Monday, September 30, 2019

Definition of following terms Essay

Time value of money This refers to the principle that a dollar on hand today has more value than a dollar received sometime in the future. Keown, A. J., Martin, J. D., & Titman, S. (2014). Financial Management: Principles and Applications (12th ed.). : Pearson Education, Inc.. Efficient market Refers to the type of market where everyone receives the same time of information and prices are reflected based on this information. Business Dictionary.com. (n.d.). Retrieved from http://www.businessdictionary.com/definition/efficient-market.html Primary versus secondary market Primary market refers to the securities a company sells for the first time for the purpose of raising money. Securities traded after initial investment are done through the secondary market. In the primary market, the issuing firm receives the money; in the secondary market if the shareholder of the firm decides to sell he receives the money. Keown, A. J., Martin, J. D., & Titman, S. (2014). Financial Management: Principles and Applications (12th ed.). : Pearson Education, Inc.. Risk-return tradeoff This principle is based on the risk that investors are willing to take for a promise of higher returns on investments. Keown, A. J., Martin, J. D., & Titman, S. (2014). Financial Management: Principles and Applications (12th ed.). : Pearson Education, Inc.. Agency (principal and agent problems) Refers to the problem companies face in motivating their managers who act as agents in pursuing the interests of the owners (shareholders). Keown, A. J., Martin, J. D., & Titman, S. (2014). Financial Management: Principles and Applications (12th ed.). : Pearson Education, Inc.. Market information and security prices and information asymmetry Security prices change as information is provided to all investors. In contrast in information Asymmetry one party may benefit from having more sources of information and therefore making better decisions. What is Information Asymmetry. (2014). Retrieved from http://www.investorwords.com/2461/information_asymmetry.html Keown, A. J., Martin, J. D., & Titman, S. (2014). Financial Management: Principles and Applications (12th ed.). : Pearson Education, Inc.. Agile and lean principles The lean principle in Finance refers to the production practice that companies use in which they target to minimize waste and use the the least amount of resources to meet the customers’ needs. Organizations that use agile type of processes allow to work on smaller projects to revamp production, maximize collaboration and allow for more flexible schedules. What is Project Management. (2014). Retrieved from http://www.villanovau.com/resources/project-management/what-is-project-management/#.VFKo2vldW So Return on investment It’s a form of investment measurement that shows how efficiently a company is using its resources. This ratio is usually expressed as a percentage. http://www.businessdictionary.com/definition/return-on-investment-ROI.html Cash flow and a source of value This is the money a company has after it has paid its bills and after it has used the money necessary to operate the business. The value of a company’s investment lies in the amount of cash flow available to spend. The Free Dictionary. (2009). Retrieved from http://financial-dictionary.thefreedictionary.com/cash+flow Project management This refers to the processes that involves all aspects of a project, ensuring that it is done well, on time and within budget. Processes in Project management include initiating, planning, executing, monitoring, controlling, and closing. What is Project Management. (2014). Retrieved from http://www.villanovau.com/resources/project-management/what-is-project-management/#.VFKo2vldW So Outsourcing and offshoring Outsourcing happens when a company contracts the services of a third party to do the work for the purpose to increase efficiency and lower costs. As opposed to offshoring this does not have to happen out of the country. Offshoring happens when a company moves abroad to reduce the costs of running its operations. What is the Difference between Outsourcing and Offshoring. (2003-2014). Retrieved from http://www.wisegeek.com/what-is-the-difference-between-outsourcing-and-offshoring.htm Inventory turnover Inventory turnover is a form of measurement of how frequently a company sells and replenishes its inventory. The Free Dictionary. (2009). Retrieved from http://financial-dictionary.thefreedictionary.com/ Inventory+Turnover Just-in-time inventory (JIT) JIT inventory system maximizes the profit by just keeping enough inventory as needed and making more frequent orders, saving space and the money associated with keeping up with large inventories. Wise Geek. (2013-2014). Retrieved from http://www.wisegeek.org/what-is-a-just-in-time-inventory.htm Vendor managed inventory (VMI) It is the type of inventory model where the manufacturer is responsible for keeping up with the levels of the company’s inventory. Vendor Managed Inventory. (2014). Retrieved from http://www.vendormanagedinventory.com/definition.php

Sunday, September 29, 2019

“I’m Still Here” by Veronica Ross Essay

Courageous and full of determination, Jake Garson in one of the short stories I’m Still Here, written by Veronica Ross, shows the set of characteristics that many Canadians regard as expressing their unique place and role in the world. He tried to fight and stand up for his own rights against the government through his act of bravery. By doing this, he had influenced many people in his hometown that faced the same situation as Jake; however, they did not show the same kind of courage that Jake showed. Readers who like to reevaluate and rethink what they are reading are recommended to read short stories such as I’m Still Here. It is one of the stories that teach us the moral lessons of standing up for yourself without anger or violence and to have a positive attitude at all times. This is one of the effects it had made to the short story. Some other effects also include a slow beginning introduction with an unpredictable ending. The author also does an excellent job of capturing the reader’s interest through plots twists, characters, theme, symbolism and much more, which made an effective short story. Although the use of vulgar language had made an unattractive impression, it showed the characteristics and emotions of the character inside the story, which made it more alive for the readers to read. Kezia, the main character from the short story The Wedding Gift, written by Thomas Raddall had a similar situation like Jake. Both of the short stories teaches us the moral lessons of standing up for yourself. Courage and bravery was something Jake had successfully shown in the short story. â€Å"Glad to see you’re standing up for your rights. We had the same thing happen to us, but we didn’t have your courage. Good luck† (Ross 201). In the story, the government wanted to take away his land with fair compensation being paid. However, Jake was not caring about the money; he was determined to stay because he was born on that land and it had been in the family a hundred and eighty years. His roots are there so losing it would be like losing a part of him. Although it looked like a foolish act to do, it had influenced many people in his hometown. All the children came and said the same thing, â€Å"that Jacob Garson was a hero, a man brave enough to stand up for his freedom. And that they were behind him† (Ross 201). However, not all people supported him. They were others who thought he was being selfish and tried to threaten him. â€Å"We’ll burn your house down, you  fool† (Ross 199). â€Å"Your land could be enjoyed by all, you selfish son of a bitch† (Ross 202). Nevertheless, those people did not make a successful interference toward him. With this bravery attitude and act of determination, it had made an effective short story that teaches readers a great moral lesson.

Saturday, September 28, 2019

Leadership Theories Essay Example | Topics and Well Written Essays - 1000 words

Leadership Theories - Essay Example Leaders who use this theory in their organization's exhibit focus, vision, inspiration and risk-taking traits. They possess a charismatic charm in transforming the organization through influence on the employees. Ethically speaking, a transformative leader must only influence the followers in a positive manner. The characters or strategies shown to the employees should be within the ethical requirements of the organization or professional field in question. The objective of a transformational leader is to change the organization positively in all aspects. Transformational leadership is increasingly becoming popular in some sectors due to its effectiveness in ensuring improved performance. Transformative leaders not only influence the followers and other junior members of the organization but impacts also on other leaders. Through the influence, other leaders become agents of change i9n the organization. Followers respect, admire and the transformative leaders. Based on the description by the proponents of the theory, transformational leadership has four components. The components include intellectual stimulation, individualized consideration, inspirational motivation and idealized influence. Through these components, the leader is in a better position to make decisions that will initiate a positive change in the whole of the organization. Through intellectual stimulation, a transformative leader can make decisions in a manner that does not appear to challenge other leaders within the organization. The leaders encourage the followers to adopt creativity when undertaking their duties. Creativity offers the followers opportunities to innovate and learn. The leader can make the decision intellectually without any member of the organization feeling victimized. The second trait that is common among ethical leaders who utilize transformational leadership style entails individualized considerations (Grants, 2012).  

Friday, September 27, 2019

Marriage among the Somali in Africa Essay Example | Topics and Well Written Essays - 1250 words

Marriage among the Somali in Africa - Essay Example Somalia used to be considered the Land of Punt by the ancient Egyptians (Abdullahi 4). They tended to adore its trees, which were responsible for producing the myrrh and aromatic gum resins frankincense. Punt is mentioned in the Bible, and it came to be known as Cape Aromatica by ancient Romans. Somalia is named for Samale or Samaal the Somali people’s legendary father. Most Somali people are Muslims of Sunni sect, and they share a similar language, Somali. Like all other cultures, the Somali people observe Marriage as a passage rite, as well as a fundamental transformation from childhood to adulthood. Traditionally, Somali marriages have created a bond in men and women, as well as between families and clans. The Somali people’s clan groupings are significant social units. Clan membership plays a vital part in Somali politics and culture and clans are patrilineal. They are divided into sub-clans as well as sub-sub-clans, leading to extended families. Somali marriages us ed to be arranged until recently when things changed. The arrangement occurred commonly between a wealthy older man and a father of the young female he wished to wed. Even in the twenty-first century, in many rural areas these customs still remain valid. The man usually pays a bride price in money or livestock to the female’s family (Gardner and Judy 12). Somali society is ethnically endogamous traditionally. Therefore, in order to prolong ties of alliance, marrying occurs between one ethnic Somali to another ethnic Somali of a different clan. Thus, for instance, a recent study showed that among the 89 marriages contracted by Dhulbahante clan men, 62%, (55) were with Dhulbahante sub-clans’ women. 33.7% (31) were with surrounding clans’ women from other clan families. 4.3 % (3) were with the Darod clan family’s women. Traditionally, Samaal marry someone from outside their family lineage or within the family lineage if it is separated from the male by six g enerations or more (Abdullahi 8). The Arab custom of marrying within a father's family lineage is followed by Saab whereby first cousins often marry each other. After marriage, a Somali bride should live with her husband's family while her own parents provide the household goods and home. However, she retains her family name. The Somali â€Å"community† comprises of a varied and a vast array of social groups, familial bonds, and clans, each of which maintains its own beliefs regarding the concept of marriage. According to some Somalis, a girl is considered appropriate for marrying a provided suitor when she reaches age nine. They believe that, incase a girl has not yet been married, by the time she reaches 15 years the girl may be regarded flawed in some aspect hence viewed as bad luck or an outcast to her family. However, in Somali’s central region, there is a strong belief that a female’s suitability for marriage starts immediately the girl's breasts become no ticeable, despite her age. Though this can lead to an inherently immature and extremely young girl child being married off, it cannot be not regarded as problematic for the â€Å"couple.† in this region Somalis believe that just because a female is young, she is not necessarily unsuitable as a wife. The girl should learn her duties as a wife in the period following her marriage if she got married off at a young age. This dynamic is known as â€Å"

Thursday, September 26, 2019

The influence of smoking cessation after diagnosis of early stage lung Dissertation

The influence of smoking cessation after diagnosis of early stage lung cancer on prognosis - Dissertation Example The researcher states that a practice of burning a substance like tobacco or cannabis and inhaling or tasting it is called Smoking. Cigarettes are the most common method of smoking. Pipes, Bidis, Cigars, Hookahs etc are other methods. A research shows that â€Å"half of all long term smokers will die† (It’s Never Too Late to Quit Smoking, Says Study 2012) due to disease related to smoking it suggests that â€Å"even non smokers† are prone to these diseases. Worldwide a â€Å"large number of people† are killed because of these diseases. Study shows that â€Å"one out of two people† die due to their habit of smoking and that too many at their mid age. There is lot of harmful effects on the body like – †¢ Temporary increase of â€Å"blood pressure† and heart beat further straining the heart and blood vessels. †¢ The chances of â€Å"heart attacks, strokes, paralysis and weakness† (Pai 2011). There are â€Å"numerous cancers† associated with smoking. †¢ Smoking at young age â€Å"reduces IQ† of a person. The â€Å"blood circulation† is not proper which affects the body and skin. This also leads to weakness. †¢ It â€Å"damages the retina† thereby affecting the eyesight. †¢ Smoking â€Å"causes the bones to become weak† (Nutrition and Weak Bones 2010) leading to fractures. †¢ â€Å"Fertility† related problems are seen in both men and women. †¢ Smokers are prone to â€Å"kidney, stomach† related diseases. †¢ It also leads to â€Å"lung cancer† â€Å"Pregnancy† related issues are found in women who smoke. The new born child is also adversely affected. People who smoke have a â€Å"shorter life span.† Smoking can cause different types of cancer. These include Lung cancer, Mouth cancer, Throat, â€Å"Stomach† Esophagus, cancer of Kidney, cancer of Bladder, cancer in Pancreas etc. Lung cancer is one amongst the most â€Å"deadliest form of cancer.† (Epidemiology of Lung Cancer n.d.). Every year aboutâ€Å"7.5 million people die† (U.N. Summit as World Cancer Toll Increases 2012) of lung cancer. The â€Å"survival† (Lung Cancer Survival Rate 2011) of the lung cancer patients depends on it’s diagnose stage and type. Now the question arises what exactly is Lung cancer. Due to series of changes in the cells in the lungs they tend to grow abnormally and â€Å"out of control† (Eldridge 2012). This type of behavior in the lungs is known as Lung cancer. This can occur any were throughout the lungs. Lung cancer is mainly classified in to two types, 1. â€Å"Small Cell Lung Cancer† (Lung C ancer n.d.). 2. â€Å"Non Small Cell Lung Cancer† (Lung Cancer n.d.). Small Cell Lung Cancer: Study reveals that around â€Å"10% to 15 %† (Lung Cancer (Small Cell 2012) of Lung cancer patients suffer from Small Cell Lung Cancer (SCLC). It â€Å"spread quickly† (Patient Information: Small Cell Lung Cancer Treatment (Beyond the Basics) 2012). It is more found in people who smoke than those who do not smoke. SCLC is considered as the â€Å"most aggressive form of Lung cancer† (Lung Cancer (Small Cell 2012). It tends to develop in the â€Å"bronchi† (Lung Cancer 2012) which is present in the centre part of the chest and later spreads to the other parts of the body. Small Cell Lung Cancer is also known as â€Å"oat cell cancer, oat cell carcinoma and small cell undifferentiated carcinoma† (Lung Cancer (Small Cell 2012). SCLC has further two other forms namely- â€Å"Small cell car cinoma (oat cell cancer)† (Small Cell Lung Cancer Treatmen t (PDQ ®) 2012): This is one of the most malignant kinds of cancer. It grows within the lungs. â€Å"Combined small cell carcinoma† (Small Cell Lung Cancer Treatment (PDQ ®) 2012). – It is a lung cancer which has different stages. It emerges in the form of a tumor in the lung tissue. Non Small Cell Lung

Criminalistics 40656300 Essay Example | Topics and Well Written Essays - 1000 words

Criminalistics 40656300 - Essay Example Evidence is the most important feature in solving a crime. Then the evidence should be matched with the crime process. A sound knowledge, investigative ability and facilitating materials are required to solve crime. Internet helps in several ways to solve crimes. The purpose of this research is to explore the internet to identify the uses of internet to solve crimes. The use of internet to solve crimes Crime mapping Crime mapping is the illustration of geographical patterns of crimes. It plots the distribution of different types of crimes and with the time periods. It uses high technologies like GIS and information from census. By looking at the crime pattern plotted in a particular area and the surroundings such as banks, schools, shops etc. underline cause can be determined. Even protective steps can be taken to minimize the potential harm to other people. Crimemapping.com, www.mapnimbus.com are examples of such web sites. A typical map uses color icons to indicate distribution of crimes as well as the type of the crime (i.e. Homicide, gun fire, stabbing, etc.) These maps are frequently used by the law enforcement agencies as well as the criminal investigators. Past crimes/Crime libraries Internet provides complete details of solved crimes. In this sources method of crime, evidence, forensic identifications, special tests, court details and verdict are extensively discussed. A large number of such crimes can be found in the internet. When a similar crime is occurs the facts in the solve crimes can be taken in to consideration. This is greatly help to identify the criminal behavior and may be helpful to protect others from the unidentified criminals. Sometimes evidence are inadequate to convict a criminal although everyone knows he is the criminal, in such a situations special tests or court decisions of early solved crimes can be used to fill the gap. Crimelibrary.com is another example which provides comprehensive details on large number of notable crimes an d court decisions. Wilipedea.org also contain complete details on many notable crimes such as â€Å"parker-hulme† murder and Sarah Marie Johnson  an  Idaho  woman who was sentenced for killing both parents (Wikipedia, 2011) Forensic technology Like any other technology, forensic technology is also upgraded frequently with much reliable detection methods. However not all the criminal investigators know all the methods use in forensic science. The internet is a source of huge amount of such methods. These sites not only provide the details of new forensic technology but also open a path to contact the relevant experts, or institutes probably online and even facilitate application. As an example, the ForensicTechnology.com provides technological details on the comprehensive bullet and cartridge case analysis. They introduce MATCHPOINT+ an advance ballistic technology for bullet matching and provide access to service and training online (Forensic Technology, 2011) Several f ingerprint comparison software packages currently available in the web. Moreover the investigators get a chance to know about the locally unavailable crime detection technologies sometimes overseas. Fingerprint comparison The web offers access to several fingerprint data bases of world wide criminals as well as some non criminals. The FBI has introduced the Integrated Automated  Fingerprint

Tuesday, September 24, 2019

Al-jazeera channel in the Arab World Essay Example | Topics and Well Written Essays - 1250 words

Al-jazeera channel in the Arab World - Essay Example The change process within the Arab media scenario mainly began with the launch of Aljazeera that Aljazeera was launched by the government of Qatar in 1996. Aljazeera gave new dimensions to the Arab news sphere and for the first time the world community witnessed the broadcasting of free expression of thoughts and media courage through any Arab country channel. After the launch of many satellite channels the competition was already became very tough for the government controlled Arab channels after which the Arab countries had to bring some level of liberalization and freedom to their media policies to enable their channel compete the other satellite channels (Nawawy and Iskandar 14). Aljazeera attained the attention of the people in very short time span working with the lotto of "the opinion and the other opinion". Initially it was a six hour daily news program that was soon expanded to 24 hour news coverage and programs and several separate channels were also initiated by the network like Al Jazeera Live, Al Jazeera Sports etc. (Zayani 98) According to the estimated, ten million people view Aljazeera daily (Lynch 5). Despite the popularity of al Jazeera it has been condemn and criticized on the charges of giving voice to the dangerous and inflammatory views. It openly broadcasted the messages of many leaders of militant groups in different countries that mostly expressed their messages against the western powers (Nawawy and Iskandar 14). Aljazeera proved to be the first example of freedom of press granted to media in the Arab world. though currently Aljazeera has somewhat lost his grounds in appealing the viewers but till last few years it was the main symbol of freedom of media in the Arab world and one could not overlook the strong influence on Aljazeera upon the Arab media scene. Many of the news programs and talks shows broadcasted at the Aljazeera remained the centre of attention of the people for several years as people widely viewed this

Monday, September 23, 2019

Methodology Assignment Example | Topics and Well Written Essays - 3000 words

Methodology - Assignment Example All researchers base their work on philosophical assumptions. A researcher works within a parameter of socially influenced outlook, and there so the initial assumptions are always taken for granted. Generally speaking, philosophical assumption is deduction made by the researchers based on his previous knowledge and perspective of the concerned subject (Scotland, 2012). There are three kinds of philosophical assumptions that form the root of a research methodology. The structure of a research is consisted of ontology, epistemology, methodology, and methods (Scotland, 2012). Ontology can be defined as the study of a subject’s reality and deals with the question of â€Å"what is† (Scotland, 2012). The researcher needs to define his perspective concerning the subject based on its real form and implications (Scotland, 2012). Epistemology is concerned with knowledge that is collected from field research (Scotland, 2012). Epistemological assumptions are born from study of data that are collected and assimilated by the researcher (Scotland, 2012). It is an establishment of relation between the â€Å"would-be-knower and what can be known† (Scotland, 2012, p.9). The structure of a research is confined within ontological and epistemological assumptions. All the assumptions that are made by the researcher are based on guesswork (Scotland, 2012), and so the philosophical aspects of the research can never proven as completely true or false (Scotland, 2012). The ontological and epistemological assumptions differ with each research since each subject has its own definition of reality and therefore the research approach is also different. Methodology is the defined course of action which is reliant on the selected methods of research (Scotland, 2012). Therefore, methodology is the process and reasons of data collection and deduction (Scotland, 2012). Methodology is the manner in which the researcher confirms or refutes his

Sunday, September 22, 2019

Netflix case study Essay Example | Topics and Well Written Essays - 1000 words

Netflix case study - Essay Example Netflix is facing stiff competition from other players such as You Tube, Video on Demand and iTunes that offer cheaper and reliable movie products (Thompson 138). A key success factor in the future movie industry is the ability to control and dominate the various movie distribution channels such as the Apple iPhone distribution channels, internet distribution channels and rental channels. The ease of access, pricing and size of content library are key success factors in the new movie rental industry since customers require convenience and wide-variety of entertainment content. Netflix should invest in proprietary software that will allow the customer easy-of-use and recommend movies depending on prior customer streaming or search terms on the movie library (Thompson 142). The success of Netflix will require the company to manage its costs in order to reduce the rental business costs and continue focusing on technology to deliver the movies to the customers. According to 2012 survey, many consumers asserted that unlimited internet streaming offered better customer value than pay-per view option. Long-term partnerships with electronic manufacturers will improve the market reach and enable Netflix acquire new customers in its streaming option business (Thompson 144). Netflix is facing the threat of pirated streaming library and stiff competition from more innovative movie rental providers such as Apple’s iTunes, Blockbuster, Amazon Instant video and You Tube. (Thompson 142).

Saturday, September 21, 2019

Apply a Marxist Essay Example for Free

Apply a Marxist Essay If was released in 1968 by director Lindsay Anderson. It is a film from a Marxist perspective based on a privileged boys boarding school in the 1960s, and the rebellion against the traditional functionalist system enforced there. Lindsay Anderson was a Marxist born in India in April 1923 whose father was a Scottish army officer. Educated at Cheltenham College, he announced there his intention to rebel and spent the rest of his life carrying out this aim. The film If reflects this as it shows a group of boys known as the Crusaders form a rebellion against not only the strict regime of the school, but society itself. The film is structured into episodes under different headings to describe the different areas of interest such as college, term time, ritual and romance, discipline and resistance. Andersons film shows Marxist, Functionalist and Feminist perspectives throughout and their ideals in correspondence to the issues included. The school system is strict and teaches the boys to conform to the norms and values of a capitalist society. They tell the boys to help the house and the house will help you which encourages the boys to obey the rules. 6th form students who follow all the rules are made into whips who are then able to set and enforce rules which can also allow them to punish those who do not follow the system. The system does not allow individuality or creativity and privileges are given to those who conform. The school has assemblies, which socialise the students into the same norms and values, and imposes discipline. The army within the school system shows a form of social control and authority and the boys are expected to involve themselves in reconstructions of war situations in order for them to train. This coincides with the element of team games which encourage competition. The Catholic faith is present within the school although the priest is corrupt and is shown to abuse the boys sexually in lessons, their confessions are also hypocritical as a student confesses to having sexual thoughts and is told that he is sinful to do so. The functionalist perspective is shown largely in the system as the elite pupils dominate everything and also that education is shown to shape beliefs and moral values and is a major mechanism for role allocation. The students are taught to cooperate with those who are neither their kin nor their friends.

Friday, September 20, 2019

Wireless Communication Systems

Wireless Communication Systems Introduction Wireless communication is part of todays world and is greatly in demand as such resources are preferred in todays world and so the sales are increasing day by day with equipment which involves wireless communication. The G which means generation, in the technology today amongst phones covers the technology improvement in the last few decades. The first mobile phone technology started with 1G which involved analogue technology. In the early 1990s the next generation of communication developed named 2G which was in a digital technology which also had text messaging with the idea of SIM cards coming into practice. SIM is short for (Subscriber Identity Module). Other technologies that evolved were CDMA(Code Division Multiple Access) and GSM (Global System for Mobile Communication). The next generation which followed made the data carrying better, making it potential to carry information such as websites as how they were originally. In 3G technology the iPhone has become the latest. As of today the agreement of 4G technology has not yet been established. It has been planned to have fast transfer speeds and should have good security. Something else that the 4G technology should meet is that it should reduce blips in transfer of the device when moving between different networks. The 4G mobile network should also be able to use the networks like the ones on the internet with IP addresses. 4G mobile is not yet implemented as an approved set of standards, so its characteristics are at present simply goals rather than requirements. As well as considerably desired increasing data transfer speeds, 4G mobile as well as should use improved security measures, When a device moves one place to another place between this area covered by different network reduce the blips in transmission is the another goal .4G mobile networks should also use a network based on the IP address system used for the internet. Two major systems using 4G technologies are WiMax and Long Term Evolution. WiMax began testing its 4G technology in Baltimore in 2008. The opposite system LTE was expected to be ready to be tested in 2010 and is expected to be ready for use in 2013. All this information above is described in detail in this research. All the topics covered above are broadened below. 3G 3G technology comes with better features than previous mobile network technologies. It has transmission which is at high speed, better multimedia access as well as connection globally.3G used with mobile phones a connects the phone with the internet and other IP connections which allow voice as well as video calls to be accessed. Not only this but also helps to download and surf the internet. From lower mobile technologies, 3G technology has higher data speed, better audio and video access, video calling support, Web use at quicker speeds and TV through the Internet. In 3G networks the transfer speed is between 128 and 144 kbps for devices that are fast and 384 kbps for slower ones. Wireless fixed LANs have a sped beyond 2Mbps. W-CDMA,TD-SCDMA, WLAN and cellular radio, among others are some of the technologies that 3G includes.[1] WCDMA The third-generation Universal Mobile Telecommunications System (UMTS) will be able to deliver high data rates of up to 384 kb/s at widearea applications or even 2 Mb/s indoors . This is achieved by using wide-bandwidth signals with Code-Division for Multiple Access (W-CDMA). The user data are multiplied by a fast pseudorandom spreading sequence before phase modulating the radio-frequency (RF) carrier. The resulting signals which are then broadcast have a bandwidth of approximately 4.5 MHz. Parameter W-CDMA Uplink 1920-1980 MHz Downlink 2110-2170 MHz Access DS-CDMA Duplex procedure FDD Modulation QPSK Pulse shaping Root-raised cos, Chip rate ÃŽ ± = 0:22 User data rate 384 kb/s; 2 Mb/s Bandwidth/channel 5MHz Max. output power 21 dBm (Class IV) TD-SCDMA It was proposed by the China Wireless Telecommunication Standards group to the ITU in 1999.60MHz has been reserved for CDMA2000 and UMTS, but TD-SCDMA has reserved 155MHz.In common with UMTS-TDD,TD-SCDMA does not require separate uplink and downlink and offer speeds from as low as 1.2kbps up to 2 Mbps. Uplink and downlink traffic can be transferred in the same frame but in different time slots, and there can be up to 16 codes allocated per slot, more time slot can be devoted to downlink transfer than in the uplink. This allocation of time slots is dynamic and if a symmetric allocation is required, which is usually the case for a telephone call, then this will also be allocated the required resources. The minimum frequency band required for this system is 1.6 MHz and the chip rate is 1.28Mcps.it does not have soft handover mechanism but has a system similar to GSM where the mobile device are tightly synchronized to the network, and it is from here that the term ‘syschronous is d erived. it is designed to work with a GSM core network is similar way to WCDMA and can also use the UTRAN signalling stack when it is deployed as a complementary technology. The frame is 5 ms rather than 10ms in WCDMA and split into seven slot.[2]. 4G The future system technology of 4G should bring something that is very enchancing when compared to the previous technologies. 4G yet does not have a meaning as it has not yet been established. However the current targets for it are as follows: system interoperability:-flexible interoperability of the various kind of existing wireless network, such as satellite, cellular wireless, WLAN, PAN and system for wireless access to the fixed network. It ability to roam between multiple wireless and mobile standards. Due to the interoperability of different mobile and wireless network through the same terminal we can identify the three possible configuration. There are Multimode terminals:-this is obviously achieved by incorporating multiple interfaces to the terminal, one for the access methods of every different kind of wireless network. The ability to use many access methods will enable users to use a single device to access the 4G network irrespective of the particular access method used. Overlay network:- In this architecture user will access the 4G network through the Access Points of an overall network. The AP will perform protocol translation and Qos negotiation for the connections. Since APs can monitor the resource used by a user, this architecture supports single billing and subscription. Common access protocol:-this choice calls for use one or two standard access protocol by the wireless networks. A possible option is for the wireless networks to use either ATM cells with additional headers or WATM cells. Terminal bandwidth and battery life:- Future generation network will be covering a large range of banwidths from about a couple of kbps to about 100 Mbps or above. The battery life is expected to be about a week. This will happen with a reduction of the size of the battery. Packet-switched fixed network.:- This 4G technology will use wireless IP based fixed networks which will be able to connect the mobiles with the wireless networks effectively. Varying quality of bandwidth for wireless access:- Having a range of networks together will cause it to overlap with other networks. Due to where they are, the user will be abl to use different qualities of wireless by the change of bandwidth. Distribution layer: This layer of the network will be able to help with digital video as well as broadcasting and due to a good coverage will cover all areas. Cellular layer: This layer of the wireless network will give a load of capacity providing many users as well as provide good coverage in highly populated areas. It will allow data sizes of over 2 Mbps. The cell size will also be small compared to the distribution layer, and will support good mobility. Hot-spot layer: This layer will help with good service over a short distance. It will include WLAN systems like IEEE 802.11 and HIPERLAN. This layer will not provide great coverage in particular as it is a short distance however roaming should be available. Personal network layer: This layer will include wireless connection however in short ranges say through the use of Bluetooth. Mobility will be less but roaming should be available. Fixed layers: This layer uses an access system which is fixed. Advanced base stations: In the future for networks, the new smart antennas will make the capacity bigger as well as base stations having self-configuration not needing the need for employment. This would reduce costs. They will include a good range of terminals. High data rates: The 3G system will be changed using what it has already to form the new 4G generation. The 4G generation will offer higher speed than the 3G generation. The introduction of 4G needs specific targets which are named above. To get to these targets, 4G needs the basis on how to achieve this which is explained in detail below.[1]. How 4G works: In the networks which have the 4G wireless technology, each one will be given an IP address which will have a home IP address and an address which represents its real location. When the computer in the Internet wants to communicate with another device perhaps a mobile phone in the wireless network. The computer will be able to send packets to the IP address of the 4G technology getting to know the home address too. To the phones address, the directory will send the packet through a tunnel, or a mobile IP, whilst on the meantime the directory server would also let the computer know that the phones address is correct. After this the other packets can be sent. The use of4G-IP address (IPv6) is that it will be able to carry more info than in the past with the IP address (IPv4). In this IP address, software can use them to tell the differences between services and to communicate with network areas of different sorts. This could be with the computer and the phones network. An example includes Moreover which uses 4G technology not only has this transmission way but also uses OFDM, MC-CDMA, LAS-CDMA, UWB *7 and Network-LMDS.[4] Orthogonal Frequency Division Multiplexing abbreviated as OFDM, passes on figures on a great quantity through a radio wave. Changing the radio signal into many small signals then transferred at the same time through different frequencies to the receiver is the method in which this is carried out. OFDM is a digital technology through modulation which increase strength of these signal; this is good for high digital data transition. This is a great digital technology method in which through the process of modulation increases the strength of the signal and is good for a transition of high quality digital data.[2] In this time, users might have a good question about how theses waves targeted the correct destination. A OFDM makes the radio wave target the right place though a couple of devices which are wireless, which make a connection tunnel when they start communication. After connecting the target, the radio wave splits into smaller signals which have the correct direction towards the target. MS-CDMA stands for Multi-Carrier Code Division Multiple Access, which is actually OFDM with a CDMA overlay. The users are multiplexed with orthogonal codes to differentiate users in MS-CDMA and single-carrier CDMA systems. It allows flexible system design between cellular system and signal cell system. However, in MC-CDMA, each user can be allocated several codes, where the data is spread in time or frequency. LAS-CDMA the shortened form for Large Area Synchronized Code Division Multiple Access, is made through by LinkAir Communication which is basically wireless technology through the developed 4G technology. LAS-CDMA makes voice capacity better, with high speed and the latest original solution called Code-Division Duplex (CDD) which combines the LAS-CDMA technology with the greater data transmission type of Time-Division Duplex (TDD). This combination makes Code-Division Duplex to be very spectrally efficient as well as having high speed available today as a great system. LAS-CDMA is seen as being the great 4G technologys ‘World Cell. If two wireless devices for instance are a quite big distance apart then using this protocol which has IPv6 to create the connection. In the 4G world, UWB radio which solves the multi-path weakening matters through its clever use of electrical impulses which has all frequencies at one time. Due to its low-power condition though, this UWB cannot be used outside of being indoors or underground. UWB should be used however with OFDM which cal transfer digital data on a large scale. This is positive though as the UWB would be running insides equally as the OFDM runs outside which means that the signal can stay strong. UWB also needs to be used in small distances inside the buildings through 4G technology. The broadband technology which is wireless used to carry video, data Internet as well as voice in 25 GHz is the Network-LMDS Local Multipoint distribution system. This method makes sure all these things are carried together at once, and this can be the result in the fading issue locally. [4] Differences between 3G and 4G: The main factors in which 3G and 4G technologies vary is due to their services, their ways of transmission, access to the web, the rates of transfer, security as well as quality. 3G technology can only carry upto the speed of about and up to 2 Mbps however 4G technology can go much higher to a better speed. 4G technologies can provide global connection whereas for 3G markets it is difficult to roam globally. Technology which uses 4G can provide global roaming at a lower price. 3g is based on the notion through circuits and packets through things like WCDMA, CDMA and TD-SDMA. However 4G uses the use of packets. As mentioned above about the differentiation between the 3G and 4G, this has been broadened in the tab le below. Feature 3G wireless technology 4G Wireless technology Speed Up to 2Mbps Full-mobility: up to 100Mbps Low-mobility:up to 1Gbps Service 1. Difficult of global roaming 2. Expensive 3. good for voice transmission 1. roaming smoothly 2. inexpensive 3. good for any type of transmission Core Network 1. Wide-area concept 2. Circuit and packet switching 1. broadband IP-based 2. Entirely packet switching Technologies 1. WCDMA 2. CDMA 3. TD-SDMA All access convergence Main: 1. OFDM 2. MC-CDMA 3. LAS-CDMA 4. UWB 5. Network-LMPS Wimax Wimax which stands for Worldwide Interoperability for Microwave Access was made to give a ordinary structure for wireless connectivity in permanent, moveable, and mobile environments. WiMAX is a wireless technology intended to give high throughput over a distance. It gives the quick broadband of link. It also provides wireless access which reduces costs which involves the fibre and making buildings. It has a range that goes beyond WiFi. A WiMAX uses two hardware components — a WiMAX tower as well as WiMAX receiver. This tower covers a 30 mile radius. The tower joins to the Internet using a wide connection through a wireline, or it offers a wireless link to other WiMAX towers with Line Of Site (LOS for short) microwave links. The receiver could be anything. NLOS (non-line of sight in full) connections join devices to the tower using a frequency range of 2-11 GHz as low wavelength signals are strong. LOS connections however do not cover as large area but covers and area of 4-6 miles. QoS is the aspect in a technology to deliver high bandwidth services. Examples of such include VoIP and IP video services as well as other services as such. To provide such QoS service, the WiMax need to make sure they have a low latency.[4] WiMAX security is defined in the Privacy Sub-layer in the MAC Layer, as specified by WiMAX standards. Fixed WiMAX (802.16-2004) typically uses X.509 certificates for authentication and 56-bit Digital Encryption System (DES), while Mobile WiMAX (802.16e-2005) uses EAP for authentication and Advanced Encryption System (AES) for encryption. Both employ Privacy Key Management (PKM) for authentication between base station and subscriber station.[5][9]. LTE Long Term Evolution (LTE) is a 4G wireless broadband technology made by the Third Generation Partnership Project. LTE has many benefits for not only the consumer but also the workers too: Performance and capacity one request that the LTE is to provide downlink rates of a minimum of 100Mbit/s and needs the technology to allow for speeds that are over 200Mbit/s. Simplicity From below 5MHz up to 20MHz, LTE supports carrier bandwidths. LTE also supports both FDD (Frequency Division Duplex) and TDD (Time Division Duplex). Ten paired and four unpaired spectrum bands have so far been identified by 3GPP for LTE. it is easiest to deploy 10MHz or 20MHz carriers, and eventually deploy LTE in all bands. plug-and-play, self-configuration and self-optimization will simplify and reduce the cost of network roll-out and management. LTE will be deployed in parallel with simplified, IP-based core and transport networks that are easier to build, maintain and introduce services on. Wide range of terminals- LTE supports hand-over and roaming to existing mobile networks, all devices can have ubiquitous mobile broadband coverage from day one[6].[9] COMPARSION BETWEEN WIMAX AND LTE Aspect Wimax LTE Access technology Downlink(DL) Uplink(UL) OFDMA OFDMA OFDMA SC-FDMA Frequency band 2.3-2.4GHz,2.496-2.69GHz ~2GHz Bit-rate: DL UL 75Mbps(MIMO 2TX 2RX) 25Mbps 100Mbps(MIMO 2TX 2RX) 50Mbps Channnel bandwidth 5,8.75,10MHz 1.25-20MHz Cell radius 2-7km 5km Cell capacity 100-200 users >200 users in 5MHz >400 users for large BW Spectral efficiency 3.75[bits/sec/Hz] 5[bits/sec/hz] Mobility: Speed Handovers Up to 120km/h Optimized hard handovers supported Up to 250km/h Inter-cell soft handovers supported Legacy IEEE802.16a through 16d GSM/GPRS/EGPRS/UMTS/HSPA MIMO DL UL No. of code words 2Tx X 2Rx 1Tx X NRx(Collaborative SM) 1 2Tx X 2RX 2Tx X 2Rx 2 Standardization coverage IEEE 802.16e-2005 PHY and MAC CN standardization in Wimax RAN(PHY+MAC)+CN Roaming framework Wimax forum Auto through existing GSM/UMTS [7].Verizon has devoted to using Long Term Evolution starting by soon, ensuring to deliver ten times the data throughput of 3G technologies in the current time. Others, including NTT DoCoMo in Japan, France Telecom, Vodafone in the UK, ATT, and T-Mobile have said also they will use LTE rather than WiMAX. Meanwhile, Sprint, Clearwire, and Comcast in the U.S., UQ Communications in Japan, and Yota in Russia are all competitively using 4G networks suitable for mobile networks using todays edition of WiMAX, 802.16e (2 to 10 Mbps), in inner-city markets where they will without doubt compete with 3G (and later, LTE) sources. The WiMAX Forum declares that 504 operators in 145 countries have organized WiMAX, but many use older 802.16d technology that however cannot provide mobile services, and many are small operators in developing countries or pastoral areas.[8] Conclusion:- In every generation, when there is a default, the next following generation gets rid of this and a new idea or notion is found as a result. However at some points this may be difficult to happen due to several reasons. The world is looking forward for the most intellectual technology that would bond the full earth. New ideas are being introduced by researchers throughout the world, but new ideas introduce new challenges. There are several issues yet to be solved like integrating the mobile world to the IP based core network, resourceful billing system, and smooth hand off mechanisms. Reference: Future mobile networks 3G and beyond Edited by Alan Clapton published by : the Institution of Electrical Engineers, London, United kingdom Convergence Technologies for 3G Networks IP,UMTS,EGPRS and ATM Jeffrey banister, Paul Mather and Sebastian Coope at Orbitage Consultants. http://docs.google.com/viewer?a=vq=cache:suYVNKca06YJ:www.habits.in/hab_files_007_822/files/3G%2520TO%25204G%25205G.pdf+limitations+of+4Ghl=engl=ukpid=blsrcid=ADGEESgduPdmeqSL9dwRiGnFJ0JOIktrJxjYXI8_5x7PWdeg7eQwcmvkJGDQE-N6lFOL62qsTZW4So4iJ9oIZIeb3tSr6X8xD35e3gjxiI_g6tL4XcJMY3MYFWZyjtnclDWgFCAA8S6Rsig=AHIEtbSPBQflncP4szu1MI5tLZL4tX8Y9g Wimax taking wireless to the max Deepak Pareek published in 2006 by Auerbach publications http://4g-wirelessevolution.tmcnet.com/topics/4g-wirelessevolution/articles/what-is-wimax.htm 15/03/2010 19.00 http://4g-wirelessevolution.tmcnet.com/topics/4g-wirelessevolution/articles/lte-ericsson.htm 15/03/2010 20.00 http://www.comsysmobile.com/pdf/LTEvsWiMax.pdf 15/03/2010 19.00 http://www.wi-fiplanet.com/news/article.php/3845111 15/03/2010 19.00 http://www.cs.york.ac.uk/rts/docs/CODES-EMSOFT-CASES-2006/codes/p266.pdf 15/03/2010