Thursday, October 31, 2019

Leaders and policy makers - making tourism more sustainable Research Paper

Leaders and policy makers - making tourism more sustainable - Research Paper Example I declare that this assignment is all my own work and the sources of information and material I have used (including the internet) have been fully identified and properly acknowledged as required in the referencing guideline given in the Course Handbook which I received. Groupwork: all members should be identified at the top of this form, but only one member need submit the work. Please clearly indicate the name/letter of the group. Approval for Extended Submission: Approved Extension Date: (to be completed by the Programme Leader) Contents Contents 3 Eccardt, T. 2004, Secrets of the Seven smallest states of Europe: Andorra, Liechtenstein, Luxembourg, Malta, Monaco, San Marino and Vatican City. Hippocrene Books. 21 1. Introduction: This research paper â€Å"Leaders and Policy Makers- Making Tourism More Sustainable† will explore the impacts of policies and leadership capabilities on making tourism sustainable. The country chosen in this case study is Malta. The reason behind t he selection of this industry and this country is because the researcher belongs to Malta, and has ample experience in this industry. Tourism is a very important industry and plays an extensive and lucrative role in the economy of any country. The countries which have explored and utilized their own tourism potential are leading the economic charts today all around the world. Analysis of economically developed and developing countries especially those which have a very high per capita income shows that most of these countries have efficiently developed tourism industry at home. Tourism brings foreigners which ultimately lead to increased foreign exchange which is one of the most important indicators of a developed country. For example, Switzerland which is 133rd largest country in the world area wise has 4th highest per capita income figures in the world. Although the economy of Switzerland is very strong and has been persistent over the time but their real source of economic stabil ity and contribution comes from the well developed and lucrative tourism industry. The flourishing GDP of Switzerland is the result of well developed and organized tourism industry. (Aminu, 2009). Tourism industry in Malta can also bring huge foreign capital and foreign exchange to Malta with ample economical benefits. Malta has the tourism potential and can make the best use of it if policies are planned carefully. Tourism industry can be most beneficial if it is developed on a plan that would ensure the future sustainability. Leaders and policy makers can play a very positive and important role in developing a successful, lucrative and sustainable tourism industry. Planning sustainable tourism carefully can lead to sustainable tourism and regular growth of GDP through decades. This is what the policy makers must keep in mind while planning milestones and policies of any industry (Gupta, 2008). This report is based on secondary data. A lot of data has been studied to come up with t his research report. Analysis of the situation has been done on the basis of existing policy documents. Malta’s climate and sea remain the primary reasons why tourists flock to this resort. A natural harbor present in the island, offering significant protection to naval vessels, has enhanced Malta’s strategic location for any conqueror that seeks to dominate the Mediterranean Sea. Romans, Normans, Arabs, British and

Tuesday, October 29, 2019

Carrots Essay Example for Free

Carrots Essay Carrots is a root vegetable that originated in Afghanistan over 5000 years ago for there seeds and leaves. But today carrots are enjoyed for their fresh delicious flavours coming in all shapes and sizes in a variation of different colours like orange, red, yellow, purple, and white. Carrots can be purchased in all kinds of forms shredded, baby carrot, diced, sliced, regular size with leaf on or leaf off. Carrots can be stored in the fridge for up to 3 months but to prevent spoilage remove green leaves because the leaves draw moisture from the root causing carrots to dry out. Also carrots should be stored away from apples because they give off ethylene gas which causes carrots to become bitter. Purchasing carrots from the grocery store should be dried off if they are wet and tightly sealed in a plastic bag, what this does is it increases the nutrition value. Carrots contain B-carotene (a source of vitamin A), also it has fibres, anti-oxidants, minerals, calcium, potassium, magnesium, vitamins C,K and B6, also carrots helps improve eye sight, skin nourishment, hair growth, and reduces the risk of heart disease, and cancer. Carrots have many alternative ways they can be used like chopped for mirepoix, blended for drinks, boiled for soups stews, fried for stir fry, steamed for side dishes, gratered for carrot cake, beauty remedies for hair skin, or simply eaten raw. There are many recipes for carrots like carrot cake, glazed carrots, or ginger carrot soup. References www. carrotmuseum. com. uk www. foodnetwork. com / www. marthastewart. com (recipes)

Saturday, October 26, 2019

Internet Protocol Version 4 Analysis

Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho Internet Protocol Version 4 Analysis Internet Protocol Version 4 Analysis Chapter 2: Literature Review 2.1 Introduction Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user does not have to wait to download a large file before seeing the video or hearing the sound. Instead, the media is sent in a continuous stream and is played as it arrives. It can integrate all other media formats such as text, video, audio, images and even live radio and TV broadcasts can all be integrated and delivered through a single medium. These applications may require in terms of bandwidth, latency and reliability than traditional data applications to support the growth of multimedia technology in the future [1]. The transportation of multimedia traffic over networks become more complicated because multimedia is becoming cheaper and cheaper and therefore used more and more. Problems with bearing multimedia flows on networks are mainly related to the bandwidth they require and to the strict maximum delay requirements that must be met [2]. This is important when multimedia applications have to provide users with real-time interaction. Because of the rapid growth of Internet usage and the requirement of different applications, the IPv4 is no more relevant to support the future networks. Many new devices, such as mobile phones, require an IP address to connect to the Internet. Thus, there is a need for a new protocol that would provide new services. To overcome to these problems, a new version of Internet Protocol has been introduced. This is called Internet Protocol next generation (IPng or IPv6), which is designed by the IETF [3] to replace the current version Internet Protocol, IP Version 4 (IPv4). IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4. The differences between IPv6 and IPv4 are including in five major areas which is addressing, routing, security, configuration and support for mobile devices [4]. Like all the development and new inventio ns, the problems of current Internet Protocol made researcher to develop some new techniques to solve these problems. Even they have tried to make some changes on the current protocol, these changes still didnt help a much. So, at the end the way came to development of a new protocol which is known as IPv6 or IPng. 2.2 OSI 7 Layer Computer networks are complex dynamic systems and difficult task to understand, design, and implement a computer network. Networking protocols need to be established for low level computer communication up to how application programs communicate. Each step in this protocol is called a layer and divided into several layers simplifies the solution. The main idea behind layering is that each layer is responsible for different tasks. The Open System Interconnection (OSI) Reference Model defines seven layers [5]. Physical Layer. This layer deals, for instance, with conversion of bits to electrical signals, bit level synchronization. Data Link Layer. It is responsible for transmitting information across a link, detecting data corruption, and addressing. Network Layer. The layer enables any party in the network to communicate with each other. Transport Layer. It establishes reliable communication between a pair in the system, deals with lost and duplicated packets. Session Layer. This layer is responsible for dialogue control and changing. Presentation Layer. The main task of this layer is to represent data in a way convenient for the user. Application Layer. Applications in this case include Web browsing, file transferring, etc. The Network Layer is the layer that is the most interesting in the context of this project. The following section gives a better view of this layer. 2.3 Network Layer As was mentioned before, this layer is responsible for enabling the communication between any party. The most used method for transporting data within and between communications networks is the Internet Protocol (IP). 2.3.1 Internet Protocol IP is a protocol that provides a connectionless, unreliable, and best-efforts packet delivery system. More details on these network service types are given below [5]. In a connectionless model the data packets are transferred independently from all others and containing full source and the destination address. It is worth mentioning that another type is the connection oriented model. However, the connection-oriented model and its details are beyond the scope of this project and thus will not be pursued in this report. The reader can consult [5] for further information on this type of service. Unreliable delivery means that packets may be lost, delayed, duplicated, delivered non-consecutively (in an order other than that in which they were sent), or damaged in transmission. 2.4 Internet Protocol Version 4 As we know, IPv4 is the current protocol for communication on the Internet. It is the protocol that underlies most communication on networks today, such as TCP/IP and UDP/IP. The largest weakness of IPv4 is its address space [7]. Each IPv4 address only have 32 bits and consists of two parts, defined as network identifier and host identifier [5]. A standard method of displaying an IPv4 address is as decimal value of four octets, each separated a period, for example: 192.168.2.5. Traditionally [6], IP addresses are presented by classfull addressing. 5 classes of address were created, which is A to E. Class A consists of 16,777,214 hosts while class B consists of 65,534 hosts and class C consists of 254 hosts. Class D is reserved for use with multicasting and class E is a block of IP addresses reserved for future use [7]. The class D and E addresses are not used to address public host, so this leaves the rest of the entire range of IP addresses carved up into classes A C. As soon as a site is connected to the Internet, it needs to be given an entire class C. Assuming that many sites only need one or two addresses then this waste over 200 addresses. Once a site reaches over 254 full addressable machines it would need an entire class B, which would waste over 65,000 addresses and so on. This allocation system is obviously insufficient and wastes much of a limited resource. 2.4.1 Header Header is a part of the IP packet[5]. There is a number of fields in an IPv4 header. Below are the some explanations for each field. 2.4.2.1 Version This field (4-bit long) is used to determine the version of IP datagram that is considered. For IPv4 it is set to 4. 2.4.2.12 Internet Header Length (IHL) The Internet Header Length is the length of the header. 2.4.2.3 Type of Service Theoretically, this field (1 octet long) should indicate something special about the protocol. However, it has never really been used. 2.4.2.4 Total Length Total is the length of data in the fragment plus the header. 2.4.2.5 Identification This field is useful for fragmentation only. Its purpose is to enable the destination node to perform reassembly. This implies that the destination node must know which fragments belong to each other, i.e. the source, destination, and protocol fields should match. 2.4.2.6 Offset Offset indicates the point at which this fragment belongs in the reassembly packet. The field is related to fragmentation mechanism and has similar vulnerabilities as the identification field. 2.4.2.7 Time to Live TTL measures the time duration of the datagram presence in a network. This guarantees that no datagram exists forever in the network. 2.4.2.8 Protocol This field identifies the transport protocols, for example UDP or TCP. Since the field contains an arbitrary value that indicates some protocol, encapsulation of one datagram into another (IP tunneling) is possible. 2.4.2.9 Header Checksum The checksum is used to detect transmission errors. However, this field was removed in IPv6. 2.4.2.10 Source Address. This field specifies the source address. 2.4.2.11 Destination Address The destination address (4 octets long) is specified in this field. No attacks related to this field are known. 2.4.2.12 Options The field (variable size) was designed to improve the IP communication. There are several options defined for this field. Among them are: security, source routing, and route recording. 2.4.2.13 Padding The field (variable size) is used to fill the IP header with zeros if the header length is less than 32 bits. 2.5 Internet Protocol Version 6 IPv6 is a new version that is specified in RFC2460 [5] to overcome the weakness of the current protocol in certain aspect. It uses a 128 bit long address field which is 4 times longer than Ipv4 addresses. This size of address space removes one of the worst issues with IPv4 and IPv6 doesnt have classes of addresses. In general, IPv4 and IPv6 have a similar in their basic framework and also many differences. At a first view, there are obviously differences in the addresses between IPv4 and IPv6. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats: Omit leading zeros Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. Double colon Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address. The IPv6 addresses are similar to IPv4 except that they are 16 octets long. A critical fact to be observed is that the present 32-bit IP addresses may be accommodated in IPv6 as a special case of IPv6 addressing. The standard representation of IPv6 addresses is a hexadecimal value of 16-bit each separated by a colon. Not only does IPv6 have different address representation, but it also discards the previous concept of network classes. The 6-byte addresses are very popular in the 802 LANs. The next generation of LANs will use 8-byte address space specified by the Institute of Electrical and Electronics Engineers (IEEE) [9]. Thus, the IPv6 addresses should be 8 bytes long. 2.5.1 IPv6Header Some of  IPv4 header fields excluded in IPv6, and some of  them has been made optional. As a result of this the packet processing time and packet header size is reduced. The header consists of two parts, which are: the basic IPng header and IPng extension headers. 2.5.2.1 Version This field (4-bit long), same as in IPv4 case, is used to determine the version of IP datagram and is set to 6 in the present case. This field is the same in both versions. The reasoning for this is that these two protocols should coexist during the transition period. 2.5.2.2 Flow Label This field is 20 bits long and, as yet, there is no specific functionality assigned to it. 2.5.2.3 Payload Length Only IPv6 has this field. Since the header length is constant in IPv6, just one field is needed. This field replaces IHL and Total Length fields in IPv4. It carries information about the length of data (the headers are not included). 2.5.2.4 Next Header Next Header field replaces the Protocol field in the IPv4 header. 2.5.2.5 Hops limit This field is a hop count that decrements. This field redefines the Time to Life field present in IPv4. 2.5.2.6 Source Address The source address is indicated by this field (16 octets long). No attacks related to this field have been experienced. 2.5.2.7 Destination Address This field (16 octets long) specifies the destination address. No attacks related to this field are known. IPv6 brings major changes to the IP header. IPv6s header is far more flexible and contains fewer fields, with the number of fields dropping from 13 to 8. Fewer header fields result in a cleaner header format and Quality of Service (QoS) that was not present in IPv4. IP option fields in headers have been replaced by a set of optional extensions. The efficiency of IPv6s header can be seen by comparing the address to header size. Even though the IPv6 address is four times as large as the IPv4 address, the header is only twice as large. Priority traffic, such as real time audio or video, can be distinguished from lower priority traffic through a priority field [8]. Based on the [27] experiment, it clearly show the brake-down of the various headers in both IPv4 and IPv6, it is evident that the overhead incurred is minimal between IPv4 and IPv6. In theory, the performance overhead between these two protocols is so minimal that the benefits of IPv6 should quickly overshadow the negatives. Table 1: Packet breakdown and overhead incurred by header information 2.6 Streaming Overview In recent years, there has been major increasing in multimedia streaming application such as audio and video broadcast over internet. The increasing number of internet subscribers with broadband access from both work and home enables multimedia applications with high quality can be delivered to the user. However, since the best effort internet is unreliable with a high packet lost and inconsistency in packet arrival, it does not provide any QoS control. This is a crucial part when dealing with real-time multimedia traffic. The multimedia streaming is a real-time application includes audio and video which is stored in stream server and streamed its content to client upon request. The example includes continuous media server, digital library, and shopping and entertainment services. Prior to streaming, video was usually downloaded. Since, it took a long time to download video files, streaming was invented with the intention of avoiding download delays and enhancing user experience. In streaming, video content is played as it arrives over the network, in the sense that there is no wait period for a complete download. Real-time streaming has a timing constraint such that the data are played continuously. If the packet data are not arrive in time, the playback is paused and will cause the in smoothness in multimedia presentation and its definitely annoying to the user. Because of this factor, multimedia streaming require isochronous processing and QoS [10] from end to end view. The lack of QoS has not prevented the rapid growth of real-time streaming application and this growth is expected to continue and multimedia traffic will form a higher portion of of the internet load. Thus, the overall behavior of these applications will have a significant impact on the other internet traffic. 2.7 Downloading Versus Streaming Application Basically downloading applications such as FTP involve downloading a file before it is viewed by a user. The examples of multimedia downloading applications are downloading an MP3 song to an IPod or any portable device, downloading a video file to a computer via P2P application such as BitTorrent. Downloading is usually a simple and easiest way to deliver media to a user. However, downloading has two potentially important disadvantages for multimedia applications. First, a large buffer is required whenever a large media file such as MPEG-4 movie is downloaded. Second, the amount of time required for the download can be relatively large, (depends on the network traffic), thereby requiring the user to wait minutes or even hours before being able to view the content. Thus, while downloading is simple and robust, it provides only limited flexibility both to users and to application designers. In contrast, in the streaming mode actually is by split the media bit stream into separate packet which can be transmitted independently. This enables the receiver to decode and play back the parts of the bit stream that are already received. The transmitter continues to send multimedia data packet while the receiver decodes and simultaneously plays back other, already received parts of the bit stream. This enables low delay between the current data is sent by the transmitter to the moment it is viewed by the user. Low delay is of paramount importance for interactive applications such as video conferencing, but it is also important both for video on demand, where the user may desire to change channels or programs quickly, and for live broadcast, but the delay must be finite. Another advantage of streaming is its relatively low storage requirements and increased flexibility for the user, compared to downloading. However, streaming applications, unlike downloading applications, have de adlines and other timing requirements to ensure continuous real-time media play out. This leads to new challenges for designing communication systems to best support multimedia streaming applications. [12] 2.8 Standard/Protocols for Streaming A good streaming protocol is required to achieve a quality of continuous playback in multimedia streaming over the internet with the short delay when a user downloading a multimedia content over the internet. The streaming protocol provides a service such as transport, and QoS control mechanism including quality adaptation, congestion control and error control. The streaming protocol is built on the top of network level protocol and the transport level protocol. The multimedia streaming protocol is based on IP network and â€Å"User Datagram Protocol† (UDP) is mainly used, despite of some streaming application using TCP. Like TCP, UDP is a transport layer protocol, but UDP is a connectionless transport protocol. UDP does not guarantee a reliable transmission and in order arrival packet. Under UDP also, there is no guarantee that is packet will arrive to its destination [16]. The UDP packet may get lost in the network when there is a lot of network traffic. Therefore, UDP is not suitable for data packet transfer where a guarantee delivery is important.UDP is never used to send important data such as webpage, database information, etc; UDP is commonly used for streaming audio and video. Streaming media such as Windows Media audio files (.WMA), Real Player (.RM), and others format use UDP because it offers speed. The reason UDP is faster than TCP is because there is no form of flow control or error correction. The data sent over the Inte rnet is affected by collisions, and errors will be present. Remember that UDP is only concerned with speed. This is the main reason why streaming media is not high quality. However, UDP is the ideal transport layer protocol for streaming application which the priority is to transfer the packet from the sender to its destination and does not contribute any delay which is the result of the transmission of lost packets. Since UDP does not guarantee in packet delivery, the client needs to rely Real time Transport Protocol (RTP) [10]. The RTP provides the low-level transport functions suitable for applications transmitting real-time data, such as video or audio, over multicast or unicast services The RTP standard consists of two elementary services, transmitted over two different channels. One of them is the real-time transport protocol which carries the data and the other works as control and monitor channel named RTP control protocol (RTCP) [13]. RTP packets are encapsulated within UDP datagrams. This step incorporates a high throughput and efficient bandwidth usage. The RTP data packets contain a 12 byte header followed by the payload, which can be a video frame, set of audio samples etc. The header includes a payload type indicating the kind of data contained in the packet (e.g. JPEG video, MP3 audio, etc), a timestamp (32 bits), and a sequence number to allow ordering and loss detection of RTP pa ckets [11]. According to the standard [14], the transport of RTP streams can use both UDP and TCP transport protocols, with a strong preference for the datagram oriented support offered by UDP. The primary function of RTCP is to provide feedback on the quality of the data distribution. The feedback may be directly useful for control of adaptive encodings along with fault diagnostics in the transmission. In summary, RTP is a data transfer protocol while RTCP is control protocol. The Real-time Streaming Protocol (RTSP) [25] is a client-server signaling system based on messaging in ASCII format. It establishes procedures and controls, either one or more time-synchronized streams continuous media such as audio and video. The protocol is intentionally similar in syntax and operation to HTTP and therefore hires the option of using proxies, tunnels and caches. RTSP and works well both for large audiences, and single-viewer media-on-demand. RTSP provides control functionality such as pause, fast forward, reverse and absolute positioning and works much like a VCR remote control. The necessary additional information in the negotiation is conducted in the Session Description Protocol (SDP), sent as an attachment of RTSP appropriate response [13]. The Requirement for Multimedia Application Various multimedia applications have different requirements for QoS describes in the following QoS parameters such as throughput, delay, delay variation (jitter) and packet loss. In most cases, the application of QoS requirements can be determine by the user which are the factors that affect the quality of applications [17]. For example, from experimenting concluded that acceptable quality, one-way delay requirements for interactive voice should be less than 250 ms. This delay includes the value of the delays imposed on all components of the communication channels, as a source of delay, transmission delays, delays in the network and the determination of the delay. There are some factors which affect QoS application requirements such as interactive and noninteractive applications, User/Application characteristics (delay tolerance and intolerance, adaptive and nonadaptive characteristics) and application criticality (Mission-critical and non-mission-critical applications) [15]. The thr ee types for this application requirement will be discuss in next section. 2.10.1 Interactive and Noninteractive Applications An interactive application involves some form of between two parties such as people-to-people, people-to-machine or machine-to-machine. An example of interactive applications is: People-to-people application such as IP telephony, interactive voice/video, videoconferencing People-to-machine application such as Video-on-demand (VOD), streaming audio/video Machine-to-machine application: Automatic machine control The time elapsed between interactions is essential to the success of an interactive application. The degree of interactivity determines the level of severity or delay the requirement. For example, interactive voice applications, which involve human interaction (conversation) in real time, are stringent requirements of delay (in order of milliseconds). Streaming (play), video applications involve less interaction and do not require real-time response. Applications streaming, therefore, are more relaxed requirements of delay (in order of seconds). Often applications tolerance delay is determined by users tolerance delay (ie, higher delay tolerance leads to more relaxed delay requirements). Jitter delay is also related to QoS support for interactive tasks. The delay jitter can be corrected by de-jittering techniques buffer. However, the buffer introduces delay in the original signal, which also affects the interactivity of the task. In general, an application with strict requirements de lay also has a strict delay jitter requirements [15]. 2.10.2 Tolerance and Intolerance Tolerance and intolerance also one of the key that affect in QoS parameter values require by the user. Latency tolerance and intolerance determines the strictness of the delay requirement. As we already mentioned, streaming multimedia applications are more latency tolerant than interactive multimedia applications. The level of latency tolerance extremely depends based on users satisfaction, expectation, and the urgency of the application such as mission critical. Distortion tolerance to the commitment of the application quality depends on users satisfaction, users expectation, and the application media types. For example, users are more tolerant to video distortion than to audio distortion. In this case, during congestion, the network has to maintain the quality of the audio output over the quality of the video output [15]. 2.10.3 Adaptive and Nonadaptive Characteristics Adaptive and nonadaptive aspects mostly describe the mechanisms invoked by the applications to adapt to QoS degradation and the common adaptive techniques are rate adaptation and delay adaptation. Rate adaptive application can adjust the data rate injected into the network. During network congestion, the applications reduce the data rate by dropping some packets, increasing the codec data compression, or changing the multimedia properties. This technique may cause degradation of the perceived quality but will keep it within acceptable levels. Delay-tolerant adaptive applications are tolerate to a certain level of delay jitter by deploying the de-jittered buffer or adaptive playback technique. Adaptation is trigged by some form of implicit or explicit feedback from the network or end user [15]. 2.10.4 Application Criticality Mission-critical aspects reflect the importance of application usage, which determines the strictness of the QoS requirements and Failing the mission may result in disastrous consequences. For example: Air Traffic Control Towers (ATCTs): The Traffic controller is responsible to guide the pilot for direction, takeoff and landing process. Life and death of the pilot and passenger may depend on the promptness and accuracy of the Air Traffic Control (ATC) system. E Banking system: The failure of this system may lead to the losses to the bank and user is unable to make an online transaction (view account summary, account history, transaction status, manage cheques and transfer funds online) and to make a online payment ( loans, bills, and credit card) and other transaction. 2.10.6 Examples of Application Requirements Video applications can be classified into two groups: interactive video (i.e., video conferencing, long-distance learning, remote surgery) and streaming video (i.e., RealVideo, Microsoft ASF, QuickTime, Video on Demand, HDTV). As shown in table 2, video applications bandwidth requirements are relatively high depending on the video codec. Video codec Bandwidth Requirement Uncompressed HDTV 1.5 Gbps HDTV 360 Mbps Standard definition TV (SDTV) 270Mbps Compressed MPEG2 25-60 Mbps Broadcast quality HDTV 19.4 Mbps MPEG 2 SDTV 6 Mbps MPEG 1 1.5 Mbps MPEG 4 5 kbps 4 Mbps H.323 (h.263) 28 kbps 1 Mbps Table 2 : Video Codec Bandwidth Requirement [15] 2.11 Packet Delay Delay has a direct impact on users satisfaction. Real-time media applications require the delivery of information from the source to the destination within a certain period of time. Long delays may cause incidents such as data missing the playback point, which can degrade the quality of service of the application. Moreover, it can cause user frustration during interactive tasks. For example, the International Telecommunication Union (ITU) considers network delay for voice applications in Recommendation G.114 and defines three bands of one-way delay as shown in table 2. Range in Millisecond (ms) Description 0 150 Acceptable for most user application. 150 400 Acceptable provided that administrators are aware of the transmission time and the impact it has on the transmission quality of user applications. > 400 Unacceptable for general. However in certain cases this limit exceeds. Table 3: Standard for delay limit for voice In the data transmission process, each packet is moving from its source to its destination. The process of data transmission usually starts with a packet from a ho

Friday, October 25, 2019

The Problem of Moral Agency in Shakespeares Hamlet Essay -- GCSE Cour

The Problem of Moral Agency in Hamlet  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to be a moral agent, a person has to have a good sense of self, they have to know exactly who they are and how they must act according to the decisions they make. In Hamlet, the moral task at hand is revenge for the murder of Hamlet the elder. The murdered King's son, also of the same name, must be the one to avenge the murder. Before Prince Hamlet finds out the true story behind his father's death, he has his mother's "incestuous" remarriage to his uncle Claudius (who is now the King of Denmark) on his mind. Long after Hamlet learns the truth, he still does nothing. Hamlet is unable to act even though he has decided to seek revenge. One reason he does not act is because he cannot get past the fact that his mother is not, in his mind, adequately mourning old Hamlet's death. The second reason the Prince has problems with moral agency is because he does not really decide why he is planning to seek revenge on Claudius. His task is twofold, h e wants to avenge the murder of his father and he wants his mother to reveal her guilt about her hasty and incestuous marriage. Finally, Hamlet does not truly know who he is, and what he is to do until the very last act of Hamlet. This essay aims to explore why Prince Hamlet has trouble becoming a moral agent. When we first encounter Hamlet, his concerns are about his mother's remarriage to his uncle Claudius so soon after his father has died. The Prince is angry because Gertrude is not adequately mourning old Hamlet's death, and due to the insistence of Claudius that Hamlet consider him his father and king: O God, a beast that wants discourse of reason Would have mourn'd longer-- married with my uncle, My fathe... .... When Hamlet is doomed to die, he goes through with his revenge, but not for his father, nor for his mother-- The Prince finally kills the King when he finds out that it he, Claudius, who is responsible for the poisonous foil. This final reason to kill Claudius is most important of all. Works Cited Calderwood, James L.. To Be and Not To Be: Negation and Metadrama in Hamlet. --New York: Columbia University Press, 1983. Shakespeare, William. All's Well That Ends Well. --In: The Riverside Shakespeare. Ed. G. Blakemore Evans. --Boston: Houghton Mifflin Company, 1974; pp.504-541. Shakespeare, William. Hamlet. --In: The Riverside Shakespeare. Ed. G. Blakemore Evans. --Boston: Houghton Mifflin Company, 1974; pp. 1141-1186. Tirrell, Lynne. "Storytelling and Moral Agency."   --In: The Journal of Aesthetics and Art Criticism. --V.48, Spring 1990; pp.115-126.

Wednesday, October 23, 2019

Human Resource Planning Process Essay

The ongoing process of systematic planning to achieve optimum use of an organization’s most valuable asset – its human resources. The objective of human resource (HR) planning is to ensure the best fit between employees and jobs, while avoiding manpower shortages or surpluses. The three key elements of the HR planning process are forecasting labor demand, analyzing present labor supply, and balancing projected manpower demand and supply. When a business becomes large enough, it must pay attention not only to the employees it needs to hire, but what kind of employees it is hiring and what skills it is giving them. Human resources planning is the strategy businesses use to link their vision, mission, and primary goals with the employees they hire for day-to-day processes. It involves both logistics and leadership skills. A company may have all the financial resources it may need. But what if the manpower employed to manage the finances isn’t well trained? Well, nothing more than your finances will be going down the drain. Most of the corporate frauds are a result of unethical and mismanaged processes. Improper human capital may create a numerical output, but not the desired one in terms of quality. Most of the time, the term human resource management is synonymously used with personnel management. However, the meaning is still the same. It involves, employing, developing, utilizing, managing and understanding the staff in an organization. Importance of HRM: Organizational Psychology holds that successful organizations do not owe their success solely to market realities and sustainable competitive advantages. Actually, there is a lot more. Successful companies are those that consider their human capital as their most important asset. Facts and figures are the quantitative elements of successful management, yet the qualitative, i.e. the cognitive aspects, are those that actually make or break an organization. Since the industrial revolution, the world has progressed tremendously. Be it the steel industry, IT, fashion houses or housing sectors, development in all of these is evident. However, over the ages man has indiscriminately used and abused the natural resources available to him. It has resulted in a global energy crises and depletion of resources in general. In this backdrop, what remains is an abundance of human resource, or let’s says human capital. To achieve any more goals, tapping the right kind of resource is the key. We may have a business house worth millions of dollars. But what if there isn’t the manpower that suits the nature of the business? Hence, developing the manpower is of utmost importance. The Process of HRM Planning: It demands the HR manager to first understand the business requirement. Only if he comprehends the nature and scope of the business, will he be able to employ those who will deliver the required performance. When it comes to engaging the manpower, the manager should have a keen eye for spotting the talent. It ensures that the workforce is competent enough the meet the targets. Additionally, the existing ‘talent pool’ in the workplace should be taken into consideration, so that people with complementary skills can be employed. The functions of the HR manager are varied; he has to assess the currently employed workforce and their shortcomings. Identifying these shortcomings goes a long way in choosing an efficient workforce. While recruiting the new employees, the HR manager must calculate the expected workload. This way the HR department can design an accurate job profile and job expectations. Once you have the decided job descriptions, looking for candidates who fit the job will be easy. Don’t be fooled by their qualifications, it is only the relevant experience that matters more. A good HR manager is one who has the zeal and passion to motivate his prospective employees to perform to their potential. This process, thus, can be considered as one of the strategic steps for building the strong foundation of an efficient workforce in an organization. HR Planning Process of my Organization The HRM System of my organization is very comfortable for me. We work like a Family. Our organization’s is a Family for all staff. The Vision of the organization is: The perpetuity of our existence is for the superiority of lives of our valued clients, and combining the quality, reliability & professionalism with the customers’ welfare has been the only business challenge for us. To achieve service excellence by providing global standard financial services at reasonable price and thereby contribute to the society creating exceptional value for our stakeholders. We do not undertake investments on projects that have been scientifically proven to be harmful to human society and the global environment. Our Human Resource Management system is well organized and it update day by day as required. Normally, Human Resources Managers handle personnel decisions, including recruiting, hiring, position assignment, training, benefits and compensation. There are various functions that the HR Department looks into. They are – Recruiting and hiring Promotions Determining salaries Handling leaves Reviewing and processing awards Handling retirements Worker’s compensation Policy making and implementing Training and development Drafting Policies Our organization follows certain policies and the HR department formulates these policies. It is the most important function of the HR department. All the policies need to be drafted taking into consideration the goals of our organization. Recruiting Procedure In the earlier day our organization gave Newspaper Advertising for recruiting new people but now a day world is going to be Internet Base, in that context our organization also using their Advertisement in www.bdjobs.com for recruiting new and well experienced people. Its response is first and effective. I am also going to recruit in that procedure. So, I think it a well advertising media. HR Department Download CV and make a short list from those CV which our required match posts. Then make a communication (it sometime phone call or e-mail) with the candidate for Interview. Next face is to take a Written and a verbal test. The written test is based on English, Mathematics and IQ. Another part of test is a question paper is use for checking his/her mentality test. After successfully completing the written test those who are all qualified they get a call for a verbal test. Through this test checking his/her work experience, organizational behavior, personal behavior, overall his/her efficiency. Once he/she passes the entire test HR Department offer him/her 06 months Provisional Period Job through an Appointment Letter with all condition and a HR Manual. After successfully completion his/her provisional period he/she will be a Permanent Staff of PISL. But there is a condition that every staff must have to be renewal his/her job position in an Organizational Format. In that time if any of the staff is not renewal his/her contact of 1 year then organization will think that he/she will not interested to continue with us. Job Description Drafting The HR executive drafts the job descriptions that the people of the various designations of the organization is expected to perform. These job descriptions define all the qualities, skills and qualifications required for each designation. Background Checks It is the responsibility of the HR department to perform the background checks of all the employees that are appointed by the organization. The potential employees should also be thoroughly checked. Employee Records The HR department is expected to file all the details of the employees working in the organization. Each employee has a file of its own and these files are confidential. The job requires the executive to always keep these files updated. Employee Relations The HR department plays an important role in maintaining good employee relations within an organization. It is the department that takes into accounts the inquiries and issues faced by the employees. This is an important aspect of the job description and needs delicate handling. Performance Appraisal Annual performance reviews and appraisals are conducted by the HR department. Employee performance needs to be conducted accurately as the promotions and salary increase depend on these reviews. All the performance management records need to be maintained in the correct employee files. A performance appraisal is one of the important HR manager duties too. Training and Development All the employee training and development needs of the organization are handled by the HR department. It identifies the people who need to be trained, arrange for the training sessions and later take feedback to ensure that the training is implemented in the day-to-day work of the employee. Leave Management The HR department looks after the leave management of the employees. They need to maintain proper records of the number of leaves entitled to the employees, the leaves taken and the balance. It is also responsible for looking after the employees’ attendance and regularity. The HR department needs to update the leaves as per the changes in the laws too. Discipline & Decorum It is the unfortunate responsibility of the HR department to arrange for disciplinary action on the employees who are guilty of missing out too many days of work, not following the rules and regulations of the company and who refuse to follow the company policies. This will ensure that there is discipline in the organization. Safety The safety requirements of the organization are of paramount importance. It is the responsibility of the HR department to draft the safety policies to be followed by the organization and to implement them. Apart from the above, the human resource manager job description also include the following – The HR managers work closely with the company lawyers to sort out the corporate issues and suits filed against the organization. The HR managers are required to play an important part in the determination of the annual budget of the organization. The HR manager conducts the benefits, performance appraisals and the salary hikes, so he is in a position to determine the increase in the organizational spending. Any changes in the staffing of the organization needs to be handled by the HR manager. The HR manager is in charge of the employee motivation and needs to resolve issues which hinder employee performance. Working Environment WORK ENVIRONMENT is a place where an employee spends his or her more than a day which provides them which should be energetic, relaxing, friendly, atmospheric, green surroundings and also it should be very much comfortable for an employee to work in. In that context our organization’s working environment is so nice. Every staff is helpful to each other. Every department work is well organized so that there is no extra pressure for a staff. Managers is always take care of their under staff. They say that take your time for work but make it perfect. Our Customer Service Department is focusing on customer satisfaction; they deliver their best services on time and with high quality, accurate speed, safety and security. They are mainly customer-oriented. Level is the main thing which identifies the position which leads the responsibilities played by an individual. Level is given by a Human resource as per the qualifications of its employees. Culture is an important role in this organization and it always understands the culture and that’s why they advertise their brand and products by very good and very well done message appeal which spread over people. In the festive seasons they always distribute gifts to their employees’ customers’ suppliers in occasions like Bangla Nobovorsho, International Mother Language Day, Independence Day, Eid Day, New Year eve etc. They try to make their people realize about the culture which really send some positive energy and people feel the freshness and home in that beauty by this organization. Thus culture plays an important role. To continue with work and job that is to manage the duties and responsibilities effectively and honestly, the level is organized by the management so the work gets divided as the role means the specific job is done by the specific person and there are different levels. Benefits and compensation The area of Compensation and Benefits belongs to the most specialized areas in Human Resources Management. Compensation and Benefits usually plays the role of the HR Controlling, setting the rules and procedures around the salaries, variable pay and benefits. Compensation and Benefits is usually the function of HRM most connected with the competitors on the market and it sets the compensation policies, which are fully competitive on the job market, but the policies still meet the targets defined by the organization. The clear definition of processes in Compensation and Benefits is very important as the processes are under the attacks from the line management every single day. There is no a day without a pressure for the salary review at the individual employees and the rules and standards must be waterproof. Our Increment system is so update. It depend a employee’s full years different status like his work hour, working efficiency, extra work, environmental behavior (internal and external), approach with customer and his co-worker etc. Every term is defining some points and all total point indicates his increment and benefits. The correct base salary is very connected to the competitive salary issue. The correct base salary is the salary, which ensures: * the organization can hire a new employee at the requested level skills and competencies * the organization is able to keep the employee * the employee is motivated * the salary is felt as being fair The most important aspect is the fairness of the base salary to the employee, managers and the organization. Many organizations went through many organizational changes and the employees were moved from departments to completely different departments in the organization. After such an activity, the HRM Function has to be proactive and the overall organizational scan of the base salaries has to be conducted to revise the compensation policy of the organization. There are always employees, who are underpaid in their new position and employees, who are overpaid. The role of the HRM Function is make a clear picture of the organization, to present the situation to the Top Management of the organization and the conclusion has to be made. The Top Management has to receive a proposal from the HRM Function ensuring the situation will be sorted out by several actions and the time frame has to be agreed. Compensation Strategy is one of the most important strategies in the HRM Function as it influences the costs of the organization and potential bad decision can lead to very serious damages to the organization. The compensation and benefits strategy is derived from the overall HRM Strategy and it has to be fully aligned. When the HRM Strategy sets the main objectives for the HRM Function, the compensation and benefits strategy has to follow. When the overall HRM Strategy states the low cost of services and employees, the compensation and benefits strategy cannot target the highest salaries at all levels. The compensation and benefits strategy sets the general rules for the compensation and benefits area in the organization and the owners and leaders of the area. In some organizations, the compensation and benefits department is just a support department for the line management. In other organizations the compensation and benefits manager is a very powerful employee in the organization with the right â€Å"veto†. The compensation and benefits strategy sets the position of the organization on the job market and defines the items in the total cash in the organization and their role. The role of different components of the compensation is very important as the role of the compensation components can differ. For example, the role of bonuses can be primarily in performance reward or the retention of the employees and the organization has to decide. The compensation and benefits strategy has to reflect the reality in the industry and the surrounding job market. The compensation strategy can set the wish to pay the lowest possible salaries, but the HRM Function and the organization have to respect the reality on the job market. The compensation strategy needs a strong support from the top management as it sets strong limits to the daily operation of the line management and they usually do not fully agree with all the aspects included in the compensation and benefits strategy. Apart from these, there are several other areas where the human resources department plays an important role. Hence, the department is termed as a support department. In order to work efficiently for the employee welfare, it is mandatory that the people working with the human resources are aware of how to handle the above. Human resources are the assets of any organization. They need to be looked after as they are the reason for the company’s existence. Human resource is also one of the various functions in an organization. It is responsible for human resources management of the company. Thus, human resources become an important department and function of any organization. When you take up a job in the human resources, you are basically dealing with the policies and strategies followed by the organization for welfare of the employees (human resources).

Tuesday, October 22, 2019

Free Essays on Landscape And Geography In “A Passage To India”

The two books chosen for the following essay have been written at an interval of fifty years by two British authors: E.M Forster and R.P. Jhabvala. The first one is E .M Forster’s major work: â€Å"A Passage to India†. Its main focus is the study of two worlds divorced. The second â€Å"Heat and Dust† has made its author Ruth Prawer Jhabvala win the Booker –Prize. In her novel, we get a picture of India by two English women separated by fifty years. Both of the novels present an enigmatic India. This is of a primary importance for the following study as we will try to understand what kind of role the geography and landscape of India play in the novels. First, we will examine the symbolism of the landscape used by the writers of â€Å"A Passage to India† and â€Å"Heat and Dust†. This will then lead us to the second part which tries to show how the Indian setting influences the characters of the novels and especially the Westerners. From the beginning of each book, the reader guesses that the Indian atmosphere is going to play a major role in the novels. The title of Ruth Prawer Jhabvala is literal in that sense: â€Å"Heat and Dust† makes it clear that the hot weather conditions are the causes of the following action. Readers expect that the heat and the dust of India are going to upset a few lives. Forster is also aware that the reader must understand the importance of the Indian atmosphere from the very first few lines. That is why he chooses to devote all the first chapter of his novel at describing the town of Chandrapore. First, he starts by presenting the part of the town inhabited by the natives as a dreary landscape: â€Å"So abased, so monotonous is everything that meets the eye, that when the Ganges comes down it might be expected to wash the excrescence back into the soil. Houses do fall, people are drowned and left rotting, but the general outline of the town persists, welling here, shrinking there, like some low but in... Free Essays on Landscape And Geography In â€Å"A Passage To India† Free Essays on Landscape And Geography In â€Å"A Passage To India† The two books chosen for the following essay have been written at an interval of fifty years by two British authors: E.M Forster and R.P. Jhabvala. The first one is E .M Forster’s major work: â€Å"A Passage to India†. Its main focus is the study of two worlds divorced. The second â€Å"Heat and Dust† has made its author Ruth Prawer Jhabvala win the Booker –Prize. In her novel, we get a picture of India by two English women separated by fifty years. Both of the novels present an enigmatic India. This is of a primary importance for the following study as we will try to understand what kind of role the geography and landscape of India play in the novels. First, we will examine the symbolism of the landscape used by the writers of â€Å"A Passage to India† and â€Å"Heat and Dust†. This will then lead us to the second part which tries to show how the Indian setting influences the characters of the novels and especially the Westerners. From the beginning of each book, the reader guesses that the Indian atmosphere is going to play a major role in the novels. The title of Ruth Prawer Jhabvala is literal in that sense: â€Å"Heat and Dust† makes it clear that the hot weather conditions are the causes of the following action. Readers expect that the heat and the dust of India are going to upset a few lives. Forster is also aware that the reader must understand the importance of the Indian atmosphere from the very first few lines. That is why he chooses to devote all the first chapter of his novel at describing the town of Chandrapore. First, he starts by presenting the part of the town inhabited by the natives as a dreary landscape: â€Å"So abased, so monotonous is everything that meets the eye, that when the Ganges comes down it might be expected to wash the excrescence back into the soil. Houses do fall, people are drowned and left rotting, but the general outline of the town persists, welling here, shrinking there, like some low but in...

Monday, October 21, 2019

Free Essays on The Nature Of Evidence

Evidence is like ‘buttah,’ or something like that. Actually, evidence is the devil. Some sort of evidence controls almost everything we do, as does the devil, or at least that is who I blame. This paper, for example, is evidence for you that I can comprehend and understand the assigned readings. Every decision I make or belief I have is supposed to have evidence, or is it? This question, including the nature of evidence, is one that both W.K. Clifford and William James try to answer. For Clifford â€Å"it is wrong always, everywhere, and for anyone to believe anything upon insufficient evidence† (118). But for James it is a little different. James believes that there are some questions that cannot wait for sufficient evidence and that in those cases it is not only right to decide using faith, but that one must decide by using faith. I know the previous statements are very short representations of James’ and Clifford’s ideas on the nature of evidence, but as the paper progresses the finer points will be brought out as well as an understanding of the similarities and differences in their ideas. W.K. Clifford, The Ethics of Belief Clifford’s main idea was that â€Å"it is wrong always, everywhere, and for anyone to believe anything upon insufficient evidence† (118). This idea is by no means all that can be gathered from his essay. Clifford made some very valid points about evidence in its relation to belief and its immense importance to humankind. Clifford described how dangerous it could be for humans to base a belief on anything but evidence. He also gave some very compelling examples of how insufficient evidence and stifling doubts leads to wrong beliefs, and how those beliefs affected others. Clifford used the example of a ship owner who knowingly allowed passengers to travel on a ship in need of repair, and then the ship went down killing all the passengers. The owner suppressed his doubts until he truly beg... Free Essays on The Nature Of Evidence Free Essays on The Nature Of Evidence Evidence is like ‘buttah,’ or something like that. Actually, evidence is the devil. Some sort of evidence controls almost everything we do, as does the devil, or at least that is who I blame. This paper, for example, is evidence for you that I can comprehend and understand the assigned readings. Every decision I make or belief I have is supposed to have evidence, or is it? This question, including the nature of evidence, is one that both W.K. Clifford and William James try to answer. For Clifford â€Å"it is wrong always, everywhere, and for anyone to believe anything upon insufficient evidence† (118). But for James it is a little different. James believes that there are some questions that cannot wait for sufficient evidence and that in those cases it is not only right to decide using faith, but that one must decide by using faith. I know the previous statements are very short representations of James’ and Clifford’s ideas on the nature of evidence, but as the paper progresses the finer points will be brought out as well as an understanding of the similarities and differences in their ideas. W.K. Clifford, The Ethics of Belief Clifford’s main idea was that â€Å"it is wrong always, everywhere, and for anyone to believe anything upon insufficient evidence† (118). This idea is by no means all that can be gathered from his essay. Clifford made some very valid points about evidence in its relation to belief and its immense importance to humankind. Clifford described how dangerous it could be for humans to base a belief on anything but evidence. He also gave some very compelling examples of how insufficient evidence and stifling doubts leads to wrong beliefs, and how those beliefs affected others. Clifford used the example of a ship owner who knowingly allowed passengers to travel on a ship in need of repair, and then the ship went down killing all the passengers. The owner suppressed his doubts until he truly beg...

Sunday, October 20, 2019

technoscience essays

technoscience essays The world is changing rapidly. A single technological development can lead to an infinite number of consequential developments, each of which having varying impacts on humanity. These impacts, or indicators, display the results of technological development. Climactic, economic, social, and energy related indicators are important in showing humanity's use of technoscience, and demonstrate that certain political and economic changes are needed so that technoscientists can use their knowledge to benefit the great majority of humanity. Climactic indicators are excellent examples of humanity's misuse of technoscience. One such indicator is global temperature. It displays the results of the burning of fossil fuels and the release of nitrous oxides into the atmosphere. Production of coal, oil, natural gas and nuclear power each expanded by 1 percent in 1995 (Brown, 16). Globally, the ten warmest years out of the last 130 have all occurred in the eighties and nineties (Brown, 15). These figures demonstrate that humanity is not effectively controlling and limiting its use of fossil fuels. As a result, acid rain falls upon the earth destroying what is left of the planet's forests and, an estimated 37 percent of the fish species that inhabit thelakes and streams of North America are either in jeopardy or extinct. A second indicator that displays humanity's misuse of technoscience is the global economy. Global economic statistics show the results of the applications of technoscience. In 1995, the global economy grew by an estimated 3.7 percent the largest gain since the 4.6 percent growth in 1980 (Brown, 74). The use of technoscientific developments in various fields raised the global output of goods and services. Although this was an impressive expansion promoting employment and development, it also increased the unsustainable demands on the earth's natural systems and resources, such as the planet's forests. Applications of tec...

Saturday, October 19, 2019

Corporate Governance Practices in Qatar Essay Example | Topics and Well Written Essays - 500 words

Corporate Governance Practices in Qatar - Essay Example Different frameworks are being drawn up to ensure that there is integrity in the market that may allow the region maintain its ethical stand, and at the same time, make profit in the ever-changing world market. This paper will examine corporate governance, and how it differs among international and local companies in Qatar. The aspect of corporate governance may not be a new one, but Qatar is among regions that do not have long-standing financial infrastructures and may not necessarily be fully aware of the impact it has on the region. However, the region is trying to incorporate the phenomenon of corporate governance through the financial market authority (Tricker, 2009). This is in a bid to address some of the issues that face most of the companies in the region, and the challenges that the region faces with a foreign company’s involvement in the region. The Qatar Financial Market Authority (QFMA) has certain guidelines for all companies that operate in the region, but the MNCs face much steeper challenges when it comes to their operations. One of the main issues that arise with MNCs in the region is the issue of the greed culture associated with MNCs. This ‘infectious greed’, as countless people refer to it, is presenting tremendous challenges to their companies in Qatar. The boards of directors in major companies are being faced with the challenge of being forthcoming with every action they take that concerns the company. The control systems in these companies are required to uphold certain regulations in order to operate without problems. Strict external auditing is required for these companies to have a transparent accounting procedure that makes them accountable to the QFMA. Agreements on disclosure are necessary to ensure financial reports are reported truthfully and accurately (Zinkin, 2011). Compliance is another issue facing countless MNCs.

Friday, October 18, 2019

Chip and Pin Card Systems Essay Example | Topics and Well Written Essays - 2500 words

Chip and Pin Card Systems - Essay Example The magnetic strips required the customer to present their cards for swiping in a terminal, sign a slip of receipt and the payment would then be processed (King, 2012). However, with the introduction of chip-and-pin, the customer’s card is swiped and the details would be authenticated by entering a unique pin and the payment would be processed. Based on the introduced chip and pin cards in the United Kingdom, research is to be conducted to determine whether their introduction has really served to reduce incidences of card fraud in the United Kingdom. The main issue in this paper is whether there has been a reduction in card fraud since chip and pin cards were introduced and whether any reduction can be attributed solely to the introduction of chip and pin cards. Literature Review The shift towards the chip and pin technology in the United Kingdom was driven by increasing card fraud, which totaled to a lot of money in 2000. After the introduction of chip and pin technology, the re has been a drastic reduction in card fraud in the UK. The technology is a technology backed by the government to implement the benchmark created by EMV to curb card fraud (King, 2012). This was meant to reduce the fraud committed when transactions are completed face to face with the customer. All major card providers in Europe and Canada have gone the way of the chip and pin technology, but the United States still uses magnetic strips on their debit and credit cards. From research, the working of the chip and pin technology is stated as replacing the common form of card performance; magnetic strips and requiring the customer to sign the accompanying receipt (Diebold, 2011). In chip and pin technology, the customer’s information is stored on an IC chip embedded in the card as opposed to the magnetic strip used before the technology was introduced. The data is then encrypted on the card using different algorithms that generate random numbers when transactions are recorded. I n the previous magnetic strip technology, the card was swiped on a terminal, but with the new technology, the customer inserts the card in a terminal, the information in the integrated circuit is decrypted and authorization for the transaction provided. When the authorization for the transaction is provided, the customer then enters a unique pin, a receipt is generated and the money deducted from the cardholder's account. One of the main security features of chip and pin technology is the ability to use wireless terminals that are more secure since the card is used in the presence of the customer. This also means that the terminals use secure modes of transmission of customer data to a central database. Before the introduction of chip and pin technology, magnetic strips were used for authentication reasons (Financial Fraud Action UK, 2011). The magnetic strip on the card had personal details for the holder which could be related to the bank account in case they want to perform any t ransaction like withdrawing money on the ATM or purchasing items in shops using the card.  

Environment & Diversity in Community Health Assignment

Environment & Diversity in Community Health - Assignment Example This does not dispute the fact that even low levels of Ozone can cause health effects. Children, adults, older people, people with lung diseases and people who are aggressive or active outdoor may be particularly sensitive to ozone. Ozone is the main component of smog in Middletown. Despite the fact that it takes place naturally in the atmosphere to offer protective layer above the earth, at the ground, it is the main component of smog (Manderscheid 51). When Ozone is inhaled, it can cause respiratory problems, inflammation of the lungs, impair body immune system thus making people susceptible to respiratory diseases including pneumonia and bronchitis and lastly, it can exacerbate asthma. The ozone pollutes or harms the environment in that it interferes with the capability of the plants to manufacture, produce and store food in that growth of the plant and food production are compromised. In addition, it weakens sensitive vegetation thus making plants more susceptible to plant diseases, environmental stress and pests (Brenkert 41-4). A nurse led program would aim to reduce risk of disease up to 15 to 20 percent in children’s lung infections by providing adequate medication to the diseases (McCann 78). Furthermore, it would focus to reduce risks of moderate to complicated respiratory symptoms in children such as aggravated coughing and painful breathing. More so, it would aim to protect the environment by trying to reduce production loss of major agricultural plants such as commercial forests, wheat and soybeans. Manderscheid, R. (2009). Aiming for a healthier population by 2020: Moving our fields towards prevention, early intervention, and population health. Behavioral Healthcare, 29 (1), 51- 52. Web. May 14

Stumper 4 Assignment Example | Topics and Well Written Essays - 250 words

Stumper 4 - Assignment Example My answer is also correct but it is not detailed to the lather. Both answers explain the effects of such situation in the short run. My answer gives general information while the teacher’s goes as far as categorizing the major economic components that face the full impacts. For instance, the teacher talks about the how businesses, households, commercial banks and the foreign exchange markets react to lower Fed Fund Rates. Nevertheless, both answers explain the result of the expansionary monetary policy that is enacted during trough phase of the business cycle. In this question, both answers are correct though there slight difference in the explanations. Both answers focus on the long term effects of a strong expansionary policy and the resulting effects. Some of the effects discussed include price levels, aggregate demand, aggregate supply, inflation, rate of unemployment and Gross Domestic Product. In my own opinion, the assignment is ninety five percent