Tuesday, December 31, 2019

Urban Agriculture in and Around Monrovia, Liberia

Urban Agriculture in and around Monrovia, Liberia Timothy Kortu Since the end of the war that raged from 1989 to 2003, Liberia has suffered from chronic food insecure and basic socio-economic infrastructure. Urban urban poverty, improve food security and enhance urban waste management in Monrovia and other Liberian cities. Recently the government acknowledging food security in the country. rity, due to the destruction of its agricultural sector agriculture provides a strategy to help reduce edged the importance of urban agriculture in Agriculture has always been the key to food security in both urban and rural areas of Liberia. Before the conflict, approximately 80 percent of the people of Liberia derived their†¦show more content†¦Rice and cassava are the main staple food crops in Liberia, and more than 60 percent of the rice consumed in Liberia is imported (WFP, 2008). But in and around Monrovia families are increasing their own food production as a way to provide their families with fresh and nutritious food, while a minority sells their produce on the market. Agriculture in Monrovia and other cities Many people, including IDPs, repatriates and rural families migrated to Monrovia In backyards and small plots on open spaces, families grow vegetables (sweet potato, cabbage, amaranth, okra, pepper, eggplant, cassava, or corn), and some fruit (mango, papaya) or medicinal plants. Some households have access to two plots: one near the house for the rainy season and one on the edge of nearby swamps for the dry season. These home-gardens and small plots are mostly cultivated by women. Urban agriculture is not new in Liberia. It was practiced for decades in Monrovia and other Liberian cities before the civil war broke out in 1989, but grew in importance during and after the conflict. Although many Monrovian citizens are now growing their own food and the government is positiveShow MoreRelatedThe Epidemic Of The Ebola Essay1497 Words   |  6 Pagesthe Ebola infection all through the West African nations of Guinea, Sierra Leone, Liberia and Nigeria. Notwithstanding the colossal and miserable loss of human life, the Ebola broad sickness is having sho cking and ruinous consequences for these West African economies in a mixed bag of greatly imperative parts/territories by ending exchange, harming cultivating and startling speculators. Capacity to move around confinements, exchange and transport: To end the spread of the infection, the nationsRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesRevisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral

Sunday, December 22, 2019

I Was An International Traveler Or An Intercultural Trainer

If I was an international traveler or an intercultural trainer within my organization and I had to train a group of people going to India about the culture. I will first start off by saying I know you guys are not use to the enculturation of India. According to lecture enculturation means the process which your native culture is acquired. To explain it to my groups members very thoroughly I would say â€Å"I know you guys are not of custom or practice the India culture but you guys have to acculturation to the culture of India†. The word acculturation from lecture class means the process by which you learn and adapt to other cultures. That’s what exactly the group of people I’m training going to have to do. At first it’s going to be a major culture shock for the group of people I’m training because they know nothing about how to handle culture in India but, I’m pretty sure my group is going to acculturation to the culture of India. Within working with the culture shock graph I will make sure my group follows the five key points while moving through the culture shock graph. The five key points are quantity, quality, relation, and manner. It’s very important my group understands these five key concepts of maxim communication because India follows these key points very differently than we do in the states. For example, in India, people love to stare at each other. This is considered non-verbal communication according to speech class. Non-verbal means using gestures andShow MoreRelatedMcsweeney vs. Hofstede954 Words   |  4 PagesHofstede was born in 1928 in Netherlands. He obtained his Masters degree in Mechanical Engineering and a doctorate in Social Psychology. He is a professor Emeritus of Organizational Anthropology and International Management of the University of Maastricht in the Netherlands. Geert Hofstede is well known for providing a theoretical framework that attempts to analyze the relationsh ips between organizational actions and cultural beliefs. In 1965, he worked at IBM as a trainer in the international ExecutiveRead MoreBeyond Sophisticated Stereotyping10228 Words   |  41 Pagescontent downloaded from 155.33.240.146 on Mon, 5 Aug 2013 09:54:15 AM All use subject to JSTOR Terms and Conditions ? Academy of Management Executive, 2000, Vol. 14, No. 1 Beyond sophisticated stereotyping: Cultural sensemakingn i context Joyce S. Osland and Allan Bird Executive Overview Much of our cross-cultural training and research occurs within the framework of bipolar cultural dimensions. While this sophisticated stereotyping is helpful to a certain degree, it doesRead MoreAirborne Express 714476 Words   |  58 PagesOver 1. Today, international business people must think globally about production and sales opportunities. Many global managers will eventually find themselves living and working in cultures altogether different from their own. Many entrepreneurs will find themselves booking flights to places they had never heard of. What do you think companies can do now to prepare their managers for these new markets? What can entrepreneurs and small businesses with limited resources do? Answer—I think what theRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesBusiness Review Finance Articles The Power of Management Capital Feigenbaum−Feigenbaum International Management, Sixth Edition Hodgetts−Luthans−Doh Contemporary Management, Fourth Edition Jones−George Driving Shareholder Value Morin−Jarrell Leadership, Fifth Edition Hughes−Ginnett−Curphy The Art of M A: Merger/Acquisitions/Buyout Guide, Third Edition Reed−Lajoux and others . . . This book was printed on recycled paper. Management http://www.mhhe.com/primis/online/ Copyright  ©2005Read MoreProject Mgmt296381 Words   |  1186 Pagesreport 4.5.1.4 Organization processes (.5) [4.5.3 4.6.3.2] 4.6.1 Administrative tasks (.3) [3.7.1, 12.4] 10.3.3.1 Lessons learned [8.3.3.4] 9.4.2.2 Individual performance appraisals Chapter 7 Managing Risk Chapter 15 Chapter 16 International Projects Oversight 11.1 Risk management process [F.8] 11.2 Identifying risks 11.3.2.2 Impact matrix 11.4 Risk assessment 11.5 Risk responses (.2–.1.2) 11.6 Risk register 7.1.2.5 PERT analysis 7.1.2.6.3 Contingency reserves 7.3.3.4 Change controlRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagestrademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Robbins, Stephen P. Organizational behavior / Stephen P. Robbins, Timothy A. Judge. — 15th ed. p. cm. Includes indexes. ISBN-13: 978-0-13-283487-2 ISBN-10: 0-13-283487-1 1. Organizational behavior. I. Judge, Tim. II. Title. HD58.7.R62 2012 658.3—dc23 2011038674 10 9 8 7 6

Saturday, December 14, 2019

Digital Fortress Chapter 25 Free Essays

Inside the Clinica de Salud Publica, visiting hours were over. The gymnasium lights had been turned out. Pierre Cloucharde was fast asleep. We will write a custom essay sample on Digital Fortress Chapter 25 or any similar topic only for you Order Now He did not see the figure hunched over him. The needle of a stolen syringe glinted in the dark. Then it disappeared into the IV tube just above Cloucharde’s wrist. The hypodermic contained 30 cc of cleaning fluid stolen from a janitor’s cart. With great force, a strong thumb rammed the plunger down and forced the bluish liquid into the old man’s veins. Cloucharde was awake only for a few seconds. He might have screamed in pain had a strong hand not been clamped across his mouth. He lay trapped on his cot, pinned beneath a seemingly immovable weight. He could feel the pocket of fire searing its way up his arm. There was an excruciating pain traveling through his armpit, his chest, and then, like a million shattering pieces of glass, it hit his brain. Cloucharde saw a brilliant flash of light†¦ and then nothing. The visitor released his grip and peered through the darkness at the name on the medical chart. Then he slipped silently out. On the street, the man in wire-rim glasses reached to a tiny device attached to his belt. The rectangular pack was about the size of a credit card. It was a prototype of the new Monocle computer. Developed by the U.S. Navy to help technicians record battery voltages in cramped quarters on submarines, the miniature computer packed a cellular modem and the newest advances in micro technology. Its visual monitor was a transparent liquid crystal display, mounted in the left lens of a pair of eyeglasses. The Monocle reflected a whole new age in personal computing; the user could now look through his data and still interact with the world around him. The Monocle’s real coup, though, was not its miniature display but rather its data entry system. A user entered information via tiny contacts fixed to his fingertips; touching the contacts together in sequence mimicked a shorthand similar to court stenography. The computer would then translate the shorthand into English. The killer pressed a tiny switch, and his glasses flickered to life. His hands inconspicuously at his sides, he began touching different fingertips together in rapid succession. A message appeared before his eyes. SUBJECT: P. CLOUCHARDE-TERMINATED He smiled. Transmitting notification of kills was part of his assignment. But including victim’s names†¦ that, to the man in the wire-rim glasses, was elegance. His fingers flashed again, and his cellular modem activated. MESSAGE SENT How to cite Digital Fortress Chapter 25, Essay examples

Friday, December 6, 2019

Activity of Financial management Samples †MyAssignmenthelp.com

Question: How Financial Management Fits Larger Managerial Framework? Answer: Overview Financial management is the most important activity for any organisation. The firms financial resources are concerned with planning, procuring and controlling. Integrated knowledge about business growth and plan Business growth comes in many structures and should be precisely arranged and custom-made to the concerned business. Business growth can mean numerous things including sales development, showcase extension and business value growth. This course had provided me learning of use of appropriate channels to advertise (the ways you get items to your clients) regarding key concentration of sales and business growth. Business Plan is essential guide to success and with this coursework I will be able to develop roadmap. Learning provided in this course assisted me in developing strategy for success to guide for the selected market. Effectiveness and understanding of managerial finance Business growth and survival is fully depended on effective financial-management. Business objectives can be achieved by monitoring financial resources which involves planning, organizing and controlling. Effective use of resources can be done if there is a good financial management, fulfilment of commitments, can gain competitive advantage and can prepare for long-term financial stability.Managerial finance will assist me in developing better business plans to ensure its clarity and feasibility. Further it will assist me in monitoring financial position. In addition to this; I will be able to keep accounting records up to date supported by tax and legal compliances. Ethical practice for financial management Ethics are principles in light of creating the best choice. An individual or business works with the help of these principles. I hold fast to and advocate the following standards and obligations governing my expert and moral conduct. To the best of my knowledge and capacity I will operate with trustworthiness and integrity. Further; strategic distance will be maintained to prevent genuine conflicts of concern among individual and practiced connections. The data I provide or consider will be viable, finished, and reliable and justified as per the concerned objective. Standards and directions are agreed by me of elected, state, universal, district and national governments, and other suitable private laws and codes. Effect positive social change within the organization Although, the fact that changes might be an inevitable piece of working together, it isn't generally embraced with open arms by representatives, chiefs or entrepreneurs. Changes in business can enable it to remain updated with industry patterns, which make the clients, attract towards and help in maintaining current clients. The ability of making changes in an organisation helps workers to get new opportunities. The effectiveness in work comes with changes, which can make for employees and more fulfilled clients. Worker mentalities and resolve are affected by positive philosophical changes in an organisation. Action Plan My goal is to attain the knowledge about the share markets and financial market. I have chosen this goal as in future I want to work infinance related job. So for that I should have complete knowledge about the financial market but I have not applied the same in a practice scenario. The goal is important for me as I lack the knowledge in this field and further my career depends on this. This knowledge will help me in understanding the share market as I would like to do job as a stock trader or broker in future. The work of stock trader is to advice and help people to deal in share market in different shares so I have to aware with the recent trends related to my business. For that I should have full knowledge about this field and in future I will apply it in my career field. This will help me to develop me professionally as well as personally. Another reason to choose this goal is that, nowadays a lot of scandals and malfunctioning are taking place in share market. If I will have proper knowledge about the market and leading misconducts, it will help me to stop future scandals to some extent. This will bring a positive change in the society. For this various resources are available from which I can gain knowledge, like from newspaper, attending seminars or by investing in shares itself. The two objectives for achieving goal are:- To gain practical knowledge by practically working in the market Develop my knowledge regarding shares and help in enhancing my career Both of these objectives are the grounds on which I will be able to attain my goal. Goal Objectives Target Proficiency Development Opportunities Timelines To gain complete knowledge about share and financial markets. To gain practical knowledge by practically working in the market Develop my knowledge regarding shares and help in enhancing my career Practical knowledge to implication of finance. To attend seminars related to financial market awareness and share market. To gain knowledge from newspapers and media or by investing in shares. Approximately 3-4 months Social Change Impact Liquidity could be attractive to financial specialists since it will be less demanding for a speculator to get his or her cash from the investment however, I leaned such lesson from the course and it will help me to take wise decisions for financial management. Including this, I learned how to calculate financial ratios for a company that I can apply to any business or a real entity to know about its financial feasibility (Fridson and Alvarez, 2011). Adding to this, I have learnt howfinance is an important part of any organization, particularly one looking for speculators. For example: in the monetary world, movement demonstrates how an organization is dealing with its benefits. I can specifically say that I know I can make best use of financial analysis, in respect to particular business and can contribute to a change. I can further analysis achievements, funds and patterns and can identify and misconducts held in financial part of business. During the course, I was aware that funds can be produced from abroad via two conspicuous sources of capital like as Foreign Direct Investment (FDI) and Foreign Institutional Investors (FII). This information will help me in future when I will start my own business, as I will consider various sources, where from I can get money. Proper investigation of usage of obtained funds is the activity of a money related trough I can manage finance more accurately. While working in a firm can take care of things as the financial knowledge gained from this course has helped me to know how I can manage my personal as well as corporate finance (Zeichnerand Liston, 2013). My knowledge of fund management will be helpful in assessing funds and contributing in the fund management of companies where I will probably work, in this manner I could bring social change. I can advise the firm or a person that regardless of whether their funds are ideally designated. To finish this task, I must rely upon financial knowledge that I have gained from the course, tactful and clever (Moon, 2013). I furthermore should understand the requests and necessity of the individual or the firm and should come up with some deliberately excused plan with the goal that the last one can appreciate ideally and all this I have learned through course that is helpful in bringing social change. References Fridson, M.S., Alvarez, F., (2011).Financial statement analysis: a practitioners guide. John Wiley amp; Sons. Moon, J.A., (2013).Reflection in learning and professional development: Theory and practice.Routledge. Zeichner, K.M., Liston, D.P., (2013).Reflective teaching: An introduction. Routledge.

Friday, November 29, 2019

Book Fair free essay sample

The theme of this year’s book fair was â€Å"E-books† keeping in mind the increasing number of IT- savvy younger generation with a penchant for internet, mobile-phones and other reader-friendly digital gizmos. It attracted over 230 participants from India and Abroad. The overseas participants were from China, Pakistan, UK and USA. The fair provided a unique platform for business-to-business transactions, establishing new contacts, entering into co-publishing arrangements, reprinting of old and rare books. The visitor profile at the fair included national and international publishers, librarian, researchers, academicians, writers, students and book lovers. Entry ticket for adults was Rs. 20/- per ticket while the same for children/students(with I. D. ) was Rs. 10/- per ticket. For the convenience of visitors, free shuttle service was also available between the entry gates and fair venue. Besides, the facility of wheelchair with attendant was also provided for convenience of physically challenged. Hon’ble Lt. Governor of Delhi Shri Tejendra Khanna inaugurated the fair on 1st sept,12 at the auditorium, Hall No. We will write a custom essay sample on Book Fair or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 8,Pragati Maidan,New Delhi. Chairperson and Managing director, ITPO, Smt. Rita Menon, president FIP, Sri Sudhir Malhotra, executive director , ITPO, Sri Neeraj Kumar Gupta, Director Delhi Book Fair, FIP, Sri Shakti Mallik, ITPO, Sri B. L. Meena Diplomats, senior ITPO Officials, besides representatives of participating companies from India and Abroad were present on the occasion. Complimenting ITPO and FIP for institutionalizing a book event of international stature, Sri Tejendra in his inaugural address, pointed out the significant role played by books in achieving global integration by building litrary bridged across the socio-cultural, linguistic and religious diversities. It was observed that basically book fulfill three functions , acquisition of knowledge, entertainment and inspiration. Sri Khanna appealed to the publishers to bring out books tha are constructive, secular and progressive in outlook as books have a significant role in shaping the next generation. Welcoming overseas exhibitors from China, Pakistan, UK and USA, he expessed the hope that the fair would give a fillip to enhance international collaborations in publishing and business transactions. He also voiced optimism that the upcoming redevelopment project of a world class integrated exhibition-cum-convention complex in Pragati Maidan would open new avenues of trade promotion. Delhi Book Fair 2012 was supplemented by a no. of seminars,workshops, poetry, and litrary evenings and book launches. The subject of concurrent seminars and workshops included : â€Å"Topper secrets of success† by AIETS, â€Å"Digital Book Market in India† by qbend LLC, â€Å"Telling Tales to Children† by NBT, â€Å"Literature and Values† by Authors Guild of India, â€Å"Public Libraries† by the Indian Library Association, â€Å"Discover the Genius in Your child† by AIETS. The workshops will be on â€Å"E-publishing† by digital media initiatives and â€Å"Mind Power Tool Intellectual Property in information age†. Besides, an exclusive program on â€Å"Strategies for Success In Your Application to American Universities, American Embassy, ‘A complete ERP solution for printing and publishing Industry’ by UNEECOPS and ‘Kitab Tere Roop Anek’ by Bachpan society and FIP was also held during the Fair. A unique feature of this Delhi Book Fair was the Screening of films based on novels of selected Indian Authors at the Shakuntalam convention centre, Pragati Maidan. As its tribute to some famous authors whose works have inspired the making of celluloid masterpieces over the last 100 years. ITPO organized a special screening of nine feature films in hindi and some regional languages during the Delhi Book Fair. The films were Duniya Ne Mane(Hindi), Meghe Dhaka Tara(Bengali), Guide(Hindi), Samskara(Kannada), Umbartha(Marathi), Vidheyan(Malyalam),Slumdog Millionaire(English), Parineeta(Hindi), 3 Idiots(hindi). Entry to the film was free and on first come first basis. The Archie’s store attracted many small kids and students as it offered variety of gift items at heavy discount it included stuff toys, show pieces, Mugs, Key Chains and many other items. Large areas were covered with mats for visitors to get some rest after walking from stall to stall. A cafeteria was also there. As compared to the previous editions, the Delhi Book Fair 2012 attracted additional footfalls on account of the popular event, the 14th edition of stationary fair . The display profile of the fair was organized in Hall no. 12A and covered a wide range of stationary items, including writing instruments, materials, pens, pencils sketch pens, erasers, geometry boxed, drawing and painting material, crayons, paints, brushes, computer related stationary items. Other items which featured at stationary fair included office supplies, files, file covers/boards, labels, photocopy paper, staplers, highlighters, diaries, calendars, adhesives, writing pads, material for seminars, conferences, stationary packing machines and materials etc. After attracting legions of visitors, Delhi Book Fair 2012 concluded successfully on September 9, 2012. Sri Neeraj Kumar Gupta, Executive director, ITPO presented the awards for excellence in display to the winners at the fair. Present on the occasion were Sri B.

Monday, November 25, 2019

Reagan Doctrine essays

Reagan Doctrine essays There were many things that lead up to the creation of the Reagan Doctrine, which was supposed to help stop a major conflict in the world. Many years before this doctrine was created, there were a major conflict that began with the Communist. Most of the Communistic activities at this time was in the Soviet Union (Russia). In a Communistic nation, the government rules every part of the peoples live, which takes away their freedom and liberty. People who live in it are like slaves who work for the government. Later on, Communism tried to spread to bring all the nations in the world under the rule of a Communistic government. They tried to slowly control each nation one by one, starting with the weak ones, until the Communistic government conquered the whole world. Many tried to resist these foes, and the nations who did were called the Free World, which was mainly led by the United States. Great Britain was another Free World nation. They were also trying to stop Communism. Other countries that were between these two great forces were called the Third World. This side consisted of many different nations around Asia, South America, and Africa. Most of the nations in the Third World were poor. Some of the people in the Third World angrily opposed Communism while others happily accepted it. Even some citizens in one nation might be against each other. To gain allies on their sides, each of the great forces tried to gain them by giving out financial aid or assistance to the Third World nations. This conflict which began about 1945 was know to be called the Cold War. This ongoing conflict between the free word and Communist lasted for a long time. Unlike other wars, which was fought mostly with heavy military weapons and fast actions, this war was mostly fought with words, diplomacy, ideology, and argument. Of course, there were some battles with weapons but not as muc...

Thursday, November 21, 2019

How can Tesco fulfill its need to adapt to changes in its workforce Essay

How can Tesco fulfill its need to adapt to changes in its workforce - Essay Example The company earned revenue of ?64.826 billion as on 2013 from its 6351 stores across the world. In terms of profit it is the second largest player and in terms of revenue it is the third largest after Walmart and Carrefour, who are the main competitors of the brand. For carrying out its operations, Tesco employs people both in store oriented and non store oriented jobs. For the stores it requires staff for a variety of activities like customer care staff, inventory managers, supervisors, stock takers etc (Humby, Hunt and Phillips, 2006, p.39). For successful distribution of products the company needs people who are well equipped with logistic management skills. The corporate office has people performing mainly the senior management roles like Finance Management, Marketing Management, Human Resource Management, Accounts Department, Production Control, Information Technology Department and Legal Departments. Tesco aspires to make sure that all functions work in harmony to steer its bus iness goals. In order to do that, the company has to ensure that it employs the right people in the accurate work at the correct time. To accomplish this, the company has structured a method for staffing and selecting employees for managerial as well as operational roles (Argyris and Schon, 1978, p.987). Workforce planning Tesco like every successful organisation is involved in the process of planning which entails an analysis of the prospective needs of the company in terms of staff. They need to analyse how many more staff that they need, what skills they should possess and where should they be recruited from and put into operation (Hackman and Craig, 2008, p.543). It permits the company to map how these wants is to be met by indulging in recruitment and training. Tesco essentially needs to plan ahead of its inception of the work. A dynamic organisation hires new employees on a daily basis for all the variety of activities that the people in the organisation perform. Vacancies are created in the organisation when the company opens up new stores or expands in the present location. Positions are also opened due to employee attrition in the company. They might switch jobs or retire from the company after the end of their tenure of service. When an employee of one department gets promoted to a higher rank the previous position also needs to be filled. New openings are also created when the company changes processes or adapts to a new technology. This entire exercise is done for both management and non management position. The objective behind this is to understand the demand for workforce in a particular year for various departments. The reports at the end of every quarter gives an estimate of how many people would be required for the operations and accordingly Tesco manipulates the needs of staffing as per necessity of departments (Ravasi, and Schultz, 2006,p.654). By this the company can buy some time for planning and flexibility for meeting the demands of the employees. It helps the company in achieving the organisational goals and short terms objectives as well (Cummings, and Worley, p.67). They consider it as Talent Planning which in turn helps in motivating the people to do their work with efficiency and precision. They also encourage the staff to progress in their careers. The job descriptions for the various positions have to be free from any ambiguity and each person needs to understand his work and know his scope of action. The appraisal

Wednesday, November 20, 2019

Global Perspectives Mid-term Memo Assignment Example | Topics and Well Written Essays - 750 words

Global Perspectives Mid-term Memo - Assignment Example 1) The rising Human Development Index (UNDP Report, 2010) a) A recent UNDP report published in 2010 has identified a rise in the index of human development for Belarus. i) Human Development Index (HDI) is an internationally accepted measure of national development. It assesses health, income, education and some other trends for a country. ii) The recent rise is not sudden and the country is steady moving up in the ladder.HDI has risen from 0.619 to 0.624 in 2010. iii) The country is categorized as a country with High Human Development in this report which means a developed country. b) We can assume following from the HDI rise; i) Higher buying power at consumer level. ii) Higher level service expectations from the consumers. iii) Belarus social indicators are satisfactory and if these trends continue to flourish there are bright chance of business in this country. iv) Encouraging business environment. 2) Belarus’s Economic Environment a) A Highly industrialized state with many features of planned economy. i) A country with a Gross National Income (GNI) per capita of US$ 1,590. ii) A decline in Belarus GDP was observed in 2009 as it dropped to US$ 48.984007391 billion from US$ 60.7634483146 billion of 2008 and was ranked 70th in the world. iii) A net inflow of foreign direct investment was declared to be US$ 1.8844 billion. (World Bank, 2011) b) A strict control government over the prices and private enterprises makes the business environment difficult for foreign investors. i) Rigorous government inspections to ensure policy compliance. ii) A higher frequency of policy and business regulation changes. iii) An overall restrictive business environment. iv) A strict control government over the prices and private enterprises makes the business environment difficult for foreign investors. (Economy Watch, 2011) c) Our recommendation from business point of view are as follows; i) Government should move towards market driven economy ii) State control over privat e enterprises should be reviewed and removed iii) Competitive business environment should be provided to business community iv) Tax free and investment friendly policies should be introduced to support direct foreign investment. 3) Belarus’s Political Environment a) Belarus had declared its independence in 1994. It is presidential republic, governed by the President Alexander Lukashenko, the National Assembly and a Council of the Republic. The President is ruling the country for last sixteen years and has got legitimacy through controversial referendum process. Most of the Western powers have termed the rule of Lukashenko as a dictatorship. i) Human rights violations are witnessed commonly. ii) Several opposition parties exist but are strictly suppressed in the country. iii) However, government controlled Belarusian telegraph agency declared the political situation in the country as ‘calm’ in a recent survey. (Belta, 2010). b) We suggest following political steps in Belarus; i) Restoration of true democracy ii) More political freedom to the masses, particularly suppressed opposition parties iii) Respect of human right at all level of the society iv) Frees press and media policies Under these circumstances business operations in Belarus does not suits

Monday, November 18, 2019

Agriculture's importance economic progress Essay

Agriculture's importance economic progress - Essay Example Agriculture which is predominantly the base of systems of economy in most of the under developed countries is the primary occupation of rural people in those countries. It is primary because it supplies basic necessities of human life, provides basic inputs for industries and, in addition to these, purveys goods for exports and other purposes. â€Å". . . the rise in agricultural production . . . makes important contributions to general economic development and that, within considerable limits at least, it is one of the preconditions which must be established before a take off into self sustained economic growth becomes possible† (Nicholls, 1970). Earlier development economists like Arthur Lewis (1954), Hirschman (1958) and Fei and Ranis (1961) have identified and analyzed how agriculture contributes to the overall economic growth of a country (Higgins, 1982). They highlighted that the ‘unlimited labor supply’ in the agricultural sector of an underdeveloped countr y can be transformed to industrial sector and the ability of agriculture to transfer its abundant resources to other sectors actually lead the economic growth of any country. Contribution of agriculture in an economy is judged by the value of the total quantity of output in the Net National Product (NNP). A ratio between the output of agricultural sector and the output of non-agricultural sector or the proportion of the former in the NNP furnishes reasonable evidence not only of the nature of economy but also its stage of development. Simon Kuznets (1961) observes that â€Å"an increase in the net output of the agriculture is, in and of itself, sum of the increases in the net products of the several sectors† (61). So long as the rate of growth of the non-agricultural sector is higher than that of the agricultural sector, the proportional contribution of agriculture in the total product will decline. His model for assessing the product contributions to the NNP quite explicit a nd it is delineated as follows: dP=A.a+O.o Where, A= Product of Agriculture; O = Product of all other sectors; P= Total Proudct =(A+O); a=rate of growth of A ; o=Rate of Growth of O; d= change. The increment in the total product is the aggregate of products of sectarian outputs as multiplied by their respective rates of growth. Role of Agriculture in Economic Development- Traditional approach The traditional and earlier approaches proposed by development economists like Lewis, Fie and Ranis highlighted the important roles of agriculture sector in the economic development of any country (Vogel, 1994). A fast track development of this sector is crucial for other sectors as well. Only a strong and efficient agricultural sector can feed the growing population of a country, provide employment, play vital role in the foreign trade and earning of foreign exchange and give a strong base to the industries. Because of these multifaceted functions of agriculture, it has got a multiplier effect on any country’s socio-economic and industrial scenario. Thus according to the traditional analysis the role of the agricultural sector is confined to the source of food, source of livelihood, role in foreign trade, capital/savings transfers and its role in industrial development (Stringer, 2001). Source of Lively hood Most of the developing countries depend on agriculture and allied activities for their livelihood. Agriculture provides immense employment opportunities to the masses and this assumes much significance when the growing working force does not come out of the yoke. The figure may be varied from 10 percent to 60 percent in the contemporary scenario generally prevailing in the developing and underdeveloped countries across the globe (Stringer, 2001). Importance in the context of food security The character and content of a country’s economic structure alongside the potential for its further growth and development are largely dependent not only upon the quan tity but also upon the type of its output generated and distributed in the economy (FAO, 2001). For example, an

Saturday, November 16, 2019

Types of Cells in the Human Body

Types of Cells in the Human Body In this essay I will be looking at the human body and how it is organised, from the simple cell to how the body systems co-operate with each other and that everything functions properly. Firstly I will be looking at some simple cells that will group together to make up a tissue. The first cells I will be looking at will be the erythrocytes, the ova cells in women, the spermatozoon cell in men and the epithelial ciliated cells in the throat. The erythrocytes are made in the red bone marrow of short bones in the body such as the hip bone, breast bone, ribs etc . Red bone marrow can produce new erythrocytes at the rate of about 1 and half million per second to replace those destroyed . When first formed the erythrocyte has a nucleus, which when the cell matures the nucleus is squeezed out to make way for more haemoglobin to be stored inside the erythrocyte. The erythrocyte is very unique in size and structure; it has the look of a biconcave disk shape. These have inner components that allow the transport of oxygen and help the elimination of carbon dioxide. There are approximately 5 million erythrocytes per mmÂÂ ³ of blood. The redness of the red blood cell comes from the pigment it contains; it contains Haemoglobin which combines with oxygen easily to become oxyhaemoglobin there are 180 million haemoglobin molecules in one erythrocyte. Erythrocytes are about 7.8 micrometres in diameter. Erythrocytes can live up to 12 0 days inside the body, before they are broken down in the liver and the spleen by a macrophage. The function of the red blood cell is to primarily transport oxygen from the lungs around the body which can be used for many things, such as making amino acids, lipids and carbohydrates, Their second function is to get rid of carbon dioxide from the tissues to the lungs to be excreted out by the lungs. Oxygen carried by the red blood cells can bind with iron atoms in the blood meaning that haemoglobin can carry 4 oxygen atoms at its maximum capacity. The ability of oxygen to bind with haemoglobin depends on a few factors such as the acidity of the blood and also the temperature. Erythrocytes make up 45% of blood inside the body; the other 55% is plasma. THE OVA CELLS The ova cells are produced in the ovaries of women. This is the by-product of the ovaries which is the tissue that makes the ova. The ovum is a smaller version of an ovary which is small enough to pass down the fallopian tube. This cell is visible and does not need a microscope to see it. It measures in diameter 120um. Its almost a perfect circular cell which has tough follicle cells surrounding the egg to protect it. These cells are normally called ova and they ovulate once every 28 days. The function of ova cells is so that it gives the spermatozoon a chance to fertilise the egg and it has to contain nutrients and metabolites to help sustain itself in early development to hopefully create a human life, as you may well know it is a cycle where once a month a egg develops in the ovaries and is passed down the fallopian tube where it can be fertilised, if fertilisation happens the inside the ova cell, cell division occurs until it reaches the uterus, if unfertilised it will pass out of the body, but if it is fertilised the weight of the ova will imbed itself into the uterus cell wall where it will grow and develop, a successful fertilisation normally is when the woman uterus cell wall is at its highest which is normally the 14th day since the last ovulation. Its structure is perfect for its function, if it was any other shape it could get stuck in the fallopian tube. THE SPERMATOZOON Otherwise known as the sperm cell, this cell is made in the seminiferous tubules in the testes which are lined by germinal epithelial cells which divide repeatedly, forming cells called spermatogonia. The spermatozoon have many structural sections which make it agile and fast. This cell is very specialised and it has some of what most cells have like a head consisting of a nucleus, which contains DNA conjugated with protein in a highly condensed form, mitochondria, microtubules and an acrosome. The nucleus contains the highly condensed set of chromosomes. The condensed state of genetic material reduces the amount of energy needed to transport the sperm. The microtubules produce the whip like movement of a mature sperm, which helps its suspension helping towards the swim to the egg. The mitochondria give the sperm cell the energy it needs to swim, and the acrosome is the storage site of enzymes which help the sperm digest the layers surrounding the egg thus being able to penetrate it. Its primary function is to fertilise an ovum cell, its structure helps it achieve its goal. THE EPITHELIAL CELLS Epithelial cells are produced pretty much anywhere needed in the body where something needs to be protected as we have different types of epithelial cells, take for instance we have squamous epithelium which is also known as pavement epithelium which is found in the walls of blood capillaries and alveoli in the lungs, we also have cuboidal epithelium which is found in some kidney tubules, columnar epithelium which is found in the lining of the small intestine, we also have glandular epithelium which is found in the lining of the rectum, we also have ciliated epithelium, this is formed in the windpipe and Its structure is takes is more of a columnar shape, it has ciliated hairs which beat away from the lungs to move mucus or any other micro-organisms and dust away from the lungs. Smokers are known to have damaged the ciliated hairs by the tar in the cigarettes making the hairs sticky and rigid or they have burnt them. It also has a cytoskeleton called the axoneme, the hairs itself is made of microtubules allowing the hairs to move with more flexibility Its function is just to keep out any foreign tissue, keep micro-organisms out and keep the lungs dust free, its structure helps it as the cilia hairs are facing away from the lungs meaning it will try and keep it by forcing it upwards. TISSUES The epithelial cells will group together to make epithelial tissue which is found in all areas and surfaces of the body, it is specialised to form a covering and or lining of all internal and external surfaces of the body. Epithelial tissue regardless of what type it is, it is separated from a thin-underlying tissue by a thin sheet of connective tissue, the basement membrane, which provides structural support for the epithelium and binds to other neighbouring structures. The ciliated cells in the throat group together to make ciliated epithelial tissue which is formed in a lining normally of the windpipe to help clear mucus, micro-organisms and any foreign tissue a lot more faster and easier than one cell alone. This helps to form one part of the respiratory system. Connective tissue is used to support the body and can bind or connect all tissues together. I will talk about one type of connective tissue which is going to be the bones in our body can also be about the bones in our body. The bones primarily give us the support we need and also give us locomotion to move, it protects delicate organs such as the brain from damage, and is also the site for where erythrocytes are made. It also plays a part in homeostasis which controls the amount of calcium in the blood. Under a microscope the bone is arranged in concentrated layers (lamellae) around the small canals called a haversian canal which interconnects to a volkmanns canal which contains a blood vessel, a lymph and nerve cell. Muscle tissue allows us to be able to relax or contrast our muscles to for us to exercise movement or do some work which requires us to use our muscles, its structure depends on the muscles that come from different areas of the body. We have smooth muscle tissue, skeletal muscle tissue and cardiac muscle tissue. I will now relate to one example which I will look at the structure and function of the smooth muscle tissue. The structure of smooth muscle tissue is made up of thin elongated muscle cells or fibres, these cells are long and pointed to the end and each cell has a large oval nucleus. The smooth muscle tissue is involuntary and we no control over it, some places you will find this tissue are the walls of the bladder, the uterus and the walls of blood vessels, its function is to control, slow involuntary movements such as the contraction of muscle tissue in the walls of the intestines and stomach. Nervous tissue is made up of nerve cells, also known as motor neuron which makes up one part of the nervous system. The structure of a motor neurone is pretty complex, these are lay up and down the body almost touching one another, via the dendrites through the axon, to the synapse, to be dissolved in neurotransmitters to another dendrite, and the central nervous system has three components for it to efficiently work, the motor neurone, the spinal cord and the brain. All motor neurones are connected to the spinal cord and the brain is connected to the spinal cord. A motor neurones function is to detect stimuli and respond to it adequately, it does this by sending electrical messages via the motor neurones to the spinal cord, to the brain and from the brain back to the motor neurones to the connected muscle to react to the stimuli. Its structure means the surface area of motor neurone is big enough to send high powered electrical messages at very high speeds. ORGAN SYSTEMS Up to now we have named a few cells which have developed into tissues, I will now look at the organs from the tissues that come together. The red blood cells have grouped up with plasma to make the blood, the squamous epithelial cells have grouped together to make capillaries, capillaries have grouped and made veins and arteries. All this is has made the circulatory system. The heart is the main organ in this system which too was made of a muscle cell which then grouped to make muscle tissue, making it what it is, the heart is specialised as a muscle as it needs pressure to pump the blood around the body, also it is hallow on the inside which allows the blood to fill the heart and then pump it around the body again. It is made of four chambers, which fill with blood, but they work separately because blood pumped into the heart is deoxygenated and pumped out oxygenated. Together they operate to form the circulatory system. BODY SYSTEMS The systems eventually start working together as one, like the respiratory system works with the circulatory system, the endocrine system works with the whole body giving it hormones, the nervous system works with the brain and spinal cord using nerve cells. The digestive system works alongside the reproductive system. With this in mind we will look at how the body systems work as one entire unit. To ensure we have life, we must to be able to breathe and for that to happen we need our heart beating with blood. The oxygen we breathe in is absorbed into the bloodstream which circulates around our body, picking up glucose and urea from the liver and arriving back at the lungs, and the waste products, like carbon dioxide is excreted. Blood contains waste products such as urea which is given to the liver and bile is added to this ready for digestion in the form of urine but that is after it has passed the kidneys. This links, the circulatory system, the respiratory system and digestive sy stem together. The endocrine system also helps the digestion system by regulating the water balance and blood pressure with the use of very important hormones, such as thyroxin which controls the bodys metabolism. The endocrine system also works with nervous system as it regulates internal functions and maintaining homeostasis. The reproductive system is linked to the digestive system as waste water is excreted through the sexual organs. So the body is linked in many ways to help it function as one whole unit.

Wednesday, November 13, 2019

Free Trade: America Should NOT Protect Industries from Foreign Competit

Free Trade: America Should NOT Protect Industries from Foreign Competition Many politicians oppose free international trade, trade without any restrictions, for a couple of reasons. From their point of view it would affect the United States in several ways: 1. Many USA workers would lose their jobs because factories would be moved to the country with whom the U.S. has a Free Trade Agreement, and where working force is much cheaper. 2. Importing foreign goods and services without tariff into the United States makes it harder for domestic industries to compete with lower prices and better quality of foreign competition. 3. Some politicians feel that it is not the right decision to have open trade with countries where the workforce is forced to work and where prisoners are used as workers. Because of these reasons, politicians who oppose Free Trade, feel that the U.S. should have some kind of restrictions, such as protective tariffs, import quotas, non tariff barriers, and/or export subsidies. However, some politicians and economists feel differently. They say that if some country would raise its barriers in order to reduce imports and stimulate production, the country whose exports suffer may raise its barriers, too. This would cause a trade war. The trade war would effect every nation in lower output, income, and employment; example is the Smooth-Hawley Tariff Act of 1930. The United St...

Monday, November 11, 2019

Functionalism and Poverty

Bethune cookman university | Poverty: From A Functionalist & A Conflict Perspective| Social Problems – SO 132| | John Arthur Jackson, III| 9/29/2012| This assignment will analyze two different forms of social analysis and how it relates to explaining the existence of poverty. | Functionalists Perspective & It’s View Concerning Poverty As it concerns social analysis, the functionalists believe that society is a stable, and orderly system comprised of interrelated, and interdependent parts all working together to achieve homeostasis (equilibrium).As far as the individual is concerned, they view them as being shaped by society, a relatively passive people molded by their experience and interactions with society. Any change that occurs in society is deemed disruptive and the system would seek to restore balance quickly. In addition, any part that is dysfunctional is correlated to the system as a whole, and there is not one thing that stands in isolation from the other. Conc erning poverty, functionalists argue that poverty is not as apparent as the figures put it. There is a consensus that even though poverty is a social problem, it isn’t as abundant as we think it is.This consensus is come to after the functionalists take into consideration the antipoverty benefits that are available for those who experience and just like that poverty is much lower than popular belief. So in lament terms functionalists claim that if we take into account all of the available benefits that are for poor people then we would come to a conclusion that poverty is lower than estimation. As you can see, poverty from this perspective is just a way of life, and perhaps probably an incentive, encouraging everyone to work that much harder to promote overall well-being and possible social mobility.Possibly, there is an ultimate balance by the existence of poverty by depicting a clear division of power and wealth. There will always be the rich, and there will always be the p oor and thus balance. Poverty, serves to remind those who aren’t in that position to have a reason to attain or to achieve just to avoid having to conform to the problem of poverty. Also, the existence of poverty allows others to compare themselves to, just to make the contrast between the two provide certain thankfulness to their situation. As to say that, whatever they are going through couldn’t get that much worse than someone who is already in poverty.Conflict Perspective & It’s View Concerning Poverty The idea that society is just a continuous power struggle between social classes over the availability and allocation of scarce resources would be the perspective of the Conflict Theorists. The premise of their argument is that there doesn’t need to be a reason to place blame on people who find themselves in an impoverished socioeconomic condition. Logically, if we continue to place blame on the people who are living in poverty, we continue to shift the focus off of the problem and onto the individual which shouldn’t be the case.There should be a firm emphasis on the bigger societal problems that occur by the hands of the unstable capitalists and avaricious elitists who continue to perpetuate a falsified ideology for people to believe in. Conflict Theorists claim that poverty â€Å"†¦ is rooted in past and present prejudice and discrimination that keeps people of color out of the economic mainstream†¦Ã¢â‚¬  (Kendall 2012). The subpar socioeconomically related living conditions that impoverished African Americans and other minorities find themselves in are just the fuel to the fire. †¦ Inadequate housing, sub-standard schools, and crime-ridden neighborhoods†¦Ã¢â‚¬  (Kendall 2012) causes the high poverty rate among the aforementioned racial groups. The lacks of regulated social policies that concern the ever-present and ongoing problems of economic inequality continue to perpetuate the capitalistic ideo logy as well as subordinate the ethnic groups that face this alienation. The conflict theorists agree that the structural problems (substandard schools, inadequate housing etc. 😉 are beyond the poor person’s control.So in order to rectify this situation, it would behoove the nation’s political and business leadership to formulate a way to compensate people who are living in poverty in accordance to being able to afford the basic necessities of life. In addition, the wealthy must face a tax cut, so that the middle class can strengthen and the lower class can shrink. In other words, in order to significantly reduce the problem of poverty; conflict theorists believe that we must stop blaming the victim for being poor, but instead find a way that benefits and help the poor people become more affluent, not financially only but economically as well.

Friday, November 8, 2019

Free Essays on Spurgeon

Spurgeon Heir of the Puritans by Ernest W. Bacon Spurgeon Heir of the Puritans is the biography of Charles Haddon Spurgeon, one of the greatest and most popular preaches who ever lived. Spurgeon was born on June 19, 1834, in Kelvedon, Essex, to John and Eliza Spurgeon. At the age of 18 months, for reasons unknown, Charles was sent to live with his grandparents who had strong influences on his life. Even though his grandfather and father were both pastors, it wasn’t until Spurgeon was nearly 16 that he gave his life to Christ. On a Sunday morning, January 6, 1850, Spurgeon started to church looking for answers to the many question he had on salvation. Because of a terrible storm he could not attend the church he had planned on. He ended up at a Primitive Methodist church where God used a simple preacher to explain that all he had to do was look to Christ and trust His work on the cross. Spurgeon’s one desire was for God to use him to preach the gospel as his father and grandfather did. At the age of 16 Spurgeon preached his first sermon and at the age of 17 became the pastor of a small village church called Waterbeach. At the age of 19 Spurgeon was called to pastor the New Park Street Chapel in London. He became very popular and by the time he was 21 his sermons were being published and to the this very day he remains very popular. Shortly after he came to the New Park Street Chapel, Charles Spurgeon met and married Susannah Thompson. Spurgeon considered her as a gift from God and a much needed helpmeet for his ministry. Spurgeon was preaching to crowds of 6,000 in the newly constructed Metropolitan Tabernacle. Although Spurgeon never received a college education, he was known for his intelligence and knowledge of the Word of God. The time spent on preparations for his sermons was Saturday evenings and Sunday afternoons. At one time Spurgeon was ... Free Essays on Spurgeon Free Essays on Spurgeon Spurgeon Heir of the Puritans by Ernest W. Bacon Spurgeon Heir of the Puritans is the biography of Charles Haddon Spurgeon, one of the greatest and most popular preaches who ever lived. Spurgeon was born on June 19, 1834, in Kelvedon, Essex, to John and Eliza Spurgeon. At the age of 18 months, for reasons unknown, Charles was sent to live with his grandparents who had strong influences on his life. Even though his grandfather and father were both pastors, it wasn’t until Spurgeon was nearly 16 that he gave his life to Christ. On a Sunday morning, January 6, 1850, Spurgeon started to church looking for answers to the many question he had on salvation. Because of a terrible storm he could not attend the church he had planned on. He ended up at a Primitive Methodist church where God used a simple preacher to explain that all he had to do was look to Christ and trust His work on the cross. Spurgeon’s one desire was for God to use him to preach the gospel as his father and grandfather did. At the age of 16 Spurgeon preached his first sermon and at the age of 17 became the pastor of a small village church called Waterbeach. At the age of 19 Spurgeon was called to pastor the New Park Street Chapel in London. He became very popular and by the time he was 21 his sermons were being published and to the this very day he remains very popular. Shortly after he came to the New Park Street Chapel, Charles Spurgeon met and married Susannah Thompson. Spurgeon considered her as a gift from God and a much needed helpmeet for his ministry. Spurgeon was preaching to crowds of 6,000 in the newly constructed Metropolitan Tabernacle. Although Spurgeon never received a college education, he was known for his intelligence and knowledge of the Word of God. The time spent on preparations for his sermons was Saturday evenings and Sunday afternoons. At one time Spurgeon was ...

Wednesday, November 6, 2019

Prince Louis-Victor Pierre Raymond de Broglie

Prince Louis-Victor Pierre Raymond de Broglie De Broglie was born August 15, 1892. He is the son of Victor Duc de Broglie and Pauline dArmallie. He studied at the Lycee Janson of Sailly, he graduated from there in He got his degree in history in 1910. He gained his science degree in in 1913, after discovering he had a He was conscripted for military services and posted to the wireless section of the army, where he remained for the remaining of the war During his time in the war he was stationed in the Eiffel Tower, where he devoted his spare time to the study oh technical problems. Once the war ended De Broglie resumed his studies of general While following his older brothers steps, de Broglie, he specialized in theoretical physics and in the study of problems involving quanta. In 1924, at the Faculty of Sciences in Paris University he delivered a thesis Recherches sur la Theorie des Quanta (Researches on the quantum theory), which gained him his doctors degree. If light waves can behave like a stream of particles(photons), then perhaps particles such as electrons can posses wave properties. According to de Broglie, an electron bound to the nucleus behaves like standing waves. Standing waves can be generated by plucking, say, a guitar string. The waves are described as standing, or stationary, because they do not travel along the string. Some points on the string , called nodes, do not move at all; that is, the amplitude of the wave at these points is zero. There is a node at each end, and there may be nodes between the ends. The greater the frequency of the vibration, the shorter the wavelength of the standing wave and the In other words, de Broglie proposed that, like light, ordinary particles

Monday, November 4, 2019

Refugees and Races Research Paper Example | Topics and Well Written Essays - 1000 words

Refugees and Races - Research Paper Example The countries of the world, especially those who preach against the very factors that drive refugees out of their homes, is expected to open their communities and societies in order to receive these poor souls. But the fact is that some of them refuse accepting immigrants or impose restrictions on refugees. For the purposes of this paper, several countries would be cited in order to provide a picture about sorry state of policies governing refugees. The first of these is Australia. The country has a number of codes and legal guarantees for the acceptance of refugees. For instance, there is the Section 91R of the Migration Act of 1958, which identifies the requirements for an immigrant that should be accepted because he or she is a refugee. In a specific case that is already part of the Australian jurisprudence, Applicant A v MIIEA, it was held that "as long as the discrimination constitutes persecution and is inflicted for a Convention reason, the person will qualify as a refugee." ( Bagaric and Vrachnas 2006, 296) However, recent events demonstrate a different reality with regards to the Australian refugee policy. In 2001, hundreds of Afghans and Iraqis being persecuted at home and hoping for sanctuary in Australia were met with Australian warships effectively sending them to Indonesia, where they languished for weeks with uncertain future, having no country of their own (Timberlake 2001). Recently, 430 Sri Lankan and Pakistani refugees also suffered the same faith when Australia refused to accept them after they were rescued by a Norwegian cargo ship (Mail Online 2011). The fact is that Australia has been enforcing tougher immigration policy and could be found discriminating against refugees, particularly boat people, even though they fit the profile of those persecuted individuals that the country ideally welcomes with open arms. According to Sidoti, the National spokesperson of Human Rights Council of Australia: The most recent refugee arrivals in Australia have been predominantly from Afghanistan and Iraq and they have been predominantly Muslim. They have experienced discrimination on these bases along with other Muslim and Middle Eastern residents of Australia. The NSW Police Commissioner recently reported a great increase of attacks on Muslim or Middles Eastern residents of the state since the Bali bombing on 12 October... They have also included stones thrown through the windows of the homes and shops of Muslims (2002).. The same can also be said about the United Kingdom. This country has a long anti-immigration history. For example, the Merchant Shipping Act of 1906 introduced a language test for those signing in British ships in the UK, meaning to discriminate against all non-white sailors. (Shah 2000) It was only after the 1980s when the UK government started to encourage plurality. It was a gradual process that has been characterized by community resentments and race riots, considering the way the British see immigrants as fore ign and alien. Today, the country's immigration and refugee policies are characterized by a particular aversion to non-white applicants and is still reminiscent of the Merchant Shipping Act by mandating English proficiency, along with other stringent requirement for all immigrants designed to weed out undesirable races. By 1990s, the UK has accumulated a series of measures that strengthened immigration controls, especially those that made it more difficult for asylum seekers to enter the country by imposing visa requirements on the countries from which asylum seekers came and imposing a duty on carriers to ensure that only

Saturday, November 2, 2019

Marketing planing Assignment Example | Topics and Well Written Essays - 2500 words - 1

Marketing planing - Assignment Example Analyzing marketing plan of Boots UK Limited will be the essence of this paper while understanding the research problem in context to theoretical argument of various research scholars. Before going to this discussion, the researcher will try to understand the business matrix of Boots UK Limited. Boots UK Limited- Business Overview Boots was established by John Boot in the year 1849 and the company is headquartered in Nottingham, United Kingdom (Boots-UK, 2013a). Boots UK is the subsidiary of Alliance Boots which is a multinational pharmacy-led health and beauty group (Boots-UK, 2013b). Boots UK works in close partnership with pharmacists and medicine manufacturers in order to maintain steady flow of supply. The company focuses on three major business verticals such as pharmaceutical wholesaling & retail distribution, pharmacy-led health supplement distribution and beauty retailing (Boots-UK, 2013b). Although the parent company Alliance Boots has established its presence over 25 count ries but subsidiary Boots UK has not expanded its operation beyond UK and Ireland. Boots UK Limited (Boots) has expanded its retail operation with the help of establishing 2500 stores in UK and Ireland. The pharmacy chain serves more than 7 million customers every week and the company earns revenue over ?5 billion (Tata Consultancy Services, 2007). Task 1 Ans.1b- Careful analysis of the research work of Sheth and Sisodia (2006) reveals the fact that both product and service driven companies have started to look into marketing planning as a strategic move instead of perceiving it as a mere operational trick to generate brand awareness. Modern companies separately allocate resources for formulating and executing the marketing plan. Sheth and Sisodia (2006) argued that modern marketers have started viewing marketing plan as a means for generating customer satisfaction and loyalty. Modern marketing plan is created after conducting deep market research on consumer behavior, economic powe r index of customer, demography of customers, social dynamics of customers while in previous occasions, marketing plan was developed on the basis of product selling objectives. However, Wood (2008) pointed out that pattern of marketing plan changed in terms on inclusion of social elements in the planning phase. For example, modern marketers emphasize heavily on creating human touch points or human appeal through the marketing plan while in previous occasions, marketing plans were mechanical in nature. Capabilities of Boots UK Limited (Boots) can be assessed in terms of its resources which can be classified as tangible, intangible and human resources. Tangible Resource Intangible Resource Human Resource Capabilities Boots work as the subsidy of Alliance Boots which earns annual revenue of more than $40 billion with operating profit of $2billion. Hence, the group is in financially stable position to finance its marketing plan. Boots is market leader in UK’s pharmacy-led health and beauty with 2,500 distribution centres. Boots has got intellectual capital by establishing patent contract with leading pharmaceutical companies. Contract with pharmaceutical companies help Boots to sell generic drugs in exclusive manner to customers. The company maintains the heritage of 164 years which is greatest drive for building the brand equity for Boots. In many occasions, Boots

Thursday, October 31, 2019

Leonardo Da Vincis journey to a master of art Research Proposal

Leonardo Da Vincis journey to a master of art - Research Proposal Example He was the dishonest son of Messer Piero Fruosino di Antonio da Vinci, a Florentine legal representative and Caterina, who was a peasant. Leonardo had no last name in the contemporary way, though ‘da Vinci’ plainly meaning ‘of Vinci’ was his family name given to him, â€Å"Leonardo di ser Piero da Vinci†, which means â€Å"Leonardo, son of Piero from Vinci.† A little bit is acknowledged regarding his early days, which has been the focus of past speculation by a lot of historians. When Leonardo was five years old, he went to reside in the house of his father, along with his grandparents and uncle namely Francesco, in a little town of Vinci, where his father had wedded with a sixteen year old girl, Albiera. She loved Leonardo however unluckily she passed away in a young age3. Just two events of his early days are recorded. First one, which he observed as a portent, was when a kite crashed from the skies and floated above his cradle, its tail feat hers combing his face. The second confrontation took place while he was traveling around in the mountains. He found a cave and documented his feelings at being, on one hand, frightened that a number of huge monsters may wait there and at the same time, motivated by inquisitiveness to find out what was in the cave4. In 1466, when he was fourteen, Leonardo was trained by one of the most victorious artiste of his time named as Andrea di Cione, also identified as Verrocchio. The workshop of this famous teacher was in the mid of the scholarly currents of Florence, declaring the little Leonardo of an education in the subject of humanities. As a trainee, Leonardo would have been educated in all the innumerable talents that were engaged in a customary workshop. Though a lot of craftsmen concentrated in work for example frame-making, gilding and bronze casting. Leonardo would have been uncovered to a huge variety of technical abilities and had the chance to study drafting,

Tuesday, October 29, 2019

Beijing Sammies Essay Example for Free

Beijing Sammies Essay The AGROVOC Concept Server (AGROVOC/CS) Workbench is a web-based working environment consisting of numerous functionalities for the distributed management and enhancement of the AGROVOC/CS built from the AGROVOC thesaurus. Following the Semantic Web’s vision, that emphasizes collaboration in the development of data and metadata to be shared and reused across the web, the management of AGROVOC will progressively be transferred from a few individuals in FAO to a wider community of international AGROVOC experts. These interested and competent users will share the collaborative maintenance and extension of AGROVOC, one of the most frequently used terminological resources for agricultural information management in the world. Maintenance of the future extended AGROVOC will thus be completely decentralized with people worldwide contributing to its development. This report provides a brief note on the technical aspects of the AGROVOC/CS Workbench. Technical details †¢ Multilingual web interface and content (UTF8). †¢ The software is developed in pure JAVA (version 1. 5. x), with no calls to any third party modules requiring precompiled DLLs or other operating system specific features. †¢ The Google Web Toolkit (GWT) is used with an Eclipse plug-in for development of the system. It is used to build the system as a fully Java based AJAX client browser application that is compatible with all common web browsers. †¢ Where possible the JSP 2. 0 Expression Language (EL) is used for any JSP development within the project (it’s a way of writing script-less JSP pages). Protege OWL api framework is used to connect OWL. †¢ MySQL is used as RDBMS. †¢ The system is DBMS-independent. Additional database abstraction layer for interacting with the OWL backbone and the relational database will be used (e. g. the hibernat e persistence and query service, etc. ). The system follows FAO guidelines for HTML publishing: †¢ Guidelines for Web site development; †¢ File naming convention and file organization guidelines; †¢ Check list for the clearance of Web sites. In summary, the system is based on the following components: Development components †¢ Eclipse 3. 2 †¢ JAVA-JDK version jdk1. 5. x †¢ Apache Tomcat (that supports JSP and JAVA Servlets) Google Web Toolkit (for AJAX framework), version 1. 4. 60 †¢ Google Web Toolkit Incubator, version 1. 4 †¢ Protege OWL API 3. 4 libraries †¢ Hibernate 3. 0 libraries †¢ Hibernate 4 GWT, version 0. 5 RC2 †¢ MySQL version 5 Server side †¢ Windows XP, Windows 2000, or Linux †¢ Apache Tomcat 5. 5. 9 or higher †¢ JAVA-JDK version jdk1. 5. x or higher †¢ MySQL version 5 or higher †¢ Protege OWL API 3. 4 libraries †¢ Hibernate 3. 0 libraries †¢ Hibernate 4 GWT, version 0. 5 RC2 †¢ WAR file with compiled JAVA files and necessary libraries Current Server Configuration †¢ OS : Debian GNU/Linux 2. 6. 22-2 †¢ CPU: AMD 64 bit †¢ Memory: 8GB †¢ MYSQL version: 5. 0. 45 TOMCAT Version: 6. 0. 14 †¢ Java-JDK: 1. 6. 0_04 Required Application 1. MySQL version 5 or above Available link to download: http://dev. mysql. com/downloads/ 2. Apache Ant version 1. 7. 1 or above Available link to download: http://ant. apache. org/ 3. JAVA JDK version jdk. 1. 5. x or above Available link to download: http://java. sun. com/javase/downloads/index. jsp 4. Apache Tomcat version 6 or above Available link to download: http://tomcat. apache. org/download-55. cgi 5. Protege Version 3. 4 beta Build 130 Available link to download: http://protege. cim3. net/download/old-releases/3. 4%20betas/build-130/full/ 6. GWT Version 1. 4 Build 1. 4. 62 Available link to download: http://code. google. com/webtoolkit/versions. html The Step of Configuration 1. Download AGROVOC Concept Server Workbench code from the CVS Server. 2. Download the sql script from CVS Server at folder named sql. Create the database. †¢ Run the sql script file located at your_directorySQLadministrator_agrovocwb _v_0_2_beta. sql This will install administrator_agrovocwb database. †¢ Run sql script file to install the owl model database located at your_directorySQLlank model _v_0_2_beta. sql Here we have provided blank owl model. †¢ You can convert owl file directly to database by using stand alone java program located at: our_directorysrcorgfaoaoscsserverprotegeconvertToDatabaseProject. java †¢ You need the change the variables in the file. |18 private final static String url = jdbc:mysql://; | |19 private final static String table = ; | |20 private final static String user = ; | |21 private final static String password = ; | |22 private final static String uri = file:/c:/; | 3. To add model in the ontology list, go to database and table and insert new row with these values. Ontology id: (Auto increment) †¢ Ontology Name: Blank Model †¢ Ontology Description: AGROVOC Concept Server Workbench Blank AOS Module †¢ Database URL: jdbc:mysql://:3306/? requireSSL=falseuseUnicode=truecharacterEncoding=UTF-8 †¢ Database Driver: com. mysql. jdbc. Driver †¢ Table Name: †¢ Database Username: †¢ Database Password: †¢ Display Ontology on the list: 0 for hide and 1 for Show 4. Use java editor to †¢ Change the configuration of the hibernate file that located in your_directorysrchibernate. cfg. xml Change the property of your connection password instead of â€Å"your_password† and change the property of your connection url instead of â€Å"your_url†. 13 your_password | |14 jdbc:mysql://your_url | †¢ Change the configuration of the database properties that located in your_directorysrcorgfaoaoscsserverowlDatabaseC onnection. properties Change the property of your username of database instead of â€Å"your_username† and change the property of your password of database instead of â€Å"your_password†. |4 userAdminDB = your_username | |5 passwordAdminDB = your_password | †¢ Change the configuration of the mail file that located in your_directory srcorgfaoaoscsutilityMail. properties Change the property of your host name instead of â€Å"your_mailserver_host†, change the property of your port instead of â€Å"your_port†, change the property of your user instead of â€Å"your_user†, change the property of your password instead of â€Å"your_password† and change the property of your from information instead of â€Å"sender_email†. |1 host=your_mailserver_host | |2 port=your_port | |3 user=your_user | |4 password=your_password | |5 from= sender_email | †¢ Run build file to create war file using Apache ANT. 5. Copy the war file to folder of tomcat installation directory. 6. You can use the program by opening your browser and type †¢ http://localhost:8080/your_project_name

Saturday, October 26, 2019

Mobile Ad Hoc Networks MANET

Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The Mobile Ad Hoc Networks MANET Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The