Sunday, May 31, 2020

Rising and Roman, African and Flat Aphra Behns Oroonoko - Literature Essay Samples

In the 19th century novel Uncle Toms Cabin, Harriet Beecher Stowe portrays Uncle Tom, a black slave, as an heroic figure. Written shortly before the American Civil War, the novel attempts to change negative moral attitudes towards blacks. However, in order to accomplish this, Stowe makes Uncle Tom appeal to Southern Plantation owners, who would otherwise dismiss the book as abolitionist nonsense. Stowe makes Uncle Tom appeal to Northerners and Southerners alike by depicting him not as a typical slave, but rather as a devout Christian with a white moral code. Similarly, Aphra Behns 17th century composition Oroonoko was written in response to the growing African slave trade. Like Stowe, Behn makes her black hero appeal to a greater audience, which she accomplishes by describing Oroonoko as having European and royal attributes. One of Behns primary objectives is to make Oroonoko clearly distinguished from the rest of his race, as in: a beauty so transcending all those of his gloomy race (2174).She can do this with relative ease for two reasons: 1) she writes a reportage, in the first person narrative, and 2) she is conscious of herself as a writer (i.e. This prince, as I have described him (2175)). Oroonokos physical description is the easiest and most effective mode for underscoring the way in which he is superior to the rest of his race. Behn writes:The most famous statuary could not form the figure of a man more admirably turned from head to foot. His face was not of that brown, rusty black which most of that nation are, but a perfect ebony or polished jet. His eyes were the most awful that could be seen, and very piercing, the whit of em being like snow, as were his teeth. His nose was rising and Roman, instead of African and flat (2175)The juxtaposition of the phrases rising and Roman and African and flat illustrates the distinction that Behn is trying to make. The alliteration of rising and Roman suggests nobility, while the assonance of African and flat sug gests plebeian and even inferior descent. This contrast nicely parallels the oxymoron that is used to describe Oroonoko: the Royal Slave. Oroonoko is royal in his country, as well as in his character. At the same time, however, as a result of social and historical conditions (namely European colonization and trade) he is bound in slavery2E Behn uses the shocking incongruity of royal and slave to advance her moral purpose.In the same way that Stowe gives Uncle Tom a white moral code, Behn must describe Oroonoko so that the British audience will not dismiss him on account of his color. While, as I have mentioned, Behn is conscious of herself in her writing, she is also conscious of her reader. This is evident in her description of Oroonoko (here Caesar) and his people as resembling our ancient Picts (2196), which the Norton glosses as A North British people appearing in histories of England and Scotland. It is also apparent in her describing the geography of the country by saying abou t half the length of the Mall here (2199), the Mall being a Fashionable walk in St. Jamess Park in London (Norton). Indeed, Behn uses phrases that are sympathetic to a noble British audience, such as refined notions of true honor, absolute generosity, softness, and gallantry (2174) to paint Oroonokos character. Throughout the story, the trait upon which Behn focuses most is honor, because her main accusation of the slave traders is that they are utterly devoid of this quality. She is quite careful not to attack the traders directly, however, for all of the aforementioned reasons regarding her audience. For example, she does not say outright that the slave ships commander is an immoral person. Rather, she says that he was a man of a finer sort of address and conversation, better bred and more engaging than most of that sort of men are (2189), thus implying that the commanders royal qualities make him an exception to the rest of his kind. Later, the good commanders betrayal and cruel treatment of Oroonoko serves to reinforce her moral judgement.Although Behn conveys her opinions about the weaknesses of Christianity through Oroonoko, she checks these statements by mentioning religion in a manner that would be favorable to her audience. Throughout the story, she follows the pattern of making a negative generalization about a group of people by distinguishing one member of that group. An example is her comment about the Frenchman: though he was a man of very little religion, he had admirable morals and a brave soul (2188). This statement implies that those who are not religious lack morals and brave souls. Behn also functions as a character within the story who attempts to Christianize Oroonoko and Imoinda. By telling stories, she tries to bring them to the knowledge of the true God (2197). While this statement sympathizes with Christian readers, Behn criticizes the falseness of Christianity through Oroonokos contempt of the ship captain and other Christian charact ers who repeatedly break their promises. One of Behns most subtle techniques for incorporating her own point of view is through the Lord Governor, whose arrival is necessary for Oroonoko and his family to be freed. Upon closer inspection, Oroonokos frustration at waiting for the Lord Governor appears to be a metaphor for the futility of the Christian belief in the Messiah, or second coming of Jesus Christ.Behn indirectly elicits the readers sympathy by incorporating white supremacy in her description of the Indians as primitive savages. Behns narration of the extreme ignorance and simplicity of em (2203) encourages the reader to scoff at the Indians, along with their primitive customs and incoherent babble (e.g. Tepeeme, and Amora tiguamy). Once the reader has been manipulated into this mode of thought, Behn once again reminds him that Oroonoko is more civilized, according to the European mode (2189). Additionally, she compares Oroonoko to legendary European military leaders such as Alexander the Great, Hannibal, and Julius Caesar. Thus, Behn elicits the readers sympathy by making Oroonoko as European as possible.The reader of Uncle Toms Cabin will find himself emotionally disturbed by the death of the poor, beaten slave at the end of the book. Furthermore, the sermon-like quality (known as a jeremiad) encourages the reader to do some introspection, and reflect on his or her own morals and attitudes. This same reaction from the Southern plantation owners in the 1850s was only possible because Uncle Tom was everything but a stereotypical black. Through Stowes manipulation of Uncle Tom, she made him white enough to be appealing to her audience, and thus had her desired effect of inspiring a moral conflict regarding the entire race. So, too, is Aphra Behns purpose achieved by shaping Oroonoko into an Europeanized black hero, unlike any other of his race. Beginning as a reportage, Behn turns the story into a fairy-tale of grand proportions, almost fooling the read er. By making Oroonoko white in every aspect except his skin color, Behn achieves her desired effect of having her readers sympathize with a black hero, serving as a step in the right direction toward racial equality.

Wednesday, May 6, 2020

The Use Of Slang And Its Significance On English Essay

Before getting into the abundance of slang and its significance on English, it is first best to cover the four base words of the LGBTQ community and how they have transgressed over time. Queer, lesbian, homosexual, and gay all share an importance to the beginnings of the more modern usages. The origin of queer is unclear, but the Oxford English dictionary defines one of its earliest meanings around 1513 as ‘strange, odd, peculiar, eccentric’. It wasn’t until the 1900s that it was used as an offensive term for homosexual people, with its original meaning still in context. This changed in the 1990s when early conversations about queer theory were had by social theorists Michel Foucault, Eve Kosofsky Sedgwick, Judith Butler, and others. This brought the word into a new light. Of course it still holds some of its derogatory meaning, but by using this word to define a theory that discussed the idea that gender is major part of the necessary self and in gay/lesbian stud ies it closely examines the socially constructed nature of identities and sexual acts. This reading connects directly with what is happening at present, which is a reclaiming of queer by people in the LGBTQ community to stand for both questioning and sexual and gender minorities. In her article on equality, Lisa Duggan states, â€Å"Queer people, particularly queer people of color, began to reclaim queer in response to a perceived shift in the gay community toward liberal conservatism, catalyzed by Andrew Sullivan sShow MoreRelatedSlang And Its Effect On Everyday Life Essay1635 Words   |  7 PagesThe use of slang in my life today is very evident. My roommates and I always talk slang during the day and the night. I don’t use slang very much in text messages or emails partly because I don’t feel the need and I am normally emailing professors and staff members who expect me to respect them by writing with proper English. Most of the time my roommates and I use slang w hen we are just messing or playing around. Therefore, the use of slang in my classroom will be mainly for educational purposesRead MoreRn Language1591 Words   |  7 PagesRegistered Nurse Language Laura Lynch Nevada State College ABSTRACT This paper discusses the significance of utilizing standard language and writing skills as it relates to multiple tiers of communication required in the nursing profession, as well as the importance of maintaining these elite level communication skills. In addition, this paper also includes a comparison between two minority authors that argue for the importance of their respective Chicana and black, â€Å"native tongues â€Å". TheRead MoreThe Poem ‘Mother To Son’ By Langston Hughes First Published1198 Words   |  5 Pagesmake will determine their destiny. However, the poems are considerably different in their writing style, diction, the point of view, tone and imagery. This essay aims to compare and contrast the two poems. Though having similarities in the theme and use of symbolism and imagery the two poems have a number of differences. Hughes wrote the poem in the 1920’s, a time in which the African Americans were living under discrimination and poverty. Her poem could have been informed by this historical contextRead More Comparison of Stealing and Hitcher Essay1324 Words   |  6 PagesThe style of language in these poems have several similarities as well as differences. Firstly, in Stealing, Duffy has managed to fuse conversational English with typical poetic devices. The poem has been written in a colloquial style and shows use of slang, merged with metaphors and impressive techniques. For example; the narrator uses slang words and phrases such as â€Å"mate†¦pinch†¦nicked a bust† but can converse in a poetic style, using metaphors such as â€Å"my breath ripped out in rags†. ThisRead MoreEll Increase Year After Year1721 Words   |  7 Pageseveryday language students use with their friends or at home. Meanwhile, CALP is academic language that is used when things pertain towards scholarly subjects and serious matters. BICS is the â€Å"surface† of a language. BICS is the level of speaking that is acquired quickly by most ELLs and usually takes 6 months to 2 years to develop. CALP is harder for ELLs to develop. CALP requires ELLs to cope with the academic demand in content classes like history, math, or english. CALP usually takes 5-7 yearsRead MoreA Universal Language2579 Words   |  11 PagesOutput†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.....................8 English Slang Questionnaire†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..9 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.....................12 I. Abstract The use of a Universal language i.e. English to communicate effectively in international environment is primary concern for most non-English speaking countries. In Southeast Asian countries primary stress is made on learning and acquisition of English language at higher education to adaptRead MoreUsing Information Communication And Technology1605 Words   |  7 PagesA new methods to acquire the English language is WhatsApp program via the smartphone, where I m going to search how to use this program to learn English language by the teacher and how arrival the idea to the student. :Introduction The world of technology and communication has changed quickly during this millennium time in history. We cannot avoid that and actually, we will be falling behind if we do not follow it. Information Communication and Technology has become the big part to bring the worldRead MoreThe African Vernacular English1850 Words   |  7 Pagesthinkin’ ebonics be messin’ wit Standard English, but it be enrichin’ it in a lotta ways. If you did not quite understand the first sentence, here is a â€Å"proper† translation; many people believe that African-American English negatively affects Standard English, but it actually enriches it in various ways. Black English, Ebonics, ghetto talk, slang, and Black Vernacular are all different words or phrases used to describe the African-American Vernacular English (AAVE) language. There are certain factorsRead MoreThe Need for Nadsat in A Clockwork Orange Essay2391 Words   |  10 Pagesonly does A Clockwork Orange present Bu rgess view on behavior science, but it also contains an invented language mixed in with English. Being well educated and having a background in languages such as Russian, German, and French, Burgess created a language known as Nadsat.   Nadsat is influenced by Russian, German, English, Cockney Slang, and it also contains invented slang. The language has a poetic feel to it and Burgess writing contains context clues that help the reader determine what the unknownRead MoreHow Language Can Be Defined As An Educational Environment? Essay1613 Words   |  7 Pagesvisual method of communication with which information is disseminated, and meaning is constructed. Going beyond speech, language is a diverse system encompassing written word, symbols and signs. Whilst this diversity suggests there is no â€Å"proper English† the term â€Å"standard† language can be applied to the discourse that is most common in an educational environment. Australian schools have traditional ly measured success in reading and writing against this single standard of literacy. However, the

Tuesday, May 5, 2020

Performance Assessment and Analysis of DNS †MyAssignmenthelp.com

Question: Discuss about the Performance Assessment and Analysis of DNS. Answer: Introduction The report is presented to discuss the various important aspects of telecommunications and networks considering the case study of the business organization Cookie Company in Australia. The company has managed online business activities properly, though it is seen that due to slow network connection and inappropriate and disturbed voice calls resulting from the network related issues, there have been misunderstanding between the staffs and customers. To enhance the experiences of customers and ensure that they are satisfied, it is important to manage consultation with the technical experts and business partners to improve the existing IT infrastructure and fulfill the needs and requirements of the business. The networking is a major component that can not only enhance the customers' services efficiency but will also ensure that the company manages proper business growth and expansion by enabling proper network connectivity and maintaining communication between the various departments and staffs at Cookie Co (Aiello, Merlo and Papaleo 2012). Network convergence allows for utilization of telephone, video and data communication and combines those to create a good network connection. Multiple modes of communication can be utilized to offer better network flexibility and improve the network infrastructure with ease and effectiveness. The network convergence, also known as the media convergence can include sending text messages, explore various websites, manage transmission of voice and multimedia over the internet protocol networks. This would also enable video conferencing and manage conversations between the business and customers face to face through the use of web camera (Bezruk et al. 2012). E-commerce would help in buying and selling of products and services online by using the internet and ensure that the quality of network services is improved largely. Unified communications help in integrating the communication in the business including messaging, voice over internet protocol, manage audio and video conferencing, enable desktop sharing along with speech recognition and call control with the non real time communication services. The unified communication could make Cooke Co. improve the network interface and even the user experience across multiple devices and media types. It uses various forms of mobile utility applications and enhances the efficiency of platforms for ensuring proper communication between the business and its customers with ease and effectiveness (Ims 2012). A local area network or LAN enables connecting a group of computer systems by sharing a common wireless link such as a router to the server. This can help in managing commercial business online as well as share resources like a printer or network storage with ease. A LAN setup includes multiple users who remain interconnected with each other via switches and routers to connect users to the internal servers. The use of Ethernet and Wi-Fi is essential for Cookie Co. to manage the LAN connection. One such kind of LAN is the WAN, which can be installed at the head office to connect all the departments and reduce the level of broadcast that may span the entire network through the implementation of multiple routers. The network routers have better functionality than the switches and can manage the network traffic as well as preserve the bandwidth for various applications (Kermajani and Gomez 2014). Metropolitan area network could also be used to provide a wider range of network connectivit y and use higher speed technologies at a lesser price when compared to the other WAN technologies. The LAN is used for enabling network connection by using internet within a lower range and so it is used at the branches of Cookie Co. The use of Ethernet will help in connecting multiple computer systems and make sure that network connection is established properly to manage the business activities online. A cabling plan will consist of various subsystems and connect the computers systems by using servers, routers, switches, security systems and by using telecom equipment and phone systems as well (Kuhlenkamp, Klems and Rss 2014). The backbone cabling can be used at the head office while the horizontal cabling will be used at the branches. LAN is used by using coaxial cables and even shielded twisted pair is used in the token ring of Cooke Co. for implementing LAN using Cat3 cable. A wide area network is a telecommunications network that covers a large geographical area to establish a network by using various telecommunication circuits. The Internet is considered as WAN and can help in establishing various modes of communication and network facilities over a long distance. The Asynchronous transfer mode or ATM can make Cookie Co. manage good data traffic and has been based on the use of internet protocol at the head office (Mahalingam et al. 2014). The cable modem is another LAN type that can act as a network bridge to manage communication of data, information, and messages by using the radio frequency channels present on the radio frequency and hybrid fiber-coaxial infrastructures. It delivers improved broadband internet access and can help the company to overcome the low-speed network connection and even gain benefits of the HFC and RFoG networks. This is suitable and can be used at the branches (Ostapenko et al. 2013). For enabling transmission media, it is important to develop a network by connecting various people, devices and computer systems. The media types include a copper cable that includes unshielded twisted pair and coaxial cable, wireless media including radio frequencies, infrared, microwave and fiber optics. The fiber optics deliver great bandwidth and can prevent security issues as well as deliver an improved level of security. DNS enables proper communication through the use of internet and uses the computer systems rather than using the IP addresses. The IPAM integrates both DNS and DHCP to bring necessary changes in the IP address and improve the functionalities of a network including better aggregation of data and troubleshooting activities (Ross 2012). The DNS management could help in reducing the human errors and prevent repetitive and complex data by deploying those on multiple physical servers. This would enhance the efficiency of the network connection established and allow Cookie Co. to improve its network stability. VoIP One of the most effective networked services is the voice over internet protocol or VoIP, which can allow the organization to interact with customers and other businesses by making calls with the use of broadband internet rather than using any telephonic system. It can save the cost of using a mobile phone, manages better portability and internet accessibility along with better flexibility. In case any phone calls come, then the signals can be converted into digital data and can be routed over the internet (Sans and Soriano 2012). Extranet It is a kind of intranet, which is a controlled private network to allow the business gain accessibility to its business partners and customers, suppliers and other stakeholders with ease. It can allow the business organization to transfer or exchange information over the internet with ease and effectiveness. Intranet An intranet is a private and closed network that consists of various LANs interconnected with each other along with use of leased lines in the WAN. It can create connections through the use of multiple gateway computer systems to the internet (Sinnreich and Johnston 2012). Email Email or electronic mail allows for transfer or exchange of data, information and messages from one person to another by use of internet. It is fast, reliable and can even make the company send its brand-related messages to its customers by emails. This could not only allow the head and brand offices to remain connected and know about the business operations but would also create good relationships with the customers (Wang et al. 2013). Data processing facilities The storage area network or SAN enables consolidated, block level data storage facilities by utilising disk arrays, tape libraries and even by managing accessibility to the servers to make the device for storage act as a locally attached system. The cost and complexity, both have reduced largely due to utilization in higher numbers across the small and medium sized organizations. Cloud storage helps in storing the digital data in pools and the physical storage is managed by multiple servers that are set up by the organization. The cloud storage facilitates the accessibility and availability of data and information, thereby keeping the physical environment protected and functional as well (Wang et al. 2015). Cloud storage offers better flexibility and ease of storing, accessing and managing data and information with ease and effectiveness. The distributed database can be beneficial for the company too for storing various portions of the database in multiple physical locations while the processing of data is distributed among multiple nodes of the database. P2P The data stored in databases are integrated and used for various purposes afterwards. The peer to peer data processing could deliver better flexibility, scalability and manage the corporate network applications and provide best data sharing and exchange services with ease. This is useful because the customer related data and information are processed and can be used to assess the needs and requirements if the customers and deliver services accordingly (Bezruk et al. 2012). Other information and data are processed to ensure that the company maintains a good brand image and attract as many customers as it can, furthermore improving the sales revenue and gaining competitive advantage in business for Cookie Co (Ims 2012). Conclusion The main focus was done on the business executives who have limited ICT knowledge, so that they could know how the networking solutions would be beneficial for the business and improve the customers services, therefore ensuring satisfaction of customers and improving the network infrastructure as well. Various telecommunications and networking technologies had been used for gaining business benefits and furthermore improve the infrastructure of the organization effectively. The LAN was used in branch office whereas WAN was used at the head office. The IP and DNS management was done to prevent human errors and this helped the company to manage the networked services by using VoIP, intranet, extranet and email. The storage of company and customer data was managed through the use of Cloud storage and SAN while the processing of data with the use of P2P had helped in gaining accessibility to relevant data, use those to improve the business operations efficiency and improve the level of s atisfaction of customers. Recommendations Use of firewall is recommended for proving better network security and even protects the database against any threats. The database should be checked properly to prevent any data redundancy It is recommended to make sure that the Ethernet cables, coaxial cables, and fiber optics are arranged properly to keep the flow of network secured and function properly. The external hard drive connected to the router must be protected by a password so that any unauthorized access is prevented. References Aiello, M., Merlo, A. and Papaleo, G., 2012. Performance assessment and analysis of DNS tunneling tools.Logic Journal of IGPL,21(4), pp.592-602. Bezruk, V., Bukhanko, A., Chebotaryova, D. and Varich, V., 2012. Multicriteria optimization in telecommunication networks planning, designing and controlling. InTelecommunications Networks-Current Status and Future Trends. InTech. Ims, L.A., 2012.Broadband access networks: introduction strategies and techno-economic evaluation. Springer Science Business Media. Kermajani, H. and Gomez, C., 2014. On the network convergence process in RPL over IEEE 802.15. 4 multihop networks: Improvement and trade-offs.Sensors,14(7), pp.11993-12022. Kuhlenkamp, J., Klems, M. and Rss, O., 2014. Benchmarking scalability and elasticity of distributed database systems.Proceedings of the VLDB Endowment,7(12), pp.1219-1230. Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, L., Sridhar, T., Bursell, M. and Wright, C., 2014.Virtual extensible local area network (VXLAN): A framework for overlaying virtualized layer 2 networks over layer 3 networks(No. RFC 7348). Ostapenko, E.G., Kulikov, S.S., Tolstykh, N.N., Pasternak, Y.G. and Popova, L.G., 2013. Denial of service in components of information telecommunication systems through the example of network storm attacks. Ross, K.W., 2012.Multiservice loss models for broadband telecommunication networks. Springer Science Business Media. Sans, B. and Soriano, P. eds., 2012.Telecommunications network planning. Springer Science Business Media. Sinnreich, H. and Johnston, A.B., 2012.Internet communications using SIP: Delivering VoIP and multimedia services with Session Initiation Protocol(Vol. 27). John Wiley Sons. Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W., 2013. Privacy-preserving public auditing for secure cloud storage.IEEE transactions on computers,62(2), pp.362-375. Wang, Y., Chi, N., Wang, Y., Tao, L. and Shi, J., 2015. Network architecture of a high-speed visible light communication local area network.IEEE Photonics Technology Letters,27(2), pp.197-200.