Wednesday, July 31, 2019

Shareholders Rights

Requirements for Valid Action at a Shareholder Meeting * Read statute, bylaws and articles * 1. Authority for the meeting * 2. Proper notice (or waiver of notice) * 3. Quorum * 4. Required number of votes cast in favor 1. Authority for Meeting * The meeting must be authorized * Look to statute and bylaws for authorization * Annual meetings MBCA  §7. 01 * Special meetings MBCA  § 7. 02 * Court ordered meetings MBCA  § 7. 03 * Who may call a special shareholders meeting? 2. Proper Notice * See MBCA  § 7. 05; Del.  § 222 * a) Must the meeting notice state the purpose of the meeting? Annual meeting MBCA  § 7. 05(b) * Special meeting MBCA  § 7. 05(c) * NOTE: A number of provisions in the applicable corporation statute will contain special notice provisions. See, e. g. , MBCA  §10. 03(d) * b) Who is entitled to notice? * generally only shareholders entitled to vote MBCA  § 7. 05(a) * only shareholders on record date MBCA  § 7. 07; Del.  § 213 * Note: In some cases sha reholder who are not entitled to vote are entitled to notice. See, e. g. , MBCA  §Ã‚ § 10. 03(d) & 11. 04(d). * c) What about electronic notice? * See MBCA  § 1. 1(c); Del.  § 232 * d) Can notice be waived? * Notice (or a defect in a notice) may be waived expressly or by participation in the meeting. See MBCA  § 7. 06; Del.  § 229 * e) What notice is required in the case of an adjourned meeting? * See MBCA  § 7. 05(e) 3. Quorum Requirement * See MBCA  § 7. 25(a); Del.  § 216 * a) Can a greater or lesser quorum be authorized? * See MBCA  § 7. 27. The articles of incorporation may provide for a greater than majority quorum * See MBCA  § 7. 25 Official Comment 5 (lesser quorum) * Compare Del. 216, which also permits the bylaws to vary the quorum requirement * Why would a corporation permit a lower than majority quorum? * b) Can shareholder, by withdrawing from a meeting, break a quorum? * See MBCA  § 7. 25(b) (no) * Not all corporation statutes (e. g. , Del. ) add ress this issue * There is some case law contra to the position adopted by the MBCA 4. Required Number of Votes * Traditionally the required number of votes is a majority of those present in person or by proxy. See Del.  § 216 * The Revised Model Act takes a different approach. See MBCA  § 7. 5(c) * What is the difference between the Del. approach and the MBCA approach? * What about elections of directors? * The trend is to merely require a plurality of votes cast. See MBCA  § 7. 28(a) and Del.  § 216 * What is cumulative voting for directors? How does it compare with straight voting for directors? * See MBCA  § 7. 28(c); Del.  § 214 * What are the advantages of cumulative voting? * What are the possible disadvantages of cumulative voting? * Only a small minority of states require cumulative voting * Of those that permit cumulative voting, most (including the MBCA and Del. are â€Å"opt in† statutes * Why does the MBCA require notice before cumulative voting is pe rmitted? * How valuable is cumulative voting? * a) Can the amount of votes required for shareholder action be increased? * See MBCA  § 7. 27 and Del.  § 216 * Del. allows supermajority voting requirements to be placed either in the certificate or bylaws * b) Some types of shareholder action have special voting requirements * Some types of action require a majority of the votes entitled to be cast. See, e. g. , MBCA  § 10. 03(e) * Non-voting shareholders may have statutory right to vote on some things.See Del.  § 351 * IT IS IMPORTANT TO READ THE STATUTE What about meeting minutes? * Is a meeting valid without minutes? Supermajority Quorum or Voting Provisions * The ability to raise quorum and vote requirements provides a tool that may be used to protect minority shareholders * Use of this tool increases possibility of shareholder deadlock * Is deadlock necessarily bad? Determining Who is Entitled to Vote * How does a corporation determine who is entitled to vote (and to noti ce)? * See MBCA  § 7. 07 * What about beneficial owners? * See MBCA  § 1. 40(22) and Del. 219(c) * See also MBCA  § 7. 23. There is no equivalent Del. provision Proxy Appointments * Does a shareholder have to be present in order to vote? * See MBCA  § 7. 22 and Del.  § 212 * Why is a proxy appointment generally only valid for a limited period of time? * MBCA (11 months); Del. (3 years) * When is a proxy appointment revocable? * Generally this is a question of agency law * The MBCA has a detailed provision on revocability * A number of problems can arise from the use of proxies. One is that of conflicting proxies * Is an e-mail, telegraphic or facsimile proxy valid? See MBCA  § 7. 22(b); Del.  § 212(c) & (d) * While the typical corporation statute does not impose significant requirements as to the form of a proxy, the SEC proxy rules do impose requirements for publicly held corporations * See SEC Rule 14a-4, suppl. p. 1671 Conduct of the Meeting * The Revised Model Act now includes some rules governing the conduct of a shareholder meeting. * See MBCA  § 7. 08 * There is no comparable Del. provision * The bylaws of a Del. corporation may include provisions similar to the rules in the MBCA. Cf. sample bylaws, suppl. . 1117 Election Inspectors * The Revised Model Act and the Del. Act require some corporations to have election inspectors and set out the duties of such inspectors * See MBCA  § 7. 29. See also Del.  § 231 * In other corporations, the bylaws may provide for election inspectors Action by Written Consent Without a Meeting * Do you have to have a shareholder meeting? * Action may be taken by signed written consent without a meeting * See MBCA  § 7. 04 and Del.  § 228 * Notice may be required to nonvoting shareholders or, in Del. to non-consenting shareholders * Read the applicable statute! * Can the written consent procedure be used in publicly held corporations? * Why or why not? * Can a written consent be revoked? * See MBCA  § 7. 04(b) Welcome to the 21st Century To what extent may electronic forms of communication or participation be used? * Can notice be given electronically? MBCA  § 1. 41(c); Del.  § 232 * Can a person participate in a meeting without being there? Del.  § 211(a); MBCA  § 7. 09. * Can a meeting occur completely in cyberspace? Del.  § 211(a)

Tuesday, July 30, 2019

Budgeting Management

My process of writing these three essays on budgeting management was most helpful to me, I believe, in the sense that it actually helped clarify the various processes about which I wrote, providing me greater conceptual awareness of budget management planning, processes, and content. Of the essays I completed, I must admit that I like various parts of all of them, but feel that my third essay was the best. By then I was more confident about what I was writing. Overall, what I learned from writing all three essays, an insight that will, I believe, remain with me long after this course, is that one learns a great deal more about a subject from writing about it. My third essay was the best-focused of the three, and most detailed and specific. It was the end result of much thinking I had done. My best sentence, within that essay was (I feel): â€Å"The top management, working with the financial department, will need to establish which projects bring highest added-value to the company and to spend the company's budget on those alone†. Writing that sentence helped me write the remainder of the essay, and then to rewrite everything before and after it. I also felt a special connection to the type of essay that this third essay was (â€Å"persuasion†), since, while learning and writing about this material, I was persuading and being persuaded (i.e., educated) about â€Å"the importance of the planning function in the overall budgeting activity and will be arguing for the many ways the budgeting planning function is coordinating with the company's strategic planning†. However, another good sentence I wrote was the first sentence of my first essay: â€Å"Budgeting is one of the fundamental concepts in managing a business and it is often up to the budgeting policies that the managers decides upon that will conclude if the company is going to make it in the industry or not.† This sentence also helped me to clarify, in my own mind, the importance of the topic I was writing about, and guided the rest of my thinking, through it and the other two essays. With these essays as background, I feel that I was able to write a good research paper, especially since I had learned, from previous writing processes, about not only structure, but key functions of a research paper: to present a thesis statement based on careful thought and inquiry, and then to defend that thesis statement with facts and research. Most writing concepts introduced in the course were not new to me, although applying those concepts, within the particular context of materials at hand, was new. One important writing concept I was able to apply within these essays was synthesis. In my third essay, the final two sentences, I believe, synthesize my argument: â€Å"You cannot have a successful planning or organizing within a company without correlating these with the budgeting function, in order to obtain the realistic backup of any project. Budgeting and planning go, in this sense, hand in hand, and you cannot really have one without the other in the company.† One other process that helped me a great deal (although at the time, I did not particularly care for it), was writing and rewriting multiple drafts, a process I do not often experience in other courses. Not only did writing multiple drafts help make my papers better mechanically, grammatically, and in terms of â€Å"hard thinking†, but it also gave me more confidence that I could really write well. I think, though, that my grammar still needs a little improvement, and in places, my punctuation does too. Overall, though, I sincerely feel that I have given my writing for the course my best effort. I suppose one can always try a little harder, but in my case, one could not try too much harder than I have tried this term. I gave the course, and my writing, my best efforts, not so much for the grade (although grades are important to me), but rather, because I really wanted to learn the material. Writing was integral to my learning. Moreover, my family knows I have given this course, and my writing, my best effort, because they have witnessed first-hand all the time and effort I have put in, and all the thought (often aloud) that I have given the subject matter for this course. In all of those respects, then, I am very proud of the work I have done in this course during the term. I focused on it; I endeavored to learn all I could; and I aimed to do work of a quality I could both be proud of and learn from in the future.

Monday, July 29, 2019

Nutrition questions Essay Example | Topics and Well Written Essays - 250 words

Nutrition questions - Essay Example l as maintain his health because imbalances in the diet with inappropriate amount of nutrients might result in health problems(Insel et al 2007 and Caldwell et al 1981). 2. Suggest the dietary amounts (in grams) of carbohydrates, proteins, and fats a person will need on a balanced diet if he/she requires 2500 kcalories per day . Explain the reasons for the values that you have chosen to use in solving this problem and show your work. Explain why this is considered a balanced diet for a normal individual. Answer: The acceptable range of carbohydrates, proteins and fats that are allowed in the diet is 50 %, 30% and 20 % percent respectively. These values fall in the normal recommended range according to the Acceptable Macro Nutrient Distribution Ranges (AMDRs). This is considered to be a part of a normal diet because these constituents are all present in the right amounts which are necessary to be consumed by an individual (Insel et al 2007 and Caldwell et al

Sunday, July 28, 2019

Why was violence so intence in the late 20th centry in America Essay

Why was violence so intence in the late 20th centry in America - Essay Example African American women and men were much more prone to be victimized by rape or murder than lynching, and they endured all kinds of violence every day, especially during the latter part of the 20th century (Markovitz 33). In spite of, or even due to, its uncommonness, lynching carried a particular psychological power, raising a degree of terror and fear that engulfed all other kinds of violence in the 20th-century America. As illustrated by Jean Toomer, the shouts of a single mob may sound â€Å"like a hundred mobs yelling† (Wood 1), and the image of violence and terror kept on burning long after it was done. All the daily violence and degradations that black southerners experienced may, actually, be filtered into the occurrence of lynching, so that it becomes the main depiction of racial oppression and injustice all together. This essay explains that the intense violence in the latter part of the 20th century in America, especially as regards lynching, is largely characterize d by violence against African Americans. 20th-Century Lynching: The Violence of America Lynching took on an enormous symbolic force specifically because it was unusual and concretely frightening. This violence that a massive number of white audiences watched as victims were tortured and hanged was the most terrifying image. The utter cruelty of the mobs, and their blatant disrespect of the law, astonished and frightened because they go against universal beliefs of what cultured individuals should or may be capable of (Holmes & Smith 17). Nevertheless, African Americans did not have to witness a lynching to be frightened by it, to sense that ‘penalty of death’ was lingering over them every day of their lives (Wood 26). According to Wright, â€Å"The white brutality that I had not seen was a more effective control of my behavior than that which I knew. The actual experience would have let me see the realistic outlines of what was really happening, but as long as it remai ned something terrible and yet remote, something which horror and blood might descend upon me at any moment, I was compelled to give my entire imagination over it† (Holmes & Smith 19). It was the scene of lynching, instead of the brutality itself, which inflicted some psychological injury that imposed black submission to white supremacy. All the more, mobs carried out lynching as a show for other white folks. The tortures, the procedures, and their later images sent powerful messages to the white people about their alleged racial supremacy. These exhibitions generated and propagated representations of black inferiority and white superiority, of black wickedness and white harmony, which served to implant and reinforce a sense of racial domination in their white audiences (Pfeiffer The Roots of Rough Justice 94). Hence, lynching was successful in acting out and preserving white supremacy not merely because African Americans were its victims, but also because white folks were its audiences. Even though lynching is at the heart of a long custom of American vigilantism, lynching grew considerably in both prevalence and severity after the Reconstruction and Civil War, reaching its peak from the latter part of the 19th century through the 20th century. During this period, lynching became a largely racial practice, as southern white folks tried to regain their power in the face of the possibility of social independence, enfranchisement, and emancipation of African Americans (Pfeiffer Lynching Beyond Dixie 21-22). Verifying the precise number of lynching that was performed in the 20th century is a very difficult undertaking, because the definition of lynching was largely contested, and groups like the Chicago Tribune, the Tuskegee Institute, and the National Association for the Advancement of Colored People (NAACP) held

SHIPPING FINANCING METHODS AN INOVATIVE FINANCING METHOD Essay

SHIPPING FINANCING METHODS AN INOVATIVE FINANCING METHOD - Essay Example The shipping company needs to show they can provide the necessary collateral in order to finance their ventures. With the expansion of modern economics, financiers, by using financial engineering, have created many sophisticated financing methods. The source of shipping finance that is more appropriate for a particular shipping company depends upon the type of company, its capital structure and the company’s estimated profitability for the future. Of course, shipping investments demand funds well beyond any retained earnings. Furthermore, additional financing will be needed for further expansion of the company. The shipping industry traditionally relied on commercial banks financing the capital needs. Shipping companies because of their ability to raise the funds needed through bank financing were not very familiar with public offerings. In the last decade with the crisis in the shipping industry, traditional sources of shipping finance have played a more streamline role than in the past and the importance of less traditional shipping finance sources such as capital markets has increased. This has been shown by the growing importance of public offerings and private placements for the purposes of raising primarily equity and debt funds in the capital markets over the second part of the 1980s and the early 1990s. The availability of debt finance has proved successful in prosperous markets. However, when the return on assets exceeded the cost of debt during the shipping crises of the 1970s and 1980s, the return on assets became greatly exceeded by the costs of debt, causing many difficulties with debt servicing. Equity reduces the financial risk from the use of debt as opposed to business market risk, generating from the fluctuations in revenue and cost levels. Innovative sources of ship finance cannot only contribute to the industry equity base, but also supplement debt funds from traditional sources. In traditional financing, a percentage of 80% is

Saturday, July 27, 2019

Cased based essay- Treatment, rationale and management of the iskemic Essay

Cased based - Treatment, rationale and management of the iskemic ulcer - Essay Example Other important findings in the history include presence of intermittent claudication of the left lower limb since one year. John is a chronic smoker. He decreased smoking since one year after onset of claudication symptoms, following advice from a physician. However, he has not been able to completely quit smoking. During the current visit to the hospital, there is no history of fever or any other symptoms. The patient complains that the onset of ulcer started after he began to wear new slip-on shoes with narrow toe box. The patient reported being allergic to penicillin. There is no history suggestive of occupational injury, trauma, varicose veins, previous history of lower limb wounds/ulcers/gangrene, history of amputations and history of any other surgeries. There is no family history of similar ulcers either. The patient is not suffering from any collagen diseases. He is not on any anti-inflammatory drugs or steroids. The condition of the patient is stable. He is afebrile. He looks well nourished. Vitals signs are stable. Systemic examination is within normal limits. The ulcer is located over the lateral malleolus of the left leg. The size of the ulcer is 3cm in length, 2 cm in width and about 0.5 cm in depth. The borders are regular and the wound appears punched out and clean. The color of the ulcer is yellowish. There is minimal granulation tissue. The exudate from the ulcer is mainly serous and minimal. The surrounding skin appears pale, non-edematous, shiny and has decreased hair. Dorsalis pedis pulsation appears normal. Lower extremity ulcers are very common in patients with diabetes and infact, these are the most common causes for limb amputation in diabetic population (Armstrong and Lavery, 1998). Factors which contribute to the development of ulcers in the diabetic population are diabetic neuropathy, peripheral arterial disease and structural deformity (Armstrong and Lavery, 1998). From a podiatrician perspective, it is very

Friday, July 26, 2019

Archaeology through DNA analysis Essay Example | Topics and Well Written Essays - 5000 words

Archaeology through DNA analysis - Essay Example An example can be seen through a recent discovery which led a group of researchers' claim into having been able to positively identified the remains of Copernicus-the first astronomer who theorized that it is the Sun, not the Earth, that is in the center of the universe. Such findings have put an end for years of debates and speculation over the location where the 'unsung hero' was exactly buried. The article ensues from the discovery of a grave and remains under the floor tiles of the cathedral where Copernicus was purportedly buried by Polish archaeologist Jerzy Gassowski and his team last August of 2005. Hence, a thorough examination of the article suggests that there is heavy dependence on the field findings for which the resources for the DNA analysis were indeed drawn from. Such were the tooth and a femur bone of the remains that were matched with a separate finding of two strands of hair from one of the said astronomer's books. Furthermore in support of the result through a dissimilar process, experts' reconstruction of the skull shows distinct indications of several facial features from Copernicus's portraits. This includes a broken nose and a cut above the left eye which coincides with a scar mark. The reconstruction also paved way to a visualization of Copernicus's face in flesh. On account of the quantitative significance of these field findings, it can still be assumed that the performed DNA analysis endowed such findings with more meaning. Through the DNA analysis, experts and researchers were able to merge the "minor" individual discoveries (i.e. the suspected remains, the hair in Copernicus's book and Copernicus's portraits) into a more conclusive and well-harmonized "major" discovery. Consequently, this article demonstrates that archaeology is not enclosed within pure discoveries but it also concerns verification of those discoveries. And now, with the advancement of technology, we are stimulated by the fact that even the smallest and most seemingly marginal of field findings before, that of a single strand of hair can also possibly yield significant contributions to the verification of a major discovery. It is important to note then that "minor" discoveries can be as relevant as "major" discoveries such that the former also constitutes the latter. With the technology of DNA analysis at hand, it can be presumed that archaeologists today are faced with deeper challenges on extracting and handling evidences from archaeological sites and in material resources. More so, the article also illustrates another magnificent advancement in technology. That is, the ability of experts today to generate a flesh visualization of deceased beings-whether humans or animals, through the reconstructions of their skulls. With this, the public may become more interested and be able to relate more with history as they are being discovered. Study of Migration in Africa through DNA analysis Another popular function of DNA analysis, which has been mentioned earlier, is genealogy detection. Recently, this technique has been used by Stanford University researchers in order to determine traces of ancestry between two regions in Africa at different periods of time. This has led the researchers to have successfully established that animal-herding methods were brought to Africa through migration rather than through the sharing of knowledge in between groups of

Thursday, July 25, 2019

Weapons, Personal Protection and Use of Force Essay

Weapons, Personal Protection and Use of Force - Essay Example Heller, in the year 2008, the Supreme Court of US held that the second amendment empowers a person to have a gun for personal use. It allows individuals to keep loaded gun for personal safety and security. In the case of McDonald v Chicago in the year 2010, the Supreme Court admitted the rights of states and the federal government (Gutmacher, 2006). Weaponry Laws of the US In the United States of America the sale, purchase and possession of firearms and their use come under the purview Weapons laws. State laws of each state differ from each other and are not dependent on federal firearms laws. However, sometimes they are wide and sometimes they are narrow in terms of its scope. Take the example of some of the states which have put ban on assault weapon which are similar in nature of federal assault weapons bans. There are 44 States wherein state constitutions are identical to the Second Amendment of the U.S. Constitution. The names of those states are California, Iowa, Maryland, Minn esota, New Jersey, and New York. The statutory civil rights of the New York are similar to the Second Amendment of the US Constitution. In the McDonald v Chicago it was held by the Supreme Court that the protections of the Second Amendment are applicable against state governments (Lott, 2010). The owners of the fire arms are to abide by the laws of state where they live in. It has nothing to do with their place of temporary or permanent residence. The weaponry laws vary from state to state. The State of Florida allows an individual to carry concealed weapons and firearms. In many states, an individual is not allowed to carry out firearms therefore, it is necessary to check the state laws of weapons where one intends to visit (Lott, 2010). In so many states of US, firearms laws are restrictive and have no comparison with federal firearms laws. However, the state and local police are not legally bound to comply with federal weaponry laws (Lott, 2010). Personal Protection Eligibility C riteria In order to possess firearms for personal safety and security, the US citizen has to meet the following requirement (Eligibility Requirements for a License to Carry Firearms): legal resident 21 years of age No outstanding warrant No current restraining order / suspension / surrender order No confinement for drug addiction or for use of alcoholism. In case of cured for addiction / alcoholism, submit registered physician certificate No confinement to hospital for mental illness. On rehabilitation, an individual has to submit a certificate from registered physician that now he or she is fit for use of firearms in his or her self defense Permanent disqualifiers are those offenses who are punishable for more than 2 years of imprisonment. Personal protection as per US law is a complex right. On the one hand, it gives honors to the inherent rights of a citizen to keep and use firearms for personal safety and security. The provision of firearms to each and every citizen has shaken t he faith and confidence of the citizens in the rule of law. The issuance of firearms license means that the states or federal government absolved from its first and foremost responsibility to maintain law and order in their administrative jurisdiction. By virtue of given right, one can take his or her revenge from any other person or to intimidate someone with the use of firearms to settle his or her score (Mauser, 1996). However, use of firearms for personal protection can be differentiated from all other reasons of using firearms. Personal protect

Wednesday, July 24, 2019

Demographic Decline, Black death, and the Ottoman Turks Essay

Demographic Decline, Black death, and the Ottoman Turks - Essay Example The worst illness to strike during this time was the Black Death or the bubonic plague. Fleas that arrived in Europe from Asia spread this disease. Most people that contracted the disease died, leading to population decline. The Ottoman Turks played a peripheral role in the history of Western Europe. The loss of the Byzantine Empire and a Christian lineage stretching back to the Emperor Constantine was more psychological than anything else. Trade continued to flow through Constantinople, now called Istanbul. The Turks did press into areas in Southeastern European areas such as Bosnia, Herzegovina, Serbia and Morea. This provides much of the ethnic tension still present in the Balkan region to this day. But most of the Turkish expansion was Southwest into the lands of the Arabian Peninsula. After they captured the holy cities of Mecca and Medina, the Ottoman Turks importance was elevated throughout the Muslim world. The Ottoman Turks were important in Western European history as a peripheral

Tuesday, July 23, 2019

Personal Development in Accounting and Finance Essay

Personal Development in Accounting and Finance - Essay Example The present research has identified that the author has the capacity to bring people together and move them in the right direction. Perhaps the most significant weakness is that the author is very attentive to details and don’t tend to take an overall picture of everything. The researcher’s focus is less on being a slave-driver and more of acting in a supportive role and helping other deal with the challenges of their work in an effective manner. His interests lie in the field of finance and accounting. This is why the author has acquired a professional accounting qualification and participated in seminars and workshops that focused on developing finance and accounting skills. Parallel to this, the author has also tried to enhance other business skills and knowledge in order to have a leading edge in the current business environment. The researcher has always been good with numbers and has felt that he can apply logical reasoning with much more comfort to decision-makin g than abstract ideas. The three values that are most important to the author in his career are the flexibility, disciple, and people-orientation. The researcher’s MBTI scored indicate that he belongs on the ESFP category in the personality inventory. This means that a researcher is a person who is outgoing and friendly. The researcher is realistic about the information that he intakes and analyzes is rational. The author also tends to focus more on people than on the basic logic of the situation. He is a flexible person, adapt his judgment to the specific situation and am mostly not judgmental. The researcher is also open to new information and ideas and appreciates creativity. This kind of a personality allows me to build an encouraging and supportive environment for the people who work with the author.

Monday, July 22, 2019

US invasion of Iraq Essay Example for Free

US invasion of Iraq Essay The research paper scrutinizes the invasion of Iraq initiated by the United States. Iraqi people had undergone several adversities as a consequence of this attack and are still on the pursuit of envisioning autonomy and liberty from the herculean clench of United States. On this account, the paper tackles all the efforts made regarding the reviving and enlivening of Iraq made by several state actors in accordance to their own personal capacity. United States invaded Iraq on 19th March 2003, and an operation known by the name of â€Å"Operation Iraqi Freedom† was started together with the support of United Kingdom, Australia and Poland. On March 17, President Bush had already given an ultimatum to Saddam Hussein either to surrender or to face the military wrath of the coalition forces, but the Iraqi government fell to its knees on 9th April by the invasion initiated by the US forces which concluded with the capture of the Iraq’s capital Baghdad (Copson, 2003). In the months of January March 2003, the US gathered its troops in the Persian Gulf. The total number of troops that the US gathered to invade Iraq was 100,000, furthermore military analysts assessed that though it will be possible even to attack in the extreme heat of summer, but military experts observed that fighting war in the cooler months before May would be much more favorable for the war (Hemmer, 2003). The American President George W. Bush and British Prime Minister Tony Blaire viewed their actions as that of disarming Iraq of â€Å"Weapons of Mass Destruction† and to end Saddam Hussein’s reign of terror and his support for terrorists and their activities and obviously, to free the Iraqi people (Operation Iraqi Freedom, 2003). However after the invasion, no WMDs were ever found in Iraq. The intelligence officials furthermore agreed on this fact that no chemical weapons have been in production since the early gulf war of 90’s (SHRADER, 2006). The CIA also accepted that no weapons of mass destruction had been found in Iraq. CIA officially released a report stating that CIA was not able to locate any weapons of mass destruction (Associated Press, 2005). The question regarding Saddam’s links with terrorist organization, Al Qaeda being the most important one, was also answered. There was no evidence found regarding direct link of Saddam being supportive of terrorist groups. Certain notable US persons have also raised fingers regarding the authenticity of the claims made that Iraq is linked with Al Qaeda and can supply weapons of mass destruction to Al Qaeda too. Carl Levin Chairman of the Senate Armed Services Committee clearly stated it to be exaggeration of the issue. Senator Dianne Feinsten also said that clearly the Al Qaeda issue was hyped (HAYES, 2003). Public Relations In January 2003, an American poll showed that most of the Americans were in favor of having support from the allies before indulging itself in a war. Furthermore the American public even went for supporting big time for the President Bush in order to launch an invasion against Iraq. Polls further shifted in the favor of Bush administration following Secretary of State Collin Powell’s February 5 presentation to the Security Council (CNN, 2003). Although some polls which were later carried out showed a decline in support of war, but President Bush’s speech which he delivered on March 17, once again was fruitful in gaining support from the American people. A Washington Post – ABC News polling showed that 71% supported President Bush’s decision in going to war, and 66% supported the President’s decision in not seeking the vote from United Nations Security Council (Washington Post, 2003). But nonetheless many Americans opposed the war too and of violating a country’s sovereignty. Large rallies and anti-war demonstrations were held in many of the cities especially huge protests in San Francisco and large demonstration in New York after the war begun. Many people also believed that because of this war, there will be high level of anti-American feelings around the whole world, and it can further add fuel to the fire (Cosgrove-Mather, 2009). Development regarding post-war Iraq With the switch of Operation Iraqi Freedom from a military to a reconstruction phase, Congress with the passage of time started to get more and more demanding regarding specific information from Bush Administration’s plans for rebuilding Iraq or the post-war future of Iraq. The Chairman of The Senate Foreign Relations Committee, Richard Lugar said that for a proper functioning of democracy in Iraq, it could at least take five years for this to be successful (Lugar, 2003). In addition many of the analysts and policymakers believed that in order to rebuild Iraq, it will be required for Congress to allocate additional funds for the future, but many were of the view that international community should come forward too for rebuilding of Iraq. Several members of United Nations Security Council submitted a letter to President Bush too regarding their support for the post-war rebuilding of Iraq. Overall, Congress was of the view that after the downfall of Saddam’s reign of terror Iraq will be highly dependent on aid from the United States and the international community, particularly from the members of U.  N. Security Council as well as number of police and military forces to maintain peace and order. But the question was that for how long Iraq will be requiring United States assistance and help and how much assistance will need to be provided (Sharp, 2003). Post-Saddam Transition and Governance The U. S. aims for Iraq are for a united, democratic, and a civic Iraq that can sustain, govern, and defend it and is an ally in the global war on terrorism. The following sections discuss Iraq’s progress toward those goals. In establishing a successful and peaceful rule in the new Iraq, a lot of complexities were involved regarding various post war risks to stability in Iraq, therefore many analysts were of the view that instead of going for the democratic form of government the present Iraq might be most effectively governed under a military regime which will not be going for the restoration of full democracy in the country but instead would comply with U.  N resolutions. However no one came forward to take the role of this leadership. The Bush Administration therefore appointed a retired General, Jay Garner to take up the responsibility of administrating Iraq’s ministries. The Administration largely discarded the State Department’s Future of Iraq Project that planned the administration of Iraq after the fall of Saddam. The project cost $5 million and had 15 working groups on major issues (Department of State USA, 2005). Traditional administrative law (TAL) The Bush Administration was looking forward to holding of general elections in the late 2005 however Ayatollah Sistani and others demanded for early elections and the return of Iraqi sovereignty which ultimately led the U. S to announce that sovereignty would be returned to Iraq by June 30, 2004 and national elections to be held by the end of 2005. This whole decision was made part of an interim constitution named as Transitional Administrative Law. It was signed on 8th March 2004. It helped to provide a way for political transition and of holding of elections for National Assembly by January 31, 2005, drafting of a permanent constitution by 15th August and by providing a roadmap for national elections for a full term by 15th December 2005 (Katzman, Iraq: Post-Saddam Governance and Security, 2009). Elections of 2005 The elections for transitional National Assembly, 18 provisional councils and the Kurdish regional assembly were held in 2005. The Sunni Arabs did not take part in the elections thus enabling the Shiite United Iraqi Alliance to ally with the Kurds and to dominate the national government. The elected government formed a committee which was given the task of drafting a new constitution and the constitution got approved on 15th October 2005. Sunni opposition tried to oppose the constitution but achieved only two-thirds of â€Å"no† vote in two provinces, not in the three, required to defeat the constitution. But in the elections later held on 15th December for a first full term government the Sunnis in a way allied with the Kurds and accepted Nuri-al-Maliki as Prime Minister, he won the approval of cabinet on 20th May 2006 (Katzman, Iraq: Politics, Elections, and Benchmarks, 2009). Promoting stability internationally and domestically After the war, the U. S pressure led UAE, Kuwait, Bahrain, Jordan, Qatar, Syria and Egypt either to send ambassadors to Iraq or announced that they’ll do it in the near future. Furthermore in almost 30 years, Iraq appointed its first Ambassador to Syria. Notable leaders who visited Iraq as a beginning of a new relationship were Jordan’s King Abdullah who was the first Arab leader to do so, he visited on August 11, 2008. Iranian President Mahmoud Ahmadinejad visited in March 2008. Two of the most major steps in reconciliation efforts were the visit of Turkey’s foreign minister Tayyip Recep Erdogan and President Abdullah Gul and it was the first such visit by Turkish head of state in 30 years. The second was the visit of Kuwait’s Deputy Prime Minister Mohammad Al Sabah in February 2009. Furthermore Saudi Arabia also thought of opening an embassy in Iraq, however its still one of the pending issues and the final decision has yet to be made by the Saudi Arabia (Katzman, Iraq: Post-Saddam Governance and Security, 2009). Even before that, Secretary of the Treasury John Snow tried to use diplomatic means to promote Iraq’s recovery. What he did was to try to persuade the institutions like that of World Bank and the International Monetary Fund to support the rebuilding of Iraq. Snow reported that representatives of the G-7 industrialized nations had agreed on this decision to help Iraq in its rebuilding efforts if the U. N Security Council grants its permission. Furthermore governments were asked to forgive the debt owed by Iraq, however Russia was particularly resistant regarding the subject matter as it owed $8 billion by Iraq and was heavily in debt itself (Blustein, 2003).

Dessler Chapter Essay Example for Free

Dessler Chapter Essay 1) Which Amendment to the U. S. Constitution states that no person shall be deprived of life, liberty, or property, without due process of the law? A) First Amendment B) Fifth Amendment C) Tenth Amendment D) Thirteenth Amendment E) Fourteenth Amendment Answer: B Explanation: The Fifth Amendment to the U. S. Constitution (ratified in 1791) states that no person shall be deprived of life, liberty, or property, without due process of the law. The Thirteenth Amendment (1865) outlawed slavery, and courts have held that it bars racial discrimination. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 2) The ________ Amendment to the U. S. Constitution outlawed slavery, and courts have held that it bars racial discrimination. A) First B) Fifth C) Tenth D) Thirteenth E) Fourteenth Answer: D Explanation: The Thirteenth Amendment (1865) outlawed slavery, and courts have held that it bars racial discrimination. The Fifth Amendment to the U. S. Constitution (ratified in 1791) states that no person shall be deprived of life, liberty, or property, without due process of the law. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 3) The 13th Amendment to the U. S. Constitution addresses the subject of ________. A) due process B) slavery C) private property D) trial by jury E) womens rights Answer: B Explanation: The 13th Amendment to the U. S. Constitution abolished slavery and courts have held that it bars racial discrimination. The 5th Amendment addresses due process, and the 6th Amendment requires a trial by jury. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 4) The ________ gives all persons the same right to make and enforce contracts and to benefit from the laws of the land. A) Fifth Amendment B) Civil Rights Act of 1866 C) Title VII of the 1964 Civil Rights Act D) Civil Rights Act of 1991 E) Thirteenth Amendment Answer: B Explanation: The Civil Rights Act of 1866 gives all persons the same right to make and enforce contracts and to benefit from U. S. laws. The Fifth Amendment to the U. S. Constitution (ratified in 1791) states that no person shall be deprived of life, liberty, or property, without due process of the law. The Thirteenth Amendment (1865) outlawed slavery, and courts have held that it bars racial discrimination. Title VII of the 1964 Civil Rights Act states that employers cannot discriminate based on race, color, religion, sex, or national origin. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 5) Title VII of the 1964 Civil Rights Act explicitly prohibits employers from discrimination based on all of the following characteristics EXCEPT ________. A) race B) religion C) color D) sexual orientation E) national origin Answer: D Explanation: Title VII of the 1964 Civil Rights Act states that an employer cannot discriminate based on race, color, religion, sex, or national origin. Title VII bars discrimination on the part of most employers both public and private with 15 or more employees. Sexual orientation is not directly addressed under the law. Diff: 1Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 6) According to Title VII of the 1964 Civil Rights Act, which of the following employers would be legally allowed to refuse employment to an individual based on race, religion, or sex? A) a state agency with 65 employees B) a medical office with 25 employees C) a local restaurant with 10 employees D) a department store with 100 employees E) a public school with 30 employees Answer: C Explanation: Title VII bars discrimination on the part of most employers, including all public or private employers of 15 or more persons. It also covers all private and public educational institutions, the federal government, and state and local governments. A business with fewer than 15 employees would legally be allowed to refuse employment based on race, religion, sex, or national origin. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Application 7) Which legislation was responsible for the creation of the Equal Employment Opportunity Commission? A) 13th Amendment B) Equal Pay Act of 1963 C) Civil Rights Act of 1866 D) Executive Orders 11246 and 11375 E) Title VII of the 1964 Civil Rights Act Answer: E Explanation: Title VII established the Equal Employment Opportunity Commission (EEOC) to administer and enforce the Civil Rights law at work. The commission itself consists of five members appointed by the president with the advice and consent of the Senate. Executive Orders 11246 and 11375 established the Office of Federal Contract Compliance Programs. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 8) The EEOC was initially established to investigate complaints about ________. A) job discrimination B) unfair business practices C) sexual harassment in schools D) structural accommodations for disabled people E) overtime payments for labor union members Answer: A Explanation: Title VII established the Equal Employment Opportunity Commission (EEOC) to administer and enforce the Civil Rights law at work. The EEOC receives and investigates job discrimination complaints from aggrieved individuals. Diff: 2Page Ref: 32 Chapter: 2 Objective: 1 Skill: Concept 9) How many members serve on the Equal Employment Opportunity Commission? A) 3 B) 5 C) 9 D) 10 E) 12 Answer: B Explanation: The Equal Employment Opportunity Commission (EEOC) consists of five members appointed by the president with the advice and consent of the Senate. Each member serves a 5-year term. Diff: 1Page Ref: 32 Chapter: 1 Objective: 1 Skill: Concept 10) Which of the following appoints the members of the EEOC? A) U. S. Congress B) U. S. Supreme Court C) President of the United States D) Department of Justice E) American voters Answer: C Explanation: The EEOC consists of five members appointed by the president with the advice and consent of the Senate. Each member serves a 5-year term. Diff: 1Page Ref: 32 Chapter: 1 Objective: 1 Skill: Concept 11) Which of the following requires equal pay for equal work regardless of sex? A) Title VII of the 1964 Civil Rights Act B) Equal Pay Act of 1963 C) Executive Order 11246 D) Pay Discrimination in Employment Act of 1967 E) Civil Rights Act of 1991 Answer: B Explanation: Under the Equal Pay Act of 1963 (amended in 1972), it is unlawful to discriminate in pay on the basis of sex when jobs involve equal work; require equivalent skills, effort, and responsibility; and are performed under similar working conditions. Diff: 1Page Ref: 33 Chapter: 2 Objective: 1 Skill: Concept 12) When companies utilize ________, they take steps to eliminate the present effects of past discrimination. A) affirmative action B) executive orders C) rehabilitation action D) civil rights guidelines E) equal pay rules Answer: A Explanation: Affirmative action refers to steps that are taken for the purpose of eliminating the present effects of past discrimination. The Equal Pay Act of 1963 requires employers to pay equal pay for equal work, and the Vocational Rehabilitation Act of 1973 requires employers with federal contracts of more than $2,500 to take affirmative action in employing disabled persons. Diff: 1Page Ref: 33 Chapter: 1 Objective: 1 Skill: Concept 13) Which of the following is responsible for implementing Executive Orders 11246 and 11375 that were issued by the Johnson administration? A) Equal Employment Opportunity Commission B) Pension Benefits Guarantee Corporation C) Occupational Safety and Health Administration D) National Labor Relations Board E) Office of Federal Contract Compliance Programs Answer: E Explanation: The Johnson administration (1963–1969) issued Executive Orders 11246 and 11375 which didnt just ban discrimination but also required that government contractors with contracts of over $50,000 and 50 or more employees take affirmative action to ensure employment opportunity for those who may have suffered past discrimination. These orders also established the Office of Federal Contract Compliance Programs (OFCCP) to implement the orders and ensure compliance. Diff: 1Page Ref: 33 Chapter: 2 Objective: 1 Skill: Concept 14) Which of the following factors is NOT an acceptable basis for different pay for equal work under the Equal Pay Act of 1963? A) merit B) seniority C) gender D) production quality E) production quantity Answer: C Explanation: Under the Equal Pay Act of 1963 (amended in 1972), it is unlawful to discriminate in pay on the basis of sex when jobs involve equal work; require equivalent skills, effort, and responsibility; and are performed under similar working conditions. Pay differences derived from seniority systems, merit systems, and systems that measure earnings by production quantity or quality or from any factor other than sex do not violate the act. Diff: 2Page Ref: 33 Chapter: 2 Objective: 1 Skill: Concept 15) Paul is a 49-year-old American of Anglo-Saxon descent. What legislation is most likely intended to protect Paul from discrimination? A) Executive Order 11375 B) Equal Pay Act of 1963 C) Executive Order 11246 D) Age Discrimination in Employment Act of 1967 E) Thirteenth Amendment to the U. S. Constitution Answer: D Explanation: The Age Discrimination in Employment Act of 1967 (ADEA) made it unlawful to discriminate against employees or applicants who are between 40 and 65 years of age. Executive Orders 11246 and 11375 require government contractors to take affirmative action, the 13th Amendment barred slavery, and the Equal Pay Act made it unlawful to discriminate in pay based on the employees gender. Diff: 2Page Ref: 33 Chapter: 2 Objective: 1 Skill: Application 16) According to the Age Discrimination in Employment Act of 1967, it is unlawful to ________. A) sue an employer for age-based pay B) fire older employees for insubordination C) require employees to retire at age 65 D) allow juries to determine age discrimination E) institute a minimum age for employees Answer: C Explanation: The Age Discrimination in Employment Act of 1967 (ADEA) made it unlawful to discriminate against employees or applicants who are between 40 and 65 years of age. Subsequent amendments eliminated the age cap, effectively ending most mandatory retirement at age 65. The ADEA allows jury trials. Diff: 2Page Ref: 33 Chapter: 2 Objective: 1 Skill: Concept 17) The ________ requires certain federal contractors to take affirmative action for disabled persons. A) Equal Pay Act B) Vocational Rehabilitation Act C) Age Discrimination in Employment Act D) Americans with Disabilities Act E) Civil Rights Act Answer: B Explanation: The Vocational Rehabilitation Act of 1973 requires employers with federal contracts of more than $2,500 to take affirmative action in employing disabled persons. It does not require hiring unqualified people. It does require an employer to take steps to accommodate a disabled worker unless doing so imposes an undue hardship on the employer, which is addressed by the ADA. Diff: 1Page Ref: 33 Chapter: 2 Objective: 1 Skill: Concept 18) Which of the following refers to highly recommended procedures issued by federal agencies regarding employee selection, record keeping, and preemployment inquiries? A) job specifications B) employment metrics C) process charts D) uniform guidelines E) applicant tracking systems Answer: D Explanation: Uniform guidelines are issued by federal agencies charged with ensuring compliance with equal employment federal legislation explaining recommended employer procedures in detail. They set forth highly recommended procedures regarding things like employee selection, record keeping, and preemployment inquiries. Diff: 1Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 19) Which of the following does NOT participate in the issuance of uniform guidelines? A) EEOC B) Department of Labor C) Better Business Bureau D) Department of Justice E) Civil Service Commission Answer: C Explanation: The EEOC, Civil Service Commission, Department of Labor, and Department of Justice together issued uniform guidelines. These set forth highly recommended procedures regarding things like employee selection, record keeping, and preemployment inquiries. The Better Business Bureau is not involved in issuing uniform guidelines. Diff: 1Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 20) Uniform guidelines from the EEOC are recommended for employers to use in matters regarding all of the following EXCEPT ________. A) employee selection B) record keeping C) preemployment inquiries D) sexual harassment E) psychological testing Answer: E Explanation: The EEOC, Civil Service Commission, Department of Labor, and Department of Justice together issue uniform guidelines. These set forth highly recommended procedures regarding things like employee selection, record keeping, sexual harassment, and preemployment inquiries. The American Psychological Association has its own non-legally binding Standards for Educational and Psychological Testing. Diff: 2Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 21) Which Supreme Court case was used to define unfair discrimination in conjunction with EEO laws? A) Buckley v. Valeo B) Brown v. Board of Education C) Griggs v. Duke Power Company D) West Coast Hotel Co. v. Parrish E) Abington School District v. Schempp Answer: C Explanation: Griggs v. Duke Power Company was a landmark Supreme Court case used to define unfair discrimination as put forth in EEO laws such as Title VII. The Court ruled that employment practices must be job related and that discrimination does not have to be overt to be illegal. Brown v. Board of Education held that segregation in public schools was unconstitutional. Choices A, D, and E were not cases related to EEO laws. Diff: 2Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 22) In Griggs v. Duke Power Company, Griggs sued the power company because it required coal handlers to be high school graduates. The Supreme Court ruled in favor of Griggs because ________. A) high school diplomas were not related to success as a coal handler B) Duke Power Company intentionally discriminated based on race C) no business necessity existed for Duke Power Company D) Title VII forbids job testing E) Griggs held a GED Answer: A Explanation: The Court ruled in favor of Griggs because having a high school diploma was not relevant to the job of coal handler. The Court held that an employment practice must be job related if it has an unequal impact on members of a protected class. Diff: 2Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 23) If a person is in a protected class, he or she is protected by which of the following? A) Department of Labor guidelines B) Sarbanes-Oxley Act C) Title VII of the Civil Rights Act D) Consumer Protection Act E) National Labor Relations Board Answer: C Explanation: The term protected class refers to persons such as minorities and women who are protected by equal opportunity laws, including Title VII. Choices A, B, D, and E are not equal opportunity laws. Diff: 1Page Ref: 34 Chapter: 2 Objective: 1 Skill: Concept 24) All of the following are principles established by Griggs v. Duke Power Company EXCEPT ________. A) burden of proof is on the employer B) performance standards should be unambiguous C) business necessity is a defense for an existing program D) employment selection practices must be job related E) discrimination does not have to be overt to be illegal Answer: B Explanation: The Court ruled in Griggs v. Duke Power Company that the burden of proof is on the employer to show that a hiring practice such as testing is job related. The Court also ruled that business necessity is the defense for any existing program that has adverse impact and that discrimination does not have to be overt to be illegal. The case did not address performance standards. Diff: 3Page Ref: 34-35 Chapter: 2 Objective: 1 Skill: Concept 25) Under the principles established by Griggs v. Duke Power Company, ________ can be used as a defense for any existing program that has adverse impact. A) occupational qualification B) business necessity C) affirmative action D) burden of proof E) fair in form Answer: B Explanation: Business necessity is the defense for any existing program that has adverse impact according to Griggs. The court did not define business necessity. Diff: 2Page Ref: 35 Chapter: 2 Objective: 1 Skill: Concept 26) Which court case provided details regarding how employers could validate the relationship between screening tools and job performance? A) West Coast Hotel Co. v. Parrish B) Albemarle Paper Company v. Moody C) Griggs v. Duke Power Company D) Burlington Industries v. Ellerth E) Ward Cove v. Atonio Answer: B Explanation: In the Albemarle case, the Court provided more details on how employers could prove that tests or other screening tools relate to job performance. For example, the Court said that if an employer wants to test candidates for a job, then the employer should first clearly document and understand the jobs duties and responsibilities. Diff: 2Page Ref: 35 Chapter: 2 Objective: 1 Skill: Concept 27) Under the Civil Rights Act of 1991, once a plaintiff shows disparate impact, who has the burden of proving that the challenged practice is job related? A) plaintiff B) employee C) employer D) judge E) EEOC Answer: C Explanation: According to the Civil Rights Act of 1991, once an aggrieved applicant or employee demonstrates that an employment practice (such as must lift 100 pounds) has a disparate (or adverse) impact on a particular group, then the burden of proof shifts to the employer, who must show that the challenged practice is job related. Diff: 1Page Ref: 36 Chapter: 2 Objective: 1 Skill: Concept 28) According to the Civil Rights Act of 1991, an employee who claims intentional discrimination can sue for all of the following EXCEPT ________. A) back pay B) job reinstatement C) punitive damages D) compensatory damages E) substantive consolidation Answer: E Explanation: According to the Civil Rights Act of 1991, an employee who claims intentional discrimination can sue for back pay, attorneys fees, court costs, job reinstatement, punitive damages, and compensatory damages. Substantive consolidation is a legal term referring to debt consolidation. Diff: 2Page Ref: 36 Chapter: 2 Objective: 1 Skill: Concept 29) Race, color, religion, sex, or national origin is a motivating factor in a termination, but the employee would have been terminated for failure to perform anyway. Which of the following most likely exists in this situation? A) mixed motive B) business necessity C) disparate impact D) liability defense E) burden of proof Answer: A Explanation: An unlawful employment practice is established when the complaining party demonstrates that race, color, religion, sex, or national origin was a motivating factor for any employment practice, even though other factors also motivated the practice. Some employers in so-called mixed motive cases had taken the position that even though their actions were discriminatory, other factors like the employees dubious behavior made the job action acceptable. Under CRA 1991, an employer cannot avoid liability by proving it would have taken the same action—such as terminating someone—even without the discriminatory motive. Diff: 3Page Ref: 36 Chapter: 2 Objective: 1 Skill: Application 30) Which of the following requires employers to make reasonable accommodations for disabled employees? A) Civil Rights Act of 1991 B) Equal Pay Act of 1963 C) Americans with Disabilities Act of 1990 D) Vocational Rehabilitation Act of 1973 E) Disability Discrimination in Employment Act of 1967 Answer: C Explanation: The Americans with Disabilities Act (ADA) of 1990 prohibits employment discrimination against qualified disabled individuals. It also says employers must make reasonable accommodations for physical or mental limitations unless doing so imposes an undue hardship on the business. Diff: 1Page Ref: 36 Chapter: 2 Objective: 1 Skill: Concept 31) According to the Americans with Disabilities Act, which of the following would be considered a disability? A) homosexuality B) voyeurism C) pyromania D) compulsive gambling E) AIDS Answer: E Explanation: The ADA specifies conditions that it does not regard as disabilities, including homosexuality, bisexuality, voyeurism, compulsive gambling, pyromania, and certain disorders resulting from the current illegal use of drugs. The EEOCs position is that the ADA prohibits discriminating against people with HIV/AIDS. Diff: 1Page Ref: 36 Chapter: 1 Objective: 1 Skill: Concept 32) Which type of disability accounts for the greatest number of ADA claims? A) drug-related B) cosmetic C) mental D) vision E) hearing Answer: C Explanation: Mental disabilities account for the greatest number of ADA claims. Under EEOC ADA guidelines, mental impairment includes any mental or psychological disorder, such as . . . emotional or mental illness. Drug-related conditions are generally not regarded as disabilities. Diff: 1Page Ref: 36 Chapter: 2 Objective: 1 Skill: Concept 33) Under ADA, those who can carry out the essential functions of the job are known as which of the following? A) protected class B) line managers C) career anchors D) staff authorities E) qualified individuals Answer: E Explanation: The ADA prohibits discrimination against qualified individuals—those who, with (or without) a reasonable accommodation, can carry out the essential functions of the job. The individual must have the requisite skills, educational background, and experience to do the job. Diff: 1Page Ref: 37 Chapter: 2 Objective: 1 Skill: Concept 34) Which of the following best explains why employers win the majority of ADA cases? A) Employers make the necessary reasonable accommodations for employees. B) Employers prove that age negatively impacts an employees job performance. C) Employees fail to prove that they are disabled yet qualified to perform a job. D) Conservative judges are sympathetic towards small-business owners. E) Employee attorneys fail to draw connections between Title VII and ADA. Answer: C Explanation: Employers traditionally prevailed in almost all—96%—federal circuit court ADA decisions. A main reason is that employees were failing to show that they were disabled and qualified to do the job. Unlike with Title VII of the Civil Rights Act, the employee must establish that he or she has a disability that fits under the ADA. Diff: 3Page Ref: 38 Chapter: 2 Objective: 1 Skill: Concept 35) Which of the following will be the most likely result of the ADA Amendments Act of 2008? A) Employees will find it easier to prove that their disabilities are limiting. B) The number of major life activities considered disabilities will be narrowed. C) Employers will be required to make fewer accommodations for workers with disabilities. D) Employers will be required to hire a specific percentage of disabled workers to be in compliance. E) Employees will apply for more jobs knowing that the legislation guarantees their employment. Answer: A Explanation: The new ADAAs basic effect will be to make it much easier for employees to show that their disabilities are limiting. For example, the new act makes it easier for an employee to show that his or her disability is influencing one of the employees major life activities. It does this by adding examples like reading, concentrating, thinking, sleeping, and communicating to the list of ADA major life activities. Diff: 3Page Ref: 38 Chapter: 2 Objective: 1 Skill: Concept 36) In which of the following situations does sexual harassment NOT violate Title VII? A) if the conduct substantially interferes with a persons work performance B) if the conduct creates an intimidating work environment C) if the conduct creates a hostile work environment D) if the conduct is motivated by both age and gender E) if the conduct creates an offensive work environment Answer: D Explanation: Under Title VII, sexual harassment generally refers to harassment on the basis of sex when such conduct has the purpose or effect of substantially interfering with a persons work performance or creating an intimidating, hostile, or offensive work environment. Sexual harassment violates Title VII. The motivation behind the conduct is not relevant to Title VII violations. Diff: 3Page Ref: 39 Chapter: 2 Objective: 2 Skill: Concept 37) The ________ provides that a person who commits a crime of violence motivated by gender shall be liable to the party injured. A) Civil Rights Act of 1991 B) Federal Violence Against Women Act of 1994 C) Pregnancy Discrimination Act D) Vietnam Era Veterans Readjustment Assistance Act of 1974 E) Vocational Rehabilitation Act of 1973 Answer: B Explanation: The Federal Violence Against Women Act of 1994 provides that a person who commits a crime of violence motivated by gender shall be liable to the party injured. The law offers an additional path women can use to seek relief for violent sexual harassment. Diff: 1Page Ref: 40 Chapter: 2 Objective: 2 Skill: Concept 38) Which of the following is NOT a form of sexual harassment according to EEOC guidelines? A) unwelcome sexual advances that create an intimidating work environment B) requests for sexual favors made implicitly as a condition of employment C) verbal conduct of a sexual nature that unreasonably interferes with work performance D) physical conduct of a sexual nature that creates an offensive work environment E) mutually consensual physical conduct of a sexual nature between co-workers Answer: E Explanation: EEOC guidelines define sexual harassment as unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature that create an intimidating, hostile, or offensive work environment or interfere with work performance. Requests for sexual favors that are used as the basis for employment decisions are also considered sexual harassment. Consensual sex between co-workers is not considered sexual harassment. Diff: 3Page Ref: 41 Chapter: 2 Objective: 2 Skill: Concept 39) All of the following are ways for an employee to prove sexual harassment EXCEPT by proving that ________. A) the verbal remarks of a co-worker were sexually flirtatious B) the rejection of a supervisors sexual advances led to a demotion C) a hostile work environment was created by a co-workers sexual conversation D) a hostile work environment was created by a nonemployees sexual advances E) a hostile work environment was created by a supervisors sexually abusive conduct Answer: A Explanation: The U. S. Supreme Court held that sexual harassment law doesnt cover ordinary intersexual flirtation. Someone can prove sexual harassment if rejecting a supervisors sexual advances led to a demotion, firing, or altered work assignment. Sexual harassment can also be proven if a hostile work environment is created by the sexual conduct of supervisors, co-workers, or nonemployees. Diff: 3Page Ref: 41 Chapter: 2 Objective: 2 Skill: Application 40) Judy was up for a promotion at Simpson Consulting when her supervisor, Will, encouraged her to develop a sexual relationship with him. He suggested that her promotion would be a sure thing if they were involved. When Judy declined his advances, Will fired her. Which of the following would Judy most likely be able to prove in court if she decided to sue Simpson Consulting? A) hostile environment created by nonemployees B) hostile environment created by supervisors C) hostile environment created by co-workers D) disparate treatment E) quid pro quo Answer: E Explanation: Quid pro quo (something for something) is the most direct way to prove that rejecting a supervisors advances adversely affected what the EEOC calls a tangible employment action such as hiring, firing, promotion, demotion, and/or work assignment. Quid pro quo would be the best option for Judy if she sues the firm for Wills actions. Diff: 3Page Ref: 41 Chapter: 2 Objective: 2 Skill: Application 41) Gus is always making sexual jokes at work. Many employees find the jokes funny, but Shelley, Guss executive assistant, is uncomfortable with the jokes. Eventually, she decides to quit her job rather than endure the jokes any longer. What form of sexual harassment has Shelley experienced? A) quid pro quo B) hostile environment created by supervisors C) hostile environment created by co-workers D) hostile environment created by nonemployees E) none of the above; Shelley is not a victim of sexual harassment Answer: B Explanation: As Shelleys supervisor, Gus created a hostile environment according to the EEOC. A claimant does not need to show that the harassment had tangible consequences such as demotion. It is sufficient in many cases to prove that a supervisors sexual harassment substantially affected an employees emotional and psychological abilities. Diff: 3Page Ref: 41 Chapter: 2 Objective: 2 Skill: Application 42) All of the following are ways that an employer can minimize liability in sexual harassment claims EXCEPT ________. A) maintaining thorough records of all sexual harassment complaints B) informing all employees about sexual harassment investigations C) instituting a sexual harassment reporting process D) training employees in sexual harassment policies E) investigating sexual harassment charges promptly Answer: B Explanation: Maintaining records of complaints, instituting a reporting policy, providing sexual harassment training, and investigating charges quickly are ways that employers can show that they took reasonable care to prevent and correct sexual harassment, which will minimize the employers liability. Sexual harassment investigations should be conducted privately, and the information should not be made available to all employees. Diff: 3Page Ref: 42 Chapter: 2 Objective: 2 Skill: Concept 43) Sanders Sporting Goods, an international sporting goods chain, is being sued for sexual harassment by a former Sanders employee. The plaintiff asserts that she was the victim of numerous unwanted sexual advances from a male co-worker. The woman claims that Sanders management condoned a hostile work environment and that the company is liable for the actions of the male employee. Which of the following, if true, would best support the plaintiffs argument that Sanders is liable for sexual harassment? A) Sanders re-published its sexual harassment policy twice within the last year. B) The HR department at Sanders has records of the plaintiffs initial complaints. C) Exit interviews of outgoing Sanders employees include questions about sexual harassment. D) Sanders lacks a management response system for handling sexual harassment complaints. E) Sanders recently lost a court case filed by former employees who claimed disparate treatment. Answer: D Explanation: Employers can minimize their liability in sexual harassment claims by showing that they have a response system set up for handling sexual harassment complaints, so Sanders may be liable if it lacks a system. Firms that re-publish their sexual harassment policies frequently, keep thorough records of complaints, and address sexual harassment issues during exit interviews are able to show that they took reasonable care to prevent sexual harassment. Disparate treatment refers to discrimination claims rather than sexual harassment claims. Diff: 3Page Ref: 42 AACSB: Reflective Thinking Chapter: 2 Objective: 2 Skill: Critical Thinking 44) Sanders Sporting Goods, an international sporting goods chain, is being sued for sexual harassment by a former Sanders employee. The plaintiff asserts that she was the victim of numerous unwanted sexual advances from a male co-worker. The woman claims that Sanders management condoned a hostile work environment and that the company is liable for the actions of the male employee. Which of the following, if true, would most likely undermine the plaintiffs claim that Sanders is liable for the male employees conduct? A) The male employee physically threatened the plaintiff on three occasions. B) The male employee made sexual advances towards the plaintiff on a daily basis. C) The male employee was required by HR to participate in a sexual harassment awareness course. D) The male employees conduct significantly interfered with the plaintiffs ability to perform her job. E) The plaintiff discussed her concerns about the male employees conduct with female co-workers. Answer: C Explanation: If the male employee was required to take a sexual harassment course, then that action shows Sanders was making a reasonable attempt to stop the behavior. Choices A, B, and D support the plaintiffs claim that ther

Sunday, July 21, 2019

Proactive and Reactive MANET Protocols Analysis

Proactive and Reactive MANET Protocols Analysis Ad hoc network Abstract A mobile ad hoc network (MANET) is consisting of wireless mobile nodes. The communication of these mobile nodes is carried out without any centralized control. Routing is a critical issue in MANET. The focus of this thesis is on the performance of routing protocols. We compare three routing protocols in MANET i.e. AODV, DSR and OLSR. OPNET is the simulation tool. These routing protocols performance are analyzed by three important metrics: delay, network load and throughput. All the three routing protocols are explained in a deep way with metrics. The comparison analysis will be carrying out about these protocols and in the last the conclusion will be present. That which routing protocol is the best for mobile ad hoc network. Introduction MANET stands for Mobile Ad hoc Network. A decentralized autonomous wireless system which consists of free nodes. MANET sometimes called mobile mesh network. MANET is a self configurable wireless network. A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are as transmitters, receivers and antennas. These antennas can be of any kind. These nodes can be fixed or mobile. The term node referred to as, which are free to move arbitrarily in every direction. These nodes can be a mobile phone, laptop, personal digital assistance, MP3 player and personal computer. These nodes located, might be in cars, ships, airplanes or with people having small electronic devices [59]. Nodes can connect to each other randomly and forming arbitrary topologies. Nodes communicate to each other and also forward packets to neighbor nodes as a router. The ability of self configuration of these nodes makes them more suitable for urg ently required network connection. For example in disaster hit areas where there is no communication infrastructure. It is greatly desired to have a quick communication infrastructure. MANET is the quick remedy for any disaster situation. The word Ad hoc means For a special purpose. So MANET a spontaneous network is useful when dealing with wireless devices in which some of the devices are part of the network only for the duration of a communication session and the need for a dynamic network topology is prominent. The MANET working group (WG) within the Internet Engineering Task Force (IETF) working specifically on developing IP routing protocols topologies. In order to improve mobile routing and interface definition standards for use within the Internet protocol suite [59]. After huge research work on MANET, still MANET does not have complete formed Internet based standards. The identification of experimental Request For Comments (RFCs) since 2003 [1] is used. In these RFCs the questions are unanswered concerning of implementation or deployment of these routing protocols. But these proposed algorithms are identified as a trial technology and there is a high chance that they will develop into a standard [1]. Extensive research work in this area has continued since then with major studies on different routing protocols such as Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), Temporarily Ordered Routing Algorithm (TORA) and Optimized Link State Routing (OLSR) [1]. Also on the standardization of routing and interface solutions for mobile networking support through Internet Engineering Task Force (IETF) Mobile Ad hoc network (MANET) Working Group WG [59]. Aims and Objectives There are two groups of routing protocols. Proactive MANET protocol, Reactive MANET Protocol, and the third are derived from both called Hybrid MANET Protocol. The Proactive MANET protocol is generally called table driven protocol. It detects the network layout periodically. It tries to maintain the routing table at every node. From which a route to the destination from the source can be detected with less delay. Proactive MANET protocols provide good reliability and low latency for deciding a route. Proactive MANET protocol is not suitable for the node moving with high speed. The routing information in the routing table cannot be updated in the routing table. If a node is not moving, then its routing table information is updated continuously. It makes much traffic overhead and also waste network resources as bandwidth [21]. Proactive MANET protocol is also not suitable for large scale MANETs. Whereas Reactive MANET Protocol is called on-demand routing protocol. Reactive MANET Protocol finds the route when a source node requests to communicate with the other. On-demand approach is suitable for the nodes with high mobility. Nodes that transmit data rarely. The main drawback of reactive routing protocols is that the source node broadcasts the routing requests in the whole network. Then it waits for the responses. This route discovery procedure produces significant delay [21]. Hybrid MANET Protocol integrates the merits of Proactive MANET protocol and Reactive MANET Protocol. Zone routing protocol (ZRP) and two zone routing protocols is the example of hybrid of MANET protocol. Research Question Our goal in this Masters thesis is to evaluate the performance of Proactive and Reactive MANET protocols. These protocols have different behaviors for wireless routing aspects. The main problem is to choice the correct and efficient routing protocol for MANET. The main questions arise for the evaluation of these problems. First question is which routing protocol provides a better performance in Mobile Ad hoc Networks? This will give the overall performance of each routing protocol. Second question is what factors influence the performance of these routing protocols? Finally we address the main key differences in these routing protocols. To answer all these questions, we will model some of MANET scenarios with different parameters. To evaluate the performance of Proactive MANET protocol and Reactive MANET Protocols as, AODV, DSR and OLSR with respect to some parameters as delay, network load and throughput. In simulating these scenarios we come to know that no single routing protocol among Proactive MANET protocol and Reactive MANET Protocol is superior in terms of overall network performance. For example one protocol is good in average delay while other is best in network load and throughput. The performance of these routing protocols greatly depends on network load and delay. So the best protocol can give low delay and high throughput. Scope of the thesis As we know the two categories of routing protocols. Reactive, proactive, and the derived one from reactive and proactive protocols are referred to as hybrid routing protocol. The hybrid protocol is a combination of both reactive and proactive routing protocols. In this thesis, we considered three routing protocols. Two of them are reactive protocols i.e. AODV and DSR. One of them is proactive protocol i.e. OLSR. In this thesis we evaluate the behavior of these routing protocols when implemented in the network. We look that how these protocols affect the network performance, and how the routing protocols behave in these networks. There is no need to go in depth the design of these routing protocol algorithms. But we will give a detailed explanation of these routing protocols. That we are able to explain their effects on the network. We did not consider the effects of varying pause time of the mobile nodes in our simulations. These pause time will be kept constant in all the scenarios. Energy consumption of the routing protocol algorithms was also not considered in the thesis. Thesis structure The thesis is mainly divided into six chapters. Chapter 1 introduces the topic. In this chapter we discuss the MANET with detail, and also the research question. Chapter 2 presents the background of our work. Types of wireless networks and some part of related work with example. Chapter 3 gives the state of the art. It gives the full theoretical background and concepts of the ad hoc mobile network routing protocols i.e. reactive MANET protocols and proactive MANET protocols. Chapter 4 is about the performance metrics: delay, network load and throughput and also about the simulation tool OPNET Modeler 14.5. Chapter 5 gives the results and an analysis of all the routing protocols simulated. In chapter 6, the conclusion and future work is presented. Chapter 2 Background and Related Work In this chapter we present the background of our work. Types of wireless networks and some part of related work with example. MANET have a dynamic nature, a large number of applications make them ideal to use. Quick deployment and minimal configuration of MANET in emergencies such as natural disaster makes them more suitable. The growth of technology makes increase in Wi-Fi capable laptops, mobile phones, MP3 players and other small portable devices. Hence a reason for MANET popularity. Extensive research work has been done on the performance evaluation of routing protocols using NS2 network simulator. Different methods and simulation environments give different results for MANET routing protocols performance. We need to look in a broader view for the effects of these routing protocols which are not considered in a specific environment. The theme of this project is to evaluate the performance of Proactive MANET protocols (PMP) and Reactive MANET Protocols (RMP) in OPNET Modeler 14.5 under varying network load [2]. For all these comparisons we will use FTP traffic to look the effects of the ad hoc network protocols. The project goal is to give an extra source of comparison statistics in the research field. In our simulation we have wireless routing protocols carrying FTP traffic. These simulations performed will have a strong link with the theoretical concepts and also with the expected performance in practical implementations. This study work will give a great benef it in the future research work. Related work Extensive research works has been done in the field of MANET routing protocols. Different routing protocols were simulated in different kind of simulators. Here we will discuss different research papers on the performance of MANET routing protocols. In this thesis work we simulate three MANET routing protocols in the OPNET modeler 14.5. AODV, DSR and OLSR were simulated against three different parameters i.e. delay, network load and throughput. The results show that OLSR is best in network delay than AODV and DSR. The protocols best in the network delay must be the finest in the network throughput. Below we will study now different simulators with different routing protocols and their performance. These routing protocols DSDV, AODV, DSR and TORA were simulated using NS2 [3]. Analysis gives different results for every parameter differently. In finding shortest path between the source and destination nodes, delay, DSDV performs well than AODV, DSR and TORA. DSR perform well in network load balancing than DSDV, AODV and TORA. DSDV has good jitter than AODV, TORA and DSR respectively. The results given in [5] analyse DSR and DSDV in idealized and realistic simulation environments on their performance. Another paper in reference [4] gives conclusion in mobile ad hoc network that reactive protocols i.e. AODV and DSR perform well when the network load is moderate. In reference [4] the reactive protocols are saving much resource like energy. It analyse that the proactive protocols perform well in heavy network traffic load. In [6] there are different conclusions about the MANET routing protocols. DSDV, AODV and DSR were simulated in NS2. The reactive protocol AODV outperforms than DSDV and DSR in maintaining connection by sequentially exchange of information for TCP based traffic. The packets are delivered when the node mobility is low and failed to deliver at high mobility. DSR perform well than DSDV at all mobility. In [6] DSR perform well than DSDV and AODV for packet dropping rate (PDR), delay and throughput. DSR generates less network load than AODV. In reference [7], the simulation was done in QUALNET simulator. The author wrote that AODV shows best performance in low and medium node density. Where as in high node density both OLSR and DSR outperforms. The author wrote in [7], that DSR is selected for file transfers where delivery and throughput are critical factors. OLSR performs well in both low and high node density. It is stated in [7] that OLSR is best suited in application oriented traffic e.g. streaming traffic, voice and video traffic. In application based traffic delay is a critical factor. Types of Wireless Networks Before we discuss the wireless networks types, a small difference between wired and wireless network is discussed. A network that sends data from one point to another point with cable or wire is called wired network. The data sent over a network which uses wireless medium from one device to another device is called wireless network. In wireless network data is transmitted from one point to another through wireless links. For communication the devices have to be in the transmission or radio range of each other. Wireless networks are divided into two main groups. First infrastructure wireless network and second is Ad hoc or infrastructure-less network. Infrastructure Networks Fixed network topology is deployed in infrastructure network. These deployed, fixed networks have base stations or access points from which wireless nodes can get connected. All the base stations or access points are connected with the main network through wired links (fiber optic, twisted or coaxial cable) or wireless link. The base station or access point is one of the important units of infrastructure networks. All of the connections will have to pass from the access point. A wireless node can connect to anyone of the access points in its range. Ad hoc Networks An Ad hoc network is deployed where wireless network infrastructure is not available. This kind of ad hoc network is called infrastructure less network. In ad hoc network each node is connected through wireless links. These nodes connected to each other and also act as a router, by forwarding data to other nodes. There is no restriction on these nodes to join or leave the network. Thus the network has no vital infrastructure. Ad hoc networks have two forms; one is static ad hoc networks (SANET), the other is called mobile ad hoc network (MANET). Commercial implementation of ad hoc network becomes possible due to the development of new technology such as 802.11 [5]. The main reason to deploy this kind of network is the flexibility and easiness of deployment. A suitable network for emergency and surveillance use. But with all these qualities, ad hoc network operation is very difficult to handle. Each and every node is responsible for its operation to maintain its routing table and also forwarding packets to its neighbors as routers. MANET has different topology changes while deployed. So ad hoc network need an efficient routing protocol. To construct an efficient routing protocol is a tough and tedious task. Mobile Ad hoc Networks As mentioned before an ad hoc network is a wireless network, which do not have a centralized and fixed infrastructure. MANET is referred to a wireless ad hoc network. In which nodes are free to move arbitrarily. In a MANET, mobile nodes transmit and receive the traffic. Also mobile nodes can act like routers by forwarding the neighbors traffic to the destination. As the routers are mostly multi hops [60]. MANET does not need base stations of wired infrastructure. The mobile nodes in wireless network range can communicate with each other. MANET is self organized network. The mobile nodes form a network automatically without a fixed infrastructure and central management [60]. The mobile nodes have transmitters and receivers with smart antennas, which enable the mobile nodes to communicate with other mobile nodes in the network. The topology of the network change every time by getting in and out of the mobile nodes in the network. In the beginning MANET was designed for military use but now the MANET is used in many areas. Such as in disaster hit areas, data collection in some region, in rescue missions, virtual classes and conferences [60]. This concept with ad hoc network makes the full name of mobile ad hoc network (MANET). By growing the network, combined with the node mobility. The challenges of self configuration of the network become more evident. Security in the MANET is a very important issue. Many techniques were defined for the security of MANET. Intrusion detection technique is investigated in reference [60]. Mobile nodes in the network waste much energy by joining in and out with connection to wireless network. This connection and reconnection create energy limitation in the network. The main purpose of developing the ad hoc routing protocols to cope with the dynamic nature of MANET. The routing protocols efficiency can be determined by the battery power consumption. Energy is consumed during participation of a node in a network and also in routing of traffic. The routing protocol which adapts to the connection tearing and mending is also considered vital. Such routing protocols are AODV, DSR and OLSR, TORA, Wireless Routing Protocol (WRP), Zone Routing Protocol, and Two-Zone Routing Protocol (TZRP) [21]. We will discuss reactive and proactive routing protocols i.e. AODV, DSR and OLSR in chapter 3 respectively. The internet engineering task force (IETF) MANET working group (WG) was dedicated to standardize the routing protocols in MANET. RFC 2501 specifies the charter of the working group [8]. An Example of MANET Application The versatility and self configuration of MANET makes them a best choice for a wide range of applications. MANET can be used in natural disaster areas, pre planed strategic event like surveillance, data collecting in some regions, conferences and virtual classes. In such areas where the fixed infrastructure is not available before. Like earthquake hit areas where the fixed infrastructure has been destroyed, in flooded areas, fire or explosion hit areas, train or air plane crash [21]. A very common use of MANET is during business conferences. The only and key attribute that make MANET ideal is their self configuration and low cost of deployment. Here we will present one practical example. In a virtual class, a WiMAX radio link may be established. Then a MANET access network can be established to give coverage to those areas that is difficult to cover. The nodes far away from the base station rely on midway nodes for communication. Thus provide a best communication network in such hostile situation. Above in figure 1, a deployed MANET over WiMAX backbone is shown. In this figure the mobile nodes and the WiMAX_WLAN Router form a MANET. These nodes are connected to the WiMAX_WLAN router and the router is further connected to the WiMAX network. The router is working like a boundary between the MANET and the WiMAX. The WiMAX_WLAN router is capable of translation between the MANET protocols and the WiMAX network protocols, and also the backbone protocols the WiMAX is connected with. The figure 1 is shown above. Chapter 3 Ad hoc Networks Routing Protocols The theoretical concepts of ad hoc routing protocols are discussed in this chapter. The behaviors of proactive and reactive routing protocols will be analyzed. Routing Routing means to choose a path. Routing in MANET means to choose a right and suitable path to the destination from the source. Routing terminology is used in different kinds of networks. In telephony technology, electronic data networks and in the internet network, the term routing is used. Here we are more concern about routing in mobile ad hoc networks. Routing protocols in mobile ad hoc network means that the mobile nodes will search for a route or path to connect to each other and share the data packets. Protocols are the set of rules through which two or more devices (mobile nodes, computers or electronic device) can communicate to each other. In mobile ad hoc networks the routing is mostly done with the help of routing tables. These tables are kept in the memory cache of these mobile nodes. When routing process is going on, it route the data packets in different mechanisms. The first is unicast, in which the source directly sends the data packets to the destination. The second is broadcast; it means the source node sends messages to all the near and far nodes in the network. The third is anycast, in this the source node sends data packet to anyone which is not in the node group. Routing types Routing has two basic types, which are as under Static Routing Dynamic Routing Static routing is done by the administrator manually to forward the data packets in the network. Static routing is permanent. No any administrator can change this setting [29]. These static routers are configured by the administrator, which means there is no need to make routing tables by the router. Dynamic Routing is automatically done by the choice of router. It can route the traffic on any route depend on the routing table. Dynamic routing allows the routers to know about the networks and the interesting thing is to add this information in their routing tables. This is shown in the figure 3.1 below. In dynamic routing the routers exchange the routing information if there is some change in the topology [61]. Exchanging information between these dynamic routers learn to know about the new routes and networks. Dynamic routing is more flexible than static routing. In dynamic routing it have the capability to overcome the overload traffic. Dynamic routing uses different paths to forward the data packets. Dynamic routing is better than static routing. Routing protocols There are several kinds of routing protocols for wireless ad hoc networks. These routing protocols are categorized as reactive or proactive routing protocols [8]. The ad hoc routing protocols which have both proactive and reactive merits, is called hybrid routing protocols. The first kind of protocol is proactive or table driven routing protocol. The second kind of protocol is called reactive or on-demand routing protocol. The first kind of protocol is simply called Proactive MANET Protocol (PMP). Proactive routing protocol detects the layout of the network actively. A routing table can be maintained at every node. From which a route can be determined with less delay. The proactive routing protocols provide good reliability on the current network topology [21] and low latency for deciding a route. The OLSR is a proactive routing protocol. The second kind of protocol is simply called Reactive MANET Protocol (RMP). In these kinds of protocols the communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are mostly suited for nodes with high mobility or nodes that transmit data rarely. There are some reactive routing protocols which we will consider here. These reactive routing protocols include AODV, DSR and TORA. An ad hoc routing protocol is a standard. That controls the decision of the nodes that which route the nodes have to take to the destination from the source node. When a node wants to join a network, it discovers the topology by announcing its presence, and listening to broadcasts from other nodes in the network. This routing discovery is performed differently according to the routing protocol algorithm implemented in the network. Proactive Routing Protocols The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed [62]. Control messages are transmitted with periodically intervals. Even if there is no data flow still control messages are transmitted. Because of these control messages proactive routing protocols are not bandwidth efficient. There are many advantages and disadvantages of proactive routing protocols. One of its advantages is that the nodes can easily get routing information, and it easily starts a session. The disadvantages are, too much data kept by the nodes for route maintenance, when there is a particular link failure its reform is too slow. OLSR (Optimized Link State Routing) It is a proactive routing protocol in MANET. It is also called as table driven protocol because it permanently stores and updates its routing table. OLSR keeps track of routing table in order to provide a route if needed. OLSR can be implemented in any ad hoc network. Due to its nature OLSR is called as proactive routing protocol. MPR nodes are shown in the given figure 3.2. All nodes in the network do not broadcast the route packets. Just Multipoint Relay (MPR) nodes broadcast route packets. These MPR nodes can be selected in the neighbor of source node. Each node in the network keeps a list of MPR nodes. This MPR selector is obtained from HELLO packets sending between in neighbor nodes. These routes are built before any source node intends to send to a specified destination. Each and every node in the network keeps a routing table. This is the reason the routing overhead for OLSR is minimum than other reactive routing protocols and it provide a shortest route to the destination in the network. There is no need to build the new routes, as the existing in use route does not increase enough routing overhead. It reduces the route discovery delay. Nodes in the network send HELLO messages to their neighbors. These messages are sent at a predetermined interval in OLSR to determine the link status. Here we can understand this by Figure 3.3. If node A and node B are neighbors, node A sends HELLO message to B node. If B node receives this message, we can say the link is asymmetric. If now B node sends the same HELLO message to A node. This is the same as first case, called asymmetric link. Now if the two way communication is possible then we can call it symmetric link, as shown in Figure 3.3. The HELLO messages contain all the neighbor information. This enables the mobile node to have a table in which it has information about all its multiple hop neighbors. A node chooses minimal number of MPR nodes, when symmetric connections are made. It broadcast TC messages with information about link status at predetermined TC interval [62]. TC messages also calculate the routing tables. In TC messages MPR node information are also included. Reactive Routing Protocols Reactive routing protocols are called on-demand routing protocols. These routing protocols are called when they are required. So the routes are built when they are needed. These routes can be acquired by sending route requests through the network. Disadvantage of this algorithm is that it offers high latency in searching a network. We will consider AODV and DSR in this report. But the analysis will be of AODV and DSR in the fifth chapter. AODV (Ad hoc On-demand Distance Vector) AODV is an on-demand routing protocol. The AODV algorithm gives an easy way to get change in the link situation. For example if a link fails notifications are sent only to the affected nodes in the network. This notification cancels all the routes through this affected node. It builds unicast routes from source to the destination. The network usage is least. Since the routes are build on demand so the network traffic is minimum. AODV not allowing keeping extra routing which is not in use [63]. Two nodes wish to establish a connection in an ad hoc network. AODV is responsible to enable them to build a multihop route. AODV is loop free. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity. This is the characteristic of this algorithm. When a node send request to a destination, it sends its DSNs together with all routing information. It also selects the most favorable route based on the sequence number [11]. There are three AODV messages. One is Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs) [1]. By using UDP packets, the sources to destination routes are discovered and maintain by these messages. For example the node which request, will use its IP address as Originator IP address for the message for broadcast. It simply means that the AODV not blindly forwarded every message. The number of hops of routing messages in ad hoc network is determined by Time-To-Live (TTL) in the IP header. When the source node wants to create a new route to the destination, the requesting node broadcast an RREQ message in the network. In the figure 3.4 the RREQ message is broadcasted from source node A to the destination node B. The RREQ message is shown by the black line from source node A to many directions. The source node A broadcast the RREQ message in the neighbor nodes. When the neighbor nodes receive the RREQ message it creates a reverse route to the source node A. This neighbor node is the next hop to the source node A. The hop count of the RREQ is incremented by one. The neighbor node will check if it has an active route to the destination or not. If it has a route so it will forward a RREP to the source node A. If it does not have an active route to the destination it will broadcast the RREQ message in the network again with an incremented hop count value. The figure 3.4 shows the procedure for finding the destination node B. The RREQ message is flooded in the network in sea rching for finding the destination node B. The intermediate nodes can reply to the RREQ message only if they have the destination sequence number (DSN) equal to or greater than the number contained in the packet header of RREQ. The intermediate nodes forward the RREQ message to the neighbor nodes and record it in their routing table. The addresses of the neighbor nodes from which it get the RREQ message. This information will be used to make a reverse path for RREP message from the destination node. When the message reach to the destination node. It calculates the shortest path to the source. In the figure 3.4 it is shown. The destination node B replies with RREP message denoted by the dotted orange color line. From node A to node B the shortest path is the lower one shown with dotted line. These nodes routes information were saved in the routing tables and were used to build a reverse route from destination to the source node with the message RREP. The request reach to the destinat ion and then RREP has reached to the originator of the request. This route is only available by unicasting a RREP back to the source. The nodes receiving these messages are cached from originator of the RREQ to all the nodes. When a link is failed an RERR message is generated. RERR message contains information about nodes that are not reachable. The IP addresses of all the nodes which are as their next hop to the destination. All the routing information about the network is stored in the table. The routing table have these route entries; (i) destination IP address, (ii) Destination Sequence Number (DSN), (iii) Valid Destination Sequence Number flag (iv) other state and routing flags (e.g., valid, invalid, repairable being repaired) (v) network interface (vi) hop count (number of hops needed to reach destination) (vii) next hop (viii) the list of precursors and lifetime (Expiration time of the route). DSR (Dynamic Source Routing) Dynamic Source Routing Protocol is a reactive routing protocol. DSR is on demand routing protocol. It is a source routing protocol. It is a simple and efficient protocol. It can be used in multi hop wireless ad hoc networks [64].