Wednesday, July 31, 2019

Banking Industry in Malaysia Essay

Money is closely linked to our lives, so the financial institutions become an inevitable and important part of our lives and people are always focusing on the situation of financial institutions. So the banking industry is the most suitable topic to study. Then, we decided to use scenario model to analyze the industry (Showed by diagrams 1). Diagram 1 After analyzing the situation of the industry, we choose ten years because it is the most proper time for our scenarios. The environment can not reach the enough degree to support these scenarios if the time is too short. On the other hand, long period of time is hardly to forecast the future careers. In the process of searching materials about banking industry, we found the major Stakeholders influencing the industry. They are government, consumers, and competitors in term of development of banking industry. The banking industry in Malaysia started from the early 1900s , in 1913 Malaysia’s first domestic bank – Kwong Yik (Selangor) Banking Corporation (now Malayan Banking Berhad) was set up, as thriving profits from rubber plantations and the tin industry. Besides, a statutory body, Bank Negara Malaysia (Central Bank), which is wholly-owned by the Federal Government, was established to the need for a governing body to oversee the activities and operations of the numerous banks in the country. Now, In Malaysia banks mainly consist of commercial banks, Islamic banks, and merchant banks. In addition, Malaysia has become an international Islamic Financial centre (Edge, 2006). As far, the banking industry in Malaysia has made conventional banking products and services, such as deposits and loans or hire purchase, taking on more advanced features, which are facilitated by advanced technological developments and make bank customers easier and simpler methods and processes of going about their daily banking. Furthermore, it also has introduced new products and services like credit and debit cards, investment products, financing products and services, and so on. RHB bank, which stands for Rashid Hussain Berhad, from throngs of banks for some reasons. Firstly, we are more familiar with it for it is a bank surroundings our. Secondly, we think it has a great potential RHB Bank is one of Malaysia’s leading financial service providers, offering commercial banking, corporate and international banking services. RHB Bank has built an impressive 200 branch network across Malaysia and also has a number of overseas branches, the majority in neighboring Singapore what’s more, after being acquiring by government in March, 2007, it becomes more competitive compared with other banks (Edge, 2006). Identify and discuss on the main driving forces shaping and affecting the industry. Business organizations exist to turn inputs from their environment into goods and services which customer in the environment want to purchase. This transformation process within the organization cannot be seen as a steady state, because external environment influences have a tendency to be continually shifting, having the effect of undermining the current balance within the system. The environment influencing business organization mainly involves the macro-environment, the micro-environment and internal environment. In our essay, we will use macro-environment, which comprise political, environment, socio-cultural, technology, legal and ecological factors, to analyze Malaysian banking industry environment. Political The political environment is one of the less predictable elements among them. In Malaysia, the Government has proposed that Malaysian-owned banks be given five-year tax exemption on income received from their new branches or remittances from subsidiaries overseas, operating within the three-year period, from the year of assessment 2007 to encourage banks to expand overseas and establish a regional presence. Furthermore, the Government will establish an Overseas Investment Fund (OIF), with an allocation of RM100 million to provide soft loans to domestic companies to finance start-up  costs of doing business overseas (Amparo and Sickles, 1994). Furthermore, to attract more foreign funds and streamline tax treatment on profits or interest income received from all financial institutions, the government proposed that profits or interest income received by non-residents from financial institutions should be exempt from tax. Economic Malaysia has been experiencing a promising economic since 2005 under the marked growth of global economic, real economic growths in Malaysia has been strengthened and real gross domestic product of Malaysia has been expanded from 2005, with growth gaining momentum since then. This growth was driven mainly by private sector activities. Real private consumption expenditure is keeping sustained at high rate, driven by continuing income growth, stable labor market conditions and strong consumer confidence. When the business activity become flourishing, people are reluctant to keeping savings, however they have strong willing to invest to increase their money value (Aziz, 2005). Monetary transactions are conducted in Ringgit Malaysia (RM) and sen, which is the Malaysian paper and coin currency respectively (Kadir, 2007). Credit cards are also accepted widely in commercial businesses, while travelers’ cheques may also be changed at any commercial banks, hotels and authorized money changers. This will bring banks desirable opportunities along with the increase in the number of traveler to Malaysia. Government influences on macroeconomic activity through such means as fiscal policy, monetary policy. As for fiscal policy, the Government introduced a stimulus package, which focuses on selected projects with strong linkages to ensure maximum stimulus to economic growth and short gestation periods while meeting socio-economic objectives, worth RM7 billion to boost economy recovery. Since early August 1998, monetary policy has become accommodative by reducing interest rates to reinforce expansionary fiscal policy and revive the economy (Aziz, 2006). The intermediation role of the banking institutions came to the forefront during the crisis period. Banking institutions were excessively cautious in their lending decisions, causing a sharp slowdown in credit under an environment of uncertainty, to avoid a credit crunch situation. Banking institutions with sufficient capacity were encouraged to achieve a minimum loan growth rate of 8% for 1998. The motivation for the 8% credit floor was to free the banking institutions from the self-imposed credit freeze (Kadir, 2007). Technological The Government is also playing a vital role in technological development of banking industry in Malaysia by promoting E-payments nationwide. As most of the individuals and business have payment transactions with the Government. This practice will help to store and collect bank account numbers, E-payments and receipt notices and instructions for how to do these electronic payments. According to the BNM, 2005 all corporations and institutions at this forum the course of action result of reengineering in organization to fully use of E-payments that provided by financial institutions and outworkers (Appelbaum, 1991). E-channel, online banking systems are using computers, telephones and the internet. ATM is the most commonly used electronic channel through out the country facilitate bank customers to conduct transactions 24 hours in a day. Phone banking is also another e-banking option can be use 24 hours a day and can made all type of transactions. RHB is using Tele-banking known as remote banking. PC banking is the 3rd form of e-banking that could be done by downloading application software in house or office. Technology varies as the time passed like the ATM & Telephones was the first Multimedia wave invented 30 years ago after that it includes some more features of PCs & Online services. Along with them E-cash stored are smart cards and Interactive videos no need to go to ATMs to withdraw money because technology hooked to any multimedia devices such as PC, Interactive TV and also Cell phones. Onyx Software Corporation has been appointed by RHB Bank to develop its  customer relationship management (CRM) initiative and build an enterprise-wide platform designed to enhance its ability to meet customer needs and improve integration between the sales force and customer call center in an increasingly competitive marketplace (Appelbaum, 1991). Threats were disintegration, the cannibalization of existing delivery channels, risk of standardizing on the wrong technology platform and the inability to keep pace with changing technology. The obstacles included security risks, network and system instability and the difficulty of integrating different systems. Socio-Cultural This consumerism society was only created dues to the banking system encourage ‘buy today, pay tomorrow’, which makes a maintained push to drive up retail customer numbers. At present, the number of Malaysian aged 60 years and above is estimated to be 1.4 million and is projected to increase to 3.3 million in the year 2020. It also increased over the years. So number of people aged 60 can do work more number in future years. As Malaysia is the Muslim country so Islamic banking is very important factor in banking industry. Malaysia life style people love to do shopping and visitors comes from all over the world banks can extend their existing Privileges and Benefits programmes in Malaysia. Banks are targeting a new generation of life style driven people who celebrate in freedom, traveling and giving their lives new perspectives (Alexandrov, 2000). The banking system with all its complexities, challenges and opportunities touches virtually all aspects of customer’s daily lives. Using a credit card to make a purchase, writing a personal or business check, paying bills and moving funds online or accessing your funds through an automatic teller machine daily used in the banking system. There is certainly significant data to suggest that profitability,  business growth and increased market penetration could be the outcome for the banks that aggressively pursue the minority community as a business objective. Fortunately many banks across the country are recognizing the business value of minority communities as emerging markets. It is because 40% of the Malaysian population consists of minorities (Alexandrov, 2000). Ecological Business does not operate in a vacuum. Activities inevitably lead to a series of ecological and social impacts (Anonymous, 2002). At the bank, through the provision of finance and banking services to a wide variety of business customers, can be more far-reaching and profound than the direct impact of our actual operations, so they have put measures in place to ensure that this impact is managed. 1) Social Responsibility †¢ Anti-money Laundering It is the disguising of funds derived from criminal activity to give them legal respectability. It has been estimated by the International Monetary Fund that such financial flows are equivalent to between 2% and 5% of global Gross Domestic Product (Clavin, 2001). With effect from December 2001, the Financial Services Authority (FSA) has assumed greater formal powers to supervise and enforce corporate and individual compliance with laws and regulations relating to money laundering (Clavin, 2001). For instance, all bank staff are obliged to report any transaction which they suspect might be related to drugs, terrorism or other serious crimes. Equally importantly, they are instructed not to reveal to a customer that they are being investigated. Besides, the Co-operative Bank is in the process of implementing additional awareness and training measures to underpin its full compliance with FSA requirements. Additionally, a money laundering helpdesk has been launched to help staff with any queries. 2) Health and Safety The Co-operative Bank’s Health and Safety Officer has provided one to one training with managers and team leaders. The bank took part in the â€Å"European Week for Safety and Health† and was recognized by the Health and Safety Commission for its efforts towards raising Health and Safety awareness. Formal accredited training has been delivered to facilities staff to improve awareness and assist with their Health and Safety inspection responsibilities. A staff handbook has been produced and distributed to raise staff awareness of the Co-operative Bank’s absence policy. During 2002, the bank made further investment in occupational health services with the expansion of the medical services unit. 3) Protection of Natural Environment †¢ Ecologically-sound Paper Global paper demand is the single largest use of wood fibre. In order to relieve pressure on the environment and reduce the amount of paper waste going to landfill, banking industry should aim to use increasing amounts of ecologically-sound paper which is considered an efficient use of resources and protects old growth forests from logging. When compared with virgin paper, the use of recycled paper substantially reduces water consumption, energy use, air pollution, and water pollution. Furthermore, the Co-operative Bank has been seeking to use the most ecologically-sound paper available for the majority of their activities for the past five years. Likewise, the disposal of paper waste also has significant ecological impacts. During 2002, the bank recycled 657 tonnes of paper (Allsop, 2001). Analysis on models. 1) Sky Land There is no need to establish too many banks anymore! In addition, banks need not fiercely compete with each other for choosing the working places. The banks can retract the working places in order to save costs for hiring employees, paying electricity fee, and rental fee. Likewise, from the perspective of ecological environment, it can save lots of resources, such as electricity and papers. Although there is only several banks do the operation for the numerous numbers of customers, â€Å"Sky Land† makes banking industry to be more available, efficient and convenience. Pro If the banks retract some places of their business network, they can save cost, such as kinds of resources, the rent of the place, electricity, labors and the like. Therefore, the banks can save the money. Con In regard to the pace of developing technology and attitude to the new high-tech, the technology will not develop the level to support the plan to be applied in 10 years. Hence, banks can not implement this scenario. In addition, some people may not have their own computer or even telephone or phone. Therefore, they can not get in touch with banks. Conclusion This project cannot be successful, because not sure for the technology either can achieve the enough level to support this project. 2) FRV Nowadays, hackers keep increasing in technology manner. Banking industry has to summon the way to solve the problem. FRV is a system includes fingerprint, retina and even voice identification functions, the highest technology system. Every people have different voice, retina, and fingerprint, efficiently make use of them are benefit to banking industry. For instance, customers have to put their fingers on the fingerprint machine that verifies their personal identities, includes get to know the amount of money. Likewise, voice can differentiate each people and it can be used in  saving and drawing. In addition, their retina has to be checked for transferring. Moreover, banking industry invents â€Å"FRV† which includes fingerprint, retina and voice and customers have to do them in the meantime for recognizing their identities. Furthermore, it puts aside the troubles of bank book, bank card, and even credit card. For instance, fingerprint, retina, and even voice system combine together and install into the ATMs, people use their fingers or eyes to save or draw money, instead of their bank cards. Pro It is safety for customers to make transaction with banks. Besides, it brings a lot of convenience to customers who can go to bank directly without carrying anything. For banks, they can save some overheads and make more profits, for they can lay off some employees. Con It will take rather a lot of money to introduce the fingerprint and retina system in the banking industry. The system is only a tool, it is very instable. For instance, if there is a bug we do not know, it may destroy the database and loss the information of customers, and make lots of loss. Conclusion This planning can be success, because the fingerprint and retina system is already mature. This system has been applied in detecting criminal case by policeman; example is â€Å"Henry system†, which classifies each fingerprint in terms of its arches, loops, whorls, composite style prints, and the location of certain fixed points and ridges. It is easy for banking industry to put it into practice. In addition, this project will improve the safety of customers a lot. Therefore, this system will be popular in the banking industry in the next ten years. Recommendation The banks who want to introduce the FRV have many barriers, such as costly and instable. Despite of these which are also can be solved easily. They can ask the suppliers who are familiar as they can give more discounts for them.  Furthermore, government is a good supplier as they can support the banks for introducing the system. Yet, employ engineers for repairing the systems when they are spoiled. Using â€Å"Backup† and â€Å"Defragmenter† are also the ways to reduce barriers. In addition, they also can establish a department for checking the system daily or monthly. 3) Automatic Bank Operator Along with the society development keep advancing, banking industry is able to introduce much more high-tech equipments. Firstly, the banks just only have to possess computers and phones with high technology â€Å"Automatic System† which includes automatic responding and do transaction for customers. Besides, they only have to hire a few employees to operate the computers. Secondly, customers can contact with â€Å"Robot Operator† to save, withdraw, and others banking functions. Be more bravely, it is better to invent â€Å"Robot Operator† which does transaction for customers. Thirdly, customers use the computers through the Internet to have a connection with the banks which includes â€Å"Automatic System†, giving responses to the customers via â€Å"BCR† (Banking Chat Room) that chat online which can contact with lots of customers in the meantime. Moreover, banking industry merge the three functions which is called â€Å"ABO† (Automatic Bank Operator), can save much money and earn a tremendous of money in the future. Eventually, in the next ten years, banks do not need employees to transact the business. Pro The â€Å"Automatic System†, â€Å"Robot Operator†, and â€Å"BCR† can do work instead of human, and banks incline to lay-off employees. The banks directly save much money in overheads. Con It costs much money for the banks as they have to invest a tremendous of money into this high technology equipment. Furthermore, it also needs longer time to get back the costs of investment and even much more long time to get profit. When the technology system goes wrong and cannot be operated, which cause the transaction be more trouble and the banks have to pay for their  mistakes. Moreover, they also have to employ engineers repair the system. Recommendation The banks can ask government to support their â€Å"ABO† in investment as these investments have to put much capital into it which is very costly and risky. Besides, they can search the suppliers who sell the raw materials and equipments to be cheaper or given discount. 4) Loving Needy In the next ten years, there are many countries will become ageing population society, the tremendous of old folks are retire or disabilities who do not have enough money to sustain their lives. Therefore, they need money to make their lives become better or even just only need to survive. In turn, the government needs more money to the welfare work for the needy. For instance, the government does a policy that is named â€Å"Loving Needy† to require the entire banking industry reel off 10 percent to 50 percent interests of the customers’ deposits. It is available and efficient to the whole society. Pro The needy can get the money via â€Å"Loving Needy† to have better live. Besides, the banks can reduce the welfare costs in other ways. Con It seems like the banks oblige customers to real off their portion of deposits. They cannot do anything to reject the government, else they just only can do strike on the government daily for rejecting them to do it. Conclusion All the banking industry does to the needy are correct and available. They ought to do this welfare work more often and even throughout the world.

Tuesday, July 30, 2019

Consumer Attitudes Towards Counterfeit Products Essay

Counterfeit products and materials are knock-off, bootleg, pirated or other illegally produced materials that are produced and sold in violation of the Intellectual Property Rights (IPRs) of others or in a manner that fraudulently represent their quality or origin (Porteus, 2002). Despite the various anti-counterfeit efforts of multinationals and international trade organizations, counterfeiting continue to pose a significant and growing threat to businesses, both in developed and developing countries (Vida, 2007; Maldonado and Hume, 2005). Vida (2007) observed that even in the face of technological advancements that facilitates easy recognition of genuine products, and the legal pressures buyers and sellers of counterfeit products, global businesses still lose billions of dollars to counterfeiters annually. The annual cost of counterfeiting is estimated at $200 billion and the international trade in counterfeit products is believed to account for between 3-5% of overall world trade. Most threatening is the fact that several bodies such as the International Anti-counterfeiting Coalition (IACC) and International Intellectual Property Institute (IIPI) agree that international trade in counterfeit product is booming. However, it should be emphasized that the total losses due to counterfeiting, annually, should not be measured in terms of the economic devastation caused to genuine product manufacturers, its effects on hundreds or thousands of jobs worldwide, increase in the cost of marketing genuine products, reduced brand equity and trademark owner reputation. Most importantly, the threat to consumer health and safety that counterfeit product poses cannot be overemphasized (Vida, 2007; Maldonado and Hume, 2005). Although, counterfeiting is a global problem, it appears to have a more significant effect on UAE for a number of reasons. Managing Intellectual Property, an internet magazine on counterfeiting, reports that while UAE is one of the fastest-growing economies in the world, it is also renowned for luxury, tourism, business and rapid development. Particularly, its free trade zone that offers attractive incentives for business, especially due to its location at the centre of the Middle East and the Arab states of the Gulf Cooperation Council (GCC) countries also create the right environments for counterfeiters to market their products. The close proximity of the free trade zone to leading counterfeit producing Asian countries and its status as a transshipment hub also greatly increases the country’s problems with counterfeiting. A recent study carried out by PricewaterhouseCoopers and reported in the magazine stated that counterfeit products make up to 68. 5% of automobile parts in the market, with fake pharmaceuticals, the least hit sector, accounts for 0. 2% of products in the market. It is therefore very critical that all efforts must be directed towards reducing this menace, and obviously, reducing counterfeiting, must involve be from the supply or the demand side. Augusto de Matos, Ituassu & Rossi (2007) rightly contend that actions towards counterfeiting can arise from both supply and demand sides. While acting from the supply side include understanding the incentives, rationale and factors that encourage or influence people to engage in manufacturing counterfeits, the demand angle involves understanding consumer attitudes and willingness to purchase fake products (Vida, 2007). Authors have largely argued that the supply side of counterfeiting has received an undue amount of attention in recent times, with the demand side largely ignored. Also, it is an established economic fact that supply is driven by demand; it is safe to suggest that the increase in global counterfeit trades is partly driven by the increasing consumer demands for cheap, substandard products. For example, the rise in the market for non-deceptive counterfeit products strengthens this argument. Thus, understanding the demand side could be the most important tool in fighting counterfeiting globally. In this regard, this paper, therefore, intends to investigate consumer attitudes or willingness to purchase counterfeit products in Abu Dhabi using a questionnaire approach to unravel the various factors and influences that shape consumer attitudes and behaviors when it comes to purchasing counterfeit products. Theoretical Framework Vida (2007) noted that since the mid 1990s when Elisabeth Hirschman, expressed the need for researchers to explore the ‘dark-side’ of consumer behaviors, literatures investigating and explaining the various factors that influence consumer purchase behaviors, especially with regard to illegal or counterfeit products, have increased considerably. Building on the â€Å"willingness to pay† concept, Vida conceived explored consumers’ willingness to purchase fake products. The author contended that demographic and socio-economic factors like age, gender, education, marital status, income and religiosity shape consumers’ attitude towards counterfeits, innovativeness (desire to be unique) and social pressure. These three, in turn, influence consumers’ willingness to purchase counterfeit products. Also, Xuemei and Veloutsou (2005) in their exploratory study, also reports that personal and social factors significantly influence consumers’ purchase behaviors. The authors contended that personal and social factors such as: value consciousness, normality susceptibility, novelty seeking and collectivism, and five attitude measures: reliability of the product in question, functionality of the product, recognized social benefits of purchasing the product, risks of purchasing and legality of purchasing, influence consumer purchase of counterfeit products. The study found that novelty seeking significantly influences consumer purchase of counterfeits products due to the similar or sometimes, superior quality of counterfeit products. Moreover, in a more elaborate study, Augusto de Matos, Ituassu and Rossi (2007) also found that price quality inference and previous experience, among others, significantly increases the chances of consumers purchasing fake products. This study, drawing from the findings of the studies mentioned above, contends that a consumer attitude towards counterfeit product greatly influences their purchase behavior. It also hypotheses that previous experience with safety concerns, quality of counterfeits with respect to the price, and the intention to use counterfeits to test the product before purchasing the genuine brands, shape consumer attitudes towards counterfeit and subsequently, their purchasing of counterfeit products. Augusto de Matos, Ituassu and Rossi (2007) rightly point out that quality and price are two fundamental factors that shape consumer purchase behavior. Traditionally, consumers believe that lower priced products are of lower quality, and this is largely the case with deceptive counterfeit products. However, with non-deceptive counterfeits products, consumers are offered products of similar or superior quality, compared to the genuine products, at lower prices. The combination of low price and high quality is bound to improve consumer attitudes towards counterfeits. For this reason, it is expected that: Counterfeits with superior quality enhances consumers’ perception and attitudes towards counterfeit products. Safety concerns are one of the most important issues with counterfeit products. These products have been known to pose significant threat to consumer health and safety, especially when it concerns medications and household items. However, not all consumers consider counterfeit goods to be unsafe or dangerous. It is expected that: Consumers who consider counterfeit goods to be unsafe and dangerous will have unfavorable attitudes towards counterfeit products, and vice versa. Lastly, novelty seeking can also influence consumer attitude towards counterfeit products. This feeling refers to individuals’ need for a sense of worth or social recognition; people always want to be seen as special and capable of affording material things. The increasing materialism in the world means that people that cannot afford the finer things of life feel unworthy. Since the presence of cheaper and yet quality counterfeit products provide the opportunity to afford these luxuries, individuals in the lower economic range are often willing to purchase such counterfeit products. Thus, it is expected that the sense of novelty influences consumer attitude towards counterfeit products. Method To investigate the influence of the factors discussed above on consumer attitude towards purchasing counterfeit products, this study surveyed a cross section of individuals in the city regarding their perceptions of counterfeit products. The research instrument adopted was questionnaire. The questionnaires, consisting of a hundred direct questions in Likert scale style, varying from 1 (completely disagree) to 7 (completely agree), were distributed to students on campus at several shopping centers. Because the questionnaires, in most cases, were self administered, respondents were encouraged to answer all the questions provided. Due to this, a total of 95 valid and usable questionnaires were collected at the end of the survey. Of the 95, 30 were below 20years old, 45 between 21 and 25 years old, with the rest above 26years old. With respect to education, more than half of the respondent had at least high school certificate, and interestingly, almost all of them (about 80%) had purchased counterfeit product in the past. Results Table I below presents the total number of questionnaires collated and the mean of responses for each of the variables under investigation. As presented in the table, the mean of respondents who rated superior quality, inexpensive trials and novelty as important factors for considering counterfeit products were 4. 4674, 4. 2211 and 4. 0053 respectively; while the respective standard deviation were 1. 16843, 1. 35759, 1. 17881 N Attitude Superior Quality Tryout Novelty Valid 95 92 95 93 Missing 0 3 0 2 Mean 3. 5447 4. 4674 4. 2211 4. 0053 Std Deviation 1. 33188 1. 16843 1. 35759 1. 17881 Minimum 1. 00 1. 00 1. 00 1. 00 Maximum 7. 00 7. 00 7. 00 7. 00 Table I To further measure the influence of these variables on consumer attitude towards counterfeit products, correlation coefficient was calculated for the variables. The result indicated that all three variables significantly influenced consumer attitudes, with superior quality presenting the most significant influence. For superior quality, r = . 668, r = . 395 for counterfeit products as tryouts, r = . 653 for novelty (correlation is significant at the 0. 01 level for all variables . ) As obvious from the three scatter diagrams above, this study found a significant correlation between the superior quality of counterfeit products and consumers’ favorable attitude towards purchasing such goods. Also, the study showed that consumers see cheap counterfeit goods as an opportunity to tryout products before purchasing them or in other cases, as a better opportunity to own products they, otherwise, will not be able to purchase. Discussion and Recommendations Counterfeiting is a growing global menace resulting in the loss of several billions of dollars annually. In finding the right tool to fight this menace, researchers and policy makers have focused on either the supply side or demand side of the problem, although, there seem to be more attention on the supply side. This paper argued that demand is a major driver of supply and that by understanding the reasons and factors that encourage demand for counterfeits, the fight against counterfeiters will take a different and better dimension. In truth to this assertion, several authors have investigated the personal and social factors that influence demand for counterfeit products. In contribution, this study investigated the influence of three variables: superior quality of counterfeit products, using counterfeit goods as inexpensive trials before purchasing genuine ones, and novelty seeking impulses. The result of this study established the hypotheses proposed earlier that these variables significantly influence demand for counterfeit products. It is an established fact that price and quality are two major determinants of consumer purchase behavior. However, by presenting consumers with superior quality products at lower prices, the tendency to purchase these counterfeits products will be considerably higher than the genuine product, because in doing so; the individuals will be receiving higher value for lesser money than if they have purchased the original. It, thus, becomes easier for consumers to rationalize their actions. The case is also similar for the two other variables, counterfeit products offer consumers the chance of buying products they, ordinarily, will not be able to afford, or the opportunity to try the product before purchasing the original. In both cases, consumers are saving money and achieving their objectives. Recommendations It is apparent that, among other things, price and quality significantly drive demand for counterfeit products. Manufacturers of genuine should strive to provide consumers with products of similar or even quality, compared to fakes, at reasonable prices. Manufacturers should also stress the fact that by purchasing fakes, consumers are increasing the cost of genuine products and destroying the jobs of several others. For as Xuemei and Veloutsou (2005) pointed out, consumers are also influenced by the desire to be accepted by significant others, by emphasizing the moral aspect of purchasing fakes, manufacturers can significantly discourage consumers from purchasing counterfeit products. Conclusion Although, counterfeiting is a serious global problem, very little is known about why consumers choose to patronize such fake products. This study has shown that the superior quality of some fake products, their lower price, which enable consumers to try them out before buying genuine ones or to own products they would not have been able to afford, greatly improve consumer attitudes towards counterfeit products. It is recommended that manufacturers should strive to meet the quality and price of counterfeits to reduce the demand for fake products. References Augusto de Matos, C. , Ituassu, C. T. and Rossi, C. A. V. (2007), Consumer attitudes toward counterfeits: a review and extension, Journal of Consumer Marketing, Vol. 24 No. 1 pp. 36-47. Maldonado, C. and Hume, E. (2005), Attitudes toward counterfeit products: an ethical perspective, Journal of Legal, Ethical and Regulatory Issues, Jan-July. Managing Intellectual Property (2008), How to tackle fakes in the UAE, Available at http://www. managingip. com/Article/1940730/How-to-tackle-fakes-in-the-UAE. html (Dec 13 2008). Porteous, S. D. (1998), Organized Crime Impact Study Highlights, Paper Prepared for Public Works and Government Services of Canada, Cat. No. JS42-83/1998. Xuemei, B. and Veloutsou, C. (2005), Consumers’ attitudes regarding non-deceptive counterfeit brands in the UK & China, Brand Management, Vol. 14, No. 1, pp. 211-222. Vida, I. (2007), Determinants of Consumer Willingness to Purchase Non-Deceptive Counterfeit Products, Managing Global Transitions, Vol. 5, No. 3, pp. 253–270.

Monday, July 29, 2019

Computer as a way of life

1.0 IntroductionIn today’s modern age where computer has become a way of life, it is evident that a majority of the country’s institutions still do not adapt the high technology. We all know that modern schools are now operating at great pace striving to serve as many students as possible with the best of their abilities. But as the years rolled by, the number of students has grown and various private and public schools arise that the manual method of monitoring students is no longer practical.In this study, the developer is hoping to develop a system that will help not only the students, but the whole campus as well. Adding function for the provided identification barcode of the ID school, and keeping track of students who will be enrolled to avoid trespassers that may cause unlikely activities such as stolen valuables, and the like, therefore will allow professors, guards, and staff ease in keeping the campus secured and monitored during the entrance of students †“ a system that will be automated, user-friendly, time effective, and efficient.1.1 Background of the StudyOur Lady of Perpetual Succor School, OLOPSS, came as a vision to a couple from Laoag City, Dionisio Alonzo Salvador, Sr. and wife Carmen Caday Salvador who found home in Marikina in the early 70’s. In 1995, College Department was opened, changing the school name into Our Lady of Perpetual Succor College, OLOPSC.During the developer’s college years since 2010 in Our Lady of Perpetual Succor College, OLOPSC, school IDs have their own barcodes, with only one function, for the use of the library. Where it is scanned by a barcode scanner or reader, to know if there are any other borrowed books that will be, or haven’t been returned.Now more than ever, growth of popularity have increased, that is why students enrolling to different universities and colleges increases. A college or university is primarily devoted to the progress and security of students. Basical ly, students spend a substantial amount of time in classrooms and/or laboratories waiting for information to be delivered by teachers/professors, and the safety performed by the security guards.The degree to which the students are satisfied with the knowledge and safety received is relative not only to the professors' expertise in their field and the guards' duties, but also to the quality of the school management. And we all know that as the number of students continually increase, maintaining the security of a school can also become increasingly difficult, especially if everything is done manually.1.2 Conceptual FrameworkInputs ProcessOutputsFigure 1.Paradigm for barcode enabled entrance system in college.1.3 Objectives of the StudyGeneral Objective: The general objective of this study is to design and develop an automated security help solution that will serve as a proposal to help security guards monitor the difference of enrolled students from not enrolled students and trespass ers. Specific Objective:1.To automate the entrance security system of students entering the campus; 2.To allow security guards to retrieve a student's status whether enrolled or not; 3.To let the security guards distinguish a student from a trespasser.1.4 HypothesisFrom the early data that has been gathered, the developer is able to conduct the study that the current school security is done manually and now requires automation.On the data that will be gathered from different sources, the developer will be able to come up to an intelligent guess that the creation of the proposed Barcode Enabled Entrance System, or BEES, will be probable and that its development will be beneficial to the whole college campus of Our Lady of Perpetual Succor College, OLOPSC.1.5 Statement of the ProblemSpecifically, this study aims to answer the following: 1.What are the common problems encountered with the existing manual system of entrance security? 2.What are the possible solutions to the problems enc ountered with the current system? 3.What is the difference between the manual system of security and the proposed security help system? 4.Is it possible to design and develop an automated security system that will help security guards to monitor the entrance of each student? 5.Will the said system really be useful not only for the security guards, but also for the whole school? 6.Will the system really provide a user-friendly interface for the convenience of the security guards and students? 7.What will be the cons of the proposed system?1.6 Significance of the StudySocio-economic significance. In this study, the proposed system will inspire other students to develop an effective and efficient system.Technological significance. The proposed system will introduce technology to other schools, colleges and universities that are until now adapting the manual method of security management.The result of this study will be beneficial to the following:College. The proposed system will autom ate everyday security tasks during entrances of the students and can help maximize time spent with all of the students thereby providing better service.Security Guards. The proposed system will make it easier for the security guards to manage the students entering the campus and convenient when it comes to determining a student of the institution or not.Students. Students are the school's principal assets. And the reason why this study is conducted is to provide a solution to the security guards' need to better secure the students and the campus.Professors and Other Staffs. Professors and staffs can benefit from this study, as they are an integral part of the whole college institution.Researcher. The researcher will develop her writing, analysis, and interpretation skills needed to make a good thesis.Future Researchers. This will benefit other researchers who wish to have similar studies as they can get background information from the result of  this study which will serve as temp late to modify their research.1.7 Scope and DelimitationIn general, the focus of this study is directed towards the design and development of an automated security help system. The study will be conducted within the vicinity of Our Lady of Perpetual Succor College, Marikina City with its students, professors, security guards, and staffs will be randomly selected from June 2013 to March 2014. The study is largely dependent on the honesty, sincerity and integrity of the respondents.1.8 Definition of TermsDefinition of terms has been provided in order to clarify words that might be foreign to different readers: Automated. Use of machines which can do the work easy and faster instead of people. Barcode. Series of black and white that holds data relating to the object which it is attached. Barcode Scanner / Barcode Reader. Electronic device for reading printed barcodes. Computer.An automatic electronic machine which calculates data and performs commands given to it by a person who uses i t. Developer. A person who develops something such as an idea, a design, or a product. Efficient. Always functioning at the highest of standards, and finding the best possible solution. Function. Operation that a particular object performs.High Technology. Use of new advanced machines and equipment.Institution. A large important organization.Integral. Important or necessary.Interface. Presentation on screen and how easy it is to operate. Maintenance. Keeping something in good condition by regularly checking it and repairing it when necessary. Manual. Operated by hand, rather than by electricity or a motor. Method. Particular way of doing something.Paradigm. A model for something which explains or shows how it can be produced. Security. Measures that are taken to ensure that only people with permission enter it or leave it. Socio-economic. Combination of social and economic factors.Substantial. Large in amount.System. Set of elements or components that interact to accomplish goals. T echnology. Result of scientific knowledge being used for practical purposes. Template. Basis.User. A person who uses something such as a facility, product, or machine. User-friendly. A machine or system that is well designed and easy to use. Variable. Factor that can change in quality, quantity, or size, which needs to take into account in a situation. Vicinity. Near or along a particular place.

Eugenics and the Horrors of Genocide in Nazi Germany Essay - 1

Eugenics and the Horrors of Genocide in Nazi Germany - Essay Example In the 1870s industrialization began to create a thriving economy in Germany, but a wide gap between wealth created a society in which was exacerbated by a lack of infrastructure. The population was growing at a rate that was not in step with the provisions that were available at a social level. Mortality rates began to skyrocket and the development of a definable issue meant that solutions would soon also emerge. Medical ‘advances’ began to define the meaning of human existence, often through the delusions of prejudiced theories that supported an idea that there were a human race and a series of sub-human races. During the time between the 1870s and the 1930s, a relationship had developed between American eugenics experts and German scientists with the same goals. In the 1930s, however, the relationship became strained. The racism that developed in Nazi Germany involving those of an ethnic Jewish background became an issue of contention and the American scientists were not interested in the idea that being Jewish meant being inferior. One of the clear signs that the racism was infecting the society of Germany is that of the Nuremberg laws which stated that those with Jewish heritage in their background would not be allowed to have citizenship. Decrees began to emerge that were further and further limiting the rights of those with ethnic Jewish ancestry, creating a prejudicial climate that began to define the nature of the beliefs as being centered on the heritage that broke the code of acceptable genetics which was growing in the nation.

Sunday, July 28, 2019

Can social media act as a platform for counter hegemony Research Paper

Can social media act as a platform for counter hegemony - Research Paper Example Social media channels did not cause uprising but played a significant role in sharing information. This paper seeks to discuss the primary role performed by social media during the 2011 Egyptian revolution (Attia, Assaf, El, Kaldas, Mo, & El-Shazly, 2011). It will explore the question whether the social media acted as a platform for counter hegemony. Finally, it will analyze theories discussing the linkage between social media and power, and how social media challenged the authority of Mubarak. Discussion Social media acts as the XXI century pamphlet, a way that individuals who are frustrated and unsatisfied with the status quo can plan and organize themselves and stage or coordinate protest. There are various theories that discuss the relationship between social media and power, for example, Antonio Gramsci and Marxism theory. Hegemony is a term that emanated from Karl Marx writing. It was intellectualized by a Marxist social philosopher, Antonio Gramsci, who lived in Italy. Gramsci subscribed to Marxist idea of the historical dialectic. This implies that based on the classic Marxist theories, communities or societies must change over time from oppressive systems of the economy to highly liberating ones till the society finally attains the Utopian communism state (Sowers & Toensing, 2012). Marx asserted that capitalism was a subordinate system of economy because of the unequal wealth and power distribution among the few powerful individuals. Moreover, he argued that ultimately, the capitalism would be overthrown by the masses and shift to the system that is less oppressive. Gramsci employs â€Å"hegemony† to theorize the fundamental condition for effective overthrow of both the powerful (bourgeoisie) by the proletariat (ruled) and its allies (for instance, the peasantry), and the bourgeois power structures in the Western European states during XIX and XX century. Gramsci’s â€Å"hegemony† is the process of intellectual and moral leadership in which subordinate or dominated classes of post 1870 Western European industrial nations consent to their own suppression by the powerful classes, rather than being coerced or forced into accepting inferior ranks. According to Gramsci, hegemony is a form of control practiced by a dominant or powerful group. In the Marxist idea of a group dominating production means; Gramsci uses â€Å"essential group† to represent the â€Å"ruling class† (Terryn, 2011). For him, the Western European nations dominant class represented the bourgeoisie, who according to the Communist Manifesto are â€Å"the class or group of modern Capitalists, wage labour employers and the owners social production means, whereas, the vital subordinate class represented the proletariat, â€Å"the group of modern wage-laborers, without means personal production means, and thus, must sell their labour power to survive. Gramsci’s hegemony use can only be realized in the light of some of the conce pts he established and those of the Civil Society and the state. Gramsci argues that media promotes powerful or dominant powers structures in his broadly used hegemony theory. In media studies, the term hegemony is defined as ways in which media motivates individuals to consent to the status quo structures of power. In the case of the Egyptian revolution, Gramsci and Marxism theory reveals that the authoritarian leadership did their best to block and cut Internet access by the mass. Unfortunately, despite their efforts,

Saturday, July 27, 2019

Chopin Biography Essay Example | Topics and Well Written Essays - 500 words

Chopin Biography - Essay Example It was in Warsaw, the Polish capital where Frederic Chopin spent most of the twenty years of his life. He made his debut in 1818 when he played a concerto by Gyrowetz, which was then followed by the publication of his Rondo in C minor at the Warsaw Conservatory in 1825 (Piano-Paradise.com, 2005). Following his debut, he presented his own compositions, F minor and E minor Concerti in Warsaw in March and October of 1830 (Piano-Paradise.com, 2005). Before Frederic Chopin became a pianist, he was left to develop on his own. Since the Warsaw Conservatory had no great piano teachers, he had to use his own skills (Biography of Frederic†¦). His love for Bach and Mozart served as his inspiration as he kept on mastering the piano (Piano-Paradise.com, 2005). Frederic Chopin eventually became a skilled pianist and a good number of his works were for solo piano (Paterson, 2008). â€Å"Many of these works are fairly short in duration, such as the Preludes, Etudes, Waltzes, Impromptus, Nocturnes and Scherzos, as well as the previously mentioned Polish dance forms of the Mazurka and Polonaise† (Paterson, 2008). More significant was his ballade, which is â€Å"free in style like a stream of consciousness but with an internal logic† (Paterson, 2008). This theme of consciousness was present in all his preludes, most especially Prelude Numbers 15, 4, 6, 7 and 20. Another famous work was the Minute Waltz which was said to be a nickname of his piece (Paterson, 2008). Frederic-Francois Chopin had the novelist George Sand as his companion for ten years, but she left him when Chopin had tuberculosis while in Paris (Piano-Paradise.com, 2005). Soon after that, October 17, 1849, Chopin died at the age of 39 (Polish American Journal, 2007). â€Å"Chopins technique was flawless, and he always caused great excitement with the evenness of his scales and the careful manipulation of his legato (Piano-Paradise.com, 2005). Today he remains as one of the

Friday, July 26, 2019

Human Resources Essay Example | Topics and Well Written Essays - 3750 words

Human Resources - Essay Example Differences between Personnel management and HRM Personnel management is essentially an administrative record keeping function at the operational level. Personnel management attempts to sustain fair terms and conditions of employment while simultaneously, efficiently managing personnel activities. HRM, on the other hand, is concerned with the development and implementation of people strategies that are integrated with corporate strategies and guarantee that the culture, structure, and values of the organization, as well as the quality, motivation and commitment of the employees contribute fully to the attainment of the organization’s goals (Armstrong 2006, p.5). HRM is concerned with undertaking of analogous functional activities conventionally undertaken by the personnel function such as job analysis, employee relations, planning, and compensation management; however, the HRM approach undertakes these functions in qualitatively distinct way relative to personnel management (D uberley and Walle1995, p.891). Personnel management is essentially workforce centered, directed largely at the organization’s employees. ... HRM, on the other hand, is strategic in nature concerned with directly aiding organizations to gain sustained competitive advantage (Guest, Michie, Conway, and Sheehan 2003, p.291). HRM is mainly more proactive than personnel management, whereas personnel management is concerned with the maintenance of personnel and administrative systems. Personnel management is largely applied in the public sector, tertiary education, and local government despite the complexity associated with public sector including a mix of politics, service delivery, and management. In the private sector, HRM can be used to manage the human side in corporate and large organizations, banks, small and medium –sized enterprise, consultancies, and trade unions. High performance working environment is linked to attainment of high levels of performance, profitability, and customer satisfaction (Armstrong 2006, p.6). Firms such as Tesco and British Airways have demonstrated the significant role played by HRM in the attainment of management objectives mirrored in the transformation of the personnel management function. (P2) The function of HRM centres on planning, developing, and administering policies and programs designed to render the expeditious utilization of organization’s human resources. HRM is concerned with the process of hiring and developing employees with the aim of transforming the employees into valuable resources for the organization (Sims 2002, p.3). The human resources function is mainly responsible for managing workforce as primary resources that play a critical part in the firm’s success. HRM largely functions as a value adding a component in the organization based on the strategic utilization of

Thursday, July 25, 2019

One Hundred Years of Solitude Research Paper Example | Topics and Well Written Essays - 1750 words

One Hundred Years of Solitude - Research Paper Example eceived its inspiration from European and North American Modernism and on the other hand it also drew influence from the Cuban Vanguardia or more popularly known as Vanguard Literary Movement. The novel founded its plot on the story from the historical context or this can be also taken as a sort of chronicle turned into drama. The novel is based on the life of the multi-generational Buendia Family. The patriarch of the family, Jose Arcadio Buendia was the founder of the town named Macondo. This town is actually metaphoric of the township on which the plot of the novel throbs, the metaphorical Columbia. The story is basically non-linear in pattern and the narrative structure of the novel is unique as it is narrated through different time periods. This technique was adapted by Garcia from the Argentine author named Jorge Luis Borges. He used this technique in his creations like ‘The Garden of Forking Paths’ of 1941. It is important to note that in style and theme, the novel ‘One Hundred Years of Solitude’ is representative of the literary creation of the Latin American Boom period of 1960s and 1970s (Wood, â€Å"Garcia Marquez 100 Years of Solitud e†). The novel ‘One Hundred Years of Solitude’ written in the year of 1967, presents the story of seven generations of Buendia Family and their lives at the town founded by them called Macondo. The founding member of Macondo, Jose Arcadio Buendia and his wife Ursula who was also his first cousin, are shown leaving Riohacha at Colombia and headed towards a new destination in search of a better life. The search for a better life and a new home launches them to build a city of utopia and hence they find themselves on a riverbank from where their dream for a world is decked up with visionary mission starts. While camping on the riverbank itself, Jose dreams of a city of mirrors that shall bear the reflection of the world in and about it. After awakening form that dream, Jose decided to shape his dreams and starts

Wednesday, July 24, 2019

Electromagnetic induction Essay Example | Topics and Well Written Essays - 1000 words

Electromagnetic induction - Essay Example Introduction Electromagnetic induction involves the electric current produced across a conductor that moves in a magnetic field. It is the basic operation for transformers, generators, electric motors, induction motors, solenoids, and synchronous motors. Electromagnetic induction is the process, which gives a prediction of the behaviour of the interaction between electric current and the magnetic field. Michael Faraday discovered the concept of induction in the year 1831. He stated that the produced electromotive force (emf) around a path that is closed is directly proportional to the magnetic flux rate of change through a surface that is path bounded. This implies that, there would be some induced electric current in a closed circuit whenever the flux going through a conductor bounded surface changes. This means that the conductor will be moving through it, or the field would be experiencing a change in its strength. Theory In Faraday’s initial demonstration of electromagneti c induction, two wires were wrapped around opposite sides of a ring of iron. According to his assessment, of the electromagnetic properties, he knew that whenever the currents began to flow in the first wire, a wave would move in the ring leading to an electrical effect on the side that was opposite. One wire was plugged into the galvanometer and observed during the connection into a battery. In this experiment transient currents were observed when the wire was connected to the battery and during disconnection. The observed induction was due to a magnetic flux change that happened when the battery was disconnected and connected. For many year, Faraday discovered different electromagnetic induction manifestation. For instance, transient currents were observed whenever a bar magnet was quickly slid inside and outside a wire coil thud generating Dc current through the rotation of a disk of copper next to a bar magnet having a sliding electrical lead. The explanation of electromagnetic induction according to Faraday was in terms of lines of force. Mathematically, the expression of Faraday can be written as; ?= - d?B/dt, where ? represents the electromagnetic force, and ?B represent the magnetic flux. In a case where there is a wire coil, having N loops with the same an equal area, the equation would be given by; ? = - N d?B/dt Whenever the Faraday’s law is combined with the Ohms law and Ampere’s law, a new law referred to as Lenz’s law would be generated. Faraday’s law is one equation having two phenomenons. The two phenomena include the EMF motion produced by a the force of magnetism through a moving wire and the EMF give out by an electric force as a result of magnetic field that is changing. Apparatus The apparatus for this experiment were coils, small compass, bar magnets, galvanometer, analogue multimeter, LV transformer, Dc voltage source, and LV transformer. Procedure Magnetic fields The outline of the two bar magnets were traced , and a small compass used to check the direction of the magnetic field at various points. The field direction was sketched in arrows to display the field direction. Two separate sketches were completed. One sketch involved attracting magnet where as the other one for a repelling magnet. The two sketches are displayed in diagram 1. Diagram 1 Attracting Magnets Repelling magnets Inductance The inductance for an air coil core was measured using the electronic bridge

Tuesday, July 23, 2019

Concept of criminal punishment Essay Example | Topics and Well Written Essays - 500 words

Concept of criminal punishment - Essay Example The English were notorious for their use of corporal punishment and their penchant for this form of punishment proliferated in their iniquitous colonies (Punishment ). The American colonies witnessed such abnormal cruelty at the hands of the English masters, and a semblance of civilized behavior was established after the advent of independence. Gradually, corporal punishment was rooted out of the American penal system, and the extant penal system has no room for such iniquitous measures (Punishment ). From the dawn of civilization, societies have implemented a wide array of punishments to deter crime. Initially and even today in some of the Islamic countries, the lex talionis or the law of equal retaliation used to hold sway. In this form of punishment the retribution is akin to the crime committed. For instance, in some Islamic countries, a thief’s hand is amputated. This is termed as the law of hudÃ… «d. An improvement over these barbaric customs was the exaction of money from the perpetrators of crime. This was predominant in England from the 5th to the 15th century. Such money was required to be paid as compensation for theft, personal injury and death (Champion, 2007). The American penal system is characterized by a high rate of incarceration. This is on account of the proliferation of crime and the resolve of the authorities to enhance the number of compulsory sentences. The discretionary powers of the judiciary have been curtailed, since the 1980’s with the consequence that the length of sentences increased from 39 to 54 months. This measure has been hailed as a grand success, because there was a substantial decrease in the crime rate. However, of late, the crime rate has displayed an increase. This has been attributed to the absence of a properly implemented rehabilitation program for convicts, and the proclivity of the authorities to imprison people with

Critical Analysis of the Nature of Gender Differences in Communication Essay

Critical Analysis of the Nature of Gender Differences in Communication - Essay Example In addition, the way that men and women adapt to others whose communication methods are different in order to achieve their communication goals. One non-verbal element of communication that can often be seen is the concept of confirmation. This is the process of acknowledge that someone exists and that the communicator is aware of that existence. This is often achieved by the nod of the head, a handshake, smile, or eye contact. A verbal indication of confirmation is a greeting such as a simple â€Å"hello†. This type of communication demonstrates respect and is often used as an attempt to gain trust from another person. We can see how men and women respond differently to this type of communication by looking at the first scene of the Modern Family episode. The theme of the situation comedy is that the family supports the other members even when they don’t agree on the actions of the family member, and even if they don’t believe that an endeavor will work. They co mmunicate their support in a secondary way through nonverbal cues as well as verbal advice. The characters in the family represent the stereotypical characters for the most part, but three members of the family stand out from the rest. There are two gay guys and a Latin Woman present in the show, who has a son with Jay in the show. Gloria, the Latina, has a thick Spanish accent and dresses like a Flamenco dancer almost, she is the prototype of a hot Latin woman, wearing bold colors and low cut dresses with high heels. Since the essay is about the difference between men and women and how they communicate, parts of the essay will focus on how she communicates in certain situations with her husband and other men. When Claire sees Dwayne, the town councilman standing outside a grocery store campaigning for reelection, she calls him â€Å"jerk† and â€Å"phony† in a low voice to her husband because Dwayne did not accept her proposal to put in a stop sign on her street. On t he other hand, the councilman who is running for office shows a big sign of the element of confirmation by warmly saying hello and shaking the husbands hand and asking for his vote. The husband immediately responds with eye contact and a smile saying that he will vote for the man. Meanwhile, Claire keeps reverting her glance away from the councilman, and indicator that men are more straightforward when communicating in person, while women are more self-aware. When Claire finally introduces herself, she announces that they have met before implying that the man should remember the encounter. After a few seconds, the man does remember and once again refutes her original request, keeping a smile on his face the entire time as if smiling is all it will take to win him the election. The man fails to acknowledge her request, responding that everyone asks for the same thing, but that’s not really what people want. This frustrates Claire even more and as she walks away, the issue for her is clearly not solved and her trust in the councilman has diminished even further. This is a great example of how men and women respond differently to confirmation efforts in communication. For the husband, the nonverbal cues were enough to satisfy him and increase his faith in the councilman, but for Claire, the use of non-verbal cues and the lack of verbal confirmation only served to lessen her faith in the coun

Monday, July 22, 2019

Harris on End Times Essay Example for Free

Harris on End Times Essay : Hey, John. What are in you today? You don’t look as upbeat as usual. Is there anything that I can do to help you? John: I don’t know, but perhaps you can. You see, I am taking Eschatology 1. My professor is weird. On top of that, he is a lousy lecturer. I can’t understand what he’s saying. And I can’t even understand my notes! I have to study it and read the book of Revelation in order to pass his test. Steven: Let me see. Hmmm. You’re not a good note taker; it’s very obvious. But I guest your professor isn’t an organized lecturer. Well, you can always read my book and†¦ John: But the exam is four hours away! Steven: Oh my goodness. You are definitely in trouble. Listen, I will lecture you briefly on the main points that you will need to pass this test. Listen carefully, and I hope you’ll get an A. John: Ok Steven: From Chapter 15 of my book, I said the Revelation can be outlined as follows: 1. Prologue: the authors self-identification and au ¬thority (1:1-20) 2. Jesus letters to the seven churches of Asia Minor (2:1-3:22) 3. Visions from heaven: breaking seven seals on a scroll; seven trumpets (4:1-11:19) 4. Signs in heaven: visions of the woman, the dragon, the beast, the Lamb, and the seven plagues (12:1-16:21) 5. Visions of the great whore and the fall of Babylon (Rome) (17:1-18:24) 6. Visions of the eschaton: the warrior Messiah, the imprisonment of the beast and Satan, judgment of the dead, and the final defeat of evil (19:1-20:15) 7. Visions of the new heaven and a new earth; descent of the heavenly Jerusalem to earth (21:1-22:5) 8. Epilogue: authenticity of the authors prophetic visions and the nearness of their fulfilment (22:6-21). In addition, many of John’s imagery and style came from Old Testament Apocalyptic Literature, and†¦ John: Wait, you mean principles of interpretation in Daniel and others such as â€Å"one apocalyptic day = one literal year† also holds in Revelation? Steven: That’s right! John: So everything I’ve learned in the previous term about Hebrew Prophecy can also be used here? Precisely the reason why I had to take Hermeneutics 2 and Hebrew Prophecy before I study Revelation? Steven: You betcha†¦ John: So first, let me recap. Let’s take a look at the terms the Lamb, the dragon, the heav ¬enly woman, the whore, and the marriage of the Lamb and the heavenly city. They are not literal being but symbols of another referent, right? Steven: Yes, and to take you to the shortcut, the historical belief is the Lamb is Jesus Christ, the dragon is a figure of Satan, the whore is his church the Roman Catholic Church, the marriage of the Lamb symbolizes the union of the Christian Church of the aggregate of the true believers after the Rapture, and the heavenly city is a picture of our destiny with Jesus Christ. Though I find it personally hard to accept that it is literally as described, but I do not really show that in the book because I do not want to offend my Christian brother.

Sunday, July 21, 2019

A Review Of Online Payment Systems

A Review Of Online Payment Systems CHAPTER 1 INTRODUCTION In this Oligocene world, electronic ecommerce has grown explosively. According to Hof (2003), on 1994 with 6 million to 2003 which have approximately 40 million households in the United States alone made at least one consumer purchase from the internet, the advancements in computer technology and deregulation of financial markets especially in the payment system which for transfer money. Traditional payment systems are flexible instruments such as drafts, checks, credit card, debit cards, and documentary credit. Some payment systems had substantially a different appearance of payment that includes the credit mechanisms. Nowadays most of the users usually make the payment through electronic payment system. As we know Electronic Payment is a division of an e-commerce transaction offered through the internet for buying and selling goods or services and non-credit-card online payment systems. The appearance of e-commerce has created new financial needs that in many cases. Some of them using a way to fraud such as credit card fraud and subjected to more digital attacks. The awareness and knowledge about the electronic payment system are needed to prevent fraud to develop. An electronic payment system is needed for expiation for some information, goods and services, this information provided through the internet as a convenient form of payment for external goods and services on consumption of system resources, access to copyrighted materials and database searches (Clifford neuman,1999). Broadly electronic payment systems can be classified into two categories such as Online Payment Cards System and Electronic Banking Payment System. Each payment system has its advantages and disadvantages for the customers and merchants. These payment systems have numbers of requirements, example security, acceptability, convenience, cost, anonymity, control, and traceability (Sumanjeet, S., 2009). Electronic payment systems may be more expedient for international online business due to vary in credit card customer protection laws in different countries. The picture of e-banking in the United States is one of a wide variety of services used by a disparate number of consumers. Approximately 91 percent of United States households have a bank account and, of these, 93 percent have one or more Electronic Funds Transfer (EFT) features associated with their accounts. In 2003, the number of Automated Teller Machines (ATM) transactions stood at 902 million per month, up slightly from 2002 (EFT Data Book, 2003). In addition, by 2003, the number of point-of-sale debit transactions stood at 495 million per month, up 21 percent from 2002, and the volume of electronic payments in the United States in 2003 exceeded that of checks for the first time (Jane M. Kolodinsky, 2004). While consumers may be willing to adopt e-banking technologies, they also want assurance that problems will be resolv ed and that some transactions will remain personal (Goldfarb, 2001; Financial Technology Bulletin, 2000). Nowadays the e-banking system also very common on internet, it works by their retail, credit union, and virtual bank by secure the website to carry out the financial transaction by customers. Some e-banking goods and services are still infancy and going innovations build through the internet growing rapidly as a marketplace for the exchange of both tangible and information goods and services. Besides online marketing and internet usage are growing to be more advanced. Paying is not definitely paper currency on the transaction, because the transaction going substituent with the electronic payment system or the card. Multitudinous payment mechanisms suitable for use in this marketplace are in several stages of development. This research projects scope is limited to electronic payment systems which focused on the needs of consumers. As in usually the case with payment innovations, the success of the smart card will depend on market circumstances and cooperation among the banks. The proper timing of the introduction may depend on consumer readiness to use the new system, which will itself be largely due to prior experience and innovativeness (Andreasen, 1991). The Numerous Payment Systems have been pervasion on the marketplace, the new system prepared to accept by better consumers. To the level that consumers have experience with previous systems, the responsiveness and information of a new payment system will be facilitated. Lastly , this research project is a key of understanding of consumer behaviour and their payment choices, and also the factors that influence the consumer choose to use e-payment. Moreover, this research project oration the usage of the electronic payment system provided a brief literature review on electronic payment and purpose to explain the determinants which affect the usage of users towards electronic payment system. 1.2 History of Electronic Payment System In late 1970s technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) to promote e-commerce transactions, authorized to operate in order to promote, such as purchase orders or invoices for electronic business documents. In 1979, Michael Aldrich contrived a technique as e-commerce; the technique was about online shopping to allow consumers and business through online transaction processing to shop from home and to trade with other business. In 1980s the enlargement and receipt of credit cards, automated teller machines (ATM) and telephone. The first ATMs machines use of magnetically prearranged plastic, the money could not automatically withdraw from users accounts were off-line machines. So the customer would perhaps be apprehensively to let a machine handle their money. But the cards used an encoded magnetic strip, making them safe and reusable. Consequently, just the only customers with good credit history were able to use ATMs. Therefore nowadays the ATM industry Association states that there will 1 billion of users using this transaction in ATMs. Almost 80 percent belong to the private sectors (Commercial Union ATM, 2000). The process of conventional payment system and settlement involves a buyer-to-seller transfer of cash or payment information such as cheque and credit card. The actual settlement of payment takes place in the financial processing network. A cash payment requires a buyers withdrawals form his or her bank account, a transfer of cash to the seller, and the sellers deposit of payment to his or her account. Non-cash payment mechanisms are settled by adjustment such as crediting and debiting the appropriate accounts between banks based on the payment information conveyed via cheque or credit cards. Non-cash payment requires three separate elements. The buyer must have an agreed means of payment authorization and restructuring its bank to affect a transfer of funds. The sellers bank and buyers bank need an agreed method of exchange payment instructions. This is referred to as payment clearing (Singh Sumanjeet, 2009). The process of electronic payment systems have been in operations since 1960s and have been expanding rapidly as well as growing in complexity. After the development of conventional payment system, Electronic Fund Transfer (EFT) based payment system came into existence. It was first electronic based payment system, which does not depend on a central processing intermediary. An electronic fund transfer is a financial application of Electronic Data Interchange (EDI), which sends credit card numbers or electronic cheques via secured private networks between banks and major corporations. To use EFT to clear payments and settle accounts, an online payment service will need to add capabilities to process orders, accounts and receipts. But a landmark came in this direction with the development of digital currency. The nature of digital currency or electronic money mirrors that of paper money as a means of payment. As such, digital currency payment systems have the same advantages as paper c urrency payment, namely anonymity and convenience. 1.3 Problem of Statement Despite the rapid development of electronic payment systems, innovative services, but still faces some challenges. Business e-markets as herald fundamental changes in the source and the computer-assisted alternative to existing market arrangements for trading in practice (Malone et al., 1989). Areas of impact include online catalogues, multimedia mail, electronic payment, brokering services and collaborative engineering. Initial implementations of electronic commerce have focused on the provision of telecommunications-based infrastructure in support of Internet-oriented services and electronic payment systems (Kohala Coast, HI 2009). Electronic payment systems should offer at least as much confidentiality as traditional payment systems currently do. The goal of this requirement is that payment data should not be exploitable in order to obtain more precise or more comprehensive information about involved entities example payer profiles. Thus, confidentiality properties of electronic payment systems can be distinguished regarding which information they reveal to which parties. Confidentiality of payment information against other parties can be achieved by encrypting communication which is no specific property of payment systems. Note that confidentiality in electronic payment systems cannot prevent information flows which may happen outside an electronic payment system among involved parties for example by observing communication networks, or revealing data in further commercial interactions (Fiat, Naor 1990). Security are keys for the successful implementation of the payment system, electronic payment security has missed out on a lot of technical innovation improvements seen in other industries. But as levels of fraud continue to increase, so too will the cost to the consumer. If this problem is not addressed, credit cards and electronic payments may become an unviable option for consumers (Benjamin Graham, 2003). (Please add research questions before research objectives) 1.4 Research Objectives Basically, there are several objectives for this study. This research project carries the objectives are as the following: To determine the awareness level of electronic payment systems To identify the factor that influences the usage of e-payment systems. To determine the current usage level among usage and the application of the electronic payment system. 1.5 Significance of the Study The significance of the study is to study about the awareness of electronic payment system for university private student which is Multimedia University in Melaka. In this research will study on various independent variables affecting the awareness of electronic payment system for student which are personal factors, demographic factors and type of benefit whether can affect Melaka private university student on their awareness of usage of electronic payment system. Many people do not aware of the importance of electronic payment system to more easy complete on their financial transaction. Nowadays the computer enables us to access all the money in the world, even we carry a credit card we could around the world. Using the electronic payment system could let us enjoy much better life. Lastly, the significance of this study would definitely be in accordance with the objectives mentioned earlier. 1.6 Scope of the Study This research will focus on the awareness and usage of electronic payment system among Multimedia University students in Melaka campus. The assumption that can be made by survey conducted using random sample to obtain the primary data. Survey instrument is in questionnaires form. In order to achieve the objective of the study, the questionnaires question will be set based on research objective and hypotheses statement. It is to ensure that the data that had been collect are useful and can be analyzed. 1.7 Organisation of Research Project This study is divides into five chapters as follow: Chapter 1, Introduction, introduces general information of electronic payment system. It also covers the history of electronic payment system, problem statement, research objective, significance of the study, scope of the study and limitations of study. Chapter 2, Literature Review, presents the state of electronic payment instruments and type of credit card, debit card, electronic purse card and electronic banking. This chapter reviews how the previous researchers summarized the relationship between usage of electronic payment system with behavior and perception of users towards the electronic payment system. Chapter 3, Methodology is telling the method of investigation. This chapter describes the conceptual framework that as the basis for designing a questionnaire to conduct an empirical study. Chapter 4, Result and Discussion, after the survey is done, a discussion is conducted to verify the result obtained. Chapter 5, Conclusion and Recommendation, summarizes the main result and provides the contributions of the study. Recommendations and limitation are being provided.

Saturday, July 20, 2019

Concepts of Computer Networking

Concepts of Computer Networking CHAPTER 1: NETWORKING CONCEPTS NETWORKING BASICS: At its most elementary level, a computer network consists of two computers connected to each other by a cable that allows them to share data. All computer networking, no matter how sophisticated stems from that simple system. While the idea of connecting two computers by a cable may not seem extraordinary, inretrospect it has proven to be a major achievement in communications. Computer networking arose as an answer to the need to share data in a timely fashion. Personal computers are powerful tools that can process and manipulate large amounts of data quickly, but they do not allow users to share that data efficiently. Before networks, users needed either to print out documents or copy document files to a disk for others to edit or use them. If others made changes tothe document, there was no easy way to merge the changes. This was, and still is, known as working in a stand-alone environment. TYPES OF NETWORKS: Computer networks can be categorized in the following types. LOCAL AREA NETWORK (LAN): A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet . The most common type of local area network is an Ethernet LAN. The smallest home LAN can have exactly two computers; a large LAN can accommodate many thousands of computers. Many LANs are divided into logical groups called subnets. METROPOLITAN AREA NETWORK (MAN): MAN stands for metropolitan area network .It is a network of devices within an area of one to ten kilometers or with in a city. It may be a single network such as a cable television network or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN to LAN as well as device to device. WIDE AREA NETWORK (WAN): A WAN stand for wide area network .It is spread through out the world. A WAN that is wholly owned and used by a single company is often referred to as an enterprise network. It can connect computers and other devices on opposite sides of the world. A WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet. INTRANET: Anintranetis a privatecomputer networkthat usesInternet Protocoltechnologies to securely share any part of an organizations information or operational systems within that organization. The term is used in contrast tointernet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internalwebsite, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. EXTRANET: Anextranetis a private network that usesInternet protocols,networkconnectivity. An extranet can be viewed as part of a companysintranetthat is extended to users outside the company, usually via theInternet. It has also been described as a state of mind in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast,business-to-consumer(B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. INTERNETWORK: An Internetwork is a collection of two or more LANs connected by WANs. Internworks are referred to interchangeably as data networks or simply networks. The most popular internetwork is the Internet which is open to public. COMPONENTS OF NETWORK: A data communication system has two main components:- HARDWARE COMPONENTS: Devices and media are the physical elements or hardware of the network Hradware is often the visible components of the network platform such as a laptop, a PC or swtich etc used to connect the devices. Ocassionally some components might not be so visible. DEVICES: Devices of the network can be of two types that are the end devices and the intermediary devices, we explain both the types:- END USER DEVICES: An end use device refers to a piece of equipment that is either the ousce or the destination of a message on a network. Network users usaully only see or touch an end device, which is most often a computer. Another can generic term for an end device that sends or receives messages is a host. E.g host and end devices are Printers, Computers, Scanners, Webcams etc. INTERMEDIARY DEVICES: Intermediary devices connect the indivisual hosts to the network or can connect multiple networks to form an internetwork. Intermediary devices are not all the same. Some work inside the LAN to perfom switching functions and others help route messages between networks. Example of intermediary devices are Switches, Hubs and Routers etc. NETWORK MEDIA: Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. The three main types of media in use in a network are: COPPER: A twisted pair cable usually used as a medium inside a LAN environment. FIBEROPTICS: Made up of glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. WIRELESS: It connects local users through air using electromagnetic waves. SOFTWARE COMPONENTS: Software components can be divided in to two parts, services and processes. SERVICES: A network service provide information in responce to a request. Services include many of the common netowrk applications people use every day, like e-mail hosting services and web hosting services. For an instance we can take example of YAHOO enterprise, they provide mail services as well as web services, there are a number of companies offering these kind of services. PROCESSES: Processes provide the funtionality that directs and moves the messages through the network. Processes are less obvious to us ut are critical to the opeation of networks. For example viewing a webpage invokes one network process, clicking on a hyperlink causes a web browser to communicate with a web server, in the same way many network processes can take place at the same time. NETWORK TOPOLOGIES: Topology of a network is the geometrical representation of the relationship of all the links and linking devices to one another. PHYSICAL TOPOLOGIES: There are four basic physical topologies possible mesh, star, bus, and ring. MESH TOPOLOGY: In a mesh topology every device has a dedicated point to point connection to every other device .A fully connected mesh network therefore has n(n-1)/2 physical channels to link n devices . STAR TOPOLOGY: In star topology each device has a dedicated point to point connection only to a central controller usually called a hub . The devices are not directly connected to each other .Unlike a mesh topology ,a star topology does not allow direct traffic between devices the controller acts as an exchange : if one device wants to send data to another it sends the data to the controller which then relays the data to the other connected device. BUS TOPOLOGY: A bus topology on the other hand is multi point one long cable acts as a back bone to link all the devices in a network nodes are connected to the bus cable by drop lines and taps a drop line is a connection running between the devices and the main cable a tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. RING TOPOLOGY: In a ring topology each device has a dedicated point to point connection only with the two devices on either side of it . A signal is passed along the ring in one direction from device to device until it reaches to its destination protocols. LOGICAL TOPOLOGIES: The Logical topology defines how the systems communicate across the physical topologies. There are two main types of logical topologies: SHARED MEDIA TOPOLOGY: In a shared media topology, all the systems have the ability to access the physical layout whenever they need it. The main advantage in a shared media topology is that the systems have unrestricted access to the physical media. Of course, the main disadvantage to this topology is collisions. If two systems send information out on the wire at the same time, the packets collide and kill both packets. Ethernet is an example of a shared media topology. TOKEN BASED TOPOLOGY: The token-based topology works by using a token to provide access to the physical media. In a token-based network, there is a token that travels around the network. When a system needs to send out packets, it grabs the token off of the wire, attaches it to the packets that are sent, and sends it back out on the wire. As the token travels around the network, each system examines the token. When the packets arrive at the destination systems, those systems copy the information off of the wire and the token continues its journey until it gets back to the sender. When the sender receives the token back, it pulls the token off of the wire and sends out a new empty token to be used by the next machine. PROTOCOLS: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard. NETWORK PROTOCOLS: For devices to communicate over the network, they must follow different protocols that perform the many tasks to be completed. The protocols define the following: The format of the message The way intermediary dvices share information about the path to the destination The method to handle update messages between intermediary devices The process to initiate and terminate communications between hosts INTERACTION OF PROTOCOLS: Interaction between protocols can be clearly understood by a simple example, the way that a web server and a web client interacts. HTTP defines the formatting and content of the requests and responses exchanged between the client and server. Both the client and server implements HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the message are transported between the client and server. TCP is the transport protocol that divides the HTTP messages in to smaller pieces to be sent to the destination client, it is also responsible for controlling the size and rate at which messages are exchanged between the client and the server. Another protocol called IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and selecting the best path to the destination host. TECHNOLOGY INDEPENDENT PROTOCOLS: Protocols that guide the network data are not dependent on any specific technology to carry out the task. Protocols describe what must be done to communicate, not how the task is to be completed.This is the reason that enables different kind of devices such as telephones and computers to use the same network infrasturcture to communicate. PROTOCOLS AND REFRENCE MODELS: Networking professionals use two networking models to comminicate within the industry, they are protocol models and reference models. Both were created in the 1970s. A protocol model is a model that closely matches the structure of a particular protocol suite. The hierarhical set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols with in the protocol suite. A refrence model provides a common referecen for maintaining the consistency within alkl types ofn etwork protocols and services. The primary function of a refercen model is to aid in clearer understanding of the functions and process involved. The OPEN SYSTEMS INERCONNECTION (OSI) the most well known reference model. OSI MODEL: In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. APPLICATION LAYER: The topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference models application layer on the receiving computer. PRESENTATION LAYER: The presentation layer, defines the format used to exchange data among networked computers. Think of it as the networks translator. When computers from dissimilar systems need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computers application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. SESSION LAYER: The session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. TRANSPORT LAYER: The transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it. NETWORK LAYER: The network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. DATA LINK LAYER: The data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. The electrical representation of the data is known to this layer only. PHYSICAL LAYER: The bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers. TCP/IP MODEL: The TCP/IP protocol does not exactly match the OSI reference model. Instead of seven layers, it uses only four. Commonly referred to as the Internet Protocol Suite, TCP/IP is broken into the following four layers: NETWORK ACCESS: Network access layer communicates directly with the network. It provides the interface between the network architecture (such as token ring, Ethernet) and the Internet layer. INTERNET: The Internet layer, corresponding to the network layer of the OSI reference model, uses several protocols for routing and delivering packets. Router are protocol dependent, they function at this layer of the model and are used to forward packets from one network or segment to another. Several protocols work within the Internet layer. TRANSPORT: The transport layer, corresponding to the transport layer of the OSI reference model, is responsible for establishing and maintaining end-to-end communication between two hosts. The transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also handles retransmissions of packets. The transport layer can use either TCP or User Datagram Protocol (UDP) protocols depending on the requirements of the transmission. APPLICATION: Corresponding to the session, presentation, and application layers of the OSI reference model, the application layer connects applications to the network. It contains all the higher-level protocols. COMPARISON BETWEEN OSI MODEL AND TCP/IP MODEL: The OSI and TCP/IP reference models have much in common. Both are based on the concept of a stack of independent protocols. Also, the functionality of the layers is roughly similar. For example, in both models the layers up through and including the transport layer are there to provide an end-to-end, network-independent transport service to processes wishing to communicate. These layers form the transport provider. Again in both models, the layers above transport are application-oriented users of the transport service. The differece between OSI and TCP/IP model is that the Application layer of TCP/IP model operates at the upper three layers of OSI model, they are application layer, presentation layer and session layer, also the Network layer of TCP/IP model works at the lower two layers of OSI model that are, data link layer and physical layer. TCP/IP PROTOCOL The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexibility and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services. SOME IMPORTANT TCP/IP PROTOCOLS: INTERNET PROTOCOLv4 (IP): Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a header to the packet so that it can be routed through the network using dynamic routing tables. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for time to live). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network. IPV4 HEADER: The key fields of the ipv4 are as follows:- SOURCE ADDRESS: Senders ip address DESTINATION ADDRESS : Receivers ip address TIME TO LIVE (TTL): Numeber of hops a packet must traverse before getting discarded. TYPE OF SERVICE (TOS): It is for a sending host to specify a preference for how the datagram would be handled as it makes its way through an internet. PROTOCOL: This field defines the protocol used in the data portion of the IP datagram. FLAG AND FRAGMENT: A three-bit field follows and is used to control or identify fragments VERSION: Protocol version. INTERNET HEADER LENGTH: The second field (4 bits) is the Internet Header Length (IHL) telling the number of 32-bitwordsin the header. PACKET LENGTH: This 16-bit field defines the entire datagram size, including header and data, in bytes. ADDRESS RESOLUTION PROTOCOL (ARP): Before an IP packet can be forwarded to another host, the hardware address of the receiving machine must be known. The ARP determines hardware addresses (MAC addresses) that correspond to an IP address. If ARP does not contain the address in its own cache, it broadcasts a request for the address. All hosts on the network process the request and, if they contain a map to that address, pass the address back to the requestor. The packet is then sent on its way, and the new information address is stored in the routers cache. HEADER: Some important fields of ARPs header are as follows:- HARDWARE TYPE: This field specifies the Link Layer protocol type PROTOCOL TYPE: This field specifies the upper layer protocol for which the ARP request is intended HARDWARE LENGTH: Length of a hardware address PROTOCOL LENGTH: Length (in octets) of alogical addressof the specified protocol OPERATION: Specifies the operation that the sender is performing SENDER HARDWARE ADDRESS: Hardware (MAC) address of the sender. SENDER PROTOCOL ADDRESS: Upper layer protocol address of the sender. TARGET PROTOCOL ADDRESS: Hardware address of the intended receiver. TARGET HARDWARE ADDRESS: Upper layer protocol address of the intended receiver. TRANSMISSION CONTROL (TCP): The TCP is responsible for the reliable transmission of data from one node to another. It is a connection-based protocol and establishes a connection (also known as a session, virtual circuit, or link), between two machines before any data is transferred. To establish a reliable connection, TCP uses what is known as a three-way handshake. This establishes the port number and beginning sequence numbers from both sides of the transmission. HEADER: Following are some important fields of TCP header: SOURCE PORT: Identifies the sending port. DESTINATION PORT: Identifies the receiving port. SEQUENCE NUMBER: This is the initial sequence number. ACKNOWLEDGEMENT NUMBER: A 32 bit acknowledgement number. DATA OFFSET: Specifies the size of the TCP header in 32-bit words. USER DATAGRAM PROTOCOL (UDP): A connectionless protocol, the UDP, is responsible for end-to-end transmission of data. Unlike TCP, however, UDP does not establish a connection. It attempts to send the data and to verify that the destination host actually receives the data. UDP is best used to send small amounts of data for which guaranteed delivery is not required. While UDP uses ports, they are different from TCP ports; therefore, they can use the same numbers without interference. HEADER: Some key headers of UDP are as follows: SOURCE PORT: This field identifies the sending port. DESITNATION PORT: This field indentifies the receiving port LENGTH: A 16-bit field that specifies the length in bytes of the entire datagram CHECKSUM: The 16-bitchecksumfield is used for error-checking of the headeranddata. NETWORK ADDRESSING: There are millions of computers in use on the web and billions of messages traversing networks at any given time, so prper addresing is essential to make sure that the sent messages arrives intact at the proper destination. Addressing of data happens in three different layers of the OSI model. The PDU at each layer adds address information for use by the peer layer at the destination. CHAPTER 2: ROUTING Fundamentals ROUTING: Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data networks such as the Internet, and transportation networks. Our main concern will be routing in packet switched networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes; typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers with multiple network cards can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the routers memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths. TYPES OF ROUTING: STATIC ROUTING: Static routing is manually adding routes to the routing table, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes make sense and can even improve the performance of a network. Some of these include stub networks and default routes. DYNAMIC ROUTING: Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. Dynamic routing uses routing protocols for routing information automatically over the internertwork. STATIC VS DYNAMIC ROUTING: Before going further we need to examine the difference between static and dynamic routing. ROUTING PROTOCOLS: Before going in to the details of dynamic routing we must understand what are routing protocols. Routing protocols implement algorithms that tell routers the best paths through internetworks. Routing protocols provide the layer 3 network state update. In short, routing protocols route datagrams through a network. Routing is a layer 3 function, thus, routing and routed protocols are network-layer entities. Routing tables on the layer 3 router are populated by information from routing protocols. A routed protocol will enter an interface on a router, be placed in a memory buffer, then it will be forwarded out to an interface based on information in the routing table TYPES OF DYNAMIC ROUTING PROTOCOLS: Dynamic routing protocols can be divided in to the following broad catagories. CLASSFUL AND CLASSLESS ROUTING PROTOCOLS: CLASSFUL ROUTING PROTOCOLS: Classful routing protocols do not send subnet mask information in routing updates. This was at the time when network address were allocated on the basis of classes i.e A, B or C. These routing prtocols did not include subnet mask in routing update because the the network mask was determined by first octet of the network address. Classfull routing protocols can still be used in todays networks but they cannot be used in all situations because they do not include the subnet mask. Classfull routing protocols cannot be used where the network is subnetted using more then one subnet mask, in other words we can say that classfull routing protocols do not support variable-lenght subnet mask (VLSM). In the following figure the classfull version of the network support similar subnet masks i.e all /24. CLASSLESS ROUTING PROTOCOLS: