Sunday, March 31, 2019

Neglected Side Of Leadership Phenomenon The Followers Management Essay

Neglected Side Of Leadership Phenomenon The Followers focusing EssayMuch has been express about attractership. From the organisational drawing cards, supervisory drawing cards, squad attractions, political attracters, religious leading and the name can be presumption to any role. The most neglected aspect is the iodin which is named partner and the one who makes the leader worthwhile. In the most concrete and translucent term leader and accomplice atomic number 18 the two sides of a single hand. Followership, on the opposite hand, is r bely brought up when leading is world discussed, in spite of its obvious importance in the grand leadhip plan (Kelley, 1988). Leadership is not one-dimensional leadershiphip is system thought in multiple dimensions. In terms of systems idea, the inclusion of agreemental performers ( chase) in the leadership process complements the whim that leaders be sole(prenominal) responsible for about 20% of the mould that is completed in an presidency (Kelley, 1992). This paper is about exploring the importance of chase in the leadership phenomenon.LeadershipLeadership is the combination of tangible skills and record to move commonwealth to accomplish stopping points. The focus of leadership is to direct organisational performers to accomplish transcriptional goals in an substanceive and timely manner. The typeistics of leadership watch on goals and jimmys. As realmd by Burns (1978), leadership is . . . inducing pursueing to act for certain goals that represent the pull in ones horns accounts and the pauperizations the wants and take ons, the aspirations and expectations- of both leader and pursual (p. 19).FollowershipOrganizations exist in perpetuallyy form of society and are predominate in the basic day-to-day operations of life (Kelley, 1992) and definitions of organizations vary in many ways. Barnard (1938) specify an organization as a system of consciously coordinate activities or forces of two or more persons (p. 81). The combination of two or more persons imparting together implies the leader-follower scheme exists and, as with leadership styles, chase exhibit styles of pursuithip.The leader- genus Ph anyus ex variegate influenceThe leader-member exchange (LMX) sticker has been offered by Graen and his colleagues (e.g., Graen Wakabayashi, 1994) as an alternative approach to the study of leadership. In contrast to traditional models that think that a leader exhibits a similar leadership style toward all members of a carry concourse, the LMX model suggests that leaders may develop opposite types of dealings with different members of the same work group. In this respect, the model depicts leader-follower relations (exchanges) as existing on a continuum ranging from high to low quality.The leader member exchange model proposed four grounds on which leader and follower interacts these are Attitudinal Similarity.Similarity is one of the most central hypothetical and empirical constructs in cognitive psychology (Medin, Goldstone, Gentner, 1993). Within the field of management, the similarity-attraction effect provides the c at one timeptual foundation for much(prenominal) research on organizational human ecology (Tsui, Egan, OReilly, 1992). The LMX model suggests that attitudinal similarity is an demand ascertain on leader and follower interactions, universe a prime determinant of successful ongoing blood.infolding and ExtraversionYears of research live convinced many investigators that the copulate constructs of introversion and extraversion are a central dimension of record (McCrae John, 1992). Introversion/extraversion is a broad dimension that deals with the social body process so of the message(p) in leader-follower relations. To the limit that the LMX model suggests that following are able to influence the quality of their interactions with leaders, it is possible that extraverted followers, seeking inte rpersonal relations, would attempt a high level of inter-action with leaders not only to gain the satisfaction of interacting, provided alike to enhance the possibility of being assigned stimulating tasks. Such behavior corresponds closely with that underlying high-quality leader-follower exchange.locus of Control investigate has repeatedly shown locus of tick to be an important construct for explaining workplace behavior (Spector, 1982). Individuals with an internal locus of control loosely timbre that they can control events in their lives and perceive personal opening to be largely instrumental in attaining success. In contrast, individuals who generally feel that outside or environsal forces determine what happens in their lives, who are said to have an external locus of control, ascribe little or no quantify to initiative because they view success as to some extent un colligate to effort. Of inte shack here is the tendency of those with an internal locus of control (henc eforth, internals) regarding postal control (Strickland, 1989). That is, because internals believe they can control a work shot through their own initiative and independence of action, they should attempt to achieve more control than do externals if they believe the control lead lead to coveted out happens. Thus, as Spector (1982) predicted and Blau (1993) reported internals will probably attempt to control feat outcomes via initiative based rather than compliant behaviors. Initiative-based behaviors could include attempting negotiations relating to operating procedures and policies, work assignments, working conditions, and work schedules. In the leader member exchange model, such(prenominal) leader-follower negotiation is characteristic of high-quality exchanges.G rowth Need StrengthGrowth need saturation is a personal attribute that concerns a persons desire to let and develop as an individual. As an explanatory construct, growth need strength is a central concept in unde rstanding the influence of contemplate characteristics (Kulik Oldham, 1988). Graen and Scandura (1987) contended that having some work group members with wrinkle-growth potential (ability) and the motivation to accept challenges beyond their job descriptions contributes to the success of leader-follower exchanges.These four dimensions of genius through leader member exchange model depict the importance of relationship between leader and follower. Through empirical findings it was clear that whenever leader and follower have a balance in their personality outcomes are more significant.Kellys style of follower shipLeader and follower are the two sides of same terra firma which is how to get best out of circumstances. The relationship between follower and leader exists and cannot be denied. As leader exhibits styles so the follower in addition exhibits style.Kelley (1992) make up ones mindd followership styles as symbolical . . . alienated . . . conformist . . . pragmatist . . . and passive (p. 97). These styles constitute the foot of the Kelley followership model and relate the followership styles to individual personality attributes in terms of thinking and acting in organizations. Individual thinking attributes are (a) in parasitic critical, (b) dependent critical, (c) expeditious, or (d) passive. These thinking attributes, like the styles of followership and leadership, give dimension to the philosophical impulse of followership.Alienated followers are mavericks who have a healthy skepticism of the organization. They are capable, but cynical.Conformist followers are the yes people of the organizations. They are very busy at doing the organizations work and will livelyly follow orders.Passive followers rely on leaders to do the thinking for them. They also require constant direction.emblematic followers are independent, innovative, and involuntary to question leadership. This type of follower is critical to organizational success.The Leadership- Exemplary Followership Exchange standardExemplary FollowershipThe style of followership coined by Kelly provides the philosophical keister for followership research. The exemplary followers are the one who makes leaders effective.Banutu-Gomez (2004) stated that To succeed, leaders mustiness(prenominal) read their followers not only how to lead leadership, but more importantly, how to be a effective follower followership (p. 143). Schaubroeck and Lam (2002) stated, Regardless(prenominal) of work building block individualism/collectivism, supervisors were more likely to form wanting, high-commitment relationships with subordinates who were similar to them in personality (p. 1132). This statement supports Johnsons (2003) conclusion that . . . followership modality variation . . . revealed that followers generally ricochet modality that corresponds with the leaders style and behavior (p. 110). Johnsons conclusion and Banutu-Gomezs contention that leaders must teach their follow ers to be assuranceful followers, displays a association to Kelleys (1992) notion that exemplary followership can be taught. To develop exemplary followership, leaders must produce organizational performers to contract exemplary followers by demonstrating the exemplary followership attributes as developed by Kelley.The following 15 attributes outline exemplary followership. Exemplary followers, according to Kelley (1992),1. Think for themselves2. Go above and beyond the job3. contribute the team up and the leader4. Focus on the goal5. Do an special job on critical line activities related to the goal6. Take initiative on increasing their evaluate to the organization7. Realize they add value by being who they are, their experiences and ideals8. body structure their day-to-day work and day-to-day activities9. look at clearly how their job relates to the enterprise10. throw off themselves on the critical travel plan toward accomplishment11. Make sure the tasks they are to perform are on the critical path12. Review their cash advance daily or weekly13. Increase their scope of critical path activities14. Develop additional expertise15. Champion new ideas. (pp. 126-166)Relationships and Culture expression relationships while identifying with the leader of an organization and their imagination is essential to big(p) followership. Jehn and Bezrukova (2003) contended that followership is a people oriented behavior, and this behavior builds relationships between leaders and otherwise followers, providing an environment that raises all organizational members to focus on a common goal. Jehn and Bezrukova suggested that good followers may be a catalyst for change in an organization as followership Inspires others to follow toward a common goal creates intensity and desire to excel fully engages others builds confidence moves the organization ahead as one entity rather than separate parts (p. 728).As relationships are important between leaders and follo wers, the quality of these relationships are equally important factors in developing an organizational finis of followers who maintain the characteristics that promote good followership. Werlin (2002) contended that good followership relationships must build on motivation rather than control, and that contribute values into followers is essential to developing a civilisation of trust and good relationships. The balance of power between leader and follower however, must be maintained in order to provide a cultivation of openness that promotes self- fight.A good relationship between followership to leadership requires that both leader and follower share divisors of each (Schruijer Vansina, 2002). Schruijer and Vansina contended that the characteristics of leaders and followers define the relationship that causes followership and leadership. Wong (2003) contended that organizational cultures must involve and value all members of the organization, and that the characteristics of all members define the roles of leaders and followers. The identification and sharing of roles lead to LEFX.Transformational Leadership and Followership recondite (1990) suggested the implementation of transformational leadership could change followers into leaders. Humphreys and Einstein (2004) contended that transformational leadership could motivate followers to be self-directing and increase follower performance. Changing followers to become self-motivated, self-directive and a leader from within is consistent with Kelleys (1992) exemplary followership style. These examples from the publications rejoin short of explaining the sciences these followers have of the change from the follower sentiment, as the perspective is consistently from the leaders point of view. Dvir, Eden, Avolio, and Shamir, (2002) longitudinal field study assay to examine follower using as opposed to leader development in terms of followership, but the result of Dvir et al.s study contended that transf ormational leadership improves a followers ability to think for themselves, thus continuing the theme that leadership makes the follower. However, exchanges of roles between leader and follower aid in the development of motivation and trust to form the LFX.Leader Follower RolesTownsend (2002) contended that the roles of leaders and followers change from that of follower to leader and back again, depending on the situation and demands of the organization. At times, followers can determine their faith in this role reversion, but other times, leadership must inspire the followers to be followers and last leaders (Jehn Bezrukova, 2003). Jabnoun, Juma, and Rasasi (2005) found that charismatic leaders are able to give lessons a sense of purpose and vision in followers who will inspire the followers to identify with the leader. Identification with the leaders vision is essential to motivating and inspiring followers to lead.Active EngagementSolovy (2005) stated, Exemplary followers wor k beyond the expected to produce exemplary results (p. 32). This statement provides an element of active engagement of exemplary followership, and a review of the literature (Dvir Shamir, 2003 Johnson, 2003 Petrausch, 2002 Solovy, 2005) pertaining to followership and active engagement has yielded a connection between active engagement and followership. In a longitudinal study, Dvir and Shamir found that collectivistic orientation, critical-independent approach, to follower development active engagement in the task, and self-efficacy, positively predicted transformational leadership among indirect followers (p. 327)Theories by Kelley (1992), Barnard (1938), and Chaleff (2003) implied that good followers actively engage and think for themselves. This supports the relationship between active engagement and followership in a way that complements the theories. The systems that support follower active engagement remain diverse in the developmental process, leader influence individual per former character, learning, and the follower understanding of their role in an organization are key factors in developing a good followership brain that supports active engagement. To implement change in an organization, the exemplary follower must understand transformational change and the role the follower has in transformation.Both leadership philosophies of Kelley (1992) and Barnard (1938) emphasize teams as well as informal and formal organizations. Barnards philosophy contends that an organization . . . is a system composed of the activities of human beings (p. 77). This is in essence a team, and as stated by Barnards observation that cooperation is essential for an organization to function, suggests the notion of teamwork. This realization of cooperative systems is a germinal element of teaming and an constitutional part of followership. In comparison, Kelley (1992) embraced teaming as a component of followership. Followership promotes self-reliance among team members, and this self-reliance provides leaders with less need to lead and thus, develops followership (Kelley).A model for Leadership-Followership ExchangesAs long as there have been leaders, there have been followers, and leaders cannot accomplish what they do without followers (Kelley, 1992). Newell (2002) suggested that a growing turn off in leadership is to inspire followership, and to this end, coaching and mentoring leaders to transform their followers into good followers is essential in todays business environments. Managers must come in actively in the forming of good follower relationships (Vince, 2002) if managers are to benefit from the Leader-Follower Exchanges that promote sharing organizational goals consistent with enterprise wide vision and values. elaborate 1 the Leadership-Exemplary Followership Exchange model illustrates the cycle of leadership-Exemplary Followership Exchanges based on relationships and culture, transformational leadership and followership, leader follow er roles, active engagement, and development of exemplary followership as outlined by Kelley (1992).The concept developed by the LEFX model provides for a culture of organizational leadership that originates from the bottom up. Relationships developed between leaders and followers must be open to dialogue regarding the vision of the organization. Shared vision between leaders and followers will develop a culture of trust and lead to active engagement of followers. Leaders must educate follower to be exemplary followers and as such, provide followers with a sense of confidence that they have the knowledge to lead themselves as an active engaged member of the organization.This model provides a cycle of relationship between leader and follower. It presents a framework for the exemplary followers to become leaders in the future.Overcoming Adversity The Impact of Leadership Attributes or Traits1. honesty or integrity2. A high level of people skills3. Initiative, assertiveness, drive, or determination4. elegant communication skills or willingness to speak up, take a Position, or take tending5. Vision (being forward-looking)6. craving or honey to lead and inspire7. Positive attitude and self-confidence charisma8. fellowship of the business and/or group task at hand competence9. The ability to surpass adversity or obstacle10. Being a Servant-Leader, serving people, and especially being humble11. Having both religious faith and strong family ties12. Framing or recognizing the worst adversity as an prospect13. Having a mentor or mentors in their development as leadersHaller (2008, pp.13-14)Leadership Attributes or Traits, and Transformational Leadership ResearchStarting back in the 1980s there was a resurgence of researchers updating the academic literature with their findings, repackaging, and comments leadership trait theory. Many of the leadership scholars focus there build on leadership traits in the context of discussing transformational leadership.Revie w of Recent Research on Individual Traits or AttributesThe findings, re-naming and framing of trait theory and transformational, or situational leadership research was led by scholars such as, Blanchard and Johnson (1982), Blanchard, Zigarmi, and Zigarmi (1985), Kouzes and Posner (2002), Peters and Waterman (1982), Peters and capital of Texas (1985), and Peters (1987). Peters and his co-authors commented on trait theory by adding their concept of excellence as the objective of leadership success. Much of the leadership theory research pore on the important effects of being a transformational leader.A great number of the studies done on traits by researchers in the setoff one- half(prenominal) of the twentieth century used young children or high prepare/college students as their subjects (Bass Stogdill, 1990, pp. 59-77). Much of the research done on leadership traits later on 1950 focused on business managers, major company CEOs, and recent college graduates go into management training programs in large firms (pp. 78-88).By the second half of the twentieth century, the theory that leaders were born had been rejected by some(prenominal) major researchers, including Bennis (1989, p. 5), Gardner (1990, p. xv), and Kotter (1990, pp. 103-107). Van Fleet and Yukl (1986) held that certain characteristics improved a leaders chance of success and that those characteristics included initiative and fortitude.Manns (1959) research on leadership documented the positive relationship between the personal traits of intelligence, adjustment, extroversion, dominance, masculinity, and sensitivity. The work by Jago (1982) asserted that there is a set of qualities or characteristics which can be attributed and measured in those who are perceived to successfully employ such characteristics (pp. 317-319).Jago concluded that leaders behavior is determined by their attributes. Their characteristics, knowledge, and skills, which he called qualities, influenced their behavior. Jag o focused specifically on how these qualities of a leader interact with the leaders perception of group attributes, the particular task at hand, and the general context of the situation (pp. 315-336).Kouzes and Posners (2002) extensive research identified respected and admired characteristics in leaders necessary to make or build a leader. Kouzes and Posner identified xix qualities or characteristics as being the most admired in leaders which they claimed were consistent over time and across six continents (pp. 24-25). Their list started with honest, which was selected by 88% of the respondents (pp. 24-28). Their other top three traits were (a) forward-looking, (b) competent, and (c) inspiring, having been selected by between 58% and 73%. A fifth quality, intelligent, received a 47% reply rating from the survey participants (pp. 25-26). Kouzes and Posner administered their survey over a period of twenty dollar bill socio-economic classs to over 75,000 participants, including ten thousand mangers and business executives and a expressage number of government managers (p. 24).Haller (2008, pp.13-15)An integrated model of Exemplary followership is leadershipWith the back up of traits of exemplary follower and universally accepted leadership traits a model for followership is leadership is developed here which can support the assumption exemplary followership is leadership in certain contexts of organizations. An exemplary follower can take the role of leader in a situation where he as an exemplary follower will act as a leader.(E) See clearly how their job relates to the enterprise/ Knowledge of the business and/or group task at hand competence (L)(E) Realize they add value by being who they are, their experiences and ideals/. A high level of people skills (L)(E) Structure their daily work and day-to-day activities/ competent (L)(E) Realize they add value by being who they are, their experiences and(E) Take initiative on increasing their value to the(E) See cl early how their job relates to the enterprise/(E) Structure their daily work and day-to-day activities/ competent(E) Take initiative on increasing their value to the organization/. Initiative, assertiveness, drive, or determination(E) Put themselves on the critical path toward accomplishment/ Positive attitude and self-confidence charisma (L)(E) Do an exceptional job on critical path activities related to the goal/ Desire or passion to lead and inspire (L)(E) Make sure the tasks they are to perform are on the critical path/ the ability to overcome adversity or obstacle (L)(E) Focus on the goal/ Excellent communication skills or willingness to speak up, take position, or take charge (L)E) Review their progress daily or weekly/ competent (L)(E) Support the team and the leader/ Being a Servant-Leader, serving people, and especially being humble (L)(E) Increase their scope of critical path activities/ Framing or recognizing the worst adversity as an opportunity (L)(E)Go above and beyond the job/ Vision (being forward-looking) (L)(E)Develop additional expertise/ having a mentor or mentors in their development as leaders (L)(E) Champion new ideas/) forward-looking (L)(E)Think for themselves/. silver dollar or integrity (L)Leader and exemplary follower traitsLeadershipExemplary follower ship is leadership (E for exemplary followership traits, L for leadership traits)Kellys followership basisFollowership, for example, sounds like the words of Jesus, who chose his disciples with the command, Follow me (NAS Mat. 419, 99, 1624, 1921, Mar.117, 214, 834, 1021, Luk. 527, 923, 1822). In fact, in the four gospels, the word follow occurs 91 times. Actually, however, Kelley traces his inspiration to a moment of boredom in a hotel room (1992, p. 22) where his eyes came to live on a bible, presumably provided by the Gideons. This caused him to reflect on religions in general-Buddhism, Hinduism, Judaism, Islam and Christianity.And he began to consider how Christs followers-not C hrist himself-changed the world. This is how Kelleys thinking on followership began.Similarly, Greenleafs concept of handmaid leadership could conceivably have been inspired by Christ. In speciate (1043-45), Jesus tells his disciples whoever wishes to become great among you shall be your servant and whoever wishes to be freshman among you shall be slave of all. For even the Son of Man did not come to be served, but to serve, and to give His life a ransom for many. And in John (1314-15), Jesus says, If I then, the Lord and the Teacher, swished your feet, you also ought to wash one anothers feet. For I gave you an example that you also should do as I did to you. Though Greenleaf does freely refer to various events and statements from the life of Christ, Greenleaf only once quotes one of Jesus servant statements though the mouth of Mr. Billings, a character in Teacher as Servant (1979, p. 28)This initial thinking of Kelly towards followership is load-bearing(a) the notion that fo llowership is leadership varying to different contexts of organizations.Barack Obama An exemplary Follower natural to a Kenyan father and an American mother, Barack Obama has a multiracial heritage. He made history when he was elected as the 44th hot seat of the United rural areas of America, as he is the showtime African American to take aim this post. Though, young and inexperienced as he has not spent much time in Washington, Barack Obama has worked for the last twenty years as a community personal organiser, a civil rights attorney, a constitutional law professor, a State Senator and then U.S. Senator.He was hired as Community organizer by Developing Communities Project, a church based community organization. The organization wanted a young black man to help them join forces with black churches in the south side. From 1985 to 1988, Obama worked there as Director of the organization. He helped blacks fight for their rights from the city government. He worked to improve the living conditions of poor neighborhoods which face crimes unemployment. Working in a small organization taught him organizational skills. He was always good with words and was known for making speeches which people could emotionally connect to. He worked with Saul Alinsky whose method was agitation which meant getting people angry enough about their current state of things that they are compelled to take some step and do something. During his tenure at Developing Communities Project, the provide at this organization grew from 1 to 13 and so did their budget. Then, he worked as consultant and instructor for Gamaliel Foundation, a community organizing institute.Barack Obama felt that law was a medium which could facilitate activism and community organization. So in late 1988, he entered Harvard Law School. In his second year at college, in 1990, he was elected as the president of law review. This role required him to be editor- in-chief and supervisor of law review staff of about 80 editors. As he was the first black to be elected for this position, it was a widely reported and much publicized event. It had taken Obama long sessions of countersign with conservatives to support him. While still in law school in 1989, he worked as an associate at Sidley and Austin law firms. He met his future wife Michelle, also a lawyer, here. Newton Minnow was a managing partner here. Minnow, later introduced him to many of the scratchs top leaders. In the summer of 1990, he worked at Hopkins and Sutter and finally graduated from Harvard in 1991 after which he again moved back to Chicago where he practiced as a civil rights lawyer. His could have easily taken up a graven image job after Harvard but his values and mothers teachings had taught him to do something for the society and the less privileged ones. The publicity that he garnered at Harvard, because of his election as first black president of Harvard law review, led him to an offer by University of Chicago law school to write book on racial relations. Meanwhile, Barack Obama also taught Constitutional Law at University of Chicago Law School from 1992- 2004 first as a lector from 1992 to 1996 and then as Senior Lecturer from 1996 to 2004. Barack had also joined Davis, Miner, Barnhill and Galland law firm as civil rights attorney. He was an Associate in this law firm from 1993 to 1996 and then counsel from 1996 to 2004. Barack served on the board of Directors Woods Fund of Chicago, Joyce foundation form 1994 to 2002. In 1992, he became the founding member of board of director of Public Allies but resigned in 1993 and his wife joined it. All these years in Chicago, he served on board of directors of Chicago Annenberg Challenge, Chicago lawyers Committee for Civil mightily under Law, the Centre for Neighborhood Technology and Lugenia Burns Hope Center.In 1992 election he had organized largest voter registration drives, Project Vote, in history of Chicago from April to October 1992. He had with hi m a staff of ten and more or less seven hundred volunteers. They had the goal of registering around 150,000 African Americans in the state who were unregistered. It was one of the most successful voter registration drives one had ever seen. Baracks work led him to run for Illinois State Senate. Eventually, he was elected in 1996 November, succeeding State Senator Alice Palmer, as Barack Obama was the only candidate left, after rest of the petitions were invalidated..He went on to serve three terms in the Illinois State Senate, from the year 1997 to 2004. Barack lost a primary run for U.S. House of Representatives to Bobby bearing in a very close fight in the year 2000. In the year 2003, he passed legislation to expand healthcare coverage to 70,000 children making Kid care, state Childrens Health insurance program, permanent. The legislation also extended health insurance to uninsured parents, which added up to additional 84,000 parents. later on he found there were 13 innocent d eath row inmates, Barrack saw to it that death penalty reforms were changed. Also, Illinois became the first state where videotaping an doubtfulness became mandatory. Even Law enforcement agreed that recording questioning would help the prosecutions chances. As the Chairman of Illinois Senates Health and Human Services Committee, Barack Obama unanimously led a legislation to be passed on racial profiling by the police, which representation maintaining records of the race, age and gender of the drivers detained. For low income families, Obama created Illinois Earned Income taxation credit which offered tax relief.Barack Obama came into national limelight with an inspiring speech at July 2004 Democratic field of study Convention where he spoke against the Bush administrations policies on Iraq war. His speech was the set off of the convent

Saturday, March 30, 2019

Mobile Ad Hoc Networks (MANETs)

erratic Ad Hoc Ne iirks (MANETs) constituteationWhat is wandering Ad Hoc electronic ne devilrk?With rapid increment of radio technology, the Mobile Ad Hoc Ne 2rk (MANET) has emerged as a new type of radio set profits. MANET is a collection of piano tuner sprightly lymph glands (e.g. laptops) that energizing each(prenominal)y function as a profit with verboten the give of whatever exist infra building and qualifying administration. It is an autonomous frame where each pommel operates non and(prenominal) as an block off re master(prenominal)s al wholeness excessively as a saddle offr to in advance piles for new(prenominal) clients.Since the leaf inspissations in MANET move just ab come out, the radiocommunication(prenominal) liaisons break and re-establish frequently. Further more(prenominal)(prenominal), near of industrious customers atomic itemize 18 re line of descent limited in computing qualification and barrage bureau and thitherfore conventionalistic computing content routing communications communications protocols argon non suitable for MANET. Several ad hoc routing protocols induce been proposed for each thickener playing as laner and maintaining routing in drivewayation.thither atomic arrive 18 some(prenominal) a nonher(prenominal) new(prenominal)(a) applications of MANET. For examples, MANET flush toilet be persona to bid emergency aids when the net impart is impair re cedeable(p) to the damaging of existent infrastructure 8. Computer scientists receive predicted a swear outman of omnipresent computing in which computers leave alvirtuoso be every(prenominal) around us, constantly performing mundane tasks to give modality our lives a teensy easier. These ubiquitous computers connect in mobile ad hoc panache and change the milieu or react to the change of the environment where they ar suited. MANET is too found useful in the so-c each(prenominal) tolded sensor dust electr onic cyberspace to set up the activities and reports of a spacious collection of tiny sensor devices which could quip exact breeding more or little terrain or environmental dangerous check outs. concentratedy tale and Motivation roughly incumbent ad hoc routing protocols as conglomerati mavin that the wireless meshwork is benign and every guest in the ne 2rk strictly follows the routing manner and is leave behinding to foregoing mailboats for contrary thickeners. Most of these protocols cope soundly with the propellent wholey changing topology. until now, they do non comprehend the problems when misbehaviour invitees show up in the network.A comm simply observed misbehavior is parcel of land displace. In a applicative MANET, nearly devices perk up very limited computing and onslaught power term pile advancement swallow ups a lot of much(prenominal) re cites. hence roughly of the mobile devices would non like to forward the bundles for t he eudaemonia of a nonher(prenominal)s and they switch mail boats not ordain to them. On the other hand, they still energise use of other guests to forward packets that they originate. These misbe gestated lymph thickenings ar very difficult to sire out because we open firenot certify that whether the packets atomic bend 18 dropped hold outingly by the misbehaved thickeners or dropped due to the customer having locomote out of transmission range or other plug into error. portion drop signifi mountaintly decreases the network exertion.Traditional pledge chemical machines be for the intimately p ruse not suitable for MANET becauseThe network insufficiencys central infrastructure to utilize traditional warranter mechanism much(prenominal) as get at take hold, au sotication and swear one(a)-thirdly party.Limited bandwidth, battery lifetime, and computation power prohibits the deployment of complex routing protocols or encoding algorithms. New hostage stumpers or mechanisms suitable for MANET essential be found. meshwork topologies and memberships atomic number 18 constantly changing. frankincense new intrusion spying arranging and entity recognition mechanisms that argon suitable for mobile ad hoc networks mustiness be projected to fend off or mitigate the behavior to the networks. dep ane instruction dusts have been recently introduced as a security mechanism in MANET. In a decampe counsel system, a communicating entity collects establish regarding competence, unbiasedy or security of other network participants with the exercise of qualification assessment or decisions regarding their perpetrate relationships. Here trust project and Sub-tasksdirection the confidence of an entity on other entity base on the prevision that the other entity pull up stakes perform a particular follow through of import to the trustor, regardless of the ability to monitor or control that other entity . For example, a trust- found routing protocol goat collect the endorse of nodes misbehaving, form trust value of the nodes and aim safest despatchs based on the trust metrics.Reputations systems argon ofttimes seen as a derivation of trust care system. In the spirit system, an entity forms its trust on another entity based not only on the selfobserved tell just also on the guerilla hand info from third parties. nonpargonil of the influential constitution systems is the DSR protocol. In the trust management system, account system and other trust-based systems, path recogniseion is based on the charge nodes introductory experience with other nodes in the network. Its mentations intimately how other entities ar honest are constantly changing. olibanum, we c both in solely the trust management systems and their derivations as propellant feedback mechanisms. The dynamic feedback mechanisms are usu each(prenominal)y applied on the electric current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matrix, which is formed harmonise to the evidence tranquil from previous moveions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identify and avoided to forward packets. In this instruction,misbehavior can be mitigated.Objective and Sub-tasksThe jump clinical of this dissertation is to check the state of the art of dynamic feedback mechanisms and protocols analyze, use and treasure DSR protocols to see how it improves the network movement and what are the side personal effect of introducing the mechanism to the mobile ad hoc network.Following tasks must be by means of with(p) to come across the primary objective.Study the preliminary knowledge that is necessary to exonerate out the main tasks. For example, to understand DSR protocol one must have close to knowledge of Bayesian compend to do murder psycho synopsis one must chequer the methodologies of conducting operation summary and processing role model data. go over security issues of mobile ad hoc network and current dynamic feedback mechanisms or protocols that are utilize to solve or mitigate the issues.Investigate and l piddle how to use the network mannikin tool. There are some(prenominal)(prenominal) touristy network trick tools available and we expect to choose the one that better(p) suits our contains. The selected network simulator should be studied so that we can use it as platform to apparatus protocol and conduct make-believes.Analyze and implement the DSR protocol based on Dynamic parentage Routing protocol (DSR) rate the network performance.Structure of the ReportSince we have almost gone by means of the chapter one, we only briefly show the content of the subsequent chapters in this sectionalisation. forward selective information render of the Art digestDesignImplementation and Tests proceedingAnalysisConclusion and Future WorkPreliminary informationwe have introduced the MANET. This chapter ease ups other preliminary information and c oncepts that go away be used in other parts of the thesis. Firstly four world(a) modes of routing exertions are introduced and equalised. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in point in time. second Bayesian estimation and Beta function are explained to pave the way for the analysis of the report card model of DSR in the chapter 4. Thirdly some techniques regarding trick and performance analysis are presented. Finally, some(prenominal) popular network air tools are treated and compared.Mobile Ad Hoc Network Routing ProtocolsNowadays there are contrasting routing protocols proposed for the MANET. The most popular ones are DSDV ( name and address-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic seed Routing) and AODV (Ad-hoc On Demand Distance Vector). Th ese routing protocols can be categorized in diverse routing operation modes.Mode of Routing OperationsThese two modes carry on whether or not nodes in an ad hoc network should keep track of communication channels to all possible terminals, or instead keep track of only those name and addresss of adjacent care Proactive protocols store route information even before it is implyed. This merciful of protocols has advantage that communications with arbitrary polish experience stripped delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly emergence routing crash peculiarly for the MANET where the think are often d lethearted. Reactive protocols, on the contrary, go routing information only when it is very needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the runner time.Source routing vs. Hop-by- cut routingThese two modes concern whether the stemma node decides the route for a packet to be forwarded to the terminal figure or the average nodes are allowed to decide the beside skitter until the packet arrives at the destination. In the artificial lake routing protocols, the starting time node decides the route and puts the route information in the packet header. All the median(a) nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not affectd to maintain the routing information. solely it suffers from the disadvantage that the packet coat grows because of antecedent routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the line of descent to know only how to get to the future(a) hop and intermediate nodes find their accept next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not in crease packet size alone they requires all the intermediate nodes to maintain routing information. control board 2-1 Categories of routing protocolshas compared the performance of these four routing protocols . The results show that DSR has best throughput performance (supra 95%) at all mobility rates and movement speeds. Thus we entrust use DSR as primary routing protocol in this thesis.The Dynamic Source Routing Protocol (DSR) jakes et al. proposed the dynamic source routing protocol (DSR) 1 which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an on aim protocol, in which route are only find when data need to be distri andeted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each vector to select an d control the routes used in routing the packets. DSR is composed of the two main mechanisms despatch denudation and travel plan support which are explained below. course husking street Discovery aims at finding routes from a source node to destination. depend 2-1 illustrates the influence of course Discovery. When a source node S essentials to steer a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S leave alone initiate a dispatch Discovery and send out pathway pass nitty-gritty which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The highway petition subject contains the addresses of source node and destination node, a unique route request identifier and a route eternise which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the be ginning of the route record when it initiates the message.When a node receives the despatch Request message, it compares the destination address in the message with its own address to render whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply message to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses mack protocols much(prenominal) as IEEE 802.11 that require a bidirectional link, it just revolutionise the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by distinct its route cache or direct out a Route Request which piggybacks the Route Reply for the source node. When the source node re ceives the Route Reply message, it puts the returned route into its route cache. From then on all the packets indentured to the same destination will use this route until it is broken.Route MaintenanceSince the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes hold by nodes in their route cache are often broken. by and by forwarding a packet, a node must germinate on to sanction the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If by and by a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node.DSR proposes deuce-ace lie with mechanisms to confirm that data can be given over the link from that node to the next hopLink- degree acknowledgment which is offer upd by MAC layer protocol su ch as IEEE 802.11. hands-off acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link.Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node.Passive recognitionPassive Acknowledgement ( bundle) is important in DSR protocol because it is used to light upon whether the next hop forwards the packet or drops it. We explain it in detail in this section.Passive acknowledgement is used with the assumption thatNetwork links operates bi- directionally.The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode afterward it originates or forwards a packet, it ensure it as an acknowledgement of the first packet if two of following check success.The Source Address, Destination Address, Protocol, Identification, and disassemble Offset fields in the IP header of the two packets essential match.If either packet contains a DSR Source Route header, both packets must(prenominal) contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet.If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node. spare featuresDSR has additional features such as replying to route requests utilize cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation.Performance Analysis TechniquesThis section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation.Factors and primitive FactorsThere are many parameters that will influence the simulation resul ts and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we extremity to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as followsFactors are the variables that affect the simulation result and have several alternatives. normally they are decided based on experience.Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjust through simulation.Data MeasurementThe key step of the network performance analysis is to interpret the simulation result and restate the characteristic of the network. To avoid the away simulation results due to an extreme scenario, we usually run simulations on several varied scenarios. The data set of these simulations are called hear. A iodin number must be presented to give the key characteristic of the standard and this hit number is called an average of the data. There are ternion alternatives to summarize a sampleMean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample.Median is obtained by take the observations in an increasing order and taking the observation that is in the shopping centre of series. If the number of the observations is even, the mean of the middle two values is used as a median.Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks. assertion legal separation for the MeanIn our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the peculiarity of the node movement scenarios and we cannot tell whether the two systems are divergent. unmatchable way to minimize the random effect is to repeat the simulations w ith different scenarios as many times as possible and get a large sample space. alas, due to the time limitation we cannot conduct many simulations. points out that utilise confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to the other.GloMoSims source and binary engrave can be downloaded only by academic institutions for look usances. commercialized-grade users must use QualNet, the commercial version of GloMoSim.OPNET modellerOPNET personateer is commercial network simulation environment for network modeling and simulation. It allows the users to design and flying field communication networks, devices, protocols, and applications with flexibility and scalability 30. It simulates the network graphically and its graphical editors reflect the structure of actual networks and network components. The users can design the network model visually.The modeller uses object-oriented modeling climax. The nodes and protocols are modeled as classes with inheritance and specialization. The development style is C.ComparisonWhen choosing a network simulator, we normally consider the verity of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has conducted experiments to compare the the true of the simulators and it finds out that the results are besides alike(p) 31. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the amphetamine layers (from transport to application layers) are executed on a give hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarized afterward comparability the three simulators, we decide to choose ns2 as network simulator in our thesis becauseNs2 is open source free software. It can be tardily downloaded and installed.The germ of the thesis has used ns2 in another network cogitate course and gotten familiar with the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience.The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison.State of the ArtIn this chapter we will introduce the start of the art security resultant roles in MANET with emphasis on dynamic feedback mechani sms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as compensation system,trust management system, composition system, etc. Finally, we will summarize all the security solutions we discussed in this chapter.Security Issues in Mobile Ad Hoc Network repayable to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inbuilt weakness. In section 1.2 we have discussed the reasons why mobile ad hoc network imposes security gainsays that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network.Following are general security properties regarding ad hoc networkConfidentiality The confdiantiality office is to protect certain information from unauthorized disclosure. The information includes not only the ap plication data that send over the routing protocol, tho also the routing information itself as well as network topology and geographical location.Integrity The law ensures that the transmitted message and other system summation are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure.The main challenge of ensuring legality is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems.Availability The availability topographic point requires that the attends or devices are exempt from defense force of service, which is normally make by interruption, network or horde overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purp ose than to consume its battery sinew.Authentication The authentication proportion requires that the communication entitys identification is recognize and proved before communication starts.Access control This property requires restrict resources, go or data to special identities according to their access rights or group membership.Non-repudiation This property ensures that when data are sent from sender to receiver, the sender cannot cover that he has sent the data and the receiver cannot deny that he has received the data.Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories.Failed nodes are simply those unable to perform an operation this could be because power failure and environmental events.Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a panic to the integrity of the network.Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal approach voluminous. big money dropping is the main attack by selfish nodes.Malicious nodes aim to purposely sever the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects whether their misbehaviors are intentional or unintentional, and the severity of the results. allowance SystemsPayment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to maximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of earnings systems is to make headway the cooperation within the MANET by economic incentives. There are several variations of defrayal systems proposed.NugletsNuglets is a virtual currency mec hanism for charging (rewarding) master of ceremonies engagement (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it.There are two models for charging for the packet forwarding service the big money wrinkle computer simulation (PPM) and the software system conduct Model (PTM).In the parcel Purse Model, the sender pays for the packet. It slews the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet shell out Model, the destination pays for the pa cket. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to idea the number of nuglets that are required to reach a wedded destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two models and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it.Count erTo address the problems en recurrenceed by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on reference counter is suggested. In this approach, the current state of each node is exposit by two variables b and c, where b is the rest battery power and cstands for the value of its nuglet counter. to a greater extent precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate.A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b is reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires fiddle disgusting hardware security module.SpiritS. Zhong et al. proposed Sprite 19, a credit-based system for MANET. As opposed to Nuglets or Counter they do no t require goldbrick-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central credence head Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a response of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then marks the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message.In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forwarding is considered successful if and only if the next node on the path reports a valid receipt to the CCS.Discussion on the Payment SystemsThe payment systems we describe in above sections either assumes a tamper loathsome hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems 20 that nodes in different locations of the network will have different plays for earning virtualcurrency, which may not be fair for all nodes. usually nodes at the periphery of the network will have less chance to be rewarded.Reputation SystemReputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized temper systems have been adopted by many online electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralise reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systemsTo provide information to distinguish between a trust-worthy principal and an tricky principals.To encourage principals to act in a trustworthy mannerTo reprove untrusty principals from participating in the service the reputation mechanism is present to protect.Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic supposition that different entities can hold different opinions on it even while veneering the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can coalesce reputation system and trust management system to dynamic feedback mechanisms. origin one is a global reputation system and mobile nodes sell their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation.DSRDSR is a reputation system aiming at make out with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes directness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routingMobile Ad Hoc Networks (MANETs)Mobile Ad Hoc Networks (MANETs)IntroductionWhat is Mobile Ad Hoc Network?With rap id development of wireless technology, the Mobile Ad Hoc Network (MANET) has emerged as a new type of wireless network. MANET is a collection of wireless mobile nodes (e.g. laptops) that dynamically function as a network without the use of any existing infrastructure and centralized administration. It is an autonomous system where each node operates not only as an end system but also as a router to forward packets for other nodes.Since the nodes in MANET move around, the wireless links break and re-establish frequently. Furthermore, most of mobile nodes are resource limited in computing capability and battery power and therefore traditional computing content routing protocols are not suitable for MANET. Several ad hoc routing protocols have been proposed for each node acting as router and maintaining routing information.There are many other applications of MANET. For examples, MANET can be used to provide emergency Services when the network is impaired due to the damaging of existin g infrastructure 8. Computer scientists have predicted a world of ubiquitous computing in which computers will be all around us, constantly performing mundane tasks to make our lives a little easier. These ubiquitous computers connect in mobile ad hoc mode and change the environment or react to the change of the environment where they are suited. MANET is also found useful in the so-called sensor dust network to coordinate the activities and reports of a large collection of tiny sensor devices which could offer detailed information about terrain or environmental dangerous conditions.Problem Statement and MotivationMost current ad hoc routing protocols assume that the wireless network is benign and every node in the network strictly follows the routing behavior and is willing to forward packets for other nodes. Most of these protocols cope well with the dynamically changing topology. However, they do not address the problems when misbehavior nodes present in the network.A commonly ob served misbehavior is packet dropping. In a practical MANET, most devices have very limited computing and battery power while packet forwarding consumes a lot of such resources. Thus some of the mobile devices would not like to forward the packets for the benefit of others and they drop packets not destined to them. On the other hand, they still make use of other nodes to forward packets that they originate. These misbehaved nodes are very difficult to identify because we cannot tell that whether the packets are dropped intentionally by the misbehaved nodes or dropped due to the node having moved out of transmission range or other link error. Packet drop significantly decreases the network performance.Traditional security mechanisms are generally not suitable for MANET becauseThe network lacks central infrastructure to apply traditional security mechanism such as access control, authentication and trusted third party.Limited bandwidth, battery lifetime, and computation power prohibi ts the deployment of complex routing protocols or encryption algorithms. New security models or mechanisms suitable for MANET must be found.Network topologies and memberships are constantly changing. Thus new intrusion detection system and entity recognition mechanisms that are suitable for mobile ad hoc networks must be designed to avoid or mitigate the behavior to the networks.Trust management systems have been recently introduced as a security mechanism in MANET. In a trust management system, a communicating entity collects evidence regarding competence, honesty or security of other network participants with the purpose of making assessment or decisions regarding their trust relationships. Here trustObjective and Sub-tasksmeans the confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity . For example, a trust-based routing protocol can collect the evidence of nodes misbehaving, form trust values of the nodes and select safest routes based on the trust metrics.Reputations systems are often seen as a derivation of trust management system. In the reputation system, an entity forms its trust on another entity based not only on the selfobserved evidence but also on the second hand information from third parties. One of the influential reputation systems is the DSR protocol. In the trust management system, reputation system and other trust-based systems, route selection is based on the sending nodes prior experience with other nodes in the network. Its opinions about how other entities are honest are constantly changing. Thus, we call the trust management systems and their derivations as dynamic feedback mechanisms. The dynamic feedback mechanisms are usually applied on the current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matr ix, which is formed according to the evidence collected from previous interactions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identified and avoided to forward packets. In this way,misbehavior can be mitigated.Objective and Sub-tasksThe primary objective of this thesis is to Investigate the state of the art of dynamic feedback mechanisms and protocols analyze, implement and evaluate DSR protocols to see how it improves the network performance and what are the side effects of introducing the mechanism to the mobile ad hoc network.Following tasks must be done to achieve the primary objective.Study the preliminary knowledge that is required to carry out the main tasks. For example, to understand DSR protocol one must have some knowledge of Bayesian analysis to do performance analysis one must learn the methodologies of conducting performance analysis and processing simulation data.Investigate security issues of mobile ad hoc network a nd current dynamic feedback mechanisms or protocols that are used to solve or mitigate the issues.Investigate and learn how to use the network simulation tool. There are several popular network simulation tools available and we need to choose the one that best suits our needs. The selected network simulator should be studied so that we can use it as platform to implement protocol and conduct simulations.Analyze and implement the DSR protocol based on Dynamic Source Routing protocol (DSR) evaluate the network performance.Structure of the ReportSince we have almost gone through the chapter one, we only briefly present the content of the subsequent chapters in this section.Preliminary InformationState of the ArtAnalysisDesignImplementation and Tests PerformanceAnalysisConclusion and Future WorkPreliminary informationwe have introduced the MANET. This chapter presents other preliminary information and concepts that will be used in other parts of the thesis. Firstly four general modes of routing operations are introduced and compared. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in detail. Secondly Bayesian estimation and Beta function are explained to pave the way for the analysis of the reputation model of DSR in the chapter 4. Thirdly some techniques regarding simulation and performance analysis are presented. Finally, several popular network simulation tools are discussed and compared.Mobile Ad Hoc Network Routing ProtocolsNowadays there are various routing protocols proposed for the MANET. The most popular ones are DSDV (Destination-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). These routing protocols can be categorized in different routing operation modes.Mode of Routing OperationsThese two modes concern whether or not nodes in an ad hoc network should keep track of routes to all possible destinations, or instead keep track of only those destinations of immediate interest Proactive protocols store route information even before it is needed. This kind of protocols has advantage that communications with arbitrary destination experience minimal delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly increase routing overhead especially for the MANET where the links are often broken. Reactive protocols, on the contrary, acquire routing information only when it is actually needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the first time.Source routing vs. Hop-by-hop routingThese two modes concern whether the source node decides the route for a packet to be forwarded to the destination or the intermediate nodes are allowed to decide the next hop until the packet arrives at the destination. In the source routing proto cols, the source node decides the route and puts the route information in the packet header. All the intermediate nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not required to maintain the routing information. But it suffers from the disadvantage that the packet size grows because of source routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the source to know only how to get to the next hop and intermediate nodes find their own next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not increase packet size but they requires all the intermediate nodes to maintain routing information.Table 2-1 Categories of routing protocolshas compared the performance of these four routing protocols . The results show that DSR has best throughput performance (above 95%) at all mobility rates and movement speeds. Thus we will use DSR as basic routing protocol in this thesis.The Dynamic Source Routing Protocol (DSR)John et al. proposed the dynamic source routing protocol (DSR) 1 which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an ondemand protocol, in which route are only discovered when data need to be transmitted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each sender to select and control the routes used in routing the packets. DSR is composed of the two main mechanisms Route Discovery and Route Maintenance which are explained below.Route DiscoveryRoute Discovery aims at finding routes from a source node to destination. Figure 2-1 illustrates the procedure of Route Discovery. When a source node S wants to send a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S will initiate a Route Discovery and send outRoute Request message which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The Route Request message contains the addresses of source node and destination node, a unique route request identifier and a route record which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the beginning of the route record when it initiates the message.When a node receives the Route Request message, it compares the destination address in the message with its own address to judge whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply m essage to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses MAC protocols such as IEEE 802.11 that require a bidirectional link, it just reverse the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by searching its route cache or sending out a Route Request which piggybacks the Route Reply for the source node. When the source node receives the Route Reply message, it puts the returned route into its route cache. From then on all the packets destined to the same destination will use this route until it is broken.Route MaintenanceSince the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes maintained by nodes in their route cache are often broken. After forwarding a packet, a node must attempt to confirm the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If after a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node.DSR proposes three acknowledge mechanisms to confirm that data can flow over the link from that node to the next hopLink-layer acknowledgement which is provided by MAC layer protocol such as IEEE 802.11.Passive acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link.Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node.Passive AcknowledgementPassive Acknowledgement (PACK) is important in DSR protocol because it is used to detect whether the next hop forwards the packet or drops it. We explain it in detail in thi s section.Passive acknowledgement is used with the assumption thatNetwork links operates bi- directionally.The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode after it originates or forwards a packet, it consider it as an acknowledgement of the first packet if both of following check success.The Source Address, Destination Address, Protocol, Identification, and Fragment Offset fields in the IP header of the two packets MUST match.If either packet contains a DSR Source Route header, both packets MUST contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet.If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node.Additional featuresDSR has additional features such as replying to route requests using cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation.Performance Analysis TechniquesThis section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation.Factors and Primary FactorsThere are many parameters that will influence the simulation results and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we want to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as followsFactors are the variables that affect the simulation result and have several alternatives. Normally they are decided based on experience.Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjusted through simulation.Data MeasurementThe key step of the network performance analysis is to interpret the simulation result and summarize the characteristic of the network. To avoid the inaccurate simulation results due to an extreme scenario, we usually run simulations on several different scenarios. The data set of these simulations are called sample. A single number must be presented to give the key characteristic of the sample and this single number is called an average of the data. There are three alternatives to summarize a sampleMean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample.Median is obtained by sorting the observations in an increasing order and taking the observation that is in the middle of series. If the number of the observations is even, the mean of the middle two values is used as a median.Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks.Confidence Interval for the MeanIn our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the particularity of the node movement scenarios and we cannot tell whether the two systems are different. One way to minimize the random effect is to repeat the simulations with different scenarios as many times as possible and get a large sample space. Unfortunately, due to the time limitation we cannot conduct many simulations. points out that using confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to t he other.GloMoSims source and binary code can be downloaded only by academic institutions for research purposes. Commercial users must use QualNet, the commercial version of GloMoSim.OPNET ModelerOPNET Modeler is commercial network simulation environment for network modeling and simulation. It allows the users to design and study communication networks, devices, protocols, and applications with flexibility and scalability 30. It simulates the network graphically and its graphical editors mirror the structure of actual networks and network components. The users can design the network model visually.The modeler uses object-oriented modeling approach. The nodes and protocols are modeled as classes with inheritance and specialization. The development language is C.ComparisonWhen choosing a network simulator, we normally consider the accuracy of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has condu cted experiments to compare the accuracy of the simulators and it finds out that the results are barely comparable 31. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the upper layers (from transport to application layers) are executed on a dedicated hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarizedAfter comparing the three simulators, we decide to choose ns2 as network simulator in our thesis becauseNs2 is open source free software. It can be easily downloaded and installed.The author of the thesis has used ns2 in another network related course and gotten familiar wi th the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience.The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison.State of the ArtIn this chapter we will introduce the start of the art security solutions in MANET with emphasis on dynamic feedback mechanisms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as payment system,trust management system, reputation system, etc. Finally, we will summarize all the security solutions we discussed in this chapter.Security Issues in Mobile Ad Hoc NetworkDue to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inherent weakness. In section 1.2 we have discussed the rea sons why mobile ad hoc network imposes security challenges that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network.Following are general security properties regarding ad hoc networkConfidentiality The confdiantiality property is to protect certain information from unauthorized disclosure. The information includes not only the application data that send over the routing protocol, but also the routing information itself as well as network topology and geographical location.Integrity The integrity ensures that the transmitted message and other system asset are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure.The main challenge of ensuring integrity is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems.Availability The avai lability property requires that the services or devices are exempt from denial of service, which is normally done by interruption, network or server overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purpose than to consume its battery energy.Authentication The authentication property requires that the communication entitys identification is recognized and proved before communication starts.Access control This property requires restricting resources, services or data to special identities according to their access rights or group membership.Non-repudiation This property ensures that when data are sent from sender to receiver, the sender cannot deny that he has sent the data and the receiver cannot deny that he has received the data.Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories.Failed nodes are simply those unable to perform an operation this could be because power failure and environmental events.Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network.Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal cost involved. Packet dropping is the main attack by selfish nodes.Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects whether their misbehaviors are intentional or unintentional, and the severity of the results.Payment SystemsPayment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to m aximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of payment systems is to encourage the cooperation within the MANET by economic incentives. There are several variations of payment systems proposed.NugletsNuglets is a virtual currency mechanism for charging (rewarding) server usage (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it.There are two models for charging for the packet forwarding service the Packet Purse Model (PPM) and the Packet Trade Model (PTM).In the Packet Purse Model, the sender pays for the packet. It loads the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to estimate the number of nuglets that are required to reach a given destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two mode ls and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it.CounterTo address the problems encountered by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on credit counter is suggested. In this approach, the current state of each node is described by two variables b and c, where b is the remaining battery power and cstands for the value of its nuglet counter. More precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate.A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b i s reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires tamper resistant hardware security module.SpiritS. Zhong et al. proposed Sprite 19, a credit-based system for MANET. As opposed to Nuglets or Counter they do not require tamper-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central Credit Clearance Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a receipt of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then determines the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message.In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forw arding is considered successful if and only if the next node on the path reports a valid receipt to the CCS.Discussion on the Payment SystemsThe payment systems we describe in above sections either assumes a tamper resistant hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems 20 that nodes in different locations of the network will have different chances for earning virtualcurrency, which may not be fair for all nodes. Usually nodes at the periphery of th e network will have less chance to be rewarded.Reputation SystemReputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized reputation systems have been adopted by many on-line electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralized reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systemsTo provide information to distinguish between a trust-worthy principal and an untrustworthy principals.To encourage principals to act in a trustworthy mannerTo discourage untrustworthy principals from participating in the s ervice the reputation mechanism is present to protect.Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic concept that different entities can hold different opinions on it even while facing the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can unify reputation system and trust management system to dynamic feedback mechanisms. Former one is a global reputation system and mobile nodes share their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation.DSRDSR is a reputation system aiming at coping with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes Fairness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routing

Popularity Towards TV Reality Shows

Popularity Towards TV honesty ShowsThis is my concession of Academic English. That was include two question which is discuss about changeless rise on the popularity of TV verity provides and give my tactual sensations on the tapers. I feel this assigning so challenging, especially question 2 is interested in me. headland 2 is want me to explain about conquest is over lucreable to ones challenging subject field or inspiration. Definition of hard hold out is intention to do eachthing, as long as you atomic number 18 100% mind into a good thing to do is the best. Definition of inspiration is a grabbing of methods or things of thought. I will choose success is due to ones hard work and I will relate it. This designation resolve resources from website and some answer I experience discuss with my classmate.Reality ShowsReality idiot box receiver shows thrust been around for a long time. It has changed the media landscape drastically since the turn of the millenni um. owe to its interactive nature, reality tv set shows has become a highly saleable advertising vehicle. Real action, unscripted TV shows bring drama, comedy, or neerthelessterfly into mickles homes. In view of reality television shows rising popularity and potential in marketing, the influence of these programs is of public interest.When the television program shows debuted in the summer of 2000 in North America, the reality television became very popular. Subsequently, umpteen saucy reality television shows allow been launched anywhere. The rise in the popularity of reality television shows at the present time merchantman be considered as phenomenal in the world media landscape. Many reality television shows feel created the history in terms of hatfuls participation and r scourue generation. A lot of reality television shows ar popularity equivalent American idol or revere fixings and otherwises.I comparable to conform to the reality television shows is Fea r factor. Fear factor is a show of challenges limit and looking for stimulus. Many volume or actors as well will go take part the show and test their level of daring. After finish the game, the netner can win some money. This show also attracts me beca physical exercise it is so stimulus. I will watch over this show every weekend. Reality television in form and theme provides the user with programming that seems to be both engaging as comfortably as entertaining. So what does reality television offer its viewing audience? Is it til now content thats worth watching? While viewing reality television shows we do non see the real picture but earlier see what the producers see as the real. Since the producers atomic number 18 the ones that set the story for the shows, the actors or rather participants remove little or no say in the final outcome thats broadcast. This is controversial of the shows, sometimes they equitable want to severalize to capture a mass audience in hop es for study advertisement sponsors. Most of this show is built around the idea of cheap toil and high profits rather than entertainment. If a production companies creates a show with the explicit intention of trying to make money from the humiliation and distress which they themselves create for unsuspecting people, then that seems to me to be immoral and unconscionable.Television shows much(prenominal) as Talk Shows, that ar watched by me frequently earn persuaded me in making many of my judgments. I come across at least six or seven Talk Shows within an hour. Talk Shows in the world of television, have undoubtedly taken up almost every inch of space on daytime television, and while doing so have caused much controversy.I am fond of watching reality television shows because I can queer some knowledge from the show. We can get some parole from the shows. So now, many young people cull to watch and enjoy reality television shows. Different viewers have different reasons wh y they do so, and there lays the underlying cause of watching. reflection these reality shows has effects on the viewers and the night club in general. It whitethorn be positive to some audiences, but it also has many negatively, depends on how one views. Unfortunately, this is also why reality shows have a negative impact on the audience because they sound off, act, and feel, uniform the shows stars, and in the process overlooks their hold sense of thinking and real emotions towards certain situations. Reality television shows and their effects on society are also dependent on the viewers desires and motives, they see themselves in these stars and somehow these stars are living their lives through the show. wish power or influence, travel and living, survival, beauty and rapture, revenge and honor, etc. more(prenominal) than than people are enjoy a certain sense of fun and satisfaction when they watch these reality television shows and their effects on society are co ntinuously mirrored in the way they interact with others, tell apart various situations, and face certain challenges. The one must be corking in absorbs the messages of these shows and everyone must remember that each individual handle scenarios, problems, dilemmas, are differently. What makes it worse than the way it is affects people now is that people get amused by the sadness, depression, frustration, and emptiness that reality stars feel and experience in the show.Reality television shows have become so ingrained that many people cant have enough reality television news. At the site, it is non only will we have all of the reality television news you want, but we will tell you about reality television cast calls and reality television auditions that are coming up. I simply can non think of any excuse for such actions pointing out that others are willing to watch such event does not relieve them of the responsibility for having orchestrated the events and willed the reactio ns in the first place. The mere fact that they want others to experience humiliation, embarrassment, and or misfortunate is itself unethical actually going forward with it is even worse.A major boost in self confidence is advantage of reality shows, like someone join the reality television shows, he can get word something from the shows and improve himself on the reality television shows. The overwhelming majority of critics, however, view reality TV as a poison so deadly to TV and the public that it is destroying TV. Austin Cline, an about.com guide, questions the ethics of reality TV and even goes so far as to say much reality television shows is achieve significant popularity but it also says that does not mean that they are good for society or that they should be aired. Is it very damaging to TV and the youth in general? On the contrary, reality TV serves many beneficial purposes to not only the public, but amazingly also the TV industry. It is hard to conceptualize that sh ows that have paved the way for teens and something to deal with and bastinado problems of emotional, physical and psychological natures are labeled as part of the musical genre that serves no value.Reality television shows are not documentaries. People are not flummox into situations simply to see how they are react the situations are heavily contrived, they are altered in order to make things of they are interesting and large amounts of footage are heavily edited into what the shows producers think will result in the best entertainment value for viewers. Entertainment, of course, often comes from conflict. negate will be created where none exists. If the reality television show cannot be active conflict during the filming, it can be created in how pieces of footage are stitched together.I like Fear factor this reality television shows because it is a bear on shows. I like this kind of shows and watches someone is test their level of daring. I hope this kind of reality televi sion shows can continue to play. victor is due to ones hard workI required to do the assignment question 2 and choose the one answer success is due to ones hard work or inspiration and relate the answer of I have choose. I will choose the answer of the success is due to ones hard work.Ive read a lot of prescriptions for success, but these days you dont key out much about hard work. Its certainly a factor, but is it really the preeminent qualification for success? I really believe it is. base doesnt happen without hard work. Producing a great product or helper doesnt happen without hard work. Real windership happens in the trenches, not on the golf course. Software doesnt get produced without thousands of hours of hard work. Of course, you have to be smart, you have to have the right strategy, and you have to have a great culture. every man wants success in brio. He may be a farmer working in the fields. He may be a school teacher or an employee in an office and he may be a busi nessman or a politician. Hard work is an important factor in the success. Someone work to pay their mortgage, put gas in their car, to buy food, to pay for their tax, to pay for their utilities and once in a while for something special like a book or a trip. Someone also work to be able to make luxuries like this computer and the Internet. Hardworking is more important than inspiration because you neer know when the inspiration was coming. If you want to upgrade yourself, only one prize it is hard work. If someone hardworking then he is a one-half success. Every people hope for success but not every people can be hard work. However, as for thousands of years people in cognitive bias, hard-working gives a lot of psychological pressure. Many people are afraid of hard work, to avoid hard work, refused even to hard-working but some people also not afraid of hardship and moil and their endurance are strong. If someone are smart but neer hardworking to work also cannot to be success. They are not voluntary, because they believe if can endure hardship then they can to be come by and by in the future. People who hard work, often far away from wine, color, money, gas, greatly contribute to the physical and mental health.Hard work busy person, use their energy in witnessing and their work, there is no time to glitter right and left over(p), there is no time for sad and painful, there is no time to calculating others, far fewer troubles and suffering. Hard work not only for fitness, keep fit, it also to medical treatment, disease prevention. Hard work to study and can absorb all kinds of knowledge, so that we can do anything more with less.It has been proven that hard work leads you to success in your life but there are also other factors to be considered. We got many examples of people who are successful in this world. Obama was born in Africa and chicken feeded his life as a lecturer and become the president of United States as we all know now, and this was possible because he work hard. In other words, if you want to be successful in life you should improve skills like good attitude and better organization skills.Good qualification can help us to be success. We should have a degree from a good university and that will give us a practical experience. quarrel is also very important. Someone is not good in language. thence also can learn English which will help us to get a better job and we can also learn other languages like Japanese that will give us more chances of getting a better job than others. Interpersonal skill is considered to be very important. We should be able to communicate with friends and family and also with our company workers. In general qualification gives us the basic knowledge we need in our life. It also depends on our hardworking.Then, we should have a good attitude. We should never lack hope and be positive, even if we have a position. You maybe not success now but later in life clean like athletes who think he will succeed even after lose the match but succeed later in life. Be confident especially when you are starting a new work. If you have good attitude you have nothing to lose, because it give you a feeling of success. Of course, it also needs us to hard work. Organization skills also a very important point to be successful and without it that we will never be successful. Many employers are looking to hire people who are good at coordinating things like negotiating with others and efficiently managing meetings. Never start something without making a plan, especially when we are starting a new job or planning for our future studies or project. We have nothing to lose, even if we dont work we also can use our organization skills anywhere. different people think that only hard work will lead to success in our life. However, the overwhelming evidence suggests the contrary, that hard work has nothing to do with success and is actually counterproductive. If hard work is supposed in a ddition produce success, then it would stand to reason that everyone who works hard would be successful. But that is far from the case. Most people who work hard never come close to being successful. In fact, most hard workers have a much higher incidence non-success than they have success. Like someone works all their lives cleaning buildings, moping floors, vacuuming carpet and sanitizing washrooms. They dont even get pay rise and have to work more hours. They success because maybe they are hardworking before.There are many reasons people should have these sets of skills like qualification, good attitude and better organization skills. Because we dont want to be left behind from others in our life and by having these sets of skills we have nothing to lose and we must hard work to rush our target. We will be more successful and will have more secure future.ConclusionI am enjoyed the process because two question is very attract for me just like question 2 because the question 2 is r elate success is due to ones hard work or inspiration, explore this statement by agreeing the one of success factors stated.Then another question, question 1 is constant rise on the popularity of reality television shows. I already publish some point to relate my views on such shows. I also use Fear Factor this reality television shows to be my example. This assignment let me benefited greatly, I very enjoy to do this assignment although I feel difficult before start the question but I can also settle the problem myself. I feel satisfaction to my assignment.