Wednesday, November 27, 2019

Essay on The Navajo Indians

Essay on The Navajo Indians Essay on The Navajo Indians Navajo Indians 1 The Navajo Indians ANT101: Introduction to Cultural Anthropology Instructor: Professor Heywood July 10, 2013 Navajo Indians 2 The Navajo Indians are considered to be the largest tribe of all Native American Indians within the United States. Among the Navajo culture their primary mode of subsistence are pastoralists. In this paper I will discuss the Navajo’s beliefs and values, sickness and healing as well as their social organization. â€Å"Pastoralists are those who regularly move in search of naturally occurring grass and water.† (Nowak Laird, 2010). The Navajo being a pastoral society as their main source of subsistence meant the use of farming to produce corn and raising of livestock, primarily sheep. These were techniques the Navajo learned after raiding Pueblo villages. Once both cultures were integrated, these techniques became important for survival and economic foundation. The shift to a pastoral and agricultural lifestyle created many opportunities which made it possible for the Navajo to become one of the most modernized societies in the United States. Having a new lifestyle and way of living, the Navajo were considered nomads because they often traveled from one area to another due to the change of season. Traveling during season changes resulted in abandoning and rebuilding of shelters repeatedly. The Navajo people have a very spiritual way of life and base their way of living around a spiritual essence. Being a spiritual people, the Navajo give thanks daily for their food as well as the la nd where they reside. The Navajo base their life on a belief that both the physical and spiritual world are blended together and that all things on earth are alive and sacred. The Navajo believe the creator placed them in the middle of four mountains that represented the four cardinal directions. Among these four cardinal directions, is where the Holy Ones are believed to have lived and that they are attracted to them by prayers, songs, stories as well as their paintings. Navajo Indians 3 The Navajo believe that the Holy people have the power to aid or to harm the Earth People, which are the Navajo or otherwise known as the Dine. There is also the belief that the use of baskets and weaving came from the first man and women from the Holy ones, for ceremonial purposes. One item the Navajo valued was Turquoise. When the Navajo learned silversmith work, they combined the turquoise with the beauty of silver. This jewelry was often large and set with turquoise as the stone. The size and detail was said to reflect the owner’s wealth and their status. Turquoise and other gem stones are an important part of Navajo silversmiths they focus more on the detail and designs made with silver. Along with jewelry making the Navajo also valued basketry, pottery and sand painting. The baskets were used as to carry such things as water, food and other things meant for trading. The pottery was used to cook with as well as to store things such as food and water. Healing of ill nesses by the Navajo was performed by ceremonies. Some of the ceremonies were called, chants, sings, or ways. Sand painting ceremonies were helot to either cure an illness and also to ensure ones general wellbeing. During these ceremonies, there were some that could last up to nine nights, however, most only lasted one day. These ceremonies are conducted by a practitioner, â€Å"priest†, that had the highest training and they are called a hatta[ii. In definition this means a singer or chanter.

Saturday, November 23, 2019

How to Say Hello in Italian 6 Common Greetings

How to Say Hello in Italian 6 Common Greetings SAT / ACT Prep Online Guides and Tips Do you want to learn Italian or are you planning a vacation in Italy? Va bene! In this article, I’ll teach you some basic words to start introducing yourself in Italian. How to Say Hello in Italian There are many different ways to greet people in Italian. Here are some of the most common that you’ll encounter. Ciao Ciao is a common, informal way of greeting friends or peers. You’ll hear â€Å"ciao† a lot on the streets of Italy. It can be used as both â€Å"hello† and â€Å"goodbye.† Buongiorno "Buongiorno", which means "good morning†, is a more formal greeting. You can use â€Å"buongiorno† when entering a store, meeting your boss, or addressing someone older than you. Buonasera Don't be surprised if you hear Italians saying "buonasera" at 3 o'clock in the afternoon. â€Å"Buonasera† is a way of saying â€Å"hello† in the afternoons and evenings (think â€Å"good evening† in English). Another, less common greeting is â€Å"buon pomeriggio† which is used between noon and sunset. Most people will go with â€Å"buongiorno† or â€Å"buonasera† though. How to Say Goodbye in Italian Ready to head out? There are many ways to say â€Å"goodbye† in Italian, too. Ciao Remember, â€Å"ciao† works as both an informal hello and an informal goodbye. Arrivederci â€Å"Arrivederci† is a more formal goodbye than â€Å"ciao.† You can use this farewell when saying goodbye to an older person or someone you don’t know very well, like a store clerk or taxi driver. Una buona giornata If you really want to make a good impression when you leave a place like a restaurant, you can say â€Å"una buona giornata,† which means â€Å"Have a nice day!† You can use the expression "una buona serata!" if you’re leaving later in the day or night. A presto When you talk to someone you already know well (like a friend) or that you expect to see very soon, you can say "a presto," which means, "see you soon." Fun Facts About the Italian Language Like all languages, Italian is full of surprises. Here are some of our favorite facts about Italian: It’s the 20th Most Common Language The Italian language is spoken by 62 million people and is the official language in five countries of the world. It’s Derived From Latin Italian is a Romance language whose modern form comes from a Tuscan dialect. While Italy had many dialects for centuries, its current form was adopted because of its use in The Divine Comedy. It Has Interesting Vocals Italian is the most conservative language of Romance languages and has seven vowels with four degrees of openness, É›, e, i, É”, ou. It Doesn’t Use All of the Same Letters as English No Italian words contain k’s, j’s, x’s, or y’s. The Longest Word The longest word in Italian is â€Å"precipitevolissimevolmente† which means "in a way like someone/something that acts very hastily.† It doesn’t quite make sense in the English translation, but you get the picture! Say This Three Times Fast Looking for an Italian tongue twister? Try this one: "Trentatre trentini entered a Trento tutti e Trentatre trotterellando.† What does it mean? â€Å"Thirty-three people from Trento entered the city, all thirty-three trotting.† Too difficult? You can just stick with â€Å"Ciao!† What's Next? Interested in learning Japanese, too?Learn how to say "good morning" in Japanese, plus nine other key greetings. What's the best foreign language to take in high school?If you're wondering which language to study, check out our guideon which foreign language you should learn in school. Want to say "hello" in other languages?We have a chart of dozens of ways to say hello in different languages. Check it out! Have friends who also need help with test prep? Share this article! Tweet Hayley Milliman About the Author Hayley Milliman is a former teacher turned writer who blogs about education, history, and technology. When she was a teacher, Hayley's students regularly scored in the 99th percentile thanks to her passion for making topics digestible and accessible. In addition to her work for PrepScholar, Hayley is the author of Museum Hack's Guide to History's Fiercest Females. Get Free Guides to Boost Your SAT/ACT Get FREE EXCLUSIVE insider tips on how to ACE THE SAT/ACT. 100% Privacy. No spam ever. hbspt.forms.create({ portalId: '360031', formId: '2167ba30-e68e-4777-b88d-8bf3c84579af', formInstanceId: '2', submitButtonClass: 'btn-red-light btn', target: '#hubspot-container2', redirectUrl: 'http://ww2.prepscholar.com/blog-subscribe-thank-you', css: '.post-bottom .hs-form.stacked label {display:none;} .post-bottom .hs-form.stacked .field div.input {padding-top: 55px; padding-left: 300px;} .post-bottom .hs-input {width: 220px} .post-bottom .btn-primary, .hs-button.primary {margin-top:0px; padding-left:350px} .post-bottom .hs-form-field {margin-bottom:5px}' }); $(function(){ $(".exclusive-tip-form #hubspot-container2 label").hide(); }); function replace_tag(a, b){ $(a).each(function(index) { var thisTD = this; var newElement = $(""); $.each(this.attributes, function(index) { $(newElement).attr(thisTD.attributes[index].name, thisTD.attributes[index].value); }); $(this).after(newElement).remove(); }); } $(function(){ replace_tag($(".posts-by-topic h3"), "h2"); }) Ask a Question BelowHave any questions about this article or other topics? Ask below and we'll reply! Search the Blog Search jQuery(function(){ var $ = jQuery; var url = 'http://google.com/search?q=site:' + location.protocol + '//' + location.hostname + ' '; var $searchModule = $('.hs-search-module.5f4f968b-239c-4974-8425-cc71900464f6'); var $input = $searchModule.find('input'); var $button = $searchModule.find('.hs-button.primary'); if (false) { $input.val(decodeURIComponent(location.pathname.split('/').join(' ').split('.').join(' ').split('-').join(' ').split('_').join(''))); } $button.click(function(){ var newUrl = url + $input.val(); var win = window.open(newUrl, '_blank'); if (win) { //Browser has allowed it to be opened win.focus(); } else { //Browser has blocked it location.href = newUrl; } }); $input.keypress(function(e){ if (e.keyCode !== 13) return; e.preventDefault(); $button.click(); }); }); Improve With Our Famous Guides SATPrep ACTPrep For All Students The 5 Strategies You Must Be Using to Improve 160+ SAT Points How to Get a Perfect 1600, by a Perfect Scorer Series: How to Get 800 on Each SAT Section: Score 800 on SAT Math Score 800 on SAT Reading Score 800 on SAT Writing Series: How to Get to 600 on Each SAT Section: Score 600 on SAT Math Score 600 on SAT Reading Score 600 on SAT Writing Free Complete Official SAT Practice Tests What SAT Target Score Should You Be Aiming For? 15 Strategies to Improve Your SAT Essay The 5 Strategies You Must Be Using to Improve 4+ ACT Points How to Get a Perfect 36 ACT, by a Perfect Scorer Series: How to Get 36 on Each ACT Section: 36 on ACT English 36 on ACT Math 36 on ACT Reading 36 on ACT Science Series: How to Get to 24 on Each ACT Section: 24 on ACT English 24 on ACT Math 24 on ACT Reading 24 on ACT Science What ACT target score should you be aiming for? ACT Vocabulary You Must Know ACT Writing: 15 Tips to Raise Your Essay Score How to Get Into Harvard and the Ivy League How to Get a Perfect 4.0 GPA How to Write an Amazing College Essay What Exactly Are Colleges Looking For? Is the ACT easier than the SAT? A Comprehensive Guide Should you retake your SAT or ACT? When should you take the SAT or ACT? Michael improved by 370 POINTS! Find Out How Stay Informed Get the latest articles and test prep tips! Looking for Graduate School Test Prep? Check out our top-rated graduate blogs here: GRE Online Prep Blog GMAT Online Prep Blog TOEFL Online Prep Blog

Thursday, November 21, 2019

Kandinsky on Color Assignment Example | Topics and Well Written Essays - 500 words

Kandinsky on Color - Assignment Example The essay "Kandinsky on Color" discovers the art of Wassily Kandinsky. Women wearing flowery and beautiful dresses in well-decorated rooms would make one imagine their happiness. Taking a closer look, one gets to realize that the women in these paintings seem bored and in deep thought. The women do not express any happiness, but sorrow and confusion. The painting reflects a dry season with the colors confirming the viewer's suspicion. Although thought so, the rolls of grass on the left side of the painting would mean that the dust is caused by the machinery harvesting the grass. The road seems brown, and a man walks along it. Trees along the road seem dried. The process of clearing could mean anticipated rains that will lead to sprouting of more grass and leaves on the trees. Dull colors in homes and workplaces lead to slow responses from individuals. Dull colors and appearance psychologically represent sadness while warm colors trigger happy reactions and also express happiness from individuals. Warm colors, when used in advertising and sales, grab the attention and interest of viewers. Additionally, dull colors repel the attention and interest of individuals. Therefore, to ensure a painting wins the attention of a majority of the targeted group of people, more warm colors and expression needs to get used. Therefore, it would be true to conclude that the eye is charmed by color before it ruminates the detail. Kandinsky Wassily became the genius of art after discovering its effects to people in different aspects.

Tuesday, November 19, 2019

A Comparative Analysis of Traditional Costing Method with ABC Costing Essay

A Comparative Analysis of Traditional Costing Method with ABC Costing Method - Essay Example (Charles T. Horngren p150) Manufacturing company only produced a few types and high quantities of products before, traditional costing method which focused on direct costs were much more important than the production overheads, traditional costing would be accurate before While the production structure has changed, the times demand that flexibility and love of change replaced absorption costing method in Manufacturing company. Our company is a Manufacturing company. The company has a processing system that is used to manufacture two products: Hinkels and Quirts. Cost drivers are the real factors that decide the cost incurred and the resource consumed. Unlike the traditional method plagued by inaccuracy in manufacturing overheads allocation, ABC need not adopt two-stage cost allocation process to figure out the each target cost, in order to achieve cost information accuracy. Therefore, ABC adopts multi activities to distribute costs. It demonstrates that choosing proper cost drivers i s the most important and key step. In practice the ABC system uses many drivers as allocation bases in the second stage of the cost allocation system whereas the traditional cost systems tend to use, at the most, two second-stage allocation bases. (Colin Drury, 2002, p298) II. ABC process: Activity-based costing has the following five steps: a. Identify the different activities performed by the business. b. Calculate the total cost of each activity over the financial period(cost pool) c. Identify a cost driver (i.e. a causation factor) for each activity. d. Calculate the cost driver rate(i.e. the average cost of one occurrence of the cost driver) e. Assign part of the cost each activity to different products based to the extent to which each product has caused the activity to occur (i.e.

Sunday, November 17, 2019

Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean Essay Example for Free

Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean Essay Writers who came from over seas write the two poems that I have been asked to analyse. Grace Nichols comes from Guyana and Hugh Boatswain from the Caribbean. The poems deal with identical themes, a man who has immigrated to Britain from the Caribbean, and must learn to adapt to a new life and culture. Both men suffer a sense of loss for their past, but in Hugh Boatswains poem Old Father, the central character tries to forget about his earlier life. Hugh Boatswain writes the poem Old Father in a Caribbean dialect. It is a narrative poem, which tells the story of old fathers arrival in Britain. At first old father is very unhappy, we can see this in the quote. Man, a takkin de nex boat back home. The writer is trying to show the reader that old father is thinking of taking the next boat back home. At this point in the poem old father still uses Caribbean dialect. I think that the use of the word home tells the reader the old father wants to go home. Later as he forgets about his past and rejects his earlier culture. Old father is trying to ignore his heritage and trying to become English. We can see that old father rejects his earlier culture when he makes jokes about his people to the white people, we can see this in the quote. tut tut, he would say, isnt it disgusting how they make a spectacle of themselves. The poem is divided into four stanzas. The writer uses alliteration and assonance, to give the poem a rhythmical sound. Assonance is where the vowels sound the same in a line, for example in this quote. make him bawl in his small basement room. Boatswain also uses alliteration when he repeats b consonants. We can see alliteration in this quote. Bouncing down the road with a blond. We can also see the writer using personification in the quote. Cold bite him hard. The poem gives a lot of detail about old fathers life and now he changes to adapt to his new life. He changes his appearance by straightening his hair and ignoring his old friends. The writer is quite critical about old father, he sees him as betraying his identity. Island Man written by Grace Nichols is an imagist poem. The writer gives images or pictures of the mans dreams rather then telling his story directly to the reader. The poem is written in free verse, without rhythm. However, the writer uses alliteration in the phrases. Sun Surfacing heaves himself Nichols also repeats word, we can see this in the quote. groggily groggily muffling muffling Which describes the man waking up. The repetition helps to emphasise the emotions of the man. The poem is divided into the mans dreams of the Island and his waking life in London. The writer uses enjambment, which means that each line flows into the next. We can see an example of enjambment in the quote. Morning and Island man wakes up This gives the language in this poem a rhythmical pattern like wave on a beach. The use of colours is very important in this poem. The dream Island is blue surf and small emerald Island. In contrast London is grey metallic soar. By reading and analysing the two poems Old Father and Island Man I have come to a conclusion that I think that the poem Old Father is better in the sense of language and themes. I enjoyed reading the poem Old Father more because the writer has used a large range of language skills. It also shows the use of Caribbean dialect, and the way the writer has structured out the poem.

Thursday, November 14, 2019

The Confederate Flag Dispute Essay -- Confederate Flag Essays

The Confederate Flag Dispute The start of the Confederate flag controversy was due to the request of the NAACP to remove the flag off of South Carolina’s Statehouse. This request is based on the fact that they, the anti-flag groups, claim that the meaning of the Confederate flag is one of hate and discrimination. On the other hand, there are other groups that believe differently whom are called the pro-flag groups. They claim that the flag is a sign of heritage and should stay on the Statehouse. Liberals tend to be in the favor of the anti-flag groups, and conservatives are more likely to be supporting pro-flag groups. Both sides use evidential logos to prove their arguments, and pathos to show how wrong the other side is. Eric Foner’s article â€Å"Rebel Yell† is an example of an anti-flag argument published in a well-known liberal magazine The Nation. In â€Å"Rebel Yell† historian Eric Foner first explains some of the pro-flag arguments in the introduction paragraph; then throughout his article he shows why claims like these are wrong. First He explains that slavery was a big issue in Civil War. Then he attacks the claim made by pro-flag groups that a large amount of black fought for the Confederacy, and lastly he shows how the Confederate flag is now connected with racial inequality. He points out that the Confederate flag is not only associated with slavery but in addition is now associated with racial discrimination. This article is a definition argument that defines the Confederate flag as a negative symbol; in it Foner mainly uses logos to show the meaning of the Confederate flag, pathos as a way of portraying pro-flag supporters as the bad guys, and his ethos to show his audiences he is well-informed of the pro-flag a... ...tion’s history will also be laid to rest†(par. 8). His logical arguments are strait forward and informative and when used with pathos as a pair is very effective. When pathos is not used with some sort of logos the effectiveness of the article quickly wavers and most of the agreeing audience will only be anti-flag supporters. This article being liberal seems to correlate with what the anti-flag side believes in. Anti-flag groups want to remove the flag because of its connection with racism, which has been part of America’s past. Liberals want to make changes for the betterment of society. If liberals see the Confederate flag as a negative symbol then they will want to remove it even though it’s a part of Southern history, is why liberals tend to support the removal of the flag. Work Cited Eric Foner. â€Å"Rebel Yell.† The Nation. 270.6 (February 14, 2000): 4. The Confederate Flag Dispute Essay -- Confederate Flag Essays The Confederate Flag Dispute The start of the Confederate flag controversy was due to the request of the NAACP to remove the flag off of South Carolina’s Statehouse. This request is based on the fact that they, the anti-flag groups, claim that the meaning of the Confederate flag is one of hate and discrimination. On the other hand, there are other groups that believe differently whom are called the pro-flag groups. They claim that the flag is a sign of heritage and should stay on the Statehouse. Liberals tend to be in the favor of the anti-flag groups, and conservatives are more likely to be supporting pro-flag groups. Both sides use evidential logos to prove their arguments, and pathos to show how wrong the other side is. Eric Foner’s article â€Å"Rebel Yell† is an example of an anti-flag argument published in a well-known liberal magazine The Nation. In â€Å"Rebel Yell† historian Eric Foner first explains some of the pro-flag arguments in the introduction paragraph; then throughout his article he shows why claims like these are wrong. First He explains that slavery was a big issue in Civil War. Then he attacks the claim made by pro-flag groups that a large amount of black fought for the Confederacy, and lastly he shows how the Confederate flag is now connected with racial inequality. He points out that the Confederate flag is not only associated with slavery but in addition is now associated with racial discrimination. This article is a definition argument that defines the Confederate flag as a negative symbol; in it Foner mainly uses logos to show the meaning of the Confederate flag, pathos as a way of portraying pro-flag supporters as the bad guys, and his ethos to show his audiences he is well-informed of the pro-flag a... ...tion’s history will also be laid to rest†(par. 8). His logical arguments are strait forward and informative and when used with pathos as a pair is very effective. When pathos is not used with some sort of logos the effectiveness of the article quickly wavers and most of the agreeing audience will only be anti-flag supporters. This article being liberal seems to correlate with what the anti-flag side believes in. Anti-flag groups want to remove the flag because of its connection with racism, which has been part of America’s past. Liberals want to make changes for the betterment of society. If liberals see the Confederate flag as a negative symbol then they will want to remove it even though it’s a part of Southern history, is why liberals tend to support the removal of the flag. Work Cited Eric Foner. â€Å"Rebel Yell.† The Nation. 270.6 (February 14, 2000): 4.

Tuesday, November 12, 2019

The Future of Iptv and Ip-Video

ECE 6613: Broadband Access Networks The Future of IPTV and IP-Video Ji Hwan Kim Georgia Institute of Technology 325050 Georgia Tech Station Atlanta, GA 30332 Abstract— This paper describes the various IPTV architectures and components, which enables large-scale integration of current and future IPTV network. IPTV technologies are transforming how we perceive TV services today and global television industry as whole. However, there is pressing need for improvement on IPTV side to meet the Quality of Experience that is equal to or better than traditional TV services.In recent years, we have seen tremendous growth in Information Technology industry with the emergence of smart phone. Various new technologies are in its development to meet the demand of higher data rate, reliable data transfer, and readily available resources with distributed cloud servers to improve quality of service to the customers. With growing number of smart phone users, IPTV service has become ever more pop ular in telecommunication companies to provide streaming videos through the different new infrastructures.The biggest competitors in IPTV service in the U. S. are Verizon FioS (FTTP) and AT&T U-verse (FTTN) providing triple-play bundle service to the customer. In this paper, we are going to discuss IPTV service architecture difference of Verizon FiOS, AT&T U-verse, Cable Company, and Netflix as well as current IPTV research and development to increase quality of experience through multicast and cloud computing. Also we will analyze some of the emerging IPTV application in the future. Key Words — Internet Protocol Television (IPTV), Verizon FiOS, AT&T U-verse, MulticastIntroduction Today’s IPTV services IPTV technologies are transforming how we perceive TV services today and global television industry as whole. It is a collection of modern technologies in computing, networking, and storage combined to deliver high quality television contents through IP network. It is be coming a platform which changing how we access information and entertainment. In recent years, we have seen tremendous growth in video and networking technologies with the emergence of smart phone.Various new technologies are in its development to meet the demand of higher data rate, reliable data transfer, and readily available resources, distributed cloud servers, to improve quality of service to the customers. The figure below [1] is an example of IPTV broadband network inside a home. [pic] Fig. 1. Diagram of IPTV Broadband Network Inside Home. With IPTV service, video contents are not only limited to the TV but can utilize in multiple platforms to enjoy video content anywhere, anytime, and anydevice.IPTV alter the way the customer consume video content like personal video recorders have done and lets customer have complete control of their entertainment experience to a next level. [pic] Fig. 2. U. S. Multichannel Video Subscriber Census Above is a figure of U. S. Multichannel Vi deo Subscriber Census by SNL Kagan [2]. In 2011, the cable industry lost 1. 8 million video subscribers whereas IPTV providers gained 1. 6 million. This shows that IPTV industry is gaining market share on video content provider and it is expected to grow even more.Cable TV delivers entire line-up of broadcast content channels all the time which requires huge amount of bandwidth being delivered all the time into the home and cable companies are moving toward IPTV delivery services to reduce bandwidth on their infrastructure. IPTV architecture is very different in that it only delivers the single channel that is requested by the consumer’s individual TV. Therefore, IPTV architecture can greatly reduce bandwidth by only providing specific request from the consumer at any given time [4]. [pic] Fig. 3.Expected Growth in IPTV subscribers. However, there is pressing need for improvement on IPTV side to meet the Quality of Experience that is equal to or better than traditional TV ser vices. To provide great quality of experience in IPTV requires almost no packet loss, delay variation of 200ms, and delivery of no more than one perceivable error during a two-hour movie. This constrains and requirements puts heavy burden on service provider to provide reliable and lossless IPTV to customers and requires video admission control. The paper is outlined as follows.In Section II, we overview the different IPTV system and architecture exist today and how service providers are planning to improve their IPTV infrastructure. In Section III we will discuss the multicast protocol in depth and current research from Cisco to deliver IPTV service with multicast protocol. In Section V, we will discuss some of the potential future application that can be seen in near future with IPTV service. IPTV System and architecture IPTV networks generate their video contents for transmission using many clustered components collectively called headends.There are three common types of IPTV hea dends to meet national, regional and local content distribution requirements. Super Headends (SHE) receives and digests content on the national level typically from satellites. After processing and encoding, the SHEs distribute the national content to video hub offices (VHO) over a core IP/MPLS network. VHOs aggregate national, regional, and local content with the on-demand services, and serve metropolitan areas with a population of between 100,000 to 500,000 homes.VHOs are connected to video switching offices (VSO) over metro aggregation networks. VSOs distributed the IPTV streams to the customer premises over access network. The IPTV architecture is shown in Figure. 4. [pic] Fig. 4. End-to-End IPTV Network Architecture. The most conventional transport technique for IPTV is to multicast UDP/IP packets with MPEG-2 video compression scheme. The newer standard video architectures use RTP protocol which can provide error repair and stream monitoring unlike UDP protocol.IPTV service hav e slower channel change time compare to CATV service provider since all the TV channels are broadcasted simultaneously whereas IPTV needs to request certain channel from the provider. IPTV zapping time is affected by several factors such as Internet Group Management Protocol (IGMP) signaling delay of leaving and joining multicast group, MPEG decoding delay, program specific information (PSI) including program association table (PAT) and program map table (PMT) acquisition delay, random access point (RAP) delay, conditional access system (CAS) key acquisition delay, and de-jittering buffer delay in the STB [4].More detail of video admission control in IPTV multicast protocol will be discussed in Section III. IPTV service over a packet-switched network demands near zero packet loss and limited jitter. Thus, it is often necessary to enforce traffic management and admission control in IPTV network by sufficient provisioning and resource allocation [4]. More detail on resource allocation through retransmission server to improve IPTV will be discussed in Section III. Telco companies are embracing the IPTV technology since this will open up huge market share with Cable TV companies.Telco companies have been delivering packet-based IP traffic over their xDSL technology for many years and utilizing their existing technology to move to IPTV is a natural choice for them. However, there are great roadblocks to deploy IPTV over DSL which primarily concerned with quality of experience that is equal or better than traditional CATV. Below is the figure of IPTV infrastructure for Telco companies [1]. [pic] Fig. 5. Telco End-to-End IPTV Network Architecture. The primary difference in Telco companies’ architecture can be seen in red cloud shown in Fig. 5.Digital subscriber line access multiplexer (DSLAM) is located in environmentally controlled vaults or huts. It is also called video ready access devices (VRAD), which is placed on lawns or easements or a common space in a partment building. DSLAM often serves 100 to 200 residential gateways (RGs) that are attached to the outside of a residence and various techniques are used to transport signal between DSLAM and RG. Very high-bit-rate DSL (VDSL) for copper and broadband passive optical network (BPON) and gigabit PON (GPON) for giber transport. This metro access segment uses a hub-and-spoke architecture [5].Cable companies have been utilizing Hybrid fiber coaxial (HFC), combine optical fibers and coaxial cables, network since early 1990s to provide broadband internet access over existing cable TV system and its been employed this protocol globally and Data Over Cable Service Interface Specification (DOCSIS) is the international standard for developing equipment for HFC networks. Cable IPTV architecture is able to evolve from the traditional CATV with simple changes by adding few more components: cable modem (CM), cable modem termination system (CMTS), and a PacketCable Multimedia (PCMM).The cable comp anies’ architecture is shown in the figure below. [pic] Fig. 6. Cable Company Network Architecture. The CMTS and CM can provide a bidirectional IP over DOCSIS transport in the HFC network. CMTS can provide media access control (MAC) and physical protocol layer (PHY) in a single device by integrate with DOCSIS however, cable industry is moving toward a modular CMTS (M-CMTS). M-CMTS separates MAC and PHY layers to improve the scalability of DOCSIS transport.The CMTS manages DOCSIS QAM switching and provides QoS over the DOCSIS channel as well as manages residential CMs by dynamically load-balancing CMs among DOCSIS downstream channels to optimize traffic flow. PCMM policy server in DOCSIS networks defines admission control QoS policies by using session managers to request and reserve bandwidth for CMTS to enforce these QoS policies. A. Verizon Fios In 2004, Verizon began deployment of its Fiber to the Premises (FTTP) access network. The initial deployment used the ITU-T G. 983 BPON standard and in 2007, Verizon began using equipment with the ITU-T G. 84 G-PON standard. Fig. 6 below is Verizon’s BPON FTTP architecture diagram describing the connection between Optical Line Terminal (OLT) and Optical Network Terminal (ONT). OLT provides interface between Core network with voice, data, and video signals and Erbium Doped Fiber Amplifier (EDFA) boosts the [pic] Fig. 6. Verizon BPON FTTP architecture optical video signal. ONT performs the optical to electrical signal conversion and provide the data, voice, and video service to the subscriber. Wavelength division multiplexer (WDM) combines the three wavelengths onto a single fiber for transmission to the premises. 310nm wavelength is used for upstream traffic and for downstream, 1550nm (broadcast video) and 1490nm (data and voice) are being utilized. Fiber Distribution Hub (FDH) cabinet contains 1Ãâ€"32 passive optical splitters. Each subscriber is connected to a dedicated fiber between FHD and the premis es. BPON delivers 622 Mbps downstream and 155 Mbps upstream per PON for voice and data through ATM. FiOS provide over 600 channels between 50 to 870 MHz RF signal transmitted over the 1550nm wavelength. [pic] Fig. 7. Verizon FiOS RF spectrumGPON physical architecture is same as BPON however it provides significant improvements over BPON in bandwidth. GPON can provide 2. 5 Gbps downstream and 1. 2 Gbps upstream for data and voice and in addition, GPON have different transport by implementing Ethernet based protocol to transfer data instead of ATM. The comparison of BPON and GPON is shown in Table 1 below. [pic] Verizon uses Multimedia over Coax Alliance (MoCA) technology to provide data communication inside the resident. MoCA is installed in the ONT, Broadband Home Router, and set-top boxes and permits two-way IP data transmission over coax.By using MoCA, Verizon can reduce installation cost by using existing coax cable instead providing Ethernet cables to connect devices in the resi dent. [pic] Fig. 7. Verizon FiOS MoCA Verizon is using two main FTTP deployment schemes, the FTTP Overlay architecture and the FTTP Full Build. The [pic] Fig. 8. FTTP Overlay and Full Build Deployment Choice between two deployment scenarios is dependent on the specific deployment area and the likely take rates. In the FullBuild architecture, the fiber is deployed to each house and each subscriber gets an ONT together.In Overlay architecture, fiber is available to pass all homes and business in a distributed area but only a small percentage of homes and businesses are connected to and served with FTTP [7]. B. AT&T U-Verse In 2006, AT&T launched its U-Verse IPTV service (project lightspeed), comprising a national head-end and regional video-serving offices. AT&T offered over 300 channels in 11 cities through FTTN technology. AT&T utilizes copper pair to connect VRAD to Residential Gateway (RG) using xDSL technology. With U-verse, it can provide 25Mbps to home approximately 2500~4000 f eet away.By using MPEG-4 H. 264 compression technique, U-verse can provide 4 simultaneous TV stream (2HD and 2 SD TV), 2 VoIP and POTS service to the resident. Figure below is U-verse architecture. [pic] Fig. 9. U-verse FTTN Architecture The DSL technology at its beginning stages could only deliver 6 Mbps but now with ADSL2+ and VDSL, it can provide much higher bandwidth over a single copper pair. [pic] Fig. 10. xDSL technology. The various techniques are being implemented to improve the bandwidth and physical loop length capabilities of different DSL technologies.Bonding copper cable pairs can provide higher bandwidth by terminating 2 copper cable pairs together to act as 1 larger copper pair. ADSL2+ and VDSL is bonded together to provide higher bandwidth. VDSL can provide higher throughput than ADSL2+ however, it can only support short loop length. There is newest xDSL technology standard VHDSL2, which approved in February 2006, can provide bandwidth of 200 Mbit/s but maximum dist ance of 300 meters. xDSL technology goal is to provide VDSL speed with longer loop length [4]. The various different xDSL technology characteristics are shown in table below. TABLE 2. xDSL SELECTED CHARACTERISTICS. pic] AT&T typically uses mix of xDSL technologies to deliver broadband service to subscribers. Mainly ADSL2+ from the central office and VDSL2 from the VRAD through FTTN fiber based technology. C) Cable TV to IPTV Transition Cable companies are the largest subscription television service provider in the world and can easily integrate IPTV services to their existing infrastructure. In cable TV infrastructure, there are two main categories of digital video services: broadcast and on-demand Broadcast service defined as a service in which one copy of a program is sent to all subscriber in a broadcast manner.Broadcast services include : – Digital broadcast- Encoded/compressed programs are sent to a subscriber’s STB, where they are decoded/uncompressed for playbac k on a TV. All programs are transmitted regardless of which programs are currently watched by the customer – Switched digital video (SDV) – SDV is similar to digital broadcast but only requested programs are sent to a subscriber group. This group typically consists of all the subscribers served by HFC node which can serve range o 125 to 2000 subscribers. SDV is first two-way communication with subscriber for program selection.The digital broadcast architecture begins with the polling the content in the headend from satellite and terrestrial sources. The acquired content is generally forward to a multifunction media processing device performing following three functions: – Statmux – performs statistical time-devision multiplexing of real-time video content from various sources. – Groomer – adjust rates of content into a maximum bandwidth and limiting the rate of video burst – Splicer – inserts ads into programming breaks as need ed for a regional market. [pic]Fig. 11. CATV Architecture. The content is then forwarded across IP transport network to an IP-enabled quadrature amplitude modulator (QAM), where video content is encrypted and forward to STB for the customer. An out-of-band (OOB) channel provides the STB with basic tuning information, basic tuning information, decryption keys, software upgrade, and other communications. Switched Digital Video (SDV) was designed as a cost-effective method to expand bandwidth capacity in a way different than plant upgrades or better video compression method.Traditional digital broadcast sends all the channels into the HFC network but with SDV, programming terminates at the headend (VHO) or hub (VSO) and does not send channel unless it’s requested. When an SDV program is selected, tuning software in the receiver sends an upstream message and SDV session manager receives the quest and maps the program to a frequency within the allocated pool. If the program is alr eady being viewed within the same subscriber group, the task is as simple as reusing the existing session frequency information. On-Demand service is an interactive service where a requested video program is streamed to one subscriber.All on-demand content is encoded/compressed and stored on server to be received by individual subscriber’s request. On-demand services include following: – Video on demand- Content is stored on a server and subscriber views a list of titles and requests to view a specific title. The VOD system authorizes and streams the requested content to the requested user. – Network-based personal video record (nPVR) – this service is like home PVR except the content is on the service provider network. A subscriber uses the STB to record specific content to record and watches content at a user-chosen time which is same manner as VOD. pic] Fig. 12. Integrated Cable Video Service Architecture Cable IPTV architecture needs three newly added components to enable IPTV to their customers: Cable modem (CM), Cable Modem Termination system (CMTS), and a PacketCable Multimedia (PCMM). [pic] Fig. 13. Cable IPTV Architecture The CMTS and CM provide a two-way IP over DOCSIS transport in the HFC network. Cable Companies are moving toward M-CMTS technology, which can separate, MAC and PHY layer to improve scalability of DOCSIS transport unlike traditional CMTS where both MAC and PHY layer in a single device.In order to utilize IPTV in Cable company network, IP STBs or other IPTV capable devices must be able to receive video over IP transport and remove network delay variation. Major Cable companies are finding hybrid STBs as attractive solution for IPTV. The Hybrid STB with an embedded cable modem can receive video from either IP path or traditional QAM/RF transport path, which is good strategy to migrate from traditional cable architecture to IPTV. Admission control in Cable IPTV can be applied to both the IP network from the vi deo source to the CMTS, and the HFC network between the QAM and the CM through PCMM policy server.Policy server in DOCSIS networks defines QoS policies for CMTS to enforce them. Admission control signaling can be categorized as off-path and on-path. Off-path is when the control path is different from the data path and on-path signaling traverses the data path for bandwidth requests that use the commonly selected Resource Reservation Protocol (RSVP). In order to provide better IPTV services to the customers, Cable industry must improve bandwidth efficiency in the last mile. The biggest recent innovation to optimize available bandwidth is SDV but additional solutions are becoming more important as cable company transition to IPTV service.QAM sharing holds great promise of improving bandwidth efficiency without the need of major change in their current infrastructure. However, there are several factors contribute to the bandwidth efficiency of QAM sharing: †¢ Even if SDV and VOD h ave the same peak hours, a viewer is likely to receive only one service at a time. †¢ The gain of QAM sharing comes from the statistical advantage of a bigger QAM pool, shared by two or more services. †¢ Differing peak hours of DOCSIS and video service contribute additional gains.For instance, the spectrum allocated for DOCSIS commercial services during the day may by reallocated for video services in the evening. Dynamic QAM sharing is being realized through new technologies and standards for the following reasons: †¢ The DOCSIS M-CMTS architecture, which separates the DOCSIS MAC and PHY protocol layers. This allows the PHY layer (specifically the QAMs) to be dynamically allocated and de-allocated. †¢ The recent emergence of universal QAMs, which can function as either MPEG video QAMs or DOCSIS QAMs. †¢ Standardization in edge QAM resource management. pic] Fig. 14. Dynamic QAM Sharing with M-CMTS Architecture ERMI specifies several interfaces to an edge res ource manager (ERM). The ERM is a plat- form that manages and leases QAM channel bandwidth for all applications: †¢ ERMI-1 is an interface for edge devices to register QAM channels to the ERM and notify the ERM of any QAM failures or state changes. †¢ ERMI-2 is an interface for the ERM to bind the QAM resources from an edge device to the resource allocation request. †¢ ERMI-3 is an interface for the M-CMTS core to allocate QAM-channel andwidth from the ERM. Variable bit rate (VBR) video provides considerable bit saving compared to constant bit rate (CBR) video. WITH VBR statistical multiplexing, Cable Company can save as much as 30 percent of bandwidth by just varying the output data per time segment. Recently, DOCSIS 3. 0 was release to compete with Telco companies FTTx deployment and it is redefined the communication between cable modem (CM) located at subscriber premises and cable modem termination system (CMTS) at cable service provider’s network headend. D OCSIS 3. are design to allow channel bonding to boost up network throughput and number of bonded channel is usually 4 or 8. With DOCSIS 3. 0 standard, it can provide 300 Mbps download and 100 Mbps upload [8]. TABLE 3. DOCSIS 3. 0 Standards and Characteristics [pic] D) Netflix OTT IPTV System and Architecture Netflix is the leading provider of OTT on-demand internet video streaming in the US and Canada with more than 23 million subscribers. Netflix can stream out HD quality video with average bitrate of 3. 6 Mbps and it is single largest source of Internet traffic in the US by consuming 29. % of peak download traffic. [pic] Fig. 15. Netflix Architecture Designing large-scale network infrastructure to support fast growing video streaming platform with high availability and scalability is technically challenging. The Majority Netflix infrastructure used to be hosted in its own datacenter but recently resorted to the use of cloud services, Content Distribution Networks (CDNs), and other public computing services. Amazon AWS cloud is being utilized by replacing its in house IT infrastructure along with SimpleDB, S3 and Cassandra for file storage.Video streaming is distributed out of multiple content distributed networks (CDNs), UltraDNS, and a public DNS service is used as its authoritative DNS servers. Microsoft Silverlight is employed as the video playback platform for Netflix desktop users and Netflix manages to build its IPTV with little infrastructure of its own. †¢ Netflix data centers – Netflix uses its own IP address space for the host name www. netflix. com. This server primarily handles registration of new user accounts and captures payment information and redirect users to movies. etflix. com or signup. netflix. com. This server does not interact with the client when handling movie request and playback. †¢ Amazon Cloud service – Most of the Netflix servers are served from various Amazon cloud services and key functions are content ingestion, log recording/analysis, DRM, CDN routing, user sign-in, and mobile device support †¢ Content Distribution Networks (CDNs) – Netflix utilize multiple CDNs to deliver the video content to the subscriber. The encoded and DRM protected videos are stored in Amazon cloud and copied to CDNs.The three main CDNS are Akamai, LimeLight, and Level-3. These three servers provide same quality level content to all the subscribers. †¢ Player – Netflix employ Silver light to download, decode and play Netflix movies on desktop web browser. There are different players for mobile phones and other devices such as Wii, PS3, Xbox, Roku, etc. Netflix utilize Dynamic Streaming over HTTP (DASH) protocol for streaming. In DASH, each video is encoded at several different quality levels and is divided into small chunks. The client requests one video chunk at a time via HTTP.With each download, it measures the received bandwidth and runs a rate determination algorithm to deter mine the quality of the next chunk request. It allows the player to freely switch between different quality levels depending on the bandwidth of subscriber. TABLE 4. KEY NETFLIX HOSTNAME [pic] Netflix Client player have many functions to improve its performance and quality of experience (QOE). Netflix video streaming is controlled by instruction in a manifest file, which Silverlight client downloads. This metafile provides the DASH player metadata to conduct the adaptive video streaming capability.It is client-specific and generated according to each client’s playback and bandwidth capability. It is in XML format and contains several key pieces of information including list of the CDNs, location of trickplay data, video/audio chunk URLs for multiple quality level, and timing parameters such as time-out interval, polling interval and other data to provide QoE to users. Manifest files ranks CDNs to indicate which CDNS are preferred for content delivery. Trickplay is achieved by downloading a set of thumbnail images for periodic snapshot during network congestion [15]. IPTV multicasting protocolIn early IP networks, a packet could be sent either in unicast (single device) or broadcast (all devices). With multicast, single transmission for a group of devices is possible. Multicast transmissions enable efficient communication between groups of devices by allowing Data to be transmitted to a single multicast IP address and received by the group of interest. Multicast over IPTV network presents many challenges related to reservation of resource and maintaining quality of experience (QoE). Backbone can be built based on IP/MPLS and the routers can be enabled for multicast using IGMP protocols.Before going into detail of multicast protocol in IPTV, we will discuss multicast protocol in detail and how it can help IPTV through multicast mechanism. TABLE 5. IGMPV2 AND IGMPV3 MAJOR DIFFERENCE [pic] The IGMP was defined to allow a host computer to select a stream fro m a group of multicast streams a user request. Following is the basic functions IGMP protocol: †¢ Join: an IGMP host indicates that it wants to receive information from a multicast group to become a member. †¢ Leave: An IGMP host indicates that it no longer wishes to receive information from a multicast group. Query: An IGMP router can ask the hosts which groups they are member of. This is done to verify a JOIN/LEAVE request or to look for error conditions. Queries maybe be: o Specific Query: Asks whether the host is a member of a specific multicast group o General Query: Asks the host to indicate all groups that it belongs to †¢ Membership Report: an IGMP host tells the IGMP host what group it belongs to. This report can be either: o Solicit Membership Report: Sent in response to a QUERY o Unsolicited Membership Report: initiated by the client.In the IPTV network, each broadcast TV channel is an IP multicast group. The subscriber changes the channel by leaving one gr oup and joining a different group. IGMPv1 is not suitable for IPTV because it does not include an explicit â€Å"Leave† capability. The client will continue to receive all requested stream until the multicast router issues next query. The standard for IGMPv2 and IGMPv3 major difference is shown in Table 5. IGMPv2 supports Any Source Multicast (ASM) networks and which allows host to specify which multicast group it wishes to join.Most deployed IPTV clients supports IGMPv2. The Major enhancement in IGMPv3 is that it allows Support Specific Multicast (SSM). Host can specify the source address it wants to listen to. Here’s basic IGMP operation involving two devices: †¢ IGMP host (client or STB) – issues messages to join or leave a multicast group. The client also responds to queries from the multicast router. †¢ IGMP router – responds to the join and leave messages to determine if multicast groups should be forward out an interface. Periodic queries are used to discover from error conditions and verify requests.The IGMP router receives multicast groups either through the use of a multicast protocol such as PIM or static flooding. It is the termination point for IGMP messages and does not send any IGMP information to its upstream neighbors. [pic] Fig. 16. DSL Access Network IPTV Service In xDSL IPTV architecture, the subscriber initiates channel change requests and responds to status inquiries. The Routing Gateway (RG) at the subscriber’s site and DSLAM aggregate traffic from multiple subscribers in order to act on request from the STB.However, IGMP networks were not originally designed to have networking equipment between IGMP client and the IGMP routers. This creates some challenges to the multicast implementation: – Excessive multicast traffic: When delivering high bandwidth IPTV over broadband network, it is important to ensure that IPTV channels are forward only to those subscriber currently viewing them sinc e bandwidth is scarce. If the intermediate devices are unaware of IGMP flows then all multicast traffic is broadcast out all ports – Excessive IGMP traffic: Extra bandwidth is consumed as IGMP flows are broadcast to across the network.A single STB IGMP request can result in responses from thousands of IGMP peer clients. – Excessive time to Leave a group: With small spare bandwidth in broadband networks, Leave request often must be processed before additional join request can be served. To mitigate above challenges, several techniques are proposed and developed in intermediary devices: Local Replication, Proxy routing, Proxy Reporting, and Immediate Leave. Local replication, IGMP snooping from DSLAM, allows DSLAM to inspect incoming IGMP Join and Leave request and take appropriate action.If the channel being requested to view is already being received at the DSLAM, it will replicate the stream and forward to the subscriber. The DSLAM builds a table to track which channe l are being forwarded to each port. [pic] Fig. 17. DSLAM with IGMP Snooping Proxy routing works by allowing intermediate device (DSLAM) takes active role of terminating all IGMP flows. This makes DSLAM to act as IGMP host and responds to all incoming requests. DSLAM will recreate the IGMP request and use its own IP address as source.The major benefit of proxy routing is scaling since router is not aware of individual subscribers. [pic] Fig. 18. IGMP Proxy Routing Proxy Reporting reduces the number of IGMP packets flowing across the network by selectively dropping IGMP packets that are not need to be forwarded. The Proxy Reporting can be subdivided to two categories: Query Suppression and Report Suppression. Query Suppression reduces traffic between the DSLAM and the subscriber premises by having the DSLAM intercept and respond to IGMP queries sent by the router.DSLAM will never send a specific query to any clients and forward general queries only to those client receiving at least o ne multicast group. [pic] Fig. 19. Query Suppression. Report Suppression reduces traffic from DSLAM to the router by having DSLAM aggregate the response. The DSLAM can intercept IGMP reports coming from STB and forwards a summarized version to the IGMP router only when it is necessary. There are two categories of reports. Unsolicited membership reports are forward when first subscriber joins a multicast group or last subscriber leaves a multicast group.This tells router to begin or stop sending channel to this DSLAM. Solicited membership reports are forward once per multicast group. The DSLAM will aggregate multiple responses together into a single membership report to save bandwidth. [pic] Fig. 20. Report Suppression Immediate leave alleviate IPTV challenge to change channel rapidly. The standard IGMP Leave operation for channel change is as follow: – The STB sends a request to leave one multicast group – Router responds by issuing Membership Query to confirm the requ est. The STB responds with a Membership Report which does not include the multicast group By implementing immediate leave, STB can leave the multicast group by just simply sending a request to leave one multicast group [16]. [pic] Fig. 21. Standard IGMP Leave and Immediate Leave. The emerging IPTV deployments utilize Real-time Transport Protocol (RTP) in order to deliver media content. Unlike UDP, RTP protocol can provide sequence numbers to maintain packet ordering and detect losses, and timing information to determine network delay and synchronize timing between senders and receivers.RTP control protocol maintains session state between senders and receivers and report sender and receiver statistics bi-directionally [17]. The rapid acquisition is illustrated in the Fig 22 flow diagram below. [pic] Fig. 22. Rapid Acquisition Flow Diagram 1) The RTP receiver sends a Multicast Leave message to its upstream multicast router to leave the current multicast session and end the currently v iewed channel. 2) The RTP receiver sends a feedback message to the feedback target asking for rapid acquisition for the session it wants to join. In this feedback message, the RTP receiver can specify its specific requirements. ) The retransmission server receives the feedback message and decides whether or not to accept the request. If the retransmission server accepts the request, it sends a message to the RTP receiver that describes the burst that the retransmission server will generate and send, including the indication when the RTP receiver should join the new multicast session. The unicast burst stream consists of retransmission of a specific block of packets which will allow the RTP receiver to begin displaying video without waiting for a certain random access point to arrive in the multicast flow.If the retransmission server denies the request, it informs the RTP receiver immediately. 4) If the retransmission server accepts the request, it transmits the unicast burst data an d any additional message(s) needed to carry the key information about the new channel. The key information is used to prime the decoder inside the IPTV STB so that it can start decoding sooner. The unicast burst continues at a higher than natural rate until the unicast burst catches up with the real-time multicast flow. The sustainable burst rate depends on the access network link characteristics. ) At the appropriate moment (as indicated or computed from the burst parameters), the RTP receiver joins the new multicast session by sending a Multicast Join message to its upstream multicast router. 6) The RTP receiver starts receiving the multicast flow and completes the rapid acquisition. The STB will not join multicast session immediately with rapid acquisition since there would not be enough available left over on the access link. By utilizing unicast burst sent from the retransmission server o catch up with the multicast flow in a reasonable amount of time before joining to multicas t group allows faster channel switching capability rather than joining multicast group immediately [18]. Cloud Computing service in IPTV IPTV videos can be delivered to subscribers through various different network structures. For many years, Proxy servers have been utilized to decrease network traffic and delays through high speed and robust connection. Telco companies are looking for ways to keep service calls rejections to minimum through cloud service for on-demand IPTV service. Figure below shows on-demand IPTV service for cloud architecture. pic] Fig. 23. On-demand IPTV cloud services Video can be streamed from any of the virtual servers by load balancing among server and handle peak loads by avoid overload to achieve continuous, high utilization levels of servers. Virtual servers can provide low cost computing resources. The Virtual server acts like a dedicated server but it co-reside on a single physical machines acting as multiple physical dedicated server. However, if too many virtual servers reside on the single physical machine, services may face problem due to scarce computing resource per virtual server.Virtual storage through cloud computing allow easy share of resources among themselves. Physical storage is virtualized into virtual disk, which allows storage consolidation across heterogeneous vendors and protocols, enabled by dynamically growing and shrinking of storage through live migration, in the enterprise storage area network to be used by applications [22]. F uture application of IPTV The key to differentiating IPTV from traditional TV service of VOD and Network-based personal video record (nPVR) is the real-time interactive application and social TV.With FTTx or Gigabit Ethernet providing more bandwidth in broadband network allows new killer application to maximize the value of the IPTV service. A) SayUTV SayUTV service allows users’ participation into TV sports, discussion, variety show, and so on. SayUTV allow mixing their vide o and sources into provider’s content to allow maximum interactive and customize IPTV content. The subscriber can click participation button on SayUTV GUI. After service provider or host of the content allows his/her participation, the subscriber’s audio and video content is mixed into program’s content.All the viewer of the content can view the participant’s image and voice. [pic] Fig. 26. SayUTV Service System Architecture SayUTV service divides the role of users into three major roles: †¢ Controller – who creates a service session and has a control over that session. †¢ Participants – who joins the session and contributes his/her own multimedia content. †¢ Simple Viewer – who enjoys this service in a passive way [pic] Fig. 27. SayUTV Implementation. SayUTV is an advanced IPTV service, which combined with bidirectional multimedia communication technologies allowing interactive user-participation [20].B) IPTV Interacti ve Online Shopping In order for IPTV service provider to maximize the profit from IPTV service require smart ad insertion based on customers’ preference. TV series and sports media are well known for effective product advertisement aid. Apparels worn by a main actress of TV series or MVP sports athletes have greater potential for larger sales than conventional display by online shopping website. In order to provide customer’s shopping craving while watching TV series or sports event is to add additional information to the product description field such as TV series name, and character or athletes name.This will allow customers place some tags on that particular product through watching particular TV series or service provider can collect customers’ preference based on content and insert smart ad targeting each subscriber. [pic] Fig. 28. Shopperama Service Screen in Korea Shopperama is OTT provider in Korea providing series, which have broadcasted through a TV st ation, online along with smart ad insertion. The apparels worn by main actors and products inside the episode are displayed in a synchronized manner with video content as shown in Fig 25.This allows customer to shop for products very easily while watching TV series and reduce customer’s burden of trying to find particular product [21]. To improve interactive online shopping with IPTV service still needs many enhancements to fully flourish in E-business model. Behavior targeting content to users is estimate to be 20 billion dollar industry and in order for IPTV interactive online shopping to gain market share requires smart integration of cross layer platforms. C) Final Remarks With IPTV service deployment, Cable Company is afraid of cord-cutting case.The IPTV service is gaining popularity amongst consumer and there are many opportunities for new killer application to integrate with IPTV service. In this paper, we described current IPTV architecture in the market and presented recent efforts to improve IPTV technology. Emerging IPTV mobile systems are also gaining a lot of attention and consumer trends demonstrate that IPTV will continue to be in demand. Acknowledgment I would like to thank Prof. G K Chang for giving me an opportunity to work on this topic and learn more about multicast protocol to provide IPTV service.I was able to learn more about IPTV architecture and current trend in network research in video streaming protocol. References 1] â€Å"IPTV and the Future of Video Services† [online] Available: http://www. employees. org/~acbegen/files/IPTV_Tutorial_CCNC_2010_abegen. pdf 2] â€Å"U. S. Multichannel Subscriber Update and Geographic Analysis,† white paper, SNL Kagan, Dec. 2012. 3] Ali C. Begen, â€Å"Error control for IPTV over xDSL networks,† in Proc. IEEE Consumer Communications and Networking Conf. (CCNC), Special Session on IPTV Technologies and Applications, Las Vegas, NV, Jan. 008 4] A. Yarali and A. Cherry, †Å"Internet Protocol Television (IPTV). † In TELCON 2005 2005 IEEE Region 10, 2005, pp. 1-6. 5] Doverspike, R. ; Guangzhi Li; Oikonomou, K. N. ; Ramakrishnan, K. K. ; Sinha, R. K. ; Dongmei Wang; Chase, C. ; , â€Å"Designing a Reliable IPTV Network,† Internet Computing, IEEE , vol. 13, no. 3, pp. 15-22, May-June 2009 6] Finn, J. ; , â€Å"PON Technology in the Verizon Network,† Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE , vol. , no. , pp. 1-5, Nov. 30 2008-Dec. 4 2008 doi: 10. 1109/GLOCOM. 008. ECP. 1076 7] M. Abrams, P. C. Becker, Y. Fujimoto, V. O’Byrne, and D. Piehler,â€Å"FTTP deployments in the United States and Japan—Equipment choices and service provider imperatives,† J. Lightw. Technol. , vol. 23, no. 1, pp. 236–246, Jan. 2005. 8] CableLabs, â€Å"Modular CMTS Interfaces,† http://www. cablemodem. com/specifications/m-cmts. html 9] CableLabs, â€Å"Data Over Cable Service Interface Specificatio n,† http://cablemodem. com/ 10] CableLabs PacketCable, â€Å"PacketCable Multimedia Specification,†2005. 11] CableLabs, â€Å"Modular CMTS Interfaces,† ttp://www. cablemodem. com/specifications/m-cmts. html 12] CableLabs, â€Å"DOCSIS 3. 0 Interface Specification,† 2007. 13] CableLabs, â€Å"DOCSIS M-CMTS Downstream External PHYInterface Specification,† 2007. 14] Vasudevan, S. V. ; Xiaomei Liu; Kollmansberger, K. ; , â€Å"IPTV Systems, Standards and Architectures: Part II – IPTV Architectures for Cable Systems: An Evolutionary Approach,† Communications Magazine, IEEE , vol. 46, no. 5, pp. 102-109, May 2008 15] Adhikari, V. K. ; Yang Guo; Fang Hao; Varvello, M. ; Hilt, V. ; Steiner, M. Zhi-Li Zhang; , â€Å"Unreeling netflix: Understanding and improving multi-CDN movie delivery,† INFOCOM, 2012 Proceedings IEEE , vol. , no. , pp. 1620-1628, 25-30 March 2012 16] â€Å"Introduction to IGMP for IPTV Networks,† White Paper, Ju niper Network. , 2007 17] RFC 3550, â€Å"RTP: A transport protocol for real-time applications. † [Online]. Available: http://www. ietf. org/rfc/rfc3550. tx 18] Mignon, M. ; Bouckhout, K. ; Gahm, J. ; Begen, A. C. ; , â€Å"Scaling server-based channel-change acceleration to millions of IPTV subscribers,† Packet Video Workshop (PV), 2012 19th International , vol. no. , pp. 107-112, 10-11 May 2012 doi: 10. 1109/PV. 2012. 6229721 19] Phooi Yee Lau; Sungkwon Park; Joonhee Yoon; Joohan Lee; , â€Å"Pay-as-you-use on-demand cloud service: An IPTV case,† Electronics and Information Engineering (ICEIE), 2010 International Conference On , vol. 1, no. , pp. V1-272-V1-276, 1-3 Aug. 2010 20] Park, I. K. ; Seung Hun Oh; Sim Kwon Yoon; Ho Young Song; , â€Å"An implementation of user-participated interactive IPTV service system,† Consumer Electronics, 2008. ISCE 2008. IEEE International Symposium on , vol. no. , pp. 1-3, 14-16 April 2008 21] Jonghoon Chun; , â€Å"In teracitve Online Shopping Innovation,† Computers, Networks, Systems and Industrial Engineering (CNSI), 2011 First ACIS/JNU International Conference on , vol. , no. , pp. 104, 23-25 May 2011 22] Phooi Yee Lau; Sungkwon Park; Joonhee Yoon; Joohan Lee; , â€Å"Pay-as-you-use on-demand cloud service: An IPTV case,† Electronics and Information Engineering (ICEIE), 2010 International Conference On , vol. 1, no. , pp. V1-272-V1-276, 1-3 Aug. 2010

Sunday, November 10, 2019

Huck finn essay

Houck Finn was designed to portray the realist aspect of life. Twain intended to make The Adventures of Huckleberry Finn to satirized life in the South and the change from slavery to equality. Houck Finn is a perfect example of our abhorrent past, and for that reason, it should be a book that is not ignored in the classroom. Houck Finn should definitely be used for an educational purpose because Twat n used it to show us that a black and white person could work together in order to ache eve a common goal during the time.In his novel, Twain uses the â€Å"unworn† in casual dialogue † s a way to underscore the chilling truth about the old South, that it was a society where perfectly â€Å"nice† people didn't consider the death of a black person worth their notice. † (Sale n) Houck Finn starts out believing that slavery is a part of the natural order, but as the story goes on, Houck wrestles with his conscience, deciding that he would rather be â€Å"damned to the e flames of hell rather than betray his black friend. (Salient) The book is nothing less than free doomed and a quest in finding freedom. Students should be able to read Houck Finn in a class room environment because education â€Å"should not always be painless. † (Chadwick shush) Issues of sexuality, race, politics, and religion frequently come up in literature. When these subjects are brought up, many people feel under â€Å"attack† by the topic. â€Å"All the same, w e cannot let ourselves shy away from the uncomfortable purely because it hurts.Ignoring the problem of racism won't make it go away; it needs to be confronted and dealt with in a re spoonbills and informed manner. Without the historical and literary background, it is practical Ill impossible to find a solution. (Shepherd) We shouldn't close our eyes and pretend that race SMS never existed. We should face the fact instead of fighting it because it is a part of oh r history. Houck Finn allows us to see the views of black people from a white, southern boy.Of r example, when Jim gets mad at Houck for lying about his dream, Houck feels bad. He stats sees that â€Å"it was fifteen minutes before I could work myself up to go and humble myself to a in egger. † Houck wasn't happy about having to apologize to a black man, but he did it anyways. This shows that he is beginning to understand that the person he once saw as property, as feelings to. Throughout the rest of the novel, we can see how Houck starts to see that Jim s as equal off human being as Houck is.It is impossible to read Houck Finn without understand ding that the novel is based on historical and literary context of racism. In today's society, many high schools are racially mixed, so when classes dive I onto The Adventures of Huckleberry Finn , if teachers don't confront the issue of the novel's use of the â€Å"unworn†, its bound to be taken offensively. â€Å"Despite the fact that is it the most taught t novel and most taught work of American literature in American schools from j noir high to graduate school, Huckleberry Finn remains a hard book to read and a hard boo k to teach. (Fishing) Houck Finn uses the â€Å"unworn† over 200 times and a teacher would find it â€Å"extremely difficult, if not, impossible†¦ † (Foley) to teach the novel in a predominantly black k classroom; and the offensive language in the book certainly makes it a difficult book to re ad. Some might argue that by reading this book and its racial slurs, â€Å"impressions can be made that such racist actions are all right or allowed. † (Massed) Many people say that Twain's use of the â€Å"unworn† an influence our students today to think that it is okay to use.If this is the ca SE, â€Å"all students should have the right to an education free of any form of discrimination, racial I hostility, degradations all should have the right to feel like human beings in the class groom. † (Monitor) Overall, students should not be forced to read Houck Finn because t he â€Å"unworn† brings up vulgar images of the past and can promote a negative image on blab KC people, making them â€Å"cheap slavery stereotypes. † (Salient) After reading Houck Finn, I believe it all comes down to how the teacher paper aches he novel.

Thursday, November 7, 2019

Pyrmaids essays

Pyrmaids essays Throughout the ages, people of the world have been perplexed by the pyramids of Egypt. This great wonder of the world has always interested me, as it has others. One question that arises is that, who, why, and how were the pyramids built. There are many hypotheses for this perplexing question, but three main ones are brought forth: they were made for tombs of pharaohs, aliens built them, or its a passage to and from planet to planet. The first and most well known hypothesis is that the Egyptians built the pyramids to house their pharaohs during their afterlife. This is taught in schools, it is read about, and seems the most logical and sane explanation for why the pyramids were built. In my opinion this is the truth and is the right answer to the why the pyramids were built. I dont really see what other explanation would work. There is so much evidence that points to this hypothesis. Such as, that the Egyptians made the pyramids because many of the tools have been found. It is said that Egyptians didnt have the tools to make the pyramids, obviously, this is false. The Egyptians have a history that supports why they built the pyramids, they thought that by making the pyramid they could go to the afterlife as well as the pharaoh. That is why this hypothesis is the most well known and excepted, as it has a right to be. The second reason is that alien architects built the pyramids. It is said that they built pyramids to line up with the stars of Orions belt. Okay, why did they build them on Earth? It really makes no sense to me, but a lot of people actually believe this hypothesis. There is a lot of evidence such as; that if a diagonal line is extended North-East and North-West of the pyramid, the lines incorporate the Nile river neatly and entirely. Another piece of evidence is that the pyramid is lined up exactly to the magnetic North pole. They say coin ...

Tuesday, November 5, 2019

How to Increase Concentration (Studying Hack)

How to Increase Concentration (Studying Hack) The life of a student is great. You have the freedom to learn, to grow, to find yourself, hang out with your friends. Now if only you could skip over the actual studying part you might be on to something! School work is real work, and sooner or later you are going to have to buckle down and get your grey matter in gear and do some serious studying. When you need to buckle down, the ability to concentrate is an important one. If you are used to the noise of the Internet and gadgets, where you get things popping up at you right away with little to no waiting, having to sit down and focus on studying can seem like a real chore. Not to worry, help is at hand. Since you know you have to study or run the risk of flunking out of school, here are some suggestions to help you buckle down and improve your ability to concentrate when it matters: Start by getting organized Make sure that you have all the materials you need in one location. If you have to get up to go look for books or papers, concentration-killer. It will also mean that you will be spending a lot more time studying or working on your assignment than if you got organized right away. Make sure your environment is comfortable If the room is too hot or too cold, you wont be able to work effectively. Are you hungry or thirsty? Make necessary adjustments to your environment and look after these basics before you get started. You wont do your best work if you are listening to your stomach rumble. Its a good idea to have a bottle of water with you so that you can stay well hydrated while you are working. Remove distractions from your desk Take everything off your desk except for the coursework or study materials you are dealing with right now. Place other books or papers on the floor or in another location for the time being. You need to give this subject your full attention. Use your course outline as a guide If you arent sure where to start tackling the material you should be studying, pull out your course outline. Use it to give you some structure around where to start in your studying. It will list the main units that the course covers. Once you have the main units listed, you can start making a list of each chapter or section your instructor has covered. Then start filling in smaller pieces until it starts to make more sense. You should be able to see a pattern emerge as you go through this process. Try to find something interesting about the course material You may not find a course particularly interesting, but if you do some digging you should be able to find some nugget of information that is interesting about the topic. You have to do the work of studying anyway and for some courses this is going to be a stretch, but try to put the best face on the experience that you can. Dont worry about your school performance If you are worried about not doing well in your studies, you will find it very difficult to stay focused on anything you are trying to read or write. The harder you try, the more you will feel bogged down in the exercise. Try taking a few deep breaths to clear your mind and help you feel ready to settle down to work. A good technique to try is inhaling for three seconds, holding your breath for three seconds, and exhaling for three seconds. This will give you time to slow down any racing thoughts and a too-rapid heartbeat. Once you feel more centered, it will be easier for you to take in the ideas you are trying to learn. Take a break when you feel you need one If your mind starts wandering and you cant stay on topic, look at your watch. If you have been working diligently for a couple of hours without a break, get up and stretch. Have something to drink. Eat a snack or a meal if you are hungry. Give yourself a limited time to recharge and then sit back down to work so that you can concentrate anew.

Sunday, November 3, 2019

State Judicial Systems Essay Example | Topics and Well Written Essays - 500 words

State Judicial Systems - Essay Example This is because helmets are said to reduce the number of brain injuries, lower the risks of cervical spine injury which can lead to paralysis and death when an accident occurs. Almost eighty percent of all motorcycle crashes lead to injuries or death. Head injury is the leading cause of these deaths (Gostin, 2008). However, in as much as there are many advantages of using a helmet, some few people, especially women passengers will not want to use it because of the fear of messing their expensive hairstyle. Skin deceases may also spread as a result of these helmets, but these few issues should not blind us from curbing the main cause problem which is death. When this bill will be passed into law, the law will influence people to use helmets and therefore reduce motorcycle fatalities. A bill requiring corporations that produce food or beverages for public consumption to place warning labels on products known to contain cancer causing agents should be passed into law. This should be in accordance to The Safe Drinking and Toxic Enforcement Act of 1986 which states that the warning must be placed on products containing lead and other hazardous substances found to cause cancer, birth defects and reproductive harm (Gostin, 2008). These warning labels will enable people to avoid those products that they perceive to cause problems with their health. In as much as most corporations will see this as a way of reducing their sales, the citizens of the nation have the right to correct the information. They should also make free decisions without influence from deceptive advertisement. The bill requiring couples to undergo twelve hours of psychological counseling before being given a marriage license is a good bill. Counseling to couples is important because it will open up their eyes on what is expected of them in marriage (Gallo, 2004). However, this bill can be inconveniencing to some people. Twelve hours of counseling is a lot of time and

Friday, November 1, 2019

Implications of Scapegoating Groups Essay Example | Topics and Well Written Essays - 1750 words

Implications of Scapegoating Groups - Essay Example The main feature of scapegoating is distortion of information. Implications Scapegoating aims toward many individuals today and affects roughly everyone in a way or another. According to Douglas (2000), scapegoats can be under attack due to characteristics common to such individuals. They can plainly face attack from traits they cannot control, for instance, their ethnicity or race. An apparent, but main consequence of scapegoating is unfairness toward minority groups. This act is a problem since it can result in stereotyping, and result in biased and unjust handling of individuals for no genuine motives at all. The most scapegoated groups include alcoholics, atheists and communists. Stereotyping is an implicit manner of scapegoating since by building negative generalizations concerning a group of people, often there is blame on them for actions that are out of their personal control. For example, Hitler blamed minorities for troubles in Germany. In this situation, the Jews stereotyp ed as ignorant and consequently, able to receive the blame of the majority population. Another consequence of scapegoating is the frivolous court cases that are infesting the court system. Beside malpractice, court cases, these court cases illustrate how the society today considers that they deserve to litigate against anyone, and cannot take responsibility for any of the events that they create. It is also the situation in cases where people get scapegoating so extreme, that they abuse the court system. These people can alternatively use their nationality to elect into office legitimate legislative bodies and laws. They can employ the use of other forms like arbitration and mediation to arrive at agreements and apprehend a balance of the liability. The reality is that both the sides share liability, and one side cannot anticipate leaving all to the other. The aim in these court cases needs to be on either side is putting the blame incorrectly on the other party, which is most of th e times on the part of the complainant in these frivolous court cases. Scapegoating entails a frustrated, disorganized society united in faulting a victim for their misgivings and taking out their hate and violent emotions on the victim or group. This incident, frequently seen emerging in crowds, for example, chanting in opposition to a character or event, burning effigies, and observable among the police in instances of arresting is a token menace. In a condition where a multitude is outrageous for unfairness they are experiencing and aggravated that their communication is not getting in to the public, media or politicians, they could create scapegoats of administrative officers or even journalists. The scapegoat is the individual who intimidates the safety of the group resulting in fear of losing their identity. The individuals become a risk to the intelligence of justice of the group resulting in resentment and a danger to the connectedness resulting in a sense of grief. The deed distorted, differences not acknowledged, the group considered as disjointed, and stability threatened. This implies that the human identity desires of the society are in jeopardy. As a result, the society turns towards those they can blame. It is also possible that police officers become the scapegoat for the multitude and possibly for