Saturday, December 28, 2019
Hamlet a Feminist Approach Essay examples - 1224 Words
Hamlet: A Feminist Approach Sexism: the belief or attitude that one sex is inherently superior to, more competent than, or more valuable than the other (most commonly used for male superiority). This idea that women are weak is not a new one in the modern world. It has been studied for countless years along with the concept of a patriarchal society. A patriarchy is defined as a system of society or government in which men hold the power and women are largely excluded from it. Such systems currently exist in several forms and areas around the world; however, the most common place for these patriarchies is in literature. Novels, plays, works of nonfiction, and other forms of literature have shown to either ââ¬Å"reinforce or undermine theâ⬠¦show more contentâ⬠¦Tender yourself more dearly, orââ¬ânot to crack the wind of the poor phrase, running it thusââ¬âyouââ¬â¢ll tender me a foolâ⬠(31). Here, Polonious clearly shows that he does not care as much as for Ophelia as he does for his reput ation, suggesting that he thinks that women are inferior. In addition, Opheliaââ¬â¢s lack of refusal to being pushed around while submitting to her fatherââ¬â¢s oppression contributes to her being portrayed as a weak, frail woman. The single response to her fatherââ¬â¢s lecture on her relationship with Hamlet is ââ¬Å"I shall obey, my lordâ⬠(31). She truly has no say in important decisions either. For example, she was asked to spy on Hamlet by her father and Claudius, and no option was provided to say no, simply because it was expected of her to follow the orders of the males present. As Polonius and Claudius spy on Hamlet and Ophelia, Hamlet and Opheliaââ¬â¢s dialogue shows the degradation of females. Hamlet says, ââ¬Å"â⬠¦for wise men know well enough what monsters you make of them. To a nunnery, go, and quickly tooâ⬠(31), describing his disgust and lack of trust for women in marriages, thinking they are all uncommitted deceivers. Hamlet, as the plot progresses, eventually accidentally kills Polonius, leaving Ophelia with no close family and influences left. When she comes to the King and Queen insane, Claudius says, ââ¬Å"Oh, this is the poison of deep grief. It springs all from her fatherââ¬â¢s death, andShow MoreRelatedFeminism in both Hamlet and Lady Oracle Essay1179 Words à |à 5 Pagesworks, Hamlet and Lady Oracle, chart both the lifeââ¬â¢s course of their main characters and underline the protagonistââ¬â¢s trajectory in some decisive moments of their existence, when both of them, Hamlet and Joan Foster, need to take some decisions which may change their destinies. In this brief essay I will try to point out similarities and differences between these two stories taking into consideration a feminist approach. First and foremost I would like to mention what do I mean by feminist approachRead MoreEssay about Ophelia: Harshly Criticized1027 Words à |à 5 PagesHamlet, a tragedy written by William Shakespeare in the 16th century, has been subject to evaluation for centuries. Each character has been broken down and analyzed. The psychology of each character has been examined. Every relationship has been studied to find more answer surrounding the play. Harold Bloom and Sigmund Freud have examined it extensively. Scholars have dissected all parts of the play. One character that has recently been analyzed more and more is Ophelia. She has been defended byRead MoreThe Role Of Female Characters In Hamlet1347 Words à |à 6 PagesHamlet is a play about death, revenge, and love. Written by William Shakespeare, this play is famous around the world for its dramatic plot. The central theme of Hamlet is love. The story starts off with a Queen falling in love with the brother of her husband. The Quee n decides to quickly marry the brother of her previous husband, when her previous husband suddenly dies. Her son (Prince Hamlet), who loves his biological father and disagrees with his motherââ¬â¢s quick decision to marry, is quite saddenedRead MoreConflict Between Hamlet And Laerte By William Shakespeare1564 Words à |à 7 PagesThroughout Hamlet, several characters die. For most, this happens through combat, such as the duel between Hamlet and Laerte, which kills them both. In the play, however, two characters die in quick, seemingly careless ways. The first, the fair Ophelia, is killed by her own madness in what seems to be suicide. The other, Gertrude, dies due to the carelessness of her husband, who accidentally poisons her. In both of these cases, their deaths, and the events that led to them, represent a differenceRead MoreLiterary Criticisms of Shakespeareââ¬â¢s Hamlet Essay1234 Words à |à 5 Pages This essay will discuss several literary criticisms of Shakespeareââ¬â¢s Hamlet. After skimming through several articles, I ended up with four peer-reviewed journal articles, each a different critical perspectives of the play: feminist, psychoanalytical/freudian, moral, and new historicism. My previous studies of Hamlet, as well as my rereading of the play this semester, has collectively given me a general knowledge of the text. My familiarity of the play made it easier for me to decipherRead More Feminine Representation in Shakespeares Hamlet Essay2628 Words à |à 11 PagesFeminine Representation in Shakespeares Hamlet à à à à à Abstract: This essay employs Feminist Criticism, New Historicism, and Marxist Criticism, to analyze the portrayal of Queen Gertrude and Ophelia. à Because Shakespeares Hamlet centers on the internal struggle of the Prince of Denmark, the reader focuses primarily on his words and actions.à An often overlooked or under appreciated aspect of the play is the portrayal of the female characters, particularly Queen Gertrude and OpheliaRead MoreHamlet s Life And The Way That He Portrays Women Essay1007 Words à |à 5 PagesShakespeareââ¬â¢s Hamlet, there is no doubt that Gertrude has had quite the major impact on Hamletââ¬â¢s life and the way that he portrays women. Gertrude is the only woman in Hamletââ¬â¢s life, so his view on women is strictly based off of what he knows about his mother. But is Gertrude a horrible mother? Is she a good mother? Is Ophelia a whore, or is this assumption based solely on Hamletââ¬â¢s perspective of his mother? These questions can be answered through both a psychological and feminine approach, alongRead MoreBrothers Grimm and Beautiful Mind1109 Words à |à 5 Pagesbiography of the mathematician John Forbes Nash Jr., Sylvia Nasar quotes one of his colleagues: All mathematici Premium 2568 Words 11 Pages * A Critical Analysis of Feminist Theories Concerning the Representation of Women in Advertising. A Critical Analysis of Feminist Theories Concerning the Representation of Women in Advertising. There are many forms of feminisms which often contradict each other and focus their efforts on issues which reflect their local concernsRead MoreFeminist Theory Applied to Hamlet2809 Words à |à 12 PagesRepresenting Ophelia: Women, Madness, and the Responsibilities of Feminist Criticism Elaine Showalter Though she is neglected in criticism, Ophelia is probably the most frequently illustrated and cited of Shakespeareââ¬â¢s heroines. Her visibility as a subject in literature, popular culture, and painting, from Redon who paints her drowning, to Bob Dylan, who places her on Desolation Row, to Cannon Mills, which has named a flowery sheet pattern after her, is in inverse relation to her invisibility inRead MoreFeminist Criticism Of Hamlet By William Shakespeare1838 Words à |à 8 PagesFeminist Criticism of Hamlet ââ¬Å"Frailty, thy name is womanâ⬠(1.2. 150)! This controversial line, followed by several more from the play Hamlet, by William Shakespeare, displays a common view towards women that portrays them as being weak and reliant on men. Throughout the play, two women, Ophelia and Gertrude, are shown to be dependent on the men in their lives. They both take on a senselessly obedient state of mind. Even though they share this common characteristic, Ophelia and Gertrude are very different
Thursday, December 19, 2019
Business Organization And Business Organizations - 998 Words
Business organization is a group of people who are organized for some charitable or profitable purpose. Business entity is a corporate, commercial or other institution which is formed or administered according to the commercial law so as to engage in business activities which is generally selling of any product or service. In accounting business organization and owners both are separate or distinct from each other. This means that the personal transactions of owner are separately treated from business. In legal system there are various forms of business organizations and they are corporations, cooperatives, sole traders or sole proprietorship, partnership and Limited Liability Company. All vary from each other on the basis of level of control but follows the same principle of separation. Business entities are just like individuals and are subject to taxation and are supposed to file a return but there are some entities which are exempt from federal income tax and they are non-profit charities, Partnership and S corporation. A restaurant is a place where people feel relaxed and prefer in times of happiness. People generally celebrate their birthdays, anniversary, victory with others and for that restaurant is the best option because many people can gather their and the waiter will take and serve the order. They will get well cooked food and donââ¬â¢t have to cook by themselves which is a tough job. So I am planning to start a new restaurant where specific types of food will beShow MoreRelatedBusiness Organizations : Business Organization1514 Words à |à 7 PagesBusiness the AA Name: Jamal Kelly Institution: Redbridge College Business Organization A business is an organization that undertakes the exchange of goods or services for monetary gain. An economic system refers to the manner in which a nation or state is organized in the exchange of goods and services, production and allocation of resources. The economy is made up of three sectors; the private sector, public sector and voluntary sector. The private sector is made up of privateRead MoreBusiness Organizations : Business Organization3050 Words à |à 13 Pages Business Organizations Task 1 7/14/15 ââ¬Æ' Business Organization Essentially, a business organization is a body that is formed for the aim of conducting a commercial enterprise (Bank, 2004, p. 2). Sole Proprietorship Brief Description A sole proprietorship is a form of business structure that is owned and operated by the same owner simultaneously (Schneeman, 2012). Characteristics â⬠¢ In this type of entity, it is difficult to draw a distinction between the owner and the business. â⬠¢ In the legalRead MoreBusiness Organization Structure Of A Business1888 Words à |à 8 PagesBusiness Organization Structure Starting a business is a major step and can in some cases be very risky. Furthermore, there are a number of important factors that should be considered when starting a business. One of the most fundamental factors involved in starting a business is determining what business entity to operate the business under. Choosing a business entity that is not aligned with your particular business model can in many cases lead to several problems that can be potentially very costlyRead MoreBusiness Functions Of An Organization1476 Words à |à 6 PagesThe ability and business functions of an organisation mainly influenced through the threat of new entrants, the organizations have to make effective business actions or processes or products and services so that any new company faces severe barrier to enter in the market (Baines, et al 2011). If the establishment of new organisation in a business environment is easy, any new company can open their shops very easily. Furthermore, when the market ru les and regulations are easy and friendly for theRead MoreDesigning Of A Business Organization1273 Words à |à 6 PagesBusiness organizations continue to impress and make customers more satisfied with their goods and services they offer. The focus is majorly on consumer satisfaction and not the volume of the products. To achieve the consumer satisfaction, most business organizations consider proper and timely dissemination of information that will strike a balanced deal between the organization and the consumers. The consumers get what they need and the organization profit from the sales. The process of informingRead MoreBusiness Is The Organization Of Conducting Business887 Words à |à 4 Pages1.0 Introduction E-Business is the organisation of conducting business by means of the web. According to the Retail Week (Bowden, 2015), online sales have developed by 14% from 2013 to 2014 with it surpassing à £100bn. The expanding popularity of online retail predicts that online sales are predicted to increase by 12% in 2015. This report will explore the future for retailers like Marks and Spencer and the key characteristics required for continued successful operations. 2.0 Findings A bricks andRead MoreBusiness Organizations Summary1574 Words à |à 7 PagesTHE LAW OF BUSINESS ORGANIZATIONS Chapter 16 ââ¬â Law of Sole Proprietorship and Partnership * Sole proprietorship ââ¬â A business where the sole owner is responsible for the management and debts of the business. * Registration/licensing issues; Flexibility * Partnership ââ¬â Partnership Act (Ontario) defines partnership as a relationship that subsists between two or more persons carrying on business in common with a view to profit. * Differences between partnership and co-ownership Read MoreThe Management Of A Business Organization1568 Words à |à 7 Pages TOPIC 2 The management accountant plays a number of key roles in: (a) Assisting an organization achieve its objectives; and, (b) making sure that the organization is ethical in its pursuit of those aims. Discuss this statement within the context of each of the following types of organization. â⬠¢ A business organization that is a manufacturer; and, â⬠¢ A not-for-profit organization, such as a charity.â⬠¨In each case, ensure that you provide illustrations of how the management accountant can contributeRead MoreA Report On A Business Organization1242 Words à |à 5 Pagescollaboration to achieve given commercial goals is known as a business organisation. Companies may have information with a purpose or aim of making profits while others start on non-profit making basis. The way the way the business organisation operates depends on the profit or non-profit making basis. However, the basics and the fundamentals of the companies are in one way or the other, similar since the management functions of the organizations are often similar. This report will focus on a profit-makingRead MoreDelegation in Business Organizations722 Words à |à 3 Pagesdelegated person remains accountable for the outcome of the delegated work. But how important is delegation and what role it plays in the success of business organization ? Delegation empowers a subordinate to make decisions; it is a shift of decision-making authority from one organizational level to a lower one. Delegation is very important in business success; if properly done can save money and time, help in building skills, and motivate people while poor delegation, on the other hand, might cause
Wednesday, December 11, 2019
Marketing and Management Review of Policy Design
Question: Describe the Report for Marketing and Management for the Review of Policy Design. Answer: GOOGLE Google works with great people, the company treats people with respect and offers equal opportunity for everyone (Steiber Alnge, 2013). The company also offers a working environment where people can enjoy the work, and they can respect and help each other. It values diversity among the people and plans. Google always tries to be innovative in the technologies and its products. To solve any problem, Google relates its creativity and the innovative technology. The working culture in Google believes in honesty and integrity. The company always tries to earn the customer loyalty by offering great products and service. The key to the success of Google is to stay in the company norms, clinch innovative ideas from the employees, earn more profits and more. Google has always cared about the communities where they work. It encourages the people to support the local community (Choi Varian, 2012).Google tries to focus on providing the best user experience. It wants to make money in the right way by creating the best product in the market. Google believes in hard work. It also focuses on the areas such as operating systems, hardware products, advertising, platform and others. The next attempt of Google is to reach as many people as possible on the web. They are ambitious with launching new PCs and phone with more advanced technologies. The goal of Google's new products is to make a more advanced web, which gives more personalised experience. Google is definitely doing right while taking Microsoft with its cloud computing features. Through this cloud-computing feature of Google, the Microsoft consumers can access their files and documents from anywhere without being physically present with their device. In 2009, Google launched its first television commercial for Google Chrome, which is an effective alternative to Microsoft's Internet Explorer Web Browser (Carlini et al., 2012). Google Chrome has been much more efficient than Microsoft's Internet Explorer Web Browser in terms of its easy accessibility (Carlini et al., 2012). In 2008, Google first launched its Android phone and went head to head with Apple's iPhone (Jonoski et al., 2013). Many critics have praised the benefits of Android over the platform of iPhone. One of the most important things is that Google is openly sourced and backed by multimillion-dollar investment (Blau, 2015). It can improve the design of Android over years. On the other hand, iPhone can only be available on American Telephone Telegraph in the US, where most of the competitors of ATT support Android. In 2010, Chinese Government threatened Google for intrusion and censorship of hackers (Carlini et al., 2012). Therefore, Google has closed its search engine in China and redirect people towards its uncensored search engine in Hong Kong. This decision was an attempt to skirt censorship requirement without maintaining Chinese Law. MICROSOFT Microsoft started off with the first DOS operating system for IBM computers which gave it the initial success. In the next decade, Microsoft expanded its business with the Microsoft Office and Windows operating system (Vishwanath LaVail, 2013).. The company went public and thus it further helped it to increase their revenue. Windows 3.0 sold more than 10 million copies within a span of two years. In the 1990s, Microsoft continuously upgraded its software for the operating system (Vishwanath LaVail, 2013). It marketed the fact that upgrades were necessary It invested in advertising in various magazines that increased its endorsements. The Windows 95 and Windows 98 were great successes. Later in the 1990s, Microsoft launched their browser called the Internet Explorer. It gained great popularity against the prevailing Netscapes Navigator within a few years (Peng, 2013). Microsoft did this by bundling the Internet Explorer in the Microsoft Office. They collaborated with AOL, which incr eased the customer base to another 5 million. During recession, to get back to its former glory, Microsoft marketed the fact that PCs are cost effective. This worked really well with the economic low. The commercials showing people who were proud PC owners helped to gain back customer loyalty and inspired the employees of Microsoft. After the successful run for years, Microsoft hit the low with its buggy and poor performing Windows Vista. The share prices have gone down by 40 dollars (Haider et al., 2016). Apple in this gap came back with various new Mac computers, iTunes, iPhones and iPads. Apples ad campaign showed a creative, easygoing and smart Mac character in contrast to the virus plagued, uptight and geeky PC character. Microsoft used the similar character for its advertisement which boasts about being a PC. This focused on the cost effectiveness of the PCs during the recession. This gave Apple an apt response who tried to slam Microsoft for its problem-prone Vista. It recreated a loyalty base among Microsoft's customers. The employees too felt encouraged and inspired. The downside of this campaign is that it lacked creativity. It has nothing new to offer. It showed the rivalry between the two giants very clearly (Persico et al., 2015). Microsoft used a similar PC character as shown in Apple's ad campaigns. It was a clever move. It hardly required much creativity, and it helped people to weigh their options more clearly. Customers who would see these commercials would definitely understand the difference between the two companies. Thus, Microsoft did a good thing by incorporating Apple's campaign in its own marketing strategy. Jim Thompson Thai Silk Company: JTTS produces various items like handbags, scarves to accessories for home furniture. The home furnishing line consists of armchairs, coffee and dining tables, sofas and lamps. They work with the Thai London based designer Ou Bahalyadhin. JTTS provides the material needed for the Asian themed home decor created by the artist. The home furnishing line is 3- percent of the total business and its exports sum up to 90 percent of the total (Patichol et al., 2014). They also extended their business with a chain of fine-dining restaurant in Singapore, Malaysia and Bangkok (Haggblade Ritchie, 2014). They have further extended their silk line by providing customised fabrics to international projects. They collaborated with the American designer, Ed Tuttle to work for projects like Park Hyatt Hotels and Aman Resorts. Particularly Park Hyatt Paris has used more than 9000 square meters of JTTS's furnishing fabric. The Sukhothai, the Regent, the Oriental and the Conrad have to furnish from JTTS. With the booming business background and solid client base, JTTS might have gone a little too far with extending their business. JTTS should have stayed within the silk and home furnishing. Starting a business with the food and beverages industry may not be as fulfilling as their other business. JTTS stands out from the other lifestyle brands because they blend contemporary western designs with the heritage and tradition of Thailand. They raised the Thai cottage industry into a famous lifestyle brand. They are different from the smooth Chinese silk. JTTS silk is more knotty and has a lustrous finish that comes in iridescent choices of colours. It is unsuitable for making clothes but is a great choice for home furnishing. They have very close connections with the weaving community of Thailand, which helps them create the best possible products. The weavers are a part of the organisation that makes it easier for JTTS to control the quality of the products (Roll, 2015). JTTS rely on customer-based exhibitions to create awareness for their product line and upcoming products and collection. Their stores have a homely feeling. They believe that their existing clients will be responsible for sharing favourable words about the brand to others (Patichol et al., 2014). Mass media is most avoided. Being a part of the Royalty of Thailand adds to the brands value. Collaboration with the American and English designers has earned them a different status. Most importantly, the rare amalgamation of Thailands rich tradition and contemporary western designs lends the brand to stand out. Fulla Dolls The Fulla dolls are a substitute for the Barbie dolls in the Islamic countries. These dolls share the similar build like the Barbie dolls but they conform to Muslim lifestyles unlike Barbie. Fulla is dark eyed with olive skin. She has Muslim values. She is a role model for the many young Muslim children (Belkhyr, 2013). These dolls are described to honest, caring and loving who respects her parents. She prefers reading and fashion and does not lie. These are the values the Muslim society wants to instil in their children. Thus, the Fulla dolls targeting the Muslim countries have increased its sales significantly where Barbie is banned. Other dolls like like Razanne and Leila fall short of the undivided popularity enjoyed by the Fulla dolls by virtue of their the marketing strategies (Dunn Dunn, 2016). The popular satellite channels are full of commercials portraying Fulla to be an ideal Muslim girl who says her prayers in the morning, reads books or surprises a friend with a cake sh e baked. They are adequately priced and instantly sold out as soon as they hit the shelves. The downside of this selective marketing is that these dolls share not much popularity in other non-Muslim countries. This is a hindrance in increasing their sales in Muslim-minority countries. Fulla dolls enjoy undivided attention in the Islamic countries. To expand its sales all over the world they can incorporate dolls that are more akin to the western ideals. Fulla does not have a boyfriend in the Muslim countries but they can add one for the western version; NewBoy can create another version of the doll that suits the ideals of the countries they are being sold to. NewBoy should attain an understanding of the markets of the countries and produce their dolls accordingly. To compete with already well established Barbie they could price the dolls lower than Barbie which might attract the customers (Dunn Dunn 2016). They should adopt proper marketing strategies to create as much awareness as possible. NewBoys segmentation policy for Fulla is very selective. The Fulla dolls are manufactured keeping in mind only the ideals of a young Muslim girl. The dolls are highly popular in the Islamic countries because the values attached to it (Saleh, 2014). It only targets the young girls and there are prayer rugs and scarves available for the girls to buy them along with the dolls. The dolls have silverware, luggage and stationary for the young girls to buy. The boys of the same age group are ignored. IDEO IDEO has created many groundbreaking designs which have received immense popularity for big labels like Prada, Nike, PepsiCo, Bank of America and much more (Clarkson et al., 2013). Much of its success can be attributed to the very different approach named as the "design thinking". It is based on "human-cantered methodology". IDEO tries to understand the needs of customers and design the product accordingly. IDEO faces difficulty in designing the products from outside to inside to make it more customer-friendly (Brown Wyatt, 2015). Most of the tech companies start designing from inside out. They have a dedicated team called the human factors that employ various methods to understand what a customer wants. They take pictures and study the experience of the customer. They also conduct behavioural mapping which is a collection of pictures of people of restricted to a certain area like waiting room of the hospital. They also use the method of camera journals. They invite customers to tell their stories narrating their experiences with any service or product. Another factor responsible for its success is prototyping. Throughout the process of designing the design is continuously tested and applied. The experience of the testing is further used to improve the final layout. IDEO has successfully created great solutions for several big names. For example, it redesigned the user interface of ATT to be more user-friendly and intuitive. It helped an apparel-making brand to improve their sales. IDEO employed their designers to shadow a number of women. These women were shopping for lingerie and came up with negative reviews. It was so because they found it difficult to locate the lingerie section as well as the appropriate size. Even the fitting rooms were uncomfortable and small (Johanssonà ¢Ã¢â ¬Ã Skldberg et al., 2013). IDEO suggested them to focus on better fitting rooms, better display and to hire personnel to help the customers find the right size. From all this, it is evident that IDEO excels in its job to understand the needs of the customers better than the companies who employ them. IDEO's greatest achievement is that it solves problems concerning usability of the products and services of its clients. It does not need to create any further awareness for itself (Denning, 2013). It one of the top companies who are known for their innovative designing approaches. The countless awards and success stories of the company precede it. Those who know how to achieve in today's market already are aware of what IDEO is and what it is capable of. References Belkhyr, S. (2013). Disney animation: Global diffusion and local appropriation of culture.tudes caribennes, (22). Blau, J. (2015). Apple and Google Hope to Slide Into the Driver's Seat. Research Technology Management, 58(4), 5A. Brown, T., Wyatt, J. (2015). Design thinking for social innovation. Annual Review of Policy Design, 3(1), 1-10. Carlini, N., Felt, A. P., Wagner, D. (2012). An evaluation of the google chrome extension security architecture. InPresented as part of the 21st USENIX Security Symposium (USENIX Security 12)(pp. 97-111). Choi, H., Varian, H. (2012). Predicting the present with Google Trends.Economic Record,88(s1), 2-9. Clarkson, P. J., Coleman, R., Keates, S., Lebbon, C. (2013).Inclusive design: Design for the whole population. Springer Science Business Media. Denning, P. J. (2013). Design thinking.Communications of the ACM,56(12), 29-31. Dunn, R., Dunn, A. G. (2016). Bad Dolls/Reappropriating Badness Performing the Feminine with Reference to Arab Muslim Dolls and Tiqquns Young-Girl. Journal of Middle East Women's Studies, 12(2), 275-283. Haggblade, S., Ritchie, N. (2014).Opportunities for intervention in Thailand's silk subsector. GEMINI. Haider, W., Creech, G., Xie, Y., Hu, J. (2016). Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks.Future Internet,8(3), 29. Johanssonà ¢Ã¢â ¬Ã Skldberg, U., Woodilla, J., etinkaya, M. (2013). Design thinking: past, present and possible futures. Creativity and Innovation Management, 22(2), 121-146. Jonoski, A., Almoradie, A., Khan, K., Popescu, I., Van Andel, S. J. (2013). Google android mobile phone applications for water quality information management.Journal of Hydroinformatics,15(4), 1137-1149. Patichol, P., Wongsurawat, W., M. Johri, L. (2014). Modernizing traditionthe Thai silk industry.Strategic Direction,30(2), 31-33. Patichol, P., Wongsurawat, W., M. Johri, L. (2014). Upgrade strategies in the Thai silk industry: balancing value promotion and cultural heritage.Journal of Fashion Marketing and Management,18(1), 20-35. Peng, M. W. (2013). Global strategy. Cengage learning. Persico, V., Marchetta, P., Botta, A., Pescap, A. (2015, December). On Network Throughput Variability in Microsoft Azure Cloud. In 2015 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE. Roll, M. (2015). Aspiring Asian Brand Cases. In Asian Brand Strategy (Revised and Updated) (pp. 183-221). Palgrave Macmillan UK. Saleh, L. (2014, May). She's Fulla Something: The Fulla Doll, Identity and Consumption in a Globalizing Arab World. In CPSA Annual Conference. Steiber, A., Alnge, S. (2013). A corporate system for continuous innovation: the case of Google Inc. European Journal of Innovation Management, 16(2), 243-264. Vishwanath, A., LaVail, K. H. (2013). The role of attributional judgments when adopted computing technology fails: a comparison of Microsoft Windows PC user perceptions of Windows and Macs. Behaviour Information Technology, 32(11), 1155-1167.
Wednesday, December 4, 2019
P1 free essay sample
P1 There are a number of features of the natural environment that will want protecting from development. Natural Habitats A natural habitat is an area of nature where an organism or an ecological community can live and where it can find food, shelter, protection and mates for reproduction. Natural habitats are very important to take into consideration when planning development as they are not to be interfered with by humans. Natural habitats should be protected, not destroyed. Habitat loss is one of the greatest threats to species diversity and the natural world that we live in. A large proportion of Britains natural amenities have already been destroyed for construction and now environmentalists are attempting to restore as many natural habitats as possible. Wildlife Wildlife is native life that exists within a geographical location. Wildlife maintains an ecological balance between food chains and food webs. Wildlife contributes in the maintenance of carbon and nitrogen cycles that are processed. We will write a custom essay sample on P1 or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Many people see wildlife as a natural beauty, lighting up scenery and making the environment look established. Wildlife provides us with a number of useful products like food and medicine. There is a wide range of wildlife in Britain, for example, birds, seals, whales, fish, snakes, otters, all which are left alone to ensure they develop within their distinguished environment. This means limiting human intervention. If humans disturb wildlife too much, it can cause some species to be extinct. Heritage Heritage can be seen as physical elements that have cultural significants, relating to things of historic or cultural value that are worthy of preserving for the future. Heritage is very high valued and is unique to a certain time or location in history. Heritage is not just land; it is also the structures that stand upon it. This includes the following: battlefields, ancient monuments, castles, bridges and archaeological sites. It is extremely important that we take care of Heritage for the benefit of our future generations to enjoy and remember distinguished moments in history. Green Belts A green belt is an area of green land that surrounds a community and provides an attractive and aesthetic appearance. Green belts are often used as zones between different land uses to help maintain a clean, fresh and natural land that all of the community can experience and enjoy. Green belts are commonly found around larger cities. The main purpose of the green belt policy is to protect the land from urban sprawl. Green belt land is protected. Water Quality Water for human consumption is mainly extracted from reservoirs. This water then has to be treated before it can be classified as drinking water. Water is distributed around the UK using a system of pipework. Water cannot contain any harmful elements such as bacteria, as this could have an immediate effect on peoples health. In many foreign countries water tends to be bottled as mineral water due to the short supply of pure, fresh and clean water. In the UK we use drinking water to flush toilets. Water quality is often determined by the journey that it goes through to get to the aquifer, meaning it avoids getting infected with materials that can be harmful. Forestry A forest is a large area covered primarily by trees and undergrowth. Forests are an important part of Earths climate system. Trees absorb CO2 from the atmosphere and store it in their trunks, roots, leaves, and forest soils. Besides providing habitats for of animals, forests can also help prevent flooding. During times of heavy rainfall, forests can help absorb water and slow flood flows down, which in turn prevents damage to land and buildings. M2 A pre-construction environmental impact report is an initial assessment of the natural environment that must be considered during the planning stages of the construction project. An environmental impact report can also be known as an environment impact assessment (EIA). There are a number of different stages in an EIA, all of which are very important as they exam what impact the construction project will have on the natural environment and how to go about mitigating the impact. Screening (The first stage is screening. Screening basically means looking at construction project and seeing whether it would be necessary to carry out an EIA, giving a brief reason why.) For this construction project to go ahead, we (ABC developments Ltd) would need to carry out an EIA, as the located area is known as a green belt unspoiled landscape. Green belt land is highly protected; therefore our EIA would have to be carried out thoroughly. Scoping (The second stage is scoping. Scoping is a way of deciding which impacts must be assessed. This will vary depending on the project and location.) For this construction project, we would identify all the potential impacts that could occur and have a negative effective on a number of different environmental features. Below is a list of all the environmental features that we would need to assess. Wildlife Habitats Soil quality Ground water quality Air quality Landscape Heritage Baseline Study (The third stage is the baseline study. Baseline study is a way of collect data on the current state of the area. This takes into account physical, biological, socio-economic and cultural factors.) For this construction project, we would look for a variety of evidence to state that certain elements are present in the located area. Taking samples of the ground is a great way of highlighting whats underneath the surface, especially if we are unsure. We can never rely on previous data assumptions. We always collect our own data against the stated elements in the scope. We would intentionally use subject matter experts, like local authorities to provide us with the knowledge. Biological features are always good to look for as they can indicate to us that there is wildlife present. Other than actual sightings, animal droppings and mole hills can be used as evidence to state that wildlife is present. Impact Prediction (The fourth stage is the impact prediction. Impact prediction is a way of highlighting what the consequences are if the project goes ahead.) There are many possible consequences that could occur if we dont plan the development carefully. The possible consequences include the following: Habitats could be ruined and destroyed, leaving some animals vulnerable. Soil quality could be ruined and PH levels could drop dramatically, causing nutrient degradation. Plant species could be destroyed, meaning they wont be able to contribute in helping to regulate atmospheric gases through a process called photosynthesis. Water pollution could occur if reactive materials and substances spill into waterways, potentially killing aquatic species. Air pollution could occur if harmful substances are released into Earths atmosphere. Air pollution can cause diseases, allergies or death of humans. It may also cause harm to other living organisms such as animals and plants, damaging the natural environment itself, which would be devastating for a green belt. Mitigation (The fifth stage is mitigation. Mitigation is a way of reducing consequences and preventing a negative impact. It is also important to state alternatives and if needs be, redesign the project.) For this construction process we would use a variety of different mitigation measures to effectively change the impact of the development. Below is a list of all the mitigation measures that we would adopt, but before doing anything, we would make sure all environmental features have been identified. We would make sure required protection measures are present on site (e.g. signs and fencing). This is done for awareness, so that the environmental features within the site are recognised. We would phase out and direct site clearing activities, especially when transporting materials and fuels. This will ensure that wildlife and the landscape are not destroyed by any heavy moving vehicles. We would introduce large physical containers on site to store any potentially polluting substances that can cause serious harm to the environment if spilt. A good example would be a bunded fuel tank. Although these tanks are deemed safe, we would still keep them well away from existing environmental features such as habitats and waterways. Also we would provide regular serviced spill kits on site as a secondary safety element. We would put into place physical barriers to prevent ruining water from washing harmful substances into waterways. We would create temporary and permanent conservation habitats for already existing animals that are seen to be native, all depending on the location of the development. We would give guidance to workers on how to deal with wildlife encounters, including any species at risk that may be present, as well as arranging methods for dealing with injured or orphaned wildlife. We would often use the pre-stressing method as mitigation measure for wildlife. Pre-stressing is used to encourage wildlife to move away from a site prior to the development works. The most common methods of pre-stressing include walking around site, making a loud noise, or placing pieces of clothing that carry a strong human scent into animal dens. The greatest disruption to wildlife generally occurs when the site is getting cleared, removing most of the existing habitat. The timing of site clearing should be carefully examined, due to the fact that wildlife will be more sensitive at certain times during the year. The table below shows the sensitive times for wildlife in various different habitats and states what the recommendations are for reducing the impacts of construction. http://documents.ottawa. ca/sites/documents.ottawa.ca/files/documents/construction_en.pdf If possible, development work should be completed effectively outside of the known sensitive timing windows, which in turn reduces the risk of impact to moderate. In some cases development may occur during the sensitive times of the year. This would mean that we would have to introduce additional mitigation measures to reduce the impact to wildlife. Additional mitigation measures include the following: Introduce more intensive pre-stressing to encourage local wildlife to leave the site area. Installation of suitable nesting boxes around the outside edge of the site, to intentionally replace current nesting sites that will be removed in the development works Qualified and trained agents on site to provide monitoring during development works Pre-arrangements made with wildlife rehabilitators and qualified veterinarians to ensure appropriate care of orphaned or injured wildlife. By doing all this it means that the wildlifes safety and wellbeing is a priority. Monitoring and Assessing (The sixth stage is monitoring and assessing.) We would monitor and assess the environmental features on a regular basis as things are always evolving. Letter D1 It is extremely important to address the environmental issues surrounding a construction project. This is in turn will benefit the community and the individual construction firms. By addressing the environmental issues, it will help boost the construction firms reputation with the local community and authority. Individual construction firms should use locally sourced materials that can be used without negatively affecting the environment. By using locally sourced materials it also means that there is less need to travel and transport materials. It is essential that these locally sourced materials are renewable and non-toxic, so that they are deemed safe for the environment and for the local community. Ideally these materials should be recyclable. Metals for example, can be extremely damaging to the environment, especially over several years. A lot of metals are not biodegradable; therefore, they would have to be effectively removed as they are not capable of being decomposed by bacteria or other living organisms. Wood on the other hand is both biodegradable and recyclable, as well as being natures most versatile building material due to its applications becoming more and more advanced. Communicating clearly with sub- contractors is essential when using locally sourced sustainable materials. It is important that sub-contractors use these materials appropriately, ensuring that they are not wasted. Sub-contractors should be given lists of suppliers that they can use, especially if local authorities have a say on what type of materials should be used.
Wednesday, November 27, 2019
Feasibility Study on the introduction of the Fortune Cooker through Mi
Feasibility Study on the introduction of the Fortune Cooker through Microfinance Institutions (MFIs) in Ethiopia. Feasibility Study on the introduction of the Fortune Cooker through Microfinance Institutions (MFIs) in Ethiopia. Thesis Proposal Student - Aarti Baldewsing Student number- 0799222 Minor- Finance and Accounting First supervisor - Mr. Dare Second supervisor- Mr. Nielsen Hand-in date - 13 April 2011 Company- The Fortune Cooker Company supervisor- Mr. Maarten Romijn Table of Content 1. Introduction3 2. Company Profile4 2.1 Product Stage4 2.2 Product Characteristics4 2.3 Product Market5 3. Research6 3.1 Research Goal6 3.2 Research Objectives6 3.3 Research Scope6 3.4 Research Questions7 4. Theoretical Framework and Methodology7 4.1 Theoretical Framework7 4.2 Methodology8 5. Ishikawa Diagram9 6. Gantt Chart9 7. Professional IBMS Competency Evaluation10 1. Introduction The title of this thesis proposal is; Feasibility Study on the introduction of the Fortune Cooker through Microfinance Institutions (MFIs) in Ethiopia. This title indicates that a feasibility study will be performed to see whether MFIs are willing to help finance the Fortune Cooker so that people at the BoP, so low-income households and unemployed females in Ethiopia, can make use of this product. Before laying down the background of this thesis proposal we must become fully aware of the meaning of the terms used in title of the thesis proposal in order to understand fully its content. A Feasibility Study is a study undertaken to analyse various issues and elements of the project in order to reach optimum decisions about the viability and direction of the business venture. Core elements of a feasibility study includes; market analysis, technical analysis and a financial analysis. Furthermore a feasibility study is undertaken to indentify the opportunities and threats in the internal and external environment of the new business venture and researches the potential resources needed to set up the business and ultimately looks at the prospects of success. The Fortune Cooker is a new, clean, convenient, user friendly, family power plant. It is built in a way that it uses solar energy to cook food, provide purification of water, dry wood and generate and store heat and electricity (See section 2 for detailed information). Microfinance Institutions (from here on referred to as MFIs) are institutions that deal with microfinance. According to KIVA , Microfinance can be defined as the provision of financial services such as credit, savings, insurance and more to the poor or the low-income clients who traditionally are considered non bankable and therefore do not have access to typical banking services due to the absence of formal employment and/or formal mortgages. Microcredit is the provision of a small loan to the poor and is one of the microfinance activities that an MFI performs. In this thesis the focus will be on Ethiopia as a market but this study will serve as a guide to introduce the Fortune Cooker elsewhere in the world. In specific people at the Base of the Pyramid are the target customers. As we look at the different world population groups in terms of economic activity the Base of the Pyramid (from here on referred to as BoP) or sometimes referred to as the Bottom of the Pyramid, refers to the largest but poorest socio-economic group in the world. According to Professor C.K. Prahalad four to five billion people live from 2 dollars or less a day. 2. Company Profile The Fortune Cooker is a new, clean, convenient, user friendly, family power plant. It is built in a way that it uses solar energy to cook food, provide purification of water, dry wood and generate and store heat and electricity. The Fortune Cooker company was created by Mr. Maarten Romijn who is the inventor of the product the Fortune Cooker. The Fortune Cooker was first tested in November 2003 in the Almeria area of Southern Spain. In early 2006 the product was tested in New Delhi/Gurgaon area of India. Since then changes in material usage have been incorporated in order to make the product function more effectively. For instance the aluminium mirrors have been replaced by solar glass mirrors to improve cooking performance and longevity. Underneath, an illustration is shown of the Fortune Cooker. 2.1 Product Stage The Fortune Cooker concept is ready and the product has been tested and produced and updated several times. It is on the verge of moving through the development stage into the production phase and after that it will
Sunday, November 24, 2019
Strategic Management Case Study on Swiss-based Nestle Essays
Strategic Management Case Study on Swiss-based Nestle Essays Strategic Management Case Study on Swiss-based Nestle Paper Strategic Management Case Study on Swiss-based Nestle Paper Strategic Management Case Study on Swiss- based Nestle BY crnp7104 Executive Summary This paper provides a case analysis and case solution to a Harvard Business School strategic management case study on Swiss-based Nestle, the worlds largest food and beverage company with 2007 sales exceeding CHFIOO billion or about US $112 billion(Bell Shelman, 2009, p. 1). While extensive background information dating to Nestles 1867 founding is provided, the primary time setting for the case is April 2008, shortly after 29-year Nestle veteran Paul Bulcke advances to the position f CEO, replacing Brabeck, who retired after a highly successful 12 year reign as CEO. The case focuses on Bulckes efforts to formulate plans for advancing his strategic vision at Nestle. Nestle is a huge, highly successful, cash-rich global corporation with hundreds of billionaire brands, a strong culture, and a history of producing innovative products and customizing products and services to meet local tastes. Looking around at Nestle, scanning the environment, and appraising the future, new CEO Bulcke sees little room for alarm. Looking towards the future, Bulckes only worry is that we become omplacent (Bell Shelman, 2009, p. 1). Bulckes predecessor, Brabeck, had set Nestle on the path of achieving worldwide sustainable competitiveness through four strategic pillars: 1) low-cost, highly efficient operations; 2) renovation and innovation of the Nestle product line; 3) universal availability; and 4) improved communication with consumers through better branding (Bell Shelman, 2009, p. ). Brabeck believed and indeed was proven that adherence to these four strategic pillars would allow achievement of the Nestle Model, a term which referred to Nestles long term objectives of organic rowth between 4% and 6% each year; continued year-after-hear improvements in earnings before interest and tax EBIT margin; and improved capital management (Bell Shelman, 2009, p. 3). Brabeck launched a number of important initiatives during his twelve year tenure, including restructuring of the RD department to be more responsive to consumers, drive renovation and innovation and support organic growth; launching a 60/40 preference rating system for products; and developing GLOBE (Global Business Excellence), a comprehensive information system designed to tie all of Nestles usinesses together under a common technology infrastructure. Brabeck, who saw sales grow 78% and EBIT grow 142% during his tenure, also made several critical acquisitions in bottled water, pet food, coffee, and ice cream; championed Nestles culture as the critical glue of the corporation; and pioneering the way for the beginning of Nestles shift from being a technology and processing-driven food and beverage company toward a broader vision of nutrition, health, and wellness (Bell Shelman, 2009, p. 4). Bulcke succeeded Brabeck as Nestles CEO in April of 2008, following two years of careful succession planning. Bulcke appears to share Brabecks basic philosophy of leadership (which emphasizes empowerment) as well as his views on the importance of culture in Nestles long term performance. Bulcke has also reaffirmed Brabecks commitment to GLOBE (which Bulcke sees as an important vehicle for continuous improvement (Bell Shelman, 2009, p. 10). Despite these basic commonalities, Bulcke has made it clear that his vision for Nestle is not identical to that of his predecessors. Bulcke wants all of Nestles future growth to come as a result of internal growth, not acquisition. Bulcke strongly supports a rapid transition to the ealth, nutrition and wellness strategy and indeed, envisions this strategy as one leg of four complementary platforms which Bulcke believes could double the companys sales over the next ten years. Besides health, nutrition and wellness, the three other platforms are emerging markets; out of home consumption and premiumization of existing products (developing exclusive, high-quality versions of existing products and appealing to higher income customers (Bell Shelman, 2009, p. 0). Problem Statement Nestle must formulate and implement the optimal strategy which will allow it to eet the growth and performance goals related to the Nestle Model while at the same time achieving a sustainable competitive advantage within the global food giants broader vision of transitioning to a health, nutrition and wellness company, and responding to threats and opportunities in the external environment. Problem Analysis An analysis of the problem and an appraisal of Nestle is provided below with the assistance of three analytical tools: a pest analysis, a Porters Five Forces analysis, and a S. W. O. T. (strengths-weaknesses-opportunities-threats) analysis. P. E. S. T. Political. Globalization is unquestionably one of the most important political factors in the food and beverage industry. Nestle is clearly a global business, and in recent years as globalization has become a reality, it has learned that globalization means a lot more than Just access to emerging markets. As Jose Lopez, Nestles Vice President of operations observed, the impact of globalization has been different than we thought it would be. For those of us in the West, globalization meant developing countries opening their markets for us to sell to. Yet thats not how it turned out instead of being globalized we are learning to react to global arkets (Bell Shelman, 2009, p. 10). Nestles status as a global corporation makes it a target for anti-globalists (Conlin, 2008). Regulatory issues are an important issue in the global food and beverage industry. Nestle, for example, operates in many highly regulated sectors, with multiple tiers of regulation affecting its products in many cases (related to food and beverage safety, production regulations, environmental regulations, cross-border trade, etc. ) (Nestles environmental impact, 2008). Economic. Demand for basic food supplies persists even in times of economic downturn. However, the patterns of eating and drinking changes, with full meals more likely to be prepared and consumed at home. With operations around the globe, Nestle had to make adjustments for variations in demand fluctuations and price sensitivities in different countries and geographic regions. Although Nestle was based in Switzerland and most of its key leaders were from the United States and the European continent, one third of 2007 sales came from the developing world and analysts projected that by 2010, 90% of the worlds population would live in developing and emerging countries. Social. As a food and beverage company operating with the global food industry, Nestle was well aware of the fact that patterns of food and beverage consumption tend to be culturally-bound or at least culturally linked. Technological. Throughout the industry, technologies are vital to defining recipes, producing food and beverages, locating and purifying water (Nestle is one of the worlds biggest bottled water companies). As the companys own GLOBE initiative demonstrates, internal technologies are vital to coordinating operations. Five Forces Threat of New Entrants (Low-Medium). Even though food and beverage is in many ays analogous to a commodity business, barriers to entry as a result of supply-side economies of scale, demand side benefits of scale, capital requirements, incumbency advantages and unequal access to distribution channels keep the threat of new entrants relatively low (Porter, 2008). Power of Suppliers (Medium) Porter (2008) notes that powerful suppliers capture more of the value for themselves by charging higher prices, limiting quality or services, or shifting costs to industry participants (p. 6). For most major firms in the food and beverage industry, the power of suppliers is medium to medium high. For Nestle, the power of suppliers is quite low as a result of extensive vertical integration by Nestle. Power of buyers (low). For Nestle and most other buyers in the industry, the power of suppliers has been kept quite low because of the fact that buyers are numerous and cannot credibly threaten to integrate forward and assume their business. Threat of Substitute Products (High). It would be difficult to name or think ofa food or beverage product which did not have a near or identical substitute. Rivalry of existing competitors (Medium High to High). Porter (2008) notes that the ntensity of rivalry is greatest when competitors are numerous or roughly equal in size and power, industry growth is slow; exit barriers are high and firms cannot read each others signals very well (p. 9). Many of these conditions have been met, thus the intensity of rivalry would be assessed as fairly intense. S. W. O. T. Analysis Strengths 1 . Financial strengths a decade-plus of strong financial results; available cash for launching new operations and/or making acquisitions. 2. Strong corporate culture. 3. History of strong, capable leadership. 4. Effective R Department 5. Strong portfolio of products . Stable of blockbuster brands 7. Huge physical infrastructure with locations around the world 8. Well-developed supply chain 9. Integrated management 10. Good relations with suppliers and farmers 1 1 . Ability to customize and localize products Weaknesses 1. History of product recalls 2. History of questionable reputation and shady deal-making (Datamonitor, 2008). 3. Allegations of unethical conduct. 4. Product concentration in many areas which might be viewed as unhealthy. 5. Few to no organic profiles in its portfolio. Opportunities 1 . Growth in emerging and developing markets 2. Changing tastes worldwide . Opportunity to make positive contributions to peoples health and nutrition 4. Opportunity to develop new products 5. Opportunity to further expand into new markets (geographic and product) 6. Opportunity to acquire complementary firms and/or firms to mitigate weaknesses Threats 1 . Threat of competition from major global food rivals 2. Threat of competition from smaller, local companies who are more in touch with the needs of the local market. 3. Threat of competition from large discounters such as Wal-Mart, Sams Club and Costco. 4. Threat of backlash based on political opposition 5. Threat of regulation . Threat of changing consumer tastes 7. Threat of environmental degradation Alternatives Any potential alternative strategies must aim at achieving the Nestle Model and its associated long-term objectives (of 5-6% annual organic growth, continued year-to- year improvement in EBIT margin, and improved capital management) as well as be consistent with CEO Bulckes stated mandates of stressing internal growth as the primary source of future growth, using GLOBE as a vehicle for continuous improvement, and making the health, nutrition and wellness strategy the mainstream of Nestles business. With these caveats in mind, the following alternative strategic variations have been identified. 1. Adhere rigidly to Bulckes basic outline with the 4 Complementary Platforms for growth. This alternative would follow CEO Buckles rationale that Nestles top strength is its product and brand portfolio, that growth should be generated internally, and that strategy should focus on Bulckes four identified platforms for growth: 1) health, nutrition and wellness (to be the centerpiece), 2) emerging markets; 4) out of home consumption; and 4) premiumization of existing products. An obvious advantage of this alternative is that t will have the full support of Nestles CEO who will no doubt work hard to ensure support for the program from Nestles board, its management, and its rank-and-file employees. Another advantage of this alternative is that it provides a moderate degree of consistency with the previous strategy under CEO Brabeck (particularly in terms of its embrace of the Nestle Model and its desire to continue moving Nestle beyond food to nutrition, health and wellness. A third advantage is that it clearly builds on some of Nestles major strengths, including its broad product and brand portfolio and its strong international presence. At the same time, there are a number of disadvantages with this strategy. First of all, by restricting growth to internal growth, this alternative forgoes possible benefits accrued through Judicious acquisition. Nestle has some weaknesses in areas where it intends to growth (e. g. health and nutrition) and acquisitions might be able to counteract those weaknesses more quickly than internal growth. Secondly, Bulckes insistence on giving the health, nutrition, and wellness strategy priority above all else and working to quickly make it the mainstream of Nestles business may not reflect a realistic goal. Nestle will face many challenges as it tries to make health, nutrition and wellness a mainstream characteristic of key divisions like confectionary, powdered and liquid beverages, ice cream, and many of the prepared foods. Another potential disadvantage to Bulckes planned strategy is that the selected four complementary growth platforms are not yet proven to be complementary and at face value, seem to be on some levels contradictory (e. g. , it may be difficult to reconcile efforts to premiumize existing productions with efforts to build a portfolio of popularly positioned products in emerging markets. In addition, it may be difficult to maintain growth and EBIT goals across these new, as yet untested platforms. Another consideration is that over the next few years, it may become apparent that one or more of these 4 platforms has more growth and profit potential than the others; if so, it would be disadvantages to continue a more or less equal emphasis on all three. 2. Build greater flexibility into the model, allowing for a slower transition to the company-wide health, nutrition and wellness model, and allowing for the possibility of modification and/or elimination of one or more of the other three rowth platforms (as well as the possible addition of a different growth platform). Also maintain a flexible approach with regard to acquisitions versus internal growth. This alternative would have the advantage of increasing the potential of meeting growth and profitability goals. Another advantage in a flexible approach is that it would allow for the possibility of discovering another potential growth platform. Yet another advantage would be the possibility of speeding growth and/or progress towards the goal of transitioning to the health and nutrition model via Judicious acquisitions as opposed to a sole reliance on internal growth. A major disadvantage of this strategy is that CEO Buckle may be disinclined to give it his full support because it is not fully consistent with his plan. Another disadvantage is that this flexible approach may delay Nestles progress towards the health and nutrition model. Another potential disadvantage is that in encouraging flexibility, Nestle may inadvertently foster inconsistencies in its business strategies and objectives and create confusion, conflicts and/or contradictions between product areas/business units. Yet another disadvantage is that it provides Nestle with an opportunity to back way from its health and nutrition strategy if it should prove difficult to execute. 3. Add a program of acquisition and divestiture to Bulckes basic model. Rather than relying solely on internal growth, this alternative would allow for the use of Judicious (yet frequent and widespread if deemed necessary) acquisitions, particularly in areas targeted for growth where Nestle is weak (e. . organic foods). Coupled with the acquisition strategy would be a targeted divestiture strategy, aimed at gradually exiting those businesses and dropping those products which are fundamentally at dds with Nestles commitment to health, nutrition and wellness. For example, this may require Nestle to exit most of its confectionary business. Likewise, the company would want to review whether or not food products loaded with salt, sugar, and artificial preservatives and flavorings really belong in the portfolio of a company which has pledged to transform itself into a unified health, wellness and nutrition company. The acquisition portion of this modification to the strategy has the advantages of allowing for the addition of new resources, including new resources nd businesses which may complement existing businesses and lead to synergies. The divestiture strategy has the advantage of allowing Nestle to exit those business which simply do not meet its overall guidelines and strategic objectives and to do so in a way which is likely to contribute favorably to both its financial objectives and its objective of building an integrated health, wellness and nutrition company. As with alternative #2, this alternative carries the risk of failing to attract support from core employees as well as the risk that the CEO will oppose it. Recommendations Implementation It is strongly recommended that Nestle combine the above suggested alternatives #2 and #3, building flexibility into the strategy overall, slowing the planned transition time for moving to a unified health, wellness and nutrition company, and allowing the firm to focus on its core resources and business opportunities by using the tools of acquisition (adding strength in selected areas and/or counteracting weaknesses in some areas) and divestiture (shedding unprofitable businesses and products, getting rid of businesses which do not fit into the profile of a unified health, wellness and utrition company. Such a combination, flexible approach will be best suited to tailoring to the specific resources and capabilities of Nestle and the opportunities and threats in the external environment. Moreover, it is more likely that Nestle will meet its performance and financial goals through this flexible approach than through Bulckes more rigid approach. To begin implementation of this option, it is recommended that Nestle top leadership and management planners use the resource-based view of the firm (Barney, 1991) and in particular, Grants (1991) practical framework of a resource- ased approach to strategy analysis as a guide to strategy formulation and implementation. This will involve the following five-step process (Grant, 1991, p. 115): 1 . Identifying and classifying Nestles resources within the three primary categories of physical capital, human capital, and organizational capital. Both tangible and intangible resources should be identified. After resources are identified and classified, Nestle management should appraise the firms strengths and weaknesses, relative to key competitors Unilever, Kraft, Group Danone and General Mills. The next omponent of this step is to identify opportunities for better utilization of resources. 2. Identify Nestles capabilities what can Nestle do more effectively than its key rivals? Once capabilities have been identified, it is necessary to identify the resource inputs to each capability, as well as the complexity (e. g. , does it involve several resources? ) 3. The strategy team should then appraise the rent-generating potential of resources and capacities in terms of: a) their potential for sustainable competitive advantage [in order to have this potential, a resource/capacity must be valuable, rare, mperfectly imitable, and non-substitutable] (Barney, 1991, p. 106); and b) the appropriability of their returns. 4. Based on the preceding work, the Nestle strategy team should then select a strategy or collection of strategies which best exploits the firms resources and capabilities relative to external opportunities. . Finally, Nestle strategy managers should identify resource gaps which need to be filled, as well as invest in replenishing, augmenting and upgrading the firms resource base. It recommended that Nestle managers complete this initial strategic analysis within six months. Once this initial assessment/strategy formulation is completed, the strategy team should: 1 . Survey and assess the identified resources and capabilities in ter ms of their level of fit with Nestles goal of transitioning from a food company to a health, nutrition and wellness company. . Target non-producing or inappropriate (those which dont fit with the rest of the portfolio or the strategic objects) for divestiture and develop a timetable and plan for such divestiture. 3. Examine the identified resource gap areas and determine if these gaps can be filled through internal development (e. g. R, internal growth) and/or strategic acquisition. If acquisition, begin scanning the environment for likely acquisition targets. References Barney, J. (1991). Firm Resources and Sustained Competitive Advantage. Journal of Management, 17(1), 99-120 Bell, D. E. Shelman, M. (2009). Nestl?Ã © in 2008. Harvard Business School Case Study, 9-509-001 (Rev. October 28, 2009). Boston: Harvard Business School Publishing. Colin, M. (2008, April 14). A town torn apart by Nestle. Business Week, Retrieved September 30, 2012 from businessweek. com/stories/2008-04-1 5/a-town- torn-apart-by-nestl Datamonitor (2011,June). Company Profile: Nestle. Swat Analysis, pp. 27-32. Grant, R. M. (1991). The Resource-Based Theory of Competitive Advantage: Implications for Strategy Formulation. California Management Review, 33(3), 114-135. Nestl?Ã © professionals name change, restructuring reflect customer focus (2008, April 7). Nations Restaurant News, p. 40. Nestles environmental impact (2008, April). Diary Industries International, p. 10. Porter, M. E. (2008, January). The five competitive forces that shape strategy. Harvard Business Review, pp. 1-18. articlesbase. com/management-articles/strategic-management-at- nestle-5907881 . html
Thursday, November 21, 2019
Should the drinking age be lowered to 18 Essay Example | Topics and Well Written Essays - 1250 words
Should the drinking age be lowered to 18 - Essay Example state public policies being properly enforced or having their intended effect: neighboring states may have differing policies, alcohol companies may lobby against strict enforcement, and the ubiquity of alcohol in contemporary society makes the acquisition of the substance almost too easy for underage drinkers. For much time, the solution to the rising occurrences of tragedies regarding alcohol-related deaths in younger adults has been to raise the MLDA to decrease both supply and demand to those most susceptible to alcoholââ¬â¢s deadly effects. However, as will be contended here, this is the wrong approach to take in trying to solve this grave problem. The solution lies not in changing actions, but in changing thoughts. Conceptually, all actions are the physical result of some mental process; actions are merely the effects where mental processes are the causes. By changing the mental processes that correspond to the physical actions, we can stop the problem at its roots. Moreover, unlike enforcing an artificially high standard of maturity in the form of an MLDA, changing perceptions and attitudes is something that can be controlled with time. In what follows, it shall be seen that the MLDA is not too high or too low, but is irrelevant to the present considerations. What must be changed is how youth treat alcohol, see its effects, and use it in a social setting. Concerning the prevalence of underage drinking in the United States, it is reported that almost 11% of all alcohol consumed is done so by youth, and a vast majority of these drinks are consumed in a ââ¬Å"bingeâ⬠fashion (Drinking in America: Myths, Realities, and Prevention Policy, 2005). Annually, this results in almost 150,000 emergency room visits by youths related to injuries and health problems related to alcohol use (Drug Abuse Warning Network, 2005: National Estimates of Drug-Related Emergency Department Visits). A 2007 survey found such figures as 45% of youth drank ââ¬Å"some amount of alcoholâ⬠,
Wednesday, November 20, 2019
Technology Essay Example | Topics and Well Written Essays - 1000 words - 6
Technology - Essay Example Technology has assisted them long and hard to further their belief in this phenomenon. The proponents of technology have supported it because they find no reason in disapproving the advantages that come along with it in different fields of life. Technology has allowed people to relax more today than ever before.This is the reason why the advocates of technology are always in favor of it. Technology has resolved nearly all the issues plaguing the human society and has been the savior on more than a single occasion to be remarked as the messiah of the modern day society. People have felt more inclined to cope up with the different technological facets today than ever before as their trust and confidence has increased manifolds. This trust and confidence has increased because they have seen the advantages and benefits that technology has offered them over the years. They have found out that technology assists them whenever they seem to be in a problem. Plus it is proactively driven to bring rewards for them which is also something that positively motivates them about technology. The ones who receive these benefits in turn tell others about how good the technological manifestations have been. This is the reason why technology is taken on by people in a sudden manner and then there seems to be no looking back on this tangent at all. If seen correctly, this is one of the major pluses behind the concept of technology adoption (Swart, 2012). Technology has overtaken the human emblem by a fair count. It has made people realize where they can find a substit ute for their own selves. At times, technology has even taken the sheen off the human intellect. This is an alarming aspect because human beings are superior than any other entity in this world yet technology has come out strong to make them redundant on certain occasions (Jensen, 2005). The role of human beings cannot be denied under any case whatsoever. It must be
Sunday, November 17, 2019
Effictive team and performance management Essay
Effictive team and performance management - Essay Example Challenges such as unsuccessful problem solving, non-functioning team diversities and most common, motivation among the team members are inevitable in a team (Keyes, 2004; p. 1282). In this group, group problems were tackled and embraced accordingly by all responsible team members. A leader or a manager must moderate problem solving. In this respect, the team decided anonymously that I should be their leader. In the entire exercise, the team passed through all phases of team formation inclusive of forming, norming and storming phases (Tuckman, 1965; p. 385). Being a leader is never an easy experience. It becomes even more difficult when one is dealing with a dynamic group. Therefore, I had to use my interpersonal skills such creativity, flexibility, passion and self-competence as put forward by Goleman (2002; p. 251). Concerning passion, I had a feeling that emotional intelligence was instrumental in uniting the team members towards our mission. Concurrently, there are areas where I felt I lacked the necessary knowledge to offer guidance to the team. Hence, I learnt admitting the lack of knowledge or expertise was very significant. Some of the skills I thought I did not possess at all came handy to my surprise. For example, timely arrival and staying patient to the end of a discussion was fundamental during the field exercise. I have known by friends as a poor listener but my team experience gave me a limelight to be the best and active listener. Though there were members who felt they were entitled to dominate the discussion, I was quite equipped in this area. First, I studied their personality and eventually learnt ways of managing them. In fact according to Richard & Lynn (2007; p. 187), studying every group member within the shortest time possible is very essential. Following my experience in this group, I learnt that working towards building trust among team members was significant in managing the group. Taking responsibility for actions is vital in buildi ng trust among the members. To err is human and mistakes committed must be admitted to ensure an amicable solution is achieved. I learnt memberââ¬â¢s involvement in different tasks was significant in achieving a formidable solution to the tasks. Likewise, allowing the group to make rules during the lifetime of the group is also very important (Monge & Contractor, 2003; p. 57). In this manner, the group will not feel dictated upon when certain decisions concerning them are to be made. At the time of making the rules, expectations of every team member must be noted with transparency it requires. In addition, it came to my grasp that my expectations of the team members were to be made clear to help build a cohesive team. Most importantly, I felt it was important for my connection with the group. Satisfying the groupââ¬â¢s self-interest was a major force in creating strong interpersonal relationships (Laura, 2008; p. 387). I had an obligation to empathize with certain emotional is sues experienced by some of the group members. Ignoring some of the issues, which one may term as ââ¬Ëpettyââ¬â¢, was no constructive at all. Behaving in this manner was liable to the downfall of the team and the whole mission. Driving the mission to success must be the ultimate goal. However, a mission cannot be driven to success when other members are completely lost from the group. I was aware that every member had a right to express his or her plight during
Friday, November 15, 2019
Mobile Ad Hoc Networks MANET
Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The Mobile Ad Hoc Networks MANET Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The
Subscribe to:
Posts (Atom)