Saturday, May 23, 2020
Ethical Issues Brought Forth by Stem Cell Research
Would you be willing to sacrifice your unborn child for the potential cure for cancer? Stem cells are the future, but it may come with a heavy price. The potential benefits of stem cells are unbelievable. Stem cells could save many lives. Imagine not having to worry about organ transplants or having diabetes. But stem cells bring many issues with them too. Is killing embryos ever ok? Should cloning be allowed in stem cell research? This is a very complex topic that changes directions every day. Stem cells are unspecialized cells that have the ability to renew themselves though cell division. Most importantly, they have the potential to become tissue or organ cells with special functions. Stem cells can be used to replace worn out or damaged tissues (â€Å"Stem Cell Basics†). Stem cells have been known of since the mid 1800s. Thompson, from the University of Wisconsin Madision, was the first scientist to isolate cells from the inner cell mass of early embryos and then develop embryonic stem cell lines in 1998. Later, in 1999, scientists discovered that adult tissues could also produce stem cells, though they weren’t quite the same as embryonic cells. Over the years stem cell research has really taken off (â€Å"History of Stem Cell Research†). There are two primary different kinds of stem cells; embryonic cells, called pluripotent, and somatic/ adult stem cells, called multipotent. Stem cells are imperative to all living beings. In a 3-5 day old human e mbryo, called a blastocyst;Show MoreRelatedEmbryonic And Adult Stem Cell Research2165 Words  | 9 Pagesthe discovery of stem cells in the 19th Century. Stem cells have the ability to divide for indefinite periods in culture and to give rise to specialized cells (U.S. Department of Health and Human Services, 2009). According to the National Institutes of Health, embryonic stem cells derive from four to five day old embryos, also known as blastocyst, that have been fertilized in vitro and donated to research purposes with informed consent from the donors. Adult embryonic stem cells are found in differentiatedRead MoreThe List Of Pros And Cons Of Human Cloning1624 Words  | 7 Pagespossibility of faster aging, it can bring forth a reduced sense of individuality, it can cause a divide among people and it might decrease the overall value of human life.(Pao Chang, 2016) Validity The source is reliable even though the researcher do not have high credentials in the field as he is a corporate author, but he has credentials and experience in the social and morals of human, as he has written many articles based on the social implications of different issues. He quotes researchers with highRead MoreHuman Reproductive Cloning Is Immoral And Unnatural1570 Words  | 7 Pagesand Unnatural Westmoreland County Community College Introduction In some ways, the never-ending scientific possibilities of our time have continued to exceed our expectations. Within the 20th century there has been new medical research on stem cell research, and we have successfully completed organ transplantsâ€â€more recently face and skin transplants. Without progressions like this from science, many would not be alive today. But when does science take it too far? Is there a moral reason toRead MoreOrgan Cloning Essay2326 Words  | 10 Pagesdish and some cells, is something that has been attempted to be done for decades. There are endless possibilities of the uses that cloning could bring, and it excites many and equally terrifies others. In was in 1997 when there was a big breakthrough of cloning occurred: the â€Å"birth†of Dolly the ewe. Dolly was cloned from an adult sheep in Scotland. Dolly was the beginning of the experimentation of cloning full mammals. We now clone many mice and claves all cloned from adult cells that still nowRead MoreEssay on Ian Wilmut and the Cloning of Dolly4070 Words  | 17 Pageshis field by successfully cloning the Finn Dorset lamb, Dolly, from an adult cell. Since I am a pre-med or pre-vet zoology major, Wilmut’s discovery has truly inspired me and has exposed me to the endless possibilities in genetic engineering and medical research. Ian Wilmut’s controversial discovery stunned the world by proving that cloning from an adult cell is possible and it opened doors to future cloning research. His dexterous discovery has shown potential for human cloning and supports theRead More Attack of the Cloning Regulations Essay2139 Words  | 9 Pagesintroduced into society because the pros of the idea greatly outweigh the cons; however, this is not the case with the discovery that human cloning is now practically possible. When a breakthrough like cloning comes about regulations must be set forth to insure the safety of all those who would use it. On one side there are people who want strong restrictions on cloning. They would prefer to have cloning be as limited as possible or even banned to prevent any unethical or dangerous experimentationsRead MoreSources of Ethics20199 Words  | 81 PagesHumGen: 37 Nuffield Council on Bioethics: 39 The European Union’s: 43 2.22- GENETICAL BEHAVIOR: 44 2.23- ETHICS OF BEHAVIOR HAS A BIOLOGICAL BASIS? 47 Behavioural Ethics And Genetics Study: 48 Implications of Behavioural Genetics Research In Society: 50 How the genes influence behaviour and ethics: 52 2.3- PHILOSOPHICAL: 55 2.31- Contribution Of In Ethics By The Source Of Philosophical Systems: 55 2.32- Contribution of Aristotle: 57 2.33- Contributions By Other ImportantRead MoreEarly Diagnosis And Indicators Of Bipolar Disorder3068 Words  | 13 PagesThe issues surrounding the importance of early diagnosis and the application of a variety of therapies for bipolar disorder are examined through the lens of a mix of quantitative, qualitative and mixed peer reviewed journals acquired from data sources such as MEDLINE, and Psycinfo by using Boolean language in Lamar University’s library data base. Current studies into the dynamics of manic depression or bipolar disorder, offer insight into future treatments; diagnosis of pediatric bipolar disorderRead MoreThe Importance Of Obtaining A College Education2060 Words  | 9 Pagesme and an outlined process catered for her daily tasks, yet she still failed to meet the minimum expectations. My other tasks as a team lead besides reviewing the department for productivity issues, was handling time performance issues and quality control issues. Each concern was brought up in my daily department meetings with the operations manager and I set out to find a solution to every problem. It has been said that a great leader embraces challenges to see what they are capable ofRead MoreVaccination Programs And Its Impact On Public Health2890 Words  | 12 Pagesand effectiveness, brought about by the confluence of various sociocultural factors. There have also been arguments centred upon economic, ethical and religious grounds. All these have served to delay and derail global immunisation efforts considerably. In this essay, I will explore the reasons as to why people object to vaccination programmes and evaluate future measures that can be put in place to ameliorate the problem. Vaccine Opposition Despite the growing number of research focusing on the safety
Monday, May 18, 2020
Case Study on Management Information Systems
Abstract This article presents a discussion on the importance of management information systems in Bistro Cuisine, a restaurant operating in the city of Nairobi, Kenya. It will explain the role of information systems in the managerial function of planning, staffing, directing, and monitoring functions of management. It will describe management information system as a system of processes that provide information necessary to manage an organization effectively. Modern technology has further made the result to management information systems in management imperative because of the changing environmental and circumstances. Finally, the article will make recommendations to public and private institutions on the importance of running management information system units. Background information The history of Bistro Cuisine dates back into the 1960’s, the independence days in Kenya. Its founder Allan Bobbes opened the little bistro in 1962 in Nairobi, Kenya. Having been a renowned radio presenter for the British colonialists, he was popularly known. One of the most famous shows that rocked the airwaves, what’s cooking where he shared his passion for gastronomy, his listeners later implored him to open up his eating joint and stop drooling over the air waves. His bistro became an instant success. Its reputation as the premier restaurant in Nairobi has attracted the custom of many internationally renowned personalities; key among them includes Bing Crosby, Jack Kennedy, David Lean, Pele, Sydney pallack and recently, the United States president, Barack Obama. Andrew apartments offer state of the art facility with such a great ambience, fully catered for by the Allan bistro, the best French restaurant in Nairobi. The journey to the success of this establishment has been long and bumpy. Attaining such world class recognition in a country that is home from other international trade names in the hospitality industry such as Hilton, Serena, the Stanley’s among others has taken a lot of effort, innovativeness, and uniqueness and quality services. At the forefront in the achievement of this key success is the successful implementation of management information systems at all the levels of management.. Bistro Cuisine employs top notch technology, management information systems and other information systems that have created a lot of efficiency and effectiveness in all the business functions in the restaurant (Buick, 2003). Management is been defined as the process of planning, organizing, coordinating, staffing directing and controlling resources with the aim of attaining optimal results in the business. A system is defined as a combination or arrangement of parts to form an integrated whole. Management information systems thus, are a set of tools that provide information necessary to assist management in effective decision making in the execution of its functions. Bistro Cuisine has a set of management information systems that provide timely and accurate information that is necessary for the achievement of the organizations goals, objectives, mission and vision (Tony, 2007). In analyzing the importance of management information systems in this company, we shall illustrate the individual information systems and how they have been helpful and how they have assisted the organization to meet its goals and live within its vision of becoming the restaurant of choice in Kenya and beyond. There are several management information systems employed by the bistro cuisine. They include financial information systems, human resource information system, quality management information system, marketing information system, customer relations management systems, enterprise information systems among many others. Financial information systems Accounting system Bistro Cuisine uses computerized accounting system to analyze and compute financial information. Oracle, an accounting system developed by the Oracle Company is used in this restaurant. This system is capable of tracking all the monetary transactions and to help management to track the profitability of the restaurant. Such an accounting system generates reports, helps in computation of profits and losses in the organization, reconciliation, computation of tax returns, timely posting of balances etc. This software has been, reduces wastages and generates timely information. This information is useful to management to be able to make decisions on what areas need improvements in the organization. From the results of the profits and loss analysis, management is enlightened on what segment of the company needs to be improved. Point of sale This is an information system that tracks all sales transactions in the restaurant. For instance, it tracks the sale of products, description, amount charged, discounts if any, and modes of payments whether cheques, or credit cards. This system is quite important to the Bistro cuisine. From this system, management is able to identify products that are slow moving, those that need to be replenished. This helps management to make informed choices on what to purchase, when and from whom. Human resource management information systems Human resource information system helps management in deciding the skills and competencies required in business. It captures information such as number of employees required in the business, the available staff, designations, skills and competencies, etc. A human resource information system helps in human resource planning, which determines the present and future human resource requirements of the organization. It also captures information on compensation plans, succession planning, training requirements, job analysis, recruitment, selection, performance appraisal and staff information. The software used by this company is the people software, software that is able to capture data on all the employees in the organization, their qualifications, designation, and experience etc. This information system helps management to decide on which area of the restaurant requires extra staff, the staff performance, areas that require training and development, performance appraisal among other important employee information. Quality management information system Bistro Cuisine is one of the most preferred restaurants in Nairobi. It serves a wide range of customers from individual clients to corporate clients. Bistro cuisine is also the sole caterer of Andrew apartments. This restaurant is renowned for its quality products and services that are widely accepted in the region and beyond. To attain these standards, this company has instituted very strict quality control information systems to ensure quality of all the products and services in the company meet regional and international standards. There are several systems that are available in this company. There is a system that ensures that all the products supplies meet the required standards, the process of preparing dishes and serving drinks in this restaurant is thoroughly checked for quality and improvements made. There is a quality control department charged with the sole responsibility of ensuring quality of products and services in the restaurant. This department ensures that any supplies into the restaurant are form credible sources, and have been checked for quality by the kentia bureau of standards where applicable. This system also helps in ensuring that all the products and services offered by the company meet the internationally recognized standards and also meet the Kenyan health and safety regulations. This also helps the company remain competitive in the hospitality industry and maintain its share of the market even with the competitive markets besides meeting its legal requirements. Risk management information system This system helps the company to identify the risks facing the organization and also suggests the risk management strategies that can be applied depending on the particular type of risk. There are several risks that face organizations operating in this industry. A risk management system helps in identifying these risks, the degree of the risks, the severity of the risks to each particular organizational functions and how the organization can mitigate the effects of these risks (David, 2005). Marketing management information systems Marketing is a critical function in any organization. It is defined as the creation of awareness of the products and services offered by the company, the rates charged and the quality of those products. It is aimed at creating awareness and attracting first and repeat purchase of the company products. Bistro cuisine has employed several marketing information system marketing tools to create awareness of its products and services. A good example is the company website. Here, clients are able to view the products and services of the company and also identify the prices charged for each product. This encourages the flow of clients from all over the world (Chung, 2003) The marketing information system helps management to reach a wide range of clients and make known the companies products and services, this has helped build business for the company. The company widely advertises its products in the local dailies. A management information system is relevant in deciding what information is relevant in the adverts and also gauging the effectiveness of the marketing plan to the organization (Emmer, 2003). Customer relations management information system This is an information system used by management to track customer information with the intention of creating repeat business. This information system is useful to management in capturing the details of all customers in the restaurant, length of time they will be staying in the premises, the employees who are tasked with the responsibility of attending to those customers among other important details. Service delivery is a key requirement in ensuring that the company attracts and retains customers. This information system helps management to design the best program for each customer, to give customized attention to the clients and attend to the customers every other need without delays. This keeps the customers satisfied and builds ion the reputation of the business (Gherissi-Labben, 2003) Hotel reservation system This is a management information system that supports multi currency, and multi language features to meet the hotel reservation system required for global operations. This system automatically converts rates from the local currency to any other currency, during the reservation process, information such as property, room description and rates can be made available in different languages. This system also supports the countries address codes. This system helps the management of bistro cuisine restaurant to determine the best rates to charge their services based on the information gathered from other industry players. It also helps this organization to avail all the required information in a timely manner for clients to make reservations in the restaurant. Information system acquisition The restaurant obtains these information systems from different sources. Most of these systems have been purchased from software vendors while others have been developed within the organization by the Information Technology department. Development of an information system follows a couple of logical steps that begin with the feasibility of the system under development through maintenance of the system. This logical process is what is commonly known as the system development life cycle. System Development Life Cycle The Systems Development Life Cycle (SDLC) is a conceptual model that describes the stages necessary for the development of an information system. Several models of this life cycle have been developed to guide system developers in the development of information systems. The most common one is the waterfall model. The diagram below illustrates the waterfall model of system development. The accompanying phases of the system development and procedures are explained below.  The waterfall model for the SDLC Appendix 1 The phases are Feasibility study The feasibility study is employed to determine both the technical and economic appropriateness of the project. This is used as a bench mark on whether the project will be given a go a head by the development team. Requirement Analysis and Design The analysis of a system includes a detailed study of the business needs of the organization. Here, the system developers look at how the complete system will function and how it will interact with the other systems in the organization.  Implementation In this phase the above the designs put in translated computer codes. In this phase, the system developer sets up the system ready for testing and use. He employs different programming languages such as Pascal, Java, C and C++ coding languages.  Testing In this phase the system is tested for accuracy and consistency. Bugs are removed at this stage and testing for the harmonious integration with other systems in the organization is also done. Maintenance Maintenance of the system is critical. The system must continuously be checked for bugs, to ensure that it’s continuously meeting its target requirements. Maintenance also involves continuous improvements to the functionality of the information system. Conclusion Management information systems are important for the success of any organization. This is because the timely, accurate and up to date information generated by the management information systems helps management at all levels to make timely decisions for the benefit of the organization. It’s highly recommended that all, whether in the hospitality industry or not, organizations adopt management information systems to help their management in decision making. This has resulted from advancements in technologies that have led to both technical and economic efficiencies in organizations. Those institutions that do not adopt management information systems may find themselves left behind in terms of competitiveness and market share. Reference Buick, I. (2003). Information technology in small Scottish hotels: is it working. International Journal of Contemporary Hospitality Management 15(4): 243-247. Chung, T. and R. Law (2003). Developing a Performance Indicator for Hotel Websites. International Journal of Hospitality Management 22(1): 119-125. Emmer, R. M., C. Tauck, et al. (1993). Marketing Hotels Using Global Distribution Systems. Cornell Hotel and Restaurant Administration Quarterly 34(6): 80-89. Hanson, David. (2005) Risk Management Information Systems Defined, American Society of Safety Engineer Gherissi-Labben, T., R. Schegg, et al. (2003). E-Mail Customer Service in the Tunisian Hotel Industry. Tourism Review 58(2): 18-26. Tony M. (2004). Principles of Management.Ashgate Publishing Ltd
Monday, May 11, 2020
Movie Analysis Mean Girls - 1280 Words
On May 2, 2004 one of the most feminine dominate movies of the time. on the opening weekend, there were 2,839 screens that were showing the film, Mean Girls. During the opening weekend the movie made $24,432,195 (IMDb 1). The film grabbed the attention of everyone in world. It was a very popular film and still is today. Even though the film is popular, Sengupta says â€Å"the more popular the film, the more potential for harm†(413). Since this movie came out, females have been the rage in television shows and movies. No matter what movie you watch, there is likely to be an underlining female connection that connects to almost anyone. The film illustrates what high school cliques can do and the effect that they can have. THESIS In the movie Mean Girls Lindsey Lohan stars as a teenager, Cady, who doesn’t really know what high school, is. Due to her parents being zoologists, she has lived in the African jungle for fifteen years. She doesn’t know what the meaning of high school is because she has been homeschooled her entire life. Even though she knows nothing about high school, she knows exactly how to survive in the real world. According to Cady, high school is a new jungle that she has to conquer. On her first day of high school she makes two friends. Her friends that’s she made were in the out crowd and the school makes them feel like they don’t belong. Soon after this she meets the popular group, the Plastics. The Plastics contain Gretchen, Regina, and Karen.Show MoreRelatedMovie Analysis : Mean Girls 1665 Words  | 7 PagesThe movie, â€Å"Mean Girls†is the perfect display of the stereotypical high school environment and creates a whole new sociological wo rld within itself. To the viewers watching, which are mostly younger teens the movie creates a fake picture of what being in high school is really like by blowing certain things like cliques or subcultures way out of proportion. Because the movie does not completely represent the high school environment correctly, it creates a very compelling and believable story lineRead MoreMean Girls Movie Analysis851 Words  | 4 Pages Mean Girls begins with the initiation of Cady Heron into â€Å"girl world†. Cady, growing up in Africa, has been homeschooled her entire life and is not used to the interactions faced in high school. Upon meeting â€Å"The Plasatics†- Regina George, Gretchen Wieners, and Karen Smith- Cady was taken under their wing. This changed Cady’s morals and her overall outlook on life. Both the feminist and marxist lenses accurately describe Mean Girls and the messages it portrays. The feminist lens is characterizedRead MoreAnalysis of the Movie Mean Girls1037 Words  | 5 Pages Cold, shiny, hard, PLASTIC, said by Janice referring to a group of girls in the movie Mean Girls. Mean Girls is about an innocent, home-schooled girl, Cady who moves from Africa to the United States. Cady thinks she knows all about survival of the fittest. But the law of the jungle takes on a whole new meaning when she enters public high school and encounters psychological warfare and unwritten social rules that teen girls deal with today. Cady goes from a great friend of two outcasts, JaniceRead MoreMovie Analysis : Mean Girls813 Words  | 4 Pages Deconstructing Mean Girls Mean Girls is a movie about a group of girls that are the most popular in High School, the film offers many instances where race, class and gender are clearly marked and classified developing our ideas of how these work in social setting specifically on those of teenagers. From the start of the movie we clearly see the categorization of groups of students together because of their race, we see African Americans together, Asian Americans together and groups of white studentsRead MoreMean Girls Movie Analysis1770 Words  | 8 PagesMean Girls was released in 2004, written by Tina Fey and mark Waters. The movie was based loosely on â€Å"Queen Bees and Wannabees†a self-help book by Rosalind Wiseman. Although the movie was released thirteen years ago, it is still highly discussed and watched today. This is rare for films that are marketed towards young people, and young women especially. Films like mean girls are often seen as frivolous and meant for children, but really Mean Girls is a film for all ages. Mean Girls is funny andRead MoreMovie Analysis : Mean Girls Kady 1779 Words  | 8 PagesMean girls is a movie about a teenage girl going into public school as a junior in high school for the first time, after being homeschooled for her entire life up until. She is discovering herself and where she wants to fit in with her peers. She is pulled many times to the middle of ongoing rivalries and trying to make the decision as to what side she wants to take in the rivalry and what peer group she wants to be part of, the groups that interest her and the groups she is already knowledgeableRead MoreEssay on Finding Meaning in For Color Girls1232 Words  | 5 Pagesâ€Å"†¦And this is for colored girls who have considered suicide but are moving to the end of their own rainbow†¦Ã¢â‚¬ (Perry: For Colored Girls, 2010). For colored girls was first written and performed as a play by Ntozake Shange in 1977. It was then called â€Å"for colored girls who have considered suicide when the rainbow was enuf†. Tyler Perry adapted and transformed it into a movie in 2010. For colored girls is centered on nine women as they encounter their fair share of neglect, abuse, pain and harassmentRead MoreFemale Writers : Mean Girls ( Tina Fey ) And Clueless ( Amy Heckerling ) Essay1497 Words  | 6 PagesYoung girls watch these movies and expect that high school should be a particular way. Unless you have a full figured woman’s body like Regina George’s, then you will not be â€Å"the in girl†. Although each of these films glamorize the lives of the popular girls in school, they have clear moral values on how being catty will ultimately have you end up ruining your reputation. Two of the six movies addressed have female writers, Mean girls (Tina Fey) and Clueless (Amy Heckerling). All six of these moviesRead MoreHigh School Confidential1044 Words  | 5 Pagescheerleader. The Jock and the Cheerleader are almost always the doppleganger of the hero and heroine. The jock and cheerleader stand for everything the hero despises, yet seemingly have everything that the hero is aiming for. The heros of the movie are outsiders, geeks, freaks, and social bottom-dwellers. They are physically awkward and wear virtually unflattering clothing.(DEnby 345 She is generally funny and sarcastic, with a hint of feministic views. She stands at an awkward still when spottingRead MoreAnalysis Of Divergent The Movie 1197 Words  | 5 PagesAnalysis of Divergent The movie Divergent can be interpreted and looked into deeply to discover the missing and hidden features within the film. Throughout the movie, there are many twists and turns. It takes the viewers on a journey. The movie is easy to understand with what is going on, but at times the plot is about mystery. When viewers go to the theater to watch the film, they tend to miss the hidden features of the movie. They only tend to focus on certain points, and by paying greater attention
Wednesday, May 6, 2020
Free Time Periods By Nathanial Hawthorne And Benjamin...
Despite writing in different time periods, Nathanial Hawthorne and Benjamin Franklin both demonstrate strong opinions about democratic equality in America. Through his short stories, Hawthorne writes cautionary tales demonstrating the fear and confusion that Puritan characters have when they discover the sinfulness of others. Franklin writes about the inequality in America but gives the reader a method for overcoming this inequality and making the most out of oneself. While Franklin and Hawthorne both argue for democratic equality, there are important differences in their writings in the way to achieve equality. Throughout this paper, I will compare and contrast these two authors and then make the argument that Hawthorne’s writings are more persuasive since they demonstrate the constant struggle between morality and individualism, a challenge that still exists in the 21st century. In Benjamin Franklin’s Autobiography, he writes about his remarkable life and career, but also maps out how common folk can create their own success in America. Franklin lays out certain virtues that he believes people should cultivate if they want to improve themselves and create success from nothing, as he did. For example, â€Å"I included under thirteen names of virtues all that at that time occurr d to me as necessary or desirable.†He argues that it is not exceptional ability that cultivates success but a devotion to serving others and the discipline needed to pursue the virtues that
Cellular System Components Free Essays
string(275) " is used over many of the GSM network interfaces; †¢ base station system application part \(BSSAP\) – BSSAP is used over the A interface; †¢ direct transfer application part \(DTAP\) – DTAP is used between MS and MSC; DTAP is carried over the Abis and the A interface\." Introduction to GSM Networks Figure 1. 1 is a schematic overview of the main components in a GSM network. The various interface labels are the formal names given to these interfaces. We will write a custom essay sample on Cellular System Components or any similar topic only for you Order Now More details about these interfaces are found in GSM TS 03. 02 [26]. The GSM network consists mainly of the following functional parts: †¢ MSC – the mobile service switching centre (MSC) is the core switching entity in the network. The MSC is connected to the radio access network (RAN); the RAN is formed by the BSCs and BTSs within the Public Land Mobile Network (PLMN). Users of the GSM network are registered with an MSC; all calls to and from the user are controlled by the MSC. A GSM network has one or more MSCs, geographically distributed. †¢ VLR – the visitor location register (VLR) contains subscriber data for subscribers registered in an MSC. Every MSC contains a VLR. Although MSC and VLR are individually addressable, they are always contained in one integrated node. †¢ GMSC – the gateway MSC (GMSC) is the switching entity that controls mobile terminating calls. When a call is established towards a GSM subscriber, a GMSC contacts the HLR of that subscriber, to obtain the address of the MSC where that subscriber is currently registered. That MSC address is used to route the call to that subscriber. †¢ HLR – the home location register (HLR) is the database that contains a subscription record for each subscriber of the network. A GSM subscriber is normally associated with one particular HLR. The HLR is responsible for the sending of subscription data to the VLR (during registration) or GMSC (during mobile terminating call handling). CN – the core network (CN) consists of, amongst other things, MSC(s), GMSC(s) and HLR(s). These entities are the main components for call handling and subscriber management. Other main entities in the CN are the equipment identi? cation register (EIR) and authentication centre (AUC). CAMEL has no interaction with the EIR and AUC; hence EIR and AUC are not further discussed. †¢ BSS – th e base station system (BSS) is composed of one or more base station controllers (BSC) and one or more base transceiver stations (BTS). The BTS contains one or more transceivers (TRX). The TRX is responsible for radio signal transmission and reception. BTS and BSC are connected through the Abis interface. The BSS is connected to the MSC through the A interface. †¢ MS – the mobile station (MS) is the GSM handset. The structure of the MS will be described in more detail in a next section. A GSM network is a public land mobile network (PLMN). Other types of PLMN are the time division multiple access (TDMA) network or code division multiple access (CDMA) network. GSM uses the following sub-division of the PLMN: CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network ? 006 John Wiley Sons, Ltd Rogier Noldus 2 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network To HLR from other PLMN D HLR D C Core network To/from other network MSC ISUP E MSC A BSC Abis BTS Um Um A ISUP GMSC ISUP BSC Abis BTS Um Um Base station system Air interface MS MS MS MS Figure 1. 1 GSM network architecture †¢ Home PLMN (HPLMN) – the HPLMN is the GSM netwo rk that a GSM user is a subscriber of. That implies that GSM user’s subscription data resides in the HLR in that PLMN. The HLR may transfer the subscription data to a VLR (during registration in a PLMN) or a GMSC (during mobile terminating call handling). The HPLMN may also contain various service nodes, such as a short message service centre (SMSC), service control point (SCP), etc. †¢ Visited PLMN (VPLMN) – the VPLMN is the GSM network where a subscriber is currently registered. The subscriber may be registered in her HPLMN or in another PLMN. In the latter case, the subscriber is outbound roaming (from HPLMN’s perspective) and inbound roaming (from VPLMN’s perspective). When the subscriber is currently registered in her HPLMN, then the HPLMN is at the same time VPLMN. 1 †¢ Interrogating PLMN (IPLMN) – the IPLMN is the PLMN containing the GMSC that handles mobile terminating (MT) calls. MT calls are always handled by a GMSC in the PLMN, regardless of the origin of the call. For most operators, MT call handling is done by a GMSC in the HPLMN; in that case, the HPLMN is at the same time IPLMN. This implies that calls destined for a GSM subscriber are always routed to the HPLMN of that GSM subscriber. Once the call has arrived in the HPLMN, the HPLMN acts as IPLMN. MT call handling will be described in more detail in subsequent sections. When basic optimal routing (BOR) is applied, the IPLMN is not the same PLMN as the HPLMN. The user of a GSM network is referred to as the served subscriber ; the MSC that is serving that subscriber is known as the serving MSC. Examples are: †¢ mobile originated call – the MSC that is handling the call is the serving MSC for this call; the calling subscriber is the served subscriber; †¢ mobile terminated call – the GMSC that is handling the call is the serving GMSC for this call; the called subscriber is the served subscriber. 1 The CAMEL service requirement, GSM TS 02. 78 [12] uses this strict de? nition. The term VPLMN is, however, commonly used to denote any network other than the HPLMN. Introduction to GSM Networks 3 1. 1 Signalling in GSM The various entities in the GSM network are connected to one another through signalling networks. Signalling is used for example, for subscriber mobility, subscriber registration, call establishment, etc. The connections to the various entities are known as ‘reference points’. Examples include: †¢ †¢ †¢ †¢ A interface – the connection between MSC and BSC; Abis interface – the connection between BSC and BTS; D interface – the connection between MSC and HLR; Um interface – the radio connection between MS and BTS. Various signalling protocols are used over the reference points. Some of these protocols for GSM are the following: †¢ mobile application part (MAP) – MAP is used for call control, subscriber registration, short message service, etc. ; MAP is used over many of the GSM network interfaces; †¢ base station system application part (BSSAP) – BSSAP is used over the A interface; †¢ direct transfer application part (DTAP) – DTAP is used between MS and MSC; DTAP is carried over the Abis and the A interface. You read "Cellular System Components" in category "Papers" DTAP is speci? ed in GSM TS 04. 08 [49]; †¢ ISDN user part (ISUP) – ISUP is the protocol for establishing and releasing circuit switched calls. ISUP is also used in landline Integrated Services Digital Network (ISDN). A circuit is the data channel that is established between two users in the network. Within ISDN, the data channel is generally a 64 kbit/s channel. The circuit is used for the transfer of the encoded speech or other data. ISUP is speci? ed in ITU-T Q. 763 [137]. When it comes to call establishment, GSM makes a distinction between signalling and payload. Signalling refers to the exchange of information for call set up; payload refers to the data that is transferred within a call, i. e. voice, video, fax etc. For a mobile terminated GSM call, the signalling consists of exchange of MAP messages between GMSC, HLR and visited MSC (VMSC). The payload is transferred by the ISUP connection between GMSC and VMSC. It is a continual aim to optimize the payload transfer through the network, as payload transfer has a direct cost aspect associated with it. Some network services are designed to optimize the payload transfer. One example is optimal routing. 1. 2 GSM Mobility Roaming with GSM is made possible through the separation of switching capability and subscription data. A GSM subscriber has her subscription data, including CAMEL data, permanently registered in the HLR in her HPLMN. The GSM operator is responsible for provisioning this data in the HLR. The MSC and GMSC in a PLMN, on the other hand, are not speci? c for one subscriber group. The switching capability of the MSC in a PLMN may be used by that PLMN’s own subscribers, but also by inbound roaming subscribers; see Figure 1. 2. In Figure 1. 2, the GSM user who is a subscriber of PLMN-A roams to PLMN-B. The HLR in PLMN-A transfers the user’s subscription data to the MSC in PLMN-B. The subscriber’s subscription data remains in the MSC/VLR as long as she is served by a BSS that is connected to that MSC. Even when the user switches her MS off and then on again, the subscription data remains in the MSC. After an extended period of the MS being switched off, the subscription data will be purged from the MSC. When the subscriber switches her MS on again, the subscriber has to re-register with the MSC, which entails the MSC asking the HLR in the HPLMN to re-send the subscription data for that subscriber. 4 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network Transfer of subscription data to MSC/VLR HLR PLMN-A MSC MS Subscriber roams to other PLMN PLMN-B MSC Figure 1. 2 Transfer of GSM subscription data for a roaming subscriber When the subscriber moves from one MSC service area (MSC-1) to another MSC service area (MSC-2), the HLR will instruct MSC-1 to purge the subscription data of this subscriber and will send the subscription data to MSC-2. 1. 3 Mobile Station The MS, i. e. the GSM handset, is logically built up from the following components: †¢ mobile equipment (ME) – this is the GSM terminal, excluding the SIM card; †¢ subscriber identi? ation module (SIM) – this is the chip embedded in the SIM card that identi? es a subscriber of a GSM network; the SIM is embedded in the SIM card. When the SIM card is inserted in the ME, the subscriber may register with a GSM network. The ME is now effectively personalized for this GSM subscriber; see Figure 1. 3. The characteristics of the SIM are speci? ed in GSM TS 11. 11 . The SIM card contains information such as IMSI, advice of charge parameters, operator-speci? c emergency number, etc. For the UMTS network an enhanced SIM is speci? ed, the universal subscriber identity module (USIM); refer 3GPP TS 31. 02. 1. 4 Identi? ers in the GSM Network GSM uses several identi? ers for the routing of calls, identifying subscribers (e. g. for charging), locating the HLR, identifying equipment, etc. Some of these identi? ers play an important role for CAMEL. 1. 4. 1 International Mobile Subscriber Identity The international mobile subscriber identity (IMSI) is embedded on the SIM card and is used to identify a subscriber. The IMSI is also contained in the subscription data in the HLR. The IMSI is used for identifying a subscriber for various processes in the GSM network. Some of these are: KPN SIM + ME = MS Figure 1. 3 Components of the mobile station Introduction to GSM Networks 5 3 digits MCC Maximum 15 digits 2 or 3 digits MNC MSIN Figure 1. 4 Structure of the IMSI †¢ location update – when attaching to a network, the MS reports the IMSI to the MSC, which uses the IMSI to derive the global title (GT) of the HLR associated with the subscriber; †¢ terminating call – when the GSM network handles a call to a GSM subscriber, the HLR uses the IMSI to identify the subscriber in the MSC/VLR, to start a process for delivering the call to that subscriber in that MSC/VLR. †¢ roaming charging – a VPLMN uses the IMSI o send billing records to the HPLMN of a subscriber. Figure 1. 4 shows the format of the IMSI. †¢ mobile country code (MCC) – the MCC identi? es the country for mobile networks. The MCC is not used for call establishment. The usage of MCC is de? ned in ITU-T E. 212 [129]. The MCC values are allocated and published by the ITU-T. †¢ mobile network code (MNC) – the MNC identi? es the mobile network within a mobile country (as identi? ed by MCC). MCC and MNC together identify a PLMN. Refer to ITU-T E. 212 [129] for MNC usage. The MNC may be two or three digits in length. Common practice is that, within a country (as identi? d by MCC), all MNCs are either two or three digits. †¢ mobile subscriber identi? cation number (MSIN) – the MSIN is the subscriber identi? er within a PLMN. The IMSI is reported to the SCP during CAMEL service invocation. The IMSI may be needed, for example, when identifying a country; countries in North America have equal country code (country code = 1), but different MCC (e. g. Canada = 303; Mexico = 334). 1. 4. 2 Mobile Station Integrated Services Digital Network Number (MSISDN Number) The MSISDN is used to identify the subscriber when, among other things, establishing a call to that subscriber or sending an SMS to that subscriber. Hence, the MSISDN is used for routing purposes. Figure 1. 5 shows the structure of the MSISDN. †¢ country code (CC) – the CC identi? es the country or group of countries of the subscriber; †¢ national destination code (NDC) – each PLMN in a country has one or more NDCs allocated to it; the NDC may be used to route a call to the appropriate network; †¢ subscriber number (SN) – the SN identi? es the subscriber within the number plan of a PLMN. CC NDC SN 1, 2 or 3 digits Maximum 15 digits Figure 1. 5 Structure of the MSISDN 6 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network IMEI TAC 6 digits FAC 2 digits FAC 2 digits SNR 6 digits SNR 6 digits spare 1 digit IMEISV TAC 6 digits SV 2 digits Figure 1. 6 Structure of IMEI and IMEISV The MSISDN is not stored on the subscriber’s SIM card and is normally not available in the MS. 2 The MSISDN is provisioned in the HLR, as part of the subscriber’s pro? le, and is sent to MSC during registration. The MSISDN is also reported to SCP when a CAMEL service is invoked. One subscriber may have multiple MSISDNs. These MSISDNs are provisioned in the HLR. At any one moment, only a single MSISDN is available in the MSC/VLR for the subscriber. . 4. 3 International Mobile Equipment Identi? er The international mobile equipment identi? er (IMEI) is used to identify the ME [or user equipment (UE) in UMTS network]. Each ME has a unique IMEI. The IMEI is hard-coded in the ME and cannot be modi? ed. Figure 1. 6 shows the structure of the IMEI. The IMEI is not used for routing or subscriber identi? cation. Refer to GSM TS 0 3. 03 [27] for the type approval code (TAC), ? nal assembly code (FAC) and serial number (SNR). The software version (SV) may be included in the IMEI (‘IMEISV’) to indicate the version of software embedded in the ME. The IMEI is always encoded as an eight-octet string. As from CAMEL Phase 4, the IMEI(SV) may be reported to the SCP. 1. 4. 4 Mobile Station Roaming Number The mobile station roaming number (MSRN) is used in the GSM network for routing a call to a MS. The need for the MSRN stems from the fact that the MSISDN identi? es a subscriber, but not the current location of that subscriber in a telecommunications network. The MSRN is allocated to a subscriber during MT call handling and is released when the call to that subscriber is established. Each MSC in a PLMN has a (limited) range of MSRNs allocated to it. An MSRN may be allocated to any subscriber registered in that MSC. The MSRN has the form of an E. 164 number and can be used by the GMSC for establishing a call to a GSM subscriber. An MSRN is part of a GSM operator’s number plan. The MSRN indicates the GSM network a subscriber is registered in, but not the GSM network the subscriber belongs to. Figure 1. 7 shows how the MSRN is used for call routing. The MSRN is not meant for call initiation. GSM operators may con? gure their MSC such that subscribers cannot dial numbers that fall within the MSRN range of that operator. 1. 5 Basic Services All activities that may be done in the GSM network, such as establishing a voice call, establishing a data call, sending a short message, etc. , are classi? ed as basic services. In order for a subscriber to use a GSM basic service, she must have a subscription to that service. 3 The handling of a basic 2 GSM subscribers may program their MSISDN into the phone; this has, however, no signi? cance for the network. 3 Exceptions are Tele Service 12 (emergency call establishment) and Tele Service 23 (Cell Broadcast). Subscribers do not need a subscription to these Tele Services to use them. Introduction to GSM Networks 7 return MSRN request MSRN HLR VMSC MSRN GMSC incoming call MSISDN Figure 1. 7 Usage of MSRN during call establishment to a GSM subscriber service is fully standardized. Hence, a subscriber may use a basic service in any GSM network she roams to, provided that that basic service is supported in that network. The HLR will send a list of subscribed basic services to the MSC/VLR, during registration. When a GSM subscriber initiates a call, the MS supplies the serving MSC with a set of parameters describing the circuitswitched connection that is requested. These parameters are the bearer capability (BC), low-layer compatibility (LLC) and high-layer compatibility (HLC), as will be described below. The MSC uses the BC, LLC and HLC to derive the basic service for this call. The rules for deriving the basic service from LLC, HLC and BC are speci? ed in GSM TS 09. 07 [55]. The MSC then checks whether the subscriber has a subscription to the requested basic service, i. e. whether the subscription data in the VLR contains that basic service. If the service is not subscribed to, then the MSC disallows the call. The basic service is not transported over ISUP. When a CAMEL service is invoked, the MSC reports the requested basic service to the SCP. The SCP may use the indication of the requested basic service for call service processing. Examples include: †¢ video calls may be charged at a higher rate than speech calls; †¢ for data calls and fax calls, the CAMEL service shall not play any announcements or tones. Basic services are divided into two groups: tele services and bearer services. 1. 5. 1 Tele Services Table 1. 1 provides an overview of the available tele services (TS); see also GSM TS 02. 03 [3]. 1. 5. 2 Bearer Services Table 1. provides an overview of the available bearer services (BS). The two bearer service groups are sub-divided into a variety of bearer services with different characteristics. Refer to GSM TS 02. 02 [2]. 1. 5. 3 Circuit Bearer Description Bearer capability, low-layer compatibility and high-layer compatibility are descriptors of a circuitswitched (CS) connection. When a GSM subscriber initiates a call , the BC, LLC and HLC are transported from MS to MSC over DTAP. The MSC includes the parameters in the ISUP signal to the destination. These parameters are also reported to the SCP during CAMEL service invocation. That enables a CAMEL service to adapt the service logic processing to the type of call. Figure 1. 8 shows the relation between LLC, HLC and BC on the DTAP and the corresponding parameters on ISUP. 8 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network Table 1. 1 Tele service 11 12 Tele services Description Telephony Emergency calls Comment This TS represents the normal speech call The emergency call uses the characteristics of telephony (TS11), but may be established without subscription and bypasses various checks in the MS and in the MSC This TS relates to receiving an SMS. This TS is not sent to the MSC/VLR. When an SMS is sent to the subscriber, the HLR checks whether the destination subscriber has a subscription to TS 21 This TS relates to the sending of an SMS This TS relates to the capability of an SMS that is sent as a broadcast SMS This TS relates to the capability to establish a speech and fax (group 3) call This TS relates to the capability to establish a fax (group 3) call This TS relates to the capability to participate in a group call as speci? ed in GSM TS 03. 8 [35] This TS relates to the capability to receive a voice broadcast as speci? ed in GSM TS 03. 68 [35] 21 Short message MT 22 23 61 62 91 92 Short message MO Cell broadcast Alternate speech and fax group 3 Automatic fax group 3 Voice group call Voice broadcast Table 1. 2 Tele service 20 30 Bearer services Description Asynchronous data bearer services Synchronous data bearer services Comment May be used for asynchronous services from 300 bit/s to 64 kbit/s. May be used for synchronou s services from 1. 2 to 64 kbit/s. This BS may be used, amongst other things, for multimedia services such as video telephony. 4 DTAP (GSM TS 04. 08) Low layer compatibility High layer compatibility Bearer capability MSC ISUP (ITU-T Q. 763) Access transport [low layer compatibility] User teleservice information User service information Figure 1. 8 Transfer of LLC, HLC and BC through DTAP and ISUP †¢ Low-layer compatibility – the LLC is transported transparently between the calling entity and called entity; it may be used by the respective entities to adapt codecs for interworking purposes. LLC describes mainly characteristics related to the data transfer. 4 3GPP Rel-7 may include a dedicated bearer service for video telephony. Introduction to GSM Networks 9 †¢ High-layer compatibility – the HLC is also transported transparently between the calling entity and called entity; it is used to describe the requested service, such as telephony, Fax, video telephony, etc. †¢ Bearer capability – the BC describes the characteristics of the 64 kbit/s circuit requested for the call. 1. 6 Supplementary Services Supplementary services (SS) in GSM are a means of enriching the user experience. An SS may, for example, forward a call in the case of no reply from the called party, bar certain outgoing or incoming calls, show the number of the calling party to the called party, etc. In order to use an SS, a GSM user needs a subscription to that SS. The subscription to supplementary services is contained in the HLR and is sent to the MSC/VLR during registration. The supplementary services are fully standardized. A GSM subscriber can therefore use her supplementary services in any GSM network, provided that the network supports these supplementary services, and have the same user experience. Table 1. 3 SS group Line identi? cation GSM supplementary services Supplementary services Calling line identi? cation presentation (CLIP) Calling line identi? cation restriction (CLIR) Connected line presentation (COLP) Connected line restriction (COLR) Calling name presentation (CNAP) Call forwarding – unconditional (CFU) Call forwarding – busy (CFB) Call forwarding – no reply (CFNRY) Call forwarding – not reachable (CFNRC) Call de? ction (CD) Explicit call transfer (ECT) Call waiting (CW) Call hold (CH) Call completion to busy subscriber (CCBS) Multi-call (MC) Multi-party call (MPTY) Closed user group (CUG) Advice of charge – information (AOCI) Advice of charge – charge (AOCC) User-to-user signalling – service 1 (UUS1) User-to-user signalling – service 2 (UUS2) User-to-user signalling – service 3 (UUS3) Barring of all outgoing calls (BAOC) Barring of outgoing international calls (BOIC) Barring of outgoing international calls except to the home country (BOIC-exHc) Barring of all ncoming calls (BAIC) Barring of all incoming calls when roaming (BICROAM) enhanced multi-level precedence and pre-emption (eMLPP) GSM TS 02. 81 [13] Name identi? cation Call forwarding 02. 96 [24] 02. 82 [14], Call offering Call completion 02. 72 [11] 02. 91 [22] 02. 83 [15], 02. 93 [23], 22. 135 [69]a 02. 84 [16] 02. 85 [17] 02. 86 [18] 02. 87 [19] Multi-party Community of interest Charging Additional information transfer Call barring 02. 88 [20] Call priority 2. 67 [10] a For the multi-call service, there is no GSM TS available, but only a 3GPP TS (22. 135). 10 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Netwo rk Supplementary services may be provisioned for an individual basic service or for a group of basic services, e. g. a subscriber may have barring of all outgoing calls for all tele services and all bearer services, except SMS (tele service group 20). Such a subscriber is barred from establishing utgoing calls (except emergency calls), but may still send short messages. Some supplementary services may be activated or deactivated by the user. Examples include call forwarding and call barring. An operator may decide to bar certain subscribers or subscriber groups from modifying their supplementary services. Table 1. 3 shows the Supplementary Services. They are combined in service groups. Subscriptions are per individual Supplementary Service. The right-most column indicates the GSM technical speci? ations (TS) that specify the service requirement for the respective Supplementary Service(s). The chapters on CAMEL Phases 1–4 describe the interaction between CAMEL and the various supplementary services. Not all GSM networks support all supplementary services. Many of the supplementary services in GSM have equivalent supplementary services in ISDN. The ISDN supplementary services are described in ITU-T recommendations. GSM TS 02. 03 [3] describes how the supplementary services may be activated, deactivated and invoked. How to cite Cellular System Components, Papers
Uncovering Business Benefit From Regulatory - MyAssignmenthelp.com
Question: Discuss about the Uncovering Business Benefit From Regulatory. Answer: Compliance requirements: This section of the summary report presents various requirements for compliance systems including the external and the internal requirements. This section also includes the compliance requirements of the industry. internal compliance requirements: The internal compliances are followed for providing assurances for following to the policies, standards and codes in the internal environment of the company (Othman and Doherty 2014). In addition, the internal compliance is also responsible for providing a framework for assisting in the achievement of compliance standards. Figure 1: Internal compliance framework (Source: Othman and Doherty 2014, pp 24) The library of internal compliance requirements includes the policies and codes of the company. The code of conduct followed by Befesa is concerned with a legal and ethical framework to be followed by the employees, directors and executives. The library of key controls lies in conjunction with risk and control assessment. The company is subjected to regulations and laws corresponding to law and corruption. The company business process has to be analyzed for identification of the risk procedures. Attestation corresponds to the execution controls which are needed for complying with the policies. This involves detection of the non-compliance issues, investigation of them and execution for meeting the standards. External compliance requirements: The external compliances are set for meeting the various requirements externally (Ifinedo 2014). It is also in place for providing a framework for complying with the externally required materials. Figure 2: External compliance (Source: Ifinedo 2014, pp 75) The external compliance requirements are the same as the internal requirement list excluding the risk control aspects. The external compliance requirement includes the presence of external officers for monitoring the level of compliance in the company. The external officers will be responsible for the development of compliance questions for the company. This will then be passed to various business reports and the attestation questions will be developed. Industry compliance requirements: The industry level requirements of the compliance policy need to achieve success and a strong business ethics. In addition, it also includes the protection of staffs and the reputations of the company (Braithwaite 2016). The customers of the company are also to be secured by the compliance policy so that the business process is not hampered. Compliance effects: This section discusses about the various effects where the compliance will have its impacts. Areas affected: The main areas impacted by the compliance policies are the legal and financial aspects of the company and the environment of the company. This helps in efficient use of resources and also helps in meeting the requirements of the customers. Risks: The major risks of the company are the environment laws and regulations. As the company is involved in environment management, there are specific amount of risks that are always considered by the company. According to this, all the legal policies are to be complied by the company and their subsidiaries. Penalties: The compliance policy is to be maintained and all the business units are to be complied with the policy. Failure to comply will result in various penalties. Risk minimisation: The risks of the company will be minimized by the compliance policies. This will result in long term success and efficiency of the company. Compliance systems: Available systems: The major systems to be discussed are the risk management systems. This involves setting up of a risks mitigation plan that will be helpful for the staffs to follow the set standards. Parameters: Cost: The cost effectiveness of the risks systems has been complied with the business process. Effectiveness and efficiency: The effectiveness and the efficiency of the compliance system are supposed to increase the success of the company. Feasibility and organizational culture: The risk management of the company has been made for analyzing the anti-money laundering systems of the company. Recommended systems: The company needs to consider the adoption of identity checks in their system. In addition, the analysis of the customer information is also to be emphasized so that the business can be effectively measured. References: Braithwaite, J., 2016. Law and Corporate Behaviour: Integrating Theories of Regulation, Enforcement, Compliance and Ethics by Christopher Hodges. Bhr, D.L. and Seitz, C., 2015. From compliance programme to compliance management systems: International convergence and standardization.Business Compliance,4(2), pp.28-42. Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition.Information Management,51(1), pp.69-79. Othman, A. and Doherty, N.F., 2014, April. Uncovering Business Benefits From Regulatory Compliance Systems. InUKAIS(p. 24).
Subscribe to:
Posts (Atom)