Thursday, December 26, 2019

Self Evaluation Essay Online For Free - Free Essay Example

Sample details Pages: 9 Words: 2824 Downloads: 9 Date added: 2017/06/26 Category Education Essay Type Essay any type Did you like this example? Self Evaluation Upon Learning This paper describes a process of self-evaluation, reflection upon learning, and planning for future developments. As well as considering the learning points which have been successfully internalized over the course of the semester, it will incorporate reflection on strengths and weaknesses, and begin to outline future communication with putative employers. In addition to presenting some analysis of the formal and academic aspects of the experience, it will discuss the interpersonal aspects of learning, and the development of those capacities which may have professional and vocational applications. Don’t waste time! Our writers will create an original "Self Evaluation Essay Online For Free" essay for you Create order As Stenhouse points out, ‘A curriculum is an attempt to communicate the essential principles and features of an educational proposal in such a form that it is open to critical scrutiny and capable of effective translation into practice. (1), However, negotiating the formal structures and requirements of the curriculum is only one aspect of the learning process. A perceptible process of transformation has begun in education, away from a lecture based didactic approach and towards adaptable, flexible modes of learning and teaching. Accordingly, this record of reflective learning will discuss the use of oral, listening and communication skills, considering self-management in group situations. In conclusion, it will present a flexible plan for the future, outlining the skills which need to be developed and providing some indicative targets and points for action. This piece presents my own reflections, and where appropriate, makes reference to appropriate research and analysi s by published authorities. From a purely personal perspective, undertaking the module involved a reconsideration of my own identity and purpose, and the sorting through of the multiple dimensions and preoccupations of my life. As Hall points out, ‘†¦no one has one identity; and indeed those identities may be in tension (one example would be the ways in which â€Å"mother† and â€Å"worker† are often understood as existing in tension. (2) Consequently, it was important to reconfigure ones self-identity and direction in the light of new knowledge and perspectives. In this respect, it is important to be aware that personality and self-image are often key determinants in setting personal objectives, defining outcomes, and constructing the parameters within which any one of us can grow and interact with their environment. As Elliot puts it, ‘We often think of the self as primarily a private domain, an inner realm of personal thoughts, values, stri vings, emotions and desires. Yet this view, which seems largely self-evident, is in contrast to the way in which sociologists study the framing of personal identity and the self. (3) Therefore, locating oneself within a social continuum, in some ways a necessary social skill and a pre-requisite of social/group orientation, can be both limiting and damaging. It is also important to consider cultural identity and the way national, regional, chronological and even familial micro cultures are profoundly constructive of our own life politics. It has become a truism in life-politics that emotional awareness – or emotional intelligence – is a fundamental determinant of how individuals will approach, engage with, and function with regard to social structures, whether the latter are in the public or private sphere. As Goleman explains, ‘self-awareness – recognizing a feeling as it happens – is the keystone of emotional intelligence†¦.the ability t o monitor feelings from moment to moment is crucial to psychological insight and self-understanding. (4) Some individuals may have this capacity through innate cognitive ability, whilst others must attempt to construct it using deliberately reflective techniques. However, the experience of the module has illustrated to me that it is not an option: interpersonal effectiveness basically demands that individuals exercise this facility, or develop it, as appropriate. As Bolton explains, ‘Reflective practice and reflexivity are not subjects but a pedagogical approach which should pervade the curriculum. (5) This is not say that formally defined subject knowledge, academic skills, or the didactic position, itself, are in any way less relevant or marginal in the curriculum process. It does indicate however that the ability to manage the dynamics of learning, and to demonstrate it through interpersonal growth, has become more prominent. It is fair to argue then, as Fraser and B osanquet have done, that ‘†¦Students are the receptors of the curriculum and their impact upon it varies†¦ (6) I found that, in the interactive learning environment, the effectiveness of the curriculum was determined and defined to a significant degree by us as learners, and in particular by our willingness to contribute new knowledge as perceptions. In this respect, the module was As Fraser and Bosanquet point out, ‘The changing nature of knowledge relevant to the discipline, and research in the discipline area, also influence the structure and learning goals of the programme†¦. (7). I consider that one of the key aspects of the module was its capacity to develop interpersonal working and the ability to work within a group dynamic. The resolution of issues, coordination of effort, and maximisation of individual skills through delegation are all highly transferable skills, which added to the developmental strengths of the formal curriculum. As Dav is observes, ‘Whilst there is demand for the traditional ability to analyse, think critically an work independently†¦, there is also a growing demand for ‘†¦transferable skills†¦.communication, team working,†¦and problem solving. This requires ‘careful curriculum planning, support mechanisms, teaching methodologies and assessment strategies†¦ (8). As discussed above, there are a range of factors which form the individuals attitudes and effectiveness within this dynamic, in terms of what they deem acceptable or effective approaches. Many of these are culturally formed, and may be interpreted within frameworks such Hofstedes Cultural Dimensions Index. Within this, Hofestede projects, each culture has tolerances and behavioural norms which dictate group behaviour, as well as strategic thinking within organisations. He defines these criteria as uncertainty avoidance, power distance, long/short term orientation, gender, i.e. masculinity a nd femininity, and individualism/collectivism. (9). Perhaps more revealing than this scheme of wide cultural sub-groups, however, is the related idea that these are just one component in tripartite scheme which includes universal human traits, ‘learned behaviour and values, and individual personality traits. (10) I consider that the recognition of individual strengths and weaknesses is a key factor, not only in the recognition of individual contributions, but in effective team building. I have definitely learned that assembling a team is a skill in itself. Simply pushing together a random group of individuals is not team-building. Correspondingly, one learning point which I can take from team working on the module, is that different individuals place value upon different aspects of interpersonal dealings, and that this has to recognised, despite personal preferences. For example, some co-learners on the module – and through logical extension, some colleagues in a professional situation – placed a high value on directness within relationships, and preferred immediate action to a deferred approach. Conversely, some personalities felt far more secure with an incremental approach to issues, preferring to delay action until the maximum possible information and analysis was assembled. Some individuals placed a high premium on relationship building through personal interaction, and took this as the inception of a trust network, before moving on to the specifics of a problem or issue. Meanwhile, some individuals were comfortable with the exact reverse of this; they wanted to stay focused on the dimensions of the issue, and preferred to leave the interpersonal dimensions of team building to take their natural course. The main learning point which emerged from this for me, was that such characteristics needed to be recognised, accepted, and factored into team building, as well as its functioning dynamic. No one individual conforms abso lutely to a specific personality or behavioural type: however, their dominant personality traits are likely to be those which emerge at key decision making moments. To get the best out of people and teams, the nature of their contribution needs to be taken into account. As Sonnetag observes, ‘There is relatively consistent empirical evidence for a positive relationship between specific aspects of individual well-being and.performance. (11) The ability to ensure this well-being and secure the related performance – in myself as well as in other learners – and eventually co-workers – is one of the key developmental points that I will take from the module as a whole. . As Murphy and Riggio indicate, ‘†¦complexity provides the resources (cognitive, social, behavioural) for generating numerous possible responses to a given situation. Individuals as well as organizations are healthy and thrive when they are capable of many responses to a given situation, and become brittle and vulnerable to changing conditions when they are uniform and specialized. (12). I prefer to think of this as understanding the personal, interpersonal, and strategic implications of the psychological contract. As Williams indicates regarding this phenomenon, ‘this interpersonal aspect to fairness reminds us that there is a social basis to the exchange relationship between employer and employee and we might expect this to be part of the psychological contract. (13) One of the key objectives that I will take away from the module is the ability to understand – through use of a reflective cycle the development of psychological contracts between individuals, within groups, across stakeholders, and between employees and management. I recognise that this, in itself, is an objective which relies heavily on the capacity to use ones own emotional intelligence, and that this in itself is an on-going task. As Goleman has observed, , ‘ †¦unlike the familiar tests for IQ, there is, as yet, no single paper and pencil test that yields an emotional intelligence score, and there may never be one. ‘ (14) In fact it could be argued that those with emotional intelligence as a dominant aspect of their skills set, tend to eschew formal learning situations altogether, relying on their reading of situations and interpersonal skills rather than credentialism to get where they want to be. The important point for me here is to recognize that these skills are increasingly important in the socialized workforce, and central to achievement of common goals. As Guest and Conway have indicated, ‘†¦built on the three pillars of fairness, trust and delivery of the deal between organizations and employees, a positive psychological contract is the best guarantee of good performance outcomes. (15) Here are some key points for my development, around which specific targets may be developed. Have I planned and managed my own workload effectively: have I consistently met deadlines, without suspending working routines, or the absorption of resources of time from other projects or priorities? In team working situations, was I effective in determining the roles allocated to myself and others, using prior knowledge about myself and them? Did I retain effective control over my role, and did my input have a discernible and measurable impact on the project as a whole? How will I assess whether or not I have consistently managed work relationships in an effective way? Assuming I can assemble such an assessment, would my co-learners or colleagues evaluations be likely to support this? Is my role – or the role of others – clear to everyone concerned? In my estimation, and with regard to the insights I have obtained about interpersonal effectiveness from the module, achievement of these objectives would go a considerable way towards making me an effective learner. They are also principles which could be deemed constructive of a learning organization as a whole, something which, in my view, we should all regard as the worthwhile outcome of our individual contributions. As Hyam and Mason point out, ‘The learning organization, argue its advocates, is one in which managers perceive their position in the organization, and their relationship with subordinates, in a radically new way, utilizing new metaphors and ways of understanding. (16). One way to measure individual progress towards this outcome would be through the use of a reflective scheme such as Gibbs Reflective Cycle.: Within this, the learner or practitioner can use description to visualize developments or events, subsequently evaluating their own emotional respo nse in the ‘feelings stage of the process. From there you progress on to the evaluation and analysis stages, seeking out any wider implications or perceptible patterns from the situation, before proceeding onto the conclusion and action plan. I consider this skill-set to be of huge importance, because wherever you go in the contemporary employment scene, you will encounter an appraisal and system, and some form of target setting regime. Being aware of ones own real situation in relation to the requirements of a professional situation, is therefore just as important as finding out about the perceptions of others. In my opinion, this is the difference between merely transactional or genuinely transformational management. As Fincham and Rhodes express it, the transactional model is ‘†¦simply a mutual exchange for economic or political reasons between leader or follower. In transformational leadership a deeper, more powerful process is present. Here one or more p ersons engage with others in such a way that leaders and followers raise each other up to higher levels of motivation and morality. (17). It can be argued therefore that worthwhile transactional management begins in the personal sphere. Footnotes 1.) Stenhouse, L (1975, .An Introduction to Curriculum Research and Development .London: Heinemann, p.4. 2 ) Hall, S., ‘Who Needs Identity? in Hall, S., and du Gay, P., (1996), (eds), Questions of Cultural Identity, Sage, London. p.5. 3.) Elliot, A., (2001), Concepts of the Self, Polity Press, Cambridge p.24. 4.) Goleman, (1996), Emotional Intelligence: Why It Can Matter More Than IQ, Bloomsbury, London. p.43. 5.) Bolton, G., (2005), Reflective Practice: Writing and Professional Development, 2nd Edition, Sage, London, p.3. 6.) Fraser, S., and Bosanquet, A., (2006), ‘The curriculum? That is just a unit outline, isnt it?, Studies in Higher Education, 31, pp.269-284, p.274 7.) ibid. 8.) Davis, M., (2003), ‘Barriers to reflective practice: the changing nature of higher education in Active learning in higher education 4 (3) pp. 243-255, p.247. 9.) Hofstede, G., (2003), Cultures and Organizations: Intercultural Cooperation and its Importance fo r Survival, Profile Business, London. p.9 10.) ibid., p.6. 11.) Sonnetag, S., (ed), (2002) Psychological Management of Individual Performance, John Wiley and Sons, Chichester, p.4110. 12.) Murphy, S.E., Riggio, R.E., (2003), The Future of Leadership Development, Lawrence Erlbaum Associates, Mahwah NJ, p.13. 13.) Williams, R.S., (1998) Performance Management: Perspectives on Employee Performance, International Thomson Business Press, St.Ives, p.183. 14.) Goleman, (1996), Emotional Intelligence: Why It Can Matter More Than IQ, Bloomsbury, London p.44. 15.) Guest, D.E., and Conway, N., (2004), Employee Well-being and the Psychological Contract: A Report for the CIPD, Chartered Institute of Personnel and Development, London, p.vii. 16.) Hyam, J., and Mason, B., (1995), Managing Employee Involvement and Participation, Sage, London, p.145. 17.) Fincham, R., Rhodes, P., (2005), Principles of Organizational Behaviour, Oxford University Press, Oxford p.345. Bibliography Armstrong, A., and Baron, A.,(2005), Managing Performance: Performance Management in Action, CIPD, London. Armstrong, A., (1994), Performance Management, Kogan Page, London. Arthur, M.B., (1996), The Boundaryless Career: A New Employment Principle for a New Organizational Era Oxford University Press. Baker, J., (1988), Causes of Failure in Performance Appraisal and Supervision: A Guide to Analysis and Evaluation for Human Resources Professionals, Quorum Books, New York. Barrow, G., and Newton, T., (2004), Walking the Talk: How Transactional Analysis is Improving Behaviour and Raising Self-Esteem, David Fulton, London. Bolton, G., (2005), Reflective Practice: Writing and Professional Development, 2nd Edition, Sage, London. Davis, M., (2003), ‘Barriers to reflective practice: the changing nature of higher education in Active learning in higher education 4 (3) pp. 243-255 Fincham, R., Rhodes, P., (2005), Principles of Organizational Behaviour, Oxford Un iversity Press, Oxford. Forster, M., (2005) Maximum Performance: A Practical Guide to Leading and Managing People at Work, Edward Elgar, Cheltenham. Fraser, S., and Bosanquet, A., (2006), ‘The curriculum? That is just a unit outline, isnt it?, Studies in Higher Education, 31, pp.269-284. Goleman, D., (1996), Emotional Intelligence: Why It Can Matter More Than IQ, Bloomsbury, London. Guest, D.E., and Conway, N., (2004), Employee Well-being and the Psychological Contract: A Report for the CIPD, Chartered Institute of Personnel and Development, London. Hall, S., ‘Who Needs Identity? in Hall, S., and du Gay, P., (1996), (eds), Questions of Cultural Identity, Sage, London. Hiser, S., ‘e-Recruitment: Tools help staff see the effects of effort. Financial Times , Published: November 7 2007. INTERNET, available at https://www.ft.com/cms/s/0/c8757344-8c95-11dc-b887-0000779fd2ac.html, [viewed 12.4.08] n.p. Gerte Hofstede Cultural Dimensions Website, INTERNET, available at https://www.geert-hofstede.com/hofstede_dimensions.php?culture1=95culture2=18#compare [viewed 20.8.08] n.p. Hofstede, G., (2003), Cultures and Organizations: Intercultural Cooperation and its Importance for Survival, Profile Business, London. Holland, J.L., (1997), Making Vocational Choices: A Theory of Vocational Personalities and Work Environments, London. Hyam, J., and Mason, B., (1995), Managing Employee Involvement and Participation, Sage, London. Maslow, A.H., (1970) Motivation and Personality, 3rd Edition, Harper Collins, New York. Murphy, S.E., Riggio, R.E., (2003), The Future of Leadership Development, Lawrence Erlbaum Associates, Mahwah NJ. Sonnetag, S., (ed), (2002) Psychological Management of Individual Performance, John Wiley and Sons, Chi chester. Stenhouse, L (1975, .An Introduction to Curriculum Research and Development .London: Heinemann. Walters, M., (1995), The Performance Management Handbook, Institute of Personnel and Development, London. Warmington, A., Lupton, C., and Gribbin, C., (1977), Organisational Behaviour and Performance: an Open Systems Approach to Change, MacMillan, London. Williams, R.S., (1998) Performance Management: Perspectives on Employee Performance, International Thomson Business Press, St.Ives.

Wednesday, December 18, 2019

Steroid Use in Major League Baseball Essay example

Steroid Use in Major League Baseball Steroids are unhealthy for baseball players and they are giving the game of baseball a bad reputation. Since steroids have become such a hot topic in Major League Baseball (MLB) fans have had nothing but bad things to say about the sport and its players. When sports illustrated asked some of its readers to give reaction to the steroid controversy in the MLB here is what baseball fan Howard Langsner from New York had to say Horrible, just horrible. We take Olympic medals away from athletes on steroids, but were supposed to look the other way in MLB because a guy can make the ball go further? Drug testing is commonplace everywhere, and used in other sports, as the article mentioned. Baseball should†¦show more content†¦The effects of anabolic steroids are used to develop muscle. Steroids are most often used by athletes seeking an edge over the competition. Others may use it for cosmetic reasons: to gain the perfect look. Developed in the 1930s, anabolic steroids are used to treat rare diseases in males whose bodies do not produce enough testosterone, as well as for conditions such as rare types of kidney disease or inoperable breast cancer (Levine 1998). Because of their serious side effects, anabolic steroids are prescribed by doctors at the minimum dosage required to help their patients. Controlled by the Federal Food and Drug Administration, these drugs are legally available only by a doctors prescription. However, a black market network of dealer?s accounts for an estimated 80% of the anabolic steroids used (Levine 1998). The black market is supplied by illegally diverted pharmaceutical products, secret laboratories producing counterfeits of those products, or steroids smuggled in from other countries. These black market steroids are often sold in gyms, locker rooms, or through magazines (Levine 1998). The oral anabolic steroids continue to be the most popular with athletes because of their greater anabolic or muscle building effects (Haley 2003). Primarily water-based, oral anabolic steroids pose an even greaterShow MoreRelatedThe Illegal Steroid Use in The Major League Baseball1355 Words   |  6 Pagestake a look and study the illegal steroid use in Major League Baseball, and possible ways it can be exempt from the game forever. Use of performance enhancing drugs is cheating and causes inequalities, in which new repercussions should be implemented. These new rules should include a zero tolerance level, records stripped and not being rewarded of their accomplishments; which is to include banishment from an admittance into the Hall of Fame. Furthermore, it causes major health concerns and could endRead MoreEssay on The Use of Steroids in Major League Baseball3073 Words   |  13 PagesThe Use of Steroids in Major League Baseball He walked into his hotel bathroom and cautiously closed the door. Clanging his 60 lb. dumbbell against the floor, he set his travel bag full of needles on the counter. While filling his syringe with THG, he began to think about the consequences of his actions; it is a serious problem, but he doesnt have the willpower to give up the success rewarded from it. As the needle slowly penetrated through the skin and half way through his muscle, he unloadedRead More Steroid Use in Major League Baseball Essay1272 Words   |  6 PagesSteroid Use in Major League Baseball Why Major League Baseball players would use steroids is the biggest question that every person in the world wants to know. I think MLB players use steroids so they can bulk up and get stronger, which will allow them to last through the long, seven-month season. I think that because they play 162 games a year during these seven months that this causes a great deal of wear and tear on their bodies. Especially if a player gets hurt, they might try to takeRead MoreSpeech On Steroids And Major League Baseball1638 Words   |  7 Pagesin Major League history. However, this record is controversial, due to steroid use. B. Thesis: Today I am going to persuade you all about the use of steroids in Major League Baseball, persuading you why steroids should not be allowed in Major League Baseball. I have a call to action for all of you to help others if they are considering using steroids, and next time you watch a MLB game to realize the impact of steroids. C. Credibility: Gave my informative speech on Steroids in Major League BaseballRead MoreSteroids Abuse in Baseball1746 Words   |  7 PagesSteroid Abuse Hurts Baseball The abuse of steroids among players in Major League Baseball is corrupting the image of Americas Pastime as well as endangering the health of those who use the illegal substances. The lack of testing and punishment for the use of illegal substances like steroids in the Major Leagues portrays a negative image to aspiring young athletes. They see their role models using steroids and becoming better athletes rather than seeing suspensions for the illegal behavior orRead More Steroid Abuse Hurts Baseball Essay1701 Words   |  7 PagesSteroid Abuse Hurts Baseball   Ã‚  Ã‚  Ã‚  Ã‚  The abuse of steroids among players in Major League Baseball is corrupting the image of America?s Pastime as well as endangering the health of those who use the illegal substances. The lack of testing and punishment for the use of illegal substances like steroids in the Major Leagues portrays a negative image to aspiring young athletes. They see their role models using steroids and becoming better athletes rather than seeing suspensions for the illegal behaviorRead MoreSteroids : Steroids And Steroids1162 Words   |  5 Pagessomething about Baseball that is just astonishing. Most people in the world have grown up baseball in their life, and families share the love for the sport throughout generations. However, there are also people that overlook baseball because of one thing: steroids. The Steroid Era has caused a lot of problems with baseball; it has hurt it so much to this current day. Since the steroid era started, there was a huge boost from the offensive si de. Everyone who had a love for baseball enjoyed the offensiveRead MoreThe Effect of Steriods in Major League Baseball Essay1343 Words   |  6 PagesBaseball is known as America’s pastime and is one of the most popular, respected sports on earth. Since the beginning of the sport, it seemingly advances with technology every year making faster and stronger players. The use of steroids became rampant and spread among players and has carried them away from the true history of the game they play. Controversy still today runs around the sport today about fines, punishments and record breaking. The past two decades of Major League Baseball have beenRead MoreEssay about Media Sports: How did Baseball get Affected by Steroids?1246 Words   |  5 Pagesways. This can be seen in America’s national pastime baseball. Baseball is a sport that became the national sport in the United States in the late 19th century. From the beginning of the sport they tried to keep the highes t standards to each player and ball club. There were times of scandal, but of all the things that happen to baseball substance abuse has been portrayed as one of the worst thing a player could do. To defame the baseball was to ruin everything the sport stood for. This researchRead More A Baseball Proposal Essay1574 Words   |  7 PagesA Baseball Proposal Ever since the creation of Americas favorite pastime, baseball, cheating has been an integral part of the game. Each era of baseball has offered new and improved techniques for cheating the game of baseball. Cheating has become a common occurrence in baseball, from the 1919 Chicago Black

Monday, December 9, 2019

Front Stage Activities Include Sales - Marketing & Product Delivery

Question: Discuss about theFront Stage and Backstage Function. Answer: Introduction The front stage function refers to the activities that are client facing. Front stage activities include sales, marketing, and product delivery. It is the public world in which a company operates. The service encounter takes place at this juncture. The service given to the customers in the theme park comprises the front stage function. In a theme park like the Tokyo Disney Resort, front stage service includes greeting customers, entertaining customers, providing them goods and services among others. There is a personal touch between the service providers and the consumers in the front stage (Bruce 2013). The customers can view the setting of the front stage area such as the furnishings and dcor. Self-service and waiting for lines is front stage function. The experience of a dining room is also a front stage function. Reception and other customer related services are a front stage. Other front stage functions are as follows: Tokyo Disney Resort provides first aid in case of medical emergency. Shows and parades for children such as Mickeys Rainbow Luau, Minnie Oh! Minnie, and Lilos Luau and Fun. The program that the customers can watch and enjoy is front stage function. The dining, shopping, and entertainment area is a front stage service. Serving food to the customers in the Tokyo Disney Resort is a front stage function while preparing the food in the kitchen of the resort is a backstage function (Tokyodisneyresort.jp 2015). Backstage function refers to the support and administrative purposes required to deliver the processes of the front stage. Such functions occur behind closed doors. It is the private world of leadership and operations of a company (Richter 2015). The manager or any person calling a customer is an example of a backstage function. In the telephoning process, the service provider and the consumer are not face to face. Both of them are invisible to each other. Some of the backstage functions of Tokyo Disney Resort are: Online ticket booking. Home delivery services as the customer are unable to see the services personally. The management, coordination, and organization needed for a successful theatrical show is a backstage function. Audiences are unable to view the managerial functions which are equally important for a show to be successful. The communication between actors, director, crew members, and production management essential for a smooth running is a pivotal backstage function (Tokyodisneyresort.jp 2015). The front stage and back stage functions of an organization thus differ. There is a line of invisibility between the two. However, they are interdependent. The backstage acts as a refuge for a person working in the front stage. Organizations must maintain the boundary that exists between the two. Sometimes, organizations tend to move the backstage services to the front stage (Thornborrow and Haarman 2012). For instance, some restaurants provide open kitchens so that customers can view the backstage services. It is a marketing strategy to make consumers believe the authenticity and keep transparency between the service provider and the consumer. Some Other Front Stage and Backstage Functions: References Bruce, J., 2013. Understanding Back Stage and Front Stage Work in Restorative Justice Conferences: The Benefits of Using Ethnographic Techniques.Current Issues Crim. Just.,25, p.517. Richter, P., 2015. From Backstage To Front.Seeing Religion: Toward a Visual Sociology of Religion,146, p.103. Thornborrow, J. and Haarman, L., 2012. Backstage activities as frontstage news.European Journal of Communication, p.0267323112459529. Tokyodisneyresort.jp. (2015).Tokyo Disney Resort Official WebSite. [online] Available at: https://www.tokyodisneyresort.jp/en/ [Accessed 26 Sep. 2016].

Monday, December 2, 2019

Monuments in Boston

Introduction The Robert Gould Shaw and the 54th Massachusetts Volunteer infantry Memorial Monuments are relief sculptures made of bronze; they are raised above the ground. In the Robert Gould Shaw monument, Saint-Gaudens used different men as models for the soldiers with each soldier standing out as a distinct person.Advertising We will write a custom research paper sample on Monuments in Boston specifically for you for only $16.05 $11/page Learn More The monument was meant to honor the bravery of Colonel Shaw and the 54th regiment. It is considered to be among the greatest public monuments (Hargrove 5). The emancipation memorial, on the other hand, refers to the emancipation Group. The monument was sculpted by Thomas Ball. It consists of a sculptor of Lincoln standing before a rising slave whose wrist chain has been broken. It was erected in 1876 (Percoco 4). This paper discusses the two monuments and finally points out which one shows more respect to t he African Americans. The Robert Gould Shaw and the 54th Massachusetts Volunteer infantry Memorial historical perspective Robert Gould Shaw was a Boston native and Union army officer. He was the privileged son of the abolitionist who devoted his life to fight for the Union. Shaw commanded the fifty fourth Massachusetts Volunteer Infantry. This was the first regiment of African American to be recruited in the North for service in the Union army. Fredrick Douglass had urged many volunteers to enlist arguing that they (former slaves and decent Africans) would have full privileges of citizenship thereafter if they fought alongside Americans. Douglass was an escapee slave who fought for long to end the slavery. He was a famous public speaker. He encouraged African Americans to join Shaw’s 54th Massachusetts Volunteer Infantry Regiment. However, then they were mere slaves and were not organized in any formal military group. However, the arming of black soldiers still remained to be controversial even after the civil war. Shaw led the 54th Massachusetts Volunteer Infantry Regiment. It was the first all black regiment. Shaw wrote several letters to his relatives which contained information expounding on the regiment of the time.Advertising Looking for research paper on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More Shaw died in the second battle of Fort Wagner on July 18, 1863. Shaw and his 54th Massachusetts Volunteer Infantry Regiment soldiers today are memorized through a monument on the Boston Common. 281 of the soldiers and officers from the Unit got lost, were killed or were never accounted for at the fort Wagner with countless becoming injured (Head start 61). Description of the Robert Gould Shaw and the 54th Massachusetts Volunteer infantry Memorial The art is a relief sculpture made of bronze measuring 11 feet by 14 feet. The Robert Gould Shaw and the 54th Regiment memorial is a monumental relie f; its sculpturing begun 20 years after the end of the civil war. The task remained uncompleted for another 14 years. The sculptor (Augustus Saint Gaudens) regarded the task as a labor of Love. The memorial is said to be commissioned by group of Bostonians as an Honor to Colonel Robert Gould Shaw. Augustus Saint Gaudens originally had envisioned an equestrian statue of the traditional hero on a horse back. This became objected by the Family suggesting the format of pretentious. The design consisted of an officer riding a horse beside a company of foot soldiers marching towards their destiny. The monument is identified as one as the first American soldier monument dedicated to a group of citizens united for their country rather than a single hero (Anon 44). Saint-Gaudens symbolized the paradoxical period where defeat gave rise to victory. The relief consists of an angle in the sky carrying the poppies which is a traditional emblem of death and remembrance with an olive branch for vic tory and peace. In the portrait, Shaw seems to be idealized by his rigid posture and resolute gaze. This was according to the contemporary accounts of his bravery demeanor when he went to the fight like a sacrificial lamb. In the monument, Shaw is wearing a long jacket and boots. He is holding a sword in one hand and his horse reins on the other. Remarkably, the stoic procession of soldiers has not been portrayed as cogs in the machinery of war but rather as individuals participating in a moral crusade. The ragged uniforms of the recruits have been disheveled differentially. The aim as put by artists was not to undermine the soldier’s gallantry but rather to honor their lengthy and dreary trudge to Charleston Harbor. The monument consists of a drum on the far right and flags on the left behind the rifles.Advertising We will write a custom research paper sample on Monuments in Boston specifically for you for only $16.05 $11/page Learn More The foo t soldiers are wearing caps which are more wrinkled, long sleeve-shirts, shoes and pants. They are carrying canteens. On their shoulder are bed rolls and packs and rifles (Anon 44). The artist created rhythm in the sculptor repeated the slant of leg and body lines and shapes at regular intervals across the sculpture. The riffles too create a steady rhythm in the top half of the sculpture. The only thing interrupting the steady match is the Shaw’s upright form and his horse neck. The sense of depth in the sculpture is indicated by soldiers who stand out farther from the background in a greater relief than soldiers at the back. The overlapping of the closer form brings out sense of depth with Shaw figure being the closet to the viewers. From the sculptor, it is evident that Shaw (the man on the horse) is in command. This is shown by the fact that he is above the other soldiers, carrying a sword and has fancy cuffs of an officer (Ballad of America 1). The sculpture is not only c ommissioned to commemorate Shaw but also the foot soldiers of the 54th Massachusetts Volunteer Infantry. The monument is made of bronze. The reason behind this could be the durability of the material and the ability to be worked on in minute detail such as thin forms like riffles and the like. More so, bronze reflects light, and it is dark and solemn. The sculptor also has a winged figure in the sky holding poppies and olive branch. Artists analyze the situation as the winged creature to symbolize an angel. The poppies she is holding could be symbolizing death and remembrance whilst the olive branch depicting peace and victory (Anon 45). Lincoln Emancipation Group, Heroic bronze of 1857 The monument became dedicated on April 14 in 1876. This day was declared by the Congress as a holiday. The monument is a twelve high foot statue which has been mounted on a ten-foot pedestal. It shows a benign half smiling Lincoln. He is holding the emancipation proclamation with his right hand.Adver tising Looking for research paper on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More His left hand is extended graciously towards the slave who is rising on his one knee. The slave’s wrist shackles are broken and his face turned upward ready to race for freedom and to accept the gift of emancipation. The statue was received warmly by most of African American. However, some disliked the kneeling posture of the freed slave and wished rather for a manly attitude (Peterson 59). Description of Lincoln Emancipation Group, Heroic bronze of 1857 The statue was erected mainly as an attempt to bring emancipation proclamation to life through the sculpture. This provided another resonance for the document and the act itself. In the statue, Lincoln is depicted as a great emancipator. It is like he is blessing the slave who is holding a broken shackle on his right hand. This monument has been depicted by history as the time of Lincoln’s visit in 1865 to Richmond when he moved through the chattered streets and the African American slaves got on their knees as Lincoln passed in a posture to show homage and supplication. He did not like that and would ask any slave who knelt down to rise up. History holds that the slave figure is a model of a last African American to return to the south under the fugitive slave act, Archer Alexander. The symbolic devices used by the artists including the broken whip on the rear memorial and broken shackles depicting the broken chain and death of slavery (Percoco 4). Conclusion The Robert Gould Shaw and the 54th Massachusetts Volunteer Infantry memorial relief sculptures are made of bronze. In the Robert Gould Shaw sculptor, Saint-Gaudens used different men as models for the soldiers with each soldier standing out as a distinct person. The monument was meant to honor the bravery of the Colonel Shaw and the 54th regiment in general. The monument took 14years to be complemented. The Emancipation group shows the freeing of a slave and Lincoln’s great role in emancipation. Both sculptures depict the great achie vements and the transformation processes. However, as the essay depicts The Robert Gould Shaw and the 54th Massachusetts Volunteer Infantry memorial is the one which shows more respect to the African American. I feel this is because it shows the African Americans fighting for their livelihoods and therefore freedom. Works Cited Anon. â€Å"Robert Shaw memorial, 1884-1897.† Kay Smidt, English Department, Menno Public School, 2002. Web. Ballad of America. â€Å"Marching Song of the first of Arkansas: Robert Gould Shaw and the 54th Massachusetts Volunteer Infantry. Chapter 9- Songs of the Civil war.† A ballad of America, 2003. Web. Hargrove, Julia. Civil War’s 54th Massachusetts Regiment: The Shaw memorial. Boston, MA: Lorenz Educational Press, n.d. Print. Head Start. â€Å"Robert Shaw Memorial, 1884-1897.† Administration for Children and families, 2006. Web. Percoco, James. â€Å"Sculpture and public history: My summer with Lincoln.† James Percoco, 2 003. Web. Peterson, Merill. Lincoln in American Memory. Oxford, UK: Oxford University press, 1995. Print. This research paper on Monuments in Boston was written and submitted by user Graysen Floyd to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Essay on The Navajo Indians

Essay on The Navajo Indians Essay on The Navajo Indians Navajo Indians 1 The Navajo Indians ANT101: Introduction to Cultural Anthropology Instructor: Professor Heywood July 10, 2013 Navajo Indians 2 The Navajo Indians are considered to be the largest tribe of all Native American Indians within the United States. Among the Navajo culture their primary mode of subsistence are pastoralists. In this paper I will discuss the Navajo’s beliefs and values, sickness and healing as well as their social organization. â€Å"Pastoralists are those who regularly move in search of naturally occurring grass and water.† (Nowak Laird, 2010). The Navajo being a pastoral society as their main source of subsistence meant the use of farming to produce corn and raising of livestock, primarily sheep. These were techniques the Navajo learned after raiding Pueblo villages. Once both cultures were integrated, these techniques became important for survival and economic foundation. The shift to a pastoral and agricultural lifestyle created many opportunities which made it possible for the Navajo to become one of the most modernized societies in the United States. Having a new lifestyle and way of living, the Navajo were considered nomads because they often traveled from one area to another due to the change of season. Traveling during season changes resulted in abandoning and rebuilding of shelters repeatedly. The Navajo people have a very spiritual way of life and base their way of living around a spiritual essence. Being a spiritual people, the Navajo give thanks daily for their food as well as the la nd where they reside. The Navajo base their life on a belief that both the physical and spiritual world are blended together and that all things on earth are alive and sacred. The Navajo believe the creator placed them in the middle of four mountains that represented the four cardinal directions. Among these four cardinal directions, is where the Holy Ones are believed to have lived and that they are attracted to them by prayers, songs, stories as well as their paintings. Navajo Indians 3 The Navajo believe that the Holy people have the power to aid or to harm the Earth People, which are the Navajo or otherwise known as the Dine. There is also the belief that the use of baskets and weaving came from the first man and women from the Holy ones, for ceremonial purposes. One item the Navajo valued was Turquoise. When the Navajo learned silversmith work, they combined the turquoise with the beauty of silver. This jewelry was often large and set with turquoise as the stone. The size and detail was said to reflect the owner’s wealth and their status. Turquoise and other gem stones are an important part of Navajo silversmiths they focus more on the detail and designs made with silver. Along with jewelry making the Navajo also valued basketry, pottery and sand painting. The baskets were used as to carry such things as water, food and other things meant for trading. The pottery was used to cook with as well as to store things such as food and water. Healing of ill nesses by the Navajo was performed by ceremonies. Some of the ceremonies were called, chants, sings, or ways. Sand painting ceremonies were helot to either cure an illness and also to ensure ones general wellbeing. During these ceremonies, there were some that could last up to nine nights, however, most only lasted one day. These ceremonies are conducted by a practitioner, â€Å"priest†, that had the highest training and they are called a hatta[ii. In definition this means a singer or chanter.

Saturday, November 23, 2019

How to Say Hello in Italian 6 Common Greetings

How to Say Hello in Italian 6 Common Greetings SAT / ACT Prep Online Guides and Tips Do you want to learn Italian or are you planning a vacation in Italy? Va bene! In this article, I’ll teach you some basic words to start introducing yourself in Italian. How to Say Hello in Italian There are many different ways to greet people in Italian. Here are some of the most common that you’ll encounter. Ciao Ciao is a common, informal way of greeting friends or peers. You’ll hear â€Å"ciao† a lot on the streets of Italy. It can be used as both â€Å"hello† and â€Å"goodbye.† Buongiorno "Buongiorno", which means "good morning†, is a more formal greeting. You can use â€Å"buongiorno† when entering a store, meeting your boss, or addressing someone older than you. Buonasera Don't be surprised if you hear Italians saying "buonasera" at 3 o'clock in the afternoon. â€Å"Buonasera† is a way of saying â€Å"hello† in the afternoons and evenings (think â€Å"good evening† in English). Another, less common greeting is â€Å"buon pomeriggio† which is used between noon and sunset. Most people will go with â€Å"buongiorno† or â€Å"buonasera† though. How to Say Goodbye in Italian Ready to head out? There are many ways to say â€Å"goodbye† in Italian, too. Ciao Remember, â€Å"ciao† works as both an informal hello and an informal goodbye. Arrivederci â€Å"Arrivederci† is a more formal goodbye than â€Å"ciao.† You can use this farewell when saying goodbye to an older person or someone you don’t know very well, like a store clerk or taxi driver. Una buona giornata If you really want to make a good impression when you leave a place like a restaurant, you can say â€Å"una buona giornata,† which means â€Å"Have a nice day!† You can use the expression "una buona serata!" if you’re leaving later in the day or night. A presto When you talk to someone you already know well (like a friend) or that you expect to see very soon, you can say "a presto," which means, "see you soon." Fun Facts About the Italian Language Like all languages, Italian is full of surprises. Here are some of our favorite facts about Italian: It’s the 20th Most Common Language The Italian language is spoken by 62 million people and is the official language in five countries of the world. It’s Derived From Latin Italian is a Romance language whose modern form comes from a Tuscan dialect. While Italy had many dialects for centuries, its current form was adopted because of its use in The Divine Comedy. It Has Interesting Vocals Italian is the most conservative language of Romance languages and has seven vowels with four degrees of openness, É›, e, i, É”, ou. It Doesn’t Use All of the Same Letters as English No Italian words contain k’s, j’s, x’s, or y’s. The Longest Word The longest word in Italian is â€Å"precipitevolissimevolmente† which means "in a way like someone/something that acts very hastily.† It doesn’t quite make sense in the English translation, but you get the picture! Say This Three Times Fast Looking for an Italian tongue twister? Try this one: "Trentatre trentini entered a Trento tutti e Trentatre trotterellando.† What does it mean? â€Å"Thirty-three people from Trento entered the city, all thirty-three trotting.† Too difficult? You can just stick with â€Å"Ciao!† What's Next? Interested in learning Japanese, too?Learn how to say "good morning" in Japanese, plus nine other key greetings. What's the best foreign language to take in high school?If you're wondering which language to study, check out our guideon which foreign language you should learn in school. Want to say "hello" in other languages?We have a chart of dozens of ways to say hello in different languages. Check it out! Have friends who also need help with test prep? Share this article! Tweet Hayley Milliman About the Author Hayley Milliman is a former teacher turned writer who blogs about education, history, and technology. When she was a teacher, Hayley's students regularly scored in the 99th percentile thanks to her passion for making topics digestible and accessible. In addition to her work for PrepScholar, Hayley is the author of Museum Hack's Guide to History's Fiercest Females. Get Free Guides to Boost Your SAT/ACT Get FREE EXCLUSIVE insider tips on how to ACE THE SAT/ACT. 100% Privacy. No spam ever. hbspt.forms.create({ portalId: '360031', formId: '2167ba30-e68e-4777-b88d-8bf3c84579af', formInstanceId: '2', submitButtonClass: 'btn-red-light btn', target: '#hubspot-container2', redirectUrl: 'http://ww2.prepscholar.com/blog-subscribe-thank-you', css: '.post-bottom .hs-form.stacked label {display:none;} .post-bottom .hs-form.stacked .field div.input {padding-top: 55px; padding-left: 300px;} .post-bottom .hs-input {width: 220px} .post-bottom .btn-primary, .hs-button.primary {margin-top:0px; padding-left:350px} .post-bottom .hs-form-field {margin-bottom:5px}' }); $(function(){ $(".exclusive-tip-form #hubspot-container2 label").hide(); }); function replace_tag(a, b){ $(a).each(function(index) { var thisTD = this; var newElement = $(""); $.each(this.attributes, function(index) { $(newElement).attr(thisTD.attributes[index].name, thisTD.attributes[index].value); }); $(this).after(newElement).remove(); }); } $(function(){ replace_tag($(".posts-by-topic h3"), "h2"); }) Ask a Question BelowHave any questions about this article or other topics? Ask below and we'll reply! Search the Blog Search jQuery(function(){ var $ = jQuery; var url = 'http://google.com/search?q=site:' + location.protocol + '//' + location.hostname + ' '; var $searchModule = $('.hs-search-module.5f4f968b-239c-4974-8425-cc71900464f6'); var $input = $searchModule.find('input'); var $button = $searchModule.find('.hs-button.primary'); if (false) { $input.val(decodeURIComponent(location.pathname.split('/').join(' ').split('.').join(' ').split('-').join(' ').split('_').join(''))); } $button.click(function(){ var newUrl = url + $input.val(); var win = window.open(newUrl, '_blank'); if (win) { //Browser has allowed it to be opened win.focus(); } else { //Browser has blocked it location.href = newUrl; } }); $input.keypress(function(e){ if (e.keyCode !== 13) return; e.preventDefault(); $button.click(); }); }); Improve With Our Famous Guides SATPrep ACTPrep For All Students The 5 Strategies You Must Be Using to Improve 160+ SAT Points How to Get a Perfect 1600, by a Perfect Scorer Series: How to Get 800 on Each SAT Section: Score 800 on SAT Math Score 800 on SAT Reading Score 800 on SAT Writing Series: How to Get to 600 on Each SAT Section: Score 600 on SAT Math Score 600 on SAT Reading Score 600 on SAT Writing Free Complete Official SAT Practice Tests What SAT Target Score Should You Be Aiming For? 15 Strategies to Improve Your SAT Essay The 5 Strategies You Must Be Using to Improve 4+ ACT Points How to Get a Perfect 36 ACT, by a Perfect Scorer Series: How to Get 36 on Each ACT Section: 36 on ACT English 36 on ACT Math 36 on ACT Reading 36 on ACT Science Series: How to Get to 24 on Each ACT Section: 24 on ACT English 24 on ACT Math 24 on ACT Reading 24 on ACT Science What ACT target score should you be aiming for? ACT Vocabulary You Must Know ACT Writing: 15 Tips to Raise Your Essay Score How to Get Into Harvard and the Ivy League How to Get a Perfect 4.0 GPA How to Write an Amazing College Essay What Exactly Are Colleges Looking For? Is the ACT easier than the SAT? A Comprehensive Guide Should you retake your SAT or ACT? When should you take the SAT or ACT? Michael improved by 370 POINTS! Find Out How Stay Informed Get the latest articles and test prep tips! Looking for Graduate School Test Prep? Check out our top-rated graduate blogs here: GRE Online Prep Blog GMAT Online Prep Blog TOEFL Online Prep Blog

Thursday, November 21, 2019

Kandinsky on Color Assignment Example | Topics and Well Written Essays - 500 words

Kandinsky on Color - Assignment Example The essay "Kandinsky on Color" discovers the art of Wassily Kandinsky. Women wearing flowery and beautiful dresses in well-decorated rooms would make one imagine their happiness. Taking a closer look, one gets to realize that the women in these paintings seem bored and in deep thought. The women do not express any happiness, but sorrow and confusion. The painting reflects a dry season with the colors confirming the viewer's suspicion. Although thought so, the rolls of grass on the left side of the painting would mean that the dust is caused by the machinery harvesting the grass. The road seems brown, and a man walks along it. Trees along the road seem dried. The process of clearing could mean anticipated rains that will lead to sprouting of more grass and leaves on the trees. Dull colors in homes and workplaces lead to slow responses from individuals. Dull colors and appearance psychologically represent sadness while warm colors trigger happy reactions and also express happiness from individuals. Warm colors, when used in advertising and sales, grab the attention and interest of viewers. Additionally, dull colors repel the attention and interest of individuals. Therefore, to ensure a painting wins the attention of a majority of the targeted group of people, more warm colors and expression needs to get used. Therefore, it would be true to conclude that the eye is charmed by color before it ruminates the detail. Kandinsky Wassily became the genius of art after discovering its effects to people in different aspects.

Tuesday, November 19, 2019

A Comparative Analysis of Traditional Costing Method with ABC Costing Essay

A Comparative Analysis of Traditional Costing Method with ABC Costing Method - Essay Example (Charles T. Horngren p150) Manufacturing company only produced a few types and high quantities of products before, traditional costing method which focused on direct costs were much more important than the production overheads, traditional costing would be accurate before While the production structure has changed, the times demand that flexibility and love of change replaced absorption costing method in Manufacturing company. Our company is a Manufacturing company. The company has a processing system that is used to manufacture two products: Hinkels and Quirts. Cost drivers are the real factors that decide the cost incurred and the resource consumed. Unlike the traditional method plagued by inaccuracy in manufacturing overheads allocation, ABC need not adopt two-stage cost allocation process to figure out the each target cost, in order to achieve cost information accuracy. Therefore, ABC adopts multi activities to distribute costs. It demonstrates that choosing proper cost drivers i s the most important and key step. In practice the ABC system uses many drivers as allocation bases in the second stage of the cost allocation system whereas the traditional cost systems tend to use, at the most, two second-stage allocation bases. (Colin Drury, 2002, p298) II. ABC process: Activity-based costing has the following five steps: a. Identify the different activities performed by the business. b. Calculate the total cost of each activity over the financial period(cost pool) c. Identify a cost driver (i.e. a causation factor) for each activity. d. Calculate the cost driver rate(i.e. the average cost of one occurrence of the cost driver) e. Assign part of the cost each activity to different products based to the extent to which each product has caused the activity to occur (i.e.

Sunday, November 17, 2019

Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean Essay Example for Free

Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean Essay Writers who came from over seas write the two poems that I have been asked to analyse. Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean. The poems deal with identical themes, a man who has immigrated to Britain from the Caribbean, and must learn to adapt to a new life and culture. Both men suffer a sense of loss for their past, but in Hugh Boatswains poem Old Father, the central character tries to forget about his earlier life. Hugh Boatswain writes the poem Old Father in a Caribbean dialect. It is a narrative poem, which tells the story of old fathers arrival in Britain. At first old father is very unhappy, we can see this in the quote. Man, a takkin de nex boat back home. The writer is trying to show the reader that old father is thinking of taking the next boat back home. At this point in the poem old father still uses Caribbean dialect. I think that the use of the word home tells the reader the old father wants to go home. Later as he forgets about his past and rejects his earlier culture. Old father is trying to ignore his heritage and trying to become English. We can see that old father rejects his earlier culture when he makes jokes about his people to the white people, we can see this in the quote. tut tut, he would say, isnt it disgusting how they make a spectacle of themselves. The poem is divided into four stanzas. The writer uses alliteration and assonance, to give the poem a rhythmical sound. Assonance is where the vowels sound the same in a line, for example in this quote. make him bawl in his small basement room. Boatswain also uses alliteration when he repeats b consonants. We can see alliteration in this quote. Bouncing down the road with a blond. We can also see the writer using personification in the quote. Cold bite him hard. The poem gives a lot of detail about old fathers life and now he changes to adapt to his new life. He changes his appearance by straightening his hair and ignoring his old friends. The writer is quite critical about old father, he sees him as betraying his identity. Island Man written by Grace Nichols is an imagist poem. The writer gives images or pictures of the mans dreams rather then telling his story directly to the reader. The poem is written in free verse, without rhythm. However, the writer uses alliteration in the phrases. Sun Surfacing heaves himself Nichols also repeats word, we can see this in the quote. groggily groggily muffling muffling Which describes the man waking up. The repetition helps to emphasise the emotions of the man. The poem is divided into the mans dreams of the Island and his waking life in London. The writer uses enjambment, which means that each line flows into the next. We can see an example of enjambment in the quote. Morning and Island man wakes up This gives the language in this poem a rhythmical pattern like wave on a beach. The use of colours is very important in this poem. The dream Island is blue surf and small emerald Island. In contrast London is grey metallic soar. By reading and analysing the two poems Old Father and Island Man I have come to a conclusion that I think that the poem Old Father is better in the sense of language and themes. I enjoyed reading the poem Old Father more because the writer has used a large range of language skills. It also shows the use of Caribbean dialect, and the way the writer has structured out the poem.

Thursday, November 14, 2019

The Confederate Flag Dispute Essay -- Confederate Flag Essays

The Confederate Flag Dispute The start of the Confederate flag controversy was due to the request of the NAACP to remove the flag off of South Carolina’s Statehouse. This request is based on the fact that they, the anti-flag groups, claim that the meaning of the Confederate flag is one of hate and discrimination. On the other hand, there are other groups that believe differently whom are called the pro-flag groups. They claim that the flag is a sign of heritage and should stay on the Statehouse. Liberals tend to be in the favor of the anti-flag groups, and conservatives are more likely to be supporting pro-flag groups. Both sides use evidential logos to prove their arguments, and pathos to show how wrong the other side is. Eric Foner’s article â€Å"Rebel Yell† is an example of an anti-flag argument published in a well-known liberal magazine The Nation. In â€Å"Rebel Yell† historian Eric Foner first explains some of the pro-flag arguments in the introduction paragraph; then throughout his article he shows why claims like these are wrong. First He explains that slavery was a big issue in Civil War. Then he attacks the claim made by pro-flag groups that a large amount of black fought for the Confederacy, and lastly he shows how the Confederate flag is now connected with racial inequality. He points out that the Confederate flag is not only associated with slavery but in addition is now associated with racial discrimination. This article is a definition argument that defines the Confederate flag as a negative symbol; in it Foner mainly uses logos to show the meaning of the Confederate flag, pathos as a way of portraying pro-flag supporters as the bad guys, and his ethos to show his audiences he is well-informed of the pro-flag a... ...tion’s history will also be laid to rest†(par. 8). His logical arguments are strait forward and informative and when used with pathos as a pair is very effective. When pathos is not used with some sort of logos the effectiveness of the article quickly wavers and most of the agreeing audience will only be anti-flag supporters. This article being liberal seems to correlate with what the anti-flag side believes in. Anti-flag groups want to remove the flag because of its connection with racism, which has been part of America’s past. Liberals want to make changes for the betterment of society. If liberals see the Confederate flag as a negative symbol then they will want to remove it even though it’s a part of Southern history, is why liberals tend to support the removal of the flag. Work Cited Eric Foner. â€Å"Rebel Yell.† The Nation. 270.6 (February 14, 2000): 4. The Confederate Flag Dispute Essay -- Confederate Flag Essays The Confederate Flag Dispute The start of the Confederate flag controversy was due to the request of the NAACP to remove the flag off of South Carolina’s Statehouse. This request is based on the fact that they, the anti-flag groups, claim that the meaning of the Confederate flag is one of hate and discrimination. On the other hand, there are other groups that believe differently whom are called the pro-flag groups. They claim that the flag is a sign of heritage and should stay on the Statehouse. Liberals tend to be in the favor of the anti-flag groups, and conservatives are more likely to be supporting pro-flag groups. Both sides use evidential logos to prove their arguments, and pathos to show how wrong the other side is. Eric Foner’s article â€Å"Rebel Yell† is an example of an anti-flag argument published in a well-known liberal magazine The Nation. In â€Å"Rebel Yell† historian Eric Foner first explains some of the pro-flag arguments in the introduction paragraph; then throughout his article he shows why claims like these are wrong. First He explains that slavery was a big issue in Civil War. Then he attacks the claim made by pro-flag groups that a large amount of black fought for the Confederacy, and lastly he shows how the Confederate flag is now connected with racial inequality. He points out that the Confederate flag is not only associated with slavery but in addition is now associated with racial discrimination. This article is a definition argument that defines the Confederate flag as a negative symbol; in it Foner mainly uses logos to show the meaning of the Confederate flag, pathos as a way of portraying pro-flag supporters as the bad guys, and his ethos to show his audiences he is well-informed of the pro-flag a... ...tion’s history will also be laid to rest†(par. 8). His logical arguments are strait forward and informative and when used with pathos as a pair is very effective. When pathos is not used with some sort of logos the effectiveness of the article quickly wavers and most of the agreeing audience will only be anti-flag supporters. This article being liberal seems to correlate with what the anti-flag side believes in. Anti-flag groups want to remove the flag because of its connection with racism, which has been part of America’s past. Liberals want to make changes for the betterment of society. If liberals see the Confederate flag as a negative symbol then they will want to remove it even though it’s a part of Southern history, is why liberals tend to support the removal of the flag. Work Cited Eric Foner. â€Å"Rebel Yell.† The Nation. 270.6 (February 14, 2000): 4.

Tuesday, November 12, 2019

The Future of Iptv and Ip-Video

ECE 6613: Broadband Access Networks The Future of IPTV and IP-Video Ji Hwan Kim Georgia Institute of Technology 325050 Georgia Tech Station Atlanta, GA 30332 Abstract— This paper describes the various IPTV architectures and components, which enables large-scale integration of current and future IPTV network. IPTV technologies are transforming how we perceive TV services today and global television industry as whole. However, there is pressing need for improvement on IPTV side to meet the Quality of Experience that is equal to or better than traditional TV services.In recent years, we have seen tremendous growth in Information Technology industry with the emergence of smart phone. Various new technologies are in its development to meet the demand of higher data rate, reliable data transfer, and readily available resources with distributed cloud servers to improve quality of service to the customers. With growing number of smart phone users, IPTV service has become ever more pop ular in telecommunication companies to provide streaming videos through the different new infrastructures.The biggest competitors in IPTV service in the U. S. are Verizon FioS (FTTP) and AT&T U-verse (FTTN) providing triple-play bundle service to the customer. In this paper, we are going to discuss IPTV service architecture difference of Verizon FiOS, AT&T U-verse, Cable Company, and Netflix as well as current IPTV research and development to increase quality of experience through multicast and cloud computing. Also we will analyze some of the emerging IPTV application in the future. Key Words — Internet Protocol Television (IPTV), Verizon FiOS, AT&T U-verse, MulticastIntroduction Today’s IPTV services IPTV technologies are transforming how we perceive TV services today and global television industry as whole. It is a collection of modern technologies in computing, networking, and storage combined to deliver high quality television contents through IP network. It is be coming a platform which changing how we access information and entertainment. In recent years, we have seen tremendous growth in video and networking technologies with the emergence of smart phone.Various new technologies are in its development to meet the demand of higher data rate, reliable data transfer, and readily available resources, distributed cloud servers, to improve quality of service to the customers. The figure below [1] is an example of IPTV broadband network inside a home. [pic] Fig. 1. Diagram of IPTV Broadband Network Inside Home. With IPTV service, video contents are not only limited to the TV but can utilize in multiple platforms to enjoy video content anywhere, anytime, and anydevice.IPTV alter the way the customer consume video content like personal video recorders have done and lets customer have complete control of their entertainment experience to a next level. [pic] Fig. 2. U. S. Multichannel Video Subscriber Census Above is a figure of U. S. Multichannel Vi deo Subscriber Census by SNL Kagan [2]. In 2011, the cable industry lost 1. 8 million video subscribers whereas IPTV providers gained 1. 6 million. This shows that IPTV industry is gaining market share on video content provider and it is expected to grow even more.Cable TV delivers entire line-up of broadcast content channels all the time which requires huge amount of bandwidth being delivered all the time into the home and cable companies are moving toward IPTV delivery services to reduce bandwidth on their infrastructure. IPTV architecture is very different in that it only delivers the single channel that is requested by the consumer’s individual TV. Therefore, IPTV architecture can greatly reduce bandwidth by only providing specific request from the consumer at any given time [4]. [pic] Fig. 3.Expected Growth in IPTV subscribers. However, there is pressing need for improvement on IPTV side to meet the Quality of Experience that is equal to or better than traditional TV ser vices. To provide great quality of experience in IPTV requires almost no packet loss, delay variation of 200ms, and delivery of no more than one perceivable error during a two-hour movie. This constrains and requirements puts heavy burden on service provider to provide reliable and lossless IPTV to customers and requires video admission control. The paper is outlined as follows.In Section II, we overview the different IPTV system and architecture exist today and how service providers are planning to improve their IPTV infrastructure. In Section III we will discuss the multicast protocol in depth and current research from Cisco to deliver IPTV service with multicast protocol. In Section V, we will discuss some of the potential future application that can be seen in near future with IPTV service. IPTV System and architecture IPTV networks generate their video contents for transmission using many clustered components collectively called headends.There are three common types of IPTV hea dends to meet national, regional and local content distribution requirements. Super Headends (SHE) receives and digests content on the national level typically from satellites. After processing and encoding, the SHEs distribute the national content to video hub offices (VHO) over a core IP/MPLS network. VHOs aggregate national, regional, and local content with the on-demand services, and serve metropolitan areas with a population of between 100,000 to 500,000 homes.VHOs are connected to video switching offices (VSO) over metro aggregation networks. VSOs distributed the IPTV streams to the customer premises over access network. The IPTV architecture is shown in Figure. 4. [pic] Fig. 4. End-to-End IPTV Network Architecture. The most conventional transport technique for IPTV is to multicast UDP/IP packets with MPEG-2 video compression scheme. The newer standard video architectures use RTP protocol which can provide error repair and stream monitoring unlike UDP protocol.IPTV service hav e slower channel change time compare to CATV service provider since all the TV channels are broadcasted simultaneously whereas IPTV needs to request certain channel from the provider. IPTV zapping time is affected by several factors such as Internet Group Management Protocol (IGMP) signaling delay of leaving and joining multicast group, MPEG decoding delay, program specific information (PSI) including program association table (PAT) and program map table (PMT) acquisition delay, random access point (RAP) delay, conditional access system (CAS) key acquisition delay, and de-jittering buffer delay in the STB [4].More detail of video admission control in IPTV multicast protocol will be discussed in Section III. IPTV service over a packet-switched network demands near zero packet loss and limited jitter. Thus, it is often necessary to enforce traffic management and admission control in IPTV network by sufficient provisioning and resource allocation [4]. More detail on resource allocation through retransmission server to improve IPTV will be discussed in Section III. Telco companies are embracing the IPTV technology since this will open up huge market share with Cable TV companies.Telco companies have been delivering packet-based IP traffic over their xDSL technology for many years and utilizing their existing technology to move to IPTV is a natural choice for them. However, there are great roadblocks to deploy IPTV over DSL which primarily concerned with quality of experience that is equal or better than traditional CATV. Below is the figure of IPTV infrastructure for Telco companies [1]. [pic] Fig. 5. Telco End-to-End IPTV Network Architecture. The primary difference in Telco companies’ architecture can be seen in red cloud shown in Fig. 5.Digital subscriber line access multiplexer (DSLAM) is located in environmentally controlled vaults or huts. It is also called video ready access devices (VRAD), which is placed on lawns or easements or a common space in a partment building. DSLAM often serves 100 to 200 residential gateways (RGs) that are attached to the outside of a residence and various techniques are used to transport signal between DSLAM and RG. Very high-bit-rate DSL (VDSL) for copper and broadband passive optical network (BPON) and gigabit PON (GPON) for giber transport. This metro access segment uses a hub-and-spoke architecture [5].Cable companies have been utilizing Hybrid fiber coaxial (HFC), combine optical fibers and coaxial cables, network since early 1990s to provide broadband internet access over existing cable TV system and its been employed this protocol globally and Data Over Cable Service Interface Specification (DOCSIS) is the international standard for developing equipment for HFC networks. Cable IPTV architecture is able to evolve from the traditional CATV with simple changes by adding few more components: cable modem (CM), cable modem termination system (CMTS), and a PacketCable Multimedia (PCMM).The cable comp anies’ architecture is shown in the figure below. [pic] Fig. 6. Cable Company Network Architecture. The CMTS and CM can provide a bidirectional IP over DOCSIS transport in the HFC network. CMTS can provide media access control (MAC) and physical protocol layer (PHY) in a single device by integrate with DOCSIS however, cable industry is moving toward a modular CMTS (M-CMTS). M-CMTS separates MAC and PHY layers to improve the scalability of DOCSIS transport.The CMTS manages DOCSIS QAM switching and provides QoS over the DOCSIS channel as well as manages residential CMs by dynamically load-balancing CMs among DOCSIS downstream channels to optimize traffic flow. PCMM policy server in DOCSIS networks defines admission control QoS policies by using session managers to request and reserve bandwidth for CMTS to enforce these QoS policies. A. Verizon Fios In 2004, Verizon began deployment of its Fiber to the Premises (FTTP) access network. The initial deployment used the ITU-T G. 983 BPON standard and in 2007, Verizon began using equipment with the ITU-T G. 84 G-PON standard. Fig. 6 below is Verizon’s BPON FTTP architecture diagram describing the connection between Optical Line Terminal (OLT) and Optical Network Terminal (ONT). OLT provides interface between Core network with voice, data, and video signals and Erbium Doped Fiber Amplifier (EDFA) boosts the [pic] Fig. 6. Verizon BPON FTTP architecture optical video signal. ONT performs the optical to electrical signal conversion and provide the data, voice, and video service to the subscriber. Wavelength division multiplexer (WDM) combines the three wavelengths onto a single fiber for transmission to the premises. 310nm wavelength is used for upstream traffic and for downstream, 1550nm (broadcast video) and 1490nm (data and voice) are being utilized. Fiber Distribution Hub (FDH) cabinet contains 1Ãâ€"32 passive optical splitters. Each subscriber is connected to a dedicated fiber between FHD and the premis es. BPON delivers 622 Mbps downstream and 155 Mbps upstream per PON for voice and data through ATM. FiOS provide over 600 channels between 50 to 870 MHz RF signal transmitted over the 1550nm wavelength. [pic] Fig. 7. Verizon FiOS RF spectrumGPON physical architecture is same as BPON however it provides significant improvements over BPON in bandwidth. GPON can provide 2. 5 Gbps downstream and 1. 2 Gbps upstream for data and voice and in addition, GPON have different transport by implementing Ethernet based protocol to transfer data instead of ATM. The comparison of BPON and GPON is shown in Table 1 below. [pic] Verizon uses Multimedia over Coax Alliance (MoCA) technology to provide data communication inside the resident. MoCA is installed in the ONT, Broadband Home Router, and set-top boxes and permits two-way IP data transmission over coax.By using MoCA, Verizon can reduce installation cost by using existing coax cable instead providing Ethernet cables to connect devices in the resi dent. [pic] Fig. 7. Verizon FiOS MoCA Verizon is using two main FTTP deployment schemes, the FTTP Overlay architecture and the FTTP Full Build. The [pic] Fig. 8. FTTP Overlay and Full Build Deployment Choice between two deployment scenarios is dependent on the specific deployment area and the likely take rates. In the FullBuild architecture, the fiber is deployed to each house and each subscriber gets an ONT together.In Overlay architecture, fiber is available to pass all homes and business in a distributed area but only a small percentage of homes and businesses are connected to and served with FTTP [7]. B. AT&T U-Verse In 2006, AT&T launched its U-Verse IPTV service (project lightspeed), comprising a national head-end and regional video-serving offices. AT&T offered over 300 channels in 11 cities through FTTN technology. AT&T utilizes copper pair to connect VRAD to Residential Gateway (RG) using xDSL technology. With U-verse, it can provide 25Mbps to home approximately 2500~4000 f eet away.By using MPEG-4 H. 264 compression technique, U-verse can provide 4 simultaneous TV stream (2HD and 2 SD TV), 2 VoIP and POTS service to the resident. Figure below is U-verse architecture. [pic] Fig. 9. U-verse FTTN Architecture The DSL technology at its beginning stages could only deliver 6 Mbps but now with ADSL2+ and VDSL, it can provide much higher bandwidth over a single copper pair. [pic] Fig. 10. xDSL technology. The various techniques are being implemented to improve the bandwidth and physical loop length capabilities of different DSL technologies.Bonding copper cable pairs can provide higher bandwidth by terminating 2 copper cable pairs together to act as 1 larger copper pair. ADSL2+ and VDSL is bonded together to provide higher bandwidth. VDSL can provide higher throughput than ADSL2+ however, it can only support short loop length. There is newest xDSL technology standard VHDSL2, which approved in February 2006, can provide bandwidth of 200 Mbit/s but maximum dist ance of 300 meters. xDSL technology goal is to provide VDSL speed with longer loop length [4]. The various different xDSL technology characteristics are shown in table below. TABLE 2. xDSL SELECTED CHARACTERISTICS. pic] AT&T typically uses mix of xDSL technologies to deliver broadband service to subscribers. Mainly ADSL2+ from the central office and VDSL2 from the VRAD through FTTN fiber based technology. C) Cable TV to IPTV Transition Cable companies are the largest subscription television service provider in the world and can easily integrate IPTV services to their existing infrastructure. In cable TV infrastructure, there are two main categories of digital video services: broadcast and on-demand Broadcast service defined as a service in which one copy of a program is sent to all subscriber in a broadcast manner.Broadcast services include : – Digital broadcast- Encoded/compressed programs are sent to a subscriber’s STB, where they are decoded/uncompressed for playbac k on a TV. All programs are transmitted regardless of which programs are currently watched by the customer – Switched digital video (SDV) – SDV is similar to digital broadcast but only requested programs are sent to a subscriber group. This group typically consists of all the subscribers served by HFC node which can serve range o 125 to 2000 subscribers. SDV is first two-way communication with subscriber for program selection.The digital broadcast architecture begins with the polling the content in the headend from satellite and terrestrial sources. The acquired content is generally forward to a multifunction media processing device performing following three functions: – Statmux – performs statistical time-devision multiplexing of real-time video content from various sources. – Groomer – adjust rates of content into a maximum bandwidth and limiting the rate of video burst – Splicer – inserts ads into programming breaks as need ed for a regional market. [pic]Fig. 11. CATV Architecture. The content is then forwarded across IP transport network to an IP-enabled quadrature amplitude modulator (QAM), where video content is encrypted and forward to STB for the customer. An out-of-band (OOB) channel provides the STB with basic tuning information, basic tuning information, decryption keys, software upgrade, and other communications. Switched Digital Video (SDV) was designed as a cost-effective method to expand bandwidth capacity in a way different than plant upgrades or better video compression method.Traditional digital broadcast sends all the channels into the HFC network but with SDV, programming terminates at the headend (VHO) or hub (VSO) and does not send channel unless it’s requested. When an SDV program is selected, tuning software in the receiver sends an upstream message and SDV session manager receives the quest and maps the program to a frequency within the allocated pool. If the program is alr eady being viewed within the same subscriber group, the task is as simple as reusing the existing session frequency information. On-Demand service is an interactive service where a requested video program is streamed to one subscriber.All on-demand content is encoded/compressed and stored on server to be received by individual subscriber’s request. On-demand services include following: – Video on demand- Content is stored on a server and subscriber views a list of titles and requests to view a specific title. The VOD system authorizes and streams the requested content to the requested user. – Network-based personal video record (nPVR) – this service is like home PVR except the content is on the service provider network. A subscriber uses the STB to record specific content to record and watches content at a user-chosen time which is same manner as VOD. pic] Fig. 12. Integrated Cable Video Service Architecture Cable IPTV architecture needs three newly added components to enable IPTV to their customers: Cable modem (CM), Cable Modem Termination system (CMTS), and a PacketCable Multimedia (PCMM). [pic] Fig. 13. Cable IPTV Architecture The CMTS and CM provide a two-way IP over DOCSIS transport in the HFC network. Cable Companies are moving toward M-CMTS technology, which can separate, MAC and PHY layer to improve scalability of DOCSIS transport unlike traditional CMTS where both MAC and PHY layer in a single device.In order to utilize IPTV in Cable company network, IP STBs or other IPTV capable devices must be able to receive video over IP transport and remove network delay variation. Major Cable companies are finding hybrid STBs as attractive solution for IPTV. The Hybrid STB with an embedded cable modem can receive video from either IP path or traditional QAM/RF transport path, which is good strategy to migrate from traditional cable architecture to IPTV. Admission control in Cable IPTV can be applied to both the IP network from the vi deo source to the CMTS, and the HFC network between the QAM and the CM through PCMM policy server.Policy server in DOCSIS networks defines QoS policies for CMTS to enforce them. Admission control signaling can be categorized as off-path and on-path. Off-path is when the control path is different from the data path and on-path signaling traverses the data path for bandwidth requests that use the commonly selected Resource Reservation Protocol (RSVP). In order to provide better IPTV services to the customers, Cable industry must improve bandwidth efficiency in the last mile. The biggest recent innovation to optimize available bandwidth is SDV but additional solutions are becoming more important as cable company transition to IPTV service.QAM sharing holds great promise of improving bandwidth efficiency without the need of major change in their current infrastructure. However, there are several factors contribute to the bandwidth efficiency of QAM sharing: †¢ Even if SDV and VOD h ave the same peak hours, a viewer is likely to receive only one service at a time. †¢ The gain of QAM sharing comes from the statistical advantage of a bigger QAM pool, shared by two or more services. †¢ Differing peak hours of DOCSIS and video service contribute additional gains.For instance, the spectrum allocated for DOCSIS commercial services during the day may by reallocated for video services in the evening. Dynamic QAM sharing is being realized through new technologies and standards for the following reasons: †¢ The DOCSIS M-CMTS architecture, which separates the DOCSIS MAC and PHY protocol layers. This allows the PHY layer (specifically the QAMs) to be dynamically allocated and de-allocated. †¢ The recent emergence of universal QAMs, which can function as either MPEG video QAMs or DOCSIS QAMs. †¢ Standardization in edge QAM resource management. pic] Fig. 14. Dynamic QAM Sharing with M-CMTS Architecture ERMI specifies several interfaces to an edge res ource manager (ERM). The ERM is a plat- form that manages and leases QAM channel bandwidth for all applications: †¢ ERMI-1 is an interface for edge devices to register QAM channels to the ERM and notify the ERM of any QAM failures or state changes. †¢ ERMI-2 is an interface for the ERM to bind the QAM resources from an edge device to the resource allocation request. †¢ ERMI-3 is an interface for the M-CMTS core to allocate QAM-channel andwidth from the ERM. Variable bit rate (VBR) video provides considerable bit saving compared to constant bit rate (CBR) video. WITH VBR statistical multiplexing, Cable Company can save as much as 30 percent of bandwidth by just varying the output data per time segment. Recently, DOCSIS 3. 0 was release to compete with Telco companies FTTx deployment and it is redefined the communication between cable modem (CM) located at subscriber premises and cable modem termination system (CMTS) at cable service provider’s network headend. D OCSIS 3. are design to allow channel bonding to boost up network throughput and number of bonded channel is usually 4 or 8. With DOCSIS 3. 0 standard, it can provide 300 Mbps download and 100 Mbps upload [8]. TABLE 3. DOCSIS 3. 0 Standards and Characteristics [pic] D) Netflix OTT IPTV System and Architecture Netflix is the leading provider of OTT on-demand internet video streaming in the US and Canada with more than 23 million subscribers. Netflix can stream out HD quality video with average bitrate of 3. 6 Mbps and it is single largest source of Internet traffic in the US by consuming 29. % of peak download traffic. [pic] Fig. 15. Netflix Architecture Designing large-scale network infrastructure to support fast growing video streaming platform with high availability and scalability is technically challenging. The Majority Netflix infrastructure used to be hosted in its own datacenter but recently resorted to the use of cloud services, Content Distribution Networks (CDNs), and other public computing services. Amazon AWS cloud is being utilized by replacing its in house IT infrastructure along with SimpleDB, S3 and Cassandra for file storage.Video streaming is distributed out of multiple content distributed networks (CDNs), UltraDNS, and a public DNS service is used as its authoritative DNS servers. Microsoft Silverlight is employed as the video playback platform for Netflix desktop users and Netflix manages to build its IPTV with little infrastructure of its own. †¢ Netflix data centers – Netflix uses its own IP address space for the host name www. netflix. com. This server primarily handles registration of new user accounts and captures payment information and redirect users to movies. etflix. com or signup. netflix. com. This server does not interact with the client when handling movie request and playback. †¢ Amazon Cloud service – Most of the Netflix servers are served from various Amazon cloud services and key functions are content ingestion, log recording/analysis, DRM, CDN routing, user sign-in, and mobile device support †¢ Content Distribution Networks (CDNs) – Netflix utilize multiple CDNs to deliver the video content to the subscriber. The encoded and DRM protected videos are stored in Amazon cloud and copied to CDNs.The three main CDNS are Akamai, LimeLight, and Level-3. These three servers provide same quality level content to all the subscribers. †¢ Player – Netflix employ Silver light to download, decode and play Netflix movies on desktop web browser. There are different players for mobile phones and other devices such as Wii, PS3, Xbox, Roku, etc. Netflix utilize Dynamic Streaming over HTTP (DASH) protocol for streaming. In DASH, each video is encoded at several different quality levels and is divided into small chunks. The client requests one video chunk at a time via HTTP.With each download, it measures the received bandwidth and runs a rate determination algorithm to deter mine the quality of the next chunk request. It allows the player to freely switch between different quality levels depending on the bandwidth of subscriber. TABLE 4. KEY NETFLIX HOSTNAME [pic] Netflix Client player have many functions to improve its performance and quality of experience (QOE). Netflix video streaming is controlled by instruction in a manifest file, which Silverlight client downloads. This metafile provides the DASH player metadata to conduct the adaptive video streaming capability.It is client-specific and generated according to each client’s playback and bandwidth capability. It is in XML format and contains several key pieces of information including list of the CDNs, location of trickplay data, video/audio chunk URLs for multiple quality level, and timing parameters such as time-out interval, polling interval and other data to provide QoE to users. Manifest files ranks CDNs to indicate which CDNS are preferred for content delivery. Trickplay is achieved by downloading a set of thumbnail images for periodic snapshot during network congestion [15]. IPTV multicasting protocolIn early IP networks, a packet could be sent either in unicast (single device) or broadcast (all devices). With multicast, single transmission for a group of devices is possible. Multicast transmissions enable efficient communication between groups of devices by allowing Data to be transmitted to a single multicast IP address and received by the group of interest. Multicast over IPTV network presents many challenges related to reservation of resource and maintaining quality of experience (QoE). Backbone can be built based on IP/MPLS and the routers can be enabled for multicast using IGMP protocols.Before going into detail of multicast protocol in IPTV, we will discuss multicast protocol in detail and how it can help IPTV through multicast mechanism. TABLE 5. IGMPV2 AND IGMPV3 MAJOR DIFFERENCE [pic] The IGMP was defined to allow a host computer to select a stream fro m a group of multicast streams a user request. Following is the basic functions IGMP protocol: †¢ Join: an IGMP host indicates that it wants to receive information from a multicast group to become a member. †¢ Leave: An IGMP host indicates that it no longer wishes to receive information from a multicast group. Query: An IGMP router can ask the hosts which groups they are member of. This is done to verify a JOIN/LEAVE request or to look for error conditions. Queries maybe be: o Specific Query: Asks whether the host is a member of a specific multicast group o General Query: Asks the host to indicate all groups that it belongs to †¢ Membership Report: an IGMP host tells the IGMP host what group it belongs to. This report can be either: o Solicit Membership Report: Sent in response to a QUERY o Unsolicited Membership Report: initiated by the client.In the IPTV network, each broadcast TV channel is an IP multicast group. The subscriber changes the channel by leaving one gr oup and joining a different group. IGMPv1 is not suitable for IPTV because it does not include an explicit â€Å"Leave† capability. The client will continue to receive all requested stream until the multicast router issues next query. The standard for IGMPv2 and IGMPv3 major difference is shown in Table 5. IGMPv2 supports Any Source Multicast (ASM) networks and which allows host to specify which multicast group it wishes to join.Most deployed IPTV clients supports IGMPv2. The Major enhancement in IGMPv3 is that it allows Support Specific Multicast (SSM). Host can specify the source address it wants to listen to. Here’s basic IGMP operation involving two devices: †¢ IGMP host (client or STB) – issues messages to join or leave a multicast group. The client also responds to queries from the multicast router. †¢ IGMP router – responds to the join and leave messages to determine if multicast groups should be forward out an interface. Periodic queries are used to discover from error conditions and verify requests.The IGMP router receives multicast groups either through the use of a multicast protocol such as PIM or static flooding. It is the termination point for IGMP messages and does not send any IGMP information to its upstream neighbors. [pic] Fig. 16. DSL Access Network IPTV Service In xDSL IPTV architecture, the subscriber initiates channel change requests and responds to status inquiries. The Routing Gateway (RG) at the subscriber’s site and DSLAM aggregate traffic from multiple subscribers in order to act on request from the STB.However, IGMP networks were not originally designed to have networking equipment between IGMP client and the IGMP routers. This creates some challenges to the multicast implementation: – Excessive multicast traffic: When delivering high bandwidth IPTV over broadband network, it is important to ensure that IPTV channels are forward only to those subscriber currently viewing them sinc e bandwidth is scarce. If the intermediate devices are unaware of IGMP flows then all multicast traffic is broadcast out all ports – Excessive IGMP traffic: Extra bandwidth is consumed as IGMP flows are broadcast to across the network.A single STB IGMP request can result in responses from thousands of IGMP peer clients. – Excessive time to Leave a group: With small spare bandwidth in broadband networks, Leave request often must be processed before additional join request can be served. To mitigate above challenges, several techniques are proposed and developed in intermediary devices: Local Replication, Proxy routing, Proxy Reporting, and Immediate Leave. Local replication, IGMP snooping from DSLAM, allows DSLAM to inspect incoming IGMP Join and Leave request and take appropriate action.If the channel being requested to view is already being received at the DSLAM, it will replicate the stream and forward to the subscriber. The DSLAM builds a table to track which channe l are being forwarded to each port. [pic] Fig. 17. DSLAM with IGMP Snooping Proxy routing works by allowing intermediate device (DSLAM) takes active role of terminating all IGMP flows. This makes DSLAM to act as IGMP host and responds to all incoming requests. DSLAM will recreate the IGMP request and use its own IP address as source.The major benefit of proxy routing is scaling since router is not aware of individual subscribers. [pic] Fig. 18. IGMP Proxy Routing Proxy Reporting reduces the number of IGMP packets flowing across the network by selectively dropping IGMP packets that are not need to be forwarded. The Proxy Reporting can be subdivided to two categories: Query Suppression and Report Suppression. Query Suppression reduces traffic between the DSLAM and the subscriber premises by having the DSLAM intercept and respond to IGMP queries sent by the router.DSLAM will never send a specific query to any clients and forward general queries only to those client receiving at least o ne multicast group. [pic] Fig. 19. Query Suppression. Report Suppression reduces traffic from DSLAM to the router by having DSLAM aggregate the response. The DSLAM can intercept IGMP reports coming from STB and forwards a summarized version to the IGMP router only when it is necessary. There are two categories of reports. Unsolicited membership reports are forward when first subscriber joins a multicast group or last subscriber leaves a multicast group.This tells router to begin or stop sending channel to this DSLAM. Solicited membership reports are forward once per multicast group. The DSLAM will aggregate multiple responses together into a single membership report to save bandwidth. [pic] Fig. 20. Report Suppression Immediate leave alleviate IPTV challenge to change channel rapidly. The standard IGMP Leave operation for channel change is as follow: – The STB sends a request to leave one multicast group – Router responds by issuing Membership Query to confirm the requ est. The STB responds with a Membership Report which does not include the multicast group By implementing immediate leave, STB can leave the multicast group by just simply sending a request to leave one multicast group [16]. [pic] Fig. 21. Standard IGMP Leave and Immediate Leave. The emerging IPTV deployments utilize Real-time Transport Protocol (RTP) in order to deliver media content. Unlike UDP, RTP protocol can provide sequence numbers to maintain packet ordering and detect losses, and timing information to determine network delay and synchronize timing between senders and receivers.RTP control protocol maintains session state between senders and receivers and report sender and receiver statistics bi-directionally [17]. The rapid acquisition is illustrated in the Fig 22 flow diagram below. [pic] Fig. 22. Rapid Acquisition Flow Diagram 1) The RTP receiver sends a Multicast Leave message to its upstream multicast router to leave the current multicast session and end the currently v iewed channel. 2) The RTP receiver sends a feedback message to the feedback target asking for rapid acquisition for the session it wants to join. In this feedback message, the RTP receiver can specify its specific requirements. ) The retransmission server receives the feedback message and decides whether or not to accept the request. If the retransmission server accepts the request, it sends a message to the RTP receiver that describes the burst that the retransmission server will generate and send, including the indication when the RTP receiver should join the new multicast session. The unicast burst stream consists of retransmission of a specific block of packets which will allow the RTP receiver to begin displaying video without waiting for a certain random access point to arrive in the multicast flow.If the retransmission server denies the request, it informs the RTP receiver immediately. 4) If the retransmission server accepts the request, it transmits the unicast burst data an d any additional message(s) needed to carry the key information about the new channel. The key information is used to prime the decoder inside the IPTV STB so that it can start decoding sooner. The unicast burst continues at a higher than natural rate until the unicast burst catches up with the real-time multicast flow. The sustainable burst rate depends on the access network link characteristics. ) At the appropriate moment (as indicated or computed from the burst parameters), the RTP receiver joins the new multicast session by sending a Multicast Join message to its upstream multicast router. 6) The RTP receiver starts receiving the multicast flow and completes the rapid acquisition. The STB will not join multicast session immediately with rapid acquisition since there would not be enough available left over on the access link. By utilizing unicast burst sent from the retransmission server o catch up with the multicast flow in a reasonable amount of time before joining to multicas t group allows faster channel switching capability rather than joining multicast group immediately [18]. Cloud Computing service in IPTV IPTV videos can be delivered to subscribers through various different network structures. For many years, Proxy servers have been utilized to decrease network traffic and delays through high speed and robust connection. Telco companies are looking for ways to keep service calls rejections to minimum through cloud service for on-demand IPTV service. Figure below shows on-demand IPTV service for cloud architecture. pic] Fig. 23. On-demand IPTV cloud services Video can be streamed from any of the virtual servers by load balancing among server and handle peak loads by avoid overload to achieve continuous, high utilization levels of servers. Virtual servers can provide low cost computing resources. The Virtual server acts like a dedicated server but it co-reside on a single physical machines acting as multiple physical dedicated server. However, if too many virtual servers reside on the single physical machine, services may face problem due to scarce computing resource per virtual server.Virtual storage through cloud computing allow easy share of resources among themselves. Physical storage is virtualized into virtual disk, which allows storage consolidation across heterogeneous vendors and protocols, enabled by dynamically growing and shrinking of storage through live migration, in the enterprise storage area network to be used by applications [22]. F uture application of IPTV The key to differentiating IPTV from traditional TV service of VOD and Network-based personal video record (nPVR) is the real-time interactive application and social TV.With FTTx or Gigabit Ethernet providing more bandwidth in broadband network allows new killer application to maximize the value of the IPTV service. A) SayUTV SayUTV service allows users’ participation into TV sports, discussion, variety show, and so on. SayUTV allow mixing their vide o and sources into provider’s content to allow maximum interactive and customize IPTV content. The subscriber can click participation button on SayUTV GUI. After service provider or host of the content allows his/her participation, the subscriber’s audio and video content is mixed into program’s content.All the viewer of the content can view the participant’s image and voice. [pic] Fig. 26. SayUTV Service System Architecture SayUTV service divides the role of users into three major roles: †¢ Controller – who creates a service session and has a control over that session. †¢ Participants – who joins the session and contributes his/her own multimedia content. †¢ Simple Viewer – who enjoys this service in a passive way [pic] Fig. 27. SayUTV Implementation. SayUTV is an advanced IPTV service, which combined with bidirectional multimedia communication technologies allowing interactive user-participation [20].B) IPTV Interacti ve Online Shopping In order for IPTV service provider to maximize the profit from IPTV service require smart ad insertion based on customers’ preference. TV series and sports media are well known for effective product advertisement aid. Apparels worn by a main actress of TV series or MVP sports athletes have greater potential for larger sales than conventional display by online shopping website. In order to provide customer’s shopping craving while watching TV series or sports event is to add additional information to the product description field such as TV series name, and character or athletes name.This will allow customers place some tags on that particular product through watching particular TV series or service provider can collect customers’ preference based on content and insert smart ad targeting each subscriber. [pic] Fig. 28. Shopperama Service Screen in Korea Shopperama is OTT provider in Korea providing series, which have broadcasted through a TV st ation, online along with smart ad insertion. The apparels worn by main actors and products inside the episode are displayed in a synchronized manner with video content as shown in Fig 25.This allows customer to shop for products very easily while watching TV series and reduce customer’s burden of trying to find particular product [21]. To improve interactive online shopping with IPTV service still needs many enhancements to fully flourish in E-business model. Behavior targeting content to users is estimate to be 20 billion dollar industry and in order for IPTV interactive online shopping to gain market share requires smart integration of cross layer platforms. C) Final Remarks With IPTV service deployment, Cable Company is afraid of cord-cutting case.The IPTV service is gaining popularity amongst consumer and there are many opportunities for new killer application to integrate with IPTV service. In this paper, we described current IPTV architecture in the market and presented recent efforts to improve IPTV technology. Emerging IPTV mobile systems are also gaining a lot of attention and consumer trends demonstrate that IPTV will continue to be in demand. Acknowledgment I would like to thank Prof. G K Chang for giving me an opportunity to work on this topic and learn more about multicast protocol to provide IPTV service.I was able to learn more about IPTV architecture and current trend in network research in video streaming protocol. References 1] â€Å"IPTV and the Future of Video Services† [online] Available: http://www. employees. org/~acbegen/files/IPTV_Tutorial_CCNC_2010_abegen. pdf 2] â€Å"U. S. Multichannel Subscriber Update and Geographic Analysis,† white paper, SNL Kagan, Dec. 2012. 3] Ali C. Begen, â€Å"Error control for IPTV over xDSL networks,† in Proc. IEEE Consumer Communications and Networking Conf. (CCNC), Special Session on IPTV Technologies and Applications, Las Vegas, NV, Jan. 008 4] A. Yarali and A. Cherry, †Å"Internet Protocol Television (IPTV). † In TELCON 2005 2005 IEEE Region 10, 2005, pp. 1-6. 5] Doverspike, R. ; Guangzhi Li; Oikonomou, K. N. ; Ramakrishnan, K. K. ; Sinha, R. K. ; Dongmei Wang; Chase, C. ; , â€Å"Designing a Reliable IPTV Network,† Internet Computing, IEEE , vol. 13, no. 3, pp. 15-22, May-June 2009 6] Finn, J. ; , â€Å"PON Technology in the Verizon Network,† Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE , vol. , no. , pp. 1-5, Nov. 30 2008-Dec. 4 2008 doi: 10. 1109/GLOCOM. 008. ECP. 1076 7] M. Abrams, P. C. Becker, Y. Fujimoto, V. O’Byrne, and D. Piehler,â€Å"FTTP deployments in the United States and Japan—Equipment choices and service provider imperatives,† J. Lightw. Technol. , vol. 23, no. 1, pp. 236–246, Jan. 2005. 8] CableLabs, â€Å"Modular CMTS Interfaces,† http://www. cablemodem. com/specifications/m-cmts. html 9] CableLabs, â€Å"Data Over Cable Service Interface Specificatio n,† http://cablemodem. com/ 10] CableLabs PacketCable, â€Å"PacketCable Multimedia Specification,†2005. 11] CableLabs, â€Å"Modular CMTS Interfaces,† ttp://www. cablemodem. com/specifications/m-cmts. html 12] CableLabs, â€Å"DOCSIS 3. 0 Interface Specification,† 2007. 13] CableLabs, â€Å"DOCSIS M-CMTS Downstream External PHYInterface Specification,† 2007. 14] Vasudevan, S. V. ; Xiaomei Liu; Kollmansberger, K. ; , â€Å"IPTV Systems, Standards and Architectures: Part II – IPTV Architectures for Cable Systems: An Evolutionary Approach,† Communications Magazine, IEEE , vol. 46, no. 5, pp. 102-109, May 2008 15] Adhikari, V. K. ; Yang Guo; Fang Hao; Varvello, M. ; Hilt, V. ; Steiner, M. Zhi-Li Zhang; , â€Å"Unreeling netflix: Understanding and improving multi-CDN movie delivery,† INFOCOM, 2012 Proceedings IEEE , vol. , no. , pp. 1620-1628, 25-30 March 2012 16] â€Å"Introduction to IGMP for IPTV Networks,† White Paper, Ju niper Network. , 2007 17] RFC 3550, â€Å"RTP: A transport protocol for real-time applications. † [Online]. Available: http://www. ietf. org/rfc/rfc3550. tx 18] Mignon, M. ; Bouckhout, K. ; Gahm, J. ; Begen, A. C. ; , â€Å"Scaling server-based channel-change acceleration to millions of IPTV subscribers,† Packet Video Workshop (PV), 2012 19th International , vol. no. , pp. 107-112, 10-11 May 2012 doi: 10. 1109/PV. 2012. 6229721 19] Phooi Yee Lau; Sungkwon Park; Joonhee Yoon; Joohan Lee; , â€Å"Pay-as-you-use on-demand cloud service: An IPTV case,† Electronics and Information Engineering (ICEIE), 2010 International Conference On , vol. 1, no. , pp. V1-272-V1-276, 1-3 Aug. 2010 20] Park, I. K. ; Seung Hun Oh; Sim Kwon Yoon; Ho Young Song; , â€Å"An implementation of user-participated interactive IPTV service system,† Consumer Electronics, 2008. ISCE 2008. IEEE International Symposium on , vol. no. , pp. 1-3, 14-16 April 2008 21] Jonghoon Chun; , â€Å"In teracitve Online Shopping Innovation,† Computers, Networks, Systems and Industrial Engineering (CNSI), 2011 First ACIS/JNU International Conference on , vol. , no. , pp. 104, 23-25 May 2011 22] Phooi Yee Lau; Sungkwon Park; Joonhee Yoon; Joohan Lee; , â€Å"Pay-as-you-use on-demand cloud service: An IPTV case,† Electronics and Information Engineering (ICEIE), 2010 International Conference On , vol. 1, no. , pp. V1-272-V1-276, 1-3 Aug. 2010