Saturday, December 28, 2019

The Handmaid s Tale By Margaret Atwood Essay - 1148 Words

Ni-Robi McNair Cuny Ela- Ms. Milliner EES21QH-09 October 19, 2016 In the society that we reside in today our voice is a source of power and our words allow us to have a say in our lives especially for the female population. Many years ago a woman s voice was to be kept at a whisper if even heard at all. We had no opinion on who we wanted to be or on how the world saw us. We were simply women who took care of the children, cooked, cleaned, and catered to the men of our home. But we broke out of that silence and women created a name for themselves, Independent. We could do anything a man could do and maybe even better and we have now lived in that freedom for many years. But author of the novel, â€Å"The Handmaid s Tale,†Margaret Atwood pulled her readers attention showing them a world in which the woman s voice was again taken away. Atwood revealed how powerful the voice is. In this novel women no longer have a say in what happens to them or their bodies. They were forced to bare the children of the men they are assigned to and were stripped away from their past lives. The only key to a small piece of freedom was through their language, through their use of words to paint a different picture than the one in front of them. That is what main character Offred did to survive the world she was living in. She paints pictures with her words and even though she did not have power over her circumstance her words gave her an escape from everything. It gave an escape for all theShow MoreRelatedThe Handmaid s Tale By Margaret Atwood1357 Words   |  6 PagesOxford definition: â€Å"the advocacy of women s rights on the ground of the equality of the sexes† (Oxford dictionary). In the novel The Handmaid’s Tale, Margaret Atwood explores feminism through the themes of women’s bodies as political tools, the dynamics of rape culture and the society of complacency. Margaret Atwood was born in 1939, at the beginning of WWII, growing up in a time of fear. In the autumn of 1984, when she began writing The Handmaid’s Tale, she was living in West Berlin. The BerlinRead MoreThe Handmaid s Tale By Margaret Atwood1249 Words   |  5 PagesDystopian Research Essay: The Handmaid’s Tale by Margaret Atwood In the words of Erika Gottlieb With control of the past comes domination of the future. A dystopia reflects and discusses major tendencies in contemporary society. The Handmaid s Tale is a dystopian novel written by Margaret Atwood in 1985. The novel follows its protagonist Offred as she lives in a society focused on physical and spiritual oppression of the female identity. Within The Handmaid s Tale it is evident that through the explorationRead MoreThe Handmaid s Tale By Margaret Atwood1060 Words   |  5 Pagesideologies that select groups of people are to be subjugated. The Handmaid’s Tale by Margaret Atwood plays on this idea dramatically: the novel describes the oppression of women in a totalitarian theocracy. Stripped of rights, fertile women become sex objects for the politically elite. These women, called the Handmaids, are forced to cover themselves and exist for the sole purpose of providing children. The Handmaid’s Tale highlights the issue of sexism while also providing a cruel insight into theRead MoreThe Handmaid s Tale By Margaret Atwood1659 Words   |  7 Pagesbook The Handmaid s Tale by Margaret Atwood, the foremost theme is identity, due to the fact that the city where the entire novel takes place in, the city known as the Republic of Gilead, often shortened to Gilead, strips fertile women of their identities. Gilead is a society that demands the women who are able to have offspring be stripped of all the identity and rights. By demeaning these women, they no longer view themselves as an individual, but rather as a group- the group of Handmaids. It isRead MoreThe Handmaid s Tale By Margaret Atwood1237 Words   |  5 Pages The display of a dystopian society is distinctively shown in The Handmaid’s Tale, by Margaret Atwood. Featuring the Republic of Gilead, women are categorized by their differing statuses and readers get an insight into this twisted society through the lenses of the narrator; Offred. Categorized as a handmaid, Offred’s sole purpose in living is to simply and continuously play the role of a child-bearing vessel. That being the case, there is a persistent notion that is relatively brought up by thoseRead MoreThe Handmaid s Tale By Margaret Atwood1548 Words   |  7 PagesIn Margaret Atwood’s The Handmaid’s Tale, The theme of gender, sexuality, and desire reigns throughout the novel as it follows the life of Offred and other characters. Attwood begins the novel with Offred, a first person narrator who feels as if she is misplaced when she is describing her sleeping scenery at the decaying school gymnasium. The narrator, Offred, explains how for her job she is assigned to a married Commander’s house where she is obligated to have sex with him on a daily basis, so thatRead MoreThe Handmaid s Tale, By Margaret Atwood1629 Words   |  7 Pages Atwood s novel, The Handmaid s Tale depicts a not too futuristic society of Gilead, a society that overthrows the U.S. Government and institutes a totalitarian regime that seems to persecute women specifically. Told from the main character s point of view, Offred, explains the Gilead regime and its patriarchal views on some women, known as the handmaids, to a purely procreational function. The story is set the present tense in Gilead but frequently shifts to flashbacks in her time at the RedRead MoreThe Handmaid s Tale By Margaret Atwood1256 Words   |  6 Pageshappened to Jews in Germany, slaves during Christopher Columbus’s days, slaves in the early 1900s in America, etc. When people systematically oppress one another, it leads to internal oppression of the oppressed. This is evident in Margaret Atwood’s book, The Handmaid’s Tale. This dystopian fiction book is about a young girl, Offred, who lives in Gilead, a dystopian society. Radical feminists complained about their old lifestyles, so in Gilead laws and rules are much different. For example, men cannotRead MoreThe Handmaid s Tale By Margaret Atwood1540 Words   |  7 Pages Name: Nicole. Zeng Assignment: Summative written essay Date:11 May, 2015. Teacher: Dr. Strong. Handmaid’s Tale The literary masterpiece The Handmaid’s Tale by Margaret Atwood, is a story not unlike a cold fire; hope peeking through the miserable and meaningless world in which the protagonist gets trapped. The society depicts the discrimination towards femininity, blaming women for their low birth rate and taking away the right from the females to be educated ,forbidding them from readingRead MoreThe Handmaid s Tale By Margaret Atwood1667 Words   |  7 Pagesrhetorical devices and figurative language, that he or she is using. The Handmaid’s Tale, which is written by Margaret Atwood, is the novel that the author uses several different devices and techniques to convey her attitude and her points of view by running the story with a narrator Offred, whose social status in the Republic of Gilead is Handmaid and who is belongings of the Commander. Atwood creates her novel The Handmaid’s Tale to be more powerful tones by using imagery to make a visibleness, hyperbole

Friday, December 20, 2019

Trans Between Trans And Trans Students - 1585 Words

Historically, trans students have had a difficult time in having adequate bathroom access. Many schools do not have policies that allow trans students to use the bathroom that matches their gender identity. This creates a difficult learning experience for the trans student, because they are put into uncomfortable situations. Trans students are more often than not to use the bathroom and locker that matches their biological sex and not their gender identity. They are then placed into a bathroom that is not for their gender, it is the same as forcing a man to use the women’s restroom. It further enforces that there is a gender binary, that is a socially accepted norm, and that trans students are not a part of it. Students should all feel†¦show more content†¦By revoking the Obama Administration’s ruling on the matter, of bathroom access, President Trump is causing more harm to those 150,000 students than good. Ethics Involved. Ethics play an important role in leadership, they allow for service organizations to work towards the common good. (Manning, 2003). What is a social good? â€Å"The social goods produced through the human service sector strengthen individuals, families, organizations, and communities through the services provided in health and mental health care, education, social welfare, criminal justice, and many other fields of practice† (Manning, 2003). Where do ethics come into play for the transgender students, who no longer have adequate bathroom and locker room access? Who decides what is ethical when decisions like this are made? In this case it is President Donald Trump is the leader. It is the responsibility of the leader to make ethical decisions that benefit the good in society. (Manning, 2003). When President Trump made his ruling to make trans bathroom access in schools a state decision instead of a federal one, he is putting 150,000 students in harms way. Now that trans bathroom access in schools is in the hands of the state, it is now their responsibility to shoulder the blame for the consequences of the removal of trans students from Title IX. By not allowing trans students proper bathroom and locker roomShow MoreRelatedWhy Gender Neutral Restrooms Are A Controversy1387 Words   |  6 Pagescontroversy. This controversy stems from the trans* rights movement’s desire for safety and acceptance. Trans*, short for transgender, is an umbrella term that is used to describe people who identify as a gender they were not assigned at birth, this includes female to male, male to female, agender, and non-binary individuals while cisgender, cis for short, is used to describe someone who identifies with the gender they were assigned at birth. Some trans* individuals many pass as their identified genderRead MoreHow Schools Deal Have Dealt With Issues Regarding Gender Diversity1727 Words   |  7 Pagesacross the generations?† Primary and secondary research has been conducted to examine schools’ behaviors regarding gender diversity/norms. Secondary research included a paper from BeyondBlue studying Transgender Mental Health as well as interview from Trans people in the public eye, like Laverne Cox and Caitlyn Jenner. Primary research included a questionnaire sent out to Generation X and Generation Z to obtain quantitative data on the participants’ awareness of Non-Binary genders, as well as their experienceRead MoreA Large Issue Facing Trans Women894 Words   |  4 PagesA large issue facing trans women today is the violence perpetrated against them. In 2003, fourteen murders of trans people were recorded in the U.S, most of them being trans women and people of color. (Bettcher, p. 280) By mid-October of 2015, twenty-one trans women, who were also mostly women of color, were murdered in the United States, and this number exceeds the amount of trans murders in 2014. (Wilkinson, â€Å"You Kno w What Time It Is†) It is important to remember that these are only recorded instancesRead MoreSynthesis and Ir Analysis of Trans-[Bis(Inosinato)Palladium(Ii)]833 Words   |  4 PagesSynthesis and IR Analysis of trans-[Bis(inosinato)palladium(II)] Abstract In this lab we synthesized trans-[Bis(inosinato) palladium(II)] for IR analysis. After completion of the reaction 84.4% of the product was collected. IR spectrum of the product and inosine was analyzed to determine how the inosine is bonded to the metal, palladium. From the IR analysis, it was determined that when inosine reacts with palladium, a shift of about 65 cm-1 in the carbonyl stretch was observed. Introduction: Read MoreRelationship Between Depression And Anxiety980 Words   |  4 Pagesdiscuss the relationship between depression and anxiety in transgender people. For this paper I am using Transgender to mean: â€Å" a term used to describe people whose gender identity differs from the sex the doctor marked on their birth certificate.† (Gladd.org) The reason I chose this social issue is with modern media with individuals such as Caitlyn Jenner and shows like Orange is the New Black; we are learning more about Transgender. I wanted to learn more about Trans-people and discovered manyRead MoreObesity And Its Effects On Children1643 Words   |  7 PagesObesity costs Canada billions of dollars in health care per year (Tran, Ohinmaa, Kuhle, Johnson, Veugelers, 2014). Obesity impacts individual’s ability to participate in and contribute to society fully due to the psychological and physical consequences, such as cardiovascular disease, type 2 diabetes, and some types of cancers (Tran et al., 2014). Risk factors for obesity include poor eating habits and a sedentary lifestyle (Tran et al., 2014). In an Alberta based study looking at the impact ofRead MoreFood Additives And Its Effects On The Modern World1660 Words   |  7 Pagesfood additives, food companies try to obtain as much profit as possible. From the perspective of suppliers, food additives apparently bring only benefits, but are there really no risks of the artificial chemicals? My research on the relationship between human health and food additives led me to one conclusion; intake of food additives deeply links to severe health problems. For example, in their collaborative study â€Å"Food Dyes A Rainbow of Risks,† Kobylewski and Jacobson present the results of experimentsRead MoreEthnic Family Research Summary : Dating1219 Words   |  5 PagesVietnamese families run true to their roots but have since developed a more modern attitude over the course of time. (Nguyen, 2008). There is an old ancient Vietnamese expression: â€Å"One drop of blood is much more precious than a pond full of water.† (Tran Phan, 2012, p. 206). This sentiment emphasizes the importance of placing value upon one’s relatives and family members within the Vietnamese culture regardless of who they are. When examining Vietnamese culture in its most traditional sense, a manRead MoreClients Rights and Counselors Responsibilities1254 Words   |  5 Pagesdisturb dance. The Relationship between gender based victimization and suicide attempts in transgender people has open up a variety of diversity within the counseling communities. The early experience of individuals who eventually identify as trans vary considerably and are influenced by individual, gender, ethnic ,racial, and class factors (Poteat, Mereish, DiGiovanni, Koening, 2011). Beemyn and Rankin (2011) describe the developmental processes among trans people. More than three- quarters ofRead MoreLeave the Past Behind Essay examples1511 Words   |  7 Pagesmatter of fact, the racial diversity in the world is increasing day by day. However, people just need to find out how to live comfortably with other of different history’s background. It is true that the process to overcome the past between nations and the discrimination between races takes an amount of time. Nevertheless, people nowadays are opening a new chapter of life. In reality, people all over the world now do not think abo ut the painful past, the war or whatsoever anymore; instead, they start to

Thursday, December 12, 2019

A Thanksgiving Experience Essay Example For Students

A Thanksgiving Experience Essay Coming to the United States as an international student from Sweden, I got introduced to many new traditions and holidays. Some of these holidays are also celebrated in Sweden, for example Christmas and Easter, even if we might celebrate them a little differently. But, I also got to experience new and different traditions. One of the new traditions I got to experience was how to celebrate a real American Thanksgiving. The first time I celebrated it, I was 17 years old and didnt think too much of it. Of course, I thought that it was nice to get some time off from school and have a delicious meal, but there wasnt much more to it than that. But now, a couple of years older, living on my own, far away from my family, Thanksgiving has gotten a whole other meaning to it, and I absolutely love this holiday. To me, Thanksgiving is a time to spend with the family, a time to show them how thankful you are for having them, and a time to tell them how much you appreciate them. Since my own family is in Sweden there was no question of where my boyfriend, Ryan, and me were going to spend Thanksgiving this year. His family lives in Connecticut so we packed our bags and flew up to the chilly but absolutely gorgeous little state in the North East. I have been there many times before and every time his parents welcome me with open arms, like I am one of their own. This makes me feel like I really am part of the family and that I belong there for this holiday. We stayed at their house and they served us like it was their job. On Thanksgiving Day we left for an early lunch at the Grandparents house and after that we went to the other Grandparents to have dinner. That way, we got to see the whole family on Thanksgiving Day, and that was our goal. Even if we had to spend some time driving around, it was well worth it as we got to see how our appearance made everybody feel happy. If our appearance made everybody else happy it was nothing compared to how it made us feel. Both Ryan, and me were ecstatic that we were able to come home and be with the family on this day and we were determined to show them how thankful we were for having them. But, Thanksgiving is not a time where you show other people your appreciation by buying them gifts, like you do for Christmas, so instead we tried to simply make sure that we acted, and told, everybody how thankful we were for having them. There are lots of ways you can show people you appreciation. This Thanksgiving, for example, I said a Swedish prayer before dinner, even though Im not very religious at all. But, Ryans grandfather was born in Sweden, and wished to hear some Swedish, so I thought it was a good opportunity to make him happy, and I was right. The only thing this old man wanted to talk about for the rest of the evening was my prayer. It was nice to see how something so simple could make someone so happy. Making people happy and show them how thankful you are for having them is nice, but I feel that the most important thing is to tell people that are close to you how much you love and appreciate them. Acting and telling people that are close to you, how much you love them are something you should always do, but somehow it seems to be easy to treat the ones you love carelessly every now and then. Therefore it is nice to have at least one day when you really think about how you act and what you say. Thanksgiving, I think, is a great opportunity for doing just that. When I woke up this Thanksgiving morning, the first thing I did was turning around, looking straight into Ryans dark brown eyes, and whisper: .ud3ccda66d4d5b741633e6575bf35647f , .ud3ccda66d4d5b741633e6575bf35647f .postImageUrl , .ud3ccda66d4d5b741633e6575bf35647f .centered-text-area { min-height: 80px; position: relative; } .ud3ccda66d4d5b741633e6575bf35647f , .ud3ccda66d4d5b741633e6575bf35647f:hover , .ud3ccda66d4d5b741633e6575bf35647f:visited , .ud3ccda66d4d5b741633e6575bf35647f:active { border:0!important; } .ud3ccda66d4d5b741633e6575bf35647f .clearfix:after { content: ""; display: table; clear: both; } .ud3ccda66d4d5b741633e6575bf35647f { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ud3ccda66d4d5b741633e6575bf35647f:active , .ud3ccda66d4d5b741633e6575bf35647f:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ud3ccda66d4d5b741633e6575bf35647f .centered-text-area { width: 100%; position: relative ; } .ud3ccda66d4d5b741633e6575bf35647f .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ud3ccda66d4d5b741633e6575bf35647f .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ud3ccda66d4d5b741633e6575bf35647f .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ud3ccda66d4d5b741633e6575bf35647f:hover .ctaButton { background-color: #34495E!important; } .ud3ccda66d4d5b741633e6575bf35647f .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ud3ccda66d4d5b741633e6575bf35647f .ud3ccda66d4d5b741633e6575bf35647f-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ud3ccda66d4d5b741633e6575bf35647f:after { content: ""; display: block; clear: both; } READ: stem cell research Essay I love you. Celebrating Thanksgiving is, for me, all about being with the family, showing them emotions. As I .

Wednesday, December 4, 2019

WAN Designing Multinational Grocery Chain

Question: Describe about the WAN Designing for a Multinational Grocery Chain? Answer: Introduction: with our modern era and havoc use of Internet, our modern communication has been facilitated and also offers advanced solutions to make transaction and other business processes much faster. Organizations and every individual in todays world are connected with each other via Internet withits different methodologies and topologies across the world. There are numbers of network topologies are used for different zones or part across the world those are used to connect different departments or parts of an organization located at different location. Those network topologies are namely WAN, MAN, LAN. There are numbers of network equipment are in use to connect different terminals with this type of network topologies. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet. All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively. Background: In previous times there are numbers of organizations across the world who were indulged in providing their information across the world some old methods such telegrams, sending letters through some recognized bodies or the organization. Though those methods take maximum of times to send some data or though bunch of papers or being present at different location form one geographic location at another geographic location (Chun, 2015). That has reinforced humans to focus upon different methodologies and technology driven aspect to adopt and on the other hand use of these technology driven systems have been instigated by the havoc use of internet. Nowadays numbers of organizations have adopted several technologies to connect their different portions of their organization with the help of LAN, MAN or WAN (Chtelain, Blanger, Tremblay, Gagnon Plant, 2009). These network topologies are much more useful connect different parts of the organization and share resources and file accordingly with in fractions of time. This system on the other hand helps to increase the use of system resource among several users by decreasing the cost of engaging same resources more than one. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet (Cuda, Indre, Le Rouzic Roberts, 2012). All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively (Deng et al., 2015). Different type of network design: There are numbers of network designs are there, for example, LAN, MAN and WAN. LAN is known as Local Area Network. LANs are connected within a limited geographical area. For example, use of network within the range of school, home, college and etc. Computers are situated within a limited area and linked with each other. LAN can be expanded over the limited distance, i.e. 1km in radius. It is possible to have communication between different terminals, i.e. form one computer to another computer (Faro, Giordano Spampinato, 2012). As all of the computers are connected with each other with different interface and port and there are no central computer hence all are able to play similar job. On the other hand LANs are usually self-owned, managed and controlled by a single expertise or by an organization. There are numbers of network equipment are in use for LAN deployment, those are routers, switches, bridges and repeaters. LAN helps to communicate with the user and to transfer files much faster. It is possible to connect a single LAN with the WAN or other LANs (Giuliano, Gordon, Pan, Park Wang, 2011). WAN is denoted as Wide Area Network. WAN are generally used to connect large geographically areas such as a continent and countries across the world. WANs are spread all over the world that may contain the 100000 kilometre radius that is between the earth and satellite. There few numbers of devices are used in WAN are modems, server and routers. WAN are used to connect different LANs and provide access to the computers or to the other equipments and resource those are outside the coverage area general LAN system (Hrehorowicz-Gaber, 2015). MAN is denoted as Metropolitan Area Network. MANs are used to connect several LANs in a common geographic region. MAN s can be expanded with within the range of 5 to 50 KM in diameter. MANs are not usually owned or deployed for a single organization rather they are owned by a group of users provided by a single network provider. Network providers sell services to a group of users. Man can be considered as the expanded version of LAN that will allow users form different groups to share their resources within a more expanded are compared to LAN (Ismail Said, 2015). Implementation plan: Suppose we have a grocery chain, CHILKART, CHILKART in US and its another branches are expanded across the different locations of Germany, Spain and India. To have a smooth flow of data across different parts of CHILLKART it is required to have the strong network infrastructure and to connect different parts of CHILLKART, no doubt it is required to have use of WAN and required network equipment. Before that it is required to connect local parts of the CHILLKART (Kliazovich Granelli, 2007). To show the LAN design I will be choosing the local parts of CHILLKART within a single limited region. US branch of CHILLKART have different stores within different parts of US. To connect different parts of CHILLKART within the US we will router switches and also require transmission mediums across the organization to capture the network. These regional networks of CHILLKART are connected with the different parts of the organizations situated at different region of different nation (Kundu Pradha n, 2015). For example, it is required to place a router within an organization located at US and a server that will provide different IP addresses for different system located at different place whether it is national wide or international wide. CHILLKART will be totally dependent upon the centralized data centre. If a WAN outage occurs, remote location will be unable to fetch data for the centralized data centres (Kuo, Ni, Sunderrajan Manjunath, 2014). The demand for the WAN bandwidth continues to increase day by day. Nowadays recent trend is more leaning towards the use of Ethernet as the WAN access media, so that it can deliver data with high bandwidth. Even there are numbers of performance sensitive applications those can easily be affected by the packet loss, delay and jitter (Li, Chen Zhang, 2015). It is the functions of the network foundation to provide the fault-tolerant and effective application that can differentiate the traffic and can make the system intelligent enough to take load sharing decisions while congestions occur in the network. Without considering the WAN technology the WAN must be able to provide the intelligent prioritization network traffic and must be able to queue that traffic along the best possible route (Mouzehkesh, Zia, Shafigh Zheng, 2015). The CHILLKART will choose few of the WAN designing methodologies for transporting data to its destination for backup links and primary links: Internet 3G/4G plan with the VPN enabled WAN. Dynamic Multipoint VPN Internet using VPN WAN Layer 2 WAN with the association of VPLS or Virtual Private LAN Services or Metro Ethernet. MPLS WAN in association with Layer3 Virtual Private Network (Nadarajah Nirmalathas, 2011). To control the operational cost it is required to take support of the WAN offered reliability and support. Because most of the WAN technology covers the functionality to transport the multidimensional data, such as voice, video, data via a single and centrally managed infrastructure. As organization is moving for the global business market, it is necessary for CHILLKART to adopt all these networking trends to be to attract numbers of employees and retain potential employees (Vahidnia, Palmer, Ledwich Ghosh, 2015), i.e. use of WAN using VPN and use of MPLS which is Layer 2 WAN. Nowadays companies are aimed to consolidate their data across the organization. Consolidating data from different terminal situated at remote location to a central data repository. This scenario helps when there is huge number of terminals get populated across the organization and authorities across the organization want access the log of the each system performance sitting at remote location. On the other hand Application optimization can speed up network performance along with the much security and improved application delivery. For example, the CHILLKART will be using the Cisco WAN optimization technique, then CHILLKART is bound to use the Cisco Application Services or the Cisco WAAS, which is an architectural solution that consists set of tools and techniques that will work together in a systematic approach to offer the best possible solution across the industry by reducing overall cost (Yan, Zhang Sun, 2015). Application optimization using WAN will provide numbers of advantage those are: Advanced and user experience by enhancing the range of bandwidth and reducing the latency. On the other hand routers are used to break the broadcast domain and connect different zones; in this case, Cisco routers give the best possible solution for the flexible deployment. Centralized management of data and managing operations in a centralized way to give opportunity to optimize the devices (Zhang Chen, 2012). Wan optimization design model: The design for WAN optimization for the remote sites needs to be based on the site-specific characteristics. The general topology used for several remote sites is almost same while there is a chance to use WAN. Characteristics of several WAN get cleared, when configuration of WAN router takes place. There are 3 WAN aggregation design models: MPLS Static MPLS Dynamic Dual MPLS The MPLS WAN-aggregation design involves two or more WAN edge routers. WAN edge routers are referred when it the context of making connection from sender to receiver. All of the WAN edge routers are connected into the LAN distribution layer (Zhang, Chi, Zhengbin Anshi, 2012). On the other hand the WAN transport options use the MPLS VPN considering it as a primary or secondary transport. Each of the transport connects to the dedicated CE router. Each of the design models uses connection of LAN as a collapsed distribution or core distribution layer or the dedicated distribution layer for WAN. WAN using the VPLS or the Virtual Private LAN Services: Ethernet has become the traditional way in the LAN technology and basically due to distance limitations of the available media and due to the unavailability of dedicated fibre or copper links. Layer 2 WAN transports are available from service providers and are able to extend various layers to control traffic of different types over a Wide Area Network. The most common use of Layer 2 WAN are in use to provide the Ethernet over WAN implementation using either point to multipoint or point to point service (Zhu, Zhang Mukherjee, 2005). Service providers across the industry are indulged to implement these Ethernet services using numbers of methods. There are numbers of network topologies are in use by the service providers, for example use of several Ethernet switches in various topologies, so that it became possible to provide services on Ethernet LAN2. This service is also known as metro Ethernet. Layer 2 WAN services supports a subscriber model in which service provider always stays clear and the organization implements routing form layer 3; this scenario on the other hand allows a more flexible WAN design and the interconnection between the remote sites (Cuda, Indre, Le Rouzic Roberts, 2012). On the other hand the point to point service allows the interconnection between two LANs. Point to multipoint LAN services allows the interconnection between more than two LANs. There are so many other services that include trunked and simple demarcation. With the help of trunk mode, the interconnection between LANs using 802.1Q VLANtagging that provide the transport of several VLANs on a single access truck. Use of internet with VPN WAN: The internet is an integration of large scale public WAN and multiple interconnected services providers are there. It has become possible for Internet to offer reliable highperformance connectivity between the various locations. Though it may lack any kind of clear guarantees for these kinds of connections, best effort services are available within the coverage area and the Internet is the best possible choice for the primary transport when it is not much feasible to transport via other medium. There are numbers of primary LAN service for WAN transport is there, for example use of Layer 2 WAN or use of MPLS are offered using Internet as an alternative transport options (Chtelain, Blanger, Tremblay, Gagnon Plant, 2011). Being connected with the Internet, it includes discussion close to the internet edge. Remotesite routers need to have internet connection as a common fact, though Internet connections do not provide services of same breadth at every location. There are numbers of secu rity reasons behind the routing of internet connections through the primary sites. Sometime industries across the world demand dedicated private connection with their client and they demand for the VPNs form the service provider. These VPNs are much secure than the publicly or openly used Internet connections such as use WiFi or easily accessible LAN service (Faro, Giordano Spampinato, 2011). Conclusion: With havoc use of internet there are numbers of functionalities have been used made it easy to communicate with the peers and to other systems by decreasing the cost of duplicate system resources. The demand for the WAN bandwidth continues to increase day by day. Nowadays recent trend is more leaning towards the use of Ethernet as the WAN access media, so that it can deliver data with high bandwidth. Even there are numbers of performance sensitive applications those can easily be affected by the packet loss, delay and jitter. It is the functions of the network foundation to provide the fault-tolerant and effective application that can differentiate the traffic and can make the system intelligent enough to take load sharing decisions while congestions occur in the network. On the other hand use of these resources have introduced have numbers of ethical dilemma. With the advent of application developers and networks administrator, numbers of intruder have introduced their presence. Eve n there are numbers of tools and applications have been introduced to steal customer data and they make illegal use of them. Hence numbers of methodologies have been adopted to restrict the illegal use of system resources and data. For example, imposing security mechanism at command level interface and or applying executive level security mechanism in routers will enable restriction on the unauthorized use of system resources. There are numbers of patches are available for the each system application and iso of the routers. While security mechanisms are concerned, there are numbers of security mechanisms are in use, those are namely use of encrypted passwords for each of the interface of the router. Being connected with each of these network infrastructures, each and every terminal or user equipment must require interface id and must contain their unique IP address to be known across the internet. On the other hand use of IPV6 addressing can also increase the network and capacity an d its tunnelling technique for transferring data from IPV4 router to IPV6 router is much more secure. All of these IP addresses are unique and these IP addresses are used to find the source and destination of some specific systems. There are numbers of adopted technologies and tools are there to let the employees or the security personal to be trained for the instalment of such devices that can provide the ultimate training and for new joiner and other less knowledgeable person to handle the network enabled devices more safely and effectively. References Chtelain, B., Blanger, M., Tremblay, C., Gagnon, F., Plant, D. (2011). Topological Wavelength Usage Estimation in Transparent Wide Area Networks. J. Opt. Commun. Netw., 1(1), 196. doi:10.1364/jocn.1.000196 Chun, K. (2015). The Effects of Metropolitan Industrial Complexes on the Relocation of Firm -Focused on Daegu Metropolitan Area. Jkpa, 50(2), 33. doi:10.17208/jkpa.2015.02.50.2.33 Cuda, D., Indre, R., Le Rouzic, E., Roberts, J. (2012). Building a Low-Energy Transparent Optical Wide Area Network With Multipaths . J. Opt. Commun. Netw., 5(1), 56. doi:10.1364/jocn.5.000056 Deng, X., He, L., Li, X., Liu, Q., Cai, L., Chen, Z. (2011). A reliable QoS-aware routing scheme for neighbor area network in smart grid. Peer-To-Peer Netw. Appl.. doi:10.1007/s12083-015-0331-5 Faro, A., Giordano, D., Spampinato, C. (2010). Evaluation of the Traffic Parameters in a Metropolitan Area by Fusing Visual Perceptions and CNN Processing of Webcam Images. IEEE Trans. Neural Netw., 19(6), 1108-1129. doi:10.1109/tnn.2008.2000392 Giuliano, G., Gordon, P., Pan, Q., Park, J., Wang, L. (2011). Estimating Freight Flows for Metropolitan Area Highway Networks Using Secondary Data Sources. Netw Spat Econ, 10(1), 73-91. doi:10.1007/s11067-007-9024-9 Hrehorowicz-Gaber, H. (2015). Role of green areas for space integration of Krakws Metropolitan Area. Bulletin Of Geography. Socio-Economic Series, 28(28). doi:10.1515/bog-2015-0016 Ismail, W., Said, I. (2015). Integrating the Community in Urban Design and Planning of Public Spaces: A Review in Malaysian Cities. Procedia - Social And Behavioral Sciences, 168, 357-364. doi:10.1016/j.sbspro.2014.10.241 Kliazovich, D., Granelli, F. (2011). Packet concatenation at the IP level for performance enhancement in wireless local area networks. Wireless Networks, 14(4), 519-529. doi:10.1007/s11276-006-0734-6 Kundu, P., Pradhan, A. (2015). Online identification of protection element failure using wide area measurements. IET Generation, Transmission Distribution, 9(2), 115-123. doi:10.1049/iet-gtd.2014.0276 Kuo, T., Ni, Z., Sunderrajan, S., Manjunath, B. (2014). Calibrating a wide-area camera network with non-overlapping views using mobile devices. ACM Transactions On Sensor Networks, 10(2), 1-24. doi:10.1145/2530284 Li, Z., Chen, M., Zhang, G. (2015). Variable-rate transmission method with coordinator election for wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0917-0 Mouzehkesh, N., Zia, T., Shafigh, S., Zheng, L. (2015). Dynamic backoff scheduling of low data rate applications in wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0929-9 Mouzehkesh, N., Zia, T., Shafigh, S., Zheng, L. (2015). Dynamic backoff scheduling of low data rate applications in wireless body area networks. Wireless Networks. doi:10.1007/s11276-015-0929-9 Nadarajah, N., Nirmalathas, A. (2012). Upstream access and local area networking in passive optical networks with a single reflective semiconductor optical amplifier. J. Opt. Netw., 7(5), 513. doi:10.1364/jon.7.000513 Vahidnia, A., Palmer, E., Ledwich, G., Ghosh, A. (2015). Wide-area control through aggregation of power systems. IET Generation, Transmission Distribution. doi:10.1049/iet-gtd.2014.1206 Yan, H., Zhang, Q., Sun, Y. (2015). Local information-based congestion control scheme for space delay/disruption tolerant networks. Wireless Networks. doi:10.1007/s11276-015-0911-6 Zhang, Y., Chen, J. (2012). Wide-area SCADA system with distributed security framework. J. Commun. Netw., 14(6), 597-605. doi:10.1109/jcn.2012.00025 Zhang, Z., Chi, Y., Zhengbin, L., Anshi, X. (2012). Dual-fiber optical burst switching network: A novel architecture for metropolitan area networks. Photon Netw Commun, 24(1), 47-57. doi:10.1007/s11107-011-0366-3 Zhu, K., Zhang, J., Mukherjee, B. (2011). Ethernet-over-SONET(EoS) over WDM in Optical Wide-Area Networks (WANs): Benefits and Challenges. Photon Netw Commun, 10(1), 107-118. doi:10.1007/s11107-005-1698-7