Tuesday, December 31, 2019
Analysis Of Bill Gates And Steve Jobs - 907 Words
Capstone Word Project The two men I am about to explain have shape the technology world drastically. Bill Gates and Steve Jobs are some of the biggest names in technology, they are digital pioneers. They founded their companies almost at the same time, both being the leaders in their fields they have created some of the largest and most profitable companies in the technology world. Without these two men the smartphones and computers we have today might be a lot different. Bill Gates founded Microsoft and Steve Jobs was the co-founder of Apple. Bill Gates was one of the original pioneers of software, Jobââ¬â¢s the pioneer of personal and handheld computers. Bill Gates is the founders and primary shareholder of Microsoft, which has become the worldââ¬â¢s leading software manufacture. ââ¬Å"The complex relationship between Bill Gates and Steve Jobs began in the late 1970s, when Microsoft was making most of its money writing software for the Apple II. When Jobs began developing the original Macintosh in the early 1980s, he wanted Microsoft to create for it a version of BASIC, an easy-to-use programming language, as well as some application software, such as word processing, charts, and spreadsheet programs. So he flew up to visit Gates in his office near Seattle and spun an enticing vision of what the Macintosh would be: a computer for the masses, with a friendly graphical interface. Gates signed on to do graphical versions of a new spreadsheet called Excel, a word-processing programShow MoreRelated Bill Gates Essay1359 Words à |à 6 PagesBill Gates William Henry Gates, III was born October 28, 1955 in Seattle, Washington. He was the middle child of three born to William and Mary Gates. ATrey,@ as he was called because of the III, was sent to a private school by his father, a lawyer, and mother, a former teacher now on several prestigous boards (Moritz, 238). At age 13, Bill had completely taught himself programming after taking a computer studies class. After scoring a perfect 800 on the mathematics half of the SAT, he graduatedRead MoreThe Exploration Of Apples Historical Background1115 Words à |à 5 Pagesproduced. The analysis will entail foreign exposure that is emphatically in nature to the success that entails the companyââ¬â¢s success. Background The company is a California corporation established in 1977, created by Steve Jobs whom has been an innovative to Apple products. Apple created desktop computer components from the late 1970s until the early 1980s. Appleââ¬â¢s Steve Jobs was in war with PC manufacturer Bill Gates. Apple couldnââ¬â¢t compete with PCs manufacturer owner Bill Gates as he stole theRead MoreAnalysis Of Bill Gates And Paul Allen1253 Words à |à 6 PagesThe History of Microsoft Bill Gates and Paul Allen are both the cofounders of the Microsoft Company. The start of their boundless achievements started when they were in high school on one of the computer terminals. All of their free time and little money were spent working in that high school terminal. The development that really instated everything in the business sense was when they read an article in 1971, in the business magazine regarding Intel s 4004 chip. Soon they both got access about theRead MoreThe Four Key Ideas Entrepreneurs Essay1564 Words à |à 7 Pagesideas entrepreneurs will be able to seek out opportunities and have a better chance of becoming a successful entrepreneur. Through analysis of articles and journals a comprehensive evaluation can be used to establish why these are the four key ideas entrepreneurs should have. Through entrepreneurs such as Richard Branson, Steve Jobs, Dr. Sangeeta Bhatia and Bill Gates, we can see the entrepreneurs success can be attributed to one of the key id eas that entrepreneurs should keep in mind when opportunityRead MoreThe American Dream Is A Good Education1100 Words à |à 5 PagesThe American Dream is the belief that working hard will bring success, prosperity and happiness. More specifically this means, having a job that you love doing, a family to come home, and the finances to provide for them. The American Dream may vary from person to person, but Wealth and happiness is universal. The American dream is real, it is attainable in todayââ¬â¢s society with the proper preparation. The preparation needed to begin the process of achieving the American dream is through a good educationRead MoreMicrosoft Analysis1396 Words à |à 6 PagesAlso this assignment will do financial comparative analysis study and benchmarking with nearest rivals like apple Inc., Google Corporation and Oracle Inc. and will applied to discover key factors for proposed area of developments and further improvements. Here the analysis tools like Porter 8-f orce analysis, PESTEL-analysis will be applied and the expected outcomes of analysis and benchmarking with nearest rivals will be incorporated in an analysis of Microsoft followed by the recommendation for Read MoreLearning by Degrees Essay958 Words à |à 4 Pagesplace. Also, another factor that fails to be an article that the Shorthornââ¬â¢s readers would find interesting is that it lacks a claim that fails to make a case for going towards a career path immediately or obtaining a college degree first. Through my analysis on this article, Iââ¬â¢ve provided several reasons and evidence why I donââ¬â¢t find this article should be published since she is trying to convince a hostile audience in this essay, gives a weak claim, and has credibility for a separate view that she isRead MoreInfluence Processes a Leadership Analysis Essays1007 Words à |à 5 PagesWilliam Scott Influence Processes: A Leadership Analysis Leadership Ethics for Managers June 1, 2008 Abstract A leaderââ¬â¢s ability to influence and motivate followers is a crucial skill that effective leaders must possess. This is why organizations allow leaders to control many of the operational functions of the organization. By controlling several key operational components, the leader is able to direct and institute change throughout the organization. The purpose of this paper is toRead MoreBill Gates : A Leader1284 Words à |à 6 PagesLeadership Identify a leader and justify why you selected that particular leader Bill Gates Not everyone is a leader or even want the attention or time it takes to be a leader. Leaders must be available for everyone that means sharing who they are with the world. This leader took his business and made a name for himself. Leaders are fantastic speakers, yet talking honorably isn t excessively required of a leader. As we all in all know, there are many people who talk and are overwhelming. ThisRead MoreAn Assessment of the Strategic Leadership of Bill Gates1939 Words à |à 8 PagesAssessment of the Strategic Leadership of Bill Gates, Introduction Bill Gates approach to planning, implementing and managing strategic-level initiatives throughout Microsoft Corporation and the long-term effects of his leadership strategies on the culture of the company is the subject of this analysis. Using the model on effective strategic leadership found in the text (Hitt, Ireland, Hoskisson, 2013) each of its dimensions are also used for assessing Bill gates leadership style and effectiveness
Sunday, December 22, 2019
The Assassination Of Abraham Lincoln - 1535 Words
Michael Cardenas Ritmann History 2B October 16, 2015 The Assassination Of Abraham Lincoln On April 14, 1865 at twelve oââ¬â¢ clock midnight John Wilkes Booth lay in his bed at the National Hotel. Three days earlier he had attended a speech given by President Abraham Lincoln at the White House. The civil war had commenced just two days earlier and the crowd was jubilant. When Lincoln concluded his speech with the the acknowledgment of black suffrage, Booth became incensed and declared that ââ¬Å"Now by God, Iââ¬â¢ll put him through, that will be the last speech he makesâ⬠. Booth was a staunch Confederate sympathizer and he had previously plotted a kidnapping involving the president in exchange for POWS between the northern and southern states. With that plan failed, he became desperate in figuring a way to put the power back in the Confederacy. Along with three other conspirators Booth realized exactly what needed to be done and that night at Fordââ¬â¢s Theatre, while a performance of the play ââ¬Å"Our American Cousinâ ⬠was appearing, Booth slipped into the Presidential Box seats where Abraham Lincoln and his wife Mary Todd were seated and shot him. Booth jumped onto the stage below and fled the scene among the chaos. As Lincoln lay dying a young surgeon named Charles Leale and other doctors in the audience tended to Lincoln and decided that traveling to the White house was out of the question, so carrying him out of the theatre on a stretcher, Lincoln was taken to the Petersen Boarding HouseShow MoreRelatedThe Assassination Of Abraham Lincoln861 Words à |à 4 PagesAppomattox Courthouse, one of America s greatest presidents, Abraham Lincoln, was shot and killed by a man named John Wilkes Booth. Specifically, John Wilkes Booth was an American play actor and a big sympathiser for the Confederacy. Booth was well known for his hatred towards the President and his crazy ideas and motives, which lead to the killing of Lincoln. Many conspiracies and theories today believed the assassination of A braham Lincoln was handled by John Wilkes alone, but other conspiracies believedRead MoreThe Assassination Of Abraham Lincoln1064 Words à |à 5 PagesColin Shafer Abraham Lincolnââ¬â¢s Assassination President Abraham Lincoln was the first United States president ever to be assassinated while in office. He was president during the Civil War and had many people that did not like him. John Wilkes Booth did not like Abraham Lincoln and was responsible for the Presidentââ¬â¢s death. Abraham Lincoln was born in Harden County, Kentucky on February 12, 1809. His parents were Thomas and Nancy Hanks Lincoln. In 1818, his mother died while he was just nine yearsRead MoreThe Assassination of Abraham Lincoln511 Words à |à 2 PagesThe Assassination of Abraham Lincoln The assassination of President Abraham Lincoln occurred on April 15, 1865, Washington, D.C. Lincoln was watching the play ââ¬Å"Our American Cousinâ⬠at Fordââ¬â¢s Theatre located in Washington D.C. John Wilkes Booth entered the theatre during the play and shot and killed President Lincoln. This tragic event changed history. President Lincoln was the President of the United States during the time of slavery. He was also the president during the Civil War. Lincoln wantedRead MoreThe Assassination Of Abraham Lincoln Essay1317 Words à |à 6 Pagesââ¬Å"Sic Semper tyrannisâ⬠or ââ¬Å"Thus always I bring death to tyrantsâ⬠were the famous words of Confederate actor John Wilkes Booth after he shot President Lincoln at Fordââ¬â¢s Theatre. The assassination of Abraham Lincoln was a tragic event that will be forever remembered in the hearts of all American citizens. On April 20, 1999 in Littleton, Colorado, Boothââ¬â¢s words would make a comeback during another Am erican tragedy; Columbine high school was the setting for arguably one of the most notorious school shootingsRead MoreThe Assassination Of Abraham Lincoln Essay1342 Words à |à 6 Pagesââ¬Å"Sic Semper Tyrannisâ⬠or ââ¬Å"Thus always I bring death to tyrantsâ⬠were the famous words of Confederate actor John Wilkes Booth after he shot President Lincoln at Fordââ¬â¢s Theatre. The assassination of Abraham Lincoln was a devastating event that will be forever remembered in the hearts of all American citizens. On April 20, 1999 in Littleton, Colorado, Boothââ¬â¢s words became a part of another American tragedy; Columbine high school was the setting for arguably one of the most infamous school shootingsRead MoreThe Assassination Of President Abraham Lincoln Essay983 Words à |à 4 PagesOne of the most tragic moments throughout all American history in my opinion is the Assassination of President Abraham Lincoln. With no surprise I am writing about certain event that oc curred leading up to, during, and after this unfortunate event. This historical event is clouded with conspiracy but I will try to avoid specifics of that particular view. Abraham Lincoln was born in a little town located within Hardin Country, Kentucky on February 12, 1809 (www.whitehouse.gov/abrahamlincoln). HeRead MoreThe Assassination of Abraham Lincoln Essay913 Words à |à 4 PagesAbraham Lincoln was the 16th president of the United States of America. He was elected into presidency on November 6, 1860. Many of the southern states were unsupportive of Lincoln becoming president because he had run on an anti-slavery platform. Lincoln being elected into presidency caused states such as South Carolina, Mississippi, Florida, Alabama, Georgia, Louisiana and Texas to split from the Union. In his inaugural address Lincoln proclaimed it was his duty to maintain the Union; a month laterRead MoreThe Assassination of Abraham Lincoln Essay1646 Words à |à 7 Pagesorphaned child-to do all which may be achieved and cherished a just and a lasting peace among ourselves, and with all other nationsâ⬠-Abraham Lincoln, Second Inaugural Address (Great Documen ts of America 19). Abraham Lincoln was the sixteenth president of the United States and perhaps one of the most hated presidents that ever served, this hatred for president Lincoln came from his options and actions regarding the nationââ¬â¢s conflict at the time; the Civil War, this came after the succession of fourteenRead MoreThe Assassination Of Abraham Lincoln1456 Words à |à 6 Pagesbe the same today if Abraham Lincoln was never assassinated on the unfortunate night of April 14, 1865. His killer, John Wilkes Booth, had a strong resent for the Union that subsequently caused a dramatic shift in history. This hatred was caused by many factors, such as his background and where he grew up, his lust for power and fame, and his mental illness. John Wilkes Booth, a master assassinator and conspirator, hoped to strengthen the confederacy by killing Abraham Lincoln. However, this murderRead MoreAbraham Lincoln s Assassination Of President1176 Words à |à 5 PagesAbraham Lincolnââ¬â¢s Assassination President Abraham Lincoln was the first United States president ever to be assassinated while in office. He was president during the Civil War and had many people that did not like him. John Wilkes Booth was one of those people and was the man responsible for the Presidents death. The following is about Abraham Lincoln, John Wilkes Booth, Boothââ¬â¢s plan for Lincoln, the Presidentââ¬â¢s assassination, Boothââ¬â¢s capture and how it affected history. Abraham Lincoln was born
Saturday, December 14, 2019
The Hero of Troy Free Essays
In todayââ¬â¢s modern times we hear the word hero all of the time Nearly every day on television people talk of athletes and celebrities as being heroes, but actually , they are not heroes at all.Possibly role models, but for the most part, not in heroic qualities a true hero is a man that distinguished by exceptional courage and nobility strength , a person that would put his self in danger to serve his god and country ,a person may even be a hero if he helped people by just giving them strength to go in through life difficulties , someone who would give up his life so another would have a peaceful life , that is what I call a hero , and through the movie we saw allot of courageous powerful warriors that were dying in the sake of their country like ; Paris , Patroclus.Achilles, Odysseus, these are the people that we would really call heroes. We will write a custom essay sample on The Hero of Troy or any similar topic only for you Order Now but among these heroic people there is one particular one that would rise above them all, and that would be ââ¬Ëhectorââ¬â¢Ã¢â¬â¢ the oldest son ofââ¬â¢Ã¢â¬â¢ priam ââ¬Ëââ¬â¢ husband of Andromache, and father of Astyanax, and he is the hero of troy because ; hector led the Trojan through the war , sacrificed his life for the sake of troy even defended his brother and stood with him while he was the one that started the war , hector faced and fought with the most power full warrior in Greek ,never gave up on his country and people and he was loyal to them .When Hectors and his brother went to visit Sparta to negotiate peace between Sparta and troy , Paris had seen Helen and he was enchanted by her beauty and fell in love with her , not only Paris who were in love with her, Helen had also admired him as well , when it was time to departed from Sparta , Paris convinced Helen to come back with him to troy and they would live there together , Helen agreed and went back with him , hector did not know about this but when his brother told him at first hector wanted to go back and return her but then he saw how they were in love with each other , he agreed on letting her come back with them to troy , and he supported his brother desire knowing what would happen if he did , but he did not care all what he thought about is what would make his brother happy . he Greeks were rage about the kidnap of Helen and they started a war with troy hector knew that after this truce the Greeks would break this truce and come after troy . When the Greeks came to invade hector didnââ¬â¢t hastate to serve his country hector wore his armour, gave a warm fare well to his family and went off for battle , hector was known with his skill in fighting ,he was one of the greatest warriors in his time , led his army with sincerity and faith , he saw the army fall down but still he had faith in troy and his self , hector fought with his whole power , when he was hurt he would get cured and fight the next day ,it was all to just see troy free .The Trojanââ¬â¢s launched a surprise attack at the break of dawn and in this battle , hector thought that he had killed Achilles but as he kneels down and removes Achilles helmet he finds out that this guy is actually Patroclus Achilles cousin , but in Achilles armour and ,Patroclus was even moving like Achilles, Achilles was irritate for the lost of his cousin and went to hectorââ¬â¢s palace to have his revenge, hector accepts the Consequences of him not being conscious about who he was fighting with , he agrees to fight bravely , and requests that the loser would have a proper funeral hosting by the winner but, Achilles refused , hector puts his soul and heart in the battle and fights strongly , at the start the two were fighting evenly , but eventually Achilles spears hector in the shoulder and then finishes with a sword in the chest . Hector closes his eyes forever on this world and, he leaves a mark in every Trojan soul, and that is a person that everyone would look back and point asââ¬â¢Ã¢â¬â¢ the hero of troy ââ¬Ëââ¬â¢, Hector was one of the great leaders and warrior that no one would forget, he led the Trojans through the Trojan War, lived to serve his country and god, family always came first to him, hector accidently killed Achilles cousin thinking that he is Achilles ,eventually he was killed by Achilles, he speared the prince in the shoulder. Hector leaves a mark in every personââ¬â¢s soul that knows what this brave warrior did. Hect or became a moral to every man. ââ¬Ëââ¬â¢the end ââ¬Ëââ¬â¢ How to cite The Hero of Troy, Papers
Friday, December 6, 2019
Risk Management and Corporate Governance - MyAssignmenthelp.com
Question: Discuss about theRisk Management and Corporate Governance. Answer: Introduction Risk can be defined as the impact of uncertainty on the objectives of the company. It is the possibility of gaining or losing something of value. It is the possibility of damage, hazards, accidents, obligations, loss or any undesirable incidence which is caused by external or internal susceptibilities. According to Institute of Risk Management (2018) it is the process which comprises of comprehending, assessing and addressing risk to ensure that the organizations achieve their goals. It depends on the complexity and the nature of industry in which the company operates. In this context, Enterprise Risk Management (ERM) is a cohesive methodology to manage risk across the entity. The hospitality industry is confronted by challenges relating to day to day safety and security. The risks relating to theft, burglary and safety related to pools, spa, personal grooming, valet parking, food and hard drinks are the issues which raise the safety and security concerns. Also, the housekeeping, laundry services and kitchen tasks are prone to fire outbreaks .To mitigate the said risk, an efficient risk control program can play a crucial role in assisting the hotel industry to provide safe and secure environment for its consumers and work force. Risk management begins with risk analysis and comprehending the risk of conducting business. The risk control procedures shall not only comprise of methods and programs to deal with safeguarding the work force and consumers but also risk management procedures for assets and day-to-day processes (Travelers, 2013).In this context, the risk analysis and risk management programs would be applied to the Caf 63, Racecourse Road, Brisbane with emphasis on its kitchen operations. The Notion of Risk What is Risk? Risk comprises of the probability of the occurrence of an unwanted event. It may also be defined as the impact of uncertainty on accomplishment of the goals of the organization. Risk concerned with the goals, plans and procedures and ultimately the mission of the company is termed as Strategic Risk. The risk affecting the delivery and success of the projects is referred to as Project Risk. The risk concerned with the human resources, internal systems and procedures is termed as Operational Risk. These risks have an effect on the results of the business divisions, individual projects, business procedures and mechanisms (Tourism Australia, 2015). Business in the hospitality industry is continuously exposed to risk which comes along with providing services and facilities to the guests. With reference to this industry, the quantum of risk increases in proportion to its workforce. The emergence of new risks with the changing trends in the hospitality industry is another factor which focuses the need for risk management. Caf 63 is one of the cafes in Brisbane which serve around 20, 00,000 customers every year. Like the other industries operating in the hospitality industry, it is exposed to certain risks (Caf 63, 2017). There are certain risks confronted by Caf 63 specially relating to kitchen operations, housekeeping and laundry. What is subject to risk? The following is a list of risk exposures which are confronted by Caf 63. Some of them are: Food Contamination: Food safety is one of the major issues of concern for businesses operating in the hospitality sector. Food is prone to infections such as salmonella, campylobacter from infected chicken ,vibrio from raw shellfish and E. coli. Another virus which can contaminate food is Norovirus. It spreads when food comes in contact with infected people and surfaces. Poor Handling: 50% of the accidents occur in the kitchens due to carrying out some manual handling related task. Mishandling of the appliances by the kitchen staff can lead to musculoskeletal injuries such as trauma or pain in the back or knees and elbows etc. Slips, trips and falls: The workers in the kitchen can fall or slip due to water pooling. Old pipelines tend to leak, especially where there are taps, basins and other activities in which usage of water is involved ( Kristina Wijaya ,2017). Dangerous Chemicals: Dangerous chemicals are used in the kitchens as cleaners, which are hazardous to the health of the workers. For example: Bear Line cleaner can cause blindness if it gets into the eyes. Burns and cuts: The kitchen staff is exposed to burns and cuts if they do not handle the knifes and sharp edged appliances carefully. Electrical Hazards: The kitchen staff is also exposed to electrical hazards if they dont handle the electrical appliances carefully. Carbon dioxide gas: CO2 is denser than air and it is odorless and sluggish .If leaked ,it would drop down to the floor and rise .If there is no facility to detect the leakage and alarm systems are not installed, it would pose a threat to the lives of the workers (Deloitte, 2013). Why is it necessary to implement risk management process? What is Risk Management? According to Government of Western Australia: Department of Mines, Industry Regulations and Safety (no date) risk management can be identified as an integrated part of good managerial practices and governance. It consists of repetitive steps, demanding the need for continuous improvement in decision making. It is an organized method involving the establishment of context ,recognizing, assessing ,prioritizing the risks, managing ,observing and communicating the risk related with any procedure or mechanism. It helps in assisting the organization to reduce its losses and increase opportunities. The important components of risk management are: Risk Management Establishment of Context: The main context or background should be set in which the rest of the process will be executed. The benchmark against which the risk would be analyzed and the structure of the risk assessment would be defined. Risk Identification: The assessment of what, how and why things could emerge in the context of further analysis. Assessing the risk: Testing the current processes regarding risk management in terms of results and probability in terms of the applied procedures. Prioritizing the risks: Contrasting the risks against the conventional risk measurement benchmarks, so that it can be ranked and prioritized. Managing the risk: The risk with the least priority should be reviewed and regulated while suitable risk mitigation plan should be formulated to treat the risks with highest priority. Observing the risk management program: Observing the implementation of the risk management program and rectifying its discrepancies. Communicating and consulting the implementation of risk management program at its each stage, with internal and external stakeholders (OECD, 2014). Necessity of Implementing Risk Management Processes An efficient risk management strategy is important for the personnel of the hospitality industry. It assists the employees to recognize, evaluate and mitigate the risks arising from a variety of sources such as financial constraints, legal contingencies and obligations, accidents, natural calamities and data or cyber security breaches. According to InterContinental Hotels Group (2013) the necessity for implementing the risk management process lies in its features. Some of them are: The risk management plan recognizes, regulates and observes the risks affecting the organization. It focuses on the accomplishment of goals and safeguarding the business models, brands and goodwill of the organization among the stakeholders. It also assists in implementing the strategy and the procedures for change. Also it helps in safeguarding the resources, physical and nonphysical, procedures and mechanisms of the organization. Risk Management can be incorporated in Cafs commercial activities through: Strategic Risk Analysis which can be a part of the Strategic Annual Plan (SAP). An Operational Risk Analysis in alignment with annual operational planning (AOP); Assessment of the project risks with the evaluation of the project plans. Analyzing the risks of frauds. Investigation of the risk profile on quarterly basis. Analysis of the risk of acquisition of the products and services. Insurance risk Analysis. Investigation of the risks pertaining to the workers health and safety. Venue Risk Analysis The Venue Risk Analysis comprises of Risk Ranking System and Venue Risk Analysis Form .The Risk Ranking System shows how risk would be assessed. Venue Risk Analysis Form is a procedure to assess the risk. Risk Ranking System Kwon et all.(2014) suggested that Risk Ranking is one of the most common procedures used for Risk Management. It is also known as Relative Risk Ranking, Risk Indexing and Risk Matrix. Its purpose is to focus on the risks faced by the system. Risk Ranking operates by bifurcating the risk into constituents and analyzing those constituents and their individual input to overall risk. The risk ranking model is most suited to contrast and manage a portfolio of complex risks. It is facilitated through breaking down of the risk into risk scenarios with components. It requires agreed set of risk factors and evaluation benchmarks. It will help the management to contemplate the aspects affecting the risk faced by the company. The aspects contemplated are: Event Likelihood Its Impact Financial severity Severity of Injury Reputation Impact severity Risk Ranking System will list the probable risk events which will cause harm to the kitchen operations of Caf 63.It will state the risk which may unfavorably impact the Caf operations . It also states the controls or safeguard mechanisms adopted by the company to mitigate the risks. At every step, the priority and probability of each factor associated with the risk would be decided and the efficiency of the safeguard mechanism regarding each factor and risk would be analyzed. Risk Ranking System regarding the kitchen operations of Cafe 63, Racecourse Road, Brisbane Risk Risk Description Available Controls Severity Likelihood Level Slips, trips and falls (Workplace Health and Safety Queensland, 2014) Injuries due to sudden fall in the kitchen causing insignificant injuries to the workers. Anti-slip mechanisms as needed; appropriate lighting. Minor Very Likely A Injuries Cuts due to mishandling of objects in the kitchen causing minor hurt to the workers (Food standards Agency, no date). Proper handling and wearing of gloves for protection against sharp objects. Moderate Likely B Food Contamination Food poisoning causing death or sever illness to the customers (Derbyshire County Council, 2017). Work permit from health inspectorate. Moderate Possible C Heat or cold Hot water burn while working in the kitchen causing major injuries. Pipes; mixer taps conform to building regulations Major Possible C Infection Faulty pipes contaminate water causing moderate injuries. Pipes conform to building regulations Significant Unlikely D Fire Fire breakout in the Kitchen causing death of the workers. Emergency exit plan in place. Fire defense conform to building regulations Significant Very Unlikely E Natural Calamity Loose objects fall on the staff due to earthquake causing severe injuries. No loose objects kept outside the cupboards. Implementation of the emergency exit plan. Significant Very Unlikely E Dangerous Chemicals Leakage of the CO2 Gas causing death of the workers. Appropriate system to safeguard the staff from leakage of dangerous gases should be established in place. Gloves and masks while handling them should be worn by the workers. Major Very Unlikely E Electric Hazards Falling over cables or loose wires and risk of short circuit causing severe injuries. Proper maintenance of the wires and their regular inspection. Major Unlikely D In the Risk Ranking System of Caf 63, the specified risks faced by the company, its description, available controls, severity, likelihood and levels are stated. Burns, cuts and falls are prone to least risk with the highest likelihood of occurrences while electric hazards and dangerous chemicals are prone to highest risk with the least likelihood of occurrences. Food contamination and heat or cold are prone to medium risk with moderate likelihood of occurrences. Infection due to faulty pipes and Fire outbreaks are prone to significant risk with the insignificant likelihood of occurrences. Risk Rating Matrix In the above mentioned Risk Ranking Matrix, for the risk with the Severe and Major Consequences, such as Electric Hazards and Dangerous Chemicals , immediate action need to be taken for removal, prevention or transferring the risk. The risk with the Moderate Consequences, like Infection, Contamination, plans need to be formulated for their risk removal, transfer or prevention. For the insignificant and minor risks such as Slips, trips and falls, the managerial personnel need to be informed regarding the training of the kitchen staff to deal with it (Reuvid, 2012). Venue Risk Analysis Form The Venue Risk Analysis form is designed to contemplate the predicted hazards and controls implemented to reduce or remove the risks. It also considers the precautions involved in handling the emergency risks. It should be approved by the top management and should be implemented at the earliest to prevent the possible risks. Training should be given to the staff in order to prevent the risks and its consequences. In the Venue analysis form, a ranking list is formulated and the probability of the risk is assigned accordingly. The likelihood and the probability of the risk is numbered accordingly. There are various factors which are considered in the venue risk analysis such as the workforce involved, frequency of harm caused and its occurrence (Verbano Venturini,2013). Risk Risk consequence and people affected Risk likelihood Impact and Consequences Control measurements recommendations Risk Rank Responsible person 1. Slips, trips and falls Injuries due to sudden fall in the kitchen causing insignificant injuries to the workers. Very Likely It can cause injuries to the kitchen staff resulting in the medical expenditure of Caf on their treatment. Consequence would be increase in the rate of absenteeism of the employees. Anti-slip mechanisms as needed; appropriate lighting. Training of the employees is needed. A General Administrator of the Caf. 2. Injuries Cuts due to mishandling of objects in the kitchen causing minor hurt to the workers. Likely The employees would not be able to work properly and the rate of absenteeism would increase. Proper handling and wearing of gloves for protection against sharp objects. B General Administrator of the Caf. 3. Food Contamination Food poisoning causing death or sever illness to the customers. Possible Loss of goodwill of the caf in the market thereby decreases in its revenue. Work permit from health inspectorate and regular checking of food items by the internal administration. C Head Chef of the Caf. 4.Heat or cold Hot water burn while working in the kitchen causing major injuries. Possible Inconvenience to the workers while working in the kitchen. It may cause serious accidents. Pipes; mixer taps conform to building regulations and regular checking by the internal administration. C General Administrator of the Caf 5.Infection Faulty pipes contaminate water causing moderate infections (Government of Western Australia: Department of Health , no date). Unlikely The customers can suffer from food poisoning thereby causing loss of revenue to the caf. Pipes conform to building regulations D General Administrator of the Caf 6.Fire Fire breakout in the Kitchen causing death of the workers. Very Unlikely It can cause loss of life and property to the caf, thereby decreasing its revenue. Emergency exit plan in place. Fire defense conform to building regulations. Training of the workers should be conducted on regular basis. E General Administrator and Technical Head of the Caf 7. Natural Calamity Loose objects fall on the staff due to earthquake causing severe injuries. Very Unlikely It may cause death or severe accidental injuries to the customers as well as staff. No loose objects are kept outside the cupboards. Implementation of the emergency exit plan and training of the workers in this regard. E General Administrator and Technical Head of the Caf 8. Dangerous Chemicals Leakage of the CO2 Gas causing death of the workers. Very Unlikely Due to leakage, the death or severe injuries of the staff and customers is possible. Appropriate system to safeguard the staff from leakage of dangerous gases should be established in place. Gloves and masks while handling them should be worn by the workers. E Technical Head of the Caf 9.Electric Hazards Falling over cables or loose wires and risk of short circuit causing severe injuries. Unlikely Loss of life and property is possible. Proper maintenance of the wires and their regular inspection. D Technical Head of the Caf With reference to the given Venue Risk Analysis Form, the risks such as Slips, trips, falls and injuries have the probability of occurrence as most likely and their impact would be injuries to the staff and cash outflow due to the medical expenses of the employees. The possible measures could be adequate lighting and proper training to the employees. According to Bedasa et al.(2018) while the risk such as Food Contamination and Burns due to hot water have the probability of occurrence as possible resulting in severe illness to staff and customers thereby causing loss of revenue and goodwill to the caf. The other risk such as Fire ,Natural Calamity, Electric Hazards have the possibility of occurrence as Unlikely or Very Unlikely with the direct impact on the staff and customers .It can cause loss of life and property .The suggestive measure is safeguarding the system and proper training to the employees (Vasvri,2015). Conclusion Thus, to conclude, the risk management of the kitchen operations of Cafe 63, Racecourse Road, Brisbane is essential for its long term survival in the industry. The risk assessment of the organization not only helps the management in safeguarding it from hazards but also assists in formulating long term policies regarding for its successful survival in the long run. It also helps in enhancing goodwill of the organization which can help it in attracting more customers and investors. Furthermore, the risk assessment analysis helps the organization in identifying, analyzing, evaluating, regulating , monitoring and communication the risk and planning certain strategies to mitigate them (Severian,2014). The kitchen operations of Cafe 63, Racecourse Road, Brisbane are posed to certain threats such as fire, natural calamity, electric hazards, slips and falls, injuries due to contaminated water or hot and cold water .These can be reduced through planning proper systems in the caf and proper training of the employees to handle the hazardous and emergency situations. The senior management should monitor and supervise the proper implementation of the policies and strategies regarding the risk management on continuous basis. Also, if any of the personnel is aware of the probable hazards occurring in the organization, they should immediately report to the senior management, so that the risk management measures can be implemented well in advance to avoid the risk (Cagliano, Grimaldi Rafele ,2015). References Bedasa, S., Shiferaw, D., Abraha, A. Moges, T.(2018) Occurrence and antimicrobial susceptibility profile of Escherichia coli O157:H7 from food of animal origin in Bishoftu town, Central Ethiopia. International Journal of Food Contamination. 5(2). Caf 63(2017) Our Story [online]. Available from: https://cafe63.com.au/the-cafe63-story/ [Accessed 23rdJanuary, 2018]. Cagliano, A.C., Grimaldi, S. Rafele ,C. (2015) Choosing project risk management techniques. A theoretical framework. Journal of Risk Research. 18(2). Deloitte(2013) Risk reduction in retail and restaurant quality assurance practices [online]. Available from: https://deloitte.wsj.com/riskandcompliance/files/2014/04/us_insight_risk-reduction_food-value-chain_pov_052813.pdf [Accessed 26thJanuary, 2018]. Derbyshire County Council (2017) Food Allergen Risk Assessment for Caterers [online]. Available from: https://www.derbyshire.gov.uk/images/Allergen%20Risk%20Assesement%20Version%20FINAL_tcm44-159357.pdf [Accessed 26thJanuary, 2018]. Food standards Agency (no date) Safety First [online]. Available from: https://www.food.gov.uk/sites/default/files/multimedia/pdfs/publication/safetyfirst.pdf [Accessed 26thJanuary, 2018]. Government of Western Australia: Department of Health (no date) Health Risk Assessment in Western Australia [online]. Available from: https://ww2.health.wa.gov.au/~/media/Files/Corporate/general%20documents/Environmental%20health/Health%20risk%20assesment/Health-Risk-Assessment.pdf [Accessed 26thJanuary, 2018]. Government of Western Australia: Department of Mines, Industry Regulations and Safety (no date) How is risk managed? [online]. Available from: https://www.dmp.wa.gov.au/Safety/Why-is-risk-management-important-4715.aspx [Accessed 23rdJanuary, 2018]. Institute of Risk Management (2018) About Risk Management [online]. Available from: https://www.theirm.org/the-risk-profession/risk-management.aspx [Accessed 22ndJanuary, 2018]. InterContinental Hotels Group (2013) Risk management [online]. Available from: https://www.ihgplc.com/files/reports/ar2013/files/pdf/IHG-AR2013-Risk-management.pdf [Accessed 23rdJanuary, 2018]. Kristina,S. Wijaya , B.M. (2017) Risk management for food and beverage industry using Australia/New Zealand 4360 Standard. IOP Conference Series: Materials Science and Engineering. 277. Kwon, J., Roberts, K. R., Sauer, K., Cole ,K.B. Shanklin, C. W. (2014) Food Safety Risks in Restaurants and School Foodservice Establishments: Health Inspection Reports[online]. Available from: https://www.foodprotection.org/files/food-protection-trends/Jan-Feb-14-kwon.pdf [Accessed 26thJanuary, 2018]. OECD (2014) Corporate Governance: Risk Management and Corporate Governance. Paris: OECD Publishing. Reuvid, J. (2012) Managing Business Risk: A Practical Guide to Protecting Your Business. Kogan Page Publishers. Severian,V. (2014) Risk Management and Evaluation and Qualitative Method Within the Projects. Ecoforum. 3(1). Tourism Australia (2015) Risk Management Policy and Procedure [online]. Available from: https://www.tourism.australia.com/content/dam/assets/document/1/6/x/6/p/2002561.pdf [Accessed 23rdJanuary, 2018]. Travelers (2013) Hotel Risk Management Guide [online]. Available from: https://www.travelers.ie/ [Accessed 22ndJanuary, 2018]. Vasvri, T. (2015) Risk, Risk Perception, Risk Management a Review of the Literature[online]. Available from: https://www.asz.hu/storage/files/files/public-finance-quarterly-articles/2015/a_vasvarir_2015_1.pdf [Accessed 26thJanuary, 2018]. Verbano,C. Venturini,K. (2013)Managing Risks in SMEs: A Literature Review and Research Agenda. Journal of Technology, Management Innovation. 8(3). Workplace Health and Safety Queensland (2014) Cafe and restaurant industry: Hazard identification checklist [online]. Available from: https://www.worksafe.qld.gov.au/__data/assets/pdf_file/0007/82816/hazard-identification-checklist-cafe.pdf [Accessed 26thJanuary, 2018].
Friday, November 29, 2019
The Advantages and Disadvantages of Fiber Optic Cable vs. Coaxial Cable
Introduction Wires play an important role in transmitting electrical energy and signals between different locations. There are different types of wires that vary from one another depending on their characteristics and other physical aspects. This paper seeks to discuss the differences between fibre optic cables and coaxial cables, elaborating on the advantages and disadvantages of each type.Advertising We will write a custom essay sample on The Advantages and Disadvantages of Fiber Optic Cable vs. Coaxial Cable specifically for you for only $16.05 $11/page Learn More Fiber Optic Cable A fiber optic cable consists of either a plastic or a glass core, which conveys light enclosed within a glass cladding. Light is guided through the fibre owing to the lower refractive index of the material as it also reflects the escaping light to the core (Higuera, 1998). Advantages of fiber optic cables Fibre optic cables have limited signal loss for every unit distance c overed. In this regard, this type of cables can cover long distances and have limited effect on the quality of transmission. With high internet speeds being a factor for consideration in the contemporary world, fiber optic cable is more reliable because of its maintenance of the signal. Fibre optic cables have very high capacity, which means they can convey high data rates at any given time. Because of the cableââ¬â¢s technology that uses light, the cable is also able to transmit at high speeds. This makes it more reliable and efficient over other cable types. Fiber optic cables are also immune to external interference, which improves further on their reliability. Vibrations and other noises have little effect on the performance of the cable (Higuera, 1998). Disadvantages These cables are expensive compared to other types of cables. The materials used in the manufacture of fibre optic cables are costly and only made-to-measure. This is particularly typical of any new technologies (Higuera, 1998). The general vulnerability of fibre optic cables to strain and temperatures affects the performance quality of this type of cables. This affects the output signals because of the inherent errors (Higuera, 1998).Advertising Looking for essay on other technology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Coaxial Cable Coaxial cables comprise of a core wire, as well as an interwoven foil material that covers the inner wire (Reynders, Mackay Wright, 2005). An insulating material that covers the central lying wire separates these conducting materials. Another insulator covers the outer foil. Advantages of coaxial cables This cable is cheaper than the fibre optic cable and, thus, it is highly affordable. Most mid-size offices and residential areas are able to acquire this cable for their internet needs. Coaxial cables can be used for different purposes. This increases their overall usefulness. Among the numerous uses of this type of cable include transmitting voice, data, as well as video signals. The cables are also easy to install around buildings (Reynders, Mackay Wright, 2005). Disadvantages of Coaxial Cables Coaxial cables are damaged easily. This affects the convenience aspect, while also adding costs in terms of repairs and new acquisitions. Installing thick coaxial cable is an expensive exercise, particularly where it is required to be pulled in between existing cable conduits. Coaxial cables work with connectors, which can be costly to acquire (Reynders, Mackay Wright, 2005). Conclusion Fibre optic and coaxial cables are used in performing the same roles, especially in transmitting data and signals. Their use has mainly increased with the advent of the internet. Fiber optic cables can carry large capacity of data at very high rates. They are also least affected by external interferences, such as noise or vibration. Coaxial cables, on the other hand, are less expensive and can easily be worke d with during installation. However, fiber optic cables are expensive to acquire and vulnerable to stress interference. Coaxial cables on their part are susceptible to damages and their thicker versions are difficult to install. References Higuera, J. M. L. (1998). Optical sensors. Cantabria: Ed. Universidad de Cantabria.Advertising We will write a custom essay sample on The Advantages and Disadvantages of Fiber Optic Cable vs. Coaxial Cable specifically for you for only $16.05 $11/page Learn More Reynders, D, Mackay, S. Wright, E. (2005). Practical industrial data communications: Best practice techniques. Burlington, MA: IDC Technologies. This essay on The Advantages and Disadvantages of Fiber Optic Cable vs. Coaxial Cable was written and submitted by user Ethan M. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Monday, November 25, 2019
Print-On-Demand vs Offset Printing Which Is Better (with Examples)
Prints) Print-On-Demand vs Offset Printing: Which Wins? This is a guest post by Jessica Ruscello, a copywriter at Blurb, Inc. Jessica is also a writer, teacher, and photographer who makes her mark with empty coffee cups, ink spills, and red lipstick.The last ten years- even the last five- have seen game-changing developments in printing technology. Even if print-on-demand has been around longer than that, weââ¬â¢re now seeing these digital machines produce exquisite quality (depending on which service you use). Advanced inkjet technology now creates pages and covers that are nearly identical to those created with traditional offset printing, offering incredible advantages to self-publishers.How can you make sure you're getting the most return out of it? Let's find out.How print-on-demand works (in 6 steps)Choose your format. From coffee-table books to magazines to trade paperbacks, print-on-demand is compatible with any format youââ¬â¢d find in a bookstore. The more copies you order, the more cost-effective customization becomes (hi gher volume order makes it possible to try different endsheets, ribbon markers, or cover styles). That said, standard commercial sizes and papers are readily available across printers.Create a properly formatted book file. Your PDF (or another print-ready file) will stay with the printer and can be called up any time an order is placed for your book.List your book on major bookselling sites. You can do this using a ââ¬Å"print-on-demand distributorâ⬠like KDP Print (for Amazon), IngramSpark, or Blurb.Every time someone orders your book, the order is sent to the printer. Digital printers print and assemble your book all in one place.The book is shipped to the retailer, who forwards it to your reader. In some cases, the customer will be able to get the print book in under one hour!Your reader pays the retailer. Your retailer will then send the net revenue to you (after deducting printing costs and retailer discounts- read more about these below). 100+ Client Services Pricing - $16.00/copy (Not including taxes or shipping) 1000 Copies Offset Printing - $7.50 /copy (Includes approximate shipping to US)Donââ¬â¢t overlook offset printing because of the large upfront costs, and donââ¬â¢t overlook print-on-demand, which offers greater speed, quality, and innovation than what has been available at any other time in print history. Whichever one's better for your project, there's no doubt that print-on-demand has done so many exciting things for book-makers, creating more options for beautiful end products.Have you tried offset printing on one of your books? What has been your experience with print-on-demand so far? Leave your thoughts (as well as any questions for Jessica) in the comments below.
Thursday, November 21, 2019
Based on your reading of The Death of Woman Wang,describle and analyze Essay
Based on your reading of The Death of Woman Wang,describle and analyze how Confucian ideals are ever present to all levels of Ch - Essay Example According to Confucius, society could become stable only when the five basic relationships are being fulfilled which are, the relation of Love (among father and son), relationship of righteousness (among emperor and minister), relationship of virtuous demeanor (among husband and wife), relationship of order (among elder and younger) and relationship of faithfulness (among friends).If we closely administer these virtues, we see that out of the five, three occur in the family system. He was the great devotee of the family system and it is also the basis of todayââ¬â¢s family system in China (Spence pp134-139). The family system has an extended impact on the whole town, city and society of China. The order is strictly followed as, for instance, younger has to obey the elder whether the elder is from his family or from outside the family. Even today, Chinese people pay special respect to their elders (Spence pp 74-96). The death of woman Wang is a piece of literature that provides a h igh exposure to Chinese norms, society and cultural values back in the seventeenth century. According to Spence, the obligation of the people to the government is very high. To support the government, they have to pay taxes. Even when there were natural calamities, the people of the village had to pay taxes. The rule of the emperor is to be judged by the virtue and it is not hereditary. According to Confucius, the ruler must rule wisely and with moral attitudes. The ruler should be just in his working and virtue must be his core conduct. If the society is being ruled by a wise and just leader and ruler, the society is harmonized, stable and flourishing and it cultivates moral and ethical values. When the government understood the condition of the village, firstly they divided the tax in installments and later on forgave the taxes to be paid. But it was too late (Spence pp 33-58). The modern Chinese society is prospering mainly due to the autonomy that their political system provides . Chinese production market, for instance, is growing at a remarkable pace. The government provides the basic necessities to their citizens at low costs. The rulers, hence, are following the principles of Confucius wisely and with high moral attitude. Conscious considered woman as morally and intellectually defective. He was the strong opponent of women subordination. Regardless of this fact, the principles he provided were significantly influential in maintaining harmony, peace and stability in an economy. In ââ¬Ëthe story of woman Wangââ¬â¢ women are portrayed as liable to perform household chores. As a widow, they are given high value and respect if they remain loyal to their husbands even after he passes away. Women are severely punished, in Spenceââ¬â¢s accounts, if they use their right to freely move around, choose their partners or try to change their lives. They are punished and eventually killed by one or the other men in Chinese society of 17th century. However, t he modern Chinese society regards female counterparts as respectful, loveable and respectful yet free to make choices. The Chinese society and the business market is an open case of female participation except households. The households and other family related issues, however, still work under women supervision and women are still held responsible for household works. Filial Piety is yet another value of Confucius. Confucius is also heard of saying ââ¬Å"
Wednesday, November 20, 2019
Strategic Management (M&S strategic analysis) Essay
Strategic Management (M&S strategic analysis) - Essay Example To maintain this, the company needs to develop a strategy that will take into consideration all the factors that might affect the sales of the company (Prince, M. 2012, 23). The aim of this essay is to determine all the factors that might affect the sales of each of the products of Marks and Spencer and come up with the most relevant strategy to help the company reach its goal. In an institution that relies on the will of a customer in a big part like Marks and Spencer, it would be prudent to have a plan that takes into consideration most of the needs of the customer (Worth, R. 2007, 62). This is just one of the needs that the company should take into consideration. For maximum productivity, the company must evaluate each of the PESTEL factors. This is to avoid being in trouble with the administration and other bodies. The company should make sure that its waste is not harmful to the environment. A big company like Marks and Spencer could easily bring catastrophic damages to the environment. The fact that it is widely over Europe, which makes it very visible, and the public is very conscious of what they do. If the company started destroying the environment, it would be seen by everyone, and this would lead to them loosing the trust and love of the customer (Marketing Society. 2009, 15). The company should also take into consideration the international tie s between the various countries that they operate in. It should follow the rules of the country to the latter. The other issue that the company should consider is how they treat their staff. A general well treatment of the members of a certain company brings a general improvement of output among the workers. This, in return, is beneficial to the company since they get products of better quality. The company should also take into huge consideration their competitors and the range of services that they offer.
Monday, November 18, 2019
Sunset Boulevard as a Genre Film Essay Example | Topics and Well Written Essays - 2000 words
Sunset Boulevard as a Genre Film - Essay Example Many critics argue as to whether noir is a genre or a sub-genre. As Martin Scorcese says in one his documentaries, noir is a sub-genre of drama and doesnââ¬â¢t have any unique definition. Filmmakers like him say that term noir is just a term that is used to indicate certain stylistic elements which are common in the movies of 1940s and 1950s. In the wake of this dilemma among the critics, this essay puts forward a hypothesis that identifies itself with the claim of many film critics that it a noir movie. In this essay, the movie shall be tested against the framework of conventional noir movie making and an analysis shall be made about the genre of the movie. The analysis shall be comprehensive and include detailed examples from the movie and also various secondary sources of information. Sunset Boulevard is widely regarded as a cult movie and one of the epic movies belonging to the noir genre. First of all, it is important to establish what is a noir genre and how did it develop in Hollywood. During the 1930s many artists, directors, and composers were ousted from Germany by Hitler. These people came to Hollywood and started to work there. The political and social situation of Germany instilled in them a sense of cynicism. It is a known fact that the German government at that time was involved in the systematic killing of millions of people. This cynicism and pessimism was carried forward and brought to Hollywood. The German Expressionist cinema, when combined with the Hollywoodââ¬â¢s fascination with crime, created a genre called noir. This term was not used at that time but was later coined by critics in the 1970s to describe a kind of films that were made in the 1940s and 1950s.
Saturday, November 16, 2019
SHCBK Protocol for Securing Ad Hoc Networks
SHCBK Protocol for Securing Ad Hoc Networks Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. Technology under development for wireless ad hoc networks has quickly become a crucial part of our life since it provides ââ¬Å"anytime, anywhereâ⬠networking services for mobile users. Wireless ad hoc networks can be dynamically set up without relying on any pre-existing infrastructure, such as Public Key Infrastructure, and central management for communications. However, such infrastructure-less characteristic of the networks also makes them vulnerable to security attacks. Numerous protocols have been planned in order to attain a high degree of safety based on a mixture of human-mediated communication and an normal Dolev-Yao c ommunication medium. One of which is the Symmetrised Hash Commitment Before Knowledge protocol or the SHCBK protocol ( A. W. Roscoe and Long Nguyen, 2006). The protocol design seeks to optimise the amount of security that the humans can attain for a known quantity of work. This dissertation presents an implementation of the SHCBK protocol for securing ad hoc networks over Wi-Fi. Chapter 1 Introduction A wireless ad hoc network is a de-centralized wireless network. The network is called ad hoc for the reason that each hop is ready to send onward data for other hop, and so the resolving that which of hops will send the data to the forward hops is dynamically established on the network connectivity. This is in dissimilarity to wired networks in which routers execute the duty of routing. It is also in difference to organize the wireless networks. In which a particular node recognized as an admission point manages communication among other nodes. All taking part parties in an ad hoc network have the same opinion to recognize and send onward messages, to and from each other. With this type of elasticity, wireless networks have the capability to form anyplace, at any occasion, as long as two or more wireless users are enthusiastic to have the communicate between them. Mobile nodes inside an ad-hoc network move from one location to another. However, finding ways to model these movements i s not obvious. In order to evaluate an ad hoc network performance it is necessary to develop and use mobility models that accurately represent movements of the mobile nodes. In this paper we present performance evaluation of various entity mobility models in terms of the traveling patterns of mobile node. MANET is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes forward packets for each other, allowing communication among nodes outside wireless transmission range hop by hop. Due to dynamic infrastructure-less nature and be deficient in the centralized monitoring points, the ad hoc networks are susceptible to attacks. The Attacks on the ad- hoc network routing protocols can disturb the network performance and dependability. Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communica tions and ad-hoc. In communications mode all traffic is transmitted among The HOPs via an admission point which controls the network and gives it with the safety system. The most usually used normal for wireless networks is the 802.11 principles or Wi-Fi which in fact is not a standard but a entire relatives of principles using the same protocol. The safety in wireless networks by Wi-Fi consists of WEP, WPA and now lately WPA2 which is essentially a ended version of WPA. WPA was shaped as an middle safety system while WPA2 was finalized and experienced since the preceding system contained several serious weaknesses. Benefits and applications of ad-hoc Networks Ad-hoc networking need not want any admission points as contrasting to wireless networks in Communications mode. This makes them functional in a set of diverse applications. It is mainly used in Military applications and in save operations where the accessible communication communications Has been damaged or is unavailable, for example later than earthquakes and other disasters. But ad-hoc is these days also being used in a lot of commercial applications. Like we see that mobile phones and PDAs using the Bluetooth protocol system, seeing as it is quick and fairly simple to setup and doesnt need any additional tools. Characteristics and standards of ad-hoc As the wireless standard 802.11 does hold up ad-hoc networks, it is extremely limited since it doesnt offer routing among the nodes, so a hop can only arrive at the straight noticeable nodes in its place protocols similar to the Ad-hoc, On-demand Distance Vector protocol or Dynamic Source Routing protocol can not be used. These routing protocols are so called immediate routing protocols, sense that it gives a route to a target only when wanted. In difference the other usually used routing protocols on the Internet are practical sense that they will set up routes separately of the traffic in the network. This implies that the reactive network is quiet pending a connection that is wanted and thus lessens the overcrowding in the network. DSR is an even additional optimized protocol which doesnt need for the sending forwarding computers to have current routing tables but have a list of network addresses in the form of the packet. The protocol because of eavesdrops the limited network traffic and listens for this routing data and information included in the packets and adds it to its personal routing table. One of the major goals when scheming mobile ad-hoc networks where the nodes go about and the topology rapidly alters is to defend the network connectivity among the hops over potentially multi hop channels. To obtain multi hop connection you must offer one-hop connectivity throughout the link-layer and expand that to multi- hop connectivity throughout routing and data that is forwarding protocols in the network-layer. Many corporations make substantial investments in their wire- less infrastructure. For example, Microsofts IEEE 802.11 based Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy or else, to republish, to position on servers or to redistribute to lists, requires prior specific permission and/or a fee. Wireless (Wi-Fi) network consists of approximately 5,000 access points (APs) supporting 25,000 users each day in 277 buildings, covering more than 17 million square feet [10]. In addition to the equipment costs, the costs of planning, deploying, and maintaining such networks is substantial. Thus, it is important to develop infrastructure that improves the ability of Information Technology (IT) departments to manage and secure their wireless networks. In recent years, researchers have uncovered security vulnerability- ties in Wi-Fi networks [20]. They showed that the Wired Equiv- agency Protocol (WEP), the popular 802.11 security mechanism that most corporations were using at the time, was fundamentally flawed. In a series of highly publicized papers, they showed that 802.11 networks could be compromised easily. The community reacted quickly by developing and deploying alternate security so- lotions including VPNs, IEEE 802.1x [30], several variations of EAP [14], Smart cards, and more recently WPA [29]. Yet, the wire- less LAN (WLAN) security problem was not completely resolved. Last year, Microsoft conducted a series of interviews with WLAN administrators of several large and small organizations [10]. The goal of these interviews was to understand the difficulties involved in deploying and managing corporate WLANs. The issue of WLAN security came up repeatedly during these interviews. All administrators felt that WLAN security was a problem. They were unhappy with the quality of the tools they had at their disposal. Many of them would periodically walk around their buildings using WLAN scanning software looking for security vulnerabilities. Some hired expensive outside consultants to conduct security vulnerability analyses of their WLAN deployme nt, only to conclude that what they really needed was an on-going monitoring and alerting system. Most administrators believed that better systems to manage WLAN security are needed. Even after protocols such as IEEE 802.1x and WPA are deployed, corporate networks can be compromised by off-the-shelf 802.11 hardware and software. For example, an unauthorized AP can be connected to the corporate Ethernet, allowing unauthorized clients to connect to the corporate network. The rogue AP may be con- nected by a malicious person or, as is more often the case, by an employee who innocently connects an AP in his office without realizing that he is compromising the corporate network. A rogue AP can circumvent the elaborate security measures that the IT department may have put in place to protect the companys intellectual property. To test our assertion that people inadvertently compromise the security of their networks, we conducted an experiment in two large organizations that had secured their WLANs using one of the methods mentioned previously. We walked around with a WLAN- enabled laptop in a small section of the two campuses looking for APs to which we could connect. Chapter 2 SECURITY ATTACKS Here I attempts to provide a comprehensive overview of attacks and secure routing. It first analyzes the reason that ad hoc network is vulnerable to attacks. Then it presents the well known attacks and the popular secure protocols. Is out of its radio range, the cooperation of other nodes in the Network is needed. This is known as multi-hop communication. Therefore, each node must do something as both a host and a router at the same time. In most wireless networking environments in productive use today the users devices communicate either via some networking infrastructure in the form of base stations and a backbonenetwork,ordirectlywiththeirintended communication partner, e.g. by means of 802.11 in ad hoc networks In distinction a mobile ad-hoc network is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Every hop in the mobile ad-hoc networks is ready with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication area. Hops are more often share the same physical media. They broadcast and obtain signals at the same frequency band, and chase the same hopping series or spreading code. If the purpose node is not inside the broadcasting range of the sending node, then the sending node takes help of the intermediate hops to communicate with the purpose node by relaying the messages hop by hop. Fig.2 describes the Mobile ad-hoc network. In order for a node to forward a packet to a node that TYPES OF THE SECURITY ATTACKS Securing wireless ad hoc networks is a highly demanding issue. Due to dynamic scattered infrastructure-less nature and be deficient in of centralized monitoring points, the ad hoc networks are susceptible to a variety of attacks. Ad hoc networks have to manage with the same kinds of vulnerabilities as their wired counterparts. As well as with new vulnerabilities specific to the ad hoc context. In addition, conventional vulnerabilities are also accentuated by the ad hoc paradigm. Initially, the wireless channel is available for the both genuine network users and cruel attackers. The ad hoc networks are vulnerable to attacks ranging from static eavesdropping to active prying. Secondly, the be short of an online CA or Trusted Third Party adds the complexity to organize security mechanisms. Thirdly, mobile devices be inclined to have limited power consumption and calculation capabilities which make it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms Fourthly, in MANETs, therearemore probabilities for trusted node being compromised and then life form used by adversary to launch attacks on networks. Lastly, node mobility and recurrent topology changes enforce frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to discriminate between stale routing information and faked routing information. Ad -hoc networks attacks can be differentiated as passive and active. Passive attack signifies that the assailant does not send any message, but just listens to the channel. Passive attacks do not disturb the process of a protocol, but only makes the attempts to find out valuable information. Active attacks may either being directed to disturb the normal operation of a exact node or target the performance of the ad hoc network as a whole. For passive attacks, the attacker listens to the channel and packets that are containing clandestine information might be eavesdropped, which violates privacy. In a wireless environment it is usually not possible to notice this attack, as it does not create any new traffic in the network. Active attacks, counting injecting packets to unacceptable destinations into the network, deleting packets, changing the contents of packets, and impersonating other hops infringe ease of use, veracity, verification, and non-repudiation. Different from the passive attacks, active attacks can be detected and ultimately avoided by the legal nodes that contribute in an ad hoc network . We broadly classify these attacks as passive and active. The classification is important for understanding the strengths and limitations of the DAIR security management system. Eavesdropping Eavesdropping is a passive attack. The attacker passively listens to the traffic on the wireless network and gleans useful information. The listener may use sophisticated code breaking techniques. Countermeasures include use of better encryption techniques as well as physical security measures such as use of radio-opaque wallpaper. Passive attacks are difficult, if not impossible, to detect and we do not address them in this paper. Intrusion Any attack that allows a user to gain unauthorized access to the network is called an Intrusion attack. Intrusion attacks are active attacks and several such attacks are possible. An attacker can compromise the corporate network by gaining physical access to its wired network and connecting a wireless AP to it. The AP creates a ââ¬Å"holeâ⬠through which unauthorized clients can connect, bypassing the elaborate security measures that the IT department may have put in place. A similar attack can be carried out by using ad-hoc wireless networks instead of APs. A corporate network may also be compromised when an attacker finds and uses an unsecured AP connected to the network by an unsuspecting employee. The widespread availability of inexpensive, easy-to- deploy APs and wireless routers has exacerbated this problem. As mentioned earlier, we found several unsecured APs in large organizations. The DAIR security management system can detect both rogue APs and rogue ad-hoc networks. Another way a corporate network can be compromised is when an attacker obtains the credentials (e.g., WEP passwords, IEEE 802.1x certificates) needed to connect to the corporate ne twork. The DAIR security management system can not currently detect such attacks. Denial of Service (DoS) Denial of Service attacks are active attacks. A diversity of DoS attacks are possible. Some DoS attacks exploit flaws in the IEEE 802.11 protocol. For example, a disassociation attack is where the attacker sends a series of fake disassociation or deauthentication messages, causing legitimate clients to disconnect from the AP. In a NAV attack, the attacker generates packets with large duration values in the frame header, thereby forcing legiti- mate clients to wait for long periods of time before accessing the network . In a DIFS attack, the attacker exploits certain timing- related features in the IEEE 802.11 protocol to aggressively steal bandwidth from legitimate users. In all three cases, the attacker transmits packets in an abnormal way, either by generating non-compliant packets, or by transmitting compliant packets at an abnormally high rate. The DAIR security management system can detect such attacks. DoS attacks are also possible by creating large amount of RF noise in the ne ighborhood of the network. The DAIR security management system can detect such attacks by comparing current observations with historical data observed from multiple vantage points. DoS attacks can also be mounted by gaining access to the corporate wired network and attacking the APs from the wired side. The DAIR system does not handle DoS attacks on the wired network. Phishing Phishing is an active attack. An attacker sets up a wireless AP that masquerades as a legitimate corporate AP (same SSID, per- haps even same BSSIDs). If the client does not use mutual authentication, it is possible for the attacker to lure unsuspecting legiti- mate users to connect to its AP. The attacker can then use a variety of techniques to extract private information (for example, sniff for passwords). The DAIR system can detect phishing attacks. How- ever, we do not describe solutions to phishing attacks in this paper. ACTIVE ATTACKS SECURITY ATTACKS Certain active attacks can be easily performed alongside an ad -hoc network. Understanding possible shape of attacks is for all time the first step towards increasing good safety solutions. Based on this danger analysis and the recognized capabilities of the potential attackers, several well recognized attacks that can target the operation of a routing protocol in an ad hoc network are discussed. Impersonation. In this kind of attack, nodes may be clever to join the network untraceable or can able to send the false routing data/information, camouflaged as some other trusted node. Wormhole. The wormhole attack involves the collaboration stuck between two attackers. One attacker gets the routing traffic at one point of the network and changes their path to another point in the network that shares a confidential communication link between the attackers, then selectively injects tunnel traffic back into the network. The two colluding assailant can potentially deform the topology and set up routes under the control over the wormhole link. Rushing attacks: The ROUTE REQUESTs for this Discovery sanded forwarded by the attacker can be the 1st to approach each neighbor of the target, then any way exposed by this Route Discovery will comprise a hop through the attacker. That is, when a neighbor of the target gets the hurried REQUEST from the attacker, and it forwards that REQUEST, and will not send onward any further REQUESTs from this Route Discovery. When non-attacking REQUESTs arrive later at these nodes, they will discard those legitimate REQUESTs. Blackmail: The attack incurs outstanding to be short of of genuineness and it grants stipulation for any node to corrupt other nodes legal information. Hops more often keep the data/ information of apparent malevolent nodes in a blacklist. This attack is pertinent alongside routing protocols that use mechanisms for the recognition of malicious nodes and spread messages that try to blacklist the criminal. An attacker may make such coverage messages and tell other nodes in the network to put in that hop to their blacklists and cut off legitimate nodes from the network. Chapter 3 Secure Routing The previously presented ad hoc routing protocols with no security contemplation assume that all participating nodes do not maliciously troublemaking the operation of the protocol. However, the continuation of malicious entities cannot be unnoticed in any system, particularly in open ones like ad hoc networks. Safe routing protocols manage with malicious nodes that can disturb the right performance of a routing protocol by changing routing information. By fabricating the wrong routing data or information and by impersonating other nodes. These safe routing protocols for ad hoc networks are either totally new stand-alone protocols, or in some cases incorporations of security mechanisms into obtainable protocols. Generally the obtainable safe routing protocols that have been future can be generally secret into two types, those that use hash chains, and those that in order to function require predefined trust relations. This method, jointly nodes can efficiently validate the legitimate traffic and distinguish the unauthenticated packets from outsider attackers. ROUTING PROTOCOL FOR AD-HOC NETWORK SECURITY SEAD: Safe Efficient Ad hoc Distance-vector routing protocol. A safe ad hoc network routing protocol that is established on the design of the Destination Sequenced Distance Vector routing protocol. To hold up employ of SEAD with hops of partial CPU processing abilities, and to guard against modification of the source address for a routing update and attacks in which an rejection of service attacks makes attempts to reason other nodes to use surplus network bandwidth or processing time of the network, efficient one way hash Chains but not cryptographic operations are used in the verification of the series number and the metric field of a routing table update message. When a node in SEAD sends a routing update, the node includes one hash value from the hash chain with each entry in that update. The nodes sets the purpose address in that entry to that target nodes address, the metric and series number to the values for that target in its routing table, and the hash value to the hash of the hash value conventional in the routing update entry from which it learned that route to that destination. When a node receives a routing inform, for each entry in that update, the node checks the verification on that entry, by the target address, sequence number, and metric in the conventional entry, together with the newest prior genuine hash value established by this node from that destinations hash chain. The hash value of each entry is hashed the right number of times and it is compared to the before authenticated v alue. Depending on this contrast the routing update is either established as authenticated, or discarded. Ariadne; Ariadne is a safe on-demand ad hoc routing protocol based on DSR that restricts attackers or the mutual hops from tampering with uncompromised routes containing of uncompromised hops, and also stops a lot of types of DOS attacks. In addition, Ariadne uses only extremely well-organized symmetric cryptographic primitives. To induce the objective of the authority of each field in a ROUTE REQUEST, the originator simply includes in the REQUEST a MAC computed with key over exclusive data. The object can with no trouble corroborate the authenticity and newness of the ROUTE REQUEST using the shared key. One-way hash functions are use to confirm that no hop was absent which is called per hop hashing. Three alternative methods to attain hop list verification. The TESLA protocol, digital signatures, and typical MACs. When Ariadne Route detection is used with TESLA, every node authenticates the original data in the REQUEST. The objective buffers and does not fire the REPLY awaiting midd le nodes can discharge the matching TESLA keys. Ariadne Route Discovery using MAC is the majority well-organized way of the three option verification mechanisms, but it asks couple wise communal keys among all nodes. The MAC list in the ROUTE REQUEST is computed by a key common among the object and the present node. The MACs are verified at the target and are not returned in the ROUTE REPLY. If Ariadne way detection is used with digital signatures, the MAC list in the ROUTE REQUEST becomes a signature list. SRP: The safe Routing Protocol consists of quite a lot of safety extensions that can be practical to existing ad hoc routing protocols as long as end-to-end verification. The one and only requirement of the future scheme is the sustained existence of a security association between the node initiating the query and the sought destination. The safety association is used to found a common secret between the two nodes, and the non mutable types of the exchanged routing messages are confined by this shared secret. The method is robust in the occurrence of a number of non-colluding nodes, and provides Routing Table Overflow: In a routing table spread out attack the malevolent node floods the network with bogus route formation packets to non existing nodes to overpower the routing protocol implementations in order to devour the resources of the participating nodes and interrupt the establishment of legal routes. The goal is to create enough routes to prevent new routes from being created or to engulf the protocol execution. Proactive routing protocols are more vulnerable to this attack, since they attempt to produce and preserve routes to all possible destinations. A spiteful node to apply this attack can simply send unnecessary route advertisements to the network. To apply this harasses in order to target a reactive protocol like AODV is to some extent more involved since two nodes are obligatory. The first node should make a genuine request for a route and the malicious node should reply with a forged address. Sleep Depravation: The sleep scarcity afflict aims at the utilization of store of a specific node by constantly keeping it busy in routing decisions. This attack floods the network with routing traffic in order to munch through battery life from the nodes and accessible bandwidth from the ad hoc network. The malicious node continually requirements for either existing or non-existing destinations forces the neighboring nodes to procedure and forward these packets and therefore munch through batteries and network bandwidth hindering the normal operation of the network. Location disclosure: Location disclosure is an attack that targets the solitude necessities of an ad hoc network. Through the use of traffic analysis techniques or with simpler probing and monitoring methods an attacker is able to discover the location of a node, and the structure of the network. If the locations of some of the intermediary nodes are known, one can gain information about the location of the destination node as well. Routing table poisoning: Routing protocols uphold tables which hold information on the subject of routes of the network. In poisoning attacks the malevolent nodes create and send untrue traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. One more option is injecting a RREQ package with a high sequence number. This will reason that all other legal RREQ packets with lower sequence number will be deleted. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops, bottlenecks and even partitioning sure parts of the network. Black Hole: A malicious node uses the routing protocol to insert fake route answers to the route needs it receives promotion itself as having the straight path to a target whose packets it needs to cut off. Once the fake route has been recognized the mean node is able to become a member of the lively route and intercept the communication packets. Network traffic is diverted through the malicious node for eavesdropping, or be a focus for all traffic to it in order to execute a DOS by dropping the received packets or the first step to a man-in-the-middle attack. While the safety requirements for ad hoc networks are the similar the ones for fixed networks, namely ease of use, privacy, reliability, validation, and non-repudiation mobile wireless networks are usually more susceptible to information and physical safety fears than fixed wired networks. Securing wireless ad hoc networks is chiefly tricky for many reasons as well as vulnerability of channels and nodes, nonattendance of communications, dynamically altering topology and etc.; The wireless channel is available to both legal network users and malicious attackers. The abstract of centralized management makes the traditional security solutions based on certification establishment and on-line servers unsuitable. A malicious attacker can willingly become a router and disturb network operations by deliberately disobeying the protocol specifications. The nodes can move arbitrarily and liberally in any way and systematize themselves arbitrarily. They can stick together or leave the network at any time. The network topology changes regularly, rapidly and randomly which considerably alters the status of trust among nodes and adds the complexity to routing among the mobile nodes. The egoism that nodes in ad hoc networks may tend to reject providing services for the advantage of other nodes in order to keep their own possessions introduces new security issues that are not address in the infrastructure-based network Chapter No 3 Distributed Security Scheme for Mobile Ad Hoc Networks In difference to fixed networks a central certification power is not possible in ad hoc networks. Distributing the functionality of certification power over number of nodes is a probable solution. This can be got by creating n shares for a clandestine key and distributing them to n different node. Key can be generating by combining the shares using doorsill cryptography methods. Mobile ad-hoc networks are extremely active. Topology differences and link crack occur fairly often. Therefore, we require a safety answer which is active, too. Any malicious or disobedient nodes can produce antagonistic attacks. These types of attacks can gravely injure essential aspects of safety, such as veracity, confidentiality and space to yourself of the node. Current ad-hoc routing protocols are totally unsure of yourself. Furthermore, obtainable safe routing mechanisms are either too luxurious or have impractical necessities. In ad hoc network, safety solution should separate the attackers and compro mised nodes in the network. Proactively dividing the attackers make it sure that they cannot carry on to attack and waste the network resources in future. A safety solution should have lessening transparency over. Attacks beside ad-hoc routing protocols can be categorize as active or passive. A passive attack does not upset the functioning of the protocol, but tries to discover valuable information by listening to traffic. An active attack inserts arbitrary packets and tries to upset the operation of the protocol in order to bound the accessibility, gain confirmation, or attract packets meant to other nodes. In ad hoc network disobedient node can advertise its accessibility. Nearby nodes changs its route table with the new route and ahead the packet through the disobedient node. Misbehaving node can alter or even drop the packet. So mobile nodes must be able to prove the reliability of a new neighbor before adding it to the route table. Also it is imperative to care for the data pac kets from eavesdropping. Once the cluster member link has reputable a secured link, they can further switch symmetric key and encrypt data packet to ensure data in private and integrity. CLUSTER-BASED TOPOLOGY Clustering is a method by which nodes are placed into groups, called clusters. A cluster head is designated for SHCBK Protocol for Securing Ad Hoc Networks SHCBK Protocol for Securing Ad Hoc Networks Abstract With present advances in technology, wireless networks are getting more popularity. These networks let the users the liberty to travel from one location to another without disruption of their computing services. The Ad-hoc networks, are the subset of wireless networks, let you the configuration of a wireless network without the require for access point. Technology under development for wireless ad hoc networks has quickly become a crucial part of our life since it provides ââ¬Å"anytime, anywhereâ⬠networking services for mobile users. Wireless ad hoc networks can be dynamically set up without relying on any pre-existing infrastructure, such as Public Key Infrastructure, and central management for communications. However, such infrastructure-less characteristic of the networks also makes them vulnerable to security attacks. Numerous protocols have been planned in order to attain a high degree of safety based on a mixture of human-mediated communication and an normal Dolev-Yao c ommunication medium. One of which is the Symmetrised Hash Commitment Before Knowledge protocol or the SHCBK protocol ( A. W. Roscoe and Long Nguyen, 2006). The protocol design seeks to optimise the amount of security that the humans can attain for a known quantity of work. This dissertation presents an implementation of the SHCBK protocol for securing ad hoc networks over Wi-Fi. Chapter 1 Introduction A wireless ad hoc network is a de-centralized wireless network. The network is called ad hoc for the reason that each hop is ready to send onward data for other hop, and so the resolving that which of hops will send the data to the forward hops is dynamically established on the network connectivity. This is in dissimilarity to wired networks in which routers execute the duty of routing. It is also in difference to organize the wireless networks. In which a particular node recognized as an admission point manages communication among other nodes. All taking part parties in an ad hoc network have the same opinion to recognize and send onward messages, to and from each other. With this type of elasticity, wireless networks have the capability to form anyplace, at any occasion, as long as two or more wireless users are enthusiastic to have the communicate between them. Mobile nodes inside an ad-hoc network move from one location to another. However, finding ways to model these movements i s not obvious. In order to evaluate an ad hoc network performance it is necessary to develop and use mobility models that accurately represent movements of the mobile nodes. In this paper we present performance evaluation of various entity mobility models in terms of the traveling patterns of mobile node. MANET is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes forward packets for each other, allowing communication among nodes outside wireless transmission range hop by hop. Due to dynamic infrastructure-less nature and be deficient in the centralized monitoring points, the ad hoc networks are susceptible to attacks. The Attacks on the ad- hoc network routing protocols can disturb the network performance and dependability. Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communica tions and ad-hoc. In communications mode all traffic is transmitted among The HOPs via an admission point which controls the network and gives it with the safety system. The most usually used normal for wireless networks is the 802.11 principles or Wi-Fi which in fact is not a standard but a entire relatives of principles using the same protocol. The safety in wireless networks by Wi-Fi consists of WEP, WPA and now lately WPA2 which is essentially a ended version of WPA. WPA was shaped as an middle safety system while WPA2 was finalized and experienced since the preceding system contained several serious weaknesses. Benefits and applications of ad-hoc Networks Ad-hoc networking need not want any admission points as contrasting to wireless networks in Communications mode. This makes them functional in a set of diverse applications. It is mainly used in Military applications and in save operations where the accessible communication communications Has been damaged or is unavailable, for example later than earthquakes and other disasters. But ad-hoc is these days also being used in a lot of commercial applications. Like we see that mobile phones and PDAs using the Bluetooth protocol system, seeing as it is quick and fairly simple to setup and doesnt need any additional tools. Characteristics and standards of ad-hoc As the wireless standard 802.11 does hold up ad-hoc networks, it is extremely limited since it doesnt offer routing among the nodes, so a hop can only arrive at the straight noticeable nodes in its place protocols similar to the Ad-hoc, On-demand Distance Vector protocol or Dynamic Source Routing protocol can not be used. These routing protocols are so called immediate routing protocols, sense that it gives a route to a target only when wanted. In difference the other usually used routing protocols on the Internet are practical sense that they will set up routes separately of the traffic in the network. This implies that the reactive network is quiet pending a connection that is wanted and thus lessens the overcrowding in the network. DSR is an even additional optimized protocol which doesnt need for the sending forwarding computers to have current routing tables but have a list of network addresses in the form of the packet. The protocol because of eavesdrops the limited network traffic and listens for this routing data and information included in the packets and adds it to its personal routing table. One of the major goals when scheming mobile ad-hoc networks where the nodes go about and the topology rapidly alters is to defend the network connectivity among the hops over potentially multi hop channels. To obtain multi hop connection you must offer one-hop connectivity throughout the link-layer and expand that to multi- hop connectivity throughout routing and data that is forwarding protocols in the network-layer. Many corporations make substantial investments in their wire- less infrastructure. For example, Microsofts IEEE 802.11 based Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy or else, to republish, to position on servers or to redistribute to lists, requires prior specific permission and/or a fee. Wireless (Wi-Fi) network consists of approximately 5,000 access points (APs) supporting 25,000 users each day in 277 buildings, covering more than 17 million square feet [10]. In addition to the equipment costs, the costs of planning, deploying, and maintaining such networks is substantial. Thus, it is important to develop infrastructure that improves the ability of Information Technology (IT) departments to manage and secure their wireless networks. In recent years, researchers have uncovered security vulnerability- ties in Wi-Fi networks [20]. They showed that the Wired Equiv- agency Protocol (WEP), the popular 802.11 security mechanism that most corporations were using at the time, was fundamentally flawed. In a series of highly publicized papers, they showed that 802.11 networks could be compromised easily. The community reacted quickly by developing and deploying alternate security so- lotions including VPNs, IEEE 802.1x [30], several variations of EAP [14], Smart cards, and more recently WPA [29]. Yet, the wire- less LAN (WLAN) security problem was not completely resolved. Last year, Microsoft conducted a series of interviews with WLAN administrators of several large and small organizations [10]. The goal of these interviews was to understand the difficulties involved in deploying and managing corporate WLANs. The issue of WLAN security came up repeatedly during these interviews. All administrators felt that WLAN security was a problem. They were unhappy with the quality of the tools they had at their disposal. Many of them would periodically walk around their buildings using WLAN scanning software looking for security vulnerabilities. Some hired expensive outside consultants to conduct security vulnerability analyses of their WLAN deployme nt, only to conclude that what they really needed was an on-going monitoring and alerting system. Most administrators believed that better systems to manage WLAN security are needed. Even after protocols such as IEEE 802.1x and WPA are deployed, corporate networks can be compromised by off-the-shelf 802.11 hardware and software. For example, an unauthorized AP can be connected to the corporate Ethernet, allowing unauthorized clients to connect to the corporate network. The rogue AP may be con- nected by a malicious person or, as is more often the case, by an employee who innocently connects an AP in his office without realizing that he is compromising the corporate network. A rogue AP can circumvent the elaborate security measures that the IT department may have put in place to protect the companys intellectual property. To test our assertion that people inadvertently compromise the security of their networks, we conducted an experiment in two large organizations that had secured their WLANs using one of the methods mentioned previously. We walked around with a WLAN- enabled laptop in a small section of the two campuses looking for APs to which we could connect. Chapter 2 SECURITY ATTACKS Here I attempts to provide a comprehensive overview of attacks and secure routing. It first analyzes the reason that ad hoc network is vulnerable to attacks. Then it presents the well known attacks and the popular secure protocols. Is out of its radio range, the cooperation of other nodes in the Network is needed. This is known as multi-hop communication. Therefore, each node must do something as both a host and a router at the same time. In most wireless networking environments in productive use today the users devices communicate either via some networking infrastructure in the form of base stations and a backbonenetwork,ordirectlywiththeirintended communication partner, e.g. by means of 802.11 in ad hoc networks In distinction a mobile ad-hoc network is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Every hop in the mobile ad-hoc networks is ready with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication area. Hops are more often share the same physical media. They broadcast and obtain signals at the same frequency band, and chase the same hopping series or spreading code. If the purpose node is not inside the broadcasting range of the sending node, then the sending node takes help of the intermediate hops to communicate with the purpose node by relaying the messages hop by hop. Fig.2 describes the Mobile ad-hoc network. In order for a node to forward a packet to a node that TYPES OF THE SECURITY ATTACKS Securing wireless ad hoc networks is a highly demanding issue. Due to dynamic scattered infrastructure-less nature and be deficient in of centralized monitoring points, the ad hoc networks are susceptible to a variety of attacks. Ad hoc networks have to manage with the same kinds of vulnerabilities as their wired counterparts. As well as with new vulnerabilities specific to the ad hoc context. In addition, conventional vulnerabilities are also accentuated by the ad hoc paradigm. Initially, the wireless channel is available for the both genuine network users and cruel attackers. The ad hoc networks are vulnerable to attacks ranging from static eavesdropping to active prying. Secondly, the be short of an online CA or Trusted Third Party adds the complexity to organize security mechanisms. Thirdly, mobile devices be inclined to have limited power consumption and calculation capabilities which make it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms Fourthly, in MANETs, therearemore probabilities for trusted node being compromised and then life form used by adversary to launch attacks on networks. Lastly, node mobility and recurrent topology changes enforce frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to discriminate between stale routing information and faked routing information. Ad -hoc networks attacks can be differentiated as passive and active. Passive attack signifies that the assailant does not send any message, but just listens to the channel. Passive attacks do not disturb the process of a protocol, but only makes the attempts to find out valuable information. Active attacks may either being directed to disturb the normal operation of a exact node or target the performance of the ad hoc network as a whole. For passive attacks, the attacker listens to the channel and packets that are containing clandestine information might be eavesdropped, which violates privacy. In a wireless environment it is usually not possible to notice this attack, as it does not create any new traffic in the network. Active attacks, counting injecting packets to unacceptable destinations into the network, deleting packets, changing the contents of packets, and impersonating other hops infringe ease of use, veracity, verification, and non-repudiation. Different from the passive attacks, active attacks can be detected and ultimately avoided by the legal nodes that contribute in an ad hoc network . We broadly classify these attacks as passive and active. The classification is important for understanding the strengths and limitations of the DAIR security management system. Eavesdropping Eavesdropping is a passive attack. The attacker passively listens to the traffic on the wireless network and gleans useful information. The listener may use sophisticated code breaking techniques. Countermeasures include use of better encryption techniques as well as physical security measures such as use of radio-opaque wallpaper. Passive attacks are difficult, if not impossible, to detect and we do not address them in this paper. Intrusion Any attack that allows a user to gain unauthorized access to the network is called an Intrusion attack. Intrusion attacks are active attacks and several such attacks are possible. An attacker can compromise the corporate network by gaining physical access to its wired network and connecting a wireless AP to it. The AP creates a ââ¬Å"holeâ⬠through which unauthorized clients can connect, bypassing the elaborate security measures that the IT department may have put in place. A similar attack can be carried out by using ad-hoc wireless networks instead of APs. A corporate network may also be compromised when an attacker finds and uses an unsecured AP connected to the network by an unsuspecting employee. The widespread availability of inexpensive, easy-to- deploy APs and wireless routers has exacerbated this problem. As mentioned earlier, we found several unsecured APs in large organizations. The DAIR security management system can detect both rogue APs and rogue ad-hoc networks. Another way a corporate network can be compromised is when an attacker obtains the credentials (e.g., WEP passwords, IEEE 802.1x certificates) needed to connect to the corporate ne twork. The DAIR security management system can not currently detect such attacks. Denial of Service (DoS) Denial of Service attacks are active attacks. A diversity of DoS attacks are possible. Some DoS attacks exploit flaws in the IEEE 802.11 protocol. For example, a disassociation attack is where the attacker sends a series of fake disassociation or deauthentication messages, causing legitimate clients to disconnect from the AP. In a NAV attack, the attacker generates packets with large duration values in the frame header, thereby forcing legiti- mate clients to wait for long periods of time before accessing the network . In a DIFS attack, the attacker exploits certain timing- related features in the IEEE 802.11 protocol to aggressively steal bandwidth from legitimate users. In all three cases, the attacker transmits packets in an abnormal way, either by generating non-compliant packets, or by transmitting compliant packets at an abnormally high rate. The DAIR security management system can detect such attacks. DoS attacks are also possible by creating large amount of RF noise in the ne ighborhood of the network. The DAIR security management system can detect such attacks by comparing current observations with historical data observed from multiple vantage points. DoS attacks can also be mounted by gaining access to the corporate wired network and attacking the APs from the wired side. The DAIR system does not handle DoS attacks on the wired network. Phishing Phishing is an active attack. An attacker sets up a wireless AP that masquerades as a legitimate corporate AP (same SSID, per- haps even same BSSIDs). If the client does not use mutual authentication, it is possible for the attacker to lure unsuspecting legiti- mate users to connect to its AP. The attacker can then use a variety of techniques to extract private information (for example, sniff for passwords). The DAIR system can detect phishing attacks. How- ever, we do not describe solutions to phishing attacks in this paper. ACTIVE ATTACKS SECURITY ATTACKS Certain active attacks can be easily performed alongside an ad -hoc network. Understanding possible shape of attacks is for all time the first step towards increasing good safety solutions. Based on this danger analysis and the recognized capabilities of the potential attackers, several well recognized attacks that can target the operation of a routing protocol in an ad hoc network are discussed. Impersonation. In this kind of attack, nodes may be clever to join the network untraceable or can able to send the false routing data/information, camouflaged as some other trusted node. Wormhole. The wormhole attack involves the collaboration stuck between two attackers. One attacker gets the routing traffic at one point of the network and changes their path to another point in the network that shares a confidential communication link between the attackers, then selectively injects tunnel traffic back into the network. The two colluding assailant can potentially deform the topology and set up routes under the control over the wormhole link. Rushing attacks: The ROUTE REQUESTs for this Discovery sanded forwarded by the attacker can be the 1st to approach each neighbor of the target, then any way exposed by this Route Discovery will comprise a hop through the attacker. That is, when a neighbor of the target gets the hurried REQUEST from the attacker, and it forwards that REQUEST, and will not send onward any further REQUESTs from this Route Discovery. When non-attacking REQUESTs arrive later at these nodes, they will discard those legitimate REQUESTs. Blackmail: The attack incurs outstanding to be short of of genuineness and it grants stipulation for any node to corrupt other nodes legal information. Hops more often keep the data/ information of apparent malevolent nodes in a blacklist. This attack is pertinent alongside routing protocols that use mechanisms for the recognition of malicious nodes and spread messages that try to blacklist the criminal. An attacker may make such coverage messages and tell other nodes in the network to put in that hop to their blacklists and cut off legitimate nodes from the network. Chapter 3 Secure Routing The previously presented ad hoc routing protocols with no security contemplation assume that all participating nodes do not maliciously troublemaking the operation of the protocol. However, the continuation of malicious entities cannot be unnoticed in any system, particularly in open ones like ad hoc networks. Safe routing protocols manage with malicious nodes that can disturb the right performance of a routing protocol by changing routing information. By fabricating the wrong routing data or information and by impersonating other nodes. These safe routing protocols for ad hoc networks are either totally new stand-alone protocols, or in some cases incorporations of security mechanisms into obtainable protocols. Generally the obtainable safe routing protocols that have been future can be generally secret into two types, those that use hash chains, and those that in order to function require predefined trust relations. This method, jointly nodes can efficiently validate the legitimate traffic and distinguish the unauthenticated packets from outsider attackers. ROUTING PROTOCOL FOR AD-HOC NETWORK SECURITY SEAD: Safe Efficient Ad hoc Distance-vector routing protocol. A safe ad hoc network routing protocol that is established on the design of the Destination Sequenced Distance Vector routing protocol. To hold up employ of SEAD with hops of partial CPU processing abilities, and to guard against modification of the source address for a routing update and attacks in which an rejection of service attacks makes attempts to reason other nodes to use surplus network bandwidth or processing time of the network, efficient one way hash Chains but not cryptographic operations are used in the verification of the series number and the metric field of a routing table update message. When a node in SEAD sends a routing update, the node includes one hash value from the hash chain with each entry in that update. The nodes sets the purpose address in that entry to that target nodes address, the metric and series number to the values for that target in its routing table, and the hash value to the hash of the hash value conventional in the routing update entry from which it learned that route to that destination. When a node receives a routing inform, for each entry in that update, the node checks the verification on that entry, by the target address, sequence number, and metric in the conventional entry, together with the newest prior genuine hash value established by this node from that destinations hash chain. The hash value of each entry is hashed the right number of times and it is compared to the before authenticated v alue. Depending on this contrast the routing update is either established as authenticated, or discarded. Ariadne; Ariadne is a safe on-demand ad hoc routing protocol based on DSR that restricts attackers or the mutual hops from tampering with uncompromised routes containing of uncompromised hops, and also stops a lot of types of DOS attacks. In addition, Ariadne uses only extremely well-organized symmetric cryptographic primitives. To induce the objective of the authority of each field in a ROUTE REQUEST, the originator simply includes in the REQUEST a MAC computed with key over exclusive data. The object can with no trouble corroborate the authenticity and newness of the ROUTE REQUEST using the shared key. One-way hash functions are use to confirm that no hop was absent which is called per hop hashing. Three alternative methods to attain hop list verification. The TESLA protocol, digital signatures, and typical MACs. When Ariadne Route detection is used with TESLA, every node authenticates the original data in the REQUEST. The objective buffers and does not fire the REPLY awaiting midd le nodes can discharge the matching TESLA keys. Ariadne Route Discovery using MAC is the majority well-organized way of the three option verification mechanisms, but it asks couple wise communal keys among all nodes. The MAC list in the ROUTE REQUEST is computed by a key common among the object and the present node. The MACs are verified at the target and are not returned in the ROUTE REPLY. If Ariadne way detection is used with digital signatures, the MAC list in the ROUTE REQUEST becomes a signature list. SRP: The safe Routing Protocol consists of quite a lot of safety extensions that can be practical to existing ad hoc routing protocols as long as end-to-end verification. The one and only requirement of the future scheme is the sustained existence of a security association between the node initiating the query and the sought destination. The safety association is used to found a common secret between the two nodes, and the non mutable types of the exchanged routing messages are confined by this shared secret. The method is robust in the occurrence of a number of non-colluding nodes, and provides Routing Table Overflow: In a routing table spread out attack the malevolent node floods the network with bogus route formation packets to non existing nodes to overpower the routing protocol implementations in order to devour the resources of the participating nodes and interrupt the establishment of legal routes. The goal is to create enough routes to prevent new routes from being created or to engulf the protocol execution. Proactive routing protocols are more vulnerable to this attack, since they attempt to produce and preserve routes to all possible destinations. A spiteful node to apply this attack can simply send unnecessary route advertisements to the network. To apply this harasses in order to target a reactive protocol like AODV is to some extent more involved since two nodes are obligatory. The first node should make a genuine request for a route and the malicious node should reply with a forged address. Sleep Depravation: The sleep scarcity afflict aims at the utilization of store of a specific node by constantly keeping it busy in routing decisions. This attack floods the network with routing traffic in order to munch through battery life from the nodes and accessible bandwidth from the ad hoc network. The malicious node continually requirements for either existing or non-existing destinations forces the neighboring nodes to procedure and forward these packets and therefore munch through batteries and network bandwidth hindering the normal operation of the network. Location disclosure: Location disclosure is an attack that targets the solitude necessities of an ad hoc network. Through the use of traffic analysis techniques or with simpler probing and monitoring methods an attacker is able to discover the location of a node, and the structure of the network. If the locations of some of the intermediary nodes are known, one can gain information about the location of the destination node as well. Routing table poisoning: Routing protocols uphold tables which hold information on the subject of routes of the network. In poisoning attacks the malevolent nodes create and send untrue traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. One more option is injecting a RREQ package with a high sequence number. This will reason that all other legal RREQ packets with lower sequence number will be deleted. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops, bottlenecks and even partitioning sure parts of the network. Black Hole: A malicious node uses the routing protocol to insert fake route answers to the route needs it receives promotion itself as having the straight path to a target whose packets it needs to cut off. Once the fake route has been recognized the mean node is able to become a member of the lively route and intercept the communication packets. Network traffic is diverted through the malicious node for eavesdropping, or be a focus for all traffic to it in order to execute a DOS by dropping the received packets or the first step to a man-in-the-middle attack. While the safety requirements for ad hoc networks are the similar the ones for fixed networks, namely ease of use, privacy, reliability, validation, and non-repudiation mobile wireless networks are usually more susceptible to information and physical safety fears than fixed wired networks. Securing wireless ad hoc networks is chiefly tricky for many reasons as well as vulnerability of channels and nodes, nonattendance of communications, dynamically altering topology and etc.; The wireless channel is available to both legal network users and malicious attackers. The abstract of centralized management makes the traditional security solutions based on certification establishment and on-line servers unsuitable. A malicious attacker can willingly become a router and disturb network operations by deliberately disobeying the protocol specifications. The nodes can move arbitrarily and liberally in any way and systematize themselves arbitrarily. They can stick together or leave the network at any time. The network topology changes regularly, rapidly and randomly which considerably alters the status of trust among nodes and adds the complexity to routing among the mobile nodes. The egoism that nodes in ad hoc networks may tend to reject providing services for the advantage of other nodes in order to keep their own possessions introduces new security issues that are not address in the infrastructure-based network Chapter No 3 Distributed Security Scheme for Mobile Ad Hoc Networks In difference to fixed networks a central certification power is not possible in ad hoc networks. Distributing the functionality of certification power over number of nodes is a probable solution. This can be got by creating n shares for a clandestine key and distributing them to n different node. Key can be generating by combining the shares using doorsill cryptography methods. Mobile ad-hoc networks are extremely active. Topology differences and link crack occur fairly often. Therefore, we require a safety answer which is active, too. Any malicious or disobedient nodes can produce antagonistic attacks. These types of attacks can gravely injure essential aspects of safety, such as veracity, confidentiality and space to yourself of the node. Current ad-hoc routing protocols are totally unsure of yourself. Furthermore, obtainable safe routing mechanisms are either too luxurious or have impractical necessities. In ad hoc network, safety solution should separate the attackers and compro mised nodes in the network. Proactively dividing the attackers make it sure that they cannot carry on to attack and waste the network resources in future. A safety solution should have lessening transparency over. Attacks beside ad-hoc routing protocols can be categorize as active or passive. A passive attack does not upset the functioning of the protocol, but tries to discover valuable information by listening to traffic. An active attack inserts arbitrary packets and tries to upset the operation of the protocol in order to bound the accessibility, gain confirmation, or attract packets meant to other nodes. In ad hoc network disobedient node can advertise its accessibility. Nearby nodes changs its route table with the new route and ahead the packet through the disobedient node. Misbehaving node can alter or even drop the packet. So mobile nodes must be able to prove the reliability of a new neighbor before adding it to the route table. Also it is imperative to care for the data pac kets from eavesdropping. Once the cluster member link has reputable a secured link, they can further switch symmetric key and encrypt data packet to ensure data in private and integrity. CLUSTER-BASED TOPOLOGY Clustering is a method by which nodes are placed into groups, called clusters. A cluster head is designated for
Subscribe to:
Posts (Atom)