Saturday, December 28, 2019

Analysis Of George Orwell s 1984 - 732 Words

Maeve Bradley Mrs. Howley Summer Assignment: 1984 by George Orwell August 13, 2015 George Orwell’s novel, 1984, is based upon Orwell’s interpretation of what society would be like in the year 1984. Although the novel was written in 1949, Orwell’s vision of the future and the actual outcome were not far off. Orwell imagines a world full of contradiction, little to no freedom of the mind, body, and soul of the individual, and an all-seeing government. The main character Winston attempts to stay human by keeping his mind safe. The only way to outwit The Party is to keep everything bottled up inside. One manifestation of his thoughts is his dreams. Winston dreams of a higher up Party member named O’Brien and the disappearance of his mother and sister. Interpreting these dreams allows the reader to better understand what the character and author are thinking. Dreams are the manifestation of subconscious thoughts. Winston hopes for a way out of the dreary life amongst The Party. He believes he is not the only one who wants to change things. When Winston locks eyes briefly with O’Brien, a higher up party member, during Two Minutes Hate a spark of hope flares up within him. He thinks O’Brien shares his exact thoughts. In Winston’s mind he conjures O’Brien saying, â€Å"I know precisely what you are feeling. I know all about your contempt, your hatred, your disgust. But don’t worry, I am on your side!† (17). Within this moment Winston revels in the idea that theShow MoreRelatedAnalysis Of George Orwell s 1984848 Words   |  4 PagesCritical Analysis In the George Orwell’s novel 1984, much of the society is watched and have no privacy of any kind. Every person in the Party is under surveillance. In effect, these people cannot live freely and independently, but it seems to be an impossible task because of of the Party surveillance, and how they limit thinking and manipulate reality. We can similarly see these concerns and their effects in today s society and the ways the novel also acts as a warning for the future. In 1984 a manRead MoreAnalysis Of George Orwell s 19841423 Words   |  6 PagesIn the novel 1984 by George Orwell, the Party has many strategies and tactics that help them have complete control of the people of Oceania. The control the Party has maintained gives them the ability to manipulate people as a result. The Party takes away the people’s freedom to have a say in their government and become their own person. They use their power to an extreme against the people rather than to help the people. The Party takes advantage of every opportunity to instill fear in the citizensRead MoreAnalysis Of George Orwell s 1984 949 Words   |  4 Pagesâ€Å"1984† is a story which takes place in what was then the future of England. The book illustrates a dystopian society in which a government figure named â€Å"Big Brother† rules above all. The country is surrounded by eyes so to speak, devices called â€Å"telescreens† are in houses and buildings to monitor wha t all of the citizens are doing via camera. Coupled with that is the existence of the â€Å"Thought Police† whose sole job is to monitor citizens from committing â€Å"thoughtcrime† which is essentially thinkingRead MoreAnalysis Of George Orwell s 1984 923 Words   |  4 Pages1984, is a book written by George Orwell giving the reader a view of what a dystopian government would be like. The government of Oceania controls the lives of it’s citizens; posters of a figure known as â€Å"Big Brother† are seen all over and emphasize that he is always watching it’s citizens. The government enforces rules and regulations amongst it’s citizens, restricting them from giving their own opinion or even opposing the government. Thoughtcrime, face crime, and double think are all strictlyRead MoreAnalysis Of George Orwell s 19841450 Words   |  6 PagesThose familiar with George Orwell’s â€Å"1984† will recall that â€Å"Newspeak was de signed not to extend but to diminish the range of thought.† I recently felt the weight of this Orwellian ethos when many of my students sent emails to inform me, and perhaps warn me, that my name appears on the Professor Watchlist, a new website created by a conservative youth group known as Turning Point USA. I could sense the gravity in those email messages, a sense of relaying what is to come. The Professor Watchlist’sRead MoreAnalysis Of George Orwell s 19841377 Words   |  6 Pagesvarious types of governments, such include democracy, oligarchy, and more specifically, totalitarian. A totalitarian government gains extensive amounts of control and power over all of their people, and dominate over every aspect of their lives. George Orwell’s â€Å"1984,† conveys to its readers how the government presented totalitarianism and obtained control over their citizens. This action by the government compares to the massacre of the Holocaust, which portrayed the act of totalitarianism by aiming discriminationRead MoreAnalysis Of George Orwell s 19841029 Words   |  5 Pages Imagine a world where everything you knew had to be forgotten, and you knew nothing more then what was being told to you. In George Orwell’s book 1984 this is exactly the case. Winston Smith, a m iddle aged man, lives a life already planned for him. Smith works at the Ministry of Truth rewriting the news and other articles to follow the teachings of Big Brother. Big Brother is the leader of Oceania, one of three world powers, and aims to rewrite the past to control the present. Oceania is separatedRead MoreAnalysis Of George Orwell s 1984 Essay1127 Words   |  5 Pagesfirst civilizations of mankind, yet it is difficult find one that is perfect even till today. George Orwell shows an example of this within 1984. 1984 was written based on what Orwell thought the government would be like in 1984. He used his personal knowledge and experience with the government to create his story. The setting of 1984 is set in a superstate where there is a totalitarian government. Within 1984 and the 21st century one major key stands out: corruption rules both governments. Trust isRead MoreAnalysis Of George Orwell s 19841026 Words   |  5 PagesIn 1984, by George Orwell violence contributed to the plot by having three stages of reintegration. The stages are to learn, understand, and to accept, Winston was forced to learn that 2+2=5 under torture, understanding that the party is good, and seeks power for its own. Winston accepts and understands the Party and Big Brother as soon as Winston wishes the burden of torture on someone else who he loves, and to learn that Big Brother is eternal and that 2+2=5, Winston then is committed and loyalRead MoreAnalysis Of George Orwell s 1984 1122 Words   |  5 Pagesfreedom. A growing debate concerning Orwell’s 1984 relevancy is quickly on the rise. Orwell’s fear of a totalitarian society led him to write this book as he lived during the totalitarian movement in Russia. The fear of a totalitarian society spreading sparked his fear and wrote this book to make people understand that it is not benef icial to society. I feel that with the the National Security Agency in the United States, the issue and relevancy of 1984 has never been higher. The public is discovering

Friday, December 20, 2019

Analysis of Chapter 3 of Kurth Vonneguts Slaughter House...

In this essay I will be stylistically analysing an extract from Chapter 3 of Kurt Vonnegut’s novel; Slaughterhouse Five. I am particularly interested in the effects different perspectives have throughout my extract, as well as the effects of the narrative structure and if it conforms or diverges from the typical models of narrative structure. I am also going to be analysing the characterisation of different figures in my extract and the impressions these give on the characters. I will also be looking at how dialogue is represented and the overall effects of different devices. I am expecting to find that Vonnegut uses a mixture of different perspectives throughout which may be difficult to extract from each other. I also expect to find†¦show more content†¦In doing so, this suggests that even though he is of a higher rank than them they don’t see him this way and see no need to pay attention to him. Bob would be therefore losing his higher status and is trying t o regain it by delivering an influential speech. During the dialogue between Wild Bob and Billy it is important to note the act of turn taking. As Billy withholds participation, Bob is forced to speak again, meaning that turn taking is not fulfilled here. This gives the impression that Billy is a weak character who isn’t really aware of the situation and appears to have little knowledge about the topic. ‘Billy couldn’t remember the outfit he was from’ (Vonnegut 1969: 55). As Bob speaks for longer, and has a lot more turns in the conversation than Billy it shows that he in charge of the soldiers and his status is evident through this conversation. He also controls the topic of the conversation. Again, this displays that despite his physical and mental health he is still a strong, sure and higher status soldier than Billy and it is evident that Billy recognises this. Next I will discuss the characterisation throughout my extract. Firstly I will consider how thought is represented. The main representation of thought that the narrator uses is indirect though. This can be seen firstly where the narrator reports on what Roland Weary is thinking ‘All Weary could think about was the agony in his own feet’ (Vonnegut 1969: 55). This type of

Thursday, December 12, 2019

Networks - Devices - and Technology

Question: Duscuss about a Essay of the Data communications networking devices for operation, utilization, and LAN and WAN internetworking? Answer: Introduction: Networking is used to connectivity between hardware systems. The report is a design document to implement network setup using intranet services. It would start from internetworking with devices. It leads to switching demonstration and its example with configuration. The other discussion would be on network security plan for given situation; VLAN concept with how attacks are done. The major discussion would be on Ethernet switching and its different layers to be built upon. The application is of above topics in industry and also demonstration of network design. WLAN switching architecture is discussed in detail also there would be description of wireless monitoring. The report would be starting from switching concept. Lan switching: Internetworking Devices Inter-networking is defined as connectivity in between hardware devices. Networking devices are those hardware devices that used for information technology infrastructure. These devices can be routers, gateways, switches, bridges etc. Networking devices are connected with different topologies. Routers are the important devices for making better intranet network and LAN connectivity as well. Internetworking is implemented by using different protocols such as TCP/IP that is used for transferring reliable data. A network can be designed to connect various devices and to make WLAN or LAN. Internetworking is used for reliable, fast data transfer and there is OSI model layers for communication purpose. Communication over network is done through different layers of OSI model. There are several benefits of using internetworking because on network the biggest issues are with reliable data transfer. Two types of data transfer techniques are used for this purpose like UDP and TCP/IP. Transport layer and data link layer are two important layers that work on data security and transportation. Switching Switching concept is used to send data packet from sender to destination. Switching is done using various techniques. The diagram below is about how so many PCs are connected through switch. A single switch can connect different type of devices like printer, modem, server, PCs etc. It can be implemented using different techniques.There is one popular switching technique that is packet switching. Layer 2 switching is used for hardware base environment and provides wire speed, hardware based bridging. Media access control is used for layer 2 switching. Layer 3 and layer 3 are used with advanced level technology. Layer 4 switching is also based on hardware but uses protocols like HTT, FTP etc. Layer 2 is most reliable switching technique in network security. Layer 3 is destination based technique because destination address is saved and then packet is delivered accordingly. Switching is applied to send information from one place to another over internet. Switch Configuration There are different modes of manual switch that applied on hub topology. We would be discussing about some of the mode and how to configure switch according to requirement. There is diagram attached here as example and Basic switch configuration includes password setting, duplex mode etc. MODE PURPOSE COMMAND User EXEC Allow user to connect with remote devices Default mode Privileged EXEC Allow user to set operating parameters Use enable command from exec mode Global Configuration Commands containing entire system Use configure command Interface Configuration Commands to modify interface User interface number VLAN Configuration Create new VLAN Use vlan id for configure Table 1: Different modes of switch Switching configuration is done to connect different PCs and making various VLAN with in system. Half duplex is used to send data from sender to destination only but no back reply can be sent. Virtual LAN concept is used to manage switches sometimes and for privacy as well. There is need to make new VLAN before configuring LAN. Commands for configuration range Awplus (Config) #interface port number Command for speed configuration Awplus (Config-if) #speed Set duplex mode Awplus (Config-if) #duplex full Awplus (Config-if) #duplex half Assign IP Address Awplus (Config-if) #interface vlan1 Awplus (Config-if) #IP address 192.168.1.1/24 Switching security : Network Security Network security is important issue while using internetworking setup. There are different approaches used to maintain security over internet services. First of all network setup need to implement security plan according to company or organization. Network security is essential because sometimes unauthorized person can breach security and use it for against organization. Organization should apply some important steps like disable unused ports; secure other ports, device security as well. Monitoring is done to track such kind of issues and different types of monitoring techniques are applied. OOS monitoring is used for long run and to check stepwise marking while remote monitoring is applied for specific cases. The major benefit of monitoring is that at the same time we can follow up the raised issues. Monitoring makes networking security more reliable. There is TCP/IP protocol can be accessed by anyone and it should be monitored. There are majorly two types of attacks passive and act ive. Active attacks are those attacks in which attacker makes changes in information and that can be seen by user as well. Authentication is the best way to check security issues and password security can be applied for this purpose. The next topic would be give idea about different types of attacks and its protocol. Types of VLAN Attacks Virtual local area network is made to provide privacy to user and increasing internet speed as well. It can be applied according to need of organization. VLAN is provided for separating two different department talks and it is maintained according to need. Virtual area network can be attacked by different techniques some of them would be discussed here. The important aspect of security is of VLAN because it is applied on Data Link layer. Address resolution protocol (ARP) is used for layer 3 IP address allocation. Attacker can be done by changing this address. Someone can provide different MAC address to destination location and packet would be sent on wrong destination. MAC Flooding is one of the popular attacks that encountered in VLAN case. It can be understood as many of MAC address come to one port. It confuses protocol that actually what packet is to be sent on which address. Dynamic host control protocol (DHCP) is used to provide IP address dynamically. But attacker provides a fake IP address using gateway. Spanning tree attack is when some try to change the value of topology root. Root of topology can be changed by using this kind of attacks. Data is sent using frame of many bits and there is brute force attack that allows many frames on network so that memory could be leaked. Random Frame Stress Attacks: Random frame attacks are that when more than one message is being untouched from sender and destination as well. If this kind of situation occur for many messages than problems become more complicated. As it can be seen by diagram that how single message is being sent to different destination and actually no one is receiving. It is a kind of brute force attack because it is applied with stress and randomness makes it more difficult to be resolved. These types of attacks are done to know about source address so that input and design of switch could be changed. The solution to avoid these attacks is to introduce private VLAN. That will separate address of source and destination as well. Prevention techniques are applied for stopping attacks and provide security. Attacks can be active and passive and their prevention must be done for security purpose. Sometimes malicious information may send to another user and spoofing can breach privacy of organization as well. The next discussion is one Ethernet and its design network. That would cover the whole scenario of switching network design and industrial application. Ethernet switching network design: Ethernet Switching: Ethernet is switching technique that use for connectivity in LAN. It is applied using straight wired connectivity among IT infrastructure and PCs. There is requirement of reliable data transfer between machines in VLAN. Ethernet provides this transfer with authentication from one PC to another in LAN. Ethernet is used for reliability a d secure data transfer with in VLAN. Ethernet is a local area network that transmits signal in zero and ones forms. These symbols are used to send data from one station to another station. Ethernet is operated by coaxial cable and twisted pair. Fig: OSI Model Ethernet technology is work in way that destinations are assigned with unique address called MAC address. The above diagram is of OSI model and explains how message is sent from one station physical layer to receiving station. Ethernet is local area network setup in which devices are connected through cable. The model is communication model that provides communication between application layers of two different stations. 64 bits 48 bits 48 bits 16 bits 368 to 12000 bits 32 bits Preamble Destination Address Source Address Type of Length data Frame check sequence Ethernet Frame It can be seen from above frame set that how bits are divided and what would be the data bits length. A single frame is sent from one sender to destination. Carrier sense multiple access (CDMA/CD) collision detection is used for sending data. This technique is used while more than two frames are collided at same time. Routers are the devices that used for sending packet frames ahead in route. The further discussion is on difference between layers. Ethernet can be implemented using various topologies like star, hub and other. IEEE 802.3 standard defines Ethernet also. Difference between Layer 2 and Layer 3: Layer 2 and layer 3 switching are used for different switching methods. Layer 2 does switching from one port to destination port using MAC address. It maintains MAC address table as well for this particular task. Layer 3 also does same switching but using IP address that is why it provides reliable transfer. The reason of reliability is that IP addresses are unique for port. Layer 2 and layer 3 both are based on OSI communication model. Layer 2 switches by Ethernet and layer 3 switches using routers. The layer 2 switching based on hardware devices that are basic switching technique. MAC table based routing is about MAC address. The MAC addresses along with their ports so that it can be maintained. There are terms like if switch works as bridge called layer 2 while if switch works like router is called layer 3. IP address based switching provides unique address so that packet frame would be sent on destination correctly. Layer 3 switching uses routers and forwards frame to next port n ear to destination. It is sent through wire speed. There is multilayer switching as well that provides scalability to support different devices. The major benefit is of these technique that support in network management as well. Enhancement in available devices, routing efficiency also that is more beneficial. Industrial Application of Ethernet: Ethernet switching is used nowadays in different applications and for network security. Communication is done over RS232 or RS485 physical layer. Industrial Ethernet is a concept that used for marketing and increases flexibility. It is also provides different ways to build distributed system using optic fiber. Ethernet provides power so that one single cable can be used for video, audio transfer also. Ethernet industrial is used for difficult situation for switching. Traditional techniques was limited to single cable for particular task only but using present technology can be done with more flexibility. Power of Ethernet is to allow distributed system. Fast forward redundancy is used for building communication medium so that after cable broken even that data can be transferred. The recent example of this technology is building automation market. Ethernet or TCP/IP can be applied by less cost and used at industrial benefits. Wireless network can be integrated using network Access poi nts as well. Ethernet Switch Network Design: The Ethernet switches work as hub or switch so that different devices can be connected through wired connection. The design of network is done by using various devices and some of them are listed here as: Fig: Network design The above diagram is self-explanatory that how using Ethernet switch that can be used as hub. There are different devices like computers, printers connected with internet connection as well. The further discussion would be on wireless LAN switching and its working. Wirelass Lan Switching: The above discussed topics are on wired technology and how switching is done using the. But now we would know about wireless switching. The technology is based on electromagnetic waves so that no need of wire would be there. This would give clear idea radio waves used for transmission. Wireless Switching Working: Wireless switching is done without wired connection and used for ad-hoc network where infrastructure is not required. International engineering standard of electrical and electronics (IEEE) is standard for all electronic implementation and technology. IEEE 802.11 is one of the standards given for wireless network setup. 802.11 standards specifies in air connectivity between client and base station. IP address plays important role while using wireless techniques. There are many amendments done in 802.11 and some of them are explained briefly here 802.11a: It is one of the specifications of WLAN that provides 54 Mbps in 5Ghz band. It uses frequency multiplexing. 802.11b: This extension is applies LAN and provides 11 Mbps speed. 802.11e: This extension is support for LAN Quality of Services in wireless network. Basic service set is rules and support for Ad-hoc network. Ad-hoc wireless network is based on infrastructure less connections. WLAN works with MAC address and BSS is the base station which is based on its LAN ports. WLAN Switching Architecture: WLAN switching architecture is for sending signal from one station to another. The diagram below will clear idea of working architecture of wireless network. Fig: WLAN Architecture Base station is connects different access points together and create local area network. As shown above these are two WLAN part (a) and part (b). Both networks works separately and can communicate with each other if they are from same base station. A switching center is assigned for each base station so that monitoring can be done of all. DS stands for distribution center that net manages all BSS in the network area. Medium access layer provides different services like transmission, frame check etc. 802.11b is architecture that works as Ethernet based and provides authenticated services. The next topic would be on wireless traffic. Wireless Traffic: Traffic stands for frame coming across network and at same time flow of messages over network. The above wired techniques are more reliable when it comes to secure data transfer but wireless services provide speed and scalability. This is the reason that wireless techniques are more popular nowadays. Data traffic is defined as devices coming across network and here we are considering Ad-hoc network specifications. The number of framed over single line would be tell us idea of total traffic over network. The speed of frame sending from source to destination depends upon the MAC address because in wireless network there is no facility of cable so that frame would reach to right destination. This is the problem with WLAN because sometimes packets are misplaced and send to wrong destination. Wireless Management Monitoring: The above discussed topics so far have clear the idea of wired LAN and wireless LAN and about its architecture. The main issues come in implementing WLAN is that how to manage stations and packet transfer between source and destination. It leads to require a management over WLAN and with this concept of monitoring comes in notice. Monitoring can be defined as keeping track of frames till it reached at perfect destination. The frames should be divided according to range of network over it is to be sent. Enabling of monitoring in networking system would give efficient system to be developed and managed as well. It is important to keep track of base stations list also so that it can be notify that which frame is attached to which stations. It is all about internetworking and its implementation methods with examples where necessary. Further we would be summarizing the discussion and concluding it for a while. WLAN is more efficient and faster than wired but less reliable. Conclusion: Internetworking is essential while we are dealing with internet communication and sending data over network. So far we have discussed about its definition, working and implementation techniques as well. The discussion was started from switching and its implementation techniques. We have covered all concepts related to local area network implementation and different working technologies nowadays. First we have cleared concept of wired LAN in detail and after that its architecture. The wireless network has been discussed so far to indicate difference between both approaches. This would give one idea of implementing wireless specification and how it can be managed as well. We have covered all aspects using diagram and detailed description about each. The proposed report is about networking concept and implementing different technologies to network design. References: Held.G(2007) Data communications networking devices: operation, utilization, and LAN and WAN internetworking, Wiley [Accessed on 10 July, 2015]. Stamatios.V (2003) DWDM: Networks, Devices, and Technology, Wiley [Accessed on 10 July, 2015]. Ginanasivam.P (2007) Telecommunication Switching and Networks, New Age International. Hung.Q et.ol (2013) Switching Networks: Recent Advances, Springer Science Business Media, Vol 5 pp[28]. (2003) Introduction to Ethernet Switching, System Configuration online available at https://www.snt.co.uk/courseware/Configuring_switches.pdf [Accessed on 10 July, 2015]. Henry.V (2011) VLAN Support in Linux, Linux Journal https://www.linuxjournal.com/article/10821 Tongsin.H (2006) Journal of Communications and Networks Vol 8, AIEI Korean Institute of Communication Sciences (KICS) [Accessed on 10 July, 2015]. Spurgen.C (2000) Ethernet: The Definitive Guide, O'Reilly Media, Inc [Accessed on 10 July, 2015]. Norman.B (2011) Implementation of IBM j-type Ethernet Switches and Routers, IBM Redbooks Farrell.M (2009) Virtual Local Area Network-Good Practice Guideline Viewed from https://systems.hscic.gov.uk/infogov/security/infrasec/gpg/vlan.pdf Hucbay.D (2003) Switch Operation of CCNP ciscopress.com Decker.M (1997) Security of Networks, Kent Encyclopedia of Telecommunications vol 15,pp 231-255 Accessed on 10 July, 2015]. Wong.A et.ol (2009) Network Infrastructure Security, Springer Kizza.J (2009) Guide to Computer Network Security, Springer Science Business Media Thomas.J (2014) Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Syngress Al-balushi.M et.ol (2012) Performance Evaluation using STP Across Layer2 VLAN, International Journal of Communication and Networking System Volume: 01 Mistrik.I et.ol(2014) Relating System Quality and Software Architecture, Morgan Kaufmann. Vossen.G (2008) Working Papers A Literature Overview on Strategic Information Systems Planning IEEE 802.11 Standard specification [Accessed on 10 July, 2015] at https://www.cse.unt.edu/~rakl/class3510/CHAP14.pdf Flickenger.R (2003) Building Wireless Community Networks, O'Reilly Media, Inc [Accessed on 10 July, 2015] Understanding Switches and Routers vol 3, issue1 [Accessed on 10 July, 2015] at https://www.ccontrols.com/pdf/Essentials0411.pdf Switch Configuration [Accessed on 10 July, 2015] at https://www.snt.co.uk/courseware/Configuring_switches.pdf

Wednesday, December 4, 2019

Aeschylus is primarily concerned with the nature o Essay Example For Students

Aeschylus is primarily concerned with the nature o Essay f justice. In the trilogy The Oresteia, the Akhaians evolve from an older, more primitive autocratic form of justice, to a new concept of civil justice devised by Athena. He confronts the contrast between the old and new orders, the lives of the members of the House of Atreus, and the serious moral questions that Orestes crime presents.The case against Orestes is strong. The son admits to striking down his mother, in violation of the sacred tenant of kinship. But I came back, my years of exile weatheredkilled the one who bore me, I wont deny it, killed her in revenge. (Eumenides lines 476-478) This shows that Orestes was fully aware of the act he was committing, that he willfully committed it, and that he must suffer for it. The bond between mother and child was broken when Orestes murdered Clytaemnestra. Marriage, arguably, is a tenant of Zeus and the Olympians. In the old order of things, family is by blood only. A husband and wife have no blood relation, yet the son is of the same blood as his parents. The Furies right to vengeance cannot be dismissed. Clytaemnestra is one who upheld the laws of the Furies. Agamemnons murder of Iphegenia at Aulis was pure outrage. Yes he had the heart to sacrifice his daughter , to bless the war (Agamemnon lines 222-223) Agamemnon killed his own blood relation in order to sail for Troy. This too, is a terrible crime, seemingly of the same weight as Orestes act. Clytaemnestra believed she was justified in avenging her daughter, because her husband violated a sacred tenant of the old gods. Here is Agamemnon, my husband made a corpse by this right handa masterpiece of justice. Done is done. (Agamemnon lines 1429-1431) This shows a clear morality behind Clytaemnestras motives. She appears to have justification for her actions. The curse on the House of Atreus is fulfilled. In the last lines of Agamemnon the chorus foreshadows Orestes return. Clytaemnestra responds by saying to her new husband, We will set the house in order once for all. (Agamemnon lines 1708) The choruss purpose for suggesting Orestes s return is to show that the house is not yet cleansed of the curse.. Like his mother, Orestes possesses what he believes to be a just motive for revenge. Unlike his mother, however, Orestes has reservations about killing. He does not wish to strike down his mother, but realises that he must. The defense of Orestes is rooted in the fact that Apollo ordered him to do so. Orestes trusts Apollos guidance at his trial. Apollo will never fail me, no, his tremendous power, his oracle charges me to see this trial through. (Libation Bearers lines 273-275) Orestes believes that he is justified in avenging his god-honoured father, who was so brutally murdered by his mother. This cycle of blood in the House of Atreus appears as if it will continue forever. This cycle of violence leads the gods to search for a different solution. If the society of Greece is to progress to a higher civilisation, some other way must be found to resolve the conflict of moral questions. The ancient idea of vengeance doesnt properly apply here because both Clytaemnestra and Orestes act ed in support of legitimate definitions of justice. The ancient gods support Clytaemnestra and her actions, while Zeus, by means of Apollo, supports Orestes. The clash between deities sets the stage for the emergence of a new form of justicecivil justice. The ancient law of retaliation, which states that blood must be paid for with more blood, is enforced by the Furies. This task was given to them by Destiny at the dawn of time. youll give me blood for blood, you must! Wither you alive, drag you down and there you pay, agony for mother-killing agony! (Eumenides lines 262, 265) Their concept of justice is one where the law of retaliation is applied absolutely. They have no notion of compassion or understanding. They uphold the belief that regardless of circumstances, Orestes must be made to pay for his crime of matricide. The Furies represent something older and more sacred which Apollo and Zeus do not respect. .u1d2bf5534779cd0e3e7a8b9d89d7b087 , .u1d2bf5534779cd0e3e7a8b9d89d7b087 .postImageUrl , .u1d2bf5534779cd0e3e7a8b9d89d7b087 .centered-text-area { min-height: 80px; position: relative; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 , .u1d2bf5534779cd0e3e7a8b9d89d7b087:hover , .u1d2bf5534779cd0e3e7a8b9d89d7b087:visited , .u1d2bf5534779cd0e3e7a8b9d89d7b087:active { border:0!important; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .clearfix:after { content: ""; display: table; clear: both; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1d2bf5534779cd0e3e7a8b9d89d7b087:active , .u1d2bf5534779cd0e3e7a8b9d89d7b087:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .centered-text-area { width: 100%; position: relative ; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1d2bf5534779cd0e3e7a8b9d89d7b087:hover .ctaButton { background-color: #34495E!important; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1d2bf5534779cd0e3e7a8b9d89d7b087 .u1d2bf5534779cd0e3e7a8b9d89d7b087-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1d2bf5534779cd0e3e7a8b9d89d7b087:after { content: ""; display: block; clear: both; } READ: causes of pearl harbor EssayAthenas establishment of the court to try manslaughter is significant, because it provides a place for the citizens to decide about what moral elements will be upheld in the Polis. The Eumenides is the battleground for the two competing moralities. The furies invoke their rights as defenders of blood, and it is up to Orestes and Apollo to convince the jury that the son was just in his actions. The jury is expected to believe that Apollos oracle is truethat Zeus himself ordained the act. The Chorus asks the question, Can a son spill his mothers blood on the ground, then settle into his fathers halls in Argos? (Eumenides lines 661-662) A good answ er to this question might have been to hypothetically reverse the question on ClytaemnestraHow quickly she settled into life after she cut down her lord. But, Apollo opts for the weaker, more arbitrary defense. His speech about how the father is the only true parent makes little sense. Even the all-male jury would take some offense to this argument. Athena, however, initiates the ideal that the law be concerned not only with the forms of justice, as the Furies are passionate about, but with justice itself. The jurors must ask themselves whether Orestes was justified in committing matricide. Circumstances, motives and consequences must be taken into account at trial. Do they consider marriage as sacred as the law of kin? Is there a sacred bond between mother and son? Or only between father and son? Does Zeuss will override the ancient laws of the Furies? These are complicated moral question that Athena asks the mortal jury to grapple with. Even Athena believes the issue too important for her to judge solely. by all rights not even I should decide a case of murdermurder whets passions. (Eumenides lines 486-487) She realises that if she were to mediate, the curse will never end. Perhaps she is suggesting that mortals must decide when the gods disagree. This is an important development because it shows the journey from the retributi ve justice in Agamemnon to the deliberative justice of Athenas tribunal. The ultimate decision is ambiguous. The vote is tied for a reasonneither side puts forth a well argued analysis of Orestes case. There is justice on both sides, and the jury realises this. Orestes is acquitted by Athena on arbitrary terms. She casts her vote for Orestes because she supports her fathers Order, believing that there is a need for the establishment of a higher reasoning. One could also argue that she voted for acquittal because she is the god of war. She supported Agamemnon, the General, throughout the Trojan war and thus wished to favour his memory. She knows little of women, despite being female herself. Having settled the trial, Athena must also settle the anger of the Furies. She tactfully invites them to join Zuess Ordersomething that is necessary if peace is to be made between the generations of immortals. She does not completely refute them, nor deny them their place in the world.I will bear with your anger. You are older. The years have taught you more than I can know. But Zeus, I think, gave me some insight, too, that has its merits. (Eumenides lines 855-859) She asks the Furies to accept her offer of making their home Athens, and to endure as the upholders of the sacred bond of marriage. They accept her offer because it is wise and just. It transforms the Furies from destructive forces to beneficial ones. This resolution ends the curse on the House of Atreus, as well as many of the differences between the old and new gods. Orestes is free to claim his city and the Furies have been given a place in Zeus Order. The latter seems to be the emphasis of the trilogy because of the arbitrary decision on Orestes case. The best possible justice has been realised in the decision. The new Apollonian concept of justice represents a higher level of understanding and civilisation. It may be argued that Clytaemnestras death was left unavenged; that justice escaped her. Orestes right to avenge the dishonorable death of his father was upheld by the court. The tribunal deemed Clytaemnestras actions wrong and Orestes just.With the establishment of Athenas judicial system, there is now a method to prosecute people like Clytaemnestra, such that the ancient blood-lust of vengeance doesnt take rule over issues of right and wrong.