.

Saturday, August 31, 2019

Substitution and Income Effects of the Working Tax Credit on Labour Supply

Labour essay: Having considered the implications for the WTC, we can now analyse the effects of the policy on labour supply by determining the substitution and income effects. It’s clear that the effect of the working tax credit on work behaviour depends upon how much a worker is currently working. To analyse these effects we will only look at one type of individual; a lone parent in the labour force. This will simplify our analysis such that we can divide the diagram below into 3 sections and describe the effects separately. draw:frame} Figure 1: Diagram showing how the imposition of the WTC affects the individuals labour supply decision When the lone parent is either not working at all, or working less than 16 hours (Labelled A in the diagram), her current wage rate and therefore income is unaffected by the WTC. This is simply because they have not yet received any tax credit and therefore have no added incentives to work. However, if they work over16 hours, the programme wi ll raise their overall take home wage as they receive a lump sum payment, shown by the first vertical blue line. Therefore, at this low level of work, there is a very small, or 0, income effect, and a positive substitution effect, thus increasing the individual’s labour supply. These effects are the same as would be under an increase in the wage rate, shown diagrammatically in Figure 2. {draw:frame} Figure 2: Diagram showing the effects of a wage increase The movement around the original indifference curve from A to C is the substitution effect; this arises due the change in price of leisure relative to hours of work, holding utility as constant. As the wage rate has increased the opportunity cost of leisure opposed to work has risen. The substitution effect encourages the worker to decrease his hours of leisure. The movement from C to B donates the income effect illustrating the workers response to an increase in real income. Overall, the substitution effect dominates the income effect and therefore increases labour supply from L1 to L2. There is also the possibility that the income effect may overpower the substitution effect resulting in a decrease in the supply of labour. However, this depends on the position of the indifference curves, hence the worker’s preferences for work and leisure. On the other hand, it is unlikely at this low wage rate for the worker to choose leisure over the opportunity to earn a higher wage. Section ‘C’ of our WTC diagram shows the area at which an individual works more than 30 hours. The worker’s net income is now higher at this point, however the worker’s marginal wage is lower which is demonstrated by the gradient of the WTC line being shallower than gradient of the No WTC line. The Substitution and Income effects here are the same as would be with a decrease in wage. Both the Income and substitution effects work together to reduce the amount of labour; shown in Figure 3: {draw:frame} Figure 3: Diagram showing the effects of a wage decrease The substitution effect is shown by the movement around the old indifference curve, from A to C. The income effect is shown by the movement from A to B. Although the substitution effect is stronger, both effects work together to reduce the hours of work from L1 to L3. Lastly, section ‘B’ represents the area at which an individual works between 16 and 30 hours. Here, the effects of the WTC on labour supply are much more complex. Despite the gradient of the WTC line being the same as section C, this time there is the possibility of increasing work to above 30 hours and receiving the additional payment. This therefore results in lone parents bunching around the 16 and 30 hour marks in order to gain the greatest benefit from the WTC payment. Some will therefore substitute leisure for work and work longer hours to gain the additional bonus at 30 hours, whilst others will choose to forgo work for leisure and be content with the benefit of working over 16 hours.

Friday, August 30, 2019

Importance of Animal Behavior Essay

Why do animals behave the way they do? The answer to this question depends on what the behavior is. A cat chases a mouse to catch it. A spider spins its sticky web to trap insects. A mother dog nurses her puppies to feed them. All of these behaviors have the same purpose: getting or providing food. All animals need food for energy. They need energy to move around. In fact, they need energy just to stay alive. Baby animals also need energy to grow and develop. Birds and wasps build nests to have a safe place to store their eggs and raise their young. Many other animals build nests for the same reason. Animals protect their young in other ways, as well. For example, a mother dog not only nurses her puppies. She also washes them with her tongue and protects them from strange people or other animals. All of these behaviors help the young survive and grow up to be adults. Rabbits run away from foxes and other predators to stay alive. Their speed is their best defense. Lizards sun themselves on rocks to get warm because they cannot produce their own body heat. When they are warmer, they can move faster and be more alert. This helps them escape from predators, as well as find food. All of these animal behaviors are important. They help the animals get food for energy, make sure their young survive, or ensure that they survive themselves. Behaviors that help animals or their young survive increase the animals’ fitness. You read about fitness in the Evolution chapter. Animals with higher fitness have a better chance of passing their genes to the next generation. If genes control behaviors that increase fitness, the behaviors become more common in the species. This is called evolution by natural selection. Innate Behavior All of the behaviors shown in the images above are ways that animals act naturally. They don’t have to learn how to behave in these ways. Cats are natural-born hunters. They don’t need to learn how to hunt. Spiders spin their complex webs without learning how to do it from other spiders. Birds and wasps know how to build nests without being taught. These behaviors are called innate. An innate behavior is any behavior that occurs naturally in all animals of a given species. An innate behavior is also called an instinct. The first time an animal performs an innate behavior, the animal does it well. The animal does not have to practice the behavior in order to  get it right or become better at it. Innate behaviors are also predictable. All members of a species perform an innate behavior in the same way. From the examples described above, you can probably tell that innate behaviors usually involve important actions, like eating and caring for the young. There are many oth er examples of innate behaviors. For example, did you know that honeybees dance? The honeybee in Figure below has found a source of food. When the bee returns to its hive, it will do a dance, called the waggle dance. The way the bee moves during its dance tells other bees in the hive where to find the food. Honeybees can do the waggle dance without learning it from other bees, so it is an innate behavior. When this honeybee goes back to its hive, it will do a dance to tell the other bees in the hive where it found food. Learned Behavior Just about all other human behaviors are learned. Learned behavior is behavior that occurs only after experience or practice. Learned behavior has an advantage over innate behavior. It is more flexible. Learned behavior can be changed if conditions change. For example, you probably know the route from your house to your school. Assume that you moved to a new house in a different place, so you had to take a different route to school. What if following the old route was an innate behavior? You would not be able to adapt. Fortunately, it is a learned behavior. You can learn the new route just as you learned the old one. Although most animals can learn, animals with greater intelligence are better at learning and have more learned behaviors. Humans are the most intelligent animals. They depend on learned behaviors more than any other species. Other highly intelligent species include apes, our closest relatives in the animal kingdom. They include chimpanzees and gorillas. Both are also very good at learning behaviors. You may have heard of a gorilla named Koko. The psychologist Dr. Francine Patterson raised Koko. Dr. Patterson wanted to find out if gorillas could learn human language. Starting when Koko was just one year old, Dr. Patterson taught her to use sign language. Koko learned to use and understand more than 1,000 signs. Koko showed how much gorillas can learn. See A Conversation with Koko at http://www.pbs.org/wnet/nature/koko/ for additional information. Think about some of the behaviors you have learned. They might include riding a bicycle, using a computer, and playing a musical  instrument or sport. You probably did not learn all of these behaviors in the same way. Perhaps you learned some behaviors on your own, just by practicing. Other behaviors you may have learned from other people. Humans and other animals can learn behaviors in several different ways. The following methods of learning will be explored below: 1. Habituation (forming a habit). 2. Observational learning. 3. Conditioning. 4. Play. 5. Insight learning. Habituation Habituation is learning to get used to something after being exposed to it for a while. Habituation usually involves getting used to something that is annoying or frightening, but not dangerous. Habituation is one of the simplest ways of learning. It occurs in just about every species of animal. You have probably learned through habituation many times. For example, maybe you were reading a book when someone turned on a television in the same room. At first, the sound of the television may have been annoying. After awhile, you may no longer have noticed it. If so, you had become habituated to the sound. Another example of habituation is shown in Figure below. Crows and most other birds are usually afraid of people. They avoid coming close to people, or they fly away when people come near them. The crows landing on this scarecrow have gotten used to a â€Å"human† in this place. They have learned that the scarecrow poses no danger. They are no longer afraid to come close. They h ave become habituated to the scarecrow. This scarecrow is no longer scary to these crows. They have become used to its being in this spot and learned that it is not dangerous. This is an example of habituation. Can you see why habituation is useful? It lets animals ignore things that will not harm them. Without habituation, animals might waste time and energy trying to escape from things that are not really dangerous. Observational Learning Observational learning is learning by watching and copying the behavior of  someone else. Human children learn many behaviors this way. When you were a young child, you may have learned how to tie your shoes by watching your dad tie his shoes. More recently, you may have learned how to dance by watching a pop star dancing on TV. Most likely you have learned how to do math problems by watching your teachers do problems on the board at school. Can you think of other behaviors you have learned by watching and copying other people? Other animals also learn through observational learning. For example, young wolves learn to be better hunters by watching and copying the skills of older wolves in their pack. Another example of observational learning is how some monkeys have learned how to wash their food. They learned by watching and copying the behavior of other monkeys. Conditioning Conditioning is a way of learning that involves a reward or punishment. Did you ever train a dog to fetch a ball or stick by rewarding it with treats? If you did, you were using conditioning. Another example of conditioning is shown in Figure below. This lab rat has been taught to â€Å"play basketball† by being rewarded with food pellets. Conditioning also occurs in wild animals. For example, bees learn to find nectar in certain types of flowers because they have found nectar in those flowers before. This rat has been taught to put the ball through the hoop by being rewarded with food for the behavior. This is an example of conditioning. What do you think would happen if the rat was no longer rewarded for the behavior? Humans learn behaviors through conditioning, as well. A young child might learn to put away his toys by being rewarded with a bedtime story. An older child might learn to study for tests in school by being rewarded with better grades. Can you think of behaviors you learned by being rewarded for them? Conditioning does not always involve a reward. It can involve a punishment instead. A toddler might be punished with a time-out each time he grabs a toy from his baby brother. After several time-outs, he may learn to stop taking his brother’s toys. A dog might be scolded each time she jumps up on the sofa. After repeated scolding, she may learn to stay off the sofa. A bird might become ill after eating a poisonous insect. The bird may learn from this â€Å"puni shment† to avoid eating the same kind of insect in the future. Learning by Playing Most young mammals, including humans, like to play. Play is one way they learn skills they will need as adults. Think about how kittens play. They pounce on toys and chase each other. This helps them learn how to be better predators when they are older. Big cats also play. The lion cubs in Figure below are playing and practicing their hunting skills at the same time. The dogs in Figure below are playing tug-of-war with a toy. What do you think they are learning by playing together this way? Other young animals play in different ways. For example, young deer play by running and kicking up their hooves. This helps them learn how to escape from predators. These two lion cubs are playing. They are not only having fun. They are also learning how to be better hunters. Insight Learning Insight learning is learning from past experiences and reasoning. It usually involves coming up with new ways to solve problems. Insight learning generally happens quickly. An animal has a sudden flash of insight. Insight learning requires relatively great intelligence. Human beings use insight learning more than any other species. They have used their intelligence to solve problems ranging from inventing the wheel to flying rockets into space. Think about problems you have solved. Maybe you figured out how to solve a new type of math problem or how to get to the next level of a video game. If you relied on your past experiences and reasoning to do it, then you were using insight learning. One type of insight learning is making tools to solve problems. Scientists used to think that humans were the only animals intelligent enough to make tools. In fact, tool-making was believed to set humans apart from all other animals. In 1960, primate expert Jane Goodall discovered that chimpanzees also make tools. She saw a chimpanzee strip leaves from a twig. Then he poked the twig into a hole in a termite mound. After termites climbed onto the twig, he pulled the twig out of the hole and ate the insects clinging to it. The chimpanzee had made a tool to â€Å"fish† for termites. He had used insight to solve a problem. Since then, chimpanzees have been seen making several different types of tools. For example, they sharpen sticks and use them as spears for hunting. They use stones as hammers to crack open nuts. Scientists have also observed other species of animals making tools to solve problems. A crow was seen bending a  piece of wire into a hook. Then the crow used the hook to pull food out of a tube. An example of a gorilla using a walking stick is shown in Figure below. Behaviors such as these show that other species of animals can use their experience and reasoning to solve problems. They can learn through insight. This gorilla is using a branch as a tool. She is leaning on it to keep her balance while she reaches down into swampy water to catch a fish. Social Behavior Why is animal communication important? Without it, animals would not be able to live together in groups. Animals that live in groups with other members of their species are called social animals. Social animals include many species of insects, birds, and mammals. Specific examples of social animals are ants, bees, crows, wolves, and humans. To live together with one another, these animals must be able to share information. Highly Social Animals Some species of animals are very social. In these species, members of the group depend completely on one another. Different animals within the group have different jobs. Therefore, group members must work together for the good of all. Most species of ants and bees are highly social animals. Ants, like those in Figure below, live together in large groups called colonies. A colony may have millions of ants. All of the ants in the colony work together as a single unit. Each ant has a specific job. Most of the ants are workers. Their job is to build and repair the colony’s nest. Worker ants also leave the nest to find food for themselves and other colony members. The workers care for the young as well. Other ants in the colony are soldiers. They defend the colony against predators. Each colony also has a queen. Her only job is to lay eggs. She may lay millions of eggs each month. A few ants in the colony are called drones. They are the only male ants in the colony. Their job is to mate with the queen. The ants in this picture belong to the same colony. They have left the colony Honeybees and bumblebees also live in colonies. A colony of honeybees is shown in Figure don’t purge me. Each bee in the colony has a particular job. Most of the bees are workers. Young worker bees clean the colony’s hive and feed the young. Older worker bees build the waxy honeycomb or guard the hive. The oldest workers leave the hive to find food. Each colony usually has one queen that lays eggs. The colony also has a small number of male drones. They mate with the queen. All the honeybees in this colony work together. Each bee has a certain job to perform. The bees are gathered together to fly to a new home. How do you think they knew it was time to gather together? Cooperation Ants, bees, and other social animals must cooperate. Cooperation means working together with others. Members of the group may cooperate by sharing food. They may also cooperate by defending each other. Look at the ants in Figure below. They show clearly why cooperation is important. A single ant would not be able to carry this large insect back to the nest to feed the other ants. With cooperation, the job is easy. These ants are cooperating. By working together, they are able to move this much larger insect prey back to their nest. At the nest, they will share the insect with other ants that do not leave the nest. Animals in many other species cooperate. For example, lions live in groups called prides. A lion pride is shown in Figure below. All the lions in the pride cooperate. Male lions work together to defend the other lions in the pride. Female lions work together to hunt. Then they share the meat with other pride members. Another example is meerkats. Meerkats are small mammals that live in Africa. They also live in groups and cooperate with one another. For example, young female meerkats act as babysitters. They take care of the baby meerkats while their parents are away looking for food. Members of this lion pride work together. Males cooperate by defending the pride. Females cooperate by hunting and sharing the food. Mating Behavior Some of the most important animal behaviors involve mating. Mating is the pairing of an adult male and female to produce young. Adults that are most successful at attracting a mate are most likely to have offspring. Traits  that help animals attract a mate and have offspring increase their fitness. As the genes that encode these traits are passed to the next generation, the traits will become more common in the population. Courtship Behaviors In many species, females choose the male they will mate with. For their part, males try to be chosen as mates. They show females that they would be a better mate than the other males. To be chosen as a mate, males may perform courtship behaviors. These are special behaviors that help attract a mate. Male courtship behaviors get the attention of females and show off a male’s traits. Different species have different courtship behaviors. Remember the peacock raising his tail feathers in Figure above? This is an example of courtship behavior. The peacock is trying to impress females of his species with his beautiful feathers. Another example of courtship behavior in birds is shown in Figure below. This bird is called a blue-footed booby. He is doing a dance to attract a female for mating. During the dance, he spreads out his wings and stamps his feet on the ground. . This blue-footed booby is a species of sea bird. The male pictured here is doing a courtship Courtship behaviors occur in many other species. For example, males in some species of whales have special mating songs to attract females as mates. Frogs croak for the same reason. Male deer clash antlers to court females. Male jumping spiders jump from side to side to attract mates. Courtship behaviors are one type of display behavior. A display behavior is a fixed set of actions that carries a specific message. Although many display behaviors are used to attract mates, some display behaviors have other purposes. For example, display behaviors may be used to warn other animals to stay away, as you will read below. Caring for the Young In most species of birds and mammals, one or both parents care for their offspring. Caring for the young may include making a nest or other shelter. It may also include feeding the young and protecting them from predators. Caring for offspring increases their chances of surviving. Birds called killdeers have an interesting way to protect their chicks. When a predator gets too close to her nest, a mother killdeer pretends to have a broken wing. The mother walks away from the nest holding her wing as though it is  injured. This is what the killdeer in Figure below is doing. The predator thinks she is injured and will be easy prey. The mother leads the predator away from the nest and then flies away. This mother killdeer is pretending she has a broken wing. She is trying to attract a predator In most species of mammals, parents also teach their offspring important skills. For example, meerkat parents teach their pups how to eat scorpions without being stung. A scorpion sting can be deadly, so this is a very important skill. Teaching the young important skills makes it more likely that they will survive. Defending Territory Some species of animals are territorial. This means that they defend their area. The area they defend usually contains their nest and enough food for themselves and their offspring. A species is more likely to be territorial if there is not very much food in their area. Animals generally do not defend their territory by fighting. Instead, they are more likely to use display behavior. The behavior tells other animals to stay away. It gets the message across without the need for fighting. Display behavior is generally safer and uses less energy than fighting. Male gorillas use display behavior to defend their territory. They pound on their chests and thump the ground with their hands to warn other male gorillas to keep away from their area. The robin in Figure below is also using display behavior to defend his territory. He is displaying his red breast to warn other robins to stay away. The red breast of this male robin is easy to see. The robin displays his bright red chest to defend his territory. It warns other robins to keep out of his area. Some animals deposit chemicals to mark the boundary of their territory. This is why dogs urinate on fire hydrants and other objects. Cats may also mark their territory by depositing chemicals. They have scent glands in their face. They deposit chemicals by rubbing their face against objects. Cycles of Behavior Many animal behaviors change in a regular way. They go through cycles. Some cycles of behavior repeat each year. Other cycles of behavior repeat every day. Yearly Cycles An example of a behavior with a yearly cycle is hibernation. Hibernation is a state in which an animal’s body processes are slower than usual and its body temperature falls. An animal uses less energy than usual during hibernation. This helps the animal survive during a time of year when food is scarce. Hibernation may last for weeks or months. Animals that hibernate include species of bats, squirrels, and snakes. Most people think that bears hibernate. In fact, bears do not go into true hibernation. In the winter, they go into a deep sleep. However, their body processes do not slow down very much. Their body temperature also remains about the same as usual. Bears can be awakened easily from their winter sleep. Instinctual behavior One type of instinctual behavior is fixed action patterns, which are behaviors the animal is compelled to engage in. For instance, some birds will raise the chicks of other birds if the eggs are put in their nests during nesting season, because caring for an egg is a fixed action pattern. Another instinctual behavior is imprinting, wherein a baby animal accepts a person, or even an item, as a surrogate mother. Sexual behavior is also instinctual, bolstered by play, which helps animals learn courtship and mating skills. Many of these behaviors are dictated by specific body systems, like the nervous system, which responds to stimuli in the environment. Learned behavior Learned behavior is important both for wild animals, who must learn specific and new ways to survive, and for domestic animals that we seek to train. Animals can learn to anticipate that an action will have a predictable outcome through trial and error, such as dog learning to sit for a treat. This is called operant conditioning. They can also learn that one event precedes another, such as the sound of a metal food bowl being moved signaling food being served, which is known as associative learning. Animals also learn a lot through watching others and mimicry. All of these behaviors allow an animal to adapt to new situations and problems. Abnormal behavior Identifying behavior patterns enables people to determine when animals are  behaving abnormally. These abnormal behaviors might simply be annoying to animal owners; however, in other instances they may also be dangerous for the animal and others or even threaten their very survival. For example, inappropriately aggressive dogs, which might be suffering from disease or trauma, are potentially dangerous to themselves and others. The behavior may be addressed if it is identified as abnormal and normal behavior is reestablished. More important to species survival are mating and raising offspring, and in these cases abnormal behavior that leads to failure to mate or care for offspring can present a threat to the animal’s long-term survival.

Thursday, August 29, 2019

Technology from print to pixel Essay Example | Topics and Well Written Essays - 250 words

Technology from print to pixel - Essay Example This reading from the screen and its effectiveness and visible results continues for the rest of the day until the time one will go to bed This new way of reading will definitely change the way people write. As the information flows and is streamed in the screens at a very quick speed, more people will start writing in prose and in other short forms as a way of saving time. This new form of writing will not be strange as translations of the words can be easily got from the same screens and because there is a lot of linking with the new technology in reading, it will not be strange at all. The writing unlike before will continue to increase and a faster pace for that matter as more and more people young and old engage in asking questions and getting written faster and even immediate response hence making them write even more as a way to gain faster knowledge and pass the same knowledge to others through the same

Wednesday, August 28, 2019

Corporate Reporting Essay Example | Topics and Well Written Essays - 1500 words

Corporate Reporting - Essay Example "Usually mergers occur in a consensual setting where executives from the target Company help those from the purchaser in a due diligence process to ensure that the deal is beneficial to both parties." (Wikipedia) Goodwill is defined as the present value of future earnings in excess of the normal return on net identifiable assets. According to the acquisition events it's defined as the excess of the cost of acquisition over a group's interest in the fair value of the identifiable assets and liabilities of a subsidiary, associate or jointly controlled entity at the date of acquisition. Goodwill is treated as an asset in the balance sheet of a company. The reduction in the goodwill needs to be calculated at annual basis and the decrease should be written off in the profit and loss account. Due to the replacement of IAS22 by the IFRS3 the treatment of goodwill changed to the defacement-only practice in January 2005. The US GAAP has the same treatment of Goodwill and defines it as the surplus acquisition price paid in addition to the fair value of the net identifiable assets. The change in treatment was first undertaken after the imposition of the SFAS142 which transformed the goodwill accounting from changed accounting for goodwill from a paying-off method to defacement-only method in July 1, 2001. As the standard was affecting international groups many of them preferred using US GAAP standards which could minimize the adverse effects of goodwill amortization and was beneficial for the groups The acquiring company should make sure that the value in excess to the fair value of the net assets should not be reduced and hence this difference should be treated as an asset that's not really identifiable. The standard addresses all the issues regarding the disclosure of the information regarding the acquisition and the management can play an important role in making the most of this information. It suggests that an effective business report must have More forward looking information Have more coverage of non-financial value creating information. Should align internal and external information. The model includes different components of business reporting, which are: 1) financial and non financial data regarding the acquisition 2) Management's analysis of financial and non-financial data. 3) Future forecasting information regarding the goodwill. 4) Shareholders and management related information. 5) Background information. 6) Proper disclosure of information 7) Proper information regarding each business segment. The model provides the shareholders and investors with the case of proper information regarding the securities in order to save them from being misallocated. IFRS3 puts more emphasis on stakeholders' relationship rather than on financial measures. Heavy reliance on financial measures has damaged most of the company's reputation. The financial performance does not represent the overall performance of the business. The position of the company in the market and the performance cannot be judge by only addressing the financial measures. The standard recommends that the role of the intangible assets is growing in determining the future performance of a company. The standard provides the solution in shape of focusing more on qualitative measures rather than

Tuesday, August 27, 2019

Research Paper proposal & annotated bibliography

Paper & annotated bibliography - Research Proposal Example I will carry out extensive literary analysis in order to discover the ideas that various authors front in their own discourses. Numerous authors and researchers have investigated the cultural manifestation and impacts of the war in the American society. I will therefore investigate and use three of the most cited works thereby drawing conclusion based on their ideologies of the authors. The three books include In discussing the history of the Vietnam War, Anderson explains the influence that such effects had on the American culture. The author explains the extensive use of radio among other media in enhancing the spread of the culture both in the United States and throughout the world. According to the book, the war led to systematic change of culture as captured by various media. The author draws his references from poetry, films, memoirs and journalism among others at the time. He explains that the works often conveyed three unique thematic features including home, wound and the voice. The three were significant in constructing the post war culture. American became increasingly patriotic with a heightening desire to protect their rights while developing comfortable, safe and secure homes for themselves. This validates the flamboyant experienced at the time as the society became conscious of the effects of war. The book provides an in-depth analysis of the cultural effects of the war and is therefore a vital resource in my research. Just as the title suggests, the encyclopedia provides an in-depth analysis of the cultural effects of the Vietnam War in the United States. As such, the encyclopedia is a phenomenal piece that discusses the importance of the war not only to the American culture but to the global culture as well. The authors assert that the United States is a major economy, one that influences the cultural developments globally. As such, the country enhanced the

Monday, August 26, 2019

UAE Courts and Law Assignment Example | Topics and Well Written Essays - 1750 words

UAE Courts and Law - Assignment Example The judiciary of UAE is constitutionally independent that also includes the Federal Supreme Court. Ras- al Khaimah and Dubai are not the part of the Federal judiciary of UAE. There is a separate Islamic and Secular law for the criminal court, high court and civil courts. The court system of UAE comprises of civil and Sharia Courts. The testimony of a woman is considered half valuable as that of a man in criminal cases. There is an exclusive jurisdiction present in the courts of Sharia to hear the disputes of families, including cases such as the custody of a child, divorce, guardianship, inheritance and child abuse. Sharia courts that are present only at the federal level listen to the appeals of criminal cases such as certain criminal cases, robbery, driving while drunk and rape. Civil Law Case The Civil Case of UAE against the 17 bootleg killers The reconciliation committee sent this case to the court for both the parties failed to make the decision and reach a single conclusion re garding the claim that was filed by the murdered man’s brother named Misri Khan. He also claimed that he was seriously injured in the fight take took the life of his brother. Thamer Hassan, the lawyer of Misri Khan said in an interview that the judge has approved that their case should be transferred to the civil court. He further added that his client has suffered from serious injury and had nearly 70 percent of disability. The claim registered by Misri Khan had been reduced from DH 1million to DH 500, 000; although the day of the hearing has not yet been decided by the court. The lawyer of the 17 men also recorded his comments by saying that the court was sent to the federal court only because Misri Khan did not settled the claim out of the court. About DH 3.4 million were paid by the killers to the family of the murdered man in order to settle the claim. This money was also paid by the killer to the family of the murdered man and the victim (Misri Khan) in exchange of pard on and as blood money. The death sentences of the murderers have been computed by the court but the prosecutor has successfully registered an appeal against this verdict of the court. The murders have also been facing another suit that has been filed by Misri Khan, who claimed that he has been seriously injured during the brawl (Kannan). This is a civil case that was filed by Misri Khan who was the brother of the murdered man and the victim as well. The hearing of the case is still on pending but the killers of Misri Khan’s brother have been sentenced to death and they have also paid heavy compensation in exchange of pardon. This kind of case shows the supremacy of the civil rights in UAE. In this particular case the family of the victim not only received compensation but the killers were also sentenced to death. This highlights that how just is the Judiciary of UAE that works to provide justice to the citizens of their country. Shariat Law In UAE according to the Shariat Law a man has the right that he can discipline his children and wife as long as he does not leave any physical marks on their body. There was a case registered in October 2010, in which a man was found guilty for slapping and beating his wife and daughter. There were several bruise found on the hand and knee of the girl and severe injuries were present on the lower teeth and lip of the girl. The court claimed that the bruises and the injuries give evidence that the man has abused the Shariat rights of his wife and daughter. In the case of the man’s wife the law of Shariat has definitely been violated as the injuries resulted from the beating were severe whereas the age of the daughter was 23 and she was too old to be disciplined by

Sunday, August 25, 2019

Cities Development Essay Example | Topics and Well Written Essays - 2000 words

Cities Development - Essay Example 2(Mike Douglass, Kong-Chong ho, 2008). Civic spaces should be available for daily practices and other collaborative engagements of the society. Civil society must actively participate in governance and making it a livable civic society. The concept of civic spaces should be understood and analyzed in the context of urban politics and metropolitan governance. The civil spaces are not empty spaces. Civic spaces are basically an extension of the civil society. It is viewed as a stage for our public life if working properly. It is the place where celebrations are held and where the social, political and economic exchanges take place. The benefit of transforming a civic society into a great public place goes a long way. It enhances civic realm not only visually but it ensures healthy growth, provides a forum for interaction and gives foundation for enhancing the livability of the community. Without great public places great cities are not possible. There are strong linkages between civic society and the forces that shape urban politics and governance. Civil society is a very elusive phenomenon which depends on a number of internal and external forces and a wide array of inputs from different segments of the society with rising and diminishing importance in different parts of the city. Global Cities Global cities are responsible for structural conditions of urban change. There exits strong relationship between emerging social disparities in global cities and their impact on politics. These income inequalities, political injustices and power differentials have led to social movements in global cities. The most recent lived economic crises along with... This paper stresses that global cities are responsible for structural conditions of urban change. There exits strong relationship between emerging social disparities in global cities and their impact on politics. These income inequalities, political injustices and power differentials have led to social movements in global cities. The most recent lived economic crises along with the bundle of other social and cultural injustices have resulted in the rise of the civil society. This rise of civil society is prevalent in all the global cities throughout the world. The role of civil society based organizations has increased manifolds especially in the context of recent downsizing and retreat of government from service delivery. Civil society based organizations are acting as important economic and social stabilizers in the neoliberalized political economy. This report makes a conclusion that with ever increasing Globalization and capitalism still being the most dominant system I don’t see the landscape of consumption in the civil societies will undergo any major changes. Although as we have already discussed that in some advanced industrial countries the trend is movement towards rural areas in search of less crowded and serene environment. This trend is still negligible and the major and dominant trend is towards urbanization and the mushroom growth of shopping malls, theme malls and even whole commercial cities such as Dubai. I don’t see that in the current scenario cities have the potential of moving from landscape of consumption to landscape of production in the near future. Capitalism marked by consumerism will remain the trend in the near future.

Saturday, August 24, 2019

Managing customer and suppliers Assignment Example | Topics and Well Written Essays - 1500 words

Managing customer and suppliers - Assignment Example Place____________________________________________________________7 8. Item ____________________________________________________________7 9. Conclusion _______________________________________________________9 10. References ______________________________________________________10 Impact of the theory of six rights on the construction of the Aquatics Centre for Balfour Beatty Introduction The theory of the six rights clearly states the importance of supplying customer satisfaction by following six basic standards including timely delivery, quality and quantity assurance and price, place and item standardization. All suppliers, manufacturers and service providers try to follow these basic guidelines for success. Background The planning for the 2012 London Olympics have led to great amends and development in the London area and the transformation of the heart of East London by the development of the Olympics village. The total budget of 5254 million pounds was initially allocated for the Olympic Development Association (Sean Dodd, 2010)and Balfour Beatty, the large British infrastructure provider, won the contract for building the 17500 seater Aquatics centre. The company is an imminent infrastructure provider whose key aim is to continue reliable and responsible growth in shareholder value. (Beatty, 2008). Some of the most high profile projects of the company included Arsenal Emirates Stadium and the Terminal 5 of the Heathrow airport. For the aquatics centre, the key requirements of the Olympics had to be fulfilled within a certain time limit and a budget and the strict observation of both of them was essential. The project was to include different training and warming pools, adjustable spectator areas, changing areas and a cafe. Other requirements included the building to be sustainable with as little impact on the environment as well. This is besides the fact that the development and the functioning are expected to be extremely safe and family friendly. Thus di fferent user rights for satisfaction of the Olympians and spectators in particular and the public in general have to be fulfilled. Balfour Beatty has to ensure that these basic rights are not compromised on any occasion during construction and the following functioning. Following of these six rights is not only a stringent requirement of the contract providers but is also essential for the efficiency and increased productivity of Balfour Beatty. Time The time frame of the project is extremely crucial as it is no ordinary airport or building but an event centre being developed for a certain event. Thus it has to be ensured that the project is fully completed well before 2012 and the proposed deadline is 2011. (Balfour Beatty wins 2012 Aquatic centre, 2008). The time limit posed also tests Balfour Beatty's commitment to its projects as it measures its efficiency. The deadline of projection completion in 2011 also prevents any extra costs as late deliveries and late processing always s piral the cost of construction. Timely supply chain management, which is Balfour Beatty's trademark also reduces the cost by increasing the lead time while ordering and the just in time inventory assures that storage costs are further decreased. Thus the project time line if followed suitably will allow the project to be completed well within the proposed budget generating good revenues for the company. The most recent development showed that the Aquatics centre will be completed in 7 months which is almost a year ahead of the schedule.

Friday, August 23, 2019

Essay Example | Topics and Well Written Essays - 750 words - 84

Essay Example However, these sources ought to be in the references’ list and cited well in the text. This is because they are not original works of the experimenter but just backing his or her information to elaborate more about the phenomenon under study. The experiment ought to have a hypothesis, which in this case is specific, brief and giving independent variable as well as expected outcome in the depended variable. In most cases, this is only in form of a statement expounding the core relationship that characterizes the entire phenomenon. Its structure should be in such a way to catch attention of the reader by giving him or her aim of conducting this experiment. The report should also give detailed information concerning varied materials used in the study and followed procedure. Hence, highlighting how and when one carried out the entire experiment. This encompasses outlining used experimental design, equipments, procedure and mode of analyzing data. In addition, method and materials’ section addresses control measures that were essential throughout the entire procedure such that the reader can effectively understand the entire process. This is to the extent he or she can accurately repeat the method without making any errors that might occur due to misinformation or incorrectly set method. If it is possible, one can utilize diagrams or images of the already set apparatus with the intention of giving the reader view of how the experiment’s set up should appear incase it is very complex. This section also entails vivid description of all apparatus and any other equipments used throughout the entire procedure. In comparison with other sections, the most outstanding feature about this section is the use of both past and active tenses. Since information relayed in this section includes actions that have already taken place. Results’ section comprises of already tabulated outcomes of the experiment either in table form or just mere statements without

Macroeconomics Essay Example | Topics and Well Written Essays - 3000 words

Macroeconomics - Essay Example The level of GDP increased from trough to peak by around 10.2 percent between the year 1981 and 1988, which states that the recovery was strong after the recession. Also after the 1990’s recession there was a sharp increase in GDP growth level. However it is evident that there is a long recovery period after the 2008 global financial crises of UK’s economy. When compared the recovery from all recession periods, it is evident from Figure 2 from the case that recovery from 2008 recession has been protracted and has the deepest fall in GDP growth levels in the year of 2008 recession. The period of Great Moderation that lasted from 1993 to 2007 was faced with smooth growth, low unemployment and low inflation. During this period economy grew to around 5 percent until it was faced with recession in 2008. There are a number of factors that can be attributed to a fall in UK’s saving ratio between 1993 and 2008.It is visible from figure 15 from the case that saving ratio fell to lowest 1.7 percent by the end of 2007.The graph also denotes fall in saving ratio over the years 1993 to 2008. Interest rate in the UK’s economy was low from 1993 that further fell to 3 % in 2003 as seen from figure 12 from the case. This meant that credit was easily available to borrowers at a cheaper cost and savers were not ready to delay consumption and instead save for lower return on savings. Low interest rates and low inflation acted as a disincentive to save. At same time housing prices were rising, which leads to wealth affect and people were ready to borrow and spend more. This wealth effect made people more confident to spend as they knew that value of their property was rising. This is could be seen in figure 13 where there is a sharp rise in average UK housing prices from 1993 to 2007, more than tripling over the 15 year period (Tejvan, 2008). Easily available credit during this period had encouraged more

Thursday, August 22, 2019

The Pepsi Carbonated Soft Drink Consumer Demand Promotion Essay Example for Free

The Pepsi Carbonated Soft Drink Consumer Demand Promotion Essay A strategic plan for PepsiCo North America is hereby proposed as follows for the geographical region of the national United States for the Pepsi Soda Product promotion to consumers between the ages of 12 through 18 years of age. It will utilize a pull strategy through the distribution channels to stimulate demand for the Pepsi carbonated soft drink to the end users as defined to maintain Pepsi’s younger generation of consumers over the next two decades. The strategic plan will consist of a strategic alliance with The Walt Disney Company coupled with a pop star endorsement by Hannah Montana and Kanye West with multiple promotion communication channels and strategies over the next two (2) years. The primary competitor, Coca-Cola, has been entrenched in the North American beverage market and is most commonly consumed by older generations. As such, Pepsi has been typically been targeted to a younger audience. As the ‘Pepsi Generation’ ages, PepsiCo North America should take proactive marketing action into the younger audiences to maintain the younger generations of soft drink consumption for decades to come. The Company History and Related Companies 1 PepsiCo (herein referred to as the ‘Parent Company’) was founded in 1965 via the merger of two major corporations, Pepsi-Cola and Frito Lay. Subsequently in 1998, Tropicana was acquired to add the family of brands under PepsiCo. In 2001, the Parent Company made yet another bold step in the merger with The Quaker Oats Company, which also then included the Gatorade Company. Notwithstanding the Parent Company being relatively young, several of the brand names under the PepsiCo umbrella have been in existence for over 100 years. Through the multiple brand acquisitions and developments PepsiCo is now a leading conglomerate owning significant market control and brand equity in consumer convenience foods and beverages. â€Å"PepsiCo brands are available in nearly 200 countries and territories and generate sales at the retail level of about $92 billion† (PepsiCo, 2007). Sales volumes are measured on the retail level to show success of the manufacturing due to the Parent Company utilizing a pull strategy for its multiple divisions and product lines with a combination of a push strategy. The current headquarters are located in Purchase, New York. The multiple corporations within the PepsiCo Family are Frito-Lay North America, PepsiCo Beverages North America, PepsiCo International, and Quaker Foods North America. Frito-Lay North America markets and sells to the subject geographical regions the following well known brands of convenience foods: Fritos, Lays, Cheetos, Ruffles, Doritos, Rold Gold, Tostitos, Sunchips, Munchies, Crackerjack, Go Snacks, Quaker Fruit and Oatmeal Bars, Quakers Corn and Rice Snacks, and even more. While Frito-Lay North America sells to business, its end user is a consumer who has demand for a snack food, or convenience food. These are typically found in grocery stores, gas stations, small markets, vending machines, public schools, and several other distribution channels. Several of these products are facing new market changes including a health conscious consumer movement. Thus, a great diversification of product lines within the PepsiCo Family is The Quaker Oats Company, merged in 2001, just on the cusp of the health conscious movement. Brands include Quaker Oats products, Aunt Jemima products, and Rice-a-Roni products. The Gatorade brand rights are legally owned by this Corporation, yet it is sold and marketed through PepsiCo Beverages North America. PepsiCo International markets and sells the North American product brands abroad, and in additional markets and sells the Mirinda, Walkers, Sabritas, Gamesa, etc. and several others in multiple countries (over 200). Each of these subsets of brands are developments of unique products tailored to each geographical culture it is marketed to. The focused Corporation of the subject strategic proposal is PepsiCo Beverages North America. This company was originally founded in 1898 by a North Carolina druggist. PepsiCo Beverages North America (herein referred to as the ‘Company’) sells several brands of consumer beverages in the United States and Canada. The various beverage products span through carbonated soft drinks, juices, readymade teas, isotonic sports drinks, bottled water, and enhanced waters. Several established brands include Diet Pepsi, Mountain Dew, Gatorade, Tropicana products, Aquafina Water, Sierra Mist, Mug, Propel, Sobe, and Dole. Refer to the Competitor Analysis section for in depth product information and listings. Outside of manufacturing and selling bottled products, the Company manufactures and sells concentrates for some of the above mentioned brand name beverage products to licensed bottlers. The Company has also established strategic partnerships with Lipton and Starbucks to create, market, and sell ready to drink Lipton tea brands and bottled ready to drink Starbucks Frappuccino drinks. These are two very powerful example of a co-branding strategic partnership. Industry Analysis of the Beverages Market 4. Soft drinks can be divided into carbonated and non-carbonated drinks. Cola, lemon and oranges are carbonated drinks category. The carbonated soft drink market has been challenged by a health consciousness movement within American consumers. Health consciousness is a very strong growing trend in America, and has created an organic movement within the drink and food industries. Within the last five years ending in 2006, the soft drink market in the United States has experienced 0. 0% growth due to this factor. Since 1975 the overall growth rate of soft drink market has been slowing. (Figure_1) As this provides a constraint on new market opportunities, it does not constrict maintaining a similar level of revenue or slightly improving it. As the current consumer market continues to age, it is expected there exists a certain level of retention to Pepsi consumption until a specific age when it is recommended by a doctor not to consume a soft drink. Given Pepsi’s position in terms of product placement within demographics, it holds the youth market when compared with Coke. As growth slows, the youth markets must continually be targeted to maintain the consumption level of Pepsi as new consumers enter the market of soft drink consumption, and other age out of it. This strategy will over a long period of time prove to gain market share of domestic soft drink consumption over Coke, while being offset by a slowing of the overall consumption. Figure 1 [pic][pic] The subject proposal is targeted to use a pull strategy through the distribution channels, and is therefore focused on the end user, or consumer segment of the market. Notwithstanding, the industry overall (primarily Pepsi and Coke as outlined herein below) does not only sell directly to consumers. A very prevalent distribution channel is through licensed bottlers and restaurant chains. A very strong business to business transactional distribution channel exists in the soft drink industry, and in fact 22. 6% of all soft drink volumes are sold in a syrup for fountain soda. This is 100% business to business within the scope of these transactions. The remaining 77. 4% of packaged soft drink volume comprises primarily of business to business transactions to retailer and bottling companies. (Figure_2) While PepsiCo Beverages North America does not directly sell to consumers primarily, the subject proposal will stimulate demand for the product at the end user level, and therefore result in more business to business sales in order to meet that demand. PepsiCo Inc. and Coke-cola Co. have dominated the carbonated soft drink industry in North America since they first entered this market. They continue to compete with each other for market share for centuries. Therefore, some experts conclude that the soft drink market is an oligopoly or even a duopoly between Pepsi and Coke. 5 By the year of 2006, PepsiCo has the leading share (26%) of U. S. liquid refreshment beverage market, followed by Coca-Cola which has taken 23% of market share as indicated in the left chart. Cadbury Schweppes, another big rival on the bottled soft drink shelves, obtained 10% by acquiring key brands in the US, namely Dr. Pepper, Seven Up, and Canada Dry. SWOT Analysis |Strength |Weakness | |Branding and packaging |Hard to enter markets occupied by Coca-Cola | |Appealing to young generation |Lack of novelty in advertising | |Superior Taste (in Blind Tests) | | |Many distributions | | |Opportunities |Threats | |Global markets |Health Conscious Consumer Trends | |Additional Youth Consumers entering the market |More substitutes | â€Å"Manifesting brand essence through packaging is powerful at retail,† declares Ron Pence, Pepsi Senior Marketing Manager for packaging innovation. Youth and vitality is the main idea that the Pepsi brand tries to express, and the bottle design helps the brand associate with teens at the age between 12 to 18 year old. Pepsi restyles its cans with a series of 35 new designs and different themes such as car culture, sport or fashion. On Pepsi website, each theme has its own video clips which can be downloaded for free and other features to attract consumers with the purpose of representing the â€Å"fun, optimistic and youthful spirit â€Å"of Pepsi. The natural tendency of young generation is to rival with old generations. Pepsi also use â€Å"music, which was traditional weapon of teenager to show their rebellion approach†. 7 Besides, a blind test conducted by Pepsi was performed in shopping malls, grocery stores and other public locations, in which consumers were asked to pick the soft drink they liked better, without knowing whether the cola they tasted was Coke or Pepsi. As results came in, 57% of testers chose Pepsi and only 43% chose Coke. It became apparent that Pepsi tastes better than Coke. 14 In addition, Pepsi products are distributed to many outlets. For example, supermarkets where Pepsi buys large shelf area and display areas so the customer can find them easier, Convenience stores, gas stations, restaurants, movie theaters and almost and other conceivable spot. Pepsi is now sold in more than 160 countries around the globe, but it still has a weakness in the international beverage market because it entered later into this arena than Coke. Pepsi has tried to enter this market by trying to do in three years what took Coke 50 years to do. Nevertheless, Pepsi has to spend years â€Å"to mature simply due to Coke’s dominance in the international market and the strong ties that Coke has developed with these markets and their governments. †15 Additionally, when marketing its products, Pepsi utilize celebrity endorsement mostly which bored some consumers due to lack of novelty. Conversely, the success of fresh and creative advertise has consistently helped Coco-Cola attract and retain customers. The world is becoming a smaller place with investors thinking in terms of sectors rather than geographic boundaries. Broad global markets, like China, India, can provide lots of opportunities for Pepsi. We may conclude from the tables on the right that in 2004, 63% PepsiCo’s profits come from the United States 8, and in the same year, the U. S. holds 30. 90% of the global market share under Europe (showed in the table below), which means Pepsi still has opportunities to compete globally. Moreover, as Pepsi targets young generation, additional youth consumers enter the market every year, which provides Pepsi adequate consumer base. For these decades, changing societal concerns, attitudes, and lifestyles become important trends that force the soft drink industry’s business environment to change. Growing health concerns for caffeine and sugar consumption threatens the carbonated industry. The large amounts of sugar, fat, and acid contained in cola will lead to heart disease, vascular diseases, osteoporosis or tooth decay. On the other hand, many other companies have tried to enter the carbonated industry, but they face high barriers, such as lawsuits and tough competition. Some of these companies end with searching for entering the noncarbonated soft drink industry for growth. Consequently, some consumers will turn to noncarbonated soft drink, such as bottled water, teas, instead of soda. Environmental scan of today’s carbonated beverage marketplace A quick glance at today’s beverage marketplace indicates an increasing amount of beverage alternatives in the market. As such, these beverage companies must understand the various factors that can help them succeed or fail. For instance, the increased awareness of the importance of health has significant influence on soft drink industry. Since most soft beverages comprises of unhealthy ingredients including High Fructose Corn Syrup, the beverage industry faces an incredible threat to their reputation and sales. Therefore, developing consumer-preferred products that can become an integral element in consumers’ daily lives has become an essential issue for beverage industry. Possible environmental factors are as follows:  ¦ Social environment ? In 2004, 28 percent of all beverages consumed in the U. S. were carbonated soft drinks. In the United States, 450 different types are sold and more than 2. 5 million vending machines dispense them around the clock, including in elementary and high schools. ? As consumers focus more on health and nutritional benefits of food items, it has sparked a key new driver in trends throughout the beverage industry. The result is the decrease in sales of carbonated beverages.  ¦ Competitive environment ? Monopolistic competition: PepsiCo. , The Coca-Cola Company, Cadbury Schweppes ? The entire beverage industry, including but not limited to bottled water, juice, other carbonated beverages, and ready-to-drink tea. ? Recent growth and demand of sports and energy drinks.  ¦ Regulatory environment ? In response to weight gaining and health concerns, the nation’s largest beverage makers including Cadbury Schweppes, PepsiCo. and The Coca-Cola Company agreed in May 2006 to halt nearly all soda sales in public schools. Beginning in 2009, elementary and middle schools will sell only water and juice (with no added sweeteners), plus fat-free and low-fat milk. High schools will sell water, juice, sports drinks and diet soda. Diet sodas use artificial sweeteners, which add little or no calories, though some, such as aspartame, have been embroiled in controversy for years over their questionable health benefits and even possible links to cancer. Obviously, Pepsi is facing not only the transition of customer perception but also the regulation stress. Besides, it always has it big and powerful competitor, The Coca-Cola Company. Under this circumstance, strategy and innovation become the top issue of Pepsi. 16 Competitor Analysis The table below displays the various brands between PepsiCo. and The Coca-Cola Company. It appears that for every product on the market from one company, the other company has an similar product to match it. This demonstrates the intense compeititve nature of both companies to keep up or outwit the competition. [pic] Differential Advantage The Coca-Cola Company has the distinct advantage of being the most recoginzed brand in the world. It is considered the classic beverage in the United States as well as in other countires. In fact, when Coca-Cola decided to change its forumula dubed â€Å"New Coke† in response to Pepsi’s emergence, public outraged roared throughout the nation. Fearing mass boycott, the original Coke formula was quickly reinstated to satisfy the demands of the public under the name â€Å"Coca-Cola Classic†. Revered as the classic beverage, Coke enjoys the stature of being the market leader. Coke appeals to a wide global audience in terms of demographics and popularity. One side effect of being the â€Å"classic† choice leads to a larger share of older consumers. PepsiCo. appeals to younger consumers with a more sweeter taste compared to Coke. Pepsi presents itself as the hip and cool alternative choice over Coke. This is edvient in the deep blue hues and patterns that Pepsi takes advantage of in its marketing compaigns. Pepsi’s younger image is also aided by celebrities endorsement touted by the teen market including Britney Spears, ‘NSync, along with popular rappers. Self-proclaimed as â€Å"The Choice of a New Generation†, Pepsi devised television commericials of younger consumers participating in blind taste tests. The participants frequently perferred Pepsi over Coke. Eventually, PepsiCo. began hiring popular celebraties to promote their products. Resource Analysis The Coca-Cola Company The Coca-Cola Company’s flagship product, Coke, is sold in stores, restaurants and vending machines in more than 200 countries. Originally developed as a medicine in the late 19th centry by John Pemberton, it has evolved into a dominating figure in the soft drink market throughout the 20th century. The Coca-Cola Company licenses worldwide bottlers who hold territorially exclusive contracts with the company. Cola cncentrate is sold to these bottlers who them produce the finished cola in cans and glass bottles while using filtered water and various sweeteners. The finished product is then sold, distributed, and merchandised to retail stores and vending machines. Coca-Cola Enterprises is currently the single largest Coca-Cola bottler in North America, Australia, Asia, and Europe. In addition to licensing to bottlers, the company sells the concentrate to major restaurants and food service distributors for use in fountain drinks. The Coca-Cola Company envision a world in which†¦ They improve the lives in every community that they touch. They replenish each drop of water that they use. Their packaging is no longer seen as waste, but as a valuable resource for future use. Workplace rights are protected and all people are respected. They work in partnership with others to provide good jobs, world class quality beverages and a healthy environment. PepsiCo The Pepsi Cola Company started in 1898 in Purchase, New York. It became known as PepsiCo when it merged with Frito Lay in 1965. PepsiCo owned Kentucky Fried Chicken, Pizza Hut, and Taco Bell up until 1997 when they were spun off into Tricon Global Restaurants – which eventually became Yum! Brands, Inc. In 1998 and 2001, PepsiCo purchased Tropicana and Quaker Oats, respectively. PepsiCo, a global American beverage and snack company, manufactures, markets, and sells a variety of carbonated and non-carbonated beverages, as well as salty, sweet and grain-based snacks, and other foods. PepsiCo also manufactures Quaker Oats, Gatorade, Frito-Lay, SoBe, and Tropicana. (Figure_3) In several ways, PepsiCo differs from its competitor, The Coca-Cola Company, having almost three times as many employees. The Pepsi Bottling Group was formed for distribution and bottling. Figure 3 [pic] Mission Statement: We aspire to make PepsiCo the world’s premier consumer products company, focused on convenient foods and beverages. We seek to produce healthy financial rewards to investors as we provide opportunities for growth and enrichment to our employees, our business partners and the communities in which we operate. And in everything we do, we strive to act with honesty, openness, fairness and integrity. Values: Sustained Growth is fundamental to motivating and measuring our success. Our quest for sustained growth stimulates innovation, places a value on results, and helps us understand whether actions today will contribute to our future. It is about growth of people and company performance. It prioritizes making a difference and getting things done. Empowered People means we have the freedom to act and think in ways that we feel will get the job done, while being consistent with the processes that ensure proper governance and being mindful of the rest of the company’s needs. Responsibility and Trust form the foundation for healthy growth. It’s about earning the confidence that other people place in us as individuals and as a company. Our responsibility means we take personal and corporate ownership for all we do, to be good stewards of the resources entrusted to us. We build trust between ourselves and others by walking the talk and being committed to succeeding together. [pic] [pic][pic] Based on the pie chart above, PepsiCo and Coca-Cola have roughly the same market share in the United States. Finacial Analysis Brief Overview [pic] Overall, PepsiCo trumps The Coca-Cola Company in many financial categories – largly in part from PepsiCo’s wide array of products throughout 4 divisions: ? PepsiCo International ? Frito-Lay North America ? PepsiCo Beverages North America ? Quaker Foods North America Egg Diagram [pic] Analysis of the Target Market Consumers 3 |Who are they? |Teenagers between age of 12 and 18 in U. S. | |What do they buy? |Teens want to buy something real, something from â€Å"corporations | | |that remind them of themselves†10. They don’t want things that | | |they are thought to like. They something that pushes the | | |boundary, different than what they had before. | |When do they buy it? |When teens find something they can identify with and have the | | |need that must be satisfied immediately. | |How do they choose? |They quickly dismiss the products that look like some 45-year-old| | |guy trying to sell them something. They easily recognize the old | | |product that was yesterday’s news. They can tell what’s being | | |â€Å"fake† and what’s being â€Å"real†10 | |Why they prefer a product? |They pick a product because they believe that product can express| | |themselves13. They can relate to someone like themselves through | | |this product. | |How they respond to a marketing program? |They respond to something catchy. For example those ads in | | |magazine are brightly colorful10, the flashy graphics suggest | | |that teens respond well to that type of ad campaign; in | | |cyberspace they respond to a space created uniquely for them12. | | |They also respond well to products on sales. | The target consumer market to stimulate demand within is the young teen market between the ages 12 through 18 years old, geographically located within the United States. This segment is compiled of the â€Å"Tween† market and the older high school teenagers. â€Å"Tweens develop sophisticated tastes beyond their years, with boys gravitating toward electronic, Internet, and video games, and girls preferring fashion and social interaction components† (Abernathy, 2004). With the technology age with computers and increasing demanding academic environment, tweens and teens have less disposable time, and therefore product advertising attention is often tuned out. â€Å"Tweens spend their own money today: on average, $9 a week. Some experts estimate tweens have close to $80 a week in disposable income available to them†¦ Overall, the tween market is valued at $43 billion† (Abernathy, 2004). Beyond the tween market, the teenage high school student will sometimes hold a part time job, and have more independent tendencies. All in all, the 2000 U. S. Census estimates the U. S. population between the ages of 10 through 19 years old to be approximately 40. 6 million individuals. The goal of researching the target consumer is to accurately pinpoint the consumer behavior in regards to our product. According to our finding, these teens and â€Å"Tweens† are constantly searching for identities at their age. The most effective way of appealing our product to them is to find a common ground. For example, there are various reasons why teens and â€Å"Tweens† idolize certain celebrity. One of them is that they can find bit and pieces of themselves in their celebrity idol. After all, who doesn’t like to see himself/herself being a celebrity? So no matter what the product is, as long as it possesses characteristic of the identity the teens and â€Å"Tweens† are searching for, they will make the purchase. The teens and â€Å"Tweens† are still very young. They have very vivid imagination and are highly visual. Therefore they are attracted to colorful pictures in the magazines. It is usual for them to just look at the pretty pictures in the magazine without reading the articles that supplement pictures. According to the finding, these target consumers prefer products that are â€Å"real†. By â€Å"real† they mean the manufacture genuinely create this product specifically for them, at least it should appears to be. Since Pepsi Cola is basically for everyone, making it appears to be special to teens and â€Å"tweens† are very important. These consumers prefer individuality. Such preference is reflected in the finding that they are constantly in search for a product that expresses themselves. The last thing these consumers wants is pressure or stereotype that sometimes appears on the commercial and magazine ads. Strategic Action Plan. The strategic alliance with Walt Disney will initially consist of (i) concert support of and promotions at several of Hannah Montana’s concerts throughout the United States, (ii) Pepsi promotion via seamless advertisement within the Hannah Montana aired shows by having characters refresh themselves with Pepsi and also have Pepsi signs in the background, and (iii) a sparingly aired Pepsi commercial endorsed by Hannah Montana to be promoted via the ABC channel network (a Disney owned network). A future alliance holds the possibility of future benefits through Disney media networks and consumption at theme parks and resorts. The concert support will come with signs at the live shows and events, Pepsi sales at the concerts, and Pepsi commercial promotions on the concert screens at intermission. There will also be a special promotional event of Pepsi Challenge tasting at the Pepsi center, which was previously near sell out for Hannah Montana. The seamless advertisement on the Hannah Montana show will consist of the characters drinking Pepsi as refreshment in a natural environment along with Pepsi signs in the background of the sets. This will continue for two (2) years during the strategic partnership, and be maintained on a very subtle level in the productions. Twice a year over the two (2) year period ABC (A Disney owned network) will air a Pepsi commercial of a music video of Hannah Montana singing the Pepsi Theme song. As part of the strategic alliance, Disney is giving a low market rate for airing over the network. ABC has been topping the charts with hit series and has been expanding viewer base considerably over the past decade. The Denver Post summarized the market impact this pop idol holds as: â€Å"When an episode of Hannah Montana followed the debut of High School Musical 2 this fall, the movie sequel got all the buzz, but the episode of Hannah Montana averaged 10. 7 million viewers the highest ratings for a regular series in the history of basic cable. The Disney Channels 90 million subscribers can watch Hannah Montana daily, sometimes as often as seven times a day. An average 2. 2 million viewers see each episode. The show also airs weekly on ABCs Saturday morning block, and is licensed in 177 countries. Of course HM is available around the clock as streaming video on computers and on iTunes. Compared to the ratings of all shows on U. S. television, Hannah Montana is second only to American Idol among kids 6-11 and tweens† 2 (Ostrow, 2007). Utilizing Walt Disney’s ‘tween’ star Hannah Montana for endorsement will provide awareness and positive associations with the Pepsi brand of carbonated soft drink. This pop star idle will build significant brand equity within the demographics of young females between the applicable ages of 12 through 15 years old. This will predictably improve vending machine sales at middle schools and high schools, as well as sales at grocery stores for their respective homes. It will also build repertoire with the respective mothers who also attend the concerts and watch the shows. The mothers of the daughters are in fact the ultimate purchasers (and also partially the ultimate consumers in some cases) of the product, while their daughters are the influencers and ultimate consumers. The daughters of families will typically have a greater influence over the parents as purchasers in American families more so than comparable aged boys. This is primarily due to the value system of the parents to typically spend more attention and money on the daughters of the family, as young females are seen to need more care. This depicts why Hannah Montana is a highly effective endorsement for Pepsi within this demographic. This strategic relationship with Walt Disney will provide the future potential for a stronger partnership with Walt Disney, thereby opening the possibility of Pepsi consumption within the theme parks and resorts, while opening a powerful media network to younger audiences for future promotion channels. Kanye West will build brand equity in the male teen market between the applicable ages of 14 through 18 years old. A male target of the upper teen years is deemed more effective, due to males in their teens practicing habits of independence and having allowances for spending. His aired TV commercial will be on ABC similar to Hannah Montana, however it will be aired three times a year over the two (2) year period. The commercial content will be his version of a Pepsi theme. Works Cited 1 Overview: Company History (2007). PepsiCo Corporate Website. Retrieved October 28, 2007 from http://www. pepsico. com/PEP_Company/Overview/index. cfm. 2 Ostrow, Joanne (Oct. 19, 2007). ‘Disney Wields Its Marketing Magic. ’ Denver Post. Retrieved October 29, 2007 from http://www. commercialfreechildhood. org/news/disneyweilds. htm. 3 Abernathy, R. W. (November, 2004). Tween Market 101. TD Monthly. Retrieved October 29, 2007 from http://www. toydirectory. com/monthly/article. asp? id=918. 4 The Beverage Marketing Corporation (August, 2007). 2007 Carbonated Soft Drinks in the U. S. Retrieved October 29, 2007 from http://www. beveragemarketing. com/reportcatalog3f. html. 5 Industry Analysis: Soft Drinks. Meghan Deichert, Meghan Ellenbecker, Emily Klehr, Leslie Pesarchick, Kelly Ziegler. Strategic Management in a Global Context February 22, 2006 from https://www. csbsju. edu/library/local/5thYear/zeigler_paper. pdf 6 PepsiCo. Performance with Purpose (2006). PepsiCo Corporate Website. From http://www. pepsico. com/PEP_Investors/AnnualReports/06/PepsiCo2006Annual. pdf 7 Kumar, Arvind. Finding weakness in the competitor strength. From http://business. articlesarchive. net/finding-weakness-in-the-competitor-strength. html 8 Murray, Barbara. (2006b). Pepsi Co. Hoovers. Retrieved February 13, 2006, from http://premium. hoovers. com/subscribe/co/profile. xhtml? ID=11166 9 Datamonitor (2005, May). Global Soft Drinks: Industry Profile. New York. Reference Code: 0199-0802. 10 http://www. inc. com/magazine/20001201/21117_pagen_3. html 11http://www. clickz. com/3334641 12www.ala. org/ala/pla/plaevents/nationalconf/program/thursdayprograms/mrbibliography. doc 13 www. marketingprofs. com/2/kewl. asp 14 Sampson Lee (Nov 21, 2007). Coke or Pepsi? From http://www. gccrm. com/eng/content_details. jsp? contentid=2073subjectid=101 15 Pepsi cola from http://www. freeessays. cc/db/11/bmu315. shtml 16 Larry West, What is the Problem with Soft Drinks? About. Com website, from http://environment. about. com/od/health/a/soft_drinks. htm |Team 5 | |Chen, Szuhua (Twiggy) | |Xiong, Xitao (Helen) | |Ma, Johnny | |Tsang, Man | |Dwyer, Michael | Figure_2.

Wednesday, August 21, 2019

Design Of Wifi Based Tdma Protocol Information Technology Essay

Design Of Wifi Based Tdma Protocol Information Technology Essay Time division multiple access is a multiple access method for shared the channel by dividing the signal into different time slots. TDMA is successful works in cellular mobile communication for several years ago. Recently has been combined with OFDM to introduce OFDMA. TDMA also ensure fairness between nodes in the network. In vehicular scenario, we proposed TDMA protocol to work with CSMA/CA to mitigate and cope with some of the challenges in vehicular communications. In this chapter we will discuss the design of the protocol, connection messages, protocol flow and cross intercommunication between the new TDMA sublayer with CSMA/CA and PHY layers. In section 3.2 a general explanation of proposed TDMA protocol, the design of Wi-Fi-based 802.11p is discussed in Section 3.3. In Section 3.4, implementations of TDMA protocol in the simulation environment is presented. Simulation problems and implementation improvements is discussed in Section 3.5. The chapter summarization is given in Sec tion 3.6. 4.2. EXPLANATIONS OF TDMA PROTOCOL The TDMA protocol is representing as a provider client protocol, which means the protocol is centralized. The other possibility is to define a distributed or an ad hoc protocol as it is done in (Fan Yu, 2007) and (Katrin, 2009). We mean by centralized that the provider will be the only one handles the information that has given in both channels. This does not mean that all communication is going to be only unidirectional (from the provider to the client), but sometimes is going to be bidirectional communication. The provider in our case here is the RSU (Road Side Unit) and the client/station is OBUs (Onboard Units). Form now we may always use the term RSU to provider or centralized node and the OBU to client or mobile station. Here we need to implement frame of 10 ms, those frame consist of two main time slots, one of them for the control and the second one for the service or data channel, and both are using different duration. Why we chose value of 10 ms because this is currently used in many TDMA implementations i.e. WIMAX. 4.3. DESIGN OF WI-FI BASED TDMA PROTOCOL IEEE802.11 has two modes DCF and PCF. Distributed Coordination Function (DCF) relies on CSMA/CA distributed algorithm and an optional virtual carrier sense using RTS and CTS control frames (IEEE Std 802.11, 1999). If the channel is busy during the DIFS (DCF Interframe Space) interval, the station defers its transmission. Point Coordination Function (PCF) is used for infrastructure mode, which provides contention-free frame transfer for processing time-critical information transfers (W. Wang, 2003). PCF is optional in the standard and only few vendors implemented it in their adapters. Two different periods defined at PCF mode: contention-free period (CFP) and contention Period (CP). CFP uses contention free-poll frames to give stations the permission to transmit. However, PCF has many drawbacks and limitations in long distance applications (i.e. up to tens of kilometers) this due to sensitivity of the acknowledgement (ACK) messages to propagation delay which is designed for contention -free local area networks purposes. Also, once a station reserves the access to the medium, it may occupy the medium for long time without any station can interrupt its transmissions even in the high priority traffics case; i.e. if the remote station has lower data rate due to the distance, then it will take long time to release the channel (Pravin, 2003). Consequently, it has been shown that (S. Sharma, 2002) (Sridhar, 2006) TDMA based MAC is suitable for long distance propagation delay. Most of the implemented solution for long distance Wi-Fi-based network was used WiMAX like TDMA frame for conducting the PMP scenario. However, using WiMAX/TDMA above Wi-Fi is increasing the system complexity and overhead since the WiMAX/TDMA has been built for the licensed-based and Wi-Fi is built with unlicensed environment. In this research a design of TDMA over the 802.11 is presented. The function of the proposed TDMA is to disable the contention behavior of 802.11 (CSMA/CA) for contention-less MAC. In this research a new cross layer design is introduced between CSMA/CA and new logical TDMA layer, which the Wi-Fi MAC frame is encapsulated in a logical TDMA header before forwarded to IP layer. The proposed protocol stack is shown in Figure4.1. The CSMA/CA peer-to-peer protocol is disabled and replaced with TDMA peer-to-peer protocol as shown with the dot-lines. Figure.4.1. Protocol flow of the TDMA-based PMP The logical TDMA header is added between IP header and MAC header. The function of the new header is to disable the random access feature of the CSMA/CA in 802.11 and replace it by logical TDMA function, which is maintains the synchronization of the local timers in the stations and delivers protocol related parameters. The frame is shown in Figure 4.2. The proposed TDMA header contains BCCH (broadcast control channel), FCCH (frame control channel) and RA (random access). BCCH: contains general information i.e. timestamp through time_stamp_update(), SSID, BS-node capabilities and random access time interval ra_interval(). All this parameters (except the RA time interval) is prepared and copied from the beacon frame (using beacon_content()) from the Wi-Fi MAC device driver. The BCCH information helps the APs in the sleep, wakeup, transmitting and receiving times. Figure.4.2. Additional TDMA header is added to Wi-Fi frame FCCH: carries the information about the structure and format of the ongoing frame i.e. scheduler () and time_slot_builder(); containing the exact position of all slots and Tx/Rx times and guard time between them and scheduling. RACH: contains a number of random access channels (RCH). This field is uses when no schedule has been assigned to the APs in the UL fields. Non-associated APs use RA for the first contact with an AP using slot_time_request(). The flow diagram of logical control and data channels is shown in Figure 4.3. Figure 4.3: the flow of the virtual channels for the TDMA frame, First, the RACH frame is receiving if there any connection request from APs to BS. Then, BCCH, FCCH and AGCH broadcast their information, then transmit and receive users payload. Timer is controlling all the transmitted and received signals. Although, the new TDMA header is introduced at the cost of the performance due to the overhead, however, in the long distance applications with point-to-multiple-point infrastructure scenarios usually the numbers of stations are not too high compared with end-user part. In our scenario we consider 4 remote access points and one central access point (BS-node). By implementing TDMA_module() each APs would assigned with time slot within the TDMA frame. TDMA also saves power because each STA only needs to wake-up during these time slots in each frame. If new node (AP) wants to join the network it listens to the BCCH frame to get the initial parameters from the BS-node. Then it uses the RA period to send time_slot_request() request to the BS-node to r equest for time slot. The BS-node uses the FCCH field to update the new scheduling table in scheduler(). The TDMA_module() assigns time slots for APs by taking copy of the NAV (network allocation vector) information (NAV_update()) from the Wi-Fi MAC layer and modifying it according to the schedule scheme. NAV is considered as virtual carrier sensing which is limits the need for contention-based physical carrier sensing. This is done by setting new back_off_counter() and NAV_new() in the TDMA_module() which indicates the amount of time that medium will be reserved for each time slots. The BS-node set the NAV value to the frame length time plus any other necessary messages to complete the current operation to make sure that no station (AP) will access the channel during the frame transmission. Other stations count down from the NAV to 0. When the NAV has nonzero value, the scheduler () send back to the Wi-Fi MAC that indication that the medium is busy; before the NAV reaches 0, the ba ck_off() and NAV_new() update the Wi-Fi MAC with the new NAV. The destination address (DA) and source address (SA) in the MAC frame header and in the SSID is modified according to the new NAV and RR scheduling information. Figure4.4 shows illustrate the flow of the process in cross-layer concept, which is consisting of three layers: TDMA source code, wireless driver and hardware abstraction layer (HAL). The cross layer is performed between wireless driver and the source code. HAL is different for each hardware platform. The procedure of this approach is also below: Core Module: Repoint the WiFi_MAC_SAP to TDMA_MAC Point the MAC-TDMA_SAP to IP TDMA_module() { //modify the NAV vector for virtual (fake) busy network busy If NAV() not_equal_to_zero then { //copy the NAV value to new place to use it for new AP Network_entry Copy CSMA/CA/NAV() to CSMA/CA/NAV_old() Copy TDMA()/NAV_new() to CSMA/CA/NAV() } If NAV()=0 then { // call NAV_update() TDMA/NAV_update() Set back-off counter() Send the NAV_new() to scheduler() } Scheduler(){ //using round robin queue scheme Round_robin() } //time_slot_builderà ¢Ã¢â€š ¬Ã‚ ¦ Time_slot_builder(){ random_access(){ // See if there are any time slot request If time_slot_request(){ Time_slot()++ } else traffic(); } } //add the new TDMA header // send the broadcast control channel (BCCH) bcch(){timestamp(); ra_interval; SSID;BS-node capability}; //for the RA using the same etiquettes used by contention period (CP) at the MAC level fcch() { slots_time_builder() Set frame_format(){ Slot_time_interval; } 4.3.1 TDMA Protocol Flowchart In Vehicular Environment The RSU sends the beacon frame periodically with the free slots available in the TDMA frame. The OBU scans for the RSU beacon. If more than one RSU respond, comparisons are made on their (received signal strength indicator) RSSIs and the best one is selected after which the order of merits are applied on the other RSUs as first, second, etc candidates according to their RSSI signal strength. The OBU uses the beacon to synchronize its frame with the RSU after which the OBU sends the data in the free slots (in the coming uplink frame). A check is performed to find if the RSSI Figure.4.4. Implementation and incorporating TDMA in 802.11p protocol stack. OBU scan for the RSUs Beacon frame More than one Beacon frame Are received No Compare the different RSSIs and select the best and > threshold Yes Synchronization and clock Exchange with RSU Send data in the free slots In the UL sub-frame RSSI No Yes Figure4.5 TDMA Protocol Flowchart The TDMA frame structure is shown in Figure4. 3. The TDMA frame encapsulates the 802.11 frames in the payload subsection. The frame is repeated periodically for every 20msec (which is the length of the frame). Each frame contains the beacon filed, i.e. the broadcast control channel (BCCH) which comprises timestamp, SSID, and BS-node capabilities. The frame also contains the frame control channels which carries information on the structure and format of the ongoing frame, i.e. the slots scheduler which contains the exact position of all the slots and the Tx/Rx times and guard times. The GACH and the RACH are used for random access channel when the OBU needs to join the WBSS. The RACH is the channel that the OBUs use for association request. The GACH is the grant access channel that contains all the OBUs accepted for transmission in the next frame. The TDMA is using transmission opportunities (TXOPs) mechanism originally provided by the IEEE 802.11e to calculate the DL and UL time slots duration. The TXOP is a predefined start time and a maximum duration for the station to access the medium. A RSU will set its own NAV to prevent its transmission during a TXOP that has been granted through the OBU (Figure4. 6). Rather than categorizing the data traffic based on the voice, the data and the video as in the 802.11e, the data traffic priority categories are based on the OBUs channel quality. The RSU gives high priority to vehicles with high speed to send more frames before it leaves the WBSS. The vehicle with the high channel fading will get more number of slots. Of course, this mechanism will introduce performance anomaly, however, we can use any of the solutions available in the literature for the performance anomaly (Tavanti, 2007) (IEEE P802.11p/D3.0,2007). DCD feedback TDMA DCF EDCA PMD and PLCP Figure4.6 Channel fading parameters feedback for vehicles transmission priority and TXOP setting. 4.4. IMPLEMENTATIONS OF TDMA PROTOCOL IN THE SIMULATION ENVIRONMENT In the previous section, we theoretically describe the main characteristics of the protocol which we want to design. This section explains how we implemented the ideas of this thesis by the modification Code of C++ in the Network Simulation. Although the protocol that we want to design is basically a protocol of MAC, we have to put in mind that is not only changes to be made in the MAC layer will be done. We will also have to deal with the physical and application layer. From the point of view of the provider of MAC layer is the one which is responsible to handle the various types of packages (from service and control channel). In fact, the MAC layer in the side of the provider is the one which carries the multiplexing of TDMA between the two channels (and also between various services to the interior of the channel of the service). The application, in this case, will produce the packages which will be presented in each channel. From the point of view of the client layers, MAC and application are simple. The MAC layer basically responsible; to send to application the packages which the client wants to receive (packages which belong to the channel or from desire service) or throwing the packages that not requested by the client (packets from a broadcast or unicast service the client is not interested in). The application layer will be the one that which produces the packages of the request from clients to send to the provider when they are interested by a service unicast. Well as we described in detail the characteristics of the MAC protocol designed earlier, we may carry out this idea described theirs corresponds to the last version of our protocol, to reach this execution that we programmed and examined before simple versions, the changes of the force and improvements made between the versions are related to the definition of the various services offered in the section of channel service: The first version only considered a unidirectional communication between provider and client. The reason was that we only define broadcast services in the service channel. A second version consisted in defining unicast services and hence introducing a bidirectional communication between provider and client. This new version was more complex than the previous one so we decided to divide the application we had until now (called pbc3) into two sides: the application in the provider side (pbc3) and the application in the client side (pbc3Sink). This idea of defining two sides of an application or protocol layer (to simplify its implementation) is already used in other applications or protocol layers included in the simulator as TCP. The third and last version consisted in implementing the algorithm which handles the access of more than one client to the same unicast service. This was not considered in version two. When we are programming our MAC protocol, several problems raised, which are not only in our side, but also of the limitations or the restrictions of the Network Simulation. Well, in the next section4.5 we describe and explained all, it is worth to mention a principal limitation in so much it deeply influenced the execution of our protocol. The limitation comes like more parallel flow of the data in the same node started to appear (the node can be client or provider). In our case we decided to have only one provider, this provider will produce the data of both services. This means that the provider will have more application to the function in parallel and more file test in the MAC layer (see Figure 3.2), each one associated to a different data flow. That is the reason why we are interested in parallelizing. The problem is, in so far as we know, installing parallel flows in same node; is not a task easy to make in the simulator. The most common solution is composed to use nodes as parallel flows as much of an idea used when a protocol stack is defined on the two aircraft or more (like the plan of the data and management represented on Figure 2.3). This is Explained in (GMPLS, 2006), or when we wish to have a node of multi-interface, in (NS2 Notebook). The idea is: if we cannot have more than one application function in parallel in the same node, what would be the possible solution? The answer to that, like also accentuated in section4.5, is to have only one application to function in the provider, which produces various types of packages according to the time execution. This approximation also solves the problem to have more than one queue (in parallel) in the MAC layer. We will not need various queues to store various packages due to these packages arrive at the MAC layer already in the order; they must be sent. This solution simplifies the definition of the MAC layer but made the definition of the application layer to be more complex. Although the solution taken could seem rudimentary; the fact is that the difference between the theoretical solution and rectifies is not also large particularly when to think that what we want with once examine with the protocol is implemented. After the mention and explanation of this problem we can now specify how the protocol was made. We will start to explain how application is defined in all both, client and provider. Both sides application have two principal functions: one is responsible for creation and sending of the packages to the lower layers and the other is responsible to receive the packages of the lower layer. The application in the side of the provider calls the pbc3 and has two principal functions: one for send and other for receive frame. While sending the frame we basically have to create a package (by defining its title) and send it. The provider will send various types of packages according to the execution time. Basically we will have two types of packages: the packages of management in the control channel of inspection mark and the packages of the data in the excavation of service of the channel timeslot. These packages will have various headers. In case of the packages of the zones information of the header are as in Figure 4.7: Type Service_id Time_slot seqNum lastPacket node_id Send_time Payload Figure 4.7: Fields of the application header for data frames. Service_id: Field used by the provider to indicate the service whose payload is included in the frame. Time_slot: Field that shows the subtime slot when the service is offered. SeqNum: Sequence number of the packet sent. Nowadays is only used in data packets which belong to unicast services, it is used by the provider when more than one client want to receive the same private information. LastPacket: This field is related to seqNum. It is used to indicate that the packet sent is the last one. In case of management frames the header is defined by the following fields in Figure 4.8. Type Services_ Num_services node_id Send_time Payload Information Figure4.8. Fields of the application header for management frames. services_information: It is only used in management frames. It is a vector which contains the basic information about the services offered by the provider. This basic information is defined by three fields: the first field is the identifier of the service, the second field is the subtimeslot identifier and the third field is the type of the service (as we said already before the type of the service means if the service is broadcast or if it is unicast). These three fields must be defined for each service available in the provider, the Figure 4.9 shows that. Service 1 Time Slot where Type of Service 1 Service 2 Time Slot when Type of service 2 Identifier Service 1 is offered Identifier Service 2 is offered Figure 4.9: Example of the services_information buffer when two services offered. Although in our implementation the identifier of the service and the identifier of the timeslot is the same (which means the service whose identifier is the number one will be offered in the subtime slot number one), we decided to define two variables because they would have different values in future versions of the protocol. Num_services: Value used to indicate the total number of services which are going to be offered by the provider during the service channel timeslot. Once we have explained how our application works in both sides (provider and client) we must explain the main changes done in the MAC layer. When we download the NS2.33 version there was already included an implementation of IEEE802.11a protocol. We didnt want to make use of this code because it was totally oriented to guaranty the CSMA/CA with virtual carries sense mechanism, we are not interested in. there was also simple TDMA implementation included. We decided to adapt into our requirements. We basically had to change the definition of the TDMA frame and to set up both data and management MAC headers. In contrast to the application layer there are no variables defended to make use of the MAC layer through the Tcl script. If we concentrate on the physical layer, we will see that in our version of Network Simulation NS2, there were already two physical layers for wireless communications applied: the first one called the wirelessPHY and the second one called WirelessPhyExt. We are interested to use this last version of the physical channel basically it presented an important concept for us: it supports multiple arrangements of the modulation. WirelessPhyExt leaves the function with BPSK, QPSK, QAM16 and QAM64 as it is described in (Qi Chen, 2008). The modulation influences certain important characteristics such as the rate of header information and minimum sensitivity of the receiver, according to the indications the Figure 3.3 of, and consequently the period of the data of transmission and SINR necessary to receive it and to decode it. The only problem is that this new version of the wireless channel must be used together with an extension of the MAC layer called Mac802_11Ext. We were not interested in using that one for the same reason we were not interested in using the Mac802_11 version; and for that we decided to introduce the multiple modulation schemes in the WirelessPhy layer. Another important point when working low layers of the WAVE protocol stack is to think about how the channel is modelled in NS2. There are four different types of channel propagation defined and include in NS2.33, The free space model, the Two-Ray Ground reflection model, the Shadowing model and the Nakagami model. The first three models are well described in (The NS manual, 2008). 4.5 SIMULATION PROBLEMS AND IMPLIMENTATION IMPROVEMENTS Here we explained the reason for which we are interested to study the technology of TDMA in the V2I communications and the process followed to define and apply our protocol. By creating a new protocol, sometimes it is not possible to design the theoretical idea that we had because of some limitations presented by the simulator. It is also possible that our execution could be improved at the points given. We must realize that although the protocol seems to be complex sometimes, many improvements could be made to obtain the best and more specific results. The idea of this section is just to explain the main problems found when elaborating our protocol and to suggest some future improvements. If we refer first to the problems found when we were working we must clarify that most of them are not really problems (in the sense of bugs found when executing the protocol) but limitations the simulator has which do not allow us to define the protocol as we wanted to. There are three main limitations we want to point out: The first is already mentioned in the previous section. The problem is related to the parallel data flows in a node. We were interested by this fact of being able not only to have more application to the function in parallel in the same node (as explained in the section 4.4) but to also define the two planes of protocol, data and planes of management, in the same node (that we can see Figure 2.3) although this last idea was thrown it required of much work to make. In section 4.4 we adopted easy and the fast solution which does not have affected the results obtained. But there is other solutions, simplest is composed to define nodes as many, in the code of TCL, as data flows we need and link these nodes through a router. To explain it easily: we will have one node per each data queue (see Figure 3.3) and one router that handle the information from each node. This solution is based in the actual implementation of the Diffserv queues in the NS (Definition of physical queues) where virtual and physical queues are used (Implementing multiqueue). In our case we will need at least two nodes: one for the data of the control channel and the other for the data of the service channel, in case only one service is offered. We must realize this solution involves changes in the Tcl code which leads to a simple C++ implementation. Another solution, which could be considered as an improvement is to have only one application running on the provider that generates different types of packets but instead of doing it as a function of the execution time, it could generate them randomly and give the work of organize them to the link layer. In this case we will need to define an algorithm in charge of finding the desired packets in the unique queue that exists in the link layer and sending them in the correct order to the MAC layer. There is a third solution which allows having an implementation closer to the one specified in the standards ((IEEE 802.11, 2007) and (Implementing multiqueue)). The idea consists of adapting the definition of the queue done nowadays in the implementation 802.11e standard which is included in the simulator. As we can see in (Design and verification, 2003) this implementation requires changes in the definition of the class queue which allows having multiples queues by creating them in an array (Evaluation of IEEE 802.11e). The source code of this new type of queue can be found in (Evaluation of IEEE 802.11e). The second limitation is related to the synchronization of the nodes. Those nodes can be an OBU or a RSU. The NS is a simulator based in events controlled by timers. The fact is, as it is pointed out in IEEE 1609.4 standard in (Yunpeng, 2007) all the nodes require to be synchronized before communication. The synchronization is especially important when using TDMA technology and it is a process which will be carried on when any OBU enters in the communication area of a new RSU in a centralized system. The fact is that in the NS tool all the nodes implemented (in the Tcl code) have the same time basis which means they do not need any synchronization because they are already synchronized. If we are interested in defining the synchronization process we should first desynchronize the nodes by manipulating their timers. In our case we will consider the RSU time basis to be the one the other nodes must to synchronize on. Each OBU will have to follow a synchronization process before receiving data frames from the RSU. The idea could be the following: the first time an OBU receives frames from a new RSU it gets the timestamp of the RSU and, after adding the delay produced by the propagation of the frame to this timestamp, adjusts its timers. Calculate the delay or time difference between the RSU and the OBU is not complicated. The only idea which does not seem clear is how to set up different time basis in the nodes. The third and last limitation is related to the anti-collisions mechanism used in the MAC layer mainly based in CSMA/CA algorithm. We detected the problem when executing our code: we found there were collisions between request frames when a considered number of OBUs were interested in receiving information about the same unicast service. Those collisions should not take place if we keep in mind each node is supposed to be able of sense the medium to see whether it is busy before sending any kind of frame. Why this type of collisions is produced? As we explained earlier, it is necessary to present intervals of guard to the end of each time slit to avoid collisions between the reinforcements produced by various devices (OBUs and RSU in our case) but in this case the collisions due are produced to different OBUs send braces of request really narrowly in time and, because of them cannot detect if the medium is with vacuum or not, a collision is produced and detected by the RSU. When working with the NS tool we are not able to do all the things we want to, not only because of some restrictions or limitations the tool has (as we explained before) but also because of time we did not implement all the ideas which came to our mind and we must simplify and focus our work. Because of this lack of time there exist a lot of points in our protocol which could be improved. Some of these points are explained in the following paragraphs. If we focus in the implementation of the control channel the most important improvement which could be done is to introduce critical frames and implement the process each node has to follow when receiving those frames. Introducing those types of frames will be really interesting because we can see how to handle both types of information (critical and no critical) and we would make a better use of the control channel than we do in our actual implementation. If we pay attention to the service channel there are some things which could be improved, the ideas are summarized in the following points: In the actual implementation there is not any prioritization between nodes, which means when two or more nodes want to receive the same information (which is unicast) the first who ask for it is the first which receives the data. One possibility is to define the priority as a function of the position of each OBU with respect to the RSU. It sounds coherent to give higher priority to the nodes that are closer to the RSU because of their small latency (time necessary to consume a service). Basically the latency is smaller because the propagation time (one of the terms