Dialup Connection Dialup connection is a means of connecting user to another computer (ISP) or a network such as the Internet with a modem equipped computer. IP AddressIP Address is an identifier for particular machine on a particular network. It is part of scheme to identify computers on the Internet. IP addresses are a set of numbers separated with periods. Figure 59: IP Address Structure Figure 60: IP Address and Subnet Mask http://www. psexam. com Page 53 Contribution of Suresh Khanal for PS Exam Domain Name A domain name is a way to identify and locate computers connected to the Internet. This is a text name of a computer in network or Internet. Domain names are converted to IP Addresses to locate computers and resources. URL URL stands for Uniform Resource Locator that identifies a particular Internet resource.URL help the user to locate web page, gopher service, library catalog and image or text file locations. URLs are the standard addressing system of the www. A complete URL provides the web client with all the information it needs to contact a server and make a request for information. URLs are divided into three basic parts: Example: http://www. psexam. com/download. htm a. Protocol (http://) – The information appearing before the colon in any URL indicates the type of information server or protocol. For example http:// indicates that the server to be connected is a www server. b. Domain name (www. psexam. com) – The second piece of information is the address of the server. In this example psexam. om is the name of the machine at PS Exam in world wide web. c. Resource name (download. htm) – The third piece of information is the path to the actual document requested. In this example the URL indicates that the document in the system directory and is named download. htm. Web Browsing or Surfing Browsing or Surfing is the process of visiting different web sites on the Internet hosted by various organizations. Page 54 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Search Engine The search engine is an interactive tool to help people locate information via the www and it is interface between the user and underlying database.The most popular search engines are Alta Vista Exite, Lycos, Yahoo! , Google, Ask etc. Figure 61: Yahoo, Ask, MSN, Google Search Engines http://www. psexam. com Page 55 Contribution of Suresh Khanal for PS Exam Figure 62: Alta Vista Search Engine Figure 63: Lycos Page 56 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Meta Search Engine A web meta searcher is a tool that helps users to locate information available via the World Wide Web. Web meta-serchers provide a single interface that enables users to search many different search engines, indexes and databases simultaneously. Some meta search engines are Albany. net, Clnet (search. om), Cyberland, Eureaka! , Savvysearch and so on. Figure 64: Meta Search Engine Internet Access We can access to the Inte rnet in one of two basic ways, dialing into an Internet Service Provider's (ISP) computer or with a direct connection to an ISP. Connecting to ISP by dialing their hunting number (phone number) is called Dial-up connection. We require a username, password and ISP's hunting number to configure Dial up Connection. http://www. psexam. com Page 57 Contribution of Suresh Khanal for PS Exam Extranet An Extranet is a type of Intranet (Internal TCP/IP Network) that has been selectively opened to a firm's suppliers, customers. IntranetAn intranet can be defined as a network connecting an affiliated set of clients using standard internet protocols, esp. TCP/IP and HTTP or as an IP-based network of nodes behind a firewall, or behind several firewall connected by secure, possibly virtual, networks. Web Index A web index is designed to assist users in locating information on the World Wide Web. Web indexes are also referred to as catalogs or directories. A web index collects and organizes resour ces available via the www. Some of the web indexes are Yahoo! , Megallan, Apollo etc. Figure 65: Web Index Page 58 http://www. psexam. com Contribution of Suresh Khanal for PS Exam HypertextThe hypertext allows for the integration of text, graphics, audio and video on a web pate. This can make it very easy to browse and very exciting to view. A web page may have colorful graphics integrated with textual information. Links on a web page may take you to other web pages, recorded sonds, or digital video clips. A single click on any hyperlink allows you to follow the link to the specified resource. Figure 66: Hypertext and Hyper Link Email Electronic Mail (Email) is one of the most popular & powerful communication tools on the Internet. It is an efficient and effective means of network communication. Email allows you to communicate with people across the globe via electronic media (computer). Email addressAn Email Address identifies a person and the computer for the purpose of exchangin g electronic mail message. Example: [email  protected] com http://www. psexam. com Page 59 Contribution of Suresh Khanal for PS Exam The email address contains three parts: a. Username – The admin in example. b. Domain name of organization – The psexam in example c. Top Level Domain – The com in example Signature Figure 67: Email Client Interface Inbox It is an element of Email Application which collects all incoming mails. Outbox It is an element of Email Application which collects all outgoing mails, if it is created and sent in offline. Page 60 http://www. psexam. com Contribution of Suresh Khanal for PS Exam TrashThis is an element of Email Application that holds all the deleted emails. Figure 68: New Email Message CC CC stands for Courtesy copy or Carbon Copy. It is an element of Email used to specify the additional recipients when the mail sent needs to be acknowledged to them. http://www. psexam. com Page 61 Contribution of Suresh Khanal for PS Exam BCC BCC stands for Blank Carbon Copy. It is similar to CC but the address of other receivers will not be shown to the receiver. Reply A reply is the response of an email you receive. After you read a mail and need to reply it you can use this feature. Forward A mail received can be sent to be other recipients known as forwarding. AttachmentsThe documents created in other applications such as word, excel can be sent along with the email message. These documents that are sent with email is known as attachment. Documents, audio/video files, Zip files etc. can be sent as attachment along with email message. Bounced When a mail sent can't reach to destination and returns back, this is known as bounced. This happens often when the recipient's address is wrong or the server at the recipient's end is down or recipient's inbox is full. Netiquette It is essential for all users on the internet to recognize that they are responsible for their own individual actions while using the net. Netiquette is simply the use of common courtesy and polite behavior while using the net. EmoticonsThe convention of expressing feeling or a joke in symbolic form by user in Email or Chatting for example 🙂 for smiling 😉 for winking 🙠 for frowning etc are emoticons. Page 62 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 69: Emoticons http://www. psexam. com Page 63 Contribution of Suresh Khanal for PS Exam Wish you best of luck! Page 64 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Visit New PS Exam Better Interface and greater possibility to share and interact. Don’t forget to subscribe! http://new. psexam. com ICT Trends – A Blog about blogging Trace the path of Suresh Khanal in blogging, promoting and monetize blogs. http://www. icttrends. com http://www. psexam. com Page 65