One of the sources of dimethyl ether is methanol. This report analyzes the viability of manufacturing dimethyl ether from methanol by heating it and converting it to dimethyl ether and water. The report considers different costs of operation to calculate the profitability of a plant producing 100,000 tonnes annually. Calculations reveal it is a viable project and the report offers recommendations for making the project safer and more efficient.
Introduction
Dimethyl ether (DME) also known as Prozone or blue fuel is made by converting hydrocarbons which are first converted to methanol and then to DME (Aresta 13). It can be made from other sources such as wood byproducts, household and crop waste, or algae biomass. It has a chemical formula CH3OCH3 and is considered a more clean fuel than methanol. It is also used for making dimethyl sulfate, a methylating agent, and for making acetic acid. The process of converting methanol to DME basically involves methanol dehydration. Dimethyl Ether is only useful in very low temperatures, limiting its usefulness.
Process description
The raw material in this experiment is pure methanol. The feed, which is at 1 atm pressure and 250c, together with the recycling from the last distillation column or a methanol recycle separator is pumped to a feed preheater. The pump increases the pressure to15 bar or 14.80 atm. Here it is superheated to vaporization at 2500c and a pressure of 14.80 atm. The source of energy must be above 2500c to be able to deliver that much energy. It is then sent to a dimethyl ether reactor where methanol converts to DME and water. The reaction is as follows:
From here, the already formed crude dimethyl ether or effluent is sent to a crude DME product cooler where it is cooled and partially condensed and then sent to a separating column. Its pressure is reduced by passing it through control valves before the product cooler. This is because the exit pressure must be below 14.80 atm but must equal that of the DME separator. The distillation column then separates DME from water and methanol, resulting in three output streams.
One is pure dimethyl ether or the distillate, which is sent to a condenser. At the condenser, pure dimethyl ether is condensed from saturated vapor to saturated liquid and then sent to storage. The second stream which is recycled delivers unconverted methanol to a reboiler where it is vaporized from saturated liquid to saturated vapor and send back to the distillation column. The third stream carries water and unconverted methanol to a methanol recycle separator. In this separator, effluent water is sent to a wastewater treatment plant while the unconverted methanol or recycle is sent back to the feed stream.
Assumptions
Methanol used is in its pure form.
The DME to the storage tank is pure assuming 100% efficiency of the distillation column.
The methanol recycle separator has 100% efficiency meaning the cost of wastewater is zero.
330 days per year to allow shutdowns and maintenance
Results
Figures to be used in this experiment are: Q = 26,574 MJ/h
Pressure of saturated steam Psat= 42.37 bar
Temperature of saturated steam = 253.720c
Dimethyl ether production rate= 15670.19 kg/h
Cost of steam = $ 135.55/hr or $ 1, 084,377.35/year
Cost of fuel = $ 79.72hr or $ 637,776/year
Using these figures for cost calculations, the cost of production amounts to $ 8.65/ 1000kgs of DME produced.
Cost of dimethyl ether = $0.43/lb
cost of methanol = $ 0.60/gal
Analysis
From this experiment, the costs of operation are steam production, fuel gas for heating, electricity, and cooling water.
From the calculations, the cost of production is $ 8.65/ 1000kgs pf DME produced. The cost of dimethyl ether in the market is $ 0.43/lb or $ 0.43/0.45359237kgs since
1 pound=0.45359237kgs.
Therefore 1000kgs of DME are worth $ 1055
This translates to a profit of $ 1046.35 for every 1,000 kgs of DME produced.
In this experiment, the desired production rate at an optimum level is 100,000 tonnes/year.
The project then translates to a profitability of $104,635/year.
Conclusion
Dimethyl ether can be made from many other sources such as wood byproducts, household, and crop waste, or from algae biomass. These sources although more affordable than methanol may not have reliable sources. Producing DME from methanol proves viable from the figures, with a profit of $ 104,635/year, assuming a production of 100,000 tonnes/ year. Methanol is easily available considering it can now be produced easily from natural gases. It can also be made from H2 and CO2, increasing its availability. This makes it a reliable source for the manufacture of DME.
Using methanol in its pure form minimizes the cost of purifying it. It also reduces the amount of energy used to heat it as it evaporates easily in its pure form. Purity minimizes the chances of contamination of the final product eliminating the need for purification. Undoubtedly, many commercial plants would be able to manufacture much more than the quantity in this experiment, making it a very viable project. Since DME is easily explosive, high safety measures required for manufacturing it add up to its cost of production.
Recommendations
Dimethyl ether has more hazardous fires as a result of its low flashpoints. It has a flashpoint of -410c causing it to form explosive mixtures easily (Frederick 13). Any experiment involving DME should be done under professional supervision and uncompromising safety measures. The process requires a lot of water for cooling and condensation. DME manufacturing plants should be located in places where water is easily accessible. Since the biggest cost of production is that of energy, the project can be made cheaper by using renewable energy such as solar where applicable.
Works cited
Aresta, Molar. Carbon Dioxide Recovery and Utilization. New York: Kluwer Publishers. Print.
Creating conditions for the safe production of pharmaceuticals is a practice that has evolved significantly due to the introduction of modern approaches to the manufacturing process. As effective measures aimed to establish control in this industry, various measures are promoted to ensure the operation of pharmacological enterprises. These practices include both external aspects of manufacturing, for instance, packaging, and internal ones, which involve tracking production technology. This work aims to present such useful techniques as quality control, packaging and labeling, biochemical analyses, and 3D printing as approaches to the safe manufacturing of pharmaceuticals.
Total Quality Control
For manufacturers of pharmaceuticals to supply quality products to the market, appropriate control mechanisms are engaged. According to Deidda et al. (2018), in some countries, there are both government agencies involved in monitoring the quality of manufactured drugs and companies testing these products for compliance with national safety standards. Although it is in the interests of manufacturers to supply quality pharmaceuticals to the market so as not to lose their licenses, cases of errors and production flaws are possible. Therefore, the relevance of quality control practices applied at different levels is objective.
The principles of quality control may vary depending on the methods used by agencies involved. Deidda et al. (2018) cite the experience of different countries and note that one of the most common practices is the testing of raw materials used for the production of pharmaceuticals. In some cases, as the authors remark, additional analytical mechanisms are utilized, which are implemented through the comparison of finished products with reference
samples (Deidda et al., 2018). To implement these tasks effectively, special error prediction mechanisms are applied to track any cases of the non-compliance of pharmaceuticals quality with production standards. In addition, screening metrics obtained through testing may be used as a rationale for reorganizing manufacturing algorithms. In the context of pharmaceutical companies broad market activities, these total quality control measures are valuable and important approaches to ensuring the safe production of drugs.
Packaging and Labeling Approaches
One of the criteria for the safe production of pharmaceuticals is the use of convenient and demanded packaging formats. Prescribing drugs, principles of their administration, and other aspects are taken into account. As Lorenzini et al. (2018) argue, pharmaceutical packaging is a key facilitator for delivering patient-friendly medication (p. 363). Due to the variety of forms of drugs, modern manufacturers use various methods of delivering pharmaceuticals to the market, starting from such criteria as the target audience, dosages, the proportion of active substances, and other factors. Lorenzini et al. (2018) note that policymakers control packaging principles carefully to provide more patient-centered terms of sale. Thus, from a practical standpoint, proper packaging approaches are essential techniques for maintaining quality pharmaceutical manufacturing.
One should also take into account additional aspects of packaging that determine trends, in particular, marketing goals. According to Lorenzini et al. (2018), today, drug manufacturers go to different tricks to win the recognition of the target audience and draw attention to their products. At the same time, safety standards dictate specific rules that are crucial to adhere to in order to distribute pharmaceuticals based on the existing legal regulations. Today, there are requirements for manufacturers, for instance, the rule to display the active substances of drugs on their packaging. Raju et al. (2016) mention environmental sustainability principles that are to promote green production for medication packaging. These control measures contribute to maintaining good manufacturing practices for pharmaceuticals are an important aspect of patient safety.
The fight against counterfeit products is one of the hot topics in the pharmaceutical market. In this regard, Zhang et al. (2020) offer to pay attention to special labeling techniques that are designed to protect drugs from counterfeiting and promote patient safety. In particular, the researchers give an example of the use of nanomaterials in the labeling of pharmaceuticals and note that utilizing such a technology can have a positive impact on reducing fake drugs (Zhang et al., 2020). Unique labels, codes, and other designations on packaging oblige manufacturers to monitor the quality of their products and create barriers to counterfeit goods from entering the market. Moreover, medicines coming from abroad, as a rule, are also subject to mandatory checks and certification, which is indicated on them. Therefore, special labeling practices are valuable manufacturing approaches to drug safety.
Biochemical Analyses
One of the most accurate practices for promoting the safe production of pharmaceuticals is biochemical testing. According to Kumar et al. (2018), today, laboratories are involved in testing drugs not only for the presence of active substances but also for hazardous components that can harm patients. As working methods in this direction, the authors note special analyses for the identification of such elements in the composition of drugs as carbohydrates, metal ions, inorganic anions, and other microparticles (Kumar et al., 2018). These tests serve as valuable drivers for ensuring the safety of drugs that enter domestic and foreign markets and eliminating the likelihood of manufacturing errors. In addition, due to such control algorithms, consumers can ensure that the products they purchase meet the existing production standards and can be used as intended without fear. Thus, biochemical testing is a good practice to maintain the quality of pharmaceuticals.
3D Printing Technology
To improve the quality of pharmaceuticals production, today, the practice of 3D printing is applied. Jose and GV (2018) consider this technique in terms of a method that can play a significant role in multiple active ingredient dosage forms (p. 46). The principle of this approach is to create a streaming system for the manufacturing of drugs for patients needs by combining individual doses into common ones to maintain a higher quality of therapeutic interventions. At the same time, Jose and GV (2018) emphasize that this modern technology is not applied randomly and requires regulation by the responsible agencies, which increases the safety of this practice. Patients can benefit from this technique since the combination of doses into a single form unit makes it possible to create highly effective drug complexes with strong effects. As a result, the 3D printing technology is a good manufacturing practice for pharmaceuticals, and its expansion in the medication market demonstrates the demand and benefits of such a technique.
Conclusion
As good manufacturing practices for pharmaceuticals, one should highlight such approaches as proper packaging and labeling, total quality control, biochemical analyses, and 3D printing. The considered approaches to ensuring production safety make it possible to monitor compliance with all the existing standards and, at the same time, expand the range of potentially positive effects on patient health. The use of these techniques in the general practice of manufacturing pharmaceuticals is a step towards preventing the penetration of counterfeit products into the drug market and contributes to successful quality control.
References
Deidda, R., Orlandini, S., Hubert, P., & Hubert, C. (2018). Risk-based approach for method development in pharmaceutical quality control context: A critical review. Journal of Pharmaceutical and Biomedical Analysis, 161, 110-121. Web.
Jose, P. A., & GV, P. C. (2018). 3D printing of pharmaceuticals A potential technology in developing personalized medicine. Asian Journal of Pharmaceutical Research and Development, 6(3), 46-54. Web.
Kumar, M., Bhatia, R., & Rawal, R. K. (2018). Applications of various analytical techniques in quality control of pharmaceutical excipients. Journal of Pharmaceutical and Biomedical Analysis, 157, 122-136. Web.
Lorenzini, G. C., Mostaghel, R., & Hellström, D. (2018). Drivers of pharmaceutical packaging innovation: A customer-supplier relationship case study. Journal of Business Research, 88, 363-370. Web.
The article titled Reverse Logistics in Pharmaceutical Industry investigates transportation mechanisms in the suggested domain and examines its problems. The paper primarily focuses on reverse logistics as a process of handling products back to the manufacturer. This kind of logistics implies that the products move from the buyer back to the manufacturer for several reasons. Such a situation occurs when the product is recalled or damaged, or due to the warranty failure. Therefore, the primary goal is to maximize the value of goods by minimizing processing costs.
Main body
Reverse logistics has become a severe problem due to market competition, economic motives, and similar issues. It plays an enormous part in the pharmaceutical industry as poor-quality goods must be delivered safely back to the final disposition point. Multiple studies show that new guidelines for optimizing and managing reverse logistics have emerged in the last decade. In addition, new recovery systems have been created to recycle and recover goods and return them to the supply chain.
The pharmaceutical industry produces products using precise combinations that are strictly regulated by quality control. Therefore, as soon as medicines are manufactured, they are delivered to the customer. However, if they are destroyed during transportation, they cannot be recalled or repaired. Typically, when the goods are given back to the distributor, they ensure the client gets a return credit. Then, the medicines are sent to a processor for destruction. Nevertheless, not each return is credited as they demand additional verification from a logistics company.
A product recall is quite similar to a return, yet requires extra identification, specific protocols, and urgency. The procedure presupposes a more thorough oversight to prove the legality of actions. To avoid legitimate inconsistencies, logistics companies offer solutions in the form of Recall Action and Recall Alliance that help the customer meet their requirement. Despite some differences in these procedures, all regulations have to be managed.
Multiple pharmaceutical products traveling on their way back to the distributor must be regulated even from overseas. There are more than 70 rules for pharmaceutical logistics. They include serialization, attaching different codes, or other distinguishing devices. Moreover, inventory security measures should be taken to avoid any accidents. Besides, reverse logistics often face a problem of controlling the temperature of pharmaceuticals. Therefore, they developed miscellaneous technologies such as sensor-based systems to prevent drug expiration during shipping and storage. Therefore, when regulations are violated, the companies may bear significant losses, reducing prices due to intense market competition.
The logistic organizations, working within the pharmaceutical industry, support clinical trials. As a result, they do not deliver drugs in large amounts to the market but ship them to laboratories and patients homes. Thus, some locations have become increasingly important for logistics companies. The drive to contain costs forces pharmaceutical retailors to mingle their clinical and commercial logistics operations under a universal contract. Such an approach helps organizations work more efficiently as returning and recalling items should be tracked thoroughly as well.
Conclusion
The development of the pharmaceutical market implies that more expensive but effective drugs will be developed. Reverse logistics works differently in this industry, as no drugs can be returned. Therefore, the regulations must be strictly followed. The primary firms objective is to ensure that shipping and storing conditions are controlled to maximize their profit and minimize losses. Only a complex approach to delivering would help distributors achieve these goals.
References
Malik Iqbal Kabir Reverse Logistics in Pharmaceutical Industry. Int. J Sup. Chain. Mgt. Vol. 2, No. 1, 2013.
An industrial operations analysis plays a critical role in assessing the efficient operations of its different units. The following report presents detailed information addressing the prevailing circumstances of the fire suppressing and the Hydrostatic and hydraulics system of Acme Manufacturing Co. As an industrial assessor, the organization of BSCI must be tasked with the role of supervising the operational efficiency of the fire suppressing system and hydrostatic and hydraulics piping system. BSCI finally must put forward its recommendation for Acmes organization to improve its working conditions in consideration of its present operational functions in its entire piping system. The report is therefore aimed at improving the internal operations of the Acme Company in managing its hydrostatic as well as hydraulics piping system. After having observed the environment in which all the industrial operations of Acme Manufacturing Company are conducted, it was necessary to present the following report of a physical examination of different companys piping systems.
Unit 6 Hydrostatics and Hydraulics Report
Analyzing a firms industrial operations is critical in ascertaining whether its operations meet the recommended operational industrial guidelines. In most cases, the preliminary assessments are poorly conducted due to the desire to have projects running and generating profits. This paper identifies the operating procedures of Acme Manufacturing Company with a key focus on its fire suppression system, water storage tank, and its hydrostatic and hydraulic piping system in recommending appropriate operational standards for its efficient operations.
Report Details
Piping System Repair
The fuel gas piping and the gaseous hydrogen piping were poorly erected. For instance, these fluids are commonly known for their high corrosive nature and yet were transported in corrosive steel conduits. The pipes size for transporting the fluid gases was also relatively small and thereby generating high fluid velocity was at 10ft/s above the recommended standard of 8.5 ft./s (Yates, 2015). In other cases, the in-house piping within the power plant was made from plastics, which are prone to burst and could cause fuel leakages resulting in explosions. The horizontal positioning of the piping systems for hydraulic fluids also disregarded the requirement of the piping system. These pipes ought to have been erected in a vertical position. They were similarly made from steel, which attracts corrosion when the steel surfaces contact with the water or moisture content, exposing them to corrosions. The content of the piping system was also mixed with some water content. This exposed the machines that relied on the hydraulic fuels to the corroding effects of water. The calculations for the given scenario is available in appendix C.
Water Storage Tank
The water storage tank was maintained at an average height necessary to generate the required pressure for the water flow; however, the water tanks were connected with plastic pipes prone to bursting. The jointing of these pipes was also made from corrosive steel pipes corroded the pipes hindering the normal water flow. The calculation of velocity is as follows:
The velocity of the liquid at the outlet when draining a container or a tank is given by the following equation:
v = Cv (2 g H)1/2. Understanding this equation is essential as it can make engineers apply the concept in the design, construction, or repair of different parts of the water storage systems. The calculation for the scenario is provided in appendix B.
Fire Suppression System
The piping system was poorly positioned horizontally without considering the required standards. Instead, the pipe appears slightly erected in most of the joint piping. This contradicts the recommended guideline that requires the fire suppressor system to be erected horizontally. The adopted pipe in installing the suppressor system was at the size of 8 inch and not a 10-inch diameter pipe, creating the suppressing fluids velocity to be below the standard 8.5 ft./s. This attracted a high pressure rendering the pipe prone to damage. The calculations for the given scenario is available in appendix C.
Conclusions and Recommendations
The company needs to reinstall most of its poorly installed pipes in accordance with the industrial guidelines. The plastic and corrosive conduits must be newly fitted with non-corrosive and durable lines. The firm also needs to reduce the fluid velocity to improve the efficiency in dealing with the fluid piping. The organization must consider a moderate fluid speed in protecting the piping material from being damaged by pressure. This will also reduce the service life of this material. A higher fluid velocity creates inefficiencies, thereby attracting high energy expenses. Reducing the velocity of the fluid will also enhance the reliability of the system. Finally, the factory needs to install the piping system with a C-factor of 150 that ensures a constant smoothness throughout the flow of all fluids in managing any rises associated with friction.
Reference
Yates, W. D. (2015). Safety professionals reference and study guide (2nd ed.). CRC Press.
Appendix A
In this case, the calculation of pressure based on the data provided is as follows:
Density of water = 1000kg/m3
Pressure at the location of the pipe repair is
P= Áhg =1000*9.81*(25*(1/3.28)) =72771.34 pa.
Appendix B
The velocity of the liquid at the outlet when draining a container or a tank is given by the following equation:
v = Cv (2 g H)1/2.
Where
v = outlet velocity (ft/s)
Cv = velocity coefficient (water 0.97)
g = acceleration of gravity (9.81 m/s2)
H = height (m) = 32.174 ft/s2
The velocity of the fluid at fluid heights of 24 feet, 18 feet, 12 feet, and 6 feet will be 749.01072 ft/sec, 561.60 ft/sec, 374.40 ft/sec, and 187.20 ft/sec respectively.
Explanation
For 24 ft:
v= 0.97 * 32.174 * 24 =749.01072 ft/sec
For 18 ft:
v= 0.97 * 32.174 * 18 = 561.60 ft/sec
For 12 ft:
v= 0.97 * 32.174 * 12 =374.40 ft/sec
For 6 ft:
v= 0.97 * 32.174 * 6 = 187.20 ft/sec
Appendix C
The calculations for the given problem are as follows:
Bernoullis equation is given as follows:
p+21Áv2+Ágh=constant
where p stands for the pressure, Á is the density of the liquid, v represents the velocity of the fluid used, g is the gravitational pull, and h symbolizes the height from a reference point.
Thus, in points A and B, the equation can be framed as:
pA+21ÁvA2+ÁghA=pB+21ÁvB2+ÁghB+HL
where hf stands for head loss inside the pipe as a result of friction.
Since this problem involves a horizontally installed piping system, then
hA=hB, indicating that potential head is not necessary.
Thus, the new equation becomes:
pA+21ÁvA2=pB+21ÁvB2+HL Ò pApB=21Á(vB2vA2)+HL
Given,
pA=55
vA=7
vB=8.5
Á= 1.940
And,
HL= Ághf =Ág(40 ft),
Then, by substituting the relevant values in the expression as:
The Toyota Motor Corporation is one of the largest and most famous car manufacturers in the world. Toyota is a worldwide firm with over seventy distribution hubs and fifty production units. The worldwide firms goods and services include specialty steel, auto parts, ship engines, medicines, property investment, finance, electrical devices, and household appliances (Toyota Annual Report, 2019). The Toyota Motor Corporation was chosen for this research due to its adoption of many HR functions. The importance of line managers in carrying out HRM obligations is emphasized.
The Toyota approach is based on two main principles: continual development and respect for people. Toyotas organizational structure is divided into divisions, with company activities focusing on market, product, and regional groupings. Toyotas organizational structure was built on a conventional Japanese company hierarchy for many years, with only the most senior executives having decision-making authority. Toyotas success is built on two pillars: technological innovation and competent people resources.
Critical Evaluation
Line managers compared to HR managers show a high level of approach to working with foreign employees. Unfortunately, the company is more focused on hiring Japanese, which is not the best solution, because the society should be diversified. However, line managers show a high level of qualification and approach to new foreign employees, providing them with all kinds of development within the country. Toyota Human Resource Management is an organizational activity related to staffing and unit management. This group is tasked with solving problems related to individuals within the company. Toyotas objective is to get the best out of everyone, whether team members on the shop floor or executives (Toledo et al., 2018). Everyone is a consumer, and the corporation is attempting to run a profitable business, requiring everyone to work to their full potential.
Line managers of Toyota Motors Corp. were well trained to support the companys business by ensuring progressive dedication, long-term creativity, and formulating and executing the right choices and job requirements. Because managers and supervisors have a close relationship with employees, they can quickly resolve their concerns and ensure they have the right equipment, experience, training, and desire to improve performance. However, several fundamental constraints, such as overwork, short-term goals, and a tendency to ignore administrative rules, have been shown to interfere with employees full participation in their work. Moreover, managers and leaders play a critical role in managing employee values and perspectives. Comparing various trends within an organization, it is believed that staff training is essential to achieve the companys goals of sound research, design, production, and marketing of safe vehicles.
The organization was obliged to modify its HRM policies to accept the responsibility of teams and provide ways for the company to be more flexible as a result of unrelenting criticism. The development of multi-skilling among staff has increased the car organizations flexibility. Workers may now transfer from one sector to the next using a rotating schedule that is dependent on the duties at hand. In the Toyota Motors Corp., flexibility has also been connected with the development of new methods. By assuring collective authority rather than personalized energy monitoring, the organization has been able to preserve flexibility and responsiveness.
HRM Strategic Examination
There is a significant strategic difference in Human Resources at Toyota, although perhaps not in the manner they believe. Toyotas strategic vision is that, in comparison to a mass-production system, lean management necessitates more highly developed employees with more fundamental convictions. People show to be the most critical component of the system, and their ability to notice and resolve problems is what propels continual progress. As a result, Human Resources is perhaps the most crucial role in every company (Boon et al., 2019). At Toyota, Human Resources accounting tasks are minor in comparison to their positions in improving the performance of individuals and creating a fair environment based on mutual trust.
Toyotas human resource manager has a far broader duty than interacting with customers as a stream of resources. Toyota considers the development of team members to be the companys primary competitive advantage (Toma & Naruo, 2017). Moreover, developing excellent people is the companys most important task; the institutions emotional connection to that obligation has improved tremendously. It is easy to see that something is different at Toyota by looking at the folks who pass through HR as managers. Directors of organizations, vice presidents of production, and a number of notable specialists in Toyotas production plans have all worked in HR.
HRM Practices
Many firms try to emulate Toyotas culture; procedures are implemented to establish and sustain a lean culture. One issue is that not everyone succeeds in a toxic workplace. Blended examinations are now more readily used thanks to advancements in the application of specific procedures, which assist in establishing a pleasant applicant experience by drastically reducing the time between preliminary tests and ultimate decisions, backed up by a straightforward and accurate feedback procedure.
The creation of the on-the-job-training (OJT) education program is key to the industrys HRM strategy. This method has been judged critical to the growth and transmission of the existing tech-savvy production to future generations. Several actions that constitute the foundation of the HRM concept are supported by the OJT program. Initially, the corporation aims to establish trust in its employees by providing steady jobs and a pleasant working atmosphere. Worker health and safety risks are also recommended to be prioritized by HR departments in all corporate divisions to create and maintain a safe workplace. In addition, the corporation is focused on the physical and psychological requirements of its employees in order to enhance their living conditions.
Recommendations
Many factors influence HRM decisions: for example, the preferences of internal management and Japanese cultural norms can influence recruitment, which is not the best aspect for the development of the company. As for the external factor, the decisions made by HR leaders can be affected by general trends in the field of personnel management. There are several recommendations for improving HRM delivery at Toyota Motor Corp. An organization needs to rethink how it delivers HRM to practice robust collaboration management in a globalized world before the system is truly global.
The company promotes its employees within the company rather than offering opportunities for external experiences. This strategy is considered appropriate for the growth of the organizations workforce, as well as for the preservation of its aspirations and values. However, automotive multinationals are strongly encouraged to look for talent outside the organization. This allows the development of an external factor, namely the attraction of foreign specialists. Toyota Motor Corporation should not just hire people from the Japanese community for leadership positions (Grdinaru et al., 2020). The vast majority of the companys senior managers are Japanese. This combination of circumstances means that the companys views are mainly focused on the domestic market, which cannot be presented as an evil aspect because the company supports the domestic market and develops the economy of its country.
References
Boon, C., Den Hartog, D. N., & Lepak, D. P. (2019). A systematic review of human resource management systems and their measurement. Journal of Management, 45(6), 2498-2537.
Grdinaru, C., Toma, S. G., & Zainea, L. (2020). Japanese versus German Supremacy in the Global Automotive Sector. Ovidius University Annals, Economic Sciences Series, 20(1), 78-83.
Toyota Annual Report (2019, November 5). Toyota Motor Corporation Official Global Website. Web.
Toma, S. G., & Naruo, S. (2017). Total quality management and business excellence: the best practices at Toyota Motor Corporation. Amfiteatru Economic Journal, 19(45), 566-580.
Toledo, J. C., Gonzalez, R. V. D., Lizarelli, F. L., & Pelegrino, R. A. (2018). Lean production system development through leadership practices. Management Decision.
Manufacturing and service systems have similarities and differences. To some extent, many organizations mix manufacturing and service operations to meet customer interest, attract new consumers and succeed in the fulfillment of their economic mission and other objectives. For instance, nowadays, an increasing number of manufacturing enterprises recognize the significance of service delivery in manufacturing, and they strive to integrate physical goods production into product service systems to address customer needs and increase customer involvement (Gao et al., 2009). Nevertheless, manufacturing and service operations require different strategic approach and provoke distinct management problems related to the development of relationships with customers, delivery of products or services, and roles of products or services providers in the supply chain and product distribution.
Customer Involvement
As mentioned by Zhou, Park, and Yi (2009), a customer takes a central part in the process of service delivery, and sometimes even the service initiation process itself (p.139). When being directly involved in service delivery process, a customer directly impacts the quality of service operations. Moreover, face-to-face interactions with customers in service organizations facilitate differentiation of service range according to customer preferences.
In manufacturing companies, customer involvement is usually less intense, and communication with consumers is of auxiliary character. It means that manufacturers may implement multiple marketing tools to communicate brand messages to consumers or utilize surveys to collect their feedback and make some improvements and differentiate product line. However, a physical product remains a critical element of manufacturing operations.
Production and Consumption
Production and consumption of services are always immediate. Since the services are generated and consumed at the same time, flexibility is regarded as the major success factor in service supply (Zhou et al., 2009). Flexibility in service delivery system implies the effectiveness of response to both substantial environmental changes and customer differences (Buzacott & Mandelbaum, 2008). Therefore, an effective service supply chain requires smart structuring, development of supportive organizational policies, and collaboration.
In manufacturing, production and consumption are cyclic and, comparing to service delivery, are separated by a time gap. Such a time lag creates challenges in the evaluation of the direct impacts of production on consumers as it is difficult to analyze the subjective customer perceptions of purchased goods.
Supplier Relations to Supply Chain
Service delivery is associated with customer-supplier duality which means that service delivery process often starts when the supply of inputs is made by customers (Zhou et al., 2009, p. 140). Contrary to manufacturing supply chain in which a producer plays a role of a key supplier of physical items, a customer may be represented as a supplier in many service organizations, i.e. electronics repair service.
Manufacturing supply chain efficiency depends on organizational capacity networking and relationship development while service supply chain requires effective information management and product customization (Zhou et al., 2009). In this way, although manufacturing and service supply strategies aim to achieve highest levels of efficiency as the end results of operations, the differences in characteristics of manufacturing and service operations emphasize that their factors of success are dissimilar, and these distinctive features should be considered in supply chain management.
Delivery of Products and Services
As the suppliers of intangible services, the employees in service organizations become the main actors in customer interaction development and are thus directly involved in the process of product delivery. At the same time, manufacturing firms may develop supply chain networks, develop partnerships, and employ partners assistance in product distribution. In this way, although producers bear full responsibility for the delivery of goods to the final consumption point, the process of product supply in manufacturing may be mediated by business partners.
References
Buzacott, J. A., & Mandelbaum, M. (2008). Flexibility in manufacturing and services: Achievements, insights and challenges. Flexible Services and Manufacturing Journal, 20(1-2), 13-58. Web.
Gao, J., Yao, Y., Zhu, V. C., Sun, L., & Lin, L. (2009). Service-oriented manufacturing: A new product pattern and manufacturing paradigm. Journal of Intelligent Manufacturing, 22(3), 435-446. Web.
Zhou, M., Park, T., & Yi, J. (2009). Commonalities and differences between service and manufacturing supply chains: combining operations management studies with supply chain management. California Journal of Operations Management, 7(1), 136-141.
The car manufacturing industry in the United States of America is quite competitive as the business environment in the country has transformed significantly. For foreign car manufacturing company to thrive in the United States market, a lot of marketing strategy considerations ought to be made particularly regarding the marketing communications plan. Owing to the fact that the marketing communication plan entails the companys communication with the target audience, it is imperative for the company to consider the cultural, social and other environmental factors in the United States. This is necessitated by the actuality that in spite of the fact that marketing is inherently an economic affair, communicating with potential customers is something that borders on culture, society and environment. In the process of developing a sound marketing communication plan, the car manufacturer will be required to compare the international promotion mix that dictates the entire marketing process and also develop a succinct strategy that will guide its marketing endeavours (Kotler et al 2008, p. 7).
The United States automobile market is driven by different needs and requirements that often alter the marketing landscape of major companies. Since the automobile needs of users have changed with time, a comprehensive market survey will inform the car manufacturers approach to marketing. Such a survey will reveal exactly what the customers expect from the car manufacturers. The five established tools of marketing that include direct marketing, public relations, advertising, personal selling and sales promotion will play an important role in market communication, but advancement in information technology will require the company to invest more time and effort in contemporary media and appropriate messages for marketing communication (Selden, 1997, p. 23).
There are a number of theories that govern the development of marketing communication plan. They include; Theory of Hierarchy of Effects, marketing myopia theory, push theory, pull theory and combination theory. These theories underscore the practice of marketing particularly with regard to strategy and marketing communication plan (Kotler & Armstrong, 2005, p. 45).
A successful marketing communication plan is informed by a comprehensive marketing strategy. According to Whittington (2001, p.23) there are four dimensions to strategy namely; classical, evolutionary, proceduralist and systemic. Classical, which represent the oldest dimension, refers to the logical planning approach laid out in textbooks. Evolutionary underscores the gradual development of marketing as a dynamic approach. Procesualist, on the other hand, denotes strategy as a process of organizations and marketing. Systemic dimension concerns the essence of strategy as a process of achieving some desired goals in marketing that are closely connected to the influences and cultures of social systems in places where it is applied (Whittington 2001, p. 23).
International Promotion Mix
Describing the International Promotion Mix
According to the theory of Hierarchy of Effects, customers navigate through a step by step process as they obtain marketing information in the course of making a marketing decision. This theory determines the operations of the international promotion mix. In essence, the international promotion mix refers to the relevant elements that underscore the marketing communication tools used in international marketing. The basic tools that form the promotion mix include direct marketing, public relations, advertising, personal selling and sales promotion. The international promotion mix, therefore, implies the blend of promotional endeavours to facilitate sales as well as boost brand equity (Wood & Masterman 2012, p. 134).
Marketing communications mix entails three ingredients: messages, tools and media. The tools can be applied in various blends and different measures of passion to communicate with an intended audience. The contemporary outlook of the marketing communications mix stipulates that the mix consists of tools, media and messages. The fundamental tools include advertisement, sales promotion, among others. The six categories of media include digital media, in-store media, broadcast, print along with other media. Messages are classified into two, namely informational and emotional (Piercy & Cravens 2005, p. 32).
There have been several major changes in the business environment that have altered the way in which businesses communicate with the intended audiences significantly. Advanced technology, for instance, has led to the development of diverse media as people devise different methods of using their leisure time (Piercy & Cravens 2005, p. 41). Such developments have critically altered the way in which corporations conduct communication with the market specifically because of the new avenues of communications that require newer versions of tools, media and messages to suit the changes. This set of combinations and alteration strategies have led to the development of the contemporary outlook of the marketing communications mix (Piercy & Cravens 2005, p. 45). The use of direct response has gained popularity in the prevalence of direct marketing for a number of products. In essence, the internet along with other digital technologies has facilitated novel interactive methods of communication where receivers have their share of responsibility in the course of communication.
The conventional promotion mix has undergone a great metamorphosis. Initially, brands were created via the application of advertisement to create top of the line bunch communication campaigns. The method involved purchasing time for advertisements in popular programmes on television. Another scheme was that of purchasing space in newspapers along with magazines; under this strategy, media owners required to create programs that attracted huge audiences in order to fetch more money through advertisements. However, things have changed as people no longer rely on television and newspapers for entertainment and information since several other forms of media have evolved. Research indicates the audiences use media for several purposes that include to share, discover, express themselves and participate (University of Leicester 2008 p. 4).
Modern-day consumers have diverse options to choose from regarding leisure and media endeavours. Similarly, todays consumers choose the time and the manner in which they consume entertainment and information. In fact, consumers have the ability to create their own messages, information and entertainment via several ways that include video, text and music. Owing to these myriad changes, the key in communicating to clients is no longer tools but messages and media. Modern organizations ought to give more consideration to the medium used for communication along with the message for purposes of promotion. When selecting the media to be used organizations ought to consider the ease in reaching target consumers. This will enable them to select the most viable as well as appropriate media for purposes of communication (Banasiewicz 2009, p. 32).
The message should address the relevant attributes of the product or service being marketed. For instance, a car manufacturing company may develop a message that informs the audience about the types of motor vehicles produced by the company regarding their nature, usability, durability, quality and maintenance. Such details are informative and educate the user on the product and how to use it. Emotional messages for car manufacturer may include sentimental details about the fancy, comfort, luxury and fantasy of owning a car that inspires the audience to buy the cars being manufactured by the company. Modern marketing communication, therefore, includes personalized and highly targeted communication endeavours that apply direct marketing, which suits the new business environment (Adcock & Ross 2001, p. 15).
The Constituents of the Mix
The marketing myopia theory stipulates that marketers ought to consider market tastes and alter the corporations products and services rather than concentrating on the company. This implies that the car manufacturer will have to consider what the market wants, their tastes and needs and develop vehicles that serve the necessary requirements of the market. The requirements of the market are the top priority of many marketing communication plans and strategies through which the promotion endeavours are designed to address the very tastes of the customer (Kurtz 2010, p. 23-27). Theodore Levitt who authored the theory argues that customers are the mainstay to the company and therefore they should be given first priority. Any marketing communication plan that does not inculcate the needs and requirements of the customer cannot bear any fruits for the organization. In its endeavour to venture into car manufacturing in the United States, the car manufacturer should conduct a market survey, understand the requirements of the market and alter the products to suit those requirements.
According to Dev and Schultz (2005, p.16-22) the international promotion mix involves three major components namely; tools, messages and media. Tools have been given much weight among the three because it is through them that the message is delivered to the market via selected media. The tools include;
Direct marketing
Public relations
Advertising
Personal selling
Sales promotion
The push theory of sales promotion stipulates that the company markets the products to a retailer who then automatically promotes them to the customers. This theory uses the intermediary technique in promoting goods whereby the company does not promote the goods to the customer directly rather it focuses on marketing the goods to a retailer and once the retailer purchases the merchandise it is upon him to promote them to the customers. This represents a participative approach to sales promotion, which offers the retailer a role in marketing the products of the company. The car manufacturer can find this kind of theory useful in the sense that he can promote the vehicles to dealers who will then promote them to the customers. Under this type of marketing, advertisements and market promotions are the most reliable tools (Rajagopal 2007, p. 67).
The pull theory of sales promotion refers to the direct process of marketing where the car manufacturer locates the customer and markets the products to them. This style of promotion and advertisement is extensive and costly because a lot of time, effort and money has to be invested in it for better results. The companys sales force must travel extensively to promote the products to the end-users.
The combination theory appropriately suits the car manufacturer in a bid to market motor vehicles in the United States. This involves supplying a car dealer with vehicles where they are offered to the customers with inducements for shopping with them. This strategy is very common among automobile companies that use buyback strategies to induce sales (Hollensen 2011, p. 56).
Kotler and Keller (2012, p.29) assert that the message is another crucial component in the process of developing a sound marketing communication plan. This often involves the development of the content of the promotion process. Once the message has been created the media and tools will follow suit. Among the three constituents of the promotion mix, the message is the most important owing to the fact that the tools and media transmit the message, and it is the message that carries the crucial information needed by the customer in the process of making a buying decision. Therefore, great care ought to be taken in the process of developing the message to ensure that the marketing process achieves the required goal. The nature of the message determines whether the marketing process is successful or not because the message underscores the real intention of the marketing process. If the media selected is appropriate and tools are effective, and the message is ineffective then the whole process is a failure (Paliwoda & Ryans 2008, p.461-2).
Kotler and Keller (2012, p.31-34) further argue that messages can be of two types; informational or emotional. Emotional messages are those that are appealing to senses and motivate the customer to make a buying decision at the spur of the moment. Emotional messages are laced with sentimental tones that present the beautiful aspect of the product creating a desire in the mind of the customer. Emotional messages are often based on fantasy associated with the product being marketed along with the luxury, comfort and prestige associated with the same (Smith et al 2010, p. 87-90).
Informational messages carry the bulk of information regarding the product being marketed that offers the customer with an understanding of the nature of products and their uses. Informational messages usually help the customer to make a decision on whether he or she needs the product or not. Depending on the nature of the information given the customers can decide whether they want the products or not (University of Leicester 2008, p.3).
Recommendations
The foreign car manufacturers endeavour to join the United States market will be governed by several parameters most of which are prescribed in the relevant theories of marketing, sales promotion, marketing communication plan and international marketing mix. In order for the car manufacturer to be successful in the United States market, he has to adhere to the following recommendations;
The car manufacturer ought to understand the business environment of the United States before developing a marketing strategy and marketing communication plan. The marketing endeavours should be informed by a clear understanding of the business environment in the United States. According to the marketing myopia theory, the key factor should be the requirements and needs of the customer and not the potential of the company. In developing a marketing message for the United States customers, the manufacturer should understand the economic, social and cultural dimensions of Americas business environment in terms of what Americans want from car manufacturers (Onkvisit, & Shaw 2004, p. 3). The car manufacturer should also select appropriate media through which marketing communication will be done. The best media is one that reaches the target audience in large numbers at the same time.
The manufacturer ought to develop educative, informative and appealing messages that will be effective in convincing the customers to make buying decisions. Appealing messages attract sales while educative and informative messages inform the customers about the importance of purchasing the products (Joshi 2005, p. 67).
Reference List
Adcock, D & Al Halborg, C 2001, Marketing: principles and practice, Financial Times/Prentice Hall, New York.
Banasiewicz, A 2009, Promotion Analytics, Andrew D. Banasiewicz, Washington.
Dev, S & Schultz, D 2005, In the Mix: A Customer-Focused Approach Can Bring the Current Marketing Mix into the 21st Century, Marketing Management, Vol. 14 no.1, pp. 1622.
Hollensen, S 2011, Global Marketing A Decision-oriented Approach 5th Edition, Pearson, Washington.
Joshi, R 2005, International Marketing, Oxford University Press, New Delhi and New York.
Kotler, P & Keller, K 2012, Marketing Management, Pearson Education Limited, Harlow, England.
Kotler, P, Gary, A, Wong, V, & Saunders, J 2008, Principles of marketing, Pearson Education/ Prentice Hall, New York.
Kotler, P & Armstrong, G 2005, Principles of Marketing, Pearson education, Washington.
Kurtz, D 2010, Contemporary Marketing Mason, Cengage Learning, OH, South-Western.
Onkvisit, S & Shaw, J 2004, International marketing: analysis and strategy, Pearson, Washington.
Paliwoda, S & Ryans, K 2008, International Marketing: Modern and Classic Papers, Volume 6 of International Library of Critical Writings in Economics Series, Edward Elgar, London.
Piercy, N & Cravens, D 2005, Strategic marketing, McGraw-Hill, Pennsylvania.
Rajagopal, R 2007, Marketing Dynamics: Theory and Practice, New Age International, New Delhi, India.
Selden, H 1997, Sales Process Engineering: A Personal Workshop, ASQ Quality Press, Milwaukee.
Smith, T Lange, F & Dahlén, M 2010, Marketing Communications: A Brand Narrative Approach, John Wiley & Sons, Washington.
University of Leicester 2008, Marketing, Design and Operations, Learning Resources, London.
Whittington, R 2001, What is strategy and does it matter? Thomson Learning, Washington.
Wood, E & Masterman, G 2012, Innovative Marketing Communications, Routledge, New York.
All modern organizations depend on other links of their supply chains. Maintaining stable and sufficient supplies has become a matter of survival for modern companies, and the resources dependency theory (RDT) examines this particular issue. It focuses on such aspects as limited amounts of materials and the manner of their distribution among manufacturers. This paper aims to analyze the resources dependency theory (RDT) within the context of clothing manufacturing organizations.
Main body
All businesses exist in a complex environment that comprises several important links. Although the degree of this dependency may vary, no company is capable of remaining completely self-contained. It is vital to ensure stable supplies, as they are a matter of paramount importance for the organizations survival. According to Pfeffer and Salancik (2002), three main factors determine the nature of a companys dependency on other organizations. The first condition consists of the extent to which the resource is necessary for the companys operations. In other words, it is important to analyze whether the organizations survival is possible without it. However, it is not the importance of the resource that has the potential to cause problems, but the possibility of its stable supply. Therefore, if it is rare in the given environment and there is significant competition, the stability may be compromised.
The second factor depends on the degree of discretion the interest group has over the resource in question. Ownership is an important component of the supply chain, as it may impose additional difficulties for an organization (Pfeffer & Salancik, 2002). For example, exclusive rights to possess a product or material allow the other party to dictate partnership terms. The third condition considers the range of alternatives the supply channel may have (Pfeffer & Salancik, 2002). In other words, this factor deals with the concentration of a resource or material. Furthermore, it is not the number of alternative supply channels that matters but the way the resource is distributed among them. Overall, the three factors may entail negative consequences for the companys operations. However, as Heath and Johansen (2018) state, effective communication is capable of resolving potential problems and ensuring stable supplies. Therefore, each company must evaluate its dependency within the context of the discussed theory and perform communication with other links of the supply chain accordingly.
The RDT can be applied to the industry of clothes manufacturing. In general, the nature of dependency in this market may vary depending on the target segment of a particular company, but it is possible to discern general tendencies. First, textiles form the primary resource base for all clothing manufacturers, and they are crucial for all their operations. Therefore, such companies demonstrate an extreme level of dependency on their fabric suppliers, according to the first factor. Nevertheless, these materials are broadly available in the market and are not excessively concentrated. Accordingly, the second and the third factor compensate for the importance of textile, as clothing manufacturers have a wide range of potential suppliers in case of issues. Kumar et al. (2018) emphasize the indispensable nature of risk management in the context of the clothing manufacturing industry in China. However, it is possible to suggest that correct assessment allows for stable supplies in the mass market.
On the other hand, luxury brands, such as Gucci, manufacturing their exclusive clothes may face additional issues. Indeed, the highest-quality fabrics are not as broadly available, which disrupts the balance of factors. In this case, all three-factor groups impose additional limitations on the manufacturers, making them extremely dependent on their suppliers. If the supply chain is broken for some reason, it may have adverse effects on production, as high-quality fabrics are not as easily obtained as mass-market materials. Therefore, Gucci and similar brands that both produce and sell clothing are in a vulnerable position, according to the RDT. Nevertheless, the risks are compensated by their extreme profits from working with the high-end market segment.
On the other hand, while fabrics form the core of operations in the sphere of clothing manufacturing, there are other resources involved in production. Clothing producers activities rely on transportation and partner stores to a similar extent. To maintain the balance of costs and profits, clothing manufacturers must ensure a stable exchange with stores and outlets. Mass-market companies described earlier encompass a larger segment of the market, making it possible to sell their products at a variety of locations. Simultaneously, luxurious brands are not as widely represented, meaning that their operations are more concentrated. In this case, potential disruption of the supply cycle will be more damaging for Gucci and similar companies. To maintain the level of product exchange with outlets, clothing manufacturers may opt for exclusive contracts ensuring a stable source of income for them. At the same time, high-end clothing manufacturers demonstrate extreme dependency on human resources. Unique fabrics and designs for wealthy clients require a certain level of expertise on behalf of the companys employees. Accordingly, such brands must spend considerable resources to prevent valuable specialists from leaving them.
Conclusion
In conclusion, the resource dependency theory suggests that, in each case, the degree of dependency varies according to three factors. The factors exist in an interrelated system and are capable of compensating one another. The grave importance of fabrics for the clothing industry is balanced by their availability in the case of mass production. However, luxurious brands demonstrate a higher level of dependency due to the narrower choice of suppliers. Overall, an in-depth risk analysis is required for each company to ensure stable supply chains.
References
Heath, R. L., & Johansen, W. (2018). The international encyclopedia of strategic communication. Hoboken, NJ: John Wiley & Sons.
Kumar, V., Bak, O., Guo, R., Shaw, S. L., Colicchia, C., Garza-Reyes, J. A., & Kumari, A. (2018). An empirical analysis of supply and manufacturing risk and business performance: A Chinese manufacturing supply chain perspective. Supply Chain Management, 23(6).
Pfeffer, J., & Salancik, G. R. (2002). The external control of organizations. A resource dependency theory. In M. J. Handel (Ed), The sociology of organizations: Classic, contemporary, and critical readings (pp. 233242). Thousand Oakes, CA: SAGE Publications.
A plastic material is among the extensive collection of artificial or semi-synthetic organic materials that are used in the production of industrial products. Plastic materials are characteristically polymers with high molecular mass. In addition, they may contain additional substances that help them to improve their performance and/or cut down the cost of production.
The most likely plastic used
Polyvinyl Chloride (PVC) is the most likely used type of plastic.
Why this plastic is selected
Polyvinyl Chloride (PVC)
PVC is highly reliable because of its durability, light weight, flexibility and low cost. In addition, it has a high resistance to out-of-doors exposure as well as high mechanical strength PVC is also very good in reducing solar heat gain. Depending on the additives, PVC combines strength with transparency or color (Ronald and Baird, 1986). This addition of white and colored additives improves the weathering resistance of the PVC materials and products as well as their process-ability. These are some examples of the huge demands made on Polyvinyl Chloride.
What are some alternative plastics and why?
Some of the alternative plastics that are in use today are:
Fiberglass (GRP)
Polyethylene
Acrylics
Formaldehyde plastics
Fiberglass (Glass Re-enforced Polyester, GRP)
The characteristics of the refined GRP compound material are dependent on a large number of fabrication and compositional factors (Blaga, 1978). Some of these factors include resin formulation, curing conditions, filler, fabrication process, the amount and type of strengthening, workmanship, and coupling agent (Blaga, 1978). Glass reinforced plastic is a polyester resin reinforced with glass fibers. It can be used as a structural material by the artist. Fiberglass can be molded into various shapes which add strength to the work of art.
This material is durable and light, which makes it suitable for delicate applications in works of art. Fiberglass can easily be reinforced by adding more layers to harden it. Although not strong, this material is cheaper to manufacture (Ronald and Baird, 1986). A Glass Re-enforced Polyester material has found use in applications that require corrosion resistant materials at reasonable costs.
Therefore, Fiber glass materials can be employed as lining materials for conventional pipes that are exposed to chemical or galvanic corrosion (Blaga, 1978). GRP materials are non conductors of electricity and are therefore, induction flows do not have an effect on them. In addition, fiber glass materials have high tensile strength, durability, better strength and low density. Also, the materials have very strong stiffness characteristics. Lastly, as a result of their structure, GRP materials have very long life times.
Acrylics
The most popular acrylic plastics type is Polymethyl methacrylate and it is usually tough and highly transparent. It is also characterized by high resistance to weathering and ultraviolet radiation. Polymethyl methacrylate can also be drilled, formed, colored and molded easily. This quality makes it ideal for many applications in art (Dominick, 1993).
In view of the fact that Acrylics do not form crystalline resins when they are heated, however, they are converted into a shapeless blob that is referred to as an amorphous resin; acrylics have a grand “mold to size” capacity but their resistance to chemical corrosion is poor. In addition, they are fragile and easily broken. This is why they are constantly sprayed with certain types of fiber glass materials so as to stiffen them.
Formaldehyde plastics
This material is highly reactive and pure. It is also relatively cheap. Formaldehyde plastics have good Color retention properties, and offer moderate water and heat resistance. In addition, they offer good chemical resistance and have excellent dimensional stability (Whitfield, Brown, and Low, 2007).
Polyethylene
Polyethylene is highly reliable because of its durability, light weight, flexibility and low cost. Polyethylene is also very good in reducing solar heat gain. Depending on the additives, Polyethylene combines strength with transparency or color. A good number of grades of Polyethylene have outstanding chemical resistance and do not liquefy at room temperature as a result of their crystalline nature.
Different from acrylic materials, Polyethylene materials have better elasticity, and would not break before bending. They are closed cell materials similar to Styrofoam, which do not absorb water and emit any gaseous odors or fumes. In addition, they are tough, electrically insulating, offer poor weathering resistance, have low strength, and have a relatively low friction coefficient (Callister, 2004).
What is the most likely process? Used
There are many processes that make it possible for plastics to be changed into a number of useful shapes. These processes, which are employed in the molding or shaping of thermoplastics fundamentally, make the plastic material softer so that its injection into a mold, or flowing via a die, or forming over or in a mold can be done easily. These processes more often than not permit any scrap materials or parts to be chopped into pieces and reused. The most common process that is used is casting.
Casting
Casting is the process of art which involves making of an art form from a hollow mold by pouring molten plastic into the mold and leaving it to harden. This technique can be done in various ways. Lost-wax method of casting for instance begins with coating of the model surface with lacquer among other proactive substances.
The model is then placed in a retainer mold where pouring of liquid elastic takes place. To reveal the negative impression, the flexible mould is gently removed from the model when it solidifies. Application of meted material is done from the inside of the flexible mold. Core of investment material is then poured following solidification of the material. To reveal the wax positive, the two halves of the outer plastic retainer molds are removed after solidification of the mold (Dominick, 1993).
Steps in creating a sculpture using direct modeling method of casting
The process starts by preparing your framework of art. The plastic material is simply poured into a box where the artist wants the artwork to carve from. For this illustration, a human head will be used. To start with, a picture of a person’s head is sourced. The next stage that follows involves building an armature.
This is the frame where building of the sculpture takes place. This can be build from any rigid material such as a steel of a wire. A small welder can also be used to make a basic steel frame. The frame is the essential outline upon which the sculptor holds the materials. To build an armature, the artist can use nails and tacks to build together pieces of woods. The length of the wood should be slightly shorter than the length of the head that the artist intends to make.
The wires are then nailed on a piece of hardboard. To make a round shape as intended, the wires are blended together. The wires are then attached to a central position on the piece of wood. This consists of the basic structure of the head. Knowledge of the right mixing ratios of the plastic material is required for the subsequent stage. This stage involved mixing of the plastic materials.
Mix the plastic materials properly to form a resilient material the moment it dries up. When the plastic material starts reacting chemically and hardening, the next step which involves inserting the hand gently into the mixing materials is started. The aim of this stage is to capture any clumps of solids and breaking them up. This stage also helps by bringing the air bubbles to the surface to ensure uniformity.
The next stage involves completion of the armature. Some old rags are torn into small strips and dipped into a mixer of the plastic. The strips are then twisted around the wire support. This process creates a strong support along the wires, and the sculpture starts to form. The strips are then left to dry. Depending on the humidity in the air, this process takes about an hour. Having done with the armature, the final shell is thrown to form the sculpture.
The versatile material is molded till the general shape of the head is built up. In order to get high quality, significant process control is required in this process. Examples of products that are made using this method are slabs, rods, tubing, and sheets (San Diego Plastics, n.d). Examples of materials that can easily be cast include nylons and acrylics (San Diego Plastics, n.d).
One of the advantages of this process is that the artist can continue to add the basic shape even after the paste has dried up. This is because materials can be mixed and casted onto the areas that the artist feels that some elements have been left out. For example, if the artist feels that the nose is smaller than intended; more materials can be mixed and casted to add up the size of the nose. It is however important to avoid adding up more paste when the earlier one is too dry because it may not adhere well. Grooves can however be cut into the dry paste to increase the level of adherence (Raymond, 1990).
This process is frequently employed in the making of complex and intricate shapes, which would otherwise be uneconomical or difficult to make using other methods (Degarmo, Black, and Kohser, 2003).
The better properties of the products that come from permanent mold casting are usually determined by solidification in the metallic mold. This include: superior mechanical properties, homogeneous chemical composition and grain structure, as well as low gas porosity and shrinkage. In addition, the art forms have good surface quality and low dimensional tolerances (Kopeliovich, n.d).
Alternative Processes
Thermoforming
This process of thermoforming involves heating a cast or extruded sheet, draping it over a mold, in addition to allowing it to cool so as to fabricate a component (San Diego Plastics, n.d).To ensure that the material better conforms to the profile of the mold, vacuum is used to haul the material downwards.
Air pressure can also be used to blow up a shape or a bubble (San Diego Plastics, n.d). On the whole, these two processes call for the softening of the material in order to allow a low force to be applied so as to shape the component (Harper, 1996). Some examples of components made from thermoforming are motorcycle and boat windshields skylights, signs, and bubble packaging (San Diego Plastics, n.d). An example of this process is vacuum forming.
Vacuum forming
Epoxy resin and Crystic polyester can both been used with fiberglass to mold solid castings. Vacuum forming, a method for molding thin plastic sheet, can be used for three-dimensional plastic surfaces. This thermoforming process uses through the application of heat and pressure to mold castings (“Vacuum forming,” n.d).
This is applicable where identical motif is required in multiples for recurrence within a sculptural arrangement, for instance in Oldenburg’s Profile Airflow (1969; New York, Museum of Modern Art); Richard Hamilton also used this procedure to make plastic imitations of the Guggenheim Museum in New York. In the mid- and late 20th century, plastic have been built into a variety of forms of sculpture, assemblage, montage and collage (Edward, 1994).
Vacuum forming (“Vacuum forming,” n.d).
Comparatively deep parts are usually formed when the form-able sheets are pneumatically or mechanically stretched before bringing the sheets in contact with the surface of the mold and before the vacuum are applied (Throne, 1999).
The process of vacuum forming is employed in the production of plastic parts many industries; these include cosmetic, food, medical, entertainment, electronics, toys, household products, automotive, athletic equipment, appliance, clothing, office supplies and packaging industries (“Vacuum forming,” n.d).
Some of the products formed by vacuum forming are inserts, blister packs, clamshells, and trays. This processes’ production time is usually short and this increases the detail-oriented features of production’s time. Many products produced by vacuum forming are sharp and precise detailed, hence making this process a desirable alternative to other molding methods (“Vacuum forming,” n.d).
Some advantages of the process include being economical for petite to medium fabrication units, low cost of tooling, quick startup, and effective prototyping. In addition, there is no need to paint the art forms since texture and color are formed in (“Vacuum forming,” n.d).
Modeling
The modeling is a sculpture process which is additive and it involves materials building up to create/generate a final product/form. It is mostly done on an armature. The sculptor uses their hands to mould the material, which must be pliable.
Matrix molding
This process, which is occasionally referred to as matrix transfer molding, is a practice frequently employed during molding. The process starts with the creation of a firm outer shell. This is then followed by the introduction of a softer and more liquefied molding material into the rigid shell and the model. Matrix molding is regularly used to create intricate shapes from composite materials such as glass/ceramic and glass composites (Mazdiyasni, 1990).
Matched-die molding
According to Mohr et al. (1973) and Agranoff (1975), matched-die molding is among the new processes that are currently in use the process allows for increased automation, and makes use of sheet molding compound (SMC). Molding of complex large art forms is facilitated by SMC.
This includes those that have differences in thickness, sharp radii, molded-in ribs, threads or bosses, comers and inserts. Art forms fabricated by this process have smooth molded surfaces. Many automotive applied products are made using this process (Blaga, 1978)
Injection Molding
Injection molding is a process of art used to make detailed three dimensional art forms (San Diego Plastics, n.d). Placement of the material inside the machine’s hopper (Injection molding machine) starts the process. After the placement, the material is then taken to the melting cavity where it is heated.
Injection Molding (Kailas, n.d.)
When the material melts, it is then taken to the pressured mould, fitting into the cavity’s outline. When the cooling process is over, opening of the mould takes place. Afterwards, the mold is closed and waits for the subsequent shot. During injection, mold clamping is critical since the pressure of the cavity rises to 5,000 psi at times. Usually, the molds are made from hardened steel, epoxy and aluminum and are carefully finished (San Diego Plastics, n.d).
Extrusion
Squeezing toothpaste from its tube can be likened to extrusion. This process brings into being continuous shapes that are two dimensional. The technique is particularly adapted to production of continuous lengths that have constant cross-sections (Gowariker, Viswanathan, and Sreedhar, 2001). Some of these products are gasketing, film, pipe, sheet, and tubing.
The process involves feeding the material into an extruder where it melts and is then pumped out from the extrusion die. The die and the take-off line can control the ultimate aspects and the shape of the cross-section as the material cools. The extrusion equipment is created and regulated to generate melted plastic at very regular pressure and temperature that control the quality and size of the extruded products (Harper, 1996).
Extrusion (Kailas, n.d.)
This process is used to produce bottles, for example the gallon milk bottle (San Diego Plastics, n.d).
Calendering
As noted by Gowariker, Viswanathan, and Sreedhar (2001), the calendering process frequently makes use of four heated rolls that are revolving at slightly distinct speeds. In this case, the material is delivered into the rolls, where it is heated and melted. Shaping of the material into films or sheets then takes place. Many products, commonly made from Polyvinyl Chloride (PVC), are usually fabricated using this process (San Diego Plastics, n.d).
Compression Molding
The process of compression molding usually involves placing a suitable charge of polymer material containing additives into the hollow space of heated male and female mold components (Callister, 2004).
Compression Molding (Kailas, n.d.)
After the material has been poured into the cavity, the mold is closed in anticipation of material cross-linking. Heat and pressure are constantly applied. This makes the plastic material to acquire the preferred mold shape.
Hand lay-up process
The hand lay-up process, which is the oldest technique and the one that calls for a minimal number of equipment, is currently used to fabricate large, hand lay-up and exceptional parts, as well as a fairly small number of miniature components, whose sizes and/or quantities would not validate the cost of production (Blaga, 1978).
This technique entails impregnation of the fiber glass reinforcement using a thermo-settable resin liquid in a gaping mold made from reinforced plastic, wood, concrete, or plaster, and cure is induced at room temperature (Parkyn, 1970; Mohr et al., 1973). A little external or no outside pressure may be applied (Parkyn, 1970; Mohr et al., 1973).
When catalysts are added, cross-linking or hardening of the material occurs at room temperature (San Diego Plastics, n.d).
Filament winding
Filament winding is a process of art forming that is said to be an automated edition of the hand lay-up method (San Diego Plastics, n.d). In this process, support filaments are coated using a resin and subsequently wrap around a mandrel. Layers and orientation’s number is dependant on the component’s bearing weight. Only strong and thin hollow pieces remain after the mandrel’s removal. Some examples of parts made from filament winding are street lighting columns and storage tanks (San Diego Plastics, n.d).
Depending on the size and the intended use of the products, there can be no “perfect substitute” for plastics. Although metals could be melted and cast into several shapes, they are bulky and some are very expensive. Wood can not be a substitute for plastics because it can neither be molded nor withstand high temperatures. All the above materials and processes are environmentally sustainable if proper care is taken when dealing with each one of them.
References
Agranoff, J., 1975. 1975-1976 Modern Plastics Encyclopedia. New York: McGraw-Hill, Znc.
Blaga, A., 1978. GRP composite materials in construction: properties, applications and durability. Industrialization Forum, 9 (1), pp. 27 – 32.
Callister, W.D., 2004. Materials Science and Engineering – An introduction. Sixth edition. New York: John Wiley & Sons.
Cowie, J.M.G., 1991. Polymers: Chemistry and Physics of Modern Materials. New York: Chapman and Hall.
Degarmo, E.P., Black, J.T. and Kohser, R.A., 2003. Materials and Processes in Manufacturing. 9th ed. New York: Wiley.
Dominick, V., 1993. Plastic Encyclopedia and Dictionary. London: Hanser Publications.
Edward, H., 1994. Mechanical Engineer’s Reference Book. London: Society of Automotive.
Engineers, 2001. Polymer Science. Bangalore: New Age International (P) Limited publishers.
Harper, C.A., 1996. Handbook of Plastics Elastomers and Composites. Third Edition. New York: McGraw-Hill Professional Book Group.
Kailas, S.V., n.d. Material Science: Chapter 11. Applications and Processing of Polymers. Dept. of Mechanical Engineering, Indian Institute of Science, Bangalore. Web.
Mazdiyasni, K.S., 1990. Fiber reinforced ceramic composites: materials, processing, and technology. New Jersey: William Andrew Noyes Publications.
Mohr, J.G. et al., 1973. SPI Handbook of Technology and Engineering of Reinforced Plastics/Composites. 2nd Edition. New York: Van Nostrand Reinhold Company.
Throne, J.L.,1999. Understanding Thermoforming. Cincinnati, OH: Hanser Gardner Publications, Inc.
Whitfield, R.M., Brown, F.C. and Low, R., 2007. Socio-Economic Benefits of Formaldehyde to the European Union (EU 25) and Norway. Lexington, MA: Global Insight (USA).
Cloud manufacturing has a tendency to expose the network in unexpected ways. Since the technology is largely untested and experimental, it can present a multitude of issues which need to be combated by an integrated set of security services. It is essential to use the firewall, anti-virus software, content filtering, and virtual private networks. All of these measures are required to protect the vulnerable network nodes from hacker attacks and possible intrusions. That is possible to achieve by utilizing the LAN gateway servers which allow the security managers to filter all the traffic going in and out of the network. Another common design is to create a buffer zone for the network which is used to store and transmit the data which is allowed to flow in and out of LAN. Such setup has the benefit of utilizing two firewalls one outer one with laxer security setting and the inner one which regulates the communications between the LAN users and the servers in the buffer zone, strictly limiting the traffic which is allowed through. This architecture fits poorly into the cloud system, since the elements of the LAN can often require access to vatious resources outside their network, and running too many traffic through the buffer can result in the connectivity issues.
Some other specialized solutions allow for the secure and efficient cloud operation. The specific network architecture offers an ability for the engineers to deploy all of these solutions as part of an integrated system while providing additional security. Security Overlay Network uses virtual architecture to run on-demand software on the third party physical servers. This arrangement allows the security engineers and managers to filter all the information flowing into the network by using a single gateway router. The virtual network conceals the actual architecture of the network. By using security overlay to cover the physical components of the cloud system, it is possible to integrate all of the necessary solutions efficiently. The system can protect communicators, producers, and human users alike. By using the unified protocols, all of the companies operating in the cloud can expect similar user behavior which will improve security. The architecture is also flexible which allows for quick adjustments and responses to new vulnerabilities. Overall, it can be concluded that the security overlay is one of the best possible solutions for the cloud manufacturers which can ensure security and adaptability that system requires (Salah et al. 53).
The core principle of smart manufacturing is “work in progress products, components and production machines will collect and share data in real time” (Shrouf, Ordieres and Miragliotta 698). That means that various systems within the manufacturing network should be able to gather, interpret, and analyze data eventually turning into useful information which can be used to manufacture the goods the customers need. That principle of customization and adaptability applies not only to the production process itself but also to the materials acquisition process and energy consumption optimization. The smart factory will optimize everything to get the best results with minimum resources by processing all of the related information to guide the workflow.
Smart factories are central to the Industry 4.0 framework since the principles of independent adaptability and optimization are the basis of that idea. Connectedness is one of the most important parts of the successful smart operation. All of the machines will be guided by the software infrastructure which will handle the data processing. Moreover, the software must also be able to transmit data to the network, to allow the smart programs to optimize and streamline the production process (Lee, Bagheri and Kao 23). By ensuring that the factory is internally connected, it is possible to achieve full autonomy. Maintaining the connectivity with the customers and suppliers is also important. The factory should be able to place customized orders for the necessary materials and receive the customer data to form the orders for the manufacturing machines. Without connectivity the Industry 4.0 model of smart production is impossible. That makes providing network security for such enterprises one of the top priorities in the future.
The vulnerabilities of the cloud manufacturing systems are similar to those of any other type of cloud network. The key difference is that a hacker has the potential to disrupt the work of the producer facilities causing more damage than in a conventional cloud. That makes securing the access to manufacturing software extremely important. The key vulnerabilities of the cloud manufacturing are account hijacking, traffic flooding, and side-channel attacks. Account hijacking can be performed through a multitude of means. In 2012, the owner of Cloudflare got his account stolen through the use of the fraudulent voicemail box. In that case, the access was promptly restored, but the hacker managed to use the admin privileges to reset user passwords and possibly steal personal data of the cloud service customers (Prince 1). In the case of the cloud manufacturing, such attacks can be even more devastating since the admin privileges can allow the intruder to shut down the production lines or disrupt the material acquisition process. That can lead to the loss of physical resources and failure to meet the production goals. This type of attack is especially dangerous for the cloud systems since they store huge amount of potentially valuable data which is used to run the manufacturing process.
Even if the intruder fails to gain access to the physical resources used by the network, viewing the order details can compromise the user confidentiality and lead to the leaks of crucial information. The intellectual property theft is another possibility. It is important to consider that the CAD files within the cloud have intrinsic value as original designs. They can be even more valuable than the personal info stored in the system. Traffic flooding is another threat especially dangerous to the cloud manufacturing systems. In 2011, a company named LastPass, which specializes in managing and storing passwords using the cloud, reported the unusual server behavior. More data was being transmitted by the servers, compared to the incoming traffic.
The company was capable of resolving the issue by changing the master passwords and ensuring the users took additional precautions. The corporate management reported that the attack was likely linked to an attempt to flood the company servers, causing them to go down and siphoning sensitive user data in the process (Barron, Yu and Zhan 4). This type of attacks can be extremely devastating to the cloud manufacturing systems. Since cloud systems are easy to access, it is possible for a hacker to create multiple accounts and flood the system with requests causing the servers to go down. The cloud manufacturing environment is highly integrated. Analytical software is linked to the production optimization software as well as the end-user interfaces. It means that without proper security precautions flooding attacks can bring down the whole manufacturing management system down by simply bombarding it with requests.
This type of attacks is mostly easily avoidable but can be so devastating to the smart factories that all potential vulnerabilities must be addressed during the pre-implementation risk assessment. The final threat is the side-channel attacks. This type of malicious activity is unique to the cloud manufacturing. It uses the resources of the cloud system itself to attack other users, disrupt the production process, and steal information. For example, one manufacturer who is using a similar production process to their competitor can reserve additional equipment to prevent the competing company from utilizing it (Wang et al. 4). In another example, the company can use the production schedule to determine certain qualities of the unreleased product by analyzing the machinery usage based on the requirements of various production technologies. If creating an opaque piece of glass requires ten more minutes than creating a transparent one, that knowledge available to all users can be used to gain a competitive advantage through a side-channel attack. This threat is unique, since the actions of the violator, while unethical, are completely legal. Eliminating this threat should be a part of the initial design process when creating a cloud-based manufacturing system. If the issue is not addressed during the setup, eliminating the possibility of the side-channel attacks later can be a task requiring a full overhaul of the end-user interface and order placement process.
Any smart factory can benefit from a secured LAN. Considering the potential damage hacker attacks can cause, it is crucial to ensure that the internal networking of the production facility is inaccessible to intruders. With a large variety of potential risks complemented by the fact that a cloud-based system is always more vulnerable makes LANs a preferable solution for the internal networking. Since the external applications present the hackers with more avenues for attack, filtering data and monitoring security are the crucial aspects of maintaining connectedness without compromising the necessary data exchange. For example, the system proposed by Babitha and Mathey allows the LAN administrator to control the data access by the cloud users (173). The project underlines the importance of the systems which control the data access within the cloud.
Without proper user access management, the smart factories risk compromising intellectual property and personal data of their customers. Such control programs require a secure network to be running properly. Otherwise, there exists a possibility of users accessing unauthorized data by exploiting the weakness of the IAM program by abusing the weaknesses of the local network. Secure LAN installations will allow the big factories to secure the personal data and prevent intrusions into the manufacturing process. Security Overlay Network also requires a secure LAN to run properly. If there are vulnerabilities inside the internal network, it is impossible to use the gateway router to effectively manage security (Salah et al. 54). It is also worth noting that many network vulnerabilities are connected to the human factor. Implementing a consistent and coherent set of security policies can minimize the risks. The secure and well-managed LAN ensures that the employees have less of a chance to compromise security. It also guarantees that it is impossible to gain the access to the production equipment from outside the network by using social engineering to target the factory personnel.
There are several obvious steps which need to be taken to ensure that the 3D-printed product is produced accurately, and its quality is satisfactory. Firstly, the compatibility of data protocols must be assured. The printer should be able to use the file format provided by the customer. Secondly, the quality of the model should be high to ensure that the process yields the required results. In fact, most of the modern CAD programs produce 3D modeling errors which need to be fixed before the printing process can begin. Ensuring that the model is properly processed beforehand is an important part of the production process. Other than that, it is crucial to select the proper printer and materials for the desired product. 3D printers are widely used in medicine, and the study of the bone grafts production shows that such factors as printing orientation and layer thickness can have a considerable effect on the resulting product (Farzadi et al. e108252). It can be deducted, that the quality and accuracy of the data used for the input plays a crucial role in determining the quality of the final product.
In the fields less demanding of the finesse than medical science, the data can be less detailed, but it is important to program the printer accordingly to receive proper results. For example, electing the appropriate support style and material can have a considerable effect both on the quality of the product and the amount of post-printing work needed to finalize the model (Lawrence par. 7). Ensuring the uninterrupted manufacturing process is also important since the power supply disruptions can lead to the mistakes during the production. Regular maintenance also plays a crucial role in the effective operation. Malfunctions, like filaments getting stuck, or the working area pollution with sand or dust particles can stop the production or negatively affect the accuracy of the final model. If the factory is utilizing the array of printers, it is also important to choose the right one for each order to use the available resources efficiently and provide the high-quality products. Different models have varying resolutions and ensuring that the model is printed out accurately is important. It is also crucial to divert less demanding models to lower resolution printer to ensure that the operation is running efficiently.
Architectures of the LAN
Cisco Packet Tracer is a network simulation program. It uses drag-and-drop interface which allows the user to easily add or remove devices from the simulated network. The working area can be used to place the objects within the network arranging them in a logical fashion. Various tools allow the user to draw connections between the elements of the network and display properties of each object. These properties can be modified to ensure compatibility and connectivity between the elements. The application is highly useful for designing complex networks and determining the most effective configurations.
Additionally, Packet Tracer allows multiple users to work together. It ensures that the teacher can work with students, or several students can work on the same project connecting their network together. Aside from the educational uses, the simulation can be utilized to plan the network and run the preliminary risk assessment. The program can simulate a wide range of Cisco routers and switches, as well as other devices. It allows users to visualize the data exchange within the network and simulate Ethernet and Wi-Fi connections. The interface is highly flexible and allows students to view full network information (Smith 6). That makes the program effective for the education as the resulting network can be analyzed extensively. Packet Tracer also allows the teachers to formulate the assignments for the students and work together with them to explain the subject and clarify certain points.
WANs have the advantage of easier connectivity by allowing the computer to interact directly with any other node in the network which can be in any part of the planet. However, for the business solutions utilizing direct WAN connections is less than advisable. WANs rely on the provider equipment and security software, which makes using them extremely dangerous. Even if the WAN is company-created, it is vulnerable by its nature since a large number of components and their interconnectedness presents a much larger number of opportunities for the attacker. WAN connections are easier to attack and tend to have higher latency. Using the LAN to connect the computers and equipment within the organization is advisable since LANs centralize the security management and provide the highest possible connectedness between the network nodes.
CAD file, like any other piece of information, is at a greater risk when transferred through the WAN. While in the local network the connections are limited and traffic is monitored, the WAN transmission can be intercepted at any of the servers the file goes through. Security in the wider network is harder to implement and requires a wide range of solutions on every direct connection to the network (Powell and Gallegos 2). In the LAN, the risks are lower since the security can be tightly managed and maintained in a centralized manner. However, the human factor is the common threat in any network and outgoing connections linking LANs and WANs can present an opportunity for hacker attacks. Implementing proper encryption protocols can allow the security specialist to mitigate that risks and prevent the intruders from siphoning valuable information. Partial encryption algorithms transmitting the encrypted data step by step can ensure high levels of protection (Cai et al. 259).
External attackers target the LAN from outside the network. They use various strategies to gain access to the internal resources through the router or server which is used to connect the network to the WAN. They can, for example, gain remote access to LAN security management by using social engineering to create the remote console which will allow them to change the security settings or plant spyware. They can also abuse the security oversights to join the VLAN used to manage the switches in the Ethernet network (Kiravuo, Sarela and Manner 1481). After becoming a part of the security network, it is easy to gain access to the user data including passwords and IP addresses. Tactics like flooding attacks can also be used to bring down the central server or switch. However, local networks are far more vulnerable to the internal attacks which are preformed from within the network. This type of attacks requires the intruder to have physical access to the element of the network. They can use various strategies to gain control over the LAN and steal data. A new element can be introduced to the network, for example, a computer which can be remotely accessed through the wireless connection.
After the device has access to the network, the hacker can utilize the software installed on the computer to interact with the network and compromise its inner security. Since the traffic within the network is generally not filtered, such attacks can be much more harmful than the external ones. Physically rebooting a switch within the network can be used to reset the passwords and gain access to it. This type of attack is easily traceable and risky for the intruder but can allow them to inject spyware into the network. If the violator manages to gain direct physical access to the central server or router, he can simply destroy it, bringing down the network. Alternatively, he can directly connect to it, creating a tap which can allow him to monitor the inner traffic of the network and potentially gain access to the full array of the security management tools. Wireless connections within the LAN make it considerably more vulnerable since they can potentially be accessed by third parties without trespassing on the company’s property. Wireless encryption protocols have been shown to be unreliable and can present a huge security threat. Utilizing wireless connections as a part of your local network is a risk, and an extensive assessment is required before such system can be implemented.
Nmap software is a tool which allows hackers and security testing specialists to penetrate networks by performing scans and finding vulnerabilities. The program is able to scan the target network to discover active IP addresses within it and then initiate the open port testing. The address resolution pings are used to determine the activity of the system elements. It is also possible to use ICMP echoes and DNS queries to avoid the traffic being blocked. If the network is utilizing a secure setup with both external and internal firewalls which provide double protection for the network members, Nmap is capable of creating a proxy node within the buffer zone of the network which is then used to ping the ports and gather the responses without being detected. The application is capable of using banner-grabbing and port response analysis to determine which service the port is being used for.
The program aggregates all of the data acquired into the visual topology of the network which can be used to scan for vulnerabilities, gather data on the internal network traffic or attempt brute force and denial-of-service attacks. The program comes with an integrated scripting tool which allows the user to design their own algorithms for the security checks and intrusions alike (Hutchens 12). The program can be used to compromise the security in a variety of ways. Firstly, the knowledge of the inner topology of the network can expose its weaknesses which can be used for future attacks. Secondly, the program can be used to execute denial-of-service attacks which have the potential to bring down the entire network by targeting specific nodes within the system. Finally, Nmap can be used to track the amount of traffic going through the network and deduce which services use it. That information, by itself, can expose valuable details about the workflow of the targeted company. Nmap is a versatile tool and can be used for penetration tests as well as for actual intrusions. It allows the hacker to get a complete map of the targeted network and execute attacks on the vulnerable parts of the system.
NetBios is the service used by the Windows OS to exchange data in the LAN. It uses TCP ports 139 and 445 to connect to the resources outside the computer, like file servers, printers, etc. Unfortunately, the protocol creates a critical vulnerability. The intruder may utilize various probing techniques to detect the active ports within the network. For example, the Nmap application, which I mentioned before, can be used. Once the hacker detects the activity of one of those ports, he can use footprinting techniques to gather the information about the user and the network. NetBios makes it extremely easy. That can be as simple as using the NBSTAT command to gather the information about the computer and the network.
Since NetBios does not conceal any information, the attacker will receive full data on the user’s computer, operating system, browser, connection type, and so on. With that information, it is possible to create the network topology and even connect to the target device, if the null responses are allowed. The hacker can also gain access to the carefully concealed inner IP addresses of the LAN (Olzac 2). Another possible method includes spoofing the network response. If the NetBios functionality is enabled, when the Internet Explorer query fails, it will be redirected to NetBios. The system is so insecure that it will send all of the credentials to the attacker if the user mistypes the network name. The hacker only needs to set up a copy of the page which the browser is trying to access and wait for somebody within the network to mistype the request. That will redirect the program to the hacker allowing him to acquire all of the user information (Zdrnja 1). Generally speaking, these attacks can be prevented by turning off various NetBios services especially null sessions. This approach does not guarantee the complete security, but some modern solutions allow the engineers to avoid using NetBios entirely eliminating the concern.
The networks are complicated systems which can be affected by the wide range of issues. The debugging process serves to detect and eliminate those issues. Since many network problems can affect the security, using the debugging tools can reveal many vulnerabilities and potential threats in the system. For example, some node might be susceptible to increased load and present a target for the denial-of-service attacks, or some PCs might not update the security policies correctly resulting in vulnerabilities. Most of the tools required to identify the network issues can be accessed through the Windows command line.
These include the ability to ping various devices, track active ports, and view specific IPs linked to the DNS servers. Diagnostic tools prebuilt into the routers and switches can also be used for troubleshooting. The survey shows that these methods are still the most widely used debugging tools (Zeng et al. 2). Currently, more complex and comprehensive solutions are required for the efficient network management and security issue analysis. One possible application is the program named SecGuru, which allows analyzing the policies across the network to ensure consistency. The tool can be used for the general survey of the network providing a complete set of data which can be used both for troubleshooting and improving security (Negi et al. 384). Such solutions can be used to improve any network.
VMWARE can be used in a variety of ways to improve network security. Firstly, the virtual machines allow for a safe and easily observable environment that can be used to study malware and test various intrusion methods. Similar systems can be used to educate the security specialists on the intrusion types and the telltale signs of the ongoing intrusion. Secondly, using virtualization allows the security specialists to implement innovative solutions for network monitoring and control. A good example is the Network Overlay system which utilizes a virtualized network to track and manage the data access within the physical network. One of the principle advantages of the virtual systems is their isolation.
The system runs in a simulated environment instead of the actual network allowing for additional security measures which can intercept and stop the attempted attacks. For example, lightweight virtual machines can be used on the mobile devices, which will make them more secure and prevent eavesdropping and intrusions through the poorly secured mobile channels (Lombardi and Di Pietro 246). Moreover, the malware requires specific configuration to escape the simulated environment. Currently, the level of isolation is not ideal. Hackers are able to break out the virtual machines and allow them to interface with the actual network. However, the study shows that VMWARE has a positive effect on the information security (Li et al. 8).
Works Cited
Babitha, Pallaty and Ravi Mathey. “Measurable, Safe and Secure Data Management for Sensitive Users in Cloud Computing.” International Journal of Research in Engineering and Technology 3.9 (2015): 171-174. Print.
Barron, Chimere, Huiming Yu, and Justin Zhan. “Cloud Computing Security Case Studies and Research.” Proceedings of the World Congress on Engineering 2 (2013): 1-5. Print.
Cai, X.T., F.Z. Hea, W.D. Lib, X.X. Lib, and Y.Q. Wua. “Encryption Based Partial Sharing Of CAD Models”. ICA 22.3 (2015): 243-260. Print.
Farzadi, Arghavan, Mehran Solati-Hashjin, Mitra Asadi-Eydivand, and Abu Osman. “Effect Of Layer Thickness And Printing Orientation On Mechanical Properties And Dimensional Accuracy Of 3D Printed Porous Samples For Bone Tissue Engineering”. PLoS ONE 9.9 (2014): e108252. Print.
Hutchens, Justin. Nmap: a “Hacker Tool” for Security Professionals, 2014. Web.
Kiravuo, Timo, Mikko Sarela, and Jukka Manner. “A Survey of Ethernet LAN Security.” IEEE Communications Surveys and Tutorials 15.3 (2013): 1477- 1491. Print.
Lawrence, Jon. 3D Printing Material and Support Build Options, 2015. Web.
Lee, Jay, Behrad Bagheri, and Hung-An Kao. “A Cyber-Physical Systems Architecture For Industry 4.0-Based Manufacturing Systems”. Manufacturing Letters 3 (2015): 18-23. Print.
Li, Shing-Han David C. Yen, Shih-Chih Chen, Patrick S. Chen,Wen-Hui Lu, and Chien-Chuan Cho. “Effects Of Virtualization On Information Security”. Computer Standards & Interfaces 42 (2015): 1-8. Print.
Lombardi, Flavio and Roberto Di Pietro. Virtualization and Cloud Security: Benefits, Caveats, and Future Developments, 2014. Web. 07 May 2016.
Negi, Vivek, Himanshu Verma, Ipsita Singh, Aditya Vikram, Kanika Malik, Archana Singh, and Gaurav Verma. “Network Security In Embedded System Using TLS”. IJSIA 10.2 (2016): 375-384. Print.
Olzac, Tom. The problem with NetBIOS, 2007. Web.
Powell, Steven and Frederick Gallegos. Strategies for Securing Wide Area Networks, n.d. Web.
Prince, Matthew. The Four Critical Security Flaws that Resulted in Last Friday’s Hack, 2012. Web.
Salah, Khaled, Jose M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla and Mohammed Alzaabi. Using Cloud Computing to Implement a Security Overlay Network, 2013. Web.
Shrouf, F., J. Ordieres, and G. Miragliotta. “Smart Factories In Industry 4.0: A Review Of The Concept And Of Energy Management Approached In Production Based On The Internet Of Things Paradigm”. 2014 IEEE International Conference on Industrial Engineering and Engineering Management (2014): 697-701. Print.
Smith, Andrew. “Development Of A Simulated Internet For Education”. Research in Learning Technology 19.1 (2012): n. pag. Print.
Wang, Weichao, Yu Wang, Wesley Williams, and Aidan Browne. Secure Cloud Manufacturing: Research Challenges and a Case Study, 2015. Web.
Zdrnja, Bojan. Is it time to get rid of NetBIOS? 2012. Web.
Zeng, Hongyi, Peyman Kazemian, George Varghese, Nick McKeown. A Survey on Network Troubleshooting, 2012. Web.