Monday, September 30, 2019

Live and Let Live

The Hitchhikers Guide to the Internet 1 The Hitchhikers Guide to the Internet Ed Krol [email  protected] cso. uiuc. edu Get any book for free on: www. Abika. com Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet 2 This document was produced through funding of the National Science Foundation. Copyright (C) 1987, by the Board of Trustees of The University of Illinois. Permission to duplicate this document, in whole or part, is granted provided reference is made to the source and this copyright is included in whole copies. This document assumes that one is familiar with the workings of a non-connected simple IP network (e. . a few 4. 2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the â€Å"oral tradition† of the Internet to the point that that net can be connected to the Internet with little dang er to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not normally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions.This is especially true of terms for the glossary (definitions are not necessary). In the beginning there was the ARPAnet, a wide area experimental network connecting hosts and terminal servers together. Procedures were set up to regulate the allocation of addresses and to create voluntary standards for the network. As local area networks became more pervasive, many hosts became gateways to local networks. A network layer to allow the interoperation of these networks was developed and called IP (Internet Protocol). Over time other groups created long haul IP based networks (NASA, NSF, states†¦ ). These nets, too, interoperate because of IP.The collection of all of these interoperating networks is the Internet. Two groups do much of the research and information work of the Internet (ISI and SRI). ISI (the Informational Sciences Institute) does much of the research, standardization, and allocation work of the Internet. SRI International provides information services for the Internet. In fact, after you are connected to the Internet most of the information in this document can be retrieved from the Network Information Center (NIC) run by SRI. Operating the Internet Each network, be it the ARPAnet, NSFnet or a regional network, has its own operations center.The ARPAnet is run by Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet BBN, Inc. under contract from DARPA. Their facility is called the Network Operations Center or NOC. Cornell University temporarily operates NSFnet (called the Network Information Service Center, NISC). It goes on to the -2regionals having similar facilities to monitor and keep watch over the goings on of their portion of the Internet. In addition, they all should have some knowledge of what is happening to the Internet in total.If a problem comes up, it is suggested that a campus network liaison should contact the network operator to which he is directly connected. That is, if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet†¦ ) and have a problem, you should contact your regional network operations center. 3 RFCs The internal workings of the Internet are defined by a set of documents called RFCs (Request for Comments). The general process for creating an RFC is for someone wanting something formalized to write a document describing the issue and mailing it to Jon Postel ([email  protected] edu).He acts as a referee for the proposal. It is then commented upon by all those wishing to take part in the discussion (electronically of course). It may go through multiple revisions. Should it be generally accepted as a good idea, it will be assigned a number and filed with the RFCs. The RFCs can be divided into five groups: required, suggested, directional, informational and obsolete. Required RFC's (e. g. RFC-791, The Internet Protocol) must be implemented on any host connected to the Internet. Suggested RFCs are generally implemented by network hosts. Lack of them does not preclude access to the Internet, but may impact its usability.RFC-793 (Transmission Control Protocol) is a suggested RFC. Directional RFCs were discussed and agreed to, but their application has never come into wide use. This may be due to the lack of wide need for the specific application (RFC-937 The Post Office Protocol) or that, although technically superior, ran against other pervasive approaches (RFC-891 Hello). It is suggested that should the facility be required by a particular site, animplementation be done in accordance with the RFC. This insures that, should the idea be one whose time has come, the implementation will be in accordance with some standard and will be generally usable.Informational RFCs contain factual information about the Internet and its operation (RFC-990, Assigned Numbers). Finally, as the Internet and technology have grown, some RFCs have become unnecessary. These obsolete RFCs cannot be ignored, however. Frequently when a change is made to some RFC that causes a new one to be issued obsoleting others, the new RFC only contains explanations and motivations for the change. Understanding the model on which the whole facility is based may involve reading the original and subsequent RFCs Get any book for free on: www. Abika. comThe Hitchhikers Guide to the Internet on the topic. -3(Appendix B contains a list of what are considered to be the major RFCs necessary for understanding the Internet). 4 The Network Information Center The NIC is a facility available to all Internet users which provides information to the community. There are three means of NIC contact: network, telephone, and mail. The network accesses are t he most prevalent. Interactive access is frequently used to do queries of NIC service overviews, look up user and host names, and scan lists of NIC documents. It is available by using %telnet sri-nic. rpa on a BSD system and following the directions provided by a user friendly prompter. From poking around in the databases provided one might decide that a document named NETINFO:NUG. DOC (The Users Guide to the ARPAnet) would be worth having. It could be retrieved via an anonymous FTP. An anonymous FTP would proceed something like the following. (The dialogue may vary slightly depending on the implementation of FTP you are using). %ftp sri-nic. arpa Connected to sri-nic. arpa. 220 SRI_NIC. ARPA FTP Server Process 5Z(47)-6 at Wed 17-Jun-87 12:00 PDT Name (sri-nic. arpa:myname): anonymous 331 ANONYMOUS user ok, send real ident as password.Password: myname 230 User ANONYMOUS logged in at Wed 17-Jun-87 12:01 PDT, job 15. ftp; get netinfo:nug. doc 200 Port 18. 144 at host 128. 174. 5. 50 a ccepted. 150 ASCII retrieve of NUG. DOC. 11 started. 226 Transfer Completed 157675 (8) bytes transferred local: netinfo:nug. doc remote:netinfo:nug. doc 157675 bytes in 4. 5e+02 seconds (0. 34 Kbytes/s) ftp; quit 221 QUIT command received. Goodbye. (Another good initial document to fetch is NETINFO:WHAT-THE-NIC-DOES. TXT)! Questions of the NIC or problems with services can be asked of or reported to using electronic mail. The following addresses can be used: [email  protected]ARPA requests [email  protected] ARPA General user assistance, document User registration and WHOIS updates Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] ARPA Hostname and domain changes and updates [email  protected] ARPA SRI-NIC computer operations [email  protected] ARPA Comments on NIC publications and services -4For people without network access, or if the number of documents is large, many of the NIC documents are available in printed form for a small charge. One frequently ordered document for starting sites is a compendium of major RFCs.Telephone access is used primarily for questions or problems with network access. (See appendix B for mail/telephone contact numbers). 5 The NSFnet Network Service Center The NSFnet Network Service Center (NNSC) is funded by NSF to provide a first level of aid to users of NSFnet should they have questions or encounter problems traversing the network. It is run by BBN Inc. Karen Roubicek ([email  protected] nsf. net) is the NNSC user liaison. The NNSC, which currently has information and documents online and in printed form, plans to distribute news through network mailing lists, bulletins, newsletters, and online reports.The NNSC also maintains a database of contact points and sources of additional information about NSFnet component networks and supercomputer centers. Prospective or current users who do not know whom to call concerning questions about NSFnet use, should contact the NN SC. The NNSC will answer general questions, and, for detailed information relating to specific components of the Internet, will help users find the appropriate contact for further assistance. (Appendix B) Mail Reflectors The way most people keep up to date on network news is through subscription to a number of mail reflectors.Mail reflectors are special electronic mailboxes which, when they receive a message, resend it to a list of other mailboxes. This in effect creates a discussion group on a particular topic. Each subscriber sees all the mail forwarded by the reflector, and if one wants to put his â€Å"two cents† in sends a message with the comments to the reflector†¦. The general format to subscribe to a mail list is to find the address reflector and append the string -REQUEST to the mailbox name (not the host name). For example, if you wanted to take part in the mailing list for NSFnet reflected by [email  protected]NSF. NET, one sends a request to Get any book f or free on: www. Abika. com The Hitchhikers Guide to the Internet [email  protected] NSF. NET. This may be a wonderful scheme, but the problem is that you must know the list exists in the first place. It is suggested that, if you are interested, you read the mail from one list (like NSFNET) and you will probably become familiar with the existence of others. A registration service for mail reflectors is provided by the NIC in the files NETINFO:INTEREST-GROUPS-1. TXT, NETINFO:INTEREST-GROUPS-2. TXT, and NETINFO:INTEREST-GROUPS3.TXT. The NSFNET mail reflector is targeted at those people who have a day to day interest in the news of the NSFnet (the backbone, regional network, and Internet inter-connection site workers). The messages are reflected by a central location and are sent as separate messages to each subscriber. This creates hundreds of messages on the wide area networks where bandwidth is the scarcest. There are two ways in which a campus could spread the news and not cause these messages to inundate the wide area networks. One is to re-reflect the message on the campus.That is, set up a reflector on a local machine which forwards the message to a campus distribution list. The other is to create an alias on a campus machine which places the messages into a notesfile on the topic. Campus users who want the information could access the notesfile and see the messages that have been sent since their last access. One might also elect to have the campus wide area network liaison screen the messages in either case and only forward those which are considered of merit. Either of these schemes allows one message to be sent to the campus, while allowing wide distribution within. Address Allocation Before a local network can be connected to the Internet it must be allocated a unique IP address. These addresses are allocated by ISI. The allocation process consists of getting an application form received from ISI. (Send a message to [email  protected] arpa and ask for the template for a connected address). This template is filled out and mailed back to hostmaster. An address is allocated and e-mailed back to you. This can also be done by postal mail (Appendix B). IP addresses are 32 bits long. It is usually written as four decimal numbers separated by periods (e. . , 192. 17. 5. 100). Each number is the value of an octet of the 32 bits. It was seen from the beginning that some networks might choose to organize themselves as very flat (one net with a lot of nodes) and some might organize hierarchically -6(many interconnected nets with fewer nodes each and a backbone). Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet To provide for these cases, addresses were differentiated into class A, B, and C networks. This classification had to with the interpretation of the octets.Class A networks have the first octet as a network address and the remaining three as a host address on that network. Class C addresses have thre e octets of network address and one of host. Class B is split two and two. Therefore, there is an address space for a few large nets, a reasonable number of medium nets and a large number of small nets. The top two bits in the first octet are coded to tell the address format. All of the class A nets have been allocated. So one has to choose between Class B and Class C when placing an order. (There are also class D (Multicast) and E (Experimental) formats.Multicast addresses will likely come into greater use in the near future, but are not frequently used now). In the past sites requiring multiple network addresses requested multiple discrete addresses (usually Class C). This was done because much of the software available (not ably 4. 2BSD) could not deal with subnetted addresses. Information on how to reach a particular network (routing information) must be stored in Internet gateways and packet switches. Some of these nodes have a limited capability to store and exchange routing i nformation (limited to about 300 networks).Therefore, it is suggested that any campus announce (make known to the Internet) no more than two discrete network numbers. If a campus expects to be constrained by this, it should consider subnetting. Subnetting (RFC-932) allows one to announce one address to the Internet and use a set of addresses on the campus. Basically, one defines a mask which allows the network to differentiate between the network portion and host portion of the address. By using a different mask on the Internet and the campus, the address can be interpreted in multiple ways.For example, if a campus requires two networks internally and has the 32,000 addresses beginning 128. 174. X. X (a Class B address) allocated to it, the campus could allocate 128. 174. 5. X to one part of campus and 128. 174. 10. X to another. By advertising 128. 174 to the Internet with a subnet mask of FF. FF. 00. 00, the Internet would treat these two addresses as one. Within the campus a mask of FF. FF. FF. 00 would be used, allowing the campus to treat the addresses as separate entities. (In reality you don't pass the subnet mask of FF. FF. 00. 0 to the Internet, the octet meaning is implicit in its being a class B address). A word of warning is necessary. Not all systems know how to do subnetting. Some 4. 2BSD systems require additional software. 4. 3BSD systems subnet as released. Other devices -7and operating systems vary in the problems they have dealing with subnets. Frequently these machines can be used as a leaf on a network but not as a gateway within the subnetted portion of the network. As time passes and more systems become 4. 3BSD based, these problems should disappear. 7 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet There has been some confusion in the past over the format of an IP broadcast address. Some machines used an address of all zeros to mean broadcast and some all ones. This was confusing when machines of both type were connected to the same network. The broadcast address of all ones has been adopted to end the grief. Some systems (e. g. 4. 2 BSD) allow one to choose the format of the broadcast address. If a system does allow this choice, care should be taken that the all ones format is chosen. (This is explained in RFC-1009 and RFC-1010). 8Internet Problems There are a number of problems with the Internet. Solutions to the problems range from software changes to long term research projects. Some of the major ones are detailed below: Number of Networks When the Internet was designed it was to have about 50 connected networks. With the explosion of networking, the number is now approaching 300. The software in a group of critical gateways (called the core gateways of the ARPAnet) are not able to pass or store much more than that number. In the short term, core reallocation and recoding has raised the number slightly.By the summer of '88 the current PDP-11 core gateways will be replaced with BB N Butterfly gateways which will solve the problem. Routing Issues Along with sheer mass of the data necessary to route packets to a large number of networks, there are many problems with the updating, stability, and optimality of the routing algorithms. Much research is being done in the area, but the optimal solution to these routing problems is still years away. In most cases the the routing we have today works, but sub-optimally and sometimes unpredictably. -8-Trust Issues Gateways exchange network routing information. Currently, most gateways accept on faith that the information provided about the state of the network is correct. In the past this was not a big problem since most of the gateways belonged to a single administrative entity (DARPA). Now with multiple wide area networks under different administrations, a rogue gateway somewhere in the net could cripple the Internet. There is design work going on to solve both the problem of Get any book for free on: www. Abika. com T he Hitchhikers Guide to the Internet gateway doing unreasonable things and providing enough information to reasonably route data between multiply connected networks (multi-homed networks). Capacity & Congestion Many portions of the ARPAnet are very congested during the busy part of the day. Additional links are planned to alleviate this congestion, but the implementation will take a few months. 9 These problems and the future direction of the Internet are determined by the Internet Architect (Dave Clark of MIT) being advised by the Internet Activities Board (IAB).This board is composed of chairmen of a number of committees with responsibility for various specialized areas of the Internet. The committees composing the IAB and their chairmen are: Committee Chair Autonomous Networks Deborah Estrin End-to-End Services Bob Braden Internet Architecture Dave Mills Internet Engineering Phil Gross EGP2 Mike Petry Name Domain Planning Doug Kingston Gateway Monitoring Craig Partridge Internic Jake Feinler Performance & Congestion ControlRobert Stine NSF Routing Chuck Hedrick Misc. MilSup Issues Mike St.Johns Privacy Steve Kent IRINET Requirements Vint Cerf Robustness & Survivability Jim Mathis Scientific Requirements Barry Leiner Note that under Internet Engineering, there are a set of task forces and chairs to look at short term concerns. The chairs of these task forces are not part of the IAB. -9Routing Routing is the algorithm by which a network directs a packet from its source to its destination. To appreciate the problem, watch a small child trying to find a table in a restaurant. From the adult point of view the structure of the dining room is seen and an optimal route easily chosen.The child, however, is presented with a set of paths between tables where a good path, let alone the optimal one to the goal is not discernible. *** A little more background might be appropriate. IP gateways (more correctly routers) are boxes which have connections to multiple networks and pass traffic between these nets. They decide how the packet is to be sent based on the information in the IP header of the packet and the state of the network. Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Each interface on a router has an unique address appropriate to the network to which it is connected.The information in the IP header which is used is primarily the destination address. Other information (e. g. type of service) is largely ignored at this time. The state of the network is determined by the routers passing information among themselves. The distribution of the database (what each node knows), the form of the updates, and metrics used to measure the value of a connection, are the parameters which determine the characteristics of a routing protocol. Under some algorithms each node in the network has complete knowledge of the state of the network (the adult algorithm).This implies the nodes must have larger amounts of local storage and enough CPU to search the large tables in a short enough time (remember this must be done for each packet). Also, routing updates usually contain only changes to the existing information (or you spend a large amount of the network capacity passing around megabyte routing updates). This type of algorithm has several problems. Since the only way the routing information can be passed around is across the network and the propagation time is non-trivial, the view of the network at each node is a correct historical view of the network at varying times in the past. The adult algorithm, but rather than looking directly at the dining area, looking at a photograph of the dining room. One is likely to pick the optimal route and find a bus-cart has moved in to block the path after the photo was taken). These inconsistencies can cause circular routes (called routing loops) where once a packet enters it is routed in a closed path until its time to live (TTL) field expires and it is discarded. Other algorithms may know about only a subset of the network. To prevent loops in these protocols, they are usually used in a hierarchical network.They know completely about their own area, but to leave that area they go to one particular place (the default gateway). Typically these are used in smaller networks (campus, regional†¦ ). -10Routing protocols in current use: Static (no protocol-table/default routing) Don't laugh. It is probably the most reliable, easiest to implement, and least likely to get one into trouble for a small network or a leaf on the Internet. This is, also, the only method available on some CPU-operating system combinations.If a host is connected to an Ethernet which has only one gateway off of it, one should make that the default gateway for the host and do no other routing. (Of course that gateway may pass the reachablity information somehow on the other side of itself). One word of warning, it is only with extreme caution that one should use static ro utes in the middle of a network 10 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet which is also using dynamic routing. The routers passing dynamic information are sometimes confused by conflicting dynamic and static routes.If your host is on an ethernet with multiple routers to other networks on it and the routers are doing dynamic routing among themselves, it is usually better to take part in the dynamic routing than to use static routes. 11 RIP RIP is a routing protocol based on XNS (Xerox Network System) adapted for IP networks. It is used by many routers (Proteon, cisco, UB†¦ ) and many BSD Unix systems BSD systems typically run a program called â€Å"routed† to exchange information with other systems running RIP. RIP works best for nets of small diameter where the links are of equal speed.The reason for this is that the metric used to determine which path is best is the hop-count. A hop is a traversal across a gateway. So, all machin es on the same Ethernet are zero hops away. If a router connects connects two networks directly, a machine on the other side of the router is one hop away†¦. As the routing information is passed through a gateway, the gateway adds one to the hop counts to keep them consistent across the network. The diameter of a network is defined as the largest hop-count possible within a network. Unfortunately, a hop count of 16 is defined as infinity in RIP meaning the link is down.Therefore, RIP will not allow hosts separated by more than 15 gateways in the RIP space to communicate. The other problem with hop-count metrics is that if links have different speeds, that difference is not -11reflected in the hop-count. So a one hop satellite link (with a . 5 sec delay) at 56kb would be used instead of a two hop T1 connection. Congestion can be viewed as a decrease in the efficacy of a link. So, as a link gets more congested, RIP will still know it is the best hop-count route and congest it eve n more by throwing more packets on the queue for that link.The protocol is not well documented. A group of people are working on producing an RFC to both define the current RIP and to do some extensions to it to allow it to better cope with larger networks. Currently, the best documentation for RIP appears to be the code to BSD â€Å"routed†. Routed The ROUTED program, which does RIP for 4. 2BSD systems, Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet has many options. One of the most frequently used is: â€Å"routed -q† (quiet mode) which means listen to RIP information but never broadcast it.This would be used by a machine on a network with multiple RIP speaking gateways. It allows the host to determine which gateway is best (hopwise) to use to reach a distant network. (Of course you might want to have a default gateway to prevent having to pass all the addresses known to the Internet around with RIP). There are two ways to insert stat ic routes into â€Å"routed†, the â€Å"/etc/gateways† file and the â€Å"route add† command. Static routes are useful if you know how to reach a distant network, but you are not receiving that route using RIP. For the most part the â€Å"route add† command is preferable to use.The reason for this is that the command adds the route to that machine's routing table but does not export it through RIP. The â€Å"/etc/gateways† file takes precedence over any routing information received through a RIP update. It is also broadcast as fact in RIP updates produced by the host without question, so if a mistake is made in the â€Å"/etc/gateways† file, that mistake will soon permeate the RIP space and may bring the network to its knees. One of the problems with â€Å"routed† is that you have very little control over what gets broadcast and what doesn't.Many times in larger networks where various parts of the network are under different administr ative controls, you would like to pass on through RIP only nets which you receive from RIP and you know are reasonable. This prevents people from adding IP addresses to the network which may be illegal and you being responsible for passing them on to the Internet. This -12type of reasonability checks are not available with â€Å"routed† and leave it usable, but inadequate for large networks. 12 Hello (RFC-891) Hello is a routing protocol which was designed and implemented in a experimental software router called a â€Å"Fuzzball† hich runs on a PDP-11. It does not have wide usage, but is the routing protocol currently used on the NSFnet backbone. The data transferred between nodes is similar to RIP (a list of networks and their metrics). The metric, however, is milliseconds of delay. This allows Hello to be used over nets of various link speeds and performs better in congestive situations. One of the most interesting side effects of Hello based networks is their great timekeeping ability. If you consider the problem of measuring delay on a link for the metric, you find that it is not an easy thing toGet any book for free on: www. Abika. com The Hitchhikers Guide to the Internet do. You cannot measure round trip time since the return link may be more congested, of a different speed, or even not there. It is not really feasible for each node on the network to have a builtin WWV (nationwide radio time standard) receiver. So, you must design an algorithm to pass around time between nodes over the network links where the delay in transmission can only be approximated. Hello routers do this and in a nationwide network maintain synchronized time within milliseconds. 13Exterior Gateway Protocol (EGP RFC-904) EGP is not strictly a routing protocol, it is a reachability protocol. It tells only if nets can be reached through a particular gateway, not how good the connection is. It is the standard by which gateways to local nets inform the ARPAnet of the net s they can reach. There is a metric passed around by EGP but its usage is not standardized formally. Its typical value is value is 1 to 8 which are arbitrary goodness of link values understood by the internal DDN gateways. The smaller the value the better and a value of 8 being unreachable.A quirk of the protocol prevents distinguishing between 1 and 2, 3 and 4†¦ , so the usablity of this as a metric is as three values and unreachable. Within NSFnet the values used are 1, 3, and unreachable. Many routers talk EGP so they can be used for ARPAnet gateways. -13Gated So we have regional and campus networks talking RIP among themselves, the NSFnet backbone talking Hello, and the DDN speaking EGP. How do they interoperate? In the beginning there was static routing, assembled into the Fuzzball software configured for each site.The problem with doing static routing in the middle of the network is that it is broadcast to the Internet whether it is usable or not. Therefore, if a net beco mes unreachable and you try to get there, dynamic routing will immediately issue a net unreachable to you. Under static routing the routers would think the net could be reached and would continue trying until the application gave up (in 2 or more minutes). Mark Fedor of Cornell ([email  protected] tn. cornell. edu) attempted to solve these problems with a replacement for â€Å"routed† called â€Å"gated†. â€Å"Gated† talks RIP to RIP speaking hosts, EGP to EGP speakers, and Hello to Hello'ers.These speakers frequently all live on one Ethernet, but luckily (or unluckily) cannot understand each others ruminations. In addition, under configuration file control it can filter the conversion. For example, one can produce a Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet configuration saying announce RIP nets via Hello only if they are specified in a list and are reachable by way of a RIP broadcast as well. This means that if a rogue network appears in your local site's RIP space, it won't be passed through to the Hello side of the world.There are also configuration options to do static routing and name trusted gateways. This may sound like the greatest thing since sliced bread, but there is a catch called metric conversion. You have RIP measuring in hops, Hello measuring in milliseconds, and EGP using arbitrary small numbers. The big questions is how many hops to a millisecond, how many milliseconds in the EGP number 3†¦. Also, remember that infinity (unreachability) is 16 to RIP, 30000 or so to Hello, and 8 to the DDN with EGP. Getting all these metrics to work well together is no small feat.If done incorrectly and you translate an RIP of 16 into an EGP of 6, everyone in the ARPAnet will still think your gateway can reach the unreachable and will send every packet in the world your way. For these reasons, Mark requests that you consult closely with him when configuring and using â€Å"gated†. -14â € ³Names† All routing across the network is done by means of the IP address associated with a packet. Since humans find it difficult to remember addresses like 128. 174. 5. 50, a symbolic name register was set up at the NIC where people would say â€Å"I would like my host to be named ‘uiucuxc'†.Machines connected to the Internet across the nation would connect to the NIC in the middle of the night, check modification dates on the hosts file, and if modified move it to their local machine. With the advent of workstations and micros, changes to the host file would have to be made nightly. It would also be very labor intensive and consume a lot of network bandwidth. RFC-882 and a number of others describe domain name service, a distributed data base system for mapping names into addresses. We must look a little more closely into what's in a name. First, note that an address specifies a particular connection on a specific network.If the machine moves, the address c hanges. Second, a machine can have one or more names and one or more network addresses (connections) to different networks. Names point to a something which does useful work (i. e. the machine) and IP addresses point to an interface on that provider. A name is a purely symbolic representation of a list of addresses on the network. If a machine moves to a different network, the addresses will change but the name could remain the same. Domain names are tree structured names with the root of the tree at the right. For example: 14 Get any book for free on: www. Abika. om The Hitchhikers Guide to the Internet 15 uxc. cso. uiuc. edu is a machine called ‘uxc' (purely arbitrary), within the subdomains method of allocation of the U of I) and ‘uiuc' (the University of Illinois at Urbana), registered with ‘edu' (the set of educational institutions). A simplified model of how a name is resolved is that on the user's machine there is a resolver. The resolver knows how to contac t across the network a root name server. Root servers are the base of the tree structured data retrieval system. They know who is responsible for handling first level domains (e. g. ‘edu').What root servers to use is an installation parameter. From the root server the resolver finds out who provides ‘edu' service. It contacts the ‘edu' name server which supplies it with a list of addresses of servers for the subdomains (like ‘uiuc'). This action is repeated with the subdomain servers until the final subdomain returns a list of addresses of interfaces on the host in question. The user's machine then has its choice of which of these addresses to use for communication. -15A group may apply for its own domain name (like ‘uiuc' above). This is done in a manner similar to the IP address allocation.The only requirements are that the requestor have two machines reachable from the Internet, which will act as name servers for that domain. Those servers could also act as servers for subdomains or other servers could be designated as such. Note that the servers need not be located in any particular place, as long as they are reachable for name resolution. (U of I could ask Michigan State to act on its behalf and that would be fine). The biggest problem is that someone must do maintenance on the database. If the machine is not convenient, that might not be done in a timely fashion.The other thing to note is that once the domain is allocated to an administrative entity, that entity can freely allocate subdomains using what ever manner it sees fit. The Berkeley Internet Name Domain (BIND) Server implements the Internet name server for UNIX systems. The name server is a distributed data base system that allows clients to name resources and to share that information with other network hosts. BIND is integrated with 4. 3BSD and is used to lookup and store host names, addresses, mail agents, host information, and more. It replaces the â€Å"/etc/ho sts† file for host name lookup.BIND is still an evolving program. To keep up with reports on operational problems, future design decisions, etc, join the BIND mailing list by sending a request to â€Å"[email  protected] Berkeley. EDU†. BIND can also be obtained via anonymous FTP from ucbarpa. berkley. edu. There are several advantages in using BIND. One of the most important is that it frees a host from relying on â€Å"/etc/hosts† Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet being up to date and complete. Within the . uiuc. edu domain, only a few hosts are included in the host table distributed by SRI.The remainder are listed locally within the BIND tables on uxc. cso. uiuc. edu (the server machine for most of the . uiuc. edu domain). All are equally reachable from any other Internet host running BIND. BIND can also provide mail forwarding information for interior hosts not directly reachable from the Internet. These hosts c an either be on non-advertised networks, or not connected to a network at all, as in the case of UUCP-reachable hosts. More information on BIND is available in the â€Å"Name Server Operations Guide for BIND† in â€Å"UNIX System Manager's Manual†, 4. 3BSD release.There are a few special domains on the network, like SRINIC. ARPA. The ‘arpa' domain is historical, referring to hosts registered in the old hosts database at the NIC. There are others of the form NNSC. NSF. NET. These special domains are used sparingly and require ample justification. They refer to servers under the administrative control of -16the network rather than any single organization. This allows for the actual server to be moved around the net while the user interface to that machine remains constant. That is, should BBN relinquish control of the NNSC, the new provider would be pointed to by that name.In actuality, the domain system is a much more general and complex system than has been descr ibed. Resolvers and some servers cache information to allow steps in the resolution to be skipped. Information provided by the servers can be arbitrary, not merely IP addresses. This allows the system to be used both by non-IP networks and for mail, where it may be necessary to give information on intermediate mail bridges. 16 What's wrong with Berkeley Unix University of California at Berkeley has been funded by DARPA to modify the Unix system in a number of ways.Included in these modifications is support for the Internet protocols. In earlier versions (e. g. BSD 4. 2) there was good support for the basic Internet protocols (TCP, IP, SMTP, ARP) which allowed it to perform nicely on IP ethernets and smaller Internets. There were deficiencies, however, when it was connected to complicated networks. Most of these problems have been resolved under the newest release (BSD 4. 3). Since it is the springboard from which many vendors have launched Unix implementations (either by porting the existing code or by using it as a model), many implementations (e. g.Ultrix) are still based on BSD 4. 2. Therefore, many implementations still exist with the BSD 4. 2 problems. As time goes on, when BSD 4. 3 trickles through Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet vendors as new release, many of the problems will be resolved. Following is a list of some problem scenarios and their handling under each of these releases. ICMP redirects Under the Internet model, all a system needs to know to get anywhere in the Internet is its own address, the address of where it wants to go, and how to reach a gateway which knows about the Internet.It doesn't have to be the best gateway. If the system is on a network with multiple gateways, and a host sends a packet for delivery to a gateway which feels another directly connected gateway is more appropriate, the gateway sends the sender a message. This message is an ICMP redirect, which politely says â€Å"I' ll deliver this message for you, but you really ought to use that gateway over there to reach this host†. BSD 4. 2 ignores these messages. This creates more stress on the gateways and the local network, since for every packet -17sent, the gateway sends a packet to the originator.BSD 4. 3 uses the redirect to update its routing tables, will use the route until it times out, then revert to the use of the route it thinks is should use. The whole process then repeats, but it is far better than one per packet. Trailers An application (like FTP) sends a string of octets to TCP which breaks it into chunks, and adds a TCP header. TCP then sends blocks of data to IP which adds its own headers and ships the packets over the network. All this prepending of the data with headers causes memory moves in both the sending and the receiving machines.Someone got the bright idea that if packets were long and they stuck the headers on the end (they became trailers), the receiving machine could pu t the packet on the beginning of a page boundary and if the trailer was OK merely delete it and transfer control of the page with no memory moves involved. The problem is that trailers were never standardized and most gateways don't know to look for the routing information at the end of the block. When trailers are used, the machine typically works fine on the local network (no gateways involved) and for short blocks through gateways (on which trailers aren't used).So TELNET and FTP's of very short files work just fine and FTP's of long files seem to hang. On BSD 4. 2 trailers are a boot option and one should make sure they are off when using the Internet. BSD 4. 3 negotiates trailers, so it uses them on its local net and doesn't use them when going across the network. 17 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet Retransmissions TCP fires off blocks to its partner at the far end of the connection. If it doesn't receive an acknowledgement in a re asonable amount of time it retransmits the blocks.The determination of what is reasonable is done by TCP's retransmission algorithm. There is no correct algorithm but some are better than others, where better is measured by the number of retransmissions done unnecessarily. BSD 4. 2 had a retransmission algorithm which retransmitted quickly and often. This is exactly what you would want if you had a bunch of machines on an ethernet (a low delay network of large bandwidth). If you have a network of relatively longer delay and scarce bandwidth (e. g. 56kb lines), it tends to retransmit too aggressively.Therefore, it makes the networks and gateways pass more traffic than is really necessary for a given conversation. Retransmission algorithms do adapt to the delay of the network -18after a few packets, but 4. 2's adapts slowly in delay situations. BSD 4. 3 does a lot better and tries to do the best for both worlds. It fires off a few retransmissions really quickly assuming it is on a low delay network, and then backs off very quickly. It also allows the delay to be about 4 minutes before it gives up and declares the connection broken. -19Appendix A References to Remedial Information 18Quaterman and Hoskins, â€Å"Notable Computer Networks†, Communications of the ACM, Vol 29, #10, pp. 932-971 (October, 1986). Tannenbaum, Andrew S. , Computer Networks, Prentice Hall, 1981. Hedrick, Chuck, Introduction to the Internet Protocols, Anonymous FTP from topaz. rutgers. edu, directory pub/tcp-ip-docs, file tcp-ip-intro. doc. -20Appendix B List of Major RFCs RFC-768 RFC-791 RFC-792 RFC-793 RFC-821 User Datagram Protocol (UDP) Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) Simple Mail Transfer Protocol (SMTP) Get any book for free on: www. Abika. com The Hitchhikers Guide to the InternetRFC-822 RFC-854 RFC-917 * RFC-919 * RFC-922 * Subnets RFC-940 * RFC-947 * RFC-950 * RFC-959 RFC-966 * Protocol RFC-988 * RFC-997 * RF C-1010 * RFC-1011 * Standard for the Format of ARPA Internet Text Messages Telnet Protocol Internet Subnets Broadcasting Internet Datagrams Broadcasting Internet Datagrams in the Presence of Toward an Internet Standard Scheme for Subnetting Multi-network Broadcasting within the Internet Internet Standard Subnetting Procedure File Transfer Protocol (FTP) Host Groups: A Multicast Extension to the Internet Host Extensions for IP Multicasting Internet Numbers Assigned Numbers Official ARPA-Internet Protocols 9 RFC's marked with the asterisk (*) are not included in the 1985 DDN Protocol Handbook. Note: This list is a portion of a list of RFC's by topic retrieved from the NIC under NETINFO:RFC-SETS. TXT (anonymous FTP of course). The following list is not necessary for connection to the Internet, but is useful in understanding the domain system, mail system, and gateways: RFC-882 RFC-883 RFC-973 RFC-974 RFC-1009 Domain Names – Concepts and Facilities Domain Names – Implement ation Domain System Changes andObservations Mail Routing and the Domain System Requirements for Internet Gateways -21Appendix C Contact Points for Network Information Network Information Center (NIC) DDN Network Information Center SRI International, Room EJ291 333 Ravenswood Avenue Menlo Park, CA 94025 (800) 235-3155 or (415) 859-3695 [email  protected] ARPA NSF Network Service Center (NNSC) NNSC BBN Laboratories Inc. 10 Moulton St. Cambridge, MA 02238 (617) 497-3400 Get any book for free on: www. Abika. com The Hitchhikers Guide to the Internet[email  protected] NSF. NET -22Glossary core gateway The innermost gateways of the ARPAnet. These gateways have a total picture of the reachability to all networks known to the ARPAnet with EGP. They then redistribute reachability information to all those gateways speaking EGP. It is from them your EGP agent (there is one acting for you somewhere if you can reach the ARPAnet) finds out it can reach all the nets on the ARPAnet. Which is th en passed to you via Hello, gated, RIP†¦. ount to infinity The symptom of a routing problem where routing information is passed in a circular manner through multiple gateways. Each gateway increments the metric appropriately and passes it on. As the metric is passed around the loop, it increments to ever increasing values til it reaches the maximum for the routing protocol being used, which typically denotes a link outage. hold down When a router discovers a path in the network has gone down announcing that that path is down for a minimum amount of time (usually at least two minutes).This allows for the propagation of the routing information across the network and prevents the formation of routing loops. split horizon When a router (or group of routers working in consort) accept routing information from multiple external networks, but do not pass on information learned from one external network to any others. This is an attempt to prevent bogus routes to a network from being pr opagated because of gossip or counting to infinity. -23- 20 Get any book for free on: www. Abika. com

Sunday, September 29, 2019

Poverty in the United States Essay

Poverty is a serious issue not only in third world countries but also here in the United States. Discussing the nature of poverty in the United States is important because through understanding we will find solutions. Gaining insights into the issue of poverty can be used to understand the complexity of the subject. Poverty has been defined as a state of deprivation of goods and services that essential to the maintenance of an adequate standard of living in a given society. Although the concept of poverty is considered relative, it cannot be denied that it magnifies the problem concerning inequality in a particular society (Levitan). The struggle of poverty impacts people’s day-to-day life. It is easy to hide some things in life but, poverty is not one of them. There are 633,782 homeless people in cities throughout the United States (St. Francis). Poor people have no place to live and are being exposed to nature’s elements, bacteria, and harmful illness can cause threat to the health of these individuals. The environment is being impacted as well, because there is nowhere to put waste or garbage other than on the ground. This is why it is important to gain insight and understand poverty so that we can help these people and the earth. When a person is living in poverty it is humiliating and weighs on an individual’s self-esteem as well as their families and is very difficult to overcome. Poverty is not always a choice, but it is a situation that can be prevented. If people everywhere take something from every book, article or essays that has been written and are willing to recognize and do something about it then it is a problem that can be fixed. There is not a perfect plan or a perfect solution to the poverty problem but, the aim is to decrease the number of individuals and families living in poverty drastically. There are many families living in poverty and there are an equal amount of thoughts and opinions on why people live in poverty such as drug and alcohol use, domestic violence and foreclosure just to name a few. Individuals have a difficult time taking care of themselves can you imagi ne having to try to provide for a family on next to nothing every day. Without a street address these families do not qualify to get welfare assistance such as food stamps, Medicaid, or housing assistance. Without housing assistance people are forced to stay in shelters and if they don’t make to a shelter by a certain  time they go without a warm place to sleep and without food that night. Some people wait in long lines all day for a spot at the shelter only to be turned away because there is just not enough space for everyone. A good way to alleviate or even eliminate this problem is to build more shelters or use some of the abandoned buildings in poverty stricken neighborhoods for the poor people to sleep in. Have stipulations in these shelters that individuals and their families are guaranteed more than one night as long as they abide by guidelines provided, kind of like a contract. So they are not just getting help they are in a sense helping their selves. Different situations have different solutions, there is a difference between a person living in poverty because you’re a war veteran and just having a hard time and living in poverty because you are and addict and everything you have is spent on drugs and alcohol. In these newly built or refurbished shelters with these stipulations, programs can be offered to help transition into a better way of living. Yes, then there is the issue of money and where will it come from. Nobody has money lying around just to give away so charity events, fundraisers, donations, volunteers and maybe even some help from government agencies would help. The children of these families living in poverty suffer most. Research shows that poverty in the first five years of a child’s life changes the life of a child compared to if they were to live in poverty later in life. This is because poverty is associated with poor nutrition; poor nutrition leads to lower intelligence, bad physical development, and poor immune systems. â€Å"Children deprived of proper nutrition during the most informative years score much lower on tests of vocabulary, reading comprehension, arithmetic, and general knowledge. The more severe the poverty a child faces, the lower his or her nutritional level is likely to be (Brown&Pollitt).† Many children that are labeled bad kids with behavioral problems are really just lacking nutritional value. A child that is hungry is more likely to act o ut and have greater difficulty focusing than a well fed child. There are government programs that offer assistance with nutrition such as W.I.C and Healthy Schools but the guidelines are very strict and fall short in making sure that every child living in poverty has adequate nutrition. So, this problem can be solved by changing the guidelines and making it easier for a family living in poverty to feed our future. People might say this is not my problem, I’m not living in poverty  so what does this have to do with me? Truth be told everyone is affected by poverty. As Dr. Martin Luther King Jr. said, â€Å"There is nothing more dangerous than to build a society, with a large segment of people in that society, who feel they have no stake in it; who feel they have nothing to lose. People, who have stake in their society, protect that society, but when they don’t have it, they unconsciously want to destroy it (Dr.MartinLutherKingJr.).† According to the history of our nation, the safety and equality of the people of our society relies on everyone individually and as a whole nation as one. If that’s the way the world is meant to be then why are people living in poverty treated so differently? Upper class doesn’t make you better than a person living in poverty, money doesn’t make you bad or good and the same goes for poverty. The founders of our nation fought hard for a country where everyone is treated as a person equally but, that is not the case when thousands of people still live in poverty every day. â€Å"Anybody that has ever spent a morning at the Department of Motor Vehicles or stood in the line at the Post Office should understand that simply because the government is handling the problem, doesn’t mean it’s being handled properly (St. Francis)†. The next time you see someone a little down and out stop to give them a minute and see if you can help them in any way, remember that poverty does not make them any less a human than you. I believe the proposed solutions will work because if its believable than its achievable and our system has proven in other situations to be reliable so let use it for the good of the people of our country that could use a hand up not a hand out. For people to be sick on the street, forced to sleep on cardboard or dirt, and have to beg other people to help them is not humane or the American way and should not be tolerated any longer. Works Cited Brown&Pollitt. â€Å"Malnutrition, Poverty and Intellectual Development.† Pollitt, L. Brown & E. n.d. Dr.MartinLutherKingJr. â€Å"†Letter From Birmingham Jail†.† April 1963. Levitan, Sar A. â€Å"†Poverty† In the Lexicon Universal Encyclopedia.† 1990: pages 478-480 Vol. 15. St. Francis, Nancy. â€Å"Homelessness in America 2013.† 2013.

Saturday, September 28, 2019

Boivail case

First, Persuasive evidence of an arrangement exists. We can see that there must be an arrangement between Avail and distributor. Second, the sellers price to the buyer is fixed or determinable.Third, collegiality is reasonably assured. Fourth, Delivery has occurred or services have been rendered. From here, we could recognize revenue of the company according to FOB. FOB shipping point, title to the property rangers to the buyer when it leaves the shipping dock and therefore revenue should be recognized at that point. With FOB destination, title does not transfer to the buyer until they receive the goods and thus revenue is not recognized until that point 3. How does the accident affect the stated revenues under different FOB contract structures? Explain your reasoning? If Avail recognizes revenues when the product leaves Violas FOB shipping point then revenue should be recognized at that point. Therefore, the truck accident would have had no impact on Violas third quarter uncial results because the title to the product and the risk associated with the accident would have passed to the Distributor as soon as the truck left Violas. Then, overstating revenues and net income on financial statement should not have happened. However, Distributor mentioned that they recognized the distribution as FOB destination then revenue will only be received by Avail until goods arrived at the point, so if Avail recognizes revenue when the product has reached the Distributors FOB destination it has recognized revenue when it has been earned and ill accurately state revenues and net income on its financial statements. 4.Are you concerned about the companys treatment of analysts who cover the stock? Would you want to be an analyst covering this company? Yes, I am concerned especially about the downgraded stock recommendation that was given to Avail. However, I would not be an analyst covering the company because there were too many misleading information in the company that would cause me as analyst to formulate wrong decision. Moreover, it might also ruin my reputation as analyst if I formulated wrong decision.

Friday, September 27, 2019

TIBET AND THE DALAI LAMA NO 2 Essay Example | Topics and Well Written Essays - 1000 words

TIBET AND THE DALAI LAMA NO 2 - Essay Example The figurehead for the religion is the Dalai Lama who has been attempting to negotiate some sort of autonomy for Tibet that would allow them to keep their culture intact. This force for continuity is in direct conflict with the changes in farming, education, and politics that the Chinese government has implemented since its invasion of the area. The efforts that the Dalai Lama finds himself with to act as a force of continuity are limited. Being in exile in India, the Dalai Lama is unable to directly affect any sort of policy change in regards to the Tibetan people, so he must appeal to western powers and point out human rights abuses in hopes that something will be done: â€Å"The exiled Dalai Lama finds himself standing on the sidelines unable to impede or reverse changes in his country that he deplores, and the frustration engendered by this impotence has seriously heightened the danger of violenceâ€Å" (Goldstein, 1998). For instance, the Chinese government initially implemented agricultural policies that lead to widespread famine and deaths throughout Tibet: The Chinese Communist Party restructured Tibets farming and nomadic pastoral areas into communes, and†¦placed Tibetan traditional culture and religion under severe attack. Between the rebellions, food shortages, and struggle sessions against "class enemies," Tibet suffered substantial privation. The full loss of life is still not clearly known, but the damage to Tibets culture was substantial (Goldstein, 1997, pg. 59). In response to the Dalai Lama’s pleads to the western media, China responded with modernisation efforts meant to improve the quality of life for Tibetans. There were many different aspects to China’s modernisation efforts, which was known as the China Western Development plan. Part of this effort was to build the Qinghai-Tibet Railway. Along with economic reforms, China instituted agricultural reforms, as many of the deaths were a result of the lack of food that could

Thursday, September 26, 2019

Discuss Principles of Teaching and Learning in Relation to a Teaching Essay

Discuss Principles of Teaching and Learning in Relation to a Teaching Session and Reflect on the Experience of Teaching a Studen - Essay Example They help educators to analyze the quality of instruction they deliver to learners and the opportunities they offer to students. People refer to the principles of learning as laws of learning (Amin and Khoo, 2003). This paper covers the various applications of principles of learning that educators apply in the nursing profession. These principles are tremendously vital in the nursing profession. This is because they enable nurses and other professionals with the responsibility of teaching to impart relevant and sufficient material to their respective students. The principles give additional insight on the things that make people learn in the most efficient manner. Scientists have discovered them, tested them, and used them in practical situations and thus making them reliable and applicable in the profession (Killen, 2006). These principles are particularly vital in the nursing profession since they enable teachers and students to reflect on practice. It also supports professional di alogue that is the parties use to strengthen pedagogical practices. Role of the nurse as educator A Nurse educator is a professional person who has undergone advanced educational and clinical training and has spent many years in the healthcare specialty. There are various core skills that strengthen the nursing workforce in the process of providing peer mentorship. These include a combination of a passion for teaching and clinical expertise. These are the specialized skills that differentiate the nurse educator and other clinical professionals. For one to be an excellent clinical educator, a passion for teaching is particularly vital. One should engage in practices that they have an interest in, and this makes the work easy. One should also posses various learning and teaching principles and skills that should guide them in the process of imparting knowledge to other people (Callara, 2008). The nurse educators have a responsibility of designing and evaluating academic programs for c linical staff and the nurses. Having worked in the profession for a long period, they have the necessary and appropriate experience that they have gathered to make decisions concerning what should be taught to clinical staff. They are aware of the changes that should be made to make the professionals improve their skills and expertise significantly. They alter various educational programs that include degrees, certificates, and other informal, continuing educational programs so that they can meet various individual learning needs (Georgii, 2011). In the world today, people expect the nurse educators to redefine the learning process for better work-flow and outcomes of various educational systems. This will make sure that the educational system is in line with the diverse and ever-changing environment of healthcare. Through this, they will sufficiently guide patients and students through the process of learning (Killen, 2006). Nurses have a role of imparting new computer technologies to their preceptors and patients. The nurse educators serve the teaching role in community health and schools education events. With advancement in technology, the nurse educators play an extraordinarily vital role in ensuring the community is conversant with the emerging technological advancements. The nurses who have gathered

Art Essay Example | Topics and Well Written Essays - 500 words - 7

Art - Essay Example Unlike drawing, there are multiple forms of mediums that include paper, wood and metal. Actual pressure is applied to the medium form to create art. Mount Fugi, from the Thrity-six Views of Mount Fuji by Katsushika Hokusai. Painting is a form of art where paint or color is applied to a form of medium that is usually brushed on. Surfaces that painting occur on include walls, paper, canvases, wood and glass. Paintings appear more naturalistic than drawings which may seem sparse. Pablo Picasso was a famous painter who created Doer Maar au Chat (1941). Encaustic: is also known as hot wax painting where hot beeswax is applied in order to add colored pigments. It is usually put on either wood or canvas. Metal tools are used to shape this paint before it cools down. Encaustic painting began in Egypt around 100-300 AD and later was used by many 20th-century American artists. This painting became prevalent around the 1990’s when people starting using electric irons, hotplates, and othe r heated instruments on different mediums to make abstract designs and other complex paintings. Fresco: involves a mural painting type that is usually created on plaster on either walls or ceilings. It is actually an Italian word that comes from Latin meaning â€Å"fresh.† Frescoes began in Greece around 1500 BC and became prevalent in Roman wall paintings.

Wednesday, September 25, 2019

Management Case Study on Sara Lee Corp Example | Topics and Well Written Essays - 1000 words

Management on Sara Lee Corp - Case Study Example What is your assessment of the long-term attractiveness of the industries represented by Sara Lee Corp’s business portfolio? Sara Lee Corp is represented in four industries: packaged meat products, retail coffee and tea, bakery products and household and body care products. In two of this industries, packaged meat products and retail coffee and tea, Sara Lee had huge market shares that is could leverage to sustain its profitability and thus retain their attractiveness. In the packaged meat industry Sara Lee held huge market shares in several categories within North America: 30% smoked sausage, 23% hotdogs, 14% lunch meat and 58% breakfast sausage (Thompson & Gamble, 2010). Given the aging of the US population and general mean rise in per capita incomes, we expect the demand for convenience food to remain high. In retail coffee and tea, Sara Lee held huge market shares in the US, a few European countries and Brazil. Furthermore, it also sold the most single-serving coffeemake rs in Europe. With the global retail coffee market expected to grow from $51billion in 2009 to $62 billion in 2013 we can presume the industry will remain very attractive to Sara Lee. The bakery products success was limited to Spain and the US. With Spain’s economy doing poorly and huge costs incurred in the US while to secure shelf space in US supermarkets we find the long-term attractiveness of this industry to be low. In the household and body care industry Sara Lee’s Kiwi harbors the greatest potential to long-term attractiveness given that it was the number one shoe care brand worldwide with a global market share of 30%. We believe that the firm could use the income it obtains from Kiwi to sustain the brand’s competitive advantage. What does a 9-cell industry attractiveness/business strength matrix displaying Sara Lee’s business units look like? What is your assessment of the competitive strength of Sara Lee Corp’s different business units? Sa ra Lee’s North American Retail division, North American Foodservice division and International Beverage divisions all have very high competitive strength largely because they have strong portfolio of market leading brands within industries that have been projected to grow in future. The global retail coffee market is expected to grow from $51-62 billion by 2013, and with ageing populations in US and Europe, we expect the demand for convenience food to also rise. We also see the company innovating in the meat business (e.g. in meat slicing) and offering complimentary products in its coffee business (single-serve coffee machines). Sara Lee could leverage its market share as bargaining power over its suppliers and customers or enter into alliances to strengthen it further. On the other hand, the North American Fresh Bakery division, International Bakery and the International Household and Body Care divisions are not as convincingly as strong as the other three divisions. North A merican Fresh Bakery has well performing brands and strong market share however; we are informed that its revenue arose when the company negotiated for increased shelf space at supermarkets and other selling stores. Assuming that â€Å"negotiating† for more shelf space implies extra costs we would expect less profits accruing to the company in this arrangement. The fact that Sara Lee has to negotiate for extra shelf space to improve its revenues lowers this division’

Tuesday, September 24, 2019

MM416 Essay Example | Topics and Well Written Essays - 500 words

MM416 - Essay Example Strategic management accounting has not been described in a justifiable way in order to eliminate any doubts of reflection in the management accounting textbooks (Hoffjan & WÃ ¶mpener , 2006). Therefore, the lack of use vastly recognized understanding is associated to the reluctance of the textbook authors in the usage of "strategic management accounting." There are different ways through which Chief Financial Officers (CFOs) determine management accounting innovation in an organization. According to David Naranjo-Gil, innovation in management accounting is referred to practices, and ideas that are viewed as new in its adoption in improving organizational efficiency and performance (Naranjo-Gil , Maas , & Hartmann , 2008). Therefore, CFOs determine and ensure the adoption of these practices by assessing and reporting the required financial and non-financial information in making concrete organizational decisions. The individual variances between CFOs and their respective characteristics dictate the use of organizational innovation in management accounting. According to a dissemination study on management accounting, most public sectors adoption of management accounting innovations is significantly affected by the central government. As a result, the determination of management accounting innovation by CFOs is based on various politica l and economic factors. Strategic planning process is a core element in improving organizational efficiency and business operations. According to Gonn K. Weide, there are a vast range characteristic of strategic planning process that can be adopted by the management in accomplishing short-term and long-term organizational goals. For instance, an effective strategic planning must incorporate communication strategy, a task force, vision and mission statement, values, goals and objectives, activities, an implementation strategy, and a

Monday, September 23, 2019

SAM 482 UNIT 8 Essay Example | Topics and Well Written Essays - 500 words

SAM 482 UNIT 8 - Essay Example In the identification phase for risks in crowd management plan, the following factors are considered; crowd behavior and control, noise levels, risks of fire, weather and use of drugs and alcohol that would lead to unruly behavior. The plan also incorporates suppliers and contractors. Risks related to their participation in an event must be identified. These could include incompetence of staff, resignation or absenteeism, theft and loss of assets among others. In the risk management action plan, the risks are identified in order and an action drafted with a timeframe. Responsibilities are allocated to experienced staff and recommendations drafted on how the risk will be monitored. This justifies that an effective crowd management plan must be in harmony with the risk management plan. Incorporate an emergency plan. A written action plan is important for this issue. The staff should be in a position to respond to emergencies promptly. Instructions detailing emergency phone numbers, exit routes, fire extinguisher strategic positions should be accessible to all users of the facility. Any risk and or an accident must be recorded by the event holders. This will assist in planning future events. Transfer of risk is an appropriate strategy for the organization. Before an event, the event organizer should hold Public Liability Insurance with a detailed Risk Management Plan. The plan should incorporate all risks anticipated during the sporting event. Crowd management plan is an integral element of the larger risk management plan for sporting facilities. An effective crowd management plan will mitigate risks to an equal level of the risk management plan. The two plans must be harmonized since their objectives are

Sunday, September 22, 2019

A review of my personal crime prevention strategy Essay Example for Free

A review of my personal crime prevention strategy Essay My idea for the preventative crime strategy is â€Å"soft drug† education. In many European countries, softer alcohols like wine and beer are not policed as strongly as hard liquor. The idea behind this began in Germany when alcoholism was beginning to become more and more prevalent. Said problem was thought to be solved if alcohol was introduced differently. To be introduced to the family or at a younger age, as less of a risky or dangerous or rebellious thing. This has led to a drop in alcoholism as these drinks are normalized from a young age. In turn, the United States school system has, for decades, been using the D.A.R.E. program but this has been shown not to actually work. It uses fear mongering and essentially educating students that if they were to come in contact with marijuana, they would die. This does not, has not, and will continue not to work. My idea is to create a strategy of soft drug education. This means treating marijuana, though schedule 1, as a weak or even purely/mostly medical drug instead of a dangerous gateway to amphetamines or heroin. So by removing the stigma of being a gateway, I hope to remove it from actually becoming one. Marijuana education would be taught differently; especially as decriminalization and legalization continue throughout the country in various stages. As of now, it is schedule 1, which means it has no medical properties. Currently, even cocaine is ranked as schedule 2, meaning it can be used in some medical scenarios. Marijuana is also often spoken of as a starter drug or gateway drug. An idea that began as simply an idea, but recently has become more of a reality. Drug dealers lacing the marijuana with addictive drugs, or mental addiction, even with people just chasing the high. But a new education could reframe the plant. This would be done so the young people coming in contact with it know what it does, what it looks like, and how it feels. Lying about drugs no longer works in a digital age. A heroin addict I once spoke to talked about how no one ever said how good drugs could feel, so if they lied about that and lied about weed killing you, why not keep trying? The gateway effect was not due to him wanting to try more drugs just to try more drugs. He had felt that if marijuana had not been this addictive and deadly substance, the other dangerous drugs would not be either. The lie itself led him to those harder drugs. So essentially institute a normalization effect on marijuana. Remove the idea that it is a narcotic. The best-case scenario would be for it to be seen as a medical drug first. Similar to Tylenol or cough syrup, a drug that is purely medical in the eyes of the public, first. The first way to go about it would be getting to the smokers first. Many times children will pick up a tobacco habit before marijuana and thus before hard drugs. So the first step would be printing medical information on cigarette cartons. More and more, tobacco companies have to put the cancer-addled pictures on the cartons, and though it is meant to be a deterrent from smoking, most smokers probably just don’t look at it. This is instituted by the Surgeon General and thus cannot be fought by the tobacco companies. So putting medical facts and statistics would lead a wandering eye to see benefits of what they may have previously heard is a dangerous drug. From here, there would need to be the differentiation between marijuana and harder drugs sucks as heroin, methamphetamine, and LSD. Those listed previously are all scheduled as narcotic only with zero medical use whatsoever. Again, cocaine is listed as safer than marijuana. So it is first important to work on changing this v iew. This could occur by interlacing the failing scare tactics with the benefits of marijuana. Many shops exist countrywide, and even on South Street here in Philadelphia where â€Å"tobacco paraphernalia† are sold. So in those places make ads that may push marijuana and tobacco but put down hard drugs. Along the lines of â€Å"When you snort cocaine your heart explodes, when you smoke weed you get hungry.† Different things similar to these. This along with the D.E.A. (Drug Enforcement Administration) rescheduling, the adult/population-wide feeling against the plant could begin to lift. If various states are legalizing and/or decriminalizing, along with the national government says it is less risky, people would be more open-minded. The most important push, however, would be the medicalization side. The best way to remove a stigma, to remove a dark side of something, is to make it beneficial. The inverse of this was seen with the medicine Sudafed. It was pulled from shelves when it became public knowledge that the drug could easily be used to manufacture forms of methamphetamine. Marijuana has already begun to be shown as a medicine. The drug has been used for soldiers to relieve post-traumatic stress disorder, with chemotherapy patients it increases appetite, in various illnesses such as arthritis it stops inflammation. Marijuana already has shown the potential in many ways to be a medicine. A cheap, easy to create, strong, and it has multiple uses, drug. If it were to be rescheduled and pushed publicly, in news or music or shows, as less of a narcotic and more of a medication, the stigma would fall away. This relates to community crime prevention in many ways. The first idea of which is the connection to the basics needed to commit a crime; a place, a person to commit the crime, and a crime itself. Even without a straightforward target, if the drug is no longer seen as a drug then the target is hardened. It is more difficult to see a legal, medical, plant as a dangerous and rebellious activity. This also falls into social disorganization theory, if marijuana is medical and harder drugs fall away, then the usage of marijuana could be seen as a norm in communities similar to tobacco use or over the counter pain killers; drug culture would begin to fall away and thus rougher communities could come together more against the harder drugs. A generation bypassing heroin use would more easily be able to push out the heroin dealers. So not only would the soft drug education lead to fewer people using the harder, more deadly drugs, but it could lead to communities pushing harder and more openl y against drug dealing. (As a side note: those who dealt/grew marijuana would easily be able to ascertain occupations in the then-legal marijuana growing industry, thus a legitimate job would prevent them from dealing other illicit drugs). As well as with fewer drug dealers present in neighborhoods, violence would drop dramatically. No more people violently high on cocaine or PCP or other â€Å"uppers† as well as no more drug-based robberies. Many drug dealers are robbed because they are seen as sources of money; so either they get robbed or often times they will carry firearms and shoot their robbers. Either way, there would potentially be a drop. As well as the growth of marijuana by those who have (though illegally) been doing it for years could show to be lucrative and make low-economic-class areas into self-made enterprise zones. As discussed in class, there must be an audience to market these ideas too as well. There are two main audiences: those who are 40 years old or older, those 12 and younger. The older crowd in order to push the idea that marijuana is not harmful, the younger in order to push that it is â€Å"really a medicine† and to keep pushing for other drugs being dangerous. As the FBI and ATF speakers also spoke about, the Hobbes Act is extremely important. But the ATF speaker brought up a strong point: marijuana can be grown anywhere hydroponically. It is currently not a Hobbes Act infringement because it cannot be traced. To tie in with my idea before, if Pennsylvania were to follow through with any of these ideas, then marijuana is no longer a drug and thus any/all sales of illicit drugs become federal crimes. There is nothing scarier than saying â€Å"ALL _____ CRIMES ARE FEDERAL CRIMES† and this would push drug sales into that category. The soft drug education has multiple parts. The rescheduling of marijuana, the bettered education and allowance of use, and the final step to make it publically seen as more of a medicine than a drug to get high off of. Especially since the indicia strain of marijuana (as opposed to sativa) mostly works with treating pain, hunger, insomnia, stress, anxiety, inflammation, and other medical ailments with less of a physical â€Å"high† from the drug.   With the proper pushing to legalize then re-educate the masses, hard drug use would drop dramatically. The main purpose is not only to allow for a medication to be used by the medical community but if this works it should prevent the gateway effect. Within a generation, a large-scale drop in heroin, LSD, cocaine (crack and powder), Mescaline, ecstasy, and all other truly dangerous schedules 1 drugs. That is my crime prevention strategy. Prevent the gateway effect and thus prevent a generation of drug crimes or drug-related crimes (such as in Goldkamp’s trichotomy) on a massive scale.

Friday, September 20, 2019

The Motivation And Rewards Management Essay

The Motivation And Rewards Management Essay Motivation and rewards has been chosen as our topic for this assignment. Motivation and rewards is very important for any organization or even any industry. Motivation is a behavior that cannot be created but can be influence while rewards are something that the employees gained from doing a good job in their work (Thomas, 2009). AirAsia was the company that chosen for this assignment. AirAsia do implement the motivation and rewards in their company successfully. AirAsia is a low-cost airline business which had become more and more popular around the world. AirAsia was established on year 1993 and started its business in year 1996 (McNamara Troftgruben, n.d). Government owned corporation is the found of this company. AirAsia is the largest company that introducing pioneer of low-cost travel and largest low-fare and in Asia and they have their slogan which known as Now Everyone Can Fly. AirAsia is a successful example for other airline companies. It has been transformed as an unthinkable concept to be successful in airline industry. This success can be proved from a money-losing task to profitable. Although AirAsia introducing no-frills service to their customer and using second hand aircraft, but it would still be a threat for other Asia airline companies (Michael Swathe, 2011). AirAsia have a very good performance in consumer mind by offering low fares, majority on-time record for flights and maintaining staff with high productivity and work ethic. Based on the information in Indonesia Straits Times, it is stated that in August 2011, Malaysian Airline form an alliance with Air Asia but the agreement of both airlines were voided because the alliance was struck down by the Malaysian government. (Leslie Lopez, 2011) AirAsia now is a successful airline company which expand from 2 planes to 80 planes and from 200 000 passengers to over 75 million passengers in 7 years time. It is a visible success that we can see year by year. (McNamara, 2012) Content Motivation In management, motivation defined as a power to force someone to work in certain way so that it able to reach certain desired goal. As what people always said, motivated people always work harder as compare with those unmotivated people. According to Lavinsky (2012), a company should make the employees feel doing something meaningful. As a result of a survey done by BNET show that majority agrees doing something meaningful were the most motivating things about work. According to Lavinsky (2012), motivation is internal and external factors that inspire employee interest, in which they need to, listen, focus and understand employee needs and wants through an effective communication. A company manager should change the question from Whom to How. An example given by Lavinsky (2012), say How we can improved this process? rather than, Who screwed up this up? This action might able to motivate the employees so that they will be more careful for their work so that wont disappoint their company. To have motivated workers, a manager must treat workers as individual, empower employees, redesigning jobs, and provide a comfortable and flexible workplace. Below are the meaning of the effective management practices (Griffin, 2006) :- Effective management practices Description Empowering employees Empowering employees means that giving the individual in an organization authority, autonomy, trust and encouragement to complete their tasks. Redesigning jobs Redesigning jobs is one of the best motivations in the workplace. Usually individuals go to work every day doing the same routine. This makes the workers become less motivated. Something actually can be done by the managers to improve the condition before the employees become de-motivated and bored. The way that manager can use is job redesign. Concern and knowledge are required for managers and have them bring it with them to the organization and then apply motivational theories into their work to improve the productivity and satisfaction of the employees. Creating flexibility World nowadays is all about flexibility. People nowadays have too much things to take care of but they do not have enough time to do it. Employees value more about personal time. Due to the family needs, a traditional nine-to-five working hours every day except Sunday may not work for many people. Therefore, flexibility which let employees to control and set their own working hours is the best. In AirAsia point of view, they believe that their entire staff act as contributor for the company, therefore, they always been treated as a big family and equally. This is an example of empowering employees. The company will have constantly talked with their employee in order to understand their needs and wants. They will organized a monthly staff forum and create some fun programs to help them release their working stress. In the event, they also give employees an opportunity to speak out their point of view towards their working place (McNamara, 2012). According to Zhu (2010), even though the salaries gave to employees were low, but all employees were giving broad range of incentives. Such as, share offers stock options, productivity and performance-based bonus. Those motivations may give employees sense of ownership and it able to improve in effective and focused workforce. Despite that, Airasia employees are able to perform in multiple roles in flat organizational structure because the airline has implemented a flexible work rules (Zhu, 2010). This can be an example of creating flexibility. Flight attendants also can be work at check-in counter. They can change to different department after they work for one month. By doing this, the employees wont be bored to working in the same area. Flexibility will motivate the employees to work harder because they are happy with all the flexible rules given and thus, they can gain more experiences in that industry. Even though AirAsia always try to minimize their expenses cost, but they are very determined on employee work ethic. Therefore, AirAsia always provided their employees the best training and ensure that they are happy in their working place. (Foo, 2012) This can be called as redesigning jobs. As a result, AirAsia gets to establish a numbers of quality and excellence employees because the employees are sa tisfied with their jobs that are always fresh to them. Reward A reward is a scheme to support desirable behavior. Rewards can be in terms of financial and non-financial. Example of financial reward is bonus pay and example of non-financial reward is degree of achievement, opportunity to growth or even praise from the top management or manager for doing a good job. Reward is different from motivation. Reward is something that the worker or employees gain from putting effort in their jobs while motivation is something that they need to have in order to put more effort in their jobs. Intrinsic and extrinsic are the two types of rewards that can motivate employees. (Mcrill, n.d ). Types of rewards Description Intrinsic rewards Intrinsic rewards are self-administrated. An intrinsic reward refers to the motivation that comes from inside of an individual rather than from any outside rewards such as bonus, gifts and so on. It is an outcome that gives an individual personal satisfaction such as an experience after completing a job, professional growth and sense of pleasure. The individual will feel good because he or she have the feeling of learning and achieving something which can be also called as personal development. Besides that, the individual will also have the feeling of competency and self-control over her work. The motivational stimulus in intrinsic do not depends on the actions of other people. People always trust that the most powerful rewards come from a persons inside. Extrinsic rewards Extrinsic rewards are externally administrated. Extrinsic rewards are usually can be seen like financial in nature. For example, an increase in wages, special assignments or incentives for reaching some quota. In addition, extrinsic rewards can be also as simple as getting a verbal compliments, public recognition, and awards for achieving something, promotions and some other extra responsibility. The motivational stimulus in extrinsic depends on the actions of other people which is also opposite from the intrinsic rewards because it originates outside the individual. All those rewards are very important for most of the workers therefore the rewards can be motivating. They will feel they are valued or been appreciated. In every management, intrinsic reward is a must to be given to the employees. While in AirAsia, they have a very good relationship with their employees. Employees reward given by AirAsia is very worthy. Every year, some of the employees will be chosen to get free flights to different destinations if they do well in their jobs. They also provided up to 90% of discount for their employees on concession travel. This encourages employees to put more effort on their responsibility in order to get the rewards. Besides that, AirAsia awarding bonuses based upon each employees contribution to the company productivity, and expects to increase loyalty through its ESOS (Employee share awarding scheme) which will be available to all employees and it also may help employee to improve their performance. The groups management encourages open communication which creates a dynamic. AirAsia also awarding long service awards for their employees who work more than 10 years. Motivation and Rewards Although its mention above that reward is different from motivation, under some circumstances, reward able to build in motivation. In social psychological terms, it also referred as the hidden cost of rewards. According to Frey (n.d), he has using an economic concept to define this theory, which is bonus against effort. A purely price effect shown increase in bonus also can increase employee effort towards their work. In other word, motivation always link with reward. AirAsia do apply this in their management. Not only AirAsia, even other companies will do. Before they serve the customer, they do find many ways to satisfy the employees such as giving motivation and rewards. When the employees are satisfied and happy with the job, they will be more enjoying and run their tasks better. Thus, AirAsia customers will be treated in a better quality of service. Lastly, as what have discussed above, a financial or non-financial rewards might given by the company to their employee in order to motivate them to be more responsible towards their job. Example, AirAsia award bonuses to their employees based on their performance, so it is a kind of motivation that able motivate their employees to work harder in order to achieve the desired goal, which is to get the bonus. Findings Multiple roles performance of AirAsia in a flat organizational structure has the possibility as mentioned by Zhu (2010) which is to compromise the AirAsias production in the future as it evolves. The efficiency and the effectiveness on task maybe lowered when multiple tasks assign to the employee. This is because employee will feel de-motivated when the job scope assign to them is too wide for them to focus on the job. Besides that, too wide of job scope and multiple task assign to employee can lead to confusion on the job in the organization. Hence, this could possibly result in a low efficient state for the AirAsia as the organization trying to expand for a better growth and affecting the airlines productivity indirectly because the ability to perform is a short-term worthwhile competitive advantage due to over dependence on the employees (Zhu, 2010). http://business-strategy-competition.knoji.com/strengths-and-weaknesses-of-airasia/ Moreover, Air Asia receives a lot complaint from customers on their service (Solano, 2012). There are several complaints has been made from the Air Asia customers. Flight delays, unnecessary charge payment being conduct and not able to change the flight or get a refund when the customers could not make it on the booking date were some of the complaints that the customers made. There are also complaints like bad services from the staff that are in charge on the particular shift. Besides that, as what stated by Solano (2012), Air Asia did not have their own maintenance, repair and overhaul (MRO) facility. Therefore, if Air Asia continually received the same complaints and did not make any improvements on the spot, this would result the loss of customers and also the productivity of the company. As confidence and satisfaction levels of customers drop, it affects Air Asia profitability. http://prezi.com/w-ee64ceukic/airasia/ In addition, Air Asia has fast track promotion as what mentioned by the Malaysia Airline Families. Fast track promotion actually means that it is the fastest and most direct route to achievement. Malaysia Airline Families says that if an employee worked for Air Asia since 1997, his or her salary will still remained based on the last drawn salary as of year 1997. Last drawn salary is the last drawn monthly essential salaries which also includes the pension allowance. When the payment of salaries are below their expectations and no increment that is being awarded from year to year, this could lead employees to be de-motivated from working in the organizations. Despite that, they might plan to shift to the other company that provides them with increment that they think they should have it. (Malaysiairlinefamilies, 2013) http://airasiafamilies.wordpress.com/category/experiencing-bad-services-with-airasia/ However, Air Asias employees were not unionized as been stated by Zhu (2010).Air Asia policy was mainly focused on maximizing efficiency and productivity of the company. Besides that, Air Asia also tends to keep their staff costs at a consistent level with low-cost carrier industry standards. This means that the Air Asia employees were provided with a wide range of incentives. Even though salaries offered to the employees were lower than the salaries of their rivals, at least Air Asia still offer their employees with a wide range of incentives. This shows that Air Asia still give their employees some benefits. The awards being given to the employees are the performance-based bonuses (PBB), share offers, and stock options (Zhu, 2010). http://business-strategy-competition.knoji.com/strategic-actions-adopted-by-airasia/ Other than that, pilots in Air Asia were provided with some rewards or benefits to improve the flight operation. Air Asia adopted a sector pay policy. They can both keep flight and minimum their operating time. Besides that, flight sectors can be covered as many as possible within a day. Therefore, Air Asia adopted a sector pay rather than an hourly pay scale for their pilots. Moreover, Air Asia gets to cut down the number of cabin crew or can be said by saving on employees cost is because of the absence of the in-flight services (Zhu, 2010). This can be said as a method of minimizing organizational expenses. It is a trend in the global airline industry nowadays especially in the Air Asia. http://business-strategy-competition.knoji.com/strategic-actions-adopted-by-airasia/ Recommendation We highly recommend that the management of AirAsia should reconsider their training course for their employees and provide re-training if possible. According to Adams (1998), management training courses fail because they: (i) are too generalized; (ii) fail to meet the specific needs of trainees; and (iii) fail to take into personal characteristics such as age, educational back-ground, previous work experience and willingness to participate in training. Besides that, Analoui (1997) mentioned that considering the perceptions, personal interests, objectives and preferences of trainees could result in greater understanding of training objectives. Hence, employees will have a clearer view of the roles in performing a certain task and carry it out more effectively. Role perception is one of the MARS model component which affects employees voluntary behaviour and performance. The management can kill two birds with one stone by implementing it because it will increase the effectiveness and e fficiency of the management. For example, every actions performed by the employees is in the best interest of the company and not otherwise. Besides that, AirAsias management should also further improve on their organizational (affective) commitment in the workplace. Affective commitment is the employees emotion attachment to, identification with and involvement in a particular organization. In another word, affective commitment is a persons feeling of loyalty to the place where he or she works. First and foremost, organizational commitment can be boosted via organizational comprehension. This refers to the overall comprehension of the organization, including its strategic direction, social dynamics and physical layout. For instance, giving staff information and opportunities to keep up to date about organizational events, communicate with co-workers, discover what circulating in different parts of the organization and study about organizations history and future plans. Besides that, trust is the key to unlock employees loyalty. This refers to the positive expectations that one person has towards another person or group in situation involving risk. AirAsia should increase employees job security to enhance trust that employees have in the management and the employment relationship. Last but not least, Four-drive theory can be practically applied to the management of AirAsia. The theory explains the innate drivers to acquire, bond, learn and defend and that incorporates both emotions and rationality. Besides that, emotions play a central role in employee motivation. These drives create emotions, which represent the prime mover or source of effort of individual behaviour. The first recommendation is that the management of AirAsia should create a best workplace that helps employees to fulfil all four drives. Therefore, the management should provide sufficient rewards, learning opportunities, social interaction and so forth for all employees. The second recommendation is that fulfilment of the four drives must be kept in balance; that is, AirAsia should avoid too much or too little opportunity to fulfil each drive because the four drives counterbalance each other. For example, change and novelty in the workplace will ease the drive to comprehend but too much of it will initiate the drive to defend to such extent that employees become territorial and resistant to change. Thus, it is vital for the management to provide balanced opportunity to fully utilize it. Conclusion Air Asia as known by everyone that a successful and well established airline company not only in our country Malaysia but also in the world. There have many way to define the successful of this airline company, one of it is using the correct way to manage the company, and the way is motivation and rewards towards the company, all of that we had mentioned above. Everyone knows that human capital is important for a company, and the human capital of a company means is employee of one company. A motivated and rewarded employee can be a productive employee. A productive employee can be a very profitable employee. While employees that are de-motivated, they will become less productive, less creative, and this may cause less of an asset towards the company. Now more than ever, company needs motivated employees. When the employees become more productive, the company will also become more productive, while productivity of a company increase, the profit of a company will also increase. With th is the company will stay in the competitive business and ready to go conquer the world. In this assignment, we have learned much of things, one of it is motivation and rewards are a good corporate culture that will direct a company to a successful way. Furthermore although Air Asia is a successful and well established airline company, it also may have some weaknesses that we mentioned in the findings part, but that is not a problem. We just need to find out the way to solve the problem. By this a company just can continue leading in the industry and unscathed in this kind of we call it competitive and cruel business world.