Saturday, August 31, 2019

Concepts of Competencies to the Jobs Essay

1.How relevant are the concepts of competencies to the jobs in a chicken-processing plant? 1.How relevant are the concepts of competencies to the jobs in a chicken-processing plant? hirsagar had been with Horizon for over twenty years. Starting off as a substitute mill-hand in the paint shop at one of the company’s manufacturing facilities, he had been made permanent on the job five years later. He had no formal education. He felt this was a handicap, but he made up for it with a willingness to learn and a certain enthusiasm on the job. He was soon marked by the works manager as someone to watch out for. Simultaneously, Kshirsagar also came to the attention of the president of the Horizon Employees’ Union who drafted him into union activities. Even while he got promoted twice during the period to become the head colour mixer last year, Kshirsagar had gradually moved up the union hierarchy and had been thrice elected secretary of the union. Labour-management relations at Horizon were not always cordial. This was largely because the company had not been recording a consistently good performance. There were frequent cuts in production every year because of go-slows and strikes by workmen—most of them related to wage hikes and bonus payments. With a view to ensuring a better understanding on the part of labour, the problems of company management, the Horizon board, led by chairman and managing director Aninash Chaturvedi, began to toy with idea of taking on a workman on the board. What started off as a hesitant move snowballed, after a series of brainstorming sessions with executives and meetings with the union leaders, into a situation in which Kshirsagar found himself catapulted to the Horizon board as work-man-director. It was an untested ground for the company. But the novelty of it all excited both the management and the labour force. The board members—all functional heads went out of their way to make Kshirsagar comfortable and the latter also responded quite well. He got used to the ambience of the boardroom and the sense of power it conveyed. Significantly, he was soon at home with the perspectives of top management and began to see each issue from both sides. It was smooth going until the union presented a week before the monthly board meeting, its charter of demands, one of which was a 30 per cent across-the board hike in wages.

Friday, August 30, 2019

Computer Networks

– Suresh Khanal Computer Networking Short Questions and Answer www. psexam. com Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: http://www. psexam. com contact: [email  protected] com Computer Networking: Short Questions and Answers Published by PS Exam Kalanki, Kathmandu Nepal www. psexam. com Copyright  ©2009 author.No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise except for personal and non-commercial use without the prior written permission of the author. About the Author Suresh Khanal is a native of Kathmandu, Nepal, where he works as a freelance developer, programmer and technical writer/editor. He has been involved in teaching computers science since 1998 and over the years has written several articles and tutorials on Office Appli cations and Web Programming.Khanal holds a Master's of Science Degree in Information Technology Science. In his spare time, he enjoys travelling, posting in forums and play online games. Table of Contents Transmission Media What is transmission media? What are the types of transmission media? Describe bound transmission media. Describe unbound transmission media. Bound Transmission Media Explain twisted pair cable. Explain Co-axial cable. Explain Fiber-Optics cable. 1 1 1 1 1 1 1 4 5 Match the following types of connectors with the cables to which they are used. Compare BNC with UTP Cables Unbound Transmission Media Explain Radio Wave. What is Microwave? List the Advantages of microwaves. What are the Disadvantages of Microwaves? Describe Infra Red. Computer Network What is a computer network? What are the advantages of Networking? Explain Network Services 8 9 9 10 11 11 11 12 12 12 13 What are the five major network services? What is Network Server? What is a client? What is a dedi cated server? What is workstation? What are dumb terminals? Types of Computer Network What is a LAN? What is MAN? What is WAN? Clarify Enterprise WANs.Clarify Global WANs. What are the two types of LAN? Protocols What is a protocol? What are the three major network protocols? Match the following protocols and their functions LAN Topologies What are the two network connection types? Explain Point-to-Point connection type. Explain multipoint connection. What are the basic LAN topologies? Explain Bus Topology. What are the advantages of bus topology? 13 13 13 14 14 14 15 15 16 16 16 17 17 18 18 18 19 20 20 20 21 21 21 23 What are the disadvantages of bus topology? What is Ring Topology? Point out the major advantages of Ring Topology.Point out the disadvantages of Ring Topology. Explain Star Topology. What are the benefits of Star Topology? What are the disadvantages of Star Topology? What are the popular topologies other than basic Topologies? Network Standards What is a Networking St andard? What are the four major industry standards? What is an Ethernet? How an Ethernet Worked? What is Medium Access Control of Ethernet? Explain Ethernet Frame. List some advantages of Ethernet. What are the disadvantages of Ethernet Cabling? What is ARCNet? List the advantages of ARCNet. What are the disadvantages of ARCNet?How does a Token-Passing Protocol works? 24 24 25 25 25 26 26 27 27 27 27 28 28 29 29 30 30 31 32 32 32 Explain Logical Ring Physical Star topology for Token-Passing Standard. 32 List some most useful advantages of Token Ring. 33 Point out the disadvantages of Token Ring. What do you mean by Beaconing and Auto-Reconfiguration? Network Architecture What is Network Architecture? What are the popular Network Architectures? Explain ISO's OSI Architecture Explain IBM's SNA Architecture Networking Model Explain Peer-to-Peer Networking Model. Explain Client/Server Networking Model.Network and Internet Terminologies NICs Hubs/Repeaters Bridges Router Switches Transce ivers Gateway Proxy Serer Firewall Node Wireless Network Internet WWW 34 34 34 34 35 35 36 37 37 37 38 38 39 39 40 41 42 42 43 43 43 43 45 45 IRC CU-SeeMe Telnet Gopher HTML Browsers Dialup Connection IP Address Domain Name URL Web Browsing or Surfing Search Engine Meta Search Engine Internet Access Extranet Intranet Web Index Hypertext Email Email address Inbox Outbox Trash CC 46 47 48 49 49 50 53 53 54 54 54 55 57 57 58 58 58 59 59 59 60 60 61 61 BCC Reply Forward Attachments Bounced Netiquette Emoticons 62 62 62 62 62 62 62 Table of FiguresFigure 1: UTP Cable 2 Figure 2: UTP Cable Connector 2 Figure 3: STP Cable 3 Figure 4: STP Cable Structure 3 Figure 5: Co-Axial Cable 4 Figure 6: Co-Axial Cable Structure 4 Figure 7: Co-Axial Cable Connectors 5 Figure 8: Fibre Optics Cable Structure 6 Figure 9: Fiber Optics Cable 6 Figure 10: AUI Connector 7 Figure 11: BNC Connector 7 Figure 12: RJ45 Connector 8 Figure 13: SC Connector 8 Figure 14: Comparison between Twisted Pairs and Co-Axial C able 9 Figure 15: Radio Wave Transmission 9 Figure 16: Microwave Transmission 10 Figure 17: Microwave Transmitter, Receiver and Repeater 10 Figure 18: Infrared Device Error!Bookmark not defined. Figure 19: Computer Network 12 Figure 20: Workstation 14 Figure 21: Dumb Terminal 15 Figure 22: Wide Area Network 16 Figure 23: Enterprise WAN 17 Figure 24: TCP/IP Structure 18 Figure 25: IPX/SPX Structure 19 Figure 26: Different LAN Topologies 20 Figure 27: Bus Topology 21 Figure 28: Bus Topology Network connected with other network 22 Figure 29: T Connector 22 Figure 30: Different Cable Terminators 23 Figure 31: Ring Topology 24 Figure 32: Star Topology 25 Figure 33: Star Topology 26 Figure 34: Tre Topology Error! Bookmark not defined. Figure 35: Mesh Topology Error! Bookmark not defined.Figure 36: Ethernet Network 29 Figure 37: ARCNet Board and Card 31 Figure 38: Network with MSAU 33 Figure 39: ISO's OSI Architecture 35 Figure 40: OSI an SNA Comparision 36 Figure 41: LAN NIC Card 38 Figur e 42: Hub 39 Figure 43: Bridge 40 Figure 44: Router 41 Figure 45: Switch 41 Figure 46: Transceiver 42 Figure 47: Gateway PC 43 Figure 48: Nework with Wireless Stations 44 Figure 49: Tim Berners Lee 45 Figure 50: Yahoo Chat 46 Figure 51: CU SeeMe 47 Figure 52: CU SeeMe Conferencing 48 Figure 53: Telnet Screen 48 Figure 54: Different Browsers Logo 50 Figure 55: Mozilla Firefox 51 Figure 56: Netscape Navigator 51 Figure 57: Internet Explorer 52 Figure 58: Google Chrome 52 Figure 59: IP Address Structure 53 Figure 60: IP Address and Subnet Mask 53Figure 61: Yahoo, Ask, MSN, Google Search Engines Figure 62: Alta Vista Search Engine Figure 63: Lycos Figure 64: Meta Search Engine Figure 65: Web Index Figure 66: Hypertext and Hyper Link Figure 67: Email Client Interface Figure 68: New Email Message Figure 69: Emoticons 55 56 56 57 58 59 60 61 63 Computer Networking Short Questions and Answers Suresh Khanal Kalanki, Kathmandu [email  protected] com [email  protected] com Published By: ht tp://www. psexam. com contact: [email  protected] com Computer Networking Short Questions and Answers Contribution of Suresh Khanal for PS Exam Transmission Media What is transmission media? Transmission media is a pathway through which data are transmitted in network.We use different types of cables or waves to transmit data. What are the types of transmission media? There are two types of transmission media namely: bound transmission media and unbound transmission media. Describe bound transmission media. Bound transmission media are the cables that are tangible or have physical existence and are limited by the physical geography. Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical cable. Describe unbound transmission media. Unbound transmission media are the ways of transmitting data without using any cables. These media are not bounded by physical geography.Microwave, Radio wave, Infra red are some of popular unbound transmission me dia. Bound Transmission Media Explain twisted pair cable. A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to reduce the interference. http://www. psexam. com Page 1 Contribution of Suresh Khanal for PS Exam Figure 1: UTP Cable Figure 2: UTP Cable Connector Page 2 http://www. psexam. com Contribution of Suresh Khanal for PS Exam We can find two types of twisted pair cables, namely: Unshielded Twisted Pair Cable (UTP) and Shielded Twisted Pair Cable (STP).The twisted pair cable that is protected against electro-magnetic interference (EMI) is known as STP and the one which is not shielded against EMI is called Unshielded Twisted Pair. Figure 3: STP Cable 1–Jacket 2–Shield-braid 3–Shield-foil 4–Solid twisted pair 5–Drain wire Figure 4: STP Cable Structure http://www. psexam. com Page 3 Contribution of Suresh Khanal for PS Exam Explain Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is known as co-axial cable. The shield is usually connected to electrical ground to reduce electrical interference. Co-axial cables have broader bandwidth and thus suitable for audio, video data transmission. Figure 5: Co-Axial Cable Figure 6: Co-Axial Cable StructurePage 4 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 7: Co-Axial Cable Connectors Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data via concentrated bursts of laser beams which are carried through bundles of hair thin glass fibers. They have advantages over electronic cables in transmission speed and volume. This technology has revolutionized telecommunication applications which used electron ic cables. Fiber optics cables as free from electromagnetic interference as well as wire tapping. http://www. sexam. com Page 5 Contribution of Suresh Khanal for PS Exam Figure 8: Fibre Optics Cable Structure Figure 9: Fiber Optics Cable Page 6 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Match the following types of connectors with the cables to which they are used. Cable: (a) Thick Coax (100 Base 5), (b) UTP (10 Base-T), (c) Fiber Optics (10 Base-FL) (d) Thin Coax (100 Base 5) Connectors: (1) AUI, (2) BNC, (3) RJ45, (4) SC or ST Type Answer:- a -> 1, b -> 3, c -> 4, d -> 2 Figure 10: AUI Connector Figure 11: BNC Connector http://www. psexam. com Page 7 Contribution of Suresh Khanal for PS Exam Figure 12: RJ45 ConnectorFigure 13: SC Connector Compare BNC with UTP Cables BNC Derived from the thick Ethernet Coaxial Cable Flexibility of adding nodes Lower price and no need of Hub Difficult to locate faults Terminators needed The cabling is comparatively less relia ble Single segment length (node to node) up to 180 meters UTP Derived from telephone cable Decided by Hub ports Needs Hubs Introduction of Hub makes fault finding much easier Terminators not needed Inherently much reliable Single segment length up to 200 meters Page 8 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 14: Comparison between Twisted Pairs and Co-Axial Cable Unbound Transmission MediaUnbound transmission media extend beyond the limiting confines of cabling. They provide an excellent communication alternative for WANS. The lack of physical restrictions provides larger bandwidth as well as wide area capabilities. Unbound media typically operate at very high frequencies. The three types of unbound transmission media are: Radio wave, Micro wave, Infrared Explain Radio Wave. Although Radio waves are prevalent and well understood, we are just beginning to realize their enormous potential as a networking medium. Radio waves can operate on a single or mu ltiple frequency bands. Figure 15: Radio Wave Transmission http://www. psexam. com Page 9 Contribution of Suresh Khanal for PS Exam What is Microwave?Microwaves have been used in data communications for a long time. They have a higher frequency than radio waves and therefore can handle larger amounts of data. Microwave transmission is line of sight transmission. The transmit station must be in visible contact with the receive station. This sets a limit on the distance between stations depending on the local geography. Typically the line of sight due to the Earth's curvature is only 50 km to the horizon! Repeater stations must be placed so the data signal can hop, skip and jump across the country. Figure 16: Microwave Transmission Figure 17: Microwave Transmitter, Receiver and Repeater Page 10 http://www. psexam. comContribution of Suresh Khanal for PS Exam Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry large quantities of data due to their large bandwidth. List the Advantages of microwaves. a. They require no right of way acquisition between towers. b. They can carry high quantities of information due to their high operating frequencies. c. Low cost land purchase: each tower occupies only a small area. d. High frequency/short wavelength signals require small antennae. What are the Disadvantages of Microwaves? a. Attenuation by solid objects: birds, rain, snow and fog. b. Reflected from flat surfaces like water and metal. c. Diffracted (split) around solid objects. d.Refracted by atmosphere, thus causing beam to be projected away from receiver. Describe Infra Red. Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared communications use light, so they are not bound by the limitations of electricity. Figure 18: Infrared Device http://www. psexam. com Page 11 Contribution of Suresh Khanal for PS Exam Computer Network What is a computer network? Computer Network is a collection of distribut ed intelligent machines that are connected with each other with transmission media for the purpose of data sharing, communication and sharing of computer resources. Figure 19: Computer NetworkWhat are the advantages of Networking? The following are the distinct notes in favor of computer networking. a. The computers, staff and information can be well managed b. A network provides the means to exchange data among the computers and to make programs and data available to people c. It permits the sharing of the resources of the machine d. Networking also provides the function of back-up. e. Networking provides a flexible networking environment. Employees can work at home by using through networks ties through networks into the computer at office. Page 12 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain Network ServicesNetwork services are the thing that a network can do. The major networking services are ? ? ? ? ? File Services: This includes file transfer, stor age, data migration, file update, synchronization and achieving. Printing Services: This service produces shared access to valuable printing devices. Message Services: This service facilitates email, voice mails and coordinate object oriented applications. Application Services: This services allows to centralize high profile applications to increase performance and scalability Database Services: This involves coordination of distributed data and replication. What are the five major network services? Major Network Services are: a. b. c. d. e.File Services Print Services Message Services Application Services Database Services What is Network Server? Network Server is a computer in Network that is designated to provide one or more network service. For example file server, database server etc. What is a client? A computer in network that connects to the server and uses the network services to perform user's tasks is a client. http://www. psexam. com Page 13 Contribution of Suresh Khanal for PS Exam What is a dedicated server? A network server designated to provide one particular service is known as dedicated server. For example if a computer is assigned for database service only then that computer is known as dedicated database server. What is workstation?A workstation is a node in network that is more powerful and can handle local information processing or graphics processing. A workstation usually has an inexpensive, small hard disk to carry out local tasks. Figure 20: Workstation Some workstations that have no disk drive of their own is known as diskless-workstation or dumb terminals. They terminals completely rely on LAN for their access. Network operating system lets the node work as if all the resources at the server belong to the node itself. What are dumb terminals? Those Workstations that have no disk drive of their own and rely completely on LAN for their access are called dumb terminals.The network operating system lets these terminals work as if all th e resources at the server belong to the workstation itself. Page 14 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 21: Dumb Terminal Types of Computer Network Computer networks fall into three classes regarding the size, distance and the structure namely: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). A LAN links a small group of functionally similar workstations within a local geographic area such as a series of adjacent cubicles or offices on the same floor. Once the network expands to include other floors or divers office within a metropolitan area, it becomes a MAN. Finally, a WAN is simply a LAN of LANs.WANs expand the boundaries of networking to a global or even galactic scale. What is a LAN? A LAN is a Local Area Network, within a single building or a specific confined space. LANs typically comprise only one transmission media type such as coaxial cable or twisted pair. LANs are characterized by comparatively high -speed communications. These high speeds are possible because LANs use one kind of cable which generally is limited to 5 km or less. http://www. psexam. com Page 15 Contribution of Suresh Khanal for PS Exam What is MAN? MAN stands for Metropolitan Area Networks. MAN is larger than a LAN and as its name implies, covers the area of a single city.MANs rarely extend beyond 100 KM and frequently comprise a combination of different hardware and transmission media. The two most important components of MANs are security and standardization. Security is important because information is being shared between dissimilar systems. Standardization is necessary to ensure reliable data communication. What is WAN? A wide area network is simply a LAN of LANs. WANs connect LANs that may be on opposite sides of a building, across the country or around the world. WANS are characterized by the slowest data communication rates and the largest distances. WANs can be of two types: an enterprise WAN and Globa l WAN. Figure 22: Wide Area NetworkClarify Enterprise WANs. An enterprise WAN connects an entire organization including all LANs at various sites. This term is used for large, widespread organizations such as corporations, universities and governments. Page 16 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 23: Enterprise WAN Clarify Global WANs. Global WANs also span the world but they do not have to connect LANS within a single organization. The Internet is an example of a global WAN. It connects diverse locations, organizations and institutions throughout the world. Global WANS can be public or private. Private WANs are called Intranet which belongs to an organization.Public WANs are open to everybody so that anybody can connect and use the resources and services available. What are the two types of LAN? There are basically two types of Local Area Networks namely: Arcnet and Ethernet. http://www. psexam. com Page 17 Contribution of Suresh Khanal for PS Ex am Protocols What is a protocol? The term protocol refers to a set of rules and procedures that govern the transmission of messages over a physical networking medium. The most common network protocols are: (a) TCP/IP, (b) IPX/SPX and (c) NetBEUE What are the three major network protocols? The three major network protocols are: 1. TCP/IP 2. IPX/SPX (Used in Novell Netware) 3. NetBEUE (Product of Microsoft Co. ) Figure 24: TCP/IP StructurePage 18 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 25: IPX/SPX Structure Match the following protocols and their functions (a) http, (b) pop, (c) ftp, (d) smtp, (e) MIME, 1. Send email messages 2. Transfer multimedia information 3. Send email attachment 4. Transfer files in servers and clients computers 5. Receive email messages Answer: (a) -> 2, (b) -> 5, (c) -> 4, (d) -> 1, (e) -> 3 http://www. psexam. com Page 19 Contribution of Suresh Khanal for PS Exam LAN Topologies The term topology defines the geographic arrangem ent of networking devices. It describes the actual layout of the network hardware.Given the location of workstations and peripherals, the goal of topology is to find the most economical and efficient way to connect all the users to the network resources while providing adequate capacity to handle user demands, maintain system reliability and minimize delay. Figure 26: Different LAN Topologies The selection of a topology for a network can not be done in isolation as it affects the choice of media and the access method used. Because it determines the strategy used in wiring a building for a network and deserves some careful study. What are the two network connection types? The two different network connection types are (a) point-to-point connection and (b) multipoint connection. Explain Point-to-Point connection type. A point-to-point connection is a direct link between two devices such as a computer and a printer.Most of today's point-to-point connections are associated with modems a nd PSTN (Public Switched Telephone Network) communications. Page 20 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Explain multipoint connection. A multipoint connection is a link between three or more devices. Historically, multipoint connections were used to attach central CPs to distributed dumb terminals. In today's LAN environments, multipoint connections link many network devices in various configurations. What are the basic LAN topologies? The three simple LAN topologies that are combined to form any practical topology are known as basic LAN topologies.They are, Bus Topology, Ring Topology and Star Topology. Explain Bus Topology. The physical Bus topology is the simplest and most widely used of the network designs. It consists of one continuous length of cable (trunk) and a terminating resistor (terminator) at each end. Data communication message travels along the bus in both directions until it is picked up by a workstation or server NIC. If the message is missed or not recognized, it reaches the end of the cabling and dissipates at the terminator. Figure 27: Bus Topology http://www. psexam. com Page 21 Contribution of Suresh Khanal for PS Exam All nodes on the bus topology have equal access to the trunk.This is accomplished using short drop cables or direct T-connectors. The number of devices and the length of the trunk can be easily expanded. Figure 28: Bus Topology Network connected with other network Figure 29: T Connector Page 22 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 30: Different Cable Terminators What are the advantages of bus topology? The advantages of physical bus topology are: a. It uses established standards and it is relatively easy to install. b. It requires less media than other topologies. http://www. psexam. com Page 23 Contribution of Suresh Khanal for PS Exam What are the disadvantages of bus topology?The disadvantages of bus topology are: a. The bus networks are difficult to reco nfigure, especially when the acceptable number of connections or maximum distances have been reached. b. They are also difficult to troubleshoot because everything happens on a single media segment. This can have dangerous consequences because any break in the cabling brings the network to its knee. What is Ring Topology? The physical ring topology is a circular loop of point-to-point links. Each device connects directly to the ring or indirectly through and interface device or drop cable. Message travel around the ring from node to node in a very organized manner.Each workstation checks the message for a matching destination address. If the address doesn't match the node simply regenerates the message and sends it on its way. If the address matches, the node accepts the message and sends a reply to the originating sender. Figure 31: Ring Topology Page 24 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Point out the major advantages of Ring Topology. The advantages of ring topologies are: a. They are very easy to troubleshoot because each device incorporates a repeater. b. A special internal feature called beaconing allows troubled workstations to identify themselves quickly. Point out the disadvantages of Ring Topology.The disadvantages of ring topologies are: a. It is considerably difficult to install and reconfigure ring topology b. Media failure on unidirectional or single loop causes complete network failure. Explain Star Topology. The physical star topology uses a central controlling hub with dedicated legs pointing in all directions – like points of a star. Each network device has a dedicated point-to-point link to the central hub. This strategy prevents troublesome collisions and keeps the lines of communications open and free of traffic. Figure 32: Star Topology http://www. psexam. com Page 25 Contribution of Suresh Khanal for PS Exam This topology, obviously, require a great deal of cabling.This design provides an excellent p latform for reconfiguration and troubleshooting. Changes to the network are as simple as plugging another segment into the hub and a break in the LAN is easy to isolate and doesn't affect the rest of the network. Figure 33: Star Topology What are the benefits of Star Topology? The benefits of star topology are: a. Relatively easy to configure. b. Easy to troubleshoot c. Media faults are automatically isolated to the failed segment. What are the disadvantages of Star Topology? The disadvantages are considered as follows: a. Requires more cable than most topologies. b. Moderately difficult to install. Page 26 http://www. sexam. com Contribution of Suresh Khanal for PS Exam What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (every device connected to all other devices), Cellular Topology (wireless point to pint and multipoint design), Tree Topology (Hierarchical connections of devices), Hyb rid topology (combination of two or more basic topologies). Figure 34: Tre Topology Figure 35: Mesh Topology Network Standards What is a Networking Standard? Protocol (the logical component) and Topology (the physical component) is combined together to create a networking standard.These standards are developed and controlled by the Institute of Electrical and Electronics Engineers (IEEE). What are the four major industry standards? The four major industry standards are (a) Ethernet, Token Ring, ARCNet and FDDI (Fiber Distributed Data Interface). http://www. psexam. com Page 27 Contribution of Suresh Khanal for PS Exam What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the various Islands. It was radio based design. Later, Robert Metacalfe went to Xeros's Palo Alto Research Center (PARC) laboratories and eliminated the radio portion and changed to co-axial cabling. Ethernet is ne of the most popular LAN technologies in use tod ay covering more than 85% of the networks. Ethernet system consists of three basic elements: 4. The physical medium use to carry Ethernet signals between computers on the network 5. A set of rules (protocols) embedded in each Ethernet interface that will decide how multiple computers on the network will have access to the data on the medium. 6. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. How an Ethernet Worked? The operation of Ethernet can be described in simple terms as follows: Each computer on the Ethernet Network, also known as a node, operates independently of all other nodes.All nodes attached to an Ethernet are connected to a shared medium over which the Ethernet signals travel serially, one data bit at a time. To send data a station first listens to the channel and when the channel is idle the station transmits its information in the form of an Ethernet frame, or packet. The Ethernet rules (protocol) are defined in such a way that every node gets a fair amount of frame transmission opportunity. Page 28 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 36: Ethernet Network As each Ethernet frame is sent out on the shared medium, the Ethernet interfaces inside the node look at the destination address.The interfaces compare the destination address of the frame with their own address. The Ethernet interface with the same address as the destination address in the frame will read the entire frame and all other network interfaces will ignore the information. What is Medium Access Control of Ethernet? The set of rules which ensures that every node in an Ethernet gets a fair amount of frame transmission opportunity, are called the â€Å"Medium Access Control† mechanism. The Medium Access Control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMD/CD). Explain Ethernet Frame. The heart of Ethernet system is the Ethernet Frame, which is used to deliver information between the computers.The frame consists of a set of bits organized into several fields. These fields include address fields, a data field and an error checking field that checks the integrity of the bits in the frame to make sure that the frame has arrived intact. http://www. psexam. com Page 29 Contribution of Suresh Khanal for PS Exam List some advantages of Ethernet. Ethernet's major advantages are: 1. It is an inexpensive way to achieve high speed LAN transmissions (10 to 100 MB/s) 2. It is a proven technology that supports various writing configurations. 3. It works well with a large number of LAN and micro-tomainframe applications. 4. It is easy to install. What are the disadvantages of Ethernet Cabling?The Ethernet cabling ahs the following disadvantages: 1. Ethernet is not a high-level performer in high-load environments. This protocol (CSMA/CD: Carrier Sense Multiple Access/Collision Detection) can slow down dramatically if hundreds of works tations are competing for the same cabling trunk 2. Its linear bus cabling system can sometimes make it difficult to isolate problems. Page 30 http://www. psexam. com Contribution of Suresh Khanal for PS Exam What is ARCNet? The Attached Resource Computer Network (ARCNet) standard was created in 1977 at the Data Point Corporation by a scientist – John Murphy. ARCNet uses the token-passing protocol over a star and bus topology.The star and bus topology combines the flexibility of a star with the simplicity and throughput of a bus. Thus, ARCNet standard has a unique protocol/topology combination: token-passing protocol and Distributed star/bus topology. Figure 37: ARCNet Board and Card http://www. psexam. com Page 31 Contribution of Suresh Khanal for PS Exam List the advantages of ARCNet. Here are some of the ARCNet's advantages: 1. It is extremely reliable. 2. ARCNet is easy to install and troubleshoot. 3. It has an excellent track record of interoperability for those using AR CNet components from various manufacturers. 4. ARCNet supports a variety of cable types including coaxial, UTP and Fiber Optics. 5.It is inexpensive and built to stay that way. What are the disadvantages of ARCNet? Here are some disadvantages of ARCNet: 1. Standard ARCNet is very slow (2. 5 Mb/s). It is almost seven times slower than Token Ring. 2. ARCNet was not designed with interconnectivity in mind. For many installations, it's difficult to go beyond the confines of single LAN. How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal called the token. A token is a 24-bit packet that circulates throughout the network from NIC to NIC in an orderly fashion. If a workstation wants to transmit a message, first it must seize the token.At that point, the workstation has complete control over the communications channel. The existence of only one token eliminates the possibility of signal collisions. This means that only one station can speak at a ti me. Explain Logical Ring Physical Star topology for Token-Passing Standard. It is sure that any break in the ring at any point will interrupt communications for all machines. To solve this problem, IBM developed a modified ring topology, which they called the logical ring Page 32 http://www. psexam. com Contribution of Suresh Khanal for PS Exam physical star. The central point of the physical star configuration is Token Ring hub called the multi-station access unit (MSAU, pronounced as masow).Workstations and servers attached to the MSAU through special STP adapter cables. IBM converted stars into a logical ring by connecting all MSAU hubs together through special ring-in (RI) and ring-out (RO) ports. Figure 38: Network with MSAU List some most useful advantages of Token Ring. Here are Token ring's most useful advantages: a. It offers excellent throughput under high-load conditions. b. Token Ring facilitates LAN-to-LAN mainframe connections especially for interfacing with IBM's broa der connectivity strategies. c. It has built-in troubleshooting mechanisms such as beaconing and auto-reconfiguration and may now be used with UTP cabling. http://www. psexam. com Page 33 Contribution of Suresh Khanal for PS Exam d.It has the most reliable protocol (token-passing), the most trouble-free configuration (physical star) and the fastest connectivity scheme (r or 16 mb/s). Point out the disadvantages of Token Ring. Few of the disadvantages of Token Ring are: a. Token Ring is very expensive. All topology components cost much more than other more popular standards. b. It is relatively proprietary. Token Ring's complexity is built into the hardware components. This means hat you need to choose a manufacturer and stick with it. c. Engineers must have considerable expertise to manage and troubleshoot token ring components. What do you mean by Beaconing and AutoReconfiguration?When a station does not receive a message from its nearest active upstream neighbor, it sends out a wa rning, otherwise known as a beacon. This beacon alerts everyone that something is wrong and helps to isolate the failure domain. When beacon occurs, the ring will attempt to fix the problem without your intervention. This process of self-healing is called auto-reconfiguration. Network Architecture What is Network Architecture? When two or more computer are connected with one another for the purpose of communicating data electronically, besides physical connection of computers, communication devices and system servers, a well defined standard known as architecture is required to establish cohesive communication between devices in Network. Page 34 http://www. psexam. om Contribution of Suresh Khanal for PS Exam What are the popular Network Architectures? The most popular architectures are: a. ISO Open System Architecture (OSI) b. IBM's System Network Architecture (SNA) Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication between two end users in a network. It is used in developing products and understanding networks which means commonly used Internet product and services fit within the model. The OSI model describes seven layers of related functions that needed at each end, when a message is sent from one party to another party in a network.Each layer has its own set of special related function as follows: Figure 39: ISO's OSI Architecture http://www. psexam. com Page 35 Contribution of Suresh Khanal for PS Exam Layer 7 – Application Layer: Application programs that use the network. Layer 6 – Presentation Layer: Standardize data presented to the application. Layer 5 – Session Layer: Manages sessions between applications Layer 4 – Transport Layer: Provides error detection and correction Layer 3 – Network Layer: Provides data delivery across the physical connection Layer 2 – Data Link Layer: Provides data delivery across the physical connection Layer 1  œ Physical Layer: Defines the physical network media.Explain IBM's SNA Architecture SNA is a computer networking architecture that was developed by IBM to provide a network structure for IBM mainframe, midrange, and personal computer systems. SNA defines a set of proprietary communication protocols and message formats for the exchange and management of data on IBM host networks. Figure 40: OSI an SNA Comparision Page 36 http://www. psexam. com Contribution of Suresh Khanal for PS Exam SNA can be used for the following types of tasks: ? Terminal access to mainframe and midrange computer applications. File transfer of data between computer systems. Printing of mainframe and midrange data on SNA printers.Program-to-program communications that allow applications to exchange data over the network. ? ? ? SNA can be implemented in a networking infrastructure that uses either a hierarchical or peer-to-peer model. Networking Model Explain Peer-to-Peer Networking Model. A networking model whe re each workstation has equivalent capabilities and responsibilities is known as peer-to-peer model. There is no central server in this network and computers join hands to share files, printers and Internet access. It is practical for workgroups of a dozen or less computers making it common environments, where each PC acts as an independent workstation that stores data on its own disk but which can share it with all other PCs on the network.Software for peer-to-peer network is included with most modern desktop operating systems such as Windows and Mac OS. Explain Client/Server Networking Model. A networking model where one or more powerful computers (servers) provide the different network services and all other user's computers (clients) access those services to perform user's tasks is known as client/server networking model. Client-server networking model became popular in the late 1980s and early 1990s as many http://www. psexam. com Page 37 Contribution of Suresh Khanal for PS Ex am applications were migrated from centralized minicomputers and mainframes to networks of persona computers.The design of applications for a distributed computing environment required that they effetely be divided into two parts: client (front end) and server (back end). The network model on which they were implemented mirrored this client-server model with a user's PC (the client) typically acting as the requesting machine and a more powerful server machine to which it was connected via either a LAN or a WAN acting as the supplying machine. It requires special networking operating system. It provides user level security and it is more expensive. Network and Internet Terminologies NICs Network interface cards, commonly referred to as NICs are used to connect a PC to a network.The NIC provides a physical connection between the networking medium and the computers' internal bus, and is responsible for facilitating an â€Å"access method† to the network. Most NICs are designed f or a particular type of network, protocol and media, although some can serve multiple networks. Figure 41: LAN NIC Card Page 38 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality begins to deteriorate as segment exceeds their maximum length. A hub provides the signal amplification required to allow a segment to be extended a greater distance. Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports.Active hubs, also sometimes referred to as â€Å"multiport repeaters†, regenerate the data bits in order to maintain a strong signal. Figure 42: Hub Bridges The bridge function is to connect separate homogeneous networks. Bridges map the Ethernet address of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are different, then the packet is â€Å"forwarded† to the correct segment. Bridges are also called â€Å"store-and-forward† device because they look at the whole Ethernet packet before making filtering or forwarding decisions. ttp://www. psexam. com Page 39 Contribution of Suresh Khanal for PS Exam Figure 43: Bridge Router Routing achieved commercially popularity in the mid – 1980s – at a time when large-scale Internetworking began to replace the fairly simple, homogeneous environments. Routing is the act of moving information across an Internetwork from a source to a destination. It is often contrasted with bridging, which perform a similar function. Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex ne twork of many LANs.Page 40 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 44: Router Switches LAN switches are an expansion of the concept in LAN bridging, which controls data flow, handles transmission errors, provides physical addressing, and manages access to the physical medium. Switches provide these functions by using various link-layer protocols. LAN switches can link four, six, ten or more networks together. A storeand-forward switch, on the other hand, accepts and analyses the entire packet before forwarding it to its destination. Figure 45: Switch http://www. psexam. com Page 41 Contribution of Suresh Khanal for PS Exam TransceiversTransceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a builtin 10BaseT or 10Base2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. Figure 46: Transceiver Gateway A Gateway is a device such as a mini or microcomputer capable of operating on a stand alone basis but which also provides connection for communication with the other computers and access to shared resources. Page 42 http://www. psexam. comContribution of Suresh Khanal for PS Exam Figure 47: Gateway PC Proxy Serer Also called a proxy or application level gateway. It is an application that breaks the connection between sender and receiver. Thus, it helps us to prevent hacker from obtaining Internet address and detail of a private network. Firewall Firewall is a method for keeping a network secure. It is mostly used in giving users access to the Internet in a secure fashion as well as to separate a company's public web server from its internal network. Node A node is a hardware device or group of devices or station in a network that link one or more other unit to the network. Wireless NetworkThe m ost and latest wireless LANs use electromagnetic airwaves either infrared or radio frequency to communicate information from one point to another without relaying on a physical connection. Radio waves are often referred to as radio carriers because they simply perform the function of delivering energy to a remote receiver. The http://www. psexam. com Page 43 Contribution of Suresh Khanal for PS Exam data being transmitted is superimposed on the radio carrier so that it can be accurately extracted at the receiving end. Multiple radio carriers can exist in the same space at the same time without interfering with each other if the radio waves are transmitted on different radio frequencies. Figure 48: Nework with Wireless StationsIn a typical WLAN configuration, a transmitter/receiver (transceiver) device, called an Access Point (AP), connects to the wired network from a fixed location using standard Ethernet cable. The Access Point receives, buffers, and transmits data between the WLAN and the Page 44 http://www. psexam. com Contribution of Suresh Khanal for PS Exam wired network infrastructures. A single Access Point can support a small group of users and can function within a range of less than one hundred to several hundred feet. The Access Point (or the antenna attached to the Access Point) is usually mounted high but may be mounted essentially anywhere that is practical as long as the desired radio coverage is obtained.The wireless network, printers or other peripherals can be shared through a connected PC. The devices then communicate using a set of reserved high-frequency radio waves. An Access Point device connects to a DSL or cable modem and enables high-rate (broadband) Internet access for the entire network. Internet Internet is the large worldwide network of computes that facilitates data communication services, file transfer, electronic mail, World Wide Web and newsgroup with common protocols. WWW Figure 49: Tim Berners Lee http://www. psexam. com Pa ge 45 Contribution of Suresh Khanal for PS Exam The WWW is the brainchild of Tim Berners Lee a CERN who had the idea of creating an electronic web of research information.The web is currently the fastest growing Internet information system, with new resources being added regularly. The web relies on a set of protocols, conventions and software to operate. The web is a distributed system of delivering linked documents over the Internet. It is called a distributed system because information can reside on different computers around the world. Yet be easily linked together using hypertext. The web uses hypertext to create links from together using hypertext. The web uses hyperte3xt to create links from one resource to another. A hypertext link is usually displayed by highlighted and underlined text on the page. A hypertext link or hyperlink can also be graphic that acts as a button linking to another resource. IRCInternet Relay Chat (IRC) is a system for sending public and private messa ge to other users in â€Å"real time† – that is, your message appears on the recipient's screen as soon as you type it. Figure 50: Yahoo Chat Page 46 http://www. psexam. com Contribution of Suresh Khanal for PS Exam CU-SeeMe CU-SeeMe is a video conferencing system that allows users to send and receive sound and pictures simultaneously over the Internet. Figure 51: CU SeeMe http://www. psexam. com Page 47 Contribution of Suresh Khanal for PS Exam Figure 52: CU SeeMe Conferencing Telnet It is a protocol or set of rules that enables a computer to connect another computer in network. It is also known as a remote login. The telnet operates on client-server principle. Figure 53: Telnet Screen Page 48 http://www. psexam. comContribution of Suresh Khanal for PS Exam Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the Internet. The Ghoper was created as a piece of software to utilize some of the services that were becoming available on the Internet. HTML HTML stands for Hyper Text Markup Language. It is a standard coding language used to create all web documents (pages). http://www. psexam. com Page 49 Contribution of Suresh Khanal for PS Exam Browsers Figure 54: Different Browsers Logo A browser is the Internet Client software that acts as an interface between the user and the inner-workings of the Internet, specifically the WWW.We can find graphical web browser that displays multimedia content of text, graphics, audio and video, and text web Page 50 http://www. psexam. com Contribution of Suresh Khanal for PS Exam browser that displays only text. Internet Explorer, Netscape, Firefox are graphical web browser and Lynx is a well known text browser. Figure 55: Mozilla Firefox Figure 56: Netscape Navigator http://www. psexam. com Page 51 Contribution of Suresh Khanal for PS Exam Figure 57: Internet Explorer Figure 58: Google Chrome Page 52 http://www. psexam. com Contribution of Suresh Khanal for PS Ex am Dialup Connection Dialup connection is a means of connecting user to another computer (ISP) or a network such as the Internet with a modem equipped computer. IP AddressIP Address is an identifier for particular machine on a particular network. It is part of scheme to identify computers on the Internet. IP addresses are a set of numbers separated with periods. Figure 59: IP Address Structure Figure 60: IP Address and Subnet Mask http://www. psexam. com Page 53 Contribution of Suresh Khanal for PS Exam Domain Name A domain name is a way to identify and locate computers connected to the Internet. This is a text name of a computer in network or Internet. Domain names are converted to IP Addresses to locate computers and resources. URL URL stands for Uniform Resource Locator that identifies a particular Internet resource.URL help the user to locate web page, gopher service, library catalog and image or text file locations. URLs are the standard addressing system of the www. A complete URL provides the web client with all the information it needs to contact a server and make a request for information. URLs are divided into three basic parts: Example: http://www. psexam. com/download. htm a. Protocol (http://) – The information appearing before the colon in any URL indicates the type of information server or protocol. For example http:// indicates that the server to be connected is a www server. b. Domain name (www. psexam. com) – The second piece of information is the address of the server. In this example psexam. om is the name of the machine at PS Exam in world wide web. c. Resource name (download. htm) – The third piece of information is the path to the actual document requested. In this example the URL indicates that the document in the system directory and is named download. htm. Web Browsing or Surfing Browsing or Surfing is the process of visiting different web sites on the Internet hosted by various organizations. Page 54 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Search Engine The search engine is an interactive tool to help people locate information via the www and it is interface between the user and underlying database.The most popular search engines are Alta Vista Exite, Lycos, Yahoo! , Google, Ask etc. Figure 61: Yahoo, Ask, MSN, Google Search Engines http://www. psexam. com Page 55 Contribution of Suresh Khanal for PS Exam Figure 62: Alta Vista Search Engine Figure 63: Lycos Page 56 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Meta Search Engine A web meta searcher is a tool that helps users to locate information available via the World Wide Web. Web meta-serchers provide a single interface that enables users to search many different search engines, indexes and databases simultaneously. Some meta search engines are Albany. net, Clnet (search. om), Cyberland, Eureaka! , Savvysearch and so on. Figure 64: Meta Search Engine Internet Access We can access to the Inte rnet in one of two basic ways, dialing into an Internet Service Provider's (ISP) computer or with a direct connection to an ISP. Connecting to ISP by dialing their hunting number (phone number) is called Dial-up connection. We require a username, password and ISP's hunting number to configure Dial up Connection. http://www. psexam. com Page 57 Contribution of Suresh Khanal for PS Exam Extranet An Extranet is a type of Intranet (Internal TCP/IP Network) that has been selectively opened to a firm's suppliers, customers. IntranetAn intranet can be defined as a network connecting an affiliated set of clients using standard internet protocols, esp. TCP/IP and HTTP or as an IP-based network of nodes behind a firewall, or behind several firewall connected by secure, possibly virtual, networks. Web Index A web index is designed to assist users in locating information on the World Wide Web. Web indexes are also referred to as catalogs or directories. A web index collects and organizes resour ces available via the www. Some of the web indexes are Yahoo! , Megallan, Apollo etc. Figure 65: Web Index Page 58 http://www. psexam. com Contribution of Suresh Khanal for PS Exam HypertextThe hypertext allows for the integration of text, graphics, audio and video on a web pate. This can make it very easy to browse and very exciting to view. A web page may have colorful graphics integrated with textual information. Links on a web page may take you to other web pages, recorded sonds, or digital video clips. A single click on any hyperlink allows you to follow the link to the specified resource. Figure 66: Hypertext and Hyper Link Email Electronic Mail (Email) is one of the most popular & powerful communication tools on the Internet. It is an efficient and effective means of network communication. Email allows you to communicate with people across the globe via electronic media (computer). Email addressAn Email Address identifies a person and the computer for the purpose of exchangin g electronic mail message. Example: [email  protected] com http://www. psexam. com Page 59 Contribution of Suresh Khanal for PS Exam The email address contains three parts: a. Username – The admin in example. b. Domain name of organization – The psexam in example c. Top Level Domain – The com in example Signature Figure 67: Email Client Interface Inbox It is an element of Email Application which collects all incoming mails. Outbox It is an element of Email Application which collects all outgoing mails, if it is created and sent in offline. Page 60 http://www. psexam. com Contribution of Suresh Khanal for PS Exam TrashThis is an element of Email Application that holds all the deleted emails. Figure 68: New Email Message CC CC stands for Courtesy copy or Carbon Copy. It is an element of Email used to specify the additional recipients when the mail sent needs to be acknowledged to them. http://www. psexam. com Page 61 Contribution of Suresh Khanal for PS Exam BCC BCC stands for Blank Carbon Copy. It is similar to CC but the address of other receivers will not be shown to the receiver. Reply A reply is the response of an email you receive. After you read a mail and need to reply it you can use this feature. Forward A mail received can be sent to be other recipients known as forwarding. AttachmentsThe documents created in other applications such as word, excel can be sent along with the email message. These documents that are sent with email is known as attachment. Documents, audio/video files, Zip files etc. can be sent as attachment along with email message. Bounced When a mail sent can't reach to destination and returns back, this is known as bounced. This happens often when the recipient's address is wrong or the server at the recipient's end is down or recipient's inbox is full. Netiquette It is essential for all users on the internet to recognize that they are responsible for their own individual actions while using the net. Netiquette is simply the use of common courtesy and polite behavior while using the net. EmoticonsThe convention of expressing feeling or a joke in symbolic form by user in Email or Chatting for example 🙂 for smiling 😉 for winking 🙠 for frowning etc are emoticons. Page 62 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Figure 69: Emoticons http://www. psexam. com Page 63 Contribution of Suresh Khanal for PS Exam Wish you best of luck! Page 64 http://www. psexam. com Contribution of Suresh Khanal for PS Exam Visit New PS Exam Better Interface and greater possibility to share and interact. Don’t forget to subscribe! http://new. psexam. com ICT Trends – A Blog about blogging Trace the path of Suresh Khanal in blogging, promoting and monetize blogs. http://www. icttrends. com http://www. psexam. com Page 65

Thursday, August 29, 2019

Models for Strategic Planning Essay Example | Topics and Well Written Essays - 500 words

Models for Strategic Planning - Essay Example ss has given Apple a great deal of brand loyalty by important target markets as the company is able to develop meaningful and lasting interpersonal relationships with consumers (Goodson, 2011). The first strategic management model relevant to Apple, Inc. is Porter’s Five Forces model, a template by which an organization is able to understand the external market and the various threats that will impede or enhance future strategic success. This model recognizes five distinct threats, including threat of new competitive entrants, the level of bargaining power of consumers and suppliers, the degree of competitive rivalry in an industry, and threat of substitutes (see Appendix A). Apple utilizes this strategic management model to understand whether switching costs for consumers are high or low, which can lead to revenue declines when consumers select competing products (Porter, 2012). This model of strategic management allows the organizational leadership to examine whether new competitors in this industry will potentially seize market share and also serves as a template to observe the competitive marketing strategies being undertaken by main competitors. The Ansoff Matrix is a four-quadrant strategic management model that identifies opportunities for strategic market growth, including diversification, new market penetration, product development and market development (see Appendix A). This model is largely used to identify risks, allowing the business leaders to recognize where the organization is currently positioned and how it should expand to achieve the most effective revenue growth and competitive advantage. By understanding how to position the business for effective market growth, this model ensures proper allocation of financial and human capital resources in one quadrant area most likely to lead to profit gains. Both the Ansoff Matrix and Porter’s Strategic Management model recognize the importance of understanding the external market and competition to

Wednesday, August 28, 2019

Reading Assignment Example | Topics and Well Written Essays - 500 words - 5

Reading - Assignment Example He argues that the masks allow the women behind them express themselves without fearing the loss of their own dignity. The author interprets demoiselle’s African masks differently from other critics. He views them as offensive and at the same time attractive, the attraction is not because of the pictorial effect, but for the clients that source the service of these pictured women.   Cave however, dispute the notion that the unmasked faces of the three figures on the left side of the picture are not â€Å"syphilitic monsters† this is because  African masks are viewed as repellents. Those masked he views them as ridden with plaque while the unmasked as very healthy. Over the last decade the Les Demoiselles has been stated to evoke fearsome and awful â€Å"prototypical† reactions amongst men that view and experience its nature. This is due to its design of cubism and caricature. Walter Benjamin observes that the emergence of prostitution is a modern phenomenon expressed trough Picasso painting. And with this modernity prostitution and the trade of sex increase. The sex he says has been commoditized in utter disregard to the very important tenets of love. The disjunctive state of the Les Demoiselles made it receive less consideration for public display. This disjunctive state left historians debating on whether the art was actually finished or not. The author of this article uses previous critiques to bring the issues of race and class, citing that race and class differentiate the art by le demoiselles and Olympus. Chave then explains that the flattening of pictorial space is but a modernist phenomenal. Clements on the other hand, sees it as a result of the consolidation of the means of unique art. Under Steinberg eye, viewing Picasso’s Les Demoiselles, he sees the interior space of the art in compression, like the inside of compressed bellows. He describes the feeling as one of an inhabited pocket heated by a contracting

Tuesday, August 27, 2019

Discourse Analysis on a Movie Scene Essay Example | Topics and Well Written Essays - 1000 words

Discourse Analysis on a Movie Scene - Essay Example In this scene we meet Billy Beane asking â€Å"guys your still trying to replace Giambi. I told you we can’t do it. We can’t do it. Now what we might be able to do is recreate him. We create him in the adding field.† The situation is the Oakland Athletic offices during a roundtable meeting between him and a group of scouts. Billy, the speaker of this word, is chairing a meeting that is deliberating on the way forward for the team after losing some of its best players to other teams while still brainstorming on what to do to counter any adverse effects on their performance that might be prompted by the shoestring budget that they have been allocated. The conversation and particularly the grammatical moods in this scene undergo a number of changes. A good example of this can be seen in this particular point of the conversation; Billy: Giambi's on-base percentage was .477.Damon's was .324. And Olmeda's was .291. Add that up and you get (He points to Peter.) Peter: Y ou want me to speak? Billy: When I point at you, yes. Peter: Ten-nine Billy: Divided by three- Peter: Three-sixty-four. Billy: That's what we're looking for. And that's what we'll find. Three players whose average OBP is - Peter: Three-sixty-four. ... planation on how sabermetrics works in identifying new players appears very casual because according to him question on the same appears more or less like distraction, which is just an extension of the authority that he apply in his speech. Also, notice how the coherence and the flow of the discourse structure flows in this particular section. In fact, was it not for the unity of schema between the speakers, conversation breakdown would have been inevitable (Collins, 23). However, as the conversation progresses we see him adapting a more positive politeness which is probably due to both his scant understanding of its working and also his own uncertainty on its effectiveness (Lewis, 16). In this regard we have Billy speaking to the scouts in a manner that suggests that they have nothing to lose even if the strategy fails to deliver expected results. This does not however dampen the scouts from raising a multitude of objections all of which are informed by very valid issues in the whol e strategy, which explain why his calm and cool discourse begins showing signs of wearing out (Brown & Yule 41). Just have a careful look at this change of tone and attitude in this piece; He puts the first strip up. It reads: JEREMY GIAMBI Billy: Jason's little brother Jeremy. Keough: Oh, god. Billy that’s trouble Poloni: Billy, if I may, he's had his problems on the field -- not to mention his problems off the field -- not to mention he's getting a little thick around the middle -- there's the stuff with the weed. He's at strip joints†¦ Billy: His on-base percentage is all we're looking at now and he gets on base an awful lot for someone who only costs $285,000 a year. (Money Ball, DVD) In this particular section Billy also come out as a smarts and intelligent person especially when

Monday, August 26, 2019

Choose one topic from four Assignment Example | Topics and Well Written Essays - 5000 words

Choose one topic from four - Assignment Example In order to identify the objective of the GATT/WTO, it is revealed that GATT/WTO has concentrated towards international trade policies with the intention of ensuring the international trade agenda. At the same time, GATT/WTO has tried to develop the international trade security. In this regard, GATT/WTO has concentrated towards economic factors with the intention of ensuring the interdependent international trade policy. In this context, GATT/WTO has emphasised towards securing the supply of natural resources such as oil, food as well as human security among the global countries. Apart from this, GATT/WTO has concentrated on political framework to establish a supportive internal trade relation among the global players and to create a supportive business environment. Additionally, it can be claimed that for ensuring the economic factor and positive trade relations among the global players, WTO/GATT has concentrated towards world industrials systems and also tried combat with environme ntal threats such as climate change. Additionally, it can be claimed that the WTO/GATT has provided its superior effort with the aim of enhancing the international trade as well as investment environment (Falkner, 2011). The objective of this paper is to identify the economic theory underpinning contemporary international economic relations. At the same time, this particular assignment has concerned with the broad principles underpinning WTO law, and with an analysis of specific agreements and disputes. Moreover, the study intended to identify the contemporary legal problems of WTO. With the effect of globalization and internationalization, it is revealed that most of nations no longer discussed in isolation, rather it is revealed that larger numbers of nations have concentrated on economic and political chance for ensuring the international political relations. In this regard, it is witnessed that several

Sunday, August 25, 2019

Economic Considerations Should be the Basis of Tort Law Essay

Economic Considerations Should be the Basis of Tort Law - Essay Example Intentional torts on the other hand refer to harm or injury caused to a person or persons by the intentional misconduct of another or others. Theft, assault, arson and fraud are good examples of causes of intentional torts. Liability torts tend to focus on the damages resulting from a person's act rather than the intention. This means that if an action causes harm, the performer of the same is liable regardless of whether they exercised the expected degree of care or not or whether the action was maliciously done or was a result of an accident. The economic framework states that each society has laws, institutions, policies which lead to inequitable distributions of economic resources and burdens among members of any given society. These economic frameworks because human political processes which eventually lead to change, both across and within societies with time. Structurally these frameworks are beneficial as the economic distributions arising from them usually affect human live. The tort law has over time evolved in many jurisdictions to consider the legal and economical implications since these are the two most important aspects of the tort laws.One theory that has developed is the deterrence theory. This theory is most applicable in accident prevention. Essential the theory aims at reducing the occurrence of accidents by making those responsible for the accident bear heavy financial cost for their unsafe conduct. General and specific deterrence are handled quite differently in tort law. The tort law admonitory effect largely dictates on how specific deterrence goes. Insurance services, however, cushion the defendant from feeling the adverse effects of this approach to tort law. In traffic accidents for instance, the motorist who causes the accident hardly feels a pinch from the monetary damages they are required to pay as the same is catered for by insurance services. The deterrence is completely lost. Deterrence theory has been said to change the primar y focus of the tort law. The crafter of the tort law intended to reduce injury through deterring behavior likely to cause harm. a careful and critical analysis of the tort law however proves that the approach of deterring through burdening those who cause harm financially may not have the desired effect due to several factors. The approach assumes that in the normal conditions, people tend hold maximization of wealth as their primary goal. This may not be strictly true in all societies. The theory further makes the assumption that there exists a large psychological relationship between safer conduct and tort law as people will tend to behave more safely to avoid being subjected to tort fines. This assumption tends to suggest that people behave rationally and are guided by projected consequences of their actions. This is not the case on the ground. Studies have shown that a driver is more likely to commit an accident if they have been fined for an earlier accident. Human nature has b een described by many classical philosophers as being rebellious. Once a driver has caused an accident and has gotten away with just a fine, they do not improve their driving since their minds are unconsciously programmed that all they will have to do is to pay a fine if they cause an accident.2 The most fundamental question that ought to be asked when analyzing the deterrence theory is: Does tort law really deter? Economic analysis largely dominates legal discussion on tort law. This is in order because the economic aspect of the same cannot be

Social Behavioral Change of sugery drinks Essay Example | Topics and Well Written Essays - 250 words - 1

Social Behavioral Change of sugery drinks - Essay Example s the belief that sugary drinks cause diseases including obesity and diabetes and without exercising, may cause people to be fat due to the high calories and sugar. An attitude towards water and juice being healthy is that they have low sugar and calories content and are good for the body development and health. The perception on the importance to the community is that the issue affects the community and is very important because of the rampant effects of obesity and diabetes in recent years. This affects the community through a reduction in work force and use of money to cure these diseases caused by a preference to sugary and high calories content drinks. It is important to change the behavior to taking healthy drinks that have low sugar content to ensure the people are less affected by these lifetime diseases to live a better life. The type of message that could help them change their behavior is a message that highlights the dangers or unhealthiness of sugary drinks when taken by the members of the society. This message should highlight the effects of unhealthy drinks on the body, the measures to take to avoid these effects, and the kind of steps to take in changing the behavior albeit slowly. This will allow the people to understand the dangers and despite being difficult to change the behavior, follow the guidelines in the message until they are free of habits of taking sugary

Saturday, August 24, 2019

Drug trafficking and drugs Essay Example | Topics and Well Written Essays - 4000 words

Drug trafficking and drugs - Essay Example mechanisms in some countries, the presence of willing buyers and sellers, the strong cartels and finally the inherent problem of being a transnational crime. A drug has been described as anything that has a biological effect on a species, and that can be used for treatment, recreation, or for preventive measures. Most drugs that are prohibited are leisure drugs which tend to affect the brain of the user, and the prohibition is to encourage the promotion of responsible behavior among the youth who would take the drug to forget about problems. There are many forms of drugs, and there is usually a law in every country that regulates the use of drugs and identifies which drugs have been abused. Drug abuse is using drugs for non-intended purposes. There are many ways in which a person can gain access to drugs, but most drugs require the prescription of a qualified doctor (Lupton, 2012). The prescription has to be made after a diagnosis, so the disease or ailment can be effectively treated. There are also drugs that the law is lenient on; some of these drugs can be purchased over the counter. These are drugs for common ailments which do not have any adverse effect on the body, even when they are not taken in exact dosages. These are drugs for headaches, stomach aches, and for malaria in tropical countries. The danger with over-the-counter medication is that users are liable to develop a tolerance if the medication is overused. Finally, another form of drug is the prohibited drug, which can only be distributed through drug tra fficking and illegal sales (Hucklesby, 2010). Drug trafficking is the illegal transfer of a prohibited drug from one place to another. This is known as black market cartel whereby there are people who have dedicated their lives for the cultivation and production of illegal drug from countries that allow the growth and distribution of the drugs. In 2003 alone, the drug market contributed up to about 1% of the world economy, by producing

Friday, August 23, 2019

Assess Friedman's assertion that business does not have social Essay

Assess Friedman's assertion that business does not have social responsibilities other than to maximise profit - Essay Example world on whether sustainable business and corporate social responsibility are a distraction to the sole purpose of which is to act in the best interest of the shareholders (Cosans, 2009:392). In other words, when companies act responsibly, they risk foregoing revenue and minimising profits at the expense of a positive reputation in society. Milton’s assertion is supported by the diagram below that states a company’s profitability is achieved where Total Costs = Total Revenues. In his article, Friedman sought to understand the statement that ‘corporate executives have a social responsibility as businesspersons’ (Makower, 2006). This statement meant that corporate executives were not to act in the best interest of their employers or stakeholders. He gave several examples that supported his argument. He questioned whether it is right for companies to avoid increasing the prices of goods to contribute to the social good of curbing inflation or that they employ the unemployed in a move to reduce poverty or that they set aside a huge amount of their profits to minimise pollution contrary to the business objectives. He argued that such measures would turn companies’ executives into civil servants. Corporate Social Responsibility and ethical business practices are considered strategic business moves in the contemporary world. This is because they contribute positively to the company’s reputation and the public is willing to buy goods from a company that considers their needs. Ignoring social and environmental issues can be damaging to companies in the current times. Companies that pollute the environment risk poisoning the public who are discouraged from buying goods from them. Furthermore, companies that raise the prices of goods to increase their profits may end up losing their customers to their competitors. Finally, companies that exploit their workers experience high employee turnover rates and increased training costs. However, the current globalised

Thursday, August 22, 2019

International Markets Essay Example for Free

International Markets Essay Once SAB Miller has decided to establish itself in the global market, it becomes necessary for the marketing manager to study and analyze the various options available to enter the international markets and select the most suitable one. The selection of the entry mode is one of the most significant decisions.SAB Miller takes in the process of internationalization, as it involves commitment of resources with long-term financial and structural implications. Mode of entry may be defined as an institutional mechanism by which a firm makes its products or services available to consumer in international markets. Root (1994) defines the market entry for international markets as a comprehensive plan which sets forth the objectives,goals,resources,and policies that guide a company’s international business operations over a future period long enough to achieve sustainable growth in world markets. FACTORS AFFECTING THE SELECTION OF ENTRY MODE EXTERNAL MODES MARKET SIZE:Market size is one of the key factors an international marketer has to develop to keep in mind when selecting an entry strategy.Countries with a large market size justify the modes of entry with investment,such as wholly owned subsiaries or equity participation. MARKET GROWTH:Most of the large,established markets,such US,Europe and Japan,have more or less reached a point of saturation for consumer goods such as automobiles,consumer electronics.Therefore,the growth of markets in these countries is showing a declining trend.For instance,the overall growth in most of the US and European market is about 7% while emerging markets like India and China is over 30% which indicates tremendous market potential in time to come. Therefore,from the perspective of long-term growth potential such as China,India,Thailand,Indonesia etc.These markets are also termed emerging markets. GOVERNMENT REGULATIONS:The selection of market entry modes to a great extent affected by the legislative framework of the overseas market,the government of most of the Gulf countries have made it mandatory for foreign firms to have local partner.For instance,the UAE is a lucrative market for Indian firms but most firms operate there with a local partner. Trade barriers such as ecological regulations and local content requirements also affect the mode of entry.It has been a major reason for  increased foreign investment in Mexico,which is a part of the North American Free Agreement(NAFTA),in order to cater to the US market. LEVEL OF COMPETITION:Presence of competitors and their level of involvement in an overseas market is another crucial factor in deciding on an entry mode so as to effectively respond to competitive market force.This is one of the major reasons behind auto companies setting up their operations in India and other emerging markets so as to effectively respond to global competition. INTERNAL MODES COMPANY OBJECTIVES:Companies operating in domestic markets with limited aspirations generally enter foreign markets as a result of a reactive approach to international marketing oppurtunities.In such cases,companies receive unsoliated orders from acquaintances,firms and relatives based abroad,and they attempt to fulfil these export orders.This casual approach to entering international markets by way of producing in the homemarket and exporting overseas translates into regular exporting if the firm has positive experience in its exports operation. AVAILABILTY OF COMPANY RESOURCES:Venturing into international markts needs substantial commitment of financial and human resources and therefore choice of an entry mode depends upon the financial strength of a firm.It may be observed that Indian firms with good financial strength have entered international markets by way of wholly owned subsidiaries or equity participation. LEVEL OF COMMITMENT:In view of the market potential,the willingness of the company to commit resources in a particular market also determines the entry mode choice.Companies need to evaluate various investment alternatives in a particular market also depends upon the way the company is willing to perceive and respond to competitive forces. INTERNATIONAL EXPERIENCE:A company well exposed to the dynamics of the international marketing environment would be at ease when making a decision regarding entering into international markets with a highly intensive mode of entry such as joint venture and wholly owned subsidiaries. Below are different modes of market entry and they include: EXPORTING Exporting is the simplest method of entering a foreign market.It is the  process of sending goods or services from country to other countries for use or sale there. By exporting to a foreign country,a company is able to enter this country without actually establishing itself in the country.The company must simply manufacture products that can be shipped to the foreign country.Export activities may take several forms,including indirect exporting,direct exporting,and intracorporate transfers. Direct exports represent the most basic mode of exporting, capitalizing on economies of scale in production concentrated in the home country and affording better control over distribution. Direct export works the best if the volumes are small. Types of direct exporting are: Sales representatives that represent foreign suppliers/manufacturers in their local markets for an established commission on sales. Provide support services to a manufacturer regarding local advertising, local sales presentations, customs clearance formalities, legal requirements. Importing distributors purchase product in their own right and resell it in their local markets to wholesalers, retailers, or both. Indirect Exporting Indirect export is the process of exporting through domestically based export intermediaries. Indirect methods of exporting requires less marketing investment, but, as the exporter has no control over its products in the foreign market, the company lose substantial control over the marketing process. Types or methods of indirect exporting are: Filling orders from domestic buyers who then export the product Seeking out domestic buyers who represent foreign customers Exporting through an Export Management Company (EMC) Exporting through an Export Trading Company (ETC) INTRACORPORATE TRANSFERS A third form of export activity is the intracorporate transfer,which has become more important as the sizes of MNCs have increased.An intracorporate transfer is the sale of goods by a firm in one country to an affiliated firm in another. LICENCING License is a contract to identify what is being licensed: trademarks, patents, designs, copyrights or software. Licensing allows rapidly entering into the chosen foreign market and reduces capital requirements to establish manufacturing facilities overseas. Your contract does not violation of the host countrys existing laws and regulations.a licensor in the home country makes limited rights or resources available to the licensee in the host country. The rights or resources may include patents, trademarks, managerial skills, technology, and others that can make it possible for the licensee to manufacture and sell in the host country a similar product to the one the licensor has already been producing and selling in the home country without requiring the licensor to open a new operation overseas. The licensor earnings usually take forms of one time payments, technical fees and royalty payments usually calculated as a percentage of sales. As in this mode of entry the transference of knowledge between the parental company and the licensee is strongly present, the decision of making an international license agreement depend on the respect the host government show for intellectual property and on the ability of the licensor to choose the right partners and avoid them to compete in each other market. Licensing is a relatively flexible work agreement that can be customized to fit the needs and interests of both, licensor and licensee. Franchising The franchising system can be defined as: â€Å"A system in which semi-independent business owners (franchisees) pay fees and royalties to a parent company (franchiser) in return for the right to become identified with its trademark, to sell its products or services, and often to use its business format and system. Compared to licensing, franchising agreements tends to be longer and the franchisor offers a broader package of rights and resources which usually includes: equipment, managerial systems, operation manual, initial trainings, site approval and all the support necessary for the franchisee to run its business in the same way it is done by the franchisor. In addition to that, while a licensing agreement involves things such as intellectual property, trade secrets and others while in franchising it is limited to trademarks and operating know-how of the business. TYPES OF FRANCHISES There are three available types of franchises.The first type is the dealership,a form commonly found in the automobile industry.Here,the manufacturers use franchises to distribute their product lines.These dealership act as the retail stores for the manufacturer.In some distance,they are required to meet quotas established by the manufacturers,but as is the case for any franchise,they benefit from advertising and management support provided by the franchisor.The most common type of franchise is the type that offers a name,image and method of doing business,such as McDonald’s,KFC,Holiday Inn. There are many of these types of franchises,and their listings,with pertinent information can be found in various sources. A third type of franchise offers services.These include personnel agencies,income tax preparation companies and real estate agencies.These franchises have established names and reputation and methods of doing business.In some distances,such as real estate,the franchisee has actually been operating a business and then applies to become a member of the franchise. CONTRACT MANUFACTURING Contract manufacturing refers to a situation where a business will engage the services of an independent party to perform a specified duty for the business. In terms of manufacturing, contract manufacturing refers to a situation where a manufacturer will engage the services of an independent party to perform a specified job. There are various reasons for this type of engagement by manufacturers, all of which involve the maximization of profit. The process of contract manufacturing also has some negative considerations that include the risk of uncertainty and lack of control over the process. WHOLLY OWNED SUBSIDIRIES Entering a foreign market with a wholly owned subsidiary involves creating a local firm without the aid of a local partner. There are two ways of doing this. The first is through what is called greenfield development. This involves creating a new organization in the foreign country from the ground up. The second method is what is referred to as brownfield development. This involves purchasing an existing company in a foreign country. Brownfield developments can be beneficial because they offer local expertise, but they can be difficult because there may be resistance from those in the company  to new ownership. JOINT VENTURE A market entry option which the exporter and a domestic company in the target country join together to form a new incorporated company. Both parties provide equity and resources to the JV and share in the management, profits and losses. The JV be limited to the life of a particular project. This option is popular in countries where there are restrictions on foreign ownership, eg. China and Vietnam PIGGYBACKING Piggyback marketing – low cost market entry strategy in which two or more firms represent one another’s complementary (but non-competing) products in their respective market. Or, in other words, it is an arrangement, where two or more companies help each other to market their products, where the products have to be complementary and not competing against each other. LEVEL OF INVOLVEMENT IN INTERNATIONAL MARKETS No direct foreign marketing: A company in this stage does not actively cultivate customers outside national boundaries; however this company’s products may reach foreign markets. Sales may be made to trading companies as well as foreign customers who come directly to the firm. Or products may reach foreign markets via domestic wholesalers or distributors who sell abroad without explicit encouragement or even knowledge of the producer. As companies develop web sites on the internet, many receive orders from international Web surfers. Often an unsolicited order from a foreign is what piques the interest of a company to seek additional international sales. Infrequent Foreign marketing: Temporary surpluses caused by variations in production levels or demand may result in infrequent marketing overseas. The surpluses are characterized by their temporary nature; therefore sales to foreign markets are made as goods are available, with little or no intention of maintaining continuous market representation. As domestic demand increases and absorbs surpluses, foreign sales activity is withdrawn. In this stage, little or no change is seen in company organization or product lines. However, few companies today fit this  model because customers around the world increasingly seek long term commercial relationships. Further, evidence exists that financial returns from initial international expansions are limited. Regular Foreign marketing: At this level, the firm has permanent productive capacity devoted to the production of goods to be marketed in foreign markets. A firm may employ foreign or domestic overseas intermediaries or it may have its own sales force or sales subsidiaries in important markets. The primary focus of operations and production is to service domestic market needs. However, as overseas demand grows, production is allocated for foreign markets, and products may be adapted to meet the needs of individual foreign markets. Profit expectations from foreign markets move from being seen as a bonus to regular domestic profits to a position in which the company becomes dependent on foreign sales and profits to meet its goals. International marketing International marketing is the export, franchising, joint venture or full direct entry of a marketing organization into another country. This can be achieved by exporting a companys product into another location, entry through a joint venture with another firm in the target country, or foreign direct investment into the target country. The development of the marketing mix for that country is then required international marketing. It can be as straightforward as using existing marketing strategies, mix and tools for export on the one side, to a highly complex relationship strategy including localization, local product offerings, pricing, production and distribution with customized promotions, offers, website, social media and leadership. Internationalization and international marketing meets the needs of selected foreign countries where a companys value can be exported and there is inter-firm and firm learning, optimization and efficiency in economies of scale and scope. The firm doe s not need to export or enter all world markets to be considered an international marketer. Global Marketing Global marketing is a firms ability to market to almost all countries on the planet. With extensive reach, the need for a firms product or services is  established. The global firm retains the capability, reach, knowledge, staff, skills, insights, and expertise to deliver value to customers worldwide. The firm understands the requirement to service customers locally with global standard solutions or products, and localizes that product as required to maintain an optimal balance of cost, efficiency, customization and localization in a control-customization continuum to best meet local, national and global requirements to position itself against or with competitors, partners, alliances, substitutes and defend against new global and local market entrants per country, region or city. The firm will price its products appropriately worldwide, nationally and locally, and promote, deliver access and information to its customers in the most cost-effective way. The firm also needs to underst and, research, measure and develop loyalty for its brand and global brand equity (stay on brand) for the long term. b)OULINE ADVANTAGES AND DISAVANTAGES OF EACH STRATEGY. Advantages of direct exporting: -Control over selection of foreign markets and choice of foreign representative companies. -Good information feedback from target market. -Better protection of trademarks, patents, goodwill, and other intangible property. Potentially greater sales than with indirect exporting. Disadvantages of direct exporting: Higher start-up costs and higher risks as opposed to indirect exporting; Greater information requirements; Longer time-to-market as opposed to indirect exporting. Advantages of the international franchising mode: -Low political risk -Low cost -Allows simultaneous expansion into different regions of the world -Well selected partners bring financial investment as well as managerial capabilities to the operation. Advantages of indirect exporting -Its an almost risk-free way to begin. -It demands minimal involvement in the export process. -It allows you to continue to concentrate on your domestic business. -You  have limited liability for product marketing problems theres always someone else to point the finger at! -You learn as you go about international marketing. -Depending on the type of intermediary with which you are dealing, you dont have to concern yourself with shipment and other logistics. Disadvantages of indirect exporting: -Your profits are lower. -You lose control over your foreign sales. -You very rarely know who your customers are, and thus lose the opportunity to tailor your offerings to their evolving needs. -When you visit, you are a step removed from the actual transaction. You feel out of the loop. -The intermediary might also be offering products similar to yours, including directly competitive products, to the same customers instead of providing exclusive representation. -Your long-term outlook and goals for your export program can change rapidly, and if youve put your product in someone elses hands, its hard to redirect your efforts accordingly. Advantages of licensing -Obtain extra income for technical know-how and services -Reach new markets not accessible by export from existing facilities -Quickly expand without much risk and large capital investment -Pave the way for future investments in the market -Retain established markets closed by trade restrictions -Political risk is minimized as the licensee is usually 100% locally owned -Is highly attractive for companies that are new in international business. Disadvantages of licensing -Lower income than in other entry modes -Loss of control of the licensee manufacture and marketing operations and practices leading to loss of quality -Risk of having the trademark and reputation ruined by an incompetent partner -The foreign partner can also become a competitor by selling its production in places where the parental company is already in. -investment to attract prospects and support and manage franchisees. Advanatges of Frachising -Franchising provide knowledge of the local markets. A franchise provides franchisees with a certain level of independence where they can operate their business. A franchise provides an established product or service which may already enjoy widespread brand-name recognition. This gives the franchisee the benefits of a pre-sold customer base which would ordinarily takes years to establish. A franchise increases your chances of business success because you are associating with proven products and methods. Franchises may offer consumers the attraction of a certain level of quality and consistency because it is mandated by the franchise agreement. Disadvantages of franchising: -Franchisees may turn into future competitors. -Demand of franchisees may be scarce when starting to franchise a company, which can lead to making agreements with the wrong candidates -A wrong franchisee may ruin the company’s name and reputation in the market -Dependence on franchisee. -Potential conflicts with franchisee. Advantages of Joint Venture: -Accessing additional financial resources Asset sharing is one of the best advantages about joint venture. Since, you are able to use larger funds to facilitate the production and operation of projects and products, you facilitate growth. In other words, you increase profit margin and increase your revenue potential. -Sharing the economic risk with co-venturer It pays to have someone sharing the responsibility with you in case you end up in deep troubles. This is also true with joint venture. Since you are sharing assets, the risk of losing a great deal of money is divided to both parties. -Widening economic scope fast – Building reputation is often difficult, not to mention time consuming and expansive. At a joint venture, you are able to widen your economic scope without spending too much money and waiting for a long time. Tapping newer methods, technology, and approach you do not have – In order to grow and expand, you need resources in the forms of methods, technology, and approach. For that matter, it would help a lot if you will be able to partner with an entity that presently has the things you don’t and the things you need. Joint venture opens up the venue for such need. -Building relationship with vital contacts – Aside from economic territory, another advantage of joint venture is the ability to give you business relationships with vital contacts. This is just like automatically befriending your partners influential friend that can give you access to lots of things such as business opportunities and a pass to vital information. Disadvantages of Joint Venture: -Shared profit – Since you share assets, you also share the profit. The profit of both parties usually depends on the size of the share to the venture or may be defined on the agreement. -Diminished control over some important matters Operational control and decision making are sometimes compromised in joint ventures. Since there is an agreement that divides which one will take over a particular operation, the other may not be satisfied with how the things are worked out with another. This leads us to another disadvantage of a joint venture. -Undesired outcome of the quality of the product or project – Since one party may not have control on the supervision of the production or the execution of one part of the system, this can happen. This often leads to disputes and lawsuits. To avoid this, both parties agree on specific details about the whole operation process. -Uncontrolled or unmonitored increase in the operating cost – Again, defined control over the operation may lead to this disadvantage. It is important therefore to make sure that all things are clarified on the paper before singing in the joint venture agreement. Advantages of contract manufacturing -Low financial risks contract manufacturing allows companies to save costs by manufacturing a particular item at a cheaper rate than what it would cost them If they decided to undertake the manufacturing process themselves. it allows the company doing the outsourcing to shave some time off the whole process, giving them quicker returns and turnovers. Where a company is less effective than another in manufacturing an item, contract manufacturing will allow it to concentrate on that in which it is the most efficient. Disadvantages of contract manufacturing -Reduced learning potential -Potential public relations problems may need to monitor working conditions. -The company doing the outsourcing faces some degree of risk if it fails to do its research properly. This is because outsourcing the manufacturing to the wrong company could end up costing the company more, rather than less, if the outsourced company fails to deliver as expected. Advantages of wholly owned subsidiaries On the positive side, a wholly-owned subsidiary that does its business in a location different from the parent companys is able to remain in its locale. With the business world spanning so many countries, this can serve as a great advantage in international situations. Name recognition is another positive reason for maintaining a wholly-owned subsidiary. If a particular brand name is well known and popular, the parent company has no reason to absorb the subsidiary entirely. Wholly-owned status allows the subsidiary to retain its name brand, thus avoiding hindering its sales. Diversity for the parent company is another perk created by maintaining a wholly-owned subsidiary. This status allows the parent company to branch out into different products and markets, building strength in diversification. Disadvantages of wholly owned subsidiaries a wholly-owned subsidiary are more business oriented. The holding company runs a definite risk in assuming control of another company while allowing its management to continue to operate independently of the parent companys. The level of investment and allocation of funds and resources required is also very high. A parent company must spend a great deal of time and money to smoothly integrate the new subsidiary.All of these factors require commitment and dedication on the part of the holding company and willingness to form that partnership on the part of the subsidiary. Advantages of piggybacking reduced financial costs limited risk quick, easy access to the market. Generally, the supported company can make immediate profits on the new market. The SME can, thus save time (3-5 years), compared to the normal length of time necessary to establish itself ; reduced logistical and administrative operations ; benefit of the brand image that the supporting company brings to its products ; immediate availability of a sales force structure ; excellent market knowledge of the supporting company. Disadvantages of piggybacking weak motivation of large companies to become supporters ; difficulty in finding partners offering a compatible product and distribution network ; risk of market loss, which can be reduced due to the complementarity of the product, and commercial follow-up between the partners ; occasional difficult relations because of differences in size or culture ; risk of lack of mutual confidence and of lack of involvement ; risk of conflict of interest (e.g. local agents could systematically put the interests of the supporting company before those of the supported company) ; occasional very rigid requirements and conditions of access to the commercial networks of large companies. These conditions can be qualitative (e.g.: product quality) and quantitative (minimum level of annual turnover, high commissions, etc.). Macro Environmental Influences That Can Affect SAB Millers SABMillers origins date back to the foundation of Castle Breweries in 1895 as to serve a growing market of miners and prospectors in and around Johannesburg, South Africa. Two years later, it became the first industrial company to list on the Johannesburg Stock Exchange and the year after (1898) it listed on the London Stock Exchange. From the early 1990s onwards, the company increasingly expanded internationally, making several acquisitions in both emerging and developed markets. In 1999, it formed a new UK-based holding company, SAB plc, and moved its primary listing to London. In May 2002, SAB plc acquired Miller Brewing, forming SABMiller plc. It is very important that SAB Miller considers its environment before going into international the market. In fact, environmental analysis should be continuous and feed all aspects of their planning to go international The macro-environment refers to the major external and uncontrollable factors that influence an organizations decision making, and affect its performance and strategies. These factors include the Political (and legal) forces, Economic forces, Sociocultural forces, and Technological forces. These are known as the PEST factors. PEST Analysis Political Factors: The political environment revolves around the current government in a particular country in which SAB Miller manufactures or trades, and also laws/legislation operate or within their home market as well as overseas. If their government is socialist then perhaps there is a policy to tax more and to invest in the public sector. On the other hand if SAB Millers have a more conservative or Republican government then the free-market is left to take control, taxation is less and there is often a smaller public sector. The political arena has a huge influence upon the regulation of the business, and the spending power of consumers and other businesses. SAB Miller must consider issues like: †¢How stable is the political environment in that country? †¢Will government policy of that country influence laws that regulate or tax SAB Miller? †¢What is the governments position on marketing ethics? †¢What is the governments policy on the economy? †¢Does the government have a view on culture and religion? †¢Is the government involved in trading agreements such as EU, NAFTA, ASEAN, or others? Economic Factors The economic environment is a direct influence on all businesses. Obviously if you are studying marketing there is a huge element of economics within the topic itself, and you should be no stranger to the principles of economics. As we saw from our lesson on the marketing environment there is a macro environment, and internal environment and the microenvironment. More specifically youll be at looking elements such as where a business is in terms of the current business cycle, and whether or not they are trading in a recession. SAB Millers marketers need to consider the state of a trading economy in the short and long-terms. This is especially true when planning for international marketing. You need to look at: 1. Interest rates. 2. The level of inflation Employment level per capita. 3. Long-term prospects for the economy Gross Domestic Product (GDP) per capita, and so on. Sociocultural Factors The Sociocultural environment embodies everything which is social and cultural within a nation or society. There are plenty of examples of society and culture on the marketing teacher website, so we recommend that you go to our lesson store and look through some of the consumer behaviour pages. Some notable examples would include the influence of learning, memory, emotion and perception, motivation, lifestyle and attitude and consumer culture. Have a look at the six living generations in America, social environment and class, the impact of your birth order on how you behave as a consumer and take a look at the eight types of online shoppers. In a more general sense consider influences such as the increase in life expectation of Western consumers, and demographics which is the study of populations. The social and cultural influences on business vary from country to country. It is very important that such factors are considered. Factors include: 1. What is the dominant religion? 2. What are attitudes to foreign products and services? 3. Does language impact upon the diffusion of products onto markets? 4. How much time do consumers have for leisure? 5. What are the roles of men and women within society? 6. How long are the population living? Are the older generations wealthy? 7. Do the population have a strong/weak opinion on green issues? Technological Factors Technological factors are a multifaceted influencer. Lets just think about the sorts of technology that you come in touch with almost daily. Smart phones such as Android and iphone are now common – all – garden, and we are used to being able to access information and communication technology instantly no matter where we are. During studies or at work we have access to information on quick PCs and over the Internet, with faster broadband connections arriving in many parts of the world. Technology also surrounds business processes. As we saw from our lesson on the functions within an organisation all departments use information technology or technology in one form or another. Our manufacturing operations will use technology to produce goods and services. Our logistics and warehousing functions use forklifts and Lorries as well as order tracking technology and software. The customer service department will use communication technology to talk to customers but will also have access to internal systems, such as technology to simplify credit control and stock control for example. There are many, many more examples of technology. Technology is vital for competitive advantage, and is a major driver of globalization. Consider the following points: 1. Does technology allow for products and services to be made more cheaply and to a better standard of quality? 2. Do the technologies offer consumers and businesses more innovative products and services such as Internet banking, new generation mobile telephones, etc? 3. How is distribution changed by new technologies e.g. books via the Internet, flight tickets, auctions, etc? 4. Does technology offer companies a new way to communicate with consumers e.g. banners, Customer Relationship Management (CRM), etc?