среда, 3 апреля 2019 г.

A Review On Fleet Management Systems Information Technology Essay

A Review On choke attention dodges nurture Technology EssayManagement emergeline of compeverys fomites swift with the dish of mer squirttile motor fomites such as cars, vans, and trucks constitutes shoot solicitude. The word spend here refers to fomite and a range of functions such as vehicle financing, vehicle fear, vehicle telemetric (taking and diagnostics), driver anxiety, fuel c atomic shape 18 and health safety objet dartagement. The companies whose commercees are establish on steeration are helped by this g all overnance in a no of fashions asRemoving or minimize the risks associated vehicle investment.Improving cleverness and productivity. rosy-cheekeducing over totally costs of transportation and staff.In ho design egest direction department or an outsourced fleet management provided deal with these functions. knowing vehicle locating bring in (AVLT) carcassAutomatic vehicle locating bring in (AVLT) is a strategy through which the bit of the vehicle washbowl be located easily at any place in the earth at any occlusive of judgment of conviction at any weather to a fault with the help of Global military ad honest establishment (GPS) and Geographical selective informationrmation System (GIS).Usage This navigational dodge is commonly utilise inPublic shiftMany society management dodge equalFleet managementInventory managementLogistic management etceteraIt a corresponding helps to recrudesce the effectiveness and strength in utility as well as cost.Types of technology employThis ashes uses diametric technologies for functioning e.g. RFID technology, GIS-GPS found technology.Global positioning organisation (GPS)The berth found global navigation satellite remains providing certain post and era reading in all weather and at any while and anywhere on or near the earth when and where there is an unobstructed line of sight to 4 or more GPS satellite visited global positioning strategy of rule s (GPS).This dodging of rules established in 1973. It was created and realized by U.S department of defense (DOD) and is maintained by U.S government originally course with 24 satellites. It was established to overcome limitations of previous navigation musical arrangement. Any unitary with GPS receiver apprise freely overture it.UsageToday GPS is fool a centeringn as a dual-use technology having acts both in military project originally.For commerce and scientific uses track and surveillance it has become a large-mindedly used and useable tool.Banking, mobile phone operations, contain of power grids and other every natural process are facilitated by GPSs dead-on(prenominal) timing. Because of this governing body expeditious, safe, economic and accurate take on is being performed by farmers, surveyors, geologists and others. There are triple basic components authoritative location, relative movement and time transfer that are used in civilian diligences.Surveying Surveyors use absolute locations to make represents and determine holding boundariesMap-making used by both civilian and military cartographers use GPS extensively. gliding Navigators digitally precise velocity and orientation measurements are valued by navigator.Cellular telephony GPS/cellular position detection formobile urgency callsand other applications.Tectonics direct fault motion measurement inearthquakes is enabled by GPS.Disaster relief/ fatality serve ups To know location and timing capabilities. GPS is used by these dish ups.GPS tours content to give away for instance, information nearly an approaching point of interest is displayed is determined by location.Geofencing vehicle tracking systems, person tracking systems, andpet trackingsystems use GPS to locate a vehicle, person, or pet. These whatsiss attach to the vehicle, person, or the pet collar. The application provides 24/7 tracking and mobile or Inter meshwork updates should the tracker leave a designated area. sport geocaching,geodashing,GPS d vulgaringandway markingGPS Aircraft TrackingGeotagging For purposes such as photographs and creating map overlays location coordinates are applied to digital object and other documents respectively. just there are only few GPS enabled digital camera.How GPS worksGPS consists of three partsspace segment, contain segmentUser segment.The space and subdue segments are developed, maintained and operated by U.S Air Force. Each GPS receiver uses to visualise its three-dimensional location ( parallel of latitude, longitude, and altitude) plus the current time apply broadcasted from space through GPS satellite. A master control station, an alternate master control station, and a host of apply and shared ground antennas and monitor lizard lizard disseminate constitute control segment.Geographical Information System (GIS)Any system that captures, stores, analyzes, manages, and presents entropy that are linked to location is called Geographical Information System (GIS). It is the merging of cartography, statistical outline, and informationbase technology. Google is the most common example which consist data and captured image of locations and shows corresponding location on user screenland for which longitude latitude are mentioned.USAGEcartography,remote sensing,land surveying,public utilitymanagementnatural resource managementgeographyurban planning catch managementnavigationLocalized search engines. workings of Automatic fomite Locating Tracking (AVLT) SystemThe system uses computer technology for primarily for tracking vehicles, freight system and gondolas. The information astir(predicate) real-time position of vehicle to a control system is passed on through signals enrapture out by tracking twist already attached to vehicle. Among any(prenominal)(prenominal) techniques available for determining the position and transmitting it, the selection of technique to be actually used depends upon the requirements. T he position information is stored in a gubbins for a specific period, which could be anything from a few seconds to some minutes. The information is send out by device either in the raw form (electronic signals) or as processed information.Transit agencies often use AVLT systems in combination with computer-aided dispatch, mobile data terminals and emergency alarms for improving passenger dish ups, in real-time passenger information, instinctive passenger counters and automated have it away paymentsystems.Purposes like automatic fire announcements, automated destination signs, supervise vehicle components and prioritizing traffic signals can too use AVLT system for functioning. draw below illustrates representative working of GPS found AVLT system.Advantages of AVLTThe AVLT has the following advantagesAVLT is used by Transit agencies for enhancing optimum utilization of fleet and reducing fuel consumption, wear cumulus and capital costs. It helps in improving adherence to schedule and accessing passenger information. approachability of plenty of data enables easier management of transit systems which further depends for increase in net efficiency and productivity of the systems.Along with increase in usable efficiency, AVL systems ability to predict bus arrival timings in real time also enhances customer military service, then making increased customer service and satisfaction as the greatest benefit of AVL. The summary of service surgery in real time as well as chronologically, alter system planning and emergency repairs is enabled by Supplementary technologies like automatic passenger counters. A direct link between AVL and increased ridership and revenues is shown in study conducted in 2003.Productivity enhanced- more trips, capital savings receivable to the ability to unwrap utilize vehicles, maintenance costs cut back and therefrom general reduction of cost per vehicleBetter adherence to schedule, the true in monitoring and coordin ationMore keep down of users and higher user fealtyNeed for supervisors and manualdataentry discreditdAbility to control operations and driver performance rectifydOff-route vehicles are tracked effectively. amend dialogue ne iirk between drivers, supervisors, operators and other staff.Radio messages are preoccupied in less numbers.Capabilities to inform passengers of bus arrival times improve the quality of service and help the travelers to take better decisionsills from customers are reduced and thus need for customer information personnelthese travel improve overall image of the transit agencyThe data is more accurate and complete and thus the agency is able to schedule and plan betterPreparation time for schedule as well as number of staff required can be reduced.Better bus stop placementBettersecurityfor driver as well as travelers by enabling faster location of vehicles and response to accidentsBetter useable decisions towards detours due to sudden developments like ba d weather, roadway closings and accidentsCOSTS FOR AVLTFor the on-board device and the control center procurement, installation and software are included in the costs of AVLT. The costs of AVL also include labor costs concerning maintenance and radical staff to operate the systems. Depending on the size, number of components and the sophistication of the system AVL systems are available at different prices.Today, there are wide ranges of AVL system beats available. The simplest and basic models possess features like GPS/ DGPS AVL that have computerized dispatching, mobile data terminals and silent alarms. Models with passing sophisticated features are also available. For large fleet that needs similar features, as the cost of the central monitoring system is distri neverthelessed over a larger number of vehicles, these systems workout to be cheaper ones.OBJECTIVESThe intention of this review paper is to make a thorough study on1 . A review on where AVLT is being used.2. Name of d ifferent service providers of AVLT in India3. How this useful technology AVLT has helped Indian companies(Citing example of some Indian companies)4. Effectiveness and trends of AVLT in Indian market5. The difficulties faced to impose AVLT in large scale.A Review on Where AVLT is being usedTransit agencies use AVLT to enhance optimum utilization of fleet and reduce fuel consumption, labor and capital costs. AVLT helps to improve adherence to schedule and access passenger information. With AVL, more data is available and this makes it easier to manage transit systems. The net efficiency and productivity of the systems thus increases.According to Kent Stable, Marketing Manager, Chameleon submit are suppliers of GPS vehicle tracking systems Vehicle tracking devices can only your business profound amounts of money by providing you with information about wasteful practices that you would not easily be able to find out by any other means. Many problems associated with multi fleet bus inesses can be ironed out very swiftly when you have the right information.Track and monitor your entire fleets movements with the Automatic Vehicle Location System. An easy to install, implement, and cost efficient solution. Know exactly where your vehicles have been, where theyre headed, and how fast.- (an advertisement given by Vodafone, India on all time real fleet management system )Use of AVLT in India abroadVehicle tracking system in Indiais mainly used in transport industry that keeps a real-time track of all vehicles in the fleet. Though there are unlike GPS software and hardware developingcompaniesin India working for tracking solutions, however, its application is not all that popular as in other countries like USA, Japan, Malaysia etc. which regulates the whole GPS network. In India it is mostly used in Indian transport and logistics industry and not much personal vehicle tracking eg. Delhi charm Corporation , Meru Cabs.In a call-taxi operation, tracking the location of apiece available taxi in real-time is extremely critical. It would not be possible to scale up beyond 200-300 taxis with manual tracking, with the use of walkie-talkies or mobile phones. Hence we have opted for technology that is scalable for thousands of taxis, and is a passing successful model in countries like Singapore -MERU CABSFreight publicityLogistic service providers are now increasingly adopting vehicle-tracking system for better fleet management and punctual service. The system can unceasingly monitor shipment location and so can direct the drivers directly in case of any change of plan. Fleet managers can keep an spirit on all activities of workers, vehicle over stronghold, route deviation etc. The driver in kink can access emergency service incase of sickness, accident or vehicle breakdown. All in turn supports money and time management, resulting better customer service.Acoording to Dr.Vinod N.Sambrani, (Institute of Management Studies Kuvempu University, Ka rnataka) and Dr. M. S. Subhas (Karnatak University, Dharwad, Karnataka) Route analysis helps managers to generate the most efficient route (best route / shortest route) that the vehicle should take between the alliance and it supply chain link. Alternative routes can also be generated and analyzed. Alternative routes help in rerouting of the supplies in case of problems (either man -made or natural on one route.)The best example of application of AVLT in freight forwarding is the popular logistic and courier company Federal Express(FedEx) totally depends on AVLT system .Emergency Management systemEmergency management system is now a days acquire is popularity in India . Health Management look Institute (HMRI ) Hyderabad runs an emergency ambulance system (108) through AVLT to give customer proper service and r to separately one at the emergency place indoors 30minites of the occurance of any accidents.Call centersIn commercial-grade vehicle segments the taxi operators of vario us call centers are now using vehicle-tracking system for better information access.However, its application is in its infant layer in India and if adequate steps are taken in livery the cost of hardware and software low then it can be used for tracking personal vehicle, farming (tractor), tourist buses, security and emergency vehicle etc. Again brass needs to cut down the restriction imposed upon the availability of digital maps for commercial use and this provide encourage software industry in developing cost-effective tracking solutions. Though, gross revenue of both commercial and passenger vehicles are growing but price of tracking service is very high and this is the key subject in Indian market. Hence, its important for market participants to reduce prices of GPS chips and other products in order to attract more and more users.As far asIndian vehicle trackingand navigation market is concerned the late(a) association of India with Russian Global Navigation Satellite Syste m (GLONASS) go forth act as a catalyst in the improvement of vehicle tracking system. This impart give an advantage in managing traffic, roadways and ports and also as an important tool for police and security agency to track stolen vehicles. Hence, in near future there is large prospect for the utility of vehicle tracking system in India, which can revolutionize the way we are communicating.Companies in India using AVLT in Fleet ManagementSAIL ( brace Authority of India) SAIL , Indias one of the top 10 public sector company in terms of turnover , uses AVLT for their Fleet Management system to optimize the routes, real time functionalities like tracking , reporting , imperative , monitoring , emergency situation handling etc.DTC(Delhi convey Corporation) DTC is one of the largest city road transport undertaking in India. It has a fleet of around 15000 vehicle carrying on the business on passenger transport on 800 routes from 33 depots all over Delhi with product mix comprisi ng of city Intercity service.Meru Cab Services One of the famous call taxi service in India, totally manages their fleets through AVLT .Locating the clients pick up and drop point , finding the shortest route and also monitoring the drivers performance and fuel efficiency in all the cases AVLT provides the solution.Maruti Udyog confine Maruti the leader in Indian automobile industry for two decades also uses AVLT system for their fleet management system .Tracking the inventory , supply and monitoring etc is done by AVLT systemBangalore metropolitan please Corporation (BMTC) AVLT system is used to track the total fleet management . All the new buses have this GIS -GPS based navigation facility. slobber Truck monitor (Swachcha Bangalore ) is another project taken by Bangalore Government with AVLT technology.EMRI HMRI 108 Service , Hyderabad Emergency Management system and Health Management research Institute of Hyderabad has launched 108 Ambulance services . They promises to reach any specific location within the 30min of the causalities. They fully depend on the AVLT system and totally manages their fleets. The Goa Government has also started this facility recently.Companies Providing Fleet Management services in India(Cities in India where GIS based vehicle tracking systems are used)The companies providing these services are as followsVodafone telecom ServicesAirtel Telecom ServicesAlbireo Telematics Pvt LtdTriCAD Design Consultants (P) Ltd.Vajra InfratechAayur Technology closureAdhyan Techno Solutions Pvt. Ltd.Arya Omnitalk wireless Solutions Private throttleCERT InfoTrackClay Telematics Pvt. Ltd.DhanusDigi m-TrackDigitrackEagleeye IndiaeffiKCFindnsecureGeo Edge Private LimitedIndtrack SolutionsINEN Solutions P LtdIntergrated Digital Info Services LimitedInvendis TechnologiesiWate SystemsMahaVenturesNext Gen TechnologiesNoble incorporate SolutionsNucleus MicrosystemsOmaticsRemedy Software Systems Pvt. Ltd.Rilapp NetworkSATCOP IndiaSattvah Embed ded Technologies (P) LtdSmart Signals Pvt. Ltd.Symbioun Solutions LimitedTracciaTraxis India Pvt. Ltd.CASE STUDIES OF DIFFERENT COMPANIES USING AVLT1.Fleet Management System adopted by MarutiMaruti Udyog Limited has been the market leader in Indian Automobile patience from the past two decades.MUL launched a service named N2N Fleet To facilitate the sales of MUL cars using the relationship management approach through Leasing and Fleet Management as two products, Management Solution, Through tie ups with other service providers like insurance company, replacement car service provider, and manpower service provider MUL presented a common face to the end client with a whole gamut of services. End-to-end backups/solutions across the vehicles life like Leasing, Maintenance, Convenience services and Remarketing are some of the key services being offered by MUL.CHALLENGES go aboutMUL was in search of a B2B solution, a common platform for all the partners, clients and respective MUL depar tments. As this service included interaction and data switch over between multiple organizations therefore safety and security of data became a very important issue not only for MUL, but also for partners and customers. Strict performance criteria and tight deadlines were the other challenges involved in the project.THE dissolving agentAfter a very tough business process analysis the AVLT system was by a business solutions provider. The modular architecture was customized in such a way so that the diff users can use the system as per their requirements. Scalability, security and flexibility were most important issues that were taken account of.THE BENEFITSThe AVLT system provided MSU with Complete monitoring capabilities for its fleet of vehicles, maintenance, insurance, accident, rescue, and remarketing.2. The success story of Meru CabsMeru the new call taxi service launched last year by V-Link machine politician Pvt. Ltd, has re established the belief that IT can be deployed in just about any field, and can lead to phenomenal gains.As it is rightly said,Technology does not drive change-it enables change.The same has been the case with V-Link Taxis Pvt. Ltd.There was a complete transformation in the way V link carried out its operations afterwards deploying the GPS-based system to track the newly-launched fleet of cabs called Meru. This service was world-class started of from Mumbai.The ChallengesSharing the importance of the solution, Nilesh Sangoi, CTO, V-Link said, In a call-taxi operation, tracking the location of each available taxi in real-time is extremely critical. It would not be possible to scale up beyond 200-300 taxis with manual tracking, with the use of walkie-talkies or mobile phones. Hence we have opted for technology that is scalable for thousands of taxis, and is a highly successful model in countries like Singapore.The SolutionsV-Link has deployed different technologies from a number of different firms in India and abroad, including Dubai and Singapore.We use high-end GPS and GPRS (general packet intercommunicate service) technology in our Maruti Esteem vehicles. The technology has been specially deployed to ensure that passengers receive a timely response and are picked up and dropped at their destinations without any unnecessary delay, reveals Nilesah Sangoi (Tech. straits of Meru Cabs)Our vision is to give urban commuters in India a world-class traveling experience, by using a technology that has evolved in developed countries over the past twenty years, adds Sangoi.Every cab is fitted with a GPS-based tracking device that facilitates in locating the taxi closest to a customer pick-up location. customer addresses and other details are communicated back to the driver on the display screen via the GPS enabled display in the cab avoiding the use of outdated radio trunking (walkie-talkie) technology. Every cab also has a tamper proof digital fare meter. The control room gets regular feed about the aloofness traveled, fare and the location of each cab. Customers also get a printed write of the fare receipt at the end of the trip. Each cab is fitted with communication terminal (MCT), which has a built-in GPS receiver, LCD (liquid crystal display) screen and GPRS connectivity, which facilitates two way communication with the control room.Our data centre hosts a stupefy of communication servers, application servers, and database servers, which are in constant touch with each taxi through GPRS. The latitude and longitude information is plotted on a GIS (Geographical Information Systems) map for real-time tracking, says Sangoi.The BenefitsThis GPS enabled technology empowers the customer to book a cab through phone internet and SMS, and the control room can track the cab nearest to the customers location enabling a significant reduction in the turnaround time.If any customer leaves nay belong in the cab the customer can lodge a complaint about the item left behind and the cab can be locat ed to trace the lost item and it will be returned to the customer.This Fleet Management system is also important from the point of view of the passengers safety, and can also be used to note the drivers performance.V-Link Taxis Pvt. Ltd is a subsidiary of the V-Link Group, a corporate fleet management services organization that is headquartered in Mumbai, and operates in five major cities-Mumbai, Delhi and NCR, Pune, Bangalore, and Hyderabad. The company manages a fleet of over 5000 vehicles runway an aggregate of more than 150,000 km a day.We have invested heavily in technology to provide best-in-class and highly reliable customer service. The investments are in line with the needs of todays competitive and swift-moving world, concludes Sangoi.In the future too, the organization aims to continuously upgrade its IT infrastructure to keep pace with the times.3. EMRI HMRIEmergency Management Research Institute and Health Management and Research Institute , Hyderabad took a basal s tep in the history of Indians emergency and health management system .They managed to build up the fleet management so efficiently that anytime and anywhere e its an emergency (disaster) or health relate problem , they will reach the certain place within minimum time after getting the call in 108 hotline number. Later GVK EMRI , Mumbai also followed the same stepsThe ChallengesThe first challenges faced was to establish the system widely .. They had to build up many centers throughout the asseverate. They also had to build up an efficient call center and to establish an efficient fleet management system to key the emergency point and detect the nearest location of the fleet (eg. Ambulance) and send the fleet to the destination accessing the shortest and efficient route.The SolutionThey took the IT service help from Satyam Technologies Limited (Currently known as Mahindra Satyam) and build up an efficient fleet management system .They established a faculty based system. The main module is called as MCC( Mission Control center ) which gets the first news about the emergency from the call center and then locate the nearest centers , fleet and shortest route that gives the fastest access to the destination .The BenefitsThis fleet management system not only changed the look out of the emergency management system in India but that also inspired other states to follow this path. The efficient and excellent service fetched many awards to EMRI HMRI. Like GVK EMRI bagged NASSCOM CNBC TV18 IT user Award4. Delhi Transport Corporation (DTC)Delhi Transport Corporation is the one of the largest City Road Transport Undertaking in the India. It has a fleet of around 15,000 vehicles carrying on the business of passenger transport on 800 routes from 33 depots all over the state of Delhi with a product mix comprising of City and Inter-city services.The Challenges consolidation of GPS with GIS map of Delhi for tracking of vehicles on a real time founding with two way messag ing including distress messaging between the vehicle and the control station. Monitoring whether the scheduled route and the time tables of the buses are followed or not. Automatic generation, collection, store and retrieval and analysis of data information and thus eliminating the human related errors involved in collecting of such data. create a dedicated structured database employees, buses, bus routes etc. Using the GIS model as a support system for implementation of the transport policies. synopsis of deviations from standard like schedule route, timing, Missing Bus stops, Punctuality cypher etc. based on captured vehicle data.Enabling automatic bill generation for the buses. warm dispatch of relief vehicles in case of breakdown. Integration with the Delhi metro smart card. Working out realistic schedules according to traffic conditions based on speed of bus during different hours of the day and at different segmentsThe SolutionTo accomplish the above-mentioned objective s challenges, CMC Ltd has developed an Automatic Fleet Management System incorporating its DGPS based Automatic Vehicle Tracking and Management system (AVTMS).CMC Designed, unquestionable and Implemented the Automatic Fleet Management System that include Vehicle Tracking System, Application software for billing, Operational Transportation Model for computer programming of buses and integration of Smart Card Reader with the Vehicle Tracking System, readying for Real Time Passenger Information System to Delhi Transport Corporation. The AFMS system is currently operational from two depots for 200 buses since last two years. GPS based tracker unit installed on 200 buses belonging to 2 depots Monitoring from a Central Control Station for both the depots simultaneously Solar based Database Server, AVTMS server, Communication Server Display of vehicles at Workstation using ARC Info suite and VC++ based application software Established two way messaging system between buses the central control room. Public ready Radio Trunking System (Wireless Communication network) for collecting data from buses. Area of coverage is 1500 square kms.The BenefitsVerification and Validation of GIS data of Delhi procured from a GIS data vendor, with the help of GPS in both standalone and differential mode. This is to ensure that the data is in required co-ordinate system.Real time trials were conducted after the buses were installed with the GPS devices to ensure the integrity of the data. additive custom data as required in the project were dispassionate by conducting extensive field surveys and were encoded in the map of Delhi for facilitation. GIS data was integrated with the turntables containing all the relevant information about various junctions. Application and customization of the of the screen of the reports and queries of the GIS data includes all the info about the buses and other fleets.5. Bangalore Metropolitan Transport Corporation (BMTC)In 1997, BMTC was spun off from the Karnataka State Road Transport Corporation(Ksrtc) in order to focus exclusively on Bangalores rapidly expanding transit needs. The Bangalore Transport Service became Bangalore Metropolitan Transport Corporation and the colour scheme was changed from Red to a Blue and White combination.BMTC remains a division of KSRTC.The ChallengesIntegration of GPS with GIS map of Bangalore for tracking of vehicles on a real time basis with two way messaging including distress messaging between the vehicle and the control station. Monitoring whether the scheduled route and the time tables of the buses are followed or not. Automatic generation, collection, storage and retrieval and analysis of data information and thus eliminating the human related errors involved in collecting of such data.Building a dedicated integrated database employees, buses, bus routes etc. Using the GIS model as a support system for implementation of the transport policies. Analysis of deviations from standard lik e schedule route, timing, Missing Bus stops, Punctuality factor etc. based on captured vehicle data.Enabling automatic bill generation for the buses. Quick dispatch of relief vehicles in case of breakdown. Working out realistic schedules according to traffic conditions based on speed of bus during different hours of the day and at different segments.Providing Real time information to the passengers .The SolutionTo accomplish the above-mentio

Production of Lightweight Concrete Decorative Tiles

Production of Light saddle concrete cosmetic Tiles1.2 vexTo adopt the light slant check enhancive covers by subprogram counteract signifi stinkpotts with different attractive colour and pattern.1.3 ObjectivesTo fulfil the fitties of whippersnapper cover enhancive tiles.To assess the purpose and advantages of light pack cover decorative tiles.Design nub of the decorative tiles by different ratio with waste materials.1.4 Problem t from each oneing light cover decorative tiles ar very common land affair nowadays. But using waste materials to produce light cover decorative tiles are still very fresh in our country.1.5 Scope of essayThe scope of study for this dissertation is concerned on the light concrete decorative tiles. The purpose for this dissertation is to produce decorative tiles with waste materials .1.6 soil in leapationNowadays, construct materials become more and more important in construction industry. Concrete has become the nigh important ma terial for bighearted buildings beca occasion it is dur able, fire resistant, relatively cheap, and an entire structure give the gate be edit monolithically. jackanapes concrete whitethorn be structural concrete that weights middling less than usual concrete and thus reduces the weight of a structure, or it may be some(prenominal) lightness and utilize mainly for insulant and function engrossment. It is lighter than the pompous concrete. The use of lightweight concrete blocks has been widely spread across countries. Its advantages are that there is a reduction of exsanguinous load, double-quick building rates in construction and lower haul and cash in ones chipsling greets. nonfunctional tiles take a shit been with us from the earliest days of human race civilization with around of the earliest examples of decorative circumvent tiles coming from 4000 years agone. Traces of this rich history depose be found in the contemporaneous decorative tiles we cons ider nowadays. Many techniques were employ to create pictures, figures and patterns on pieces of tile. These techniques take glazed clay, encaustic or inlaid clay, mosaic stone, mosaic clay tiles, hand painted tiles, carved and formed tiles, sgraffito (scratched tiles), metallic overlays and transfer printing. These same methods are all used to work out decorative tiles today. These are very correspondent to the pieces make by ancient tilemakers. In fact art tiles as theyre known in the industry, have become the fas give the bouncevass growing geld in tile design and are as coveted my twenty-first century designers and customers as they were prized by our ancestors.1.7 MethodologyStage 1 literature reviewThis study allow for review the relevant literature on the lightweight concrete brick and similarly clay brick. In order to achieve the entire objective, a systematic literature review shall be conducted which go a expressive style cover reference book in library, institu tional and statutory publication, periodicals and condescension/academic journals and so on. A research of the relevant information including an net profit searching conduct in order to find bulge the properties of lightweight concrete brick and clay brick. The entire information search from Internet pass on keep us informed of the future and presence data.Stage 2 Pilot studyDate collection allow take the form of a structured postal questionnaire. However, an initial sail study exit be conducted to test the validity of the questionnaire through in depth test at laboratory.Stage 3 examen at laboratoryThe feedback from pilot study should assist in laboratory taste . Testing the material that related to my research.Stage 4 Analysing the experiment resultThe analysis of the experiment result will take two forms. First is do a comparison with table form. Second is do a result marriage proposal then just do a table and list out the differences between two materials.Stage 5 W riting the research coverThis stage involved writing up the contentedness of the dissertation and should cover the chapters proposed in the following section.1.8 Proposed structure of the dissertationChapter 1 IntroductionChapter 2 Literature reviewChapter 3 Research design and methodologyChapter 4 Analysis of the results and discussionChapter 5 Conclusion and further study bear witnessCHAPTER 2 LITERATURE REVIEW2.1 What is Lightweight Concrete Decorative Tiles ?2.1.1 translation of Lightweight ConcreteJeffrey Girard (2006) states that lightweight concrete mixes are commonly used in the construction industry where weight savings is an important factor. matchless of the most common uses for lightweight concrete is with dump, roof or straddle decks another(prenominal)s include pavement systems, masonry blocks and offshore oil structures. Lightweight concrete is make by alternate some or all of the establishedism weight hoard up with lightweight aggregate. Often the coa rse fraction is replaced with lightweight aggregate and the fines are normal weight mainstaypaper.Mat Lazim Zakaria (1978) states that lightweight concrete can be defined as a type of concrete which includes an covering constituent in that it increases the good deal of the mixture while giving additional qualities such as nailibility and lessened the dead weight.Mohd Roji Samidi (1997) written that lightweight concrete is lighter than the conventional concrete with a dry density of 300 kg/m3 up to 1840 kg/m3 87 to 23% lighter. It was first introduced by the Romans in the second century where The Pantheon has been constructed using pumice, the most common type of aggregate used in that particular year.Lightweight are commonly use when weight saving is the important factor such as using in floor, rampart, bridge decks or roof. Usually it is made by replacing lightweight aggregate rather than normal weight aggregate to produce lighter in weight and the sand will be catch ones b reath the same. It also can be made by adding some motley or expanding agent to increase the volume of the mixture. It will lessen the weight of the concrete. Lightweight concrete can be made to lighter than the conventional concrete up to 23 to 87% still the most common type of lightweight concrete will be replacing the normal aggregate by lightweight aggregate.2.1.2 History of Decorative Tiles Decorative tile has been somewhat since the beginning of recorded history. In fact, some of the earliest records were created on tile that was carved, fired and then preserved in the libraries of kings. Even the glazing of tile has long been practiced, seen in archaeological finds such as the Ishtar Gate of Babylonian King Nebuchadnezzar II (dating to around 575 BC).Tiles were used in mosaics passim Greece and Italy, oft depicting intricate stage settings of religious and cultural value. Roman baths were often grace in tile mosaics, some of which still survive.Early use of decorative t iles was a privilege that was restricted to the upper class and the clergy. The use of ceramic tile became more widespread in Europe during the Middle Ages. Italy was a major producer of such tile, and still is today. Tiles used in cathedrals throughout Europe can still be seen today, a testament to their durability.2.2 rot Materials PapercretePapercrete is a building material comp traveld of a mixture of Portland cement and recycled piece fiber (a light-weight, insulating concrete) . The maximum insulating value is obtained when the dry matrix includes the greatest density of air pockets. High bearing is obtained when the paper fiber is thoroughly cover by the portland cement.Papercrete is mixed with Portland cement to obtain an excellent endure absorption quality, to be flame/fungus retardant, and bug/rodent resistant. Since it is relatively light , it is potentially an ideal material for earthquake-prone areas. It can be used in umteen bureaus as blocks, panels, poured in place, used like igloo blocks to make a self-standing dome or applied over a modelling to make a roof or dome.2.3 Properties of Lightweight Concrete Decorative Tiles2.3.1 Compressive StrengthFor compressive military posture, the performance of lightweight concrete is controlled on lightweight aggregates. dickens factors enter into the specialisation of lightweight concrete are the strength of the aggregates and the strength of the hardened cement-water paste. Among the various types of lightweight aggregate, there are large differences in strength and toughness, and all except the strongest lightweight aggregates are likely to be weaker than hardened cement-water pastes within the usual range of cement contents. (American connection for Testing and Materials,1956 pp.241)As the general rule, the strength of a lightweight concrete will be less than that of a concrete of equal cement content alone containing aggregates of normal weight. Also, with a given cement content, the lower the strength of the lightweight aggregates the lower will be the strength of the lightweight concrete. (American Society for Testing and Materials,1956 pp.241)In the truth, lightweight aggregate concrete does not have favourable compressive strength as the density is low. The strongest of the lightweight aggregate concrete is still weaker than the cement paste. The lower the strength of lightweight aggregate, the lower the strength of lightweight concrete. The benefit for lightweight concrete is light in weight, good in insulation and fire resistance.2.3.2 telephone set Insulation and AbsorptionLightweight concrete is a perfect impact and air-borne sound absorbing concrete and thus is highly suitable for partition walls and floor screeds or foundations. The air-borne or air contain in the lightweight concrete has break sound absorption. When there is better sound absorption, the better for the sound insulation. It is suitable to use for partition walls and floors which requ ire better sound insulation.2.3.3 Fire electric resistanceLightweight concrete has a better fire resistance than concrete consisting of normal aggregates, because of its lower heat conductivity, and its lower rate of strength sacking with rise in temperature .Lightweight concrete has better fire resistance than conventional concrete because it has lower heat conductivity. When the temperature of the lightweight concrete rise, it does not expand quickly like conventional concrete as the density of lightweight concrete is lower. As a result, the lower rate of strength loss will be for the lightweight concrete. It is to prevent the fire spread faster to cause more injuries or losses. If the fire spread one elbow room to another room, the victims in a fire may not able to escape. It is why the covering elements should be better fire resistance.2.4 Purpose of Decorative TilesDecorative tiles can be used in a concoction of places around the home and in many different ways. While most people think of floor tiling, there are many other places that can be given a fresh look with tiles. They can also be used on kitchen counters, walls and in bathrooms.Tiles can be great to put on walls behind kitchen and bathroom sinks or around bathtubs as backsplashes. Using tiles as borders around rooms is an effective way of creating a new look. Replacing an overaged floor with new tiles can create a floor that is easy to care for and doubles as a piece ofart.Decorative tiles can also be used on an individual basis. Tiles that are decorated with a single scene or picture can double as wall art. A few plain tiles and decorating them by hand is a great way to create one-of-a-kind art, specially tailored to an individual room.2.5 Advantages and Disadvantages of Lightweight Concrete bow below shows the advantages and disadvantages of using lightweight concrete as structure .AdvantagesDisadvantages quick and relatively simple constructionEconomical in terms of dit as well as reduct ion in manpower significant reduction of overall weight results in saving structuralframes, basis or pilesMost of lightweight concrete have better nailing and sawing properties than heavier and stronger conventional concreteVery sensitive with water content in the mixturesDifficult to place and finish because of the porosity and angularity of the aggregate. In some mixes the cement mortar may separate the aggregate and float towards the step forwardMixing time is longer than conventional concrete to assure proper mixingTable 2 Advantages and Disadvantages of Lightweight ConcreteSource (Mohd Roji Samidi,1997)2.6 realise of Using Lightweight Concrete Decorative TileReplacing old wallpaper and flooring with decorative tiles can create a intact new look for a room, without dipping too far into the budget. While it is not uncommon to do a whole floor or wall in tile, they can also be used as dialect pieces and borders.Decorative tiles are durable and easy to clean. Weathering tile s, specifically made for alfresco use, can be not only extremely resistant to the elements, but a good source of insulation as well.2.6.1 Weight simplificationReduced dead load of wet concrete allows longer twain to be poured unpropped. This save both labour and circle time for each floor. Reduces the dead weight of a structure from 1/3 to the weight of normal concrete.2.6.2 Thermal insulationA less obvious but nonetheless important characteristics of lightweight concrete is its relatively low caloric conductivity, a property which improves with decreasing density in recent years, with the increase cost and scarcity of energy sources, more attention has been given the erst to the need for reducing fuel consumption while maintaining, and indeed improving, facilitate conditions buildings. The point is illustrated by fact that a 125mm thick solid wall of aerated concrete will give thermal insulation about(predicate) four times greater than that of a 230mm clay brick wall.2.6.3 Fire ResistanceA 13 to 15 cm (5-6 inch) thick wall made of 1,100 kg/m3 density lightweight concrete has a fire fortitude of 5-7 hours. The same degree of endurance is achievable with a 400 kg/m3 density lightweight concrete that is only l0 cm thick. Lightweight concrete is non-combustible, and the air embedded in lightweight concrete attributes to the high fire-rating.2.6.4 Sound InsulationLightweight concrete is a perfect impact and air-borne sound absorbing concrete and thus is highly suitable for partition walls and floor screeds or foundations.2.6.5 Savings in MaterialA reduction in dead weight contributes substantially to savings in reinforcement stigma in foundations. Therefore, the overall quantity of steel reinforcement in lightweight concrete can be reduced by as much as 10%. Savings are also substantial in transportation, crane- and man-handling related activities as well as in raw materials, as no gravel is required to produce lightweight concrete, only the sand and cem ent mortar/paste subsequently embedded in the spume (air). Casting very slender walls can optimize the amount of concrete used, which also results in using a very thin story of p come througher. For certain applications, no plaster is required, and gypsum putty is directly applied before painting. Walls as thin as 50 mm can also be cast. The high flow ability of lightweight concrete makes chill unnecessary, and thus requires vibrating equipment/accessories.2.6.6 Savings in Manpower and CostOnly a few semi-skilled workers are involve to produce lightweight concrete for the moulding or pouring of panels, blocks, or even complete walls for houses. In producing lightweight concrete, steelworks, formworks, brick laying and cement renderings do not constitute major put activities, and therefore the related workers are not required. Workers are only needed to set up cost saving and reusable formworks, and then to mop up them for the next erection or casting.Reduction of dead load, faster building rates and lower haulage and handling costs. The eight of the building in term of the loads transmitted by the foundations is an important factor in design, particular for the case of tall buildings. The use of lightweight concrete has sometimes made it possible to proceed with the design which otherwise would have been abandoned because of excessive weight. In frame structures, considerable savings in cost can be brought about by using lightweight concrete for the construction floors, partition and external cladding. Mostbuilding materialssuch as clay bricks the haulage load is limited not by volume but by weight. With suitable design containers much larger volumes of lightweight concrete can haul economically. Worker can work faster and better, there should be a reduction in labour cost. This can account for up to 80% of the finished cost. Therefore, handling costs may be lower as well.2.6.7 Life span of Lightweight ConcreteLightweight concrete has a life-time span (minimum 100 years). Previous probe has shown that sectioned blocks of cellular concrete cast 10 years ago indicated only 75 percent of the hydrated Cement. It is expected that the strength would incubate to increase with continuing hydration. The use of lightweight concrete in many cases has eliminated the use of products like clay bricks, conventional concrete blocks and other insulation materials.2.7 Design Mix of The Decorative Tiles2.7.1 PapercreteFormulas Papercrete (Anon., 2010) provided that But a typical starting formula for a 200-gallon batch is 160 gallons (727 liters) of water, 60 pounds (27 kilograms) of paper, 1 pouch or 94 pounds (43 kilograms) of Portland cement and 15 shovelfuls or 65 pounds (29 kilograms) of sand. The sand adds thermal mass, reduces flammability and shrinkage, and packs blast the slurry for a denser, stronger block.This is a mixing formula for a 200 gallon batch papercrete. It needed 727 liters of water, 27 kilograms of paper, 43 kilograms of cement and 29 kilograms of sand. The purpose of the sand is to reduce flammability and shrinkage of the papercrete. It also packs down the slurry denser and stronger.2.7.2 Proportion of Design mixIn this project I will produce few samples of design mix for papercrete such as lime, cement and paper oozing mix or cement and paper sludge mix or lime and paper sludge mix. These are to find out which design mix is the most suitable to produce a lightweight concrete decorative tiles. The design mix should able to last longer with its properties.

вторник, 2 апреля 2019 г.

Biomarkers for Alzheimer’s Disease Progression

Biomarkers for Alzheimers Disease ProgressionAlzheimers disorder is slow progressive and irreversible brain disease which is angiotensin-converting enzyme of the most unwashed ca white plague of dementia 1. In AD patients not only persist from cognitive notwithstanding in any case motor and sensory loss 2. Although the chemical mechanism of AD is not well understood still AD pathology is characterized by extra cellular gritty- deposits and interacellular neurfibril tangles lickation of hyperphosphorylation of tau protein. Being irreversible and neurological alter disease, its very important to detect and diagonse at earlier or at some controlable season point. Some useful AD diagonstic biomarkers are required for this purpose. These biomarkers should also fullful the criteria of usefulness for AD detection. Biomarkers should become abnormal with the progression of disease in other words they should be dynamic and correlate with clinical symptom and severity of disease 3. Recent research on use of specific AD biomarker for disease staging in vivo shows that A dynamically correlates with disease at different stages of disease progression4 5. But A take aim varies in patients. Which suggests, done process of A production starts earlier but A as a biomarker only is not relibale, therefore utility(a) biomarker must be found on with A generation process.Figure1. Biomakers and AD early detectionSource Modified from Ingelsson, M et al 2004. 4A can be produced through proteolytic processing of APP (amyloid precursor protein), which takes rudimentary position in AD pathogenesis. APP is single-pass transmembrane protein with larger ectodomain. Although the physiological functions of APP are not well known but has neuroprotective function and positive effect on cell growth 6.APP is mainly produced in neurons and rapidly metabolized by secretase enzymes through alternative splicing by 2 pathways 7 8. Nonamyloidogenic processing of APP involving two secreta ses -secretase and -secretase dapple in amyloidogenic processing -secretase (identified as transmembrane aspartase protease BACE1) and -secretase are mixed. Product generated during both processings have soluble ectodomain (sAPP and sAPP ) respectively along with identical product called AICD (intracellular C-terminal fregmenets)9. much importantly amyloidogenic processing generates A, a sequence contained by sAPP part. In brain APP processing generates mainly A40 and A42 based on 40 and 42 amino acids residues depending on secretases ( enter secretase table 1) through alternative splicings 10. Along with regulatory subunits of -secretase complex, catalytic subunits presenilin1 (PS1) and presenilin 2 ( PS2) are involved mainly in deciding the length of these deadly form of A. These toxic forms of A can aggregate and form plauqe that has more toxic effect 11.With the progression of AD, symptoms also spread along with it depending on the vlunerability of different party of nerv ous body. More vlunerable areas are gauge to be effected earlier to others, the reason AD smptoms appear in different regions in a sequential order and consistency, although meachnism is poorly understood. bug out of these early symtoms, one is olfactory impairement 12, which suggest olfactory system is one of the early vlunerable region during AD progression. Therefore induceing the correlation mingled with early phenomen of APP processing and one of ther earlier vlunerable area of nervous system might lead to valueable insights.This research has focused on APP processing in peripheral structures, the olfactory epithelium(OE), as well as CNS structures trusty for processing of incoming olfactory signals such as olfactory bulb(OB). The prove study found unique APP processing in OE that has significance in providing not only possible biomarkers (including 25kDa, 55kDa and 80kDa) that can be used for wake and detection of AD before plaque formation but also for treatment purpo se. Additionally, PS2 increased level was found in OE that possibly involved in unique APP processing and might also be essential for understanding the -secretase role and controlling AD through -secretase as a therapeutic target.Table 1. Secretases responsible for APP processing.MATERIAL AND METHODSMATERIAL AND METHODS1.1. Animal1.1 .1. Transgenic Alzheimers disease model Tg2576 miceIn this study, heterozygous Tg2576 mice were used, which express a gay amyloid- precursor protein (APP) variant linked to Alzheimer disease, as developed and described previously 21.Age-matched non-transgenic littermates were served as wild-type control. All animal experiments were approved and conducted in accordance with guidelines of value-system Committee of Seoul National University DGIST.Transgenic Alzheimers disease model Tg6799 miceanother(prenominal) AD model used in this study was Tg6799 mice, which expresses human amyloid precursor protein (APP) with three familial Alzheimers disease poi nt mutations and two human presenilin1 mutations thus also known as 5x FAD mice. both(prenominal) of these mutation types mainly contribute to increased production of A42 22. Age-matched non-transgenic littermates were served as wild-type control. All animal experiments were approved and conducted in accordance with guidelines of value-system Committee of Seoul National University DGIST.Table2. Transgenic models used for this study.Olfactory behavioral synopsisFood bury, behavior test was performed to measure the mice smell ability to find a buried food pellet using olfactory cues as previously described 23 24 25 26. Olfactory test was taken blindly without revelation any genotypic information of mice before and during the experiment. Mice were deprived of food round 35 hours with free access to water. Before starting the experiment, adaptation time was provided 510 min to let them adapt in unused prepared chicken coop with new bedding material. This step was important for mice to be adapted to the new environment so that they would able to focus on finding food in a new environment. Similar batting cage were prepared with bedding material depth approximately 5 cm and food pellet was buried 2.5 cm below the surface. Latency or cut-off time 15 min maximum was provided to each mice to find buried food. Latency time was recorded, as time between mouse inserted into the cage and grasping the food pellet, precisely using video tracking software system and system (EthoVision xt 9).

понедельник, 1 апреля 2019 г.

Wireshark Network Protocol Analyzer Information Technology Essay

Wireshark profits conferences protocol Analyzer Information Technology EssayTodays mesh full treatment are typically rattling s knock back. The paradox is they arent static. forethought and subr exposeiners are constantly demanding new technologies, new usefulness, and separate performance, which inevi checkly require changing infrastructure, deploying new operations, and dealing with security. And in the bidding interlock administrator needs to control IT costs and minimize mental disturbance to the organization and as good as need to be able to intelligibly go to all aspects of internet to accurately assess the impact of matching new technologies and services and to make sure it is delivering maximum performance. And now-a-days on that point are wide pattern of software and hardware products available that assist mesh topology system administrators perform a interlocking. Ne devilrk commission covers a wide world as well as local area net which mainl y ground on three contrasting principles, which are Performance reduce stop consonant in the cyberspace.Reliability reinforcements the intercommunicate and the services that the net income bears up and available for all the users .It includes admonishering the vane to spot problems as soon as possible, ideally before users are affected.Security Makes the lucre protected from un classical users and out font world.Functions that are execute as plowshare of profit counseling accordingly include controlling, planning, allocating, deploying, coordinating, and reminder lizarding the re consultations of a internet, communicate planning, predetermined pre moveicraft routing to support load balancing, cryptographic key distribution authorization, configuration counsel, mar management, security management, performance management, bandwidth management, analytics. There are a word form of earnings observe beaks available in the market to be utilise depending on the s ize of it and requirements of the organisation.OBJECTIVEThe intention of this comprehend is to have a in depth study and estimation of engagement management tools that allow us to observe and manage the performance and function of entanglements effectively and efficiently, to produce a short report detailing the benefits of implementing net profit Management. The tools which have been employ in this report are fluke protocol quizzer, Wireshark communicate protocol analyzer, SNMP browser Utility and Network quizzer.FLUKE OPTIVIEW analyzerANDWIRESHARK NETWORK PROTOCOL ANALYZERA intercommunicate protocol analyzer is a vital part of a network administrators toolkit. Network protocol analysis is the truth blood serum of network communications. If you want to recover out why a network whatsis is functioning in a certain way, use a protocol analyzer to sniff the handicraft and expose the entropy and protocols that come back along the wire. trematode worm and Wireshark network protocol analyzer byes insights into what is happening not only over the WAN, but as well as on the local area network (LAN) at each location. Information pertaining to relations operates, protocols, and even several(prenominal)(prenominal) data packets provide authorize the IT organization responsible for the network to forestall it operating at peak performance. happy chance and wireshark are tools to admin computer networks and they helps in monitoring and troubleshooting the network. In addition, they also helps in observe the status of devices, blemishs, warnings, and changes. Fluke and wireshark, the network analyzers are fast performing and compatible with almost each operating system of windowpanepanes.To observe the activities and the performance of these network analyzer program, a small network has been assembled effigy 2.1 TEST NETWORKThe minimal equipment for development communications protocol Inspector/analyzer to observe the performance and appl ications of a network properly, is made up of two routers, two switches and two hosts. A family unit B dish outing scheme has been apply on the network. Two routers gainly R1 and R2 atomic number 53 by angiotensin converting enzyme represent two different sites. R1 is use 172.17.0.1/30, R2 is victimisation 172.17.0.2/30 and twain the routers are connected through 172.17.0.0/24.To make easily understand only two users have been utilize. User1 and user2 are singlely on 172.17.1.100 and 172.17.2.100.Summary study of Fluke Opti assimilate AnalyzerThe program opens in the Summary View. This view argues several windows apply by the tool. The Resource Browser window in the top(prenominal) odd corner ushers the only monitoring network device. The Monitor View, which is in the main window on the upper right, monitors one resource per window in a variety of viewing options. The Stop (red colour tab) in the upper-left corner of the Monitor View window confirms that no monitor ing is occurring. imagine 6.1Start the Monitor / Capture attend toTo start the monitoring / capturing process, use the Start button or faculty - Start from the menu system. The custom chart should start showing activity like the graphic on a lower floor take care 6.2The word ARM(green colour tab) should appear where Stop had been before. If opening the Module menu, notice that Stop is now an option while Start is muted.The tabs at the bottom of the window show the resulting data in a variety of forms. Click on each and note the result. Transmit (Tx), Alarms, and Alarm log go forth be blank. The following is the Received (Rx) haul ups, which indicates that Broadcast and Multicast frames are macrocosm received, but they may not show any(prenominal) Unicasts. sign 6.3 employ the console connection to the router, ping the monitoring host, and notice that Unicast frames appear. Unfortunately, the errors shown in the troika column give not appear in the lab answer unless a traf fic generator like the Fluke Networks OptiView product has been added. right away ,for the Detail View window click on the Detail View button in the toolbar or double click anywhere on the Monitor View chart. This will open a number window that should look some(prenominal)thing like the following, after maximizing the Utilization / erroneous beliefs Strip map (RX) window.In a detail view on that point are a couple of(prenominal) options we provoke distinguish MAC StatisticsFrame size distributionProtocol Distribution master of ceremonies TableNetwork Layer innkeeper tableApplication forge host table horde matrixNetwork story matrixExpert viewMAC STATISTICSMac Statistics tells us almost the module type and speed utilise on the system. It provides all- burning(prenominal)(prenominal) schooling like Network utilization, total bytes of data received. It also provides the different types of frames travelling across the network. put down 2.2 Mac StatisticsAs shown in Error Reference source not represent, the total issuances of 1,555 frames were received. Further to a greater extent there were 152 post frames, 322 multicast frames and 1,081 unicast frames sent over the network. There were no errors found and a total of 122,453 bytes of data was received with an effective 0.003% network utilisation. place SIZE DISTRIBUTIONFrames on a network are sort out according to size. Frame size distribution tells us the frames across the network and their size. portend 2.3 FRAME SIZE DISTRIBUTIONThe picture in a higher place shows the frame size distribution over the test network. On the basis of size frames have been classified in to 8 different categories. The maximum total frame size is 65-127.PROTOCOL DISTRIBUTIONProtocol distribution tells the number of protocols operating over the particular network and also at what constituent a protocol is working in terms of transferring data. flesh 2.4 Protocol DistributionThe figure above shows different types of protocols on the network and the piece of each protocol on the right of the graph and on the left side are different tabs, by clicking on each one of them an individualistic percentage of each protocol chamberpot be monitored. boniface tabulate phalanx table gives us a picture of the traffic generation on the network and the MAC overlay of the devices receiving the traffic. It tells us the maximum traffic host and the minimum traffic host. realize 2.4 master of ceremonies prorogueIn the picture above it shows percentage of traffic based on the number of frames coming in to the host. On the right hand side it shows the MAC mentiones of the different hosts. It also tells us about the broadcast and the s.t.p. traffic.NETWORK social class HOST get acrossThe Network Layer forces Table tells us about the packets, errors and bytes for each station at network layer. It allows decoding the packets based on their network layer address. So it helps the network managers to troublesh oot at the host level. variety 2.5 NETWORK LAYER HOST TABLEThe figure above shows the packets coming in to the hosts at the network layer based on their IP addresses. It also tells us that there are 5 IP hosts and no IPX hosts on the network.1APPLICATION LAYER HOST TABLEApplication layer host table tracks packets, errors and bytes on an application specific basis. It traces packet activity of a particular application. It helps network managers to monitor bandwidth utilization on the network. discover 2.6 APPLICATION LAYER HOST TABLEThe figure above shows the operation of the different applications by the host. It shows the usage of the bandwidth in percentage by each application.HOST matrixHost matrix shows the communication between two or more MAC addresses/ hosts. Hosts could be talking to more than one host at the same prison term which smoke be defined by the graph infra turn 2.7 HOST MATRIXFigure 2.7 shows different hosts communicating to each an opposite(prenominal) and at what percentage they are direct and receiving data on the network, which helps an lead in bandwidth allocation to various hosts on the network.NETWORK LAYER MATRIXNetwork Layer Matrix shows the total data packets between a pair of systems by the network layer protocol. It shows the protocol specific traffic between the hosts.Figure 2.7 NETWORK LAYER MATRIXThe figure above shows the conversations between the different pair of hosts. It shows the communication between two IP addresses and their bandwidth utilization.EXPERT VIEWExpert view shows different pleasings of data capturing on the network on a single screen where the network locomotive engineer locoweed monitor the user activities to make the network more antiphonal and reliable.Figure 2.8 EXPERT VIEW OVERVIEWFigure 2.9 Expert View of entropy Link layerFigure 2.10 EXPERT VIEW OF academic term LAYERFigure 2.11 EXPERT VIEW OF NETWORK LAYERThe figures above show the output of different layers of OSI model. It also sho ws the protocol distribution across the network and utilisation of the different applications for file transfers like HTTP, ARP and others. It also identifies errors and any broadcast or multicast on the network.PROTOCOL OPERATIONSNetwork inspector tool is also used to investigate the operation of different protocols likeICMPTFTPTELNETDHCP snag/OSPF/IGRPICMP (internet Control Message Protocol)ICMP stands for Internet Control Message protocol. It is one of the rattling important internet protocols, it is used by the a network administrators to monitor network connectionsICMP SUCCESSFUL PINGICMP is the tool used to check the connectivity also known as PING (Packet Internetwork Gropper) which sends and receives echo glide by. PING successful content that device is in a chance onable distance, when host receives the echo communicate it reply to it this means the destination is reachable. This process is explained in the figures belowFigure 0.1 ICMP ECHO collectFigure 0 .1 shows i t is an Echo request by the host 192.168.2.2 to the destination 192.168.1.2 all across the network.Figure 0.2 ICMP ECHO reactionThe Echo reply to the request is shown in the figure above. It is clearly visible(a) that the 32 bit data packet was sent to the host 192.168.1.2 and the source 192.168.2.2 sends it as a reply the host 192.168.1.2 as the same 32 bytes which means no data was lost and twain can communicate without loosing any data.ICMP PING TIMEOUTAnother common message while severe to ping a host or address is ping Timeout. Ping times out when destination IP address does not exist, network inspector displays the following result for ping time out.Figure 0.3 orison TIMED OUTFigure 0 .3 shows that when the engineer tries to ping an address which does not exists on the network, ARP protocol broadcasts this request with MAC address FFFFFFFFFFF to get hold the destination address, but when it does not get any response because the address is not there on the network the Pi ng crave, Times out after some time.ICMP NETWORK UNRECHABLENetwork out of reach(predicate) means the network which we are trying to reach is not available for communication. This could happen receivable to numerous reasons, if the interface is down for some reason, if in case of exploitation RIP it is at a distance more than 15 hop from the source or if the destination address does not exist in the routing table of the router. Fluke network inspector helps network manager to produce the reason behind the network failure as explained in the figures belownFigure 0.4 ECHO REQUEST FOR THE IP ADDRESS right(prenominal) THE NETWORK ADDRESSFigure 0.5 DESTINATION UNRECHABLE REPLYFigure 0 .4 explains a network engineer sending an Echo Request to the address 192.168.3.1 which is not within the network and Figure 0 .5 shows if the address is not on the network or routing table of the router it sends a message Host unapproachable.ICMP Ping Time Out is different from ICMP Ping Network Unre achable because when the host sends a data to an address, it then waits for the reply from the destination. If after some time the reply does not come back this means the data is going to the destination address but cannot receive any updates or data from that destination, it displays the message Request Timed out. On the other hand when host sends data to the address which does not has not entry in the routing table of any of the routers, the data will not be sent anywhere and the message comes out as Destination Host UnreachableTFTPTFTP or Trivial File Transfer Protocol is very well and simple to implement as it takes very less memory. It is a connectionless service that uses UDP (User Datagram Protocol). It is faster than FTP. It is used on routers, switches and some hosts that support TFTP for the purpose of transferring the file.Figure 0.6 TFTP FILE COPYINGFigure 0.7 TFTPIn the above figure it is clearly visible that the source port is 56882 and destination port is 69 which is used for (Trivial File transfer). This diagram also proves that TFTP uses UDP to transfer of files along the network. In the mho portion TFTP is captured where it shows the file transferred is sdm-config.TELNETTelnet is a good to entre a device remotely over the network. It can be used for many purposes. Telnet works with TCP/IP. Whenever we access a device remotely, a connection has to have victimization a Three trend Handshake process.ESTABLISHING A TELNET SESSIONSynchronization between hosts is done by an exchange of connection frameing segments that compact SYNs. The Synchronization requires each side to send its own (ISNs Initial age Numbers) and to receive a conformation of it in an Acknowledgement (ACK) from the other host. each host also receives each others ISN and send a conformation as ACK this process is called a Three Way HandshakeTHREE air milkshakeHost A send its ISN (Seq = X) to start the school term, it is received by the Host B who then send its own ISN (Seq = Y) and also sends (ACK = X+1) to Host A, when Host A receives the ACK it do the same as Host B adds 1 to the ISN received and send (ASK = Y+1) back to the Host B which establishes the TELNET session (see Figure 0 .72).Sends SYNSEQ = YACK = X + 1)Host AHost BSends SYN(Seq = X)Receive SYN(Seq = X)Receive SYNSEQ = YACK = X +1)Sends ACK(ACK = Y +1)Receive ACK(ACK = Y +1)Figure 0.72 THREE WAY shiverDiagram taken from CCNA 1 2 Companion dragFigure 0.8 THREE WAY shakeFigure 0 .8 shows the Three Way Handshake. Each host sends an ISN and in reply other host add 1 to it and sends it back as an acknowledgement. Fluke Network Inspector allows network administrator to see this process and monitor any unauthorized attempts.Figure 0.9 FIRST constitute OF THREE WAY HANDSHAKEIn Figure 0 .9 Client sends the request to synchronise its ISN to the telnet master of ceremonies, it then specifies its initial period and adds 1 to it.Figure 0.10 SECOND defend OF THREE WAY HANDSHAKEFigure 0 .1 0 shows that the ACK packet has been sent back to the host and at the same time another packet for its SYN has also been sent to establish a connection.Figure 0.11 THIRD STAGE OF THREE WAY HANDSHAKEFigure 0 .11 shows that the waiter just now received a packet from the host and the connection is now established between them for get ahead more data transfers.DATA CAPTURINGFluke network inspector helps network manager to monitor and capture the data being transferred between the devices at a time the telnet session is active, though it can be a lengthy process to see the whole data but it can be in truth helpful in troubleshooting typical problems. Data is captured in only one garner at a time which can be seen in the following diagram.Figure 0.12 DATA CAPTURINGIn the figure above letter I has been captured which is a part of password while accesing the device remotely. therefore Fluke tool helps network engineer to monitor each and either bit of data travelling across the netwo rk..Figure 0.13 LOGGED ON through TELNETFigure 0 .13 shows the successful remote log on to the router R2. straightway here all the data transferred will be captured by the Fluke tool inspector.TERMINATING A TELNET SESSIONTerminating a TELNET connection is a moldiness for security reasons. It again takes Three Way Handshake process. This process can be monitored in Fluke Inspector as we will see this in the diagrams below (see Figure 0 .14).Figure 0.14 FIRST STAGE TERMINATIONIn Figure 0 .14 the request for the termination of the session has been sent, next figure will show the acknowledgment received by the server.Figure 0.15 SECOND STAGE TERMINATIONIn Figure 0 .15 server receives the request and sends an acknowledgment for the termination of the session.Figure 0.16 THIRD STAGE TERMINATIONFigure 0 .16 shows the third and the last stage of terminating the telnet session.LIMITATIONS OF TELNETTELNET is not very secure process as it is over the internet and the data is not encrypted wh ich can be easily hacked and the information can be lost. Secondly TELNET involves TCP/IP only, and hence is not compatible with other protocols. Unauthorised users can on to log on to the network and can damage the configuration files, which can affect the performance of the network and can result in less reliable network. To prevent this remote access can be restricted to certain ports so that only authorised individual can log on remotely which helps in decrease the chances of and intrusion on the network.DHCP (Dynamic Host Configuration Protocol)DHCP allows hosts on the network to reign an IP address energetically. Network engineer configures a DHCP server for the network defining a pool of IP address to be allocated to a particular range of hosts. Whenever a host requests an IP address, server mechanically assigns the address.When a DHCP client comes online it sends a DHCP Discover broadcast message. After sending a DHCP Discover, client moves into a select state. Client the n takes the offer from the DHCP server, it then receives the first response and sends the DHCP Request packet and asks for how long it can keep that address without renewing it, then server acknowledges the request and sends DHCP ACK packet. At this stage the client gets into the bound stage and starts use the IP address. The flow chart below (see Figure 0 .17) describes the whole process.Clint BootsInitialize earthSelectDHCP ACKDHCP RequestRequestDHCP DiscoverBoundFigure 0.17 diminish CHART FOR DHCPDiagram taken from CCNA 1 2 Companion GuideDHCP snatchProtocol Inspector tool can be used to monitor the whole process step by step.Figure 0.18 DISCOVERFigure 0 .18 shows the client has been discovered by a DHCP server by its broadcast. At this point it does not have any IP Address.DHCP pressDHCP server makes an IP address offer to the client.Figure 0.19 DHCP OFFERIn Figure 0 .19 an offer made by server to accept 192.168.2.3 as an IP address.CLIENT REQUESTA request from the host is sent to the DHCP server for an IP addressFigure 0.20 DHCP REQUESTIn Figure 0 .20 host negotiates for the lease time for the IP address offered by the DHCP server.DHCP ACKNOWLEDGMENTDHCP server then sends an acknowledgment packet.Figure 0.21 ACKNOWLEDGMENTFigure 0 .21 shows the IP Address 192.168.2.3 has been accepted by the client as new IP address.DHCP RELEASEDHCP server issues an IP address to the client which can been seen in the Figure 0 .22Figure 0.22 DHCP RELEASERIP (Routing Information protocol)The Routing Information Protocol (RIP) is a dynamic routing protocol used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP) using the distance-vector routing algorithm. Devices running RIP sends the information of all the connected devices in the network every 30 seconds to keep the network reachable and connected. RIP has two editions.Fluke network inspector tool tells about the connected routers and the hops, with there IP address. All t his information is very useful in troubleshooting.Figure 0.23 RIP ROUTING INFORMATION PROTOCOLFigure 0 .23 explains the routing process. It shows that the port used for routing is UDP 17. Only two routers are connected to each other. It also tells us which version or RIP is running and at what distance both router are as in HOPS COUNT as visible the first one is 1 Hop far from the host and second one is 2 Hops from the host it sends the routing information every 30 seconds. Another thing is that RIP can only support 15 Hops per network.SNMP (Simple Network Management Protocol)This protocol operates at the network layer of the OSI model where it exchanges the management information among the devices installed in the network. It is very clear from its name that this protocol is used to manage network devices such as routers, Switches Hubs, modems, and systems. It is used to monitor different user activities over the network. SNMP helps network engineer to monitor and identify any faul ts on the network and helps to solve these problem for bust connectivity.A network managed by the SNMP consist of the followingManaged devices Devices used on the network such as Routers, Switches Hubs, modems, systems and servers etc.Agents Agent is software which is used to operate the managed devices.Network-management systems They provide the processing and memory infallible for the network management, there can be one or more network-management systems on a managed network stick aroundIF UTILITYThe SNMP operation can be monitored by the network engineer with the use of Protocol inspector and a utility called OPTIVIEW using a freely available browser utility called GETIF. GETIF is a network tool which is based on windows GUI it is very helpful to collaborate the graphical information of SNMP devices. It provides information like Parameters, Interfaces Connected, Routing Tables, Trace Route and Network length..GETIF PARAMETERSAfter loading up the GETIF utility type in the rout er IP address in the host name box of the parameter window the result will be as following.Figure 0.24 GETIF PARAMETERIn Figure 0 .24 it is shown once the router IP Address has been typed in and broach button has been pressed in the Parameter Tab of GETIF utility, it gives us the information like the router name and IP Address, router description, and also shows the SNMP port number which is 161.SNMP GETFluke network inspector tool can be used with GETIF utility to see the data retrieved from SNMP agent. To retrieve this information select MBrowser tab on the GETIF window and then select the SNMP option from the graphical tree, it gives us all the required information shown below.Figure 0.25 SNMP GETSNMP SETWhen a single item is selected in MBrowser of GETIF utility, start the network protocol inspector to monitor the data transfer. When the name of the router is changed by using GETIF utility it will be shown on the Network Inspector Utility as wellSNMP lying in waitFluke Network Inspector tool along with GETIF utility has the ability to diagnose the error on the network, To see the result on the Network Inspector tool if the network engineer can physically take the serial cable out from the router port and disconnect the communication in the network the Network Inspector tool identify this error and displays it on the tools screen for the network engineers urgent attentionFigure 0.26 SNMP TRAPIn Figure 0 .26 the status of the serial connection is show to down this is collectable to the serial cable being unplugged from the port.GRAPHYCAL MONITORING IN GETIFThis is another option in GETIF utility to monitor the network bandwidth outgo and the percentage of the different protocols. It can be seen in the following figures.Figure 0.27 SNMP GRAPHYCAL MONITORINGIn Figure 0 .27 two graphs have been shown, in these graphs only ICMP packet has been monitored to show the operation of the protocol. In top fractional(prenominal) of the fig graph starts from the 0 and then gradually goes up due to the increase in the ICMP PINGs. A sudden drop can also be seen while the graph is increasing this is due to the term Request Timed Out in the ping in the second half you can see the decrease in the graph and this is due to when the pings were scrub one by one.BENEFITS OF FLUKE NETWORK INSPECTOR TOOLFluke Network Inspector allows network engineer to provide reliable, and desired connectivity to the organisation, it saves time and money by effective resource management. It also provide get out knowledge to the network engineer about the devices installed on the network which helps to find the faults and fix them easily.Fluke Network Inspector provides a solution for monitoring and analysing the network which can be very helpful to the organisations to get desirable and reliable connectivity of their network.It also allows the network engineer to protect the network from any unauthorized users and gives a freedom of managing the network remotely.Flu ke Network Inspector Tool helps in performing major functions of the network management which includes break of serve ManagementConfiguration ManagementAccounting ManagementPerformance ManagementSecurity ManagementAll these functions have been explained briefly in this reportFAULT commissionThe process of identifying, diagnosing a problem on the network and resolving it is called fault management. The problem could be of any kind from faulty cables to defective hardware. In other words, it is a very important for the effective operations of a network and to provide the connectivity among the users of a company, An natural network engineer will detect the fault in the network in very less time and fix the problem fast. transmutation management is a very reliable tool for providing the connectivity for the network.Fault management is very useful to the network administrator as they can keep an eye on the network from anywhere in the network and settlement the issues quickly. Apart from automatic updates about the fault on the network, network administrator can be informed by the users. Network administrator can send ping packets to identify the problem. If a network administrator cannot reach a certain device remotely like when administrator pings a device and gets no reply there could be number of reasons, fault management helps in finding solution to such problems, so that the network is available all the time.Whenever there is a fault on the network it will be known to the network operator by using SNMP (Simple Network Management Protocol) it also rate the problem as if the problem is of high risk to the network or to the low risk, but will keep on sending information to the network administrator about the fault in the network till the time it has be pertinacious and will send a notification of error resolved.CONFIGURATION MANAGEMENTConfiguration management is all about handling the configurations of the network devices. It involves maintaining a databas e of the network devices, and providing reports of the data travelling over these devices. Keeping the record of the configure devices on the network is called configuration management.Configuration management can help a network administrator to install different software for the demote communication among the network. The data base of the configuration management includes different entries like, the devices used, the version numbers and the device capabilities.By using configuration management a network administrator can increase the devices on the network, can provide or deny access to the certain number of users or a group on a particular network. Remote sites can be configured by using different techniques, access can be restricted to certain area of the network for specified users, or if required interfaces can be brought down or up by using the configuration.ACCOUNTING MANAGEMENTAccount management helps in managing the utilization of network resources, which further leads to a more productive network. One of the functions of the accounting management is to distinguish between inter and intra -domain accounting data and route them to the respective device, for the session record containing Network Access Identifier, this packet can be routed by examining the NAI to save this packet to be broadcasted over the whole network and utilizing the bandwidth.Accounting management involves the monitoring of the users activities on the network at an individual or at a group level which helps in providing crack communication and also reduces the fault generation which can cause injury of data. It allows network engineer to keep track of the bandwidth utilisation w

Harry Potter Analysis: Themes of Power and Oppression

harry muck about Analysis Themes of Power and OppressionThe creative human activityivity in which bingle lives nowadays is virtuoso that is non distinguish adequate from the ag single in m from separately one(a) aspects. though thither subscribe to been several changes in society, there argon still several affairs that remain the same.Human modus viv eat upi undoubtedly has changed along with the authority that slew forecast. However, memories and records of dismantlets and the kindred ar not unendingly bury. People whitethorn not for choose things easily, and roughlymake it a pass to hang on to memories and even grudges. Historic events may be preserve solely for the purpose of preserving thoughts of the world so that man, in time to come, would buzz off a chance of knowing his roots.Through hi bilgewater, one grievous thing that has come to mans attentionis the existence of inequalities through with(predicate) time. Inequalities gather in eer existed, and these take on al miens been a major source of encroach.Conflict has al behaviors been known man, and has never been a stranger to man at any menses in time. This is not to opine that wars al modalitys raged across the earth, moreover if certainly does mean that atrocities and the cargon always existed. The hostilities and crime that one witnesses today is hardly different from the crimes that were committed in the past. The only thing that makes it a great messiness more different to what it was in the past is that there is technology on ones side today. Instead of this cosmos of great serve well to man today, it has resulted in oftentimes more death and destruction, entirely scratch from inequalities in resources. Theorists like Karl Marx and Stephen Greenblatt be individuals that would be able to shed greater light on the disharmony in society. Their sensible horizons on tender life sentence similarly help one to infrastand the way that things were and be today, and how exchangeable appointments may be through time .Domi solid ground could take to the highest degree any form, and this would depend on what kind of resources one class has. If one has economic resources, it is possible to dominate other(a)s extensively. In redness terms, domination is ordinarily because the resources a class has in return. If a class has economic resources, it has greater strength and prat dominate others. If the resources assume limited cherish, they give the gatenot dominate alone(predicate) that a great smoke. In addition to the possession of resources that causes dispute, there is to a fault nearlything known as a intellect of belonging. If a person feels that another is not of his placement or does not speak the language that s/he does, conflict might arise. However, Differences of habit and languageare nothing at each(prenominal) if our aims are identical and our hearts are open.Aside from the differences in resources and t he conflict that takesplace because of a difference in resources, Marxism has other values. It is a possible action that explains amicable change, which is wherefore it rear beapplied to various situations of conflict. The suit for this is thatthere always has to be a reason for conflict, and this refers todifferences in resources of strengths .Marxism being a macro-sociological theory is one that lav in any case apply tosmaller setups. This meat that it can apply to communities as welleven though a biotic society of interests is only a part of a larger society. However,thismakes sense because of the detail that it to a fault applies to a whole conjure up that it egotism a smaller part of a global environment .Being a theory that can be apply to bump into significance in communities, itis one that can be applied to the witching(prenominal)ians community in enkindle mess aroundNovels by J.K Rowling. The community in nettle ceramicist Novels is perfect for implementi ng bolshy theory. This is because of the fact that there is existence of segregation, class/group conflict, oppression, slavery,Prejudice, etc. live in the community. It is all these factors thatexpose the importance of Marxist theory and the way that communities gothrough changes du butt on conflict. The stages in a conflict are alikeunderstandably visible as one reads through the chafe Potter books. Thesestages are similar to Marxist explanations, and are also in sync withsocial changes that proceed because of conflicts .In addition to the class conflict that would occur because of ensure over resources or johnal forcefulnesss, there is also the field of study of descent.Descent or heritage is an issue in incrust Potter stories as well becausethose who belong to an original group are believed to be just heirs and incur authorized picture. This is something that is explained byother theories as well, plainly Marxism primarily considers these to bebecause of beliefs an d doctrines that are insert in pots minds.They are also most possible to occur because of the control that batchbelieve they are authorize to when they are of original or virgin(a) descent. This is precisely the case wit the pure stock certificates that think they arerightful owners of illusion. The purebloods take for granted that they micturate therights to conjuring trick and only they should be allowed to study at the schoolof magic. They treasured the half bloods and the mudbloods ousted.However, since they could not do it through fair means they resorted overlyther means. At various stages of the whole story of evoke Pottersexperience this is demonstrated. Not only is kindle Potter subject totheir unfair means moreover so are many innocent hatful. The pure bloods arewilling to go to any duration to dominate and gain control over al readinesshers. They want to gain control in the wider society by first takingover the magic school and proving themselves as right ful owners ofmagic. They are inbred and come from generations of practice. AlbusDumbledore asserts You place too ofttimes importance on the so-calledpurity of blood You analyse to recognize that it matters not whatsomeone is born, but what they grow to be Undoubtedly, they may possess exceptional traits and ability to performspells, but it may also be said that they take a crap mastered all thisthrough immense practice. As opposed to this, plague Potter is anindividual who is of half headliner descent. He still has more abilitiesthan most other wizards of pure descent. He has the ability to applymagical spells at will even though he was warned in the initial stagesthat it could nurture dangerous for him. He was told that afterperforming magic for the first time, it is inhering to want a bitmore. He was told that he cant start fleeting cars to try and gethimself noticed (Chapter 6, p. 91). The best part about blight Potters function is that he is a wizard ora unfledged wi zard with immense skill. He does not use his magicalstrengths unless he sincerely fatalitys to. He had been warned against victimizationmagical spells, but also preferred to use sensible to engage his waythrough situations. It may be asserted that Harry Potter was a clevermagician who used his magical capabilities to reinforce his sudors. Describing magical situations in a community of wizards and using amacro-sociological theory to back up it up, may seem odd. However, itappears that the discrimination betwixt different groups or classes isbest described through this theory. The elan in which individuals inthis story behave is interesting and fits well into such a theory.Considering Roald Dahls The Witches, it can also be asserted thatMarxism fits into it too. This is because there are also notions ofgroups or class in this story. There is also existence of oppressors.These oppressors are the ones that cause the disharmony they try toget unloose of children, and people i n prevalent cannot detect them spiritednessalong with them in society. They sense of smell like normal ladies and have everygeneral character that women have, and no one would even imagine thatthere are some of the wickedest women life story right beside them.Since class distinction is an important part of Marxist theory, it isworth assert that Harry Potter has no shortage of Marxist notions. This can be complyd in the fact that class distinction is quite open. The mien in which classification takes place in Harry Potter and the Philo sopshers Stone is exceptional. This is typically visible whenthey magicians are categorized and placed in traditional houses. Each magician is placed in a traditional house fit to his or her capability or status. An example of this is the dash in which Harryis placed in the house of Gryffindor. He is a molar and is placed herewhile other magicians such as Malfoy, are placed in Slytherin. though it may be argued that this is highly unlike a Mar xist practice becauseof the inequality, it can be said that it is actually very much in syncwith Marxist theory. This is because of the fact that Marxism holdsthat each one has ill-tempered capabilities that could be put to use. Marxism emphasizes on the notion from each one according to hiscapability, and to each one according to his need (Marx Engels,1848). In the above example, it is obvious that the furiousness is more onthe capability of the individual, which is why each of the characterized are placed in separate houses.In this kind of segregation, there are particular advantages as well asdisadvantages. This refers to the fact that being segregated couldcause unity in some ways and hike disintegration in others. InHarry Potter and the Philosophers Stone, both these notions arevisible clearly. Unity is demonstrated through the experience ofmorals in each character. The characters recognize certain qualities ineach other and they are skeletal underweightr Harry, Ron and Hermione stand outas examples. In contrast to this, it can also be observed that thereare instances where some characters are repulsed.It is through the unity that is created by the tether friends at themagic school that a p masses has been detected to steal the PhilosophersStone. Harry, Ron and Hermione work unneurotic to discover a culprit atthe top level. It turns out that one of the teachers is a suspect. Thework that the leash friends put in to discover the suspect is anexample of the way that the people in a produce can work towards foilinga unsafe attempt. This part of the story also reflects the natureof the Marxist state that is more than potential to pull down a leader orany official that puts them at risk. The people are the ones with springand they may use it collectively to achieve a goal. Though there may beother individuals against them, they may still go ahead with what theybelieve in.The Philosophers Stone is like the importance of a state, and if anyone is tr ying to steal something that belongs to the state they need tobe stopped. The situation can be deadly, which is why it may also beadventurous. After all, to the well-organized mind, death is but whenceext great adventure .This is precisely what Harry and his friends set out to do after theyhave strong suspicions on particular people. However, their earliersuspicions were not accurate as Harry discovers that he has to facesomeone other than Snape. atomic number 53 can have As much money and life as youcould want The two things most human beings would choose above all -the trouble is, humans, even if they are magicians, do have a knackof choosing precisely those things that are worst for them .In ball club to prevent the Philosophers Stone from being stolen, Harryand his friends have to go after the stone themselves. This meant thatthey had to get in through the guards to make sure the Stone would notbe stolen away. At this point in the story, it is specificallymentioned that Harry and his friends had to pull their strengthstogether in order to get where they reached.Harry and his friends manage to do this quite fortunately until Harryhas to go in alone after the Stone. In doing this, he is faced withProfessor Quirrell. Being his knowing self like many politicians thatwant to benefit the most, Professor Quirrell tries to use Harry to getto the stone. He knew that Harry would be able to get through, and soknew it would be the best way. However, the prof remainsunsuccessful in his attempt. Quirrell was killed and Voldemortdefeated. This defeat and death stands for the necessity of conflict tobring peace and riposte to a state. The characters defeated standfor those that interfere with the relatively peaceful system in place.Harry and his friends stand for those that are willing to risk all thatis theirs in order to do what is right. Harry in particulardemonstrates that he is the people of a state because of the fact thathe was ready to lay down his life for e veryone. He knew that he was theonly one capable of completing the task, and so went into a dangeroussituation all by himself. However, he emerged victorious and thus livedup to being a hero.Though Harry did a splendid amount of heroic work single-handedly, itcannot be forgotten that he could not have done it all by himself.Towards the end of the adventure, this is exposed considerably throughthe points scored in all the efforts. Gryffindor earns one hundred andsixty points through the collective efforts of Harry, Ron and Hermione.However, an extra ten points were earned because of Nevilles effortsto stop the three from going to the Philosophers Stone.It is obvious that trying to stop Harry and his friends from goingthrough the defenses of the guards would be seen as a good act. quite anaturally, Harrys actions as ring leader were not the mostappropriate the school of magic may not have been pleased about this,and so placed a ban on him from using magic for the rest of the summer.H owever, he unbroken this ban a secret so that no one would take advantageof him. Using magic could not be unploughed a secret, but not using it couldbe kept a secret. Looking at the practice of magic in the literaturepublished today, there are several religious groups that are againstthe use of magic and witchcraft in Harry potter stories. This has beenthe case so much so that religious groups have moved to have the serialbanned. However, this is an unlikely thing to happen, as the book isfiction something that is far from reality. However, in comparing thenotions in this series with Marxist literature, it can also be saidthat there are people who scrutinize it (Marxist Literature) as well,terming it all as evil and a social disease that aims at overturningother just forms of governance. The fears are more real in this sense,but pertinent literature can hardly be banned from progeny .Marxist literature is known to focus on many different aspects ofsocietal living it is a politic al theory and often serves as a meansof scrutinizing state operations. One of the main things that ittargets is injustice. It emphasizes on the need to get rid the root ofinjustice in society. In Marxist notions, there are ways of targetingand acquiring rid of injustice. The oral communication mentioned earlier about Marxismcan aptly be applied here as well to each one according to his needs(Marx Engels, 1848). These words comprehensively overruleinjustice, but of course are not sufficient to make sure that injusticedoes not occur. Injustice still occurs in its various forms, anddiscrimination towards individuals belonging to particular origins isone of the most well known of its forms. discrepancy is alsosomething that is a major consideration in Harry Potter and thechamber of secrets. basically the discrimination is generalized at all magicians lower thanpure blood wizards. In Harry Potter and the bedchamber of SecretsHarry is discriminated by Malfoy because Harry is not a pur e bloodwizard. In contrast to this story talk about discrimination andmaking of differences surrounded by wizards, there is a great deal that onecan learn from it. Tolerance is one of the major teachings in thisstory. Individuals of all ages can learn from allowance, no matter whattheir backgrounds are. Marxist theory also holds lush to tolerance asopposed to its notions of conflict. People living in a society may havedifferences, but they still have to live together. Provided that thedifferences are not too magnified, there is no reason why they cannotlive together. In extreme cases, they may need to clash before peace isestablished, but first tolerance is preferred. Conflict is actually thelast option when there is no other way out, conflict is resorted to.The intensity of the conflict can be observed in the following lineswhen Arthur Weasley says Never trust anything that can think foritself if you cant see where it keeps its brain .Tolerance in the CommunityIn Harry Potter a nd the Chamber of Secrets, tolerance in the communityis of great importance. If tolerance is non existent, there would be nocommunity. However, there are some individuals that want to causedisharmony even if their intentions seem logical. In the story, SalazarSlytherin wants to get rid of all those that are different andestablish a community that is pure he wants to get rid of themudbloods, or wizards that do not have any magical ancestors. Here,one can see that is a explicit distinction between the two classes, andthere is also a definite take down tone and term being used againstthose that were not pure magicians . Quite obviously, there was aresponse from those who were being looked down upon. They would defendthemselves if attacked or harmed in any way. This would be legitimatein the sense that all members in a society are entitled to equalrights, and these are natural rights. The targeted class might feel theneed to resist hostilities or even launch attacks. This conflict isn othing unknown to Marxism in fact, class conflict is normal for peaceto be achieved. Particularly, it must be noted that class conflict inHarry Potter and the Chamber of secrets is also similar to Marxistdescription because of the class conflict existing between two classes.Typically, this was the Quidditch game between Gryffindor andSlytherin. The Gryffindor and Slytherin represent the two classes inconflict. agree to Marxism there are no other classes there is just aconflict between to very distinctive classes in society because of thedifferences in resources . Here, one can observe that the classconflict or group conflict in Harry Potter exists between those thathave more magical power and those that do not. Also, those that havemore power are ones that claim to have purer heritage. They believethat they can purify their community by getting rid of those withoutsuch heritage.Purifying the community is something that is out of Marxist views itis something that does not bring up t o the theory. Though there havebeen instances in the past that may be used as examples of purifyingcommunities and races, none can be blamed on Marxism. nuance ofraces and communities is something that has been the result ofDarwinian thought. However, since these notions were integrated withso-called socialist strategies, Marxism is largely blamed for heinousevents in narration .In Harry Potter, the purification that Salazar Slytherin intendsactually goes to show that these ideas are opposed to peace. pacification canonly attained by getting rid of such prejudices. The only way to get ofthese prejudices is to change the way that the dominating class thinksand acts or to have a direct and open conflict to demolish it.Coming back to the manner in which Harry and Hermione are both demeanedbecause of their heritage, Harrys is only half of what the pure bloodswere. Both Hermiones parents were not magicians as well. This meansthat both friends were not pure magicians by blood. However, they werepretty good at some(prenominal) they did there magic was far better and more pieceive than Malfoys who was a pure blood. Here again there can be aMarxist comparison. This is because of the fact that Harrys andHermiones characters demonstrate the fact that all individuals nomatter what their heritage have the ability to perform in any art allindividuals are able to do just as well as any other individuals.Marxism holds that all people in a community have the ability towork and be as productive as any other individual. Though there areindividuals with particularized skills who can be more productive in termsof quality, other individuals should not be demeaned or underestimated. However, this is what Malfoy does he and his lot aredescribed as oversized, strange-looking, mean and unintelligent, butthey are still pure bloods coming from generations of pure blood. Theyhave not much in their favor, and so, it is very important for them tobe pure. They have worked for generation s to be purebloods at thecost of losing everything else. This is perhaps the reason why they areso hung up on remaining in control and excluding all those that aredifferent to them. Perhaps they could not stand anyone having magicalpowers and not being pure bloods. However, the problem for them wasthat Harry and Hermione were really good at their magic even thoughthey were not pure bloods .Observing the manner in which the pure blood wizards treated themudbloods, one can say that there already are already two classes inconflict. However, the mudbloods are those that are targeted, andwithin a blanket(a) category of those that dominate them are the pure bloodwizards along with others. These others include people such as theDursleys, who virtually fear magic. They are the ones that try to avoidmagic and had kept Harry away from these practices that were rightfullyhis own. The Dursleys serve as a group of people in the category ofthose that oppress the mudbloods even though they are no t exactly onthe same side of the pure blood wizards. However, the fact is that,anyone or group that opposes or oppresses the mudbloods areautomatically considered to be in one broad category. This is similarto the manner in which all those who oppose or oppress the proletarianare considered to be one group or class.As opposed to the class conflict that is clearly visible in HarryPotter and the Chamber of Secrets, Marxist theory has it that for acommunity to survive there is need for tolerance to be practiced. Iftolerance is not a strength in a community, at any point in future, acommunity is liable to fall apart or become a victim of disharmony. A community should be strong enough in its bonds in order to preventdisharmony. It should tolerance and other qualities at its center sothat its community members can rely on it. Speaking of a community as awhole, in Harry Potter could not have been a hero on his own. He neededother individuals to support his role and cause too. Without them , hecould not be successful and would never have been recognized as a hero.Harry also has individual traits as well that are required of a hero.He is one that depends on the instant for taking decisions thatultimately define his success. Harry uses each moment intelligently andapplies common sense knowledge to situations. He does not think withhis magical powers. He instead, uses his magical abilities to reinforcehis decisions. He does not think with magic or with power. This isreflected in Marxist theory as well, as individuals and governingbodies or a state or even a community need to think logically and notwith the power they have in their pass. kind living is given a lotof importance in Harry Potter and the Chamber of Secrets, which is whyHarry maybe used as an important example. He is a community member. Heis one that is oppressed by those that are in a target to oppresshim, but he does not give in. He knows better because he can think anddoes not abuse his magical power. T his is something important and infact is close to utopia in Marxism. Being honest and having the abilityto control ones power and authority is a quality that many do nothave .Just like the legal system in Marxism is taken into considerationso is it done in Harry Potter and the Prisoner of Azkaban. The systemof governance in place is most important to consider. This is becauseof the fact that it is the foundation of actions to be carried out whendealing with millions of people in a country. If there is injustice inthe legal system, it needs to be dealt with accordingly. An example ofinjustice in the legal system is reflected I the way that Lucius andMalfoy deal with those that make mistakes. Their decisions are severeand harsh, and in most cases are unnecessary.Lucius and Malfoy represent the harsh hand of the law. In many casesrecorded in history there have been legal systems that have practicedharsh treatment of their people and junior-grade was done. However, Marxistideals do not agree with this even though rulers may have misusedtenets of Marxism. Injustice of the kind that Lucius and Malfoy carriedout cannot be tolerated.The Social set up is such that it allows all individuals to locatethemselves. They may do sop as individuals or as a group. The Quidditchis believed to be a social indicator that can reveal the wayindividuals are. This is possible because it allows a competitionbetween two sides, Gryffindor and Slytherin. The right of the twosides is measured in terms of the strategies they use. Each of themwants to emerge as the winner and earn recognition through theirpowers. However, the serious conflict is that the Slytherin use unfairmeans to prove themselves even though they are pure bloods. TheGryffindor on the other hand are not necessarily pure in terms ofmagical power heritage they are however, effective, and are evenbelieved to be more powerful than their opponents.The Quidditch also serves as an environment of its own kind becauseof the fac t that it has the ability to observe individuals as thoughthey are in another environment altogether. Through the Quidditch a lotcan be revealed about an individuals real life intentions it can beused to predict the lengths to which that individuals may go in orderto win or prove themselves. On the parts of both competitors,Gryffindor and Slytherin, it can be observed that they have tried hardto prove themselves the best way they know how. In this process, agreat deal has been revealed about the Marxist notions involved in theoverall set up. nearthing that reinforces Marxist notions, curiously with theoppressed magicians, is the fact that they are concerned about thosethat are enslaved. They understand the dilemma of those enslaved andknow that their condition is perhaps worse than their own. Beingoppressed is one thing because at least the oppressed like Harry andHermione have the power to fight back. With the elves, there is hardlya chance of fighting back, as they have nothing to fight with and haveno special magical powers. It is this concern for the enslaved that istypical of individuals among the proletarian. This is an attitude thathas the power to bring people together and oppose oppression by thedominant ones.The slaves in Harry Potter are individuals that are kept for freelabor for the wicked wizarding families. The way that these elves aretreated depends on the mercy the wizards have for them, and since theyhave enslaved them it is obvious what kind of mercy they have shown them.Hermione has learned much from this captivity and knows that this isnot far from the way that other good and bad wizards have experiencedat the hands of Lord Voldemort. Hermione then works throughout the bookto liberate the oppressed individuals. Some of those enslaved were madeso by corporeally restricting them to particular areas or by placingthem under a curse or spell. In view of the way that they wereenslaved, Marxist views would reveal that individuals in society c analso be enslaved in similar ways. The physical way of course ispossible through keeping a person in captivity or even abusingpolitical power to torment individuals. The alternative means ofenslaving a person through a curse could refer to the way that anindividual may be placed under bonds, contracts and the like. Peopleoften take advantage of individuals who fail to fulfill agreementsunder bonds and contracts, and they may subject them to blackmail or have them to serve their demands. Just like the wizards may not havebeen able to do much under the Imperius curse, individuals cannot domuch after being placed under a bond.People with the power to enslave others and control them in this waygradually can take control of a lot of people. Politicians have thepower to do this when they are ion power and create particular decreesthat compel the people in a country to act accordingly. Getting peopleto act according to the demands of a ruler is also captivity. Thesame thing is in effect in Harry Potter and the Goblet of Fire. Thewords mentioned in this book that say exactly what one should knowabout a mans behavior towards others are as follows If you want toknow what a mans like, take a good look at how he treats hisinferiors, not his equals . These are precise words and ones that saya lot about class difference and individual attitude in view of apersons social position. However, the intention that Voldemort had wasto get all the slaves together and then get rid of them so that therewould be almost a nation of pure bloods. This sounds very familiarhistory rings a campana here, and one is compelled to consider the Second worldly concern War in which the Germans had attempted and succeeded at doingthis to some extent. However, this is something is opposed to Marxisttheory because of the fact that Marxism does not hold with purifying acommunity through enslavement and other similar practices.Though it has been blamed for what happened in the Second World War,Marxis m promotes diversity. Again here one of its tenets may beconsidered as it was earlier to each one according to his need, andfrom each one according to his capability . These words automaticallyclear Marxism, promoting the appreciation of diversity in society.Establishing a pure race is no where within the tenets of Marxismbecause it is a theory that primarily focuses on the value of humanlife and effort . This human life and effort cannot be compared orcompensated for economically it cannot be change as a commodity, andshould not be sold as such.Instead, the value of human life and effortis so high that it should be cared for in such a way that the stateappreciates it through its entire existence. This is particularly thereason why this theory does not believe in the accumulation of personalassets it is more focused on state-provided care in order to maintainpower that is distributed among the people. When power rests with thestate, no individual a group can rise up easily and take control ofothers with shortage of resources or power. In Harry Potter and theGoblet of Fire, this is what causes the problem in the magicianscommunity a handful of magicians manage to take control of othersthrough their crafty ways and gain more and more control. There was nopoint in unreassuring yet. what would come, would come and he wouldhave to meet it when it did . It is through brave and selfless effortsthat Harry manages to overturn these efforts. Harry is not justinterested in saving the community nor is he totally against wrongdoings, but he is keen on opposing domination. He becomes a herobecause he has one aim and that is to protect what was important toeveryone primarily. He wanted to protect the Philosophers Stone andalso confront the evil magicians. However, it is these efforts thatbuild up a community connectedness. In his efforts he had to seek helpfrom those he could. Without his friends by his side, Harry might nothave been able to get to the Philosophers Stone.I n the Triwizard tournament as well, Harry is not alone. Hagrid andMoody had helped him in getting him past the dragon. Also, Cedric andDobby had helped him further when they helped him decrypt the goldenegg this enabled Harry to rescue the underwater victims.While trying to guess out what Harry may have done single-handedly,there is apparently little to go on. This even includes Harry gettingthrough the maze he would not have been able to get through had it notbeen for the protective charms created by his wands connection withVoldemorts wand. anesthetize for Voldemort was inevitable. Its a strangething, but when you are dreading something, and would give anything toslow down time, it has a discommode habit of speeding up .Harry was also under the egis of his parents sacrifice. Harryalways thought about his parents he also thought about his stupefy .He also thought about his fathers three oldest friends Moony,Wormtail, Padfoot, and Prongs (Chapter 21, p. 407)His parents sacrifi ce was the thing that kept him alive. Therefore,whenever he is apparently cornered, he has a wa