Wednesday, April 29, 2020
The Thread of History
Any society can be compared to a living organism that gets born, grows and changes according to the time, environment and processes that go on internally. Any group of people has their own beliefs and regulations which are backed up by history, traditions and culture.Advertising We will write a custom research paper sample on The Thread of History specifically for you for only $16.05 $11/page Learn More In any society there are people who get their opinion widely known and they are sometimes called visionaries. For the past twenty years, society has experienced many rapid changes, and thinkers and writers often offered their opinions, as to what is going on under the surface and where the present world is going to be in the future. All societies have intricate traditions and structures with work and leisure time. One of the oldest activities that people are engaged in is sports or any kind of physical games. Steve Craig, in his book titled ââ¬Å"Sports and Games of the Ancientsâ⬠looks at how societies view games and how they are comprehended personally and socially. One of the important points is that each society has a form of games that are played publicly, for peopleââ¬â¢s entertainment. Socially, it says several things, as the population is very multifaceted. Primarily, it is that people need a form of entertainment that can be watched live. People are interested in seeing other fellow human beings in action and the key feature of the sport which is its unpredictability makes the viewing even more exciting and desired. The unique nature of games is very original because it cannot be fully predicted and people are drawn to that (Craig 1). Comparing to the television, where people are playing out formed scripts, games are much different. Even though previously, in the early days, there were games and the need for them, peopleââ¬â¢s interest and commercialization have grown immensely at the onset of television and oth er mass media. This led to people wanting more and expecting sights that were non-existent before. It begs a question of why do people really need entertainment and what would happen without it. It is a part of human soul and emotional existence, as without it, people would have work and duties that are a part of the routine and not feelings. A close connection to the pleasures of life is explored by Deborah Blum in her book ââ¬Å"Love at Goon Park: Harry Harlow and the Science of Affectionâ⬠. Just as people need mass and public entertainment, they need affection and love. This is one of the starting points in life and it very much sets up the rest of a personââ¬â¢s development. It is interesting that the way a person will feel about themselves, others, their ability to be in public places, feel confidence and connection to people; all these things get influenced by how the infant and child are treated.Advertising Looking for research paper on social sciences? Let's se e if we can help you! Get your first paper with 15% OFF Learn More She mentions Harry Harlow who did experiments with monkeys and was rather successful. The experiments proved that baby monkey sometimes needed affection and ââ¬Å"warmthâ⬠of their mother more than food. This and other experiments, as well as the views of Deborah Blum reiterate the fact that people need love and any society must have healthy and loving individuals for the whole nation or country to prosper (Blum 15). In a work titled ââ¬Å"The Pyrotechnic Insanitarium: American Culture on the Brinkâ⬠, Mark Dery describes a new age of life and society. The twenty first century has brought many changes and the focus can be seen on the rapid development of entertainment but also, on the negatives and short backs of society. The conspiracy theory is mentioned, and people start to realize that in the fast moving world there are things that could be unseen and under the surface. It is somewhat rebated by saying that in reality, there are no conspiracies and the politics are very much openly viewed but it does not seem convincing. The entertainment and pleasures of people are going hand in hand with the horrors that human mind offers. With the increasing crime rates and technological advancement, people are receiving more information and problems to deal with. The heights of human brain power are allowing predicting that the future will bring even more challenges and people will face something that has never been seen before (Dery 30). It is very true that human mind is still a mystery and it is quite difficult to see what people are capable of. Alfred Lubrano discuses another part of the changing world in a book titled ââ¬Å"Limbo: Blue-Collar Roots, White-Collar Dreamsâ⬠. He especially points to the division between people socially and personally. For as long as there has been humanity, people have had different duties according to own views but also to the world around th em. The division between the working and the middle class is what Alfred Lubrano talks about. He describes the qualities of people who are born to be a part of the middle class and that there is no way of becoming anything else. It touches upon the moral issue of a person desiring what they want to do in their life but at the same time, creating opportunities to achieve whatever it is they strive to reach. Education is mentioned as an important part of the process in becoming successful and this reflects in the scope of bigger things in society. This is becoming very true in any part of the world, as the evolution of technologies and workforce is delving into a different sphere, uncommon to the previous century. The world is becoming business oriented and there are many individuals who consider it their lifeââ¬â¢s calling to become a part of it (Lubrano 10).Advertising We will write a custom research paper sample on The Thread of History specifically for you for on ly $16.05 $11/page Learn More Vivian Sobchack takes a look at the modern society and examines the future in the work titled ââ¬Å"Carnal Thoughts: Embodiment and Moving Image Cultureâ⬠. The world is acquiring so many angles and perspectives that it is becoming harder to keep track of. She refers to ââ¬Å"Hansel and Gretelâ⬠in relation to the fact that without the ââ¬Å"breadcrumbsâ⬠people might become lost (Sobchack 13). This representation is meant to show that people need guidance. The future world has many mysteries and people need organization and each otherââ¬â¢s help to find the way. The world is becoming divided into spaces that are foreign and sometimes, unequal. Even though this is an age of knowledge and peopleââ¬â¢s rights, there is still much to learn, especially in the relationship between people and different groups. Vivian Sobchack qualifies people as being lost in the world, not knowing what to do and how to adjust to the fast moving pace. There starts to evolve a sort of separation between the world and the masses, and an individual is not aware of what is expected of them regarding themselves and society. People start to create false realities and whatever they think is right, eventually becomes empty space and people are forced to re-think their goals and dreams. Another look at the modern world and the way it is being run is taken by Linda Seger in a book ââ¬Å"Jesus Rode a Donkey: Why Republicans Donââ¬â¢t Have the Corner on Christâ⬠. The author compares peopleââ¬â¢s religious beliefs to the political system and what is expects and required of people (Seger 7). Many are faced with sacrifices that have to be made for the system to prosper. But there is also a different side of the coin, where others get rich at the expense of people who are fulfilling their duty to be a good citizen. Linda Seger reinforces that in order for people to go into the future, they must be understanding and kind to each other. The simplicity of their actions and straightforward manner will create best conditions of life for all human beings. The new age has given people power to vote for their leaders and enjoy the rights and freedoms that are naturally given but is unclear what these freedoms can sometimes bring. All the writers and thinkers have a very common theme that centers on people which is their needs and the evolving society. People want to be happy and keep finding ways of how to enjoy the life. Even though the majority bases their existence on goodness, there are those who want to use the population and gain more than is needed. This leads to an important question of the changing world and the expectancies that people have towards it. It must be just and equal to all and this should be the motto of the future. Works Cited Blum, Deborah. Love at Goon Park: Harry Harlow and the Science of Affection. New York, United States: Basic Books, 2011. Print.Advertising Looking for research paper on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Craig, Steve. Sports and Games of The Ancients. Westport, United States: Greenwood Publishing Group, 2002. Print. Dery, Mark. The Pyrotechnic Insanitarium: American Culture on the Brink. New York, United States: Grove Press, 2000. Print. Lubrano, Alfred. Limbo: Blue-Collar Roots, White-Collar Dreams. Hoboken, United States: John Wiley Sons, 2010. Print. Seger, Linda. Jesus Rode A Donkey: Why Republicans Donââ¬â¢t Have the Corner on Christ. Avon, United States: Adams Media, 2010. Print. Sobchack, Vivian. Carnal Thoughts: Embodiment and Moving Image Culture. Los Angeles, United States: University of California Press, 2004. Print. This research paper on The Thread of History was written and submitted by user Black P1ge0n to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Friday, March 20, 2020
Cultural profile of China The WritePass Journal
Cultural profile of China Cultural profile of China Chapter 11.0 Introduction1.1 Cross-cultural management1.2 Definition of culture1.3 Characteristics of cultureChapter 22.0 Cultural profile of China 2.1 Geert Hofstedes five cultural dimensions2.1.1 Power distance2.1.2 Individualism2.1.3 Masculinity2.1.4 Uncertainty avoidance2.1.5 Long-term orientation in ChinaChapter 33.0 Challenges and recommendations expand business to ChinaChallengeRecommendation3.2 Differences of business cultureChallengeRecommendation3.3 Guan Xi (Relationship)Recommendation3.4 Government RegulationChallengeRecommendation3.5 Legal EnvironmentChallengeRecommendation3.6 Local CompetitorsChallengeRecommendationChallengeRecommendation3.8 Business PartnerChallengeRecommendationà Chapter 44.0 ConclusionRelated Chapter 1 1.0 Introduction As an American Chinese, the cultural profile of a country that I am going to choose is China in this assignment. This is because the rate of GDP growth was strong in China in 2010 with an estimated 10% year-on-year growth. This means that it is benefits to the investors who are going to invest or expand business in China. Before U.S. companies decided to expand business into China, they must understanding the cultural profile of China in order to make profit on their business. To be clear about the Chinas cultural profile, Hofstedes five dimensions of culture are being applied into this assignment. Every country has their cultures. Therefore, here are the explanation about subject of cross-cultural management, explanation of culture, and characteristics of culture to provide a theoretical background for this report. 1.1 Cross-cultural management Basically human races came with different background. Cultural background. When people from one cultural background, meet, understand, interact and deal with people from other cultural background. That is a cross-cultural management. In recent years, with the increase in globalization and diversity in the workplace, cross cultural management has become an important element of organizational life. Cross-cultural management is the study of the behavior of the people in organization located in cultures and nations around the world. It focuses on the description of organizational behavior within countries and cultures, on the comparison of organizational behavior across countries and cultures, and, perhaps most importantly, in the interaction of peoples from different countries working within the same organization or within the same work environment (Nancy J. Adler, 1983). 1.2 Definition of culture Culture has been defined in a number of ways, but most simply, as the learned and shared behavior of a community of interacting human beings(J., Useem, R,1963). According to English Anthropologist Edward B Taylor, culture is that complex whole which includes knowledge, belief, art, law, morals, custom, and any other capabilities and habits acquired by man as a member of society. Culture gives us an identity which makes us unique and different from people of other cultures. The culture of the society becomes the dominant culture and those of the immigrants from the subculture of the community, when people with different cultures migrate and settle in another society. People usually settle in other nations imbibe the new culture; while at the same time strive to preserve their own. (Deepa Kartha, 2000-2011). 1.3 Characteristics of culture There are different characteristics or qualities of cultures throughout the world. First characteristic of culture is that culture is learned. Culture is not inherited; it is acquired through learning and experience. People can learn behavior patterns including language and many other attributes if they grow up with that particular culture. The second characteristic of culture is that culture is shared by a group of people. We can consider a thought or an action as a culture if it is commonly shared and believed or practiced by a group of people. It can be considered as their culture when a group of individual share and believe with each others. The third characteristic of culture is that culture is cumulative. The knowledge of culture can be passed from one generation to another generation. As time passed by, more and more knowledge is added in the particular culture. It may work out solutions of problems in the life as the particular culture goes with time. The fourth characteristic of culture is that culture is dynamic. This is the characteristic of culture that stems from the cultures cumulative quality. As there is no culture remains on the permanent state, culture is considered as changing frequently as added in new ideas and new techniques to change the old ways. The fifth characteristic of culture is that culture gives us a range of permissible behavior patterns. Culture has structure and is integrated as a change in one part will bring changes in another. It tells us how to dress based on gender, statue, occasions, and many more. Chapter 2 2.0 Cultural profile of China China is located in eastern Asia. China is formally known as ââ¬ËThe Peopleââ¬â¢s Republic of Chinaââ¬â¢ (PRC). As the worlds population is approximately 6.7 billion, China represents a full 20% of the worlds population so one in every five people on the planet is a resident of China. Chinas population growth has been somewhat slowed by the one child policy, in effect since 1979 (Matt Rosenberg, 2010). Confucianism is a system of behaviors and ethics that stress the obligations of people towards one another based upon their relationship. The basic tenets are based on five different relationships in China which are ruler and subject, husband and wife, parents and children, brothers and sisters, finally, friend and friend. Confucianism indicated the duty, sincerity, loyalty, honor, filial piety, respect for age and seniority (Mandarin Today, 2005). 2.1 Geert Hofstedes five cultural dimensions In this part, Geert Hofstedes cultural dimensions have been used to introduce cultural profile of China. He had analyzed about the way of culture influence working relationships in a multicultural environment along five dimensions which are power distance, individualism, masculinity, uncertainty avoidance, and long-term orientation in China. Below is the diagram of USA vs China by hofstedes five dimensions. Figure 1: USA vs China by Hofstedes five dimensions Source: geert-hofstede.com/hofstede_dimensions.php?culture1=95culture2=18#compare According to figure 1, China has long-term orientation in the highest ranking factor and lowest individualism than United States. And also, it has high in masculinity, power distance and low in uncertainty avoidance culture compared to United States. 2.1.1 Power distance Power distance refers to the level of acceptance by a society of unequal distribution of power in institutions. The extent to which subordinates accept unequal power is socially determined. United States scores around 40 with low ranking power distance in figure 1. It indicates that there is a greater equality between societal levels, including government, organizations, and even within families in United States. This orientation reinforces a cooperative interaction across power levels and creates a more stable cultural environment (Geert Hofstede,1967-2009). However, the power distance remains high in China which scores around 80 in the diagram above. This means that the Chinese society is characterized by a very high level of inequalities in power and wealth, and that these are accepted by the individuals (Carletti Mathilde, 2008). Also, the individual representing the authority in any organization (family, undertaking, etc.) is highly respected, because that individual has the dec ision-making power. In China, there is a strong differentiation of roles, competences and respect due, according to the individualââ¬â¢s position on the hierarchic scale. In China, individuals with power enjoy greater status and privilege than those without power, and subordinates are less likely to challenge or express disagreement with superiors (Matthew Earnhardt, 2009). In other words, the rank structure is clearly delineated between management and subordinates, and disagreement with management is frowned upon. Information control is one of the predominant sources of power in China. Critical information in China is selectively preserved instead of being distributed widely. It is quite obvious in e-government practices in China where branches of government purposely hold back some information and obstruct large-scale information sharing in order to keep their power and interests (Lucian E. Marin, 2010). 2.1.2 Individualism Individualism describes the relationship between the individual and the immediate community. The high individualism ranking for the United States (88) indicates a society with a more individualistic attitude and relatively loose bonds with others (Kimberley Roberts Stephen Taylor, 1998-2008). However, low individualism is important for learning the Chinese way of thinking which scores 20 in figure 1. Interpersonal relationships and group affiliation are focused in China (Matthew Earnhardt, 2009). They will act with good manner at all the times and will not do anything that caused other people embarrassment in the public. It can be observed by the use of silence in structure meetings. A person will remain quite although a person à disagrees with what another person says, rather than disagree publicly,à This is giving respect to the other person, while speaking up would make both parties lost reputation. In China, a collectivistic culture, individuals are willing to sacrifice personal goals for the good of the group (Matthew Earnhardt, 2009). This loyalty is promoted across all aspects of Chinese culture, including the workplace. Loyalty is a highly regarded trait in a society where relationships are strong and is, therefore, it is importance to most of the Chinese people (Simon Kriss, 2006). This links back to their high long term orientation above. The collectivist thinking of a culture, China tends to be extremely parochial, with people and businesses not changing suppliers lightly for fear of the impact on relationships (Simon Kriss, 2006). So, it is a good idea to select a good strong partnership that has potential to last a long time when doing business with others. 2.1.3 Masculinity Masculinity refers to the role share between men and women, and the differences of equality that exist between the two genders. The highest the score the more assertive and competitive the culture (Masculine), the lowest the score the more modestly and caring (Feminine). The United States has score around 72.5 and China has score around 75 in the figure1. Therefore, China has high masculinity in their culture and has a strong role differentiation between men and women. Men hold most of the responsibility and power positions. The role of women in China is very limited, even though it seems to be taking more importance in the cities and more developed regions (Carletti Mathilde, 2008). Especially in the rural areas their status is inferior. The country is far from setting up men-women parity. This is the one dimension in which China most aligns itself to the rest of the world, and yet, it is often totally missed by businessman of United States, who think that the women in China are, fo r the most part, ignored (Piseth 2009). 2.1.4 Uncertainty avoidance Uncertainty avoidance refers to the extent to which people in a society feel threatened by ambiguous situations. Uncertainty avoidance has many implications for leadership characteristics and leadership traits such as habitual, formal, cautious, and orderly is perceived as an outstanding form of leadership in some countries while a negative form in others (Matthew Earnhardt, 2009). A high ranking of uncertainty avoidance dimension in United States (45) is indicate that society has fewer rules and does not attempt to control all outcomes and results while doing business. It also has a greater level of tolerance for a variety of ideas, thoughts, and beliefs (Simon Kriss, 2006). But, China presents a low degree of acceptance of uncertainty which scored 30 is a characteristic of a society that does not try to take control of the future, and that is not afraid of unforeseen situations. It is also characteristic of a society that is more tolerant towards opinions, behaviors that are differ ent from its own, and changes (Carletti Mathilde, 2008). It is a more meditative society which does not feel the need of controlling its environment. 2.1.5 Long-term orientation in China The fifth dimension, long-term orientation specify the extent to which a culture is devoted or not devoted to ââ¬Å"traditional, forward thinking valuesâ⬠(Hofstede, 2001). High or short-term orientation predispose countries to resist it or accept to change. In countries in which people display high long-term orientation suggests that the country has long-term commitments to tradition and fosters a strong work ethic as a plan for future rewards outweigh the need for rapid change. Cultures with a short term orientation focus on values such as ââ¬Ësaving faceââ¬â¢ and respecting tradition while cultures that focus on the longer term tend to focus on thrift and perseverance. The US has a scored around 29 in this dimension. China has the highest ranking for long-term orientation which scored around 110 in figure 2.1. China slow and steady wins the race for business deals compare with United States. China is having a building strong, reliable, lasting relationship which is the key for the Chinese (Eric Yee, 2008). A certain amount of trust must be gained before any decision is met. The Chinese prefer to deal with people they knew and trusted before starting to conduct business with others (Vincent Lo, 2011). It may take three to four times the length of time to finish the business deal after finish meeting. So if do not come to a fast agreement, dont be discouraged, make the client feel comfortable and show patience to Chinese. The Chinese never like to rush into things. The company has to maintain the relationship if want to do more business with Chinese. Chapter 3 3.0 Challenges and recommendations expand business to China To be successful in the Chinas market, the United States companies need to have an understanding of major practical challenges they may face in China. China has a different culture because the way they implement their business tends to differ from US. China market is a complicated filed to those companies that are familiar to the Chinese culture would be able to move around in the market. Hence, cultural differences are always the barriers between foreign companies and the locals. For a successful partnership, both parties need to learn more about each other culturally and their business styles (Starmass International 2001-2011). Below are the challenges that foreign company may face in China. 3.1 Communication Challenge There will be a failure business if misunderstanding happened when communicate with Chinas companies. Therefore, language barrier is the biggest challenges for many U.S. companies when they want to enter into the China market. Although there are an increasing number of Chinas people learning English, but there still have majority of locals are unable to communicate in English and also many foreigners are unable to speak Chinese. The way they written and verbal English spoken is totally different with Western countries. Recommendation Individuals need to understand what the other party wants before start to conduct business with Chinese people. By this, they have needed to spend money for hiring person who can carry the responsibility to interpret and as an effective translator to communicate with the locals. Individuals are required to provide their interpreter the relevant information which can effectively execute their task in work. It is better to spend some time to discuss with the interpreter what an individual want to achieve out before each of the meeting to avoid any negotiations. 3.2 Differences of business culture Challenge Foreign investors unfamiliar with the business culture in China are the second major reasons that they failed to enter the China market. To be succeeded in the China, the U.S. investors cannot simply apply their own business models into China market. Due to the culture difference, many of them do not always adapt to accept Chinas standard. As Chinese are very respectful to others, they tend to carry out their business according their beliefs and values. Chinese would like to seek others opinions and advices before making any decision but that take longer time. If the investors do not respect Chinese, there will not have deal between both parties. Hence, U.S. investors need to respect them while talking or having meeting with Chinese. Recommendation The U.S. companies should take more time to do research on the Chinas business culture with fully understanding it. This action may help them to do business with Chinese people in the long-run. The investors have to understand that the Chinese are not indecisive but rather respecting the view of others in doing business. Hence, they must be more patient when dealing business with Chinese. But once they decide to move ahead, the investors must get ready for it because Chinese may expected to proceed it immediately. 3.3 Guan Xi (Relationship) Challenge China likes to build strong relationship in their business compare to United States. It is an important element in achieving successful business in China. However, many U.S. investors may think that it is wasting time in socializing but to the Chinese, it is all the part of the business. Chinese more prefer to work with someone who more familiar with them to reduce disagreement and conflict. Thus, they need to develop wide interpersonal relationship with Chinese. Recommendation The company would benefit in many different ways with buildup good relationship in China. First, a trust would be able to establish between U.S companies and locals. Thus, they would be very comfortable working with each other. Second, good relationship may helps to resolve any problems if a company would to encounter any problems in any field. The investors must learn how to socialize like sing karaoke, having drinks and so on. It is important when entertain or having fun with Chinese. It does not matter whether you are a gifted singer or not. Besides that, the investors must learn how to drink. If you hear ganbei that means Chinese expected you to empty your cup and have fun with them. There are a good places and better ways to build up relationship with them. 3.4 Government Regulation Challenge Chinas government placed heavy restriction on foreign investment in the retail sector. Under the restriction, investors must make concessions on the size and independence of their business to access Chinas market. However, the investors must go through stricter licensing procedures compared to other domestic competitors. They could apply approval only from the government to establish business in China. The investors must first obtain a business license from MOFCOM and then registration approval from the State Administration for Industry and Commerce (SAIC). The licensing process is also opaque and can be slow and inconsistent, adding extra costs and burdens for the investor. In recent years, pushed by foreign business communities and governments, MOFCOM and SAIC have delegated certain approval authorities to local governments and streamlined the licensing processes for foreign retail investors (US-China Business Council (2010). Recommendation A strong government relationship remains an important factor to do business successfully in China as Chinas government plays an important role in influencing market movement and administering foreign investments. There are unnecessary procedures and delays if the foreign companies have good relationship with the government officials. This is because China is not a free-market economy and it has an authoritarian communist government. While they employ some of the same terms and strategies as full-fledged capitalist markets, political control is everywhere (Ehow, 2011). 3.5 Legal Environment Challenge Before enter into China market, U.S. investors have to be familiar with the China market laws. The china laws may be frustrating as they seem to be very complicated. In China, the wording of contract may look relatively vague compared to what you are used to. If any dispute arises, consider the contract as a guide, but do not expect it to offer much protection legally. Recommendation Interacting with the locals would allow a better understanding of the Chinese culture and laws and it will be useful in doing business. Hence, a lot of foreign companies would undertake a local company as partner to help them with the registration process and negotiation with the Chinese. 3.6 Local Competitors Challenge One of the challenges that U.S. investors need to be faced are the local competitors. However, one must not overlook small local companies in the China market as the Chinese have a very strong national pride thus they tend to be more supportive towards their local products. Recommendation U.S. companies would really need to do a detailed market and consumer research if they want not only enter the China market but also market their products to the local market. The investors can also seek for the outside help when trying to get into the China market. The Chinese culture would help tremendously when approaching familiar with the China market as they would know the tactic on how to handle any problems. 3.7 Local Pride Challenge In addition, U.S companies do not really know what are the preferences and needs of the Chinese consumers in China. Chinese consumers often prefer to deal with local, Chinese-run companies rather than western enterprises. This also extends to favored treatment from political officials, and it can influence bids on projects and other ventures. Carrying out a consumer research may not be very useful as the information collected may not truly reflect the true responses as the Chinese may not be comfortable giving out information to foreign researches. Recommendation There are normally more reliable if companies engage a local research company to carry out the market analysis research. As low cost of material and labour in China, the products that the U.S. companies offers must at the cheaper level to compare with the local products. 3.8 Business Partner Challenge It is not an easy task for foreign investors to find a good business partner to build up business. A good business partner shares your vision and enthusiasm, bringing expertise in the areas in which you are inexperienced. Its someone who understands the legal and financial responsibilities endemic to sharing a business. Most importantly, its someone with whom you get along. Recommendation Most of the U.S. companies are not well in network of China because they are unable to find reliable business partners in China markets and meet a lot of bureaucratic problems as they are unfamiliar with the laws of China. Therefore, it is important to choose a right business partner. He or she as a business partner in China must be able to speak well in both English and Mandarin. Having enthusiasm for the companys products, strong relationship with import and export agencies and also appropriate storage of the companys products are the factors as a reference for the foreign company to choose a good business partner. In addition, a strong and stable financial background is the most important factor for the company to make sure individuals are able to be a responsible business partner with them. à Chapter 4 4.0 Conclusion In this section, I would like to conclude that it is important to understand others cultural profile before start doing business with them. Geert Hofstede five cultural dimensions in China which are long-term orientation, individualism, masculinity, power distance, and uncertainty avoidance are important elements for the foreign investors to understand cultural profile of China. Once they started to understand the Chinese culture, the foreign investors can have a good cooperation with the locals and succeed to develop their enterprise in China. Maintaining good relationships in China is very important to help foreign investors to success in the China market. Chinese are making business deal depend on how much they see your personal relationship with them. Being respectful and do not make others lose their reputation in the public are the ways to build relationship with Chinese. Besides that, collectivist dimension of Chinese culture where the group is more important than the individual. From this assignment, I learned how it is essential to understand the different culture in an unfamiliar country. And also, I had understand to the Chinese culture or ways to doing things in their business dealing. Besides that, communication tools and skills to face the challenges are learned through this assignment.
Wednesday, March 4, 2020
Tent Poles and Tentpoles
Tent Poles and Tentpoles Tent Poles and Tentpoles Tent Poles and Tentpoles By Maeve Maddox A reader wonders about a Hollywood term new to him: Have been seeing Hollywood recently using the expression tent poles, but its not clear what theyre trying to express. Can you enlighten us? Literally, a ââ¬Å"tent poleâ⬠is a long stick that holds up a tent roof. A good rule of thumb is to fold the tent about the same length as theà tent poles before you roll it up.à A palatka is a hut with aà tent-poleà all the way to the top. I have seen tentpole used figuratively to refer to a tall person, the way Hermia uses maypole in her harangue against tall Helena: How low am I, thou painted maypole? Speak. How low am I? I am not yet so low But that my nails can reach unto thine eyes. The OED offers an example of tent-pole used as an epithet in the list of compound words in the entry for tent: His ugly, unmarriageable tent-pole of a daughter. Tentpole in the context of entertainment was new to me. The OED does not include a definition for this use, but Merriam-Webster does: tentpole noun: a big-budget movie whose earnings are expected to compensate the studio for its less profitable movies. In some contexts, a tentpole movie is one that will make money with tie-in merchandise. In television programming, a new, untried show is scheduled to follow a popular show- the tentpole- in an effort to keep viewers watching. Tentpole movies are usually equated with high-budget blockbusters: Universal Pictures has done away with the tentpole blockbusterthis year, at least Paul Greengrass has defended Hollywoods high stakes tent pole movie strategy, saying that big budget blockbusters are essential for the movie business. For the last five years or so, the dominant studio strategy for combatting lower attendance and moviesââ¬â¢ declining entertainment market share has been a focus on bigger movies ââ¬â the ââ¬Å"tentpolesâ⬠, in industry parlance, ââ¬Å"four-quadrantâ⬠movies that appeal to every stereotypical member of the stereotypical family, targeting the largest possible audience. An article in Forbes, however, speculates that less expensive films may be able to function as tentpoles: We may have reached the point where cheap comedies are the new tentpoles.- ââ¬Å"Neighbors May Represent The Future Of Tentpoles,â⬠Forbes In Hollywood jargon, a tentpole is a movie of any kind that can be expected to garner earnings beyond initial ticket sales, usually in the form of sequels and the licensing of related merchandise. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:50 Idioms About TalkingDisappointed + PrepositionConfusion of Subjective and Objective Pronouns
Sunday, February 16, 2020
Responding to a Bioterrorist Attack from the Department of Health and Essay
Responding to a Bioterrorist Attack from the Department of Health and Human Services - Essay Example (Task Force on Bioterrorism makes plans to educate doctors, public. 2001). As the researchers at the Johns Hopkins Bloomberg School of Public Health concluded, another important consideration in managing the public education on such possible bioterrorist attacks should be that public panic is rare and preventable. They also point out that the public is an active participant in responding to such an attack. Civic organizations like churches, charity trusts, and other associations may be effectively used to distribute information and medications, and to educate the public on such potential threat. The biodefence planners and leaders should continually educate the public on preparedness and response plans for bioterrorism. (Hopkins study dispels ââ¬Ëpanicââ¬â¢ myth and suggests ways to involve public in response to a bioterrorist attack. 2001). Thus, the education of the public must be directed towards the real awareness among people trusting their potentials in involving in such efforts. A. Botulinum toxin is one of the most poisonous substances in the world. Ironically, it has also positive uses such as in the treatment of painful muscle spasms and as a cosmetic treatment. No wonder, its use is a reason for confusion to the public. The use of BoTox as a bio-weapon has been a serious reason for worries for many a nation, especially the US. There is a view that discounts its use as a bio-weapon due to the limitations in concentrating and stabilizing the toxin for aerosol dissemination. Contrary to this view, botox can cause disruption and distress among people. (Botulinum toxinas a Biological weapon. 2001). There are many such instances before us. This weapon ââ¬Å"causes botulismââ¬âa potentially fatal disease with symptoms that include severe paralysis of the limbs and respiratory muscles.â⬠(Schwartz, Mark 2006). Terrorists can use botox for
Monday, February 3, 2020
Humana Insurance Hispanic Market Essay Example | Topics and Well Written Essays - 1000 words
Humana Insurance Hispanic Market - Essay Example Speaking of various backgrounds, Humana is also servicing the individuals or customers from varied ethnic backgrounds including the Hispanics. With Hispanics constituting a sizable portion of the population in US, organizations operating in various sectors including the ones in the Insurance sector like Humana are giving extra focus to this section of the population. Although, Humana is carrying out customer friendly strategies in regards to Hispanics, specifically the strategy of localization or customization, when viewed in an overall manner, it is not doing it effectively, and so if it can optimize or improve that strategy, it can give Humana the competitive advantage in relation to the Hispanics Market. According to US Census Bureau, more than 50 million Hispanics currently live in the United States, comprising about 17 percent of the total U.S. population. (Black, 2013). Although, Hispanics are a varied ethnic population, differing in the aspects of country of origin, race, etc., they speak the common language of Spanish. Their population is on the rise and that is making impacts on the health sector as well. ââ¬Å"They are the fastest growing racial or ethnic population in the United States today and are expected to comprise approximately 30 percent of the total US population by 2050.â⬠(Black, 2013). Despite witnessing fast growing rates, the Hispanics continue to face discrepancies regarding health coverage as well as care, thereby making them ââ¬Å"the highest uninsured rate among racial/ethnic groups, with nearly one in three lacking coverageâ⬠(Black, 2013). These facts about the Hispanics, apart from reflecting how they are not completely covered under insurance , also brings out the key point of how they are a strong prospective customer base for the insurance companies including Humana. In that direction, Humana has
Saturday, January 25, 2020
Mobile Ad Hoc Networks MANET
Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The Mobile Ad Hoc Networks MANET Mobile Ad Hoc Networks MANET Abstract Mobile Ad Hoc Network (MANET) is a wireless network capable of autonomous operation. MANET routing has no fixed base station and hence nodes in the network are mobile and self configuring. A MANET is characterized by multi hop routing so that nodes are not connected to layer 2 but can communicate through layer 3 routing. In MANET every node is a potential router and the topologies are dynamic due to node mobility. This paper presents a comprehensive study of four MANET routing protocols ADOV (Ad Hoc On demand Distance Vector), DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing) and TORA (Temporally Ordered Routing Algorithm). For experimental purpose six scenarios have been considered. These 6 scenarios are generated with 3 different traffic parameters namely high resolution video, light HTTP and high FTP load. This traffic was passed individually on to each scenario on 2 different node setup (20, 100 nodes). Finally, graphical evaluation of each protocol was based on t heir performances which are calculated on the basis of performance metrics used which are End to end delay, Network load and Throughput. Chapter 1: Introduction This chapter demonstrates a brief overview of the project. Now days in our day to day life we see so many changes around the world accelerating with respect to technology. In this technical world Internet has brought revolution in communication media. Communication is said to the method of information exchange either between two people or between two end users (in terms of computers). Communication is said to be done when a file or a message is passed over the medium among two people. Here the usage of internet comes into existence. Internet can be used as shared medium for information interchange between users around the globe. This information can be of any type: Short Message Mail File transfers Video Audio etc When these types of information are passed among internet, it uses either the wired media (for connecting users locally) or wireless media (for connecting locally or globally). When this information exchange is done the packets carry that information through the protocols available for the respective media to deliver the packet to the destination. This is the process of information exchange. In this paper, similar work is experimented over MANET (Mobile Ad Hoc Networks) [chapter 2] for information exchange using four different protocols. This setup was done internally over a virtual setup of networks using OPNET modeller 14.5. So the investigation of protocols is done based on the performance of each protocol. In the scenarios, each protocol is passed with 3 different types of traffics namely: High FTP load, High Resolution Video and Light HTTP Browsing. This thesis concludes the performance of four routing protocols towards through the end. Keywords: MANET, AODV, OLSR, TORA, DSR, OPNET Modeler 14.5. 1.1 Organisation of Thesis: This thesis gives an overview of how the project is organised with respect to each chapter. The very first chapter is Introduction of the Thesis, which shows a project idea and the tasks to achieve the goals. Second chapter Literature Survey which contains the studies and work which has been done previously by other authors on the related topics with the parameters used by them for their work. The scenarios used for my work are related somewhere by overall different results are taken with different parameters used. Again the classification and the background work of MANETs are explained following the comparison of MANET routing protocols. The parameters and scenarios used for my work are explained briefly with the simulation setup in chapter 3, Implementation. The results of the simulations and experiments performed are explained in chapter 4, Performance Evaluation and Design. The results are taken graphically which helps in comparing the results for routing protocols against the pe rformance metrics used to investigate the performance. The graphs are explained briefly in chapter 4. The results gathered with the help of scenarios in chapter 3 are concluded with the future work on the routing protocols in chapter 5, Conclusion and Future Work. Finally the supported documents for the project which helped in making the simulation and project start up is kept in Appendix A. And finally chapter 6 shows all the sources and references used for the thesis to help in achieving all the supported information and work. 1.2 Objective of Work The main objective of this work is to study the different routing protocols, which are developed for Mobile Ad hoc networks (MANETs), and to compare the different routing protocols by using simulation tool OPNET Modeler 14.5. As a part of the work four major routing protocols OLSR, AODV, DSR and TORA have been selected and carried out the simulations for comparing the performance of these protocols. Three performance metrics delay; Network Load and Throughput are used to compare the performance of the routing protocols. Objective 1 To get a clear understanding and functioning of different routing protocols for Mobile Ad hoc networks. This objective could be achieved by reading and understanding the various papers available on routing protocols of Mobile Ad hoc networks. Objective 2 To do a literature survey of previous work done on MANET Routing Protocols so that something different and efficient simulation could be introduced. For this objective different articles and papers published has been studied thoroughly and analysed from websites, books and all relevant resources available. By going through literature survey on routing protocols, the desired simulation environment and setup have been introduced with different simulation parameters. Literature Survey is explained in chapter 2. Objective 3 Conducting an experiment and collecting the output data: This objective has been achieved by designing the appropriate networks with the appropriate simulation parameters and running a simulation for different protocols for different performance metrics. After conducting the simulation the output data have been collected graphically. The results are shown graphically and explained in the project in chapter 4. Objective 4 Analyzing the output data and ending up with summary and the conclusion: The results have been studied and explained in chapter 4. After studying the simulation results conclusion has been made with some future work which can be done further. Conclusion of the project and future work is explained in chapter 5. Chapter 2: Literature Survey 2.1 Introduction This chapter gives a brief introduction about the work done in previous related papers and reports related to this project. In addition, the introduction to the routing protocols and their classification with respect to routing is demonstrated. This chapter is a short review of the previous work done and the additional objectives regarding routing protocols. The four MANET routing protocols are selected to evaluate the performances; they are OLSR, AODV, DSR and TORA. The further implementations of these protocols are explained later in this thesis (Chapter 3). MANET is an infrastructure less network which provides the freedom to the nodes to be free to move anywhere in the network (Stefano Basagni, 2004). 2.2 Related Work on Routing Protocols: As we see from (Mahmoud), analysis of two reactive protocols DSR and TORA were done using OPNET Modeller. In their simulation scenario, they used 50 wireless devices in each scenario with constant traffic parameters and protocol specification settings. They have passed FTP traffic of 1000 bytes making it constant throughout the simulation. Evaluation of these protocols was done based on the performance metrics used which are: Delay, Data dropped, Throughput and media access delay. Their simulation results shows that DSR performance was better than TORA in terms of throughput as TORA produces less throughput due to additional overhead used for path creation and path maintenance. At the same time TORA minimizes communication overhead by localization which results in less delay when compared to DSR as there is no such mechanism in DSR. Similarly, from (Zukarnain, 2009) they have done evaluation of MANET routing protocol AODV in order to establish the connection between the nodes since the mobile node can change their topology frequently. So their study was carried on different mobile node movement pattern which are: Random Waypoint Mobility Model, Random Walk Mobility Model and Random Direction Mobility Model. In order to evaluate the performance of the protocol with these node movement patterns, performance metrics used were Routing overhead, Throughput and Packet delivery ratio. They used 2 simulation scenarios where in the first scenario comparison was made on different mobility model varying different number of nodes 5, 10, 15, 20, 25 with fixed speed of 15m/s and in other case comparison was made to evaluate the protocol on different mobility models with varying speeds 5, 10, 15, 20 m/s and 50 nodes as constant all through. They concluded that Random waypoint model is best for AODV compared to other mobility m odels as the protocol produces highest throughput than compared to others. Other related work from (Nyirenda, 2009) gives the similar working of MANET routing protocols AODV, OLSR, DSR and TORA on OPNET 14.5. Their work carried out for study the performance of the four protocols by different performance metrics which are: Network load, Packet delivery ratio, Packet end-to-end delay and Throughput. The simulation setup which was implemented on 6 different scenarios where the traffic passing on to the network was ranging from low to high network load, nodes changing from 5, 20, 50 and with speed ranging from 10 m/s to 28 m/s. Mobility model used in this was Random waypoint model for mobility pattern. They conclusions included in their work showed that OLSR performed better compared to the other protocols as it has a bad routing overhead and hence it is well suited for large and complex networks. So apart from routing overhead OLSR performed better but with routing overhead DSR is better. But when in small network AODV is much better compared to other protocol s. So finally, proactive protocols perform well in high capacity links whereas reactive protocols perform better in low capacity networks. From another paper (Maltz, 2001), we see that working on demand routing protocols in MANET was done where DSR protocol was compared to other on demand protocols like AODV, TORA and DSDV. Simulation setup carried is represented in tables below: With the above simulation setup the protocols were evaluated based on the performance metrics used which was Packet delivery ratio, Routing overhead, Path optimality and lower speed of nodes. The conclusions showed that DSR performed well when referred to packet loss rate and routing over head is concerned. Of all careful implementation done with all the above parameters tested on the experiment test beds DSR out performed in every case scenario used when compared all the other protocols used in this setup. 2.3 Background Work A network can be said as association of different systems or organizations where sharing the information can be done collectively. Whereas in computing terms it can be simply defined as a group of computers connected together logically to share information like printing, faxing, etc The network can be divided into 2 types based on their working behaviour. They are: Infrastructure network: These networks are used where the topology is said to be limited and there is a fixed point like base station (generally referred as router) to transmit signals and the end points which are connected to base station communicate with each other devices on the network switching from one base station to another. When a node moves out of range within its network, then it is said to be connected to another base station range where this process is referred as handoff. We can often see this type of mechanisms in infrastructure and fixed or wired networks. Infrastructure less network: These networks are a typical type of networks where there are no such fixed nodes or topologies on the network and the end pints or devices on the network are free to communicate with each other devices on the network as each device on the network behave themselves as routers and encourages communication process all over the network. By this we can say that wireless technology is a promising technology that can tolerate the information exchange worldwide. In the last decade we can also see the constant increase in the growth wireless technology issues, one of which being mobile devices such as laptops, cell phones, PDAs etc Ad hoc networks are also the part of this type of network. Mobile Ad hoc network is a new technology emerged with the hypothesis of wireless networks. These networks are very typical and do not use any fixed infrastructure for communication process. The nodes connected in these networks are wireless links which are mobile in nature and communicate with each other mobile node in the network with radio transmission and topology is said to establish by the intermediate nodes on the network which are helpful for communication process. As there are no fixed infrastructure and limited topology constraints the nodes on the network are free to join and leave the network and this is possible as the nodes on the network are mobile. Due to this random movement of the nodes in the network the topology of the network changes dynamically. Due to this change protocol must be able to acclimatize with these movements and are also responsible to maintain the routes of the information travelled without disturbing network connectivity. This concept of ad hoc network allows each node on its network to act like router, resulting in the flow of information exchange with multi hop routing. These types of networks are widely used in military and other rescue applications. (Saadawi, 2003) 2.4 Routing: Routing is the process of moving the data from one place of the network to another. The one end should be the source which intends to transfer the data to the destination (other end). The concept of routing has been there since 1970s but it has caught the move in 1980s. In 1970s networks were simple and today there are large scale networks in existence. To move the data from one host to another at least one router is required in the network. Router has all the information regarding hosts in the network and it can manipulate the best possible route as well. (Javvin, 2004) Routing takes place at Layer 3 in OSI 7 layer Model. Some of the protocols at layer 3 are IP and IS-IS. These protocols carry the data between source and destination along with their addresses in the data packet. Routing involves two basic activities; Path Determination and Switching. These two activities are capable to determine the optical routing path and to transfer the data packets through internetworking. This is called Switching. Switching can still be easy where as determining the reliable path is difficult. Path Determination: Routing make use of the different routing protocols to determine the best possible path to deliver the data. Routing protocols use the metric to calculate which the best possible path to accomplish the task is. The metric used could be path bandwidth, path length, delay etc. to determine the optimal path. To determine the path in the network, routing algorithms maintains the routing tables which are used to store the routing information about the network. Routers communicate with each other in order to maintain their routing tables which make communication easier and faster. Routing information can vary according to the routing algorithm used for the process. (Cisco, 2010) Switching: Apart from path determination, router shows one more activity; Packet Switching. Switching simply means forwarding the required data from one interface to the another in order to reach the destination. In this case, the data to be forwarded is packet. The next interface address is decided by using the destination address present in the packet. Though the nodes know the next hop address, they still need to know how to use it. So for that reason they use routing tables. The routing table throws the packet away when the destination is unknown. But when the destination is known routing table posses all the interface information forming the route to the destination. (2006) The next hop address could be another host or either it could be a router. According to ISO developed hierarchical terminology, the systems which have the capability to forward the data from the source to the destination are called Intermediate Systems (IS) and the systems which fails to do so are called as End systems (ES). When it is a router it follows the same procedure as this one, and if it is a host it simply forwards the packet. In packet switching, the Layer 3 address of the source and the destination remains the same to authenticate the original sender and the receiver. However the Layer 2 address (MAC) changes from router to router and from router to host which at last determines the destination host. (Cisco, 2010) 2.5 Ad hoc Networks An ad hoc network is a collection of many autonomous nodes connected together by radio waves and maintain the connectivity in decentralised manner. Wireless ad hoc networks are connected through wireless links so there is no need of any physical medium and hence contend of the medium is always there such as noise, interference and fading. On ad hoc networks each node functions as a node and a router itself. It simply means there is no need of an additional switch or a router to route the data and the control is given to the nodes themselves. (Yang Li, 2010) 2.6 Mobile Ad hoc Networks: A Mobile Ad hoc Network is an autonomous network formed by hundreds or thousands of nodes. These networks dont need any infrastructure as they can act as a node and router itself. They are free to move anywhere in the network and are connected through radio links. The only limitation with the MANETs is that they can communicate in a particular rage of the radio waves and outside the network they need some additional arrangements to communicate. To overcome this limitation the Intermediate Node or sometimes called as Relays are brought into picture. Intermediate nodes help in forwarding the packets to the destination. In MANET nodes are free to travel anywhere in the network, hence network topology cannot be fixed for such networks and it keeps changing depending on the current location of the nodes. (ANTDS, 2001) The fundamental differences between the wired networks and MANET are: Asymmetric Links Redundant Link Interference Dynamic Topology 2.7 Characteristics of MANETs There are several MANET routing protocols which should handle the several inherent characteristics of MANETs as follows as mentioned in (Subbarao)(Jain, 2005): Dynamic Topologies: Since the MANET is infrastructure less ad hoc networks, the nodes are free to move arbitrarily. The mobility of nodes may be random and so unpredictable. So the links between the nodes may be unidirectional or bidirectional at times. Bandwidth Constrained, Variable Capacity Wireless Links: Wireless links generally are bandwidth constrained. Since there is a lower capacity in wireless links as compared to the wired links, the traffic congestion is typical rather than different. Energy/Power Constrained Operation: Energy consumption is vital in MANETs as these nodes operate typically off power limited sources. Some or all nodes in MANETs rely on batteries. Limited Physical Security: Wireless networks like MANETs are more vulnerable with the security issues available with them. Issues like eavesdropping, jammer attack, spoofing and denial of service attacks must be carefully considered. 2.8 Need of MANET Routing Protocols A mobile ad hoc routing protocol is used to discover new routes and maintain the existing routes between the nodes in the network. MANET (Mobile Ad Hoc Network) is the collecting of mobile nodes which are present in random manner in the network has the capacity to communicate and exchange information effectively over the network by facilitating the intermediate nodes for their communication. The essential task of a MANET protocol is to create or discover the correct and efficient routes between the nodes so that information can be delivered accurately with respect to time. Route construction should be done with less overhead and minimal bandwidth consumption for effective communication. 2.9 Applications of MANETs Applications of MANETs can be used in many critical situations today and are increasing widely. There are many applications of MANETs today and some of them are mentioned here. An ideal application is for search and rescue operations. Such kind of operations is characterized by the networks without having an infrastructure present. One of the reasons for this may be because all of the equipment was destroyed or may be the region is too remote. Rescuer must be capable of communicating to use their energy fairly and also they must maintain the security. Carrying the equipments for communication that the rescuers are already using makes the job easier. The commercial application for MANETs includes computing everywhere which means the mobile devices are free to move anywhere in the network and yet it is possible to be in communication with the devices. The computers are allowed to forward the data to another computer or data networks may be extended far beyond the considered reach. Such networks may be more widely available and much easier in use. Another important application of MANETs is Sensor Networks. Sensor networks are composed of very large number of small sensors which are able to detect number of properties of the area, for example; temperature, pressure, toxins, pollutions etc. In this case, the capability of sensor network is much limited. So there is always need to forward data to the central computer and for this purpose they have to rely upon others in order to forward data to the central computer. The sensor networks individually are limited in their computing capabilities but together can be very effective and the key to future homeland security. But individual sensors because of their limited computing capabilities can prove prone to failure and loss. There are many other applications of MANETs like personal area networking where the communicating nodes may be mobile phones, laptops etc. Also this has a potential in military operations with the nodes of the network as soldiers, tanks and airplanes. Many more areas includes civilian environment to diverse taxi cab networks, conference rooms, boats and ships. (Bluetronix, 2006) 2.10 Classification of Routing Protocols According to (Jain, 2005), ad hoc routing protocols can be classified mainly into two categories: Table driven (proactive) Routing 2.10.1 Proactive (Table-Driven) Routing Protocols These routing protocols are similar to and come as a natural extension of those for the wired networks. In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the network. (LinuxOnly) In proactive routing protocol each node maintains the up to date routing information of all nodes in the network. Here each node maintains the routing table and broadcast it when there is a change in network topology. As soon as source needs the route to the destination it can select from the routing table. The routing table is exchanged periodically by broadcasting to all nodes in the network to keep track of the new message even though the topology is not changed. Each nodes has the routing information of all nodes in the network though most of it undesired. Advantages of proactive protocols are that the communication experiences a minimal delay and routes are up to date. Disadvantage is that the routes are broken as a result of mobility of nodes. (Chang) Following are the examples of table driven protocols: GSR and OLSR and some other proactive routing protocols are FSR, HSR, ZHLSR, CGSR and WRP etc. 2.10.1.1 OLSR (Optimized Link State Routing) OLSR Protocol is based on traditional link state algorithm which supports point to point routing strategy. In this strategy the nodes keeps exchanging the information periodically in order to maintain the network topology within the network. OLSR is an optimization version of link state protocols. That means it keeps flooding the topological changes information to all the hosts across the network when happens. OLSR is also proved beneficial for the reason that it minimizes the size of each control message exchanged and also it avoids each node to rebroadcast during the updating of the routes. It uses the Multi Point Replaying (MPR) strategy to do the above task. For MPR strategy each node creates a set of all of its neighbouring nodes, generally called multipoint relays of the node, in the network to transmit the packet once again. Each node in the particular set can receive and process the packet but only cannot retransmit it. To use MRPs, each node has to keep broadcasting periodic ally to all one hop neighbours using hello messages. Another method to reduce the overhead is to provide the shortest path. When the time interval is reduced for the control messages transmission, it can prove more reactive to the topological changes (Kuosmanen). The implementation of OLSR protocol basically uses two control messages; Hello message and Topology Control (TC). The hello messages are to be sent only one hop away from the host and are used for finding the link state information and hosts neighbours. MPR selector sets are constructed with Hello messages which explain which host in the network has chosen this host to act as MPR and using the information the host can select its own set of MPRs. The Topology control (TC) messages are to be broadcasted across entire network about the advertised neighbours and it includes at least the MPR selector list. As OLSR is proactive approach and it keeps updating the routing table periodically, the TC messages are also broadcasted periodically and the hosts with MPR selector set can only forward the TC messages. There can also be MID message which is Multiple Interface Declaration message to declare that the announcing hosts can have multiple OLSR interface addresses. And again MID message are broadcasted throughout entire network and only by MPRs. 2.10.2 Reactive (Source Initiated) Routing Protocols These protocols take a lazy approach to routing. They do not maintain or constantly update their route tables with the latest route topology. Reactive routing is also known as on-demand routing. The Reactive Routing Protocols are also called as Source initiated Demand Driven protocols. They are called so because the routes are discovered only when needed by source. Source initiated on demand networks cerates routing only when desired by the source node. When source wants to communicate with destination then it invokes the route discovery mechanism to find the path to the destination. The route discovery process is completed once a route is found or all possible are identified. Once the rout is formed between source and destination it is maintained by a route maintenance procedure until the destination becomes inaccessible or the route is no longer desired. (Chang) These Examples of reactive routing protocols are dynamic Source Routing (DSR), Ad hoc on-demand distance vector routing AODV, ABR, SSA, CBRP, and RDMAR. 2.10.2.1 AODV (Ad hoc On Demand Distance Vector) Ad hoc On Demand Distance Vector protocol as the name implies it is an On Demand that is, Reactive Protocol. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, it means that it builds routes between nodes only as desired by source nodes. It uses the concepts of DSR routing for route discovery and route maintenance and DSDV protocol for the concept of sequence number. It uses sequence number concept to ensure the freshness of routes. The ad hoc on-demand Distance vector algorithm facilitates the self-starting, multi hop and dynamic routing between participating nodes to establish and maintain an ad hoc network. AODV algorithm enables the nodes to find the routes for new destinations as and when they are needed and the nodes are not required to maintain the routes to the destination that are not in the part of active communication. It also enables the nodes in the formation of multicast groups and enables the nodes to respond quickly to link breakages and topological changes in the network thus the operation of AODV is loop free and thus avoids the Balham Ford count to infinity problem. AODV routing protocol is a simple and effective routing protocol for Ad hoc networks. It also uses the concept of hop by hope routing and sequence numbers from DSDV protocol. The following are the message types defined by AODV they are: Route request (RREQ), Route replies (RREP), Route error (RERR) and group hellos (GRPH) this message types are handled by UDP and IP header. The route request message format contains the following fields: Source address: the address of the node which originates the route request Source Sequence number: the current sequence number to be used in deciding the route for the source request Destination address: the address of the target node for which the route is initialized. Destination Sequence numbers: the sequence number received by source for route towards the destination. Broadcast ID: The sequence number by which a RREQ route request can be uniquely identified. Hop counts: the number of the hops to be taken from the source node to reach the destination node that handles the Route request. The Route Reply message format contains the following fields Destination address: the address of the destination node for which the route is abounded Destination sequence number: the destination sequence number related to the route Source address: the address of the source node that originates the route request Lifetime: the time for which nodes receiving the route reply considers the route to be valid. Hop counts: the number of hops to be taken from source to destination. The route error message format contains the following fields: Unreachable destination address: The address of the destination that has become unreachable due to link failure. (Arbia, 2008) In AODV the only nodes that take active participation in routing process are the nodes that sit in direct path between source and destination. The nodes which do not lie on active path do not take participate or maintain the routing table, thus AODV minimize the number of control messages sent between two nodes. As long as there is a valid routes between the source and destination for communication, AODV does not play any role and when a new route to a new destination is required and if the route to the destination does not exist only then the source node initialize the route discovery process by broadcasting the RREQ message to find the route to destination. The
Subscribe to:
Posts (Atom)