Tuesday, August 25, 2020

How do the characteristics of the villages Navenby and Dorrington differ?

This is the general inquiry that I need to reply so as to explore the distinctions and similitudes of the two country towns: Navenby and Dorrington. To help answer this inquiry I went on a field excursion to Lincolnshire to take notes on the site, circumstance, size, morphology and administrations of Navenby and Dorrington. There are different components in which I can research to recognize these variables for my two picked towns. These are: *Land use *Amenities or Services *Comparison of settlement designs *Age of development of settlements *Site *Situation There are five inquiries I have contrived to pose to make a reason for my examination among Navenby and Dorrington: â€Å"How and for what reason do the locales of Navenby and Dorrington differ?† â€Å"How and for what reason do the circumstances of Navenby and Dorrington differ?† â€Å"How and for what reason does the morphology of Navenby and Dorrington differ?† â€Å"How and for what reason do the populace sizes of Navenby and Dorrington differ?† â€Å"How and for what reason do the degrees of administrations of Navenby and Dorrington differ?† These inquiries are appropriate in assisting with responding to the general inquiry since these things being solicited are largely attributes from a town. Empowering to separate them implies that we can take a gander at the towns in much more detail and make notes on things explicitly. Additionally read Driver’s Ed Module Reflection Journal To respond to questions one and two I will outline and shading code maps of Navenby and Dorrington to show how administrations, civilities and land use contrast between the two. The guide will have the option to show the circumstance as it will demonstrate access to assets and offices for instance: access to food assets or a structure and fuel assets. The guide will likewise show the site of the towns as it will appear if the towns are useful for resistance or for water gracefully or cover, for instance For question three having the option to take note of how the morphology contrasts between the two towns will show how the towns have created through time and how monetary, social and memorable conditions have influenced the towns. Question four will show how populace sizes contrast because of different components. These could be things, for example, availability, land possession design, settlement size or arranging limitations. This will likewise show what towns are creating and maybe which are diminishing and whether individuals who live there are maybe workers for instance. Question five will show which town is increasingly evolved and which is progressively country. Regardless of whether the land has been utilized to do the trick for the individuals who live there and why the land has been utilized the manner in which it has for instance transport courses or industry working to give individuals work. Or on the other hand the land has not been changed at all importance less turns of events and possibly more suburbanites. To have the option to respond to the past inquiry (how do the attributes of the towns of Navenby and Dorrington vary?) I needed to recognize the data that I should gather from visiting the towns Navenby and Dorrington. For the initial two inquiries (how and for what reason does the site and circumstance of Navenby and Dorrington contrast?) I should gather my data from assets, for example, data focuses; investigating the towns themselves and furthermore taking note of whatever relates with the site and circumstances of the towns and afterward to think about them when I return home and review the distinctions. I can likewise utilize an OS map for this inquiry since it will show the circumstance of the towns to assets that are required. For instance water, safe house and resistance and so on. For my third inquiry (how and for what reason does the morphology of Navenby and Dorrington contrast?) I gathered my data by strolling around the towns again and making notes on how the towns have monetarily developed or contracted, how socialization has built up the towns or not and how noteworthy conditions have influenced the towns. This should be possible by taking a gander at the sorts and times of the structures inside the towns. This data is important to my examinations as I will have the option to discover why the towns have become what they are today and what has impacted. The two towns could have had distinctive monetary, social or memorable conditions, which would make them be totally different now because of various town morphology. For my fifth inquiry (how and for what reason do the degree of administrations of Navenby and Dorrington vary?) I gathered my data by utilizing a count diagram. Each time I saw a specific assistance I added to my count graph. I likewise took a gander at the nearby transport course and made a note of different towns it experienced and how regularly it ran. I additionally made note on different administrations, for example, portability administrations and the quantity of open houses, instructive focuses and places of love. This data is important to my investigation, as it will show which town is increasingly evolved and furthermore which town is all the more monetarily created. I figure this data will be valuable to gather, as it will empower me to gather a similar data for every town making it a reasonable examination. The techniques picked to gather the information were fitting on the grounds that the notes I made refreshed my memory of what I completely observed when I returned home. Likewise making a count outline was a brisk and basic approach to note down the various administrations inside the towns as I could completely review the administrations when I returned home. Making notes on the sorts and periods of structures on maps gave made it conceivable to depict the morphology that has occurred after some time. I thought utilizing an OS map was a decent strategy for working out the contrasts between the destinations and circumstances of the towns as it gives a decent point of view of whereabouts certain assets are that are should have been noted to have the option to look at the locales and circumstances. While gathering my information I encountered a couple of issues. Despite the fact that the climate was acceptable (it wasn't coming down) it was blustery and cold. The breeze continued moving sheets around and now and again somewhat wild. Likewise in light of the fact that it was fairly cool it got awkward to work and felt rather tedious. In the town of Navenby on the grounds that it was the biggest town I thought that it was difficult to get around the entire town and gather all the pertinent information in as far as possible we were given. This was certifiably not something worth being thankful for as it could influence the consequences of my last work. I likewise thought that it was hard to get all the data I needed. For instance I couldn't get the subtleties I needed on populace size as there was a restricted accessibility to this asset thus I needed to do my own examination on the towns when I returned home on the Internet. I likewise thought that it was somewhat hard to peruse the guide now and again as a portion of the structures weren't stamped thus It was marginally troublesome attempting to make sense of where I was standing and to where certain structures were. â€Å"How and for what reason does the morphology of Navenby and Dorrington differ?† Navenby and Dorrington's territory use is commanded by private land use. Anyway Navenby ‘s private land use is almost 75% more than Dorrington's. Different types of land use inside these two towns are instruction focuses, spots of love, burial grounds, open houses and open land, for example, farmland and playing fields. â€Å"How and for what reason do the degrees of administrations of Navenby and Dorrington differ?† Both Navenby and Dorrington differ a ton with regards to administrations. In spite of the fact that the two of them have a portion of similar administrations, for example, a butcher, open house, post office, open phone, town corridor church/sanctuary, a quaint little inn and an endowments and artworks focus Navenby contrasts a great deal since it has more than 30 administrations while Dorrington just has 17 administrations. The two towns have versatile administrations, which incorporate Fish, Library (on Mondays), Bread, Clinic, Milk or dairy deals and a Bank for Navenby and a portable Bread and Butcher help for Dorrington. Diagram One Diagram Two â€Å"How and for what reason do the destinations and circumstances of Navenby and Dorrington differ?† See sketch maps. From this examination I planned to discover how the qualities of Navenby and Dorrington vary. I have found from my examination that the two towns are totally different and just have not very many likenesses. Site: Navenby is the biggest town and is additionally the best situated all things considered on a scarp incline so it would have been utilized as a post for when the town was enduring an onslaught. The town is additionally not very a long way from a decent wellspring of water. Dorrington then again is a little town in examination and is likewise in decay this could be because of the way that it is on level land and it not being almost a decent water source. Circumstance: From my examinations I have discovered that the closer a town is to an enormous town then the bigger the town is probably going to be. In this manner, on the grounds that Navenby is nearer to Lincoln than Dorrington it is a bigger town. Morphology: I have likewise discovered that the land use in both Navenby and Dorrington is private with little farmland and essential administrations, for example, open houses, spots of love and instruction focuses. Additionally from my examination I have seen that Navenby is a developing town. Because of it being on the fundamental course among Lincoln and Grantham and that it is a decent driving town. Dorrington is in decrease which is potentially because of it not being a generally excellent driving town has little administrations contrasted with Navenby and its closest enormous town is Sleaford as opposed to Lincoln or Grantham. My precision of my information gathered could have been progressively dependable on the off chance that I had a more drawn out measure of time to spend in the towns. On the off chance that I had longer I could have had more opportunity to discover things, for example, private livelihoods, agribusiness, populace sizes, development in administrations and so on as these would all influence the development or decay between the towns.

Saturday, August 22, 2020

Break the Ice by Holden Pan free essay sample

In the event that youre ever feeling devastated, forlorn, or just truly exhausted from envisioning the following Brand New or Taking Back Sunday collection to come out, at that point Holden Pan could simply be the band youll like. With great verses on falling all through adoration (So I attempted to break the ice today/yet I brought a subsequent ice age/felt that we could talk it out/the status will justify itself) ,Blink 182-esque guitar introductions, and an infectious beat to go with vocalist Desmond Zantuos pop-punky voice, this band hails from Floral Park is probably going to deeply inspire you with their ongoing EP, Breaking the Ice. The third track Are You Sayin Pam or Pan' is ideal for anyone that is simply tired of never discovering somebody to love (And Im going to overlook the adages of all the fish out in the ocean/cause all the gets have been captured/and the sea is unfilled). We will compose a custom exposition test on Break the Ice by Holden Pan or on the other hand any comparable theme explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page The main tune An is the thing that anyone whos experiencing difficulties with a sweetheart or a companion can tune in to (How could closest companions simply drop/to companions without benefits). To get familiar with this appealing band, go to Holdenpan.com, or look at their myspace, facebook, or purevolume page for additional tunes to hear.

Sunday, August 2, 2020

Celebrate May Day by becoming a Seeple COLUMBIA UNIVERSITY - SIPA Admissions Blog

Celebrate May Day by becoming a Seeple COLUMBIA UNIVERSITY - SIPA Admissions Blog Sunday marks a new beginning for many people across the globe. May 1, also known as May Day, has various meanings, but for many of us it is a time to celebrate spring and the approaching summer months. Some communities dance around a maypole like the one pictured above taken at a fair in Bristol, some feast on their home countrys delicacies, and others exchange flowers to mark the spring holiday. At SIPA, we do things a little differently and celebrate by welcoming the next class of Seeples to the university. But were not sure if well be able to fully welcome all of our admitted students  to the SIPA family. A handful of you havent responded to your offers of admission,  which is due on  â€" you guessed it  â€" May 1. If you still have reservations about joining the program, use your friends and family as a sounding board this weekend. Even if youve already asked for their advice, sometimes just voicing your concerns out loud is enough to give yourself that extra moment of clarity you need to make the best decision.  Not enough? Browse through our SIPA Stories microsite, which highlights what our students are up to both inside and outside of the classroom. (You might even recognize a few stories from the blog!) We hope you  all will join us in the fall.  Just click here to respond to your offer of admission. Photo courtesy of Lukey / Flickr / (CC BY-NC-ND 2.0)

Saturday, May 23, 2020

Essay About Experience That Is Most Dear to Me

Experience That Is Most Dear to Me About 15 years ago, when I was going to the second grade, there was a day which influenced my future greatly. Of course, at that moment I didn’t realize it, but it was so strong that I remember that feeling I experienced that day up till now and I am sure that I will never forget it. On that day my grandmother invited her friend to us to drink some coffee. She came with her daughter who was a couple of years elder than me. After some conversations, which I don’t remember now, there was that moment. Mary, the daughter of my granny’s friend, found my English textbook and started reading some exercises from it. So far, I didn’t hear the English language much, as our teacher was often ill and my parents spoke only Spanish. Moreover, I didn’t like my English classes and this language seemed too boring for me to learn. Nevertheless, all of a sudden, it changed when Mary started to read. I was so impressed with the beauty of the language that I held my breath just not to interrupt this magical reading process. I looked at her with my big eyes and didn’t move. I just wanted her to continue on and on. That was the moment when I decided to learn this language and read as great as Mary did. From then on I remember that I read that textbook every day and I completed all the assignments by myself in about half a year – and that being only 7 years old! I am still fascinated by my insistence. A lot happened since that time, but even now, 15 years later, that feeling of fascination didn’t ever leave me. Now I know the language very well, but still always try to reveal something interesting and previously unknown for me. And what is even more exciting – I always succeed in it. I will never forget that day and that feeling and I am sure that this memory will always keep me concentrated and will urge me to develop and evolve every day of my life.

Sunday, May 10, 2020

Essay on English-Only Movement - 1511 Words

An Argumentation on the Bilingual education and English-only Movement The question of whether the U.S should have an official language and whether bilingual language education can be accepted is highly controversial. Hispanic concentrated areas like California, the Southwest and Florida are especially troubled by the proposed English-only movements. People stands for English-only movement claims that linguistic divisions is harmful to political unity, while single official language can provide the chance to the narrow down the distances between the rich and the poor. On the other hand, disbelievers of English-only movements are worrying about the violation of civil liberties which are people’s rights stated in the Constitution†¦show more content†¦In fact, according to M.E Mujica in his essay Why the U.S. Needs an Official Language, the U.S government makes it easy for immigrants to live and work in their own native languages through bilingual education, multilingual ballots and driver’s license exams, and translators in schools and hospitals who are paid by the government. Mujica further argues that providing most essential services to immigrants in their native languages is expensive for American taxpayers and also keeps immigrants linguistically isolated. Miami, California have long history of bilingual education. Maurice Ferre, former mayor of Miami, believes that Spanish is the main form of communication in his city. Miami government’s website has both English and Spanish version. Even the mayor’s after work voice call was answered by greetings in Spanish. However, multilingual government is not cheap, when it comes to cost taxpayers billions of dollars every year. Te federal government’s research showed that English-only teaching is more effective than multi-lingual teaching. Examples of failed multi-lingual socities are witnessed around the world. India, a country of more than ten official languages, is the worst example of chaotic society and bureaucracy nightmare, regardless English is still used extensively as an official language in India. Without a single recognized common language, the governmentShow MoreRelatednm,n. On the other hand the main dissimilarity of those two essays is authors view towards the society. Their ideas are very helpful for the development of our society.1747 Words   |  7 Pages Essay Assignment #1 Length: three to four pages not including Works Cited Evaluation of an Argument through Analysis – In this assignment, you are required to show your abilities to summarize and evaluate the effectiveness of an argument, based on your analysis of it. Thus far in the course, we have explored the ways in which we read and analyze an argumentative text critically. Critical analysis of a text requires us to look for what the author claims (the main idea/thesis) and to closelyRead MoreThe Views Of Macaulay And Gandhi On Improving Social And Political Structure Of India Essay1246 Words   |  5 PagesThis essay looks at the opposing views of Macaulay and Gandhi on improving both the social and political structure of India. Macaulay suggested that education in english will produce colonial subjects that will produce a class of Indian men to think like the British. This ultimately aids in the goal to have British rule in India. Thomas Macaulay was the chair of the Committee of Public Instruction in 1835 British India. He has argued in his minute that the traditional Sanskrit and Arabic educationRead MoreRocking Infant Poor And Unlucky Travelers By Jonathon Swift955 Words   |  4 Pagesregulating their trade clearly benefitting the Eng lish. England had left Ireland starving and impoverished. Jonathon Swift, an author at the time, wrote several essays intending to spite the English and call the Irish to action to fight this oppression. The Irish did not respond. Terry Eagleton and Daniel Coleman’s theories prove that in his attempt to move Ireland to action Swift in actuality pacified their need to rebel again the encroaching English. His literature provided the humanization toRead MoreDefining Characteristic Of Berlin Dada ; A Vital Interwar Period Movement1424 Words   |  6 PagesPhotomontage is a defining characteristic of Berlin Dada; a vital interwar period movement, which primarily took place between 1915 and 1924. Although photomontage is associated with the interwar period, it undoubtedly had a monumental influence on the fine arts well after it’s initial collective disbanded, which included figures such as John Heartfield, Hannah Hoch, George Grosz, Kurt Schwitters, and Raoul Hausmann. In fact, even celebrated post-war and contemporary artists, such as David HockneyRead MoreBecoming Members of Society: Learning the Social Meanings of Gender (Devor1029 Words   |  5 PagesProfessor Shana Smith English 112 (D22P) March 21, 2013 Machin Rifamos (The Rise of Brown America An argument essay by Melvin Richardson) â€Å"Resistance is futile† is a resounding statement first exclaimed by the alien race called the Borg in the Gene Roddenberry long running television series Star Trek. â€Å"Why do you resist? Asked the Borg commander, Ryker replies â€Å"I like my species the way it is†! Borg commander counters with, â€Å"We only wish to raise quality of life for all species†Read MoreMartin Espada And Richard Rodriguezs View Of Bilingualism936 Words   |  4 PagesDoes my ability to speak multiple dialects of English infer I am bilingual? Society commonly interprets bilingualism as the capability to speak multiple languages. In reality, someone’s cultural and emotional connection largely helps define bilingualism. I define bilingualism as someone’s ability to express their culture(s) while speaking a language(s). The writers Martin Espada and Richard Rodriguez discuss their views of bilingualism within their essays. Espada teaches at the University of Massach usetts-AmherstRead MoreEssay on America, Land of Immigrants746 Words   |  3 Pagestheir personal cultural identity. It must be difficult to find the balance of personal identity and not seam un-American. This issue is discussed in the short essay by Myriam Marquez â€Å"Why and When We Speak Spanish in Public.† In the essay, Marquez explains how she and her family chose to use their native tongue, Spanish, instead of English. She says they do this, despite the impression some people may get of them being rude, â€Å"out of respect for their parents and comfort in our cultural roots.† Read MoreEnglish And English Linguistic Imperialism977 Words   |  4 Pagesthere is an increasing number of people speaking English and there has been much discussion on the issue of whether English users are the victims of linguistic imperialism. Historically, English was regarded as a lingua franca and it has the same function nowadays (Kachru, 1985, cited in Jenkins, 2014). In ad dition, linguistic imperialism is related to English in this essay. Although English users could profit from the spread of English and ‘English linguistic imperialism’ indeed brings some advantagesRead MoreThe Literary Canon On The Black Arts Movement941 Words   |  4 PagesLaqu’er Clark English 1305-05 Dr. Boone March 2, 2016 The Literary Canon How did the Black Arts Movement change the white supremacist of the Literary Canon? Before one can go on to answer this question, students must understand exactly what a literary canon is. â€Å"Literary canon† is a term used widely to refer to a group of literary works that are considered the most important of a particular time period or place. Before the 1960’s the canon was widely referred to as the â€Å"Western Canon.† However afterRead More`` Fate `` By Ralph Waldo Emerson1441 Words   |  6 PagesUniversity, accessed June 9, 2017, http://archive.vcu.edu/english/engweb/transcendentalism/authors/emerson/. Transcendentalists connected philosophy, literacy, and nature to promote a conscience or intuition that made it possible for each person to connect to the spiritual world. Philip F. Gura, Transcendentalism and Social Reform, History Now, accessed June 9, 2017, https://www.gilderlehrman.org/history-by-era/first-age-reform/essays/transcendentalism-and-social-reform. In this way, there

Wednesday, May 6, 2020

Input/Output Organization Free Essays

string(88) " and reads and writes to those addresses are interpreted as commands to the I/O device\." INPUT/OUTPUT ORGANIZATION †¢ Accessing I/O Devices †¢ I/O interface †¢ Input/output mechanism Memory-mapped I/O y pp / Programmed I/O Interrupts Direct Memory Access †¢ Buses Synchronous Bus Asynchronous Bus I/O in CO and O/S †¢ †¢ †¢ Programmed I/O Interrupts DMA (Direct memory Access) A bus is a shared communication link, which uses one , set of wires to connect multiple subsystems. The two major advantages of the bus organization are versatility and low cost. Accessing I/O Devices Most modern computers use single bus arrangement for connecting I/O devices to CPU Memory †¢ The bus enables all the devices connected to it to exchange information †¢ Bus consists of 3 set of lines : Address, Data, Control †¢ Processor places a particular address (unique for an I/O Dev. We will write a custom essay sample on Input/Output Organization or any similar topic only for you Order Now ) on address lines †¢ Device which recognizes this address responds to the commands issued on the Control lines †¢ Processor requests for either Read / Write †¢ The data will be placed on Data lines Hardware to connect I/O devices to b t bus Interface Circuit – Address Decoder – Control Circuits – Data registers – Status registers †¢ The Registers in I/O Interface – buffer and control †¢ Flags in Status Registers like SIN, SOUT Registers, SIN †¢ Data Registers, like Data-IN, Data-OUT I/O interface for an input device Memory Address Processor Data Control Address Add Decoders Control C t l circuits Data d t t D t and status registers I/O /O Interface Input device (s) p ( ) Input Output mechanism h i †¢ Memory mapped I/O †¢ Programmed I/O †¢ Interrupts †¢ DMA (Direct memory Access) A bus generally contains a set of control lines and a set of data lines. The control lines are used to signal requests and acknowledgments, and to indicate what type of information is on the data lines. The control lines are used to indicate what the bus contains and to implement the bus protocol. The data lines of the bus carry information between the source and the destination. This information may consist of data, complex commands, or addresses. Buses are traditionally classified as processor-memory di i ll l ifi d buses or I/O buses or special purposed buses (Graphics, etc. ). Processor memory buses are short, generally high speed, and matched to the memory system so as to maximize memoryprocessor bandwidth. I/O b buses, b contrast, can be lengthy, can have many by t t b l th h types of devices connected to them, and often have a wide range in the data bandwidth of the devices connected to them. I/O buses do not typically interface directly to the memory but use either a processor-memory or a backplane bus to connect to memory. The major disadvantage of a bus is that it creates a communication bottleneck possibly limiting the maximum I/O bottleneck, throughput. When I/O must pass through a single bus, the bus bandwidth of that bus limits the maximum I/O throughput. Reason why b R h bus d i design is so difficult : i diffi lt – the maximum bus speed is largely limited by physical factors: the length of the bus and the number of devices. These physical limits prevent us from running the bus arbitrarily fast. – In addition, the need to support a range of devices with widely varying latencies and data transfer rates also makes bus design challenging. – it becomes difficult to run many parallel wires at high speed due to clock skew and reflection reflection. The two basic schemes for communication on the bus are synchronous and asynchronous. If a bus is synchronous (e. g. Processor-memory), it includes a clock in the control lines and a fixed protocol for communicating that is relative to the clock. g This type of protocol can be implemented easily in a small finite state machine. Because the protocol is predetermined and involves little logic, the bus can run very fast and the interface logic will be small. Synchronous buses have two major disadvantages: – First, every device on the bus must run at the same clock rate. Second, because of clock skew problems, synchronous buses cannot be long if they are fast. An A asynchronous b h bus i not clocked. It can accommodate a is t l k d d t wide variety of devices, and the bus can be lengthened without worrying about clock skew or synchronization problems. To coordinate the transmission of data between sender and receiver, an asynchronous bus uses a handshaking protocol. Three special c ontrol lines required for hand-shaking: ReadReq: Used to indicate a read request for memory. The address is put on the data lines at the same time. DataRdy: Used t i di t th t th d t D t Rd U d to indicate that the data word is now ready on the di d th data lines; asserted by: Output/Memory and Input/I_O Device. Ack: Used to acknowledge the ReadReq or the DataRdy signal of the other party. I/O Dev. Memory Steps after the device signals a request by raising ReadReq and putting the address on the Data lines: 1. When memory sees the ReadReq line, it reads the address from the data bus and raises Ack to indicate it has been seen. 2. As the Ack line is high – I/O releases the ReadReq and data lines. g / q 3. Memory sees that ReadReq is low and drops the Ack line to acknowledge the ReadReq signal (Mem. Reading in progress now). 4. This step starts when the memory has the data ready. It places the data from the read request on the data lines and raises DataRdy. 5. The I/O device sees DataRdy, reads the data from the bus, and signals that it has the data by raising Ack. 6. On the Ack signal, M/M drops DataRdy, and releases the data lines. 7. Finally, the I/O device, seeing DataRdy go low, drops the Ack line, which indicates that the transmission is completed. Memory mapped I/O I/O devices and the memory share the same address space the space, arrangement is called Memory-mapped I/O. In Memory-mapped I/O portions of address space are assigned to I/O devices and reads and writes to those addresses are interpreted as commands to the I/O device. You read "Input/Output Organization" in category "Essay examples" †¢ â€Å"DATAIN† is the address of the input buffer associated with the k eyboard. – Move DATAIN, R0 reads the data from DATAIN and stores them into processor register R0; – Move R0, DATAOUT sends the contents of register R0 to location DATAOUT g Option of special I/O address space or incorporate as a part of memory address space (address bus is same always). When the processor places the address and data on the memory bus, the memory system ignores the operation because the address indicates a portion of the memory space used for I/O. The device controller, however, sees the operation, records the data, and transmits it to the device as a command. User programs are p p g prevented from issuing I/O g / operations directly because the OS does not provide access to the address space assigned to the I/O devices and thus the addresses are protected by the address translation. Memory mapped I/O can also be used to transmit data by writing or reading to select addresses. The device uses the address to determine the type of command, and the data may be provided by a write or obtained by a read. A program request usually requires several separate I/O operations. Furthermore, the processor may have to interrogate the status of the device between individual commands to determine whether the command completed successfully. DATAIN DATAOUT STATUS CONTROL 7 6 5 4 DIRQ KIRQ DEN KEN SOUT SIN 3 2 1 0 I/O operation involving keyboard and display devices Registers: DATAIN, DATAOUT, STATUS, CONTROL Flags: SIN, SOUT – Provides status information for keyboard nd display unit KIRQ, DIRQ – Keyboard, Display Interrupt request bits DEN, KEN –Keyboard, Display Enable bits Programmed I/O †¢ CPU has direct control over I/O – S Sensing status i t t – Read/write commands – Transferring data †¢ CPU waits for I/O module to complete operation †¢ Wastes CPU time In this case, use dedicated I/O instructions in the processor . These I/O instructions can specify both the device number and the command word (or the location of the command word in memory). The processor communicates the device address via a set of wires normally included as part of the I/O bus. The actual command can be transmitted over the data lines in the bus. bus (example – Intel IA-32) IA-32). By making the I/O instructions illegal to execute when not in kernel or supervisor mode user programs can be mode, prevented from accessing the devices directly. The process of periodically checking status bits to see if it is time for the next I/O operation, is called polling. Polling is the simplest way for an I/O device to communicate with the processor processor. The I/O device simply puts the information in a Status register, register and the processor must come and get the information. The processor is totally in control and does all the work. A ISA program to read one line from the keyboard, store it in memory buffer and echo it back to the display buffer, The disadvantage of polling is that it can waste a lot of processor time because processors are so much faster than I/O devices devices. The processor may read the Status register many times, only to find that the device has not yet completed a comparatively slow I/O operation, or that the mouse has not budged since the last time it was polled. When the device completes an operation, we must still read the status to determine whether it (I/O) was successful. Overhead in a polling interface lead to the invention of interrupts to notify the processor when an I/O device requires attention from the processor. Interrupt-driven I/O, Interrupt driven I/O employs I/O interrupts to indicate to the processor that an I/O device needs attention. When a device wants to notify the processor that it has completed some operation or needs attention, it causes the processor to be interrupted. Interrupts I/O INTERRUPT Processor †¢ When I/O Device is ready, it sends the INTERRUPT signal to processor via a dedicated controller line †¢ Using interrupt we are ideally eliminating WAIT period †¢ In response to the interrupt, the processor executes the Interrupt Service Routine (ISR) †¢ All the registers flags program counter values are saved registers, flags, by the processor before running ISR †¢ The time required to save status restore contribute to execution overhead ? â€Å"Interrupt Latency† p y nterrupt-acknowledge signal – I/O device interface p y accomplishes this by execution of an instruction in the interrupt-service routine (ISR) that accesses a status or data register in the device interface; implicitly informs the device that its interrupt request has been recognized. IRQ signal is then removed by device. ISR is a sub-routine – may belong to a different user than the one being executed and then halted. The condition cod e flags and the contents of any registers used by both the interrupted program and the interrupt-service interrupt service routine are saved and restored restored. The concept of interrupts is used in operating systems and i many control applications, where processing of d in l li i h i f certain routines must be accurately timed relative to external events (e. g. real-time processing). Interrupt Hardware p Pull up Pull-up resister INTR = INTR1 +†¦.. +INTR n INTR An equivalent circuit for an open drain bus used to implement a open-drain common interrupt-request line Interrupt Hardware Supply pp y R INTR Processor Pull-up resister INTR 1 INTR 2 INTR 3 INTR = INTR1 +†¦.. +INTR n GND INTR Enabling and Disabling Interrupts Device activates interrupt signal line and waits with this signal activated until processors attends †¢ The interrupt signal line is active during execution of ISR and till the device caused interrupt is serviced †¢ Necessary to ensure that the active signal does not lead to successive interruptions (level-triggered input) causing (level triggered the system to fall in infinite loop. †¢ What if the same d i h h device i interrupts again, within an ISR ? i i hi †¢ Three methods of Controlling Interrupts (single device) – Ignoring interrupt – Disabling interrupts – Special Interrupt request line Ignoring Interrupts – Processor hardware ignores the interrupt request line until the execution of the first instruction of the ISR completed – Using an interrupt disable instruction after the first instruction of the ISR – no further interrupts – A return from interrupt instruction is completed before further interruptions can occur †¢ Disabling Interrupts – Processor automatically disables interrupts before starting the execution of the ISR – The processor saves the contents of PC and PS (status register) before performing interrupt disabling. The interrupt-enable is set to 0 – no further interrupts allowed – When return from interrupt instruction is executed the contents of the PS are restored from the st ack, and the interrupt enable is set to 1 †¢ Special Interrupt line p p – Special interrupt request line for which the interrupt handling circuit responds only t th l di h dli i it d l to the leading edge of d f the signal – Edge –triggered g gg – Processor receives only one request regardless of how long the line is activated – N separate i t No t interrupt di bli t disabling i t instructions ti The sequence of events involved in handling an interrupt request from a single device. Assuming that interrupts are enabled, the following is a typical scenario: 1. 1 The device raises an interrupt request request. 2. The processor interrupts the program currently being executed. t d 3. Interrupts are disabled by changing the control bits in the PS (except in the case of edge-triggered interrupts) interrupts). 4. The device is informed that its request has been recognized, and in response, it deactivates the interrupti d di d ti t th i t t request signal. . The action requested by the interrupt is performed by the interrupt-service routine. 6. Interrupts are enabled and execution of the interrupted program is resumed. Handling Multiple Devices †¢ Multiple devices can initiate interrupts p p †¢ They uses the common interrupt request line y p q †¢ Techniques are q – Polling – Vectored Interrupts p – Interrupt Nesting – Daisy Chaining y g Polli ng Scheme †¢ The IRQ (interrupt request) bit in the status register is set when a device is requesting an interrupt. The Interrupt service routine polls the I/O devices connected to the bus. †¢ The first device encountered with the IRQ bit set is serviced and the subroutine is invoked. †¢ Easy to implement, but too much time spent on checking the IRQ bits of all devices, though some devices may not be requesting service. Vectored Interrupts †¢ Device requesting an interrupt identifies itself directly to the processor †¢ The device sends a special code to the processor over the bus. The code contains the – identification of the device device, – starting address for the ISR, – address of the branch to the ISR †¢ PC finds the ISR address from the code. †¢ To add flexibility for multiple devices – corresponding ISR is executed by the processor using a branch address to the appropriate routine – device specified Interr upt Vector. An interrupt vector is the memory address of an interrupt handler, or an index into an array called an interrupt vector table or dispatch table – a table of interrupt vectors (pointers to routines that handle interrupts). Interrupt vector tables contain the memory addresses of interrupt handlers. When an interrupt is generated, the processor saves its execution state via a context switch, and begins execution of the interrupt handler at the interrupt b i ti f th i t t h dl t th i t t vector. The Interrupt Descriptor Table ( p p (IDT) is specific to the ) p I386 architecture. It tells where the Interrupt Service Routines (ISR) are located. Each interrupt number is reserved for a specific purpose. For example, 16 of the vectors are reserved for the 16 IRQ lines. Q On PCs, the interrupt vector table (IVT or IDT) consists of 256 4-byte pointers – the first 32 (0-31 or 00-1F) of which are reserved f for processor exceptions; the rest f for hardware interrupts, software interrupts. This resides in the first 1 K of addressable memory. Interrupt Nesting †¢ Pre-Emption of low priority Interrupt by another high Pre Emption priority interrupt is known as Interrupt nesting. †¢ Di bli Disabling I t Interrupts d i t during th execution of th ISR the ti f the may not favor devices which need immediate attention. Need a priority of IRQ devices and accepting IRQ from a high priority device. †¢ The priority level of the processor can be changed y y dynamically. †¢ The privileged instruction write in the PS (processor status word) that encodes the processors priority word), priority. Interrupt Nesting (contd. ) Pro ocessor INTR1 Device 1 INTA 1 Device 2 INTRp .. . Device p INTA p Priority arbitration circuit †¢ Organizing I/O devices in a prioritized structure. g g / p †¢ Each of the interrupt-request lines is assigned a different priority level level. †¢ The processor is interrupted only by a high priority device. Daisy Chaining †¢ †¢ †¢ †¢ The interrupt request line INTR is common to all the devices The interrupt acknowledgement line INTA is connected to devices in a DAISY CHAIN way INTA propagates serially through the devices Device that is electrically closest to the processor gets high hi h priority i i Low priority device may have a danger of STARVATION INTR P Processor r Device D i 1 INTA Device D i 2 .. Device n D i Daisy Chaining with Priority Group †¢ †¢ Combining Daisy chaining and Interrupt nesting to form p priority group yg p Each group has different priority levels and within each group devices are connected in daisy chain way INTR1 Proc cessor Device 1 Device 1 INTA 1 INTR p . . . . Device D i 1 INTA p Priority arbitration circuit Device D i 1 Arrangement of priority groups Direct Memory Access (DMA) †¢ For I/O transfer, Processor determines the status of I/O devices, by – – Polling Waiting for Interrupt signal †¢ Considerable overhead is incurred in above I/O transfer processing †¢ To transfer large blocks of data at high Speed, between EXTERNAL devices Main Memory, DMA approach is often used †¢ DMA controller allows data transfer directly between I/O device d i and d Memory, M with i h minimal i l intervention i i of f processor. Direct Memory Access (DMA) †¢ DMA controller acts as a Processor, but it is controlled by CPU †¢ To initiate transfer of a block of words, the processor sends the following data to controller – The starting address of the memory block – The word count h d – Control to specify the mode of transfer such as read or write – A control to start the DMA transfer †¢ DMA controller performs the requested I/O operation and sends a interrupt to the processor upon completion 1 Status and Control Starting address Word count In ? ? ? IRQ 30 IE 1 R/W 0 Done DMA interface g g First register stores the starting address Second register stores Word count Third register contains status and control flags Bits and Flags R/W Done IRQ IE 1 READ Data transfer finishes Interrupt request Raise interrupt (enable) after Data Transfer 0 WRITE Processor Main memory Disk/DMA controller DMA controller Printer Keyboard Disk Disk Network Interface Use of DMA Controller in a computer system Memory accesses by the processor and DMA Controller are interwoven †¢ DMA devices have higher priority then processor over BUS control †¢ Cycle Stealing:- DMA Controller â€Å"steals† memory cycles from processor, though processor originates most memory access. †¢ Block or Burst mode:- The of data without interruption †¢ Conflicts in DMA: – Processor and DMA, – Two DMA controllers, try to use the Bus at the same time to access the main memory DMA controller may given exclusive access to the main memory to transfer a block DMA and Interrupt Breakpoints During D i an I t Instruction Cycle ti C l Bus Arbitration †¢ Bus master: device that initiates data transfers on the bus. †¢ The next device can take control of the bus after the current master relinquishes control †¢ Bus Arbitration: process by which the next device to become master is selected †¢ Centralized and Distributed Arbitration BBSY P Processor r BR BG1 DMA controller 1 BG2 DMA controller 2 A simple arrangement for bus arbitration using a daisy chain BR (bus request ) line – open drain line – the signal on this line is a logical OR of the bus request from all the g q DMA devices – BG (bus grant) line – processor activates this line indicating (acknowledging) to all the DMA devices (connected in daisy chain fashion) that the BUS may be used when its free free. – BBSY (bus busy) line – open collector line – the current bus master i di b indicates d i devices that i i currently using h it is l i the bus by signaling this line BBSY Processor BR BG1 DMA controller 1 BG2 DMA controller 2 Sequence of signals during data transfer of bus mastership †¢ Centralized Arbitration – Separate unit (bus arbitration circuitry) connected to the bus – Processor is normally the bus master, unless it grants bus mastership to DMA For the timing/control, in previous slide: DMA controller 2 requests and acquires bus mastership and later releases the bus. During its tenure as the bus master, it may perform one or more data transfer operations, depending on whether it is p , p g operating in the cycle stealing or block mode. After it releases the bus, the processor resumes bus mastership. †¢ Distributed Arbitration – All devices waiting to use the bus has to carry out the arbitration process – no central arbiter – Each device on the bus is assigned with a identification number 4-bit – One or more devices request the bus by asserting q y g the start-arbitration signal and place their identification number on the four open collector lines – ARB0 through ARB3 are the four open collector lines – One among the four is selected using the code on the lines and one with the highest ID number A distributed arbitration scheme Assume that two devices, A and B, having ID numbers 5 and 6, respectively, are requesting the use of the bus. Device A transmits the pattern 0101, and device B transmits the pattern 0110. p The code seen by both devices is 0111. Each device compares the pattern on the arbitration lines to its own ID, starting from the most significant bit. If it detects a difference at any bit position, it disables its drivers at that bit position and for all lower-order bits. It does so by placing a 0 at the input of these drivers drivers. In the case of our example, device A detects a difference on line ARB I. Hence, it disables its drivers on diff li I H i di bl i d i lines ARB 1 and ARBO. This causes the pattern on the arbitration lines to change to 0110, which means that B has won the contention. Universal Serial Bus (USB) The USB supports two speeds of operation called lowoperation, low speed (1. 5 megabits/s) and full-speed (12 megabits/s). The Th most recent revision of the bus specification (USB i i f h b ifi i 2. 0) introduced a third speed of operation, called high-speed (480 megabits/s). The USB has been designed to meet several key objectives: -P Provide a simple, low-cost, and easy to use interconnection id i l l t d t i t ti system that overcomes the difficulties due to the limited number of I/O ports available on a computer – Accommodate a wide range of data transfer characteristics for I/O devices, including telephone and Internet connections / , g p – Enhance user convenience through a †plug-and-play† mode of operation USB Bandwidths: A low-speed rate of 1. 5 Mbit/s (~183 kB/s) is defined by USB 1. 0. It is intended primarily to save cost in lowbandwidth human interface devices (HID) such as keyboards, ( ) y , mice, and joysticks. The full-speed rate of 12 Mbit/s (~1. 43 MB/s) is the full speed ( 1. 43 basic USB data rate defined by USB 1. 1. All USB hubs support full-bandwidth. A high-speed (USB 2. 0) rate of 480 Mbit/s (~57 MB/s) was introduced in 2001. All hi-speed devices are capable of falling back to full bandwidth operation if necessary; they are full-bandwidth backward compatible. Connectors are identical. SuperSpeed ( d (USB 3. 0) rate produces upto 4800 Mbit/s ) d bi / (~572 MB/s or 5 Gbps) Each node of the tree has a device called a hub, which acts as an intermediate control point between the host and the I/0 devices devices. At the root of the tree, a root hub connects the entire tree to the host computer. The leaves of the tree are the I/0 p / devices being served. The tree structure enables many devices to be connected while using only simple point-topoint serial links. Each hub has a number of ports where devices may be connected, including other hubs. In normal operation, a hub g copies a message that it receives from its upstream connection to all its downstream ports. As A a result, a message sent b the host computer is lt t by th h t t i broadcast to all I/O devices, but only the addressed device will respond to that message. A message from an I/O device is sent only upstream towards the root of the tree and is not seen by other devices. Hence, th USB enables th h t t communicate with the I/O H the bl the host to i t ith th devices, but it does not enable these devices to communicate with each other. The USB operates strictly on the basis of polling. A device may send a message only in response to a poll message from the host host. Hence, upstream messages do not encounter conflicts or interfere with each other, as no two devices can send other messages at the same time. This restriction allows hubs to be simple, low-cost devices. USB protocol requires that a message transmitted on a highspeed link is always transmitted p y at high speed, even when the ultimate receiver is a low-speed device. device Hence, a message intended for device D is sent at high speed from the root hub to hub A, then A forwarded at low speed to device D. The latter transfer will take a long time, during which highl ti d i hi h hi h speed traffic to other nodes is allowed to continue. Each device on the USB, whether it is a hub or an I/O device, is assigned a 7-bit address. This address is local to the USB tree and is not related in any way to the addresses used on the processor bus. A hub may have any number of devices or other hubs connected to it, and addresses are assigned arbitrarily. When a device is first connected to a hub, or when it is powered on, it has the address 0. The hardware of the hub to which this device is connected is capable of detecting that the device has been connected, and it records this f d hi fact as part of i own status i f f its information. Periodically, the host polls each hub to collect status information and learn about new devices that may have been added or disconnected. When the host is informed that a new device has been connected, connected it uses a sequence of commands to send a reset signal on the corresponding hub port, read information from the device about its capabilities, send configuration information to the device, and assign the device a unique USB address. O d i d i th d i i dd Once this thi sequence is completed the device begins normal operation and responds only to the new address. Read about USB protocols Isochronous traffic on USB and USB FRAME How to cite Input/Output Organization, Essay examples

Thursday, April 30, 2020

Two star crossd lovers Essay Example

Two star crossd lovers Paper William Shakespeares Romeo and Juliet is about Two star crossd lovers who take their lives. It is a famous tragic love story directed in 1997, which is as popular today as in Shakespeares time. Romeo and Juliet is the most tragic love story in the world and the most well known Shakespeare play. This play was set in Italy, which during the sixteenth century was considered as an affluent and amorous country. Shakespeares language brings the story to life, making each character distinctive and reveals the chaos of emotions that Romeo and Juliet experience throughout the play. In Romeo and Juliet many themes are brought forward like love, conflict, fate, life and death, power, time and two worlds. The reason why this play has such dominant genres is because this play shows the downfall of the two protagonists. However, the liability for their breakdown lies outside the characters, it is the workings of fate. Baz Luhrmann directed the modern film Romeo and Juliet in 1997. When he was directing the new version of Romeo and Juliet he didnt know whether there would be an audience for Shakespearean stories in a modern culture. So Luhrmann didnt make this film with the old-fashioned, Shakespeare in mind. Instead, by using lively, modern images (swimming pool etc.) with a modern rock soundtrack and young good-looking popular actors. He will have an action film that is exiting and fun to watch, and a more romantic version. For this reason things would have to be edited. By casting young popular actors/actresses like Leonardo Di Caprio and Clare Danes, Baz Luhrmann has brought in a younger audience who would not otherwise go to see a work by William Shakespeare, and the fact that the film is set in modern America and has scenes of violence involving guns and fighting would draw in more of a male audience than if it was set in 16th Century England. I think that by incorporating modern issues such as homosexuality, drugs and violence he has made the film more relevant to todays society. We will write a custom essay sample on Two star crossd lovers specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Two star crossd lovers specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Two star crossd lovers specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Baz Luhrmann uses many different techniques in the modern version of Shakespeares Romeo and Juliet, to make the opening sequence effective to the audience. Straight away we are introduced to the Montague Boys they are a gang of punks, dressed similarly cruising in their car with the music rowdy. In just this minute into the story we can see so many areas that put forward the fact that this is a modernised version of the play. For example the Montagues are driving a car, which has a private number plate, and they have loud music on. These points make the opening scene very effective to me as a teenager and I think to anybody else who has been brought up in a modern lifestyle. The modernising allows you to understand what is happening easier as you can relate it to something that would happen nowadays near you. The picture freezes as the boys are introduced as Montagues and the camera uses a shot of the whole car (medium shot) to make the freeze more effective as everyone can be seen easily. The Montagues drives into a petrol station to fill the car up with petrol, but soon to follow them in are The Capulets. The two households are now together in one petrol station. The tension created at this scene is immense as the audience panic about what is going to happen next. The Capulets are portrayed as the mean people and they come across as much tougher and violent people than the Montagues. The different images that the two households have are very effective and help the audience to understand who is who. Tybalt the Prince of Cats is introduced to the audience with great effect. As he gets out of the car the camera focuses only on his steel heeled leather boots. He walks towards the Montagues and every stride he takes is emphasised as his steel heeled boots clang as they hit the ground. The camera is still only focused on his boots and the audience dont actually know who this man is yet, he has not yet been introduced as Tybalt. This creates tension and helps to make the opening scene effective because the audience dont know whom he is or what is going to happen next. All they know is that the boots come across as something an aggressive person would wear and that the man is a Capulet, so an aggressive Capulet could mean a fight. To increase the tension the music has stopped playing so all the audiences minds are focused on are Tybalts boots. The camera now introduces Tybalt and focuses on all his body. He drops a cigar that he was smoking on the floor and again the camera changes its shot to one that is zoomed in on Tybalts feet and the ground beneath them. He grinds the cigar out with the bottom of his heel and the sound effects are loud so that the audience can here. The scraping sound that the steel heel makes as he crushes the cigar gives the audience the feeling that he is ruthless and that he probably treats people in a similar way to his cigar. He just grinds them beneath his feet if they get in his way. Extinguishes them! The fact that Tybalt was smoking in a petrol station shows that he is ruthless and that he doesnt obey rules. Once the camera has finished focusing on the cigar it zooms in on a signpost that reads Careful fire hazard on it. This is again to create tension and for the audience to think about what is going to happen next. The opening scene of Romeo and Juliet is definitely based on tension build-ups. Humour follows this tense scene to help to break it up a little. One of the Montagues hides behind an old womans car door, as he is scared about what is going to happen next. He has pink punk style hair and is wearing a garish t-shirt. He looks so ridiculous that anyone would have to have at least a slight giggle at the sight of him. To add to that the lady whose car it is panics and thinks that the Montague is going to hurt her so she begins hitting him with her handbag. This is just comical and when you can actually watch his face and hers you have to laugh. These little acts of humour do make the scene effective as they break up the tension and then this allows it to be built back up again wit hout the audience getting bored. The weapons in this film are guns with the brand name sword. It should be noted that the engraving on the guns is SWORD therefore when put up your swords is spoken it is meant as guns. In Act 3 Scene 1,the Capulet boys appear; in the background, you can hear western music. Which suggests theres going to be a duel. The Capulets have come to find Romeo because Tybalt had seen him at the Capulets party the night before. This scene is a key moment of tension as this scene leads to Mercutios death. Mercutios role in this play is very imperative because his death is the turning point when the play becomes a tragedy. Tybalt insults Romeo and uses the party as an excuse to fight: Turn and draw. Romeos love for Juliet and the fact that he has married a Capulet causes him a great deal of discomfort during this scene. He does not want to fight Tybalt. Romeo tries to flatter Tybalt to diffuse the situation. The shot sequence in the Baz Luhrmann movie is very meaningful for the tension of the scene. He has a variety of camera shots implied. He first uses a Medium Shot on Tybalts face. He uses this type of shot to illustrate Tybalts body language. This is an establishing shot because it sets the scene. In this scene he shows Mercutios face repeatedly as a close up shot and also as a reaction shot. This shot tells us that he is going to do something astonishing and shocking in the fight. The close up also shows his individual emotions. His facial expressions are very angry and frustrated. Women played a completely different role in society in Elizabethan times than they do today. Wealthy upper class women like Juliet were expected to obey their fathers wishes and marry at their command. Loving someone was not an excuse to marry someone. Fathers arranged marriages mainly for social reasons like wealth. In the case of Juliet she was forced to marry when secretly she was already married to her true love Romeo. Juliet at the time fought passionately to stop the arranged marriage. This would be most unusual at the time for young a woman to fight back against her fathers wishes. This event would have surprised and stunned the crowd watching. When Lady Capulet arrives bringing good news in Act 3 Scene 5 saying, Marry, my child. Juliets horror was observed and the response of the audience was shocking. By this time in the play the audience would be completely involved in the play and on their edge of their seats, some must be sympathetic towards Juliet, some laughing with the dramatic irony, but all truly sunken in the story. Capulet is extremely angry at Juliets direct refusal of the generous offer he has made. There is also a fear in the atmosphere for Juliet. While directing this film Baz Luhrmann used many theatrical devices like the music. The tempo of the music upsurges when Capulet walks in; this builds up tension because he has brought good news that Juliet cant accept. His movement is emotional and poigient. The body language is very important for this scene as it is an aggressive scene and there is a lot of physical movement. Juliet has a defensive posture while Capulet has an angry and fuming posture. The movement of Capulet is very mystified and confused, he is also angry because he cannot take that Juliet rejected an offer from a noble family. The speed of the mother slows down at the end of the scene. The facial expression for each character is diverse. Capulets is negative while Juliets is defiant and angry and Lady Capulets is horrified and pale. The little detail of everything by Luhrmann helps create a tense environment. The filming of the shots help work out the mood of the characters. It also can tell another characters point of view. The Fathers face has been repeatedly zoomed in this helps work out the facial expression and the body posture. The close up of the father is very effective because it shows power and anger and also we could see that hes more dominant than the rest. The High angle Shot of Juliet on the bed shows the weak and defensive body posture. This also shows how controlling her father is. The low angle shot of Capulet and Lady Capulet shows how prevailing and ascendant they are. The effect created could be the audience sympathising Juliet. The medium shot of Lady Capulet and Capulet together shows that they are together and they both feel the same way. The effect created is that Juliet is gone weak because two authoritative and prevailing bodies have gone against one. By the end of the harsh fight of words and angry exchange of feelings Juliet is left shattered and exhausted weeping with despair. The audience feel immensely upset and probably want to comfort Juliet. In conclusion, Luhrmann has created an exciting and highly rated adaptation to the original story in many ways including visual imagery like his powerful music, vivid colours, contrasting costumes and exciting camera techniques. Generally, the first scene has established the mood and set the scene in many ways. In the first scene he has mixed comedy with action successfully enough to capture the modern day audience. I think that by incorporating modern issues such as homosexuality, drugs and violence he has made the film more relevant to todays society. I also think this film is an accurate insight of Shakespeares themes and ideas. This film, in my opinion, is complex yet simple. That is why it is so successful and can be watched and understood by everybody.

Saturday, March 21, 2020

The people who started the movement around Jesus

The people who started the movement around Jesus must have suffered a traumatic setback with his death. They were expecting the coming of the kingdom of God on earth, but it did not arrive immediately as they had expected. Something changed their outlook on who Jesus was and what he would mean for the future of the movement. This is known as a rebirth. The followers of Jesus were convinced that he had been raised from the dead and had been taken away into heaven as an acquittal of his messianic identity. The earliest form of the movement was thoroughly a sect within Judaism. The earliest forms of the Jesus movement were small, sectarian groups. The people held on tightly to their beliefs and expectations while at the same time continued in their Jewish tradition. One of the things they had to do was distance themselves from their authoritative cultural surroundings. A sect always arose within a community with whom it shared a basic set of beliefs and yet, it needed to find some way to differentiate itself. Sectarian groups were always in tension with their environment. That tension was manifested in a variety of ways. There were controversies over belief and practice and different ideas of pureness and holiness. Another demonstration of the tension is the tendency to spread the message out, to travel, and convince others that the truth is real. Christianity did not start out as a unified movement. There were no fixed thoughts of what Christian beliefs should be, what Christian rituals should be, or what they should think about Jesus or what they should tell about Jesus. Over a long period of time Constantine, Julian, and Arius had disputes over which religion should dominate their region. Christianity adopted a lot of concepts from other religions, which enriched the early Christian movement tremendously. By the time of the conversion Christianity became the official religion of the Roman Empire. That was not a sim...

Wednesday, March 4, 2020

Understanding the Progressive Era

Understanding the Progressive Era It can be difficult for students to understand the relevance of the period we call The Progressive Era because society before this period was very different from the society and the conditions we know today. We often assume that certain things have always been around, like laws about child labor and fire safety standards. If you are researching this era for a project or research paper, you should begin by thinking about the way things were before government and society changed in America. Before the events of the Progressive Era occurred (1890-1920), American society was much different. The federal government had less of an impact on the lives of the citizen than we know today.  For example, there are laws that regulate the quality of food that is sold to American citizens, the wage that is paid to workers, and the work conditions that are endured by American workers. Before the Progressive Era food, living conditions, and employment was different. Children were employed in factoriesWages were low and unregulated (with no wage minimums)Factories were crammed and unsafeNo standards existed for food safetyNo safety net existed for citizens who couldnt find employmentHousing conditions were unregulatedThe environment was not protected by federal regulations The Progressive Movement refers to social and political movements that emerged in response to rapid industrialization from which caused societal ills.  As cities and factories emerged and grew, quality of life declined for many American citizens. Many people worked to change the unjust conditions that existed as a result of the industrial growth that took place during the late 19th century. These early progressives thought that education and government intervention could ease poverty and social injustice. Key People and Events of the Progressive Era In 1886, the American Federation of Labor is founded by Samuel Gompers. This was one of many unions that emerged toward the end of the nineteenth century in response to unfair labor practices like long hours, child labor, and dangerous working conditions. Photojournalist Jacob Riis exposes deplorable living conditions in the slums of New York in his book How the Other Half Lives: Studies Among the Tenements of New York.   Conservation of natural resources becomes a matter of public concern, as the Sierra Club was founded in 1892 by John Muir. Womens Suffrage gains steam when Carrie Chapman Catt becomes president of the National American Womens Suffrage Association.   Theodore Roosevelt becomes president in 1901 after the death of McKinley. Roosevelt was an advocate for trust busting, or the breaking up of powerful monopolies that crushed competitors and controlled prices and wages. The American Socialist Party was established in 1901.   Coal miners strike in Pennsylvania in 1902 to protest their terrible working conditions. In 1906, Upton Sinclair publishes The Jungle, which portrayed the deplorable conditions inside the meatpacking industry in Chicago. This led to the establishment of food and drug regulations. In 1911, a fire broke out at the Triangle Shirtwaist Company, which occupied the eighth, ninth, and tenth floors of a building in New York. Most of the employees were young women aged sixteen to twenty-three, and many on the ninth floor perished because exits and fire escapes were locked and blocked by the company officials. The company was acquitted of any wrongdoing, but the outrage and sympathy from this event prompted legislation concerning  unsafe working conditions. President Woodrow Wilson signs the Keating-Owens Act in 1916, which made it illegal to ship goods across state lines if they were produced by child labor. In 1920, Congress passed the 19th Amendment, which gave women the right to vote. Research Topics for The Progressive Era   What was life like for children who worked in factories? How was this different from the work of children who lived on farms?How did views on immigration and race change during the Progressive Era? Did the legislation of this era effect all people, or were certain populations most affected?How do you suppose the trust busting legislation affected business owners? Consider exploring the events of the Progressive Era from the point of view of wealthy industrialists.How did living conditions change for people who moved from the country to the cities during this time period? How were people better off or worse off during the shift from country living to city living?Who were the major figures in the Womens Suffrage movement? How was life impacted for these women who came forward?Explore and compare life in a mill village and life in a coal camp.Why did the concern for environmental issues and natural resource preservation emerge at the same time as concern and awareness for social issues like poverty? How are these topics related? Writers and photojournalists were key figures in Progressive Era reforms. How does their role compare to changes that have taken place due to the emergence of social media?How has the power of the federal government changed since the Progressive Era? How have the powers of individual states changed? What about the power of the individual?How would you compare the changes in society during the Progressive Era to changes in society during and after the Civil War?What is meant by the term progressive? Were the changes that took place during this time period actually progressive? What does the term progressive mean in the current political climate?The Seventeenth Amendment, which allowed for the direct election of US Senators, was ratified in 1913 during the period known as the Progressive Era. How does this reflect the sentiments of this period?There were many setbacks to the Progressive Era movements and campaigns. Who and what created these setbacks, and what were the interests of the parties involved? Prohibition, the constitutional ban on the production and transportation of alcoholic beverages, also took place during the Progressive Era. How and why was alcohol the subject of concern during this period? What was the impact of Prohibition, good and bad, on society?What was the role of the Supreme Court during the Progressive Era?   Further Reading for The Progressive Era Prohibition and Progressive Reform The Fight for Womens Suffrage Muckrakers

Monday, February 17, 2020

Recommendation memo for business trend Essay Example | Topics and Well Written Essays - 1500 words

Recommendation memo for business trend - Essay Example Starbucks' clients have less money in their pockets than they used to. They may have lost their jobs or cut back on consuming luxury coffee like Starbucks. Furthermore, as the housing bust has unwound, whole neighbourhoods have changed. They will want to reconsider the placement of cafes. These are just several of a number of recommendations included below to help Starbucks weather this storm and once again get back on top of the coffee world. Starbucks is a very strong brand with a loyal following. They are well positioned to storm back to the top of the charts. Over the years, Starbucks has proved itself to be a very successful company. It is has expanded substantially and is a recognized brand. But the financial crisis and economic downturn had a severe impact on its revenue (see figure 1, appendix). Now is the time to consider a number of steps which can help Starbucks restore itself to its former glory. It is not a matter of simply returning Starbucks to the position it held bef ore the crisis. Many things have changed in the marketplace since then. Success may well mean something different now. Starbucks must look around at a changing marketplace and seize new opportunities. In some cases it may have to shift its focus in order to maximize returns. What follows are five recommendations to ensure the Starbucks does not become a relic. The recommendations aim to help Starbucks focus on its customers and its future. Lower cost and rebrand The era of conspicuous consumption is over. The economic crisis made sure of that. It resulted in serious damage to national economies worldwide and the cuts that will have to result to bring down the deficit have not yet been made. Things are going to get worse before they get better. This is a problem because the price of Starbucks coffee is too high. Competition with MacDonalds may be negatively impacting Starbucks sales (Ordonez). The truth is that the climate has changed and cost is a big factor for many people these da ys. We need to see a small reduction in the price of a cup of coffee at Starbucks. That alone will be worth media attention and will be a kind of signal to consumers that Starbucks takes this issue very seriously. A lot of the coffee is overpriced and this overpricing is not sustainable with new competition in the market. Reducing the price even ten or fifteen per cent will show consumers that Starbucks is willing to change and adapt to new economic realities. This can be part of a rebranding that will make Starbucks more appealing to a larger audience. The communications element of branding is key to attracting more customers (Capon, 296). Currently, Starbucks is seen as a hipster place where the elites go to sip an expensive latte. There is no reason to lose this cache, but it makes sense in this economic climate to try to create a larger tent in which many different types of people can come and enjoy themselves. Starbucks needs to think long and hard about who it wants to attract in 2012 and beyond. The larger the customer base the more stable the company. It is important to remember that rebranding can be a risky proposition (Muzellec, et al, 802). Approach it with caution. Expansion into new markets Starbucks is seen primarily as an American company, with most of its cafes in North America and Western Europe. These generate a lot of

Monday, February 3, 2020

Primary source Analysis Research Paper Example | Topics and Well Written Essays - 500 words

Primary source Analysis - Research Paper Example Since it demonstrates how the slaves were relating with their masters, it can be of much benefit if used in studying about the topic, Work and Discipline of Plantation Slaves. The pictures of the slaves being shipped, yoked, monitored, punished and whipped clearly shows how they were considered to be loyal captives who would not be expected to rebel whatsoever. Summary: This primary source consists of 35 pamphlets which were collected together. Having been written by reputable scholars, the pamphlets are considered as a primary source since they contain first hand information about the plights of the African-Americans. These are the people who were used as slaves to work on the white plantations in the America. In these collections, the writers give a clear picture on how these slaves were subjected to harsh treatments and expected to remain disciplined. This, as they explain, was mainly achieved as a result of the punitive laws which had been put in place. Relevance: these pamphlets are very important in understanding the expansive history of the African-Americans. It can be instrumental in studying about the discipline of the slaves who were working on the plantation farms. Hence, it comes out as an outstanding and credible primary source authored by reputable scholars including Frederick Douglass, Ida Wells-Barnett, and Booker Washington. Summary: This is an excerpt of an interview which was conducted by about slavery. On June 11, 1949, Hermond Norwood interviewed Fountain Hughes in Baltimore, Maryland. Hughes was the right person for this interview because he was a former slave who had a deeper understanding about slavery. In this interview, he gave an account on how oppressive slavery was to the Negros. He says that they were not treated as human beings. Instead, they were stripped off their fundamental rights. Relevance: This interview is very

Sunday, January 26, 2020

Military Support to Civilian Law Enforcement Agencies

Military Support to Civilian Law Enforcement Agencies CHAPTER I: Violence perpetrated by Mexican Drug Trafficking Organizations (DTOs) increased dramatically in 2006 and continued to rise dramatically through 2010.   According to the National Drug Intelligence Centers â€Å"National Drug Threat Assessment, 2010†, published in February 2010, â€Å"Mexican DTOs dominate the transportation of illicit drugs across the Southwest Border.   They typically use commercial trucks and private and rental vehicles to smuggle cocaine, marijuana, methamphetamine, and heroin† (National Drug Threat Assessment, 2010).   The increase in DTO activity has resulted in an increase of military involvement in counterdrug operations along the U.S. southwestern border region.   The tables in the appendices outline the statistical extent of the problem and the geographic penetration of Mexican DTOs within the United States.   Americas densely populated southern border with Mexico stretches nearly 2,000 miles in length and possesses several established crossing points.   In areas along northern Mexico, DTOs organize and equip themselves with resources that out match Mexican military forces (McCaffrey 2009).   With these developments, it is necessary to consider increased U.S. military support to drug interdiction along the southwest border, as DTOs are a national security threat that directly plays a role in destabilizing the heavily trafficked areas in both the U.S. and Mexico. Problem Statement The problem is to determine what Military Support to Civilian Law Enforcement Agencies (MSCLEA) should be brought to bear against Mexican DTOs to interdict and reduce the flow of drugs across the Southwest Border. Research Objective This research aimed at answering and elucidating the following objectives: What capabilities does the U.S. military already have in the southwest border region to counter drug trafficking? What is the DTOs current capability to interdict drugs across the border (e.g. weapons, funding, resources)? What are the American laws and regulations governing the use of MSCLEA?   Is it financially feasible to increase MSCLEA? Assumptions The main premise to this research is based on the assumption that increasing the resources used to interdict the drug trafficking in the southwest border region will have a positive impact in disrupting DTOs operations, decreasing the amount of drugs trafficked and aiding in stabilizing the southwest border region.   Some groups advocate other approaches to the problem such as legalization and establishing additional treatment programs for users and abusers of illegal drugs.   Moreover, on the supply side, the assumption is diplomatic pressure on the countries that produce the drugs or assistance to their military and police organizations is necessary to increase the effectiveness.   This proposal assumes that enhanced interdiction efforts on the Southwest border will negatively impact Mexican DTOs and reduce use of illegal drugs within the United States. Additionally, the results and recommendations for this research assumed that all military assistance falls within Title 32 Duty and Article I,  § 8 of the Constitution that allows the National Guard to be used under the command and control of the governor to execute the laws of the Union, in order to suppress rebellion and deter invasions (Withers, 2010 p. 6). Definition of Terms Military Support to Civilian Law Enforcement Agencies (MSCLEA):   Technical assistance rendered to civilian law enforcement agencies.   This can include military resources that are not available to civilians such as aerial surveillance, technical assistance with these resources, and tactical advice.   It does not include actual law enforcement powers (Sergienko, 2006, p. 395). Interdiction efforts:    All efforts used to reduce the flow of illegal drugs into the United States on the ground (or underground) across the Southwest border.   Success equals increased levels of drug seizures. Southwest border:   The land border between the U.S. and Mexico; also called the U.S.-Mexico border. Limitations and delimitations This study is limited to ground interdiction.   Drug smuggling is an incredibly profitable enterprise.   If ground interdiction efforts are to prove effective, it presumes that DTOs would attempt to move their operations into marine and aerial operations.   However, this study will only consider the deployment of marine and aerial assets as they relate to ground operations.   This study will limit its focus of the Southwest to the three major DTO interdiction routes located in Texas, New Mexico, and California.   The strategies proposed or dismissed in this research may or may not be appropriate to compare with the interdiction efforts on other borders such as the northern border with Canada. This study will be limited to cooperation with civilian law enforcement agencies within the United States.   It will not consider support for Mexican civilian law enforcement agencies nor will it consider cooperation with the Mexican military although it will acknowledge that they are now the lead agency in struggle with DTOs within Mexico. All proposals for MSCLEA will be governed by the U.S Constitution, relevant U.S. laws and the USNORTHCOM directives on MSCLEA, â€Å"Military support to civilian law enforcement is carried out in strict compliance with the Constitution and U.S. laws and under the direction of the president and secretary of defense† (USNORTHCOM). CHAPTER II: Literature Review This chapter provides an overview of the literature examined.   It identifies the dominant literature and sources that will provide arguments addressing DTOs drug smuggling, MSCLEAs and the current situation along the Southwest border.   The academic debate concerning MSCLEA on the border focuses primarily on the issue of illegal immigration and second on drug interdiction.   There are only a few books on the topic.   Therefore, research will focus on scholarly articles, government studies, and statistical data available through the U.S. Border Patrol and Department of Enforcement Administration. Timothy Dunns 1996 book, The Militarization of the U.S.-Mexico Border, 1978-1992: Low Intensity Conflict Doctrine Comes Home is a study that compares data collected through interviews with military doctrine, law enforcement, congressional documents, and personal observations.   Dunns intent is to illustrate that increased activity along the southwest border escalated forcing military involvement in immigration and drug enforcement to a level unintended by Congress and defense officials.   Dunn provides insight to the difficulty associated with MSCLEA along the southwest border.   This historical data requires comparison to the post 9/11 challenges. There are numerous government studies and reports related to previous and current U.S. counterdrug program.   The Congressional Research Service (CRS) and the Government Accountability Office (GAO) prepared most reports for members of Congress.   The National Drug and Control Policy also have a number of useful products.   Stephen Vina CRS report in 2006, Border Security and Military Support: Legal Authorizations and Restrictions outlines military support legal and policy limitations with in the U.S.   His study states military support to DTO is feasible however, it must be restricted to the employment of Nation Guard for border security missions vice the employment of active duty (GAO, 2003).   The 2010 report Department of Defense Needs to Improve Its Performance Measurement System to Better Manage and oversee Its Counternarcotics Activities demonstrates congressional interest in measures of effectiveness to justify MSCLEA in the early 1990s.   The 1993 Heavy Investment in Military Surveillance is Not Paying Off   report   findings suggest some military assets, such as rotary wing transport and lower-end unmanned aerial vehicles are relatively inexpensive and within the potential budget of federal law enforcement.   Other assets such as large multi-role aircraft and naval vessels, are very expensive operate and maintain.   The GAO (2009) study concluded that military surveillance is costly particularly when modern technology systems designed to detect and control highly sophisticated weapon systems in combat situations are employed against a DTO smuggling threat. Together, these two reports support content from the recent Washington Office on Latin America report that strongly suggest there must be a separation of military and police roles in America.   George Withers would agree there is a lack of measures of effectiveness justifying military support on the border. The GAO study, Secure Border Initiative: Observations on Deployment Challenges discusses the challenges of integrating sensors and obstacles along the 2000-mile Southwest border.   Conversely,   the 2007 report, U.S. Assistance Has Helped Mexican Counternarcotics Efforts, but Tons of Illicit Drugs Continue to Flow Into the United States clearly demonstrates the difficulties of combating the supply of drugs.   This study bring about discussion to identify the gaps in capability could be leveraged with unique available military resources.   The Rise of Mexican Drug Cartel and U.S. National Security hearing conducted by the U.S. Department of Justice illustrated the success of interagency cooperation against targeting DTOs.   The report provides an overview of the capability of the DTOs operating along the southwest border and describes their ability to conduct drug trafficking, kidnapping, bribery, extortion, money laundering and smuggling of profits, and trafficking and use of dangerous firearms.   The report concludes that the best strategy to combat the full spectrum of the drug cartels operations is a holistic approach that employs the full spectrum of our law enforcement agencies and its resources, expertise, and statutory authorities.   The Mexican border states have become much like a war zone with heavily armed military units on the street (since the President deemed local police too corrupt to deal with the cartels) and frequent firefights between the military and the cartels.   According to L.A. Times, as of November 29, 2010, 28,288 people have died in Mexico since January 2007 because of the drug wars.   In relative terms, that number is higher than the number of American troops that have died in Iraq in the last seven years (Mexico under Siege The Drug War on Our Doorstep, 2010). â€Å"Mexico Under Siege The Drug War on Our Doorstep†, is an L.A. Times website that includes all of their coverage of drug smuggling along the Southwest border along with interactive maps, links to television coverage and a host of other information.   This website is the principle primary source for details of recent events and media coverage of the situation.   Additionally, the website â€Å"Drug Trafficking in Mexico† maintained by latinamericanstudies.org traces the history of the drug trafficking between Mexico and the U. S. from 1998-2009.   This website provides links to hundreds of other articles on the subject as well. The Congressional Reporting Service publication â€Å"Terrorism: Some Legal Restrictions on Military Assistance to Domestic Authorities Following a Terrorist Attack† by Charles Doyle and Jennifer Elsea presents the legal definition of MSCLEAs in the wake of post 9/11 developments (Doyle and Elsea, 2005). Increased MSCLEA issues emerged in the 1980s and 1990s with regard to the interdiction of drugs.   However, since 9/11 they have largely revolved around the role of MSCLEA around terrorism related incidents.   The official policy of the United States Army on MSCLEA is contained in the Catastrophic Disaster Response Staff Officers Handbook â€Å"Appendix I: Legal Considerations/Law Enforcement† published by the United States Army Combined Arms Center in May 2006.   This document is supplemented by a paper prepared by Colonel Thomas W. McShane entitled, â€Å"United States Northern Commands Mission to Provide Military Support to Civilian Law Enforcement Agencies: The Challenge to keep Homeland Security and Civil Liberty Dancing in Step with the Current Legal Music† (2004). There are varieties of publications that deal with the history of MSCLEA for Counter-drug Operations.   Most of the U.S. policy affecting domestic counterdrug MSCLEA require updates and fails to reflect the realities of the implementation of the North American Free Trade Agreement (NAFTA) or the terrorist attacks of 11 September 2001.   Two of these stand out as having particular importance for this proposal.   The first is The Militarization of the U.S.-Mexico Border, 1978-1992: Low-Intensity Conflict Doctrine Comes Home by Timothy J Dunn, published in 1996.   The second is a Rand Corporation report entitled Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction written by Peter Reuter, Gordon Crawford, and Jonathan Cave published in 1988.   Both of the documents are dated however, they will provide a historical context to compare to current operations.   Reuter concludes that military support provided in the war on drugs in the 1980s w as costly, ineffective, and distracted military forces from preparing for interstate combat missions. Both documents are roughly twenty years old and this means that their consideration of everything from the technology of interdiction efforts to the scope and influence of DTOs is dated.   On the other hand, both documents precede the emergence of the overwhelming threat of terrorist attacks and therefore the focus is on MSCLEAs in a pre-9/11 context with the emphasis on drug interdiction, not anti-terrorism operations. Most importantly, both of these documents present a negative image of interdiction efforts.   The U.S. military interdiction efforts, although criticize provides an approach from two different perspectives.   The Militarization of the U.S.-Mexico Border, 1978-1992: Low-Intensity Conflict Doctrine Comes Home published by the Center for Mexican American Studies at the University of Texas, Austin focuses on the negative effects of the militarization of the border in terms of lost economic opportunities and threats to civil liberties. More condemning, however, is the Rand Corporation document, Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction.   It concludes that interdiction efforts in general have little impact on the flow of drugs into the United States.   Furthermore, it concludes that an increase in military involvement did not improve the interdiction effectiveness efforts and was unlikely to do so in the future.   The Rand study strongly suggests that the military cannot be the primary interdiction agency and that a major increase in military support is unlikely to reduce drug consumption significantly in the United States (Reuter, Crawford and Cave, 1988). The findings are not practical for exploring renewed efforts to employ enhanced MSCLEA in the interdiction effort in the twenty-first century.   There are numerous reservations about applying this study directly to the current situation.   This study will examine interdiction in terms of interdiction (seizure) rates, not reduced consumption, and the price of illicit drugs as examined by the Rand study. In addition, the circumstances of the drug trade across the Southwestern border have changed considerably over the past nine years, as have the military resources available to employ against interdiction effort.   The DTOs are now using RPGs and other military type weaponry consequently the military has UAVs and other surveillance equipment that was not available in the 1980s. The Rand study is incredibly important to understanding the history of military involvement in drug interdiction on the Southwest border.   However, the findings do not constitute the final word on the subject today as it is over twenty years old. It is imperative to examine literature that relates to the policies and procedures for MSCLEAs and the organization of cooperative efforts between the MSCLEAs.   Doctrine for this already exists for both the military and civilian organizations.   The Joint Task Force North, â€Å"JTF-North Operational Support Planning Guide 2010† outlines the military perspective on joint military-civilian operations.   The police understanding of the relationship is outlined in â€Å"Civilian and Military Law Enforcement Cooperation† published in The Police Chief (Awtry, 2004). The study Preach What You Practice: The Separation of Military and Police Roles in the Americas argues that military employment to assist law enforcement agencies falls the Posse Comitatus Act limits however, there is no imminent â€Å"threat of attack† on the United States.   Therefore, they question the need for a heightened militarization of the southwest border (Withers, Santos, Isacsoni, 2010 p 8).   This report suggest that instead of supporting a military response, the U.S. government re align its resources to focus on additional aid for police and law enforcement capabilities within Mexico.   They recommend this aid be in the form strengthening law enforcement training, equipment, and technology rather than merely training in counter-drug tactics.   The JTF North website lists the following capabilities as operational support the U. S. military is prepared to provide federal law enforcement agencies: aviation transportation, including both insertion and extraction of personnel; aviation reconnaissance; air and maritime surveillance radar; unmanned aircraft systems; ground surveillance radar; listening post and observation post surveillance; ground sensor operations; and ground transportation.   The consensus within NORTHCOM appears to be the military is capable of supplying resources that enhance law enforcement ability to interdict the threats along the southwest border.   Under USNORTHCOM, the military conducts a variety of domestic exercises aimed at using the military and National Guard under the presidents control in a wide range of U.S. homeland emergencies such as terrorist events and even domestic violence.   Which is the threat currently demonstrated by DTOs.   The exercises do not involve any Mexican entities, NORTHCOM suggest that an exchange of military personnel and cadets with Mexico as a means of gaining Mexican involvement in NORTHCOM, as well as regular talks about cooperation could increase the effectiveness of combating DTO activity along the border.   Jose Palafox addresses militarization of the border and the applicability of military counterdrug operations along the U.S.-Mexican border in 1990.   He closely examines the 1996 structure of JTF-6 and then concludes that a JTF consisting of only a brigade-size unit could effectively conduct sustained operations to interdict border drug trafficking along the two-thousand-mile boundary.   JTF-6 was renamed JTF North in a ceremony Sept. 28, 2004, and its mission was expanded beyond the drug war to include providing homeland security support to the nations federal law enforcement agencies. The article states the Pentagon is spent approximately $800 million a year to help enforce the drug trafficking laws alone.   The missions ranged from ground reconnaissance, training, logistics, and research.   In 1995, the Department of Defense transferred military technology equipment to Border Patrol in order to upgrade legacy Vietnam War error equipment.   Due to a joint effort by the Justice and Treasury Departments and the Office of National Drug Control Policy, the Border Patrol also has its own high-tech Border Research and Technology Center near San Diego. The article suggests that JTF-6 operations supporting DTO activity was a success and a necessity for future operations between military and civilian organizations.   Although, Border Patrol received significant upgrades gaps along the porous border remain specifically training and intelligence collection. Major Mark Van Dries 1990 monograph titled Drug Interdiction: Can We Stop the New Pancho Villa, addresses the feasibility of military counterdrug operations along the border in the 1990s.   The study states that drugs are a legitimate national security threat and the vulnerability of drug cartels to military operations.   Drie conclusion supports employment of military forces along the border where legal restraints are not clear and domestic opposition is less likely.   He further articulates that effectively securing the southwest border in 1990 would require a cordon force of 65,000 U.S. troops. Both the article and monograph fail to mention the 1997 tragic death of a U.S. citizen at the hands of a military service member that exposed the difficulties and inherent risks in employing combat focused forces in training missions in support of domestic counterdrug MSCLEA.   Marine Corps Corporal Manuel Banuelos shot and killed Texas high school student Esequiel Hernandez with a single shot from his service rifle.   The incident inspired a backlash against armed military patrols along the border and resulted in cease of the practice.   The current approach is indirect support to law enforcement such as intelligence, engineering, and surveillance (Dunn, 2001, p 14-17).   In summary, this chapter discusses corroborative information relating to drug cartel along US-Mexico borders and its perpetuation within the region which caused escalation of violence, increasing number of death tool and its serious implication to Mexicos politico-economy as well as its diplomatic relation with nations, specially United States. The succeeding chapters will discuss the methodology. CHAPTER III:   Methodology This chapter tackles the research methodology that will be used to assess the military resource requirements to counter drug activity along the Southwest border.   The author will conduct analysis of secondary information by using (a) timeline analysis to account the historical context about the war on drugs, (b) evaluate the laws and regulations associated with MSCLEA and current MSCLEA support in order to determine the most appropriate MSCLEA to counter drug trafficking along the Southwest border, (c) illustrate key developments in the war on drugs and military involvement in supporting the domestic counterdrug effort and (d) evaluate the significance, extent, resource capacity and feasibility of deploying MSCLEA to assist in the interdiction of DTOs across the Southwest border. Research Design This chapter will examine the issue by means of qualitative and quantitative analyses using variety of sources from media accounts, government reports, academic works, and historical documents.   To a lesser extent, opinion pieces will be used when the information is valid and appropriate opposing viewpoints are available for inclusion. Analysis of the results will provide statistical validity to the interpretation of results for the military and for the other agencies such as drug threats provided by Drug Enforcement Administration (DEA) and the National Drug Intelligence Center (NDIC). Sample Sampling is irrelevant in this study. Researcher is not using survey method but will be maximizing secondary information from government reports and earlier studies conducted related to the issue on Mexican drug interdiction. Other related relevant sources will also be inclusively considered. Setting The study will be conducted within American soil although it will also make use of documents from Mexican government which will be accessed, reviewed and evaluated accordingly. Instrumentation This is a qualitative and quantitative longitudinal case study that will use a combination of timeline mapping, conflict-analysis, and triangulation to understand the complex and unending illegal drug trade within the region that has been affecting neighboring and the international communities worldwide due to increasing violence within the area despite security management measures. All historical accounts, records, testimonies and researchers from incessant intervention done by the United States of America will be reviewed, analyzed and be maximized in crafting conclusions and recommendations at the end of the study. Data Collection To address research objective number three, DTOs current ability to interdict drugs across the border, the author will review publicly available information from books, journal articles, and corroborated news media accounts.   The book, Drug Smugglers on Drug Smuggling, will be used to substantiate data from the perspective, motivation and experiences of DTO smugglers. This book interviews experienced smugglers who at one time successfully in defeated drug interdiction measures.   The purpose of this research objective is to identify the nature and extent of DTO exploitation of US Southwest border. Specifically, this question serves to identify DTO resources and methods that are uniquely vulnerable to US military capabilities or where the US military resources can augment civilian law enforcement agencies.   Researcher will further use all information that can be sourced from government agencies, libraries, online research institutions, magazines, journals, court documents, magazines and journals. Data Analysis The author will use historical mapping as an instrument to gather information to assess the length of period and extent of the drug trafficking problem within the region. Historical mapping will also be used to determine the MSCLEA method(s) of involvement introduced by US Southwest region, including the outcome and impact of these interdictions.   Historical mapping will also be used to outline the laws and policies governing MSCLEA that were legislated as a response to countering illegal drug trade in the region. Additionally, analysis of government documents produced by Congressional Research Service (CRS), the Government Accountability Office (GAO), U.S. Department of Justice, Drug Enforcement Administration (DEA) and the National Drug Intelligence Center (NDIC) will be analyzed to determine the MSCLEA ability to adequately curtail drug trafficking across the southwest border. Lastly, the author will identify and compare the relative combat power of DTOs and US law enforcement personnel operating along the Southwest border.   Determining the capability gap will exhibit the necessary MSCLEA requirement(s) to effectively reinforce the combat power of law enforcement agencies in order to adequately curtail drug trafficking in the region.   As a mixed quantitative and qualitative study, researcher will present an integrated analysis and inferences into coherent conclusions toward a comprehensive and meaningful explication of the subject studied. Validity and Reliability This research is undertaken with serious consideration of the international and professional standard. Inferences and sequential presentation of information are drawn from primary and secondary sources that are critically evaluated based on acceptable standards of sources. Some information used came from government authorities and decision-making bodies who are honored with their credibility as authorities of the state. Readers who may conduct follow-up research may triangulate information and database used here to further validate reports. Ethical Considerations Researcher observes the highest standard of professional ethics required by the institution. Matters of confidentiality are held sacred while authors, writers, and agencies whose contributions to these subjects are wisely utilized were credited and recognized in the references. The succeeding chapter will substantially discuss the theme of this study. Chapter 4- DISCUSSION Resolving the complex issues on narcotics in the south west border require in-depth reflection on historic interventions made by USA which help increase interdiction on illegal drug-related cartel; evaluate the political capacity of DTO to sustain its illegal operations; triangulate policies of USA in its decision to assist in decreasing the movements of illegal drug trade; and assess the fiscal capacity of the American government to allocate against increasing demand of budget for operations. US Military Capacity vs Drug Trafficking In mid-19th century, United States deployed US Army on its southern border and was mandated to protect the border, interdict bandits, secure lives and properties, conduct regular patrolling and support civil law enforcement against illegal drug cartel business (Matthews, 1959). More than a century have passed, USA is still deploying National Guard Soldiers to the Mexican border as post-9/11 politico-military undertakings (Matthews, 1959). To reckon, from 1846 towards this millennium, US Army sustained its security mandates at the borders hard and rugged terrain (Matthews, 1959).   Reports mentioned that amid disputes, there is also a demand to increase numbers of soldiers (Matthews, 1959).   This is further compounded with critical Mexican politics and US-Mexican diplomatic relations that is affecting Armys operations (Matthews, 1959).   Contextualized in such distinct social character, Armys role was fitted to support to local, state, and Federal civilian agencies. Such nature of intervention is already evident since 1920s (Matthews, 1959). During President George W. Bushs administration decided to deploy about 6,000 Army National Guard Soldiers in 2006 to conduct security border patrol as issues relating to potential terrorist infiltration, increase of illegal drug syndicates activity, and leveling-up of apprehension about illegal immigration to United States en route through Mexico (Matthews, 1959). Though this was regarded with disapproval, there is however recognition to improve border security works albeit controversial use of military personnel to support law enforcement (Matthews, 1959). Both America and Mexico shared ambivalent relations since the former tightened its political control in that shared border coupled with cross-border violent aggressions done by Indians and bandits which accordingly increased the level of enmity (Matthews, 1959). There was however a historic epoch when America and the Mexican governments explored revitalization of goodwill when Major General Philip H. Sheridan waged a campaign against the French.   That provided an opportunity to resolve issues relating to US Armys disposition at the border from 1870 to 1886, including its inherent weakness about lack of personnel and passive defenses against cross-border raids. It also discussed the raid in Mexico in 1873 led by Colonel Ranald S. Mackenzies   and that pre-emptive strike led by Lieutenant Colonel William â€Å"Pecos Bill† Shafters. There was subsequent reduction of attacks but this generated political conflict which grind down American and Mexican goodwill (Matthews, 1959). In 1911 to 1917, the Mexican Revolution caused insecurity in the border and US soldiers realized that static defenses and patrolling couldnt cease terrorist raiders who maintained interest to cross the border. This was also same period when Major General Frederick Funstons attempted to stop the Plan of San Diego plotters and Brigadier General John J. Pershing launched punitive action against Francisco â€Å"Pancho† Villa. The military strategies enforced hot pursuits and preemptive strikes into Mexico to restore order to the border (Matthews, 1959). US Army have also conducted responses to WETBACK Operation in 1954 until they increased their presence in 1978 in Mexican border as a response to same issue on illegal US immigration and anti-drug cartel. The military supports for law enforcement at southern border have also evolved (Matthews, 1959). The historic problem remained in these 20th centuries and the issues pertaining to militarys disposition reverberates (Matthews, 1959 ). It still re-echo the need for defensive position and the discussion on conducting cou Military Support to Civilian Law Enforcement Agencies Military Support to Civilian Law Enforcement Agencies CHAPTER I: Violence perpetrated by Mexican Drug Trafficking Organizations (DTOs) increased dramatically in 2006 and continued to rise dramatically through 2010.   According to the National Drug Intelligence Centers â€Å"National Drug Threat Assessment, 2010†, published in February 2010, â€Å"Mexican DTOs dominate the transportation of illicit drugs across the Southwest Border.   They typically use commercial trucks and private and rental vehicles to smuggle cocaine, marijuana, methamphetamine, and heroin† (National Drug Threat Assessment, 2010).   The increase in DTO activity has resulted in an increase of military involvement in counterdrug operations along the U.S. southwestern border region.   The tables in the appendices outline the statistical extent of the problem and the geographic penetration of Mexican DTOs within the United States.   Americas densely populated southern border with Mexico stretches nearly 2,000 miles in length and possesses several established crossing points.   In areas along northern Mexico, DTOs organize and equip themselves with resources that out match Mexican military forces (McCaffrey 2009).   With these developments, it is necessary to consider increased U.S. military support to drug interdiction along the southwest border, as DTOs are a national security threat that directly plays a role in destabilizing the heavily trafficked areas in both the U.S. and Mexico. Problem Statement The problem is to determine what Military Support to Civilian Law Enforcement Agencies (MSCLEA) should be brought to bear against Mexican DTOs to interdict and reduce the flow of drugs across the Southwest Border. Research Objective This research aimed at answering and elucidating the following objectives: What capabilities does the U.S. military already have in the southwest border region to counter drug trafficking? What is the DTOs current capability to interdict drugs across the border (e.g. weapons, funding, resources)? What are the American laws and regulations governing the use of MSCLEA?   Is it financially feasible to increase MSCLEA? Assumptions The main premise to this research is based on the assumption that increasing the resources used to interdict the drug trafficking in the southwest border region will have a positive impact in disrupting DTOs operations, decreasing the amount of drugs trafficked and aiding in stabilizing the southwest border region.   Some groups advocate other approaches to the problem such as legalization and establishing additional treatment programs for users and abusers of illegal drugs.   Moreover, on the supply side, the assumption is diplomatic pressure on the countries that produce the drugs or assistance to their military and police organizations is necessary to increase the effectiveness.   This proposal assumes that enhanced interdiction efforts on the Southwest border will negatively impact Mexican DTOs and reduce use of illegal drugs within the United States. Additionally, the results and recommendations for this research assumed that all military assistance falls within Title 32 Duty and Article I,  § 8 of the Constitution that allows the National Guard to be used under the command and control of the governor to execute the laws of the Union, in order to suppress rebellion and deter invasions (Withers, 2010 p. 6). Definition of Terms Military Support to Civilian Law Enforcement Agencies (MSCLEA):   Technical assistance rendered to civilian law enforcement agencies.   This can include military resources that are not available to civilians such as aerial surveillance, technical assistance with these resources, and tactical advice.   It does not include actual law enforcement powers (Sergienko, 2006, p. 395). Interdiction efforts:    All efforts used to reduce the flow of illegal drugs into the United States on the ground (or underground) across the Southwest border.   Success equals increased levels of drug seizures. Southwest border:   The land border between the U.S. and Mexico; also called the U.S.-Mexico border. Limitations and delimitations This study is limited to ground interdiction.   Drug smuggling is an incredibly profitable enterprise.   If ground interdiction efforts are to prove effective, it presumes that DTOs would attempt to move their operations into marine and aerial operations.   However, this study will only consider the deployment of marine and aerial assets as they relate to ground operations.   This study will limit its focus of the Southwest to the three major DTO interdiction routes located in Texas, New Mexico, and California.   The strategies proposed or dismissed in this research may or may not be appropriate to compare with the interdiction efforts on other borders such as the northern border with Canada. This study will be limited to cooperation with civilian law enforcement agencies within the United States.   It will not consider support for Mexican civilian law enforcement agencies nor will it consider cooperation with the Mexican military although it will acknowledge that they are now the lead agency in struggle with DTOs within Mexico. All proposals for MSCLEA will be governed by the U.S Constitution, relevant U.S. laws and the USNORTHCOM directives on MSCLEA, â€Å"Military support to civilian law enforcement is carried out in strict compliance with the Constitution and U.S. laws and under the direction of the president and secretary of defense† (USNORTHCOM). CHAPTER II: Literature Review This chapter provides an overview of the literature examined.   It identifies the dominant literature and sources that will provide arguments addressing DTOs drug smuggling, MSCLEAs and the current situation along the Southwest border.   The academic debate concerning MSCLEA on the border focuses primarily on the issue of illegal immigration and second on drug interdiction.   There are only a few books on the topic.   Therefore, research will focus on scholarly articles, government studies, and statistical data available through the U.S. Border Patrol and Department of Enforcement Administration. Timothy Dunns 1996 book, The Militarization of the U.S.-Mexico Border, 1978-1992: Low Intensity Conflict Doctrine Comes Home is a study that compares data collected through interviews with military doctrine, law enforcement, congressional documents, and personal observations.   Dunns intent is to illustrate that increased activity along the southwest border escalated forcing military involvement in immigration and drug enforcement to a level unintended by Congress and defense officials.   Dunn provides insight to the difficulty associated with MSCLEA along the southwest border.   This historical data requires comparison to the post 9/11 challenges. There are numerous government studies and reports related to previous and current U.S. counterdrug program.   The Congressional Research Service (CRS) and the Government Accountability Office (GAO) prepared most reports for members of Congress.   The National Drug and Control Policy also have a number of useful products.   Stephen Vina CRS report in 2006, Border Security and Military Support: Legal Authorizations and Restrictions outlines military support legal and policy limitations with in the U.S.   His study states military support to DTO is feasible however, it must be restricted to the employment of Nation Guard for border security missions vice the employment of active duty (GAO, 2003).   The 2010 report Department of Defense Needs to Improve Its Performance Measurement System to Better Manage and oversee Its Counternarcotics Activities demonstrates congressional interest in measures of effectiveness to justify MSCLEA in the early 1990s.   The 1993 Heavy Investment in Military Surveillance is Not Paying Off   report   findings suggest some military assets, such as rotary wing transport and lower-end unmanned aerial vehicles are relatively inexpensive and within the potential budget of federal law enforcement.   Other assets such as large multi-role aircraft and naval vessels, are very expensive operate and maintain.   The GAO (2009) study concluded that military surveillance is costly particularly when modern technology systems designed to detect and control highly sophisticated weapon systems in combat situations are employed against a DTO smuggling threat. Together, these two reports support content from the recent Washington Office on Latin America report that strongly suggest there must be a separation of military and police roles in America.   George Withers would agree there is a lack of measures of effectiveness justifying military support on the border. The GAO study, Secure Border Initiative: Observations on Deployment Challenges discusses the challenges of integrating sensors and obstacles along the 2000-mile Southwest border.   Conversely,   the 2007 report, U.S. Assistance Has Helped Mexican Counternarcotics Efforts, but Tons of Illicit Drugs Continue to Flow Into the United States clearly demonstrates the difficulties of combating the supply of drugs.   This study bring about discussion to identify the gaps in capability could be leveraged with unique available military resources.   The Rise of Mexican Drug Cartel and U.S. National Security hearing conducted by the U.S. Department of Justice illustrated the success of interagency cooperation against targeting DTOs.   The report provides an overview of the capability of the DTOs operating along the southwest border and describes their ability to conduct drug trafficking, kidnapping, bribery, extortion, money laundering and smuggling of profits, and trafficking and use of dangerous firearms.   The report concludes that the best strategy to combat the full spectrum of the drug cartels operations is a holistic approach that employs the full spectrum of our law enforcement agencies and its resources, expertise, and statutory authorities.   The Mexican border states have become much like a war zone with heavily armed military units on the street (since the President deemed local police too corrupt to deal with the cartels) and frequent firefights between the military and the cartels.   According to L.A. Times, as of November 29, 2010, 28,288 people have died in Mexico since January 2007 because of the drug wars.   In relative terms, that number is higher than the number of American troops that have died in Iraq in the last seven years (Mexico under Siege The Drug War on Our Doorstep, 2010). â€Å"Mexico Under Siege The Drug War on Our Doorstep†, is an L.A. Times website that includes all of their coverage of drug smuggling along the Southwest border along with interactive maps, links to television coverage and a host of other information.   This website is the principle primary source for details of recent events and media coverage of the situation.   Additionally, the website â€Å"Drug Trafficking in Mexico† maintained by latinamericanstudies.org traces the history of the drug trafficking between Mexico and the U. S. from 1998-2009.   This website provides links to hundreds of other articles on the subject as well. The Congressional Reporting Service publication â€Å"Terrorism: Some Legal Restrictions on Military Assistance to Domestic Authorities Following a Terrorist Attack† by Charles Doyle and Jennifer Elsea presents the legal definition of MSCLEAs in the wake of post 9/11 developments (Doyle and Elsea, 2005). Increased MSCLEA issues emerged in the 1980s and 1990s with regard to the interdiction of drugs.   However, since 9/11 they have largely revolved around the role of MSCLEA around terrorism related incidents.   The official policy of the United States Army on MSCLEA is contained in the Catastrophic Disaster Response Staff Officers Handbook â€Å"Appendix I: Legal Considerations/Law Enforcement† published by the United States Army Combined Arms Center in May 2006.   This document is supplemented by a paper prepared by Colonel Thomas W. McShane entitled, â€Å"United States Northern Commands Mission to Provide Military Support to Civilian Law Enforcement Agencies: The Challenge to keep Homeland Security and Civil Liberty Dancing in Step with the Current Legal Music† (2004). There are varieties of publications that deal with the history of MSCLEA for Counter-drug Operations.   Most of the U.S. policy affecting domestic counterdrug MSCLEA require updates and fails to reflect the realities of the implementation of the North American Free Trade Agreement (NAFTA) or the terrorist attacks of 11 September 2001.   Two of these stand out as having particular importance for this proposal.   The first is The Militarization of the U.S.-Mexico Border, 1978-1992: Low-Intensity Conflict Doctrine Comes Home by Timothy J Dunn, published in 1996.   The second is a Rand Corporation report entitled Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction written by Peter Reuter, Gordon Crawford, and Jonathan Cave published in 1988.   Both of the documents are dated however, they will provide a historical context to compare to current operations.   Reuter concludes that military support provided in the war on drugs in the 1980s w as costly, ineffective, and distracted military forces from preparing for interstate combat missions. Both documents are roughly twenty years old and this means that their consideration of everything from the technology of interdiction efforts to the scope and influence of DTOs is dated.   On the other hand, both documents precede the emergence of the overwhelming threat of terrorist attacks and therefore the focus is on MSCLEAs in a pre-9/11 context with the emphasis on drug interdiction, not anti-terrorism operations. Most importantly, both of these documents present a negative image of interdiction efforts.   The U.S. military interdiction efforts, although criticize provides an approach from two different perspectives.   The Militarization of the U.S.-Mexico Border, 1978-1992: Low-Intensity Conflict Doctrine Comes Home published by the Center for Mexican American Studies at the University of Texas, Austin focuses on the negative effects of the militarization of the border in terms of lost economic opportunities and threats to civil liberties. More condemning, however, is the Rand Corporation document, Sealing the Borders: The Effects of Increased Military Participation in Drug Interdiction.   It concludes that interdiction efforts in general have little impact on the flow of drugs into the United States.   Furthermore, it concludes that an increase in military involvement did not improve the interdiction effectiveness efforts and was unlikely to do so in the future.   The Rand study strongly suggests that the military cannot be the primary interdiction agency and that a major increase in military support is unlikely to reduce drug consumption significantly in the United States (Reuter, Crawford and Cave, 1988). The findings are not practical for exploring renewed efforts to employ enhanced MSCLEA in the interdiction effort in the twenty-first century.   There are numerous reservations about applying this study directly to the current situation.   This study will examine interdiction in terms of interdiction (seizure) rates, not reduced consumption, and the price of illicit drugs as examined by the Rand study. In addition, the circumstances of the drug trade across the Southwestern border have changed considerably over the past nine years, as have the military resources available to employ against interdiction effort.   The DTOs are now using RPGs and other military type weaponry consequently the military has UAVs and other surveillance equipment that was not available in the 1980s. The Rand study is incredibly important to understanding the history of military involvement in drug interdiction on the Southwest border.   However, the findings do not constitute the final word on the subject today as it is over twenty years old. It is imperative to examine literature that relates to the policies and procedures for MSCLEAs and the organization of cooperative efforts between the MSCLEAs.   Doctrine for this already exists for both the military and civilian organizations.   The Joint Task Force North, â€Å"JTF-North Operational Support Planning Guide 2010† outlines the military perspective on joint military-civilian operations.   The police understanding of the relationship is outlined in â€Å"Civilian and Military Law Enforcement Cooperation† published in The Police Chief (Awtry, 2004). The study Preach What You Practice: The Separation of Military and Police Roles in the Americas argues that military employment to assist law enforcement agencies falls the Posse Comitatus Act limits however, there is no imminent â€Å"threat of attack† on the United States.   Therefore, they question the need for a heightened militarization of the southwest border (Withers, Santos, Isacsoni, 2010 p 8).   This report suggest that instead of supporting a military response, the U.S. government re align its resources to focus on additional aid for police and law enforcement capabilities within Mexico.   They recommend this aid be in the form strengthening law enforcement training, equipment, and technology rather than merely training in counter-drug tactics.   The JTF North website lists the following capabilities as operational support the U. S. military is prepared to provide federal law enforcement agencies: aviation transportation, including both insertion and extraction of personnel; aviation reconnaissance; air and maritime surveillance radar; unmanned aircraft systems; ground surveillance radar; listening post and observation post surveillance; ground sensor operations; and ground transportation.   The consensus within NORTHCOM appears to be the military is capable of supplying resources that enhance law enforcement ability to interdict the threats along the southwest border.   Under USNORTHCOM, the military conducts a variety of domestic exercises aimed at using the military and National Guard under the presidents control in a wide range of U.S. homeland emergencies such as terrorist events and even domestic violence.   Which is the threat currently demonstrated by DTOs.   The exercises do not involve any Mexican entities, NORTHCOM suggest that an exchange of military personnel and cadets with Mexico as a means of gaining Mexican involvement in NORTHCOM, as well as regular talks about cooperation could increase the effectiveness of combating DTO activity along the border.   Jose Palafox addresses militarization of the border and the applicability of military counterdrug operations along the U.S.-Mexican border in 1990.   He closely examines the 1996 structure of JTF-6 and then concludes that a JTF consisting of only a brigade-size unit could effectively conduct sustained operations to interdict border drug trafficking along the two-thousand-mile boundary.   JTF-6 was renamed JTF North in a ceremony Sept. 28, 2004, and its mission was expanded beyond the drug war to include providing homeland security support to the nations federal law enforcement agencies. The article states the Pentagon is spent approximately $800 million a year to help enforce the drug trafficking laws alone.   The missions ranged from ground reconnaissance, training, logistics, and research.   In 1995, the Department of Defense transferred military technology equipment to Border Patrol in order to upgrade legacy Vietnam War error equipment.   Due to a joint effort by the Justice and Treasury Departments and the Office of National Drug Control Policy, the Border Patrol also has its own high-tech Border Research and Technology Center near San Diego. The article suggests that JTF-6 operations supporting DTO activity was a success and a necessity for future operations between military and civilian organizations.   Although, Border Patrol received significant upgrades gaps along the porous border remain specifically training and intelligence collection. Major Mark Van Dries 1990 monograph titled Drug Interdiction: Can We Stop the New Pancho Villa, addresses the feasibility of military counterdrug operations along the border in the 1990s.   The study states that drugs are a legitimate national security threat and the vulnerability of drug cartels to military operations.   Drie conclusion supports employment of military forces along the border where legal restraints are not clear and domestic opposition is less likely.   He further articulates that effectively securing the southwest border in 1990 would require a cordon force of 65,000 U.S. troops. Both the article and monograph fail to mention the 1997 tragic death of a U.S. citizen at the hands of a military service member that exposed the difficulties and inherent risks in employing combat focused forces in training missions in support of domestic counterdrug MSCLEA.   Marine Corps Corporal Manuel Banuelos shot and killed Texas high school student Esequiel Hernandez with a single shot from his service rifle.   The incident inspired a backlash against armed military patrols along the border and resulted in cease of the practice.   The current approach is indirect support to law enforcement such as intelligence, engineering, and surveillance (Dunn, 2001, p 14-17).   In summary, this chapter discusses corroborative information relating to drug cartel along US-Mexico borders and its perpetuation within the region which caused escalation of violence, increasing number of death tool and its serious implication to Mexicos politico-economy as well as its diplomatic relation with nations, specially United States. The succeeding chapters will discuss the methodology. CHAPTER III:   Methodology This chapter tackles the research methodology that will be used to assess the military resource requirements to counter drug activity along the Southwest border.   The author will conduct analysis of secondary information by using (a) timeline analysis to account the historical context about the war on drugs, (b) evaluate the laws and regulations associated with MSCLEA and current MSCLEA support in order to determine the most appropriate MSCLEA to counter drug trafficking along the Southwest border, (c) illustrate key developments in the war on drugs and military involvement in supporting the domestic counterdrug effort and (d) evaluate the significance, extent, resource capacity and feasibility of deploying MSCLEA to assist in the interdiction of DTOs across the Southwest border. Research Design This chapter will examine the issue by means of qualitative and quantitative analyses using variety of sources from media accounts, government reports, academic works, and historical documents.   To a lesser extent, opinion pieces will be used when the information is valid and appropriate opposing viewpoints are available for inclusion. Analysis of the results will provide statistical validity to the interpretation of results for the military and for the other agencies such as drug threats provided by Drug Enforcement Administration (DEA) and the National Drug Intelligence Center (NDIC). Sample Sampling is irrelevant in this study. Researcher is not using survey method but will be maximizing secondary information from government reports and earlier studies conducted related to the issue on Mexican drug interdiction. Other related relevant sources will also be inclusively considered. Setting The study will be conducted within American soil although it will also make use of documents from Mexican government which will be accessed, reviewed and evaluated accordingly. Instrumentation This is a qualitative and quantitative longitudinal case study that will use a combination of timeline mapping, conflict-analysis, and triangulation to understand the complex and unending illegal drug trade within the region that has been affecting neighboring and the international communities worldwide due to increasing violence within the area despite security management measures. All historical accounts, records, testimonies and researchers from incessant intervention done by the United States of America will be reviewed, analyzed and be maximized in crafting conclusions and recommendations at the end of the study. Data Collection To address research objective number three, DTOs current ability to interdict drugs across the border, the author will review publicly available information from books, journal articles, and corroborated news media accounts.   The book, Drug Smugglers on Drug Smuggling, will be used to substantiate data from the perspective, motivation and experiences of DTO smugglers. This book interviews experienced smugglers who at one time successfully in defeated drug interdiction measures.   The purpose of this research objective is to identify the nature and extent of DTO exploitation of US Southwest border. Specifically, this question serves to identify DTO resources and methods that are uniquely vulnerable to US military capabilities or where the US military resources can augment civilian law enforcement agencies.   Researcher will further use all information that can be sourced from government agencies, libraries, online research institutions, magazines, journals, court documents, magazines and journals. Data Analysis The author will use historical mapping as an instrument to gather information to assess the length of period and extent of the drug trafficking problem within the region. Historical mapping will also be used to determine the MSCLEA method(s) of involvement introduced by US Southwest region, including the outcome and impact of these interdictions.   Historical mapping will also be used to outline the laws and policies governing MSCLEA that were legislated as a response to countering illegal drug trade in the region. Additionally, analysis of government documents produced by Congressional Research Service (CRS), the Government Accountability Office (GAO), U.S. Department of Justice, Drug Enforcement Administration (DEA) and the National Drug Intelligence Center (NDIC) will be analyzed to determine the MSCLEA ability to adequately curtail drug trafficking across the southwest border. Lastly, the author will identify and compare the relative combat power of DTOs and US law enforcement personnel operating along the Southwest border.   Determining the capability gap will exhibit the necessary MSCLEA requirement(s) to effectively reinforce the combat power of law enforcement agencies in order to adequately curtail drug trafficking in the region.   As a mixed quantitative and qualitative study, researcher will present an integrated analysis and inferences into coherent conclusions toward a comprehensive and meaningful explication of the subject studied. Validity and Reliability This research is undertaken with serious consideration of the international and professional standard. Inferences and sequential presentation of information are drawn from primary and secondary sources that are critically evaluated based on acceptable standards of sources. Some information used came from government authorities and decision-making bodies who are honored with their credibility as authorities of the state. Readers who may conduct follow-up research may triangulate information and database used here to further validate reports. Ethical Considerations Researcher observes the highest standard of professional ethics required by the institution. Matters of confidentiality are held sacred while authors, writers, and agencies whose contributions to these subjects are wisely utilized were credited and recognized in the references. The succeeding chapter will substantially discuss the theme of this study. Chapter 4- DISCUSSION Resolving the complex issues on narcotics in the south west border require in-depth reflection on historic interventions made by USA which help increase interdiction on illegal drug-related cartel; evaluate the political capacity of DTO to sustain its illegal operations; triangulate policies of USA in its decision to assist in decreasing the movements of illegal drug trade; and assess the fiscal capacity of the American government to allocate against increasing demand of budget for operations. US Military Capacity vs Drug Trafficking In mid-19th century, United States deployed US Army on its southern border and was mandated to protect the border, interdict bandits, secure lives and properties, conduct regular patrolling and support civil law enforcement against illegal drug cartel business (Matthews, 1959). More than a century have passed, USA is still deploying National Guard Soldiers to the Mexican border as post-9/11 politico-military undertakings (Matthews, 1959). To reckon, from 1846 towards this millennium, US Army sustained its security mandates at the borders hard and rugged terrain (Matthews, 1959).   Reports mentioned that amid disputes, there is also a demand to increase numbers of soldiers (Matthews, 1959).   This is further compounded with critical Mexican politics and US-Mexican diplomatic relations that is affecting Armys operations (Matthews, 1959).   Contextualized in such distinct social character, Armys role was fitted to support to local, state, and Federal civilian agencies. Such nature of intervention is already evident since 1920s (Matthews, 1959). During President George W. Bushs administration decided to deploy about 6,000 Army National Guard Soldiers in 2006 to conduct security border patrol as issues relating to potential terrorist infiltration, increase of illegal drug syndicates activity, and leveling-up of apprehension about illegal immigration to United States en route through Mexico (Matthews, 1959). Though this was regarded with disapproval, there is however recognition to improve border security works albeit controversial use of military personnel to support law enforcement (Matthews, 1959). Both America and Mexico shared ambivalent relations since the former tightened its political control in that shared border coupled with cross-border violent aggressions done by Indians and bandits which accordingly increased the level of enmity (Matthews, 1959). There was however a historic epoch when America and the Mexican governments explored revitalization of goodwill when Major General Philip H. Sheridan waged a campaign against the French.   That provided an opportunity to resolve issues relating to US Armys disposition at the border from 1870 to 1886, including its inherent weakness about lack of personnel and passive defenses against cross-border raids. It also discussed the raid in Mexico in 1873 led by Colonel Ranald S. Mackenzies   and that pre-emptive strike led by Lieutenant Colonel William â€Å"Pecos Bill† Shafters. There was subsequent reduction of attacks but this generated political conflict which grind down American and Mexican goodwill (Matthews, 1959). In 1911 to 1917, the Mexican Revolution caused insecurity in the border and US soldiers realized that static defenses and patrolling couldnt cease terrorist raiders who maintained interest to cross the border. This was also same period when Major General Frederick Funstons attempted to stop the Plan of San Diego plotters and Brigadier General John J. Pershing launched punitive action against Francisco â€Å"Pancho† Villa. The military strategies enforced hot pursuits and preemptive strikes into Mexico to restore order to the border (Matthews, 1959). US Army have also conducted responses to WETBACK Operation in 1954 until they increased their presence in 1978 in Mexican border as a response to same issue on illegal US immigration and anti-drug cartel. The military supports for law enforcement at southern border have also evolved (Matthews, 1959). The historic problem remained in these 20th centuries and the issues pertaining to militarys disposition reverberates (Matthews, 1959 ). It still re-echo the need for defensive position and the discussion on conducting cou