Saturday, December 28, 2019

In Another Country Essay - 609 Words

The short story in another country is about patriotism, a term which rudimentarily means: deep love to ones own country. It is, however, just a part of a greater concept, love, which manifests itself, throughout the story, in different forms; love to a friend, love to a spouse and even to ones own country. When we are first exposed to the story, with the vivid imaginary of the weather, we feel how cold it is, and how warm are the `roasted chestnuts that we actually desire some. Moreover, it is very delightful to share the experience of the speaker when `the electric lights came on, and it was pleasant along the streets looking in the windows. To ponder over the captioned imaginary, we will discover that it refers to human life in†¦show more content†¦In the case of the speaker, the medals he has been awarded have nothing to do patriotism because `[he] had been given the medals because [he] was [merely] an American. This is why he and his fellow-soldiers were `drifted apart - they know that such medals should have only been given to those who sacrifice themselves in order to save their own country, not because they are merely from another one, thus they will not have any passion toward the country they are put in to fight in spite the fact that they may be placed in the front l ines and, accordingly, fight gallantly. The `boy who had been wounded his first day at the front is still in good terms with the speaker since the latter likes him because `perhaps he would not have turned out to be a hawk either [like me] - this implies that the speaker does not want to bother himself fighting for another country and since the boy, as he thinks, resembles him, he keeps his relationship with him. While using the medicalShow MoreRelatedIn Another Country1453 Words   |  6 Pages`In Another Country` By E. Hemingway `In Another Country` by E. Hemingway Hemingway creates a powerful and true-to-life story about real experience of many soldiers who came home but remember all casualties and hardship they were faced with during the WWI. On the other hand, their stories full of bravery, honor and courage. They need to adapt to new world, but the only way for them is to change their habits and personal values. Settings and objects reflect inner psychological state of the charactersRead MoreMoving to Another Country1316 Words   |  6 Pagestraditional knowledge they use. Thats OK. But one should bear in mind two things. First, if something goes wrong — if there seems to be a problem — then relying on tradition isnt good enough. Its not working, and youll need to tweak something or find another tradition. And second, a thoughtful person should critically evaluate some traditions. Its your choice which, but everyone ought to be good at something and have the experience of trying to improve some knowledge. Everyone should put some seriousRead MoreThe Experience of Living in Another Country1448 Words   |  6 PagesLiving in another country is a difficult experience for many people. A common feature of people living in a foreign country is finding them Gathered together in restaurants, discussing about their home and their experiences in the foreign country. Moreover, these groups are not all from the same home country. Often, the interests that landed them in a foreign country are enough to connect them in building the foundations of friendship, like studying same major. However, the only thing that you canRead MoreIn Another Country by Ernest Hemingway662 Words   |  3 Pagesinfluenced greatly the way lectors saw a piece of writing. Despite the fact that they were a couple of lines on a paper, the meaning and information behind it were immense. The iceberg theory of prose was further exemplified in his famous work In Another Country. This novel’s style not only benefited the story in itself bu t also assured that a deeper and more analytical meaning was found. The style of omission is characterized as minimalistic and avoids the use of extraneous words. It was first developedRead MoreMoving To Another Country Essay722 Words   |  3 PagesBelongings to Another Country If you are moving from the United States to a foreign country with your family, there are several things you need to know about the process. You may have moved before, but leaving the country you reside in to live in another nation is a big move. The following are a few things you need to consider in advance. Choose your movers carefully Anyone can claim to be an international moving company, but there are different rules for customs when shipping to other countries. No twoRead MoreIn Another Country of Hemingway Essay602 Words   |  3 PagesThe word war is always horrible to man especially with who has been exposed to. It is destruction, death, and horrible suffers that has been with all mans life. In the short story In Another Country, Ernest Hemingway shows us the physical and emotional tolls of the war as well as its long-term consequences on mans life. He also portrays the damaging effects that the war has on the lives of the Italians and even of the Americans. What has been existed in life after the war? Nobody knowsRead MoreIn Another Country by Hemingway Essay1095 Words   |  5 PagesIn Another CountryHemingway Hemingway’s â€Å"In Another Country† is the story about the wounded soldiers who are puled back from the front lines due to injuries. The setting of the story is a military hospital in Milan, Italy, during the war. Although author does not specifically give the time we can say that he refers to the World War I because this short story was published in the book â€Å"Men Without Women† in 1927; it was another book of short stories which collected The Killers, In AnotherRead MoreAnother Country By James Baldwin2288 Words   |  10 PagesAnother Country is a fiction book written by James Baldwin in 1962. James Baldwin was an essayist, playwright, and novelist with many popular writings. He is an iconic African American for his writings during the Civil Rights era in the United States focusing on racial and social issues. In Another Country, Baldwin’s characters go through interracial, homosexual, bisexual, and violent relationships. The main character, Rufus Scott, is an African American jazz drummer that commits suicide after theRead MoreDoing Business in Another Country2418 Words   |  10 Pagesimportant to know the culture of the country you plan to do business in. In order to introduce mobile handsets into a market like Venezuela, the supplier must be well acclimated with the purchasing habits, tastes, and willingness to purchase the product that is being sold. Understanding these things starts with building a knowledge base about the major aspects of the culture and your target consumer. With this being said I am providing a brief overview of the country of Venezuela. Venezuela boastsRead MoreEssay about Moving to Another Country528 Words   |  3 Pagesthink getting up and moving to another country is as easy as it sounds. People leave their home countries for various reasons, to escape as a refugee, or immigrate for a change in life. As easy as it seems to be there are so many roadblocks along the way. The country was created thousands of years ago as the holy land but over time, it has gone through different rulers and at many times the Jewish people of Israel was exiled and forced to leave the only country they knew. The history of Israel

Friday, December 20, 2019

Big Walter Character Analysis - 720 Words

In the play A Raisin in the Sun, Lorraine Hansberry shows that Big Walter is an essential character to the play since he not only acts as the family’s financial support, but also as a moral guide through the tough times, suggesting that even a loved one who has ceased to exist is essential to a family’s morals. In the beginning of the play, the family is pictured as poor and live in harsh conditions, but Big Walter’s life insurance money turns these problems around. The money is extremely important to the family, and is shown when Walter yells, â€Å"THAT MONEY IS MADE OUT OF MY FATHER’S FLESH† (128). Although Walter says that the money is â€Å"made† from his father’s flesh, he does not mean this literally. Instead, he is trying to imply that his†¦show more content†¦She knows that Big Walter wanted to fulfill everyone’s dreams, and just because Mama’s problems are solved, does not apply to the entire family. Th erefore, she can save some spare change for the other family members. Throughout the play, Mama is constantly trying to fulfill Big Walter’s dreams for the family, as she does not want her husband’s sacrifice to be wasted in vain. Big Walter’s legacy lives in triumph when in the end Walter tells Mr. Lindner â€Å"[Big Walter] earned it for us brick by brick† (148). In the beginning, Walter cares only for the liquor store and opposes the idea of moving to a new house, in fear that there will be no money left for him. Thus he guilt trips Mama into giving him the rest of Big Walter’s money, only to end up losing it all. This catastrophe leads to the breaking of the family’s pride. In desperation of getting the money back, he calls Mr. Lindner to explain that they are not going to move into the new house. However, when speaking with Mr. Lindner, Walter changes his mind because he realizes that buying the house is the right thing to do. When Walt er says that his father earned the house for them â€Å"brick by brick†, it is an allusion to Big Walter’s time and spirit that had been invested into bettering his family that ultimately resulted in his death. Walter realizes that life has a deeper purpose than the money that he is given, and life is about standing by those who he caresShow MoreRelatedScene Analysis - The Big Lebowski1516 Words   |  7 Pages GE3401 – TB2 Exploring English Cinema Scene Analysis â€Å"Scattering Donny’s Ashes† Scene in The Big Lebowski (Joel and Ethan Coen, 1998) Student Name: Fan Ho Nga, Gloria Student ID: 52948216 â€Å"Scattering Donny’s Ashes† Scene in The Big Lebowski (Joel and Ethan Coen, 1998) The Big Lebowski (1998) by the Coen Brothers is no doubt a comedy film about friendships between three bowling buddies with differing personalities who met and stuck together as friends by choice in LosRead MoreLiterary Analysis of Sunrise over Fallujah Essay905 Words   |  4 PagesDiPaolo-Smit ENG 2D1 May 21st, 2013 Literary Analysis of Sunrise over Fallujah The novel Sunrise Over Fallujah by Walter Dean Myers is a historical fiction novel that retells the memories of Robin Perry’s experience in Iraqi civil war. He was in a civil affairs unit, which is dedicated to protecting by standers in the war. Robin encounters various setbacks that try to slow down the progress of his unit such as the death of his close friend Jonsey. Walter Dean Myers portrayed his knowledge of theRead MoreHow Can A Focus On Gender Enrich Our Understanding Of Contemporary Media?994 Words   |  4 PagesHow can a focus on gender enrich our understanding of contemporary media? Gender is a social construct—that is, a society s assumptions about the way a man or woman should look and behave. It is argued that the media plays a big role in the way that gender is created and is influenced over society. The Mass media plays a significant role in a modern world, by broadcasting information in fast pace and giving entertainment to vast audiences. This essay is going to assess whether a focus on genderRead MoreThe Roles Of Sexism And Dreams1377 Words   |  6 Pagesthe hell told you you had to be a doctor? If you so crazy ‘bout messing around with sick people- then go be a nurse like other women- or just get married and be quiet...† (38). Walter Younger, one of the protagonists of the play, makes this sexist comment towards his sister, Beneatha, and her desire to become a doctor. Walter belittles Beneatha’s dream by implying that women are only fit for supporting roles just like their mother, Mama Lena. Debuted on Broadway in 1959, the d ramatic work, A RaisinRead MoreCharacter Analysis Of Lorraine Hansberry s A Raisin990 Words   |  4 PagesCharacter Analysis: A Raisin in the Sun The play A Raisin In the Sun, by Lorraine Hansberry is a classic, revolutionary play written in the times of segregation and discrimination of skin tones. Throughout the story, the Youngers display how they are just like an ordinary family; everybody has their own special personality. This caused many conflicts when it was time to decide what to do with the check coming in the mail for ten thousand dollars. Walter Lee Younger, the son and oldest child of mamaRead MoreAnalysis Of A Raisin In The Sun1185 Words   |  5 Pagesattempts to answer. Hansberrys effort to reflect upon the power and implication of dreams leads to a number of possible answers to What happens to a dream deferred?. In this essay i will use particular lines in the poem and use them to create a character analysis as a way to show how Hansberry created a story around the belief that the dreams and ambitions can destroy our psyche if they are just ignored. In my own opinion, we as humans, needs dreams because they represent our active search towardRead MoreAnalysis Of Walt Disney s Transformational Leadership1726 Words   |  7 Pagesact as a consulting analysis on how Walt Disney utilized his transformational leadership and brought to the world one of the most famous entertainment companies in the 20th century. Transformational leaders provide extraordinary motivation by appealing to people’s ideals and values and inspiring them to think about issues in new ways. It begins with a vision and the leader embeds that vision into others through encouragement, enthusiasm and motivation (Winchester, 2013). Walter Disney’s portrayedRead MoreBilly Wilders Double Idemnity1367 Words   |  6 PagesDouble Indemnity - Scene Analysis Billy Wilder’s Double Indemnity is one of the best representatives of the film noir era in Hollywood as it contains all the main characteristics of the genre. The general darkness present throughout the movie is embodied in the plot which reveals the moral bankruptcy of the main characters. It is also present in the mise-en-scene choices such as the dark costumes and modest lighting with the great emphasis on shadows (Allyn 1978, p. 117). The main character’sRead MoreCritical Analysis Of Walter Bartleley : Equal Opportunity1330 Words   |  6 PagesWalter Mosley is one of the most versatile and admired writers in America today (Fantastic Fiction 1999). Walter Mosley’s father, LeRoy Mosley who was a World War II veteran, was a major influence in Walter’s works; having a talent for writing fictional narratives, many of Mosley Walter’s works represent his father’s experience with unfair, racial and/or prejudice opinions he faced (Encyclopedia 2 016). These opinions are shown throughout most of Walter’s fictional stories such as Equal OpportunityRead MoreThe Contender By Walter Dean Myer And The Treasure Of Lemon Brown717 Words   |  3 PagesAnalysis Of Stylistic Techniques Figurative language is a language that uses words or expressions with a meaning that is different from the literal interpretation. When the author uses literary language, he or she is stating the facts as they are. Figurative language is very common in poetry, and is also used in prose and nonfiction as well. In the stories â€Å"The Treasure of Lemon Brown† by Walter Dean Myer and â€Å" The Contender† by Robert Lipsyte the authors use figurative language to describe the

Thursday, December 12, 2019

About Compasss Invention Essay Example For Students

About Compasss Invention Essay The compass has served as a navigational aid to many tourists, travelers, and numerous explorers. Though the compass has served well in navigation, it has affected and improved mankind greatly. In China, building was refined in many ways by the compass. It has enabled many to find positions, direction or route. No one knows when, where, or by whom the compass was invented (dEstaing and Young 153). We do know though, that there were numerous inventors of the compass. The first compass was invented about two thousand years ago by the Chinese. It was discovered by Luan Te, a Chinese magician. He had a board game similar to chess in which one of the game pieces was a spoon. When he emptied the metal laying pieces onto the board the spoon would spin around until the handle was pointing north (Icanberry 1). His spoon was made from what we know today as lodestone. The spoon was able to spin around because of the long handle and rounded bottom. Elmer Sperry, an American navigator, invented the gyrocompass, a widely used tool. This device worked anywhere on Earth, day or night. When it points northward, it hold that positioning because it uses a spinning wheel set in gimbals called a gyroscope. William Gilbert, an Englishman, experimented with magnets to learn and understand their behaviors. Gowin Knight, on the other hand, rubbed magnets on iron bars to create super magnets. This magnetized compass needles for much longer periods of time. Lord Kelvin corrected this by using small magnets that surrounded the compass and prevented deviation. The small magnets were known as corrector magnets (Travers 155). Many different compasses have been invented, with various uses, but some stand out more than others. The well-known compasses today are the magnetic compass, the gyrocompass, the liquid compass, and the steering compass. The magnetic compass uses a magnetic needle; this is glued to the bottom. When it was attached to the pivot, the entire card rotated to the north rather than just the needle, which made the compass much easier to read than previous styles. Bibliography:. Free essay sample, essay topic, how to write essay on Compas

Wednesday, December 4, 2019

Technical Plan and Implementation New Charter Housing Trust Group

Question: Case study of New Charter organization. Answer: Introduction The task includes primary requirements on designing Virtual Private Network over a case study of New Charter organization. At first, the assignment addressees the essential design of the VPN network along with security and business objectives ("Social Housing Program Protects Network Inside and Out", 2016). The business and security objectives are included as with showing the new network design configuration. The assumptions are attached for depicting entire security scope inclusion. The description is attached in this study for showing the network specifications and design components. The justification is assigned for showing the entire objectives based design of the network as well (Liao, WU Dai, 2016). The components are shown for further addressing of the network procedures; the implementation of the planned network is depicted to show the entire scenario of the design. Network Diagram for the Case Study Figure 1: VPN Network Design Security and Business Objectives in Case Study The security and business objectives are included as per the case study consideration. The organization New Charter Housing Trust Group required incorporating a low-cost yet scalable network connection architecture connecting more people in one grid (Liu et al., 2015). Their primary goal of business is to connect more people from lower income background with serving 20,000 citizens in UK. Their business initiatives are included as following: To provide low cost implementation of Virtual Private Network with serving more residents and corporate staffs To integrate the management units into the existing IT network with mitigating the difficulties To implement the network with legacy hardware and software without any discrepancies in interconnection To implement the network with including access controlling for proper policy and maintenance planning The security considerations are included as following in form of techniques for mitigating the risks and discrepancies. To include potential policies in the organization practices with including deployment of technology To recommend several security and privacy considerations under the network for mitigating the risk of packet transmission without exploit To incorporate the suitable security guidelines under the network connection for privacy maintenance To minimize the security and maintenance cost with increasing the performance later on with connecting the components in network architecture as well Assumptions in Network Design and Security Primary and essential consideration is that the users and personnel should consider entire process with care and sincerity. The organizations personnel and their staff should be included with suitable level of maintaining the secure and private network (Gharam, Salhi Boudriga, 2015). The assumptions in network design and security are included as following. These assumptions are attached for showing which parts are to be considered as the security concerns. The assumptions are important for determining whether the considerations are in the project scope or not. The assumptions are included herewith: The network will be incorporated with access controlling for the users under blocking access to unidentified users The network will be under some users, those who are identified in the grid The network is to be implemented with suitable structuring and configuration The IP addressing is necessary for setting the architecture at a certain packet passing rate Staff and users will be accounted with primary and essential knowledge of interconnection within the grid The staff and personnel will be aware about the network security policies and they would not be violating the rules of the security policy The security and privacy policy will be activated at the time of VPN implementation Description of Network Diagram The system is depicted with including the crucial prerequisites of segments associated in the network. The configuration is made do with considering effortlessness in design with stressing the availability procedure. The switches have RIP routing convention incorporated into the design for appropriate bulk of packet passing through the connected network architecture. The RIP convention is appended for particular bundle going in the system. The switch to switch passage is recognized as 10.0.0.0 and the change to switch portal is distinguished as 192.168.10.0 and 192.168.20.0 individually. The switch is incorporated into the system chart with passing the parcels all through two doors of 192.168.10.1 and 192.168.20.1 too. The switches are interconnected in the middle of the PCs and switches. The switch is possessed with quick Ethernet ports as fro 0/1 to 0/24; there are 24 quick Ethernet ports. The IP locations are in space of 192.168.10.0 and 192.168.20.0 individually. The association is kept up with adaptability as far as segmenting the two areas with two separate doors as 192.168.10.1 and 192.168.20.1 individually. The security encryption as "AES" is incorporated into the outline also. The verification is put as pre-offer mode. The verification is put through with sharing the key however the switch design alongside some IP address ranges. The key is pre-shared as to setting up the privacy in the middle of the frameworks for preparatory SA development. The system outline is dynamic with "isakmp" convention in the 10.0.0.0 entryways through the interfaces fa0/0 and fa0/1. The convention is incorporated into the outline for securing the encryption under the PCs in IP address scope of 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 separately. The computers are communicating with suitable packet passing as shown in the following figure. Figure 2: Ping test in between first and second PC The AES encryption is actualized with hash code "SHA" under the system engineering for fortifying the security and bundle passing component. The figure key is relegated as "toor" in the configuration, and the key is pre-shared under the IP ranges. The sharing imparts in the PCs without interpreting the message physically. As secure 'SHA 256' calculation is utilized alongside AES encryption for irregular hash-code era under a reasonable key task. The calculation is compelling inside Virtual Private Network, as it has no issues in decoding messages without a moment's delay. The security approach 10 is incorporated into the usage, as it is good with VPN arrangement with all parts of protection in bundle passing. The strategy is helpful inside the system for making the NAT conceivable under VPN setup too. Justification of Network Design The network design is justified as it is aligned with security and design initiatives as well. The necessary alignment with objectives is included along with suitable and essential design requirements. To provide low cost implementation of Virtual Private Network with serving more residents and corporate staffs; the VPN is implemented. It is feasible with low cost yet higher performance network architecture. To integrate the management units into the existing IT network with mitigating the difficulties; is implemented with dynamic IP configuration under the architecture as well. To implement the network with legacy hardware and software without any discrepancies in interconnection; as the VPN configuration does not require more important components in this aspect. To implement the network with including access controlling for proper policy and maintenance planning; the network is considered with access control lists in the process. The security considerations are included as followin g in form of techniques for mitigating the risks and discrepancies. To include potential policies in the organization practices with including deployment of technology; the security policy is included as isakmp. To recommend several security and privacy considerations under the network for mitigating the risk of packet transmission without exploit. To incorporate the suitable security guidelines under the network connection for privacy maintenance; the policy documents need to be distributed to the users and staff. To minimize the security and maintenance cost with increasing the performance later on with connecting the components in network architecture as well. Description of Major and Required Equipment The requirements of hardware and components are included as following with specifications in the network diagram. The design is managed with considering simplicity in architecture with emphasizing the connectivity process. The required hardware components are quite popular in market within limited cost as well. 2811 Router: The routers are general with two fast-Ethernet interfaces as 0/1 and 0/0. The routers have RIP routing protocol included in the configuration for suitable packet passing regardless of gateway. The RIP protocol is attached for specific packet passing in the network. The router to router gateway is identified as 10.0.0.0 and the switch to router gateway is identified as 192.168.10.0 and 192.168.20.0 respectively. 2950-24 Switch: The switch is included in the network diagram with passing the packets throughout two gateways of 192.168.10.1 and 192.168.20.1 as well. The switches are interconnected in between the computers and routers. The switch is occupied with fast-Ethernet ports as fro 0/1 to 0/24; there are 24 fast-Ethernet ports. General PC: The personal computers are generic with no extra requirements regarding the network connection. The IP addresses are in domain of 192.168.10.0 and 192.168.20.0 respectively. The connection is maintained with scalability in terms of sectioning the two domains with two separate gateways as 192.168.10.1 and 192.168.20.1 respectively. VPN Tunnelling and Encapsulation Requirements The VPN tunnelling and encapsulation requirements are included with including the security policy in the process. The security encryption as AES is included in the design as well. The authentication is placed as pre-share mode. The authentication is put through with sharing the key though the router configuration along with some IP address ranges. The encapsulation requirements are included as following: isakmp protocol: The protocol is assigned with mentioning a key as toor in the network architecture. The key is pre-shared as to establishing the confidentiality in between the systems for preliminary SA formation. The network design is active with isakmp protocol in the 10.0.0.0 gateways through the interfaces fa0/0 and fa0/1. ipsec protocol: The protocol is included in the design for securing the encryption under the computers in IP address range of 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 respectively. AES encryption: The AES encryption is implemented with hash code SHA under the network architecture for strengthening the security and packet passing mechanism. The cipher key is assigned as toor in the design, and the key is pre-shared under the IP ranges. The sharing helps to communicate in the PCs without deciphering the message manually. SHA 256 algorithm: As secure SHA 256 algorithm is used along with AES encryption for random hash-code generation under a suitable key assignment. The algorithm is effective within Virtual Private Network as it has no issues in decrypting messages at once. Security Policy: The security policy 10 is included in the implementation, as it is compatible with VPN configuration with all aspects of privacy in packet passing. The policy is beneficial within the network for making the NAT possible under VPN configuration as well. Implementation of Planned Network The implementation of the planned network is quite simple in this aspect. The routers are connected though the cross-over cables within the gateways as 10.0.0.1 and 10.0.0.2 within them. The switches are connected with computers and routers with straight cable wiring. The PC gateway is identified to be 192.168.10.1 and 192.168.20.1 as well. The computers are configured with 192.168.10.2 to 192.168.10.255 and 192.168.20.2 to 192.168.20.255 IP addressing. The routers are included with RIP packet routing procedures. The cryptography is assigned with security policy 10, along with pre-shared authentication of key. The encryption is implemented with AES security over packet passing. The hash code SHA is attached for showing the random key generation with mapping the access-list 101 in IP range of 192.168.10.0 to 0.0.0.255 and 192.168.20.0 to 0.0.0.255. Again, the second router is incorporated with access-list of 101 within similar ranges of IP addressing. The mapping is supported with CMA P and TSET compatibility for key matching of toor. Figure 3: isakmp Cryptography active in first router Figure 4: ipsec Encryption Shown in red outline Conclusion The assumptions in network design and security are included for managing the in-scope requirements only. The network design is justified as it is aligned with security and design initiatives as well. It is feasible with low cost yet higher performance network architecture. To implement the network with including access controlling for proper policy and maintenance planning; the network is considered with access control lists in the process. The RIP protocol is attached for specific packet passing in the network. The protocol is assigned with mentioning a key as toor in the network architecture. The cryptography is assigned with security policy 10, along with pre-shared authentication of key. The encryption is implemented with AES security over packet passing. Bibliography Ahmed, B. A., Saleem, Y., Waseem, S. (2015). AN IMPLEMENTATION OF MULTIPROTOCOL LABEL SWITCHING VIRTUAL PRIVATE NETWORKS AND INTERNET PROTOCOL SECURITY USING GRAPHICAL NETWORK SIMULATOR 3 AS AN EDUCATIONAL TOOL.Science International,27(3). Burke, C. (2015). Implementation and Evaluation of Virtual Network Functions Performance in the Home Environment. Chen, Y. L., Chen, P. W., Wang, C. H. (2015, October). Performance improvement for CMT-SCTP via load-balancing virtual connections. InComputing and Communication (IEMCON), 2015 International Conference and Workshop on(pp. 1-7). IEEE. Dumka, A., Mandoria, H. L., Dumka, K., Anand, A. (2015, March). MPLS VPN using IPv4 and IPv6 protocol. InComputing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on(pp. 1051-1055). IEEE. Gharam, M., Salhi, M., Boudriga, N. (2015). An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. InCryptology and Network Security(pp. 248-256). Springer International Publishing. Ghilen, A., Azizi, M., Bouallegue, R. (2015). Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. InCryptology and Network Security(pp. 238-247). Springer International Publishing. Gladstone, P. J. S., McGrew, D. A. (2015).U.S. Patent No. 9,178,697. Washington, DC: U.S. Patent and Trademark Office. Han, S. B., Phan, T. (2015).U.S. Patent No. 9,178,761. Washington, DC: U.S. Patent and Trademark Office. Kim, B., Oh, S. (2016). Implementation of Data Visualization of Harmful Information Filtering System.International Information Institute (Tokyo). Information,19(3), 987. Liao, T., WU, B., Dai, X. (2016).U.S. Patent No. 20,160,134,591. Washington, DC: U.S. Patent and Trademark Office. Liu, V., Tesfamicael, A. D., Caelli, W., Sahama, T. R. (2015). Network security and performance testing for health information system management. Lospoto, G., Rimondini, M., Vignoli, B. G., Di Battista, G. (2015, May). Making MPLS VPNs manageable through the adoption of SDN. InIntegrated Network Management (IM), 2015 IFIP/IEEE International Symposium on(pp. 1155-1156). IEEE. Priyanka, B. H., Prakash, R. (2015). A Critical Survey Of Privacy Infrastructures.arXiv preprint arXiv:1512.07207. Social Housing Program Protects Network Inside and Out. (2016). www.cisco.com. Retrieved 29 May 2016, from https://www.cisco.com/c/dam/en/us/products/collateral/security/new-charter-housing.pdf Zhou, L. (2015, January). Implementation of Linux VPN Gateway based on Netlink communication. InControl Engineering and Information Systems: Proceedings of the 2014 International Conference on Control Engineering and Information Systems (ICCEIS 2014, Yueyang, Hunan, China, 20-22 June 2014).(p. 399). CRC Press. Zhuang, S., Li, Z., Baohua, S. O. N. G. (2015).U.S. Pate.