Thursday, October 31, 2019

International Business Enviroment Essay Example | Topics and Well Written Essays - 2000 words

International Business Enviroment - Essay Example It intends to make its investments in Kenya, with intent to providing cloud computing services. The essence of this work and report is to evaluate and to critically analyze how viable this idea is. It will do this by discussing a few factors such as the institution systems in Kenya, exchange regime that governs the country and the political risks involved, and how they may affect the success or failure of the iomart venture. The report shall then be submitted to the CEO of iomart Group of Companies, with a conclusion on whether the idea is viable or not, and furnished with a few recommendations. Table of Contents Executive Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 National Institutions Systems†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.5 Exchange Rate Regime†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...7 Political Risks†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.9 Conclusion and Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.12 International Business Environment Introduction . ... The iomart Group is keen to expand and one of its objectives is to be a globally recognized brand. The last expansion phase saw it expand to Asia and now the focus has shifted to Africa. The iomart Group is highly profitable and as a result has been able to take advantage of business opportunities around the globe through comprehensive market researches (iomart, 2013). Kenya is considered to be East Africa’s fastest growing economy, and is endowed with many resources. In the recent past, the country has witnessed many drastic changes and growth in terms of leadership, growth of industries, expansion of investments and growth in the national Gross Domestic Product (Nzwili, 2012; Nyong’o, 2007). The iomart branch, if established, is intended to be a major provider of cloud computing services to the already established and the growing businesses in Kenya (iomart, 2013). This report will serve to examine the exchange regimes that govern Kenya, determine and compare the two countries’ national institution systems and finally look at the political risks in Kenya. A conclusion shall be drawn and recommendations given. National Institution Systems It is important to know the institutions that govern businesses in a country and how different they are from what one is used to (Cullen and Parboteeah, 2009). The IT firm to be established, just like the iomart in U.K will deal with handling personal data, and hence this will be the main issue since Kenya and UK have different policies regarding how personal information is treated. The main body that regulates the operations of the IT industry in Kenya is the Communication Commission of Kenya and the National Communications Secretariat. These two regulatory bodies are

Tuesday, October 29, 2019

Importance to the performance of the business Essay Example for Free

Importance to the performance of the business Essay Identify aspects of the business training and development programme and explain its importance to the performance of the business? What is training? Training is the acquisition of a body of knowledge and skills, which can be applied to a particular job. Training includes all forms of planned learning experiences and activities designed to make positive changes to performance in a job. The benefits of training There are number of major benefits that flow from training: It increases productivity of workers within a business. It helps achieve the businesses objectivities by having more knowledge within the business. Improved efficiency results from saving from material costs due to reduced wastage, improved delivery performance, improved delivery performance, reliability and range of products or services to customers. At Haydon this means less wasted teaching time lessons starting on time lessons planned and run efficiently. Creates a more flexible work force. At Haydon this could help when a teacher is off sick and another teacher has the ability to teach another subject for example an Ict teacher who can also teach economics. If effective should improve the competitiveness of an organisation. As well as improving its productivity and service to customers. At Haydon this means improved student grades. Retaining staff, surveys have shown that training costs less in the long run than recruiting full trained workers from outside the organisation. Recruited, fully trained employees tend to leave much sooner than employees the organisation has trained itself. Haydon should try to train staff already at the school to do jobs rather than hire some one from outside. Improves image of a business. As it will be able to keep staff and have well trained staff where parents will want their children to go to school.l Training adds to competitiveness In a knowledge economy training development take on a greater importance than ever before. The company that trains and develops its staff is best placed to have better educated students and therefore gain competitive advantage. What is development? Development approaches the individual and his or her motivation from a different angle from that of training. While training is typically concerned with enabling the employee to contribute to meeting the objectives of Haydon better, personal development is more concerned with enabling individuals to develop themselves in the way that best suits individual needs. The two will come together. By helping individuals to develop themselves, they will be more inclined and better able to contribute to helping Haydon meet its objectives. Why adopt training and development? Haydon other organisations organise training and development programmes for many reasons. Training and development programmes may be introduced to: Motivate employees and increase job satisfaction, thereby reducing absentees and student leaning Establish the most effective and efficient working methods in order to maximise the education of students and remain competitive The resources needed for Haydon training can generate significant costs. It is important that training needs are correctly identified and the required standard of skill is established. The training programme needs to be administered efficiently and evaluated, so the results achieved by the Haydon teachers that have received training should be compared with the standard of performance it was hoped to achieve How does a business know if training is needed? The business could ask the employees to see if they need or want any training. When filling a vacancy they could use the job description to find skills and knowledge required for the job. Also look at the performance of the school e.g. exam results Induction training Induction is the process of introducing new employees to their place of works new surroundings and the people they will be working with. Induction also provides information to help new employees start work and generally fit in. This induction programme enables Haydon to introduce new employees to the business and tell them about the many achievements and procedures it has produced over the years. The induction programme is supposed to make the new employee feel more aware of the different functions of the business as a whole, so they can know what the business is about instead of the specific job he/she has to take on in the future. The induction usually contains information about the organisations policies and objectives, future career opportunities Pay, training and fringe benefits Health and safety, the requirements of the job. Good induction programmes can successfully balance the amount of information that needs to be conveyed with the length of time, so employees can maintain t heir concentration. In house training courses This is where employers run courses inside their own organisation the courses might be held in an office or in a smart training centre owned by the business. The main benefits of in house training are: They are cheap to run Course content is made to suit the business Examples can be related to the business work Everyone knows each other. External Training courses These are more expensive because they include fairly luxurious accommodation in lavish surroundings and the guest speakers are highly paid. This means employers have to think very seriously about the value of the courses to the business. Mentoring Mentoring involves a trainee being paired with a more experienced employee. The trainee carries out the job but uses the mentor to discuss problems that may occur and how best to solve them. Often trainee teachers work with a mentor who is responsible for their early training and development. The student teacher will watch the mentor teach before starting his/her own teaching. The mentor will then give an ongoing guidance to the student teacher on how best to improve his/her performance and the trainee will take any problems and difficulties he/she is facing to the mentor to seek advice. Coaching This is rather similar to mentoring but the difference is that the coaching involves helping the young employee to acquire high quality skills in a number of specific management areas. These skills include communication with staff, budgeting, how to appraise and how to carry out disciplinary procedures. Vocational Courses These provide training in job related skills for example office skills: the QCA (Qualifications and Curriculum Authority) took over the role of the NCVQ (National council for Vocational Qualifications, set standards for workplace competences which can be assessed both in the workplace and at college by examining bodies such as Edexcel, OCR and AQA. Job Rotation Is giving staff a range of jobs in rotation, which widened their experiences and increases their skills Job enlargement Is where staff is given extra tasks to do this gives management a better idea of the employees true capacity and ability. Job enrichment Adding more interesting and difficult tasks to the job to motivate and tro see how capable they are. Types of training at Haydon Induction Training The induction training takes place in July, which can be up to 3 weeks long this will include Assessment Reports Behaviour management Child protection Special needs Being a form tutor Administration Health and safety Contracts Classes Syllabus Courses Training days All employees have to attend this as it is where school issues are disused and they are trained on things like equal opportunities within the school. The 1996 Educational Act legally requires these training days. Specialised Courses Some courses which Haydon have done are: Use of fire extinguishers: a specialised trainer came in to school to train the staff how to use them. Man handling courses: is for staff looking after disabled students so they no how to look after the student and what they are and arent allowed to do. Web design: this needed to be taught because of the new syllabus this was run by miss Boorman. Mentoring Every newly qualified teacher has a mentor at Haydon within the same subject the mentor has to do weekly meetings to review progress, observe their teaching skills and give feed back, and need to be their for support and motivation. On the Job training This is when a trainee at Haydon will work along side a qualified employer and observe teachers to gain experience. This means the trainee acquires their training st the school. This is known as job shadowing. External Training Haydons staff have gone on courses such as first aid which are done out side the business. Haydon also have to do external training for changes in the syllabus for example how to mark the coursework. I have shown why Haydon should train its employees and how it can be identified. Ive shown different types of training used how Haydon benefits from it and how the employees benefit from it.

Sunday, October 27, 2019

The Potential Of The Kalabagh Dam Environmental Sciences Essay

The Potential Of The Kalabagh Dam Environmental Sciences Essay Should the government commence the construction of Kalabagh Dam or should the project be abandoned? Kalabagh Dam, one of the largest projects pending in Pakistan, is to be located on river Indus at a site about 100 miles away from the capital city of Pakistan, Islamabad. The project was first conjured by the Government of Pakistan under the regime of Ghulam Muhammad in 1953. However, its project report which intended to inform and convince everyone about its economic and technical feasibility was completed by 1984 during the rule of the military leader Muhammad Zia-ul-Haq. The Kalabagh Dam project was designed with the support of the United Nations Development Program under the supervision of the World Bank. Having a live storage capacity of 6.1 million acre feet of water and producing 2400MW of electricity, Kalabagh Dam appears like the only solution to the water related issues facing Pakistan. Since the inception of this project till today, all four provinces continue to argue abou t the projects potential disadvantages and advantages. The benefits of building and running this dam which include obtaining cheap energy and increasing crop yield are tempting; however, after conducting an unbiased cost benefit analysis, it appears that the projects harmful effects like the displacement of people, damage to the environment, high cost, and no significant control over flood water flow outweigh the few advantages that might be achieved through its construction. The first and foremost important purpose for the Kalabagh Dam is considered to be the filling up of the huge gap in the demand and supply of electricity. According to PEPCO, Pakistan Electric Power Company, the total electricity shortfall in Pakistan is 3000 to 4000 MWs; supply from various sources being 11,815 MWs and the demand being 14,904 MWs. Pakistans population suffers greatly due to this deficit because it has to face long hours of load shedding also in areas which face unbearably hot summers. Electricity shortage to industries is detrimental to the economy, reducing exports in a country which already faces an alarming negative balance of payments. Not only is industrial load shedding disconcerting, threatening to destabilize the economy drastically if supply is not urgently met, or programs are not put into action immediately, but household shortage of electricity is also upsetting the social and economic infrastructure of the country. A study carried out by the Competition Commission of Pakistan (CCP) on the development of the power sector found that presently only 65 to 70 percent of 172 million people have access to electricity. The dire need for the demand of electricity to be met, then, cannot be ignored. The study by the Competition Commission of Pakistan also detailed that the country can generate a total of 40,000 MWs from Hydel resources, but owing to lesser exploitation, only 6500 MWs have been utilized from this energy source. The Kalagbagh Dam can hence be seen as a project that is immediately required in order to extract electricity from Pakistans natural resources. However, alternative, less controversial and hence more readily implementable plans to meet energy demands are also prevalent. Various small plans that cater to meeting the demand for electricity cannot be ignored; for instance wind energy projects, nuclear power reactors, coal power projects as well as solar energy utilization projects are also present. Solar energy panels covering several rural areas of Pakistan are under construction right now, with some of them near completion. These projects as a whole are expected to generate electric power of at least 3500 MWs together. Similarly Pakistan has a total of abou t 185,000 metric ton reserves of coal, while only 3300 metric tons have been exploited as yet for power generation. China has agreed to build several other power plants in Pakistan which are set to complete in the coming years; these plants, including Nandipur (425 MWs, Thermal), Guddu(800 MWs, Thermal) and Neelam-Jhelum(1000 MWs, Hydro), Chashma (1200 MWs, Nuclear) will add more than 3000 MWs of power generating capacity. Therefore Kalabagh dams importance as the only source for filling in the energy shortage is diluted; furthermore the heightened debate over it which has been stretching over for many years now stalls the process of implementing more energy generating programs. At the same time, the Kalabagh Dam project is considered to act as a cheap alternative source of energy. However, this cheap energy advantage in the production of electricity conversely will not benefit the population because WAPDA (Water And Power Development Authority) and KESC (Karachi Electric Supply Company) are both under debt incurring losses of 28% and 40% respectively.(Forex) This means that any cost advantage earned by both of these bodies due to using a relatively cheaper hydro-electric energy source will not be passed down to the customers. Additionally, Pakistan has abundant coal in the Thar reservoir in Sindh from where coal can be extracted and used to produce cheap electricity; foreign investment has been attracted over the years to exploit such reserves providing a feasible alternative to the much disputed Karbala Dam. The problem posed by diminishing storage capacities of dams due to silting which occurs over the years must be taken into account as well. A study carried out by TAMS-Wallingford in March 1998 explains that the capacity lost in Tarbela and Mangla Dams is approximately equal to the proposed capacity of Kalabagh Dam. The study says that a de-silted Tarbela Dam will yield the same benefit as the Kalabagh Dam; however the cost incurred would be one seventh of that than in the case of the construction of a new dam in net present value terms. Therefore, the Kalabagh Dam will only be a more expensive replacement providing storage capacity that is equal to that provided by the construction of new outlets at Tarbela dam which will enable sediments to flush out from the reservoir and will be far more beneficial as indicated by the study as well. Thus it appears that Kalabagh Dam is merely amongst one of the many options available when it comes to filling the energy gap and not the only solutio n possible, and certainly not the most viable one. Additionally, the proposed Kalabagh Dam Project is an expensive one. Pakistan, being the 54th poorest country in the world has recently been struck with a devastating flood which has exacerbated the prevalent poverty among the populace.(Aneki) The total expected cost of the Kalabagh Dam project was estimated to be about 6 billion dollars in 2000.(Khan) Pakistan expects to meet this cost by private funding, government funding, and foreign aid, the latter forming the major portion. However, Pakistans lower credibility and high rate of corruption makes it unlikely to be a candidate for private funding. Additionally, 6 billion dollars invested in Kalabagh Dam can rather be spent on the development of smaller projects costing lesser and directed at uplifting and benefiting the poverty struck masses. However, proponents of the Kalabagh Dam argue that Pakistan is facing an acute water shortage which is negatively affecting its agro-based industries. Pakistan relies heavily on rain water for irrigation and due to irregularity in the rain pattern agriculture output is suffering. Water is not only needed for irrigation purposes but also to increase crop production; the NCS report states: at present 12.2 million hectares of land are available for double cropping, as against the 4.38 million hectares that are double cropped clearly water is the constraining factor. This report tells us about the significance of the water shortage faced in Pakistan. However it needs to be assessed whether the shortage of water really is the problem or if the inefficient use of available water is the actual cause of reduced output. Excess water seepage in Pakistan has resulted in the issues of water logging and salinity which renders fertile land unusable. Rather than building a new dam, if the emphasis is laid on a more efficient use of the available water, the chances for water logging and salinity will lessen, resulting in a more cost efficient and beneficial course of action. The World Commission on Dams reported that lower irrigation efficiency than expected resulted after the construction of the Tarbela Dam, one of the largest dams in Pakistan; it seems unlikely that a new dam can cater to the irrigation problems being faced currently when the efficiency level of the existing dam is poor. Money should instead be spent on devising efficient ways of water distribution to the agricultural land. A widespread notion amongst the masses is that dams help to prevent floods. It is commonly held to believe that if the Kalabagh dam had been constructed and was running at the time when the flood hit Pakistan, it would have helped in reducing the extent of damage that occurred. This thought was further reinforced when the Prime Minister of Pakistan, Yousaf Raza Gilani, gave a statement in Multan after visiting a flood affected area that deaths and destruction in the floods could have been averted if the Kalabagh Dam had been built.(Daily Times). However, a former chairman of the Indus River System Authority (IRSA), Fatehullah Khan Gandapur, who headed IRSA from 1993 to 1998 said, The dams effect on floods would have been contrary to what the prime minister claimed. Gandapur elaborated on how he thought that Kalabagh dam would have resulted in increased flooding; he also claimed that the dams construction would have caused reverse flow in Kabul River, water logging in the entire Pesha war valley and the submersion of the Nowshera district. His statement shows how the idea that the Kalabagh dam could have prevented or reduced the damage of the flood may not be entirely true. Politically driven statements can lead the general public to form an uninformed and uneducated opinion. The flood which began in July 2010 and resulted at one point in one-fifth of Pakistan being under water was estimated to have floodwater of volume approximately equal to 100 Million Acre Feet whereas Kalabagh dam has a capacity to hold just 6 Million Acre Feet of water. It may be indeed troubling to see how the Prime Minister of Pakistan thought that Kalabagh dam with capacity almost 17 times less than the floodwater would have considerably averted the damage caused by the flood. Moving on to the environmental aspect, the construction of the Kalabagh dam would disrupt the Delta ecology and the Mangrove forest. Environmentalist Muhammad Tanveer warns that large dams have depleted wetlands in the Indus Delta and destroyed marine life; the effects spread over 300 square kilometers. Mangrove forestation is also suffering; mangroves are salt tolerant trees that grow on river deltas and in coastal areas and are important economically and environmentally. They help clean the soil and water containing excess salt by taking it up through the roots and later excreting it by shedding its leaves. Also Mangroves are a natural habitat to a large number of insects, birds, micro organisms, different mammals as well as snakes; further advantages include protection of coastal areas from cyclones and hurricanes, reducing sedimentation in the sea and acting as a breeding ground for fish and crabs. Mangrove forests have reduced to 100,000 hectares from 3 million hectares and the primary reason Tanveer quotes is the impediment upstream in Indus delta. He goes further and claims that Riverine forests on the banks of the Indus also face extinction. If another large dam is built, forests will have to face the consequences which will eventually upset the balance of the whole ecosystem. Reduced water flow in the River Indus which will result if the Kalabagh dam is constructed will also adversely affect forests and the ecosystem they support. The cost of land acquisition and resettlement of the displaced people is also necessary in deciding about the construction of the Kalabagh Dam. The newspaper Dawn reported in 2008 that the dam would take up 110,200 acres of land and displace about 120,000 people; the land acquisition and resettlement cost had been estimated to be 68 billion rupees. According to the World Commission on Dams, the Tarbela Dam directly affected 96,000 people from 120 villages while those people indirectly affected were not quantified. Out of those 96,000 people displaced in 1953 with the promise of land at another place, many affectees hold valid allotment letters but have not been given land due to non-availability. If all the affectees of 1953 have not been given lands by now, guaranteeing land for 120,000 more people seems like a flimsy commitment, and would result in greatly increasing the number of the homeless. In any case, even if all the harmful effects of the project are ignored, the project cannot be carried out without the consent of all the provinces. Without political agreement over this controversial topic, this project will turn into a disastrous one in the history of Pakistan. Building a dam at the cost of national unity does not seem like a reasonable course of action. Although China and India when faced with similar problems went ahead with the projects and did benefit from them, unparalleled political instability is at stake in the case of Pakistan. Since 1953, all four provinces are at a conflict over its construction with Punjab being in its favour while the other three rejecting it, Sindh being the strongest opponent. Officials in other provinces have blamed Punjab of only being concerned in its own water requirement at the cost of harming other provinces. About 11 members of Jiye Sindh Qaumi Mahaz (JSQM) went on a hunger strike demanding the immediate shutdown of the Kalaba gh project over which chairman Bashir Qureshi said that his movement is backed by the 40 million people of Sindh. The Sindh assembly and all political, religious and nationalist parties, irrespective of ideology, have given the thumbs-down to the controversial water projects. (OneWorld South Asia). This shows that going ahead with the Kalabagh Dam project will jeopardize national unity and thus abandoning the project in favour of another hydro-electric dam or other alternative energy source seems like a much viable option. Kalabagh Dam projects cost benefit analysis shows that it is not economically and environmentally feasible. If the project is carried out, not only will national unity be threatened but agricultural land, mangrove forests and in turn the eco system will also be harmed; additionally 120,000 people will be at risk of becoming homeless. Furthermore, the advantages of the Kalabagh Dam can be obtained in other ways which do not have significant costs attached to them. The benefit of increased water storage capacity can be obtained by de-silting the Tarbela and Mangla dams, increased crop yield can be achieved by improving the efficiency with which water is utilized and the energy gap can be filled by completing and starting new small projects and making use of abundant coal reservoir in Thar. The Kalabagh Dam project is not a necessity, it is just one proposal, formed during the process of finding solutions to the problems Pakistan faces, which seems to have taken the shape of an irresolv able dispute. As such then, it is evident that this dam rather than being a viable solution to the energy crisis has instead stalled the urgently required process of exploring Pakistans natural resources.

Friday, October 25, 2019

America Needs a Complete Smoking Ban Essay -- Should smoking be banned

Approximately 7,500 infants die due to sudden infant death syndrome due to exposure of secondhand smoke in America (â€Å"American Lung Association†). Children all over the United States are unwillingly exposed to parental secondhand smoke in public, in cars, and at home. When children are exposed to secondhand smoke, many develop life threatening diseases later in life as a result of that exposure. In the United States, smoking should be banned while in the presence of children. Children’s lungs are vulnerable to the effects of secondhand smoke, and this can cause serious problems down the road. Some states have already banned smoking in public and others are in the process. Secondhand smoke exposure has the possibility of causing nicotine dependence in adolescent (nicotine dependence in Children). Secondhand smoke can cause diseases in the lungs of children which can be long-term. There are three examples of diseases in children that include asthma, chronic obstructive pulmonary disease (COPD), and pneumonia. Asthma, being the most common, is a chronic disorder which causes the host to cough, wheeze, have a shortness of breath, and chest pains (â€Å"WebMd† Asthma.) Living with asthma is very common; many people can live perfectly normal lives with the disease. Another illness caused by secondhand smoking is COPD. Symptoms include COPD flare ups, shortness of breath, buildup of mucus, weight loss, and in some cases the host’s skin will turn a shade of blue. There are four stages to COPD which are mild, moderate, serious, and very serious in which the symptoms progressively become worse as you go from stage to stage ("WebMd COPD.") A third disease is pneumonia which violently attacks the respiratory system. Symptoms include rapid ... ...ndhand Smoke." American Lung Association. N.p., n.d. Web. 2 Mar. 2015. . "Symptoms and types." WebMd. N.p., n.d. Web. 2 Mar. 2015. . "COPD Symptoms and types." WebMd. N.p., n.d. Web. 2 Mar. 2015. . "Pneumonia Symptoms and types." WebMd. N.p., n.d. Web. 2 Mar. 2015. . Bell, Kirsten, Salmon Amy, and Darlene McNaughton. "Smoking around children and childhood overnutrition." 19.2 (2009): 15. Web. 2 Mar. 2015. "second-hand smoke may trigger nicotine dependence symptoms in kids." NewsRx Health & Science 19 Oct. 2008: 195. Health Reference Center Academic. Web. 28 Mar. 2015.

Thursday, October 24, 2019

How the Stock Market Crash of 1929 Affected the United States Essay

The year of 1929 is marked by the Stock Market Crash in which most consider to be the beginning of the Great Depression. This was not the sole cause of the Great Depression, though. The Stock Market Crash was caused by an economy that was not stable enough to handle the high stock prices. The Stock Market Crash helped bring on the Great Depression which forced the United States government to make changes in the regulation of stock exchanges, providing much greater protection for investors. The United States was a young nation and was not always as powerful as it is now or was in 1929. The United States was formed from European citizens who wanted to start their lives over. So the United States had relatively little money compared to the financial status of the rest of the world. London at the time was considered the center of finance. The United States borrowed money from England and other countries to spur its industry. By 1960 it seemed that the United States would inevitably be the world’s most important business and financial power. The Civil War provided a boost for industry, which jump-started the gradual shift of financial power from London to New York. The United States had a valuable asset in the form of land. â€Å"The United States was forced to develop itself before it could worry about competing with the world. Hence, the amount of capital was far greater once available to be spent outside the United States. The year of 1914 can be considered the point at which the United States would never be second in the world again.† (Axon, 32) Europe was stricken with war and the United States was turned to for supplies. The â€Å"wealthy European countries were ravaged by war because of casualties, economic losses, and expensed of war over four years.† (Axon, 33) The United States only was in the war for a year and did not have its country damaged by the war. The United States emerged from World War I being owed billions of dollars for having financed most of the war and was acknowledged to be the leader of the Western world. The early 1920s were a time of booming industry, of soaring hope and confidence. The ups and downs of the stock market were hardly noticed by the average American. The average American was more concerned with their daily life than the state of the stock market. The economy was such that many new products and services were available to almost everyone, including the automobile, radios, and other products for the home. The stock market was controlled by professionals that worked for large firms who had good financial backing which made it easier to use the market advantageously. Small investors were never shut out of Wall Street but the professionals paid for stock tips and also rigged the market so that certain stocks would rise and fall. This gave small investors a much harder time in making money through the stock market. As the market began to grow more small investors entered the game and were really just gambling their money. Most were not successful but some got lucky or got a good stock tip and rode the rising market until they lost their money too with the Stock Market Crash. At this time nobody had any reason to believe that the stock market would not keep rising. â€Å"Throughout the 1920s a long boom took stock prices to peaks never before seen. From 1920 to 1929 stocks more than quadrupled in value. Many investors became convinced that stocks were a sure thing and borrowed heavily to invest more money in the market.† (PBS) As the market grew, the stock market became a way of life and was a highly discussed topic among common Americans who were eager to get a piece of the pie. Americans no longer were connected by the common bond of making a life for themselves like at the birth of the nation. The 1920s were an era of revolution in ideas, beliefs, inventions, and ways of living. â€Å"The nation was totally different after World War I than before. The United States experimented with Prohibition. The Jazz age rose from the streets of Harlem, NY. Women got the right to vote. The whole of society was convinced that anything was possible, not only in the stock market and finances, but also in every facet of life.† (Sherrow, 12) Most of this is taken for granted now because what was considered a new idea seems commonplace and because the Stock Market Crash of 1929 overshadowed the great improvements in society. Society’s attitude affected Wall Street, though. The large investing firms thought that the government should not be allowed to interfere with the speculation of finances. This is a common feeling when the economy is booming, that the government is always trying to oppress. The exact opposite is seen when the economy is in a depression and everyone turns to the government for help. The federal government was very limited in its control of the market and could not impose new control efforts at the time because the nation would not agree. As we know now, the stock market would have been better off if the government would have stepped in when the stock market became dangerously high. One of the main causes for the stock market to become dangerous was because large firms or groups of individuals practiced unfair techniques when buying and selling stocks. This was known as â€Å"rigging† the market. The stock market flows more smoothly through normal buying and selling activity but when certain groups tried to make money in an unfair way they hurt others in the process which concentrated capital. Large pools could control prices more than was healthy for the stock market. Some made fortunes others lost everything. An example was â€Å"a cigar stock at the time was selling for $115 a share. The market collapsed. I got a call from the company president. Could I loan him $200 million?† (Blaszczyk and Scranton, 337) To the public, the stock market seemed as though it would surely make them money, and were buying. The craze was a â€Å"frenzied finance that made Ponzi look like an amateur. (Blaszczyk and Scranton, 337) The insiders were controlling the market though, setting the stage for the greatest crash of all time. The booming economy in the United States was not typical of the whole world. England had its share of problems concerning currency. The people wanted gold to again be used as it was before the war. They felt that it was a valuable metal and provided a solid backing for currency. The British government finally agreed, after a lot of pressure, to re-instate the gold standard but it was a new version where gold would be used to back up paper money and gold would be used to handle international debts. The pound was put into use, which created a problem. The pound was overvalued in terms of other currencies meaning that people had to pay more to by British goods. Naturally, people bought goods elsewhere to avoid the currency exchange rate of the pound. Instead of realizing what was happening, the British tried to lower the price, which in turn lowered wages and caused strikes to break out in England around 1926. German’s were not better off. Of course their country was destroyed physically by war, but the financial system was very poor at this time in Germany. Germany was forced to pay reparations according to the Treaty of Versailles plus the inflation was so bad that German currency was absolutely worthless. The German public was enraged about this and the fact that they lost a lot of what they considered their land because of the war. The new government installed in Germany after the war called the Weimar republic was a democracy. The German public could not adjust to this making governmental intervention a difficult task. France and the rest of Europe faced the same effects. Inflation was uncontrolled and the political systems were thrown into upheaval. Since the United States was so financially secure at this time, countries like Britain and France naturally asked for assistance. They appealed to the Federal Reserve Board to make cuts in interest rates in the United States. This would make the United States less attractive to investors and would maybe cause investment in Europe instead. By increasing the money supply in the United States, the dollar would be worth less and make American goods more expensive while lowering the price of foreign goods. At this time the United States thought that this would not benefit it at this time. After all, the economy was booming, nearly everyone was working, people were making money from the stock market, and life was generally pleasant. Taking actions that would have hurt the United States would not have been appreciated by businessmen and normal citizens as well. The United States paid little attention to these pleas. There has always been talk that if the Federal Reserve Board would have stepped in that there would have been no boom in speculation, greatly reducing the risk of a crash. The argument against this is the fact that the Federal Reserve Banking system has little control of the economy, but can only make changes spurring growth or decline. Other theories put the blame on foreign countries too. One allegation states that stock speculation and â€Å"gambling† the market was a trait the United States adopted from Europe. However, the get rich quick attitude of Americans is just as great as the Europeans. The California Gold Rush and the Florida Real Estate Boom prove this. The United States Government can still consume most of the blame. At that day and age, it was hard to expect economists to predict exactly what would happen with the stock market rising so rapidly. They could have realized that it was a dangerous situation. The government felt too threatened by  business. When the government stepped in businessmen, bankers, and society in general criticized them for trying to take action when none was deemed necessary. By 1928 the stock market had reached the point of no return. The stock market fluctuated greatly and the risk of the stock market became greater. The rigging of stocks became so common that people of great esteem thought nothing wrong of manipulating stocks in way that actually defrauded the public. By† the inevitability of a market collapse was upon the United States but nobody expected that a full-fledged business depression was to come about because of it.† (Axon, 47) At this time three million shares were traded each day. Slowly it rose to four and five million shares per day. By November 1928 a daily volume of six million shares was reached. It must be realized that industrial stocks rose at a normal rate at this time, approximately growing by a third. The individual stocks are what marked disaster. For example, the Radio Corporation of America (RCA) grew an unheard of 400 percent in 1928. In 1929 the stock market continued to grow at a dangerous pace. People borrowed money at high interest rates figuring to make enough in the stock market to cover the interest and still profit greatly. With people concentrating so much energy in the stock market, few realized that production could not keep up with the stock market. The automobile and construction industries had a small decline but people disregarded it as normal. Few Americans decided to sell-out for a profit. Most refused to believe the boom was coming to a halt. Stock market prices were now driven up by the sheer power of speculative demand. In other words, there was nothing concrete to back up the stock prices. By mid-October, the stock market was in a bad state. No major boom could revive the quality stocks that took a sharp dive. Fear began to take the place of greed in Wall Street. The word â€Å"sell† was now heard more than the word â€Å"buy†. Brokers asked for more margins or more cash from the customer to be paid into their accounts. The customers, of course, could not afford it and the brokers sold the stock. This pushed stock prices even lower. Everyone began banking the large operators on Wall Street would step in because they had much more to lose than the small investor. The problem was that they could not afford to because they were already in trouble because of the sharp decline in their stocks. October 24, 1929 was called Black Thursday because this hope was squashed and stock prices plummeted. Even after this there was still some hope. That same day, bankers moved in trying to restore some of the mess. They were trying to restore some of the optimism in the market. This was not the case as the following Monday, October 28, 1929, the market was flooded with selling orders. The big bankers were no longer there because they were in their own trouble. The people that were hurt the most are those that put their whole lives into the stock market and now walked the streets, stunned about their losses. â€Å"Some of the more badly declining stocks from 1929 to 1933 are as follows: Consolidated Cigar common stock fell from $115 to $3. General Foods dropped from $82 to less than $20. General Motors fell from $91 to less than $8. US Steel dropped drastically from $261 to just over $21. The railroad stocks were hit the hardest. The New York Central Railroad alone fell to $9 from $256.† (Klingaman, 111) The Stock Market Crash of 1929 marked a new era that was not immediately realized. Just as the rising stock market had provided industry with the capital to expand, the falling market caused industry to move into recession.

Tuesday, October 22, 2019

SALIERI essay) essays

Music and thought (Amadeus/SALIERI essay) essays In the play of life and death, Peter Shaffers Amadeus exemplifies a distinct contrast between the Age Of Reason and Romanticism thoughts. In representing the various themes, Shaffer uses his two main characters as spokesmen for each. The musician Salieri, based on reason, lives a struggled life attempting to find fame through composition. As for Amadeus Mozart, the Romantic composer, finds joy in living life as freely as can be. The character Salieri represents one side of the conflict taking place in the play which is that of reason. In being Mozarts competitor in the music world, Salieri envies Mozart for his sublime work and way of life. Salieri observes Mozart and his perfection in fame, and yet as he tries to work up to Mozarts greatness, he uses the complete opposite tool than Mozart to become the same thing. Salieri bases his life around thoughts of planned living and above all, life by reason. His thoughts are therefore revolved around ideas of goals towards dominating power and only through reason does Salieri believe he can obtain those accomplishments. In terms of religious ties, Salieri looks to praise God for all works of life, including his ability to create music. Art is therefore produced by artists who are truly inspired at greatest by God himself. In Salieris eyes, art is a gift by God. As his belief in God as inspiration to all music, Salieri becomes caught up in conflicts in the matter s of religious thought. As Salieris life changes and he grows towards more and more hatred for Mozarts abilities, his interactions with God grow. Towards the end of the play he says, [To audience]. What did this mean? Was this proof God had finally decided to defend Mozart against me? Was he engaging with me at last? With the premeditated and reasoned surroundings, Salieri observes life in a structured manner. In regards to music, Salieri fol...

Monday, October 21, 2019

The eNotes Blog These Are a Few of My FavoriteThings

These Are a Few of My FavoriteThings Its almost a new year, let the embarrassing work Christmas parties commence and the Auld Lang Synes ring! For my part, Id like to say farewell to 2012 and herald 2013 with a list of favorite things I discovered or enjoyed this past year, for the most part online. Hopefully youll agree that this collection has a little something for everyone: students, teachers, avid readers, art admirers, humorists, or simply the  perennially  curious. Working for I try my best to promote learning at every age. I strongly feel that if you cannot participate in a classroom, you should at least maintain an active level of curiosity and wonder about the world around you. With the many information-grabbing, curio-snapping sites below, youll never be at a loss for tools of learning and instruction 1. Brain Pickings Its not hard to imagine the Internet as a museum of wonders. Its much harder to imagine oneself as the curator of such an exhibit. Enter superwoman Maria Popova, interestingness hunter-gatherer and curious mind at large and creator of the wonderful blog Brain Pickings, the site that collects everything funny, captivating, and obscure from the far corners of the interweb for your consumption. Without Brain Pickings this year I would not have learnt of Salvador Dalis struggle between skepticism and faith, or of  how to talk about books I havent read, or book spine poetry  and how to dabble in it myself. Brain Pickings  is a human-powered discovery engine for interestingness, culling and curating cross-disciplinary curiosity-quenchers, and separating the signal from the noise to bring you things you didn’t know you were interested in until you are  Brain Pickings  is your LEGO treasure chest, full of pieces across art, design, science, technology, psychology, sociology, anthropology, you-name-itology. 2. Underground New York Public Library As the Sartorialist does for the fashion conscious, UNYPL documents in photographs the penchants of everyday people in a bustling metropolis, the difference being that creator Ourit Ben-Haim is more interested in what youre reading than who youre wearing. If youre looking for book recommendations hot off the pavement, this blog is the place to find them. And if youre looking for the picture of a kid grossed out by reading Fifty Shades, that can be arranged too. But the best part about UNYPL (besides the also stellar visuals themselves) is that beneath every caption telling you what the subject is reading, youll find links to either Read by purchasing the book online or Borrow the book from your local library (via the very handy WorldCat library network service). Youll find works you never knew existed, not only in a New York subway, but right outside your front door, too. The photos come together as a visual library. This library freely lends out a reminder that we’re capable of traveling to great depths within ourselves and as a whole. 3. What a year for literary adaptations! Yes, books are adapted for the silver screen all the time, but in 2012 the results really stuck out for me, either for their ambitious undertakings (naysayers said Cloud Atlas and Life of Pi could never be made into films) or for their daring takes on old classics (such as the stage play-esque adaptation of Anna Karenina and the forthcoming 3D red curtain spin on The Great Gatsby). Its also the year that most of the Internet fell in love with the British series Sherlock, a modern-day adaptation of the Holmes mystery series (and precursor to CBSs Elementary). There are so many more books worth a mention here Cosmopolis, The Hobbit, Great Expectations, On the Road,  The Perks of Being a Wallflower, Midnights Children come Oscar season, the awards will be dominated by films that were originally books. Watch out for a punch up over the Best Adapted Screenplay prize, not to mention the Best Visual Effects nod, as filmakers outdid themselves in 2012 to recreate the stunning landscapes of these  imaginative  novels. 4. S#@! My Students Write If you are or have ever been in charge of a classroom, youll likely have a few gems in your back pocket similar to the above. Now theres a tumblr account to collect other unintentionally hilarious snippets from teachers everywhere, and yes theyre all true. Even this one. And this one. You would not believe how much tumblr helped me waste time ahem, grow as a person this year. S#@! My Students Write:  Evidence of the true cost of educational funding cuts. 5. Quizzes Interestingly, a great way to counteract the above problem! This year we at released our very own collection of quizzes across hundreds of book titles. And because theyre all developed in-house, these quizzes contain thousands of unique questions geared towards helping students study for their literature tests. Theyre also a pretty fun way to kill a few minutes, or 30 Out of all of releases in 2012, Quizzes iss definitely my favorite, and its an area of the site we expect to grow and grow. If you havent checked it out yet, test your knowledge today to try and beat some of our top quiz takers. 6. TED Talks Okay, I admit, I must seem a little late to the game right now, but omg TED Talks!! I love you. Youre so great, you even made it into one of those futuristic teasers for the Prometheus movie. Where else could I learn about neo-evolution, how to 3D print a human kidney, or about  time-lapse nature photography  all in one place? I also believe that any site that allows you to sort through its video archives by Rated jaw-dropping must contain some very humbling stuff. If youve never visited TED before what are you doing with your life? Get on it now, or better, watch one of my favorite ever talks below: We believe passionately in the power of ideas to change attitudes, lives and ultimately, the world. So were building here a clearinghouse that offers free knowledge and inspiration from the worlds most inspired thinkers, and also a community of curious souls to engage with ideas and each other. Free knowledge for all! (If not a free pass to their annual TED Conferences, which will run you more than the cost of ten Coachella tickets. But hey, thats what the video archives are for.) If youre interested in keeping up to date with all the worlds brilliant ideas, this non-profit organization has a great blog to peruse, too. 7. Books on the Nightstand A podcast I discovered just this year, BOTNS is a great resource to turn to to stay ahead of the latest  book-selling  trends. Hosted by industry insiders Michael Kindness and Ann Kingman, the show offers lots of great conversation on new releases, mostly sorted into various categories (their holiday gift guide does a great job of this, collating best graphic novels, best non-fiction, best childrens lit, and so on into a neat gift-giving manual). Its because of this podcast that I picked up my current read, Age of Miracles, and have a lot more waiting on my Amazon wish list. Check out the show notes on their website  for lots of good end-of-year recommendations, plus info on their annual reading challenge and Booktopia Festival. 8. Twitterature Last but not least, if youve read any of my past posts you may have noticed my growing fascination this year with the idea of Twitterature. I was never a great supporter of Twitter until 2012I knew it was a good publicity tool, yes, but how could it actually work for me in my life? At best, I thought of tweets as glorified Facebook statuses, and the last thing I wanted to read on the Internet were the details of others lives eating chips and looking out windows. I do enough of that on my own, thank you very much. I also dont like this new word we have in our lexicon thanks to Twitter: hashtag. To me, its an ugly word that now, unfortunately, is somebodys ugly name. But I digress In May I encountered Jennifer Egans short story created purely for Twitter, Black Box. The installments, all published as tweets of 140 characters or less, read like a kind of poetry. It struck a chord with meif tweets reveal a persons thoughts, then perhaps narration is perfectly suited to Twitter? Luckily, authors across the world have taken this idea and run with it. At this years Twitter Fiction Festival, I encountered a variety of stories created purely for this new form, from the murder mystery narrated by three party guests Twitter accounts, to a retelling of Hardys  The Turn of the Screw, via the perspective of the nannys tweets. While I still may not hold a Twitter account personally, I am eager to see where this new avenue of literature leads to in 2013, especially in light of the latest Bridget Jones scoop.   Its always exciting to feel in the midst of a big change in the world of literature. Sure, tweeters may not make up the next Romantics, or Beats, or Angry Young Men, but they might, just might, be carving out a new form for a brave new literary world. Well, thats all from me until next year. Happy holidays, and a very happy 2013 to everyone! I hope this new year will be just as exciting as our last.

Sunday, October 20, 2019

KoRn essays

KoRn essays Korn was formed in 1993. There are 5 members, Jonathan Davis, Munky, Head, David Silveria, and Fieldy. As a child, Jon Davis was sexually abused by his father, he has a deep hatred for what his father did to him that he expresses in the song "Daddy" off of the self titled Korn Album. He was a mortitian at the Kern County Morgue. He was 16 when he landed that job. In school he was teased by other kids, and called a "faggot" and a "queer", because of that, he earned his nickname, "HIV", pronounced "hive". Munky and Head, the 2 guitarists, were best friends, and have played together over 2/3 of their lives. Munky lost the top part of his left index finger in an accident, and Head taught Munky to play guitar. They were in LAPD together. David Silveria, the drummer in the group, is the shy member in the band. He had a good childhood and doesn't relate well to most of Korn's lyrics. He has a penis fetish, and when he signs things he usually makes a penis somewhere in it. Fieldy, the bassist, is sort of mysterious, hardly anyone knows his real name, which is Reginald Arvizu, and his past is pretty much unknown as well. On the side he has Fieldy's Dreams, a sort of combination between Rap and Hip-Hop. KoRn was formed as a result of SexArt and LAPD breaking up. Jonathan Davis, Korn's front man was in SexArt, Head, Munky, David, and Fieldy were in LAPD. After the 2 bands split, Jon Davis joined LAPD, and they changed their name to Korn. The name Korn didn't come from Kiddy pORN like Bible-Thumpers like to trick people into thinking. It came from a conversation over heard by Jon Davis while he was in a bar. The conversation was between 2 homosexuals, they were talking about eating eachother's asses, and one had dirahea and shit on the other guys face, and he had eaten popcorn. When the guy who had been shit on opened his mouth there was a corn kernal on his tongue, and every time Jon said corn, the rest of the group a ...

Saturday, October 19, 2019

LEGAL ASPECTS OF HOSPITALITY MANAGEMENT Essay Example | Topics and Well Written Essays - 2000 words - 1

LEGAL ASPECTS OF HOSPITALITY MANAGEMENT - Essay Example Socio-political instabilities in the world can severely affect the growth and profitability of the hospitality industry. Example: during 2009-2012 time period the profitability of most of the businesses in the world declined. Terrorist attacks in the USA, persisting European sovereign debt crisis, conflicts in the Middle East and the economic slowdown in Asia are expected to negatively affect the performances of hospitality industry. However according to the statistical estimations the demand for the hotels and the quality of the hospitality services continued to increase in year 2012. In fact the total number of hotel rooms in the world is expected to reach approximately 30 million and the room stock of hotel chains is expected increase up to 20 million by year 2030 (Slattery, 1999). Moreover, hotel industry is largely associated with the contemporary living styles of the people. Increasing public demand for recreational activities largely contribute to the growth of hotel industry. Therefore the employment opportunities in this industry are secure compared to the other sectors. Diversity of the industry is evident in the types of businesses that are currently operating in the world. Example: Free-Standing Hospitality Businesses (example: Hotels, Holiday centers, Quasi hotels, Cruise ships, Bars and Restaurants), Hospitality in Leisure Venues (example: Casinos, Bingo clubs, Night clubs, Cinemas and Theatres), Hospitality in Travel Venues (example: Airports, Railway stations, Bus stations and Ferry terminals) and Subsidized Hospitality (example: workplaces, Education institutes, Military, Custodial, Retailers) (Slattery, 2002). This report compiles the legal aspects of managing the drowning in hotel swimming pools. Drowning in swimming pools is recognized as a leading cause of unintentional fatal injuries occurring in the United States. Majority of the child deaths in the country are caused by drowning in residential swimming pools. For hoteliers, various aquat ic vessels such as vortex or current pools, wave pools and recreational rivers are valuable income generating opportunities. In general, large numbers of guests are annually attracted to the aquatic sports facilities available in the hotels such as the Disney resorts. A considerable proportion of these guests are children and minor. Therefore the government of the United States has mandated a set of safety requirements for aquatic sports facilities. These safety measures are the internationally recognized minimum requirements for structure, maintenance and functioning of the swimming pools. Following these standards is considered as a legal duty of the public swimming pool managers. This paper evaluates the importance of legal framework which applies to the hotel swimming pools’ security system in the United States. This paper is organized in the following order. â€Å"Background† chapter describes the importance of Aquatic Recreation Facility to hospitality industry a nd the statistical significance of drowning in the United States. â€Å"Literature review† describes the legal framework which is aimed at preventing the drowning related deaths and fatal injuries. Finally, the â€Å"Discussion† chapter scrutinizes the importance of following the swimming pool safety standards and legal implications of neglecting these regulations by hoteliers. Background Importance of the Aquatic Sports Facilities in Marketing Swimming is a very

Friday, October 18, 2019

Micro economics Term Paper Example | Topics and Well Written Essays - 1750 words - 1

Micro economics - Term Paper Example Minimum wage is also controlled by local and state governments, which implies that different states in the US may have different statutory minimum wages. While the statutory minimum wage has significant benefits on workers, it is nevertheless known to have some economic effects on businesses, local employment, and individuals. This paper entails minimum wage in the United States and the associated effects. By July 2009, the US federal government had set an overall minimum wage of at least $7.25 per hour. On the contrary, some municipalities and states in the same country had set minimum wage levels slightly higher than the federal government statutory minimum wage level. In the Washington State for instance, the minimum wage level was set at $9.32 per hour by January 2014 (Washington State Department of Labor and Industries, 2014). Connecticut passed legislation in 2014, on March 26, that advocated for the raise of minimum wage to $10.10 from $8.7 by 2017. It was the first state in the United States to address the call by President Obama to increase minimum wage in the country. Further, Seattle City Council, in Washington passed an ordinance on June 2 2014 to increase the city’s minimum wage to $15 per hour (New York Times Editorial Board, 2014). This legislation placed the city in the topmost position regarding the highest minimum wage in the entire country. The overall minimum in the United States wage has remained as $7.25 since it was re-set in 2009, specifically on July 24. This increase was basically the third and the last step of the US Fair Minimum Wage Act of 2007, which had become a low in 2007, on 25th May. It was held by the Supreme Court that this federal minimum wage was constitutional and hardly exceeds the Commerce Cause’s scope in the United States v. Darby Lumber Co. ( U.S. v. DARBY, 312 U.S. 100 (1941) ). Nevertheless, some of the U.S.

Man on the Moon Real or Hoax Essay Example | Topics and Well Written Essays - 1750 words

Man on the Moon Real or Hoax - Essay Example However, along with this arose innumerous numbers of controversies regarding the legitimacy of the claim. Various theorists and scholars claimed that the entire plot was hoax, and a considerable proportion of people claimed that the whole chapter was genuine. On February 15, 2001, the FOX television network broadcasted the program named Conspiracy Theory: Did We Land on the Moon? The program provided considerable amount of evidence to show that NASA cheated the world by faking moon landings. In We Never Went to the Moon: America’s Thirty Billion Dollar Swindle, Bill Kaysing pointed out that it is irrational to believe that the landing on moon actually took place because according to estimates in late 1950s, the possibility of successfully landing on the moon was just 0.0017%, that is, approximately 1 in 60,000; and in fact, this estimate was done by the Rocketdyne Company that took into account the efficacy of technology that existed at that point of time (7-8). Another serious allegation comes from Ralph Rene, the author of NASA Mooned America. He points out that all American missions before Apollo 11 were detected to have multiple numbers of defects. The scholar points out that the earlier projects had so many technical errors that would have forced American to drop the idea of moon landings and to fake it instead (as cited in Eisen, 378). Similar is the allegation that the poor quality of the images of moon landings is a deliberate effort to prevent others from examining them. Still, the photos available were sufficient to initiate controversy. For example, the pictures presented the astronaut saluting the American flag, and unfortunately, the flag was waving as if in a wind. The point in consideration here is the fact that there is no air or wind on the moon. Yet another major allegation came that when a camera was fitted to the astronaut’s chest, how would this be possible to take such excellent photographs that

DQ1 Essay Example | Topics and Well Written Essays - 500 words - 5

DQ1 - Essay Example The hierarchies are a universal arrangement within organizations. This is for the reason that they imitate a normal as well as common method for individuals to tackle with complication. Forming a chain of command is consequently an ordinary thing to do, up till now it is equally simple as well as intricate. During the past the organizational structures were simple, with one department handling marketing and sales, one department handling distribution and customer service, and the other department working on research and development. The employees were more or less settled in their routines. But, in the present scenario it is pretty unrealistic to have the organizational structure defined above. Each one of the departments has loads to cope up with everyday, larger targets to meet, deadlines to meet, a bigger array of customers to be satisfied. The materialization of fresh technology, goods as well as amplified international rivalry will only assist the alteration that will be required in order to contend. An individual cannot supervise the history however can in no doubt take arraign of the future. The most noteworthy event is the hastening rate of modification for the goods also the growing range of goods presented as a result in compound also varying requirements mutually for individuals as well as for structures. Additionally, the consumers, the suppliers, as well as the technical modernizations keep transforming at spectacular momentum furthermore they have need of nippy reactions in order to defend their associations or else the aggressive positions. The element of efficient partnership within job situations signifies a method of accomplishing aggressive benefit within the market. The concept of effectual association signifies a major aspect of organizing a corporation’s structure. The plans utilized for corporations during the past cannot be utilized specified the burden on todays, a great deal

Thursday, October 17, 2019

Hull City Marketing Strategy Essay Example | Topics and Well Written Essays - 3000 words

Hull City Marketing Strategy - Essay Example Chocolates are commonly used in Christmas time, which presents a good opportunity for Thornton to promote their products. The company continues to adapt new strategies to meet consumer’s needs and be competitive during Christmas time in Hull. It has established various strategic plans for the business to create a competent organizational process, increase its sales and margins, incentives and measurability. Different media channels will be used to promote the campaign slogan â€Å"Christmas time-chocolate heaven†. The slogan will strengthen the image of Christmas time as a great time to celebrate and have a relaxing moment using Thornton’s range of products such as variety of chocolates wedding favors, corporate gifts, and hampers boxes. The case study of the Company will provide an opportunity to evaluate the whole aspect of planning for considerable growth during Christmas time. Table of Contents Executive Summary 2 Table of Contents 2 Introduction 4 SWOT MATRI X 5 11 Marketing Objectives 6 111. Target Markets 7 IV Product Offering 8 V. Brand/Product Positioning 8 VI Marketing Strategies 9 Consumer Behavior 9 Marketing Mix For The Marketing Strategy 10 Product 10 Place 11 Price 11 Promotion 12 Vii Implementation and Control 14 Sales Increase Objectives 14 Increased Product/Brand Awareness Objectives 14 Viii Budget 14 Appendix 15 Appendix 1 15 Appendix 2 17 Appendix 3 17 Appendix 4 17 Available at: Financial Times LTD 2012, Thorntons PLC Markets data: http://markets.ft.com/Research/Markets/Tearsheets/Business-profile?s=THT:LSE 18 Works Cited 19 Introduction Christmas time is an entertaining forum where the concept of gift exchange is much eulogized. It is a season that main waits with expectations as they appreciates and end the year with the loved ones. Indeed, this season raises the need to exchange gifts to the loved ones and as chocolate remains the best gift for someone special. In the British culture, chocolates augment love language and thought as romantic (Hull City, 1961). During Christmas time, most young couple regard exchanging gifts to their partners as a sign of love and appreciation. Particularly, most men pamper their women with gifts as they are beings who are relationship oriented. In most cases, women are given chocolates as presents as it enhances the feeling of being cared, pampered, and loved. Many people believe that there are creative ways of using chocolates in Christmas time besides eating them. For instance, Clayton (2009) believes that it can creatively used in bedroom for sensual treat and a key ingredient of feeling good. Thornton can utilize this to promote their products during Christmas season as a perfect way of showing appreciation to the loved ones and creating a relaxing moment. To promote products, the marketing strategy plan will present a SWOT matrix, identify the marketing objectives along with target group, product/brand positioning, and product offering. Eventually, the compa ny will present the budget implementation and control of marketing planning. This will create a platform to understand the key strategies of being competent during Christmas seasons. In doing this, we will highlight the major competitors of the company to highlight the possible strengths, opportunities, threats and weaknesses of the

The confidence of saudi consumer in the seasonal sale of the Literature review

The confidence of saudi consumer in the seasonal sale of the international brands - Literature review Example Secondary research was chosen as the method of research for this study. This involves using qualitative and quantitative data that has been gathered by other individuals for different purposes. This will be collected through examining the literature surrounding Saudi consumers, international brands and seasonal sales in detail, collating the information and using statistical analysis to look for patterns and trends. There are a number of advantages to secondary research. Firstly, it is cheaper and less time consuming than primary research. This is because the information has already been collected, it is a matter of finding, collating, interpreting and analysing it. Because of this, a larger data set can be examined than is able to be through primary research. Secondary, sometimes secondary research can give more accurate data than can be obtained through primary research. This is because a large amount of data is being collated, which gives a clearer picture than little data, and there may be government surveys or censuses that reach a large number of people that can be taken advantage of. However, it is important to take the original source and context of the data into account wherever possible to prevent accuracy being compromised. The disadvantages of secondary research are that the questions asked in the original research may not correspond to the questions that are being asked through secondary research.... dary research are that the questions asked in the original research may not correspond to the questions that are being asked through secondary research. This can make the results not relevant for the current question, or biased towards one particular part of the population. This problem is amplified by the fact that the context of the primary data is sometimes unavailable. This study has attempted to avoid this problem by incorporating data from a wide range of different sources, aiming for sufficient replication to avoid any bias from one or a few studies. One primary method of research that could be used for this study would be the questionnaires to directly determine the opinions of the consumer population. Questionnaires are a good method of primary data gathering, as they enable sampling of a wide range of people and do not intrude on the population . For this study in particular, there was difficulty obtaining permission to conduct either internet based, or mail based surveys o f the consumer population of Saudi Arabia, and there was concerns that not all of the survey responses would be legitimate, as the culture of Saudi Arabia is very private and the country has strict religious rules . For this reason, and the advantages cited above, secondary research was chosen as the method of data collection for this study. Finding Secondary Sources Once the focus of study and the questions being asked has been determined, the next step in secondary research is to find and collate data. A large amount of data is needed, and generally speaking, the more data is analysed, the more realistic the results will be. For this study secondary sources will be found primarily through the use of internet based search engines, primarily focusing on peer-reviewed items, as these are on

Wednesday, October 16, 2019

DQ1 Essay Example | Topics and Well Written Essays - 500 words - 5

DQ1 - Essay Example The hierarchies are a universal arrangement within organizations. This is for the reason that they imitate a normal as well as common method for individuals to tackle with complication. Forming a chain of command is consequently an ordinary thing to do, up till now it is equally simple as well as intricate. During the past the organizational structures were simple, with one department handling marketing and sales, one department handling distribution and customer service, and the other department working on research and development. The employees were more or less settled in their routines. But, in the present scenario it is pretty unrealistic to have the organizational structure defined above. Each one of the departments has loads to cope up with everyday, larger targets to meet, deadlines to meet, a bigger array of customers to be satisfied. The materialization of fresh technology, goods as well as amplified international rivalry will only assist the alteration that will be required in order to contend. An individual cannot supervise the history however can in no doubt take arraign of the future. The most noteworthy event is the hastening rate of modification for the goods also the growing range of goods presented as a result in compound also varying requirements mutually for individuals as well as for structures. Additionally, the consumers, the suppliers, as well as the technical modernizations keep transforming at spectacular momentum furthermore they have need of nippy reactions in order to defend their associations or else the aggressive positions. The element of efficient partnership within job situations signifies a method of accomplishing aggressive benefit within the market. The concept of effectual association signifies a major aspect of organizing a corporation’s structure. The plans utilized for corporations during the past cannot be utilized specified the burden on todays, a great deal

Tuesday, October 15, 2019

The confidence of saudi consumer in the seasonal sale of the Literature review

The confidence of saudi consumer in the seasonal sale of the international brands - Literature review Example Secondary research was chosen as the method of research for this study. This involves using qualitative and quantitative data that has been gathered by other individuals for different purposes. This will be collected through examining the literature surrounding Saudi consumers, international brands and seasonal sales in detail, collating the information and using statistical analysis to look for patterns and trends. There are a number of advantages to secondary research. Firstly, it is cheaper and less time consuming than primary research. This is because the information has already been collected, it is a matter of finding, collating, interpreting and analysing it. Because of this, a larger data set can be examined than is able to be through primary research. Secondary, sometimes secondary research can give more accurate data than can be obtained through primary research. This is because a large amount of data is being collated, which gives a clearer picture than little data, and there may be government surveys or censuses that reach a large number of people that can be taken advantage of. However, it is important to take the original source and context of the data into account wherever possible to prevent accuracy being compromised. The disadvantages of secondary research are that the questions asked in the original research may not correspond to the questions that are being asked through secondary research.... dary research are that the questions asked in the original research may not correspond to the questions that are being asked through secondary research. This can make the results not relevant for the current question, or biased towards one particular part of the population. This problem is amplified by the fact that the context of the primary data is sometimes unavailable. This study has attempted to avoid this problem by incorporating data from a wide range of different sources, aiming for sufficient replication to avoid any bias from one or a few studies. One primary method of research that could be used for this study would be the questionnaires to directly determine the opinions of the consumer population. Questionnaires are a good method of primary data gathering, as they enable sampling of a wide range of people and do not intrude on the population . For this study in particular, there was difficulty obtaining permission to conduct either internet based, or mail based surveys o f the consumer population of Saudi Arabia, and there was concerns that not all of the survey responses would be legitimate, as the culture of Saudi Arabia is very private and the country has strict religious rules . For this reason, and the advantages cited above, secondary research was chosen as the method of data collection for this study. Finding Secondary Sources Once the focus of study and the questions being asked has been determined, the next step in secondary research is to find and collate data. A large amount of data is needed, and generally speaking, the more data is analysed, the more realistic the results will be. For this study secondary sources will be found primarily through the use of internet based search engines, primarily focusing on peer-reviewed items, as these are on

Ethical Theories Essay Example for Free

Ethical Theories Essay Moral dilemmas are a part of daily life and the solutions presented to them are usually dependent on the ethics that govern the individual facing them. Every person at one point in time has been faced with a moral dilemma. This can be described as the values which are used to determine the right way to handle a situation and the wrong way to go about it. Each society and community has its own moral index and in some societies, an action may be viewed tolerable or right, while the same action in another community would be viewed as intolerable and frowned upon. The moral index of a society usually goes hand in hand with religious beliefs and communities which are religiously inclined to have strict rules on what is suitable behaviour and what is not. Societies which have more secular values usually tolerate extreme or eccentric behavior. The difference in opinions of different people in what is normally right and wrong has led to the development of various ethical theories. Two of these theories are utilitarianism and duty ethics. An example of a situation which brought about different ethical stand points is the Firestone Company tire recall in 1999 and 2000. The company had discovered that its newly designed firestorm Radial ATX, ATX II and Wilderness AT tires were defective back in 1996, after 8 of the 18 times were singled out after they failed a test that tested the endurance of tires under high speed. Of the 14. 4 million tires sold approximately 6. 5 million tires had to be recalled due to defects in the details which involved the tread and one steel belt separating from the other steel belt and carcass The details has led to serious and even fatal accidents as the cars overturned when the accidents occurred while they were in motion. In an attempt to show difference between utilitarianism and duty ethics we shall consider an engineer working for the company at the time and the stand he or she would take if they subscribed to utilitarianism or duty ethics Utilitarianism can be described as an ethical theory that proposes that the action that brings good or favorable consequences to the majority is not subject to whether it is right or wrong meaning it is not subject to questioning. (Fredrick,2003) This theory was greatly championed by utilitarians such as John Stuart Mill. This theory advocates for actions that produce happiness to the greatest or largest number of people. In an ideal situation this may be possible but usually any action can produce happiness to many or a few people depending on the action. The theory does not usually advocate for the use of ethically correct actions at all times and thus actions which may be viewed as wrong sometimes bring happiness to a large group of people but the actions still remain morally wrong. An engineer subscribing to the utilitarianism way to life would have supported the company stand and the action it took. The company discovered that some tires were defective and did not recall the rest of the tires that had already been sold. This lead to accidents which caused suffering and death and it was not until an investigation into the cause of the accidents that finally forced the Firestone Company to admit liability and recall the tires. The company did not recall the tires because it feared the losses that it would face incase the tires were all defective. The company chose to protect their profits margins at the expense of their clients. (Little, 2003) As an engineer with a utilitarianism view point this action would be the best because recalling would mean great losses and downsizing in terms of job which would mean unemployment for many people working at the company affecting both them and their dependants. The duty ethics proposes that the action taken in any situation should be just and honest and respectful to all persons involved. This ethical principle advances for the upholding of principles regardless to the wrong consequences whether they will be good or bad. (Graham,2004) An engineer working for the Firestone Company would have chosen to recall all the defective tires and conducted a through investigation to the causes of the defaults without external pressure or the threat of law suits as inducement. The engineer moral compass would have guided them to make such a stand regardless to the fallout which is this case would have resulted in major losses to the company. As per the requirements of the engineering profession, this mechanical engineer was ascribed to some basic fundamental ethics and the relevant professional codes of conduct while in the jurisdiction of their duty. These are guidelines aimed at providing safety standards for the engineers while at work and the common good of the society. However, the same was objectively inadequate in the Firestone’s case. As a basic requirement, they should exercise their professional skills and also knowledge in providing contentment in the general human life. Impartiality and honesty should prevail in their service where fidelity to the public should never be compromised above that of clients and also employers. Elsewhere, engineers should pursue a continued development in their profession and bring service to their different clients without any conflict. These are the basic fundamentals of mechanical engineers whose proficiency is provided by the support of the canons of mechanical engineering. In conclusion the moral stand point taken by any individual should always be after requiring all the necessary information. This is because in every decision made, there are always individuals who love and those who benefit. As in the Firestone, the recalling decision would have resulted in loss. After careful evaluation one should decide on the decision that brings minimal losses in the involved activity.

Monday, October 14, 2019

Dcf Distributed Coordination Function Computer Science Essay

Dcf Distributed Coordination Function Computer Science Essay Fragmentation It is the process used in MAC IEEE 8021.11 to break ­ing apart a packet into smaller pieces. Fragmentation is process that dividing long frame to several shorter frame. Using this technology because the Wireless LANs have high bit error rates. The probability of losing frame is much higher for wireless links. The 802.11 uses fragmentation to reduce the frame error rate. The PCF is supporting sensitivity traffic and support some high priority application. Therefore the real time application data need to transmitted without any delay. The probability of lost frame is much higher for wireless links. Thats why fragmentation is used to Reduces amount of time medium is in use and Reduces probability of collisions. And there some pervious work has been done which related to our title, will be shown in next sections. Acknowledgment: Acknowledgments the patience and support of my family was the biggest help in the completion of this project. And would also like to acknowledge for my supervisor Mr.Manssor Ali and for module tutor Prof. Vallavarj, and module leader Mr. Vijay Krishna, for their guiding. Also, I would like to thank the project coordinator Ms. Pravenna , for encouraging me to complete this work and my study. Nomenclature MAC: Medium Access Control. DCF: Distributed Coordination Function. PCF: Point Coordination Function. AP: Access Point. BSS: Basic Service Set. IBSS: Independent Basic Service Set. ESS: Extend Service Set. RTS: Request To Send. CTS: Clear To Send. ACK: Acknowledgement. OSI: Open System Interconnection. LLC: Logical Link Control. HTTP: Hyper Text Transfer Protocol NAV: Network Allocation Vector. DSSS: Direct Sequence Spread Spectrum. Contents Page Contentsà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. Page No Abstractà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. i Acknowledgementà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ii Nomenclatureà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..iii Contents pageà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..iv List of figuresà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦v Chapter 1: Introductionà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦7 1.1) General Informationà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..7 1.2) Aim Of the projectà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦7 1.3) Project Objectiveà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..8 1.4) Honors challengesà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.8 Chapter 2: literature Review..9 Backgroundà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..9 IEEE MAC 802.11physical layerà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦10 what is Fragmentation.10 Why we are using this Technology.12 The advantages and disadvantages of fragmentation..12 Distributed Coordination function (DCF)13 Fragmentation Operation.14 Point Coordination function (PCF)à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..15 Analysis The earliest work in data fragmentation IEEE802.1116 Chapter 3 Literature Review analysis..19 solutions for all above problems.19 Future Work..20 Chapter 4 Research Problem.21 Chapter 5 Design and Experiment Setupà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..22 Chapter 6 Conclusionà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.23 Chapter 7 Referencesà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.25 List of figures Figure name Page No. Figure (1) Independent Basic Service Set(IBSS)à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 11 Figure (2) Infrastructure Basic Service Set à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 11 Figure (3) Fragmentation The RTS/CTS access methodà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. 13 Figure( 4) MSDU divided into several MPDUà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 14 Figure (5). Combination DCF PCF. 15 Figure (6) The effect of (polling overhead )on network throughput17 Figure (7),Effect of fragmentation. 18 Figure (8), WLAN Setup diagram in OPNETà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. 22 Chapter 1 Introduction 1.1) Aim: Study on the effect data fragmentation on the performance of IEEE 802.11 wireless LAN under PCF mode.fragmentation used to increase reliability transmit frame by divide 802.11 frames into smaller pieces (fragments) that are sent separately to the destination. 1.2) The objectives in this paper will be as follows: 1)The first objective in this paper will be understand the Theory and different standards of IEEE 802.11. 2)To understand the what are structure of the wireless network 3)To evaluate and analyse the effect data fragmentation on the performance of IEEE 802.11 wireless LAN under PCF mode. )Selection for suitable simulation tool4 5)To design suitable WALN with appropriate settings 6)Study the critical evaluation of the result. 1.3) Honours challenge: Critical analysis and evaluation of the results. Experimental Investigation of existing work. 1.4) General Information: The motivation i select this project title , is because in my organization they are looking for wireless network technology ,which can provide such applications like for delivering traffic for real-time applications such as Voice and data . Therefore IEEE 802.11 under point coordinate function PCF can satisfy the requirement, we will see that later. wireless local area network (WLAN), make people on the move to communicate with anyone and anywhere at anytime Caledonian college is one best example which is providing wireless service inside the college camps which allows the student to share data and web brows. The IEEE 802.11 WLAN has two different type of method channel accessing ,the distributed coordination function (DCF) and point coordination function (PCF). DCF is based on the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism, while PCF is based on using the polling technique. The DCF mode of operation consists of two techniques for packet transmission. In the default its operate as a two-way handshaking technique where a positive acknowledgment is transmitted by the receiver station. (Stallings, 2007) . Fragmentation It is the process of break ­ing apart a packet into smaller pieces. A source (wireless Network Interface Card or access point) uses for fragmentation is to divide 802.11 frames into smaller pieces (fragments) that are sent separately to the destination. The fragments are all marked in a way that allows the destination device to put them back together again after it gets all the fragments. 1.5)The some of earliest work in data fragmentation IEEE802.11: Dynamic Fragmentation Scheme fro Rate -Adaptive WLAN.[7] Improving the Aggregate Throughput of Access Points in IEEE802.11Wireless LANs[26]. Performance Analysis of Packetized Voice Transmission with PCF in IEEE802.11Wirelessnetwork.[27] Delay Analysis of IEEE 802.11 PCF MAC based Wireless vetworks.[28] Performance Evaluation of the IEEE 802.11 Wireless LAN Standards [6]. Performance Enhancement of Wireless Local Networks. [20] Chapter 2 Literature Review Before we will go in depth of our title on data fragmentation under PCF mode , we must understand The basic building block of the WLAN network in IEEE 802.11., And our first objective will be covered in this section. 2.1) Background: In this section we will be discussing about wireless local area network (WLAN), which make people on the move to communicate with anyone and anywhere at anytime Caledonian college is one best example which is providing wireless service inside the college camps which allows the student to share data and web brows ,but increasing demand on portable computer for example Laptops and increasing communication equipment, its has responsibility of increasing in wireless network service. As we know this technology is working under protocols to control the service between users. Each type of wireless data network operates on a specific set of radio frequencies. For example, most Wi-Fi networks operate in a special band of radio frequencies around 2.4 GHz that have been reserved in most parts of the world for unlicensed point-to-point spread spectrum radio services. Other Wi-Fi systems use a different unlicensed band around 5 GHz. (Ross , 2008) ) IEEE MAC 802.11physical layer are defined in three type:2.2 Direct sequence spread spectrum (DSSS):its operating in the 2.4 GHz band at data rate of 1Mbps and 2Mbps, the number of channels available depend on the bandwidth. Frequency hopping spread spectrum(FHSS): operating in 2.4GHz at data rates of 1Mbps and 2Mbps, the available channel range is 23 in japan,70in USA. Infrared : data rate is 1Mbps and 2Mbps operating at a wavelength between 850and 950 nm. For IEEE 802.11 there are different standards as we can see ,but my study will be based on IEEE 802.11:[4] à ¢Ã¢â€š ¬Ã‚ ¢ IEEE 802.11: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Medium Access Control (MAC), and 1 and 2 Mbps for DSSS, FHSS in 2.4 GHz band, and Infrared, ratified in 1997. à ¢Ã¢â€š ¬Ã‚ ¢ IEEE 802.11a: Works at 6, 9, 12, 18, 24, 36, 48 and 54 Mbps in 5GHz band, ratified in 1999. à ¢Ã¢â€š ¬Ã‚ ¢ IEEE 802.11b: Works at 5.5 and 11 Mbps in 2.4 GHz band, ratified in 1999. à ¢Ã¢â€š ¬Ã‚ ¢IEEE 802.11e: MAC enhancements for Quality of Service (QoS), work ongoing.( Stallings,2005) 2.3) There are four physical components standards for 802.11 network : Access point- Station- -Wireless Medium -Distribution System The basic structure block ,of the WLAN network is the 802.11 basic service set (BSS). A BSS defines a coverage area where all stations within the BSS connected. There are Two BSS network topologies: Independent BSS (IBSS) Networks Infrastructure BSS Networks The first one, In the independent BSS network stations, as it shown in figure(1) are communication directly with each other. Also its called the IBSS as ad-hoc network, used to communicate all station in infrastructure network together . An ad -hoc network operates from one station to another station immediately, without any help from other device, thats mean no need for permission to access. This operation is working by using the independent basic service set(IBSS) . Figure (1) :Independent Basic Service Set(IBSS) Second an Infrastructure Basic Service Set(BSS) as we can see in figure, (2) is a type of IEEE 802.11 network consists from stations and access point(AP), which are used to communicate all stations by (BSS).This will work when first station is sending the information to AP and than the AP forward this information to station which let the information pass to a wired node and the AP passes to fixed network. This available at (http://msdn.microsoft.com/en-us/library/ff556962(VS.85).aspx) Figure (2):Infrastructure Basic Service Set (http://msdn.microsoft.com/en- us/library/ff556962(VS.85).aspx) 1] what is Fragmentation? and 2] Why we are using this Technology? 2.4) what is Fragmentation? In this section we understand the Fragmentation It is the process of break ­ing apart a packet into smaller pieces. Fragmentation is process that dividing large frame into several shorter frame. Each fragment consists of a MAC Layer header and frame check sequence (FCS), and a fragment number representing its ordered to position within the frame. Because the source station transmits each fragment independently, the receiving station reply with separate acknowledgement for each fragment (Yuguang and Kwon,2003 ) . All fragments are generate with equal size at same time, and all fragments will not change until they are transmitted in both PCF and DCF. 2.5) Why we are using this Technology? Using this technology because the Wireless LANs have high bit error rates. The probability of lasing frame is much higher for wireless links. 802.11 uses fragmentation to reduce the frame error rate. 2.6)The advantages and disadvantages of fragmentation: Advantages : To reliability of data exchange between the stations. The uses fragmentation to reduce the frame error rate and fragmentation for larger sized packets improves . Disadvantage: fragmentation will increase the overhead. (Tamer Khatteb,2009) 2.7) Distributed Coordination function (DCF) In 802.11, DCF also provides an optional way of transmitting data frames that involve transmission of special short RTS and CTS frames to the transmission of actual data frame. As shown in Fig(.3) an RTS frame is transmitted by a station, which needs to transmit a packet. When the destination receives the RTS frame, it will transmit a CTS frame after SIFS interval immediately following the reception of the RTS frame. Figure(3) Fragmentation The RTS/CTS access method (Anon.,2003) The source station is allowed to transmit its packet only if it receives the CTS correctly. Note that all the other stations are capable of updating the NAVs based on the RTS from the source station and the CTS from the destination station, which helps to combat the hidden terminal problems In fact, a station able to receive the CTS frames correctly, can avoid collisions even when it is unable to sense the data transmissions from the source station. If a collision occurs with two or more RTS frames, much less bandwidth is wasted when compared with the situations where larger data frames in collision.(Haitao ,et al.,2002) 2.8) The Fragmentation operation: A 802.11 data link layer is divided in two sub layers Logical Link Control (LLC) and Media Access Control(MAC). In 802.11, a MAC service data unit (MSDU) could be divided into a sequence of smaller MAC protocol data unit (MPDUs) as it (shown in figure 4). Fragmentation creates MPDUs smaller than the original MSDU length to increase the reliability, by increasing the probability of successful transmission of the MSDU in cases where channel characteristics limit reception reliability for longer frames. Fragmentation is able at each immediate transmitter. The process of combine MPDUs into a single MSDU is called as defragmentation . Defragmentation is adept at each immediate destination Only MPDUs with a unicast receiver address will be fragmented. Broadcast multicast frames shall not be fragmented even if their length exceeds a Fragmentation Threshold When a directed MSDU is received from the LLC with a length greater than a Fragmentation Threshold the MSDU shall be fragmented. The MSDU is divided into MPDUs. Each fragment is a frame no larger than a Fragmentation Threshold. (Yuguang and Kwon,2003 ). Figure( 4) MSDU divided into several MPDU. (Yuguang and Kwon,2003 ). ) Point Coordination function (PCF):2.9 PCF is working in combination with DCF as it shown in figure (5). PCF works suitable for high traffic load, In PCF, the AP acts in the role of the point coordinator, and it controls the medium access, If point coordinator hears there is no traffic after PIFS time gap, it sends out beacon frame Field to indicate length of time that PCF (polling) will be used instead of DCF (contention) during this time.(Stalling,2008) receiving stations must stop transmission for that amount of time The period during which PCF operates is called the contention-free period (CFP). Before the CFP begins, the AP operates under DCF, but it makes use of the priority inter-frame space (PIFS) to take hold the medium, and then sends out a beacon packet containing the duration of the CFP.(Stalling,2008) Figure (5). combination DCF PCF .(Stalling,2008) The fragmentation operation in PCF is same as DCF,but in PCF conation free period making different ,but because the DCF working with Contention period (CP) and PCF working with Contention free period(CFP) . (Yuguang Kwon,2003 ). There are some limitations on PCF which directly effetely the fragmentation, one of these limitation is the binary exponential back off , the frame need to wait even the medium is free ,because the binary exponential back off will double the random number from 15 to 1023 till the medium will be free, so this can effect the retransmit the frame in fragmentation . Other limitation in PCF has been designed to support time-limited for poor QoS performance. In particular the central pooling scheme is inefficient and complex which causes fall of the performance of PCF high-priority traffic under load, when a free station is allowed to send a frame of length between 0 and 2346 bytes, it introduce the difference of transmission time. (Dillip.2006). 2.1.0)Analysis The earliest work in data fragmentation IEEE802.11: In this section we will analysis ,In this paper(Abhishek,2003) we can analysis that polling in PCF causes overhead . In PCF, point coordinator (PC )is a central coordinator that schedules channel access for all other polling able stations in CFP. PC maintains list of poll able nodes in BSS. At beginning of CFP it polls all stations in Round Robin fashion. Nodes receiving poll respond back, either by transmitting data or there is no data frame. If station has no pending data, then it sends no frame. If station fails to do either then its result in polling time out at PC and PC resumes polling. When most stations have pending data, in order polling provide to ordered channel access and this can reduces collisions. But when few stations have pending data and rest are silent, this polling operation becomes major overhead, It adds unnecessary delay for stations with data, due to unsuccessful poll attempts for stations, with no pending data. For this reason resulting in throughput decreasi ng. Form the figure(6) we compares the overall throughput of network with 32 and 64 nodes having 16 nodes that have data to transmit. We can analysis that Effect of polling overhead is clearly visible(Abhishek,2003) Figure 6: the effect of (polling overhead )on network throughput From this paper, we can find the solution for pervious paper (Abhishek ,2003),by analysis that the overhead in PCF fragmentation is high ,so instead of allowing the transmission of multiple packets with a high data rate ,its possible to make MPDU large size to reduce the overheads caused by multiple packets transmission when channel condition is good. In Literature Review analysis we can describe it more clear(Yuguang and Kwon,2003 ). As we understand from this paper, that voice packets transmitted by use of PCF mode ,According to our analysis, PCF mode can well support packetized voice transmission using echo canceller fragmentation ,when the load are fragmented into small packets ,large fragment size such as 2000 or 2304 bits dose favour to voice traffic at the available bandwidth for data transmission.(Xiyan,al.,2003) In this paper ,we can analysis that, they propose a new rate adaptive MAC protocol with adynamic fragmentation. The major advance is the use of multiple fragmentation thresholds, for different rates to generate a new fragment from (remaining) MSDU only after the rate for next transmission is selected. With this scheme, the nodes with good channels can transmit more data than the ones with bad channel.( Byung,al.,2005) In this paper ,several methods been used to improve wireless network performance ,the result indicate as we can see in the figure (7),that the effect of fragmentation threshold can increase throughput and improve the wireless network performance, but how, the answer is when the bit error rate selected to be and the fragmentation threshold to be 256 bytes or 512 bytes, the result show that there is no any major effect on the network performance.(Walid Ajlouni,2006) figure (7),Effect of fragmentation, ( Walid Naim,2006) This paper ,proposes an adaptive control algorithm to tune the performance of IEEE802.11wireless LANs, so that traffic demands with different characteristics will be handled mostly by the MAC protocol that fits them. The algorithm aims is control the percentage of CFP duration within a super frame by measuring the throughput in PCF mode.(James,al.,2003) Chapter 3 Literature Review analysis T In this section we will be analysis ( 3.1 he out come from literature Review analysis: -Fragmentation It is the process of break ­ing apart a packet into smaller pieces. Fragmentation is process that dividing long frame to several shorter frame, Each fragment consists of a MAC Layer header, frame check sequence (FCS), and a fragment number indicating its ordered position within the frame. (Yuguang Kwon,2003 ). -The main reason we are using fragmentation is because the Wireless LANs have high bit error rates. -The period during which PCF operates is called the contention-free period (CFP). When most stations have pending data, in order polling provide ordered channel access and reduces collisions. But when few stations have pending data and rest are silent, this polling mechanism becomes major overhead, It adds unnecessary delay for stations . There are some limitations on PCF which directly effetely the fragmentation, one of these limitation is the binary exponential back off , the frame need to wait even the medium is free ,because the binary exponential back off will double the random number from 15 to 1023 till the medium will be free, so this can effect the retransmit the frame in fragmentation .(Class lecture ,Simulation Network Multimedia) 3.2 ) What will be solutions for Some Of above problems: 1) When there will be high overhead in PCF fragmentation is, so instead of allowing the transmission of multiple packets with a high data rate ,its possible to make MPDU large size to reduce the overheads caused by multiple packets transmission when channel condition is good. 2) when the bit error rate selected to be or the fragmentation threshold to be 16 bytes or 256 bytes, the result show that there is no any major effect on the network performance, so this maybe will be one of in our design and experiment we will select the above bit rat error than simulated it and observe the result.( Walid Naim,2006) 3) We go for IEEE 802.11e which introduces new coordination function called as a Hybrid Coordination Function (HCF) that is only useful for QoS network. The HCF supports channel access mechanisms, Enhanced Distributed Channel two additional Access (EDCA) for contention-based and HCF Coordination Channel Access (HCCA) for contention-free. And this stander will solve all problem with Polling and CW, which effect on fragmentation in PCF. ) Future Work:3.3 During my research i found that there is new standard been developed in 2007 , it know as IEEE 802.11e. To the best of our knowledge, there is very little literature , that deals with polling overhead in PCF .Other People have mentioned the problem earlier and there also come with some proposed solution to deal with it. also that people have mention the importance of polling for providing QoS service in IEEE 802.11 WLAN. New upcoming standard for QoS, IEEE 802.11e its called HCF (Byung,al.,2005) Chapter 4 Research Problem As i mention earliest the reason of selecting the study of data fragmentation effect in IEEE 802.11 under PCF mode is , is because in my organization they are looking for wireless network technology ,which can provide such applications like for delivering traffic for real-time applications such as Voice and data. There are some limitations on PCF which directly effetely the fragmentation, one of these limitation is the binary exponential back off , the frame need to wait even the medium is free ,because the binary exponential back off will double the random number from 15 to 1023 till the medium will be free, so this can effect the retransmit the frame in fragmentation . There for i found that IEEE 802.11 under PCF mode ,will not satisfy my Chapter 5 Design and Experiment Setup In This section i will be doing simulation , by using OPNET software as we can see in figure (8) to design and evaluate the performance of the IEEE 802.11 MAC protocol for wireless LANs. The aim of the project is to study the effect of data fragmentation in IEEE802.11under PCF mode. The main objectives of this experiment is to Study the effect of data fragmentation in PCF by choosing different bit rate error and observe the major effect on the network, as we analysis that using low bit error rate ,and give fragmentation value 256 bytes or 512bytes ,the result must show that there will be will no effect on the data transmission or on network performance. We can also do measuring response time (seconds) for PCF with 256 fragmentation and fixed data rate 5.5Mbps, and for page response time (seconds) for PCF with 256 fragmentations with fixed data rate 11Mbps.Finaly Compare the result obtain. Figure 8: WLAN Setup diagram in OPNET Chapter 6 Conclusion During my working in this project I have identify the effect of data fragmentation in IEEE802.11 under PCF in wireless network. I come out that this standard will help me in my organization to be used in library office only. The probability of lost frame is much higher for wireless links. Thats why fragmentation is used to Reduces amount of time medium is in use and Reduces probability of collisions .The IEEE 802.11 WLAN has two different channel accessing mechanisms, namely, the distributed coordination function (DCF) and point coordination function (PCF). We understand that When most stations have pending data, sequential polling provide ordered channel access and reduces collisions. But when few stations have pending data and rest are silent, this polling mechanism becomes major overhead, It adds unnecessary delay for stations with data. Also we understand that when there will be high overhead in PCF fragmentation is, so instead of allowing the transmission of multiple packets with a high data rate ,its possible to make MPDU large size to reduce the overheads caused by multiple packets transmission when channel condition is good. Anew standard has been developed in 2007 , it know as IEEE 802.11e. which support QoS. and can solve polling overhead in PCF. The References Books : Stalling,W.William.,2008.Data and computer communications 8 ed published by Dorling Kindersly(India) Pvt,LTD 482, F.I.E Delhi, India. Stalling, W,Willim., 2008, Wirless communications Network second ed published by Asoke K. Ghosh (India) Delhi, India. E-Books: Ross, John.,2008. Book of Wireless : A Painless Guide to Wi-Fi and Broadband Wireless (2nd Edition). San Francisco, CA, USA: No Starch Press, Incorporated, p 15. Available at: http://site.ebrary.com/lib/caledonian/docDetail.action?docID=10218384p00 =a%20painless%20guide%20wi-fi%20broadband%20wireless%20(2nd%20edition). Journal Papers: Tamer, M Samir ,K .,2009.Performance Analysis of Wireless Local Area Networks ,WLANs A thesis submitted to the Faculty of Engineering at Cairo University in partial fulfillment of the requirement for the degree ofMASTER OF SCIENCE. Yoon Hougwon Kim Jeonge. ,2003. Data fragmentation scheme in IEEE 802.15.4 wilerlss sensor network, Department of computer Scinse and Engieenring , Korea Unifersity Dillip, K., 2006.Quality of Service Provisioning with modified IEEE 802.11 MAC Protocol, Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Orissa, India Byung,S, Younggoo, K. ,2003.Throughput Enhancement Through Dynamic Fragmentation in Wireless LANs ,Student Member, IEEE, Yuguang Fang, Senior Member, IEEE, Tan F. Wong, Senior Member, IEEE. Abhishek ,G. , 2003.Dynamic Adaption of DCF and PCF mode of IEEE 802.11 WLAN, School of Information Technology, Indian Institute of Technology, Bombay . Xiyan, M ,Tamio, S.,2003.,Performance Analysis of Packetized Voice Transmission with PCF in IEEE802.11Wirelessnetwork, Dept. of electronic Engineering .Tsinghu University ,Beijing ,China.2003. Shakil ,A.,2007. Effect of Fragmentation in WLAN Systems with Interference Problems. College of Information Technology University. [emailprotected] .UAE James X.Dong,S.,2004 Mustafa Ergen Improving the Aggregate Throughput of Access Points in IEEE 802.11 Wireless LANs, and Anuj Puri Department of Electrical Engineering Computer Science University of California at Berkeley. Ziouva E. and Antonakopoulos T.2003., Efficient Voice Communications over IEEE802.11 WLANs Using Improved PCF Procedures. Walid ,HNaim ,A.,2006 Performance Enhancement of Wireless Local Area Networks,Dept. of Computer Science,Amman Arab University for Graduate Studies,P 0 Box 2925, Amman 11821, Jordan. Web Page:URL http://msdn.microsoft.com/en-us/library/ff556962(VS.85).aspx