Monday, September 30, 2019
My Job Experience
Narrative Story: The first-person narrative is a literary technique wherein a story is narrated explicitly by one or more of the characters, who refers to himself or herself in the first person as ââ¬Å"Iâ⬠. As the narrator express his/her own feelings, thoughts, and experiences, the narratorââ¬â¢s character is revealed and the reader easily gains insight to the character. It also suspends information from the reader, and therefore widely used and effective to suspense and detective fiction. My Job Experience I woke up with a loud ringing near my head.A few days back, or years to be exact, I would have easily put it off and dose back again on my soft pillows. Ahh, but this day was different. Itââ¬â¢s my first day in my first job ever. I could hear my head pounding. I never needed the alarm clock in the first place anyway, since I hardly slept last night. Iââ¬â¢ve always seen myself as a ââ¬Ëcool guyââ¬â¢ but the butterlies in my stomach speaks much differently ab out me, though. I headed for the shower and felt the water slap me from my semi-half-awake half-asleep state. Breakfast!But where are my stockings? Though contrary to real day-today experience, I wish mom was here. Well, better get off now or I might miss the bus. I surely want to make a good first impression and hope this will carry me all the way to promotions. I can hardly wait right now to experience the sweet smell of success! I stopped myself as I saw a man staring at me. Daydreaming may have been written all over my face. Secretly, I pinched myself for making a fool of me. As I came inside the building, I headed for the shop to which I was assigned.Across the shop, Darlene Shepherd subtly nodded at me, acknowledging approval of my early arrival. She was the one who chose me as a shop steward. Of course, I wanted to prove my worth. I love the dignity of work, but best of all, I love to walk around the corner and shop just a liiiitle bit of little-bitty things. My first day in my first job closed shopped with less adventure than I expected. This routine, except for the case of the missing stockings, went on for some time. Until last April, I saw my coworker named Daniels crying.Apparently, she was reprimanded. I came near her. At first it felt awkward hugging her a bit ( we hardly knew each other except for our first names). But when I did, her tears fell all the more, and I was completely taken over by her concern It was mid-afternoon, she said when her legs became awfully painful trying to stand all day. As the pain became almost unbearable, she tried to sit on one of the chairs placed near the customerââ¬â¢s area. Though shoppers were becoming fewer by the moment, Mr. Jarvis (our head supervisor) came in just as she sat down on the couch.Think about perfect wrong- timing indeed! I could understand where Mr. Jarvis is coming from, since it did look the way it shouldââ¬â¢nt look. But termination? I tried to calm myself down. Being angry might give me my fifteen minutes of victory but it could defeat my career-history. I brought the case to higher management. I carefully chose and weighed my words and to my amazementâ⬠¦ they listened and relented. From then on my co-workers would start looking for me to speak for them whenever they have concerns that they feel uneasy to face with the supervisor or manager.I found myself getting more and more involved in my co-employeesââ¬â¢ work-related concerns. I have learned to listen and empathize with them, without getting emotionally involved myself whenever the outcome turns out unfavorable. I never did saw myself before as what I am becoming right now. Lately, weââ¬â¢ve been involved in community outreach to feed the homeless. Itââ¬â¢s a pretty sight to see big-muscled Jack teaching math to 5 year- old Sam. Iââ¬â¢ve seen how generous below-middle class workers could be with their spare time.I thought plenty spells generosity, but my co-workers proved them wrong. Before we started this project, I honestly had some doubts as to its success and sustainability. Before, it was just us, me and the union. I believe in the unionââ¬â¢s contribution to the betterment of the workerââ¬â¢s welfare. And yet, the more we ask, the more we see things to complain about. There seems to be no end on what to grudge about. Of course, as we go along helping the needy, there would be more things to sort out, too. And more things to improve on.Yeah, life as a shop steward does have its many rewards. Shopping? Maybe. For now I see my storehouse rich with lifeââ¬â¢s lessons ââ¬â being my brotherââ¬â¢s keeper (whether one is rich or not-so-rich), standing up for what is just and striving for equality. As we wrap our things and clean up the mess after the feeding program, all around me, I see tired happy faces. Tired, but happy. Reference: 1. ââ¬Å"First-Person Narrativeâ⬠. From Wikipedia, the free encyclopedia Http://en. wikipedia. org/wiki/literary_sty les
Brand and Proper Branding
Branding Meaning of Branding: The word ââ¬Å"brandâ⬠is derived from the Old Norse ââ¬Å"brandrâ⬠meaning ââ¬Å"to burn. â⬠It refers to the practice of producers burning their mark (or brand) onto their products. Branding is the practice of giving a specified name to a product or group of product of one seller. Branding is the process of finding and fixing the means of identification. In other word, naming product, like a naming a baby, is known as branding. Parents have children and manufactures also are eager to know the character and the capacity of their names. Thus branding is management process by which product is name; i. . branding. Proper branding can result in higher sales of not only one product, but on other products associated with that brand. For example, if a customer loves Wai Wai Noodles and trusts the brand, he or she is more likely to try other products offered by the company such as Kwiks Cheese Balls or Kwiks Potato Chips. Definition of Brandin g According to the American marketing Association, ââ¬Å"A brand is name, term, sign, symbol or a combination of them, intended to identify the goods and services of one seller or group of sellers and to differentiate them from those of competition. According to William j Stanton, ââ¬Å"All trademarks are brands and thus include the word, letter or numbers which may be pronounced; they may also include pictorial designs. â⬠Threes of Cs of Branding 1. Clarity: Strong bonds are clear about what they are & what they are not. They understand their unique promise of value. And this promise of value sets them apart from their competitors. It differentiates them and allows them to attract and built loyalty among a desirable set of consumers. 2.Consistency: In addition to being clear about who they are, strong brands are also consistence. They are always what they say they are. 3. Constancy: It is not enough to be clear and consistent if you are not always visible to your target aud ition. Strong brands are constant, they are always there for their customers and prospects. A brand can convey up to six level of meaning 1. Attributes: Mercedes brings to mind expensive, well built, well engineered, durable, high prestige automobiles. 2.Benefits: The attributes ââ¬Å"Durableâ⬠could translate into the functional benefits and the attributes ââ¬Å"Expensiveâ⬠translates into the emotional benefits. 3. Values: Mercedes stands for high performance, safety and prestige. 4. Culture: Mercedes represents German culture; organized, efficient and high quality. 5. Personality: Mercedes may suggest a no nonsense boss ââ¬Å"personâ⬠, reigning lion ââ¬Å"animalâ⬠or an austere palace (object). 6. User: Suggest the kind of consumer who buys or uses the product. A top executive behind the wheel of a Mercedes and not a young secretary.Purpose of Branding 1. Brand is a massive asset. 2. Brand is a promotional tool. 3. Brand is a weapon to protect market. 4. B rand is antidote for middle man survival. 5. Brand is a means of identification for customers. Significance/advantage of branding 1. Advantage to producers a. Easy to advertise. b. Easy to identify the products. c. Creation of separate market. d. To get more price. e. Easy to expand the product mix. f. Personal contacts with consumers. 2. Advantage to middle man g. Easy to understand needs and wants of consumers. . Less risks. i. No need of advertisement and sales promotion. j. Increase in sales. k. Increase in profit. 3. Advantage to consumers l. Easy to recognize. m. Availability of quality product. n. Minimum fluctuation in price. o. Mental satisfaction. p. Improve packing. Branding decision Branding of products are mainly done under following criteria: 1. Founderââ¬â¢s names. 2. Blanket family names. 3. Separate family name for all products. 4. Corporate names combined with individual product name.
Saturday, September 28, 2019
Internet Procedures Essay
The Internet is considered the ââ¬Å"worldââ¬â¢s largest computer networkâ⬠(Encyclopedia Americana). The Internet dates back to the early 1960s. The Internet consists of small computer networks that are connected to each other. It serves as a tool for different organizations to share and exchange electronic data. It links different computers from all over the world through TCP/IP protocols (The Library, University of California, Berkeley, 2006). Each computer has a software that allows it to provide information and conversely, to access and view information (The Library, University of California, Berkeley, 2006). The Internet has grown in size over the years that the Internet Software Consortium estimated that by early 2003, more than 170 million computers or hosts are connected to the Internet (Encyclopedia Americana). A person who wants to access the Internet through a computer must have a telecommunications link, such as modem, and software that is necessary to be able to connect to an Internet Service Provider (The Library, University of California, Berkeley, 2006). A computer needs an IP address to be able to connect to the Internet. An IP address consists of a unique set of numbers that allows the computer to receive data using the TCP/IP. Transmission or sharing of computer files occurs when each packet of a computer file finds its destination, which is the IP address of its intended recipient (Encyclopedia Americana). The Internet differs from the World Wide Web (WWW), in that the Internet is the network that serves as the conduit of all computers connected to it, while the World Wide Web is ââ¬Å"a service that allows computer users to quickly and easily navigate the Internetâ⬠(Grolier Multimedia Encyclopedia). References Internet. (2007). Encyclopedia Americana. Retrieved February 21, 2007, from Grolier Online http://0-ea. grolier. com. novacat. nova. edu:80/cgi-bin/article? assetid=0216805-00 The Library, University of California, Berkeley. (2006). What is the Internet? Retrieved February 20, 2007, from http://www. lib. berkeley. edu/TeachingLib/Guides/Internet/WhatIs. html World Wide Web. (2007). Grolier Multimedia Encyclopedia. Retrieved February 21, 2007, from Grolier Online http://0-gme. grolier. com. novacat. nova. edu:80/cgi- bin/article? assetid=0315535-0
Friday, September 27, 2019
Heat Capacity Assignment Example | Topics and Well Written Essays - 1000 words
Heat Capacity - Assignment Example For instance, it would take 2 minutes to heat an electric kettle holding about 1.6 kg of water from 200C to 600C while it will take 100 minutes to heat a hot water tank holding about 160 kg of water by the same temperature with a 5 kW immersion heater. This explains why it takes longer waiting for hot water tanks to heat up water for bathing than would be the time waited for kettles to boil. The water contained in hot water tanks have higher heat capacities that the water in kettles. Hence, it would require more energy to raise the temperature of the water in the hot water tank than it would be required to raise the temperature in the kettle. Taking the same mass of different materials, it would take different times to raise their temperatures by equal magnitude using the same electric heater. Thus, Avison (2009) documents various heat capacities for 1 kg of different materials as shown in Figure 1. Measuring the heat capacity of a substance with reference to its specific mass gives its specific heat capacity. Hewitt et al. (2012) define specific heat capacity, c, as the heat energy required to raise the temperature of a kilogram of a substance by 1 Kelvin. Hence: Note that experimental values tend to be higher than the exact specific heat capacities of various substances because of the heat losses during heating (Avison, 2009). Due to such difficulties in determining the specific heat capacities of substances, they have been documented for referencing. Table 1 shows some specific heat capacities for various substances. The knowledge of heat capacity, and specific heat capacity by extension, informs on the heating characteristics of substances. As such, it plays a critical role in determining the substances to use when making instruments where the heating characteristics of such substances are of basic importance. Therefore, substances that have a small specific heat capacity heat up quickly and additionally
Thursday, September 26, 2019
Distribution Channel Case Study Example | Topics and Well Written Essays - 4000 words
Distribution Channel - Case Study Example Both of the afore mentioned examples suit various different class of companies / firms and this element of the Distribution Channel could be decided by distinguishing the class, price range, quality, company's capacity, etc. That is, the Distribution Channel is closely related to the Place, Price as well as the Product differentiation elements of the Marketing Mix. (Rolnicki) Direct Selling concept: This element of the distribution channel generally refers to the door to door selling concept. Although, new authors have also included Telephone sales, e-mail sales, direct mail sales, and online (e - commerce) sales within this concept. Via Agents: Agents acts as middle - men between the company and either end user or wholesaler. That is, they purchase goods from producers (manufacturers) and sell them to interested sellers (sometimes within specific geographical boundaries, as a company may appoint many agents, but according to ethical principles, it is always in the best interest of everybody to clearly distinguish and identify the geographic regions for each) with prior (usually written) consent from the company. Retailer: Within this normally 3 concepts are involved: The first being, a manufacturer directly sells his good to retailers, this is usually in case if the production capacity of the Manufacturer is medium to lower levels. Second concept here could be self-retail prospects, through which a manufacturer could sell his goods at his self owned retail store / s. Another concept which has been added by the author of this report is, retailing through previously recognised and somewhat legendary retail franchisees such as our Case Study of TOPSHOP. Allotment of regional Distributors: Through the means of this concept a company may depute various distributors on a regional basis, this is quite similar to the agent concept; but is used where a much larger geographical coverage is required (minimum at State level / National Level), and has normally been seen effective where the manufacturer has a huge brand name. Whole selling: A company may also opt to choose wholesalers to market their
Evaluate the impact of Fairtrade Essay Example | Topics and Well Written Essays - 2000 words
Evaluate the impact of Fairtrade - Essay Example Alternative trade organizations that are based on philosophies of well being of environment, and also social justice are creating new channels for marketing and trade alongside conventional agricultural export sectors. Social responsibility and ethics have become an important factor in consumer marketing which provides an organization with competitive advantage with respect to its competitors. The changes that are brought about by fair trade have to be looked at first to analyze the impacts of fair trade. One has to consider in this regard the changes that were not possible without the existence of fair trade. When the existence of fair trade benefits farmers, they start to control a significant part of the production chain and also employ workers. When farmers who are certified by fair trade employ workers, those workers have a high standard of living and a working condition that is considered better. If workers have a standard of living that is considered better, they will invest more money in their childrenââ¬â¢s education. Favourable economic opportunities are provided by fair trade to small farming families such that they also get the opportunity to join manufacturing organizations and produce products with market specifications. These farmers are considered to enjoy higher and stable incomes as compared to those farmers that sell in the conventional market. Buyers pay a stable minimum price known as fair trade price to cover the sustainable cost of production. There also exists opportunity for pre-financing and also contracts for long term planning. It also has an increased access to the export markets (Bassett, 2010, pp. 44-49). The fair trade price is considered to have a lot of significance when in the volatile world the prices of commodities and products fall below the cost of production. Importers tend to import the products of fair trade in their respective countries for further processing of such products and to sell those products themselves or
Wednesday, September 25, 2019
Limited time quiz. 1 hour and 10 minutes Assignment
Limited time quiz. 1 hour and 10 minutes - Assignment Example The majority of its business is conducted online: Consumers purchase typically small quantities of products online and Plant Away coordinates the shipping from the most appropriate nursery. What unique problems might you anticipate it has in its supply chain? What might remedy these problems? (Points : 35) First, Plant Away will have an uphill task while transporting these products because of their nature. Seedlings can wither or die off if the transportation process is delayed, which is inevitable in an online business. Secondly, Plant Away will experience problems getting customers because of lack of trust. Not many customers can trust that purchasing a product online will land on their hands safely. They would rather buy what they can see physically. The other problem is concerned with cyber crime. If the company or its customers are not careful, money can be lost to cyber criminals or hackers. To remedy these problems, Plant Away may want to use agents to be selling the products from the side of the customers. Regarding lack of trust of online business, Plant and Away can invest in good customer relations and education to increase their confidence. Lastly cyber crime can be avoided by making sure all the security control checks are installed in their systems, and generally being c areful not to fall play of these crimes. Customers can be educated on the
Tuesday, September 24, 2019
My Family Is My Life Essay Example | Topics and Well Written Essays - 250 words
My Family Is My Life - Essay Example The examples that show these lessons on virtues include kindness, care for others, and development of my good attitude in life towards people and the society, and patience. The second reason for the family is the main foundation of my life is my parents. My parents were the ones who taught me how to eat, build relations with others, how to write and behave making the family as important as ever. My parents also developed me in terms of providing better care, housing, and companionship.à The basis for the formation of lifeââ¬â¢s values. Many of the values I have were developed at the family unit. Family enabled the formation of basic life values including good mannerisms, morals that act the idea face in the society, development of character, and these all make family my life. I also learned the importance of respect, hard work, commitment to a given goal and the need to be assertive into to order succeed at the family unit. Without the strict guidelines and procedures set at th e family unit, I would not be in a position to achieve success yet maintain professionalism, humility and respect as I have today.à The family has always acted in my best interest with encouragement whenever I fail, appreciation when I succeed, care when ill, and protection from enemies, making family the best friends in life. Secondly, the family has always been there for me through provision of finances and other resources through lower education up to know showing that they have always wanted the best for me.à Ã
Monday, September 23, 2019
Illustrate techniques that influence performance Essay
Illustrate techniques that influence performance - Essay Example These are personalities who like to be sensually animated and sexually roused. They regard eroticism as an abundant source of pleasure and prompt their romanticism through cuddling, tenderness and amorous care. They enjoy living one day at a time and prefer interruption to solemn work. These incoporate people motivated by Financial Incentive strive for a huge pay-off that comes as the fruit of their labor. They need to feel that their income and benefits equal the value of the time and energy they invest in their work. While it is a shared motivator, most people identify with high income earners, (those who do not want to work for peanuts), these individuals place more importance on remuneration than the average worker. This is not to say they are only after the big bucks; their main concern is having the money to afford a specific lifestyle that gives them the drive to succeed. They are willing to invest themselves, but will not do so without significant pay-off (Pandey, 2005). Apart from a desire to make an extremely high salary within a short time to feel happy upon employment, they would also want to see the long-term reward for the personal investment they put into their
Sunday, September 22, 2019
Reading Kafka Essay Example for Free
Reading Kafka Essay Reading Kafkas The Trial, especially for the first time, we often experience a blend of precision and obscurity; words, sentences, and single events are clear in themselves, but are linked to each other in ways we cannot always grasp. The blend of precision and obscurity is one of the most remarkable aspects of the style in which The Trial is written. The device is used constantly and consistently throughout the novel, and we assume that it is used like all other stylistic devices, i. e. to throw an aspect of the novel into relief. In an attempt to determine, if possible, what this aspect is, follows a detailed analysis of two paragraphs on pages 159 to 160 that I deem to be characteristic of the blend of precision and obscurity. In the two paragraphs, detail and precision interact with each other to produce a blend. Almost all descriptions are quite in depth, such as the description of the old woman wrapped in a warm shawl, yet these detailed descriptions are not connected with anything else in the book. The old woman does not reappear anywhere else in the book, and no symbolism, hidden meaning or reference becomes apparent after having analyzed the description. In more conventional novels, almost every character that appears is in some way, whether clear or obscure, connected with the main plot or a sub plot. Not so with The Trial. The old womans importance and connection, if indeed there is one, remains open to speculation: perhaps she belongs to the court, perhaps the scrap of what looked like carpet that K sees in the same paragraph comes from her warm shawl, perhaps this enigma is simply a device used by Kafka to confuse the reader. The possibilities and perhapses stretch on into infinity until they are lost in the obscurity of the cathedral. Kafka describes an object, person, or concept in great detail, with very few omissions in order to give the described every semblance of reality, but the meaning of the described is left completely open to the reader. This is the particular blend which casts its mottled shadow on the novel. A possible interpretation of this presence of this blend would be to say that it serves to give the novel a dreamlike, surreal quality. One knows from ones own dreams that certain aspects remain crystal clear in our memory, yet one can almost never remember for sure what the aspects role in the dream was. It is the same way with the blend: an aspect may be clear, but the rest is hazy. Supporting this interpretation would be the fact that K cannot read: he opens his album and looks through the pages for a while, probably only looking at the pictures without reading the text, and eventually has to stop this futile exercise ostensibly because it is too dark. The dream interpretation would also explain the randomness of events, objects, and people. Since the subconscious is left to work unrestricted in dreams, the products can be quite random and utterly impossible to link together or make sense of using logical means. The blend could also be viewed as a method to accentuate the confusion and plunge the reader yet deeper into the obscurity. In the second paragraph, when the candles have been lit, Kafka states that the candles only made the darkness more intense. If the candles and light are taken to represent precision and the darkness obscurity, then Kafka is clearly showing why he has worked the blend in to the novel. It is impossible to judge anything unless one compares it to something else. It is by contrast that we determine what is what. If one is constantly in the dark, one will not consider it dark, because one has become accustomed. Perhaps the candles of precision are there to throw the confusion and the haziness into sharp (or hazy? ) relief. Kafka only allows in any light so that the reader can see that he is bathed in darkness and confusion, and be attracted to the light. However, when the reader reaches the light he realizes the light is hollow as well: it is only aesthetically different from the darkness. In the second paragraph Joseph K. examines an altarpiece with his electric light. K. sees a Knight and looks at it for a considerable period analyzing it in detail without really understanding what the Knight is doing, nor why he was there. However, when K. shifts his light to see the rest of the picture, he realizes that the Knight is only a small piece of a conventional treatment of Christs burial. The parallel between K. and the reader is too strong to be overlooked. The reader, while reading the book, is looking through it one page at a time, attempting to analyze details and connect events. It is as if we too are looking at disconnected close-ups of a large picture. Like a picture, the events in the book are non-linear. They can be read any which way and in any order and still retain the same meaning. Kafka is essentially telling us as readers that we ought to shift our lights as K. does so that the whole of the picture is lit. If the reader focuses solely on one precise aspect, the rest of the picture is bathed in obscurity. Kafka, through the device of precision and obscurity, is telling the reader to take a step backwards and view the novel not as a succession of events like other conventional novels, but rather like a picture, where ones eyes and thoughts may rove freely along any lines that they choose. Only then will the whole come into focus. With reference to the last paragraph, I have been guilty of doing exactly what Kafka tells us not to do: i. e. analyzing in detail a small part of the text. Thus any conclusion that I may draw from these paragraphs alone are bound to be erroneous. However, draw a conclusion I will. I believe the blend of obscurity and precision is used to immerse the reader completely into the confusion of the text while at the same time advising the reader to take a step backwards. Given Kafkas rather eccentric sense of humor, I think it is quite possible that he believed pulling the wool over the readers eyes was uproariously funny, especially when the wool has directions telling how to lift the wool sewn on the inside, where it is too dark to see.
Saturday, September 21, 2019
Wireless Lan Applications Areas Computer Science Essay
Wireless Lan Applications Areas Computer Science Essay G. Marconi invented the wireless telegraph in 1896. In 1901, he sent telegraphic signals across the Atlantic Ocean from Cornwall to St. Johns Newfoundland; a distance of 1800 miles. His invention allowed two parties to communicate by sending each other alphanumeric characters encoded in an analog signal. Over the last century, advances in wireless technologies have led to the radio, the television, the mobile telephone, and communication satellites. All types of information can now be sent to almost every corner of the world. Recently, a good attention has been focused on wireless networking. Early wireless LAN products, introduced in the late 1980s, were marketed as substitutes for traditional wired LANs. Wireless networking is allowing businesses to develop WANs, MANs, and LANs without cabling. A wireless LAN saves the cost of the installation of LAN cabling and eases the task of relocation and other modifications to network structure. The IEEE has developed 802.11 as a standard for wireless LANs. The Bluetooth industry consortium is also working to provide a seamless wireless networking technology. The impact of wireless communications has been and will continue to be profound. Very few inventions have been able to shrink the world in such a manner. The standards that define how wireless communication devices interact are quickly converging and soon will allow the creation of a global wireless network that will deliver a wide variety of services. 1.2 Over view As the name suggests, a wireless LAN is one that makes use of a wireless transmission medium. Until recently, wireless LANs were little used. The reasons for this included high prices, data rates, occupational safety concerns, and licensing requirements. As these problems have been now addressed, the popularity of wireless LANs has grown rapidly. 1.3 Wireless LAN Applications Areas: There are four application areas for wireless LANs: LAN extension, Cross- building interconnect, Nomadic access and Ad hoc networks. LAN Extension The motivation for wireless LANs was overtaken by events. First, as awareness of the need for LANs became greater, architects designed new buildings to include extensive pre wiring for data applications. Second, with advances in data transmission technology, there is an increasing reliance on twisted pair cabling for LANs and in particular, Category3 and Category 5 unshielded twisted pair. However, in some environments, there is a role for the wireless LAN as an alternative to a wired LAN. Examples include buildings with large open areas. In most of these cases, an organization will also have a wired LAN to support servers and some stationary workstations. Thus, this application area is referred to as LAN extension. There is a backbone wired LAN, such as Ethernet, that supports servers, workstations, and one or more bridges or routers to link with other networks. In addition, there is a Control Module (CM) that acts as an interface to a wireless LAN. The control module includes either bridge or router functionality to link the wireless LAN to the backbone. It includes some sort of access control logic, such as a polling or token-passing scheme, to regulate the access from the end systems. Cross- Building Interconnect Another use of wireless LAN technology is to connect LANs in nearby buildings, be they wired or wireless LANs. In this case, a point-to-point wireless link is used between two buildings. The devices so connected are typically bridges or routers. This single point-to-point link is not a LAN per se, but it is usual to include this application under the heading of wireless LAN. Nomadic Access Nomadic access provides a wireless link between a LAN hub and mobile data terminal equipped with an antenna, such as a laptop computer or notepad computer. Nomadic access is also useful in an extended environment such as a campus or a business operating out of a cluster of buildings. Ad Hoc Networking An ad hoc network is a peer-to-peer network (no centralized server) set up temporarily to meet some immediate need. For example, a group of employees, each with a laptop or palmtop computer may convene in a conference room for a business or classroom meeting. The employees link their computers in a temporary network just for the duration of the meeting. There are differences between a wireless LAN that supports LAN extension and nomadic access requirements and an ad hoc wireless LAN. In the former case, the wireless LAN forms a stationary infrastructure consisting of one or more cells with a control module for each cell. Within a cell, there may be a number of stationary end systems. Nomadic stations can move from one cell to another. In contrast, there is no infrastructure for an ad hoc network. Rather, a peer collection of stations within range of each other may dynamically configure themselves into a temporary network. Fig 1.1 Wireless LAN Configurations 1.4 Wireless LAN Requirements A wireless LAN must meet the same sort of requirements typical of any LAN, including high capacity, ability to cover short distances, full connectivity among attached stations, and broadcast capability. In addition, there are a number of requirements specific to the wireless LAN environment. The following are among the most important requirements for wireless LANs. Throughput: The medium access control protocol should make as efficient use as possible of the wireless medium to maximize capacity. Number of nodes: Wireless LANs may need to support hundreds of nodes across multiple cells. Connection to backbone LAN: In most cases, interconnection with stations on a wired backbone LAN is required. For infrastructure wireless LANs, this is easily accomplished through the use of control modules that connect to both types of LANs. There may also need to be accommodation for mobile users and ad hoc wireless networks. Service area: A typical coverage area for a wireless LAN has a diameter of 100 to 300m. Battery power consumption: Mobile workers use battery-powered workstations that need to have a long battery life when used with wireless adapters. This suggests that a MAC protocol that requires mobile nodes to monitor access points constantly or engage in frequent handshakes with a base station is inappropriate. Typical wireless LAN implementations have features to reduce power consumption while not using the network, such as a sleep mode. Transmission robustness and security: Unless properly designed, a wireless LAN may be interference prone and easily eavesdropped. The design of a wireless LAN must permit reliable transmission even in a noisy environment and should provide some level of security from eavesdropping. Collocated network operation: As Wireless LANs become more popular, it is quite likely for two or more wireless LANs to operate in the same area or in some area where interference between the LANs is possible. Such interferee may thwart the normal operation of a MAC algorithm and may allow unauthorized access to a particular LAN. License-free operation: Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN. Handoff/roaming: The MAC protocol used in the wireless LAN should enable mobile stations to move from one cell to another. Dynamic configuration: The MAC addressing and network management aspects of the LAN should permit dynamic and automated addition, deletion, and relocation of end systems without disruption to other users. 1.5 The Trouble with Wireless Wireless is convenient and often less expensive to deploy than fixed services, but wireless is not perfect. There are limitations, political and technical difficulties that may ultimately prevent wireless technologies from reaching the other side with full potential. Two limiting issues are incompatible standards and device limitations. Device limitations also restrict the free flow of data. The small LCD on a mobile telephone is inadequate for displaying more than a few lines of text. In additions, most mobile wireless devices cannot access the vast majority of WWW sites on the Internet. The browsers use a special language, wireless markup language (WML), instead of the de facto standard HTML. Most likely, no one wireless device will be able to meet every need. The potential of wireless can be met but not with a single product. Wireless will succeed because it will be integrated into a variety of devices that can meet a variety of needs. 1.6 Fading in the Mobile Environment Perhaps the most challenging technical problem being faced by communication systems engineers is fading in a mobile environment. The term fading refers to the time variation of received signal power caused by changes in the transmission medium or path(s). In a fixed environment, fading is affected by changes in atmospheric conditions, such as rainfall. But in a mobile environment, where one of the two antennae is moving relative to the other, the relative location of various obstacles changes over time, creating complex transmission effects. 1.6.1 Types of Fading Fading effects in a mobile environment can be classified as either fast or slow. Referring to Fig 1.2, as the mobile unit moves down a street in an urban environment, rapid variations in signal strength occur over distances of about one-half a wavelength. The rapidly changing waveform is an example of the spatial variation of received signal amplitude. The changes of amplitude can be as much as 20 or 30 dB over a short distance. This type of rapidly changing fading phenomenon, known as fat fading, affects not only mobile devices in automobiles, but even a mobile phone user walking down an urban street. As the mobile user covers distances well in excess of a wavelength, the urban environment changes, as the user passes buildings of different heights, vacant lots, intersections, and so forth. Over these longer distances, there is a change in the average received power level about which the rapid fluctuations occur. This is referred to as slow fading. Lamp Post B D C A Fig 1.2 Mobile unit signal reflections Fading channel models are often used to model the effects of electromagnetic transmission of information over the air in cellular networks and broadcast communication. Fading channel models are also used in underwater acoustic communications to model the distortion caused by the water. Mathematically, fading is usually modeled as a time-varying random change in the amplitude and phase of the transmitted signal. 1.6.2 Slow vs. Fast Fading The terms slow and fast fading refer to the rate at which the magnitude and phase change imposed by the channel on the signal changes. The coherence time is a measure of the minimum time required for the magnitude change of the channel to become decorrelated from its previous value. Slow fading arises when the coherence time of the channel is large relative to the delay constraint of the channel. In this regime, the amplitude and phase change imposed by the channel can be considered roughly constant over the period of use. Slow fading can be caused by events such as shadowing, where a large obstruction such as a hill or large building obstructs the main signal path between the transmitter and the receiver. The amplitude change caused by shadowing is often modeled using a log-normal distribution with a standard deviation according to the Log Distance Path Loss Model. Fast Fading occurs when the coherence time of the channel is small relative to the delay constraint of the channel. In this regime, the amplitude and phase change imposed by the channel varies considerably over the period of use. In a fast-fading channel, the transmitter may take advantage of the variations in the channel conditions using time diversity to help increase robustness of the communication to a temporary deep fade. Although a deep fade may temporarily erase some of the information transmitted, use of an error-correcting code coupled with successfully transmitted bits during other time instances (interleaving) can allow for the erased bits to be recovered. In a slow-fading channel, it is not possible to use time diversity because the transmitter sees only a single realization of the channel within its delay constraint. A deep fade therefore lasts the entire duration of transmission and cannot be mitigated using coding. Flat vs. Frequency-selective Fading As the carrier frequency of a signal is varied, the magnitude of the change in amplitude will vary. The coherence bandwidth measures the minimum separation in frequency after which two signals will experience uncorrelated fading. In flat fading, the coherence bandwidth of the channel is larger than the bandwidth of the signal. Therefore, all frequency components of the signal will experience the same magnitude of fading. In frequency-selective fading, the coherence bandwidth of the channel is smaller than the bandwidth of the signal. Different frequency components of the signal therefore experience decorrelated fading. In a frequency-selective fading channel, since different frequency components of the signal are affected independently, it is highly unlikely that all parts of the signal will be simultaneously affected by a deep fade. Certain modulation schemes such as OFDM and CDMA are well-suited to employ frequency diversity to provide robustness to fading. OFDM divides the wideband signal into many slowly modulated narrowband subcarriers, each exposed to flat fading rather than frequency selective fading. This can be combated by means of error coding, simple equalization or adaptive bit loading. Inter-symbol interference is avoided by introducing a guard interval between the symbols. CDMA uses the Rake receiver to deal with each echo separately. Frequency-selective fading channels are also dispersive, in that the signal energy associated with each symbol is spread out in time. This causes transmitted symbols that are adjacent in time to interfere with each other. Equalizers are often deployed in such channels to compensate for the effects of the inter symbol interference. Fading effects can also be classified as flat or selective. Flat fading, or nonselective fading, is that type of fading in which all frequency components of the received signal fluctuate in the same proportions simultaneously. Selective fading affects unequally the different spectral components of a radio signal. The term selective fading is usually significant only relative to the bandwidth of the overall communications channel. If attenuation occurs over a portion of the bandwidth of the signal, the fading is considered to be selective; nonselective fading implies that the signal bandwidth of interest is narrower than, and completely covered by, the spectrum affected by the fading.
Friday, September 20, 2019
A military technology
A military technology CDMA is a military technology first used during World War II by English allies to foil German attempts at jamming transmissions. The allies decided to transmit over several frequencies, instead of one, making it difficult for the Germans to pick up the complete signal. Because Qualcomm created communications chips for CDMA technology, it was privy to the classified information. Once the information became public, Qualcomm claimed patents on the technology and became the first to commercialize it. Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture and has shared in the past decades explosive growth in the wireless market. CDMA, like GSM, has seen incremental improvements in capacity throughout this period. Now both types of networks are making a transition to third-generation (3G) systems around the globe, offering yet more capacity and data services. INTRODUCTION With the advent of wireless communication there was the advent of the two technologies for the cellular communication. They were the CDMA and the GSM technology. Both the technologies have their own mechanisms of working and their own pros and cons for which they have their own different utilizations and implications. à à à à à à à à The technology on which our group has proposed to research is the CDMA (Code Division Multiple Access) technology. Though the total users of the CDMA technology around the globe are approximately 14% yet it has many advantages over the GSM technology which has enormous number of users. Actually the GSM technology is easy to manage and to handle rather than CDMA but that doesnt mean that it has got no future. Truly speaking the CDMA technology is the technology of the future. Gradually its gaining popularity in the European market. What is CDMA? CDMA (Code-Division Multiple Access) refers to any of several protocols used in so-called second-generation (2G) and third-generation (3G) wireless communications. As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands. CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology. Audio input is first digitized into binary elements. The frequency of the transmitted signal is then made to vary according to a defined pattern (code), so it can be intercepted only by a receiver whose frequency response is programmed with the same code, so it follows exactly along with the transmitter frequency. There are trillions of possible frequency-sequencing codes, which enhance privacy and makes cloning difficult. The CDMA channel is nominally 1.23 MHz wide. CDMA networks use a scheme called soft handoff, which minimizes signal breakup as a handset passes from one cell to another. The combination of digital and spread-spectrum modes supports several times as many signals per unit bandwidth as analog modes. CDMA is compatible with other cellular technologies; this allows for nationwide roaming. The original CDMA standard, also known as CDMA One and still common in cellular telephones in the U.S., offers a transmission speed of only up to 14.4 Kbps in its single channel form and up to 115 Kbps in an eight-channel form. CDMA2000 and wideband CDMA deliver data many times faster. Code Division Multiple Access (CDMA) is a digital air interface standard, claiming eight to fifteen times the capacity of traditional analog cellular systems. It employs a commercial adaptation of a military spread-spectrum technology. Based on spread spectrum theory, it gives essentially the same services and qualities as wireline service. The primary difference is that access to the local exchange carrier (LEC) is provided via a wireless phone. Though CDMAs application in cellular telephony is relatively new, it is not a new technology. CDMA has been used in many military applications, such as: Anti-jamming (because of the spread signal, it is difficult to jam or interfere with a CDMA signal). Ranging (measuring the distance of the transmission to know when it will be received). Secure communications (the spread spectrum signal is very hard to detect). CDMA is a spread spectrum technology, which means that it spreads the information contained in a particular signal of interest over a much greater bandwidth than the original signal. With CDMA, unique digital codes, rather than separate RF frequencies or channels, are used to differentiate subscribers. The codes are shared by both the mobile station (cellular phone) and the base station, and are called pseudo-random code sequences. Since each user is separated by a unique code, all users can share the same frequency band (range of radio spectrum). This gives many unique advantages to the CDMA technique over other RF techniques in cellular communication. CDMA is a digital multiple access technique and this cellular aspect of the protocol is specified by the Telecommunications Industry Association (TIA) as IS-95. In CDMA, the BSSAP is divided into the DTAP and BSMAP (which corresponds to BSSMAP in GSM). Generating a CDMA signal There are five steps in generating a CDMA signal. analog to digital conversion vocoding encoding and interleaving channelizing the signals conversion of the digital signal to a Radio Frequency (RF) signal The use of codes is a key part of this process. How CDMA is altering the face of cellular and PCS communication? CDMA is altering the face of cellular and PCS communication by: Dramatically improving the telephone traffic capacity Dramatically improving the voice quality and eliminating the audible effects of multipath fading Reducing the incidence of dropped calls due to handoff failures Providing reliable transport mechanism for data communications, such as facsimile and internet traffic Reducing the number of sites needed to support any given amount of traffic Simplifying site selection Reducing deployment and operating costs because fewer cell sites are needed Reducing average transmitted power Reducing interference to other electronic devices Reducing potential health risks Commercially introduced in 1995, CDMA quickly became one of the worlds fastest-growing wireless technologies. In 1999, the International Telecommunications Union selected CDMA as the industry standard for new third-generation (3G) wireless systems. Many leading wireless carriers are now building or upgrading to 3G CDMA networks in order to provide more capacity for voice traffic, along with high-speed data capabilities. CDMA is a form of Direct Sequence Spread Spectrum communications. In general, Spread Spectrum communications is distinguished by three key elements: The signal occupies a bandwidth much greater than that which is necessary to send the information. This results in many benefits, such as immunity to interference and jamming and multi-user access, which well discuss later on. The bandwidth is spread by means of a code which is independent of the data. The independence of the code distinguishes this from standard modulation schemes in which the data modulation will always spread the spectrum somewhat. The receiver synchronizes to the code to recover the data. The use of an independent code and synchronous reception allows multiple users to access the same frequency band at the same time. In order to protect the signal, the code used is pseudo-random. It appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous detection. This pseudo-random code is also called pseudo-noise (PN). There are three ways to spread the bandwidth of the signal: Frequency hopping. The signal is rapidly switched between different frequencies within the hopping bandwidth pseudo-randomly, and the receiver knows before hand where to find the signal at any given time. Time hopping. The signal is transmitted in short bursts pseudo-randomly, and the receiver knows beforehand when to expect the burst. Direct sequence. The digital data is directly coded at a much higher frequency. The code is generated pseudo-randomly, the receiver knows how to generate the same code, and correlates the received signal with that code to extract the data. HOW SPREAD SPECTRUM WORKS? Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noise-like. Spread Spectrum signals use fast codes that run many times the information bandwidth or data rate. These special Spreading codes are called Pseudo Random or Pseudo Noise codes. They are called Pseudo because they are not real Gaussian noise. Spread Spectrum transmitters uses similar transmit power levels to narrow band transmitters. Because Spread Spectrum signals are so wide, they transmit at a much lower spectral power density, measured in Watts per Hertz, than narrowband transmitters. This lower transmitted power density characteristic gives spread signals a big plus. Spread and narrow band signals can occupy the same band, with little or no interference. This capability is the main reason for all the interest in Spread Spectrum today. IMPLEMENTATION OF CDMA TECHNOLOGY Now a day, in large organization the communication process has to be fast and efficient. There are the major points that have to be taken care in the modern corporate culture. Over time, more and more demands have been made on the capabilities of corporate networks. Workers want more mobility; secure, high-speed access; and an extension of applications across the enterprise, all of which can strain current IT capabilities. The first and foremost of all is protecting corporate network assets is an ongoing task for IT professionals. Increased worker mobility and mobile workers needs for immediate, secure access to critical business information add challenges to maintaining network security Some of todays top security issues and concerns are: Unauthorized systems and network access Auditability and compliance Customer data breaches Internal and external sabotage Theft of intellectual property and confidential business information Cost of mobile device administration The following diagram illustrates many elements critical to mobile data security. DIFFERENCE BETWEEN GSM AND CDMA TECHNOLOGY In cellular service there are two main competing network technologies: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). Cellular carriers including Sprint PCS, Cingular Wireless, Verizon and T-Mobile use one or the other. Understanding the difference between GSM and CDMA will allow you to choose a carrier that uses the preferable network technology for your needs. The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA, a proprietary standard designed by Qualcomm in the United States, has been the dominant network standard for North America and parts of Asia. However, GSM networks continue to make inroads in the United States, as CDMA networks make progress in other parts of the world. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other. That said, to the non-invested consumer who simply wants bottom line information to make a choice, the following considerations may be helpful. Coverage The most important factor is getting service in the areas you will be using your phone. Upon viewing competitors coverage maps you may discover that only GSM or CDMA carriers offer cellular service in your area. If so, there is no decision to be made, but most people will find that they do have a choice. Data Transfer Speed With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, speed is important to those who use the phone for more than making calls. CDMA has been traditionally faster than GSM, though both technologies continue to rapidly leapfrog along this path. Both boast 3G standards, or 3rd generation technologies. EVDO, also known as CDMA2000, is CDMAs answer to the need for speed with a downstream rate of about 2 megabits per second, though some reports suggest real world speeds are closer to 300-700 kilobits per second (kbps). This is comparable to basic DSL. As of fall 2005, EVDO is in the process of being deployed. It is not available everywhere and requires a phone that is CDMA2000 ready. GSMs answer is EDGE (Enhanced Data Rates for GSM Evolution), which boasts data rates of up to 384 kbps with real world speeds reported closer to 70-140 kbps. With added technologies still in the works that include UMTS (Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet Access), speeds reportedly increase to about 275à ¢Ã ¢Ã¢â¬Å¡Ã ¬380 kbps. This technology is also known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone is required. In the case of EVDO, theoretical high traffic can degrade speed and performance, while the EDGE network is more susceptible to interference. Both require being within close range of a cell to get the best speeds, while performance decreases with distance. Subscriber Identity Module (SIM) cards In the United States only GSM phones use SIM cards. The removable SIM card allows phones to be instantly activated, interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself is tied to the network, rather than the actual phone. Phones that are card-enabled can be used with any GSM carrier. The CDMA equivalent, a R-UIM card, is only available in parts of Asia but remains on the horizon for the U.S. market. CDMA carriers in the U.S. require proprietary handsets that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone, the carrier must deactivate the old phone then activate the new one. The old phone becomes useless. Roaming For the most part, both networks have fairly concentrated coverage in major cities and along major highways. GSM carriers, however, have roaming contracts with other GSM carriers, allowing wider coverage of more rural areas, generally speaking, often without roaming charges to the customer. CDMA networks may not cover rural areas as well as GSM carriers, and though they may contract with GSM cells for roaming in more rural areas, the charge to the customer will generally be significantly higher. International Roaming If you need to make calls to other countries, a GSM carrier can offer international roaming, as GSM networks dominate the world market. If you travel to other countries you can even use your GSM cell phone abroad, providing it is a quad-band phone (850/900/1800/1900 MHz). By purchasing a SIM card with minutes and a local number in the country you are visiting, you can make calls against the card to save yourself international roaming charges from your carrier back home. CDMA phones that are not card-enabled do not have this capability, however there are several countries that use CDMA networks. Check with your CDMA provider for your specific requirements. According CDG.org, CDMA networks support over 270 million subscribers worldwide, while GSM.org tallies up their score at over 1 billion. As CDMA phones become R-UIM enabled and roaming contracts between networks improve, integration of the standards might eventually make differences all but transparent to the consumer. The chief GSM carriers in the United States are Cingular Wireless, recently merged with ATT Wireless, and T-Mobile USA. Major CDMA carriers are Sprint PCS, Verizon and Virgin Mobile. There are also several smaller cellular companies on both networks.
Thursday, September 19, 2019
Varying Patterns of Speciation Essay -- Wallaces Line Plate Tectonics
Varying Patterns of Speciation Wallaceââ¬â¢s line, located in the Malay-Archipelago, is one of the best known and most studied boundaries of zoogeography in the world. It is a transition zone between the islands of Borneo and Sulawesi and the islands of Bali and Lombork, which marks both the convergence and division of the diverse flora and fauna found in the Asian (Borneo, The Philippines, and Western Indonesia), and the Australian regions (Sulawesi, Eastern Indonesia, Australia, and New Guinea) (Schulte 2003). The hypothetical line was first proposed by Alfred Russel Wallace in 1858 after observing many morphological differences of various bird species in the Asian and Australian regions (Raven 1935). In the past, to confirm the placement of Wallaceââ¬â¢s hypothetical line, researchers have applied the theories of plate tectonics and continental drift in order to create geographical reconstructions of land masses. From this information, researchers were able to substantiate a majority of the boundaries of the originally drawn line. Presently, however, due to the enigmas found on the island of Sulawesi, a portion of the line between Borneo and Sulawesi (Celebes) still remains uncertain (Whitmore 1981). Researchers have identified two genera that contradict the location of the line: the macaque monkey (Macaca species) and the Sulawesi toad (Bufa celebensis) (Evans et al. 1998). Whereas geographical phenomena such as tectonic plate shifts, rising and falling sea levels, and climatic fluctuations have caused the morphology of the Sulawesi toad to remain fairly undifferentiated, the ancestral macaque monkeys have evolved into seven distinct endemic species. The zoogeography on the eastern and western sides of Wallaceââ¬â¢s line... ...esi. Evolution. 57:6:1436-1443. Evans, Ben J., Juan Carlos Morales, Jatna Supriatna, and Don J. Melnick. 1998. Origin of the Sulawesi Macaques (Cercopithecidae: Macaca) as Suggested by mitochondrial DNA phylogeny. Biological Journal of the Linnean Society. 66:539-560. Michaux, B. Land Movements and animal distributions in east Wallacea (eastern Indonesia, Papua New Guinea and Melanesia). Palaeogeography, Palaeoclimatology, Palaeoecology. 112:323-343. Raven, Henry C. 1935. Wallaceââ¬â¢s Line and the Distribution of Indo-Australian Mammals. New York. Schulte, James A. II. Jane Melville, and Allan Larson. 2003. Molecular phylogenetic evidence for ancient divergence of lizard taxa on either side of Wallaceââ¬â¢s Line. The Royal Society. 270:597-603. Whitmore, T.C. 1981. Wallaceââ¬â¢s Line and Plate Tectonics. Clarendon Press. Oxford University Press, New York.
Wednesday, September 18, 2019
Tragedy at Texas A&M University :: essays research papers
Tragedy at Texas A&M University Texas A&M University and the University of Texas have been rivals for over 90 years. Every year Texas A&M held an annual bonfire tradition which attracts thousands of people. It is a tradition for Texas A& M to build a huge bonfire right before the game against rivals with University of Texas. Students would spend several weeks building the bonfire. On November 18, 1999 the stack of logs collapsed over and killed 12 A&M students. The aggie bonfire tradition would never again be the same. In US News, the article ââ¬Å"A Tragedy at Texas A& Mâ⬠, tells how the logs broke in half killing 12 students. On Thursday of November 18, 1999, early that morning the students started working on stacks of logs from the previous days. Students at A & M were very proud of this historical event. The students would gather one week and start to create the bonfire together. But little did they know this would turn into a tragedy. Early morning around 2:30am the logs were thrown everywhere including the students that were working on it that night. About 70 students were at the top of the logs when it suddenly gave way. At least nine killed in collapse of A&M towering, 40-feet pyramid of logs trembled and then came roaring down early Thursday, crushing at least nice students to death and injuring 28 others. At least four of the injured were in critical condition and two people could be seen trapped in the rubble late Thursday afternoon. Rescuers couldnââ¬â¢t tell if they were died or alive. Rescuers had to use sound-detection equipment to listen for moaning, tapping and heard scratching noises that led them to believe there were victims trapped. In Time magazine, the article ââ¬Å"A Good Time Goes Badâ⬠, explains, how a junior at Texas A& M University, embarked this fall on a rite of passages that began in 1909. Fernando Shaun was an eye- witness to this tragedy late that night. The week before the accident Fernando would help cut the wood and load the trucks. He worked hard around the clock to build the wooden tower. At 2:28am is when he saw the 44-ft tall tower fall to the ground. After 24 hours the rescue workers had found 12 dead bodies and 28 were injured. The people began to question, why did the tower fall?
Subscribe to:
Posts (Atom)