Wednesday, July 31, 2019

Junk food in schools Essay

The Government had set out a ban to prevent junk food from being sold to children at canteens. Mark Fraser had written a letter to a newspaper company called Community Chronicle on the 29th of October 2010 to share his disbelief at the government’s vain attempt to prevent obesity. Throughout this piece, he uses an attacking tone. He aims to target the audience of parents with children in schools to agree with him on his contention that this vain attempt will not benefit the children. Since the beginning, Fraser believes that eating habits are heavily influenced by the parents. He urges parents to take responsibility of their own children. He admits that he weighs â€Å"close to 100 kilograms† and further strengthens his statement by claiming that he is a â€Å"responsible parent.† He personalizes the statement and enables the audience to see him as a regular person and also being a responsible parent for his children despite being overweight. Fraser argues that children need to learn â€Å"self-restraint† and that parents should be responsible to make â€Å"informed decisions† for their children. He implies to the audience that a responsible parent should educate their children on their food choices. Fraser quoted Dr Peter Clifton who said â€Å"37 percent† of their daily energy intake is consumed at school, but only â€Å"14 percent† was lunch bought from the school canteen and â€Å"schools should be a focus for combating childhood obesity but strategies were needed to tackle the lunchbox, not just the school canteen.† He shifts the blame from the school cafeteria to the parents, implying that the parents should make good decisions for their children when packing for them. Fraser believes that the bans will have no impact on children’s eating habits. He begins by claiming this â€Å"strategy will not make our children perfectly healthy eaters† and † it will not encourage our kids to get out and get fit.† He implies that they’re other more effective solutions out there other than â€Å"canteen policing†. Fraser had also quoted two major principals’ associations that â€Å"young people consume at most 5 of their 21 meals a week at school† and the policy would make kids feel that â€Å"junk food is an attractive â€Å"taboo†.† He reinforces his contention by implementing the use of expert opinion, leading the audience to be more likely to believe his contention. Lastly, Fraser expresses his concern regarding the schools’ finances by stating that the â€Å"canteen is a major revenue stream for school funding.† He suggests that once the ban is put into place, sales wouldn’t be too great and there schools would lose it’s main source of revenue. Fraser also questioned whether the government would be â€Å"allocating additional funds for the revenue shortfall† He also suggested that the government might not fund the school’s revenue shortfall even if the school is affected by the ban. Fraser suggests that the ban will most likely cause major financial problems regarding the schools’ revenue steam. Fraser believed that the ban proposed by the government was merely a waste of time. He had strongly conveyed his negative opinion toward the government’s approach from the very start. He believes that children’s eating habits are majorly influenced by the parents, not the school canteen’s food choices. Fraser also believes that the bans will be off no impact toward children’s eating habits and at the same time also cause major financial problems for the school. He urges for the state government to â€Å"wake up† and see that â€Å"kids need opportunities to make their own decisions† and â€Å"stay active.†

Tuesday, July 30, 2019

Product Mix Essay

What Is a Product Mix? Product mix, also known as product assortment, refers to the total number of product lines that a company offers to its customers. For example, a small company may sell multiple lines of products. Sometimes, these product lines are fairly similar, such as dish washing liquid and bar soap, which are used for cleaning and use similar technologies. Other times, the product lines are vastly different, such as diapers and razors. The four dimensions to a company’s product mix include width, length, depth and consistency. The Service Quality Dimensions Every company owner wants to get loyal customers which add to repeating purchases and of cause increasing their maximum revenue. But to get there they need to know about the 5 Service Quality Dimensions. Many actually think that service is just a little part of the marketing mix, but it is actually a very important part of both the 4 and 7 P’s Each of the 5 Service Quality Dimensions makes an extra addition to the level and quality of service which the company offers their customers. It also makes the service far more unique and satisfying. Dimension 1 – tangibles; The tangible Service Quality Dimension refers to the appearance of the physical surroundings and facilities, equipment, personnel and the way of communication. In other words, the tangible dimension is about creating first hand impressions. A company should want all their customers to get a unique positive and never forgetting first hand impression, this would make them more likely to return in the future. Dimension 2 – reliability; The reliability Service Quality Dimension refers to how the company are performing and completing their promised service, quality and accuracy within the given set requirements between the company and the customer. Reliability is just as important as a goof first hand impression, because every customer want to know if their supplier is reliable and fulfill the set requirements with satisfaction. Dimension 3 – responsiveness; The responsiveness Service Quality Dimension refers to the willingness of the company to help its customers in providing them with a good, quality and fast service. This is also a very important dimension, because every customer feels more valued if they get the best possible quality in the service. Dimension 4 – assurance; The assurance Service Quality Dimension refers to the company’s employees. Are the employees skilled workers which are able to gain the trust and confidence of the customers? If the customers are not comfortable with the employees, there are a rather large chance that the customers will not return to do further business with the company. Dimension 5 – empathy; The empathy Service Quality Dimension refers to how the company cares and gives individualized attention to their customers, to make the customers feeling extra valued and special. The fifth dimension are actually combining the second, third and fourth dimension to a higher level, even though the really cannot be compared as individuals. If the customers feel they get individualized and quality attention there is a very big chance that they will return to the company and do business there again. Appendix Reliability (1) Providing services as promised. (2) Dependability in handling customers’ service performed. (3) Performing the services right the first time. (4) Providing services at the promised time. (5) Maintaining error-free records. Responsiveness (1) Keeping customers informed about when services will be performed. Service quality dimensions Gi-Du Kang and Jeffrey James Managing Service Quality Volume 14  · Number 4  · 2004  · 266–277 276 (2) Prompt service to customers. (3) Willing to help customers. (4) Readiness to respond to customers’ requests. Assurance (1) Employees who instill confidence in customers. (2) Making customers feel safe in their transaction. (3) Employees who are consistently courteous. (4) Knowledgeable employee to answer customer questions. Empathy (1) Giving customers individual attention. (2) Employees who deal with customers in a caring fashion. (3) Having the customer’s best interest at heart. (4) Employees who understand the needs of their customers. (5) Convenient business hour. Tangibles (1) Modern equipment. (2) Visually appealing facilities. (3) Employees who have a neat, professional appearance. (4) Visually appealing materials associated with the service. Technical quality (1) It is successful to complete a call. (2) There is no noise during the call. (3) The call can be completed without the interruption. Image (1) It is a reliable company. (2) It provides an excellent service to customers. (3) It is a successful company. (4) It makes a lot of contribution to the society. (5) It has an superior technology in cell phone service. (6) It is sincere to the customers. (7) It has a good reputation. (8) It is a large-scale company. (9) It is familiar to the customers. (10) It is honest. Customer satisfaction (1) The services have not worked out as well as I thought it would. (2) I am satisfied with my decision to use this service. (3) Sometimes I have mixed feelings about keeping it. (4) My choice to use this service was a wise one. (5) If I could do it over again, I’d choose a different company. (6) I feel bad about my decision to use this service. (7) I am not happy that I used this service. (8) Using this service has been a good experience. Note: are presents an item removed after the CFA. Service quality dimensions Gi-Du Kang and Jeffrey James Managing Service Quality Volume 14  · Number 4  · 2004  · 266–277 Promotional mix; There are five main aspects of a promotional mix These are: Advertising – Presentation and promotion of ideas, goods, or services by an identified sponsor. Examples: Print ads, radio, television, billboard, direct mail, brochures and catalogs, signs, in-store displays, posters, motion pictures, Web pages, banner ads, and emails. Personal selling – A process of helping and persuading one or more prospects to purchase a good or service or to act on any idea through the use of an oral presentation. Examples: Sales presentations, sales meetings, sales training and incentive programs for intermediary salespeople, samples, and telemarketing. Can be face-to-face selling or via telephone. Sales promotion – Media and non-media marketing communication are employed for a pre-determined, limited time to increase consumer demand, stimulate market demand or improve product availability. Examples: Coupons, sweepstakes, contests, product samples, rebates, tie-ins, self-liquidating premiums, trade shows, trade-ins, and exhibitions. Public relations – Paid intimate stimulation of supply for a  product, service, or business unit by planting significant news about it or a favorable presentation of it in the media. Examples: Newspaper and magazine articles/reports, TVs and radio presentations, charitable contributions, speeches, issue advertising, and seminars. Direct Marketing is a channel-agnostic form of advertising that allows businesses and nonprofits to communicate straight to the customer, with advertising techniques such as mobile messaging, email, interactive consumer websites, online display ads, fliers, catalog distribution, promotional letters, and outdoor advertising. Corporate image corporate image may also be considered as the sixth aspect of promotion mix. The image of an organization is a crucial point in marketing. If the reputation of a company is bad, consumers are less willing to buy a product from this company as they would have been, if the company had a good image. Sponsorship is sometimes added as an seventh aspect

Monday, July 29, 2019

Aniconic and Iconic Art in South Asian Art Essay

Aniconic and Iconic Art in South Asian Art - Essay Example Image No.4 is a sculpture known as the Bodhisattva of Ajanta from south-central India belonging to the 5th century CE, which is a possible representation of the Guptas’ golden age. This art form is an illustration of dynasty vs. region as it is brought out by local vs. foreign traditions. Image No.5 is an illustration of a large temple known as Ambh Sharif that is located on a salt range in West Punjab, Pakistan that was built in the 10th century AD. The building representation of the emphasis placed on dynasty vs. the importance of regional traditions. It is also a clear representation of the fluidity of iconography between water cosmology, Hinduism, Buddhism, Jainism, and Islam. Image No.6 is a folio from the Kalpastura & Kalakacharya-Katha of northern India possibly from Delhi with the catalog No.1475. This art form represents religion, its influences on trade and conquest and its role as a pan-Asian connector. It illustrates the fluidity of architectural iconography among Hinduism, Jainism, and Islam. Image No.7 is a folio from the Harivamsa catalog No.1595 called Fatehpur Sikri or Agra of India. It belongs to the art of the Mughals, Rajputs and Deccani rulers’ period. In the context of this paper, this art form is a primary source of information regarding continuities and innovations of Islam in South Asia (DhÄ r and NMI 183). It is also a representation of the comparison between dynasties vs. regional traditions, the fluidity of iconography among Hinduism and Islam, and fluidity among the religious and secular realms. Image No.8 is a piece of art that is described as Karkhana 89 of natural pigments on Wasli Ca.2003, and it features on the contemporary trends section. Aniconism is the religious belief or practice that avoids or bans depiction of deities in art or other artistic expressions.

Sunday, July 28, 2019

Is film dead should it be buried in favor of digital film Essay

Is film dead should it be buried in favor of digital film - Essay Example For nearly a century, film has been the leading choice of professionals for capturing images, unraveling a multibillion-dollar industry until 2000. Digital capturing devices got their start in 1969 at Bells Lab with the invention of the charge-coupled device (CCD). The CCD, an invention by George Smith and Willard Boyle, uses an electrical charge to activate pixels when light hit the censors rather than create an image through grain re-arrangement It was not until the Dogme 95 era in the early 1990's that filmmakers saw the potential of digital cinema as a viable form for telling stories. Approximately a decade later, George Lucas and Sony teamed up to create the first professional digital video cameras that offer many of the same features of 35mm motion picture cameras. The release of Star Wars II in 2002 marks the instance in the film history when a one-hundred percent digital production of the film becomes successful, sparking the embracement of digital film revolution. For nearly a decade after 2002, companies such as ARRI, Red, Sony, Canon, and Panavision on digital film have spent billions of dollars on research and development to further the efficiency of digital film cameras. It is a digital millennium. Everything is going digital: cars, houses, computers, everything under the sun is. Just like in every other industry, controversy dominates as to which between the devil we know (old), and the strange angel (new), is the path to maximum achievement and not doom of the film industry. This study will discuss in depth the features of digital film that saw it overtake and kill the film, plus the mileage it has so far gained above it. Color grading This is the process of alteration and enhancement of an image, video, or motion picture to achieve a certain appearance. Digital film allows for capturing and post-editing, making this process much easier as compared to film. According to Paramour Productions, digital shooting allows for post-shoot editing of indiv idual scenes unlike in the film era that supported only two shooting modes: tungsten-balanced and daylight-balanced films. This means color temp fluctuation was very likely, varying as per the available light’s intensity, which meant all the footage needed correction to achieve a white consistent point to start the grading. This further explains why in the film era, a shoot required several rooms with different customizations to achieve variations. However, today, digital filming allows shooting from a single location or prop and with the use of advanced software, allows easy color alteration or grading from just a computer unlike the use of actual rooms, props or scenes to achieve certain effects. In addition, and according to Hoad, Hollywood incorporates much use of digital color grading to achieve extreme special effects impossible with film as it allows for post-production alteration as with the 2000 movie O Brother, Where Art Thou? It is the first filming to be put on a hard drive, allowing for creation of a Digital Intermediate point (DI), from where the editor used â€Å"virtual crayons† to achieve an explosion of special effects. The guardian refers to color grading as an absolute necessity. Distribution, marketing, and exhibition According to Fischer (95), in the year 2000, Hollywood disseminated a full movie, Titan AE via the internet, which it digitized before sending it to its destination,

Saturday, July 27, 2019

Art class Essay Example | Topics and Well Written Essays - 1500 words - 1

Art class - Essay Example Braque had had far less training than Picasso. He is quoted as saying " I couldn't portray a woman in all her natural loveliness . . . I haven't the skill. No one has. I must, therefore, create a new sort of beauty, the beauty that appears to me in terms of volume, of line, of mass, of weight, and through that beauty interpret my subjective impression. Nature is a mere pretext for a decorative composition, plus sentiment. It suggests emotion, and I translate that emotion into art. I want to expose the absolute, and not merely the factitious woman.(Braque 1910). They both were relatively alienated from society and used cubism to express their inner most secretive obsessive desires: music and sexual lust. ( Fry 297) "Braque's preoccupation with music and musical instruments is evident in the frequency of their appearance in his works, as frequent as that of women and of guitars or violins as alter egos of women in Picasso.(Fry 298) The painting which will be compared will show these ch aracteristics. Three paintings will be compared of Georges Braque to those of Pablo Picasso to show their different use of "cubism" as well as their similarities. Black period 1906-1907 'Epoque negre "African Art" was significant in proving to himself that he could break away from classism. . (Warncke, black-period) As he always said, art was an experience, he had found some ancient artifacts that he used in Les Demoiselles d'Avignon. The faces of the left are based on the Iberian art and on the right on African art which was in his possession..(A friend had taken them from the Louvre) He wanted to use African art as a means to be able to innovate as Van Gogh used Japanese art. He was fascinated by the African art at the Trocadero Museum in Paris. His use of Cubism represented the geometrical forms. The concept of images remained. It is most fascinating in seeing the progress from his blue period two years before with his distinct bodies and the harsh angles of the bodies and faces. Before his blue period he depended on romanticism. In his blue period, his biggest influence was El Greco and the grief of having lost his good friend. In his rose period, he started to show his own style which was completely manifested in his Black period. His black period gained him followers who became interested in his abstract style of painting. George Braque went from Matisse and came to study with Picasso. This was the being of his new period . Some call it the beginning of Cezanne's cubism because of the monochrome, the geometrical forms and the visual paintings of images. It was the breakthrough from classism once and for all. Cubism: 1907 -1915 the birth of abstract art. His Demoiselles d'Avignon had several angles in which the viewer could see. "The language of Cubism was to see an object independently from different viewpoints" (Warncke 2004) When George Braque associated himself with Picasso he used cubism to show natural objects: technique of faceting. Braque's Nude 1 907-1908 would be his equivalent of his first attempt at cubism. He shows the modest use of colors as he uses 'the roses and blue hues of Picasso. Her forms are not as welled defined. It shows his influence of Cezanne. In his later works, he takes the form and turns them into geometrical shapes. His Maison a l'Estaque 1908 shows his fascination with geometrical forms and the need to show a background and a foreground in the painting. "His treatment of space and time is directly related to the classical tradition". (Fry 298) The concept of

Different Aspects of Starting OASOGB Essay Example | Topics and Well Written Essays - 500 words

Different Aspects of Starting OASOGB - Essay Example Further, in relation to marketing efforts, the virtual competitive environment does play a significant role in determining how successful Old American can actually be on the Internet website. After careful analysis of pricing, delivery policies, and marketing efforts of competition, OASOGB has determined that our current marketing strategy, using various promotional incentives, far exceeds the advertising capabilities of our competitors. Also highly beneficial to Old American is the socio-cultural environment both locally and across the whole of the United States. Research indicates that modern consumerism, such as the value placed on material goods in America, continues to escalate year after year (Boone & Kurtz, 2006). In a culture in which gift-giving and the exchange of tangible gratitudes is a common element of lifestyle, simply by the nature of the companys products the business is catering to the social demand for luxury items and gift presentation. Further, there is a growing demand in the United States for ethical and socially responsible business behaviors, with consumers and advocacy groups alike continuously applying pressure to large-scale businesses to be more ethical. As previously discussed in other business reports, Old American continuously gives back to the community through charitable activities, thus satisfying the consumer demand for ethics and delighting them because of our responsible busines s behaviors. Though the technological environment directly impacts our success, as OASOGB continues to monitor and incorporate more streamlined distribution methods to lower our delivery costs, there is not a substantial influence in connecting technology with that of Old American success. At the same time, the political environment in America is one which applauds the creation of profitable businesses, causing little to no conflict with how the company continues to

Friday, July 26, 2019

Environmental Impact of Products Essay Example | Topics and Well Written Essays - 1250 words

Environmental Impact of Products - Essay Example Their examples can be used to show how companies had to change their products and their processes in order to become more environmentally friendly. Environmental degradation has become a very important topic for the world today watchdog groups as well as concerned bodies focus on various ways and means in which they can force giant companies to help the environment rather than harm it (Green, 2005). Government regulation, think tank pressure, as well as the opinions of various consumer groups, can force companies to become friendlier towards the environment (Schulte, 2006). Undoubtedly, human activities including the actions taken by corporations have had a visible impact on the global environment and this has been noted by the scientific community at large. While the government can make laws to regulate a bare minimum to be done by corporations, consumers have to ensure that they do not support those companies which are hurting the environment (VonAncken, 2006). Consumers who have access to vast amounts of information about the companies they make purchases from can demand that the brands or businesses which they support behave ethically and show their responsibility for not hurting the environment. Organisations have to show that they are ethical producers since consumer wish to be ethical themselves and may make the purchase decisions based on knowing if the company is helping the environment rather than hurting it (Ethical Consumer, 2006). By being friendly to the environment, companies such as Apple and Cadbury Schweppes are helping their shareholders and investors (Phillips, 2003). Through the scientific developments in recycling, proper water conservation, and more efficient technologies for generating energy, individuals and companies have made great advances in becoming more environmentally responsible. At the same time, these efforts fall short of what will be needed in the world for sustained long-term prosperity.

Thursday, July 25, 2019

Immigration Essay Example | Topics and Well Written Essays - 750 words - 3

Immigration - Essay Example However, in the pursuit of the freedom and success that people dream about, many migrate to foreign countries, risking so many things and achieving nothing but being trapped in similar or even worse situations than those which they have left at home. This paper will look deeper into the political and economic issues which are the issues people leave home and the same problems which they face in their new residents as well as possible remedies for such situations. In Flight from Oaxaca, the author shares why Luz Dominguez, Marcela Melquiades and other Mexican immigrants have left their homes. It is revealed that the primary reason for their flights is poverty. They all agree that life in their country of origin is difficult where the minimum wage cannot even be enough to feed their families. Their poverty, though, is not because they are lazy. Instead there are forces that are out of their control. For instance, the political situation in Oaxaca, a state of Mexico, brought about too many difficulties to the citizens. In 2006, there had been so many protests because of the belief that there was fraud in the July presidential election. This led to the paralysis of major businesses. In addition, other grievances came out due to the situation. For instance, citizens claim that Mexico is not a poor country but it has become one because the oil which is being exported does not go back to the people which, they have now questioned. Mexicans say that if the government will only do its job well, the people will not suffer and will not have to choose moving out of the country. For reasons of poverty and political issues, Dominguez and other Mexicans crossed the borders to the United States. However, they seem to have forgotten to consider that even in the United States, there are political issues and poverty is also a common problem to the residents. It may be true that

Wednesday, July 24, 2019

Philosophy of Media Ethics Essay Example | Topics and Well Written Essays - 1250 words

Philosophy of Media Ethics - Essay Example I will also seek to dispel the notion that a conflict of interests develops between social science which is based on generalized information and natural sciences which focus on specifics. Roll-Hansen has argued that while the press is designed to provide independent opinion based on reliable information and well supported knowledge, discrepancy can be created based on political expediency. Hansen has focused on the need for basing reports on, "reliable knowledge" which he implies to be, "strongly confirmed by empirical investigations" and also corroborated by, "other well established knowledge". He also dwells on the need for complete knowledge and basing reports on the whole truth as is expected from witnesses during trials. In the second part of my exegesis I will dwell on how the specific events denoted by Hansen of acid rain and lifting the ban on whale hunting were not misrepresented by the media but were the result of relative ignorance of implications and that the biases had crept in due to external interests rather than representation of falsehood. Hansen feels that the media does not provide accurate information and tends to support public assumptions. Hansen cites two examples to support this hypothesis. The first is the alarm in Norway based on media reports of extensive damage to forests due to acid rain in Germany and Central Europe with reports of, "yellowing, loss of needles and gradual thinning of the tree crown with death ensuing". This created public alarm of, "forest death". Scientists at the Norwegian Institute for Forest Research (NISK) held that the threat of damage to forests due to acid rain supported by the minister of environment was, "over dramatized" and there was no reason to panic. A press conference organized by the NISK to provide balanced information of the case did not receive much attention as journalists felt it lacked a good story and they were, "disappointed". The danger of acid rain to Norwegian forests thus became firmly entrenched in public opinion. A book, "If Trees could Cry" was published with support from the Norwegian ministry of environment, prefaced by the minister who criticized the role of scientists at the NISK. Evidence that the damage could have occurred due to causes such as drought, untimely frost, fungi and so on was ignored. Public opinion was so strong, that NISK scientists fell silent and some even supported the theory, falling prey to opposition which was proving, "strenuous in the long run and not conducive to procuring economic support". Hansen feels that the journalists themselves were, "caught in bias producing mechanisms" and consistently ignored substantial facts. I feel that this argument over states the case that n ewspapers can form and sustain public opinion independently. The second case quoted is that of wide spread condemnation of the Norwegian government for permitting resumption of commercial hunting of minke whales in 1992. The charter of the International Whaling Commission (IWC) denotes that a balance between conservation and interest of the whaling industry should be maintained. The protests arose based on depletion of stocks and a stronger argument as per

Tuesday, July 23, 2019

Government Contracts Essay Example | Topics and Well Written Essays - 500 words

Government Contracts - Essay Example The topics in this process include the persons who will be involved, how the process will be structured and where the real negotiations will take place. In the same way, the business has to outline the whole process of government contracting and come up with an effective way on how to approach it (Stein, 2011). It is normally realized that participating in government contracts involves a lot of bureaucracy and a lot of procedures which must always be adhered to by the business. All these factors must be known beforehand in order for the process to be effective. In any case, government contracts normally attract several parties and competition is therefore very stiff. The organization therefore needs to get acquainted with all the operations of the government relating to contracting. In the same way, every government contract comes with a series of rules and regulations which must be well understood. As a result, it is important to conduct the pre-negotiation in order to ensure that everything is taken into account and nothing remains unattended. Without conducting pre-negotiations, it is normally seen that negotiations are bound to fail or become counterproductive. The process helps in reducing much of the conflicts that are normally realized in the actual negotiations process (Alston, 200 5). Considering the importance of pre-negotiations prior to engaging in government contracts, it is normally viewed as part of the negotiations. Like the actual negotiation, pre-negotiation is normally conducted in specific stages in order to realize the objectives. The first stage involves definition of the problem; the second stage involves showing commitment to the negotiation while the third stage involves arrangement of the negotiation process. The participants of the actual negotiations are selected in the pre-negotiation stages and the boundaries of the actual negotiations are also effectively demarcated in the process. Most importantly, the agenda for the

Monday, July 22, 2019

Organic Food Speech Essay Example for Free

Organic Food Speech Essay I have a question for you at the beginning of this speech. Who just eat organic food everyday? Obviously! According my research, which I gave the question to my friends. Most of them know about organic food, but only few of them just eat organic food which including the vegetable, meat and eggs and other people don’t take it seriously and eat fast food always. What is organic food? The United States Department of Agriculture (USDA) states that animals raised on an organic operation must be fed organic feed and given access to the outdoors. They are given no antibiotics or growth hormones. Organic crops are raised without using most conventional pesticides and using no petroleum-based or sewage-sludge-based fertilizers. Do organic and natural mean the same thing? And four main reasons to choice organic food! No, natural and organic are not same. You may see natural†, â€Å"all natural, free-range or hormone-free on food labels. These descriptions must be truthful, but dont mean they are organic. Only foods that are grown and processed according to USDA organic standards can be labeled organic. According to USDA: Organic food such as fruits, vegetables and meat can make people become healthier and organic farming can protect the environment. Choice organic vegetable! The picture for strawberry: On the right is non-organic and left is organic. For the picture down: one the right is non-organic and the left is organic. Normally, non-organic fruit or vegetable will grow faster and taste not as good as organic food. For the last picture: the right side is organic egg and left side is non-organic. The reason why the color is different is because organic chicken also eats organic feed. Choice organic meat! We also need to choice organic meet. From the picture we see. Organic Meat Comes from Animals Treated Ethically and Humanely. The organic farming looks cleaner and animal form there lives healthier. Here are some of the reasons why you should buy organic animal products. 1. Organic meat comes from animals that were given a pesticide-free diet. 2. These animals may have had some limited access to pasture. 3. They were not loaded with antibiotics, steroids and other poisons. 4. Organic meat has not been irradiated. Therefore, organic meat is not loaded with toxins–that are subsequently passed on to you when you eat them–like conventional meat is. Health and money which one you prefer: Non-organic food can cause lots of disease. Even the organic food is expensive; there is nothing important than our lives and our family’s health. According to the research from Organic Liaison: Because factory-fed cattle eat the ground-up remains of their SAME SPECIES, this can cause mad cow disease, destroying a humans central nervous system and brain. Also the animal, which grows up in dirty environment, can cause many parasitic disease and diarrhea. Studies also show that grass-fed beef contains more nutritional value, including higher levels of conjugated linoleic acid (CLA) and omega-3 fatty acids, which reduce the risk of heart disease and cancer. Here is another new research from Maryland University: Non-organic Chicken has one kind bacterium, which is resistant to modern medicine. This kind of bacteria that can cause serious and unpleasant disease that becomes a lot harder to cure. Conclusion: We know that eating organic fruits, vegetables, and other produce is the way to go. Its healthier, it tastes better, and it doesnt have any nasty toxins or chemicals. Healthy and happy life cannot live without organic food. Now let us choice organic food!

Chemistry in Our Dailylife Essay Example for Free

Chemistry in Our Dailylife Essay Our entire universe is made up of matter which is constantly changing forms and evolving into other forms of energy. Chemistry is defined as the study or science of this ever changing matter. The other sciences which we study commonly like biology, physics and mathematics are all dependent on chemistry and are known as specific studies under the elaborate subject of chemistry. Since there is chemistry seen in biological forms as well as physical states of nature, there are subjects called biochemistry and physical chemistry which help study these changes. There are many chemical changes which occur around us everyday but we are never aware of them. But this is a great way of teaching children how magical the world of chemistry is! With these real examples you can teach them by taking a chemistry in everyday life quiz, as practical studies are always fun to learn. To make this job easier for you, mentioned below are a few such examples of chemistry in everyday life, take a look! Examples There are chemical reactions in daily life like, in the way you breathe, the food you eat, the water you drink and in every motion which is taking place around you at every second of the day. It is a very important and interesting concept which could be taught to your children as they have to know, how their world works. The best way to explain this to them is to show them practically how and why are a few things in nature the way they are! You can do this by demonstrating a few kids chemistry experiments for them. An essay on this topic can be a great start to teach these kids, what a wonderful thing, chemistry is. Find out what these intelligent mechanisms of nature are, that define presence of chemistry in daily life, read on. Water, which occupies 70% of the earths surface is made by two chemical elements, hydrogen and oxygen. Soap is an emulsifier which allows oil and water to mix and so the oily mixtures on body and clothes can be removed after application of soap and water. Chemistry in kids life can also include why vegetables are colored. Colored vegetables consist of chemical compounds called carotenoids which have an area known as the chromophore. It absorbs certain wavelengths of light and thus there are colored vegetables. Food is cooked because of the steam thats present either in the water added or that which is present inside the food items. Onions make you cry due to the presence of sulfur in the cells which break after the onions are cut. This sulfur gets mixed with moisture and thus irritates your eyes. You feel hungry because of the satiety center in your brain falls short of particular hormones to function and then sends the signal of hunger. You fall in love, get attracted and have a feeling of belonging because of certain monoamines present in your brain which get stimulated through nerve sensors. If you have wondered, why is the sky blue, it is due to a phenomenon called the Rayleigh scattering, which depends on scattering of light through particles which are much smaller than the wavelength. Hence when light passes through gases, there is scattering and the sky appears blue. Coffee keeps you awake because of the presence of a chemical called adenosine, in your brain. It binds to certain receptors and slows the nerve cell activity when sleep is signaled. Anaerobic fermentation is also a great concept which is present in the chemistry of everyday life. It is present in yogurt, breads, cakes and many other baking products. It is the multiplication of certain useful bacteria which increase the size of the food and make it more filling and soft. The food chain present in every ecosystem is also a major part of everyday life chemistry. Even though it has more biological background, it eventually works because of its chemistry. With these great examples, there is no other explanation of the existence of earth and its components other than chemistry. Thus, through so much to learn from, you can easily teach your children the importance of chemistry in our day-to-day life!

Sunday, July 21, 2019

Company analysis of NUMICO

Company analysis of NUMICO NUMICO came into existence in the year 1896 when Mr Martinus van der Hagen secured all rights of a formula for infant milk from cows milk. His operation was based in The Hague in The Netherlands. In 20th century company changed the named to Nutricia but in the year 1997 when company received the designation Royal then its name changed to NUMICO NV. Recent Past of NUMICO: Strategic Corporate Development History For nearly 5 decades NUMICO worked with corporate strategy of trying to build themselves on only one baby product with limited exports. In 1946 company introduced another product but in the local market only. NUMICO for a long time tried to develop the new strategy after their first initial success in 19th century. Launching new product was not a brilliant idea though it was a sustainable decision. Usually companies spend millions of dollar developing the product and this would take some years to recover. As product development was not enough to grow in multiple folds so company made many acquisitions in different geographies. The result at the end of year 2006 was NUMICOs presence in more than 100 countries with plethora of products to sell. Products were bifurcated among different divisions like clinical nutritional products went under brands such as Nutrison, peptisorb etc. Revenue and profit margin both increased because of acquisition. Acquisitions can get a limited and desired level of success and to keep growing even NUMICO invested heavily in research development. Strategic alliance with industry giants, universities and government helped NUMICOs cause. Research development wing of NUMICO attracted the best and on a regular basis filed for the patents. NUMICO Acquisition strategy in 1998, 1999 2000 To exploit linkages between the organisation and its environment NUMICO adopted Medical Platform Marketing. NUMICO moved from supermarket shelves to practitioners clinics. Now, products for vulnerable people were prescribed by doctors. Expenses on research and development were forcing NUMICO to reach new places to recover the cost. In 1998 annual report NUMICO was a multinational company focusing on the development, production and sales of nutritional medical concepts with a great value addition. Strategy of NUMICO as per annual report of 1998 mentioned in the case study* by Eppink was as follows: The strategy of NUMICO is focused on specialisation, continuing internationalisation and profitable growth, partly by acquisitions as wll as by strategic alliances, and safeguarding the highest quality in all stages of production and services. As per the turnover in 1998, NUMICOs major revenue generating business still was infant food which was sold maximum in Western Europe which was experiencing the major falling birth rates and an ageing population. After analysing the market NUMICO bought few European companies to expand in profitable areas. In 1999, NUMICO acquired a company bigger than them in terms of production revenue. When NUMICO bought General Nutrition Companies (GNC) of Pittsburgh (USA) it was the largest manufacturer of nutritional product in the world with a stronghold in sports-nutrition market. It was a win-win situation for both the organisations where GNC was gaining from NUMICOs research to enhance their product range NUMICO could gain from the distribution network of GNC. Press release explained the reason of this acquisition which was to achieve the global market dominance.1 Acquisition was on the cards for the third year as well when NUMICO snapped Enrich International Rexall Sundown in 2000. Unlike GNC Enrich was in the business of nutritional supplements personal care products with an in house RD department for product development. Again unlike GMC, Enrich was in 10 more countries with a global distribution system. Rexall Sundown another US based organisation was acquired by NUMICo. Rexall like Enrich was a producer of nutritional supplements as well as consumer health products. NUMICO acquired another business which has got nothing to do with their main business interest like GMC. A press release describes the reason of acquisition which was again to get the pole position in the market.2 Acquisition of new businesses far from NUMICOs main business made NUMICO its own rival because NUMICO already had the presence in the market. However, Rexall could exploit the European market because of NUMICOs distribution network present in Europe. At this point in time, NUMICO was confused in their approach because two competitors (Enrich Rexall) were working under one roof and serving the same market. Strategist might have analysed the more competition less co-operation among the two brands. To make operation smoother and to serve their customers better NUMICO merged the Enrich Rexall in one new separate entity by the name Unicity. Strategy evaluation: From day one and for a long period of time NUMICO operated with one product because of which they never realised their potential as a standalone entity to grow. After not getting desired success till the end of 20th century NUMICO realised alone they cannot get the global position in market. At this position, they might have done PEST analysis to judge the environment affecting them. Even SWOT could be used as a tool to know the strong areas where they can build the future empire. PEST might have shown them that they are not functional in future markets where they can grow faster than their current strong hold markets like Western Europe. PEST can cover issues from demography to social technological changes like declining birth rates to e-commerce. By applying SWOT, one can know that NUMICO always regarded the RD as an important activity which they wont give up at any cost. Thus, they identified RD was their strength where they can build their future. Michael Porters 5 forces theory could have also applied in this case study to know why NUMICO only adopted the acquisition route. As the case study explains NUMICO was operating in such an environment where the small players could have changed the entire game. The threat from existing players and new comers was massive moreover small players were taking the competition to all geographies. Hence to enhance the global position in the market NUMICO adopted the acquisition route. Acquiring GMC was a sensible move it was reducing the competition and on the other hand it was enhancing the performance but acquiring Rexall Enrich was not at all a brilliant move. Reason being, it stretches the operational efficiency because NUMICO was not in the same domain with them. *case study (Do the Harvard referencing because I am not aware of the source) 1) Just the last line need referencing from the case study. 2) Press release in the case study Current Strategic Situation: Acquisitions in a field which was not related with their main business interest left them in a position between the pharmaceutical market and the food market. To avoid the stuck in the middle situation usually organisations adopts the Michael Porters (1998), generic strategies which is as follow: Figure: Competitive advantage Source: tutor2u.net (Accessed on: 20/03/2011) Cost Leadership: In this strategy, organisation aims to be the lowest cost producer to gain the maximum share in the market. To achieve this position organisation drive the cost down through sourcing the cheapest raw material labour cost. NUMICO was not trying to achieve the cost leadership because case study shows that they were aiming for high margin business. Hence, cost leadership is not NUMICOs domain. Differentiation: As the name suggests, in this strategy, organisations aim to be different from their competitors. Differentiation provides a competitive advantage to organisations which helped them to charge a premium price for their products services. If we look at NUMICO case study we will find that they started with one product due to patents they held the ground for long time. One product was sufficient with a patent to create the differentiation but later they acquired so many organisations which could provide them distribution network penetration in the foreign market. Acquisition which they made was not only in their own domain and at this point they started losing the gained differentiation. From super stores shelves to general practitioner prescription, move was certainly adopted to make a differentiation but due to diversified businesses it confused the distribution points. Differentiation did not pay off well because by 1998 their major revenue generator was still infant formula. Niche strategies: Here the organisation function in one specific segment and try their best to become the best provider of products services. To work in this kind of strategy organisations need to be either cost efficient or different from other players like Rolls Royce in the car market. NUMICOs acquisition exercise took them into various domains but still they tried to call themselves a Medical Platform Marketing. One platform for medical assistance to those who are vulnerable didnt work well because of plethora of products. However, from NUMICOs perspective they focused on specialisation with profitable growth. STUCK IN THE MIDDLE: NUMICO got involved in series of acquisition related unrelated to their main business interest because of which they are facing the stuck in the middle situation. To simplify the situation they tried to bring all the diversified business interests under one roof. Things are still confusing because they wanted to build on nutritional field but due to acquisitions they are working in nutritional supplements fields as well. Moreover, they acquired two competitors (Enrich Rexall) and left them in the field to compete with each other. It took some time to bring both of them under one brand name and by that time both of them did enough damage to each other. Now, NUMICO is stuck between the pharmaceutical market the food market because of their confused approach. Lot of unwise decision made which resulted in head on collusion with giants of pharmacy food business like Novartis Nestle. NUMICO always wanted to sell clinical diet foods but because of their acquisitions they are not focusing on their main stream business. NUMICO bought the US operations not to sell what they were doing before acquisition e.g. vitamins. Rather than turning them into NUMICOs regular business NUMICO started looking after their operations. First an industry expert noticed that NUMICO is facing challenges because they are not performing only in their traditional markets. Company was stuck in the middle because it was facing challenges from giants minnows at the same time. New markets where they were operative due to acquisitions were full of small players. In addition to that threat from new entrants was massive. NUMICOs strategy needed a review before they lose the global position. Strategy review: In the year 2000, NUMICOs board of directors recognised the risks from existing strategy. NUMICO due to acquisition was not paying enough attention to their cash cow i.e. infant products and now strength of NUMICO is making them vulnerable. NUMICO is a European organisation they maintain balance sheet in euro and any PEST affect in USA operation can cause serious problem to their business figures. Operation overseas involves exchange risk as well. Last but not the least even NUMICOs board realised that they are confused in approach. NUMICO was not all stuck in the middle because organisations who face this kind of situation usually subject to a takeover or merger. Finally when NUMICOs board realised the drawback associated with the strategy they should take this opportunity to reduce or eliminate the risk. Strategy review due to certain events: In the year 2001, after 1 year of realisation, company saw themselves in hot waters due to economic slowdown in the USA. In addition to slowdown, demand for nutrition herbs were plummeting too with an increased competition from low price manufacturers. Its not only NUMICO which was facing the heat but the whole sector was losing the effectiveness. If NUMICO would have done the PESTEL analysis then they could have avoided this slowdown and competition because they never saw this slowdown coming into the picture. It is necessary to explore the competitive environment to develop sustainable competitive advantage. NUMICO response to events: NUMICOs response to the situation was not at all proactive. NUMICO response was reactive that to after negative growth. CEO was asked to mind the traditional new business but not to take any other big projects. US operations gave back to back management problems to CEO which resulted in his resignation in May 2002. New CEO bifurcated the operations in three divisions and for the first time they adopted a specific approach to tackle each brand. In other words, NUMICO changed the corporate strategy to unit level strategy to take care of each business. In the year 2002, NUMICO got bad news from all the quarters of business and to make the situation worse exchange rate of US dollar was changing frequently against euro. Finally, NUMICO announced the sale of Rexall Sundown GNC to focus on high-growth/high-margin businesses of baby food and clinical nutrition. Both the brands increased the performance of its new owner. Strategic Direction for the future: After divestment, NUMICO should think about the future. Company can use BCG Matrix to determine what is to be done to remaining product portfolio. NUMICO already dumped the low-growth/low-margin products, so now; they can concentrate on long term value creations through developing high-growth/high margin products. Stars of NUMICO: NUMICOs star was infant product but due to lot of exposure in low birth rate countries their business was declining at an alarming rate. NUMICO can utilise the some money which they received from divestment to expand in those countries where birth rate is much better than Western countries like India China. For infant products, long ago NUMICO used to command premium price because of RD patents. Cash Cow of NUMICO: NUMICO should turn their infant product into cash cow by offering cost leadership. After gaining the cost leadership NUMICO can go back to their golden days. To achieve the cost leadership NUMICO doesnt have to invest heavily on supply chain because they have everything which it takes to get the advantage. Dogs of NUMICO: NUMICO already sold the Dogs from their product portfolio now they should not repeat this mistake by taking over another non-business interest investment. Question marks of NUMICO: NUMICO should avoid this block by focusing on cash cows star blocks. Imagine a scenario; if they dont pay much attention now on finding new markets for infant products then they might end-up in this block because western market has declined in term of birth rate and they already sold the maximum distribution points of GMC Rexall in USA. Hence, they should take actions on urgent basis to avoid question mark. Figure: BCG Matrix Source: www.tellingthestory.typepad.com Accessed on: 20/03/2011 BCG matrix can help in understanding the mistakes done in past to fit an all approach strategy for future. BCG matrix is not free from flaws but it certainly explains what to do what not to do. To bring back the growth back into the books of NUMICO they should adopt Ansoff Growth Matrix. As per Lynch (2006), the market options matrix examines the options available to the organisation from a broader strategic perspective than the simple market/product matrix (called in some texts the Ansoff Matrix). Figure: Ansoff matrix Source: www.cipher-sys.com Accessed on: 20/03/2011 As per Ansoff matrix, NUMICO can go for market penetration. It will be like without disturbing the companys existing range of products or services and perhaps it can attract current customers as well. Things can backfire if market penetration is planned for new customers only. For example, mobile companies offer brilliant price plans to retain the existing customer. Market penetration is smooth when the market is growing. Existing organisations with low relative market share in a booming market have little to lose but NUMICO has high relative share and if they dont attract their current as well as new customers then they might lose whatever they are holding till now. Market development using existing products could be a strategic route but for this approach they should not disturb the existing customer focus. In NUMICOs case, they should take infant products to those countries where birth rate is better than Western Europe and USA. NUMICO can slightly repackage the product then can promote to a new market segment. Product development for the existing market can be possible for NUMICO because they have their own RD centres where they can develop new concepts. NUMICO should do optimum utilisation of their all resources to counter competitive entry. NUMICOs RD centres can help them to maintain the companys stance as innovator. Diversification is not needed according to case study because they have just finished the sale of GMC Rexall. Other Strategic Options: Organic growth: NUMICO should start the change from with-in and build itself from scratch and this time they should stick to the core business. Acquisitions Mergers: NUMICO can acquire the rival business or merge with one of its rival from core business market to gain the lost momentum. Strategic Alliances: NUMICO can make some strategic alliances with few government bodies in developing countries. Licensing: NUMICO can sell their patent license or lease to its competitors to build a business from their intellectual properties. Recommendations: NUMICO needs to pursue a growth strategy in a structured way the methods by which the market opportunities associated with strategy options might be achieved. NUMICO should treat their RD outputs as their assets which they can sell in market to claim a tag of future business. Investors like to associate themselves with future markets because they know their money can take them to new avenues with high returns. NUMICO was a leader in RD and infant products but all was lost because of acquisitions in foreign un-related markets products. This time they should build themselves related to their core-strength. For RD, they hired PHD passed-outs but they never presented themselves as a smart organisation which they should focus this time. Current generation would like to associate themselves with smart organisations like Google Apple. NUMICO should aim for future parents who will buy their products services. Given the amount of analysis that can potentially be undertaken, merger with other competitors is highly recommended. Mergers are similar to acquisitions like combining two companies. However, merger can happen in one scenario where both the parties cannot take over each other. This can be a friendly hand but still a special care will be always required. Merger should be sone before identifying the strategic issues. Mergers are never meant to lose the total control of the company but to gain new markets new customers. None of the evidence suggests till date that merger is a value addition but neither has it suggested any failure when both partners are same in size. Merger might not a big value to NUMICO but it can enhance the performance. Although NUMICO can still grow as a stand alone business but to take their research in right path they need a right partner. Partner especially with same business interest but with more distribution points in desired locations can do wonders for NUMICO. NUMICO always had RD centres but they never capitalised on that asset perhaps a partner can take that advantage or turn it into their competitive advantage.

Saturday, July 20, 2019

Luxembourg :: essays research papers fc

Location Luxembourg is located in Europe and is bordered by Belgium, Germany and France. On a map, it is located at 50 N latitude and 6 E longitude. Luxembourg is very small. It is only 998 square miles, which is roughly the size of Orange County, California. All the country is inhabited, with most people living in the southern part. The Flag The flag of Luxembourg was adopted in 1845. The colors come from the Coat of Arms of Luxembourg and are red, white and blue. The flag is simply three horizontal stripes from top to bottom. The Land and People Luxembourg has two distinct regions. The Ardennes, or northern region, is mountainous. The Bon Pays, or southern region, is mostly fertile farmland. The climate is cool and moist, with snow in the mountains. There are rich deposits of iron ore creating many jobs in the steel industry. There is also fertile farmland to the south, also creating many jobs in farming. The people of Luxembourg have no native costume. They borrow much of their culture from Belgium, Germany, and France. Today, modern Luxembourgers dress like other Europeans. The people of Luxembourg like to eat smoked pork and beans, and sometimes saurkraut. Smoked ham is available all year round, and pastries are a Luxembourg favorite. Some of these pastries include rolls, muffins, cupcakes, and a special dry cake translated "Random Thoughts". Luxembourg makes beer and wine which is sold there and in other nearby countries. The buildings in Luxembourg vary from place to place. Some villages have charming old houses hundreds of years old, though in the cities there are many modern apartment and office buildings. For recreation, a Luxembourger might ride a bike, or hike in the countryside. A favorite sport of the people is volleyball. For transportaion they have railroads and highways for cars and buses. There are bike trails and hiking paths as well. Luxembourg doesn't have a culture all its own, because it ties in with its neighboring countries, Belgium, Germany, and France. The natural resources of Luxembourg are: iron ore, which is processed into steel, farm products such as wheat, corn and livestock, and grapes which are grown for winemaking. Technology The main industries of Luxembourg are steel and winemaking. Farming is also an important industry, especially with such crops as corn, wheat and livestock. The steel is exported and crops are exported, as well as used in Luxembourg. Also the wine made in Luxembourg is exported and sold there. Culture There is a lot of culture in Luxembourg. There are many art galleries featuring work from the expressionist painter, Joseph Kutter, and also that of Edward Steichen, a well

Friday, July 19, 2019

Literary Elements and Time Setting in Ethan Frome Essay -- essays rese

Ethan Frome Love does not always have happy endings. People can fall in and out of love as easily as changing clothes. "Ethan Frome," a novel by Edith Wharton, explains how a married man named Ethan struggles on with his life, secretly distracted by the yearning for his wife's cousin, Mattie Silver. The author uses literary elements and time setting in the story. Wharton has been generous in using literary elements in the novel. She has put together senses of personification and similies to thoroughly describe the plot of the story. In personifying the kitchen ornaments, the author uses "...-were hastily refreshing themselves at one corner of the supper-table which aligned its devastated pie dishes and ice cream saucers on the platform at the end of the hall." In this selection, Whar...

Education: A Path to Gender Equality in Labor Markets Essay examples --

Human capital is a fundamental labor force. Thus, encouraging greater female participation or reinforcing gender equality in labor markets worldwide will lead to gains in productivity. However, what can be done to create gender equality? A study emphasized the equality of education. When education access to women is equal to men, occupation opportunities and earnings of men and women with similar education and experience are equal. A research in Pakistan and other studies are introduced. Their findings suggest that education plays a vital part in gender equality in labor force. In another word, education can be a path to gender equality in labor markets. For education to be a path to gender equality, it must benefit woman equally to man. But the benefit of education depends on the equality of education including equality of access and equality in the learning process. Equality of access means that both genders are offered to gain access to formal, informal or other methods to the primary education. The actual attendance can be a preference to decide if the access has been approached. Equality in the learning process means that girls and boys are treated equally and have equal opportunities to learn. Even though the lessons may be approached to individuals in different learning styles, boys and girls should be exposed to the same curriculum. Also, the lesson materials which are brought to them should be free of stereotypes and gender bias. Moreover, boys and girls should have the freedom to learn, to explore and to develop their ability in all academic and extracurricular fields. When equality of access and equality in the learning pr ocess are achieved, the status of men and women and their ability to contribute to, take part in e... .... United Nations Population Fund. 2005. Web. 8th April. 2011. Melkas, Helina, et all. Towards Gender Equity in Japanese and Nordic Labor Markets: A Tale of Two Paths. July 2003. Web. 8th April. 2011. Malhotra, Anju, et all. Impact of investments in female education on gender equality. International Center for Research on Women. 27th August. 2003. Web. 8th April. 2011. Percheski, Christine. â€Å"Opting out? Cohort Differences in Professional Women's Employment Rates from 1960 to 2005.†American Sociological Review Vol. 73, No. 3 (Jun., 2008), pp. 497-517. Print. Sathar, Zeba, et all. â€Å"Women's Status and Fertility Change in Pakistan.† Population and Development Review. Vol. 14, No. 3 (Sep., 1988), pp. 415-432. Print. Tempon, Mery, et all. Ed. Girls’ Education in the 21st Century: Gender equality, Empowerment, And Economic Growth. The World Bank, 2008. Print.

Thursday, July 18, 2019

Internet and Intranet Connectivity Through Wireless Local Area Network (Wlan)

CHAPTER 1 Introduction Chapter 1 Introduction 1. 1 What is WLAN? 1. 1. 1 WLAN Wireless Local Area Network (WLAN) is a kind of local area network which established using a wireless link between the service providers and the clients using some wireless equipment. This network development is based on the IEEE 802. 11 standard. 1. 1. 2 IEEE 802. 11 IEEE 802. 11 denotes a set of Wireless LAN/WLAN standards developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The term 802. 11x is also used to denote this set of standards and is not to be mistaken for any one of its elements. There is no single 802. 1x standard. The term IEEE 802. 11 is also used to refer to the original 802. 11, which is now sometimes called â€Å"802. 11 legacy† [1]. The 802. 11 family currently includes six over-the-air modulation techniques that all use the same protocol. The most popular techniques are those defined by the b, a, and g amendments to the original standard; security was originally included and was later enhanced via the 802. 11i amendment. 802. 11n is another modulation technique that has recently been developed; the standard is still under development, although products designed based on draft versions of the standard are being sold. Other standards in the family (c–f, h, and j) are service enhancements and extensions or corrections to previous specifications. 802. 11b was the first widely accepted wireless networking standard, followed by 802. 11a and 802. 11g [1]. 802. 11b and 802. 11g standards use the 2. 40 GHz (gigahertz) band, operating (in the United States) under Part 15 of the FCC Rules and Regulations. Because of this choice of frequency band, 802. 11b and 802. 11g equipment can incur interference from microwave ovens, cordless telephones, Bluetooth devices, and other appliances using this same band. The 802. 1a standard uses the 5 GHz band, and is therefore not affected by products operating on the 2. 4 GHz band. Table 1. 1: Protocol Summary of IEEE 802. 11 Protocol Legacy 802. 11a 802. 11b 802. 11g 802. 11n Release Date 1997 1999 1999 2003 2006 Operating Frequency GHz 2. 4-2. 5 5 2. 4-2. 5 2. 4-2. 5 2. 4 and/or 5 Throughput (Typ) Mbps 0. 7 23 4 19 74 Data Rate (Max) Mbps 2 54 11 54 248 = 2Ãâ€" 2 ant Range (Indoor) meters ~25 ~30 ~35 ~35 ~70 Range (Outdoor) meters ~75 ~100 ~110 ~115 ~160 2 1. 2 Why it should be used? Bangladesh entered the Internet world in 1993 using offline E-mail services. Online Dial-up services started in 1996 through VSAT based data connectivity. But it is not possible to give a Dial-up connection to all because; it uses the BTTB’s telephone line. While Dial-up is active the phone line is busy and it is not possible to give a client more than 4/5 Kbps speed. Using an ADSL modem it can be increased to more than 2 Mbps. But it is not enough for a corporate user and also it is very costly and there are many other problems which has described below. The Ethernet connectivity can give a maximum of 100 Mbps. But its range is too small. Wireless LAN has vast benefits over wired network in some aspects. In our country especially in big cities like Dhaka, it is very hard job to establish a wired network all over the city. Because, it is over populated, buildings were made with out any proper plan and also the roads. Generally the wire lines are established over head, which is not so secured. Wire can be broken due to any kind of natural or man made problem. It may be theft. Or it can be misused by any one by taking a parallel line from it. It may create leak of data security. It is also very expensive to establish a copper wire network road by road and maintenance of it. Besides that there are many rivers, cannels in our county, and also hill tracks in some parts. It is not possible to give a wired network over those. For all those reasons it is not a wise decision to use a wired network in our country. A Wireless LAN can be more reliable, low cost, convenient network considering above aspects. There are a number of Internet Service Provider (ISP) companies in our country giving Wireless LAN support to the clients. Those are known as Wireless ISP. These ISPs give internet or intranet service to the clients as their requirements. Those networks are reliable and also secured. It is easy to establish a connection in the company’s coverage area using a wireless device at the client end. The Wireless ISP Company should have proper resources to give that coverage. A model of a Wireless ISP company’s wireless part for Bangladesh is given below. The nation wide link can be a optical fiber or microwave link. Here the main coverage is shown in Dhaka city and thus BSSs are shown at here is more than one. It can be expand the network in other areas by adding additional equipments required to establish a BSS. And also it can give coverage on other areas by establish same network on that area. Figure 1. 1: Model of a Wireless ISP 1. 3 Why one should be interested in WLAN field? The telecom industry is changing with breathtaking speed. There are a lot of telecommunication and Wireless ISP companies working in our country and there are a lot of companies to come. At present telecommunication is the most challenging and interesting field out of all other e ngineering fields. All the telecom company has some common structure. So, there are many similarities between a mobile or PSTN (Public Switched Telephone Network) operator and a Wireless ISP. The skills one gather from a Wireless ISP can use in the telecom companies. The man can be skilled on installing different devices, surveying a site, proposing a link budget. He can face the practical problems occur in installing radio networks and can be skilled in solving those problems and also troubleshoot the devices and the radio link. In the mobile operators, there are many restrictions. One can not work with all things. But as still Wireless ISP companies are smaller in our country one can get opportunity to work in different sections which will increase his experiences and skills. Lastly it can be say that, as it is a challenging field, the person likes facing challenges will enjoy working in this field 4 1. 4 Organization of this report This Internship report has seven chapters in total. The second chapter contains theory about the radio frequency properties and different modulation techniques In third chapter, different RF antennas and it accessories are described. Fourth chapter contains the Wireless LAN’s theory and architecture in brief. Chapter five analyzes to survey a site, and how to budget a link. The sixth chapter describes the device installation process for the APERTO and CANOPY devices. The seventh and final chapter is the concluding chapter where limitations of this works are reported and few suggestions of our work are provided along with the concluding remarks. 1. 5 Aims and objectives 5 RF Properties and Modulation Techniques CHAPTER 2 6 Chapter 2 RF Properties and Modulation Techniques 2. 1 Radio Frequency 2. 2. 1 Radio Frequency Radio frequencies are high frequency alternating current (AC) signals that are passed along a copper conductor and then radiated into the air via an antenna. An antenna converts/transforms a wired signal to a wireless signal and vice versa. When the high frequency AC signal is radiated into the air, it forms radio waves. These radio waves propagate (move) away from the source (the antenna) in a straight line in all directions at once. 2. 2. 2 RF Behaviors RF is sometimes referred to as â€Å"smoke and mirrors† because RF seems to act erratically and inconsistently under given circumstances. Things as small as a connector not being tight enough or a slight impedance mismatch on the line can cause erratic behavior and undesirable results. The following sections describe these types of behaviors and what can happen to radio waves as they are transmitted. Gain Gain, illustrated in Figure 2. 1, is the term used to describe an increase in an RF signal' amplitude [2]. Gain is usually an active process; meaning that an external s power source, such as an RF amplifier, is used to amplify the signal or a high-gain antenna is used to focus the beam width of a signal to increase its signal amplitude. Figure 2. 1: Power gain However, passive processes can also cause gain. For example, reflected RF signals combine with the main signal to increase the main signal' strength. Increasing the RF s signal' strength may have a positive or a negative result. Typically, more power is s better, but there are cases, such as when a transmitter is radiating power very close to legal power output limit, where added power would be a serious problem. 7 Loss Loss describes a decrease in signal strength (Figure 2. 2). Many things can cause RF signal loss, both while the signal is still in the cable as a high frequency AC electrical signal and when the signal is propagated as radio waves through the air by the antenna. Resistance of cables and connectors causes loss due to the converting of the AC signal to heat. Impedance mismatches in the cables and connectors can cause power to be reflected back toward the source, which can cause signal degradation. Objects directly in the propagated wave' transmission path can absorb, reflect, or s destroy RF signals. Loss can be intentionally injected into a circuit with an RF attenuator. RF attenuators are accurate resistors that convert high frequency AC to heat in order to reduce signal amplitude at that point in the circuit. [2] Figure 2. 2: Power loss Being able to measure and compensate for loss in an RF connection or circuit is important because radios have a receive sensitivity threshold. A sensitivity threshold defined as the point at which a radio can clearly distinguish a signal from background noise. Since a receiver’s sensitivity is finite, the transmitting station must transmit signal with enough amplitude to be recognizable at the receiver. If losses occur between the transmitter and receiver, the problem must be corrected either by removing the objects causing loss or by increasing the transmission power. Reflection Reflection, (as illustrated in Figure 2. 3) occurs when a propagating electromagnetic wave impinges upon an object that has very large dimensions when compared to the wavelength of the propagating wave [3]. Reflections occur from the surface of the earth, buildings, walls, and many other obstacles. If the surface is smooth, the reflected signal may remain intact, though there is some loss due to absorption and scattering of the signal. Figure 2. 3: Reflection 8 RF signal reflection can cause serious problems for wireless LANs. This reflecting main signal from many objects in the area of the transmission is referred to as multipath. Multipath can have severe adverse affects on a wireless LAN, such as degrading or canceling the main signal and causing oles or gaps in the RF coverage area. Surfaces such as lakes, metal roofs, metal blinds, metal doors, and others can cause severe reflection, and hence, multipath. Reflection of this magnitude is never desirable and typically requires special functionality (antenna diversity) within the wireless LAN hardware to compensate for it. Refraction Refraction describes the bending of a radio wave as it passes through a medium of different density. A s an RF wave passes into a denser medium (like a pool of cold air lying in a valley) the wave will be bent such that its direction changes. When passing through such a medium, some of the wave will be reflected away from the intended signal path, and some will be bent through the medium in another direction, as illustrated in Figure 2. 4. [3] Figure 2. 4: Refraction Refraction can become a problem for long distance RF links. As atmospheric conditions change, the RF waves may change direction, diverting the signal away from the intended Diffraction Diffraction occurs when the radio path between the transmitter and receiver is obstructed by a surface that has sharp irregularities or an otherwise rough surface [3]. At high frequencies, diffraction, like reflection, depends on the geometry of the obstructing object and the amplitude, phase, and polarization of the incident wave at the point of diffraction. Diffraction is commonly confused with and improperly used interchangeably with refraction. Care should be taken not to confuse these terms. Diffraction describes a wave bending around an obstacle (Figure 2. 5), whereas refraction describes a wave bending through a medium. Taking the rock in the pond example from above, now consider a small twig sticking up through the surface of the water near where the rock. As the ripples hit the stick, they would be blocked to a small degree, but to a larger degree, the ripples would bend around the twig. This illustration shows how diffraction acts with obstacles in its path, depending on the makeup of the obstacle. If Object was large or jagged enough, the wave might not bend, but rather might be blocked. 9 Figure 2. 5: Diffraction Diffraction is the slowing of the wave front at the point where the wave front strikes an obstacle, while the rest of the wave front maintains the same speed of propagation. Diffraction is the effect of waves turning, or bending, around the obstacle. As another example, consider a machine blowing a steady stream of smoke. The smoke would flow straight until an obstacle entered its path. Introducing a large wooden block into the smoke stream would cause the smoke to curl around the corners of the block causing a noticeable degradation in the smoke' velocity at that point and a significant s change in direction. Scattering Scattering occurs when the medium through which the wave travels consists of objects with dimensions that are small compared to the wavelength of the signal, and the number of obstacles per unit volume is large [3]. Scattered waves are produced by rough surfaces, small objects, or by other irregularities in the signal path, as can be seen in Figure 2. 6. Figure 2. 6: Scattering Some outdoor examples of objects that can cause scattering in a mobile communications system include foliage, street signs, and lampposts. Scattering can take place in two primary ways. First, scattering can occur when a wave strikes an uneven surface and is reflected in many directions simultaneously. Scattering of this type yields many small amplitude reflections and destroys the main RF signal. Dissipation of an RF signal may occur when an RF wave is reflected off sand, rocks, or other jagged surfaces. When scattered in this manner, RF signal degradation can be significant to the point of intermittently disrupting communications or causing complete signal loss. 10 Second, scattering can occur as a signal wave travels through particles in the medium such as heavy dust content. In this case, rather than being reflected off an uneven surface, the RF waves are individually reflected on a very small scale off tiny particles. Voltage Standing Wave Ratio (VSWR) VSWR occurs when there is mismatched impedance (resistance to current flow, measured in Ohms) between devices in an RF system. VSWR is caused by an RF signal reflected at a point of impedance mismatch in the signal path. VSWR causes return loss which is defined as the loss of forward energy through a system due to some of the power being reflected back towards the transmitter. If the impedances of the ends of a connection do not match, then the maximum amount of the transmitted power will not be received at the antenna. When part of the RF signal is reflected back toward the transmitter, the signal level on the line varies instead of being steady. This variance is an indicator of VSWR. [2] As an illustration of VSWR, imagine water flowing through two garden hoses. As long as the two hoses are the same diameter, water flows through them seamlessly. If the hose connected to the faucet were significantly larger than the next hose down the line, there would be backpressure on the faucet and even at the connection between the two hoses. This standing backpressure illustrates VSWR, as can be seen in Figure 2. . In this example, you can see that backpressure can have negative effects and not nearly as much water is transferred to the second hose as there would have been with matching hoses screwed together properly. Figure 2. 7: VSWR-like water through a hose VSWR Measurements VSWR is a ratio, so it is expressed as a relationship between two numbers. A typical VSWR value would be 1. 5:1. The two numbers re late the ratio of impedance mismatch against a perfect impedance match. The second number is always 1, representing the perfect match, where as the first number varies. The lower the first number (closer to 1), the better impedance matching your system has. For example, a VSWR of 1. 1:1 is better than 1. 4:1. A VSWR measurement of 1:1 would denote a perfect impedance match and no voltage standing wave would be present in the signal path. Effects of VSWR Excessive VSWR can cause serious problems in an RF circuit. Most of the time, the result is a marked decrease in the amplitude of the transmitted RF signal. However, 11 since some transmitters are not protected against power being applied (or returned) to the transmitter output circuit, the reflected power can burn ut the electronics of the transmitter. VSWR' effects are evident when transmitter circuits burn out, power s output levels are unstable, and the power observed is significantly different from the expected power. The methods of changing VSWR in a circuit include proper use of proper equipment. Tight connections between cables and connectors, use of impedance matched hardware throughout, and use of high-quality equipment with calibration reports where necessary are all good preventative measures against VSWR. VSWR can be measured with high-accuracy instrumentation such as SWR meters, but this measurement is beyond the scope of this text and the job tasks of a network administrator. 2. 2 Spread Spectrum 2. 2. 1 Spread Spectrum Spread spectrum is a communications technique characterized by wide bandwidth and low peak power. Spread spectrum communication uses various modulation techniques in wireless LANs and possesses many advantages over its precursor, narrow band communication [4]. Spread spectrum signals are noise-like, hard to detect, and even harder to intercept or demodulate without the proper equipment. Jamming and interference have a lesser affect on a spread spectrum communication than on narrow band communications. For these reasons, spread spectrum has long been a favorite of the military. 2. 2. 2 Narrow Band Transmission A narrowband transmission is a communications technology that uses only enough of the frequency spectrum to carry the data signal and no more, spread spectrum is in opposition to that mission since it uses much wider frequency bands than is necessary to transmit the information. This brings us to the first requirement for a signal to be considered spread spectrum. A signal is a spread spectrum signal when the bandwidth is much wider than what is required to send the information. [4] Figure 2. 8 illustrates the difference between narrowband and spread spectrum transmissions. One of the characteristics of narrow band is high peak power. More power is required to send a transmission when using a smaller frequency range. In order for narrow band signals to be received, they must stand out above the general level of noise, called the noise floor, by a significant amount. Because its band is so narrow, and high peak power ensures error-free reception of a narrow band signal. 12 Figure 2. 8: Narrow band verses Spread Spectrum on a frequency domain A compelling argument against narrowband transmission-other than the high peak power required to send it-is that narrow band signals can be jammed or experience interference very easily. Jamming is the intentional overpowering of a transmission using unwanted signals transmitted on the same band. Because its band is so narrow, other narrow band signals, including noise, can completely eliminate the information by overpowering a narrowband transmission; much like a passing train overpowers a quiet conversation. 2. 2. 3 Spread Spectrum Technology Spread spectrum technology allows taking the same amount of information than previously using a narrow band carrier signal and spreading it out over a much larger frequency range. For example, 1 MHz at 10 Watts with narrow band, but 20 MHz at 100 mW with spread spectrum. By using a wider frequency spectrum, we reduce the probability that the data will be corrupted or jammed. A narrow band jamming attempt on a spread spectrum signal would likely be thwarted by virtue of only a small part of the information falling into the narrow band signal' frequency range. s s Most of the digital data would be received error-free [4]. Today' spread spectrum RF radios can retransmit any small amount of data loss due to narrowband interference. While the spread spectrum band is relatively wide, the peak power of the signal is quite low. This is the second requirement for a signal to be considered spread spectrum. For a signal to be considered spread spectrum, it must use low power. These two characteristics of spread spectrum (use of a wide band of frequencies and very low power) make it look to most receivers as if it were a noise signal. Noise is a wide band, low power signal, but the difference is that noise is unwanted. Furthermore, since most radio receivers will view the spread spectrum signal as noise, these receivers will not attempt to demodulate or interpret it, creating a slightly more secure communication. 2. 2. 4 Frequency Hopping Spread Spectrum (FHSS) Frequency hopping spread spectrum is a spread spectrum technique that uses frequency agility to spread the data over more than 83 MHz. Frequency agility refers to the radio’s ability to change transmission frequency abruptly within the usable RF frequency band [4]. In the case of frequency hopping wireless LANs, the usable portion of the 2. GHz ISM band is 83. 5 MHz, per FCC regulation and the IEEE 802. 11 standard. 13 How FHSS Works In frequency hopping systems, the carrier changes frequency, or hops, according to a pseudorandom sequence. The pseudorandom sequence is a list of several frequencies to which the carrier will hop at specified time intervals before repeating the pattern. The transmitter uses this hop sequence to select it s transmission frequencies. The carrier will remain at a certain frequency for a specified time (known as the dwell time), and then use a small amount of time to hop to the next frequency (hop time). When the list of frequencies has been exhausted, the transmitter will repeat the sequence. Figure 2. 9 shows a frequency hopping system using a hop sequence of five frequencies over 5 MHz band. In this example, the sequence is: 1. 2. 449 GHz 2. 2. 452 GHz 3. 2. 448 GHz 4. 2. 450 GHz 5. 2. 451 GHz Figure 2. 9: Single frequency hopping system Once the radio has transmitted the information on the 2. 451 GHz carrier, the radio will repeat the hop sequence, starting again at 2. 449 GHz. The process of repeating the sequence will continue until the information is received completely. The receiver radio is synchronized to the transmitting radio' hop sequence in order to s receive on the proper frequency at the proper time. The signal is then demodulated and used by the receiving computer. Effects of Narrow Band Interference Frequency hopping is a method of sending data where the transmission and receiving systems hop along a repeatable pattern of frequencies together. As is the case with all spread spectrum technologies, frequency hopping systems are resistant-but not immune-to narrow band interference. In example in Figure 2. 9, if a signal were to interfere with our frequency hopping signal on, say, 2. 51 GHz, only that portion of the spread spectrum signal would be lost. The rest of the spread spectrum signal would remain intact, and the lost data would be retransmitted. 14 In reality, an interfering narrow band signal may occupy several megahertz of bandwidth. Since a frequency hopping band is over 83 MHz wide, even this interfering signal will cause little de gradation of the spread spectrum signal. Frequency Hopping Systems The IEEE and Open-Air standards regarding FHSS systems describe: 1. The frequency bands which may be used 2. Hop sequences 3. Dwell times 4. Data rates The IEEE 802. 1 standard specifies data rates of 1 Mbps and 2 Mbps and Open-Air (a standard created by the now defunct Wireless LAN Interoperability Forum) specifies data rates of 800 kbps and 1. 6 Mbps. In order for a frequency hopping system to be 802. 11 or Open-Air compliant, it must operate in the 2. 4 GHz ISM band (which is defined by the FCC as being from 2. 4000 GHz to 2. 5000 GHz). Both standards allow operation in the range of 2. 4000 GHz to 2. 4835 GHz. Channels A frequency hopping system will operate using a specified hop pattern called a channel. Frequency hopping systems typically use the FCC’s 26 standard hop patterns or a subset thereof. Some frequency hopping systems will allow custom hop patterns to be created, and others even allow synchronization between systems to completely eliminate collisions in a co-located environment. Figure 2. 10: Co-located frequency hopping system Though it is possible to have as many as 79 synchronized, co-located access points, with this many systems, each frequency hopping radio would require precise synchronization with all of the others in order not to interfere with (transmit on the same frequency as) another frequency hopping radio in the area. The cost of such a set of systems is prohibitive and is generally not considered an option. If synchronized radios are used, the expense tends to dictate 12 co-located systems as the maximum. 15 If non-synchronized radios are to be used, then 26 systems can be co-located in a wireless LAN; this number is considered to be the maximum in a medium-traffic wireless LAN. Increasing the traffic significantly or routinely transferring large files places the practical limit on the number of co-located systems at about 15. More than 15 co-located frequency-hopping systems in this environment will interfere to the extent that collisions will begin to reduce the aggregate throughput of the wireless LAN. Dwell Time In frequency hopping systems, it must transmit on a specified frequency for a time, and then hop to a different frequency to continue transmitting. When a frequency hopping system transmits on a frequency, it must do so for a specified amount of time. This time is called the dwell time. Once the dwell time has expired, the system will switch to a different frequency and begin to transmit again. Suppose a frequency hopping system transmits on only two frequencies, 2. 401 GHz and 2. 402 GHz. The system will transmit on the 2. 01 GHz frequency for the duration of the dwell time100 milliseconds (ms), for example. After 100ms the radio must change its transmitter frequency to 2. 402 GHz and send information at that frequency for 100ms. Hop Time When considering the hopping action of a frequency hopping radio, dwell time is only part of the story. When a frequency hopping radio jumps from frequency A to frequency B, it must change the transmit frequency in one of two ways. It ei ther must switch to a different circuit tuned to the new frequency, or it must change some element of the current circuit in order to tune to the new frequency. In either case, the process of changing to the new frequency must be complete before transmission can resume, and this change takes time due to electrical latencies inherent in the circuitry. There is a small amount of time during this frequency change in which the radio is not transmitting called the hop time. The hop time is measured in microseconds ( µs) and with relatively long dwell times of around 100-200 ms, the hop time is not significant. A typical 802. 11 FHSS system hops between channels in 200-300  µs. With very short dwell times of 500 – 600 µs, like those being used in some frequency hopping systems such as Bluetooth, hop ime can become very significant. If we look at the effect of hop time in terms of data throughput, we discover that the longer the hop time in relation to the dwell time, the slower the data rate of bits being transmitted. 2. 2. 5 Direct Sequence Spread Spectrum (DSSS) Direct sequence spread spectrum is very widely known and the most used of the spread spectrum types, owing most of its popularity to its ease of implementation and high data rates. The majority of wireless LAN equipment on the market today uses DSSS technology. DSSS is a method of sending data in which the transmitting and receiving systems are both on a 22 MHz-wide set of frequencies. The wide channel enables devices to transmit more information at a higher data rate than current FHSS systems. 16 How DSSS Works DSSS combines a data signal at the sending station with a higher data rate bit sequence, which is referred to as a chipping code or processing gain. A high processing gain increases the signal’s resistance to interference. The minimum linear processing gain that the FCC allows is 10, and most commercial products operate under 20. The IEEE 802. 11 working group has set their minimum processing gain requirements at 11. The process of direct sequence begins with a carrier being modulated with a code sequence. The number of–chips-in the code will determine how much spreading occurs, and the number of chips per bit and the speed of the code (in chips per second) will determine the data rate. Direct Sequence Spread Spectrum (DSSS) Direct sequence spread spectrum is very widely known and the most used of the spread spectrum types, owing most of its popularity to its ease of implementation and high data rates. The majority of wireless LAN equipment on the market today uses DSSS technology. DSSS is a method of sending data in which the transmitting and receiving systems are both on a 22 MHz-wide set of frequencies. The wide channel enables devices to transmit more information at a higher data rate than current FHSS systems. How DSSS Works DSSS combines a data signal at the sending station with a higher data rate bit sequence, which is referred to as a chipping code or processing gain. A high processing gain increases the signal’s resistance to interference. The minimum linear processing gain that the FCC allows is 10, and most commercial products operate under 20. The IEEE 802. 11 working group has set their minimum processing gain requirements at 11. The process of direct sequence begins with a carrier being modulated with a code sequence. The number of-chips-in the code will determine how much spreading occurs, and the number of chips per bit and the speed of the code (in chips per second) will determine the data rate. Channels Unlike frequency hopping systems that use hop sequences to define the channels, direct sequence systems use a more conventional definition of channels. Each channel is a contiguous band of frequencies 22 MHz wide and 1 MHz carrier frequencies are used just as with FHSS. Channel 1, for instance, operates from 2. 401 GHz to 2. 423 GHz (2. 412 GHz  ± 11 MHz); channel 2 operates from 2. 406 to 2. 429 GHz (2. 417  ± 11 MHz), and so forth. Figure 2. 11 illustrates this point. 17 Figure 2. 11: channel allocation and Spectral relationship The chart in Table 2. 1 has a complete list of channels used in the United States and Europe. The FCC specifies only 11 channels for non-licensed use in the United States. Each of the frequencies listed in this chart are considered center frequencies. From this center frequency, 11 MHz is added and subtracted to get the useable 22 MHz wide channel. Easy to see that adjacent channels (channels directly next to each other) would overlap significantly. Table 2. 1: DSSS channel frequency Assignment Channel ID 1 2 3 4 5 6 7 8 9 10 11 FCC Channel Frequencies GHz 2. 412 2. 417 2. 422 2. 427 2. 432 2. 437 2. 442 2. 447 2. 452 2. 457 2. 462 ETSI Channel Frequencies GHz N/A N/A 2. 422 2. 427 2. 432 2. 437 2. 442 2. 447 2. 452 2. 457 2. 462 To use DSSS systems with overlapping channels in the same physical space would cause interference between the systems. DSSS systems with overlapping channels should not be co-located because there will almost always be a drastic or complete reduction in throughput. Because the center frequencies are 5 MHz apart and the channels are 22 MHz wide, channels should be co-located only if the channel numbers are at least five apart: channels 1 and 6 do not overlap, channels 2 and 7 do not overlap, etc. There is a maximum of three co-located direct sequence systems possible because channels 1, 6 and 11 are the only theoretically non-overlapping channels. The 3 non-overlapping channels are illustrated in Figure 2. 2 18 Figure 2. 12: DSSS non-overlapping Channel 2. 2. 6 Comparing FHSS and DSSS Both FHSS and DSSS technologies have their advantages and disadvantages, and it incumbent on the wireless LAN administrator to give each its due weight when deciding how to implement a wireless LAN [4]. This section will cover some of the factors that should be discussed when determining which technology is appropriate f or your organization, including: 1. Narrowband interference 2. Co-location 3. Cost 4. Equipment compatibility 5. Data rate and throughput 6. Security 7. Standards support Narrowband Interference The advantages of FHSS include a greater resistance to narrow band interference. DSSS systems may be affected by narrow band interference more than FHSS because of the use of 22 MHz wide contiguous bands instead of the 79 MHz used by FHSS. This fact may be a serious consideration if the proposed wireless LAN site is in an environment that has such interference present. Co-location An advantage of FHSS over DSSS is the ability for many more frequency hopping systems to be co-located than direct sequence systems. Since frequency hopping systems are-frequency agile-and make use of 79 discrete channels, frequency hopping systems have a co-location advantage over direct sequence systems, which have a maximum co- location of 3 access points. 19 Figure 2. 13: Co-location Comparison However, when calculating the hardware costs of an FHSS system to get the same throughput as a DSSS system, the advantage quickly disappears. Because DSSS can have 3 co-located access points, the maximum throughput for this configuration would be: 3 access points ? 1 Mbps = 33 Mbps At roughly 50% of rated bandwidth, the DSSS system throughput would be approximately: 33 Mbps / 2 = 16. 5 Mbps To achieve roughly the same rated system bandwidth using an IEEE 802. 11 compliant FHSS system would require: 16 access points ? 2 Mbps = 32 Mbps At roughly 50% of rated bandwidth, the FHSS system throughput would be approximately: 32 Mbps / 2 = 16 Mbps In this configuration, an FHSS system would require 13 additional access points t o be purchased to get the same throughput as the DSSS system. Also, additional installation services for these units, cables, connectors, and antennas would all need to be purchased. Cost: When implementing a wireless LAN, the advantages of DSSS may be more compelling than those of FHSS systems, particularly when driven by a tight budget. The cost of implementing a direct sequence system is far less than that of a frequency hopping system. DSSS equipment is widely available in today’s marketplace, and its rapid adoption has helped in driving down the cost. Only a few short years ago, equipment was only affordable by enterprise customers. Today, very good quality 802. 11b compliant PC cards can be purchased for under $100. FHSS cards complying with either the 802. 11 or Open-Air standards typically run between $150 and $350 in today' market depending on the manufacturer and the standards to which the cards s adhere. 20 Equipment compatibility and availability The Wireless Ethernet Compatibility Alliance (WECA) provides testing of 802. 11b compliant DSSS wireless LAN equipment to ensure that such equipment will operate in the presence of and interoperate with other 802. 11b DSSS devices. The interoperability standard that WECA created and now uses is called Wireless Fidelity, or Wi-Fi, and hose devices that pass the tests for interoperability are-Wi-Fi compliant-devices. Devices so deemed are allowed to affix the Wi-Fi logo on the related marketing material and devices themselves showing that they have been tested and interoperate with other Wi-Fi compliant devices. There are no such compatibility tests for equipment that uses FHSS. There are standards such as 802. 11 and Open-Air, but no organization h as stepped forward to do the same kind of compatibility testing for FHSS as WECA does for DSSS. Due to the immense popularity of 802. 11b compliant radios, it is much easier to obtain these units. The demand seems only to be growing for the Wi-Fi compliant radios while the demand for FHSS radios has remained fairly steady, even decreasing to some degree over the past year. Data rate and throughput The latest frequency hopping systems are slower than the latest DSSS systems mostly because their data rate is only 2 Mbps. Though some FHSS systems operate at 3 Mbps or more, these systems are not 802. 11 compliant and may not interoperate with other FHSS systems. FHSS and DSSS systems have a throughput (data actually sent) of only about half of the data rate. When testing the throughput of a new wireless LAN installation, achieving 5-6 Mbps on the 11 Mbps setting for DSSS or 1 Mbps on the 2 Mbps setting common using DSSS. When wireless frames are transmitted, there are pauses between data frames for control signals and other overhead tasks. With frequency hopping systems, this interframe spacing is longer than that used by direct sequence systems, causing a slow-down in rate that data is actually sent (throughput). Additionally, when the frequency hopping system is in the process of changing the transmit frequency, no data is sent. This translates to more lost throughput, albeit only a minor amount. Some wireless LAN systems use proprietary physical layer protocols in order to increase throughput. These methods work, yielding throughputs as high as 80% of the data rate, but in so doing, sacrifice interoperability. Security: It is widely touted-and is a myth-that frequency hopping systems are inherently more secure than direct sequence systems. The first fact that disproves this myth is that FHSS radios are only produced by a minimal number of manufacturers. Of this small list of manufacturers, all of them adhere to standards such as 802. 1 or Open-Air in order to sell their products effectively. Second, each of these manufacturers uses a standard set of hop sequences, which generally comply with a pre-determined list, produced by the standards body (IEEE or WLIF). These 2 items together make breaking the code of hop sequences relatively simple. 21 Other reasons that make finding the hop sequence quite simple is that the channel number is broadcasted in the clear with each beacon. Also, the MAC address of the transmitting access point can be seen with each beacon (which indicates the manufacturer of the radio). Some manufacturers allow the administrator the flexibility of defining custom hopping patterns. However, even this custom capability is no level of security since fairly unsophisticated devices such as spectrum analyzers and a standard laptop computer can be used to track the hopping pattern of a FHSS radio in a matter of seconds. Standards Support: DSSS has gained wide acceptance due to low cost, high speed, WECA' Wi-Fi s interoperability standards, and many other factors. This market acceptance will only accelerate due to the industry moving toward newer, faster DSSS systems such as the new 802. 1g and 802. 11a compliant wireless LAN hardware. WECA' new Wi-Fi5 s interoperability standard for 5 GHz DSSS systems operating in the UNII bands will help move the industry along even faster in the same direction it is already headed. The new standards for FHSS systems include Home RF 2. 0 and 802. 15 (in support of WPANs such as Bluetooth), but none for advancing FHSS systems in the enterp rise. 2. 2. 7 BPSK In BPSK, the phase of the carrier is varied to represent binary 1 or 0 . Both peak amplitude and frequencies remain constant as the phase changes. For example, if a phase of 0 represents binary 0, then the phase 180 represents binary 1. the phase of the signal during each bit duration is constant. And its value depends on the bit (0 or 1). Figure 2. 14 shows a conceptual view of BPSK. BPSK is also known as 2-PSK. because two different phases (0 and 180) are used. The table below shows BPSK which makes the relationship of phase to bit value. Bit 0 1 Phase 0? 180? Figure 2. 14: BPSK. 2. 2. 8 QPSK The diagram for the signal is given in Figure 2. 15. A phase of 0 now represents 00; 90 represents 01; 180 represents10; and 270 represents 11. This technique is called QPSK. The pair of bits represented by each phase is called a dibit. 22 Bit 00 01 10 11 Figure 2. 15: QPSK. Phase 0? 90? 180? 270? 2. 2. 9 QAM QAM is a Combination of ASK and PSK so that a maximum contrast between each signal unit (bit, dibit, tribit, and so on) is achieved. QAM takes the advantages of the fact that it is possible to send two different signals simultaneously on the same carrier frequency . by using two copies of the carrier frequency. One shifted by 90 with respect to the other. For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted over the same medium. In QAM the number of amplitude shifts is fewer than the number of phase shifts. Because amplitude changes are susceptible to noise and require greater shift distances than do phase changes, the number of phase shifts used by a QAM system is always larger than the number of amplitude shifts. [5] Figure 2. 16: QAM. 23 2. 2. 10 Orthogonal Frequency division Multiplexing (OFDM) Orthogonal Frequency division Multiplexing offers the highest data rates and maximum resistance to interference and corruption of all the signal manipulation techniques in use in 802. 1 today [5]. Although it is not considered a spread spectrum technique by the FCC, OFDM shares many qualities with spread spectrum communicators, including using a low transmit power and wider-than-necessary bandwidth. OFDM is used to provide data rates up to 54 Mbps in 802. 11a and 802. 11g. How OFDM Works OFDM achieves high data rates by squeezing a large number of Communication Channels into a given frequency band. Normally, two c ommunication channels must be separated by a certain amount of bandwidth or they overlap and interfere. Specially, each Channel has harmonics that extend up and down the frequency space, decreasing in amplitude as they get farther from the channels fundamental signal. Even if two channels are non-overlapping, their harmonics may overlap and the signal can be corrupted. An OFDM communicator can place adjacent communication channels very precisely in the frequency space in such a way that the channels harmonics exactly cancel each other, effectively leaving only the fundamental signals. OFDM achieves high data rates by dividing a single communication channel into a large number of closely-spaced, small bandwidth sub-carriers. Each sub-carrier individually has a relatively low data rate, but by transmitting data in parallel on all sub-carriers simultaneously, high data rates can be achieved. Figure 2. 17: OFDM frequency plot. Figure 2. 17 shows an example of a frequency spectrum for an OFDM transmitter. Each of the peaks represents a single sub-carrier, and the sub-carriers together make up the communications channel. The sub-carriers are precisely aligned so that the zero-points of their harmonics overlapped exactly. The majority of the harmonic energy will cancel out, leaving just the sub-carriers. 4 CHAPTER 3 RF Antenna and Accessories 25 Chapter 3 RF Antenna and Accessories 3. 1 Introduction Antennas are most often used to increase the range of wireless LAN systems, but proper antenna selection can also enhance the security of your wireless LAN. A properly chosen and positioned antenna can reduce the signal leaking out of workspace, and make signal interception extremely difficult. 3. 2 RF Antennas An RF antenna is a device used to convert high frequency (RF) signals on a transmission line (a cable or waveguide) into propagated waves in the air [6]. The electrical fields emitted from antennas are called beams or lobes. Antenna convert electrical energy into RF waves in the case of a transmitting antenna, or RF waves into electrical energy in the case of a receiving antenna. The physical dimensions of an antenna, such as its length, are directly related to the frequency at which the antenna can propagate waves or receive propagated waves. The physical structure of an antenna is directly related to the Shape of the area in which it concentrates most of its related RF energy. There are three generic categories of RF antennas: 1. Omni-directional 2. Semi-directional 3. Highly-directional Each category has multiple types of antennas, each having different RF characteristics and appropriate uses. As the gain of an antenna goes up, the coverage area narrows so that high-gain antennas offer longer coverage areas than low-gain antennas at the same input power level. 3. 2. 1 Omni-directional (Dipole) Antennas The dipole is an omni- directional antenna, because it radiates its energy equally in all directions around its axis. Dipole antenna is Simple to design; dipole antenna is standard equipment on most access points. Directional antennas concentrate their energy into a cone, known as a â€Å"beam. † Figure 3. 1: Dipole doughnut 26 Figure 3. 1 shows that the dipole' radiant energy is concentrated into a region that s looks like a doughnut, with the dipole vertically through the â€Å"hole† of the â€Å"doughnut. † The signal from an omni-directional antenna radiates in a 360-degree horizontal beam. If an antenna radiates in all directions equally (forming a sphere), it is called an isotropic radiator, which is the theoretical reference for antennas, but rather, practical antennas all have some type of gain over that of an isotropic radiator. The dipole radiates equally in all directions around its axis, but does not radiate along the length of the wire itself – hence the doughnut pattern. The side view of a dipole radiator as it radiates waves in Figure 3. 2. Figure 3. 2: Dipole-side view If a dipole antenna is placed in the center of a single floor of a multistory building, most of its energy will be radiated along the length of that floor, with some significant fraction sent to the floors above and below the access point. Figure 3. 3 shows examples of some different types of omni-directional antennas. Figure 3. 3: Sample omni-directional antenna Figure 3. 4 shows a two-dimensional example of the top view and side view of a dipole antenna. Figure 3. 4: Coverage area of an omni-directional antenna High-gain omni-directional antennas offer more horizontal coverage area, but the vertical coverage area is reduced, as can be seen in Figure 3. 5. 27 Figure 3. 5: Coverage area of high gain omni-directional antennas This characteristic can be an important consideration when mounting a high-gain omni antenna indoors on the ceiling. If the ceiling is too high; the coverage area may not reach the floor, where the users are located. Usages Omni-directional antennas are used when coverage in all directions around the horizontal axis of the antenna is required. Omni-directional antennas are most effective where large coverage areas are needed around a central point. For example, placing an omni- directional antenna in the middle of a large, open room would provide good coverage. Omni-directional antennas are commonly used for point-tomultipoint designs with a hub-n-spoke topology. Used outdoors, an omni-directional antenna should be placed on top of a structure (such as a building) in the middle of the Figure 3. 6: Point to multipoint link coverage area. For example, on a college campus the antenna might be placed in the center of the campus for the greatest coverage area. When used indoors, the antenna should be placed at the middle of the building or desired coverage area, near the ceiling, for optimum coverage. Omni-directional antennas emit a large coverage area in a circular pattern and are suitable for warehouses or tradeshows where coverage is usually from one corner of the building to the other. 3. 2. 2 Semi directional Antenna Semi directional antennas direct the energy from the transmitter significantly more in one particular direction rather than the uniform circular pattern that is common with the omni- directional antenna; Semi-directional antennas come in many different styles and shapes. Some semi- directional antennas types frequently used with wireless LANs are Patch, Panel, and Yagi (pronounced â€Å"YAH-gee†) antennas. All of these antennas are generally flat and designed for wall mounting. Each type has different coverage characteristics. Figure 3. shows some examples of semidirectional antennas. 28 Figure 3. 7: Sample semi-directional antenna Semi-directional antennas often radiate in a hemispherical or cylindrical coverage pattern as can be seen in Figure 3. 8. Figure 3. 8: Coverage area of a semi-directional antenna Usages Semi-directional antennas are ideally suited for short and medium range bridging. For example, two office buildings that are across the street from one another and n eed to share a network connection would be a good scenario in which to implement semidirectional antennas. In a large indoor space, if the transmitter must be located in the corner or at the end of a building, a corridor, or a large room, a semi-directional antenna would be a good choice to provide the proper coverage. Figure 3. 9 illustrates a link between two buildings using semi-directional antennas. Figure 3. 9: Point to point link using semi-directional antenna In some cases, semi-directional antennas provide such long-range coverage that they may eliminate the need for multiple access points in a building. For example, in a long hallway, several access points with omni antennas may be used or perhaps only one or two access points with properly placed semi-directional antennas – saving the customer a significant amount of money. In some cases, semi- directional antennas have back and side lobes that, if used effectively, may further reduce the need for additional access points. 29 3. 2. 3 Highly directional antenna Highly-directional antennas emit the most narrow signal beam of any antenna type and have the greatest gain of these three groups of antennas. Highly-directional antennas are typically concave, dish-shaped devices, as can be seen Figures 3. 10 and 3. 11. These antennas are ideal for long distance, point-to-point wireless links. Some models are referred to as parabolic dishes because they resemble small satellite dishes. Others are called grid antennas due to their perforated design for resistance to wind loading. Figure 3. 10: sample of a highly directional antenna Figure 3. 11: sample of a highly directional grid antenna Figure 3. 12: Radiation pattern of a highly directional antenna Usages High-gain antennas do not have a coverage area that client devices can use. These antennas are used for point-to-point communication links, and can transmit at distances up to 25 miles. Potential uses of highly directional antennas might be to connect two buildings that are miles away from each other but have no obstructions in their path. Additionally, these antennas can be aimed directly at each other within a building in order to â€Å"blast† through an obstruction. This setup would be used in order to get network connectivity to places that cannot be wired and where normal wireless networks will not work. 0 3. 2. 4 Antenna Gain An antenna element without the amplifiers and filters typically associated with it is a passive device. There is no conditioning, amplifying, or manipulating of the signal by the antenna element itself. The antenna can create the effect of amplification by virtue of its physical shape. Antenna amplification is the result of focusing the RF ra diation into a tighter beam, just as the bulb of a flashlight can be focused into a tighter beam creating a seemingly brighter light source that sends the light further. The focusing of the radiation Measured by way of beam widths, which are measured in degrees horizontal and vertical. For example, an omni-directional antenna has a 360-degree horizontal beam width. By limiting the 360-degree beam width into a more focused beam of, say, 30 degrees, at the same power, the RF waves will be radiated further. This is how patch, panel, and Yagi antennas (all of which are semi-directional antennas) are designed. Highly directional antennas take this theory a step further by very tightly focusing both horizontal and vertical beam widths to maximize distance of the propagated wave at low power. . 2. 5 Intentional Radiator As defined by the Federal Communication Commission (FCC), an intentional radiator is an RF device that is specifically designed to generate and radiate RF signals. In terms of hardware, an intentional radiator will include the RF device and all cabling and connectors up to, but not including, the antenna, as illustrated in Figure 3. 13 below . Figure 3. 13: Intentional Radiator Any reference to â€Å"power output of the Intentional Radiator† refers to the power output at the end of the last cable or connector before the antenna. For example, consider a 30- milliwatt transmitter that loses 15 milliwatts of power in the cable and another 5 milliwatts from the connector at the antenna. The power at the intentional radiator would be 10 milliwatts. As an administrator, it is your responsibility to understand the FCC rules relating to Intentional Radiators and their power output. Understanding how power output is measured, how much power is allowed, and how to calculate these values are all covered in this book. FCC regulations concerning output power at the Intentional Radiator and EIRP are found in Part 47 CFR, 1 3. 2. 6 Equivalent Isotropically Radiated Power (EIRP) EIRP is the power actually radiated by the antenna element, as shown in Figure 3. 14. This concept is important because it is regulated by the FCC and because it is used in calculating whether or not a wireless link is viable. EIRP takes into account the gain of the antenna. Figure 3. 14: Equivalent Isotropically Radiated Power Suppose a transmittin g station uses a 10-dBi antenna (which amplifies the signal 10fold) and is fed by 100 mill watts from the intentional radiator. The EIRP is 1000 mW, or 1 Watt. The FCC has rules defining both the power output at the intentional radiator and the antenna element. 3. 3 RF Accessories When wireless LAN devices connect together, the appropriate cables and accessories need to purchase that will maximize throughput, minimize signal loss, and, most importantly, allow making connections correctly. Different types of accessories are needed in a wireless LAN design. [7] 1. RF Amplifiers 2. RF Attenuators 3. Lightning Arrestors 4. RF Connectors 5. RF Cables 3. 3. 1 RF Amplifiers An RF amplifier is used to amplify, or increase the amplitude of, RF signal, which is measured in +dB. An amplifier will be used when compensating the loss incurred by the RF signal, either due to the distance between antennas or the length of cable from a wireless infrastructure device to its antenna. Most RF amplifiers used with wireless LANs are powered using DC voltage fed onto the RF cable with an injector near the RF signal source (such as the access point or bridge). Sometimes this DC voltage used to power RF amplifiers is called â€Å"phantom voltage† because the RF amplifier seems to magically power up. This DC injector is powered using AC voltage from a wall outlet, so it might be located in a wiring closet. In this scenario, the RF cable carries 32 both the high frequency RF signal and the DC voltage necessary to power the in-line amplifier, which, in turn, boosts the RF signal amplitude. Figure 3. 15 shows an example of an RF amplifier (left), and how an RF amplifier is mounted on a pole (right) between the access point and its antenna. Figure 3. 15: A sample of a fixed gain Amplifier RF amplifiers come in two types: unidirectional and bi-directional. Unidirectional amplifiers compensate for the signal loss incurred over long RF cables by increasing the signal level before it is injected into the transmitting antenna. Bi-directional amplifiers boost the effective sensitivity of the receiving antenna by amplifying the received signal before it is fed into the access point, bridge, or client device. Configuration and Management RF amplifiers used with wireless LANs are installed in series with the main signal path seen below in Figure 3. 16. Amplifiers are typically mounted to a solid surface using screws through the amplifier’s flange plates. Configuration of RF amplifiers is not generally required unless the amplifier is a variable RF amplifier. If the amplifier is variable, the amplifier must be configured for the proper amount of amplification required, according to RF math calculations. The manufacturer' user manual will s explain how to program or configure the amplifier. Figure 3. 16: RF amplifier placement in the wireless LAN system 3. 3. 2 RF Attenuators An RF attenuator is a device that causes precisely measured loss (in dB) in an RF signal. While an amplifier will increase the RF signal, an attenuator will decrease it. Consider the case where an access point has a fixed output of 100mW, and the only antenna available is an omni-directional antenna with +20 dBi gain. Using this equipment together would violate FCC rules for power output, so an attenuator could be added to decrease the RF signal down to 30mW before it entered the antenna. This configuration would put the power output within FCC parameters. Figure 3. 17 shows examples of fixed-loss RF attenuators with BNC connectors (left) and SMA connectors (right). Figure 3. 18 shows an example of an RF step attenuator. 33 Figure 3. 7: Sample of a fixed loss Amplifier Figure 3. 18: A sample of a RF step attenuator (Variable loss) Configuration and Management Figure 3. 19 shows the proper placement in a wireless LAN for an RF attenuator, which is directly in series with the main signal path. Fixed, coaxial attenuators are connected directly between any two-connection points between the transmitter and the antenna. For example, a fixed, coaxial antenn a might be connected directly on the output of an access point, at the input to the antenna, or anywhere between these two points if multiple RF cables are used. Variable antennas are generally mounted to a surface with screws through their flange plates or simply placed in a wiring closet on a shelf. Configuration of RF attenuators is not required unless a variable attenuator is used, in which case, the amount of attenuation required is configured according to your RF calculations. Configuration instructions for any particular attenuator will be included in the manufacturer' user manual. s Figure 3. 19: RF attenuator placement in a wireless LAN 3. 3. 3 Lightning Arrestors A lightning arrestor is used to shunt transient current into the ground that is caused by lightning. Lightning arrestors are used for protecting wireless LAN hardware such as access points, bridges, and workgroup bridges that are attached to a coaxial transmission line. Coaxial transmission lines are susceptible to surges from nearby lightning strikes. Lightning arrestor are only needed for outdoor antennas that are 34 Susceptible to lighting sticks in the vicinity. They are not necessary for indoor antennas because of the existing building ground. A lightning arrestor can generally shunt surges up to 5000 Amperes at up to 50 volts. Lightning arrestor performs the following function 1. Lightning strikes a nearby object 2. Transient current are induced in the antenna or the RF transmission line 3. The lightning arrestor senses these currents and immediately ionizes the gases held internally to cause a short (a path of almost no resistance) directly to earth ground. Figure 3. 20: Lightning Arrestors installed in a network 3. 3. 4 RF Connectors RF connectors are specific types of connection devices used to connect cables to devices or devices to devices. Traditionally, N, F, SMA, BNC, and TNC connectors (or derivatives) have been used for RF connectors on wireless LANs. In 1994, the FCC and DOC (Canadian Department of Communications) ruled that connectors for use with wireless LAN devices should be proprietary between manufacturers [7]. For this reason, many variations on each connector type exist such as: 1. N-type 2. Reverse polarity N-type 3. Reverse threaded N-type Figure 3. 21: Sample N-type and SMA Connector 35 Choosing an RF Connector There are five things that should be considered when purchasing and installing any RF connector, and they are similar in nature to the criteria for choosing RF amplifiers and attenuators. . The RF connector should match the impedance of all other wireless LAN components (generally 50 ohms). 2. Know how much insertion loss each connector inserted into the signal path causes. The amount of loss caused will factor into your calculations for signal strength required and distance allowed. 3. Know the upper frequency limit (frequency response) specified for the particular connectors. This point will be very important as 5 GHz wireless LANs become more and more common. Some connectors are rated only as high as 3 GHz, which is fine for use with 2. GHz wireless LANs, but will not work for 5 GHz wireless LANs. Some connectors are rated only up to 1 GHz and will not work with wireless LANs at all, other than legacy 900 MHz wireless LANs. 4. Beware of bad quality connectors. First, always consider purchasing from a reputable company. Second, purchase only high-quality connectors made by name-brand manufacturers. This kind of purchasing particularity will help eliminate many problems with sporadic RF signals, VSWR, and bad connections. 5. Make sure you know both the type of connector (N, F, SMA, etc. ) that you need and the sex of the connector. Connectors come in male and female. Male connectors have a center pin, and female connectors have a center receptacle. 3. 3. 5 RF Cables Proper cables are needed for connecting an antenna to an access point or wireless bridge. Below are some criteria to be considered in choosing the proper cables for your wireless network. 1. Cables introduce loss into a wireless LAN, so make sure the shortest cable length necessary is used. 2. Plan to purchase pre-cut lengths of cable with pre-installed connectors. Doing minimizes the possibility of bad connections between the connector and the cable. Professional manufacturing practices are almost always superior to cables manufactured by untrained individuals. 3. Look for the lowest loss cable available at your particular price range (the lower the loss, the more expensive the cable). Cables are typically rated for loss in dB/100-feet. The table in Figure 5. 29 illustrates the loss that is introduced by adding cables to a wireless LAN. 4. Purchase cable that has the same impedance as all of your other wireless LAN components (generally 50 ohms). 5. The frequency response of the cable should be considered as a primary decision factor in your purchase. With 2. 4 GHz wireless LANs, a cable with a rating of at least 2. 5 GHz should be used. With 5 GHz wireless LANs, a cable with a rating of at least 6 GHz should be used. 36 Table 3. 1: Coaxial Cable attenuation ratings LMR Cable 100A 195 200 240 300 400 400UF 500 600 600UF 900 1200 1700 30 3. 9 2. 0 1. 8 1. 3 1. 1 0. 7 0. 8 0. 54 0. 42 0. 48 0. 29 0. 21 0. 15 50 5. 1 2. 6 2. 3 1. 7 1. 4 0. 9 1. 1 0. 70 0. 55 0. 63 0. 37 0. 27 0. 19 150 8. 9 4. 4 4. 0 3. 0 2. 4 1. 5 1. 7 1. 2 1. 0 1. 15 0. 66 0. 48 0. 35 220 10. 9 5. 4 4. 8 3. 7 2. 9 1. 9 2. 2 1. 5 1. 2 1. 0. 80 0. 59 0. 43 450 15. 8 7. 8 7. 0 5. 3 4. 2 2. 7 3. 1 2. 2 1. 7 2. 0 1. 17 0. 89 0. 63 900 22. 8 11. 1 9. 9 7. 6 6. 1 3. 9 4. 5 3. 1 2. 5 2. 9 1. 70 1. 3 0. 94 1500 30. 1 14. 5 12. 9 9. 9 7. 9 5. 1 5. 9 4. 1 3. 3 3. 8 2. 24 1. 7 1. 3 1800 33. 2 16. 0 14. 2 10. 9 8. 7 5. 7 6. 6 4. 6 3. 7 4. 3 2. 48 1. 9 1. 4 2000 35. 2 16. 9 15. 0 11. 5 9. 2 6. 0 6. 9 4. 8 3. 9 4. 5 2. 63 2. 0 1. 5 2500 39. 8 19. 0 16. 9 12. 9 10. 4 6. 8 7. 8 5. 5 4. 4 5. 1 2. 98 2. 3 1. 7 37 CHAPTER 4 Wireless LAN 38 Chapter 4 Wireless LAN 4. 1 Wireless LAN (WLAN) 4. 1. 1 Wireless LAN Linking of t