Monday, September 30, 2019

The Toyota Marketing Strategy

[pic] Introduction 1. Introduction Navana Limited stands as the authorized distributor of Toyota cars in Bangladesh, so we have chosen them to make a successful marketing plan on Toyota cars. Our area of concentration was centered on the new model of Toyota Corolla-GLi. This is the latest car of Toyota Corolla that has been recently launched in Bangladesh by Navana Limited in November 2007 at Japan trade fair in Bangladesh. The brand name Corolla of Toyota is well known for producing cars for the common people but this car is an upgraded model of Corolla. [pic] Company Profile 2. Company Profile 2a. Company Overview Toyota Motor Corporation is a multinational corporation headquartered in Japan. Today, Toyota is the world's third largest manufacturer of automobiles. Providing the most reliable automobile for its customer is the Toyota’s specialty. Toyota Motor Corporation recently celebrated its 70 years both as a carmaker and half a century of selling cars in America. In 2007 Toyota sold 8. 52m vehicles and its net income rose by 20% and become $14 billion. Moreover Toyota is aiming to sell 10. 4m vehicles in 2009. In Bangladesh it is the most popular automobile company to the car user and it has almost 70% market share in our country. It is always interested to get the attention of the young generation, family people, working executives, service holders, business people, in one word all kind of people. â€Å"Its mission† is to predict consumer trends and create a lineup of cars and trucks to capitalize on them. Each professional is expected to spend time out in the field talking to car buyers. The Japanese have a name for it: genchi genbutsu – go to the scene and confirm the actual happenings. With Toyota, one thing has never changed that their commitment to the communities where they do business. Toyota spends over billions of billion on R, design, manufacturing, sales and marketing operations. Over the world they have sales /service offices, financial service offices, R centers, holding company, manufacturing facilities, design centers, Hino operation facilities, Supplier state etc. 2b. History Kiichiro Toyoda, founder of the toyota Motor Corporation, was born in 1894. His father Sakichi Toyoda became famous as he inventor of the automatic loom. Inheriting the spirit of research and creation from his father, Kiichiro devoted his entire life to the manufacturing of cars, which was an unknown frontier at that time. In 1933, Toyoda Automatic Loom Works created a new division devoted to the production of automobiles under the direction of the founder's son, Kiichiro Toyoda. Kiichiro Toyoda had traveled to Europe and the United States in 1929 to investigate automobile production. After years of hard work, he finally succeeded in completing the A1 prototype vehicle in 1935. That was the beginning of the history of the Toyota Motor Corporation. Toyoda Automatic Loom Works was encouraged to develop automobile production by the Japanese government and Model AA passenger car was the first production model of Toyota in 1936. [pic] Replica of the Toyota Model AA, the first production model of Toyota in 1936 Toyota Motor Co. was established as an independent and separate company in 1937. The company was founded by Kiichiro Toyoda as a spinoff from his father's company Toyota Industries to create automobiles. Toyota also owns and operates Lexus and Scion brands. Toyota is headquartered in Aichi, Nagoya and in Tokyo. In addition to manufacturing automobiles, Toyota provides financial services through its division Toyota Financial Services and also creates robots. 2c. Product Line of Toyota Toyota operates in Bangladesh through Navana Group, under Navana Limited. The product line of Toyota’s brand new cars, that are marketed by Navana Limited and are available in Bangladesh are: 1. TOYOTA Yaris 2. TOYOTA Corolla GLi 3. TOYOTA CAMRY 4. TOYOTA Avanza 5. TOYOTA Rav4 6. TOYOTA Fortuner 7. TOYOTA Prado 8. TOYOTA Land Cruiser 9. TOYOTA Hilux 10. TOYOTA Dyna 11. TOYOTA Hiace 12. TOYOTA Coaster [pic] Current marketing situation 3. Current marketing situation There is a huge market for automobile industry worldwide. In this global earth people need to communicate with others each and every minute. Transportation is one way that facilitates communication. The market demand for cars rise and fall time to time, but the demand never fell to the ground. The current market situation of cars is a little unstable for the fact that oil price has risen significantly worldwide that has resulted in a decrease of car sale worldwide. The same has also affected the Bangladeshi market. Different car dealers have reported that car sale has dropped significantly from last year, 2006-2007. There is also a rise in the car due to increase in cost of production. The steel price has risen significantly worldwide. Japan, Taiwan, importers of steel, are giving 27 to 30% more for buying steels. In Bangladesh, the government’s rules and regulation imposed on import, duty and tax has also caused the market of cars to decrease. [pic] Product Profile 4 . Product profile 4 a. Mission, Vision, Objectives & Goal Mission: The mission is to create a luxury vehicle that could go head to head with the world’s best automobiles. Vision: Setting new industry standards in operational excellence, market penetration, customer satisfaction and community commitment. Objective: Corolla GLi is clear in its objective to produce the segments most engaging driving dynamics while maintaining the brands traditional ride quality. Goal: From the outset, it is their goal to develop a luxury flagship vehicle that would be recognized as one of the finest cars in the world. 4 b. Products quality and features, design, packaging, brand name, extra services Brand name: Corolla GLi Features And Quality: ? Powerful performance: Responsive and quick to please, the Corolla effortlessly generates the power for driving pleasure, delivering subtly smooth and stable performance. ? Advanced technology: The Corolla generates outstanding power, minimizes its environmental impact, and provides warm reassurance. Wti technology: Based on driving conditions, it optimally changes the open/close timing of the intake valve, contributing to increased torque and output, better fuel economy and reduced Nitrogen oxides and hydrocarbon emissions. ? Crash safety body: It is comprised of a high integrity cabin with front and rear crumple zones that help absorb impact energy in a collision. ? Suspension: The Macpherson strut suspension on the front and torsion beam suspension on the rear were fine-tuned to provide excellent stability and control, and ride comfort. Keyless entry system: It lets to lock and unlock the doors from a distance. ? Moon roof: It incorporates one touch mode and a jam-protected system. ? Rear spoiler: The rear spoiler integrated into the trunk lid adds a sporty touch. ? Anti corrosion steel sheeting: The extensive use of anti corrosion steel sheeting protects the Corolla from rust, helping it to keep its goods looks for years to come. ? Immobiliser system: It provides security against theft. The car can only be started when the ID in the electronic matches the ID code in the engine immobiliser system. Fuel Level warning ? Wireless door lock ? Audio – AM/FM, CD Changer, 6 spk. ? Child protector ? Brake control valve – EBD Design ? Highly functional design: The ergonomics-based design of the instrument panel with its easy-to-use switches engages the driver, providing comfortable opera tion that enhances driving enjoyment. Convenient functional features and various integrated storage spaces enhance comfort ? Dynamic and advanced: With its dynamic and advanced design creating a high quality feeling, the Corolla continues winning hearts and minds right around the world. Sophisticated presence: First impressions are compelling. The short-nose, long-deck proportions highlight the advanced sedan styling. Together with its expensive cabin space, it exudes a distinctive presence. ? Generous appearance: The captivating design creates a feeling of great possibility. The wide tread and generous appearance set the stage for the spacious cabin. ? Refined interior details: The Corolla’s attention to details includes the distinctive curved design of the center console, the use of colors and textures, and the quality finish. Brakes: Disc brakes on all four wheels, ventilated on the front, are standard for all grades, giving sure stopping performance. ? Windshield Glass â €“ Green Laminated ? Outside rear view mirror ? Color Oxygen Sensor ? Head Rest – Front & Rear ? Rear Armrest – with Cup holder ? Inside Rear view mirror – Day & Night Colors available in Bangladesh ? Super White 2 ? Silver Metallic ? Blue Metallic ? Turquoise Mica Metallic ? Red Mica Metallic ? Grey Metallic ? Black Mica Packaging: It creates a spacious, comfortable cabin with excellent headroom, together with ample trunk space. Engine: The compact, lightweight engine integrates sophisticated technologies, which contribute to its excellent performance and low fuel consumption. Extra Service ? Immobiliser system: It provides security against theft. The car can only be started when the ID in the electronic matches the ID code in the engine immobiliser system. ? Keyless entry system: It lets to lock and unlock the doors from a distance. ? CD changer 4 c. Products position in the market compare to other product of the company with BCG growth matrix Boston Consulting groups (BCG)’s growth share matrix is a table that gives an idea about about market growth rate compare to relative market share. The market growth rate on the vertical axis indicates the growth rate of the market in which the business operates. And the relative market share on the horizontal axis indicates the market share compare to the other segments. It serves as a measure of the company’s strength in that market segment For BCG growth matrix, we have selected four models of Toyota Cars to analyze GLi’s position in market compare to other models. Models are- 1. Corolla GLi 2. Probox 3. Yaris 4. Crown | |Relative Market Share | | | |High Low | | | | | |Market High | |Growth | |Rate | | | |Low | HighLow High Figure: BCG Growth Matrix Our analysis on Corolla GLi compare to others is described below- Star: According to our observation, Probox falls into the position of Stars in the matrix table. Recently, Probox has reached at peak point in terms of selling. That is why their market growth rate is very high as well as market share. From the Bangladesh perspective, the demand of this car has increased so the company is trying to hold this position Question Mark: Corolla GLi falls under the category of this position. Because it is totally a new brand in Bangladesh, but has got very rapid sale within a short period of time. Therefore, their market growth rate is in the high position. On the other hand, as a new brand market share is not so high till now. Cash Cow: When market growth rate is low along with high market share then the product fall under this category. From our point of view, Yaris falls in to this position. Because present market growth rate of Yaris is not that much high compare to other though their market share is high. Dogs: In this position, both the market growth rate and market share is low. According to our observation, Crown falls into Dogs position in the matrix table. This is the model, which has less demand in Bangladesh that is why their market share is also low. 4 d. Market segmentation process Market segments are large identifiable groups within a market. There are four basic bases for segmenting consumer market. These variables can be used singly or in combination. These are- 1. Geographic segmentation 2. Demographic segmentation 3. Behavioral segmentation 4. Psychographic segmentation Now, considering Corolla GLi, we find that they also segment their market into groups based on the above segmentations. For this segmentation process, firstly they study the market and customers demand. They complete this process by analyzing the competitors’ products, segmentation as well as customers demand. The process is described below- Geographic segmentation: It is the process of dividing the market into different geographical units, such as country, city, nation, state, region etc. The company can operate in one or few geographic areas, or operate in all but pay attention to local variations. From Corolla GLi’s point of view that they segment their market based on – †¢ Country: In order to cover the whole world’s market they launch their product in different countries. To do so, in 2007 they first launch this model in Bangladesh. City: After selecting the country, they target those cities where they find more customer demands and wants. They actually select the cities after analyzing the purchasing power, living standard and so on. Demographic Segmentation: In this segmentation the market is divided in to groups on the basis of variables such as age, family size, life cycle, gender, income, occupation, education etc. These variables are the most popular bases for distinguishing customer groups. From corolla GLi point of view, they segment their market depending on income and occupation mostly and others have less affect in this segmentation part. As we know that they firstly go for market study to know customers demand as well as their purchasing power. For this purpose, they target those customers who have high income as well as in top position in their occupation to match whether they can afford this car or not. Behavioral segmentation: In this segmentation buyers are divided in to groups on the basis of their knowledge, attitude toward the product, use of, or response to a product. The behavioral variables are occasions, benefit, user status etc. If we look at the Corolla GLi’s segmentation process, we can see that they mainly focus on benefit variables and customers attitude toward the products. In benefit variables consumers actually look for products quality, services, economy, and speed. Therefore, corolla GLi is providing high quality, extra ordinary services along with high economic value to meet the customer demands. Moreover some customer’s attitude is to prefer branded products. They are basically quality concern people not price sensitive. Psychographics segmentation: In this segmentation the market is divided in to groups on the basis of life style, personality and social class. As we have mentioned earlier that GLi is a branded product targeting the upper class people so social class, life style, and personality play an important role in this segmentation. The people who are in the upper class and lead a luxurious life style they want such type of car that represent their status, image and pride in the society. Here corolla GLi holds all the characteristics that make satisfy these groups of customers. In addition, the customers who are ambitious, outgoing, demanding, compulsive and want to show a unique image may also buy this car as a symbol of attractiveness. Thus these four basic parts of segmentation process helps them to identify the proper customer demands and market. 4 e. Target market selection process After the segmentation process marketers identify one or more selected areas to enter into the market, this is known as target market selection process. There are different patterns of target market selecting. These are- 1. Single segment concentration: Producing one product for one selected market. 2. Selective specialization: Offering different product for different market. Here, one sector can be covered by other. 3. Product/service specialization: Offering one product for all groups of people in order to minimize cost. 4. Market specialization: Offering different product for one selected market. 5. Full market coverage: Marketers try to cover full market by offering different products for different market. After analyzing the five patterns of target market selection, we can say that Corolla GLi follows the Single segment concentration. Because- ? They don’t have any other sub model of GLi. It indicates that they are producing only one product. ? Also they are producing this product targeting only one group of people, which are the upper class people. From Corolla GLi point of view, they select their target market by considering the customer’s demand like- what feature, design, and benefit they want. Last of all, they try to match these with the customer ability and purchasing power. As it is mentioned earlier that they are following single segment concentration so the benefits for selecting this pattern are mentioned below- ? Through the Single segment concentration, marketers gain a strong knowledge of the segments need and achieve a strong market presence. ? With the help of Single segment concentration they can increase their sale, which can earn a high return on its investment. 4 f. Types of Consumer behavior Buying Behavior is the decision processes and acts of people involved in buying and using products. There are four typical types of buying behavior based on the type of products that intends to be purchased. These are- Complex buying behavior: It is a buying behavior where the individual purchases a high value brand and seeks a lot of information before the purchase is made. In this process, buyer first develops belief about the product then develops attitude about the product and lastly makes a thoughtful choice. Variety-seeking buying behavior: It is a buying behavior where the individual likes to shop around and experiment with different products. Here brand switching occurs for the sake of variety rather than dissatisfaction and look for cheaper price. Dissonance-reducing buying behavior: It is a buying behavior when buyer is highly involved with the purchase of the product. There exists little difference between existing brands, so customers become confused. Habitual buying behavior: It is a buying behavior where the individual buys a product out of habit e. g. a daily newspaper, sugar or salt etc. After analyzing the above point it is quite clear that Corolla GLi car buyers are following complex buying behavior, because they are highly involved in purchase and aware of significant difference among brands. We know that this car is expensive, risky and self- expressive so buyer buy infrequently. Furthermore, this type of customers buy car by differentiating the products with other significant brands like- Mercedes, BMW. Here, Corolla marketers also compare their product with BMW, Mercedes. Mainly, customers are concern about brand not price so they look for brand’s benefits and quality, which will show the symbol of pride, status in the society. 4 g. Steps in the consumer buying behavior Consumer Buying Behavior: It refers to the buying behavior of final consumers- individual and households, who buy goods and services for personal consumption. There are five steps by which consumer buying behavior pass through- Fig: Steps of consumer buying behavior Likewise, to buy Corolla GLi consumers may through all the steps. These are explained below- Need Recognition: In this step a consumer become aware of a problem or need. As we have mentioned earlier that Corolla GLi is a car of status, reputation, image and so on. When people reach that level where they feel to have such a prestigious car, they are in the need recognition stage. So they want such a brand new car, which will higher up their position in the society as well as match with their societal status. Information Search: When customers become aware of the need, they go for information search. They can collect information from various sources, such as personal, commercial, public sources etc. In personal sources, they can collect reliable information from their friends and others who have Corolla GLi or may know well about this car. ? They also can go for visiting Toyota show rooms in order to collect more accurate information, which refers as commercial sources. ? Print & elect ronic media, advertisement, billboard, Internet etc can also act as public sources in order to provide information to customers. Evaluation of Alternatives: In this stage, the consumers form preferences among the brands in the choice set. After completing the information search stage, customers look for competitive brand information by which they can evaluate the brands with each others. Here customers also evaluate Corolla GLi with other brand new cars and try to find out significant differences among them. They compare the brand image, features, services, speed, design, and other facilities and benefits among the alternatives. Purchase Decision: After completing the evaluation process, the select the most preferred brand which is suitable for them and then they decide to buy the product. In the case of Corolla Gli, after evaluating all the alternatives the pick Corolla GLi as it is fitted from all perspective. Attitudes of others who already have Corolla GLi, plays an important role to take the purchase decision. And then go for final consumption. Post-purchase Behavior After purchasing the product, consumers will experience some level of satisfaction or dissatisfaction. In the case of Corolla Gli, consumer may try to figure out their satisfaction level. Whether the car’s perceived performance is satisfactory or not. 4 h. Product Life cycle stage determination [pic] Corolla GLi was launched in November 2007 in Bangladesh it went through the introduction stage with great success and now it is in the growth stage the features, quality and brand name of the car are attracting more and more potential buyers day by day. 4 i. SWoT analysis SWOT stands for internal Strengths and Weaknesses and external Opportunities and Threats. It is used to gauge the degree of â€Å"fit† between the organizations’s strategies and its product and to suggest ways in which the organization can profit from strengths and opportunities and shield itself against weaknesses and threats. [pic] Strengths ? Brand new product ? It represents luxurious life style and symbol of status. ? Showing reliability by the company name Toyota. ? Using WT-i technology Weakness ? Since it is one of the models of corolla so some people may have misperception about GLi as a new brand. ? Because of the mentioned reason also GLi still don’t have own Brand image. ? No product line and variation in model. Opportunities ? Offering product, which is equivalent to other luxuries car. ? Attracting new customer by providing quality product. Threat Entrance of new competitors. ? Government regulations (new or revised). [pic] Pricing for Corolla Gli 5. Pricing for Corolla Gli 5a. Price A firm sets prices when it develops a new product, whe n it introduces its regular product into a new distribution channel or geographical area, when it adds new features in the product, etc. Price is the only element in the marketing mix that generates revenue the other element generates cost. Price is considered as the major determinant of buyer choice especially in the poorer nation and with commodity type products. Companies set their prices in different ways based on cost, value, competitors, customers, etc. Each pricing strategy is different from the. Cost based pricing strategy is where the organization set prices based on cost of production with that amount a certain markup is added for the profit and the product is sold. Competitors based pricing strategy depends on the price of the competitors what they would charge for the product for this pricing strategy the organization either charges same or low price than the competitors. 5b. Pricing strategy of Toyota Corolla Gli Toyota mainly follows cost based pricing strategy for the entire car it manufactures for the luxurious car it follows both cost based pricing strategy and value based pricing strategy. They deliver the value promised by their value proposition and the customer perceives the value. To communicate and enhance perceived value in buyers mind Toyota uses other marketing mix elements such as advertising and sales force. Value based pricing depends on the product performance, quality, features, customer service, etc. For Corolla GLi Toyota uses both cost based and value based pricing strategy as this is one of the most luxurious cars of Toyota. Navana is the only importer in Bangladesh who buys Corolla GLi from Toyota. Initially when the car was launched it was sold at a price of 1950000 taka but now as duty fee has increased and international currency fluctuated the price of Corolla GLi is now 2250000 taka. For the pricing of this car Toyota is also following other pricing strategies they are price skimming strategy which is they are charging maximum price as it is a new product, the demand of this car is already present in other countries and the buyers are also willing to pay any price to buy this car. It is following premium pricing which is charging high price for the high quality car . It is also following the optional product pricing e. g. for with the car Toyota is providing a luxorious comfortable interior with leather seats, cd player, etc. Therefore Final price is determined with all these strategies plus the cost of import, duty fee, the cost of shipment and the markup of Navana. pic] Distribution for Corolla Gli 6. Distribution for Corolla Gli 6a. Distribution or location strategy Most producers do not sell their goods directly to final consumers they use channels or marketing intermediaries to deliver their product to the ultimate consumers. By using intermediaries the cost of the producers and their number of transaction decreases. 6b. Channel dynamics †¢ Conventional marketing system- manufacturer, wholesaler, retailer work as independent system. No one has control over the other. Each member of the channel has separate objectives. †¢ Vertical marketing system- all the members of the channel work as a unified team. Hybrid marketing system- when the product is sold by using more than one channel 6c. Distribution of Toyota Toyota has distributors in almost every country. In Bangladesh the main distributor of Toyota is Navana. Navana performs many functions of Toyota. They gather information about potential and current customers of Bangladesh about the government policy and other external factors and communicate the information to Toyota. They make people of Bangladesh aware of the new cars their features and benefits e. g. to promote Corolla Gli Navana used print media, internet, etc for advertisement. They communicate with the customers dir ectly and sell the cars. As Toyota uses Just-in-time approach to some extent they depend on their distributors as the distributors provide them information about customers demand or about the cars of the competitors and Toyota produce their cars accordingly. Toyota and Navana together follows the Vertical marketing system where they work as a unified team. If Toyota wants to launch a new car in Bangladesh they provide Navana with all the information about the car Navana then analyzes the current marketing situation about the competitors and orders as per demand which is then delivered after 5months through shipment. Navana is an exclusive distributor of Toyota they are given full authority to sell the cars of Toyota. [pic] Promotional tools 7. Promotional tools Every company has to sell their products to their desire customers. For that they need to communicate with them. In this circumstances every company use some promotional tools to sell their product. As Toyota selling specialty product GLI car, they are also using some promotional tools to capture more and more market share. 7 a. Objective of promotional activity Toyota has some certain objectives behind their promotional activities. Those ares- ? Giving information about the product ? What’s new in features and benefits ? Trying to create brand value of GLI ? Ultimate increase of market share 7 b. Promotional tools of corolla GLI Toyota using three basic promotional tools to promote Corolla GLI. ? Advertising ? Personal selling ? Direct marketing Advertising Advertising is the paid form of non-personal presentation by an individual organization to promote their products towards their customers. Toyota gives advertisement of their product through different media to promote their products towards their customers. Toyota using paper and bill board for their advertising. They go for billboards which are situated in Bijoy Shoroni, Manik Mia Avenue, Kamal Ataturk Avenue, Gulshan 1 & 2, infront of Shonargoan Hotel, Dhanmondi 27, Newmarket. In Chittagong – Newmarket, Port city, Nasira bad and Kulshi etc. Personal selling Toyota using personal selling tools to sell and promote corolla GLI. Personal selling is the direct way to connect with customers. Toyota first introduce GLI in Japan trade fair, it’s a way of personal selling. Also Under personal selling they go for corporate selling and they target bank and company high ranked personalities to buy their product. It’s a very effective form of selling corolla GLI. Direct marketing Direct marketing is another tool that used by Toyota to aware about GLI to their customers. Direct marketing is way of marketing where, there are no physical contacts with the customers. They did E-mail campaign to promote GLI as direct marketing. 7 c. Media used by Toyota As Toyota wants to sell their product GLI, they use some media to provide their message to their desired customers. Toyota uses both personal and nonpersonal communication channels to promote GLI. ? Personal communication channels Personal communication channels involve two or more person communicating directly with each other face to face, person to audience, over the phone or through mail, where company get the opportunity to receive feedback from customers etc. To promote GLI Toyota uses face to face, person to audience and mail as personal communication channels. Also word of mouth behavior acting as personal communication channel. ? Nonpersonal communication channels Nonpersonal communication include media, atmosphere and event, where no face to face communication occur. Moreover no opportunity to get feedback from the customers. Toyota uses print media, bill boards, car show etc as nonpersonal communication channel. 7 d. Media budget One of the most difficult marketing decision is determining how much to spend on promotion. There are some common methods of determining media budget. Those are affordable method, percentage on sales method, competitor’s parity method and objective and task method. From these Toyota is using a combine approach of affordable and objective-task method. But before that they are estimating the budget depending on product life, quantity and brand value. For GLI, Navana the authorized distributor of Toyota budgeted 20-30 lakh for the current year. 7 e. Advertisement effect on sales Toyota marked GLI as a successful project in Bangladesh. To become successful Toyota is doing a lot of promotional activities. They also found positive effect on their sales from their promotional activities. As a result they able to sell 300 to 350 Gli car within 8 months. It’s a great achievement in term of selling luxury sedan. Toyota is very successful in term of their promotional activities. Also they use different types of promotional tools to become successful in Bangladeshi competitive car selling market. [pic] Problem Identification Car is marked as specialty product and also perceived as luxurious product in our country. So it’s a bit difficult to maintain a luxurious product like Toyota GLI in every segment of marketing. Although it’s a very successful project of Toyota in Bangladesh but they faced some problems. 1. Perceived value of corolla in customers mind Customers of Bangladesh perceived that corolla is a brand of common people. As GLI is a sedan of corolla segment, customers perceived that it’s not a high branded car. Although it is a corolla segment car but it is a high grade car of corolla then other corolla cars. As customers think it is a common brand car they don’t want to buy it on that amount of value. So it’s become a huge marketing problem for corolla GLI. 2. Brand name GLI Basically GLI doesn’t have any meaning. But customers want to know the meaning of it. So it creates some sort of problem to give the proper answer of meaning of GLI. 3. High price GLI is a car of high grade, so it’s a high price car. As more people wants to buy affordable car they don’t want to buy it at a high price. Also some don’t want to buy a corolla branded product at a high value. So the high price of the car creates some sort of problem. 4. Off stock delivery time Toyota uses Just in time inventory system. So they manufacture product only on demand. If the stock of GLI car comes to an end then it needs 120 day to delivery the product again through shipment. So off stock delivery time is a problem of Toyota for any car as well for GLI. 5. Rapid growth of competitors high branded cars Previously, the Bangladeshi car market was captured by Toyota. But in term of luxurious and high branded car, now Nissan, Honda and Mitsubishi entered the market with a great deal. So market becomes competitive and it’s a new problem for Toyota in Bangladeshi market. 6. Import of recondition cars Huge amount of recondition cars are importing from Japan to our country. So the new branded cars are loosing their appeal in the market. 7. Unstable car import and duty law and regulation Car import and duty law is very unstable in our country. It creates hazard for the company to do their business smoothly. Toyota is facing some problems regarding GLI. They are also trying their best to solve those problems. Moreover they marked these problems positively and from the GLI experience they will able to avoid these hazards for their up coming projects. 9. Recommendations 1. Customers perceived value- To overcome this situation marketers need to increase the brand value of Corolla GLi. They can increase brand value by adding more features than other Corolla cars, or even compared to the competitors same level cars. They can utilize the brand equity of Toyota cars that prevails in the market. They can highlight the brand GLi besides Toyota Corolla. They can differentiate GLi from other Corolla. They can differentiate GLi from other Corolla line extensions by highlighting the existing features. They can introduce new designs in terms of color, body kits etc; new features and also extra facilities. 2. High price- As the price of Corolla GLi is high; to overcome this situation marketers can add more value to the product rather than cutting the price. They can have value addition to the product- a. perceived value in terms of brand image. b. tangible value- marketers can introduce new features and design by producing new colors, body kits etc. They can avail more extra facilities and benefits in the car. 3. Though the management philosophy of Toyota that is the Just-in- time approach is not a current problem but rather is referred as a potential problem in the long run. Our recommendation would be to study and be informed about the market demand all the time to avoid any situation of being out of stock. 4. The rapid growth of competitors branded cars is a great threat to Toyota worldwide as well as in Bangladesh. The marketer should always be aware of bringing in, what are the benefits that will be available etc and plan accordingly to reduce the threat of being out of model or even out of market. References & Bibliography www. amartoyota. com www. toyota. com www. toyotahistory. com www. toyotacarzone. com Marketing Management-Philip Kotler 11th edition, Prentice Hall Advertising Principle & Practice – William Wells and Sandra Moriarty, 7th edition, Prentice Hall. www. bdnewspaper. com ———————————————- ———————– Star (Probox) Question Mark (Corolla GLi) Cash Cow (Yaris) Dogs (Crown) H igh Low Involvement Involvement Significant difference Between brands Few difference Between brands Complex Buying Variety Seeking buying Habitual buying Dissonance Reducing Buying Purchase Decision Post-purchase Behavior Evaluation of Alternatives Information Search Need Recognition Time Product Develop- ment Introduction Profits Sales Growths Maturity Decline Losses/ Investments ($) Sales and Profits ($) GLi

Sunday, September 29, 2019

Modernization Essay

Modernization is a process of modernizing a way of life. South Africa and China both attempted to modernize for a beneficial outcome. China was successful at modernizing and benefited greatly. South Africa resisted modernization and in the end suffered from harmful effects. South Africa and China both modernized in their own way. China attempted to modernize from the struggles that were present in the country. In China, modernization occurred later than then most countries; this allowed the Chinese to use other countries as a model. China began to focus on important industry’s that would help their country prosper. They began to advance in military, science, and technology, and established a strong economy by selling products to other nations. As a result of modernization China became urbanized, and industrialized. The nation also became economically stronger which made the growing nation prosper. Modernization benefited China in all aspects of a great nation. China modernization process started to begin after the Qing dynasty fell, with this the country wanted to reform which led to modernization. Modernization was a very beneficial process to china as a whole. South Africa did not benefit from the process of modernization. Modernization caused a loss of culture and society to African culture. The British came to South Africa hoping they could take over the country and modernize the country as a hole. The people of South Africa were known as the Zulus, the Zulu’s resented modernization of the British and wanted to modernize on their own. The British attempted to convert South Africans to Christianity to create modernization in the country. The Zulu’s lost the war to the British and their freedom; natives were forced to provide cheap labor to the British to make money for food. The British benefitted more from modernization then South Africans did. Modernization was not beneficial to the South Africans. Modernization was beneficial to China and was harmful to South Africa. China took years to modernize and was late in modernization but did eventually modernize and greatly befitted from it. South Africa did not benefit from modernization; they had a loss in society and culture. Modernization will always ether help a country or be harmful to the country. This will depend on how the country attempts this process as a hole and what they go off of.

Saturday, September 28, 2019

Chemistry Exam Review

Melting solid silver to form liquid silver 006 10. 0 points Which of the processes I) chopping broccoli l) baking bread Ill) burning a match involves a chemical change? 2. Pulling silver into silver wire . Ill only 3. Passing electric current Again (as) to plate out silver through 4. Dissolving silver nitrate in water to form a solution 2. II and Ill only 3. Only 4.All of these 004 10. 0 points Which of the following is a chemical property of sulfur? And Ill only 5. 6. II only . Burns in air 7. And II only 2. Melts at 119 C Dowses (vivid) – Exam review – Dowses 8. None of these – (241 27) 007 10. 0 points Which Of the properties I) conductivity II) combustibility Ill) hardness are chemical properties? 2 to identify a type of matter? 1. Density 2. Heat 3. Mass 4. Volume 2. And Ill only 011 10. 0 points Write 0. 0000072 using scientific notation. 1. 7. 2 x 10-6 4. Only 2. 72 x 10-7 5. All of these 3. 7. 2 x 10-7 6. Ill only 4. 0. Xx 10-5 7.II only 8. And II only 00 8 10. 0 points Which process does NOT involve a chemical change? 012 10. 0 points What is in between the electrons and nucleus of an atom? 1. Nothing 2. No one knows. 1. Melting of a solid 3. Water vapor 2. Oxidation of a metal 4. Air 3. Combustion 5. Smaller atoms go 10. 0 points Which of the following is an intensive property? 1. 16 cubic feet 013 10. 0 points Which scientist discovered that the atomic number, rather than the atomic weight, is more responsible for the properties of an element? (Tragically this scientist died soon after as a soldier in WWW. 00 Kelvin 2. 1. SST. Augustine 3. 3 miles 2. Chadwick 4. 4 days 3. Mosey 010 10. 0 points Which of the following properties can be used 4. Milliken 5. Rutherford 014 10. 0 points Which of the following is F-ELSE? 3 2. 45 protons; 35 electrons; 45 neutrons 3. 35 protons; 45 electrons; 45 neutrons 4. 35 protons; 35 electrons; 45 neutrons 1 The mass of neutrons and electrons are about the same. 2. The mass of a hydrogen atom is abo ut the same as a proton. 5. 45 protons; 35 electrons; 35 neutrons 6. 45 protons; 45 electrons; 35 neutrons 7. 35 protons; 45 electrons; 35 neutrons 3.The mass of protons and neutrons are 4. The mass of a proton is much greater than the mass of an electron. 015 10. 0 points How many protons are present in one V+ ion? 8. 35 protons; 35 electrons; 35 neutrons 018 10. 0 points Determine the number of protons, electrons, and neutrons in the the isotope sodium-23. 1. 11 protons; 12 electrons; 12 neutrons 12 protons.

Friday, September 27, 2019

Poets' Expression of Fillings Essay Example | Topics and Well Written Essays - 250 words

Poets' Expression of Fillings - Essay Example Wordsworth, in his poem, I Wandered Lonely as a Cloud, describes the various aspects of nature and concludes by appreciating their presence saying; Similar romantic themes are focused on the works of Donne, Frost, and Shakespeare as well as the works of Bishop, Basho, and Hardy. Many stylistic devices including imagery, symbolism, and sarcasm formed the major styles that were used to convey a romantic message to the then society. A proper choice of words with accurate rhyming schemes in these poems creates an acute rhythmic pattern enhancing their musicality and bringing out the aesthesis. For instance, Shakespeare in his poem That time of year thou mayst in me behold expresses his love for nature in a rather loving tone cultivating a compassionate mood on the readers towards nature. He says; In conclusion, poetic works during the romantic ages focused on the romance derived from various sources. The association of nature with man's ability to gain satisfaction through it formed a major theme in most of the works during this period. The theme of romance in these poems can be addressed at two levels by splitting the fused twin focus of interpersonal love.

Thursday, September 26, 2019

International Business of McDonald Essay Example | Topics and Well Written Essays - 1500 words

International Business of McDonald - Essay Example It is referred as the industrial business transactions which take place collectively among two or more nations, areas or regions. These transactions are performed in order to augment the profit margin of an organisation along with its brand equity across the globe (Eebizguides, n.d.). Notably, in recent years the scope of international business in United Arab Emirates (UAE) augmented due to low trade barriers and huge amount of Foreign Direct Investments (FDIs). In addition, UAE also offers the opportunity of free trade zones with modern infrastructure and sovereignty from foreign exchange controls. The economy of UAE also offers an easy entrance to consumer markets connecting ‘13 free trade zones’ in the present scenario (Eebizguides, n.d.). The objective of the assignment is to analyse the importance of international business and the scope of foreign investment in UAE with the motive to assist an Australian renowned fashion company, Peter Alexander to expand its busine ss operations in UAE. With this intention, the discussion of this paper will evaluate the suggestion of considering joint ventures as a mode of strategic alliance with the local companies of UAE for Peter Alexander’s penetration to the market. 2.0. Project Description and Progress Peter Alexander is a renowned Australian fashion designer, mainly known as the leader in the segment of stylish sleepwear, nightwear and gifts. It includes varied types of stylish and trendy clothes for men, women and kids. In the year 2004, the foremost stand-alone store for Peter Alexander’s products was established in the city of Melbourne, Australia with his name (Peteralexander, n.d.). The objective of this project is to propose the organisation, i.e. Peter Alexander to expand in the UAE highlighting the opportunities in the UAE fashion industry. In order to enhance the portfolio of the brand along with its distinctiveness from a global perspective, Peter Alexander can be suggested with noteworthy strategies with due consideration to joint venture initiatives to attempt towards expanding its business operations in the markets of UAE. Hence, it might also facilitate Peter Alexander to amplify the brand value and total turnover of the organisation. It might also enhance the reputation of Peter Alexander, which is extremely essential to sustain in the long run. With this concern, the progress of this particular project will be considering the virtues of joint ventures to assist in the expansion planning of the company. Stage 2 3.0. Business Matching and Networking Owing to the virtues of globalisation, the intensity of fashion events enhanced quite rapidly acting as the backbone of the emerging markets of Middle Eastern region providing a considerable contribution over the GDP of these economies. Moreover, the exclusivity of fashionable hubs also developed by a large extent due to presentation of varied shows by the leading fashion houses within the market of Dubai (S cribd, n.d.). Thus, it is advised to the management of Peter Alexander, to visit the markets of Abu Dhabi and Dubai in order to recognise its underlining opportunities and strengths by conducting a market research to evaluate the internal as well as external risks

Research tutoial Essay Example | Topics and Well Written Essays - 1000 words

Research tutoial - Essay Example Research on nursing usually falls mainly into two areas. These are qualitative research and quantitative research. Quantitative research has its basis on the paradigm of logical positivism, and it focuses on outcomes for clients which are measurable (Polit & Beck, 2010). These are generally statistics. On the other hand, qualitative research as its basis on grounded theory, phenomenology and ethnography among others (Polit & Beck, 2010). It takes into consideration of those involved in delivering the nursing care, putting more emphasis on the meaning which it holds for the individual. There are set guidelines, as well as procedures that assist the participants of nursing research to carry out an effective research. Embracement of these guidelines and procedures will help in protecting the participants as they carry out their research, as well as practice. Legal and ethical issues involve the requirements of participants on their daily work. It takes into consideration the protection of dignity with regard to the information publication in the research. Nevertheless, when nurses participate in any research, they have to put up with the society, nursing practices, and science (Sawatzky-Dickson & Clarke, 2008). The main legal and ethical issues during nursing research include informed consent, beneficence, respect for confidentiality and anonymity and respect for privacy. Informed consent is one of the main ethical issues in conducting nursing research. It is one of the means that enhance protection of the right of the patient to autonomy. It involves the ability for determination, with respect to a personal plan (Sawatzky-Dickson & Clarke, 2008). When it comes to beneficence, it includes professional mandate to carry out a significant and effective research for the purpose of serving and promoting the welfare of the constituents. This implies that the nurses should conduct their

Wednesday, September 25, 2019

Research paper from Supply Chain Proposal Example | Topics and Well Written Essays - 1250 words

Paper from Supply Chain - Research Proposal Example This is easier said than done. Although Singapore is well located and well connected by all modes of transport, the uncertainties of a supply chain have to be understood in order to achieve plan its management. Having a good range of suppliers is not enough as the chain involves logistics as well. Apart from this there are different priorities and concerns of each of them and for a specific operation the entire chain has to work on agreed schedules and timelines so that both short and excess supplies and timely deliveries are organized in a way that all links in the chain have a chance to make a fair margin. If it not a win-win situation for all stake holders then the link will break and the entire supply chain management will become distraught. In the current worldwide scenario many disruptions contribute to the disruption of the supply chain. The latest among them being terrorism that knows no boundaries and respects none. Risk management has therefore become a huge concern. The other more normal constraints are different perceptions of the stakeholders, logistics and storage issues. The objective of this research is to identify the obstacles to good supply chain management in Singapore and to suggest possible remedies. Purchase is the foundation of making an effective Supply Chain. A good purchase will often result in better margins. Organizations have specialist purchase departments. Since there are individuals who finally make decisions their judgment, whether individually or in groups, are influenced by the environment they work in. Kohli (1989) proposed that influence is a function of personal resources or power. Sheth (1973) maintains that the psychological world of the decision makers affects purchasing behaviour. This will include the special knowledge the purchaser has acquired, the training he has received, the skills he has developed and the seller networking he commands. Best Practices

Tuesday, September 24, 2019

Defining concept of design thinking Assignment Example | Topics and Well Written Essays - 2000 words

Defining concept of design thinking - Assignment Example 1). It permits people who are not trained as designers as well to utilise creative tools in order to cope with the fast range of growing challenges. Design thinking is basically a human process, which taps into people’s skills, but it is normally ignored by more traditional problem-solving method (Hunter 2015, p. 1). Design thinking depends on people’s ability to be intuitive, identify patterns, develop ideas, which are meaningful and functional, and communicate well through methods past symbols and words. No one wants to run a company of intuition, feelings and inspiration, but an over-dependence on the analytical and rational can be just as dangerous (Polsani 2010, p. 1). This is where design thinking comes in – to offer an integrated third way (Hunter 2015, p. 1). Keeping in line with that, this paper will complete a thoroughly researched essay that defines the concept of design thinking. It will explain how each and every example is linked in some way and als o discuss examples of design thinking in a real business world. Today’s organisations go through multifaceted problems and issues, which are basically part of more and more complex business models. Constant expansions of worldwide transactions, supported through partnerships, which can span huegeecosystems, create both unique challenges and unique opportunities for businesses and organisations (Polsani 2010, p. 1). The process of design thinking is best considered as a system of overlapping spaces instead of a chain of orderly steps. There are three key spaces to bear in kind including ideation, inspiration and implementation (Hunter 2015, p. 1). Inspiration is the opportunity or problem, which motivates people to look for answers or solutions. Ideation, on the other hand, refers to the process of collecting, developing and analysing ideas. And, finally, implementation is the route that leads from the

Monday, September 23, 2019

Balance lab Report Example | Topics and Well Written Essays - 250 words

Balance - Lab Report Example Record the reading The Centigram Balance, which gives a reading of 2.3 on weighing the copper slug directly, has a sensitivity of 0.1 grams, whereas the Electronic Balance which gives a reading of 2.999 for the same slug has a much higher sensitivity of 0.001g. It is important to use the same slug for both instruments to make sure that any disparity in the readings is due to the instrument being used and not because of a difference in the mass of the copper slug being measured. The Electronic Balance has a higher accuracy. This is further proved by the value obtained for average mass of a copper slug using an Electronic Balance. This value, 2.980, is very close to the reading 2.989 which was obtained when a copper slug was measured on the Electronic Balance using weight difference method. The Electronic Balance, due to its high sensitivity and accuracy is more reliable for measurement of small masses. The Centigram on the other hand has a much lower accuracy and sensitivity and is thus unsuitable for small masses. Weighing by difference is different from weighing directly because it involves taking two readings and then subtracting the two to get a value for the mass that has to be measured. Weighing by difference gives more accurate results because when the readings are subtracted then any zero error due to wrong calibration of the instrument will be removed from the final reading. In case of weighing a mass directly if the instrument contains a zero error it will show up in the reading obtained which will then be inaccurate. Conclusion: This experiment establishes that the use of an Electronic Balance as opposed to a Centigram Balance and the use of weighing by difference technique as opposed to weighing directly produce more accurate

Sunday, September 22, 2019

Police Technology Essay Example for Free

Police Technology Essay 1. Introduction A gun may be a useful tool to arrest a suspect in a traditional crime scene, but what about a crime committed on the Internet to steal billions of dollars in a few minutes or even confidential information? Will guns be useful in this case? According to Goodman, â€Å"the world isn’t run by weapons anymore, or energy, or money, it’s run by ones and zeros It’s not about who has the most bullets. Art’s about who controls the information –what we see and hear, how we work, what we think. It’s all about information.† (p.466) With the technological revolution we have nowadays, that changed every aspect of our lives representing new threats and new crimes, police officers should be equipped with new technological tools or techniques to be able to face these new challenges. This paper aims at giving an idea about police technology and how does technology help police officers by defining the term â€Å"police technology†, shading the light on history of police technology, and giving some of the impacts of technology on police work and practice. 2. Definitions To understand exactly how does technology help police officers, this section will define what is meant by both terms â€Å"technology† and â€Å"police technology†. 2.1 Technology The Britannica Concise Encyclopedia defines technology as â€Å"Application of knowledge to the practical aims of human life or to changing and manipulation the human environment. Technology includes the use of materials, tools, techniques, and sources of power to make life easier or more pleasant and work more productive. Whereas science is concerned with how and why things happen, technology focuses on making thing happen.† 2.2 Police Technology According to Encyclopedia Britannica the term â€Å"police technology† refers to â€Å"the wide range of scientific and technological methods, techniques, and equipment used in policing.† 3. Police Technology in History and Literature This section will shade the light on the history of police technology since 1840 when officers only had guns and night-light sticks, â€Å"then came technological progress with the invention of the patrol wagon and signal service (which have) effected a revolution in police methods.† (Seaskate, Inc). (See police technology timeline in Table 1) â€Å"The adoption of information technology by police departments in the united States is a relatively recent phenomenon. Before 1987, less than 2% of the 2.200 US police departments with fewer than 100 employees used computers. And as recently as 2003, only 40% of police departments had mobile computer terminals.† (CentrePience) Moving to information technology,   â€Å"only in recent years have many agencies found the use of information technologies significantly helpful. Examples include fingerprinting databases, computerized crime mapping, and records management systems doing everything from inventory property and cataloging evidence to calculating solvability factors.† (Seaskate, Inc) 3.1 The political era (1840-1920) This period witnessed technological advances such as â€Å"telegraph, telephone, police callboxes, Bertillon system of criminal identification† (Seaskate, Inc) and (Stewart, R. W.). â€Å"The advent of fingerprinting in the 1900s and of crime laboratories in the 1920s greatly augmented the police capacity to solve crimes†. (Seaskate, Inc) 3.2 The professional model era or Nationalization of Crime (1920-1970) This period witnessed efforts that tried to â€Å"rid the government of undesirable political influences and create what they deemed professional police departments† (Seaskate, Inc). â€Å"The model was the crime laboratory in Berkeley, California, Police Department then the FBI inaugurated its own laboratory which eventually became recognized as the most comprehensive and technologically advanced forensic laboratory in the world† (Seaskate, Inc). This period â€Å"saw the widespread police adoption of the automobile and the introduction of two-way radios† (Seaskate, Inc). Then, in response to rapidly rising crime rates and urban disorders, the Crime Commission was established in the 1960s (Seaskate, Inc). This period witnessed the nationalization of crime. â€Å"In 1967, the Crime Commission produced a long report that gave recommendations, 11 of them dealing with police technology (Seaskate, Inc). The President’s Crime Commission found that the nation’s criminal justice system suffered from a significant Science and technology gap (Seaskate, Inc). Then came â€Å"the advent of 911 after the commission called for establishment of a single telephone number that Americans could use to call the police† (Seaskate, Inc). The computerization for American policing was a result for the commission’s recommendations and the 911 system (Seaskate, Inc). â€Å"The 911 system became enhanced (E911) when computer got smarter, showing the telephone number, address, and in some cases, the name of the person who owned the number† (Seaskate, Inc). â€Å"One of the most important computer-based innovations in American policing was the advent of National Crime Information Center (NCIC), administered by FBI† (Seaskate, Inc). Computers also were â€Å"essential in the development of Automated Fingerprint Identification Systems (AFIS)† (Seaskate, Inc). 3.3 The Community Policing Era or Computerization of American Policing (Since 1970) The introduction of computers into policing corresponded to the beginning of the third and current era in American policing or â€Å"the Community Policing Era† from 1970 up till now (Seaskate, Inc). â€Å"In 1995, the Office of Community Oriented Policing Services (COPS) was created by the Violent Crime Control and Law Enforcement Act of 1994†. (ITI, p.3) With funding provided by COPS and other federal and state grant programs, the use of computers in law enforcement gained widespread acceptance in law enforcement agencies of all sizes. (ITI p.3) 4. The Impact of Technology on Police Work Technology has had its impacts on police work especially since the process of computerization of American policing (Figure1 in the appendices shows trends in technology use by police agencies). According to Davis, J. N., â€Å"the continuing development of computer technology has had critical impacts on law enforcement. Mobile data terminals in police cars, automatic vehicle locator systems, and computer-assisted dispatch are now commonly found in police departments. The use of expert systems and artificial intelligence by police agencies in the United States and Canada is on the increase. Examples can be found in agencies ranging from small rural Alliance, Nebraska to urban Baltimore County, Maryland†. (p.1) This section will show how does technology affect police work either in increasing effectiveness, enhancing officer safety, or assisting law enforcement agencies to meet new challenges of terrorism and cyber crimes. 4.1 Increased Effectiveness Research showed that â€Å"police departments that adopted computers together with IT management/governance practices such as CompStat did experience reduced property and violent crime and significantly increased crime clearance rates (by around 8%). Thus, researchers concluded that computers do increase the effectiveness of police work, but only if police work is substantially reorganized to take advantage of their presence† (CentrePiece, p.2). Also according to ITI, â€Å"Significant technological breakthroughs have resulted in products that have increased their crime solving effectiveness† (P.4). For example â€Å"studies led to the widespread use of night vision gear by today’s police agencies† (ITI, p.4). A technology such as fingerprint reader â€Å"has resulted in the creation of automatic fingerprint identification systems (AFIS)†. (ITI, p.4) â€Å"AFIS has resulted in the clearance of thousands of crimes that would have otherwise gone unsolved†. (ITI, P.4) The â€Å"enhanced† 911 â€Å"allowed dispatchers to see on their computers screen the address and telephone number from which a 911 emergency call originated† (ITI, p.4).   Ã¢â‚¬Å"The miniaturization of body microphones and closed circuit television has benefited law enforcement in a variety of investigative and crime prevention initiatives†. (ITI, P.4) 4.2 Changed the Role of Police and How They Carry Out Their Duties Technology has changed the role of both police officers and law enforcement agencies. â€Å"With the introduction of the Community Oriented Policing model, a dramatic change occurred in how agencies measured their effectiveness†. (ITI, P.3) The previous section showed that COPS was a result for introducing computers into policing.   â€Å"The emphasis on quick response to calls for services and the number of arrests made and crimes cleared was replaced by the reduction of crimes committed†. (ITI, P.3) â€Å"The COPS program promoted the development of close/citizen relationships with a focus on improving the quality of life on a neighborhood-to-neighborhood basis. From this effort grew programs such as neighborhood Policing and Problem Solving Policing† (ITI, P.3). â€Å"For the COPS concept to be successful officers needed timely information about crime patterns and other social problems occurring on their beats†. (ITI, P.3) â€Å"In police practice the possibility to access and use electronic records has opened up a new way of gathering information for police officers. This has created and developed new ways of working for police officers: they can gather more information when involved in operational work as well as when they are present physically at the police station†. (Borglund, E.) 4.3 Improved Record Keeping and Report Writing Computers have led to a key advantage â€Å"improved recordkeeping†. â€Å"Research showed that introducing computers for record-keeping did increase the amount of recorded ‘minor crimes’ such as larceny† (CentrePiece, p.2). According to Davis, J. N., â€Å"police report writing has also evolved with changes in technology, especially the use of lap-top computers. The continued development of new computer technologies will also bring changes in police report writing†. (p.1) 4.4 Enhances Officer Safety â€Å"Significant technological breakthroughs have resulted in products that have improved officer safety† (ITI, P.4). â€Å"Soft body armor has saved hundreds of officers from death or serious injury† (ITI, P.4). â€Å"Information used in conjunction with Computer Aided Dispatch software allowed dispatchers to warn officers of potential dangers and the history of previous calls at locations prior to their arrival†. (ITI, P.4) The use of safe weapons such as â€Å"non-lethal weapons such as the Taser, beanbag shells and pepper mace had been added to the list of force options available to officers in the field† (ITI, p.4). 4.5 Assist Local Law Enforcement Agencies Meet the New Challenges of Terrorism and Cyber Crime According to Reichert, K. â€Å"creative uses of information technology have the potential to increase the capacity and effectiveness of law enforcement in fulfilling its complex mission today. Including increased demands in the post-September 11 World†. (p.4) â€Å"The pace of the use of technology in law enforcement continues to accelerate. New technologies such as the use of DNA for the criminal investigation, the growth of AFIS and Livescan fingerprinting systems, GPS tracking, and reverse-911 software are all computer dependent systems now being more widely used by agencies around the country†. (ITI, p.4) â€Å"New hardware such as Personal Digital Assistance (PDAs) and other wireless devices such as web-enabled cellular telephones are changing the way information is collected and shared†. (ITI, p.4) â€Å"The 911 systems have precipitated the use of computerized mapping and links between 911 systems and computer aided dispatch software† (ITI, p.4). â€Å"Incident-based reporting is being implemented across the country requiring new records management software designed to capture and report crime statistics electronically† (ITI, p.4). â€Å"The 1995 Oklahoma City bombing and the 2001 attack on the World Trade Center and the Pentagon significantly increased awareness for the need to share information between law enforcement agencies at all levels of government†. (ITI, p.4) â€Å"Antiquated radio systems are being replaced so that multiple agencies can communicate during joint operations and disaster responses. Integration of computer databases is being developed for intelligence gathering and criminal investigation†. (ITI, p.4) â€Å"Detection technology, protection equipment and training are being provided to public safety personnel to meet the challenges of a nuclear, biological or chemical threat as well as an attack using conventional weapons†. (ITI, p.4) â€Å"The use of the Internet for the commission of crimes is increasing at an alarming rate†. (ITI, p.4) â€Å"Thieves, hackers, hate groups, pedophiles, cyberspace stalkers, drug cartels and terrorist groups freely use the Internet to carry out their illegal activities†. (ITI, p.4) The Internet also offers many benefits to law enforcement† (ITI, p.5). â€Å"The ability to share information between agencies and with the public has been greatly enhanced by the use of the internet†.

Saturday, September 21, 2019

History of Autism and Aspergers

History of Autism and Aspergers Pandoras Box During World War II, the large-scale involvement of US psychiatrists in the required a common language and standard criteria for the classification of mental disorders. This prompted the American Psychiatric Association (APA) to publish the Diagnostic and Statistical Manual of Mental Disorders (DSM) The first edition, DSM-I, published in 1952, included autism as schizophrenic reaction, childhood type, but provided no guidance on diagnosis. In DSM-III, published in 1980, infantile autism was lifted from schizophrenia and established as the core of a new category of pervasive developmental disorders, based on Kanners two cardinal signs: pervasive lack of responsiveness to other people and resistance to change. The age of onset was specified as before 30 months, which would rule out all kids who would later be diagnosed with Asperger syndrome. To accommodate kids who suffered a loss of skills after thirty months, there was Childhood Onset Pervasive Developmental Disorder (COPDD). In DSM-III-R, published in 1987, the manual was revised to improve the criteria for autism based on recommendations of a task force, comprising Lorna Wing, Lynn Waterhouse, and Bryna Siegel. In this revision, the word infantile was deleted, and Kanners syndrome was rechristened autistic disorder. There was no age-of-onset, and the COPDD diagnosis was dropped. It also added a new criterion Pervasive Developmental Disorder Not Otherwise Specified (PDD-NOS). This label turned out to be the most commonly used PDD diagnosis. Estimates of autism prevalence increased worldwide after DSM-III and DSM-III-R was published. The overall trend was clear: Autism spectrum disorder might be as prevalent as 1 in 100 children. After a comprehensive analysis of the Family Fund database for the UK Department of Education and Skills, PricewaterhouseCoopers concluded that the increase in autism resulted from improved diagnosis and recognition of the disability. A similar evolution was taking place in the United States, prompted by a set of amendments to the Individuals with Disabilities Education Act (IDEA). In 1991, autism was included in IDEA as its own category of disability, which enabled children with a diagnosis to gain access to individualized instructions and other services. In tandem with IDEA, state legislators passed laws making public funds available to families for early intervention therapy. The first standardized clinical instruments to screen for autism were becoming available.ÂÂ   The first attempt to develop and popularize such a tool was Rimlands E-1, and E-2 behavioral checklists. But the checklists depended entirely on parental recall rather than direct clinical observation. A childs score could differ depending on which parent filled in the checklist. In 1980, Eric Schopler and his TEACCH colleagues introduced the Child Autism Rating Scale (CARS), which was good at distinguishing autism from other forms of developmental delays, such as intellectual disability. After observing the child engage in a structured interaction through a one-way mirror, the rater scored the child on a seven-point continuum along several dimensions such as verbal and nonverbal communication, interaction with people and objects, sensory responsiveness, intellectual functioning. CARS used the spectrum model of autism in the DSM-III-R to score behaviors. Independent analyses showed that the scale was reliable and consistent, and that its score matched well with assessment by other means. In 1988, Schopler issued a second edition of CARS that could diagnose teenagers and adults. After reading the manual and watching a 30-minute video, a novice could produce ratings that were as accurate as those of seasoned clinical observers. Then, six months after Rain Man opened, an international team of researchers introduced a comprehensive tool called the Autism Diagnostic Observation Schedule (ADOS). Based on the criteria that would appear in the upcoming DSM-IV, the ADOS and a companion tool called the Autism Diagnostic Interview became the gold standard of autism assessment. *** The first international conference on Asperger syndrome was held in 1988, and Lorne Wing had lobbied the World Health Organization (WHO) to include Asperger Syndrome in the 10th edition of the International Classification of Disease (ICD), published in 1990. In 1994, Asperger syndrome was included in DSM-IV. *** Leominster, the birthplace of Johnny Appleseed, is forty-five miles northeast of Boston. In the 1940s, it was called the Plastic City as one in five residents worked for plastics manufacturers like Foster Grant, the company that turned sunglasses into a fashion. Soon it became the Pollution City as the waters of the Nashua flowed red, white, and blue. Then Foster Grant outsourced its frame manufacturing to Mexico. The defunct plant was declared a hazardous-waste site by state authorities. Two years after the plant closed, a couple in Leominster named Lori and Larry Altobelli had their second child, Joshua. When he was three, he was diagnosed with PDD-NOS. His younger brother, Jay, was also eventually diagnosed with PDD-NOS. Later on, Larry Altobelli realized that two of his friends grew up from the same neighborhood also had autistic kids. Lori, who had a masters degree in health care administration, asked parents at autism support group meetings if they had ever lived in her husbands old neighborhood. She was shocked by how many said yes. On March 25, 1990, Lori sent a letter to the CDC headquarters in Atlanta demanding an investigation. An epidemiologist arrived in town two months later to collect data. Lori had promised to keep the investigation secret to avert mass panic until she heard the city was planning to build a playground next to the old factory. She called and complained to the mayor who promised to postpone the playground. But an anonymous caller tipped off local reporters and the news went national, appearing at ABC Newss 20/20 on March 13, 1992. A graduate student named Martha Lang from Brown University found from Loris files that the number of confirmed autisms in town was lower than she had been led to believe. Some of the kids were misdiagnosed, and some parents in Loris files had never lived in Leominster at all. After failing to find evidence of genetic abnormalities in the community, the team of geneticists from Stanford suggested that the rise in autism was driven by the change in the diagnostic criteria for autism rather than a true increase in prevalence. But the media circus had long ago moved on. *** In 1995, after a torrent of inquiries from parents, Rimland ran a banner headline in his newsletter, Is There an Autism Epidemic? His answer was yes. But instead of focusing on the changes in the diagnostic criteria, he raised the possibilities that pollution, antibiotics, and vaccines were triggering the increase in new cases, citing the Leominster cluster as an example. Rimland made that statement after he read the book called DPT: A Shot in the Dark, written by Harris Coulter and Barbara Loe Fisher. Rimlands endorsement helped to spread Coulters ideas within the autistic parents community. Meanwhile, a young gastroenterologist in England named Andrew Wakefield introduced Coulters ideas into the mainstream by claiming to have discovered a potential mechanism by which the combination measles-mumps-rubella (MMR) vaccine causes brain injury. In the mid 1990s, Wakefield published a series of studies in which he concluded that measles virus might cause Crohns disease and inflammatory bowel disease (IBD). The studies were considered groundbreaking, but subsequent research failed to confirm the hypothesis. In 1995, while conducting research into Crohns disease, a mother of an autistic child approach Wakefield seeking help with her sons bowel problems. That prompted him researching for possible connections between the MMR vaccine and autism. On February 28, 1998, Wakefield held a press conference at Royal Free Hospital in Hampstead, North London, on his new studies published in The Lancet. The paper, written by Wakefield and twelve other authors, claimed to have identified a new syndrome, raising the possibility of a link between autism, the MMR vaccine, and a novel form of bowel disease. Although the paper said no causal connection had been proven, Wakefield made statements at a press conference calling for suspension of the MMR vaccine until further research. This press coverage sent shock waves through the autism parents community. In the coming years, many members of Rimlands network would become convinced that autism was caused by damage to the childs developing brain from from vaccines, vaccine preservatives, or both. Meanwhile, other researchers could not reproduce Wakefields findings or confirm his hypothesis. In 2004, Brian Deer, a Sunday Times reporter, discovered that Wakefield had failed to disclose its financial conflicts of interest; ten of the studys co-authors took their names off the paper; and Lancet retracted the study in 2004. Wakefield was stripped of his medical license in England in 2010, and the editors of the British Medical Journal denounced his study as an elaborate fraud in 2011. *** There was no question in Lorna Wings mind that the changes she brought to the DSM criteria were the primary factor responsible for the rise in autism cases. Her daughter, Suzie died of a heart attack in 2005 at age forty-nine, and her husband died of Alzheimers disease five years later. She died in 2014 at age eighty-five.

Friday, September 20, 2019

Simple Network Management Protocol (SNMP) for MIB

Simple Network Management Protocol (SNMP) for MIB SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and emergency issues will assist in many aspects such as identifying location, solving communication issues etc. In this research we will propose a SMNP based solution for effectively managing computer devices. In this research we will propose a MIB [Management Information Base] using ASN1.0 specification and also proposing a prototype on the implementation. Then based on our proposed prpotype we will evaluate. ASN for the proposed MIB has been designed as part of this research but it could not be implemented with real time implementation due to lack of resource for SNMP based developemnt. Aim: Propose a solution for SNMP based Emergency management for an organization Objectives: Research on network management using SNMP. Proposing an MIB Tree for the emergency network management Critically evaluating the proposed solution for SNMP based emergency network management. Introduction Network management is managing and maintaining different components and its functioning in a network. Network should be managed in an efficient way for avoiding different attacks. Several protocols are used for managing network. Management plays a vital role for monitoring the state of the network and analyses the performance. Among such protocols Simple Network Management Protocol (SNMP) is one which is used for monitoring the network. The main purpose of this protocol is designed for maintaining devices in network in internet protocols (IP). The network management performance can be used for transporting network information and its elements functioning (Stephen F. Bush and Amit B Kulkarni, 2001). SNMP in networks provides reliable and integrated network management. Several attacks may occur in network, for analyzing networks should be managed in an efficient way. The SNMP manages the network with the usage of different commands to the network and is useful in different networks. Th ere are several architectures for SNMP which is used depending upon the network mechanisms. It performs several operations in network for managing different components in the network. For performing all these operations SNMP uses Management Information Base (MIB) for handling components in the network. In this project SNMP and its performance in network is analyzed with the help of case study approach. The emergency preparedness is important part in network management and is equal to other maintenance works. One of the problems in network is traffic (German Goldszmidt and Jurgen Schonwalder, 2003). Sometimes the flow of data is more in network which causes traffic in network. In order to avoid traffic limited number of data should be transmitted in the network. Another problem that occurs in networks is security. Sometimes intruders may involve in network which leads to loss of data, in order to avoid this SNMP protocol performs several operations. For identifying network problems w ith SNMP components in network uses Management Information Base. Manager plays major role in managing the network. SNMP emergency services are very much helpful for the managing the network. This project uses emergency management of SNMP in order to solve problems that occur in networks (Geln E. Clarke, 2005). Hence from above context it can be concluded that SNMP is one of the protocol which helps in managing the network. Several problems may occur in network like traffic and security to the data. SNMP emergency management helps in managing the networks by performing different operations. Research Problem The network management protocols identify the communication between the network management server programs that are executing on the router or host, and the network management client program invoked by the manager. Considering these factors, it can be expected that the network management protocols contains numerous commands (Douglas Comer, 2006). The major disadvantage of constructing the network management protocols is the resulting complexity because this protocol needs an individual command for every operation on the data item. The Simple Network Management Protocol (SNMP) is useful in such types of cases. SNMP makes an interesting approach to network management. In place of defining the large command set, SNMP directs all the operations in a fetch-store paradigm. SNMP makes use of only two commands which allow the manager to store values into the data item and get the value from the data item. Other operations are described as the side-effects of the two operations. The main adva ntage of using the fetch-store paradigm is simplicity, flexibility and stability. SNMP is stable as its meaning remains fixed. SNMP is also easy to understand, debug and implement as it evades the difficulties of using special cases for every command. Finally the SNMP is flexible as it can contain the arbitrary commands in a well-designed framework (Douglas Comer, 2006). Problem Context: Importance of emergency in SNMP In the present scenarios of the Simple Network Management protocol, there are numerous of conditional factors that involves in defining the perspectives of the response in emergency SNMP (Amjad Umar, 2003). The emergency response can be used as a tool guide to the proposed scheme. The situation of the emergency can be found in the several areas of the networking management. The state of emergency can be found in many context such as market demand, failure in the key resources, shortage in the areas of the supply, in the same way there is a need of the emergency can be found in the areas of the political sciences and public administration. As in the same way in this research the point to be focused on is the emergency response of the Simple Network Management Protocols (Harold F. Tipton and Micki Krause, 2004). The factor that contributes to the difficulty in the emergency are lack of flexibility in making decision, lack of available resources, lack of response in option, failure in c ommunicating and cascading the events. To overcome these whole problems in the SNMP emergency, it must have to develop the outstanding plans that can be used for giving the training on the extensive simulation of the Emergency Response. Most of the organizations get failure only because of the one reason that is managing the emergency situations (Rob Cameron, Neil R. Wyler, Trent Fausett, Kevin Fletcher, Patrick Foxhoven and Mark J. Lucas, 2007). If the emergency situations in an organization are maintained in a superior approach then it may lead to loss in the communication, information and essential data. Hence a proper management system is required for organizing the emergency situations in Simple Network Management protocol. This protocol is used to reduce the traffic when a emergency situation is occur in the network, then the preventive measures that has to be taken are recovery, preventives in the system, improving the communication scheme, performance and work on the basis o f the propriety. Research Method: Case study is one of the best methods for researchers; these are effectively used by the people to understand the contest of the study. It is less complexity and adds strength to the data which is used in the research. The steps that is followed in this case study are * Determine the theme of the research * Select the cases and analysis the techniques for gathering the data * Preparation for the collection * Collection of the data according to the field * Estimate and analyze that data * Preparation of the report This study is to manage the emergency in Simple Network Management protocol. The organization that involves in the SNMP managements standards, that provides the major introduction to the organization management. There are several conditions that have an impact on the areas like co-operation and trading (Bill Gillham, 2000). To develop the management system in the SNMP is based on the information and communication. This includes the problems, listing the questions, describing the method that involve in the research. The key features of the report includes the detail of the Simple Network Management Protocols in the management information of specific data that relates to the successes or disappointments experienced by the organizations that were conveyed during data collection and answers or comments illuminating issues directly related to the research questions (Ben Beiske, 2007). The researcher develops each issue using quotations or other details from the data that is collected, and points out the uses of data where it is applicable. The data also includes the confirming and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that another may apply these techniques to another electronic community, network and its management to determine whether similar findings are particularly to in communities that belongs to the network (George L. Dunbar, 2005). Final report distribution includes all participants. Within the case study it has been analyzed at the first time whether the technique used with each non-profit organization under study. The assigned investigator studies each organizations written documentation and survey response data as a separate case to identify unique patterns within the data for the single organization. A detailed case study that is, written ups for each organizing management, categorizing interview questions and answers and examining the data for within group similarities and differences. Cross case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair (Kathleen Stassen Berger, 2004). Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, certain evidence that may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up focused interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. Chapters Summary: In summary, here there is a discussion about the case studies in terms of the different types of case studies which is found in the literature. The case studies are considered to be useful in research as it enable researchers to examine data at the fine level. It is an alternative to quantitative or qualitative research, case studies is a practical solution to when a big sample population is difficult to obtain. Although the case studies have a variety of advantages, so it is used for data management for having the better situations and it provide a better insights for the document in detail to which the subjects of Interest is related. Case study method has always been criticized for its lack of severity and the tendency for a researcher. It is the base for establishing reliability and generality in subjected to uncertainty when a small sampling is deployed. Some case study research is dismissed as useful only as an exploratory tool. Hence as the case study have various advantages o ver the qualitative or the quantitative researches. So it is used in this research. Summary of chapters: Chapter 2 includes the Literature review for the related research work. Chapter 3 discusses the analysis of problem requirements which is providing a solution for managing or developing emergency based system. We have used SNMP and MIB based approach to provide the design of the emergency based provision. We will be using MIB tree and ASN based design and development for this. Chapter 4 includes the development and data collection which will be obtained through SNMP Query for Firealarm and Power off. Chapter 5 covers the analysis and evaluationof results or test data, This has the effectiveness of the research and proposed solution for emergency. Chapter 2: Literature Review 2.1 Network Management Network Management is a service which employs different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. For example in certain cases the network management involves a single network advisor monitoring the network activity by utilizing an obsolete protocol analyzer. In other cases the network management involves auto polling, distributed database and high end workstations producing real time network topology traffic and changes (Network Management n.d). Architecture of Network Management Many of the network management architectures use similar set of elements, structure and relationships. The managed devices or end devices like the computer systems and network devices run the basic software which allows them in producing alerts when problems are recognized. For instance consider the exceeded user determined thresholds. The alerts received are programmed by the management entities to respond by executing one, group of actions like operator notification, system shut down, automatic attempts and event logging by system repair. Even the entities of the management can be polled for end stations to verify the values of definite variables (Network Management n.d). The polling can be user initiated or automatic but the agents of managed devices react to all polls. These agents are the software modules which first compile information regarding managed devices in which they reside. Later the information is stored in management database and is finally produced to the management entities reactively or proactively of the network management systems (NMSs) through a protocol of network management. The network management protocols include Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). Figure 1 represents basic network management architecture (Network Management n.d). Sampling Techniques Network Management involves the status information of queue occupancy, latency, load and other parameters which is available from devices like switches, networking interfaces and routers. This information of the network management is accessed by the Simple Network Management Protocol (SNMP) (Edwin A. Hernandez, Matthew C. Chidester, and Alan D. George, 2000). The Network Management Station (NMS) of the SNMP queries the agents or network devices to evaluate the status of the network links or devices periodically. The accuracy of the data measured is determined by period of sampling. A transient activity cannot be detected accurately if the sampling interval is large and a greater storage capacity is required at the NMS as small intervals consume larger bandwidths on the network. For instance, a burst of major action with few seconds is probable to be undetected with sampling interval of some minutes. To balance the accuracy with sampling several sampling techniques have been practical to the managers of network. Some of these sampling techniques are: SNMP Architecture: Simple Network Management Protocol (SNMP) is the network protocol which is used in network management systems. This protocol is designed to administer the devices on an Internet Protocol (IP) network. It collects the information from different network devices such as routers, servers, hubs on an internet protocol. It is used for managing complex networks. The SNMP architecture consists of different set of components such as network management system and the SNMP agent and the managed device. The managed device is also known as the network elements. It is connected to the data network. The SNMP agent collects the data from the managed device and transforms it to another format using SNMP. This agent acts as a server, switch, hub and many others. The NMS is the one of the module of the SNMP which basically executes the applications which can manage and control the managed devices like physical devices such as routers, network interfaces and software. They manage the remote monitoring of these managed components and do the sampling. Then after do the analysis of the collected information and finally gives the presentation of the information (Steven Karris T, 2004). All the devices in the architecture are referred as managed devices. The managed device in the architecture acts as an SNMP agent which facilitates the network management syst em to recover the status of managed device. All the available information of the managed devices is been addressed through management information base (MIB). There are two types of MIBs. They are scalar and tabular. The scalar object of MIBs denotes the single object instances and the tabular objects of MIBs define the multiple object instances. If the network management system recognizes which device to be managed in MIB then it changes the MIB objects with the relevant requests to the agent of SNMP. The information of MIB is loaded into the network management system with the help of MIB file. The network management system acts as the master device where as the managed device and the SNMP agent acts as a slave device. It provides security by preventing unauthorized users to gain access on the system. This security is performed with the help of community string. This string acts as the password and groups the data either to read-only or read-write areas (Thomas Porter, 2006). The ap plication server of the SNMP agent is designed to run the specific applications. The SNMP agents and the network management systems communicate each other with different set of operations such as read, write and trap. The NMS requests the SNMP agent through read operation and it sends the information through write operation. The notifications are sent from SNMP agent to NMS through trap operation. Hence from the above context it is understood that SNMP is used in many applications. It is implemented in many operating systems. The storage network of the SNMP architecture consists of switch and the hub which acts as the interface between the components. All the devices such as managed devices, MIB are connected only through storage network. Tape library contains more than one tape drives which stores bulk amount of data. It acts as a SNMP agent. The SNMP agent translates the whole information. Different SNMP versions are derived to increase the performance of the system. SNMP ahs the followings: Network Element: if any tool connects to the network then that tool can be called as network element. Some of the tools like gateways, hosts, terminal servers, servers, switches, firewalls, and active hubs. Management station: this station includes a platform which contains software in SNMP that manages and controls the network elements. SNMP agent: it is a software management agent which is responsible for executing the functions in the network management after receiving the messages from the management station. SNMP request: a message which travels from management station to SNMP agent in the network device. SNMP trap receiver: it even receives the notification messages from SNMP agent on network devices. Management information base: it is a method which identifies the elements in SNMP database. SNMP Architecture Simple Network Management Protocol is very popular not only because of its simple operation but also due to easy of usage. This protocol is very useful for manufacturers and seller as it is easy to use SNMP technology for the manufacturers while adding network management functions to their products (Kerrie Meyler, Cameron Fuller, John Joyner Andy, 2008). Components of the SNMP Architecture: The SNMP architecture mainly contains two components, managers and agents, apart from standards which are used for controlling the interactions between components. By using SNMP commands, these managers and agents communicate with each other. These commands are explained in RFC 1157. Here, the managers organize the functioning of agents. The agents provide the data to the managers by interacting with the devices like routers and computers. These devices are also known as managed devices (Ramadas Shanmugam, R. Padmini S.Nivedita, 2002). The protocol used for communication between manager and agent is referred as SNMP. Generally, the SNMP managed network consists of three components; they are (Deon Reynders Edwin Wright, 2003): * Managed devices. * Agents. * Network-management systems (NMSs). Managed devices: It is a network node which includes SNMP agent which exists in a managed network. These devices gather and store the management information. By using SNMP, managed devices enable the management information to network-management systems (NMSs). It also responsible for querying the agents by using SNMP commands. Managed devices can also be known as network elements, these can be any type of devices like routers, switches, hubs, access servers, bridges, IP telephones, printers, or computer hosts (Gilbert Held, 2003). Agent: It is a network-management software module which exists in managed devices. Agent software represents one or more program modules which operate within the managed devices like bridge, router, workstation or gateway. Each of the managed agent stores information and provides these information to the manager after receiving the request from the manager. It translates the management information into a well-suited form with SNMP (Deon Reynders Edwin Wright, 2003). Network-managed systems (NMSs): This system performs applications that examine the managed devices. It provides a large amount of memory resources for network management. In any managed network, there should one or more number of NMSs (Gilbert Held, 2003). SNMP operations SNMP reads or writes the values in applications from SNMP devices. There are four basic SNMP operations, they are Get, Get-next, Set and Trap. Get and Set are the basic operations which are mostly used for reading and writing data to a node which are identified by a specific OID. It also requests the values of one or more SNMP objects and sets the values of SNMP object. Get-next reads the content of the tables at a time and steps through MIB hierarchy. Trap is an asynchronous notification from server (agent) to client (manager) which reports the occurrence of an interesting event. It sends the information in the form of packet to SNMP (Evi Nemeth, Garth Snyder Trent R. Hein, 2006). Basic commands of SNMP Commands are explained in RFCs, there are many RFCs which relate to SNMP components. The importance of these RFCs is it describes the operation of the protocols. Generally, there exists three RFCs; they are RFC 1155, RFC 1157 and RFC 1213. RFC 1155 used for Structure of Management information (SMI), it explains about the data types and structure that should be used for managed objects. RFC 1157 is used for Simple Network Management Protocol (SNMP), it describes protocol and operation of SNMP. RFC 1213 is used in Management Information Base (MIB) (Philip Miller, 1997). By using four basic commands in SNMP, managed devices are monitored and controlled. They are namely read, write, trap, and travel operations (Deon Reynders Edwin Wright, 2003). Read command it is used by NMSs, in order to monitor the managed devices. NMS inspect various variables which are maintained by managed devices. Write command to control managed devices, these commands are used by NMS. The variables in the managed devices are changed by NMS. Trap command- these commands are utilized by the managed devices to asynchronously report the result to the NMS. Whenever there are certain results in the managed devices, then managed devices send rap to NMS (Deon Reynders Edwin Wright, 2003). Transversal operations- NMS make use of these operations to identify the variables which supports managed device and also collects the data in variable tables like routing table. SNMP Network Management Managing a network is very difficult task for any administrator as it deals with huge number of nodes and protocols. The best way to keep track of all the nodes that exists in a network is to identify and implement an effective protocol which can allow a user to read or write a particular piece of information. SNMP is one of the network management protocol preferred by most of the network administrators in organizations. SNMP can be available with three versions; each has enhanced features when compared with its previous versions. SNMPv3 can offer high security features while managing organizational network. A network manager in an organization has to play a key role in managing the networks. Using of SNMP for network management can be advantageous as it can solve most of the problems that exists in a network (Sebastian Abeck and Adrian Farrel, 2008). Thus, performance of network mostly depends on the network protocols used by the administrator. Network management using SNMP protocols can be identified as a request/reply process. SNMP makes use of request messages like GET and SET while managing a network. Through GET request a SNMP server can retrieve the required information from a node where as SET request can stores specific information on a node. SNMP servers mostly use GET requests in order to manage a network. SNMP implementation efficiency largely depends on these requests and replies from the nodes or servers (Dinesh Chandra Verma, 2009). A network administrator has to recognize the network details before implementing SNMP protocols. Client programs in networks can be utilized by network administrators in order to display the actual details of a network. While displaying network details a client program acts like an interface. When a user or administrator wants to access specific information, a request must be sent to the server. For sending request to particular node, a client program makes use of SNMP protocols. R equests from the users will be received by SNMP servers running on the specified node. SNMP server processes these requests and finds the information required for a user. Finally a client program will display the information based on the response received from SNMP servers. The major aspects that has to be understood in SNMP network management is, how a user can specify the information request and how a server recognizes the required information (Larry L. Peterson and Bruce S. Davie, 2007). SNMP makes use of Management Information Base (MIB) for retrieving the required information. MIB performs the function of identifying information from SNMP databases. As SNMP uses MIB, a particular syntax for the requests has to be specified. For implementing SNMP with MIBs a standard specification like ASN.1 can be used. A SNMP client agent keeps an ASN. 1 identifier in MIB, SNMP server searches the required information based on the identifier specified by the client. For managing a network SNMP makes use of various network components. Every SNMP agent will interact with MIBs and Network Management Systems while managing a network (Monique Morrow and Kateel Vijayananda, 2003). Hence from the above discussion it can be understood that, SNMP operates in client/ server mode which establishes virtual connections with the servers to provide information to the Network Management Systems (NMS). The information provided to NMS can provide the devices status at a particular time. MIB in SNMP refers to the databases controlled by SNMP agents and SNMP servers retrieve the information based on MIBs in networks. Network management through SNMP can be an effective and most used method in present organizational networking environments. Many large organizations use SNMP tools for managing their networks effectively. Why SNMP SNMP is defined as simple network management protocol. Network management system will make use of SNMP for communicating with various network objects. SNMP is mostly used for the remote management of network device. SNMP is widely used because it easy to use and user can easily add the network management functions to their new or existing products. SNMP runs on various devices like network tools, core network devices and office network tools (Ray Rankins, Paul Jensen and Paul Bertucci, 2002). SNMP allow network and system administrator to access network devices that are present in their networks such as server, routers etc. SNMP for the management of network device contains one SNMP station and management station. Management station is mainly utilized to arrange the network elements and to receive the SNMP traps from those elements. By making use of SNMP, network monitor can observe changes and alerts that are identified in the network elements. If the size of network is increased th en method called management is required. In SNMP errors obtained are varies from one agent to other agent but will include system failure, disk warning etc (Harold F. Tipton and Micki Krause, 2004). If the device passes an alert to the management station then network management itself involves in rectifying the problem. Time to time configuration request should be send to the device. If provided string is correct then automatically configuration of the device will change according to the requirement. Organizations can identify the status of all equipments and can also perform remote trouble shooting. SNMP is nothing but a protocol that is used to develop and manage nodes that are present in the network system. SNMP allows system administrator to work on the problems that are executed in the network and should plan for the growth of network. Network management service will identify the changes that are done in the network devices based SNMP (Douglas R. Mauro and Kevin James Schmidt, 2005). SNMP consists of three features; they are managed device, agents and network management system. Managed device is usually a network node. It contains SNMP agent that is located on a managed network. Management data that is gathered and stored will be available to network management system of SNMP. Managed devices can also be called as network elements. An agent is nothing but network management module software module which is present in the management device. This device has great knowledge on local management information and this information can ne transferred to SNMP. NMS usually carry out applications that can manage and control the managed device. Hence from the above discussion it is identified that SNMP is a protocol which can help in managing the networks. Why MIB Management Information Base (MIB) is an essential component for handling a network. The importance of MIB increased as it comprises data definitions for managed objects. For managing the networks through SNMP protocol, an information base is necessary. The information base must allow a user to retrieve required data. MIB provides the facility of managing databases in SNMP agents. Managed object instances stored in MIBs will be exchanged between SNMP agents and managers (Stephen B. Morris, 2003). Thus, MIB is necessary for managing the information while implementing SNMP protocol in networks. Managed objects in MIB will be specified with a unique identifier, a user has to send request regarding information by following a particular syntax. MIB in SNMP also helps in recognizing the present status of a network device. Identifying the network information in case of small networks can be done very easily as the host names and IP addresses can be available to the users directly. But in lar ge networks, a MIB