Header Ads

The Tuareg Tent


   The tent represents an important symbol for the nomadic Tuareg cultural heritage. It is a central element within family and social relations in the Tuareg society. The Tuareg tent reflects a lot of values; it is there that one lives, eats, drinks tea and sleep. Alongside tea (the drink) and dromedary (the animal), the tent symbolizes the refuge and is one of the three pillars of Tuareg life. Its form remains faithful to ancestral traditions, while other elements have often been modernized.

   The traditional tent was originally woven by the women. It is made with dromedary hair, sheep's hair or woven goat hair. This mode of weaving still persists but is very rare because of its high manufacturing cost. Current families therefore tend to buy canvas tents, known as "Kaitoun", which are much more economical. It is designed in a triangular shape to avoid rainwater infiltration and resist storms .Tent is composed of two pillars linked together with a rope; the tent is fixed to the ground with stakes called "Akhoualaf". It traditionally provides separate spatial units between men and women, that is to say, the tent consists of part for women, the other for men and a space most often reserved for prayer and receives guests. It is designed to be easily mounted or disassembled. It is mounted with height because it symbolizes generosity, so that the passenger can see it from afar, and thus be assured and reassured to find shelter and protection.

   Tuaregs learned to build and orient their tents from their ancestral. According to the Tuaregs’ beliefs, the north of the tent is considered harmful because evil beings called kel-esuf "those of solitude" crowded in large numbers, especially at dusk, while the south is charged with blessing. For them, in other words, in the south there are fertile areas from which their millet comes, while in the north there is only desert and hunger. This belief is also well displayed in the conjugal bed; the man is placed in the north to protect his wife against the kel-esuf. That is why, on wedding day, the groom must enter the nuptial tent by the north, and the bride by the south. Again, the same applies to when God created the world, he placed Adam to the north and Eve to the south. Moreover, the Tuareg woman is always compared to the tent among the Tuareg region .She is called the guardian of the tent. This society make a feminine domain to protect them from this supernatural danger because of their affinity with the tent, women are more naturally protected. The tents belong to women. When a mother marries her daughter, she donates her own tent or takes care of her until to make a tent. The young bride comes to install in the camp of her husband .In the Tuareg society, the man finds a tent when he takes a wife, but, if he becomes an old man, or in case of divorce or widowhood ,this brings him back to the precarious position of adolescents who go without a tent. Thus, the wearing of the veil means that a lot of men are deprived  of tents .The men are thus somehow outside the tent, this tent, of which we have seen that the camps are mobile and incessantly composed and decomposed according to the marriages and divorces.

The Tuareg Tent (Written by ARAB Sabrina)

9 comments:

  1. These are the great blogs; I assure you that I really enjoyed a lot in reading. www.ultralighttent.info/

    ReplyDelete
  2. when we had raised our tent they had completed their lunch and gone for a walk, on the off chance that you need something fast and simple for an end of the week away and you don't go camping regularlyyou can choose best instant tents at Ardent Footsteps.

    ReplyDelete
  3. These appraisals demonstrate the season in which it is best to utilize your tent.Camping tent

    ReplyDelete
  4. A tent with less stakes are better weight-wise however one with more stakes can withstand significantly more terrible climate. So dependably consider the climate.Used Pop up campers

    ReplyDelete
  5. When set up correctly, tent canopies are so sturdy and expandable - in fact, most hotels have permanently installed them in their gardens to augment their function rooms.click reference

    ReplyDelete
  6. If you set out to make me think today; mission accomplished! I really like your writing style and how you express your ideas. Thank you. thetenthub.com

    ReplyDelete
  7. As far as my own personal list I would also include an ice chest type cooler, thermos, camping coffee pot, emergency fire making kit, ponchos, flares, compass, walking stick, 22 pistol, hunting bow, prescription medications, frisbee, towels, blankets, sewing kit, and other camping supplies that are suited to my own personal camping supply needs.best deals on teardrop trailers near me

    ReplyDelete
  8. 📁 HIRE A PROFESSIONAL HACKER today has been one of the world's most technical valued navigating information.
    On (Recovery Of Lost Funds, Catching A Cheating Spouse [Phone Hack], Credit Score Upgrade, WEBSITE HACK.)
    High prolific information and Priviledges comes rare as it's been understood that what people do not see, they will never know. One of the affirmative ability to convey a profitable information Systematically is the majoy factor to success
    When you wonder “which hacking company should I hire, the first aspect that should concern you is Sincerity. The very sincerity of a company's strength earns them a solid reverence in their field of concentration. Secondly, Rapid response. Clearly, you want to embark for services that povides swift response, Thanks to our talented and astonishing Hackers, you will be glad to find out that our services Implies precisions and actions.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are fixed within a short period of time.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers.
    If your shoe fits in any of the services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    💰Recovery of lost funds:✅(BITCOIN INVESTMENTS, BINARY OPTIONS, LOAN AND TRADING FOREX WITH FORGERY BROKERS.) 🖥️I would try my possible best to shortly explain this in particular.
    This shocking study points to one harsh reality we all face today. It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database. Every information required by the Global KOS would be used to tracking every transaction, time and location of the scammer. This is acheived using the systematic courier tracking base method•
    However, there are secret cyber infiltrators called brokers and doom. The particular system used by this scammers permeates them to manupulate targets digital trading system or monetary fund based accounts. Strictly using a dark web rob to diverting successful trades into a negative outcome. This process bends to thier advantage while investors results to losing massive amount of money. An act of gaining access to an organization or databased system to cause damages. We have worked so hard to ensure our services gives you a 100% trading success to recover all your losses•
    📲 HACKING A MOBILE PHONE:.✅ Do you think you are being cheated on? Curious to know what your lover is up to online? This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    The company is large enough to provide comprehensive range of services such as•
    • Email hacks📲
    • Hacking of websites.📲
    • Uber free payment hacks.📲
    • website hack.📲
    Our strength is based on the ability to help fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    Contact:
    ✉️Email: leroysteckler(@)gmail • com
    Or theglobalkos(@)gmail.com
    ®Global KOS™
    ©2020.

    ReplyDelete

Powered by Blogger.