Monday, May 25, 2020

Devices and services - Free Essay Example

Sample details Pages: 30 Words: 8977 Downloads: 2 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Abstract Autonomic networks attempt to find the method to improve the capability of networks, devices and services, in order to handle with unpredictable changes. This document will propose an autonomic solution along with the required components in order to set up an autonomic configuration to a non-centralized and self-administrative group of autonomic base stations taking part of a wireless access network. The system proposed will show a different way to evade existing centralized topologies avoiding the central point of failure. Don’t waste time! Our writers will create an original "Devices and services" essay for you Create order In addition, when considering autonomic networks is critical the examination of protection requirements and the administration of security infrastructure. This system will illustrate a qualitative assessment and simulation results that shows self-healing characteristics and autonomous behaviour. It explains many of the drawbacks found when trying to simulate an autonomic conduct and the limitations when using software simulators. Acknowledgment I would like to thank Dr Thomas Owens for reading my dissertation report and supplying me with technical and writing advice including the supporting conversations we had. I have to thank Claudia and Angel who always gave me recommendations from a non-technical point of view. This work could not have been done without the help all of them. I dedicate this dissertation to my parents and God, who always supported me, gave me new ideas, and brought me the right solutions I always needed. Chapter 1: Introduction Autonomic wireless access systems was a model created in order to support the development of communication networks in the direction of efficient flexibility and extensibility to a large sort of potential faults and attacks. On the other hand, particular importance is given on the foundation values to accomplish focused behaviour over a self-organization. Therefore, an autonomic system allows the performance of an autonomic network when including self-management, self-configuration, self-optimization, self-healing and self-protection and the relation with different numerous of dynamic network groups and communities. As a result, every day more people, private customers and enterprises are employing wireless access technologies in order to achieve better connection, mobility and easier reception at any location. However, as the significance of this wireless technology has been increasing with the time, the need of autonomic self-management systems became crucial. In fact, this dissert ation will collaborate to the actual investigations related with autonomic wireless management systems. In addition, when considering autonomic networks is critical the examination of protection requirements and the administration of security infrastructure. The system presented in this report will illustrate a qualitative evaluation and simulation results that shows self-healing characteristics and autonomous conduct. It presents some of the disadvantages found when trying to simulate an autonomic behaviour and the restrictions of using software simulators. 1.1 Towards Self-Management. Self-management [1] is the core of autonomic networks, and its intention is to liberate systems administrators from the facts of system operation and maintenance and to give users with a machine that can be used at all times. In addition autonomic systems will preserve and regulate their operation in the case of changing components, hardware failures, software malfunctions, and outdoor conditions. The autonomic system has the capacity of frequently supervise itself, and check for component improvements. Self-configuration takes part when the system can configure itself in harmony with high-level procedures. In the case of a new component is adapted, this will incorporate itself easily, and the rest of the system will adjust to its incidence. Self-optimization means the way that several parameters must be set correctly for the network to work ideally. Autonomic systems try to improve the operation of different technologies by identifying and gathering their main functions in order to make them much more competent in performance or cost. Therefore, is here when autonomic systems will monitor and experiment with their individual factors in order to make proper choices, verifying, and applying the most recent updates. Self-healing takes place when the system can identify, trace and determine the origin and cause of a particular malfunction in complex mobile ad hoc networks [2]. On the other hand, serious user problems can occur and their explanation can take several weeks to be detected and fixed. However, autonomic systems will discover, analyse, and restore localized failures by using information about its individual system configuration and may be through a regression tester. Self-protection over autonomic systems can be applied in two ways. Firstly, we can protect the network as a whole against considerable, associated problems coming up from attacks or consecutive failures. Secondly, we can predict problems based on premature reports obtained from sensors and take steps in order to evade or make them smaller. In mobile ad hoc networks, it is very common to deal with unexpected alterations of population, topology and the complex reconfiguration executed by end-users. In addition, it is highly difficult for people to manage and to have the control of these unpredictable changes because the complex character of mobile ad hoc environments due to the heterogeneity of components and technologies, the lack of infrastructure and the decentralized composition. The model to follow in this project about mobile autonomic networks is based on a specific type of wireless mobile ad hoc networks [3]. In other words the network is built spontaneously as devices connect, instead of relying on a unique central base station to manage the current of messages to each node in the network, the individual network nodes forward packets to and from each other. A mobile autonomic network could be a semi-centralized, mobile ad hoc, wireless, autonomic network, where its nodes are heterogeneous and the whole network can be easily manage by non-expert users. Therefore, a kind of mobile autonomic network can be for example, a home wireless network, a SOHO wireless network, an emergency service ad hoc network a business meeting network or a military scheme ad hoc network. The security needs that the mobile autonomic networks required are mainly the same as those usual networks. In other words, the security architecture obtained from wireless, mobile and ad hoc networks might be implemented in mobile autonomic networks. 1.2 Problem Depiction Self-managed wireless network posses a quantity of characteristics that allow us the developing and creation of autonomic base stations or access routers. However, in order to achieve the best performance of the network there are some problems that must be taken into account. The number of capabilities that every base station must enclose includes: A base station may be self-configure as long as it has a home duplicate of running and administration information in addition with particular installation of the management methods. Self-optimisation characteristic includes the facility of a base station to communicate with other ones and to find their positions on the network. As a result, each base station must be connected each other since they have to share important information during the authentication procedure. The security part needs special attention since all the interchange of data among base stations has to be protected against attackers in addition with the reliability of the management information such base station exchange (self-protection). Self-adaptive attributes must take place when every base station inform to the others about any modifications in its environment. It is essential for the network to have a self-managed communication method that guarantee a well performance as the traffic and the interchange of information increases. The idea is that every station will be able to operate and interact with others by creating new configurations or, be capable of running its default configuration sequence. In the event of failures o errors every base station must be capable of find the solution and solve the problem itself or, if necessary, notify to other access points in order to correct the failure globally as a method of self-healing conduct. 1.3 Aim and Objectives To present and simulate an autonomic behaviour through the use of self-healing capabilities and the improvement of some of the different aspects involved within a decentralized management system when being applied to an autonomic wireless network context in addition with the analysis of all requirements that an autonomic base station has to contain. Describe a system that could implement self-capabilities for autonomic base stations. Show how base station performance can be autonomy adapted. Illustrate the manner how self-protection, self-healing and self-optimisation are applied to autonomic wireless networks. Evaluate the possible solutions when improving the scalability problems of autonomic management systems. Simulate an Autonomic behaviour using OPNET Modeller by showing how self-healing capabilities may be adopted. Analyse some of the different drawbacks presented when trying to evaluate autonomic conditions. 1.4 Dissertation Organisation Chapter 2 looks into what are the existing approaches for autonomic systems and the management of wireless networks. Additionally, it examines some of the issues when dealing with autonomic networks and essential network technologies involved in the autonomic networks field. Chapter 3 describes the proposed decentralized management system and different autonomic applications may possibly run on it. Furthermore, important security characteristics will be discussed. Chapter 4 presents the modelling and simulation, using OPNET Modeller 14.5-Education version for the autonomic wireless network management. This chapter contains all modifications and suppositions that were necessary in order to achieve an autonomic self-healing behaviour including failure detection and results. Finally, conclusions, simulationÂÂ ´s limitations and discussion of further work in Chapter 5. Chapter 2: Literature review 2.1 Autonomic Systems Autonomic systems can be denoted as interactive groups of autonomic elements, individual systems components that have resources and deliver services to specific users and other autonomic elements. These elements may manage their inner actions and their associations with other autonomic elements in harmony with policies that people or other elements have recognized. In addition, a spread, service-oriented infrastructure will maintain autonomic elements and their communications. The managed component will be alike to what is found in ordinary non-autonomic systems, although it can be personalized to allow the autonomic manager to observe and manage it. The directed element may be a hardware supply, such as a CPU, a printer, or a software resource, such as a database [1]. Within a more complex field, a managed element may be an application service, electronic business application or other related IT application. The autonomic manager makes a distinction the autonomic element from its non-autonomic equivalent. If we can monitor the managed element and its exterior atmosphere, and constructing a plan based on an examination of this information, the autonomic manager will reduce people of the dependability of directly managing the managed element. The autonomic computing is expected to progress as designers slowly add progressively more complicated autonomic managers to existing managed elements. Each autonomic element will be responsible for managing its own interior condition and conduct and for controlling its relations with an environment that consists mainly of signals and communication from other elements and the external world. An elementÂÂ ´s internal behaviour and its relationships with other elements will be determined by objectives that its maker has implanted in it, by other elements that have authority over it [2]. The element may need help from other elements to accomplish its goals. In this case, it will be in charge for obtaining essential resources from other elements and for dealing with exception cases, as an example the failure of a necessary resource. Autonomic elements will take part at many levels, from individual computing components such as disk drivers to small-scale computing systems such as workstations or servers to entire automated enterprises in the largest autonomic system of all the global economy. At the lower levels, an autonomic elements variety of interior behaviours and relations with other elements, and the set of elements with which it can act together, may be comparatively partial and hard-coded. Mainly at the rank of individual components, well-established techniques, many of which fall under the rubric of fault tolerance, have led to the expansion of elements that not often fail, which is one significant feature of being autonomic. When having higher levels, fixed behaviours, links, and associations will give way to enlarged vitality and flexibility. All these aspects of autonomic elements will be articulated in more high-level, goal-oriented terms, leaving the elements themselves with the responsibility for resolving the details on the fly. Service-oriented architectural models such as Web and network services will play an elementary function, a sufficient foundation for autonomic computing requires more. Primary, as service providers, autonomic elements will not obediently honour requests for service, as would classic Web services or objects in an object-oriented environment [2]. In fact, autonomic elements will provide only services that can improve the reliability of its objectives. Autonomic elements will initially a problem requests to other elements to carry out their objectives. After all, autonomic elements will have complex life cycles, frequently transporting on various threads of activity, and constantly sensing and responding to the environment in which they are situated. Autonomy, proactively, and goal-directed interactivity with their environment are distinguishing characteristics of software agents. 2.2 Architecture of Autonomic Networks The current consideration on network organization remains. For example, autonomic communications holds the layer as: User Applications Services / Components Middleware Network and Computers Device Agent (soft) or Sensor (hard) Take into account that this layering has network, computers and software, transmissions, and information. But the requirement of supporting everywhere networks is required; a strong domain model must be incorporated in Autonomic Communication architectures [3]. Domains substitute layers as the main organizing component. Domains will supply limits, much like the border and doorway routers do today in IP networks. But domains will need to mechanically communicate large amounts of information about what they will and will not accept; what they are capable of, and what present facility and QoS is accessible. Domains will contain domains, each with alike computational manage systems but with diverse locations, contexts and communities [4]. Criticize domain structures will have connection and provide shortcuts across these many networks. A distributed computing, tools and platforms will be a fixed part of the network. While routers and switches will still pass data, they will subcontract all but the simplest and quickest of decisions to the implanted distributed computing substrate; only things like lookups will stay. In result, every mechanism will have a service interface with available methods. In some architectural systems, the device-embedded service will dynamically register itself with service modellers and discovery components principal of which is the agent-service providing self restoration. This probably means that every device will include Java or .NET and provide service and running interfaces accessible by soft services. Basic to the plan of all autonomic networks is a fixed security model. In conventional networks, protection was applied after the reality mainly via external devices, applications and tools. The world would be a much more organized and safer place if TCP/IP had been designed with fixed security and even this is being looked at again [5,6]. Autonomic networks must be self configuring, self deploying, and self assembling. While total security cannot be assured and security does add fee, for the most part of current designs have produced workable compromises where the security of a network is well known. The best designs can adjust cost and security as properties of network domains, controlled by policy and bounded on the borders with a security that filters user and service admittance. Four basic steps are designed into Autonomic Network [7]: Collect: get together information from environmental and device sensors and instrumentations; determine purpose or service requirements; look up user context and security credentials. Analyze: this function uses the current tools to associate and model multifaceted situations for example, queuing models, economic models, rules and polices. In addition, these mechanisms permit the autonomic manager to use the network environment more efficiently and to predict further conditions. Decide: process with the best available computation engines including decision theory; risk analysis, hypothesis generation, genetic algorithms, and neural networks; scope actions to situations and needs. Act: call up services; collect components; manage association; configure managed elements; signal devices; inform users and administrators; log actions and the strategic analysis that determined them. 2.3 Existing Management Solutions With the use of centralized, distributed or hybrid solutions it is possible the management of wireless networks. Centralized systems make use of a unique master mechanism to configure the base stations. On the other hand, decentralized, distributed configurations do not use that single point of malfunction and collaboratively execute a completely distributed administration solution. Within any of the approaches mention above, the objective is that a wireless base station must have a reliable, system-wide composition. Nowadays, with the use of wireless switches is possible to connect base stations and make them operate as wireless bridges to a switched wired network as a solution that many companies have been created in order to provide centralized administration solutions for groups of base stations [5]. With the use of wireless switches within a centralized architecture is possible to obtain channel management in addition with bandwidth, access and traffic control therefore the link-layer switch executes the management component. However, this type of centralized link-layer topologies also has disadvantages. There are several problems related with broadcast traffic that does not allow the free develop of link-layer broadcast domains. Furthermore, the architecture of the wired system does not allow straight association of the management system to the base stations. However, there are some solutions that work at the network-layer resolving this limitation. One way to configure mobile ad hoc networks (MANETs) [16] is through decentralized management systems where its centre of attention is to enable peer-to-peer communication within very high dynamic, mobile structures [4]. It means that each base station does not make any decision based on a central manager but it does base on its local capacity. There are many uncompleted researches that try to design self-configuring solutions for MANETs. On the other hand, this report is focused mainly on the configuration of fixed wireless networks for mobile clients seeking the way to improve effectiveness and performance. In addition, the important factor here is to develop an autonomic and decentralized management platform that can sustain different sort of management functions. Hybrid advances to wireless network management give some more functionality from a fundamental system into the base stations. However, hybrid systems which are a little more complex than the plain wireless bridges do not totally attend to solve the disadvantages of centralized systems; e.g., being central points of failure for one. 2.4 A Quantity of Problems of Autonomic Home Networks With the introduction of the self-characteristics (self-management, self-organization and self-configuration [12]) some issues have been brought within a dynamic environment. The IP-based networks have been increasing its complexity rapidly which affect directly to network designers, network operators and subsequently network users. Actual IP networking technologies execute spontaneous adjustment by responding to changes in the location once a problem has happened. Therefore, is the job of autonomic networks find the way to develop the capacity of networks, terminals and devices to deal with the unexpected variations, along with the physical and logical features of the network that can be accessed but also, changes in topology, load and other responsibilities. In addition, by the introduction of self-characteristics it provides users with the advantage to focus on their duties instead of configuring and managing networks. Nevertheless, within a dynamic environment a quantity of problems can also be brought by utilization of the self-characteristics, such as be deficient in learning capacity of the policy-based [12], autonomic control-loop, particularly in the mixed and mobile context in addition with the complex security and cost-effectiveness of the inherent monitoring methods found in the current autonomic networking technologies. There are some factors that must be considered when analysing the self decision makings process within autonomic networks, such as context information for routing decision which could limit the autonomic ability of the systems. Therefore, in order to be able to analyse and consequently understand the modelling and performance of the most recent autonomic networking technologies and systems, we must analyse some of their issues in the context of some basic network technologies, intrinsic monitoring systems and mobility management. 2.5 Essential Networking Technologies The inclusion of autonomic features into modern internet architecture let us visualized a future internet system having capacities such as self-optimizing, self-management, self-organization and so on. Nowadays autonomic networking technologies are yet inadequate to adjust to diversity of upcoming network situations as follow: Control/Decision plane: at this part the modern models of control loop just provides autonomic tasks like the policy-based autonomic control loop [13] has no learning features, providing the network with no autonomic capabilities. In addition, for an end-to-end performance goal makes so much difficult for a decision element obtain the correct decision. Better comprehensive context technologies: in order to make decisions, autonomic network nodes obtain essential information through contexts and for this reason network contexts achievement technologies have obtained special treatments. On the other hand, contents of applications and service characteristics are very significant context information for autonomic nodes when optimizing network routines and quality of service of users. A clear example may be, since wireless networks have a limited data transmission capacity, packet loss rate is pretty high. In the case that, autonomic nodes choose to drop a number of packets, users will suppose that important packets are going to be protected while insignificant ones to be dropped. Therefore, with a better comprehensive context aware technologies will provide such behaviour by gaining and analyzing the context data of clients, applications and network. An obedient network: total responsiveness regarding to objectives, businesses and applications must be essential properties of Self-Managed Autonomic Networks. 2.5.1 Monitoring Infrastructures Actual autonomic systems are facing problems regarding the way monitoring infrastructures provide local and global performance information consistently and efficiently not including security problems and performance degradations. In addition, the status concerning the autonomic network must be sensed by an autonomic system which leads to a large amount of data flow to be handed out to the autonomic system. Therefore, the monitoring infrastructures must be strongly built with very high performance, the security of the principal monitoring system have to be cautiously calculated as well as the expenses of big monitoring activities ought to be take into account. Additionally, in case of have a large size monitoring activities further processing and combining into the total performance information for the autonomic systems and services will be required due to a massive production of data. 2.5.2 Mobility Administration Mobility management becomes much more complex and complicated since potential mixed wired and wireless systems are going to supply everywhere coverage and flawless mobility in order to allow additional users with multi-mode transportable terminals. As a result, for a mobile device will be a problem quick to response different changes perfectly and opportune and acquire suitable calculations without human intervention along with heterogeneous access situations. Likewise, in order to accomplish competent resource employment, load contribution, bandwidth aggregation and some more features, mobility administration must support interface-level [13], mobility and flow-level mobility. The junction rate of the control-loop in the autonomic networks might be low since diverse types of the heterogeneous access technologies, the time-changing characteristic of wireless channels produce vibrations when collecting information for the control-loops. As a consequence, it may have and effect on the self-configuration and self-adaptation process in the mixed wired/wireless situations. Chapter 3: Design of an Autonomic Management System 3.1 Overview The aim of this chapter is to describe the design of the autonomic management system. In addition, it will explain what sort of suppositions must be taken into account when choosing the autonomic access points as well as the most important security characteristics and the basic networks functionality. After all, the chapter will describe some important autonomic functions that can be including in the central system. 3.2 General Requirements The model that is presented in this report requires of a well selected base stations which are fundamental components of the autonomic wireless system. IP [22] access routers can be used as wireless base stations due to their assigned IP subnet and they have the capability to correct any error that may occur without the intervention of any human operator. Each access point will require a wireless interface in order to provide wireless services to every user or mobile piece of equipment connected. Another network interface which can be wired or wireless is going to supply uplink [25] communication to mobile devices and the other part of the network. In fact, it can be used for Internet access [14]. In addition, this second interface may be use as a supervision and management interface among base stations and to support self-management services. The use of supplementary interconnection lines can be useful when connecting mobile devices that come from different networks (wired or wireless) and there is a need to link different channels and protocols. The description mentioned above is represented in the Figure 3.0 where four access routers provide wireless interfaces for connectivity and uplink among different mobile devices. The other network interface is used to transfer data between the access router and the Internet and for autonomic administration capabilities. However, an extra or extras uplink interfaces could be included. It is the job of the access routers to allocate and configure IP addresses and subnets which are going to be used for the mobile devices and for the uplink interfaces. Self-protection (Figure 3.1) can be achieved by following a number of considerations that the model proposed in this report must make use of. This model will use X.509 certificates [15] among with public-key cryptography in order to obtain key distribution and user authentication. A key pair (private/public) is created by a certification authority (CA) [17]. Public keys are included into a certificate; they do not need to be protected from unauthorized nodes and may be spread with the use of software [24], information servers or an Internet system. A two-way authentication along with the use of X.509 certificates provides reliability in many security aspects. Every base station needs to corroborate its neighbours certificates. Consequently, each base station must contain the related certification authorityÂÂ ´s public key and the deviceÂÂ ´s certificate. At the same time, the use of hash algorithms is fundamental in this application, being SHA-1 [18] and MD5 [23] the most commonly known and used. The Secure Hash Algorithm (SHA) generates a 160 bit (20 byte) message digest in contrast with the 128 bit (16 byte) message used by MD5. Therefore, SHA-1 is stronger against attacks but slower than MD5. 3.3 Functionality of the Network An essential idea about this report and the projected model is to show how we can distribute the administration functionality of the wireless system, in some way that no central point of failure will exist and as a result will be avoiding bottlenecks [18] during the processing and communication of information. For that reason, all the base stations must support autonomic management capabilities and be able to provide self-protection, self-healing and self-optimisation. In addition, important information regarding the wireless network configuration and running activities must be exchanged and collected among each base station and its neighbours hence every station within the radio range work together as a uniform wireless access network. Within a network with inner management station, there is communication between each station and the central administration station but no exchange of information is possible between other base stations. Avoiding central point of failure [14, 18] topologies, interchange of irrelevant information among neighboured base stations is evaded. Hence, the information recovered and collected locally will permit base station to choose the correct management configuration. The information exchanged between base stations sometimes is divided and just passed to a single access router and it must be absolutely reliable all over the network. In addition, this information will be extend globally among stations which are closely situated and every station have to report to its neighbours regarding any modifications by using sporadic periods in order to avoid massive transit of messages. Figure 3.2 shows the way in which information is shared between stations is obtained using next-door stations only. In other words, when a base station obtains fresh management data this information is only transmitted to the nearest neighbour station. Subsequently, the station who has received new information must inform to itÂÂ ´s next-door station about all modifications it does internally plus data received previously from the originating transmitter [20]. After an exchanging of information between stations, the information shared will not be forward again because to the initial sender this data is no longer new material. For a base station must be absolutely relevant, the fact of avoid contacting all other base stations within the network when planning to execute management data modifications, instead, the only thing they have to do is to contact its individual next-door stations. The autonomic configuration activity takes place in the way that, access points receive and exchange certain information among other devices that is use for specific purposes. Though, every base station posses an autonomic behaviour since they shared information each other but none access point can be oblige to adopt or make use of any kind of information or wrong configuration it receives. In addition, this protects all the devices within the wireless network against an attacker pretending to force a base station to execute malicious procedures. 3.4 Categorisation Process It is very functional to make a segmentation based on the type of information that every base station manage in order to make easy for the base station to decide what sort of information it should used during a specific process. 3.4.1 Global Information. This information can be broadcasted throughout the entire network and includes actual employed protocols, a group of unnecessary mobile devices and wireless encryption key. 3.4.2 Public Information. Public Information will be exchange only among next-door devices which can be found within the radio coverage. As a result, this information contains the number of devices connected to each base station, the connection path use for base stations and information regarding addressing. Consequently, when a group of next-door stations want to communicate each other public information shared allows them to act in response to events happening within a specific area. By using bi-directional broadcasting at regular intervals to next-door devices, base stations use its public data to revise and renew information regarding to its home status as well as its own system updating. 3.4.3 Private Information Private data will be found and used exclusively for local proposes and it is not transferable among devices. Security related information and capacity data will not be shared with anyone. However, some security elements are exchanged throughout the entire network. 3.5 Performance and Setting up Propose of this section is to explain how the suggested autonomic wireless access network works based on its management functionalities. Firstly, we are going to analyse the performance of the self-configuration method, the course of action when adding new base station. Afterwards, we will be discussing how to include homogeneity when processing global information and after all explain how a centralized configuration could be transformed and used within a non-centralized autonomic wireless access network. 3.6 Improving the Scalability of the Network The process of initialization of a base station starts breaking its synchronisation [20] follow by a checking period. Subsequently, the base station may start configuring itself in order to supply connection mode to all mobile devices associated to each node of the network. In case of power malfunction, all stations may be re-initialized themselves at the same time, but because they are not synchronized they will not be looking for new next-door stations in a parallel way. After a small period of time where the base station generates a probe of connectivity this is ready for an auto-configuration IP process, which includes designation of subnets in order to bring association capabilities to mobile devices and get ready with the uplink line [20]. In addition, the base station looks for its next-door devices with propose of testing their correct configuration and the later inclusion within the self-management network. At this part of the process beacons [26] are imperative elements because they provide to a neighbour base station with network management information as a result of the quantity of overhead that the broadcast of beacon frames produce which is very significant; conversely, a beacon is capable of identify the presence of an access point. By using a radio network interface card (NIC), every radio frequency channel is scanned looking for beacons approaching from base stations in order to discover an appropriate one. As soon as a beacon is discovered, information regarding groups of access points and potential information about the network could be obtained. Therefore, association process among bases stations may start taking place. Power reduction mode is another important attribute of beacons. Inside our self-managed wireless access network, a base station periodically transmits mapping information using beacons in order to identify which base stations utilizing power reduction mode have data frames claiming for them at the access point buffering service. In case that none next-door stations can be found by the access point during the searching process, the device autonomously will use a default configuration and then be able to commence operation among mobile devices. Figure 3.5 illustrates the manner how an access point initiates a wireless scanning process looking for next-door base stations. As soon as a station detects the presence of the other access points within its coverage area the station ratifies the scanned access point as one of its neighbours. Resolution of management interface addresses takes place with the transmission of a resolve request by the base station to its next-door previously scanned stations. The resolve request may be sent as a user datagram protocol (UDP) [21] message. As a result, broadcasting and multicasting messages can be used. On the other hand, if fresh stations use encryption or filtering the communication may possibly fail. A new access point gets association with all the addresses and stations found throughout the wireless scan using their management interfaces. This is like the MAC address of the interface which makes possible wireless services. In order to obtain association with next-door stations the recent base station may utilize the wireless interface as a mobile point of connection at the same time transmitting the solve request to that base station. Therefore, needless multicast or broadcast messages could be avoided inside the wireless access network. However, a fresh base station could broadcast or multicast the resolve request by using its administration interfaces. If the neighbour stations do not provide answer at all to the new base station, it will set up the configuration by default as well as connection service among mobile devices. The first time neighboured stations receive information regarding a new base station is when this one sends to them its resolve request. A successful authentication of a new base station is conceded by its next-door stations, only they will authorize this procedure using the information exchange during the presentation part and the implementation of an X.509 certificate previously discussed in the section 3.2. Transmission control protocol (TCP) [22] supplies reliable and well-organized transport of a stream of bytes as well as flow control, network traffic congestion and it will guarantee the trustworthiness of management data exchange among bases stations. At this instant, the new base station is capable of provide all its neighbours with public and global information. The new base station will be ready then to combine all the data recovered from its different next-door stations during the searching phase and the selectivity of available radio channels. In addition, a base station performs a series of scans in order to identify alterations around its surroundings. However, the scanning procedure could affect users connectivity depending on how frequently is executed as a result regulation take place during the uplink transmission among mobile nodes. 3.7 Network Database and Recovery Several advantages will be obtained with the use of databases that save and store important information regarding all devices inside the wireless access network. In other words, a network administrator could be capable to obtain significant data about the actual network configuration and status just by using previous collect related information. In case of network failure, the fact of having a backup of all information related will be incredibly helpful in addition with the security fact that none malicious attacker will be able to modify or utilize certain information because it will be out of reach. One way to apply this concept is with the creation of virtual neighbours [25]. In fact, a neighbour will be adding to a list of all actual next-door stations no matter if it belongs to the same radio coverage. In this order of ideas, the virtual device will collect the same amount of messages that direct or (real) neighbours have received. Scalability is easily obtained with the inclusion of virtual devices since a station does not differentiate among a virtual or real next-door device. Therefore, a virtual neighbour simply recovers the configuration information of a pre-selected subgroup of each and every one stations contained by the wireless access network. 3.8 Security Requirements and Technologies The use of security applications must be imperative when trying to guard the wireless access network. The system has to be protected against malicious infiltrations, illegal accessing, interception or modification of private data [24]. In addition, authentication information and encryption keys have to be protected from harm. Masquerading attack [19] is quiet difficult to detect and one of the most dangerous attacks, it can affect the normal operation among mobile clients and base stations. An invalid entity may impersonate a valid base station and acquire illegal control over the traffic network. The management procedures carrying out within the wireless network could be used as a way to attack the network. A broadcast including resolve messages is created by the enemy using a stations address as destination address. In consequence, the station affected will receive several answers due to the broadcast attack sent to all active base stations. Data integrity and privacy among base stations is possible by using the transport layer security (TLS) [8] protocol. The TLS protocol is divided into to layers: TLS record protocol TLS handshake protocol TLS record protocol uses private connection and encryption is achieved using symmetric cryptography. The connection is trustworthy and message transference makes use of a message integrity check using MAC address. SHA-1 and MD5 can be used as hash functions. TLS handshake protocol provides authentication, encryption algorithm negotiation and cryptography key checking between stations. Chapter 4: Simulation and Results 4.1 Overview The aim of this chapter is to illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version for the autonomic wireless network management. In addition, it will explain what kind of modifications and suppositions were necessary in order to achieve the autonomic self-healing mechanism, including agentÂÂ ´s architecture and description. 4.2 Autonomic Management Agents This section will illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version, of a community of autonomic management agents that provide network fault analysis for a group of base stations. The main objective of these intelligent agents will be to bring together process information in order to detect failures when bases stations exchange information between them and the creating of high obtainable wireless access network. Analysing network failures is relatively difficult since theses problems may differ from one network system to another and could depend on network dynamics, i.e., the type of network information to be exchange and the traffic characteristics associated with that information. In addition, the pattern of failures could vary quickly as the network operates and reconfigures around a failed device. As OPNET Modeller 14.5-Education version does not have autonomous process ready for simulation usage, existing code had to be adapted to allow autonomic behaviour. The use of two different autonomic agents we required in order to provide self-healing network diagnosis and facilities. In this report, OPNET coding modifications will be called Agents and two different types are mentioned and applied to the access points. Testing Agents will supply data simplicity and monitoring capabilities to Node Agents, on the other hand, Node Agents will check periodically the information that Testing Agents bring together and use it as a medium of failure detection within the wireless access network. In addition, a Testing Agent will be able to supervise and provide data regarding information exchanged among access points. Node agents use data obtained by the Testing Agents as a method of node analysis. Various Testing Agents may be found on a single wireless client. A Testing Agent can be situated on a host device since it does not have to deal with data acquisition and information simplicity. In contrast, Node Agents will be located on a base station. Various Testing Agents may be found on a single wireless client. 4.2.1 Additions and Model Modifications OPNET Modeller was used in order to determine concept achievability of the proposed model. The conception about Autonomic Mobile Wireless Networks is illustrated by using a community of wireless base stations which allow autonomous healing of interrupted paths. Intended how autonomic healing (self-healing) is possible of broken route. The OPNET simulation showed in this report will contain two Node Agents and two Testing Agents which take part of a group of autonomic base stations. The new OPNET topology required the creation of ten nodes in order to characterize every autonomic agent and all the modifications were made to accomplish the needs of both agents. The autonomic behaviour was obtained through modifications to the wlan_server_adv and ip_arp_v4 OPNET process models, where code changes were made in order to achieve the desired behaviour. 4.2.2 Testing Agent (TA) and Node Agent (NA) Description Each Testing Agents belong respectively with a Node Agent as a single component of a particular node in the OPNET simulation. As mentioned in section 3.3, each base station is aware of its next-door stations at all times. A Testing agent (TA_1) is designed to watch and detect alterations regarding other base stations. In the event of any modification of the network, TA_1 will notify Node Agent (NA_1) by using a UDP message. UDP presents lack of reliability consequently; the Testing agent TA_1 cannot assured successful message transmission. However, this lack of reliability will be useful for simulation proposes. After receiving information from TA_1, a Node Agent (NA_1) will inform other stations about changes in zone, and files updating may take place. When a NA_1 observes that information sent has no arrived to its destination by a particular period of time, the agent alerts its neighbours that a probable node malfunction has happened. This time depends of certain attributes fixed for a particular mobile user. Scalability of the network will be achieved with the use of a second pair of agents. Where, Agent TA_2 has the job of monitoring path request messages sent and received by other stations. Information regarding path request is detected by TA_2, including the time when the path request was generated and the destination of this demand. Changes to the mobility architecture were necessary including ARP and IP alterations. The idea was to alter some settings in order to evaluate and compare the destination address with the address of the device were specific information was sent. The destination address must belong to a registered wireless client and the intelligent agents will check correct transmission of it. IP alterations were made changing the moip_core to allow stations to be able of forwarding information packets to its neighbours, modifying the IP routing mode and helping each station choosing the better route available. The moip_core has a list that could be dynamically regulated as the base stations travel between networks. The UDP is used as a transport protocol and the managing, mobility and registration information is handling by the process show in the figure below. The moip_reg process allows base stations when managing and updating mobility information regarding next-door stations. When exchanging information among stations, all the agents will monitor and process each request and they will aim to find failures during the registration process. When the registration communication was successful, there is an identification value that is compare with a mobility list and the right matched among them will mean no error has occurred during the registration procedure. Updated messages must be sending when agents have no information regarding the mobile station due to updating failures. In fact, agents need acknowledgments in order to be sure that the communication between stations is doing perfectly and in case that an agent does not received the updating message, it will not be able to monitor base stations and all the information exchanged among agents will be lost. Therefore, all the updates and acknowledgments will be verified within an identification field contained by the moip_reg. If they are equivalent, the update will be set as confirmed and the exchange of information will be free of failures. OPNET Modeller allows us to present the node model which was modified in order to provide autonomic behaviour to a set of autonomic base stations within a self-managed wireless access network. The wireless connectivity is achievable through the use of IEEE802.11b interfaces, permitting roaming among networks. This type of interfaces could be improved by adding an extra communication module between the radio transceiver and the wlan_mac system. This process allows a base station to simulate the effect of completely losing connection among devices and at the same time avoiding unnecessarily queues of packets. 4.3 Network Model Three different network configurations were constructed to simulate and identify autonomic characteristics, and agent distribution was arbitrarily decided in order to improve the simulation. The Testing agent (TA_1) was applied to a single base station, other station was selected to make use of Testing agent (TA_2) and Node Agent (NA_1) while Node Agent (NA_2) were modified to operate in all base stations. 4.3.1 Design of Wireless Network Infrastructure The next steps were followed in order to design a wireless infrastructure in OPNET: Open the OPNET program and select New Project and the press OK. Give the project a name and the scenario name. Select create empty scenario and press Next. Network space was chose as campus and specific size was selected as: X-span and Y-span 10 kilometres respectively. The Object Palette Tree will open which illustrates the various WLAN devices as follows. The third model illustrated in the Figure 4.7 offers a more narrowly linked network configuration. The number of neighbours for every node will increase and the communication between Node Agents and Testing Agents will improve due to a decrement in the number of paths required for Testing Agent information to meet the suitable Node Agent. Therefore, a superior self-healing performance will be expected using this configuration. 4.4 Verification of Agents self-healing process upon base station malfunction. To experiment the right operation of the agents, different simulations were made in every network model. The main purpose is to test agent reliability and its competence when providing intelligent self-healing course of action. Consequently, the base stations were programmed to reproduce a failure and the action of agents would eventually lead to simulate an autonomic behaviour. The diagram above illustrates the self-management of the system. Exchange of information among nodes may take different paths until data arrives at its final destination. In the event that a particular base station fails, the permanent monitoring service of the Node Agents will detect the malfunction, and then base stations self-healing method will autonomously locate another route allowing intelligent diagnosing and repairing. OPNET code modifications provide one method of simulating a malfunction in the base station. The most important features required for this process was the use of acknowledge mechanism and understanding of the range capacity of base stations. These characteristics were required to allow mobile devices to recognize when a failure takes place in a base station and stop transmitting and routing traffic, in order to start self-healing and path recovery. 4.5 OPNET Simulation Results A set of simulation were run in order to obtain some important information regarding self-healing and path recovery. The figure 4.9 shows the interchange of data being sent by the two mobile devices and obtained by mobile_node_2. The red line indicates the data and traffic being sent by mobile nodes 0 and 1, while the blue one represents information received by the mobile_node_2. In order to detect the presence of devices and the best possible path, control traffic and management features are established and can be noticed by looking at those short spikes at the beginning of the simulation. In addition, there is a stable amount of traffic being transmitted without interruptions. Chapter 5: Conclusions and Future Work This document proposed an autonomic solution along with the required components in order to set up an autonomic configuration while providing self-characteristics to a non-centralized and self-administrative group of autonomic base stations taking part of a wireless access network. We showed how to avoid centralized topologies including the central point of failure issue. A qualitative evaluation and simulation results allow us to demonstrate self-healing characteristic and autonomous behaviour within the system. This report presented and simulated an autonomic behaviour through the use of self-healing capabilities and the upgrading of different aspects involved within a decentralized management system when being applied to an autonomic wireless network environment. A fast reaction of the self-managed wireless access network is very important in order to react to failures, errors and interferences. Therefore, the self-healing behaviour used in this report offers a way to address such connection problems, including a vision of how a base station can react to changes in its environment and react on failures of its neighbours. On the other hand, the proposed system is capable to handle various base stations in wireless access networks through diverse topologies. This management system for a wireless access network was able to identify and to adapt alterations in the network and, to be efficient, establish the alterations on all regarding base stations. The self-healing behaviour is protecting network information being exchanged and the traffic characteristics associated with that information. As a result, avoiding that the intensity of failures could vary quickly as the network operates and reconfigures around a failed device. The self-management of the system shows how exchange of information between nodes can take diverse routes until data arrives at its final destination, when a particular base station failed, the permanent monitoring service of the Node Agents detected the malfunction, and then base stations self-healing method autonomously located another route allowing intelligent diagnosing and repairing. Alterations to the OPNET mobility architecture showed one method of simulating a base station malfunctions. In addition, with the use of an acknowledge mechanism and understanding of the range capacity of base stations the system could recognized when a failure took place in a base station, stopping transmitted and routed traffic, and beginning self-healing and optimal path recovery. Simulation of autonomic characteristics including self-healing, self-characteristics (self-management, self-organization and self-configuration) and security features in OPNET Modeller 14.5-Education version is a problem for various reasons. OPNET modeller requires enormous alterations of coding programming in order to achieve autonomic behaviour. Therefore, self-characteristics are not easy to apply and gather together in the same network environment because OPNET Modeller 14.5-Education version does not include autonomous process ready for simulation usage. As an alternative, modifications of OPNET architecture have to be done in order to accomplish such propose. OPNET Modeller 14.5-Education version does not support WAP (Wireless Application Protocol) security characteristics. Therefore, simulation of security features within wireless environments is quite complex. 5.1 Future Work It is very important to think about future applications but more importantly is the upgrading of this actual one. The integration of external information will improve the scalability problems and the lack of self-management characteristics. In addition, the inclusion of more management applications is vital. More OPNET architecture modifications must be include accomplishing further autonomic capabilities, including implementation with greater number of nodes and base stations. References S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, E. Gelenbe, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, and F. Zambonelli, A survey of autonomic communications, ACM Transactions on Autonomous and Adaptive Systems, 2006. M. Aljnidi and J. Leneutre, A security Policy System for mobile Autonomic Networks, in Proceedings of the First International Workshop on Self-Organizing Systems, 2006. L.Zhou, Z.J.Haas: Securing ad hoc networks. IEEE Network (1999) C.M.Ellison: Home network security. Intel Technology Journal 6 (2002) E. Gelenbe, Towards autonomic networks, in Proceedings of the 2006 IBM Research Headquarters (manifesto). (2001, Oct.) Autonomic computing: IBMs perspective on the state of information technology. [Online]. Available: https://www.research.ibm.com/autonomic/overview/ elements.html K. Murray, R. Mathur, and D. Pesch, Intelligent access and mobility management in heterogeneous wireless networks using policy, in Proc. 1st ACM Int. Workshop Inf. Commun. Technol., 2003, pp. 181-186. Hickman, Kipp, The TLS Protocol, Netscape Communication. Corp., Feb 9, 1995. https://www.ibm.com/developerworks/autonomic/library/ac-edge4/figure-am2.gif https://wasteagain.sourceforge.net/img/server.png https://wasteagain.sourceforge.net/img/server.png F. J. Mullany et al., Self-Deployment, Self-Configuration: Critical Future Paradigms for Wireless Access Networks, Proc. 1st Intl. Wksp. Autonomic Commun. (WAC 2005), Berlin, Germany, 2004. M. Masullo and S. Calo, Policy Management: An Architecture and Approach, Proc.1st IEEE Intl. Wksp. System Management, LA, USA, Apr. 1993. C. Adams and S. Farrell. Internet X.509 public key infrastructure certificate management protocols. Request for Comments 2510, Internet Engineering Task Force, March 1999. S. Corson and J. Macker. Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. Request for Comments 2501, Internet Engineering Task Force, January 1999. H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-securing ad hoc wireless networks, in Proceedings of the 7th IEEE Symposium on Computers and Communications, 2002. Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized Trust Management. In Proceedings of the IEEE Symposium on Security and Privacy, number 96-17, Berkeley, California, USA, May 1996. T. Dierks and C. Allen. The TLS protocol version 1.0. Request for Comments 2246, Internet Engineering Task Force, January 1999. Matthew S. Gast. 802.11 Wireless Networks. OReilly Associates Inc., California, USA, 2002. J. Postel. User datagram protocol. Request for Comments 768, Internet Engineering Task Force, August 1980. J. Postel. Transmission control protocol. Request for Comments 793, Internet Engineering Task Force, September 1981. R. Rivest. The MD5 message-digest algorithm. Request for Comments 1321, Internet Engineering Task Force, April 1992. Andrew S. Tannenbaum and Maarten van Steen. Distrubuted Systems, Principles and Paradigms. Prentice Hall Inc., New Jersey, USA, 2002. 25. J.J. Silva Tobella, Martin Stiemerling, and Marcus Brunner. Towards Self- Configuration of IPv6 Networks. In Poster Session of IEEE/IFIP Network Operations and Management Symposium (NOMS04), Seoul, Korea, April 2004. 26. https://alkautsarpens.files.wordpress.com/2008/01/f45.jpg

Thursday, May 14, 2020

Racial Tension and The Declaration of Independence

â€Å"The past is never dead. It’s not even past.† Requiem of a Nun by William Faulkner. In a speech given by commander-in-chief, president Barack Obama he uses this quote as an example to describe the racial situation that plagues contemporary America. Over two hundred years ago a document was signed promising no guaranteeing that every man was entitled to life, liberty and the pursuit of happiness. This document found that it was self evident, that all men were created equal and that they are endowed by their creator with certain unalienable rights (life, liberty and the pursuit of happiness). When it was written the Declaration of Independence guaranteed every man he shall not be denied certain unalienable rights by the government and if his†¦show more content†¦The black people who have had a horrific experience ever since they were captured and brought to this country. Plagued with memories of embarrassment and the injustice of slavery, Jim Crow laws, one- drop doctrines, inflicted upon them by depraved white men and women who thought nothing more of them than animal that could be exploited and to add insult to injury now that African Americans have come to a point where they are finally getting a milliliter of respect they are told by their Caucasian counter parts to just get over it (slavery, Jim Crow, and the countless other injustices and embarrassments we have had to suffer). This has led to some African Americans developing a â€Å"the white man is keeping me down† mentality that is not only detrimental to himself but also the African-American and American community. In many cases this mentality has been justified by the institution of doctrines such as the one- drop doctrine or one drop rule stating that a person could have between one-eighth and one-quarter African blood and be considered legally white entitling said person to all the right of an American citizen. Although justified to a certain degree this mentality is counterproductive to the abolishment of bigotry and the beginning of social, cultural and racial understanding amongst all Americans whether they are black, white, brown, red, yellow, green or purple. Laws have been instituted toShow MoreRelatedEssay on Soiling of Old Glory: Photograph by Stanley J. Forman1576 Words   |  7 Pagesfamous images that still resonate around the world. However, this image he captured on the plaza outside of Boston’s City Hall reveals the deep-seated tension between the whites and blacks in America. This tension is a result of years of segregation both in busing and schooling. According to Weinbaum, ___________, Massachusetts enacted the Racial Imbalance Act in an attempt to prevent schools to segregate between the blacks and whites. In addition, the act required schools in the Boston districtRead MoreJust Walk On By Black Men And Public Space By Brent Staples1433 Words   |  6 Pagesand captivating piece of writing. His publication captures one s interest and makes a person think about the role of prejudice in his or her daily interactions. It is full of metaphors, which achieves the desired figurative effect. The Declaration of Independence, on the other hand, is the founding document of the traditions of the politics of the United States (Lucas). It clearly explains the fundamental ideas that constitute America that all men are free and equal, and have similar inherent naturalRead MoreThe United States As A Foreign Power During The 19th Century1292 Words   |  6 PagesTh e United States as a Foreign Power during the 19th Century The Declaration of Independence established the self-evident truths that the laws of nature entailed. Life, Liberty, and the Pursuit of Happiness became rights to every person in the eyes of Americans. As the 20th century approached and America’s international affairs expanded, the natural rights declared by Americans was challenged globally. In order to protect and preserve natural human rights while also improving domestic entities,Read MoreRacism : The Criminal Justice System1040 Words   |  5 Pagesin our criminal justice system is simple and easy. Americans need to fully understand the idea of equality. Second, police need to stop doing racial profiling. Finally, the criminal justice system needs to be kinder to different races. Americans need to abolish the idea that racism needs to be alive. The criminal justice system does still do a bit of racial profiling. First, americans need to get the idea of racism out of the heart and minds of the people who control our criminal justice systemRead MoreOn The Run By Alice Goffman1336 Words   |  6 Pagesevents deemed as a norm (either little children have made a game of cops catching and being overly aggressive to Black boys), hinders their process at advancing within American society. Systematic oppression against a minority group slows and puts racial tension progress at a standstill as they are continued victims of larger forces. What truly works against them once locked up and released, is when they were not given a chance based on race, now based on criminal history. People in such situations areRead MoreThe Right Of Self Determination989 Words   |  4 Pagesa) The Kanyesian and Kimesian people in Westphalia have long lived together in the same territory but recent developments have created tensions. With Kanye as the president, legislation that has limited the Kimeshian’s right t o educate their own language along with a lack of representation in the parliament. These tensions led to the creation of a group dedicated to self-determination for the Kimeshian people. We can then look at and understand the legality of their desire for unilateral secessionRead MoreEssay on A Noncolor Blind Society1458 Words   |  6 Pagesthe Declaration of Independence that, All men are created equal, decades ago and often times today, it only applied to what was believed to be the superior race, and that only meant certain groups of people. This American paradox connected directly to racism which included prejudice, discrimination, and institutional inequality defined by sociologists Michael Omi and Howard Winant. America is an unequal society destroyed by individual racial discrimination that led to institutional racial discriminationRead MoreOn The Run By Alice Goffman1718 Words   |  7 Pagesevents deemed as a norm (even little children play a game about cops catching and being overly aggressive to Black boys), hinders their process at advancing within American society. Systematic oppression against a minority group slows and puts racial tension progress at a standstill, as they are continued victims of larger forces. What truly works against them once locked up and released, is that they were not given a chance based on race, now it becomes based on race plus their criminal history.Read MoreRacial Inequality Has Been A Problem Plaguing This Country Since Its Inception1283 Words   |  6 PagesRacial inequality has been a problem plaguing this country since its inception. Even today we can see the extent of the issue in almost every facet of life. There is racial inequality within the workforce, resulting in a vast differential between incomes of different races. Racial inequality also lives within our health care system, meaning that millions of Americans are not covered by government issued health insurance, but the majority of those not covered belong to a racial minority. The mostRead MoreLiterary Analysis : Virginian Luxuries1450 Words   |  6 Pagespainting does not appear to be signed makes me suspect that the artist did not want his opinion to be associated with himself. This seems in line with learning, in this course, that the subject of slavery was intentionally omitted from the Declaration of Independence. Toqueville defines the three races, as he sees them, in the United States as European, Negro, and Indian. He believes that the Indian race will be completely wiped out once the European race settles in the remainder of the western continent

Wednesday, May 6, 2020

Withering of the American Dream in The Great Gatsby Essay

Withering of the American Dream in The Great Gatsby The Great Gatsby written by F. Scott Fitzgerald depicts the degradation of the American dream through the loss of humility and rectitude. The American Dream, which remains till today, bases itself upon assiduousness and high morals. Many people from foreign and faraway countries view this dream as a reality and believe that America upholds these high standards. Yet, Fitzgerald clearly writes this novel to show that the linchpin that kept the dream alive has eroded away. America, known as the land of opportunity, promises a comfortable life to all those who work honestly and diligently. Yet Gatsby, a key player in The Great Gatsby, earns his money through bootlegging and†¦show more content†¦Tom, from the onset of the novel, partook in a relationship with Mrs. Wilson, and even rented themselves a small apartment as a reprieve from their families and previous lifestyles. He often dined in restaurants with her and even took Nick to see Mrs. Wilson who he referred to as my girl. In contrast, the first immigrants from Europe to America were the Puritans and they established the status quo for the American Dream. They set high moral and civil duties, and if anyone failed to abide by these regulations they were excommunicated from the society. On the other hand Daisy, Gatsby, and Nick all involve themselves in these activities and still retain their paramount positions in their milieu. Daisy and Gatsby take a more prosaic and practicable ap proach to their affair. They meet at parties and invite each other as dinner guests. Daisy, Tom and Mrs. Wilson all being married people, partook in this picayune, garish, and flippant lifestyle and ended up causing their loved ones pain and anguish. But because of this time period, the 1920s, in which new and unprecedented ideas were the norm, people hurtled from the old traditional ways and etched themselves a place in society by getting involved in iridescent lifestyles. Womens rights acquired an austere and cognizant determination and would not settle for complacency. In addition, peopleShow MoreRelatedThe Great Gatsby By F. Scott Fitzgerald1355 Words   |  6 PagesMost define the American Dream as an equal opportunity for all to achieve success through handwork and determination. Many define success as having or gaining wealth and power. This isn t true for the novel The Great Gatsby by F.Scott Fitzgerald. Instead Fitzgerald represents the withering of the American Dream , in the novel the American Dream is presented more as a overpowering idea of aspirations far from reach, making it less of a dream and more of a distant thought. Throughout the novel FitzgeraldRead More Time1677 Words   |  7 Pagessimple, as pure, and as vulnerable as a dream stand against the slow but steady stream of time, that beats like particles of sand against the bottom of an hourglass? For a dream to continue to nourish the minds of the masses generation after generation, it must adapt--change to better fit the new circumstances that a change in time invariably evokes. But as a dream changes, is it as pure, as innocent, and as high-minded as it once was? Could the American dream, which has hereto defined the very spiritRead MoreThe American Dream is a recurrent theme in American literature, dating back to some of the earliest600 Words   |  3 PagesThe American Dream is a recurrent theme in American literature, dating back to some of the earliest colonial writings. Ben jamin Franklin, who is considered to be the epitome of the self-made man once said, â€Å"The Constitution only guarantees the American people the right to pursue happiness. You have to catch it yourself† (Franklin). Furthermore it is the belief that every man, whatever his origins, may pursue and attain his chosen goals; whether they be political, financial or social. However, theRead More1) How Does Gatsby Represent the American Dream? and What Does the Novel Have to Say About the Condition of the Amrican Dream in 1920s?1116 Words   |  5 PagesAlthough The Great Gatsby is filled with multiple themes such as love, money, order, reality, illusion and immorality, no one would probably deny that the predominate one focuses on the American Dream and the downfall of those who attempt to reach its illusionary goals. The attempt to capture the American Dream is the central of this novel. This can be explained by how Gatsby came to get his fortune. By studying the process of how Gatsby tried to achieve his own so-called American Dream, we could haveRead More1) How Does Gatsby Represent the American Dream? and What Does the Novel Have to Say About the Condition of the Amrican Dream in 1920s?1110 Words   |  5 PagesAlthough The Great Gatsby is filled with multiple themes such as love, money, order, reality, illusion and immorality, no one would probably deny that the predominate one focuses on the American Dream and the downfall of those who attempt to reach its illusionary goals. The attempt to capture the American Dream is the central of this novel. This can be explained by how Gatsby came to get his fortune. By studying the process of how Gatsby tried to achieve his own so-called American Dream, we could haveRead MoreThe Great Gatsby By F. Scott Fitzgerald989 Words   |  4 PagesGatsby Essay Hayden Gordon The overall theme of â€Å"The Great Gatsby† by Scott Fitzgerald is the rise and death of the â€Å"American Dream†. The theme is shown to us through the life of Nick Carraway and the high-class society of which he lives amongst. The characters continually hint at the falsified â€Å"American Dream† in their actions and viewpoints throughout the novel. This dream is built through false hopes and crushed by failed goals. The American Dream is the pursuit of prosperity and hope, andRead MoreThe Great Gatsby1205 Words   |  5 PagesÂâ€" The Great Gatsby The main theme of the novel The Great Gatsby focuses on the American Dream and it is portrayed through the life of Jay Gatsby. Through Gatsbys life we see the withering of the American Dream, a tragedy that struck Jays near finished dream. The American Dream is what many have hoped of achieving, it has existed in the past and is in the present. The American Dream gives people a goal that they can work towards, it also gives them a purpose in life. The American Dream representsRead More F. Scott Fitzgeralds The Great Gatsby Essay1190 Words   |  5 PagesThe Great Gatsby The main theme of the novel â€Å"The Great Gatsby† focuses on the American Dream and it is portrayed through the life of Jay Gatsby. Through Gatsby’s life we see the withering of the American Dream, a tragedy that struck Jay’s near finished dream. The American Dream is what many have hoped of achieving, it has existed in the past and is in the present. The American Dream gives people a goal that they can work towards, it also gives them a purpose in life. The American Dream representsRead More The American Dream in F. Scott Fitzgeralds The Great Gatsby1134 Words   |  5 PagesThe American Dream in F. Scott Fitzgeralds The Great Gatsby The Great Gatsby, by F. Scott Fitzgerald, is a brilliant illustration of life among the new rich during the 1920s, people who had recently amassed a great deal of wealth but had no corresponding social connections. The novel is an intriguing account about love, money and life during the 1920s in New York. It illustrates the society and the associated beliefs, values and dreams of the American population at that time. These beliefsRead MoreLuxuries and Love in the Great Gatsby by F. Scott Fitzgerald Essay1197 Words   |  5 PagesThe American Dream is an ideal that has been in existence since the day the Declaration of Independence was signed. Normally, the lower citizen yearns to rise from rags to riches, while obtaining such luxuries as love, high social status, and political/economic power on his or her way to the top. This dream has undergone various changes since its creation, however it is generally founded on ideas, of freedom, independence, and the desire of something greater . Early colonists’ desire to travel West

Tuesday, May 5, 2020

Estimation of Demand for Supplementary Reading Material Among Students in Pune free essay sample

Estimation of Demand for Supplementary Reading Material among students in Pune Prepared For: Mr. S. V. Godbole Pune March 2007 EXECUTIVE SUMMARY To estimate the demand for supplementary reading material for students (Medical and MBA) in Pune. Time for the project i) Total time: July 2006 to February 2007 ii) Fieldwork time: 25 days (January 2007) Objective 1) To estimate the demand for supplementary reading material for the next one year among the students (Medical and MBA) in Pune city. 2) To find reasons for borrowing/sharing supplementary reading material. 3) To find areas of interest in readership. Operational Definitions ? Estimation of Demand: done by intention to buyer’s survey in the next one year. ? Supplementary Reading Material (SRM): is an addition to the curriculum. These include periodicals and journals in English both in print and digital format. ? Student: MBBS and MBA students. ? Borrowing: from the library and peers, seniors, etc. There is no money spent on the individual units. ? Sharing: among friends, where the person pays a part of the amount spent on purchasing the units. ? Areas of interest: The subject different from the specialization of the respondent. This subject should be in tandem with the definition of SRM. Exploratory Study The exploratory research was conducted using two methods: Case Study The case study was prepared by Book Marketing Limited (London) for Publishers Association in 2003. The research objective of the case study was to conduct a study of information sources and book buying behavior of students. The objective of studying the case study was to gain an insight on the sample size and characteristics, the research methodology selected and the theories implemented during the research. Focus Group Interview Number of focus group interviews: 1 The objective was to help in determining the sampling design and the locations for conducting the interviews. Research Design Questionnaire Design: Structured, undisguised Survey Method: Respondents were contacted in college premises. Sampling Design: Quota sampling The sample consisted of 138 respondents of which 48 were MBBS students and 90 were MBA students. Respondents are MBBS students (private and government colleges) and MBA students (first and second year). Findings MBBS Students Sample size: 48 No significant statistical difference in the intended demand to purchase SRM in the next one year between MBBS students of private and non-private colleges is observed. [Ref. Table 2. 2. 1. 1(3)] The total intended demand lies in Rs. 0 to Rs. 729 with 95% confidence. [Ref. Table 2. 2. 1. 1(3)]. There are 42% respondents who do not purchase SRM and claim cost effectiveness as the main reason for borrowing/sharing SRM. [Ref. Figure 2. 2. 1. 8]. There is no clear preference for any particular area of interest though Technological Advancements and Equipments lead with 25%. [Ref. Table 2. 2. 1. 9]. MBA Students Sample size: 90 Significant statistical difference in the intended demand of SRM in the next one year between MBA students of the first year and the second year is observed. [Ref Table 2. 2. 2. 1(3)] The total intended demand on SRM lies in the range Rs 0 to Rs 401. [Ref Table 2. 2. 2. 1(3)] There are 76% respondents who claim that cost effectiveness is the main reason for not purchasing. The next in order of importance are low frequency of reading and unavailability. One respondent may have recorded more than one reason. [Ref. Figure 2. 2. 2. 8] There is no clear area of preference for readership of SRM though Marketing and Finance lead the choice of preference. [Ref. Figure 2. 2. 2. 9] ACKNOWLEDGEMENTS I would like to express my special gratitude to Mr. S. V. Godbole, Professor of Applied Marketing Research, for his guidance and valuable insights. His in depth knowledge and teaching helped develop the right approach towards the subject. I am also thankful to the Director and faculty of the Symbiosis Institute of International Business for giving me an opportunity to estimate the demand for SRM among the MBBS and MBA students in Pune city. This presentation could not have been possible without the support of my batch mates. I am thankful to them for their cooperation. Date: 06/04/2007Aakanksha Gupta TABLE OF CONTENTS CHAPTER I INTRODUCTION7 1. 1Background7 1. 2Introduction7 1. 3 Objectives8 1. 4Operational Definitions and Scope8 1. 5 Research Design9 CHAPTER II FINDINGS15 2. 1 Findings from secondary data15 2. 2 Findings from Survey16 CHAPTER I INTRODUCTION 1 Background The supplementary reading material market in India today is in a growth phase, with literacy levels and per capita incomes consistently increasing over the last ten years. A large part of SRM’s target audience comprises students, especially post graduate students. The results from the research conducted will help the manager in the following ways: 1. Pune has a large student population and the results of the research conducted here will help the manager ascertain his target market. 2. It will give the manager an idea about the sources from which students obtain SRMs. This will aid in distribution channel decisions. 3. The areas of interest will help the manager ascertain the content of the SRMs that he releases. 4. Most importantly, the current and intended demand, in terms of average expenditure on SRMs per year will aid the manager decide the size of the market for his product. 5. Pune is also a representative market that can be used as a benchmark for deciding marketing strategies in other markets. 2 Introduction The project has been undertaken as a part of academic curriculum under the subject Applied Marketing Research. The project has been completed under the guidance of Mr. S. V. Godbole, an M. B. A. from Punjab University and with wide experience in industry in the field of Marketing Research. He is presently a Marketing Consultant and is involved with teaching the subject to students of MBA course. He is a visiting faculty at SIIB. 1. 3 Objectives ? To estimate the demand for supplementary reading material for the next one year among the post-graduate students (Medical and MBA) in Pune city. ? To find reasons for borrowing/sharing the supplementary reading material. ? To find areas of interest for the readership. 4 Operational Definitions and Scope Operational Definitions ? Estimation of Demand: To form an approximate opinion of amount in INR for the desire for a particular commodity. The desire should be supported by purchasing power. Only the situation where the student is directly purchasing the reading material is considered. ? Supplementary Reading Material (SRM): Reading material that is an addition to the curriculum. The research considers periodicals and journals (print and CD format) in English that are used by the students as a source of extra information. ? Student: A person engaged in a higher course of study after completion of basic high school education (in case of M. B. B. S. ) and after completion of a basic graduation degree (in case of M. B. A. ). Pune City: Refers to the Pune Municipal District and PCMC. ? Borrowing: From the library and others like peers, seniors, etc. There is no money spent on the individual units. ? Sharing: Among friends, where the person pays a part of the amount spent on purchasing the units. ? Purchasing: Includes only the SRM that is bought by an individual for personal use. The individual, in this case, pays the entir e price of the unit. ? Areas of interest: The subject different from the specialization of the respondent. This subject should be in tandem with the definition of SRM. Scope ? Geographic scope: Pune city Time scope: 1 year ? Target respondents: M. B. B. S. students and postgraduate students of Business Administration Full-time students Based within the specified geographic area ? Product scope: Periodicals and journals in English language 1. 5 Research Design [P1. 5. 1] The research was conducted in a structured, undisguised manner. [SP1. 5. 1. 1] The methodology undertaken was survey technique, with mall interviews. [P1. 5. 2] Exploratory Design [SP1. 5. 2. 1] Theories The following theories were studied before undertaking the research: 1) Buyer’s Intention Theory ) Chain Ratio Method of Demand Estimation 1) Survey of buyers’ intention A buyers’ intention survey indicates what buyers are likely to do under a given set of conditions. 2) Chain-ratio method of dem and estimation The theory uses the total market potential as the basis of forming the chain ratio. The total market potential is the maximum amount of sales that might be available to all the firms in an industry during a given period. The formula used is: Q= n x q x p Where; 1) Q = total market demand 2) n = number of buyers in the market ) q = quantity purchased by an average buyer per year 4) p = average price of a unit According to Kotler and Keller, the chain-ratio method involves multiplying the base number by several adjusting percentages. [SP1. 5. 2. 2] Case Study The case study was prepared by Book Marketing Limited (London) for Publishers Association in 2003. The research objective was to conduct a study of information sources and book buying behaviors of students. The objective was to investigate the following; 1. Information sources with reference to books owned, books borrowed and the internet 2. Book purchasing behavior with reference to new, second hand and recommended books. The investigation is done in terms of; a. Number of units purchased b. Value of units purchased 3. Use of Library 4. Access to Internet 5. Sources of books The case study comprised a single quantitative stage of research. It involved a target of 750 interviews across a representative sample of undergraduate students. Students were interviewed at a variety of universities. The interviews were conducted using two methods; by face-to-face interviews or by self-complete questionnaires. The salient features of the research were that it studied the: 1. Student finances 2. Information sources used a. Overall Usage levels b. Alternatives used c. Internet usage d. Ease of access to the internet 3. Usage of University Library in terms of frequency 4. Book Buying behavior in terms of: a. Overall incidence of purchase b. Numbers of books bought c. Values of purchases d. Reasons for non-purchase e. Extent of choice of recommended books f. Value for money g. Extent of use of individual books 5. Sources of books a. Sources used at all b. Extent of buying from different sources c. Online purchases The findings and implications of the above research were as follows: 1. Student market for books has remained very stable, despite the changes in course structure 2. Usage of electronic media/ the Internet in the future will go up gradually with removal of technological barriers. In the general consumer market for books, online bookstores have a struggle to take a major share of the market, as they are not perceived as offering significant price advantages. Also students cannot view them in advance SP1. 5. 2. 3] Focus Group A focus group interview was conducted on the first year students of MBA. The objective was to gain an insight into the sampling technique and locations for conducting the interviews. The questions assigned were: i) What sampling technique should be used – probabilistic or non probabilistic? ii) If probabilistic technique is selected then should it be stratified or non-stratified sampling? And if st ratified then how the strata should be defined? iii) What locations should be preferred while undertaking mall intercept interviews? [P1. 5. ] Data Collection Design The method used for data collection was survey method and personal interviews were conducted. The reason for conducting personal interviews was that probing and prompting was required while administering the questionnaire which was not possible in any other technique. The questions required memory aids as they were related to future intentions and past purchases. The interviews were mall intercept interviews, the advantage being that it is more efficient and appropriate when the respondents are on related places (libraries or college campus). Another alternative was to use telephone survey. It was rejected because the retention in an interview declines in a multiple choice questionnaire over a telephonic conversation. Mail interviewing was another option. It was rejected because of the low response rate. E-mail interviewing was also rejected on the premise that the response rate is low and validity of data may be compromised. [P1. 5. 4] Sampling Design The sampling universe comprises graduate students of Medicine and post graduate students of Business Administration in Pune city. The research follows quota sampling. The sample consists of 138 respondents of which 48 are MBBS students and 90 are MBA students. The findings cannot be generalized to the entire universe because the buyers’ intention theory was studied but not implemented in entirety. Hence reliability was not maintained. [P1. 5. 5] Fieldwork Design A meeting was arranged to instruct investigators about administering the questionnaire. Separate instruction sheets were provided to each investigator to facilitate the interviews. Prompt cards were provided to help the respondents in clarification of terms. The duration of the training was 5 hours. Respondent Error ? Inability Error Some respondents were unable to answer the intention questions as they were not sure about their specialization subjects in future. The error was minimized by providing prompts and assuring the respondents that the intention need not be final and binding. ? Unwillingness Error Some respondents were unwilling as they had classes and examinations the following day. The error was minimized by assuring the respondents that the interview would be simple and less time consuming. Investigator/Researcher oriented Error ? Recording Error Some investigators recorded the amount and units without converting the values for a 12 month period. The error has been minimized by rechecking with the particular investigator because investigator codes were provided and data could be confirmed. [P1. 5. 6] Analytical Design The data for respondents (MBBS students) has been tested using t-test. The data for respondents (MBA students) has been tested using z-test. [P1. 6] Limitations The research cannot be generalized to the entire universe because several theories like the buyers’ intention theory, the chain ratio theory were studied but not implemented in entirety. Hence reliability was not maintained. [P1. 7] Format of the report Chapter II FINDINGS : It comprises the findings and the analysis on data of Medicine and MBA students. It gives the estimation of demand among the Medicine and MBA students CHAPTER II FINDINGS 2. 1 Findings from secondary data [SP2. 1. 1]Theories The chain ratio method and buyer intention survey method were studied to obtain insights and understanding on the research design. The chain-ratio method involves multiplying the base number by several adjusting percentages. Using this method the following formula applied to the research: D= p x e Where; D = Demand for Periodicals and Journals p = Population e = Average Expenditure/Month Respondents were asked to give the estimated expenditure on SRM for the last three months. The total amount spent on purchases of SRM in the last one year was calculated by extrapolating this data to one year (multiplying by 4). The figure obtained has to be verified with the respondent and then recorded. Buyer’s intention theory facilitated the identification of alternative course of action. The research provides a gratis of reasons for opting for borrowing/sharing and areas of interest for the respondents. SP2. 1. 2] Case Study The case study was used to gain insight for developing an approach to the problem and define the objective more precisely. Demand is estimated in Rupees. It helped in formulating the sample design. The decision for locations for interview was also facilitated by the case study. [SP2. 1. 3] Focus Group The focus group helped to determine the sampling de sign and the locations for conducting the interviews. The sampling technique used was non probabilistic quota sampling. The proposed sample was 150 respondents in the ratio 1:2 for Medical and MBA respectively. The MBBS students consist of both private and non-private colleges and MBA students are classified according to year of study. The focus group specified locations to conduct the mall intercept interviews. The interviews were conducted in college libraries, canteens, cafes or any other location on campus where the students gathered. [SP2. 1. 4] Pre Test For the purpose of improving the questionnaire, a pre-test was conducted to test the questionnaire on a small sample of respondents. A sample of 9 respondents was taken, out of which 4 respondents were from MBBS and 5 from MBA. There were no problems identified during pretesting. All questions were understood by the respondents correctly and data was collected according to the requirements. 2. 2 Findings from Survey [P2. 2. 1] MBBS Students [SP2. 2. 1. 1] Sample Profile [P1]Acquaintance of readers with respondents The respondents belong to two separate samples as in the table, both of which are independent of each other i. e. the attributes of one sample have no bearing on those of another. The sample comprises 48 medical students of private and non-private (government) colleges of Pune. Out of these 26 students are from non-private college and 22 from private college. [Ref. Table 2. 2. 1. (1)] [T1] Table 2. 2. 1. 1 (1) Sample Profile of MBBS Students | |Type of College |Grand Total | | |Non-private |Private | | |Total |26 |22 |48 | [P2] Readership Pattern of SRM The inference derived is that 11 respondents or 23 percent read SRM and 37 respondents or 77 percent do not read SRMs. [Ref. Figure 2. 2. 1. 1 (2)] [F1] Figure 2. 2. 1. 1 (2) Readership Pattern of SR M n=48 [P3] Average of Total Intended Demand The intended demand (Rs. ) for purchase of SRM for next one year by MBBS students of private and non-private colleges is not statistically significant. t-test is applied as the sample size for each classification is less than 30 and the two samples are independent. [Ref. Table 2. 2. 1. 1(3)] For further analysis the two samples are merged and medical students are considered as one single sample. The details of hypothesis formulation and the calculation have been attached in Annexure C. The average total intended demand ranges between Rs. 0 and Rs. 729 with 95% confidence. [T2] Table 2. 2. 1. (3) Average of Total Intended Demand n=48 | |Average Demand |Range | |Total Intended Demand of Purchases (Rs. ) |502 | | | | |0-729 | [SP2. 2. 1. 2] Estimation of Overall Average Demand of SRM (Current Intended) The total average demand (Rs. ) of MBBS students for purchase of SRM for the current year is Rs. 325 and that intended for the next one year is Rs. 502. [Ref. Table 2. 2. 1. 2] [T3] Ta ble 2. . 1. 2 Estimation of Overall Average Demand of SRM (Current Intended) n=48 |Nature of Demand |Average Demand (Rs. ) | |Current Year |X1 = 325 | |Next One Year |X2 = 502 | [SP2. 2. 1. 3] Current Demand of Print SRM The overall average current demand of MBBS students for print SRM is Rs. 75, within the range of Rs. 8 to Rs. 142. The average current demand for subscription in print media for SRM is Rs. 31, within the range of Rs. 0 to Rs. 78. The average current demand for off the shelf purchase in print media for SRM is Rs. 44, within the range of Rs. 2 to Rs. 86. [Ref. Table 2. 2. 1. 3] [T4] Table 2. 2. 1. 3 Current Demand of Print SRM n=11 | |Average Demand (Rs. ) |Range (Rs. ) | | Print Overall |75 |8 -142 | |Print Subscription |31 |0-78 | |Print OTS |44 |2-86 | [SP2. 2. 1. 4] Current Demand of CD format SRM The overall average current demand of MBBS students for CD format SRM is Rs. 250, within the range of Rs. 0 to Rs. 633. There is no current demand for subscription in CD format for SRM. The average current demand for off the shelf purchase in CD format for SRM is Rs. 250, within the range of Rs. 0 to Rs. 633. [Ref. Table 2. 2. 1. 4] [T5] Table 2. 2. 1. 4 Current Demand of CD format SRM n=11 | |Average Demand (Rs. ) |Range (Rs. ) | |CD Overall |250 |0-633 | |CD Subscription |0 0 | |CD OTS |250 |0-633 | [SP2. 2. 1. 5] Estimation of intended demand for print The overall average intended demand of MBBS students for print SRM is Rs. 231, within the range of Rs. 102 to Rs. 361. The average intended demand for subscription in print media for SRM is Rs. 164, within the range of Rs. 43 to Rs. 284. The average intended demand for off the shelf purchase in print media for SRM is Rs. 68, within the range of Rs. 3 to Rs. 132. [Ref. Table 2. 2. 1. 5] [T6] Table 2. 2. 1. 5 Intended Demand of Print SRM n=11 |Average Demand (Rs. ) |Range (Rs. ) | |Print Overall |231 |102 -361 | |Print Subscription |164 |43-284 | |Print OTS |68 |3-132 | [SP2. 2. 1. 6] Estimation of intended demand for CD format The overall average intended demand of MBBS students for CD format SRM is Rs. 271, within the range of Rs. 0 to Rs. 695. There is no average intended demand for subscription in CD format for SRM. The average intended demand for off the shelf purchase in CD format for SRM is Rs. 271, within the range of Rs. 0 to Rs. 695. [Ref. Table 2. 2. 1. 6] [T7] Table 2. 2. 1. 6 Intended Demand of CD format SRM n=11 | |Average Demand (Rs. ) |Range (Rs. ) | |CD Overall |271 |0-695 | |CD Subscription |0 |0 | |CD OTS |271 |0-695 | [SP2. 2. 1. ] Estimation of sources of accessing SRM The inference derived is that out of 11 respondents who read SRM 6 both purchase and borrow/share SRM. [Ref. Figure 2. 2. 1. 7] [F2] Figure 2. 2. 1. 7 Estimation of sources of accessing SRM n=11 [SP2. 2. 1. 8] Estimation of reasons for borrowing/sharing SRM and not purchasing The inference derived is that out of 10 respondents who borrow/share and/or purchase SRM, 42% claim that cost effectiveness is the main reason for not purchasing. The next in order of importance are low frequency of reading and unavailability. One respondent may have recorded more than one reason. Ref. Figure 2. 2. 1. 8] [F3] Figure 2. 2. 1. 8 Estimation of reasons for borrowing/sharing SRM and not purchasing n=10 [SP2. 2. 1. 9] Estimation of Areas of Interest There is no clear area of preference for readership of SRM though Technological Advancements and Equipments lead the choice of preference. [Ref. Figure 2. 2. 1. 9] [F4] Figure 2. 2. 1. 9 Estimation of Areas of Interest n=48 [pic] [P2. 2. 2] MBA Students [SP2. 2. 2. 1] Sample Profile [P1]Acquaintance of readers with respondents The respondents belong to two separate samples as in the table, both of which are independent of each other i. . the attributes of one sample have no bearing on those of another. The sample comprises 90 management students of colleges of Pune. Out of these 54 students are from first year and 36 from second year. [Ref. Table 2. 2. 2. 1(1)] [T8] Table 2. 2. 2. 1 (1) Sample Profile of MBA Students | |Year of Study |Grand Total | | |First Year |Second Year | | |Total |54 |36 |90 | P2] Readership pattern of SRM The inference derived is that 87 re spondents read SRM. [Ref. Figure 2. 2. 2. 1 (2)] [F5] Figure 2. 2. 2. 1 (2) Readership pattern of SRM n=90 [pic]` [P3] Intended demand (Rs. ) of SRM for next one year by students of first and second year. The intended demand (Rs. ) for purchase of SRM for next one year by MBA students of first and second years is statistically significant. A z-test is applied as the sample size for each classification is greater than 30 and the two samples are independent. [Ref. Table 2. 2. 1. (3)] For further analysis the two samples are considered separately. The details of hypothesis formulation and the calculation have been attached in Annexure D. The average total intended demand ranges between Rs. 64 and Rs. 258 for the first year MBA students with 95% confidence. The average total intended demand ranges between Rs. 27 and Rs. 167 for the second year MBA students with 95% confidence. [T9] Table 2. 2. 2. 1 (3) Intended demand of SRM for next one year by students of first year and second year = 90 |Year of study |First Year |Second Year | |Average of Total Intended Demand of Purchases (Rs) |X1 = 374 | | | | |X2 = 1116 | |Range |64-258 |27-167 | |Number of Respondents |n1 = 54 |n2 = 36 | SP2. 2. 2. 2] Estimation of Overall Average Demand of SRM (Current Intended) The total average demand (Rs. ) of MBA students for SRM for the current year is Rs. 161 for the first year students and Rs. 97 for the second year students. Intended for the next one year is Rs. 170 for the first year students and Rs. 713 for the second year students. [Ref. Table 2. 2. 2. 2)] [T10] Table 2. 2. 2. 2 Estimation of Overall Average Demand of SRM (Current Intended) n=90 |Â   |Average Demand (Rs. | | |First Year |Second Year | |Current Period |161 |97 | |In the next one Year |170 |713 | [SP2. 2. 2. 3] Current Demand of Print SRM The overall average current demand of MBA first year students for print SRM is Rs. 344, within the range of Rs. 219 to Rs. 470. The average current demand for subscription in print media for SRM is Rs. 164, within the range of Rs. 64 to Rs. 263 in this group. The average current demand for off-the-shelf purchase in print media for SRM is Rs. 81, within the range of Rs. 30 to Rs. 240 (95 percent confidence used for all estimations). The overall average current demand of MBA second year students for print SRM is Rs. 586, within the range of Rs. 380 to Rs. 792. The average current demand for subscription in print media for SRM is Rs. 109, within the range of Rs. 34 to Rs. 184 in this group. The average current demand for off-the-shelf purchase in print media for SRM is Rs. 483, within the range of Rs. 85 to Rs. 653 (95 percent confidence used for all estimations). [Ref. Table 2. 2. 2. 3] [T11] Table 2. 2. 2. 3 Current Demand of Print SRM =87 |Â   |Average Demand (Rs. ) |Range (Rs. ) | | |First Year |Second Year |First Year |Second Year | | Print Overall |344 |586 |219 470 |380-792 | |Print Subscription |164 |109 |64 263 |34 – 184 | |Print OTS | 181 |483 |30 240 |85 – 653 | SP2. 2. 2. 4] Current Demand of CD format SRM The research shows that there is no current demand for CD format SRMs among the MBA students in Pune. [SP2. 2. 2. 5] Estimation of intended demand for print The overall average intended demand of MBA first year students for print SRM is Rs. 285, within the range of Rs. 200 to Rs. 370. The average intended demand for subscription in print media for SRM is Rs. 161, within the range of Rs. 105 to Rs. 218 in this group. The average intended demand for off-the-shelf purchase in print media for SRM is Rs. 126, within the range of Rs. 9 to Rs. 173 (95 percent confidence used for all estimations). The overall average intended demand of MBA second year students for print SRM is Rs. 1181, within the range of Rs. 683 to Rs. 1680. The average current demand for subscription in print media for SRM is Rs. 755, within the range of Rs. 297 to Rs. 1213 in this group. The average current demand for off-the-shelf purcha se in print media for SRM is Rs. 426, within the range of Rs. 262 to Rs. 590 (95 percent confidence used for all estimations). [Ref. Table 2. 2. 2. 5] [T12] Table 2. 2. 2. 5 Intended Demand of Print SRM n=87 Â   |Average Demand (Rs. ) |Range (Rs. ) | | |First Year |Second Year |First Year |Second Year | | Print Overall |285 |1181 |200-370 |683-1680 | |Print Subscription |161 |755 |105-218 |297-1213 | |Print OTS |126 |426 |79-173 |262-590 | [SP2. . 2. 6] Estimation of intended demand for CD format The research shows that there is no intended demand for CD format SRMs among the MBA students in Pune. [SP2. 2. 2. 7] Estimation of sources of accessing SRM The data shows that out of 87 respondents who read SRM 67 both borrow and share SRM. Further, 9 respondents both purchase and borrow/share SRMs [Ref. Figure 2. 2. 2. 7] [F6] Figure 2. 2. 2. 7 Estimation of sources of accessing SRM n=87[pic] [SP2. 2. 2. 8] Estimation of reasons for borrowing/sharing SRM and not purchasing The inference derived is that out of 68 respondents who borrow/share and/or urchase SRM, 76% claim that cost effectiveness is the main reason for not purchasing. The next in order of importance are low frequency of reading and unavailability. One respondent may have recorded more than one reason. [Ref. Figure 2. 2. 2. 8] [F7] Figure 2. 2. 2. 8 Estimation of reasons for borrowing/sharing SRM and not purchasing n=68 [SP2. 2. 2. 9] Estimation of Areas of Interest There is no clear area of preference for readership of SRM though Marketing and Finance lead the choice of preference. Ref. Figure 2. 2. 2. 9] [F8] Figure 2. 2. 2. 9 Estimation of Areas of Interest n=87 [pic] Readers Non Readers PURCHASING BORROWING/SHARING PURCHASE BORROW/SHARE SRM Cost Effective Low Frequency of Reading Unavailability 3 3 3 1 0 9 12 12 5 10 0 2 4 6 8 10 12 14 Pharmacology Technological Advancements Biotech Equipments Others Non-Readers Readers 35 8 7 8 3 6 1 Cost Effective Low Frequency of Reading Unavailability 0 5 10 15 20 25 30 Marketing Finance HR Others First year Second year