Wednesday, October 30, 2019

Moral and Ethical Principles in Public Policy Essay

Moral and Ethical Principles in Public Policy - Essay Example Public policy is what our individual representatives in Parliament choose to do, or not to do, about public problems that can have nationwide consequences. There are also public policy advocates that help bring public problems to the attention of Government on behalf of their clients and help Government made sound decisions or try to influence legislation in the favor of their client’s interests. Thus the actors or participants in public policy matters are primarily the Government functionaries, lobbyists and social pressure groups and other autonomous and semi-autonomous agencies. This paper will discuss the importance of public policy, actors in the policy macro-environment and their contributions, influences and value in shaping of public policy for a nation. The Importance of Public Policy A policy is a stated way of getting things done. It gives the procedures to effect a certain task in a given environment. It states rules and regulations under which business is to be co nducted or a course of action is to be pursued. Policies are guides to action. It may also happen that when a certain course of action has been adopted and is followed consistently by a number of people or groups with no adverse consequences noted for quite a while, that in time becomes public policy regarding that matter. Public policy is said to define a way of life for society, in terms of acceptable behavior and rules and norms that become codes of conduct in that particular culture. It reflects what society regards as important to uphold and preserve in its actions and codes of conduct in dealing with others as well as each other. Actors in the Public Policy Macro-Environment Politics, like diplomacy, is the art of the possible. It is the authority and power to do what is right, to follow the will of the mass of the people, in choosing our actions and their legislation. We are what we do, and the same is true of society, as its moral principles are enshrined in its code of cond uct and rules of law. Public policies reflect society’s most important matters and choices. There may also be a conflict of values, in which case a majority vote determines what is to be done or what receives priority over others. Actors in the public policy environment are the policy advocates, representatives at different levels of Government and in committees, commentators, lobbyists and others. At the highest level, it includes the President, the Governors of various States and members of the Legislature. At lower levels, it may involve school boards, the Mayor or the City Council. Of course, the type and number of actors involved in a particular public policy decision depend on its importance and reach- the number of people it is supposed to affect (Howlett, 1991). Do All the Actors Play Out the Roles They are Given Effectively? There has been considerable debate over whether the present procedures for enactment and consideration of public policy initiatives are sufficie nt to meet the purpose for which they were designed. Many a time it has been felt that we are proceeding at a snail’s pace when an important decision needs to be made.

Monday, October 28, 2019

State and federal laws and regulations Essay Example for Free

State and federal laws and regulations Essay Beginning from January 1, 2006, individuals with incomes up to 150% of the federal state poverty level and with limited resources would be eligible for the subsidy. Unfortunately, the MMA also eliminated all Medicaid drug coverage for more than 6 million individuals who are dually-eligible for both Medicare and Medicaid, and required states to pay back to the federal government – through a mechanism known as the â€Å"clawback† – most of the savings that they would otherwise realize from the state. As a result of the legal mandate, states have attempted to respond by implementing their own State Pharmaceutical Assistance Programs (SPAP) to provide cost-sharing and supplemental drug coverage for dual eligibles and other low-income residents. The SPAP makes payments on behalf of a Part D beneficiary, with such payments being counted toward to the beneficiary – true out-of-pocket costs which count toward meeting the astronomical threshold which leads to reduced or eliminated beneficiary cost-sharing (Center for Medicare Advocacy, Inc., 2007). Despite such efforts by the states, however, the Center for Medicare Advocacy (2007) reports that dual eligibles will nevertheless find themselves with less prescription drug coverage under Part D than they had under Medicaid, and with far less protection to challenge denials, and other barriers to coverage. In addition to making co-payments for their prescriptions, dual eligibles also have to deal with predicted yearly increase of these co-payment amounts (Center for Medicare Advocacy, Inc., 2007). As a result of Part D, the stop-gap emergency actions taken by numerous states was estimate to have cost between $500,000 to several million dollars, as it varies per state, and puts those states budgets at risk (Champlin, 2006). Unfortunately, by law, the federal government cannot reimburse the states for the costs they spent in order to fix the problem. Based on the data presented and analyzed in the previous sections, the thesis concludes with the following recommendations to minimize issues identified – the complicated CMS enrollment process, and the lack of information as to the dual eligible beneficiaries right to reimbursement – to the different parties involved, or affected, by Medicare Part D: The Business Environment †¢ Non-insurance companies, regardless of whether in the US or anywhere else in the world, and regardless of type of industry, should run their health care program like other parts of their business. Health care management should be deemed as a key business function as equally important as the other key business functions of the company such as marketing, sales, or operations (Watson Wyatt Worldwide, n. d. ) †¢ Private insurance companies offering Part D should make sure there is exhaustive communication with Medicare representatives in terms of eligibility information, and with companies and beneficiaries themselves. With regard to beneficiaries, private insurance companies should make sure there is full disclosure, and knowledge, as to the plans available to them, and as to the prescription drugs available in the plans they selected. Insurance companies need to work closely with physicians to ensure that the required drugs their beneficiaries need are included in each beneficiarys formulary. There may be a need to develop a formulary which is more flexible in incorporating the individual medication needs of each patient. Private insurance companies should also not bombard their prospective clients with too much plan options, and should perhaps start with what their clients need, instead of presenting them with a set of options, in order to help the beneficiaries determine which plan is most appropriate for their needs. †¢ Physicians and pharmacies should participate in keeping an eye on how private insurance companies implement Part D plans and regulations. Since these are the two parties or sectors which deal directly with the beneficiaries – either on how they get their medicine upon purchase, and in determining what medication they need – physician associations and pharmacies should lobby or solutions to the glaring loopholes of the Part D program. The Employer †¢ Employers have to emphasize employee productivity and overall health as key goals. Not only should they aim for longer-lasting and more efficient health care strategy planning cycles, but they must also engage their employees in health care decision-making (Watson Wyatt Worldwide, n. d. ) For instance, employers can help by including employee self-service features in their health care program, and should empower their employees to take responsibility for health benefits without the employees feeling that they are left on their own. The employer should provide assistance and information in helping their employees to select the best plans they need. To do so, employers should themselves be careful in their selection if the medical vendor they decide to tie up with, or have been tied up with, in providing employee health benefits. The employer has the responsibility to ensure that the insurance company is effectively transmitting eligibility information to Medicare. In other words, the employer should be vigilant for their employees sake †¢ The employer can also make use of information and technology investments to administer benefits and distribute health information to their employee. The Employee †¢ The employee should do his or her research on Medicare, and study carefully the plans available. The employee should figure out how much he or she can afford to spend, and a make a list of the drugs currently taken. For questions, the employee can turn to the Medicare website or call their 1-800 hotline. Some state assistance programs can also help them enroll, and articles and reports, featured online or in newspapers, which investigate the choices available in their local areas may also provide useful information. Should the beneficiary be taking a large number of prescription drugs, he or she should look for a plan that does not have a doughnut hole or get multiple plans to cover the gap, if they can afford it. Lastly, the employee could also try talking to his or her pharmacist, who fills prescriptions every day and may be able to name plans that provide the best coverage (McWhinney, 2006). †¢ The above recommendations are applicable to retirees or plan-holders who may want to shift to another plan. To beneficiaries however who have not yet retired and are still currently enrolled, they should then strive to take a more active part in taking responsibility for their health care. Understanding the ins and outs of their companys health care program is a first step, as is availing of seminars, and other information dissemination campaigns that their organization may offer. In other words, employees should not be merely passive recipients, but should participate as engaged and informed consumers in making cost-effective decisions with their employers about the type and amount of health care that they need (Watson Wyatt Worldwide, n. d. ) The Government †¢ CMS should require PDPs to notify beneficiaries about their right to reimbursement, and monitor implementation of its retroactive payment policy (U. S. General Accounting Office, 2007). CMS should work with state governments in determining where the deficits arise, and in assisting state-sponsored programs to subsidize low-income beneficiaries by reimbursing at least a percentage of what states spend to make up for what Medicare was unable to provide. This may perhaps require an amendment to the actual MMA law, to encourage states to participate more actively in prescription drug subsidies for their low-income constitutions without the fear of depleting their state coffers. CMS should also require PDPs to transmit eligibility information to Medicare within a prescribed period, with a penalty imposed should such information not be communicated, or be wrongly communicated. In the same vein, CMS must ensure that the assignment of dual eligibles into appropriate plans involves communicating to the PDPs of these beneficiaries dual eligibility. The point is that beneficiaries should not be turned away at pharmacies simply because they were not identified or classified correctly by their PDPs. Otherwise, the MMA would not be serving the original objective of the law: to provide prescription drug benefits, and ultimately, to improve the quality of health care in the country. Part IX: References Camillus, J. C. (November 1999). Putting Strategy to work. Praxi, Business Line’s Journal of Management. Vol. 2, No. 4. Center for Medicare Advocacy, Inc. (2007). Medicare Part D. Retrieved May 10, 2007 from: http://www.medicareadvocacy. org/FAQ_PartD. htm Champlin, Leslie. (January 13, 2006). Family Physicians Grapple with Medicare Part D Glitches. American Academy of Family Physicians. Retrieved May 12, 2007 from: http://www. aafp. org/online/en/home/publications/news/news-now/archive/medicarepartd. html Employee Benefit Research Institute. (July 2004). Health Care Expenses in Retirement and the Use of Health Savings Accounts and Appendix. EBRI Issue Brief # 271. Retrieved May 10, 2007 from: http://www. ebri. org/publications/ib/index. cfm? fa=ibPrintcontent_id=3502 McWhinney, Jim.(January 9, 2006). Getting Through The Medicare Part D Maze. Investopedia. Retrieved May 10, 2007 from: http://www. investopedia. com/articles/06/MedicarePartD. asp Medicare-PartD. com. (April 1, 2007). The Background and Basics of Medicare Part D. Retrieved May 10, 2007 from: http://www. medicare-partd. com/PartD-History-MedicarePartD-ProgramPDP. php Rovner, Julie. (January 11, 2006). Problems Plague Rollout of New Medicare Drug Plan. National Public Radio. Retrieved May 10, 2007 from: http://www. npr. org/templates/story/story. php? storyId=5148817 Slaughter, Louise M.(June 1, 2006). Medicare Part D – The Product of a Broken Process. The New England Journal of Medicine, Vol. 354: 2314-2315, No. 22. Retrieved May 10, 2007 from: http://content. nejm. org/cgi/content/full/354/22/2314 Stebbins, Marilyn. (January 20, 2006). Confused by Medicare Part D? UCSF Expert Offers Advice. University of California, San Francisco. UCSF School of Pharmacy. Retrieved May 10, 2007 from: http://pub. ucsf. edu/today/cache/news/200601203. html Watson Wyatt Worldwide. (No date). New Rules for Managing Health Costs – Seventh Annual WBGH/Watson Wyatt Survey Report. Retrieved May 10, 2007 from: http://www. watsonwyatt. com/research/resrender. asp? id=W-532page=1 Wikipedia, The Free Encyclopedia. (2007). Medicare Part D. Retrieved May 10, 2007 from: http://en. wikipedia. org/wiki/Medicare_Part_D U. S. Government Accountability Office. MEDICARE PART D – Enrolling New Dual-Eligible Beneficiaries in Prescription Drug Plans. Testimony by Kathleen M. King, Director, Health Care, before the Committee on Finance, U. S. Senate, May 8, 2007. Retrieved May 12, 2007 from BenefitsLink. com Website at: http://www. gao. gov/new. items/d07824t. pdf.

Saturday, October 26, 2019

Hijacking Catastrophe: 9/11, Fear & the Selling of American Empire Essa

Directed and produced by Jeremy Earp and Sut Jhally, narrated by Julian Bond, "Hijacking Catastrophe: 9/11, Fear & the Selling of American Empire" is an unrated sixty-eight minute eye-opening documentary released in 2004 by The Media Education Foundation. The film sheds light on the relationship between 9/11 and the invasion of Iraq before the attack on the World Trade Center. Just like every other movie or documentary, this film carries a message; Hijacking Catastrophe provides concise analysis that persuades its audience to take a second look and interpret the connection. It is generally a perceptive documentary full of oppositions against the Bush administration featuring interviews with significant people full of compelling arguments. Hijacking Catastrophe takes its viewers on a journey of all fallacies the Bush administration and radical neoconservatives made to escalate the fear and persuade the American public to strike war on what they called "terror". This documentary contends to represent the political corruption caused by the Bush administration and the right-wing radical neoconservatives. For that reason, the film includes many strategies to help the audience's understanding of the suspected relationship. To begin with, the documentary starts up with the powerful quotation by Herman Goring, "The people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked and denounce the peacemakers for lack of patriotism and exposing the country to danger," This quote explicitly signifies that George W. Bush along with the neoconservatives lied to make the American public react in a certain way they have planned for their own concealed motives. In my opinion ma... ...a man determined to achieve absolute power over the cost of war tragedies. The film productively works through featuring interviews, displaying news footage and heartbreaking pictures of the after math of the war on Iraq. It specifically proves how the Bush administration provoked the media to convince the people of America to support "war on terror" by creating a non-existent fear. It offers interviews and documentaries that show the hidden motives of the Bush administration kept secret from the American public such as gradually expanding the country's power through extending the military expenditures and power to keep up global hegemony. Finally, if anyone pins the America vs. Iraq war on terrorism and have not seen this documentary they are to a certain extent mistaken hence, it is full of vital facts but with less irony, sarcasm and biases than Fahrenheit 9/11.

Thursday, October 24, 2019

Volpone, by Ben Jonson :: Free Essay Writer

Consider the end of the play, the lack of resolution in the Bonario - Celia relationship, the class based difference in the severity of Volpone and Mosca`s punishments, the situation in which Corbaccio, Voltore and Corvino are left. Do you find the ending just and in structure or are the unresolved situations disturbing? In the epistle of the play Ben Jonson states â€Å"it being the office of a comic poet to imitate justice.† It can be said that this is shown in the ending and that it is just and in structure as all the characters are punished in some way for their avarice and the â€Å"innocent† characters Bonario and Celia who in a way provide a contrast to the immoral selfishness, are set free and Celia is given back with three times her dowry money to her father. However there are unresolved issues left at the end of the play concerning these characters. One point of view would be that Celia and Bonario were secondary characters in the play used as virtuous characters to provide a distinction between the corruption and greed of Volpone. Mosca, Corvino, Corbaccio and Voltore, consequently making the problems concerning them as unimportant in context with the punishment or â€Å"justice† served by Jonson to Volpone. But then it is important to bear in mind that as these two ch aracters were so inherently good-natured that the reputation of them and lack of resolution can be regarded as disturbing. Another disturbing injustice can be viewed as the class based difference Mosca and Volpone`s punishments. Volpone is sent to â€Å"Thou art to lie in prison, cramped with irons, till thou be`st sick and lame indeed.† As he is â€Å"By blood, and rank a gentleman.† And is sent to the Hospital of the Incurables. Mosca, â€Å"Being a fellow of no birth, or blood.† Is sentenced to â€Å" first thou be whipped; Then live perpetual prisoner in our gallies.† This inequity can be seen as being based on the fact that Mosca is a parasite, in metaphorical terms a flesh fly who feeds of others: the lowest of the low. However, when one of the avocatore thought Mosca had inherited the money therefore moving up in status, as a clarissimo he had described Mosca as â€Å"A proper man! And were Volpone dead. A fit match for my daughter.† And is called a â€Å"gentleman.† This shows how differences in class make a difference for how the characters are treated i n punishment.

Wednesday, October 23, 2019

The Laws in the Reconstruction Era and the Civil Rights Movement

The Laws in the Reconstruction Era and the Civil Rights Movement The civil rights movement that started and grew through the years following the Brown v. Board of Education decision of 1954 and with the help of the Voting Rights Act of 1965 (Patterson, 2001) marked an important period that accomplished more than ending segregation in cities and unfair rights; it led to the transformation of American social, cultural, and political life. The civil rights movement did not only demonstrate that the rights of African Americans should not be ignored but also showed how a nation as a whole had the power to change itself. The way the civil rights unfolded, gave others a chance to reach equal opportunity in the future. When one thinks of the words â€Å"civil rights† one often thinks of Martin Luther King’s â€Å"I Have a Dream† speech before the nation’s capital. Many can recall television footage of peaceful marchers being abused by fire hoses and police dogs. These and other images can be seen as a struggle and intense burst of black activists that characterized the civil rights movement of the mid twentieth century. Yet African Americans have always struggled for their rights. Many consider the civil rights movement to have begun not in the 1950s but when Africans were first brought in chains, centuries earlier, to American shores (Gillon & Matson, 2001). In particular, those African Americans who fought their enslavement and demanded fundamental citizenship rights laid the foundation for the modern civil rights movement. The first slaves were brought to America in 1619 ( Gillon & Matson, 2001). Not until the Thirteenth Amendment abolished slavery following the Civil War did blacks gain their freedom (Gillon & Matson, 2001). But the newly freed blacks could not read or write and did not have money or property, and racism and inequality remain, especially in the South, where slavery had predominated for so long. To aid black assimilation into white society, federal and state governments implemented many democratic reforms between the years 1865 and 1875, the Reconstruction era (Gillon & Matson, 2001). The Fourteenth Amendment, for example, guaranteed blacks federally protected equal rights, and the Fifteenth Amendment granted black men the right to vote (Gillon & Matson, 2001). Despite these and other measures to help the former slaves’ rights, the effects of the Reconstruction era were short lived. In the area of extreme southern white society, many did whatever it took to keep blacks from enjoying any of the benefits of citizenship. Some, for example, sought to keep African Americans from equal rights through harassment or intimidation. A number of racist groups, such as the Ku Klux Klan (KKK), used even more cruel methods including lynching and other forms of violence to terrify African Americans seeking to exercise their rights or advance their social position. You can read also  Similarities and Conflicts in † a Streetcar Named Desire† As the constitutional guarantees of the Thirteenth, Fourteenth, and Fifteenth amendments continued to slowly disappear, the Supreme Court struck perhaps the most crippling blow to the black struggle for equality: In 1896 the Court ruled in Plessy v. Ferguson that blacks and whites could be legally separated as long as the facilities for each were â€Å"equal† (Chong, 1991). Facilities for blacks and whites were rarely equal. More importantly, the Supreme Court’s decision, by legally backing segregation, gave white society a powerful tool to keep blacks from enjoying the rights of citizenship. With the Supreme Court now reinforcing the South’s segregation practices, the environment of white racism gave birth to the Jim Crow Laws, southern customs and laws that kept parks, drinking fountains, streetcars, restaurants, theaters, and other public places segregated (Conklin, 2008). In response to Jim Crow, which by 1900 extended into all parts of public life, several leaders in the black community stepped up to debate political strategies to fight injustice and racial inequality. One of the dominant figures of this early movement for civil rights was an intellectual W. E. B. Du Bois, who encouraged African Americans to fight for the rights that they deserved. Du Bois’ crusade led, in part, to the formation of the National Association for the Advancement of Colored People (NAACP), a civil rights organization that brought together lawyers, educators, and activists to collectively fight for black civil rights (Powledge, 2001). Through protests, agitation, and legal action, the NAACP continued a steady campaign to end segregation in housing, education, and other areas of public life. With the outbreak of World War I, well over a quarter of a million black troops joined the military, but were relegated to segregated units (Romano, 2006). At the same time, many blacks traveled north to take advantage of the rapidly increasing defense industries. This massive migration, however, aggravated unemployment and other problems that already plagued the northern urban centers. Racial problems continued. When the United States entered World War II, African Americans were, as before, subjected to discrimination in the defense ndustries and in military units, despite their willingness to risk their lives in combat (Powledge, 2001). These wartime experiences, along with a growth in the African American population resulted in a surge of black protest that brought Jim Crow under national scrutiny. During the 1950s, two incidents brought the issue of civil rights squarely into the public spotlight. On May 17, 1954, the NAACP, which had been steadily chipping away at the legal foun dations of segregation, won an unprecedented legal victory: The Supreme Court unanimously ruled in Brown v. Board of Education that segregation in public schools was unconstitutional (Polsgrove, 2001). Chief Justice Earl Warren presented the Court’s decision, in which he describes why â€Å"separate but equal† in education represents a violation of African Americans’ rights: â€Å"Segregation of white and colored children in public schools has a detrimental effect upon the colored children. The impact is greater when it has the sanction of the law; for the policy of separating the races is usually interpreted as denoting the inferiority of the Negro group. A sense of inferiority affects the motivation of a child to learn. Segregation, with the sanction of law, therefore, has a tendency to inhibit the educational and mental development of Negro children and deprive them of some of the benefits they would receive in a racially integrated school system† (Patterson, 2001). By ruling against â€Å"separate but equal† doctrine set by the case Plessy v. Ferguson, the court had struck a blow to segregation. But still many southern racist practices were still being practiced, and many whites remained opposed to change. With the ruling of Brown, the affects remained slow, if not existing at all. Many school officials refused to comply with the ruling and the threat of harassment; for the ruling had unleashed fierce resistance preventing many black students from enrolling in all-white schools. At the same time, schools for black students remained overcrowded, dilapidated, and, in general, grossly inferior to those that their white counterparts enjoyed (Conklin, 2008). The second incident that captured the public eye unfolded in Montgomery, Alabama, when a woman named Rosa Parks started the spark that would provide the momentum for the entire civil rights movement. On December 1, 1955, the NAACP member boarded a public bus and took a seat in the â€Å"Negro† section in the back of the bus. Later, Parks refused to relinquish her seat to a white passenger, defying the law by which blacks were required to give up their seats to white passengers when the front section, reserved for whites, was filled (Polsgrove, 2001). Parks was immediately arrested. In protest, the black community launched a one-day local boycott of Montgomery’s public bus system. As support for Parks began, the NAACP and other leaders took advantage of the opportunity to draw attention to their cause. They enlisted the help of a relatively unknown preacher, Martin Luther King Jr. , to organize and lead a massive resistance movement that would challenge Montgomery’s racist laws (Kohl, 2005). Four days after Parks’ arrest, the citywide Montgomery bus boycott began (Kohl, 2005). It lasted for more than a year. Despite taunting and other forms of harassment from the white community, the boycotters persevered until the federal courts intervened and desegregated the buses on December 21, 1956 (Kohl, 2005). The Montgomery bus boycott was important because it demonstrated that the black community, through unity and determination, could make their voices heard and effect change. Picketing, boycotting, and other forms of resistance spread to communities throughout the South. Meanwhile, King emerged as the movement’s preeminent leader. His adherence to the nonviolent tactics used by the Indian nationalist Mohandas Gandhi would largely characterize the entire civil rights movement and inspire large scale participation by whites as well as blacks (Sunnemark, 2003). From 1955 to 1960, the efforts of blacks to bring attention to their cause met with some success. In 1957 Congress passed the Civil Rights Act, the first since Reconstruction, to establish a civil rights division in the Justice Department that would enforce voting and other rights (Davis, 2001). Meanwhile, the NAACP continued to challenge segregation, and out of that came numbers of new organizations that where formed. Among these, the Southern Christian Leadership Conference (SCLC), a Christian-based organization founded in 1957 and led by King, became a major force in organizing the civil rights movement (Sunnemark, 2003). An organization called the Student Nonviolent Coordinating Committee (SNCC) grabbed the media spotlight, and started many protests; when it backed four students who launched a sit-in campaign to desegregate southern lunch counters (Conklin, 2008). Not only was the nonviolent sit in technique used to desegregate other public places, but it gave large numbers of African American youths a way to participate in the movement. This helped gain national attention, bringing equal rights demands before the public eye. The protest movement continued to accelerate as different leaders tested new tactics and strategies. Many established community-based projects that sought to combat the barriers that kept blacks from voting. Others targeted the white terrorism that continued to intimidate blacks into submission. King and other leaders launched a massive campaign that brought together thousands of blacks in Birmingham, Alabama, one of the most segregated and violently racist cities at the time (Sunnemark, 2003). Early in the campaign, King was arrested and jailed. From his cell, he penned his famous â€Å"Letter from Birmingham Jail,† which earned him the support of many sympathetic whites (Conklin, 2008). Meanwhile, as blacks continued the desegregation campaign in Birmingham, an event occurred that irrevocably commanded the attention of America and its leaders: In an effort to stop a demonstration, the notoriously racist police Chief Eugene â€Å"Bull† Connor turned vicious attack dogs and fire hoses on the peaceful demonstrators (Sunnemark, 2003). The force of the water slammed women and children to the ground and sent others hurling through the air. Television coverage and other media reports of these brutal assaults shocked the nation and viewers around the world. After a month of this highly publicized violence, city officials repealed Birmingham’s segregation laws (Powledge, 2001). In Birmingham’s aftermath, mass demonstrations continued to spread, as did fierce resistance within the white community. In response to these events, King and other leaders planned a mass gathering on the nation’s capital in the summer of 1963 (Sunnemark, 2003). On August 28, the March on Washington brought an estimated quarter of a million people, black and white, in front of the Lincoln Memorial, where King delivered his now famous â€Å"I Have a Dream† speech (Romano, 2006). This triggered the SNCC to start a wide-scale campaign to bolster voting rights. The group launched a massive voter registration drive throughout the South, concentrating on Mississippi, where less than 5 percent of the state’s eligible blacks were registered to vote (Conklin, 2008). Freedom Summer, as it became known, was marked by episodes of extreme white terrorism. One of the most heinous examples involved three young civil rights workers. The trio was working to register voters when they were arrested and later murdered by the Ku Klux Klan (Patterson, 2001). By 1965 the voting campaign had shifted to Selma, Alabama, where, under the leadership of King, thousands of demonstrators began a fifty-mile trek to Montgomery (Sunnemark, 2003). This time, as the peaceful demonstrators approached the Edmund Pettis Bridge, state troopers used police whips and clubs to halt their progress. The scene blasted into American living rooms via the nightly news. After â€Å"Bloody Sunday,† thousands of people gathered again to complete the march, this time under the protection of the Alabama National Guard (Powledge, 2001). On August 6, 1965, shortly after the highly publicized events in Selma, President Johnson signed into law the Voting Rights Act, which, for the first time since Reconstruction, effectively opened up the polls to southern black Americans (Davis, 2001). By the mid-1960s, many black activists started to lose faith in the civil rights reforms that thus far had targeted only the most blatant forms of discrimination (Chong, 1991). While King’s nonviolent direct action approach had dominated the movement, many people particularly in the North, adopted a more revolutionary stance. As a wave of nationalist sentiment grew within the movement, organizations such as SNCC and CORE took up more militant agendas. SNCC, for example, began promoting a program of â€Å"black power† a term that meant racial pride (Conklin, 2008). The greatest spokesman for Black Nationalism was Malcolm X. With his working-class roots and charismatic style of speaking, Malcolm appealed to a lot of young urban blacks. Malcolm rejected Dr. King’s advocacy of nonviolence and instead urged his followers to secure their rights â€Å"by any means necessary† (Sunnemark, 2003). After Malcolm’s assassination in February 1965, another extremely provocative Black Nationalist group emerged: the Black Panthers, a group that boldly adopted the idea â€Å"by any means necessary† (Sunnemark, 2003). Race riots exploded across America, as blacks trapped in urban slums lashed out against the poverty and racism still rampant in their communities. Not only did the riots devastate ghetto areas that were home to millions of African Americans, including those in the Watts section of Los Angeles, but the racial violence started a separation between those who continued to believe that civil rights could be achieved through peaceful means and those who were more violent . King’s assassination in April 1968 struck a blow to the already fractured civil rights movement. Marin Luther King Jr. became the face of national equality not just for African American but to all those who sought justice and freedom. The American civil rights movement nevertheless left a permanent mark on American society. Most of the forms of racial discrimination came to an end, and racial violence decrease. Today, African Americans can freely exercise their right to vote, and in communities where they were once banned from the polls. Millions of African Americans have been lifted out of poverty as a result of the many economic opportunities created by the civil rights movement. Also important, the civil rights movement served as a model for the advancement of other minority groups, including women, the disabled, Hispanics, and many others. The civil rights movement has left a legacy in which generations after it can learn by reading it and not through experiencing it.

Tuesday, October 22, 2019

Can Fancy Trucks Attract New Drivers

Can Fancy Trucks Attract New Drivers CareersInGear has rounded up several of the latest innovations luxury truck manufacturers are turbo-loading into new rigs:Â  In-truck bathing and toilet facilities! The most popular features? KitchenettesTables and boothsEntertainment centers set up with surround sound, DVD players, video game consoles, and flat screen TVsLarger, non-folding bedsHow are the entertainment centers not a terrible idea? But anyway, the thing to remember with all these action-packed palaces on wheels is the weight. Balance your need for amenities with the number of loads you want to make, the mileage you’ll be accumulating (and the fuel costs that go with it), and the frequency of the runs you’ll be making. Companies like TryHours are piloting 20 big rigs in their fleet with more extravagant features, but in order for these upgrades to be reasonable across the industry they’ll need to be scaled down appropriately. More comfortable beds, absolutely! Xbox? Maybe not so much!Have you se en any of these luxury rigs on the road yet? Â  Would the increased convenience of stopping less and enjoying more privacy be worth the compromises on load-bearing? Weigh in in the comments!

Monday, October 21, 2019

Advantages and Disadvantages of being a sole trader

Advantages and Disadvantages of being a sole trader Sole traders are the most common form of business organizations. One person provides the permanent finance and, in return, has full control of the business. Sole traders have a variety of advantages and disadvantages.Firstly, sole traders have limited liability which means that their personal possessions and property can be taken to pay off the debts of the business if it fails. A sole trader organization is easy to set up, as there are hardly any legal formalities. The owner has complete control of the business and is able to keep all profits made. Since a sole trader manages their business completely on their own, they do not have to answer to anybody else as they would in a partner ship situation. They are able to choose times and patterns of working that are suitable for them. The business can be based on the interests or skills of the owner, rather than working as an employee for a larger firm.English: Sole Trader - Petty CuryDecision purelyHowever, although the advantages of be ing a sole trader make this organization structure seem very appealing, it also comes with a number of drawbacks and disadvantages. Sole traders have unlimited liability meaning that all of the owner's assets are potentially at risk. This makes it difficult for the owner to raise additional capital is they are purely dependant on their own savings, profits made and loans for injections of capital. Even though a sole trader can choose times and patterns of working, longs hours are often necessary ti make business pay.Another major disadvantage is that the owner is unable to specialize in areas of the business that are most interesting. They are responsible for all areas of management. This can be a tough and effort consuming duty. As many sole traders remain small in order to remain...

Sunday, October 20, 2019

Enlightenment Philosophers Influencing the American Documents Essay Example

Enlightenment Philosophers Influencing the American Documents Essay Example Enlightenment Philosophers Influencing the American Documents Essay Enlightenment Philosophers Influencing the American Documents Essay During the 1600- 1700â„ ¢s enlightenment philosophers all had different ideas on government and the way of living. All these ideas greatly impacted the colonists, encouraging the American Revolution and helping form its government. These political, economic, and social changes from the Enlightenment also influenced the American documents; the Declaration of Independence, the Constitution, and the Bill of Rights. Five great philosophers greatly impacted the Revolution and the documents and although many think that Montesquieu influenced more ideas then Baccaria, Rousseau, Voltaire, and Locke, Locke truly impacted the most in the creation of U.S. government and its documents. The rights in the Bill of Rights werenâ„ ¢t based on the ideas of Baron de Montesquieu but the ideas of John Locke. Lockeâ„ ¢s ideas of the Natural Rights were the general foundation of the bill, Voltaire and Baccaria went more into detail on his beliefs. In the first amendment, ideas of freedom of speech, press, and religion are a very crucial part of the Bill of Rights. This idea was by Voltaire, he believed strongly in all the rights. He believed in the freedom of speech and press because he was a writer himself and thought you can have a right of thought and expression. He is famous for the powerful quote, I may not agree with what you say but I will defend to the death your right to say it. Voltaireâ„ ¢s second idea was freedom of religion. He believed in this because he lived in France and at that time you could only be catholic. Everyone that was not catholic was kicked out of their homes so he believed that there should be religious toleration. Religion toleration i s an important right because there is many religions in the world and is the one of the main causes of war, so if people have freedom of religion there is more hope that there will be fewer wars. The main second philosopher that helped with the Bill of rights was Baccaria; his ideas were put into amendments five, six, and eight. In amendments 5 and 6 he influenced that every mean should have the right to a speedy and public trial and torture is not allowed. Amendments five and six were important because people used to torture others so that they will say one thing even if it is untrue and with no torture there will be fair trial. The eighth amendment is the prohibition of excessive bail and cruel, unusual punishment. This means that a personâ„ ¢s crime should determine the type and severity of the punishment, this is one of the fairest rights because you can not get equality for all people, no one can be prejudice to the person and everyone gets equal treatment for the crime that is done. Baccariaâ„ ¢s ideas were like Lockeâ„ ¢s ideas of all men are equal giving men equal treatment. Montesquieu inspired the U.S. constitution greatly but Locke still had a main idea in the document. Montesquieu believed in checks and balances giving him the idea of the 3 branches of government; judicial, executive, and legislative. All three of the branches had equal amount of power, this way not group could take over and corruption wouldnâ„ ¢t occur. The judicial branch is made up of the judges of the Supreme Court; they interoperate the laws to see how each applied to a specific case. The executive branch is made up of the leader (president or king) and his ministers; they carried out the laws of the state/ country. The last branch, legislative; they were made up of parliament (congress) and they made the laws. These branches carefully check each other, the leader can veto a law by congress but congress can override a vito by 2/3 vote, also the judicial branch can determine the when a law is unconstitutional. These all work perfectly to make sure that no one gets more power then the other and is superior to another. John Locke believed in equality for all and this represents it, all branches are equal and no branch has more authority. Lastly, the declaration of independence was based on mostly Lockeâ„ ¢s brilliant ideas, leaving Montesquieu in the dust for most influential. John Locke advocated the 3 natural right of man, which were the basis that Thomas Jefferson made for the Declaration. Lockeâ„ ¢s natural rights state that everyone is able to have life, liberty, and the right to own property. No one is able to take away these rights because they are given to you by god. He also stated that if the government did not protect these rights, that the citizen had the right to overthrow or remove it from being in office. This was in the opening of the document because it was that most important, main idea that gave people more freedoms. Locke was not the only philosopher that influenced it, Jean Jacques Rousseau had man important ideas to add. He impacted it by the idea that nobility should be abolished, that all men are created equal, and also along with Lockeâ„ ¢s ideas about the social contract. The soci al contract is that persons in a state would willingly come together to form a state and that individuals would agree to form a state that would provide a neutral judge that could protect the lives, liberty, and property of those who live within the state. Locke was the main contributor to the Declaration for all his brilliant ideas. The enlightenment was a very important to shape America into what it is today. Without the central ideas and figures of the enlightenment, the U.S. would have been drastically different from what it is today. Both during and after the American Revolution many of the core ideas of the enlightenment were the basis for the important documents; declaration of independence, the constitution, and the bill of rights. Concepts such as freedom form oppression, natural rights, and the new ways of thinking about the governmental structure came from the philosophers such as Montesquieu, Baccaria, Rousseau, Voltaire, and most importantly Locke. They all made the foundations of colonial and modern America.

Saturday, October 19, 2019

Legal System of The United States Essay Example | Topics and Well Written Essays - 1250 words

Legal System of The United States - Essay Example Each state government within the US is independent in governing its people. Presently, there are 50 US states which are self-governing and make their own decisions. Federalism is quite domineering in reference to the America’s legal system because the Constitution defines the rights and obligations of each individual state in direct relation the federal government. Basically, the purpose of this essay is to augment this argument that the legal system of America cannot be explicated without discussing federalism because both are closely connected. The following discussion will scrutinize many impacts executed by federalism on the US legal system. There is huge federal involvement in many justice functions that are left to be performed by the national and state governments. This federal involvement in the justice and law enforcement area has not always been so conspicuous throughout the US history as it is now. Now, the federal government regularly contributes to assisting the a dministration in control of the Department of Justice and makes a number of critically important recommendations. It is suggested that the greatest involvement of federalism in law enforcement that was ever witnessed in the US history was during the Nixon Administration (Meese). It was under the governance of late US President Nixon that federalism really picked momentum and gained confidence in the actual functioning process of law enforcement. Prior to the Nixon rule, there was hardly any noticeable presence of federalism, but following that and in every successive governing period the Congress is seen to be considerably influenced by this particular political ideology. While many potential benefits are offered by federal involvement in crime control and justice department, there are also some disadvantages. Critics see many problems attached to federalism playing a potential role in local crime control in each state and it is even thought that the underlying motives of federal in volvement can be unauthentic and flawed. The influence inflicted by federalism on local law enforcement agencies is undeniable, but it cannot always be justified or considered necessary. It is one of the not so positive impacts produced by federalism on the legal system of the US that whenever the Congress perceives any law or penalty to be politically outstanding and practical, it decides to sign it and implement it in the state even when it is not necessary and regardless of the nature of the law. The bedrock of the federal system is constructed by effective distribution of control between the national and state governments (Federalism Overview). The legal system in the US is heavily inspired by the political philosophy of federalism which explains why all 50 self-governing states in the US have the power to define their own standards which may not be similar to those of the federal government. Both national and state governments are in charge of devising very important national p olicies which have huge repercussions for the public. But, there is a division of control between the central government and each of the 50 states and the roots of this division are entrenched in federalism. There is such heavy involvement of federalism now in every legal area and national or local policies that the legal system of the US cannot be studied or assessed now in separation from federalism because they are not separate subjects now but have blended into one over time. It is

Friday, October 18, 2019

Lecture review Essay Example | Topics and Well Written Essays - 500 words

Lecture review - Essay Example He was determined to be someone who would help develop the society (Perdue). Dr. James studied hard to become a teacher and coach. The disability did not prevent him from performing his duties because he received the award of the best teacher of the week at the Fox 17 awards. He also became the top teacher during the 2002. He showed great ambition and demonstrated that one should not give up their goals when he received his doctorate degree from Tennessee State University. He still held on to his passion, and this awarded him with the title Coach of the Year for both the years 2000 and 2006. Receiving the Dr. Ramer Award in 1991, and Jo Andrews in 1995 showed that he was able to set aside all challenges and adversities in order to succeed both as a teacher and as a coach. Narrating his life experiences made one realize the scope of the challenges that existed in the world. That all people, in one way or another, faced challenges, but they should not be a reason to back down (Perdue). Dr. James Perdue was very clear about his mission in the society. He would help others in passing through strategies so that they would emerge as survivors of the tragedy. He was very specific that it is everyone’s responsibility to help each other in times of tragedy, and even before it occurs. We should be a source of encouragement and motivation, hence acting as pillars that support the hurting (Perdue). We, who pass through the struggles of life, should find the strength of passing through all the tragedies. This enabled me to realize that as much as our friends are there to support us; we ought to encourage ourselves and uplift our spirits because today’s tragedies should not affect our tomorrow. We, therefore, ought to live each day to our fullest. We should hold on to the hope and the determination that we can beat all odds whatever the tragedy may be, or whenever it may strike (Perdue). Passion should, therefore, be our driving force through the tragic

LETTER OF APPEAL Essay Example | Topics and Well Written Essays - 1500 words

LETTER OF APPEAL - Essay Example Respect Sir, I basically belong to the part of the world that is often characterized by the conventional professions and money making sources. These primarily include professions like business studies, engineering, medicine and other commonly tested and practiced professions. In such environments there is little margin for experimenting or going for professions that are little tested and little known. Before I put my case, I hereby state that I am not writing to question the system of immigration in the incumbent country nor do I plan to challenge it through the claims that I may make. I am here only to seek your professionally motivating and sympathetic consideration into the personal reasons which forced me into skipping classes and breaching the original terms of visa where it was conditioned to attending the classes and completing my degree as per initial undertaking. I will also attribute the reason for the overall debacle to the immaturity and hastiness from my end, believing that the dropping out will make my parents realize instead of considering the repercussions and the possible consequences and I hold myself directly responsible for it and do not blame the law, the institution or any other individual affiliated in the entire conundrum that is at hand. To start with the particularity of my case I render an unconditional apology for having violated the original conditions and thereby request a revisiting into the case with possible grant of a fresh visa or nullifying of the decision reached as a result of the acts committed in the light of skipping classes originally. Giving a history of my family, my sister is enrolled in the field of medicine study and she is going well with her goals and there are no records of her dropping out or any other event therefore I can indirectly assure through her practices and her presence ,that if I am given a chance to follow my desired goals, it will allow me delivering the goods as per expectations and conditions

Thursday, October 17, 2019

Organizational Development in HRD Essay Example | Topics and Well Written Essays - 500 words

Organizational Development in HRD - Essay Example The last manager to be terminated, Leon McLaughlin had 15 years of Marine experience, but he could not deliver results. Although, he did his best, he was handicapped by the lack of funds, which were originally promised, leading to underperformance. The main task before the new manger, Jack Keltner, is how to successfully run Fourwinds Marina through new strategies, even while generating funds. Strengths Lake Monroe is a happening place in Indiana with all safeguards and opportunities FourWinds has been providing optimum services for the last few years There are other value added services, which would complement it Jack Keltner’s previous good performance in Marina’s accounting department Weakness Managers are being changed in a short-term manner, without long-term perspective Thus, there is no optimum continuity of the various organizational processes, initiated by each one of them Charges for anchoring boats are also increasing, leading to higher operational costs Oppo rtunities Indianapolis metropolitan area’s population is over one million, and they have some $3.5 billion dollars to spend annually.

Economics of Advertising Essay Example | Topics and Well Written Essays - 2250 words

Economics of Advertising - Essay Example No company can imagine economic growth without this strong tool called advertisement. Even non-profit organizations and public authorities to promote national programmes such as health campaign, anti drug campaign, literacy drive, cultural mission etc use this vehicle to reach their people. Some organizations which frequently spend large sums of money on advertising but do not strictly sell a product or service to the public, include political parties, interest groups, religion-supporting organizations, and militaries looking for new recruits. Additionally, some non-profit organizations are not typical advertising clients and rely upon free channels, such as public service announcements. The advertising industry is large and growing. In the United States alone in 2005, spending on advertising reached $144.32 billion, reported TNS Media Intelligence. That same year, according to a report titled Global Entertainment and Media Outlook: 2006-2010 issued by global accounting firm Pricewat erhouseCoopers, worldwide advertising spending was $385 billion. The accounting firm's report projected worldwide advertisement spending to exceed half-a-trillion dollars by 2010. Nowadays, advertisement has become the common medium of commercial interaction in competitive bids. Advertising has gone through five major stages of development: domestic, export, international, multi-national, and global. For global advertisers, there are four, potentially competing, business objectives that must be balanced when developing worldwide advertising.... me organizations which frequently spend large sums of money on advertising but do not strictly sell a product or service to the public, include political parties, interest groups, religion-supporting organizations, and militaries looking for new recruits. Additionally, some non-profit organizations are not typical advertising clients and rely upon free channels, such as public service announcements. The advertising industry is large and growing. In the United States alone in 2005, spending on advertising reached $144.32 billion, reported TNS Media Intelligence. That same year, according to a report titled Global Entertainment and Media Outlook: 2006-2010 issued by global accounting firm PricewaterhouseCoopers, worldwide advertising spending was $385 billion. The accounting firm's report projected worldwide advertisement spending to exceed half-a-trillion dollars by 2010. Nowadays, advertisement has become the common medium of commercial interaction in competitive bids. Advertising ha s gone through five major stages of development: domestic, export, international, multi-national, and global. For global advertisers, there are four, potentially competing, business objectives that must be balanced when developing worldwide advertising: building a brand while speaking with one voice, developing economies of scale in the creative process, maximizing local effectiveness of ads, and increasing the company's speed of implementation. Born from the evolutionary stages of global marketing are the three primary and fundamentally different approaches to the development of global advertising executions: exporting executions, producing local executions, and importing ideas that travel. (Global marketing Management, 2004, pg 13-18) MERITS OF ADVERTISEMENTS If a vehicle runs with an

Wednesday, October 16, 2019

Organizational Development in HRD Essay Example | Topics and Well Written Essays - 500 words

Organizational Development in HRD - Essay Example The last manager to be terminated, Leon McLaughlin had 15 years of Marine experience, but he could not deliver results. Although, he did his best, he was handicapped by the lack of funds, which were originally promised, leading to underperformance. The main task before the new manger, Jack Keltner, is how to successfully run Fourwinds Marina through new strategies, even while generating funds. Strengths Lake Monroe is a happening place in Indiana with all safeguards and opportunities FourWinds has been providing optimum services for the last few years There are other value added services, which would complement it Jack Keltner’s previous good performance in Marina’s accounting department Weakness Managers are being changed in a short-term manner, without long-term perspective Thus, there is no optimum continuity of the various organizational processes, initiated by each one of them Charges for anchoring boats are also increasing, leading to higher operational costs Oppo rtunities Indianapolis metropolitan area’s population is over one million, and they have some $3.5 billion dollars to spend annually.

Tuesday, October 15, 2019

Alignment of HRM with Business Strategies Term Paper

Alignment of HRM with Business Strategies - Term Paper Example This quality can only be developed when human resource manager is given an active role in the growth and development of an organization. Multinational companies are considered as a pioneer in developing the latest HR system which can benefit the organization. Marriot is one of the well-known restaurant chains working in the USA. They have developed there human resource management systems in such a way that employees are considered as one of the valuable assets of the organization. The contribution of human resource management is an important factor to achieve the desired results for the organization like Marriot. Aruba Marriot believes that employees should be well aware of the role which he or she has to play to the overall productivity of the organization. HR can only be considered as a business partner when the employees know about the strategic direction which has been set by the HR professionals and top management collectively. Aruba Marriot communicates its strategic directions by providing signals within the job description and job specifications. HR professionals at Aruba believe that potential employers can only contribute positively when he has clear direction about where the company is heading in the next five to ten years (Rosenbloom, 2007). The quality of the human resource management function can also be analyzed by looking at the level of positions which are often available within the organization. For example, if an organization keeps on creating new vacancies for its new departments and functions then it can be inferred that the organization is growing and the human resource department is attracting new talent towards their organization. However, if an organization keeps on introducing same vacancies after every five to six months then it can be inferred that organization is not able to retain talented employees or there is some issue with the culture prevailing within the organization. As far as the case of Aruba Marriot is concerned, the orga nization is growing and they are offering diverse positions within the organization so that they can meet the human resource requirement. Some key positions which are often offered at Aruba Marriot include front desk officer, vacation planner, door person, vacation planning coordinator etc. The organization is associated with hospitality services business; therefore the positions available often require extrovert persons to deal with the customers politely. Aruba Marriot is a company of good repute, therefore, the people working at this organization should be well aware of the standards which could be expected from them. The organization has associated itself with well-known health and safety standard union which ensures the quality services provided by Aruba Marriot. HR manuals of an organization also indicate the level of competency and essential skills required by the organization for the effective performance of task, duties and responsibilities (Ghemawat, 2003). There are many interesting job positions offered by Aruba Marriot. As far as my preferred choice is concerned I believe that the job of front desk officer suits the personality traits at which I am good. Extroversion is almost essential in the hospitality services, therefore, I have the right kind of skill to excel in the field of hospitality in general while the job of front desk officer in particular. This job also requires public relation skills, therefore, the contacts which I have developed during my education can also help in attracting potential clients for Aruba Marriot.  Ã‚  

The World Is A Text Essay Example for Free

The World Is A Text Essay The introduction of Silverman and Raders The World is a Text states that: â€Å"We should think of our entire world as something that should be read† (Silverman Dean, Introduction). On my personal view, this means that we should think and analyze each event that happens in our daily lives. Critical thinking is necessary in order for us to understand the world as a whole and consider its inside (human factors) and outside (non-human factors). This involves the environment, development and sustainability of the world and the people in general.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One real-life example of how I read the world recently is how fair treatment campaigns are done worldwide but still it remains as one of the biggest problem that we all face. Mixed-raced or pure, unfair treatments is an issue at home, office, schools and other places that truly brings an imprint of trauma to someone’s heart resulting to social division of people according to their race. The influence and impact of this issue causes people to change their individual character as a person just to belong in a group that results to behavioral risk problems, lack of self-esteem, social isolation and problems in family relationships. This racial difference is the root cause of the conflicts our world is experiencing now that is why it should be read and solved first. Diversity cannot be avoided but it can be applied in a positive manner.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The world is something that we should interpret.   In terms of social factors, each one of us must consider the different factors that may influence decision-making and the actions we take as values, beliefs and personal circumstances. There is a need to reconcile these diverse social aspects of human race to complete a firm global citizenship. Works Cited Silverman, Jonathan and Rader, Dean. The World is a Text: The Writing, Reading, and   Ã‚   Thinking   About Culture and Its Contexts (2nd Edition). New Jersey: Prentice Hall, 2005.

Monday, October 14, 2019

Proactive and Reactive MANET Protocols Analysis

Proactive and Reactive MANET Protocols Analysis Ad hoc network Abstract A mobile ad hoc network (MANET) is consisting of wireless mobile nodes. The communication of these mobile nodes is carried out without any centralized control. Routing is a critical issue in MANET. The focus of this thesis is on the performance of routing protocols. We compare three routing protocols in MANET i.e. AODV, DSR and OLSR. OPNET is the simulation tool. These routing protocols performance are analyzed by three important metrics: delay, network load and throughput. All the three routing protocols are explained in a deep way with metrics. The comparison analysis will be carrying out about these protocols and in the last the conclusion will be present. That which routing protocol is the best for mobile ad hoc network. Introduction MANET stands for Mobile Ad hoc Network. A decentralized autonomous wireless system which consists of free nodes. MANET sometimes called mobile mesh network. MANET is a self configurable wireless network. A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are as transmitters, receivers and antennas. These antennas can be of any kind. These nodes can be fixed or mobile. The term node referred to as, which are free to move arbitrarily in every direction. These nodes can be a mobile phone, laptop, personal digital assistance, MP3 player and personal computer. These nodes located, might be in cars, ships, airplanes or with people having small electronic devices [59]. Nodes can connect to each other randomly and forming arbitrary topologies. Nodes communicate to each other and also forward packets to neighbor nodes as a router. The ability of self configuration of these nodes makes them more suitable for urg ently required network connection. For example in disaster hit areas where there is no communication infrastructure. It is greatly desired to have a quick communication infrastructure. MANET is the quick remedy for any disaster situation. The word Ad hoc means For a special purpose. So MANET a spontaneous network is useful when dealing with wireless devices in which some of the devices are part of the network only for the duration of a communication session and the need for a dynamic network topology is prominent. The MANET working group (WG) within the Internet Engineering Task Force (IETF) working specifically on developing IP routing protocols topologies. In order to improve mobile routing and interface definition standards for use within the Internet protocol suite [59]. After huge research work on MANET, still MANET does not have complete formed Internet based standards. The identification of experimental Request For Comments (RFCs) since 2003 [1] is used. In these RFCs the questions are unanswered concerning of implementation or deployment of these routing protocols. But these proposed algorithms are identified as a trial technology and there is a high chance that they will develop into a standard [1]. Extensive research work in this area has continued since then with major studies on different routing protocols such as Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), Temporarily Ordered Routing Algorithm (TORA) and Optimized Link State Routing (OLSR) [1]. Also on the standardization of routing and interface solutions for mobile networking support through Internet Engineering Task Force (IETF) Mobile Ad hoc network (MANET) Working Group WG [59]. Aims and Objectives There are two groups of routing protocols. Proactive MANET protocol, Reactive MANET Protocol, and the third are derived from both called Hybrid MANET Protocol. The Proactive MANET protocol is generally called table driven protocol. It detects the network layout periodically. It tries to maintain the routing table at every node. From which a route to the destination from the source can be detected with less delay. Proactive MANET protocols provide good reliability and low latency for deciding a route. Proactive MANET protocol is not suitable for the node moving with high speed. The routing information in the routing table cannot be updated in the routing table. If a node is not moving, then its routing table information is updated continuously. It makes much traffic overhead and also waste network resources as bandwidth [21]. Proactive MANET protocol is also not suitable for large scale MANETs. Whereas Reactive MANET Protocol is called on-demand routing protocol. Reactive MANET Protocol finds the route when a source node requests to communicate with the other. On-demand approach is suitable for the nodes with high mobility. Nodes that transmit data rarely. The main drawback of reactive routing protocols is that the source node broadcasts the routing requests in the whole network. Then it waits for the responses. This route discovery procedure produces significant delay [21]. Hybrid MANET Protocol integrates the merits of Proactive MANET protocol and Reactive MANET Protocol. Zone routing protocol (ZRP) and two zone routing protocols is the example of hybrid of MANET protocol. Research Question Our goal in this Masters thesis is to evaluate the performance of Proactive and Reactive MANET protocols. These protocols have different behaviors for wireless routing aspects. The main problem is to choice the correct and efficient routing protocol for MANET. The main questions arise for the evaluation of these problems. First question is which routing protocol provides a better performance in Mobile Ad hoc Networks? This will give the overall performance of each routing protocol. Second question is what factors influence the performance of these routing protocols? Finally we address the main key differences in these routing protocols. To answer all these questions, we will model some of MANET scenarios with different parameters. To evaluate the performance of Proactive MANET protocol and Reactive MANET Protocols as, AODV, DSR and OLSR with respect to some parameters as delay, network load and throughput. In simulating these scenarios we come to know that no single routing protocol among Proactive MANET protocol and Reactive MANET Protocol is superior in terms of overall network performance. For example one protocol is good in average delay while other is best in network load and throughput. The performance of these routing protocols greatly depends on network load and delay. So the best protocol can give low delay and high throughput. Scope of the thesis As we know the two categories of routing protocols. Reactive, proactive, and the derived one from reactive and proactive protocols are referred to as hybrid routing protocol. The hybrid protocol is a combination of both reactive and proactive routing protocols. In this thesis, we considered three routing protocols. Two of them are reactive protocols i.e. AODV and DSR. One of them is proactive protocol i.e. OLSR. In this thesis we evaluate the behavior of these routing protocols when implemented in the network. We look that how these protocols affect the network performance, and how the routing protocols behave in these networks. There is no need to go in depth the design of these routing protocol algorithms. But we will give a detailed explanation of these routing protocols. That we are able to explain their effects on the network. We did not consider the effects of varying pause time of the mobile nodes in our simulations. These pause time will be kept constant in all the scenarios. Energy consumption of the routing protocol algorithms was also not considered in the thesis. Thesis structure The thesis is mainly divided into six chapters. Chapter 1 introduces the topic. In this chapter we discuss the MANET with detail, and also the research question. Chapter 2 presents the background of our work. Types of wireless networks and some part of related work with example. Chapter 3 gives the state of the art. It gives the full theoretical background and concepts of the ad hoc mobile network routing protocols i.e. reactive MANET protocols and proactive MANET protocols. Chapter 4 is about the performance metrics: delay, network load and throughput and also about the simulation tool OPNET Modeler 14.5. Chapter 5 gives the results and an analysis of all the routing protocols simulated. In chapter 6, the conclusion and future work is presented. Chapter 2 Background and Related Work In this chapter we present the background of our work. Types of wireless networks and some part of related work with example. MANET have a dynamic nature, a large number of applications make them ideal to use. Quick deployment and minimal configuration of MANET in emergencies such as natural disaster makes them more suitable. The growth of technology makes increase in Wi-Fi capable laptops, mobile phones, MP3 players and other small portable devices. Hence a reason for MANET popularity. Extensive research work has been done on the performance evaluation of routing protocols using NS2 network simulator. Different methods and simulation environments give different results for MANET routing protocols performance. We need to look in a broader view for the effects of these routing protocols which are not considered in a specific environment. The theme of this project is to evaluate the performance of Proactive MANET protocols (PMP) and Reactive MANET Protocols (RMP) in OPNET Modeler 14.5 under varying network load [2]. For all these comparisons we will use FTP traffic to look the effects of the ad hoc network protocols. The project goal is to give an extra source of comparison statistics in the research field. In our simulation we have wireless routing protocols carrying FTP traffic. These simulations performed will have a strong link with the theoretical concepts and also with the expected performance in practical implementations. This study work will give a great benef it in the future research work. Related work Extensive research works has been done in the field of MANET routing protocols. Different routing protocols were simulated in different kind of simulators. Here we will discuss different research papers on the performance of MANET routing protocols. In this thesis work we simulate three MANET routing protocols in the OPNET modeler 14.5. AODV, DSR and OLSR were simulated against three different parameters i.e. delay, network load and throughput. The results show that OLSR is best in network delay than AODV and DSR. The protocols best in the network delay must be the finest in the network throughput. Below we will study now different simulators with different routing protocols and their performance. These routing protocols DSDV, AODV, DSR and TORA were simulated using NS2 [3]. Analysis gives different results for every parameter differently. In finding shortest path between the source and destination nodes, delay, DSDV performs well than AODV, DSR and TORA. DSR perform well in network load balancing than DSDV, AODV and TORA. DSDV has good jitter than AODV, TORA and DSR respectively. The results given in [5] analyse DSR and DSDV in idealized and realistic simulation environments on their performance. Another paper in reference [4] gives conclusion in mobile ad hoc network that reactive protocols i.e. AODV and DSR perform well when the network load is moderate. In reference [4] the reactive protocols are saving much resource like energy. It analyse that the proactive protocols perform well in heavy network traffic load. In [6] there are different conclusions about the MANET routing protocols. DSDV, AODV and DSR were simulated in NS2. The reactive protocol AODV outperforms than DSDV and DSR in maintaining connection by sequentially exchange of information for TCP based traffic. The packets are delivered when the node mobility is low and failed to deliver at high mobility. DSR perform well than DSDV at all mobility. In [6] DSR perform well than DSDV and AODV for packet dropping rate (PDR), delay and throughput. DSR generates less network load than AODV. In reference [7], the simulation was done in QUALNET simulator. The author wrote that AODV shows best performance in low and medium node density. Where as in high node density both OLSR and DSR outperforms. The author wrote in [7], that DSR is selected for file transfers where delivery and throughput are critical factors. OLSR performs well in both low and high node density. It is stated in [7] that OLSR is best suited in application oriented traffic e.g. streaming traffic, voice and video traffic. In application based traffic delay is a critical factor. Types of Wireless Networks Before we discuss the wireless networks types, a small difference between wired and wireless network is discussed. A network that sends data from one point to another point with cable or wire is called wired network. The data sent over a network which uses wireless medium from one device to another device is called wireless network. In wireless network data is transmitted from one point to another through wireless links. For communication the devices have to be in the transmission or radio range of each other. Wireless networks are divided into two main groups. First infrastructure wireless network and second is Ad hoc or infrastructure-less network. Infrastructure Networks Fixed network topology is deployed in infrastructure network. These deployed, fixed networks have base stations or access points from which wireless nodes can get connected. All the base stations or access points are connected with the main network through wired links (fiber optic, twisted or coaxial cable) or wireless link. The base station or access point is one of the important units of infrastructure networks. All of the connections will have to pass from the access point. A wireless node can connect to anyone of the access points in its range. Ad hoc Networks An Ad hoc network is deployed where wireless network infrastructure is not available. This kind of ad hoc network is called infrastructure less network. In ad hoc network each node is connected through wireless links. These nodes connected to each other and also act as a router, by forwarding data to other nodes. There is no restriction on these nodes to join or leave the network. Thus the network has no vital infrastructure. Ad hoc networks have two forms; one is static ad hoc networks (SANET), the other is called mobile ad hoc network (MANET). Commercial implementation of ad hoc network becomes possible due to the development of new technology such as 802.11 [5]. The main reason to deploy this kind of network is the flexibility and easiness of deployment. A suitable network for emergency and surveillance use. But with all these qualities, ad hoc network operation is very difficult to handle. Each and every node is responsible for its operation to maintain its routing table and also forwarding packets to its neighbors as routers. MANET has different topology changes while deployed. So ad hoc network need an efficient routing protocol. To construct an efficient routing protocol is a tough and tedious task. Mobile Ad hoc Networks As mentioned before an ad hoc network is a wireless network, which do not have a centralized and fixed infrastructure. MANET is referred to a wireless ad hoc network. In which nodes are free to move arbitrarily. In a MANET, mobile nodes transmit and receive the traffic. Also mobile nodes can act like routers by forwarding the neighbors traffic to the destination. As the routers are mostly multi hops [60]. MANET does not need base stations of wired infrastructure. The mobile nodes in wireless network range can communicate with each other. MANET is self organized network. The mobile nodes form a network automatically without a fixed infrastructure and central management [60]. The mobile nodes have transmitters and receivers with smart antennas, which enable the mobile nodes to communicate with other mobile nodes in the network. The topology of the network change every time by getting in and out of the mobile nodes in the network. In the beginning MANET was designed for military use but now the MANET is used in many areas. Such as in disaster hit areas, data collection in some region, in rescue missions, virtual classes and conferences [60]. This concept with ad hoc network makes the full name of mobile ad hoc network (MANET). By growing the network, combined with the node mobility. The challenges of self configuration of the network become more evident. Security in the MANET is a very important issue. Many techniques were defined for the security of MANET. Intrusion detection technique is investigated in reference [60]. Mobile nodes in the network waste much energy by joining in and out with connection to wireless network. This connection and reconnection create energy limitation in the network. The main purpose of developing the ad hoc routing protocols to cope with the dynamic nature of MANET. The routing protocols efficiency can be determined by the battery power consumption. Energy is consumed during participation of a node in a network and also in routing of traffic. The routing protocol which adapts to the connection tearing and mending is also considered vital. Such routing protocols are AODV, DSR and OLSR, TORA, Wireless Routing Protocol (WRP), Zone Routing Protocol, and Two-Zone Routing Protocol (TZRP) [21]. We will discuss reactive and proactive routing protocols i.e. AODV, DSR and OLSR in chapter 3 respectively. The internet engineering task force (IETF) MANET working group (WG) was dedicated to standardize the routing protocols in MANET. RFC 2501 specifies the charter of the working group [8]. An Example of MANET Application The versatility and self configuration of MANET makes them a best choice for a wide range of applications. MANET can be used in natural disaster areas, pre planed strategic event like surveillance, data collecting in some regions, conferences and virtual classes. In such areas where the fixed infrastructure is not available before. Like earthquake hit areas where the fixed infrastructure has been destroyed, in flooded areas, fire or explosion hit areas, train or air plane crash [21]. A very common use of MANET is during business conferences. The only and key attribute that make MANET ideal is their self configuration and low cost of deployment. Here we will present one practical example. In a virtual class, a WiMAX radio link may be established. Then a MANET access network can be established to give coverage to those areas that is difficult to cover. The nodes far away from the base station rely on midway nodes for communication. Thus provide a best communication network in such hostile situation. Above in figure 1, a deployed MANET over WiMAX backbone is shown. In this figure the mobile nodes and the WiMAX_WLAN Router form a MANET. These nodes are connected to the WiMAX_WLAN router and the router is further connected to the WiMAX network. The router is working like a boundary between the MANET and the WiMAX. The WiMAX_WLAN router is capable of translation between the MANET protocols and the WiMAX network protocols, and also the backbone protocols the WiMAX is connected with. The figure 1 is shown above. Chapter 3 Ad hoc Networks Routing Protocols The theoretical concepts of ad hoc routing protocols are discussed in this chapter. The behaviors of proactive and reactive routing protocols will be analyzed. Routing Routing means to choose a path. Routing in MANET means to choose a right and suitable path to the destination from the source. Routing terminology is used in different kinds of networks. In telephony technology, electronic data networks and in the internet network, the term routing is used. Here we are more concern about routing in mobile ad hoc networks. Routing protocols in mobile ad hoc network means that the mobile nodes will search for a route or path to connect to each other and share the data packets. Protocols are the set of rules through which two or more devices (mobile nodes, computers or electronic device) can communicate to each other. In mobile ad hoc networks the routing is mostly done with the help of routing tables. These tables are kept in the memory cache of these mobile nodes. When routing process is going on, it route the data packets in different mechanisms. The first is unicast, in which the source directly sends the data packets to the destination. The second is broadcast; it means the source node sends messages to all the near and far nodes in the network. The third is anycast, in this the source node sends data packet to anyone which is not in the node group. Routing types Routing has two basic types, which are as under Static Routing Dynamic Routing Static routing is done by the administrator manually to forward the data packets in the network. Static routing is permanent. No any administrator can change this setting [29]. These static routers are configured by the administrator, which means there is no need to make routing tables by the router. Dynamic Routing is automatically done by the choice of router. It can route the traffic on any route depend on the routing table. Dynamic routing allows the routers to know about the networks and the interesting thing is to add this information in their routing tables. This is shown in the figure 3.1 below. In dynamic routing the routers exchange the routing information if there is some change in the topology [61]. Exchanging information between these dynamic routers learn to know about the new routes and networks. Dynamic routing is more flexible than static routing. In dynamic routing it have the capability to overcome the overload traffic. Dynamic routing uses different paths to forward the data packets. Dynamic routing is better than static routing. Routing protocols There are several kinds of routing protocols for wireless ad hoc networks. These routing protocols are categorized as reactive or proactive routing protocols [8]. The ad hoc routing protocols which have both proactive and reactive merits, is called hybrid routing protocols. The first kind of protocol is proactive or table driven routing protocol. The second kind of protocol is called reactive or on-demand routing protocol. The first kind of protocol is simply called Proactive MANET Protocol (PMP). Proactive routing protocol detects the layout of the network actively. A routing table can be maintained at every node. From which a route can be determined with less delay. The proactive routing protocols provide good reliability on the current network topology [21] and low latency for deciding a route. The OLSR is a proactive routing protocol. The second kind of protocol is simply called Reactive MANET Protocol (RMP). In these kinds of protocols the communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are mostly suited for nodes with high mobility or nodes that transmit data rarely. There are some reactive routing protocols which we will consider here. These reactive routing protocols include AODV, DSR and TORA. An ad hoc routing protocol is a standard. That controls the decision of the nodes that which route the nodes have to take to the destination from the source node. When a node wants to join a network, it discovers the topology by announcing its presence, and listening to broadcasts from other nodes in the network. This routing discovery is performed differently according to the routing protocol algorithm implemented in the network. Proactive Routing Protocols The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed [62]. Control messages are transmitted with periodically intervals. Even if there is no data flow still control messages are transmitted. Because of these control messages proactive routing protocols are not bandwidth efficient. There are many advantages and disadvantages of proactive routing protocols. One of its advantages is that the nodes can easily get routing information, and it easily starts a session. The disadvantages are, too much data kept by the nodes for route maintenance, when there is a particular link failure its reform is too slow. OLSR (Optimized Link State Routing) It is a proactive routing protocol in MANET. It is also called as table driven protocol because it permanently stores and updates its routing table. OLSR keeps track of routing table in order to provide a route if needed. OLSR can be implemented in any ad hoc network. Due to its nature OLSR is called as proactive routing protocol. MPR nodes are shown in the given figure 3.2. All nodes in the network do not broadcast the route packets. Just Multipoint Relay (MPR) nodes broadcast route packets. These MPR nodes can be selected in the neighbor of source node. Each node in the network keeps a list of MPR nodes. This MPR selector is obtained from HELLO packets sending between in neighbor nodes. These routes are built before any source node intends to send to a specified destination. Each and every node in the network keeps a routing table. This is the reason the routing overhead for OLSR is minimum than other reactive routing protocols and it provide a shortest route to the destination in the network. There is no need to build the new routes, as the existing in use route does not increase enough routing overhead. It reduces the route discovery delay. Nodes in the network send HELLO messages to their neighbors. These messages are sent at a predetermined interval in OLSR to determine the link status. Here we can understand this by Figure 3.3. If node A and node B are neighbors, node A sends HELLO message to B node. If B node receives this message, we can say the link is asymmetric. If now B node sends the same HELLO message to A node. This is the same as first case, called asymmetric link. Now if the two way communication is possible then we can call it symmetric link, as shown in Figure 3.3. The HELLO messages contain all the neighbor information. This enables the mobile node to have a table in which it has information about all its multiple hop neighbors. A node chooses minimal number of MPR nodes, when symmetric connections are made. It broadcast TC messages with information about link status at predetermined TC interval [62]. TC messages also calculate the routing tables. In TC messages MPR node information are also included. Reactive Routing Protocols Reactive routing protocols are called on-demand routing protocols. These routing protocols are called when they are required. So the routes are built when they are needed. These routes can be acquired by sending route requests through the network. Disadvantage of this algorithm is that it offers high latency in searching a network. We will consider AODV and DSR in this report. But the analysis will be of AODV and DSR in the fifth chapter. AODV (Ad hoc On-demand Distance Vector) AODV is an on-demand routing protocol. The AODV algorithm gives an easy way to get change in the link situation. For example if a link fails notifications are sent only to the affected nodes in the network. This notification cancels all the routes through this affected node. It builds unicast routes from source to the destination. The network usage is least. Since the routes are build on demand so the network traffic is minimum. AODV not allowing keeping extra routing which is not in use [63]. Two nodes wish to establish a connection in an ad hoc network. AODV is responsible to enable them to build a multihop route. AODV is loop free. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity. This is the characteristic of this algorithm. When a node send request to a destination, it sends its DSNs together with all routing information. It also selects the most favorable route based on the sequence number [11]. There are three AODV messages. One is Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs) [1]. By using UDP packets, the sources to destination routes are discovered and maintain by these messages. For example the node which request, will use its IP address as Originator IP address for the message for broadcast. It simply means that the AODV not blindly forwarded every message. The number of hops of routing messages in ad hoc network is determined by Time-To-Live (TTL) in the IP header. When the source node wants to create a new route to the destination, the requesting node broadcast an RREQ message in the network. In the figure 3.4 the RREQ message is broadcasted from source node A to the destination node B. The RREQ message is shown by the black line from source node A to many directions. The source node A broadcast the RREQ message in the neighbor nodes. When the neighbor nodes receive the RREQ message it creates a reverse route to the source node A. This neighbor node is the next hop to the source node A. The hop count of the RREQ is incremented by one. The neighbor node will check if it has an active route to the destination or not. If it has a route so it will forward a RREP to the source node A. If it does not have an active route to the destination it will broadcast the RREQ message in the network again with an incremented hop count value. The figure 3.4 shows the procedure for finding the destination node B. The RREQ message is flooded in the network in sea rching for finding the destination node B. The intermediate nodes can reply to the RREQ message only if they have the destination sequence number (DSN) equal to or greater than the number contained in the packet header of RREQ. The intermediate nodes forward the RREQ message to the neighbor nodes and record it in their routing table. The addresses of the neighbor nodes from which it get the RREQ message. This information will be used to make a reverse path for RREP message from the destination node. When the message reach to the destination node. It calculates the shortest path to the source. In the figure 3.4 it is shown. The destination node B replies with RREP message denoted by the dotted orange color line. From node A to node B the shortest path is the lower one shown with dotted line. These nodes routes information were saved in the routing tables and were used to build a reverse route from destination to the source node with the message RREP. The request reach to the destinat ion and then RREP has reached to the originator of the request. This route is only available by unicasting a RREP back to the source. The nodes receiving these messages are cached from originator of the RREQ to all the nodes. When a link is failed an RERR message is generated. RERR message contains information about nodes that are not reachable. The IP addresses of all the nodes which are as their next hop to the destination. All the routing information about the network is stored in the table. The routing table have these route entries; (i) destination IP address, (ii) Destination Sequence Number (DSN), (iii) Valid Destination Sequence Number flag (iv) other state and routing flags (e.g., valid, invalid, repairable being repaired) (v) network interface (vi) hop count (number of hops needed to reach destination) (vii) next hop (viii) the list of precursors and lifetime (Expiration time of the route). DSR (Dynamic Source Routing) Dynamic Source Routing Protocol is a reactive routing protocol. DSR is on demand routing protocol. It is a source routing protocol. It is a simple and efficient protocol. It can be used in multi hop wireless ad hoc networks [64].

Sunday, October 13, 2019

Wake Up Willy :: essays research papers

Wake Up, Willy "He's a man way out there in the blue, riding on a smile and a shoeshine †¦ A salesman is got to dream, boy." (Requiem, page 138) Willy Loman longs for the success of his brother Ben, but refuses to accept the drudgery in the work of his friend, Charley. Essentially, Willy wants the freedom that Ben has – leaving for Alaska on a whim, ending up in the wrong place, and still succeeding on his own – without the responsibility and hard work that Charley puts in to be modestly and stolidly successful. The incongruity in Willy’s wishes – that Willy wants all the glory without any of the guts – leaves him in a place where, truly, he is still a child. And, like a child, Willy could never live like Ben because he needs the security of a job and life like the one Charley has. As the play winds on, Willy cannot wake up from his fantasized version of true American success and, ultimately, allows Miller to illustrate the shallowness of the American Dream. Ben represents success based on the benchmarks Willy has created: that if a man has a good appearance and is well-liked, he will thrive in the business world. Yet, the amount of truth in Ben’s character is questionable. More likely, Ben has been idealized in Willy’s mind to become a mix between truth and fantasy – one who exemplifies the principles that Willy lives his life by and bestows on the Loman boys. "William, when I walked into the jungle, I was seventeen. When I walked out I was twenty-one. And, by God, I was rich!" (Act 1, Page 52) In fact, either Ben leaves out the part of the story where he worked tirelessly for four years in the jungle to make his fortune or this is another example of Willy nurturing his fantasies in his own idealized hallucination of Ben. Either way, Willy cannot wake up from the dream world his head is in involving the seemingly effortless success that comes about his brother Ben, nor can he realize that, at least in his world, success is based on more than projecting a good, confident appearance and being well-liked: it involves hard work and effort. And, while he idealizes Ben and raises him to the point of symbolic greatness, he idolizes Dave Singlman (single-man), who, at the age of eight-four, can â€Å"go into any city, pick up the phone, and†¦ [make] his living,† because he represents the only solid example of success under Willy’s principle – and even then, Singleman is alone.

Saturday, October 12, 2019

Development of the character of Lady Macbeth :: essays research papers

It is a difficult task, to discover the essence and origin of a character and their trends, which so often surprise us by their existence where we least expect. Therefore, from what is known about Lady Macbeth is what should be written about her character. Lady Macbeth is amongst the most essential of characters in the play Macbeth by William Shakespeare. Upon her introduction in Act 1 Scene 5, Lady Macbeth is brought into the plot of the play. If I was asked to describe the lady in one word it would be ambitious. A person who collapses on reaching success, after striving for it with single-minded energy, is the figure of Shakespeare's Lady Macbeth. She fulfills her role among the nobility and is well respected like Macbeth. King Duncan calls her "our honored hostess." She is loving to her husband but at the same time very ambitious, as shown by her immediate determination for Macbeth to be king. This outcome will benefit her and her husband similarly. She immediately concludes that "the fastest way" for Macbeth to become king is by murdering King Duncan. She goes through a drastic change in the play. At first there is no hesitation, no sign of any internal conflict in her, no dispute, but that of overcoming the principles of her ambitious and yet tender-minded husband. She is ready to sacrifice even her femininity to her brutal intention, she asks the dark evils to â€Å"unsex† her and take all the traits of a human conscience, which lie within her. Without reflecting on the crucial part, which this womanliness must play when the question afterwards arises of preserving the aim of her intention, which has been attained in the course of a crime. She makes Macbeth kill his beloved king by taunting him and insulting him by using words such as â€Å"coward† and also says â€Å"I fear thy nature, It is too full o’th’milk of human kindness†; We see that, like Adam who gave in to Eve’s urging, Macbeth falls into the same trap, which eventually leads to their downfall as a couple. She did not comprehend that her nature is very similar to Macbeth’s at the start. Although later on she admits that she could not kill Duncan herself because he, â€Å"resembled her father while he slept†. This proves to the reader that she still has her womanly instincts and outlook, which shows us that the so-called spirits do not exist.