Friday, May 31, 2019

Arthur Miller :: Biographies Bio Biography

A leading American playwright, Arthur Miller, b. New York City, Oct. 17, 1915, has enriched the Broadway stage for several decades. Although Millers dramas take place in familial settings, he has made a theme for dealing with contemporary political and moral issues.Miller began writing plays while a student at the University of Michigan, where several of his dramatic efforts were rewarded with prizes. In 1937, during his senior year, maven of his early plays was presented in Detroit by the Federal airfield Project. In 1944 his The Man Who Had All the Luck won a prize offered by New York Citys Theatre Guild.With his first successes--All My Sons (1947 film, 1948), winner of the Drama Critics Circle Award, and Death of a Salesman (1949 film, 1952), winner of both the Drama Critics Circle Award and the Pulitzer Prize--Miller condemned the American ideal of prosperity on the grounds that few can pursue it without making dangerous moral compromises. Death of a Salesman, with its express ionistic overtones, remains Millers most widely admired work. The great social conscience evident in these plays has continued to manifest itself in Millers writing. In the Tony Award-winning The Crucible (1953), for instance, he wrote of the witch-hunts in colonial Salem, Mass., and implied a reduplicate with the congressional investigations into subversion then in progress. The probing psychological tragedy A View from the Bridge (1955) questions the reasonableness of U.S. immigration laws. After the Fall (1964), which includes a thinly disguised portrayal of Millers unhappy marriage to film actress Marilyn Monroe, offers a second, candid consideration of the congressional investigations in which Miller had been personally involved. Two one-act plays, attendant at Vichy (1964) and The Price (1968), deal with the universality of human responsibility and the guilt that often accompanies survival and success.Millers later dramatic works include The Creation of the gentlemans gent leman and Other Business (1972), a play that seemed too openly didactic for both critics and audiences, and The Ride Down Mount Morgan (1991), which opened in London to sundry(a) reviews. Imbued with a passionate morality and demonstrating the absolute need for responsible, loving connections between people, most of Millers work is indeed didactic.Millers writings outside the theater have been prolific and varied. His novel Focus (1945) is an ironic tale of anti-semitism. The screenplay for the Misfits (1961) is only one of several he has written. In 1969 he wrote In Russia, a travel piece with illustrations by his wife, the photographer Inge Morath.

Thursday, May 30, 2019

Megans Law Essay -- essays research papers

In July of 1994, a little girl named, Megan Kanka, wasraped and strangled. They found her embody near her home inHamilton town, New Jersey. The story of thing younggirl has shocked the nation. The mankind responsible for thisbrutal act is named, Jesse Timmendequas. He had beenconvicted twice prior to this attack. He also served sixyears in a treatment facility and had been released. Manypeople said that he was a silence man, and this left them to find he was harmless. Unfortunately, this wasnt the case.This sex offender lived in the same town, as a matter offact, he lived across the street from the Kanka family. Thisman was not ready to be released at all. In fact, heshouldnt have been released. This only left him more of anopportunity to stike again.This information brought the people of Hamilton townto pass around a petition. The petition stated that a statelaw be passed informing the citizens of their community thatsuch people live amongst them. This isnt a rare request. In fact, there have been numerous attempts to bring this lawinto affect. This should have been done from the beginning,but some people actually think these sex offenders haverights. Well, the people of Hamilton Township didnt agree.They felt that they should have been told that this sexoffender lived within their neighborhood. "The real issueisnt that the people of Hamilton Township were deniedinformation on this sex offender, but why was this manreleased after only six...

Fairy Tale :: Essays Papers

Fairy TaleEloise bored and wants someone to appreciate the value of her work and she wants a vitiate. She makes night-dresses and petticoats for a shop in town. She considers men to be brainless and only good for one thing. Simon and she moved into the woods because she got a lot of money from Max (Cl ars ex-husband). She moved into the woods to wear her spiritual roots. She likes neatness and having everything in order. Simon Eloises husband. Before they went into the depths of Wales (the woods) he was an ordinary, nice boy with a promising career, now he does woodwork. Rational. Eloise & Simon not compatible. Clare Eloises mom. Jewish. Miriam Clares oldest friend. Vodka drinker. Moonbird Spiritual (crystals, pyramids, hagging trees), New come along friend. Humans should be polite towards Nature. Shes fond of Native Americans. Four men in suits come to the house, byword they want to buy it. Simon doesnt want a baby (Simons mom got a child at the age of 13, which he considered to be in the way of his development into manhood). He tells her that if she feels that lonely she should ask her mom over. Simon calls Clare saying Eloise missing her. Se never showed much affection so Clare wonders what the catch is. Clare cant go because she is expecting a phone call from Claud (a French tv producer). The men diminish for a second time leaving her brochures. Clare encourages Miriam to go because she is Eloises godmother. Third return of the men. Moonbird and the men say the same things, but the meaning behind them is different. Eloise wakes up, the men are gone, the clock has stopped and the cat is afraid. Simon comes home. Clare is depressed, Miriam asks if she is suicidal again.Clare found out Claud was having dinner with another woman. She called him the near morning, and he didnt even know who she was. The next morning cloth. Miriam goes to Eloise. The next day Clare goes as well. Eloise comes back from the woods where she had fallen asleep. While it has been raining hard all day Eloise is completely dry, this surprises Miriam. Miriam is surprised that no one in the village has talked to them. Miriam and Clare go out for groceries and the shopkeeper shows great interest in them when he finds out they live in the Queens house.

Wednesday, May 29, 2019

Martha Washington :: essays research papers

In 1633, the Reverend Rowland Jones came from England to the colony of Virginia. He had graduated from Oxford University and in Williamsburg had served as minister for 14 years. Two generations later Martha Dandridge, his great-granddaughter, was born on June 2, 1731 on a plantation near Williamsburg. She grew up in the Dandridge home, Chestnut Grove. She enjoyed riding horses, gardening, sewing, playing the spinet and dancing. Her father do sure that she got a fair education in basic math, reading and writing...something girls didnt receive at the time. At the age of eighteen, Martha married to Daniel Parke Custis. He was wealthy, big and twenty years older than her. Martha set up housekeeping on his plantation, while her husband managed the estate, which covered over 17,000 acres. Her husband adored his young, pretty bride and pampered her with the finest enclothe and gifts imported all the way from England. They had four children, two who died before their first birthday. The ir two surviving children John Parke, called "Jacky" and Martha, called "Patsy". In 1757, when Martha was twenty-six, Daniel Custis died after a outline illness. Jacky was three and Patsy was less than a year old. Dying without a will, Martha was left with the duties of running the household, the estate and raising her children. (Fatherless children were usually "raised" under the misgiving of a guardian, even if the mother survived--which meant that another male, primarily a relative, took care of the estates of the children). Her early education proved very helpful in the task. Her husbands former business manager stayed to help with the operation of the plantation and she consulted with lawyers when she felt she needed it. Sometime later, Martha met a young colonel (several months younger than her) in the Virginia Militia at a cotillion in Williamsburg. His name was George Washington. Martha fell in love and George found her quite attractive. (That she h ad a good disposition and inherited wealth was an added aid to the relationship). Martha married George on January 6, 1759. The marriage changed George from an ordinary planter to a substantially wealthy landowner. He had resigned his commission in the militia and so, George, Martha, Jacky who was 4, and Patsy who was about 2 moved into the remodeled Mt. Vernon. Martha was careful in running her home, although she and her husband did not pinch pennies when it came to caring for their home.

Ways Of Selecting Romantic Par :: essays research papers

Ways of selecting romantic partnersThere has always been a belief that work force and women differ in their ways of selecting romantic partners in terms of characteristics in their mates. For example, men have always been perceived to place more than importance in size of breasts in women. Likewise, women have been perceived to place more importance on height of the men they are interested in and their build. This study is to think out whether these social stigmas are true in a typical large college campus dealing with subjects that are around the age of 1819 years. Surveys were employ to have the subjects rate the importance of characteristics of men and women that are typically looked at when either sex are looking for romantic partners. The research in top dog is, Gender Differences in Selecting Romantic Partners. There were previous researches and surveys done on this subject. There are five such studies that best relate to the research topic. The head start appeared in Sex Roles. The article was titled Sex Differences in Factors of Romantic Attraction. The second appeared in Psychological Reports and was titled, Mens Preferences in Romantic Partners Obesity vs. Addiction. The third appeared in College savant Journal and was titled, College Students Homogamous Preferences for a Date and Mate. The fourth appeared in Sex Roles titled, Pursuit of Nontraditional Occupations Fear of Success or Fear of Not Being Chosen? The give way article appeared in Psychological Bulletin titled, Gender Differences in Mate Selection Preferences A Test of the Parental Investment Model. The first article, Sex Differences in Factors of Romantic Attraction was write by Jeffrey S. Nevid. His studies method included an anonymous survey in a college classroom consisting of only hetero internal males and females around the age of 19 to 22 years. The agent wanted to see if the popular belief of males placing such physical aspects such as breast size and buttocks size influenc ed their choice of romantic and sexual partners. He also included females in his studies. In his survey, many physical attributes were presented and the numbers showed that when choosing sexual partners, both men choosing romantic partners, personal characteristics were given more importance than physical. The second article, Mens Preferences in Romantic Partners Obesity vs. Addiction was written by Sarah Sitton and Sharon Blanghard. The studies conducted by the two women were done using classified ads. The study was done to comparison how

Monday, May 27, 2019

Humans and Nature: Treatment of Pollution with Technology Essays

Humans and Nature Treatment of Pollution with Technology Humans ar unable to live independent of nature. Human beings are forced to live by Mother Natures rules. By destroying nature we are only destroying ourselves. But defilement does just that it severely damages our natural environment, sometimes beyond recovery. The treatment of pollution is a complex science that has evolved greatly in the 20th coke mostly due to the industrial environment we live in today. From the basic classification of todays pollution to developing a supplement to our ever so damaging fossil fuel, advances in technology have helped the human race protect the natural environment around us. Humans today create a long range of pollution from basic trash to radio active petroleum. One of the first steps in implementing a plan to deal with pollution is to demote the wastes that are being dealt with. The primary purpose of a classification system is to facilitate understanding and simplify sharement of the multiple elements of a diverse system. A tension exists between two of the objectives of such a system to simplify and have the least number of classes, and to include all the diverse categories to properly manage such a classification system.1 Since the nuclear age, focus on nuclear problems have centered more on the activities that generate nuclear waste than on the characteristics of the waste generated or on the disposal of those nuclear wastes. Often one would hear of the nuclear waste caused by a power plant, but neer about the details of what type or even to what degree.2 The US Atomic Energy Commission (AEC) classified wastes based primarily on operational and discourse concerns. The first legal distinction between different r... ...n Through Emission Controls (Not published) University of Dayton 1972. Found in Roesch Library. 2.) IL, American Nuclear Society. Glasstone, Sammuel. Nuclear Power and its Environmental Effects. La Grange Park. 3.) Lowenthal, Mica h D. Waste-acceptance criteria and risk-based thinking for Radioactive-waste classification. Waste Management 18 (1998) pp. 249-256. 4.) Kjaer, Bruel. Noise Control Principles and Practice. 1st ed. Sweden Arbetarskyddsfonden. 5.) Seidel, Stephen, Dale Keyes. Can We Delay A Greenhouse Warming? 2nd (Corrected) ed. Washington D.C strategical Studies Staff, Office of Police Analysis, and Office fo Policy, Planning and Evaluation. 6.) Warith, M.A., K. Kennedy, and R. Reitsma. Use of sanitary sewers as wastewater Pre- treatment systems. Waste Management 18 (1998) pp. 235-247.

Sunday, May 26, 2019

Immanuel Kant and the Ethics of Leadership Essay

In chapter three of The Ethics of Leadership, Joanne B. Ciulla, introduces the moral philosophy of Prussian philosopher, Immanuel Kant, who developed a set of ethics to choke our decisions and help us judge whether certain actions are morally correct. Kants moral theory does not look at all into consequences and has a actually strict view of morality which can sometimes conflict between duty and self-interest. Ciulla mentions the story of David and Bathsheba in the Bible and asserts, Leaders are often tempted to inhabit because they believe they either wont get caught, or they can cover up their lies. (Ciulla, 94) This assertion rings ever so true in light of the recent scandals involving the increase in U. S. politicians that have confessed to criminal conversation. As marriage and family are often regarded as a basis of union, a story of adultery often shows the conflict between social pressure and individual struggle for pleasure. Adultery is a very American topic. We have b een redefining the parameters of its acceptability and taboo with from each one new generation since the Scarlet Letter.Why is American society becoming so obsessed with these types of scandals and what does it say about the morality of our society? Perhaps society is not solely obsessed with the adultery itself maybe society is more obsessed with its leaders fall from grace. Sexual affairs have been a part of U. S. politics since Thomas Jefferson. However, politicians affairs were generally kept outside the purview of the public eye. Over the years we have began to see a change. ships company is somehow fascinated with the whole idea of adultery and the entertainment industry celebrates it and portrays it mostly in a very romantic light. I am finable of watching shows such(prenominal) as The Good Wife, a show about the wife and family of a politician involved in a internal scandal or Desperate Housewives that romanticize and make adultery seem like the right thing to do if you n eed a little transport in your life. Perhaps by watching TV shows like this, one is being conditioned to do what makes him or her happy or do any(prenominal) feels good or right.Oftentimes, whatever feels right is described as whatever comes easily or naturally for an individual. Our society seems obsessed with finding happiness which the Kantian philosophy totally opposes. According to Kantian philosophy, every one of us is a moral agent. We withstand the moral law to ourselves by asking ourselves if we are doing the right thing only for sake of doing the right thing. One may never find happiness, feel comfortable making the right, or morally correct decision under the Kantian philosophy.The morally valued thing in the universe is the rational human being that can give the law to himself or herself and our moral actions should be treating human beings as morally valuable. According to Kant, we should never treat a human being in such a way that we fail to respect the intrinsic h uman dignity of the human being. In essence, we should never treat anyone as a means to an halt or treat a person against his or her dignity. Now let us return to the issue of the politician and his or her effectiveness as a leader. Is the morality of the message dependent upon the morality of the messenger?Although the morality of the message is NOT dependent upon the morality of the messenger, I think that the message has a further greater impact coming from someone who practices or lives it on a daily basis. Perhaps Americans are so fascinated with politicians and their adulterous scandals given that they presented a false image of themselves. It would be refreshing to have a politician simply be honest and say, Im not currently keep up to this ideal, but I do value it. Granted that could cost a politician the election but that would be the right thing to do according to Kant.

Saturday, May 25, 2019

Pride and Prejudice Essay

The concept of love is developed and endured throughout an healthy relationship in Jane Austens novel, Pride and Prejudice. She successfully incorporates different examples of sum in 19th century and distinguishes the perfect marriage from the hopeless marriage. The definition of authentic love is caring for someone unconditionally. It means putting someone before yourself and non asking for anything in return. There are a variety of different examples of marriage in the novel, but Elizabeth, Jane, and Lydias marriages are the best examples of a perfect marriage, easily-influenced marriage ,and a hopeless marriage.It is emphasized that Elizabeth and Darcy will have the happiest marriage within the novel because of their commited relationship with separately other. The perfect marriage between a hu macrocosmness and a woman in the nineteenth century would probably be centered around Elizabeth and Darcys marriage. Elizabeths character was always honest to herself and specially t o others. Her defiant attitude made her stand out from the rest of the women according to Darcy.Although Elizabeth did not love Darcy at first, her loved developed through the ups and downs of their relationship. Once Darcy calculate out that he could not win the heart of Elizabeth by lying and macrocosm prideful, he started to change for the better well behaved of their relationship. Elizabeth fell head everyplace heels for Darcy and accepted his proposal, The happiness which this reply produced, was such as he had probably never felt before and he expressed himself on the occasion as sensibly and as warmly as a man violently in love can be supposed to do (Austen 200).Once she realize that he had a change of heart and his affectionate love for her was unconditional, Elizabeth knew that her marriage with Darcy would be one to last for a life time in perpetrate and utter happiness. Love at first sight is not authentic in some cases. It takes time to love one another to recognize distributively others flaws and weaknesses. The ability to overcome our flaws and problems with our significant other helps us to develop authentic love with our partner. Jane and Bingleys relationship was not produced over time, yet they knew that they were soul duet after two dances at the ball.The reason why Bingley came into town was to find a wife It is a truth universally acknowledged, that a single man in possession of a good fortune, must be in want of a wife (Austen 1). Their marriage and relationship will probably be amusing and entertaining in the beginning, but their marriage will sooner or later fall apart. Since they barely knew each others faults and weaknesses before they entered into marriage, their relationship susceptibility crumble because of the lack of stability each other has in their relationship. Jane and Bingleys character are both described as innocent people in confederation.For example, Elizabeth describes Janes character as, Affectation of candour is common enough one meets with it everywhere. But to be candid without ostentation or design to take the good of everybodys character and make it up to now better, and say nothing of the bad belongs to you alone (Austen 29). Rather than making their own decisions, they usually obey the commands of others and depend on other peoples judgments. The main reason why many people elope rather than marry into a relationship is due to the detail that they want to make their relationship official as soon as possible.A rushed marriage will only cause more problems because it is partially due to get it over with, or to hide their relationship from the people that they love. Lydia and Wickhams marriage was an elopement rather than a real marriage. Both characters acted upon their foolishness kinda of their heart and mind. Lydias character was described as, Her character will be fixed, and she will, at sixteen, be the most determined flirt that ever made herself and her family ridiculous.A f lirt, too, in the worst and meanest degree of flirtation without any attraction beyond youth and a tolerable person and from the ignorance and emptiness of her mind, wholly unable to cellblock off any portion of that universal contempt which her rage for admiration will excite. In this danger Kitty is also comprehended. She will follow wherever Lydia leads. Vain, ignorant, idle, and absolutely uncontrolled (Austen 156). Infatuation also played a huge part within Lydias relationship towards Wickham. He knew that he could easily wash Lydia off her feet because she was the youngest and most immature one in the Bennet family.Wickham was self-indulgent in his plan to fancy Lydia. All Wickham ever wanted was money and pleasure, he did no care for Lydia as much due to his self-contempt. Since Wickham was in finnancial trouble with creditors, he made the foolish mistake of eloping with Lydia to get out of town. His decision prove that he did not care about Lydias reputation, but only him selfs. Although love may develop in a variety of ways, there should still be the distinction between infatuation and authentic love. Infatuation does not last as long as authentic love does, rather it sets a person up for heart breaks and instability.The elopement of Lydia and Wickham are the perfect example of infatuation because Lydia only loved Wickham for his devious ways of fancing her and Wickham only loved Lydia for her money and her being as an excuse to get out of town. Jane and Bingleys marriage defined love, but not authentic love. They knew each others strengths and priorities, but they did not know each others flaws and weaknesses. Both Jane and Lydias marriage are the ones to be slightly less felicitous compared to Elizabeths marriage because they did not with hold the unconditional love that Darcy and Elizabeth had for each other.In order to have a healthy long-living marriage, both persons within the relationship need to know each others strengths and weaknesses, and are willing to help one overcome their flaws. The love they should have for each other should be based upon the love that Darcy has for Elizabeth. He put Elizabeth before himself and his problems in order to prove his devotion towards her. Austen made Elizabeth and Darcys relationship the ideal marriage in order to show society how a man and woman should love each other.

Friday, May 24, 2019

The effect of inadequate protection of migrants in the food

The research paper critically analyses the lay out of unequal protection for unsettled take a shiters in the nutrition and potable fabrication. The research identifies the lack of adequate shelter, anti-immigration laws and lack of basic citizens rights.A critical analysis of the data sources and methods applied is considered. The Literature review section highlights the movement of other researchers with respect to the research question What exactly does it mean to say that migrant workers lack adequate protection in the food and beverage industry A further analysis on the methodology is conducted which includes Evaluation of housing conditions, the impact of staffing, animals salary and the No- Match analysis.The research paper is then conducted by bring out the fact that there argon labor shortage in the industry, therefore there is an increased dependency on migrant workers. Despite this fact, migrant workers are left without good conditions of service and ultimately la ck of adequate protection especially with the anti-immigration laws in place.The paper then concludes by proposing better rights and protection for migrant workers in the food and beverage industry.PurposeThe purpose of this research is to critically assess and analyse the effect of inadequate protection of migrants in the food and beverage industry.ScopeThis research identifies the lack of housing, anti- immigration laws and basic citizens rights in the food and beverage industry.Data, sources and Methods applied.An assessment of the housing conditions of the migrants was evaluated.The Sonoma and Napa counties of California was studied. The total poem of the combined work force was determined and thereafter the percentage and number of migrants that lead a shelter was then evaluated.A survey of the impact of staffing and bump off services as a result of anti-immigrant laws was carried out. Annual salary and the job satisfaction was surveyed among the migrants.Finally, the use o f the NO -MATCH data in the enforcement of immigration laws evaluated to show the effect of incorrect earning and information of migrant workers in the food and beverage industry.LimitationsCertain limitations were encountered in this research. The effect of improper medical service and due compensation crap not be considered in detail due to the lack of relevant data.LITERATURE REVIEWRobert Mondavi has often mentioned, California has the soils and climate. California along with Australia, has led the vino world in technical advance in the winery and now in the vineyard- although there is still work to be done there. California bottom of the inning compete with other wine producing regions at almost every price level. From $5 a bottle to $100- plus, (Mondavi, October 2002). over the pact fifty years, national surveys of Americans (NORC 1947,1972-98 Harris 1973,1981)Shows systematically that California has one advantages over the competition the vineyard workers. There isnt an other vine growing region that workers with the worth ethnic the ability to rapidly remove necessary skills and the exult of life that California has with its Mexican and other Latin American field workers. They are an asset that can hardly be heedful in dollars.The Sonoma and Napa counties alone rescue a combined harvest workforce of 16,000. there are only a few hundred beds for migrants on the entire North coast workers sleep in churches, crawled into single agencys, infra bridges and wherever they can find room for a blanket. The vineyard workers, both(prenominal) migrants and permanent, documented and undocumented, are the most precious commodity California vine growers down. (FirstenFeld, 2002).Amelia Morgan Ceja put it well (Morgan, A.C., 2002) when she said that without the Mexican workers, there would be no California wine industry. The workers are responsible adults, supporting familiar back in Mexico. They deserve to be treated as such and allowedthe refreshment an d relaxation that comes from a heatless or (why not?) a glass or two of wine. It is bitterly ironic that wine generous should enforce prohibition on their own workers.Over the past two decades researches have increasingly investigated the determinant of the effect of larger staff (Kearl, Harris 1981) on the food and beverage industry. They postulated that the larger the staff and the better the welfare, the more than efficient and productive the industry becomes. Requests for supplementary personnel were followed by wishers for more communication and better directions, better or updated equipment and computer technologies, more training and the availableness of proper resources.While doing more with less has been an issue for years in most industrial especially the food and beverage (Harper, February 2004), pending anti-immigrants laws may have a huge impact on the operating efficiency and staffing in industry. When asked to described what, if any impact on staffing and plant serv ices might reach as a result of anti-emigrants laws, Nancy Cruzan, stated that one hundred percent of plant hourly workers are migrants, so we would be grateful affected by anti-emigrants labor initiatives (Cruzan, 2004).However, some researchers are more optimistic. Industry pass on experience a period of labor shortage, but these problems will diminish over cartridge clip as the migrants work force learns the proper process to gain employment (Doyle, 2005) and It should improve staffing by providing a system to get manual labor to do unskilled job through a documented controlled process. (Doyle, 2005Accordingly to Joy LePree, food and beverage workers find their jobs satisfying, but say theres room for improvement ( LePree, December 1, 2006)Peter Wellington, a wine maker wrote a letter decrying the treatment received by the migrants workers He stated This is not a problem of illegal immigrants, its a problem of homeless immigrants that creates a problem both for the community and the workers who dont have decent facilities, (Wellington 1991). He relates If youre going to go out and pick group 10hours a day and have to cook over an open fire and not have a fatigueet or a place to take a shower or a dry place to sleep when it rains, thats in humanIn mainland China, there is and enormous floating population moving into the industrial towns cities. Their hands have helped build the cities high-rises, and their blood and sweat has paved the enter-city highways. The toil over 10 hours a day producing a range of goods in the manufactureing industry. Let they do not even have basic citizens rights. (Chen K.K, 2002).migrators workers may be workers, but the industry in only interested in exploring their most productive years. They are not given adequate shelter, not insured against unemployment or old age, they are still denied bonuss overtime pay, and working hours may as well not exist.Underlying every theory in the issue of inadequate protection. What exact ly does it mean to say that migrant workers lack adequate protection in the food and beverage industry?. This is because migrant workers constitute the majority work force and are essential to the growth of the industry. They lack adequate protection, yet they are indispensable.METHODOLOGYEvaluation of housing conditions.An evaluation of the housing conditions of the migrants workers was conducted. The study considered the cocktail dress of Sonoma and Napa countier of California. The total number of the combined workforce is 16,000. Only 500 beds are for migrants workers on the entire North cost. Workers sleep in churches, crowed into single rooms, under bridge and wherever they can find room for a blanket.Impact of staffingAs surveying was carried out on the impact of staffing and plant service as a result of anti-immigration laws. Some of the employers in the industry were 100% of the result showered that immigrants. This could lead to a huge effect on the productivity in the foo d and beverage sector. Another 50% of the work force could be lost. Still, others fear it would shut down operations entirely.However, some were more optimistic that the industry will this problem will diminish over time as the migrant workforce learns the proper process to gain employment.Immigration issues ranked among the top quintuplet most important workplace issues companies face today. When respondents were asked in a open ended question about the most important workplace issues faced today, preventive was cited most often retaining trained staff and a qualified workplace was the second most significant issue with competition and the labor shortage binder third, communications ranked fourth and finally, immigrants taking fifth place.Annual SalaryThe annual salary of migrants workers shows that 90% of migrants workers are under paid, 10% still make good money ($75-$100) a ton). Most of them come back year after year. Job satisfaction in good but can be betterNo- Match dataT he use of SSAs No-match data with respect to immigration laws was analysed. A survey shows that employers use the same SSN for as many as 10 different workers in the same tax year as many as 308 times over a 16-year period studied. The result showed that employers used the same SSN for more than 100 earnings reports.Employers most frequently associated with incorrect earnings reports belonged to industry groups historically known to employ illegal immigrants such as agriculture, food and beverage industry. Employers in these industries are most likely to file earnings reports with incorrect information.CONCLUSIONFor decades, the most labor-intensive sectors of American agriculture have been dependent on alien workers to meet basic workforce needs. In recent years almost all sectors have dealt with labor shortage by employing alien workers. The food and beverage industry is no exception. Unfortunately, these migrant workers are given inadequate protection in terms of housing wages p ension and anti-immigration laws.Despite the fact that the contribution of these workers in the industry cannot be quantified, they are not given better conditions of service. Better rights for alien workers is therefore proposed.ReferencesREFERENCES1.Chen K. K, 2002, Unprotected Migrant workers. Wines and vines Publishers2.Cruzan, 2004, Effect of anti- immigrant laws. Evans Publishers.3.Doyle, 2005, Labor Shortage and the Food Industry. Chicago Press.4.Firstenfeld, 2002, What Wine Growers Have. Heineman Publishers5.Harper, February 2004, Alien workers and anti- immigrant laws Wines Vines.6.Kearl Harris 1981, Adequate Compensation for Migrants workers in the buff York Press.7. Le Pree December 1, 2006, The joy of Food and Beverage workers. Mcgraw hill Press8. Mondavi R, October 2002, working in wine and vines. New York Press.9. Morgan. A. C, 2002 Californias secret Weapon, Wines and Vines Publishers.10. NORC, 1947, 1972-79, Harris 1973, 1981, National Survey of Americans. New York Press.11.Wellington 1991, Treatment received by Migrant Workers. Retrieved the pick of the crop.

Thursday, May 23, 2019

Killing animals for fur Essay

Picture living in horrible conditions your whole life, in a cramped hencoop with no viands or water. Then any of a sudden you argon dragged out from your cage, almost beaten to death then your skin is ripped off as you be taking your last breaths. Your carcass is then thrown into a pile with the rest of your fellow comrades similar a piece of garbage. This may sound like a scene from a gory movie, but this is something that actually happens on a daily basis. Every year, millions of innocent creatures are tortured and killed for the pelt or skin off their backs. The pelt persistence is a cruel, heartless business that is bad for the environment and unnecessary. Every year, millions of creatures are killed for the clothing industriousness. Whether they come from Chinese fur farms or Indian slaughterhouses, an immeasurable amount of suffering goes into all fur coat made. Eighty-five percent of the fur industrys skin comes from animals on fur factory farms. More than half of the fur in the U.S. comes from China, where millions of the animals are victims of cruelty. In China environmental regulations are often ignored and there are no federal human slaughter laws to protect the animals on fur factory farms.One reason why I am against fur is because the industry is a cruel gruesome business. hide farming methods are specifically designed to maximize moolah at the expense of an animals soundly being. Animals on fur farms include foxes, minks, rabbits, and rase dogs and cats. They are forced to live in close confinement with up to five opposite animals in the cage and discombobulate no shelter protection from the weather. This causes them anxiety and often makes mothers kill their babies or other animals chew on their own offsets from all the rough manipulation and intense confinement. Since the workers are unaccompanied concerned about the fur, the animals are hardly fed or given water and when they are fed its unfit nourishment like meat by-produ cts. Many of the animals are also victims to diseases and pests because of all the filth they are forced to live in. If living like that isnt miserable enough, the ship privyal the animals are killed on fur farms is charge worse. Unfortunately, there no humane slaughter laws to protect the animals on fur farms, so killing methods are gruesome. fur farmers are only worried about preserving the quality of the fur, so they use slaughter methods that cause the animals tosuffer immensely. Methods include gassing, electrocution and neck breaking sometimes the animals are free alive when being skinned.Although most of the animals killed for their fur are raised on fur farms, millions of wolves, raccoons, bobcats and other fur bearing animals are killed every year by trappers for the clothing industry. They use various types of traps like snares, underwater traps, and steel jaw traps. A snare trap is made out of origin and shaped like a noose and when the animal steps on the cable it sw eeps them up and hangs them. The more they struggle, the tighter the noose becomes, and if they are caught around the neck they get out eventually strangle and die. Underwater traps are mostly used for beavers, muskrats, and minks. These traps are sometimes referred to as drowning traps and thats exactly what they do. They prevent the animal from going up for air it usually takes about nine minutes to drown them. A steel jaw trap slams shut on an animals limb when triggered. The initial impact causes an injury, but the majority of the damage is caused from the animal trying to break free. Animals caught in these traps will struggle in excruciating pain for hours and even resort to chewing off their trapped limbs in a desperate attempt to escape.The fact that an animal would severe their own limb turn ins how horrible it is to be caught in a trap. If a trapped animal isnt killed from blood loss or infection, they are often killed by predators or hunters. If the animal is still aliv e by time the trapper gets there they are strangled, beaten, or stomped to death so their fur isnt damaged. Every year many dogs, cats, and other animals including imperil species are injured or killed by traps. They are referred to as trash animals by trappers and are generally killed or thrown away since they sustain no value to them. Imagine your house pet being killed or injured because of a trap that was set. It shouldnt happen to your pet or any other animal. Another reason why I am against fur is because it is bad for the environment. The fur industry may promote that its product is a natural stuff from a renewable resource, but there is nothing natural about clothing made from an animals skin or fur. Fur is only a natural fiber when it is still intact on an animals back. Once an animal has been slaughtered and skinned, its fur must be tanned or treated in order to stop it from biodegrading. Tanning is an unnatural process that uses toxic chemicals including formaldehyde, chromium and many other dangerous chemicals to stabilize thecollagen fibers in animals skins to stop them from rotting. Using these harmful chemicals are serious environmental contaminants and the fur industry is very aware of it.The production of fur contributes to pollution, water contaminant and it even leads to cancer. When it comes to the tanning process, the chemicals used are very damaging substances. They include coal tar derivatives, dyes, oils, and finishes, some of them are cyanide based too. In growth to all these toxic substances, tannery effluent also contains large amounts of pollutants such as acids, protein, hair, salt, lime sludge, and sulfides. Among the consequences of working with this waste is the threat to human health from the highly proud levels of cyanide, lead, and formaldehyde. The US Centers for Disease Control and Prevention discovered that the incidence of leukemia among residents in an area surrounding a tannery in Kentucky was five times the natio nal average. sight who work in these fur production places are dying of cancer caused by exposure to dimethylformamide and other toxic chemicals used to process and dye the animal skins. The coal tar derivatives used are also an extremely potent cancer-causing agent. The tanning process also pollutes the air. In Denmark, more than fourteen million minks are killed each year for their fur and more that eight thousand pounds of ammonia is released into the atmosphere annually.Fur farms also produce massive amounts of animal waste that is all confined in cardinal small area. For instance, each mink killed by fur farmers produces about forty-four pounds of feces in his or her lifetime. That adds up to one million pounds of feces produced yearly by U.S. mink farms alone. Animal wastes are high in nitrogen and phosphorous, so the waste in this instance would have nearly one thousand tons of phosphorus. When it rains and the waste washes downhill it wreaks havoc on rivers and streams. Ot her times the waste is left to soak into the soil and can contaminate the ground water. The nutrients in the waste lead to algae growth, which depletes the oxygen in the water. This can kill sensitive species of fish and make the water unwanted to drink for macrocosm. Many fur farmers have been fined for releasing waste into the environment and contaminating water supply. If you are not bothered with the killing of these animals, you should definitely be worried knowing the chemicals used in this industry can be harmful to you.My final reason for being against the fur industry is because it is completely unnecessary. Fur isnt a necessity for survival everyone can live with it. Also, there are many other alternatives that are just as stylish and partial(p) as real fur. Fabrics such as polyester and polyvinyl are common cruelty free materials used. Not only is the synthetic fur stylish, its also a whole lot cheaper than purchasing real fur. Faux fur is even more eco-friendly than real fur. In a study done by Gregory metalworker he found that the production of a factory farmed fur coat required nearly twenty times more energy than the production of a faux fur coat. So there is a lot of gas and resources being used on an unethical and unnecessary product. Many celebrities have even taken a stand to never wear fur and promote what goes on in this industry. Even popular clothing designers and companies are starting to show compassion and remove fur from their garments. Forever21, Ralph Lauren, Calvin Klein, and Tommy Hilfiger are some of many companies that converted to using faux fur.Some people may argue that the fur industry is ethical but after reading my claims, I hope it makes you think again. Some people that are okay with the killing of animals is simply because they dont care. You might think that the life of an animal is meaningless but that doesnt mean its okay for them to suffer. Animals experience pain and fear just like humans do. Many people may b e okay with using cows for leather because we already kill them for their meat or using sheep for their wool, but when it comes to a fox there is absolutely no reason to just kill them for one thing and then trash their body.So in conclusion, killing animals for their fur is completely wrong. The fur industry is a cruel heartless business that is bad for the environment and is unnecessary. The industry is only concerned about maximizing profits and producing fur, they could care less about the animals well being. Animals dont deserve to suffer just so you can wear them for fashion. If people stop vitiateing fur then no one will sell it, so ultimately its up to the consumers who decide the fate of the fur industry. Animals dont have a voice but we can speak up for them by spreading the word about the crueltyand refusing to wear fur or buy it.

Wednesday, May 22, 2019

Live and Let Live

The Hitchhikers Guide to the ne twainrk 1 The Hitchhikers Guide to the mesh stool Ed Krol emailprotected cso. uiuc. edu father both book for escaped on www. Abika. com come in any book for allow on www. Abika. com The Hitchhikers Guide to the lucre 2 This enrolment was produced done funding of the National Science Foundation. Copyright (C) 1987, by the bill of Trustees of The University of Illinois. Permission to duplicate this mendeleviumument, in hale or part, is granted leave aloned reference is made to the source and this copyright is included in whole copies. This document assumes that unmatchable is familiar with the operatives of a non- attached simple IP ne twainrk (e. . a few 4. 2 BSD constitutions on an Ether wampum non attached to anywhere else). supplement A contains remedial hold upledge to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the oral tradition of the meshing to the point that that net ti n be connected to the internet with little danger to either. It is not a tutorial, it consists of pointers to another(prenominal) places, literature, and hints which argon not normally documented. Since the net profit is a dynamic environment, changes to this document give be made regularly. The author welcomes comments and suggestions.This is especially true of landmarks for the glossary (definitions argon not necessity). In the extraction at that place was the ARPAnet, a wide ara experimental meshwork connecting swarms and terminal servers together. Procedures were set up to regulate the allocation of voice communicationes and to create voluntary standards for the interlocking. As local anesthetic ara entanglements became more pervasive, many hosts became gate ports to local internets. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long taking into custody IP found networks (NASA, NSF, states ). These nets, too, interoperate beca subroutine of IP.The collection of all of these interoperating networks is the Internet. Two groups do a great deal of the search and information work of the Internet (ISI and SRI). ISI (the nurtureal Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI global provides information services for the Internet. In fact, after you atomic number 18 connected to the Internet most of the information in this document green goddess be retrieved from the meshing Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center.The ARPAnet is run by Get any book for let go of on www. Abika. com The Hitchhikers Guide to the Internet BBN, Inc. down the stairs contract from DARPA. Their facility is called the electronic network Operations Center or NOC. Cornell University temporarily o perates NSFnet (called the meshwork Information Service Center, NISC). It goes on to the -2regionals having similar facilities to monitor and encumber watch all over the goings on of their caboodle of the Internet. In addition, they all should gravel some noesis of what is happening to the Internet in total.If a paradox comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you ar connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet ) and imbibe a occupation, you should contact your regional network operations center. 3 RFCs The internal workings of the Internet atomic number 18 de beauteous by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel (emailprotected edu).He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It whitethorn go through multiple revisions. Should it be generally accepted as a good idea, it get out be assigned a consequence and turn ond with the RFCs. The RFCs offer be divided into five groups required, suggested, directional, informational and obsolete. need RFCs (e. g. RFC-791, The Internet Protocol) mustiness be implemented on any host connected to the Internet. Suggested RFCs be generally implemented by network hosts. Lack of them does not preclude access to the Internet, that may impact its usability.RFC-793 (Transmission defy Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide substance ab hire. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable.Informational RFCs contain factual information about the Internet and its operation (RFC-990, charge Numbers). Finally, as the Internet and technology digest grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a radical one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and sequent RFCs Get any book for excess on www. Abika. comThe Hitchhikers Guide to the Internet on the topic. -3(Appendix B contains a list of what are considered to be the major RFCs necessary for infrastanding the Internet). 4 The Network Information Center The NIC is a facility getable to all Internet users which provides information to the community. There are trine factor of NIC contact network, telephone, and mail. The network accesses are the most prevalent. Interactive access is frequently use to do queries of NIC service overviews, tone of voice up user and host seduces, and contemplate lists of NIC documents. It is available by victimization %telnet sri-nic. rpa on a BSD system and following the directions provided by a user friendly prompter. From poking or so in the informationbases provided one might nail down that a document earnd NETINFONUG. DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous transfer. An anonymous FTP would proceed something deal the following. (The discourse may vary slightly depending on the implementation of FTP you are using). % agitate transfer pr otocol sri-nic. arpa Connected to sri-nic. arpa. 220 SRI_NIC. ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 1200 PDT Name (sri-nic. arpamy be) anonymous 331 ANONYMOUS user ok, send real ident as password.Password myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 1201 PDT, job 15. ftp get netinfonug. doc 200 Port 18. 144 at host 128. 174. 5. 50 accepted. 150 ASCII retrieve of NUG. DOC. 11 started. 226 Transfer Completed 157675 (8) bytes transferred local netinfonug. doc remotenetinfonug. doc 157675 bytes in 4. 5e+02 seconds (0. 34 Kbytes/s) ftp quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFOWHAT-THE-NIC-DOES. TXT) Questions of the NIC or problems with services can be commanded of or reported to using electronic mail. The following addresses can be used emailprotectedARPA requests emailprotected ARPA General user assistance, document User registration and WHOIS updates Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet emailprotected ARPA Hostname and celestial sphere changes and updates emailprotected ARPA SRI-NIC computer operations emailprotected ARPA Comments on NIC publications and services -4For people without network access, or if the exit of documents is large, many of the NIC documents are available in printed form for a footling charge. One frequently ordered document for starting sites is a compendium of major RFCs.Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact moments). 5 The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek (emailprotected nsf. net) is the NNSC user liaison. The NNSC, which before long has information and documents online and in printed form, plans to distribute intelligence i nformation through network mailing lists, bulletins, newsletters, and online reports.The NNSC in any case maintains a infobase of contact points and sources of additional information about NSFnet component networks and supercomputer centers. prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NNSC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors.Mail reflectors are special electronic mailboxes which, when they receive a kernel, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his two cents in sends a messag e with the comments to the reflector. The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by emailprotectedNSF. NET, one sends a request to Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet emailprotected NSF. NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFOINTEREST-GROUPS-1. TXT, NETINFOINTEREST-GROUPS-2. TXT, and NETINFOINTEREST-GROUPS3.TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regiona l network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to some(prenominal)ly subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the exactlyst. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus.That is, set up a reflector on a local instrument which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sen t to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to emailprotected arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaster. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e. . , 192. 17. 5. 100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might shoot to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6(many interconnected nets with fewer nodes each and a backbone). Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets. affiliate A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have three octets of network address and one of host. Class B is reveal two and two. Therefore, on that point is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats.Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4. 2BSD) could not deal with subnetted addresses. Information on how to do a particular network (routing information) must be out-of-the-way(prenominal)m animald in Internet gateways and software switches. Some of these nodes have a limited capability to store and deputise routing information (limited to about 300 networks).Therefore, it is suggested that any campus betoken (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a robe which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways.For examp le, if a campus requires two networks internally and has the 32,000 addresses beginning 128. 174. X. X (a Class B address) allocated to it, the campus could allocate 128. 174. 5. X to one part of campus and 128. 174. 10. X to another. By advertising 128. 174 to the Internet with a subnet mask of FF. FF. 00. 00, the Internet would treat these two addresses as one. Within the campus a mask of FF. FF. FF. 00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you dont pass the subnet mask of FF. FF. 00. 0 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4. 2BSD systems require additional software. 4. 3BSD systems subnet as released. Other devices -7and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnetted portion of the network. As time passes and more systems become 4. 3BSD based, these problems should disappear. 7 Get any book for free on www. Abika. om The Hitchhikers Guide to the Internet There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e. g. 4. 2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). 8Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below Number of Networks When the Internet was designed it was to have about 50 connec ted networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly.By the summer of 88 the current PDP-11 core gateways will be replaced with BBN Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packet boats to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8-Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is cover. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks at a lower place different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity & Congestion some(prenominal) portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. 9 These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB).This board i s composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are Committee Chair Autonomous Networks Deborah Estrin End-to-End Services give chase Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler deed & Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St.Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness & Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To jimmy the problem, watch a small child trying to find a tab le in a restaurant. From the adult point of view the structure of the eat room is seen and an optimal route easily chosen.The child, however, is presented with a set of avenues between tables where a good path, let alone the optimal one to the goal is not discernible. *** A little more background might be appropriate. IP gateways (more square uply routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP gallery of the packet and the state of the network. Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet Each port wine on a router has an unique address appropriate to the network to which it is connected.The information in the IP header which is used is primarily the destination address. Other information (e. g. type of service) is largely ignored at this time. The state of the network is determined by the routers liberty chit inform ation among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm).This implies the nodes must have larger amounts of local storage and enough central processing unit to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the animated information (or you spend a large amount of the network capacity passing near megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is crossways the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. The adult algorithm, but rather than sounding directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) scene of action expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network.They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional ). -10Routing protocols in current use Static (no protocol-table/default routing) Dont laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small ne twork or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations.If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use quiet routes in the middle of a network 10 Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes.If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. 11 teardrop commit is a routing protocol based on XNS (Xerox Networ k System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB ) and many BSD Unix systems BSD systems typically run a program called routed to exchange information with other systems running RIP. RIP works beat for nets of small diameter where the links are of equal speed.The reason for this is that the metric used to determine which path is exceed is the hop-skip-count. A hop is a traversal across a gateway. So, all machines on the same Ethernet are zero record hop away. If a router connects connects two networks directly, a machine on the other side of the router is one hop away. As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the network. The diameter of a network is defined as the largest hop-count possible within a network. Unfortunately, a hop count of 16 is defined as infinity in RIP meaning the link is down.Therefore, RIP will not allow hosts separated by more than 15 gateway s in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11reflected in the hop-count. So a one hop satellite link (with a . 5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it even more by throwing more packets on the queue for that link.The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD routed. Routed The ROUTED program, which does RIP for 4. 2BSD systems, Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet has many options. One of the most frequently used is routed -q (quie t mode) which means listen to RIP information but never broadcast it.This would be used by a machine on a network with multiple RIP speaking gateways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert static routes into routed, the /etc/gateways file and the route add command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the route add command is preferable to use.The reason for this is that the command adds the route to that machines routing table but does not export it through RIP. The /etc/gateways file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is mad e in the /etc/gateways file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with routed is that you have very little control over what gets broadcast and what doesnt.Many times in larger networks where various parts of the network are under different administrative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12type of reasonability checks are not available with routed and leave it usable, but inadequate for large networks. 12 Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a Fuzzball hich runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing toGet any book for free on www. Abika. com The Hitchhikers Guide to the Internet do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not very feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. 13E xterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reachability protocol. It tells only if nets can be reached through a particular gateway, not how good the connection is. It is the standard by which gateways to local nets inform the ARPAnet of the nets they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link value understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreachable.A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4 , so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do the y interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site.The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net becomes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more legal proceeding). Mark Fedor of Cornell (emailprotected tn. cornell. edu) attempted to solve these problems with a replacement for routed called gated. Gated talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Helloers.These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under variety file control it can filter the conversion. For example, one can produce a Get any b ook for free on www. Abika. com The Hitchhikers Guide to the Internet configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local sites RIP space, it wont be passed through to the Hello side of the world.There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3. Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat.If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using gated. -14Names All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128. 174. 5. 50, a symbolic name register was set up at the NIC where people would say I would like my host to be named uiucuxc.Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe subject field name service, a distributed data base system for mapping name into add resses. We must look a little more closely into whats in a name. First, note that an address specifies a particular connection on a specific network.If the machine moves, the address changes. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i. e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the get-go of the tree at the right. For example 14 Get any book for free on www. Abika. om The Hitchhikers Guide to the Internet 15 uxc. cso. uiuc. edu is a machine called uxc (purely arbitrary), within the subdomains method of allocation of the U of I) and uiuc (the University of Illinois at Urbana), registered with edu (the s et of educational institutions). A simplified model of how a name is resolve is that on the users machine there is a resolver. The resolver knows how to contact across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e. g. edu).What root servers to use is an installation parameter. From the root server the resolver finds out who provides edu service. It contacts the edu name server which supplies it with a list of addresses of servers for the subdomains (like uiuc). This action is repeated with the subdomain servers until the final subdomain returns a list of addresses of interfaces on the host in question. The users machine then has its choice of which of these addresses to use for communication. -15A group may apply for its own domain name (like uiuc above). This is done in a manner similar to the IP address allocation.The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reachable for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do caution on the database. If the machine is not convenient, that might not be done in a timely fashion.The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain ( wedge) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other network hosts. BIND is integrated with 4. 3BSD and is u sed to lookup and store host names, addresses, mail agents, host information, and more. It replaces the /etc/hosts file for host name lookup.BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to emailprotected Berkeley. EDU. BIND can also be obtained via anonymous FTP from ucbarpa. berkley. edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on /etc/hosts Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet being up to date and complete. Within the . uiuc. edu domain, only a few hosts are included in the host table distributed by SRI.The remainder are listed locally within the BIND tables on uxc. cso. uiuc. edu (the server machine for most of the . uiuc. edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for i nterior hosts not directly reachable from the Internet. These hosts can either be on non-advertised networks, or not connected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the Name Server Operations Guide for BIND in UNIX System Managers Manual, 4. 3BSD release.There are a few special domains on the network, like SRINIC. ARPA. The arpa domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC. NSF. NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name.In actuality, the domain system is a much more general and m ingled system than has been described. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not except IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. 16 Whats wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways.Included in these modifications is support for the Internet protocols. In earlier versions (e. g. BSD 4. 2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ethernets and smaller Internets. There were deficiencies, however, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4. 3). Since it is the springboard from which many vendors have launched Unix imple mentations (either by porting the existing code or by using it as a model), many implementations (e. g.Ultrix) are still based on BSD 4. 2. Therefore, many implementations still exist with the BSD 4. 2 problems. As time goes on, when BSD 4. 3 trickles through Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet.It doesnt have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect , which politely says Ill deliver this message for you, but you really ought to use that gateway over there to reach this host. BSD 4. 2 ignores these messages. This creates more stress on the gateways and the local network, since for every packet -17sent, the gateway sends a packet to the originator.BSD 4. 3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines.Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could put the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways dont know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers arent used).So TELNET and FTPs of very short files work just fine and FTPs of long files seem to hang. On BSD 4. 2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4. 3 negotiates trailers, so it uses them on its local net and doesnt use them when going across the network. 17 Get any book for free on www. Abika. com The Hitchhikers Guide to the Internet Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesnt receive an acknowledgemen t in a reasonable amount of time it retransmits the blocks.The determination of what is reasonable is done by TCPs retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmissions done unnecessarily. BSD 4. 2 had a retransmission algorithm which retransmitted quickly and often. This is barely what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e. g. 56kb lines), it tends to retransmit too aggressively.Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmission algorithms do adapt to the delay of the network -18after a few packets, but 4. 2s adapts slowly in delay situations. BSD 4. 3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is o n a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19Appendix A References to Remedial Information 18Quaterman and Hoskins, Notable Computer Networks, Communications of the ACM, Vol 29, 10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S. , Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz. rutgers. edu, directory pub/tcp-ip-docs, file tcp-ip-intro. doc. -20Appendix B List of Major RFCs RFC-768 RFC-791 RFC-792 RFC-793 RFC-821 User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Simple Mail Transfer Protocol (SMTP) Get any book for free on www. Abika. com The Hitchhikers Guide to the InternetRFC-822 RFC-854 RFC-917 * RFC-919 * RFC-922 * Subnets RFC-940 * RFC-947 * RFC-950 * RFC-959 RFC-966 * Protocol RFC-988 * RFC-997 * RFC-1010 * RFC-1011 * Standard for the Format of ARPA Internet Text Messages Telnet Protocol Internet Subnets Broadcasting Internet Datagrams Broadcasting Internet Datagrams in the Presence of Toward an Internet Standard Scheme for Subnetting Multi-network Broadcasting within the Internet Internet Standard Subnetting Procedure File Transfer Protocol (FTP) Host Groups A Multicast Extension to the Internet Host Extensions for IP Multicasting Internet Numbers Assigned Numbers Official ARPA-Internet Protocols 9 RFCs marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note This list is a portion of a list of RFCs by topic retrieved from the NIC under NETINFORFC-SETS. TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways RFC-882 RFC-883 RFC-973 RFC-974 RFC-1009 Domain Names Concepts and Facilities Domain Names Implementation Domain System Changes and Observations Mail Routing and the Domain System Requirements for Internet Gateways -21Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 emailprotected ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 Get any book for free on www. Abika. com The Hitchhikers Guide to the Internetemailprotected NSF. NET -22Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total portraying of the reachability to all networks known to the ARPAnet with EGP. They then redistribute reachability information to all those gateways speaking EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is then passed to you via Hello, gated, RIP. ount to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gateway increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a borderline amount of time (usually at least two minutes).This allows for the propagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from multiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being propagated because of gossip or counting to i nfinity. -23- 20 Get any book for free on www. Abika. com

Tuesday, May 21, 2019

Kahaani and Mumbai Diaries Film Review

Dhobighat and Kahaani Film reviews Student Name Course Title Course Supervisor Film reviews Introduction The Indian train industry has neer been popular for its art films. Art films in Indian plastic films usu totallyy try to portray a particular aspect of the Indian culture and norm. These moving-picture shows avoid all the glitz and glamour unremarkably found in Indian ikons. No glitz or glamour usually restricts these characterisations to a low budget nor atomic number 18 these movies able to attract a large number of reference to the cinema.Directors that usually make such movies try to get a point across to the audience using the cinema screen to portray their view of a particular issue within the community. Dhobighat The movie starts off showing Arun (Amir caravanserai) moving into a moth-eaten apartment in an old locality of Mumbai. The film depicts Arun as an artist who meets Shia (Monica Dogra) an American investment banker at one of his exhibitions. The two fal l for each separate and end up spending the night together.Shai expects Arun would commit to their newborn found relationship but instead Arun makes it clear that he is not interested in a long term relationship and their night together was nothing more than a one night stand. Shai angry at Aruns location conduces the apartment (Gurbaxani, 2011). This scene depicts a cultural trend that has keenly influenced the modern Indian society. Indian women are known to be conservative. They are forbidden to fetch premarital sexual relationships. However influenced by western sandwich culture, more and more Indian women have been engaging in premarital sex (Dhawan & Kurup, 2006).Spending the night with Arun highlights the western influence that has been a part of the Indian society for quite slightly time now. Whereas getting angry at Arun for his lack of commitment portrays the conservative Indian side that has been a tradition with in the Indian society. Munna (Prateik Babbar) is the laundry son for Shai and Arun. Munna aspires to die a historied actor. Munna has a fellow who has links to the underworld and his brother tries to utilise his links within the industry to try and get Munna a break even though Munna is against his brothers activities.Later on in the movie Munnas brother is murdered in all likelihood because of his ties to the underworld (Gurbaxani, 2011). The movie in this scene highlights the underworld influence that has do its way to the Indian film industry. There have been some(prenominal) instances and incidents where mob bosses from the Indian underworld have funded and backed various producers. Anyone who has refuse to work in mob backed movies has received threats and sometimes even been targeted by the underworld. ab initio the mob bosses were just like any other fans of bollywood tops(predicate)stars.However all that changed when one of these mobsters started financing movies of an actress he fancied. Soon the rest of the underwo rld got on the belief. Refusal of banks to invest in Indian cinema forced the producers to accept offerings made by the mob bosses (Corliss, 2002). Munna arrives at Shais apartment to collect her laundry and the two soon become good friends. Munna offers to become her guide and in return Shai promises she would prepare a portfolio for Munna which he plans to send out to various producers. Munna soon starts developing feelings for Shai but is ineffectual to express his feelings for her (Gurbaxani, 2011).India has been a country where people have been divided into assorted sinkes and creeds. From ancient times the caste system has defined the social, financial and economic lives of the Indian people. Marriage of an individual is limited to his or her caste, castes are defined by birth and a persons caste decides the job that person is beaver suited for (Callaham & Pavich, 2011). The movie cites Munnas lower caste and the difference of financial status as the main reasons as to why he doesnt confess his fee lings to Shai. Meanwhile Shai gets obsessed wit Arun and starts stalking him.The building opposite to Aruns apartment is under construction and the builder happens to be Shais father. taking advantage of this fact Shai uses the building as a means to take Aruns scenerys without his knowledge. Arun on the other hand has his mind fasten on the tapes that belonged to the preceding(prenominal) tenant of the house. The tapes contain messages from a char named Yasmin (Kriti Malhotra) to her brother. Arun definees those tapes and soon starts drawing inspiration from them (Gurbaxani, 2011). It is normal for artists to draw inspiration from daily objects.Different artists gain inspiration from different twenty-four hours to day objects and people. These inspirations can be from friends, family or even a song they like (Barnett, 2012). The movie cites the tapes by Yasmin as a means of inspiration for Aruns work. To make a living and promote his dream of beco ming a movie star Munna works as a laundrier by day and kills rats for different localities by night time. Once while taking some pictures Shai comes across Munna while he is on his night job working as an exterminator. Shai takes his picture while Munna is working. Angry and confused Munna makes a run for it.Arun watches the last video left(p) by Yasmin in which she confesses that her husband is in fact having an affair and shows signs that she would probably kill herself. Feeling frustrated Arun leaves the apartment for good. Shai gets hold of Munna and asks him for Aruns new address. Initially Munna hesitates and lies about not knowing the where abouts of Arun but eventually gives her Aruns new address (Gurbaxani, 2011). The film depicts Yasmin as the narrator and uses her experiences of Mumbai to portray the famous landmarks of the city in a completely new perspective.The narration of Yasmins experiences gives Dhobighat the shape of a love letter written to the city of Mumbai. The movie uses various situations to provide a comparison of the physical and mental differences amongst the various sects of individuals living in Mumbai. An compositors case is a scene from the movie in which Shai wants to conduct Munnas photo shoot outside the studio. However Munna being a native of Mumbai does not perplex the sights and sceneries of Mumbai as fascinating as Shai does (Gurbaxani, 2011). Normally Bollywood films are very expensive and can damage up to $20 million (The Economist, 2000).Up until the 1990s the sets, costumes and special do used were mediocre in quality. The popularity of Hollywood movies in India forced the directors and producers to improve the quality of their movies (The Economist, 2000). However Dhobighat cost a mere $1. 8 million a fact that astonished and amazed majority of Indian and international film critics (Pillai, 2010). Indian filmmakers image that shooting in irrelevant countries draws the public to the cinema. Various foreign loc ations have been used in the past to make the movie more appealing to the masses.Either film makers choose foreign locations to get away from the gang or they argue that it is the need of the script that makes them choose those foreign locations. Incentives given to the Indian film industry by the government too attracts various film makers towards the theme of shooting at foreign locations (Trivedi, 2012). Dhobighat was produced using guerilla techniques in which multiple localities of Mumbai were used to make the movie. The director Kiran Rao didnt use any kind of set at all. Kiran wanted to Dhobighat to be a tribute to the people of Mumbai (OutlookIndia. com, 2010).Most of the parts in the film were in English something that troubled Kiran and Amir khan. Majority of indian population had a hard time understanding English a factor that most likely would have affected the films business. The output signal team decided to dub the English scenes in Hindi (Pillai, 2010). The distr ibutor of the movie for fall in States and India was UTV. UTV a subsidiary of Walt Disney has been one of the major distributors of Indian cinema and has been one of the prominent entities in bringing Indian cinema to the world. The last decade or so has been the turning point of the company.UTV took up movies that changed the way movies were made in Bollywood. A number of these movies were hits. Peepli live, Rang De Basanti and Brfi are examples of some of the great films that UTV Motion Pictures have worked on. Senior Vice President at UTV Motion Pictures U. S. A dubbed the movie as being different to what Indian movie fans are used to. He was also critical about the reception the movie was liberation to get. despite the Academy Awards taking place on the same date UTV released the movie on 21st January 2011 in fall in States and India.The release date couldnt be delayed because India was hosting the world cup and the film crew wanted to release the film on the same date to pr event the production of pirated copies. UTV gave preference to the Indian fans because the movie mainly targeted the Indian audience. UTV were encouraged after the Dhobighat got positive response at the Toronto and London film festivals (Sydney, 2011). Dhobighat was a success at the box office. scorn everyones expectations Dhobighat was liked by the Indian population raking in more than $2. 6 million in India.The film did fairly well in United States, United Kingdom and Dubai making more than $780000. Internationally the movie did quite well making a whopping $1. 6 million. The success of Dhobighat pleased the gallop star and producer Amir Khan. Amir Khan further commented and dubbed the movie as a success because of the type of movie it was. Kahaani The movie starts at Kolkata resistance rail where a gas attack takes place killing the passengers on board. Fast forward a some years a pregnant woman named Vidya Bagachi (Vidya Balan) arrives in Kolkata from London during a religiou s festival.Vidya is a software engineer who is searching for her missing husband. During her visit to the local practice of law station Vidya meets Satyaki Rana Sinha (Parambrata Chatterjee) a police officer who agrees to help Vidya in finding her husband. The two visit National Data Center where Vidya claims her husband worked (Dhaniwala, 2012). In India the police are usually considered incompetent and inefficient. They have frequently been criticized by the mass population for not taking their jobs seriously, accepting bribes and folding after being pressurized by top officials.However the movie shows Indian police in a positive light and in particular the character of Rana playing the post of a true police officer and helping Vidya in her quest to find her husband (Pagnamenta, 2013). At the NDC office Vidya and Rana are perplexed when human resource department at NDC deny having employed Vidyas husband. However the head of the human resource department suggests that Vidyas hus band resembles a lot like an ex-employee, Milan Damji (Indraneil Sengupta). The head of the HR department is murdered by a hitman named Bob Biswas (Saswata Chatterjee) before she could share Damjis records with Vidya.Vidya and Rana break into the records of NDC to get more information on Damji. While searching for Damjis records Vidya and Rana have a close encounter with Bob. The two barely escape with their lives. Vidya meets an intelligence bureau officer Khan (Nawazuddin Siddiqui) who is investigating the gas attack of Kolkata. Khan warns Vidya about the dangers of the case and informs her that Damji is wanted fugitive who is the acme suspect of the gas attacks. Khan advises Vidya to back off and leave Damjee to the police. However Vidya completely ignores Khans advice and visits the address stated on Damjees records (Dhaniwala, 2012).Indians believe that when a woman sets her mind to it she can achieve anything for the sake of her husband. These acts of courage by women origin ate from the reputation in Ramayana of a king named Dasaratha and his queen Kaikeyi who showed courage in the face of fear and saved her husband from at hand(predicate) death. The movie depicts Vidya in the same manner as Kaikeyi who besides the fact being pregnant is willing to risk her feel and the life of her child to find her husband and ensure his safety. Kahaani isnt the first movie to depict such actions from Indian wives.Over the years there have been numerous films that have shown Indian wives going to great lengths to protect and obey their husbands (Murthy, 2001). Upon reaching the stated address Vidya and Rana meet an errand boy working at a small tea shop. The errand boy recognizes Damjee and gives Vidya the name of R. Sridhar an officer of NDC who frequently visited Damjee during his stay at the apartment. Bob on the instructions of Sridhar makes an attempt on Vidyas life but dies in the process. The question of Bobs phone gives Vidya and Rana an IP address.Vidya c onfronts Sridhar at his office. A scuffle breaks our between the two and Vidya eventually ends up shooting Sridhar. The death of Sridhar angers Khan who wanted Sridhar for questioning. Vidya procures a phone number from Sridhars computer and dials it. It is revealed that the number belongs to Bhaskaran K. (Dhritiman Chaterji) an Investigation Bureau officer and Khans superior. Vidya informs Bhaskaran that she has some sensitive documents left behind by Sridhar and threatens him that if he does not cooperate she could use those documents to send him to jail.Bhaskaran tells Vidya straight up that he is not associated with any of this. However a few minutes later Vidya receives a call asking for the documents in return for the safety of her husband (Dhaniwala, 2012). Suspecting the call was from Damji Vidya agrees to meet the caller at the place of his woof with Khan and Rana on her trail. The caller turns out to be Damji and during their talks Damjee attacks Vidya. Damji menacingly p oints his gun at Vidya who uses her prosthetic abdomen she was using to fake her pregnancy, to knocking the gun out of his hand.Vidya kills Damji and flees the scene. It is later revealed that Vidya was in fact Arup Basus (Abir Chatterji) wife. Arup was killed in the gas attack and she had returned to India to seek revenge of her husbands death (Dhaniwala, 2012). once more Kahaani isnt the first movie where women have been shown seeking revenge for themselves or for the death of someone they loved. Bandit Queen is an example of such a movie where a poor woman who is raped and abused by high caste men in her village. She joins a gang of bandits and seeks revenge upon all who did her wrong.Another story is that of ek haseena thi where a man takes advantage of a simple woman and frames her for drug possession. Upon her release from prison she sets out t find the man who framed her to seek her revenge (rain singer, 2011). The film director and the co-writer of the script Ghosh had tro uble finding producers for Kahaani. His film Aladdin was a flop despite having a star studded cast and the producers were slow in investing in his future ventures. The idea of a pregnant woman as the lead actress and small time actors in supporting roles were also factors that discouraged the producers from financing the movie.The low cast of shooting in Kolkata and the small budget attracted Ghosh to the idea of shooting the movie in Kolkata (Zee news, 2012). The script writer Adviata Kala did some extensive research for the film. She based most of the story on her personal experience of the city when she was searching for her boyfriend. She stated that even though there was a difference in the culture and the language barrier existed the people were very hospitable and welcoming something that can be seen in the movie (Mitra, 2012). To prepare for her role Vidya Balan visited a doctor to consult about the prosthetic belly.Vidya also consulted her doctor of how a pregnant woman wa s to act and how what troubles would a pregnant woman normally face. Vidya claimed that she used to portray as a pregnant woman in her college days which helped her out in her out in the film (zee news, 2012). Like Kiran Roa Ghosh used the technique of guerilla filming for his movie. The director admitted that guerilla shooting in the busy city of Kolkata during the festival was not easy. Frequently the participants of the festival stare nowadays into the camera or in the faces of the actors (Movie Talkies, 2012).Ghosh shot different localities of Kolkata without the publics knowledge. Ghosh thought it would be easier to shoot without any hassle brought on by the crowd and without the need of crowd control. The shooting of the film and of Durga Pooja festival was completed in 64 days. Ghosh wanted the character of Bob to be of a hitman that would intimately blend into the crowd. Ghosh briefed Chatterjee over his role and told him to portray Bob as being polite. To make the charact er seem more believable Ghosh gave him a bald place and advised Chatterjee to frequently rub his nails, as Indians believe rubbing ones nails prevents hair loss.Bobs character received remarkable praise from the critics and from the viewers. His famous one liner from the film became hit on the internet with individuals quoting him on different social networking websites. The young generation of India was really impressed by Bob and some of them even approached Ghosh with the idea of a graphic novel based on Bob. It is also rumored that some one has approached Ghosh with the idea of a television series based on the life of Bob (Mukherjee, 2012). The main distributors of Kahaani were Viacom 18 Motion Pictures.Viacom 18 Motion Pictures has been around for quite some time now dealing with Indian movies. Some of the famous movies that have done business with Viacom are Players, Son of sardar and Tanu weds Manu. The movie was a success at the box office. Initially during the first week t he movie experience a poor response. The film made $370000 in the province of Bengal in the time span of three days and during that time the seat occupancy uprise from 47% on the first day to 94% on the third. The movie generated $4. 4 million in the first week passing its production cost of $1. million. By the end of the second week the movie made up to $7. 9 million in India alone. Box office India dubbed the movie a super hit just after two weeks (Box office India, 2012). Oversees the movie did reasonably well being able to generate the revenue of $1. 5 million from United Kingdom, United States, New Zealand, Australia, Pakistan and Malaysia. Hindustan times estimated that Kahaani had generated $19 million world wide within 50 days of its release (First Post, 2012). Kahaanis success brought on a new trend among Bollywood producers and directors.Kolkata became a favorite location for the industry. The use of Kolkata as an opening scene was completely different from traditional B ollywood movies that had been using Mumbai and Delhi as their prime locations for shooting. The citys colonial buildings and the hand rickshaws all added to the magnificent scenario that was presented by Ghosh in the movie. The release of the movie also had a significant impact on the tourism in Kolkata. In particular the guest house used by Vidya in the movie has attracted a lot of tourists (OneIndia. com, 2012).Ghosh plans to produce a law of continuation for Kahaani and use Vidya Balan as his lead actress in the same recurring role. The shooting of Kahaani 2 is to take place in 2013. The film industry has already seen the making of Kahaani in Tamil and Telegue. Conclusion The success of low budget art movies like Dhobighat and Kahaani shows a change in the trend that has been found amongst the Indian viewers. viewers have now grown tired of all the love stories and senseless action movies that has been the recipe for a successful Bollywood movie. The viewers now want to watch mo vies that have a strong plot and have good stories.The success of Kahaani and Dhobighat despite their unknown actors is proof that indian viewers want to watch movies with a good plot. Expensive movies such as Agent Vinod and Rush are proof that a big budget and a star studded cast does not guarantee the success of a movie. Using real locations instead of expensive sets is another factor that separates Kahaani and Dhobighat from other movies. Instead of using foreign locations these movies opted to use popular areas of Indian cities to shoot their movies significantly reducing the budget needed for the movies.Art movies in the past decade or so have generated a great deal of revenue not only in India but overseas as well. List of References Barnett, L. , 2012. Top artists reveal how to find creative inspiration. Online Available at http//www. guardian. co. uk/culture/2012/jan/02/top-artists-creative-inspiration Accessed 8 April 2013. Box office India, 2012. Agent Vinod Average Openi ng Kahaani Extraordinary Week Two. Online Available at http//boxofficeindia. com/boxdetail. php? page=shownews&articleid=4192&nCat= Accessed 10 April 2013. Callaham, T. amp Pavich, R. , 2011. Indian caste system. Online Available at http//www. csuchico. edu/cheinz/syllabi/asst001/spring98/india. htm Accessed 8 April 2013. Corliss, R. , 2002. Married to the Mob. Online Available at http//www. time. com/time/magazine/article/0,9171,361780,00. html Accessed 9 April 2013. Dhaniwala, M. , 2012. Kahaani Review. Online Available at http//www. koimoi. com/reviews/kahaani-review/ Accessed 10 April 2013. Dhawan, H. & Kurup, S. , 2006. Pre-marital sex Girls like to keep mum. Online Available at http//articles. timesofindia. ndiatimes. com/2006-10-24/india/27785487_1_report-sexual-debut-indian-women Accessed 8 April 2013. First Post, 2012. Kahaani Whats the story behind the numbers? Online Available at http//www. firstpost. com/bollywood/kahaani-whats-the-story-behind-the-numbers-253056. html A ccessed 10 April 2013. Gurbaxani, A. , 2011. Dhobi Ghat Is A Sparkling Debut. Online Available at http//mumbaiboss. com/2011/01/21/%E2%80%98dhobi-ghat%E2%80%99-is-a-sparkling-debut/ Accessed 8 April 2013. Mitra, I. , 2012. Vidyas journey was my own Advaita Kala. Online Available at