Tuesday, August 25, 2020
Biography of Carl Sagan, Astronomer of the People
Life story of Carl Sagan, Astronomer of the People Stargazer and creator Carl Sagan (November 9, 1934 - December 20, 1996) burst into open cognizance as the star and maker of the TV arrangement Cosmos. He was a productive specialist in astronomyâ as well as a science popularizer who looked to teach general society about the universe and the estimation of the logical method.â Early Years Conceived in Brooklyn, New York, Sagan grew up with a solid enthusiasm for the planets, stars, and sci-fi. His dad, Samuel Sagan, moved based on what is currently Ukraine and functioned as an article of clothing laborer. His mom, Rachel Molly Gruber, supported his incredible enthusiasm for science. Sagan regularly refered to his folks impact on his profession, saying that his dad affected his creative mind and his mom asked him to go to the library to discover books about stars. Proficient Life In the wake of moving on from secondary school in 1951, the youthful Sagan headed the University of Chicago for a degree in material science. At the University of Chicago, he partook in science research about the structure squares of life. He proceeded to win a Ph.D. in space science and astronomy in 1960. Sagan left Illinois and started working at University of California - Berkeley, where he worked with a group toâ build an instrument for a NASA crucial Mars called Mariner 2. During the 1960s, Sagan moved to Harvard University, where he worked at the Smithsonian Astrophysical Observatory. There, he concentrated his exploration all the more intently on planetary science, with a specific enthusiasm for Venus and Jupiter. Sagan later moved again to Cornell University, where he filled in as chief of the Laboratory for Planetary Studies. Sagans work with NASA proceeded. He was a foremost consultant for the Viking missions and chipped away at the arrival site determination. He additionally was instrumental in an undertaking to put messages from humankind on board the Pioneer and Voyager tests to the external close planetary system. In 1976, he becameâ the David Duncan Professor of Astronomy and Space Sciences, a seat he held until his demise. Examination Interests and Activism All through his profession, Carl Sagan remained profoundly intrigued by the chance of life on other worlds.â Throughout his work with NASA and the U.S. space program, he energetically advanced the thoughts behind the quest for extraterrestrial knowledge, casually known as SETI. Sagan worked onâ several communitarian tests, which at last showed that, when presented to bright light, blends of amino acids and nucleic acids could be created inâ conditions much like those of early Earth. Carl Sagan directed early examination on environmental change. One of his investigations indicated that the high temperatures on the outside of Venus could be ascribed to a runaway nursery impact. All through his profession, Sagan proceeded with his logical exploration, at last distributing in excess of 600 papers. All through his work, he pushed for logical suspicion and sound thinking, advancing doubt as an option in contrast to conviction frameworks of governmental issues and religion. Sagan was alsoâ an hostile to war extremist. Heâ studied the expected effect of atomic war and upheld for atomic demilitarization. Science as a Way of Thinking As an ardent doubter and skeptic, Sagan advanced the logical technique as an instrument for better understanding the world. In his bookà Demon-Haunted World, he spread out techniques for basic reasoning, deconstructing contentions, and testing claims. Sagan distributed various other science books focused on a lay crowd, including The Dragons of Eden: Speculations on the Evolution of Human Intelligence, and Brocas Brain: Reflections on the Romance of Science.â â â In 1980, Carl Sagans:à Cosmos: A Personal Voyage debuted on television.à The debut transformed Sagan into a notable science popularizer. The show was focused on a general crowd, with eachâ episodeâ focusing on an alternate part of logical disclosure or exploration.à Cosmosà received two Emmy Awards.â Later Years and Legacy During the 1990s, Carl Sagan was determined to have a blood condition called myelodysplasia. He got three bone marrow transplants and progressing treatment, proceeding to chip away at his examination and composing even as the condition exacerbated. At age 62, Sagan kicked the bucket of pneumonia related with his condition. Sagan left an enduring heritage in the fields of space science and science training. A few honors for science correspondence are named after Carl Sagan, included two given by the Planetary Society. The Mars Pathfinder area on Mars is named the Carl Sagan Memorial Station.â Carl Sagan Fast Facts Complete Name: Carl Edward SaganKnown For: Astronomer, writer, and science popularizerà Born: November 9, 1934 in Brooklyn, New York, USADied: December 20, 1996 in Seattle, Washington, USAEducation: University of Chicago (B.A., B.S., M.S., Ph.D.)Selected Works:à Cosmos: A Personal Journey,à Demon-Haunted World,à The Dragons of Eden,à Brocas BrainKey Accomplishments:à NASA Medal of Honor (1977), Emmy Award for Outstanding Personal Achievement (1981), created 600 logical papers and many mainstream science articles and books.Spouse Name:à Lynn Margulis (1957-1965), Linda Salzman (1968-1981),à Ann Druyan (1981-1996)Childrens Names: Jeremy, Dorion, Nick, Alexandra, Samuelà Famous Quote: Extraordinary cases require phenomenal proof. Sources and Further Reading Kragh, Helge. ââ¬Å"Carl Sagan.â⬠Encyclopã ¦dia Britannica, Encyclopã ¦dia Britannica, Inc., 27 Oct. 2017, www.britannica.com/life story/Carl-Sagan.à Head, Tom. Discussions with Carl Sagan (Literary Conversations), University Press of MIssissippi, 2006.à Terzian, Yervant, and Elizabeth Bilson. Carl Sagans Universe. Cambridge University Press, 2009.
Saturday, August 22, 2020
Actions that Nurses Can Take To Maintain Skin Integrity Assignment
Moves that Nurses Can Make To Maintain Skin Integrity - Assignment Example To abstain from situating customers on locales of skin hindrance, and at whatever point conceivable, the customer ought to be turned at regular intervals. They can likewise utilize the suitable and affirmed situating gadgets. They ought to abstain from utilizing covers, sheets, and towels as paddings. They are typically incapable in dispersing pressure and can prompt grating. Rather, defensive cushioning and movies ought to be utilized. To move patients with care to forestall the unsafe effects of mechanical powers, for example, shear, grating, and weight (Wadlund 2010) Nurses should execute a reported treatment plan for locales of skin debilitation. The composed arrangement guarantees consistency in the consideration given. Medical attendants can utilize topical medications that keep up clammy situations for wound mending. They should asses the patientsââ¬â¢ healthful status and foundation the essential dietary enhancements. This should be possible with the assistance of a nutrit ionist. To be mindful so as not to open skins to temperatures above 42oC when utilizing pressure guideline gadgets
Tuesday, August 11, 2020
What Im doing this IAP
What Iâm doing this IAP IAP is a concept I didnât really understand until last month, oops. The way that MITâs academic calendar works is that the Fall semester is from September to December, while the Spring semester is from February to May. In between the two semesters, during January, is Independent Activities Periodâ"this glorious month of fun classes and activities. Itâs kind of hard to describe IAP because people are just doing wildly different things during it. Some of my friends chose to have an extended winter break and spend more time at home, or travelling. Some of my friends are doing an externship, which is the term for an internship that happens over IAP. Some of my friends are doing GTL, where you go to another country to teach high school students. I applied for externships and GTL, but didnât really get accepted anywhere. But thatâs fine, because there are lots of cool things happening here on campus too! Like: Classes Many of my friends on campus are taking classes! While there are classes, they arenât really normal classes. Some differences between normal classes and IAP classes include: Scheduling. IAP classes are a month long, or less. So the classes happen over a shorter time frame. The scheduling of classes are also different. Some classes meet at a certain time two or three days of the week, for the whole month, like normal classes. One example is 6.S087, which Iâll talk about more later, which meets MWF 2-3.3001 which is MIT Catalog notation for Mondays, Wednesdays, and Fridays from 2:00 PM to 3:30 PM . But other classes meet for longer each day, but for shorter periods of time, like 15.6721 Negotiation Analysis, which meets for 8.30-4.30 for three days in a row towards the end of IAP. Instructors. Thereâs a lot of variety among people who teach IAP classes. They range from several faculty members teaching a lecture series (18.095 Mathematics Lecture Series) to a team of undergrads coming together and running a huge class (6.147 Battlecode) to a student organization (6.S817 Code for Good). Content. And probably the biggest difference is what the classes are actually about. The format of IAP allows lots of non-standard classes. Iâve already mentioned a three-day negotiation workshop, a math lecture series, a competition with thousands of dollars in prizes, and an opportunity to work on software-related projects with nonprofits. But thereâs also a non-standard treatment of classical mechanics (8.223 Classical Mechanics II), and a Chinese calligraphy class (21G.111 Chinese Calligraphy). So the classes are pretty hype, and Iâm really excited about the two classes Iâm taking. The first class is 6.S087 Mathematical Methods for Multidimensional Statistics, which is about⦠matrices, and statistics, apparently. Iâm taking the class because I looked at last yearâs problem sets,02 so MIT uses a class management system called Stellar, and for some classes, you can access course material from previous years! itâs really cool :) and they felt really well-written. Itâs been a cool class so far; I was really hyped when we learned about random vectors on our first lesson. (Theyâre like random variables, but theyâre vectorsâ"and they have their own nice properties beyond just being a collection of random variables!) The other class Iâm taking is 6.148 web.lab. Like 6.147 Battlecode or 6.176 Pokerbots, itâs a programming competition with thousands of dollars in sponsor-backed prizes. While Battlecode is about writing an AI to play a game, and Pokerbots is about writing an AI to play poker, web.lab is about making a website. The cool thing about these classes is that students from all levels of programming experience are welcome, because they teach all the material necessary to get started. web.lab is a pretty intense class. We have lectures from 11 to 3 from Mondays to Fridays for the first two weeks of IAP. The first week alone was really intense, as we covered the basics of HTML, CSS, Javascript, React, APIs, Node, MongoDB, and authentication, all in one week! For this second week, weâve been having sponsors give lectures in the mornings, while covering more advanced topics in the afternoons. Then the next two weeks will be for us to work on our website, with the intent of finishing before the end of IAP. Iâve always wanted to learn more web development, but I was just really scared by the dozens and dozens of web technologies and libraries that sprouted seemingly out of nowhere. Thereâs lots and lots of fancy names, like Redux or Django or Typescript or Rails or Angular. Itâs been pretty clear that the first three things you learn are HTML, CSS, and Javascript, and I did have some experience with these, but I didnât have any sense of direction after that. The class was a good excuse to pick up web development again, and Iâve been learning a lot! Iâm making a website with two other people,03 hi Dylan and Emma! oops sorry iâm writing this instead of working on the website and Iâm really excited to see how itâll turn out. Non-credit activities It wouldnât be called Independent Activities Period if there werenât a lot of⦠activities? There are over a hundred different non-credit activities over IAP, which you can view on the IAP listings. While a lot of them sounded interesting, like a Japanese woodworking workshop or a poetry discussion series, I couldnât really make space a lot of them on my schedule. One of them, I guess, is a waltz class. I joined the class through Tech Squares, though, so it doesnât really count. But I did go to an event that I only knew existed through the listings. I signed up for a bacterial photography workshop, because I did manage to fit it in my schedule. I didnât really read the description that carefully, other than the title, the date and time, and âNo biological laboratory experience necessary!â So I signed up and I went. It was pretty cool! It, in fact, was not a workshop about taking pictures of bacteria, but using bacteria to make pictures. We did it in a room called the BioMakerspace, which was a wet lab. I saw two of my friends who were doing their own projects in the makerspace, and were surprised to see me there.04 âI didnât know you were a bio person!â âIâm not.â The first part was learning to use micropipettes, which are pipettes but for very small, precise amounts of liquid. Then we used electrophoresis (big word!) to insert plasmids that had the DNA we wanted into the E. coli. In practice, this involved mixing tiny amounts of liquid, putting it in a cuvette (like, this tiny plastic box), putting the cuvette in a machine, and pressing a button. But it felt really cool that we were inserting DNA in bacteria by running electricity through it. Then we put this⦠electrocuted bacteria⦠on an agar plate for it to grow. Since this would take a day in real time, we used a culture that was already prepared for the next step, which was picking out a culture of E. coli, putting it on this specially prepared agar plate, and then putting it in an incubator that projected an image on it. It would again take a day to see the final results, but we were shown results of previous experiments, and it looked really cool. I donât think I particularly want to work in any kind of wet lab in the future. But thatâs the fun part, you know? I have absolutely no plans to do anything involving biology, but I loved that I could still sign up for events like these anyway. There are so many things I want to try, but not necessarily commit to, just because I want to try it, and I love how MIT has space for me to do this. Extracurriculars Two of my clubs are in full swing now that IAP is starting. Tech Squares, MITâs square dancing club, has continued its regular Tuesday meetings again! I missed square dancing so much over the break. It was one of the few times I got exercise in the week, and it was a way to catch up with other friends in the club. Next Tuesday night at 8, Tech Squares is hosting an intro night in Morss Hall, and Iâm really excited to just drag some of my friends and show them what square dancing is, so they could understand why Iâm so hyped about it.05 i should write a blog post dedicated to squares one day to explain my love for it Tech Squares is not only a square dancing club, but a round dancing club. Rounds, like squares, is also a kind of dancing where someone gives instructions in real-time to tell dancers what to do. There are lots of kinds of rounds, like rumba, two step, or foxtrot. A waltz rounds class started this IAP on Monday nights, and Iâm enjoying it so far. Weâll see if I can continue joining the class through Spring. The other club Iâm in thatâs active is ESP. I talked about Splash, a program that ESP runs, at length on âTwo thousand high schoolers walk into MITâ. Weâre getting ready for Spring HSSP, a program open to students from 7th to 12th grade, where teachers teach a class every Saturday for six Saturdays. So itâs a longer program, unlike Splash. Tonight, I did some chalking06 writing things on sidewalks with chalk, typically to publicize an event along sidewalks to publicize teacher registration, which will close soon. Another program weâre getting for is Spark. Like Splash, itâs a one-weekend program, but Spark is open for students in 7th and 8th grades. Teacher registration is ongoing, but the deadline is much later, so weâre not doing much for Spark yet. Iâm part of ESP Art, so I sent out a proposal for the shirt design recently, and Iâm waiting on feedback. Mystery Hunt The one thing Iâm hands-down most excited for this IAP, though, is MIT Mystery Hunt. AND ITâS HAPPENING IN THIRTY-FIVE HOURS AAAAAAHHHHH IâM SO HYPED!!! The Mystery Hunt is the first time I heard about MIT, ever. For the longest time, the only thing I knew about MIT was that it was the university that ran the Mystery Hunt, nevermind the fact that itâs famous or whatever.07 in my defense, i grew up in the Philippines I remember browsing the internet when I was eleven or twelve, and somehow I ended up on the Wikipedia page for puzzlehunts, and then I ended up on the Wikipedia page for the MIT Mystery Hunt. And I remember being awestruck by the whole thing. Maybe itâs the scale. Itâs a huge event: dozens of teams and thousands of contestants solving hundreds of puzzles over a single weekend. Maybe itâs the thought of having so many puzzles that I can work on them for a whole weekend and not have to worry about anything else. Or maybe itâs the realization that there were other people out there who wanted to do this. That out there were people who also wanted to do puzzles for a whole weekend, and there are thousands of them, and itâs not just me. And that was the first time I ever wanted to go to MIT. Not to study or anything, but to participate in Mystery Hunt. I wanted to be on campus and do runarounds and work on puzzles with a bunch of people who liked puzzles too. Well, twelve-year-old CJ, Iâm doing it. And I canât wait. which is MIT Catalog notation for Mondays, Wednesdays, and Fridays from 2:00 PM to 3:30 PM back to text ? so MIT uses a class management system called Stellar, and for some classes, you can access course material from previous years! itâs really cool :) back to text ? hi Dylan and Emma! oops sorry iâm writing this instead of working on the website back to text ? âI didnât know you were a bio person!â âIâm not.â back to text ? i should write a blog post dedicated to squares one day to explain my love for it back to text ? writing things on sidewalks with chalk, typically to publicize an event back to text ? in my defense, i grew up in the Philippines back to text ?
Saturday, May 23, 2020
Security Brokers, Inc. - 2152 Words
Security Policy 1. Overview Security Brokers, Inc. is a brokerage firm dedicated solely to the trading of stocks, bonds, mutual funds, and other money market products geared towards serving our customers needs. Security Brokers, Inc. has committed to not only providing the best of financial services to our customers but also providing our customers the security to protect our company assets required to gain and retain trust in our ability to do business in the financial industry. This document will serve as a guideline on how the Security Brokers, Inc. server and workstation hardware and operating systems will be hardened, secured and maintained. All employees, contractors, consultants, temporary and other workers at Security Brokers,â⬠¦show more contentâ⬠¦utilizes Dell as the sole manufacturer for providing equipment for servers and user workstations. Server hardware utilized includes the Dell R series server hardware platforms including a mixture of R210, 410, and 710 chassisââ¬â¢. User workstations are provided by Dell as well and include the Optiplex series towers for non-mobile users and the latitude 820 for mobile and remote users. Remote and mobile user laptops are encrypted and require an RSA USB encryption token to unencrypted the mobile workstation upon boot. Remote and mobile users choosing to gain remote access into the Security Brokers, Inc. network using their company issued laptop must use their RSA token to gain VPN access into the company network. Remote user wishing to utilize a company issued Optiplex series tower will be issued an RSA token to use to gain VPN access to the company network. Security Brokers, Inc. utilizes the Checkpoint Mobile VPN access client to provide secure VPN communication between the remote user and the company network. Security Brokers, Inc. utilizes Microsoft operating systems and other Microsoft Windows based products to ensure 100% compatibility with our customers and other partnerââ¬â¢s ability to access our company resources. Utilizing a sole baseline for software also allows Security Brokers, Inc. the ease of maintaining the server and workstation software, applying patches and updates to ensure the highest level of security and
Tuesday, May 12, 2020
Syllabus - 1681 Words
ETS. 101.001 Arthur Manjarrez, ABD, OSU Ethnic Awareness Black Hall 101-13 Spring Quarter, 2014 PH: 963-2161 M-F: 12:00 ââ¬â 12:50 Office Hour: 8:00-9:00am Farrell Hall 111 E-mail: manjarra@cwu.edu Course Materials: Race and Ethnicity in the United States, 7th Edition by Richard T. Schaefer Course Description: Ethnic Studies is designed to bring awareness and understanding of the problems facing the American people in the area of race and ethnic relations, primarily focusing on ethnic minorities. Ethnic Studies will focus on the nature and scope of relationships between minority groups and majority group in the United States.â⬠¦show more contentâ⬠¦Effective participation in class requires that you read the required materials prior to coming to class and that you have completed all assignments that are due. In addition, I expect you to contribute honestly and thoughtfully to class discussions. Late or missed assignments, and/or response papers will be accepted only during the next class meeting. 2 points will be deducted for late response papers or late assignments. No late final papers will be accepted, and missed quizzes cannot be made up. Electronic devices such as iPods or cell phones should be ââ¬Ëturned offââ¬â¢ prior to the start of class. Grading: Grades will be assigned based upon the following breakdown: 4- Response Papers: 25% (100 points-25pts each) 4-Class Assignments: 25% (100 points-25pts each) 3-Quizzes: 20% (100 points-33.3pts each) 1- Oral Presentation: 10% (50 points) 1-Final Reflection Paper: 20% (150 points) 100% 500 points | You can keep track of your own grade by summing your total points earned: A: 500-465 points, A-:464-450 points B+: 449-440 points, B: 439-415 points, B-: 414-400 points C+: 449-440 points, C: 439-415 points, C-: 414-400 points D+: 449-440 points, D: 439-415 points, D-: 414-400 points Students with 399 points or less will receive a failing grade! Date | Assignments/Readings | TuesdayApril 2 ââ¬â April 11 | Review and discuss Syllabus: What is Ethnic Studies?Begin April 2nd, Students ReadShow MoreRelatedsyllabus1129 Words à |à 5 Pages Pop Quizzes 10% Hourly Tests (4) 40% Individual Cases (4) 20% Group Cases 20% Business Game 10% Syllabus (syllabus, slides, reading material, assignments will be posted on Blackboard per session), Lecture -6:00-7:45,Break -7:45-8:15, Lecture 8:15-9:30PM ) Date Topic Assignment Sept. 4 Course Introduction/Syllabus, Telecom structure, Products, Why regulations, Market sizes, Form teams, Assignment -Read: The US Telecommunications IndustryRead MoreSyllabus3428 Words à |à 14 PagesLearning Activities |Assignments (to be completed prior to this class day) | |Week 1 | |The Professional Nurse |Download Review Syllabus from BlackBoard. | | | |Course Objectives: |Review the Instructions for Navigating Blackboard. | | | Read MoreSyllabus1484 Words à |à 6 PagesESP Syllabus ââ¬â English for Hospital Receptionists 1. Target Group: Age | Adults from 21 to 57 | Sex | Female and Male | Mother Tongue | Spanish | Level of English | Elementary | 2. Main Aim: English for Hospital Receptionist is aimed to prepare learners to use a narrow range of English for Hospital receptionist, adequate for basic medical communication between patients, familiesââ¬â¢ patients and medical stuff. 3. Course Description: This course is designed for hospitalRead MoreSyllabus1864 Words à |à 8 Pageslearning environment. Scheduled Topics / Readings amp; Assignments (DUE on Dates Below) Business amp; Society 8/27: Introduction and syllabus / course expectations / group exercise / case study partnerships Corporation amp; Its Stakeholders / Chap 1 Discussion Cases in class: Brawl in Mickeyââ¬â¢s Backyard (p. 22) amp; New Belgium Brewery video 9/3: Managing Public Issues amp; StakeholderRead Moresyllabus1379 Words à |à 6 Pagesï » ¿El Paso Community College Syllabus Instructorââ¬â¢s Course Requirements I. Course Number and Instructor Information HECO 1322 NUTRITION AND DIET THERAPY INSTRUCTORââ¬â¢S NAME Evelin Eichler, MS, RD, LD CAMPUS AND OFFICE NUMBER Rio Grande ââ¬â No office TELEPHONE NUMBER (Cellphone) (575) 642-1850 OFFICE HOURS To be announced E-MAIL Communication with instructor should be done through the class message system, not through the college e-mail addressRead MoreSyllabus1598 Words à |à 7 PagesExaminers supply a Sharp, Model EL-231C calculator to candidates. These calculators are available in many department stores for less than $10. DAILY ASSIGNMENTS Homework - You are expected to do all the homework assignments listed in this syllabus. A few questions, exercises, or problems may be discussed periodically in class. Special rules apply to ASSIGNMENTS that have to be turned in. 1. You must be present in class to turn in the assignment. Under no circumstances may you turn inRead MoreSyllabus6151 Words à |à 25 Pagesassignment refers to Service Request SR-kf-013, Develop Requirements for Kudler Fine Foods Frequent Shopper Program. Similar to the individual assignment, please ignore the ââ¬Å"Expected Results/Impact when completedâ⬠section of the service request and focus your answer on addressing the items listed below. A link to the Virtual Organizations can be found on the course Materials page. The Learning Team will prepare a 12-16 page paper for the complete project which will be turned in on Week 5;Read MoreSyllabus696 Words à |à 3 PagesCollege of Business Administration Department of Accountancy Accounting 351 Federal Tax II Fall 2014 Instructor: Simon R. Pearlman Phone: (562) 985-4578 E-Mail: sy.pearlman@csulb.edu Office: CBA 400 Office Hours: Mondays and Wednesdays - 2:00 p. m. ââ¬â 3:00 p.m. / Wednesdays 5:00 p.m. 6:00 p.m. Others by appointment Text: Smith, Raabe, Maloney, Taxation of Business Entities, South-Western, 2015 edition Class Times: 12:00 p.m.-- 1:50 p.m.-MondaysRead MoreSpring Syllabus2332 Words à |à 10 Pages[pic] [pic] Florida AM University Department of Chemistry CHM 1045 Lab Syllabus | COURSE SYLLABUS | |Course Number: CHM 1045L |Course Title: General Chemistry I Laboratory | |Prerequisite(s): Read MoreJournal Syllabus1109 Words à |à 5 Pages08 january 2016 (week 1) On the first day of community service class, Lecture explain about community service cause syllabus to improve knowledge student. Beside, lecture also play a videos community service which is to explain about definition of this subject. In the videos, we learn the concept on community service such as what we doing. We feel very happy because in this subject learn about unity which is work together to make people satisfy such as fell happy and enjoyable in real life. 15
Wednesday, May 6, 2020
Nurse on Thinking Outside the Box Free Essays
Innovative thinking is required but In order to do so, one must gain ample experience to foresee crisis that may happen upon the application of the unconventional. Getting out of the box means sucking with the problem longer, and looking at It from various sides, which may not always be suitable for a fast paced nurse, even with the right time management nurses are naturally multi-tasters and are known to accomplish one job to get on with the other. In the box thinkers often believe that every problem needs only one solution; therefore, folding more than one possible solution is a waste of time. We will write a custom essay sample on Nurse on Thinking Outside the Box or any similar topic only for you Order Now In Nursing Leaders/Supervisors: Nursing leaders on the other hand, thinking outside of the box may mean seeking the opinions of others which can help in the creative thinking process. As a nurse leader, one can improve out of the box thinking if one seeks ideas from those outside of oneââ¬â¢s own profession. Asking oneself on how things are being done in other industries could go a long way from Just going around his/her own department. Through this, a leader can easily seek what ideas can be best applied to a particular situation/task/problem and this requires a willingness to take new respective to day-to-day work. As nurse leaders, they need to nurture their ability to think outside the box and promote this skill in others. In Nurses Working in Offices: While nurses who have ventured outside the clinical set-up and have chosen the cubicle type of work environment, by doing so only proves that theyââ¬â¢re one of the outside of the box thinkers. They are the ones who like to challenge their own assumptions on a regular basis, which can be the most difficult part of out of the box thinking. One must remember that Just because something has always been one ay, doesnââ¬â¢t mean that it has to continue to be that way. Out-of-the box thinking requires openness to new ways of seeing the world and willingness to explore. It means considering other Innovative options, from roles as nurse educators, executive nurse leaders and policymakers, to nurse entrepreneurs, retail clinic nurses, nurse Informatics and researchersââ¬âto name a fewââ¬âwe have seen how nurses have been able to parlay their clinical backgrounds and health care skill sets Into entirely new realms, one must not stop because even great creative people can become In-the-box thinkers when they stop trying. How to cite Nurse on Thinking Outside the Box, Papers
Saturday, May 2, 2020
Euthanasia Essay Introduction Example For Students
Euthanasia Essay Introduction By: Alex Rourke Alex Rourke Rourke 1 Mrs. E. Teague English 110 1 May 1999 Euthanasia The origin of the word euthanasia comes from the Greek eu, good, and thanatos, death, meaning literally, good death. But the word euthanasia has acquired a more complex meaning in modern times. It is generally taken nowadays to mean doing something about achieving a good death. Suicide, self-deliverance, auto-euthanasia, aid-in-dying, assisted suicide call it what you like can be justified by the average supporter of the so-called right to die movement. It is advanced terminal illness that is causing unbearable suffering to the individual. This is the most common reason to seek an early end. Grave physical handicap which is so restricting that the individual cannot, even after due consideration, counseling and retraining, tolerate such a limited existence. This is a fairly rare reason for suicide most impaired people cope remarkably well with their affliction but there are some who would, at a certain point, rather die. What are the ethical parameters for euthanasia? The person is a mature adult. This is essential. The exact age will depend on the individual but the person should not be a minor who comes under quite different laws. The person has clearly made a considered decision. An individual has the ability nowadays to indicate this with a Living Will (which applies only to disconnection of life supports) and can also, in Rourke 2 todays more open and tolerant climate about such actions, freely discuss the option of euthanasia with health professionals, family, lawyers, etc. My position is that euthanasia should be legalized for the terminally ill. Because of the increasing number of suicides in Michigan, Gov. John Engler signed an anti-suicide law that made doctor-assisted suicides a felony. During the 21-month trial period of the new law anyone assisting in a suicide can be sentenced to up to four years in prison and fined more than $2,000 (Reuters 1993). In a poll cited in a 1991 issue of USA Today, 80 percent of Americans think sometimes there are circumstances when a patient should be allowed to die, compared to only 15 percent think doctors and nurses should always do everything possible to save a persons life. It also showed that 8 in 10 adults approve of state laws that allow medical care for the terminally ill to be removed or withheld, if that is what the patient wishes, whereas only 13 percent disapproved of the laws. Also, 70 percent think the family should be allowed to make the decision about treatment on behalf of the patient, while another 5 percent think this is suitable only in some cases (Colasnto 62). Seventy percent think it is justified at least sometimes for a person to kill his or her spouse, if he or she is suffering terrible pain caused by a terminal illness. Even suicide is starting to be accepted. About half the public think a moral right to suicide exists if a person has an incurable disease or is suffering great pai n with no hope of recovering (Colasnto 63). About half of those with living parents think their mothers and fathers would want medical treatment stopped if they were suffering a great deal of pain in a terminal disease or if Rourke 3 they became totally dependant on a family member, and 40 percent of their parents would want medical treatment stopped if daily activities became a burden (Colasnto 63). One reason that just about everyone who favors euthanasia agrees with is that a person has the right to a death with dignity. Another reason is a person should be allowed a natural death instead of a prolonged death with medical equipment . Still another reason is that doctors are supposed to ease the pain of people, not prolong it. (Battin 19). Death is one of the few things that all people have in common. This means that there is a chance for anyone to face the decision of letting someone go. People should be allowed to control their own deaths. Why should patients be forced to live i f he or she think their present standard of life has degenerated to the point of .ub331f400db77ee6f7764bf7dd6c0cd56 , .ub331f400db77ee6f7764bf7dd6c0cd56 .postImageUrl , .ub331f400db77ee6f7764bf7dd6c0cd56 .centered-text-area { min-height: 80px; position: relative; } .ub331f400db77ee6f7764bf7dd6c0cd56 , .ub331f400db77ee6f7764bf7dd6c0cd56:hover , .ub331f400db77ee6f7764bf7dd6c0cd56:visited , .ub331f400db77ee6f7764bf7dd6c0cd56:active { border:0!important; } .ub331f400db77ee6f7764bf7dd6c0cd56 .clearfix:after { content: ""; display: table; clear: both; } .ub331f400db77ee6f7764bf7dd6c0cd56 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub331f400db77ee6f7764bf7dd6c0cd56:active , .ub331f400db77ee6f7764bf7dd6c0cd56:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub331f400db77ee6f7764bf7dd6c0cd56 .centered-text-area { width: 100%; position: relative ; } .ub331f400db77ee6f7764bf7dd6c0cd56 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub331f400db77ee6f7764bf7dd6c0cd56 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub331f400db77ee6f7764bf7dd6c0cd56 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub331f400db77ee6f7764bf7dd6c0cd56:hover .ctaButton { background-color: #34495E!important; } .ub331f400db77ee6f7764bf7dd6c0cd56 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub331f400db77ee6f7764bf7dd6c0cd56 .ub331f400db77ee6f7764bf7dd6c0cd56-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub331f400db77ee6f7764bf7dd6c0cd56:after { content: ""; display: block; clear: both; } READ: 28 October 1998 Essay
Tuesday, March 24, 2020
Marketing Plan for a New Cardiac Center
Introduction The target market for the proposed cardiac center is Dammam city in Saudi Arabia. This is given the fact that there is lack of a cardiac center in the region. The proposed cardiac center will offer services addressing cardiac problems and complications, advice to patients and simple surgical procedures to people of all ages. Even if the new cardiac center will be located at Dammam city, it is noted that it may attract patients and professionals from other parts of the country.Advertising We will write a custom report sample on Marketing Plan for a New Cardiac Center specifically for you for only $16.05 $11/page Learn More This report is going to address issues surrounding the establishment of the proposed cardiac center in the city. The report will cover several aspects of this new venture. Dammam is a small city in Saudi Arabia. It is the capital city of Eastern Province in this country. According to Armstrong et al. (2009), the town is the economic hub of the worldââ¬â¢s most oil-rich region. As far as size is concerned, Dammam is third after Riyadh and Jeddah. Historians are of the view that the city was initially inhabited by an Al Dossary clan as far back as the early 1920s. The inhabitants were immigrants from neighboring Bahrain. The developments in this region are attributed to the huge oil deposits that were discovered there in the 1940s and 1950s. The oil deposits account for about 25 percent of the total oil deposits in the world. There is no specialized cardiac center in Dammam city. People are forced to travel for long distances to find such services. The purpose of this marketing plan is to address issues revolving around the setting up of a new cardiac center in Dammam city. It is noted that it is not fair to have patients travel very far in search of healthcare. This is the idea behind this proposal. It is aimed at addressing or alleviating the problems that people in this and surrounding regions fac e trying to access quality health care. The proposed cardiac center is named Tabibu Hospital. Tabibu hospital is a small hospital located at the center of Dammam city. Although it is a small facility, it is noted that Tabibu Cardiac Center will have the facilities that are needed to cater for the health needs of the population in the city and surrounding areas. The hospital will have 50 beds which even though not sufficient for the large population of the city, will help in providing the much needed treatment for cardiac conditions. The hospital is expected to serve the whole of Dammam city as far as cardiac cases are concerned. So far, the premises are ready. This means that the investors already have the physical facilities needed to establish the hospital. The organization has received funding from two donors who are willing to support the establishment of the facility. Additionally, the government has agreed to provide a loan through the Saudi Arabian National Bank.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Mission Statement The mission statement of this cardiac center is: Provide quality and affordable services to the residents of Dammam and surrounding areas with the aim of reducing the number of cardiac complications and mortality rates. Services Offered The cardiac center intends to offer a myriad of services both to the patient and to the community in Dammam and Saudi Arabia as a whole. Tabibu hospital intends to offer services touching on cardiac consultations and advice, Electro- Cardio Graph examination (ECG), diagnosis of cardiac problems, cardiac catheterization, pacemaker insertion and other basic surgery services. It is noted that consultation and offering advice to the patients and to the members of the community as a whole are the major services that will be provided by expert cardiologists. The cardiac center has five of them already engaged (Hiam, 2009). Advice will be given by the doctors and the nurses during patient visits. Diagnosis will only be done by a cardiologist after thorough examination. The thorough examination will include an ECG and consultations with other doctors. The organization already has an ECG machine which is operated by an expert in this field. This means that operating the machine is not a problem. It is however noted that there is a pressing need for a sophisticated and ultra- modern machine for the hospital. There is need for another person or another specialist to assist the current machine operator. Catheterization, insertion of pacemakers and other minor surgeries will be done by the team of cardiologists, anesthetists and surgical nurses. It is noted that the cancer center can use specialists from other hospitals. Anesthetists from other hospitals will be used in case the three employed by the organization are occupied or unavailable. There is also the need to have a day bed facility in the cardiac center. The center will have a day bed for the less serious patients who need supervision for a day or a few hours. However, there will also be facilities for those patients needing closer attention for a prolonged period of time. The 50 beds will be used for patients who need supervision for a longer period of time. The cardiac center will also work together with other hospitals in dealing with very serious cases. The very serious cases will be referred to larger hospitals with better facilities. There is need to transfer patients from this hospital to another and to bring the patient to the hospital in case of medical emergencies. For the purposes of emergency and transfer of critical patients, the cardiac center is planning to buy an ambulance soon after opening. Plans are also underway to acquire land where the cardiac center can construct a bigger hospital.Advertising We will write a custom report sample on Marketing Plan for a New Cardiac Center specifically for you for only $16.05 $11/page Learn More The number of beds will need to be increased to about 100 in 3 months. Another service that will be offered by the proposed Tabibu cardiac center will be open heart surgery. This is another service that the center would like to offer at least a year after obtaining land. The services are to be charged as follows: Consultation and advice ââ¬â $90 ECG ââ¬â $100 Cardiac catheterization ââ¬â $200 Pacemaker insertion ââ¬â $300 Basic surgery ââ¬â between $ 900- $ 2000Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More These charges are inclusive of bed where applicable. The drug charges will be determined separately after prescription. The prices are however subject to review after more research is carried out after Tabibu begins offering services. This means that the prices can be reviewed either upwards or downwards depending on the findings of the assessments carried out. The charges may vary depending on the prevailing market conditions that will determine the cost of inputs such as drugs used during operation. Market According to recent census records, 30% of Dammam population is composed of two major groups. The first group is the very old who are aged 70 years and above and the second group is the very young aged 10 years and below. 5% of the population is made up of obese people and most men are smokers. All these are factors that predispose the population to a myriad of cardiac problems (Gilligan Wilson, 2009). All of these people are vulnerable to cardiac conditions such as heart failu re as a result of their age and their lifestyle. There is evidently the need for a cardiac center to cater for the populationsââ¬â¢ cardiac needs. This is through the provision of advice, treatment and early diagnosis of cardiac conditions so that prompt treatment can be provided. The most vulnerable members of the population need periodic screening to ensure that cardiac conditions are detected early enough. This is the only way that the conditions can be dealt with effectively. Since most of the inhabitants of Dammam city are middle working class, it is noted that they will be able to pay for the services offered by the cardiac center. This is keeping in mind the fact that the cardiac center will save them the trouble and inconveniences of traveling to other places to search for medical care. However, just like any other society, Dammam city has a number of people who are poor. For the minority poor population, the cardiac center has liaised with various government agencies so that they can be offered quality services at subsidized prices. This collaboration with government agencies and other stakeholders will also go a long way in offering emergency services due to the close location of our services to the consumer. For instance, if a person falls sick at night, it will be easier to bring them to the hospital which is closer than flying them all the way to other facilities across or outside town. In terms of quality of service, the hospital has qualified members of staff in all the fields. There are also a few positions open for the people in Dammam city as a token of appreciation after they accepted to host the cardiac center. Currently there are no direct competitors in this city apart from a small training center which occasionally offers such services. Advertisement will be done to sensitize the people on the availability of services. This is especially so considering that many people are unaware of the availability of services in the hospitals. This is despite of the critical role that the cardiac center will play in their lives. Factors that usually affect the market of other services will not apply in the case of this hospital. For example, factors like seasons will not affect the market as it does not determine in any way when and where people get sick. There is no correlation between falling sick and season. This is unlike other services such as tourism which are dependent on weather patterns in European and American nations. However, the poor people and those in the rural areas may find it difficult to reach the hospital. To address this problem and avail the services conveniently, the hospital plans to offer mobile clinics where basic services like advice and consultations can be provided. With time the hospital will seek for funding from some of the stakeholders so as to open branches in nearby towns. The management has also consulted one of the hospitals in the region which offers mobile clinics. This is to enable Tabi bu cardiac center to join them on their excursions. This will definitely help in reaching the market (Kotler et al., 2008). Competition As mentioned earlier in this report, there is no cardiac center in Dammam and thus competition will be from other cardiac centers located far from Dammam city. Location is thus an advantage on the part of the cardiac center. It is noted that in cases of emergencies, the first choice for the residents will be Tabibu Hospital. From the local authorities, the management got information that people are not happy with the services offered by the hospital near this city. As a result, the people are forced to travel very far in search of medical services. The opening of a cardiac center near them will be welcomed. It is also noted that culture or the peopleââ¬â¢s way of life can be a source of competition. However in this case, culture as indirect competition will not be there. But several legal requirements are yet to be met (Godin, 2009). That is bein g taken care of by the insurance company. The Environmental Impact Assessment that has been done in the area showed that expansion will be problematic. The report does not provide for the expansion of the hospital as it will increase the amount of waste emitted into the environment. As a result, the cardiac center plans to use the local council in finding a bio- digester so the waste problem can be addressed once and for all. The hospital could face socio- economic competition from a small percentage of the population and the significance of this is possible decline of profits (Gilligan Wilson, 2009). As already indicated in the paper, there is a training college within the area that should be taken into consideration when analyzing competition. The training college in the area may be an indirect source of competition. The college trains cardiologists and sometimes holds mobile clinics where they look at some of the cardiac cases before transferring them to their main hospital in a nearby city. The training college offers transport to the patient but they do not pay for the treatment. This is the major weakness that Tabibu hospital will capitalize on probably through subsidized fees. After carrying out independent research, Tabibu hospital has realized that most cardiac cases are serious. To this end, the hospital has a location advantage over the competitors (Hiam, 2009). The new cardiac center project is likely to succeed because its strengths surpass its weaknesses. It involves the introduction of services that are not currently available and hence acceptable to the community. The project brings with it accessible services. The hospital has a strong and positive relationship with the relevant authorities that deals with the poor members of the society. This will help in off- setting the medical bills of such patients. The hospital also offers high quality services with the help of highly qualified personnel. The hospital has technologically advanced equipm ents (Kotler et al., 2008). The management however foresees a few difficulties in some areas. This is for example difficulties in reaching people in the rural areas, access to capital, pricing and space. The latter is to allow for the expansion of the facility. The hospital has about 30% of the current budget and needs a lot of money to be able to offer good services. The rest of the budget (70 percent) is yet to be financed. Pricing Price is influenced by both internal and external factors. Internal pricing variables are expenses involving capital, research, labor, distribution, utilities and all other costs (Armstrong et al., 2009). According to Godin (2009), capital is the amount of money invested in the business and all assets that the hospital owns. This is for example all the machines that the hospital will buy. Labor in this case will include the total amount of time that staff members spend in the hospital including overtime. Kotler et al. (2008) says that distribution is th e ways through which the services will reach the consumer. This is for instance hiring people to disseminate information about the services offered through word of mouth, media advertising among others. Utilities in this case are bills that are incurred through mandatory expenses like water, electricity, transport, advertising for business promotion, purchase of daily supplies like syringes, bandages and telephone bills among others (Phillip, 2009). External variables to be considered during pricing include prices of the competitors in the market. With time, prices are bound to be revised depending on the marketââ¬â¢s growth rate. However, customer needs will be put in mind so that the hospital does not push customers away due to overpriced services (Godin, 2009). The hospital is not intending to incur losses. There are deliberate efforts to price services in a way that will make the consumers comfortable while at the same time making it possible to smoothly run the hospital and offer quality services. It is for this reason that the hospital has proposed strategies to price products (Kotler et al., 2008). In the process, it will be able to know whether it is making a profit or incurring losses and take necessary actions. This is a process that will take some time and needs a lot of research and careful planning which will be done by qualified marketers. For the sake of simplicity, the management could trust the leader and price products in the same way. In such a case, it will find out how much the best and most popular hospital charges for similar services and use the same criteria. They probably followed the same procedure during pricing of their products. Tabibu could also price the products higher than the competitors in order to understand how much the customers are willing and able to pay. It should however be noted that pricing services higher or lower than the competitors will be for a short period as a way of testing the market. There will be revie w of prices after we have properly assessed the market. Basically, the above are just pricing processes but after sometime, the prices will be calculated by multiplying total cost with the mark- up percentage to get the retail price (Armstrong et al., 2008). Distribution This is the way through which the available services reach the consumer or the market (Kotler et al., 2008). In our case, we intend to use various methods ranging from advertising to creating a good image. Advertising will be done by our public relationsââ¬â¢ officer through the local media channels, the internet and the local newspaper. Since our services are to be provided to a wide range of customers, media advertising will be done through television and radio. We are to publish a website containing all the information like the services offered and how to contact us (Gilligan Wilson, 2009). The prices will however not be stated in the website to avoid being taken advantage of by our customers. The very first thing that attracts anyone to a product is the image (Hiam, 2009). We are aiming at creating a beautiful logo that will attract our customers especially when doing internet marketing. The same logo will appear on the business cards. The most effective method in our case is to hire marketers who will then spread information about the services offered by word of mouth. For the purposes of saving on expenses, we will buy supplies in bulk (Godin, 2009). We have located a nearby warehouse where we can store supplies of non-perishables goods like disinfectants, soaps, brooms, bandages and syringes among others. This will help in saving space in the already crammed hospital. The warehouse is in a clean, secure and accessible location. Promotion Mix We intend to use local television networks, local newspapers, leaflets, radio and internet to market our products. Having a healthy nation is the mission of our hospital. The hospital will be located in a quiet suburb in Dammam city. A hotline w ill be provided so that our staff can go and provide the necessary services or give advice on what to do through the hotline. We need about $ 100,000 for the first year for advertisement. There will be production of leaflets with information about our services, contacts and location. The leafletsââ¬â¢ and postersââ¬â¢ production will cost about $10,000, newspaper adverts will cost $50000 and the rest will cost approximately $39000 for a whole year. There will be an opening party for the hospital where we will invite the businessmen and offer free cardiac services during the day including the use of public address. Sales Forecasting Our market covers the people in the middle and higher classes. About 90% of the population is literate and thus able to understand what we will be offering. We aim at providing quality services at reasonable rates. For the small percentage that is poor, we have a special way of dealing with their payments through the social worker at the hospital. W e have spoken to the relevant government authorities and they are willing to help foot the hospital bill of the people who need the service but are unable to pay for it. It difficult to forecast sales in this case (Hiam, 2009) but it is important so as to know how many employees are required and when. It is also important to determine the combination of promotional mix to be used and supplies to buy. Kotler et al. (2008) suggests micro and macro forecasting as the suitable methods for doing this. Macro- forecasting involves making deductions on what will happen in the market depending on total market price. Micro- forecasting is done on specific services offered. The above however depends on the availability of information, timing, position of service at the life cycle and accuracy. The more accurate the forecast is the higher the costs. It is hard to make a forecast when a product is on its introductory phase than when it is in its maturity phase (Gilligan Wilson, 2009). Precise f orecasts can be made when the business has being operating for a long time. A more precise method would be to conduct this at least a year after the commencement of services in order to improve accuracy. We have also planned to make this a requirement at the end of every year to know how far we have gone. Action Plan According to Armstrong et al. (2009), there are various marketing strategies. In this case, market dominance is the most appropriate considering our target market of Dammam city population. We can use the 3Cs model developed by Kenich Ohmae (Gilligan Wilson, 2009) where we focus on the corporation, customer and competitors. For the corporation (hospital in this case), we strategize with an aim of maximizing our strengths against our competitors. This should be done is such a way that we also consider the cost effectiveness of what our suppliers offer and the customer paying a minimal fee for the services offered. The next C is for customer who is a very important perso n to the business. We thus have the responsibility of ensuring that the customer is satisfied in all ways and has a reason to use our services again. The prices of our services will be minimal and the quality of the services high. We will continue to ensure this happens through occasional in- service training of our staff especially those who come into contact with the customers. We will also keep advertising and employ extra members of staff who are skilled. The next C is for competitors who are the greatest threat to any business. We have done a thorough research on what our competitors offer, how they do it, their strengths and weaknesses. With this knowledge, we can avoid making the same mistakes and capitalize on their weaknesses. One of the advantages we have over them is that we have concentrated on cardiac services making us able to provide better services. Location is another advantage we have over our competitors. Being in a position to offer services to a customer when ne eded will go a long way as a market strategy. After implementing the 3Pââ¬â¢s we will then use the 4Cââ¬â¢s proposed by Jerome McCarthy in our marketing strategy (Kotler et al., 2008). The first P is for product or in this case, our services. Apparently, products go through a cycle of growth and every marketer should be aware of this. In our case, I would say after intensive treatment and information, cases of cardiac conditions may reduce and we may have to do a service mix to cater for the income. The next P is for pricing which should be adapted to cater for all areas of the business. Promotion is what is denoted by the next P and this involves advertising, personal selling and other ways of promoting the business. The means of doing promotions should be appropriate depending on the market. The last P is for place meaning that services should be provided when required and where required. The ambulance and hospital van will be used for this purpose. Either one of the two str ategies will be used but the first one is more preferable. Production Fluctuations are bound to occur due to the nature of our services. From the research carried out, we have concluded that demand is almost impossible to predict. Production will be leveled by volume. This is where we make a record based on which days are busiest and how many patients we expect to serve. On such a day, we make sure that we have enough staff and perishable and non- perishable supplies. This will ensure smooth operation and provision of services and also reduce wastage in terms of man power and perishable supplies. We plan to use demand leveling. Here, we can manipulate demand. In some cases, treatment is not an emergency. For instance, a customer who needs the insertion of a pacemaker can take some time. We can ask the patients with certain conditions to be seeing the doctors on certain days. This way, we save on salaries paid to part time staff members hired only on demand. As discussed above, we wi ll at times use local people in the hospital. Using local labor is cheaper than imported labor. This is given that no costs are incurred in importing it. Table 1: Simple Budget for Tabibu Hospital for the Year 2011 Income Expenses Grants $100000 Loans $97000 Donations $45000 Suppliers- $198000 Equipment- $200000 Doctorsââ¬â¢ salary- $195000 Nursesââ¬â¢ salaries- $82500 Other personnel- $95000 Utilities- $90000 Totals $242 000 $860500 References Armstrong, G., Harker, M., Kotler, P., Brennan, R. (2009). Marketing: An introduction. New York: Prentice Hall. Gilligan, C., Wilson, R. M. (2009). Strategic marketing planning. Massachusetts: Butterworth-Heineman Publishers. Godin, S. (2009). All marketers are liars: The power of telling authentic stories in a low trust world. Chicago: Prentice Hall. Hiam, A. (2009). Marketing for dummies. New York: John Wiley and Sons Publishers. Kotler, P., Armstrong, G., Wong, V., Saunders, A. J. (2008). Principles of marketi ng. New York: Pearson Education. Phillip, K. (2009). Marketing insights from A to Z: 80 concepts every manager needs to know. New York: John Wiley and Sons. This report on Marketing Plan for a New Cardiac Center was written and submitted by user Sonia Whitney to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Friday, March 6, 2020
Main Currents in American Poli essays
Main Currents in American Poli essays The spectrum of American Political thought is not wholly original nor is it very diverse. American political thought occupies an area dedicated to centralist, broad-based political unity on the political spectrum. Therefore, this paper is divided into two main sections. The first section will cover the ideologies that are discussed in Nancy Loves book Understanding Dogmas and Dreams, and those ideologies we discussed in class. The second section is a survey of the most important political shifts in politics since the colonial period. As comprehensive detail was not the goal of this paper detail is apparent perhaps only in the ideology section and in the specific time periods addressed. To begin, communal anarchism rests on the belief that humans can live together cooperatively in a non-authoritarian society. As of criticism at existing society, communal anarchism denies that the state rests on any moral or natural law. Instead, anarchists like Emma Goldman say that the state uses coercion to sustain its laws, and therefore is opposed to nature. Communal anarchists further state that taxation and conscription violate citizens rights to property and liberty. They believe the state is the problem with society, not the solution in communal anarchism. Society views communal anarchism as utopian and impossible because of humans corruptibility. Oppositely, communal anarchists see the state as the source of corruption because it invests power to rule. Communal anarchists insist that, So long as political power exists, there will be ruler and ruled, masters and slaves, exploiters and exploited. The modern example of communal anarchism is the hippie communes of the 1960s where everyone worked for each other and there were no classes. The members formed a consensus by making decisions with the input from every member of the group. Most political theorists doubt the possibility of a comm...
Wednesday, February 19, 2020
Human ressource management Essay Example | Topics and Well Written Essays - 1500 words - 1
Human ressource management - Essay Example oblem-solving skills, coaching, and counseling, rather than an adherence to structured programs or a menu-driven approach to training and development. The organization is the basic framework within which individuals and groups behavior occur. The quality and nature of the decisions made are influence by the nature of the structure. The external environment contains a range of influences that affect an organization. They include: socio-demographic, technological, economic and political factors. Political system means the way of authority and management style adopted by organizations. Organizations as a part of external environment should pay attention to social ans cultural issues which make a significant contribuà tion to the business. This may become even more important when the organizationââ¬â¢s strategy is taking it into new countries, or different forms of alliance and collaborative ventures. Organizations can contribute to the success of such plans by ensuring that social differences are considered when common policies are defined, that announcements are made in a way that is most effective for each culture, and that managers who have to operate across country borders understand the nature of the cultural differences involved, and adjust their own behavior to obtain the best result (Bartlett, Ghoshal, 1999). According to Storey (1989): The drive to adopt HRM is...based on the business case of a need to respond to an external threat from increasing competition. It is a philosophy that appeals to managements who are striving to increase competitive advantage and appreciate that to do this they must invest in human resources as well as new technology (Storey 1989, p. 34). With the commodification of products, increases in liquidity, and widespread availability of information, services and products have a great need for flexibility and creativity on the part of managers in order to secure high-quality revenue. With customer demands for products often requiring
Tuesday, February 4, 2020
Hegemony and Education Assignment Example | Topics and Well Written Essays - 1000 words
Hegemony and Education - Assignment Example Male norms stress values such as autonomy, certain forms of aggression, adventure, courage, toughness of both mind and body etc. Hegemony involves persuasion of the greater part of the population the organization of social institutions and the media in ways that appear ââ¬Å"naturalâ⬠. Hegemonic masculinity in education involves the application of certain strategies for the subordination of women (Gibbs, 2008). Most universities promote an ideology that fosters the outlook of white middle class males. Through the media, sports in universities have helped uphold a masculine hegemonic order in society (Kian, 2007). In comparison to womenââ¬â¢s sports, menââ¬â¢s sports and male athletes are given more coverage. This gives a clear depiction of how masculinity is cherished more than femininity. The education system has therefore institutionalized gender with the aim of constituting people as two significantly different categories, male and female so as to organize social relat ions of inequality on the basis of this difference (Gibb, 2008). The gender system in universities just like race becomes constructed as a distinct organizing principle of social relations to determine how resources are distributed. Thus, cultural beliefs about gender are nothing more than stereotypes. However, the significance of such stereotypes is more significant than we may want to think. For instance, the sex composition of a student-teacher interaction is certain to bring to mind gender beliefs that will determine how students evaluate each others performance and how to enact their individual roles. Biological factors such as high levels of testosterone in men and different genetic make up are thought to affect cognitive abilities of men and women differently. Such biological factors are held to be the cause of difference in educational performance between male and females. Cultural beliefs that male students are supposed to exhibit an interest in traditional masculine subjec ts i.e. physics and past times such as rugby, football, athletics etc. constitute strategies for the construction of hegemonic masculinity in education. Studies have revealed that women outperform men in schools that adopt learning and assessment procedures that are better suited for females than to males. This is based on the difference in behaviors, learning styles and attitudes of male and females thereby requiring implementation of different school and teaching practices in order to succeed. Feminized schools lack adequate number of male teachers to guide boys. Such schools exhibit prejudice towards feminism in curriculum materials, reject competition and luck toughness in discipline. However, hegemonic masculinity may foster highly disruptive, inattentive, and aggressive behavior among males inside and outside the classroom leading to poor educational achievement (Gibb, 2008). Ethical issues arise from hegemonic power processes which occur as subroutines that eventually regulat e daily interactions and work flows in organizations, without any open opposition. The implicit nature of hegemonic processes leads to gradual acceptance of organizational practices some of which may be against the general good of the society. The concealed nature of hegemonic processes condition employees to act according to the rules and social values of everyday life. The employees act upon
Sunday, January 26, 2020
Proactive and Reactive MANET Protocols Analysis
Proactive and Reactive MANET Protocols Analysis Ad hoc network Abstract A mobile ad hoc network (MANET) is consisting of wireless mobile nodes. The communication of these mobile nodes is carried out without any centralized control. Routing is a critical issue in MANET. The focus of this thesis is on the performance of routing protocols. We compare three routing protocols in MANET i.e. AODV, DSR and OLSR. OPNET is the simulation tool. These routing protocols performance are analyzed by three important metrics: delay, network load and throughput. All the three routing protocols are explained in a deep way with metrics. The comparison analysis will be carrying out about these protocols and in the last the conclusion will be present. That which routing protocol is the best for mobile ad hoc network. Introduction MANET stands for Mobile Ad hoc Network. A decentralized autonomous wireless system which consists of free nodes. MANET sometimes called mobile mesh network. MANET is a self configurable wireless network. A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are as transmitters, receivers and antennas. These antennas can be of any kind. These nodes can be fixed or mobile. The term node referred to as, which are free to move arbitrarily in every direction. These nodes can be a mobile phone, laptop, personal digital assistance, MP3 player and personal computer. These nodes located, might be in cars, ships, airplanes or with people having small electronic devices [59]. Nodes can connect to each other randomly and forming arbitrary topologies. Nodes communicate to each other and also forward packets to neighbor nodes as a router. The ability of self configuration of these nodes makes them more suitable for urg ently required network connection. For example in disaster hit areas where there is no communication infrastructure. It is greatly desired to have a quick communication infrastructure. MANET is the quick remedy for any disaster situation. The word Ad hoc means For a special purpose. So MANET a spontaneous network is useful when dealing with wireless devices in which some of the devices are part of the network only for the duration of a communication session and the need for a dynamic network topology is prominent. The MANET working group (WG) within the Internet Engineering Task Force (IETF) working specifically on developing IP routing protocols topologies. In order to improve mobile routing and interface definition standards for use within the Internet protocol suite [59]. After huge research work on MANET, still MANET does not have complete formed Internet based standards. The identification of experimental Request For Comments (RFCs) since 2003 [1] is used. In these RFCs the questions are unanswered concerning of implementation or deployment of these routing protocols. But these proposed algorithms are identified as a trial technology and there is a high chance that they will develop into a standard [1]. Extensive research work in this area has continued since then with major studies on different routing protocols such as Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), Temporarily Ordered Routing Algorithm (TORA) and Optimized Link State Routing (OLSR) [1]. Also on the standardization of routing and interface solutions for mobile networking support through Internet Engineering Task Force (IETF) Mobile Ad hoc network (MANET) Working Group WG [59]. Aims and Objectives There are two groups of routing protocols. Proactive MANET protocol, Reactive MANET Protocol, and the third are derived from both called Hybrid MANET Protocol. The Proactive MANET protocol is generally called table driven protocol. It detects the network layout periodically. It tries to maintain the routing table at every node. From which a route to the destination from the source can be detected with less delay. Proactive MANET protocols provide good reliability and low latency for deciding a route. Proactive MANET protocol is not suitable for the node moving with high speed. The routing information in the routing table cannot be updated in the routing table. If a node is not moving, then its routing table information is updated continuously. It makes much traffic overhead and also waste network resources as bandwidth [21]. Proactive MANET protocol is also not suitable for large scale MANETs. Whereas Reactive MANET Protocol is called on-demand routing protocol. Reactive MANET Protocol finds the route when a source node requests to communicate with the other. On-demand approach is suitable for the nodes with high mobility. Nodes that transmit data rarely. The main drawback of reactive routing protocols is that the source node broadcasts the routing requests in the whole network. Then it waits for the responses. This route discovery procedure produces significant delay [21]. Hybrid MANET Protocol integrates the merits of Proactive MANET protocol and Reactive MANET Protocol. Zone routing protocol (ZRP) and two zone routing protocols is the example of hybrid of MANET protocol. Research Question Our goal in this Masters thesis is to evaluate the performance of Proactive and Reactive MANET protocols. These protocols have different behaviors for wireless routing aspects. The main problem is to choice the correct and efficient routing protocol for MANET. The main questions arise for the evaluation of these problems. First question is which routing protocol provides a better performance in Mobile Ad hoc Networks? This will give the overall performance of each routing protocol. Second question is what factors influence the performance of these routing protocols? Finally we address the main key differences in these routing protocols. To answer all these questions, we will model some of MANET scenarios with different parameters. To evaluate the performance of Proactive MANET protocol and Reactive MANET Protocols as, AODV, DSR and OLSR with respect to some parameters as delay, network load and throughput. In simulating these scenarios we come to know that no single routing protocol among Proactive MANET protocol and Reactive MANET Protocol is superior in terms of overall network performance. For example one protocol is good in average delay while other is best in network load and throughput. The performance of these routing protocols greatly depends on network load and delay. So the best protocol can give low delay and high throughput. Scope of the thesis As we know the two categories of routing protocols. Reactive, proactive, and the derived one from reactive and proactive protocols are referred to as hybrid routing protocol. The hybrid protocol is a combination of both reactive and proactive routing protocols. In this thesis, we considered three routing protocols. Two of them are reactive protocols i.e. AODV and DSR. One of them is proactive protocol i.e. OLSR. In this thesis we evaluate the behavior of these routing protocols when implemented in the network. We look that how these protocols affect the network performance, and how the routing protocols behave in these networks. There is no need to go in depth the design of these routing protocol algorithms. But we will give a detailed explanation of these routing protocols. That we are able to explain their effects on the network. We did not consider the effects of varying pause time of the mobile nodes in our simulations. These pause time will be kept constant in all the scenarios. Energy consumption of the routing protocol algorithms was also not considered in the thesis. Thesis structure The thesis is mainly divided into six chapters. Chapter 1 introduces the topic. In this chapter we discuss the MANET with detail, and also the research question. Chapter 2 presents the background of our work. Types of wireless networks and some part of related work with example. Chapter 3 gives the state of the art. It gives the full theoretical background and concepts of the ad hoc mobile network routing protocols i.e. reactive MANET protocols and proactive MANET protocols. Chapter 4 is about the performance metrics: delay, network load and throughput and also about the simulation tool OPNET Modeler 14.5. Chapter 5 gives the results and an analysis of all the routing protocols simulated. In chapter 6, the conclusion and future work is presented. Chapter 2 Background and Related Work In this chapter we present the background of our work. Types of wireless networks and some part of related work with example. MANET have a dynamic nature, a large number of applications make them ideal to use. Quick deployment and minimal configuration of MANET in emergencies such as natural disaster makes them more suitable. The growth of technology makes increase in Wi-Fi capable laptops, mobile phones, MP3 players and other small portable devices. Hence a reason for MANET popularity. Extensive research work has been done on the performance evaluation of routing protocols using NS2 network simulator. Different methods and simulation environments give different results for MANET routing protocols performance. We need to look in a broader view for the effects of these routing protocols which are not considered in a specific environment. The theme of this project is to evaluate the performance of Proactive MANET protocols (PMP) and Reactive MANET Protocols (RMP) in OPNET Modeler 14.5 under varying network load [2]. For all these comparisons we will use FTP traffic to look the effects of the ad hoc network protocols. The project goal is to give an extra source of comparison statistics in the research field. In our simulation we have wireless routing protocols carrying FTP traffic. These simulations performed will have a strong link with the theoretical concepts and also with the expected performance in practical implementations. This study work will give a great benef it in the future research work. Related work Extensive research works has been done in the field of MANET routing protocols. Different routing protocols were simulated in different kind of simulators. Here we will discuss different research papers on the performance of MANET routing protocols. In this thesis work we simulate three MANET routing protocols in the OPNET modeler 14.5. AODV, DSR and OLSR were simulated against three different parameters i.e. delay, network load and throughput. The results show that OLSR is best in network delay than AODV and DSR. The protocols best in the network delay must be the finest in the network throughput. Below we will study now different simulators with different routing protocols and their performance. These routing protocols DSDV, AODV, DSR and TORA were simulated using NS2 [3]. Analysis gives different results for every parameter differently. In finding shortest path between the source and destination nodes, delay, DSDV performs well than AODV, DSR and TORA. DSR perform well in network load balancing than DSDV, AODV and TORA. DSDV has good jitter than AODV, TORA and DSR respectively. The results given in [5] analyse DSR and DSDV in idealized and realistic simulation environments on their performance. Another paper in reference [4] gives conclusion in mobile ad hoc network that reactive protocols i.e. AODV and DSR perform well when the network load is moderate. In reference [4] the reactive protocols are saving much resource like energy. It analyse that the proactive protocols perform well in heavy network traffic load. In [6] there are different conclusions about the MANET routing protocols. DSDV, AODV and DSR were simulated in NS2. The reactive protocol AODV outperforms than DSDV and DSR in maintaining connection by sequentially exchange of information for TCP based traffic. The packets are delivered when the node mobility is low and failed to deliver at high mobility. DSR perform well than DSDV at all mobility. In [6] DSR perform well than DSDV and AODV for packet dropping rate (PDR), delay and throughput. DSR generates less network load than AODV. In reference [7], the simulation was done in QUALNET simulator. The author wrote that AODV shows best performance in low and medium node density. Where as in high node density both OLSR and DSR outperforms. The author wrote in [7], that DSR is selected for file transfers where delivery and throughput are critical factors. OLSR performs well in both low and high node density. It is stated in [7] that OLSR is best suited in application oriented traffic e.g. streaming traffic, voice and video traffic. In application based traffic delay is a critical factor. Types of Wireless Networks Before we discuss the wireless networks types, a small difference between wired and wireless network is discussed. A network that sends data from one point to another point with cable or wire is called wired network. The data sent over a network which uses wireless medium from one device to another device is called wireless network. In wireless network data is transmitted from one point to another through wireless links. For communication the devices have to be in the transmission or radio range of each other. Wireless networks are divided into two main groups. First infrastructure wireless network and second is Ad hoc or infrastructure-less network. Infrastructure Networks Fixed network topology is deployed in infrastructure network. These deployed, fixed networks have base stations or access points from which wireless nodes can get connected. All the base stations or access points are connected with the main network through wired links (fiber optic, twisted or coaxial cable) or wireless link. The base station or access point is one of the important units of infrastructure networks. All of the connections will have to pass from the access point. A wireless node can connect to anyone of the access points in its range. Ad hoc Networks An Ad hoc network is deployed where wireless network infrastructure is not available. This kind of ad hoc network is called infrastructure less network. In ad hoc network each node is connected through wireless links. These nodes connected to each other and also act as a router, by forwarding data to other nodes. There is no restriction on these nodes to join or leave the network. Thus the network has no vital infrastructure. Ad hoc networks have two forms; one is static ad hoc networks (SANET), the other is called mobile ad hoc network (MANET). Commercial implementation of ad hoc network becomes possible due to the development of new technology such as 802.11 [5]. The main reason to deploy this kind of network is the flexibility and easiness of deployment. A suitable network for emergency and surveillance use. But with all these qualities, ad hoc network operation is very difficult to handle. Each and every node is responsible for its operation to maintain its routing table and also forwarding packets to its neighbors as routers. MANET has different topology changes while deployed. So ad hoc network need an efficient routing protocol. To construct an efficient routing protocol is a tough and tedious task. Mobile Ad hoc Networks As mentioned before an ad hoc network is a wireless network, which do not have a centralized and fixed infrastructure. MANET is referred to a wireless ad hoc network. In which nodes are free to move arbitrarily. In a MANET, mobile nodes transmit and receive the traffic. Also mobile nodes can act like routers by forwarding the neighbors traffic to the destination. As the routers are mostly multi hops [60]. MANET does not need base stations of wired infrastructure. The mobile nodes in wireless network range can communicate with each other. MANET is self organized network. The mobile nodes form a network automatically without a fixed infrastructure and central management [60]. The mobile nodes have transmitters and receivers with smart antennas, which enable the mobile nodes to communicate with other mobile nodes in the network. The topology of the network change every time by getting in and out of the mobile nodes in the network. In the beginning MANET was designed for military use but now the MANET is used in many areas. Such as in disaster hit areas, data collection in some region, in rescue missions, virtual classes and conferences [60]. This concept with ad hoc network makes the full name of mobile ad hoc network (MANET). By growing the network, combined with the node mobility. The challenges of self configuration of the network become more evident. Security in the MANET is a very important issue. Many techniques were defined for the security of MANET. Intrusion detection technique is investigated in reference [60]. Mobile nodes in the network waste much energy by joining in and out with connection to wireless network. This connection and reconnection create energy limitation in the network. The main purpose of developing the ad hoc routing protocols to cope with the dynamic nature of MANET. The routing protocols efficiency can be determined by the battery power consumption. Energy is consumed during participation of a node in a network and also in routing of traffic. The routing protocol which adapts to the connection tearing and mending is also considered vital. Such routing protocols are AODV, DSR and OLSR, TORA, Wireless Routing Protocol (WRP), Zone Routing Protocol, and Two-Zone Routing Protocol (TZRP) [21]. We will discuss reactive and proactive routing protocols i.e. AODV, DSR and OLSR in chapter 3 respectively. The internet engineering task force (IETF) MANET working group (WG) was dedicated to standardize the routing protocols in MANET. RFC 2501 specifies the charter of the working group [8]. An Example of MANET Application The versatility and self configuration of MANET makes them a best choice for a wide range of applications. MANET can be used in natural disaster areas, pre planed strategic event like surveillance, data collecting in some regions, conferences and virtual classes. In such areas where the fixed infrastructure is not available before. Like earthquake hit areas where the fixed infrastructure has been destroyed, in flooded areas, fire or explosion hit areas, train or air plane crash [21]. A very common use of MANET is during business conferences. The only and key attribute that make MANET ideal is their self configuration and low cost of deployment. Here we will present one practical example. In a virtual class, a WiMAX radio link may be established. Then a MANET access network can be established to give coverage to those areas that is difficult to cover. The nodes far away from the base station rely on midway nodes for communication. Thus provide a best communication network in such hostile situation. Above in figure 1, a deployed MANET over WiMAX backbone is shown. In this figure the mobile nodes and the WiMAX_WLAN Router form a MANET. These nodes are connected to the WiMAX_WLAN router and the router is further connected to the WiMAX network. The router is working like a boundary between the MANET and the WiMAX. The WiMAX_WLAN router is capable of translation between the MANET protocols and the WiMAX network protocols, and also the backbone protocols the WiMAX is connected with. The figure 1 is shown above. Chapter 3 Ad hoc Networks Routing Protocols The theoretical concepts of ad hoc routing protocols are discussed in this chapter. The behaviors of proactive and reactive routing protocols will be analyzed. Routing Routing means to choose a path. Routing in MANET means to choose a right and suitable path to the destination from the source. Routing terminology is used in different kinds of networks. In telephony technology, electronic data networks and in the internet network, the term routing is used. Here we are more concern about routing in mobile ad hoc networks. Routing protocols in mobile ad hoc network means that the mobile nodes will search for a route or path to connect to each other and share the data packets. Protocols are the set of rules through which two or more devices (mobile nodes, computers or electronic device) can communicate to each other. In mobile ad hoc networks the routing is mostly done with the help of routing tables. These tables are kept in the memory cache of these mobile nodes. When routing process is going on, it route the data packets in different mechanisms. The first is unicast, in which the source directly sends the data packets to the destination. The second is broadcast; it means the source node sends messages to all the near and far nodes in the network. The third is anycast, in this the source node sends data packet to anyone which is not in the node group. Routing types Routing has two basic types, which are as under Static Routing Dynamic Routing Static routing is done by the administrator manually to forward the data packets in the network. Static routing is permanent. No any administrator can change this setting [29]. These static routers are configured by the administrator, which means there is no need to make routing tables by the router. Dynamic Routing is automatically done by the choice of router. It can route the traffic on any route depend on the routing table. Dynamic routing allows the routers to know about the networks and the interesting thing is to add this information in their routing tables. This is shown in the figure 3.1 below. In dynamic routing the routers exchange the routing information if there is some change in the topology [61]. Exchanging information between these dynamic routers learn to know about the new routes and networks. Dynamic routing is more flexible than static routing. In dynamic routing it have the capability to overcome the overload traffic. Dynamic routing uses different paths to forward the data packets. Dynamic routing is better than static routing. Routing protocols There are several kinds of routing protocols for wireless ad hoc networks. These routing protocols are categorized as reactive or proactive routing protocols [8]. The ad hoc routing protocols which have both proactive and reactive merits, is called hybrid routing protocols. The first kind of protocol is proactive or table driven routing protocol. The second kind of protocol is called reactive or on-demand routing protocol. The first kind of protocol is simply called Proactive MANET Protocol (PMP). Proactive routing protocol detects the layout of the network actively. A routing table can be maintained at every node. From which a route can be determined with less delay. The proactive routing protocols provide good reliability on the current network topology [21] and low latency for deciding a route. The OLSR is a proactive routing protocol. The second kind of protocol is simply called Reactive MANET Protocol (RMP). In these kinds of protocols the communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are mostly suited for nodes with high mobility or nodes that transmit data rarely. There are some reactive routing protocols which we will consider here. These reactive routing protocols include AODV, DSR and TORA. An ad hoc routing protocol is a standard. That controls the decision of the nodes that which route the nodes have to take to the destination from the source node. When a node wants to join a network, it discovers the topology by announcing its presence, and listening to broadcasts from other nodes in the network. This routing discovery is performed differently according to the routing protocol algorithm implemented in the network. Proactive Routing Protocols The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed [62]. Control messages are transmitted with periodically intervals. Even if there is no data flow still control messages are transmitted. Because of these control messages proactive routing protocols are not bandwidth efficient. There are many advantages and disadvantages of proactive routing protocols. One of its advantages is that the nodes can easily get routing information, and it easily starts a session. The disadvantages are, too much data kept by the nodes for route maintenance, when there is a particular link failure its reform is too slow. OLSR (Optimized Link State Routing) It is a proactive routing protocol in MANET. It is also called as table driven protocol because it permanently stores and updates its routing table. OLSR keeps track of routing table in order to provide a route if needed. OLSR can be implemented in any ad hoc network. Due to its nature OLSR is called as proactive routing protocol. MPR nodes are shown in the given figure 3.2. All nodes in the network do not broadcast the route packets. Just Multipoint Relay (MPR) nodes broadcast route packets. These MPR nodes can be selected in the neighbor of source node. Each node in the network keeps a list of MPR nodes. This MPR selector is obtained from HELLO packets sending between in neighbor nodes. These routes are built before any source node intends to send to a specified destination. Each and every node in the network keeps a routing table. This is the reason the routing overhead for OLSR is minimum than other reactive routing protocols and it provide a shortest route to the destination in the network. There is no need to build the new routes, as the existing in use route does not increase enough routing overhead. It reduces the route discovery delay. Nodes in the network send HELLO messages to their neighbors. These messages are sent at a predetermined interval in OLSR to determine the link status. Here we can understand this by Figure 3.3. If node A and node B are neighbors, node A sends HELLO message to B node. If B node receives this message, we can say the link is asymmetric. If now B node sends the same HELLO message to A node. This is the same as first case, called asymmetric link. Now if the two way communication is possible then we can call it symmetric link, as shown in Figure 3.3. The HELLO messages contain all the neighbor information. This enables the mobile node to have a table in which it has information about all its multiple hop neighbors. A node chooses minimal number of MPR nodes, when symmetric connections are made. It broadcast TC messages with information about link status at predetermined TC interval [62]. TC messages also calculate the routing tables. In TC messages MPR node information are also included. Reactive Routing Protocols Reactive routing protocols are called on-demand routing protocols. These routing protocols are called when they are required. So the routes are built when they are needed. These routes can be acquired by sending route requests through the network. Disadvantage of this algorithm is that it offers high latency in searching a network. We will consider AODV and DSR in this report. But the analysis will be of AODV and DSR in the fifth chapter. AODV (Ad hoc On-demand Distance Vector) AODV is an on-demand routing protocol. The AODV algorithm gives an easy way to get change in the link situation. For example if a link fails notifications are sent only to the affected nodes in the network. This notification cancels all the routes through this affected node. It builds unicast routes from source to the destination. The network usage is least. Since the routes are build on demand so the network traffic is minimum. AODV not allowing keeping extra routing which is not in use [63]. Two nodes wish to establish a connection in an ad hoc network. AODV is responsible to enable them to build a multihop route. AODV is loop free. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity. This is the characteristic of this algorithm. When a node send request to a destination, it sends its DSNs together with all routing information. It also selects the most favorable route based on the sequence number [11]. There are three AODV messages. One is Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs) [1]. By using UDP packets, the sources to destination routes are discovered and maintain by these messages. For example the node which request, will use its IP address as Originator IP address for the message for broadcast. It simply means that the AODV not blindly forwarded every message. The number of hops of routing messages in ad hoc network is determined by Time-To-Live (TTL) in the IP header. When the source node wants to create a new route to the destination, the requesting node broadcast an RREQ message in the network. In the figure 3.4 the RREQ message is broadcasted from source node A to the destination node B. The RREQ message is shown by the black line from source node A to many directions. The source node A broadcast the RREQ message in the neighbor nodes. When the neighbor nodes receive the RREQ message it creates a reverse route to the source node A. This neighbor node is the next hop to the source node A. The hop count of the RREQ is incremented by one. The neighbor node will check if it has an active route to the destination or not. If it has a route so it will forward a RREP to the source node A. If it does not have an active route to the destination it will broadcast the RREQ message in the network again with an incremented hop count value. The figure 3.4 shows the procedure for finding the destination node B. The RREQ message is flooded in the network in sea rching for finding the destination node B. The intermediate nodes can reply to the RREQ message only if they have the destination sequence number (DSN) equal to or greater than the number contained in the packet header of RREQ. The intermediate nodes forward the RREQ message to the neighbor nodes and record it in their routing table. The addresses of the neighbor nodes from which it get the RREQ message. This information will be used to make a reverse path for RREP message from the destination node. When the message reach to the destination node. It calculates the shortest path to the source. In the figure 3.4 it is shown. The destination node B replies with RREP message denoted by the dotted orange color line. From node A to node B the shortest path is the lower one shown with dotted line. These nodes routes information were saved in the routing tables and were used to build a reverse route from destination to the source node with the message RREP. The request reach to the destinat ion and then RREP has reached to the originator of the request. This route is only available by unicasting a RREP back to the source. The nodes receiving these messages are cached from originator of the RREQ to all the nodes. When a link is failed an RERR message is generated. RERR message contains information about nodes that are not reachable. The IP addresses of all the nodes which are as their next hop to the destination. All the routing information about the network is stored in the table. The routing table have these route entries; (i) destination IP address, (ii) Destination Sequence Number (DSN), (iii) Valid Destination Sequence Number flag (iv) other state and routing flags (e.g., valid, invalid, repairable being repaired) (v) network interface (vi) hop count (number of hops needed to reach destination) (vii) next hop (viii) the list of precursors and lifetime (Expiration time of the route). DSR (Dynamic Source Routing) Dynamic Source Routing Protocol is a reactive routing protocol. DSR is on demand routing protocol. It is a source routing protocol. It is a simple and efficient protocol. It can be used in multi hop wireless ad hoc networks [64].
Subscribe to:
Comments (Atom)