Saturday, January 25, 2020

The Lost Phoebe Analysis

The Lost Phoebe Analysis In the story of The Lost Phoebe, Theodore Dreiser writes a story about a man and his wife. Dreiser tells so much about the mans childhood and early adulthood because he was showing the reader how Henry Reifsneider was doomed to suffer in isolation at the end of his life. The man, Henry Reifsneider, had lived with someone all his life. He lived with his parents until he fell in love. When Henry fell in love, and decided to get married, his parents invited his bride-to-be to live with him. Henry married Phoebe when he was just twenty-one years old and .had been married for forty-eight years. He also continued to live with his parents until they passed away ten years after his marriage to Phoebe. Their death probably would have been the first time that he had to deal with the idea of people, in which he cared a great deal for, leaving his life forever. Dreiser does not mention anything about other people, such as grandparents so it would be unknown to the reader if he ever knew them. He lived with Phoebe for forty-eight years until her death, this was, probably the worst goodbye this man had ever had to endure. Forty eight years of marriage yielded seven children. Three of his children had passed away, further setting the scene for this poor mans isolation. The rest of these children had moved away to other cities, some other states. It seems as if there was no time in his life that he was alone until the death of his wife. Phoebe became sick when she was sixty-four years old. The disease she came down with might have been curable if it was not for her age. He followed her body to her resting place consumed with grief and uncertain as to what he should do next, or what the rest of his days would bring. Even though his children and friends asked him to come and stay with him and let them take care of him, he was so set in his ways that he would not dare to budge. The next couple of months were spent dwelling on her death. He will not leave his home and could not care less if there were visitors to the home. He knows that it will soon be his turn to die and it seems, to me anyway, that he welcomed death. He could again be with his love only if he passed away. Henry gradually started to put his wifes things away, but five months after her death a change had begun in him and his isolation had gotten the better of him. Late one night, after a particularly restless night, shapes in his house began to take the shape of his wife. Of course, when he went to her he found that it was all in his imagination. Shortly, he thought he saw her in the yard. When his Phoebe was alive he would accuse her of moving his things. She would always have the same come back of telling him that if he continued to accuse her of these things that she was going to leave him. She would also claim that he would never find her if she did decide to leave. It did not take long for his mess up mind to think that she had, in fact, made good on his promises. Since he had packed up some of her things, it gave his dementia the reasoning it needed to support his claim. In his mind, he had not packed her things away, she had packed her things. The first place he went to look for his wife was at her friends house, Mrs. Race. He told her friend that he and his Phoebe had gotten in an argument and had left in the middle of the night. She, of course, realizes, that he has lost his mind without his dear Phoebe and tries to go along with his mad fantasy, so that she could keep him there until someone could get there to help this poor man. He would not stay any longer. He was a man on a mission; he would find her and bring her home. He walked around all day asking anyone who would listen if they had seen his wife and telling them the same story. Someone did call the authorities, but the authorities dismissed him as being a harmless old man, who would be in less danger to himself if they had left him to walk the miles he did ever day than if they put him in some sort of hospital or nursing home. Most of the county knew who he was and pitied him. His neighbors would do their best to take care of him, feed him and whatever they can do for him. As the years go by, Henry loses his mind more and more. Dreiser skips ahead three years. In this three years Henry has spent the entire day, every day walking miles and miles looking for his dead wife. His mind is so gone that he believes that she left him on purpose while everyone else knows his wife, Phoebe is dead. If he could only find her he believes he could convince her to come home. No one knows how he handled the cold weather, the rain, or other harsh weather. I suppose his love for his wife and hope that he would find out where she had gone would have carried him through the bad weather or it could have been part of his mental illness. In the end the apathetic views of Henry Reifsneider cost Henry his life. One night the old man thought he saw his wife. She looked as she was fifty five years before. He had walked off a cliff and was found laying at the bottom with a smile on his face. He had found his lost Phoebe, as he had promised her he would do if she ever left him. The story of The Lost Phoebe is a perfect example of the new ideas in psychology that influenced the Modernist movement. Theodore Dreiser was interested in the chaotic view of man and it truly shows in this story.

Friday, January 17, 2020

Overview on Ipsec

I. Abstract2 II. The need for IPSec3 1. Internet threats3 2. TCP/IP security vulnerabilities4 3. The need for IPSec5 III. What is IPSec5 1. What is IPSec5 2. IPSec properties6 IV. IPSec structure6 1. Authentication header (AH)6 2. Encapsulating Security Payload (ESP)7 V. Security Associations (SA)8 1. Security Associations8 2. Combining Security Associations9 3. SA and key management10 VI. Building a real VPN with IPSec11 1. VPN overview11 2. IPSec in VPN11 VII. Future Research13 VIII. Conclusion14 IX. References14 I. Abstract It can be seen clearly that the Internet has developed with a very high speed in many recent years. In the 80s of last century, the Internet was only used in US army, but nowadays, the Internet has come to every country, every home and everyone. However, such fast develops also go along with the increasing number of security issues from the Internet. Therefore there is a need to find a security solution for this issue and that is the season why Internet Protoco l Securities exists. * In this paper, i will introduce a overview about this security protocol: what is it?What are its core components? And how this protocol was implemented in the practical? II. The need for IPSec 1. Internet threats * The Internet is quickly changing our world, particularly in the way we do business. The fast development of technology has helped to increase the connection speed of Internet and decrease the cost also. This has given the opportunity for people who know how to take advantage of it. The Internet enables such things as: * Extranets: companies can easily link with their business partners and their customers.In the past, we have to use dial up line with low bandwidth, so we have to wait a bit long to get the connection to a web sites or send messages to our friend via yahoo messenger. But today with the quick development of the technology, the speed of the Internet has been increased significantly, therefore the Internet can enable instant and on-demand high-speed communications with our business customers and partners around the world . * Intranets: a powerful tool is widely used for providing the communication in a organization.. Remote users: the Internet also provides a solution for users who don’t need to go to the company till can connect and access to the company network. This will help to reduce the transport cost and also increase the productive of the company. * It can be said that the Internet provides many business opportunities, but if there is not the proper controls, your data can become a subject to various kinds of security attacks. * Loss of Privacy There are many ways that the Internet users can lose their privacy information such as: the address, family information, phone number, credit cards and so on.This information can be used in marketing purposes such as send spam mail about a new product to many people or more dangerously, It can be used for thief or criminal purposes such as: credit care stealing , disclose personal information to the public and so on. * Loss of Data Integrity Even in case your credential is not stolen but there is still need a solution to help ensure the integrity of data. For example, when you do an transaction, your password are not be disclosed but if the number of money of your transaction was modified, you still got a big problem. Identity Spoofing The Internet is an un-trusted network so be careful with your identity when you surf on the Internet because an intruder can impersonate you and get the access to your confidential. * Denial-of-service As organizations take advantage of the Internet, there is a issue that the service being performed is almost always a constant time operation, so it is easy for an external observer process to detect a Dos attack. These attacks are generally transient. 2. TCP/IP security vulnerabilitiesThe main reason lead to Internet threats mentions above is that TCP/IP – the foundation of Internet – has many s ecurity vulnerabilities. When IP, TCP, UDP and the infrastructure protocol of TCP/IP were designed to use in a very small network and all hosts and users are known, hence the security concerns were almost non-existing. But today, with a very quick development of the Internet, there are more and more security vulnerabilities of TCP/IP were exploited. In this section I will reveal an overview about popular kinds of attacks in TCP/IP. a. TCP SYN or TCP ACK Flood AttackThis is a form of DOS attack in which an intruder sends a successful SYN request to victim’s system to consume the resources of the victim’s sever to make the sever cannot respond to the legal connection b. TCP Sequence Number Attack By predicting the IP sequence number, an attacker can inject data or take over a pre-established connection. c. ICMP Attacks Attacker could use either the ICMP message can make a host stop working such as â€Å"Time exceeded† or â€Å"Destination unreachable† messa ges. Attacker can make use of this by simply forging one of these ICMP messages, and sending it to one or both of the communicating hosts.Their connection will then be fallen apart. d. Smurf Attacks The â€Å"smurf† attack is a modification of the classic ping flood attack. An attacker instead of sending ICMP echo packets from his system to the victims network, he send a packet to a broadcast address of middle network with a return IP address of the victim’s network. 3. The need for IPSec To solve issues was mentioned in the previous sections, it is necessary to have a protocol suite which can provide the authentication and decryption to IP packets to increase the security level in data communication over the Internet.And that is reason why we have Internet Protocol Security (IPSec). III. What is IPSec 1. What is IPSec? * Internet Protocol Security (IPSec) has revolutionized Internet Protocol (IP) security. The IPSec protocol suite utilizes cryptographic techniques to ensure data confidentiality, and digital signatures to authenticate the source of the data transmission. IPSec also brings a new level of interoperability to the Internet that never existed before. It doesn’t rely on proprietary protocols or techniques to establish secure links between network nodes.By utilizing IPSec in virtual private networking solutions organizations can exchange sensitive data over public networks with the knowledge that the parties they are exchanging the data with are the intended receivers, that the data was kept confidential in transit, and that the data did not change during transmission. * IPSec has two goals: * To ensure the integrity and confidentiality of IP packets. * To provide a defense against network attacks. Both goals are met through the use of cryptography-based protection services, security protocols, and dynamic key management. 2. IPSec properties IPSec has following properties: * Anti –replay (replay prevention): ensures the un iqueness of each IP packet, any packet was captured by the attacker cannot be put back into the network to establish a session or steal information. * Integrity: protect data from being modified in transit, ensure that received data is the same as the first data. * Confidentiality (encryption): ensures that data is only know by the authorized recipients. To do this, data will be encrypted before being send, and the received has to use a public, private key to decrypt the data when receiving it. Authentication: verifies that a message can only be send from a receiver who knows the shared, secret key. The sender will include a authentication message to the data before sending, the receiver has to use their key to encrypt the authentication message to enable watching the data. If the key is wrong, the data will be discarded. IV. IPSec structure 1. Authentication header (AH) * AH is used to authenticate- but not encrypt – IP traffic, or in other words this protocol guarantees con nectionless integrity and data origin authentication of the packet.Moreover, it can optionally guard against replay attacks by attackers who obtain a copy of authenticated packet and later put it back to the network. * Structure of AH: The AH header consist of 6 parts: * Next hdr (8 bits): this identifies what the upper-level protocol following the AH is * AH len (8bit): this field indentifies the size of the authentication header. * Reserved: this field is a place holder for future use. * Security Parameters Index (32bits): this is a random number that indicates the setting that being selected by the transmitter to communicate with the receiver.This includes the encryption algorithms that are being used, which encryption keys are being used, and the information about the validity period for these encryption keys. * Sequence Number: this is a counter that increases incrementally each time a packet is transmitted using the parameters setup in the SPI. * Authentication Data: this is t he Integrity Check Value(ICV) for the packet. The originator will create a keyed-one-way-hash of the packet payload and attach this hash value to the packet as the authentication field.The receiver can check the integrity of the payload data by hashing the payload data once it has been decrypted with the same hash algorithm, which sender used. If two hash values are identical then the recipient can be sure that the data was not modified during the transmission. However, because the data was not encrypted this does not ensure the confidentiality of the payload data only the integrity. 2. Encapsulating Security Payload (ESP) The ESP is the portions of the IPSec that addresses the confidentiality of the data that is being transmitted as well as offers authentication capabilities.ESP utilizes symmetric encryption techniques to encrypt the IP packet payload. The symmetric encryption algorithms that must be supported in order to be compliant to standard are DES, 3 DES, RSA, CAST, and Blow fish. The ESP will encrypt the IP header or information, which includes the information required for routing. It will only encrypt the packet payload, which will ensure the confidentiality of the data. There are six elements which make up the ESP which include: V. Security Associations (SA) 1. Security Associations * A key issue appears in both authentication and encryption mechanism for IPSec, that is Security Association (SA).SA is a simply the bundle of algorithm are parameters that is used to provide authentication and confidentiality a particular flow of traffic stream in one direction. Thus in normal bi-directional traffic process, the flows are secured by a pair of security associations. * In order to decide what protection is to be provided for an outgoing packet, IPSec uses the Security Parameter Index (SPI), an index to the security association database (SADB), along with the destination address in a packet header, which together uniquely identify a security association fo r that packet.A similar procedure is performed for an incoming packet, where IPSec gathers decryption and verification keys from the security association database. There are two types of SAs are defined: transport mode and tunnel mode. * Transport mode SA is used to provide security communication between two hosts, and in this mode only the payload of packet is encrypted (with ESP) or authenticated (with AH) so it only provide protection for upper layer protocols. A tunnel mode SA is used to provide security communication between two gateway or between a gateway and a host and in this mode the entire IP packet is encrypted (with ESP) or authenticated (with AH). 2. Combining Security Associations * Any single SA can select AH or ESP to protect the data transmits over an IP network but it cannot combine 2 of these protocols. Therefore, there is a need to combine many SAs to achieve the required security policy. The term â€Å"security association bundle† or â€Å"SA bundleâ₠¬  is applied to a sequence of SAs through which traffic must be processed to satisfy a security policy. Security associations may be combined into bundles in two ways: transport adjacency and iterated tunneling. * Transport adjacency refers to applying more than one security protocol to the same IP datagram, without invoking tunneling. This is only applicable for combining AH and ESP at the same level. * Iterated tunneling refers to the application of multiple layers of security protocols affected through IP tunneling. This approach allows for multiple levels of nesting, since each tunnel can originate or terminate at a different IPSec site along the path. Basic ways of SAs’ combination: documents about IPSec structure has listed four cases of combining SAs based on the compatibility between severs or gateways * Case 1: all securities properties are provided between systems. * Case 2: security is only provided between gateways and there is no any host implemented IPSec * Ca se 3: based on the case 2 but add the End to End security. * Case 4: support the remote access through the Internet in the scope of firewalls and expandable accept of server or host in behind the firewalls. 3. SA and key management Key management is an important part of IPSec regarded to identify and distribute the secret key. And basic demand is four keys to communicate between two applications: receiving key and sending keys include two AH and ESP. IPSec structure allows to support two type of key management is: * Manually: every administrator configure manually their private keys with other communicate systems’ keys. In practice, this type of key management is used for small resources in a static environment. * Automated: it is a system which allows creating keys for SAs and being used in a large distribution system with dynamic configuration. The default automated key management in IPSec is called ISAKMP/Oakley with following components: * Oakley key indentifying protocol : Oakley is a basic key exchanging protocol based on Diffie-Hellman algorithm, but added security condition. Oakley is a general standard; it does not have any specific format. * Internet Security Association and Key Management Protocol (ISAKMP): ISAKMP provide a framework for establishing SAs and cryptographic keys in an Internet environment VI. Building a real VPN with IPSec 1. VPN overviewVPN (Virtual Private Network) is the expansion of LAN by adding connections over a shared network or public network like the Internet. In other words, VPN is a private network uses public communication infrastructure but still remains the privacy by using a tunneling protocol and security procedures. VPN can be used to establish a connection between a computer and a private network or between 2 private networks. 2. IPSec in VPN * In IPSec, ESP is the unique way to provide encryption, but ESP and AH both can provide authentication, so what is the most efficient way to combine 2 of them together. The traditional solution of wrapping ESP inside of AH is technically possible, but because of the limitations of AH with NAT (Network Address Translation), hence combining AH and ESP by this way will make this tunnel not work with devices using NAT. * Instead, ESP + Authentication is used in Tunnel mode to fully encapsulate the traffic on its way across an un-trusted network, protected by both encryption and authentication in the same thing. * What's especially nice thing about this way of implement is that VPN and other security measures are almost invisible to the end-user hosts.Because a VPN is carried out by a gateway device which treats the VPN as yet another interface, traffic destined for the other end is routed normally. VII. Future Research This paper only provides an overview about IPSec but not focus on securities components of IPSec such as encryption algorithms and detail of mechanism of SAs. Therefore in the future research I will spend more time on those issues. VIII. Conclusion * After covering most of components of IPSec structure, it can be seen clearly that IPSec is a strong security protocol; it can provide both ncryption and authentications. It also use various types of encryption and authentications algorithm such as Triple-DES, 128 bit C4, AES (for encryption) ; MD5 or SHA-1 (for authentication). * However IPSec still have security issue: when a authorized IPSec user access to the network, they can also access to unauthorized resources. Moreover data file is uploaded and downloaded easily also creates the threats from virus infection. IX. References 1. Www. wikipedia. org 2. http://tools. ietf. org/html/rfc2401#section-4. 4. 3

Thursday, January 9, 2020

Marketing Analysis Business Association And Management...

NAGEMENT The focus of any business is to provide needs of customer by providing military and supplies, and in this procedure generate value for customers and solve their trouble. Production and operations management talks about applying big business association and management concepts in formation of supplies and military (1). PRODUCT: A product is defined as the thing offered for deal. A product can be a facility or an item. It can be material or in virtual form. Every product is made with some particular cost and each is sold at a price. The price depends on the quality, marketing etc (2). Product can be different object for different people like for customer product is mix of utilities because customer expects some uses from product.†¦show more content†¦It is that action where by resources, flowing within a defined arrangement, are joint and changed in a controlled manner to add value in according to the policy communicated by management. It does not activate in separation from the other organization system. There exists a feedback about the performance, which is necessary to manage and improve performance of the system. (Schematic production system) CLASIFICATION OF PRODUCTION SYETEM 1. Job-shop production: Job-shop production is used to manufacturing of one or more quantity of any product which is designed and created as per requirement of particular customers within prefixed period and cost. 2. Batch production: Batch production is used to produce limited numbers of products in regular interval. In this type of production job passes through different batches and each lot have different direction. 3. Mass production: Mass production is used to produce very large quantity of product of same configuration. In this production parts produce continuously with short cycle time of production. 4. Continuous production: In continuous production services are arranged as particular cycle of production operations from first to finished product. In this type of production products are made to flow through different conveyors (4). MANAGEMENT: Management is defined as perfect combination of art and science of accomplishment science of accomplishment things completed by the public, by organizing,

Wednesday, January 1, 2020

Changan - Capital of the Han, Sui, and Tang Dynasties

Changan is the name of one of the most important and immense ancient capital cities of ancient China. Known as the eastern terminal of the Silk Road, Changan is located in Shaanxi Province about 3 kilometers (1.8 miles) northwest of the modern town of XiAn. Changan served as capital to the leaders of the Western Han (206 BC-220 AD), Sui (581-618 CE), and Tang (618-907 AD) dynasties. ChangAn was established as a capital in 202 BC by the first Han Emperor Gaozu (ruled 206-195), and it was destroyed during the political upheaval at the end of the Tang dynasty in 904 AD. The Tang dynasty city occupied an area seven times larger than the current modern city, which itself dates to the Ming (1368-1644) and Qing(1644-1912) dynasties. Two Tang dynasty buildings still stand today―the Large and Small Wild Goose Pagodas (or palaces), built in the 8th century AD; the rest of the city is known from historical records and archaeological excavations conducted since 1956 by the Chinese Institute of Archaeology (CASS). Western Han Dynasty Capital At about AD 1, the population of ChangAn was nearly 250,000, and it was a city of international importance for its role as the eastern end of the Silk Road. The Han Dynasty city was laid out as an irregular polygon surrounded by a pounded-earth wall 12-16 meters (40-52 feet) wide at the base and more than 12 m (40 ft) high. The perimeter wall ran a total of 25.7 km (16 mi or 62 li in the measurement used by Han). The wall was pierced by 12 city gates, five of which have been excavated. Each of the gates had three gateways, each 6-8 m (20-26 ft) wide, accommodating the traffic of 3-4 adjacent carriages. A moat provided additional security, surrounding the city and measuring 8 m wide by 3 m deep (26x10 ft). There were eight main roads in Han dynasty ChangAn, each between 45-56 m (157-183 ft) wide; the longest leads from the Gate of Peace and was 5.4 km (3.4 mi) long. Each boulevard was divided into three lanes by two drainage ditches. The middle lane was 20 m (65 ft) wide and reserved exclusively for the use of the emperor. The lanes on either side averaged 12 m (40 ft) in width. Main Han Dynasty Buildings The Changle Palace compound, known as the Donggong or eastern Palace and located in the southeastern part of the city, was approximately 6 sq km (2.3 sq mi) in surface area. It served as the living quarters for the Western Han empresses. The Weiyang Palace compound or Xigong (western palace) occupied an area of 5 sq km (2 sq mi) and was located in the southwestern side of the city; it was where Han emperors held daily meetings with city officials. Its principal building was the Anterior Palace, a structure including three halls and measuring 400 m north/south and 200 m east/west (1300x650 ft). It must have towered over the city, as it was built on a foundation that was 15 m (50 ft) in height at the north end. At the north end of the Weiyang compound was the Posterior Palace and buildings that housed the imperial administration offices. The compound was surrounded by a pounded earth wall. The Gui palace compound is much larger than Weiyang but has not yet been fully excavated or at least not reported in the western literature. Administrative Buildings and Markets In a administrative facility located between the Changle and Weiyang palaces was discovered 57,000 small bones (from 5.8-7.2 cm), each of which were inscribed with the name of an article, its measurement, number, and date of manufacture; its workshop where it was created, and the names of both the artisan and the official who commissioned the object. An armory held seven storehouses, each with densely arranged weapon racks and many iron weapons. A large zone of pottery kilns that manufactured brick and tile for the palaces was located north of the armory. Two markets were identified within the northwestern corner of the Han city of ChangAn, the eastern market measuring 780x700 m (2600x2300 ft, and the western market measuring 550x420 m (1800x1400 ft). Throughout the city were foundries, mints, and pottery kilns and workshops. The pottery kilns produced funerary figures and animals, in addition to daily utensils and architectural brick and tile. In the southern suburbs of Changan were remains of ritual structures, such as the Piyong (imperial academy) and jiumiao (ancestral temples to the Nine Ancestors), both of which were established by Wang-Meng, who ruled ChangAn between 8-23 AD. The piyong was built according to Confucian architecture, a square on top of a circle; while the jiumiao was built on the contemporary but contrasting principles of Yin and Yang (female and male) and Wu Xing (5 Elements). Imperial Mausoleum Numerous tombs have been found dated to the Han Dynasty, including two imperial mausoleums, the Ba Mausoleum (Baling) of Emperor Wen (r. 179-157 BC), in an eastern suburb of the city; and the Du mausoleum (Duling) of Emperor Xuan (r. 73-49 BC) in southeastern suburbs. Duling is a typical elite Han Dynasty tomb. Within its gated, pounded earth walls are separate complexes for the burials of the emperor and empress. Each interment is centrally located within a gated rectangular surrounding wall and covered by a pyramidal pounded-earth mound. Both have a walled courtyard outside of the burial enclosure, including a retiring hall (qindian) and a side hall (biandian) where ritual activities associated with the buried person were conducted, and where the individuals royal costumes were displayed. Two burial pits contained hundreds of nude life-sized terracotta figures―they were clothed when placed there but the cloth has rotted away. The pits also included a number of pottery tiles and bricks, bronzes, gold pieces, lacquers, pottery vessels, and weapons. Also at Duling was a shared mausoleum temple with an altar, located 500 m (1600 ft) from the tombs. Satellite tombs found east of the mausoleums were built during the rulers dynasty, some of which are quite large, many of them with conical pounded earth mounds. Sui and Tang Dynasties Chang​an was called Daxing during the Sui Dynasty (581-618 AD) and it was founded in 582 AD. The city was renamed Changan by the Tang dynasty rulers and served as its capital until its destruction in 904 AD.   Daxing was designed by the Sui Emperor Wens (r. 581-604) famous architect Yuwen Kai (555-612 AD). Yuwen laid out the city with a highly formal symmetry that integrated natural scenery and lakes. The design served as a model for many other Sui and later cities. The layout was maintained through the Tang Dynasty: most of the Sui palaces were also used by Tang dynasty emperors. An enormous pounded-earth wall, 12 m (40 ft) thick at the base, enclosed an area of approximately 84 sq km (32.5 sq mi). At each of the twelve gates, a fired brick fa ¸ade led into the city. Most of the gates had three gateways, but the main Mingde Gate had five, each 5 m (16 ft) wide. The city was arranged as a set of nested districts: the guocheng (outer walls of the city describing its limits), the huangcheng or imperial district (an area of 5.2 sq km or 2 sq mi), and the gongcheng, the palace district, containing an area of 4.2 sq km (1.6 sq mi). Each district was surrounded by its own walls. Main Buildings of the Palace District The gongcheng included the Taiji Palace (or Daxing Palace during the Sui dynasty) as its central structure; an imperial garden was built to the north. Eleven great avenues or boulevards ran north to south and 14 east to west. These avenues divided the city into wards containing residences, offices, markets, and Buddhist and Daoist temples. The only two extant buildings from ancient Changan are two of those temples: the Great and Small Wild Goose Pagodas. The Temple of Heaven, located south of the city and excavated in 1999, was a circular pounded earth platform composed of four concentric stepped circular altars, stacked on top of one another to a height of between 6.75-8 m (22-26 ft) and 53 m (173 ft) in diameter. Its style was the model for the Ming and Qing Imperial Temples of Heaven in Beijing. In 1970, a hoard of 1,000 silver and gold objects, as well as jade and other precious stones called the Hejiacun Hoard was discovered at Changan. The hoard dated to 785 AD was found in an elite residence. Burials: a Sogdian in China One of the individuals involved in the Silk Road trade that was so central to the importance of ChangAn was Lord Shi, or Wirkak, a Sogdian or ethnic Iranian buried in ChangAn. Sogdiana was located in what is today Uzbekistan and western Tajikistan, and they were responsible for the central Asian oasis towns of Samarkand and Bukhara. Wirkaks tomb was discovered in 2003, and it includes elements from both Tang and Sogdian cultures. The underground square chamber was created in the Chinese style, with access provided by a ramp, an arched passageway and two doors. Inside was a stone outer sarcophagus measuring 2.5 m long x 1.5 m wide x 1.6 cm high (8.1x5x5.2 ft), lavishly decorated with painted and gilded reliefs depicting scenes of banquets, hunting, travels, caravans, and deities. On the lintel above the door are two inscriptions, naming the man as Lord Shi, a man of the nation of Shi, originally from the Western countries, who moved to Changan and was appointed sabao of Liangzhou. His name is inscribed in Sogdian as Wirkak, and it says that he died at the age of 86 in the year 579, and was married to the Lady Kang who died one month after him and was buried by his side. On the southern and eastern sides of the coffin are inscribed scenes associated with the Zoroastrian faith and in Zoroastrian fashion, the selection of the south and eastern sides to decorate corresponds to the direction the priest faces when officiating (south) and the direction of Paradise (east). Among the inscriptions is the priest-bird, which may represent the Zoroastrian deity Dahman Afrin. The scenes described the Zorastrian journey of the soul after death. Tang Sancai Pottery Tang Sancai is the general name for vividly color-glazed pottery produced during the Tang dynasty, especially between 549-846 AD. Sancai means three colors, and those colors refer typically (but not exclusively) to yellow, green and white glazes. Tang Sancai was famous for its association with the Silk Road--its style and shape were borrowed by Islamic potters at the other end of the trade network. A pottery kiln site was found at ChangAn named Liquanfang and used during the early 8th century AD. Liquanfang is one of only five known tang sancai kilns, the other four are Huangye or Gongxian Kilns in Henan Province; Xing Kiln in Hebei Province, Huangbu or Huuangbao Kiln and Xian Kiln in Shaanxi. Sources: Cui J, Rehren T, Lei Y, Cheng X, Jiang J, and Wu X. 2010. Western technical traditions of pottery making in Tang Dynasty China: chemical evidence from the Liquanfang Kiln site, Xian city. Journal of Archaeological Science 37(7):1502-1509.Grenet F, Riboud P, and Yang J. 2004. Zoroastrian scenes on a newly discovered Sogdian tomb in Xian, northern China. Studia Iranica 33:273-284.Lei Y, Feng SL, Feng XQ, and Chai ZF. 2007. A provenance study of Tang Sancai from Chinese tombs and relics by INAA. Archaeometry 49(3):483-494.Liang M. 2013. Scenes of Music-Making and Dancing in Wall Paintings of the Tang Tombs in the Xian Area. Music in Art 38(1-2):243-258.Yang X. 2001. Entry 78: Changan Capital Site at Xian, Shaanxi Province. In: Yang X, editor. Chinese Archaeology in the Twentieth Century: New Perspectives on Chinas Past. New Haven: Yale University Press. p 233-236.Yang X. 2001. Entry 79: Imperial mausoleums of the Western Han dynasty at Xian and the Xianyang Plains, Shaanxi Province. In: Yang X, editor. Chinese Archaeology in the Twentieth Century: New Perspectives on Chinas Past. New Haven: Yale University Press. p 237-242.Yang X. 2001. Entry 117: Daxing-ChangAn Capitals and Daming Palace Sites at Xian, Shaanxi province. In: Yang X, editor. Chinese Archaeology in the Twentieth Century: New Perspectives on Chinas Past. New Haven: Yale University Press. p 389-393.Yang X. 2001. Entry 122: Hoard of Gold and SIlver Objects at Hejiacum, Xian, Shaanxi province. In: Yang X, editor. Chinese Archaeology in the Twentieth Century: New Perspectives on Chinas Past. New Haven: Yale University Press. p 3412-413.