Sunday, January 26, 2020

Modelling and simulation using opnet modeller 14.5

Modelling and simulation using opnet modeller 14.5 4.1 Overview The aim of this chapter is to illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version for the autonomic wireless network management. In addition, it will explain what kind of modifications and suppositions were necessary in order to achieve the autonomic self-healing mechanism, including agents architecture and description. 4.2 Autonomic Management Agents This section will illustrate the modelling and simulation, using OPNET Modeller 14.5-Education version, of a community of autonomic management agents that provide network fault analysis for a group of base stations. The main objective of these intelligent agents will be to bring together process information in order to detect failures when base stations exchange information between them, and the creation of a high obtainable wireless access network. Analysing network failures is relatively difficult since these problems may differ from one network system to another and could depend on network dynamics, i.e., the type of network information to be exchanged and the traffic characteristics associated with that information. In addition, the pattern of failures could vary quickly as the network operates and reconfigures around a failed device As OPNET Modeller 14.5-Education version does not have an autonomous process ready for simulation usage, the existing code had to be adapted to allow autonomic behaviour. The use of two different autonomic agents was required in order to provide self-healing network diagnosis and facilities. In this report, OPNET coding modifications will be called Agents and two different types are mentioned and applied to the access points. Testing Agents will supply data simplicity and monitor capabilities to Node Agents whereas Node Agents will periodically check the information that Testing Agents bring together and use it as a medium of failure detection within the wireless access network. In addition, a Testing Agent will be able to supervise and provide data regarding information exchanged among access points. Node agents use data obtained by the Testing Agents as a method of node analysis Various Testing Agents may be found on a single wireless client. A Testing Agent can be situated on a host device since it does not have to deal with data acquisition and information simplicity. In contrast, Node Agents will be located on a base station. Various Testing Agents may be found on a single wireless client 4.2.1 Additions and Model Modifications OPNET Modeller was used in order to determine concept achievability of the proposed model. The concept of Autonomic Mobile Wireless Networks is illustrated by using a community of wireless base stations which allow autonomous healing of interrupted paths The OPNET simulation showed in this report will contain two Node Agents and two Testing Agents which take the part of a group of autonomic base stations. The new OPNET topology required the creation of ten nodes in order to characterize every autonomic agent and all the modifications were made to accomplish the needs of both agents. The autonomic behaviour was obtained through modifications to the wlan_server_adv and ip_arp_v4 OPNET process models, where code changes were made in order to achieve the desired behaviour. Figure 4.0: OPNET ip_arp_v4 process model. 4.2.2 Testing Agent (TA) and Node Agent (NA) Description Each Testing Agent belongs respectively with a Node Agent as a single component of a particular node in the OPNET simulation. As mentioned in section 3.3, each base station is aware of its next-door stations at all times. A Testing agent (TA_1) is designed to watch and detect alterations regarding other base stations. In the event of any modification of the network, TA_1 will notify Node Agent (NA_1) by using a UDP message. UDP presents lack of reliability so consequently the Testing agent TA_1 cannot assure successful message transmission. However, this lack of reliability will be useful for simulation purposes After receiving information from TA_1, a Node Agent (NA_1) will inform other stations about changes in zone, and file updating may take place. When a NA_1 observes that information sent has not arrived at its destination within a particular period of time, the agent alerts its neighbours that a probable node malfunction has occurred. This time depends on certain attributes fixed for a particular mobile user. Scalability of the network will be achieved with the use of a second pair of agents. Agent TA_2 then has the job of monitoring path request messages sent and received by other stations. Information regarding path request is detected by TA_2, including the time when the path request was generated and the destination of this demand. Changes to the mobility architecture were necessary including ARP and IP alterations. The idea was to alter some settings in order to evaluate and compare the destination address with the address of the device where specific information was sent. The destination address must belong to a registered wireless client and the intelligent agents will check correct transmission of it IP alterations were made changing the moip_core to allow stations to be able to forward information packets to its neighbours, modify the IP routing mode and help each station choosing the better route available. The moip_core has a list that could be dynamically regulated as the base stations travel between networks The UDP is used as a transport protocol and the managing, mobility and registration information is handled by the process shown in the figure below. Figure 4.1: OPNET moip_reg process model The moip_reg process allows base stations to manage and update mobility information regarding next-door stations. When exchanging information among stations, all the agents will monitor and process each request and they will aim to find failures during the registration process. If the registration communication was successful, there is an identification value that is compared with a mobility list and the correctly matched among them will mean no error has occurred during the registration procedure Updated messages must be sent when agents have no information regarding the mobile station due to updating failures. In fact, agents need acknowledgments in order to be sure that the communication between stations is happening perfectly. If an agent does not receive the updating message, it will not be able to monitor base stations and all the information exchanged among agents will be lost. Therefore, all the updates and acknowledgments will be verified within an identification field contained by the moip_reg. If they are equivalent, the update will be set as confirmed and the exchange of information will be free of failures. Figure 4.2: OPNET agent node structure Figure 4.2 shows a plain representation of agent node structure and distribution. In addition, OPNET Modeller allows us to present the node model which was modified in order to provide autonomic behaviour to a set of autonomic base stations within a self-managed wireless access network. The wireless connectivity is achievable through the use of IEEE802.11b interfaces, permitting roaming among networks. This type of interface could be improved by adding an extra communication module between the radio transceiver and the wlan_mac system. This process allows a base station to simulate the effect of completely losing connection among devices and at the same time avoiding unnecessarily queues of packets 4.3 Network Model Three different network configurations were constructed to simulate and identify autonomic characteristics, and agent distribution was arbitrarily decided in order to improve the simulation. The Testing agent (TA_1) was applied to a single base station; another station was selected to make use of Testing Agent (TA_2) and Node Agent (NA_1) while Node Agent (NA_2) was modified to operate in all base stations 4.3.1 Design of Wireless Network Infrastructure The next steps were followed in order to design a wireless infrastructure in OPNET: Open the OPNET program and select New Project and then press OK. Give the project and the scenario a name. Select create empty scenario and press next. Network space was chosen as campus and specific size was selected as: X-span and Y-span 10 kilometres respectively. The Object Palette Tree will open which illustrates the various WLAN devices as follows. The file Node Models situated in the object palette contains the item wireless-lan-adv which encloses all the different network devices used in the wireless network presented in this report All nodes were modified by using the function configuration Application Config and Advance Edit Attributes option. In addition, the following wireless parameters were customized as stated in the figure 4.4: Physical characteristics Data Rate (bps) Transmit Power (W) AP Beacon Interval (sec) Packet Reception-Power Threshold (bytes) The wireless access network contains ten base stations (Figure 4.5) which are connected via point to point duplex links (ppp_adv). Each base station has at least two interfaces; one interface to provide connectivity among wireless mobile devices and another wired interface for uplink communication. The network configuration showed above was created in order to simulate and analyse the wireless system when it includes nodes (Base Stations) on the exterior sector of the network and no more than two neighbour stations close to it. Therefore, these stations will only have a maximum of two paths to communicate their next-door devices. On the other hand, the rest of base stations will be surrounded by more stations and more possible routes. Figure 4.6 shows the second configuration. There are various potential routes on which base stations and mobile devices may exchange information among them. As a result, the agents performance is going to be probed by selecting the best path and being able to repair route problems. The third model illustrated in the Figure 4.7 offers a more narrowly linked network configuration. The number of neighbours for every node will increase and the communication between Node Agents and Testing Agents will improve due to a decrement in the number of paths required for Testing Agent information to meet the suitable Node Agent. Therefore, a superior self-healing performance will be expected using this configuration. 4.4 Verification of Agents self-healing process upon base station malfunction To experiment the right operation of the agents, different simulations were made in every network model. The main purpose is to test agent reliability and its competence when providing an intelligent self-healing course of action. Consequently, the base stations were programmed to reproduce a failure and the action of agents would eventually lead us to simulate an autonomic behaviour. In order to obtain a more understandable vision of the self-healing performance, a reduced network configuration was simulated (Figure 4.8). Exchange of information among nodes may take different paths until data arrives at its final destination. In the event that a particular base station fails, the permanent monitoring service of the Node Agents will detect the malfunction, and then the base stations self-healing method will autonomously locate another route allowing intelligent diagnosing and repairing OPNET code modifications provide one method of simulating a malfunction in the base station. The most important features required for this process were the use of an acknowledged mechanism and the understanding of the range capacity of base stations. These characteristics were required to allow mobile devices to recognize when a failure takes place in a base station and stop transmitting and routing traffic, in order to start self-healing and path recovery 4.5 Self-Healing and Route Discovery The new route discovery was obtained through modifications to the wlan_server_adv and ip_arp_v4 OPNET process model, where code changes were made in order to achieve the desired autonomic behaviour. In a wireless access network, if the base station and mobile nodes are within transmission range of each other, an ARP request can be use in order to find a new route to the target mobile node. The Internets Address Resolution Protocol dynamically translates IP addresses to its MAC level address. Full OPNET source code is given in Appendix Source Code page 70 //ROUTE FAILURE //Route failure was created by denying connection service for a given destination address. The program looks into ARP table entries to find an entry for the destination IP address. Because the IP address given does not match in the ARP table the program returns a FAILURE ROUTE situation. On the other hand, in case that a matching entry was found SUCCESS connection will take place. static Compcode arp_cache_entry_find (IpT_Address dest_ip_addr, int* index_ptr) { Int table_size; inti; IpT_Arp_Entry*entry_ptr; //Find the entry in the ARP cache for a given destination IP address. table_size = op_prg_list_size (arp_cache_lptr); for (i = 0; i { entry_ptr = (IpT_Arp_Entry *) op_prg_list_access (arp_cache_lptr, i); FRET (OPC_COMPCODE_FAILURE) } //Match the to-be-resolved destination IP address with the entrys IP address if (ip_address_equal (dest_ip_addr, entry_ptr->ip_addr) == OPC_TRUE) { *index_ptr = i; FRET (OPC_COMPCODE_SUCCESS) } } When a new route is discovered (SUCCESS connection case), the information needs to be sent to an explicit destination (Mobile node) as specified in the â€Å"Destination Address† attribute. If the destination address specified is correct it generates a destination and forward the appl_packet to the MAC layer with that information. if (destination_address == OMSC_AA_AUTO_ASSIGN) { curr_dest_addr = OMSC_AA_AUTO_ASSIGN; oms_aa_dest_addr_get_core (oms_aa_handle, integer_mac_address, (int) mac_address); curr_dest_addr = integer_mac_address; } else { //Destination Address attribute. curr_dest_addr = destination_address; } // Set this information in the interface control / information to be sent to the MAC layer op_ici_attr_set_int64 (wlan_mac_req_iciptr, dest_addr, curr_dest_addr); // Install the control information and send it to the MAC layer op_ici_install (wlan_mac_req_iciptr); op_pk_send (pkptr, outstrm_to_mac); send_paket = op_ici_create_fmt (appl_packet); sendID = (SPkt *) op_prg_mem_alloc ( sizeof (SPkt) ); } In order to make the code modifications a simple as possible, the new path discovery was made through a simple Request-Response communication between base station and mobile node. Transmission of selected configuration parameters from the base station to the mobile node is possible by the creation of the autonomic agents and their interaction. The agents configuration is also executed in the OPNET Modeller Simulation by the use of the Node Editor described in the Figure 4.9.

Saturday, January 18, 2020

Han China and Imperial Rome Essay

Imperial Rome and Han China are both well recognized empires, known as strong and fairly successful. Although the empires had some differences they also had similarities in their methods of political control. Similarities between these empires include the belief that leaders had connections to God, religious tolerance, and public works provided to citizens. Along with the similarities in political control the differences include Rome having a democracy while China had a centralized bureaucracy, Rome had lesser domestic repercussions while China had harsh punishments, and Rome offered assimilation to become a citizen while China did not need to offer assimilation because it conquered states that were already chinese. Imperial Rome and Han Dynasty are similarly structured societies. Both empires believed that their leaders had some sort of connection with God. Rome believed that their emperors were to be viewed as â€Å"god-like† individuals and were to guide them unto the right path. China called their emperors â€Å"God of Heaven† and the emperors had to follow the â€Å"Mandate of Heaven† which states God would bless the authority as leader, and if an emperor did not provide adequately for their empire they could be replaced. Han China and Rome both also tolerated religion. Rome integrated Christianity into its culture while Han China allowed for Buddhism to become integrated. Neither empire persecuted due to religion. The last similarity between Han China and Imperial Rome is the fact that both empires decided public works were important enough to spend quite a bit of money on and to provide to the citizens. These public works included roads, bridges, canals, and aqueducts. All of these were an important part of society as they allowed for transportation, communication, and sanitation. The government in both societies decided how to view the leaders, what they would permit as far as religion, and what to spend government funding on. As well as these similarities, Rome and China had their differences. Imperial Rome differed from Han China in some aspects. For instance, Rome had divided the empire into smaller sections so it could be easier to manage, as each sector had a branch of government to control it. China did not have a Democratic approach, but a Bureaucratic approach. There was one emperor that controlled the entire empire, and the government was highly centralized. Another difference between the government in Rome and China were punishments. Imperial Rome had short and superficial domestic repercussions compared to the strict legalism society of China. Punishments in China were swift and harsh to persuade citizens to stay in order. The Chinese believed humans were dumb and short sighted and had clearly defined laws and rules that were strictly enforced. Rome did not focus so much on punishments as China did. The last difference between these two empires are their allowance or need for assimilation. Rome conquered Germanic tribes that refused to conform to society, even though Rome offered assimilation. This would eventually lead to the end of Rome. China, however, did not need to offer assimilation due to the fact that the conquered nearby states had already accepted chinese culture to be their own, therefore having one culture throughout the empire instead of a mixture of cultures. Han China and Imperial Rome are comparable in political standards in the means of the view of leaders, that they were closest to God, how they decided to spend political funding, on public works for citizens, and their tolerance for religions, Rome allowing Christianity and China allowing Buddhism. Rome and China are contrastable in the sense of Rome being Democratic while China was Bureaucratic, Rome being lenient with punishments compared to China’s strict legalism beliefs, and Rome offering assimilation to conquered Germanic tribes while China conquered already Chinese states and did not need assimilation. Both empires are valued respectively for their contributions to modern society, including their similarities and differences.

Friday, January 10, 2020

How Facebook Effects Relationships

Facebook is a popular web page where anybody can create a free account, similar to an email address. The site allows anybody to add friends, post pictures, and let all their friends know what their doing on an hourly basis. At the beginning, the page appeared to be a great way to keep in touch with people who lived two minutes to two hours to two thousand miles away. The site allows all who have accounts to add friends, some who are suggested by the page itself, and keep in touch through quick, easy Internet access.But is the web site actually helping or hurting the relationships we form everyday? There are many benefits to Facebook. Facebook is the quick, easy way to keep up to date with events that happen every day. Once a person creates an account, they can add their friends and therefore look at the page that is created by that person and see their posts. When a person â€Å"posts† something it means that they are writing anything they want for all their friends to see, fr om song lyrics, to what their plans are for the day, to angry outbursts with a lot of curse words associated.The posts pop on the community wall so a person doesn’t have to go to each individual’s page to see their plans. This feature is beneficial because it allows a friend to discover plans and therefore work with, or around them to be able to see or communicate with that person without having to go through to hassle of keeping in touch every hour or having to send a text to twenty of your friends about what you’re doing that day. Another benefit of Facebook is it allows a person to keep in touch even through long distances.For example, if a person lives across the country, it is difficult to coordinate the time difference, and therefore makes it hard to have phone conversation or text repeatedly back and forth unless it is at a set time that is consensual for both parties. Facebook allows people to keep in touch on each person’s own time through wall p osts, and messages, this is especially helpful in families who have ventured off to different areas of the world. Finally, the site is helpful by keeping loved ones in touch.Just as it does with families, Facebook allows person A to say something to person B on their own time but it also lends a hand in reminding loved ones how much they miss or care about each other publicly. As stated by Andrew Sabatini in his article Effects of MySpace and Facebook, â€Å"These websites provide a new way for couples communicate and help eliminate geographical boundaries. Both sites allow one member of the couple to get brownie points, through gifts and comments, and get them out of the dog house. (Sabatini) The option for a boyfriend of bringing surprise flowers to his girlfriend when she’s with all her friends is eliminated when the two are separated by hours due to college or job choice or a family vacation. Facebook allows the man to publicly display his affection (though it wonâ€℠¢t always work) to his girlfriend through words of endearment and the thought that he doesn’t mind letting everyone know how much he cares for his significant other. Although there are many benefits of Facebook, the site can also create a lot of tension.In the film Catfish, a documentary directed by Henry Joost and Ariel Schulman, a 24-year-old photographer begins talking to a family after becoming intrigued with an 8-year-old child painter prodigy. As the main character Yaniv â€Å"Nev† Schulman creates a stronger bond with the family he starts to talk to the young prodigy’s older sister via text, phone calls, and of course, Facebook. Without ever meeting his soon-to-be girlfriend, Nev discovers her appearance, her friends, events, and whereabouts through Facebook.However, when Nev travels to visit the family and girl he has been communicating with for months he learns that all is not what he expected. The location where she has said to be staying is not being occupied by anyone, and the mail he has sent her is still located in the abandoned mailbox. Nev and his friend’s next stop is the house of the young artist who inspired the whole film. While there Nev realizes that the girl he had been having a technology-based relationship with is actually the married mother of the 8-year-old sensation. The mother had created a fake Facebook account, added fake friends she had created and posted fake wall posts.Through imagination, and some form of determination this woman formed a relationship with Nev through Facebook updates and text messages. Eric Eisenberg pronounces in a Catfish review, â€Å"As social networking becomes more and more a part of every day life for people of all ages, Catfish is a reminder that it’s wise to wonder what’s truly going on at the other end of the line. † (Eisenberg) The movie simply proves that Facebook can let a person be anyone they want, the pictures, the updates, everything can be a lie, yet nobody will ever know.It’s a concern of trust, but more so of safety. Even though there are many more negative aspects of Facebook, such as the time it consumes from people every day, the things that makes Facebook non-appealing to many is that it creates jealousy, and tension in intimate relationships. On the web site people are able to tag other people in pictures. The website causes jealousy due to pictures because if a person’s significant other is pictured with someone you don’t know, or aren’t comfortable with, or never told you they would be with, the tension rises and questions come up.Another negative effect of Facebook on relationships is how wall posts may not match exactly what a person said. For example, in the article What Effect does Facebook have on Relationships by Lauren Fisher, she says â€Å"If your boyfriend told you they were out for the weekend, that was pretty much it. But now you have the ability, should you want to, to scour their Facebook page for updates over the weekend, to see what they’re up to. † (Fisher) Facebook creates a sense of suspicion, and obsession to check if your partner is actually doing what he or she claims.Furthermore, Facebook has the ability for people to display their relationship status. A relationship isn’t really a relationship these days unless it is â€Å"Facebook official†, and a break-up isn’t concrete until a wall post says that they are single. John Norvell declares â€Å"†¦people had ways of telegraphing their status. † (Hines) Even though people could always easily portray their relationship status through actions and words the simplicity of updating a page in seconds can cause a person to second guess â€Å"trying to talk it over† or give them time to reflect on what’s actually happened, and if breaking up is the best choice.As stated before, Facebook can let people demonstrate their care for another, h owever it can also become an annoying obsession preformed by many, women more so then men. For instance, â€Å"One participant of the survey said that her boyfriend calls her a pain when she does it (comments on his wall or message’s him) because she has done it so many times that it has become obnoxious. † (Sabatini) Finally, and most obviously, Facebook use correlates directly to stress in relationships. Facebook permits a person’s significant other to view how much activity is taking place, and therefore generates resentment, yet it is a no win situation.If a person has too much information it can be questioned on why so much action is taking place, yet if things are hidden or unable to be seen it is also grounds for distress because curiosity strikes. In a study â€Å"Accessibility of information: Increased info about the interactions of significant others lead to increased monitoring and jealousy for 19. 1% of participants†, â€Å"Relationship jealo usy: 16. 2% of respondents were explicitly linked to Facebook use contributing to jealousy†, and â€Å"Lack of context: 7. 4% of respondents referenced how Facebook can be ambiguous and that, without context, jealousy can be spurred over misunderstandings. (Parr) There is no easy way out of the Facebook jealousy factor, except to delete your Facebook account altogether, and consequently disconnect from society in a way. In conclusion, Facebook is a very good way to stay in touch with people who are distances away. It helps people keep up to date, and know what their friends are doing for the day. The site allocates couples to show their affection to the public without even leaving their house, and doesn’t conflict with time schedules or location. But to every good, there is a little bad. Facebook creates jealousy left and right.The web page makes questions arise that may not have before the site was created. And the option of hiding crucial information or checking and obsessing over it can lead to destruction in a somewhat other happy relationship. Overall, Facebook has its positives and negatives, just like everything else in life, but a person has to ask themselves, is social connectivity via the internet worth a full hearted relationship? Only time can tell.Works CitedCatfish. Dir. Henry Joost and Areil Schulman. Perf. Navid Schulman. Rouge Films, 2010. Film. Parr, Ben. â€Å"Study: Facebook Increases Jealousy in Relationships.Social Media News and Web Tips – Mashable – The Social Media Guide. 9th Aug. 2009. Web. 27 Oct. 2010. . Sabatini, Andrew. â€Å"Effects of Myspace and Facebook on Relationships. † http://webrelationships. wetpaint. com/page/Effects+of+Myspace+and+Facebook.Fisher, Lauren. â€Å"What effect does Facebook have on Relationships? †Ã‚  http://www. simplyzesty. com/facebook/effect-facebook-relationships/.Hines, Twanna A. â€Å"Is Facebook Helping or Hurting Your Love Life? †Ã‚  http://www. fa stcompany. com/articles/2008/02/facebook-love-life. html.

Thursday, January 2, 2020

Fords E-Commerce Strategy - 1680 Words

EXECUTIVE SUMMARY In early 1999, Ford announced an integrated e-commerce strategy, with the objective of creating an interface among customers, dealers, vendors and even competitors. The SWOT analysis was studied for the development the strategy, as well as the chances of success of such strategy. With Fords desire to shift from ‘dealer-centric selling to ‘consumer-centric selling, we looked at the typical characteristics of online customers and how dealers could reinvent themselves to remain relevant in the changing automotive industry. The quest of Fords goal to become the worlds leading consumer company that provides automotive products and services has compelled Ford into integrated e-commerce strategy in connecting with†¦show more content†¦Fords current chairman and CEO, Bill Ford has a simple strategy, Our vision for the future is simple: We want to build great products, a strong business, and a better world. Fords vision is, To become the worlds leading consumer company for au tomotive products and services Chances of Success However, there are many obstacles on Fords path. To increase her success rate, Ford must shift from ‘dealer-centric selling, where consumers choose from the limited selection on a dealers lot to ‘consumer-centric selling, where the buyer gets what he/she actually wants. Cars are not like computers, which have just a few components and could be shipped by UPS in couple of days. Automobiles have thousands of parts produced by thousands of suppliers; hence the biggest challenge/success factor is to integrate all the individually wired entities in the value chain into a single, large network. In addition, Ford needs to be constantly wary of stiff competitors like Nissan who claimed to be the first major automaker to introduce Web-enabled build-to-order (BTO) manufacturing and that its front-end configuration engine will provide the basis for a Dell-like custom manufacturing system which Ford is rather skeptical about. The tussle with Franchise Laws, especially in US, is also a perpetual issue in which Ford has to content with and it will continue to be an obstacle for Fords future. WEB CUSTOMERS Though there areShow MoreRelatedFord Motor Companys Transformation Essay634 Words   |  3 PagesWhen Ford Motor Company saw rapidly changing technologies dramatically impacting how the world did business it also recognized that for the organization to remain competitive incorporating these technologies would be critical. The emergence of e-commerce presented an opportunity to improve company structure for information sharing and process changes that could also enhance relationships with suppliers, dealers and customers. This technology would, in the presidents words, allow us to integrateRead MoreThe Mission Statement Of Ford Essay1792 Words   |  8 Pages Ford Credit helps Youngers to rent a car or lease a car from Ford. Ford’s marketing organizational structure is primary decentralized because there are two departments which are automobile and finance department. Automobile department concentrates to sell and lease vehicles. Finance department is strongly connected to Ford Credits. Also, Finance department plays role of real estate ownership. External Environment Ford strategy is serving customers in markets with a family of best in class vehiclesRead MoreBusiness Analysis- Ford Motor Company Essay2411 Words   |  10 Pagesanalysis of Ford Motor Company’s (Ford) statements will identify their solvency in today’s automobile market. Elements such as liquidity, leverage, profitability, and activity ratios will demonstrate Ford’s financial health and stability. A further assessment of their technological advantages, global strategies, and benchmarking analysis will indicate the future prognosis of this company. Business Analysis Part III: Ford Motor Company Ford Motor Company: Strategic Initiative Liquidity Ratios ManagersRead MoreMarketing Strategies: - Ford Case Sudy3951 Words   |  16 PagesINTRODUCTION Marketing strategies varies from one market to another and from one product to another. For example the marketing strategy of Daewoo is different from Ford. The main marketing strategy of Daewoo was how to break onto the relatively mature USA market in order to become a meaningful player in a short period of time, while fords problem was basically an internally focused one, indicating how IT influenced the organization design and global marketing strategy. Company Profile: Read MoreInvestigation into Ford Motor Company’s Green Washing2535 Words   |  11 Pagesany other vehicle to the company’s bottom line. Without SUV offerings, Ford likely would lose sales and profits† (Luke, 2001). While it is in Ford’s brand imaging interest to attract ‘green’ customers, it is more financially rewarding to attract drivers of SUVs like the Explorer. Deliberately losing â€Å"sales and profits† would be a potentially fatal strategy, yet this is what the ‘green consumer’ is asking of Ford. It is unsurprising from a business perspective that they are resisting the reductionRead MoreEssay on ford3377 Words   |  14 Pages000 to 10,000 eiectric cars per year starting in2011. In mid-2009, Nissan Motor was granted $1.6 billion in loans also from the U.S. Department of Energy to build as many as 100,000 electric cars a year at its plant in Smyrna, Tennessee, by 2013. Fords newest competitor may be the U.S. government because GM and Chrysler LLC are in line to get $62 billion in investments from the U.S. Treasury. GM and Chrysler have cut their debt and closed hundreds of dealers with that money, while Ford still hasRead More Ford Motor Company Marketing Strategy Essay6259 Words   |  26 PagesFord Motor Company Marketing Strategy Ford Motor Company is one of the world’s largest producers of cars and trucks and one of the largest providers of automotive financial services marketing vehicles under the eight brands shown below. The Company is a publicly traded company listed on the New York Stock Exchange. During 2002, the company made 6.7 million vehicles and employed 328,000 people worldwide. Business partners include 25,000 dealers and more than 10,000 suppliers. Ford motor companyRead MoreAbraham Lincoln essay paper1569 Words   |  7 Pageswinning election to the Illinois state legislature in 1834 (Johnson). Like his Whig heroes, Henry Clay and Daniel Webster, Lincoln opposed the spread of slavery to the territories, and had a grand vision of the expanding United States, with a focus on commerce and cities rather than agriculture (Johnson). Lincolns congressional term (1847-1849) was dominated by controversies over the Mexican War (Lehrman). He took the standard Whig position that the war had been provoked by President James K. Polk (Lehrman)Read More Conditions and Effects of the Evolving Electronic Economy on Labor3644 Words   |  15 Pageswanted to do in my day?† â€Å"Not so bad as that,† replied Dr. Leete. â€Å"We have simply dispensed with them. Their functions are obsolete in the modern world.† (60) Looking Backward by Edward Bellamy, 1887 Edward Bellamy’s futuristic conception of commerce in the 21st century unintentionally created a surprisingly accurate representation of the emerging electronic economy. The use of computer technology and the internet is allowing the creation of greater corporate profit margins at the expense ofRead MoreFord Motor Company Supply Chain Strategy Case Report3198 Words   |  13 PagesCompany Supply Chain Strategy Case Report EXECUTIVE SUMMARY As director of Supply Chain Systems, I have decided to implement portions of the new supply chain strategy of Virtual Integration and strategies from companies like Dell. Although there are several key differences between the companies, Dell’s virtual integration strategy can be applied to Ford’s supply chain operation. A modification of the virtual integration system currently used by Dell could be applied to Ford’s dependent supplier