The use of wireless networks, or Wi-Fi as many people call it, provides a wide range of benefits to a workplace. However, due to the various drawbacks, organizations cannot rely entirely on wireless transmission as a source in the workplace. There is a wide range of problems with wireless connections.
The most significant risk of using a wireless network is security. Since these connections are cordless, controlling network access at any specified time is difficult. A wireless connection is more exposed to attacks by unauthorized users. To help combat issues with security, organizations should use preventative measures such as authentication through MAC address filtering and encrypted passwords (Kobayashi et al., 2019). Transmission speed is also another issue affecting the wireless network. The connection can be slower and less efficient in some areas. The signal transmission is less reliable and can be blocked by objects like walls and hills. Adverse weather also affects the signal strength of wireless connections. Wireless network connections are difficult to set up and install. The process typically requires technicians with knowledge of electromagnetic signal transfer.
The Israeli hacker scandal is an example of complete operation disruptions due to wireless network failure. In 2016, an Israel-based internet hacker took over an entire citys Wi-Fi Amihai Neiderman spotted an internet hotspot and wanted to test its security strength. He performed various disconnections on the router through access points and interfered with the IP addresses of the network. He disconnected the internet and scanned for open ports realizing that the router was serving a web-based login interface port 433 (HTTPS). This shows how insecure a wireless connection can be.
This paper primarily aims to give a better understanding of Radio Frequency Identification. RFIDs have spread their wings around the globe, and their benefits are numerous.
The paper first talks about how they have saved businesses money and time in managing their assets and inventory and how they have become dynamic substitutes to barcodes over the period.
Secondly, the paper talks about the vast impact RFIDs are having on companies and industries, how they are being used for various purposes in different industries and how these industries have benefited from them.
Lastly, the paper talks about the importance of integrated RFIDs. Since companies are now interlinked together and also work together to achieve common goals, RFIDs should be implemented across the supply chain to achieve the greatest efficiency and accuracy.
Based on your background readings, what makes RFID such a big deal in managing production and inventory?
Ans1. RFID is a major player in the field of production and inventory management. The systems based on RFID provide a piece of accurate information related to product and inventory levels at thousands of firms and retail outlets across the globe. Production and inventory systems start from the factory or supplier and end at the retailer. RFID provides an end-to-end supply chain through which every single product is monitored and controlled from production till it reaches the consumer.
RFID has become a dynamic substitute for bar codes in many places. All this hype has various reasons to it; RFID systems are powerful, compact, flexible, and can carry extensive amounts of information regarding products and inventories. The use of state-of-the-art wireless technologies is used to track products, inventory, and even equipment in a flawless manner. RFID provides a platform for businesses to engrain a fully automated data securing and analysis system that helps businesses keep track of their resources, whether it be inventory at a cell phone manufacturing company or a fleet of vehicles for a flower delivery firm. Where optically based systems lack, RFID provides logical solutions to various logistical problems. As compared to bar codes, RFIDs do not require a line of sight, have an extensive and portable database, tracking is conducted in real-time, and multiple tags can be read/wrote simultaneously.
Moreover, RFID technology, although being the latest, is still evolving and becoming more affordable. New innovations are also coming up, for e.g., a weather and traffic update system for truckers and delivery vehicles. This would enable them to avoid heavy traffic and re-route as per weather and traffic conditions. Therefore, RFID is a very effective and efficient system, and companies worldwide are using these systems to work towards their goals, including tracking and authenticating valuable assets, managing aviation baggage handling, manufacturing processes, etc.
What is the nature of the impact that RFID is having on industries and on individual companies within those industries?
Ans 2. RFID has a major impact on various industries and their respective individual companies in a variety of ways.
The benefits are reaped excessively by the retail industry, for e.g., the German retailer Metro which has thousands of different products, RFID tags are used to monitor inventory flows, deliveries, expiry, etc. The transport sector uses RFIDs to track vehicles, trucks, aircraft, etc. For e.g., the system enables cars to be tolled on various roads automatically using the transponders and receivers attached to the respective roads and vehicles. In agriculture, RFID is used to track the movement of animals, their health, age, and various other data. Almost all manufacturing industries ranging from pharmaceuticals to textiles are using the technology to streamline their processes, eliminate redundancies, control and monitor inventory, production, and also processes. RFID is also particularly important in the distribution sector; it provides visibility at all levels, eases registration processes, improves accuracy and authenticity. RFID is also swiftly entering the aviation, consumer applications, security, healthcare, and transport sectors.
All in all, RFID impacts all industries in a positive manner. It saves sales personnel expenses and the time to check inventory repeatedly by eighty percent, and it provides greater authenticity and accuracy complemented by reduced costs and operational productivity. It also provides emphasis on accurate and updated expiry dates, lot and batch tracking, and improved returns management infrastructure. At the operational level, operational productivity is enhanced, shipping is monitored and controlled, and receiving accuracy is also guaranteed. Moreover, product and consumer security and safety issues are also addressed. RFID supports anti-counterfeiting measures and theft or shrinkage management. As a result, the cost of goods sold is decreased considerably, and the improved asset and inventory utilization can have several beneficial results on company financial statements.
Given the current, rapidly changing logistics environment, to what extent do you think a company can afford to go it alone when making choices about managing its inventory and production?
Ans 3. As per the question, given the current, rapidly changing logistics environment with extensive collaboration between suppliers, distributors, and retailers in the form of networking and various other linkages, it would be unfeasible for a company to go it alone when making choices about managing its inventory and production.
Although many successful RFID pilots are used by single companies, with no collaboration with other supply-chain partners, the full benefits and returns can only be realized when all the different supply-chain partners work together. This is the primary reason why large retailers such as Wal-Mart are encouraging suppliers to implement RFID. Thus, RFIDs value is realized only when companies work together in the form of information sharing, analysis, and joint decision making.
References
Lauren R Hartman. (2005). RFID in the consumer goods supply chain. Packaging Digest.
Patrick M Bryne. (2002). Supply Chain RFID: Lessons from a leader. Logisitcs Management.
Patrick M Bryne. (2002). RFID: Not just for Wal-Mart. Logisitcs Management.
Shepard Steven. (2005). RFID Radio Frequency Identification. Illustrated. Mc-Graw Hill Professional.
Over the recent past, the concept of using wireless sensor networks has gained popularity in the world of technology, because of the numerous applications and systems, which are dependent on it. Although this is the case, just like any other technological idea, this technology has its own challenges, which in most cases result, because of insufficiency of energy and scarcity of non-renewable resources.
However, to curb these challenges, numerous developments, for example, the convergence of computing and communications and the coming up of low-power VLSI, has made this innovation a reality. This paper will discuss what the technology of wireless sensor networks entails and its common topologies and applications.
Introduction
The wireless sensor network is primarily composed of spatially circulated independent sensors whose main function is to ascertain the level of physical quantities, for, example pressure, sound vibrations, the level of hotness or coldness, movements, and sometimes the amount of pollutants in the air (Stankovic, 2006, pp. 1-2).
Recently, it has established its way into a wider variety of applications and systems with infinitely varying requirements and distinctiveness. Wireless sensor networks primarily came into existence, because of the need of the armed forces to have systems that could help to know when an enemy is in their territories.
Later on, this technology stated to be used in a number of industrial and consumer applications such as industrial processing, monitoring and controlling of machines, and in hospitals as a mechanism of monitoring and controlling machines (Raghavendra, 2006, p. 17).
Wireless sensor networks are primarily comprised of numerous nodes, which in most cases depend on the size of the system. Every node is connected to one or more sensors (Raghavendra, 2006, p. 30-33). These sensors are primarily a form of network node with a microcontroller, radio transceiver, and a sensor node.
As a result of its importance, this technological innovation has become a real commodity in the present world; hence, the nature of significance it is given in the world today (Akyildiz, Melodia, & Chowdhury, 2009, p. 7).
Wireless Sensor Network Topologies
Point To Point Topology
This type of a topology is the simplest of all the topologies. It is a permanent link between two points. Every single sensor node under this system must have a different bent and protected couple of wire connection. Primarily, it is a type of normal telephony that relies on unrestricted mode of transferring signals among the duo.
As compared to others, it is very dependable, because it has one malfunction, which primarily involves the host itself. It is of two different kinds; dedicated, which is the easiest to understand and the user is permanently associated with the two endpoints, and switched that is also known as circuit or packet switching.
The latter is set up dynamically, after which it is dropped when it is no longer needed. It is costly, because it has a difficult configuration management and almost all the information processing is entirely done by the endpoints (Raghavendra, 2006, p. 34).
The Bus Topology
This topology is made in such a way that, every single node is interlinked to one bus cable and a information from the primary source moves in either way and this information must pass through all the sensors, which are attached to it up to that time that the information will reach its designated endpoint (either a node or a device).
If for instance the machine signal does not match the projected address of data, the sensors will ignore the data (Kosmerchock, (n.d), pp. 1-2). This topology is easy to implement, install and extend.
Also, it is less expensive, easy to manage and cost effective, since it uses a single cable. However, it is limited to the length of cable and number of connections; hence, it makes one to work with a limited number of nodes (Kumar, 2009, p. 9).
The Star Topology
Under this topology, network nodes are connected to a central hub with a point to point connection. The network does not necessarily look like a star as the name suggests, but all the nodes of the network must be connected to one central device. Therefore, all the information that traverses the network has to pass through this central hub, because the hub acts as a signal repeater (Akyildiz, Melodia, & Chowdhury, 2009, p. 10-11).
This topology is considered as the easiest to design, because it has better performance, since it does not allow passing of data packets through an excessive number of nodes. It also isolates all devices in the network; hence, preventing non-centralized malfunction from disturbing the whole network.
However, failure from the central hub renders the whole network useless, since there is a very high dependency of the system on the functioning of the central hub (Kumar, 2009, p. 15).
Ring Network Topology
It is an organisation that is almost circular; whereby, information is transmitted in one course, because each node helps to repeat the signal. This is the case because the signal has to remain strong up to when it reaches its required destination.
It is mad in such a way that all the required data travels in using a single path, and every node does the work of duplicating the signal up to that point when the required information arrives at the targeted point. Therefore, each sensor is made up of a receiver, which is required to receive the signal and a transmitter that should convey the information to the subsequent sensor in the system.
It is considered to be the most orderly network, because it performs better than a bus topology under heavy network load and it does not require any central node to manage the connectivity between computers (Raghavendra, 2006, p. 41).
The most recent ring topology has a back up ring that boosts the main ring in the system. Setbacks of this network are that, the information delays and malfunctioning of one of the nodes can affect the whole system.
The Mesh Topology
This topology was originally developed for military applications, but over the past decades, its cost, size and power rations have made it to be used in radios (Akyildiz, Melodia, & Chowdhury, p. 18). This type of networking involves every node on the system being able to capture and spread its own data and serve as a transmitter to other nodes at the same time.
In other words, it must collaborate in order to propagate its own data in the network. This kind of system can only be designed by employing a flooding or routing technique. Either way, all the available paths must allow continuous connection and reconfiguration in both broken and blocked paths, which are commonly called healing algorithms.
The only disadvantage with this network is that, it is has a wizzy distal courier and delays in the system (Kosmerchock, (n.d), p. 3).
Tree Network Topology
It borrows the idea of the star topology, but is a central root node say, which is ranked highest and it is connected to one or more nodes in such a way that each of them is one level lower in the hierarchy. Hence, it has a point to point link between each of its nodes (Akyildiz, Melodia, & Chowdhury, 2009, p. 19-20).
The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point of the organisation. As a result of this unique connection, sometimes the tree topology is defined as a combination of the bus and star topology. So far it is the most preferred type of network (Raghavendra, 2006, p. 45).
Applications of Wireless Sensor Networks
Wireless sensor networks have a variety of applications, which have completely revolutionized the world. One of the main applications is in area monitoring. This technology is the most common application that is used to monitor movements, more so in restricted areas. For instance, the military apply these sensors as a method of identifying an opponents invasion, while other individuals apply it to examine a geo-fencing.
This technology is also of great significance when it comes to checking air pollution, because it has been applied in numerous urban centres to check the amount of dangers, which may result due to these harmful substances in the air. Another common application is the use of this technology in forest fire detection.
The nodes are installed in the forest to monitor the situation in case of a fire; whereby, using the nodes, it is possible to control humidity, gases, and the temperature that is produced forest fires. On the other hand, this technology has found wide application in green houses.
In conservatories, the wireless network sensor nodes can be used in controlling the temperature and humidity levels; whereby, they are set in a way that they are able to notify the manager through e-mail or a phone text message in case any of these parameters fall below or rise above certain required levels (Mattern and Romer, 2004, pp. 4-8).
Conclusion
In conclusion, although this technology has it its own disadvantages, wireless sensor networks have numerous applications that are very important in the world today. As research studies show, the future of wireless sensor networks is promising, as there are numerous researches undertaking to reduce any delays and expenses that are associated with this development (Raghavendra, 2006, p. 56 and Kumar, 2009, p. 4).
In order to make this technology more efficient than it is today, it is necessary for engineers and the involved parties to do more research work and implement measures, which should ensure that lower-power communication hardware, micro-controllers, and better energy saving devices are made.
Reference List
Akyildiz, I. F., Melodia, T., & Chowdhury, R. K. (2009). A survey on wireless multimedia sensor networks. Broadband and Wireless networking Labaratory, School of Electrical and Computing Engineering, Georgia University of Technology.
Kosmerchock, S. (n.d). Wireless Sensor Network Topologies. Web.
Kumar, S. (2009). Considerations in Wireless Sensor Networks for Telemedicine. Proceedings from SPIE ITCOM Conference, Sept 2003-2009.
This shift from paper based on electronic record keeping is very well informed. Adopting wireless and mobile technology will improve the doctors and nurses efficiency and lessen their workload. However, this technology comes with a number of challenges and risks (Kim, 2010). Some of these risks affect the patients wellbeing. This makes mitigation of these risks a priority. Here is a detailed report on the risks involved in this shift and recommendations on how to mitigate them.
Wireless networks in this case can be used with such handheld devices like PDA phones, PDAs, handheld PCs, laptops, and tablets. The first risk that is specific to wireless technology is infiltration of an access point. If the access point of a wireless network is left unsecured, unauthorized people can gain access to the networks resources. This can in turn pose a risk to the integrity and confidentiality of patients information.
Wireless devices that are not secured increase the chances of a hacking. If a hacker accesses a wireless device, it makes it easy for him/her to gain entry into the networks resources using an unsecured interface. In addition, unsecured devices are susceptible to MAC flooding attacks (Alexander, 2009). These kinds of attacks affect the networks performance. Wireless networks also come with the risk of jamming.
This occurs when there are other wireless networks operating within the same area. Overlapping frequencies are the main cause of jamming wireless networks. Hand held devices come with the risk of man in the middle attacks. This happens when an attacker forces another device between an end device and the access point.
This attacker can then be able to access the network resources. This is because the attacker records every transaction done by the end device through the network. Wireless networks use authentication methods that can be compromised. The WEP keys that are used by most wireless networks can be compromised through monitoring or sniffing attacks. When this happens, the encrypted data sent through the network can be decrypted.
Each of the above problems can be mitigated using several measures. The first measure involves putting in place an efficient user authentication method. Several internet security standards recommend different authentication methods. Any of these methods can be used depending on the required security level. Another way of minimizing security risks is using higher-level protocols to secure network resources.
An example of such is the virtual private network protocol. Avoiding unnecessary coverage of a wireless network minimizes the risk of intrusion. Wireless networks that can be detected away from their intended range can easily fall prey to attackers. All hardware devices should be properly secured limiting their accessibility only to a network administrator.
The office in this case consists of three doctors and two nurses. Its location is in the midst of other offices. Therefore, it is recommended that an extensive site survey be conducted before deploying the wireless network. This will make sure all sources of interference are discovered beforehand because they may later affect a networks performance. They should also make sure that all the equipment used for the wireless network is within their jurisdiction.
This reduces the chances of attacks instigated through hardware access. The doctors should also make sure that the type of authentication used is robust. The technology and devices used should be up to date. This is because outdated technology poses a higher security risk (Retterer, 2004). Implementing wireless networks and purchasing mobile devices is not cheap. Therefore, this office should make sound financial considerations before embarking on this shift.
References
Alexander, J. (2009). Securing your wireless network. AAOS Bulletin, 51(2), 23-25.
Kim, D. ( 2010). Fundamentals of Information Systems Security. Boston, MA: Jones & Bartlett Learning.
Retterer, J. (2004). Securing wireless technology for healthcare. Journal of AHIMA, 75(5), 56-58.
Wireless networks have higher flexibility as compared to wired networks due to the lack of trunking and cabling in the networks. Both desktop computers and laptops can be fitted with wireless cards which enable the machines to be connected to the net. To connect the machines, various protocols are applied to enhance the proper connection of various standalone machines. Wireless networks have their problems at the same time when compared to wired networks.
When wires are used, some protocols like the Ethernet are allowed to use dedicated wires which go hand in hand with the dedicated medium that can avail the transmission and consequent reception of data. This allows the network to be able to transfer data at a higher rate than the wireless networks. In the case of the wireless networks, the radio frequency in which the network is tuned is the only medium. This limits the mechanisms which the network is using for access control (MAC) (Butala, Tong 2005).
In all networks, CSMA (Collision Sense Multiple Access) is used to access the network medium. Wired networks use collision sense multiple access with collision detection (CSMA/CA) whilst the wireless networks use collision sense multiple access with collision avoidance (CSMA/CA) (Ergen, Lee, Sengupta, 2003). The key difficulties of wireless data transmission are the encoding of the data, speed of transmission, access of the hidden nodes through stations (hubs), overcoming of the cyclic transmissions caused by transmission errors and failures. The offered technologies and protocols involve the key solutions of the stated problems, however, some of them originate from other problems. Hence, the paper aims to assess the data transmission protocols and define the weaknesses and strengths of each protocol.
Token-based protocols
Token-based access control protocols have been there for some time now. Some protocols that put into practice a comparable access control system are the Frottle which is open source, as well as Wireless Cyclic Token Protocol (WiCTP), Wireless Token Ring Protocol (WRTP). These protocols generate a master/main node that is used to control the access to the network medium by bringing into play a token that is switched over between the nodes on the particular network.
Client nodes queue the data packets that they are obliged to send. At the time that they receive the tokens, they send the queued packets by the data that is contained within that token. This technique is very straightforward and successfully eliminates the concealed node crisis at the same time as increasing the stability of the network since two nodes cannot move at any one point in time.
System models of the data transmission networks may vary, however, the key aim of the network is to perform the reliable and stable data-transmission process. Because MAC, Data Base Management, Admission Control and Information Access Management are the key aspects of the wireless network creation, most of the existing protocols involve these aspects as the basic features for reliable work. Nevertheless, some of them are not suitable for wide application and data coordination, due to various reasons. These reasons are closely linked with the multitude of parameters that need to be adjusted for any particular data-transmission instance, which is not suitable for everyday use.
Frottle
As in the case of Frottle, expansion of WiCCP seems to have come to an end. The latest release accessible as of 2004 is version 0.5, accessible as both a Linux kernel module and also as a Windows XP driver. Thus, it is further attractive to wide-ranging users seeing that Linux is not required to utilize the protocol. Unfortunately, the Windows driver only sustains the client mode, but this is still a bit more preferable to Frottle, which has many supplementary dependencies.
This is a Linux-only execution of a token-based access control mechanism. It at present relies on the Linux kernels IPtables abilities of packet filtering to control the access to the network, and it uses the Transmission Control Protocol and Internet Protocol (TCP/IP) stack to be in touch between the master and also the clients. It runs as a userspace application and utilizes the IPtables QUEUE rule which is set to queue some packets for transfer (Luo, Lu 2005).
The Frottle wrap-up communicates amid the master and the client nodes using TCP/IP port 999. This is a key disadvantage, in view of the fact that its reliance on both TCP and IPtables confines its portability. Without IPtables, Frottle has no efficient way of controlling the packet queuing, and also without a TCP/IP stack, it cannot correspond between the nodes. For any embedded structure wishing to run the Frottle protocol, they must have the TCP/IP stack and also the IPtables modules which should be compiled into the kernel, which adds to the size of that kernel spectacularly (Aad & Castelluccia 2001).
While TCP/IP would approximately certainly be amassed into any networked structure, IPtables can boost the required sizes by many KBs, a serious distress for almost all embedded systems. The Frottle wrap-up also lets unrestricted right of entry on port 999, a noteworthy weakness. If one more server runs a tune-up on port 999, a client who is part of the Frottle ring can be able to circumvent the token access control and hence directly access that service.
This can realize a spectacular drop in routine and in cases where that service is heavily in use, allows the hidden node problem to reappear. While port 999 is not in use by any typical network service, a client could have the capability to circumvent the access control on that network to be able to achieve a higher feat at the expense of the other users on that network. Frottle does not include auto-detection of the master nodes. Thus, each of the nodes must be set individually, and thus have at least one single network crossing point of the same subnet as in the master sequentially to swap over control packets.
This relentlessly limits the flexibility of that protocol, as any protocol with auto-detection of master nodes and no dependence on TCP/IP would efficiently allow numerous subnets on the identical access point. This would add to the number of probable network setups many times over. While Throttle has been on hand since 2003 in the month of August, development of the protocol seems to have come to an end, and at the moment, no new edition has been out (Yi-Sheng and Takawira 2004).
The results of a Frottle execution on a network are also for the most part subjective, with no firm results existing for assessment against the standard CSMA/CA access control mechanism. This, shared with its numerous execution disadvantages, leads users to try to find alternatives other than Frottle (Ergen et al 2001).
Because the key problem of Frottle technology is the solution of hidden node parts of the network, it should be emphasized that it is mainly used in widespread WLAN setups with numerous nodes, that are connected by the means of directional antennas and have high upload (the radius of such networks is 50M and wider). Hence, as it is emphasized by Yi-Sheng and Takawira (2008, p. 451): IEEE 802.11 is suited for bridging the last mile for broadband access only to a very limited extent. Newer standards such as WiMAX assign time slots to individual stations, thus preventing multiple nodes from sending simultaneously and ensuring fairness even in over-subscription scenarios.
In the light of this statement, it should be emphasized that IEEE 802.11 uses 802.11 RTS/CTS, and this principle is applied in the Frottle protocol as the technology of handshake packets. Actually, the commonly used RTS/CTS protocol is not the perfect solution to the hidden node problem, nevertheless, it is capable to decrease throughput even further. Hence, the only solution is the use of adaptive adjustments and regimes that are not available for the average users for their complexity and absence of a user-friendly interface.
Wireless Cyclic Token Protocol
The projected protocol implements a token-passing access control apparatus, analogous to the mechanisms implemented by Frottle and also WiCCP, called the
Wireless Cyclic Token Protocol (WiCTP). WiCTP works by use of passing a token to each node on the particular network. Only the node which is in possession of the token may be able to transfer the data, thus allowing only one of the nodes to transfer at any one point in time, thus getting rid of collisions completely. Each of the nodes on that network is grouped as either master or slave. The master nodes have knowledge about all other nodes on the particular network, but each of the slaves only knows about the masters. The master node reins all access to the entire network, in view of the fact that it handles all the allocation of the tokens to each of the nodes.
This allows the main master node to have a vast suppleness in the control of that network. It can then re-order the process of passing of the tokens to better utilize that network, or provide preferential handling to definite nodes, thus allowing the master node to make sure that all the nodes that in general would be downgraded to lower performance obtain a fair share of the networks bandwidth (Metropolis et al 2000).
The key aspect of WiCTP network communication is the Carrier Sense Multiple Access with Collision Avoidance technology. This helps to define whether the collision-free transmission is possible on the definite part of the root. Assuming that the network is taken as the distance between A and B points with some intermediary Access Point, the nodes of the network may be hidden or visible. If the nodes are hidden, it is impossible to define whether the node is transferring or not. Hence, if two hidden nodes are transferring to an open node, the data is colliding, causing loss of the information, and collision paradox, when A and B have to retransmit, while neither A nor B know whether the other point is transferring.
WiCTP is aimed at solving this problem by using the Request to Send/Clear to Send (RTS/CTS) protocol. Hence, information is sent in RTS packets with special marking, which points out the required transmission delay. Hence, any station that hears such a signal will prevent transmission for the duration pointed.
While not yet put into practice, WiCTP uses the integration of dissimilar Quality of Service (QoS) algorithms. When any node is connecting to a wireless network, it sends a packet broadcasting its presence to the particular network. When the master node receives this packet, it goes ahead and replies to that node with information about the master node with which it has come to be associated with, and also makes that node a slave. The master node adds the new slaves data to its list of existing slaves and then places it in the lineup for receiving the tokens. When the slaves receive the token, it confirms to see if that token is from the master node to which it has been directly associated.
If so, it will verify for any data that necessitates being sent, and then examines the token to observe how many packets it may propel as allocated by the main the master. The slave then sends its queue of data packets to all the other lined-up recipients.
When the slave has no supplementary data packets to launch, or it has sent the highest figure of packets, it drives the tokens back to the master node. Since only the slaves with the tokens may broadcast the data, the concealed node problem is hence eliminated. No, any two nodes can be able to transfer at the same instant, thus the collisions are eliminated completely (Spyropoulos and Raghavendra 2010).
WTRP
Key features of this protocol are as follows:
It is regarded as a medium access control protocol for wireless networks.
It maintains guaranteed quality of the services by controlling the bandwidth and latency values.
The token defines the transmission order, and each may be abandoned after the specified amount of time
Each network ring has a unique MAC address
If owner (the central station) leaves the ring, another station occupies its place.
The Wireless Token Ring Protocol is regarded as the innovative medium access control tool for wireless networks of local area scale. In most researches, it is opposed to IEEE 802.11 networks, as in comparison with this standard, the WTRP provides the reliable connection tools in the terms of latency and bandwidth. This protocol is based on the principle of reducing the retransmissions caused by collisions. By the statement by Ergen et al (2009), the key principles of this protocol are closely linked with the statement that stations prevent cycled transmission if these are filed:
WTRP is a distributed protocol that supports many topologies, as not all stations need to be connected or to a central station. WTRP is robust against single node failures, and recovers gracefully from multiple simultaneous faults. WTRP is suitable for inter-access point coordination in ITS DSRC, safety-critical vehicle-to-vehicle communications, and home networking, and provides extensions to other networks and Mobile IP. (Ergen et.al. 2010, p. 1870)
In the light of this statement, it should be emphasized that the actual benefit of using this protocol is the opportunity to create partial connectivity. Furthermore, the existing connectivity principle is able to create the unique overall architecture of the network system that is featured with the data link layer. Hence, the Mobility Manager and Channel Allocator may be used for Admission Control, as well as Information Base Management. (Metropolis 2000)
Conclusion
From the above methods, it is evident that there are various diverse ways in which Token-based MAC protocols for Supporting Timely Transmission of Real-Time Traffic in Wireless Networks can be enhanced. This includes the use of Wireless Central Coordinated Protocol (WiCCP), Wireless Cyclic Token Protocol and throttle among others. The methods have been seen to have various advantages and disadvantages which determine the most applicable process.
One of the critical conditions that the implementers of the protocol should focus on is the use of protocols is avoidance of collisions within the data packets in transit which makes the transmission of information a problem. Efficiency of information transfer is the most important aspect in communication between different nodes in any network and thus the protocol used should be of great essence (Yi-Sheng and Takawira 2004).
According to the discussion presented in this paper, networks which use WiCTP are more stable in networks as compared to CSMA/CA protocol. In WiCTP, the error rates in data transfer are predominantly decreased whilst the error rates in CSMA/CA are a bit less than the latter. WiCTP has better throughput and is more stable and it also shares the bandwidth between the nodes in a more stable manner.
References
Aad, I & Castelluccia, C 2001, Differentiation mechanisms for IEEE 802.11, in Proc. IEEE INFOCOM01, 209218.
Butala, A., Tong, L. 2005 Cross-Layer Design for Medium Access Control in CDMA Ad Hoc Networks, EURASIP J. Applied Signal Processing, vol. no. 2, pp. 129-143, 2005.
Ergen, D. et al 2001,WTRPwireless token ring protocol, IEEE Trans. Veh.Technol., 53(6):18631881.
Ergen, M., Lee, D. Sengupta, R., 2009 WTRP-Wireless Token Ring Protocol WTRP Journal. Vol 4; No 6.
Ergen, M., Lee, D. Sengupta, R. 2003 Wireless Token Ring Protocolperformance comparison with IEEE 802.11 Eighth IEEE International Symposium on Computers and Communication, Antalya, Turkey.
Luo, H., Lu, S. 2005 A Topology-Independent Wireless Fair Queueing Model in Ad Hoc Networks, IEEE J. Selected Areas in Comm., vol. 23, no. 3, pp. 585-597.
Metropolis, A. W. 2000 Equations of state calculations by fast computing machines, J. Gem. Phys., vol. 21(6):10871092.
Spyropoulos, A., Raghavendra, C. 2010 A Token-based Greedy Chain Scheduling Algorithm (T-GCSA) for Situation Aware Wireless LANs University of Southern California, Los Angeles.
Yi-Sheng, L., Takawira, F. 2004 Token Based Medium Access Control in Wireless Networks School of Electrical and Electronic Engineering, University of Natal.
Yi-Sheng, L., Takawira, F., Hong-Jun X. 2008 A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol. 7, No. 5.
This paper explores the historical development of wireless networks. The essay also gives a detailed analysis of the physical infrastructure associated with wireless networks. The benefits of this technology for business organizations are also discussed. Some of the issues encountered by Cisco Systems after implementing the use of the wireless network are also analyzed. The paper concludes by describing the implications of wireless networks for different emergency agencies and the police.
Wireless Networks
Overview of Wireless Networks
Cardei and Du define a wireless network as any computer connection that uses wireless data (334). This method is embraced because it reduces the costs associated with cable systems. The common wireless networks include Wi-Fi connections and cell-phones. The history of wireless networks is founded on the development of the first wireless telegraph (Cardei and Du 336). Concepts of data compression emerged after Claude Shannon published his work in 1948.
The first Terrestrial Microwave Telecommunication System was designed in 1950. By 1977, cellular systems had been launched in Washington. From 1970 to 1990, new developments emerged, thus leading to the first mobile phone. In 1998, Nokia, Intel, IBM, and Ericsson joined hands to develop the first Bluetooth (Stojmenovic 12). This achievement made it possible for humans to exchange wireless data. In 1999, Wi-Fi Alliance was established to develop new technologies for wireless local area networking (WLAN). These developments created the foundation for future wireless networks.
Types of Wireless Networks
Wireless Networks (WLANs) allow computer users in different areas to share information through the internet. There are different wireless networks that are designed to complete various tasks and duties. Wireless networks make it possible for individuals to share or access information and applications without the use of data cables. Wireless networking also delivers freedom of movement and the ability to share ideas across the globe (Stojmenovic 17). The major types of wireless connections are presented below.
Wireless Local Area Networks (WLANs)
This kind of wireless network allows computer users within a small environment, such as a campus, to have internet access (Stojmenovic 18). Three or more individuals can come together to form a common point of access. This network is used by individuals who want to share information within a small area.
Wireless Personal Area Networks (WPANs)
WPANs are used by individuals to connect several devices. This should be done within a small area, such as a house or office. The connection makes it easier for the user to have internet access (Stojmenovic 32). New technologies such as OFDMs and spread-spectrum make it possible for users to access the internet within a wider circumference.
Wireless Mesh Network
This kind of wireless network is not widely used. The network system is usually composed of radio nodes arranged to form a mesh typology (Negus 2). The nodes work together to increase performance and efficiency. The networks have the ability to reroute whereby a node can support those around it (Negus 3).
Wireless Metropolitan Area Networks (W-MAN)
Several WLANs can be interconnected to form a wider system. This kind of connection is given the name W-MAN (Stojmenovic 42). The WLAN connections within the system can share information and applications.
Wide Area Networks (W-MAN)
Wireless WAN is a connection that covers a wide area (Negus 4). A good example is a connection serving two neighboring suburbs or cities. A firm can use W-MAN to connect its businesses in different cities (Negus 4). This connection is characterized by several access points, bridging relays, and Base Station Gateways (Negus 4).
Space Network
This wireless network evolved due to the needs and issues associated with space exploration. The communication between spacecraft and control centers is essential. Spacecrafts are therefore fitted with Wireless Space Network (WSN) in order to relay information back to planet Earth (Hultell, Johansson, and Markendahl 2). A good example of this network is the one managed by the National Aeronautics and Space Administration (NASA).
Global Area Network (GAN)
The current proliferation of technology has made it possible for different nations and continents to share information. The development of GAN makes global communication possible. GAN is, therefore, a connection aimed at supporting wireless data across the globe (Negus 6). The use of terrestrial wireless LANS have been observed to promote communication over large coverage areas (Stojmenovic 76).
Aspects of Wireless Technology
Every network connection is defined by various hardware components and software applications. Such components and devices make it easier for different organizations to be connected. Several components should be considered in order to have an effective wireless connection (Szabo, Horvath, and Farkas 3). This means that the system should have various aspects, such as hardware, software, protocols, and physical infrastructures.
Protocols
Stojmenovic defines an internet protocol as a communications protocol within the internet suite that relays data-grams across networks (82). This routing function is critical because it makes internetworking possible. This protocol is, therefore, can be described as the internet (Hultell et al. 3). That being the case, there are different protocols associated with the wireless network. For instance, the Long Term Evolution (LTE) is a powerful communications protocol used to network mobile phones. The other common protocol for wireless connections is Wi-Fi. Bluetooth is another protocol that has been in use since the 1990s. However, Bluetooth functions within a distance of fewer than 10 meters (Szabo et al. 6).
Hardware
Different hardware components should be utilized in order to have an effective wireless network. Some of the typical hardware devices or components utilized to support wireless networks include computers, switches, phone lines, and cables (Szabo et al. 6). The physical hardware should be organized effectively in order to ensure the system functions effectively. Every device on the network system should have an adapter (Hultell et al. 3).
This means that computers and devices capable of accessing wireless internet have such adapters. Wireless routers are also used to ensure wireless networks work effectively. Such routers work as access points for effective internet access. Wireless antennas are also useful because they increase the capability of every wireless radio signal (Szabo et al. 7). Wireless repeaters are also used to compose the hardware system of a wireless network. Such repeaters offer two-way relay for radio signals (Hultell et al. 3).
Physical Infrastructure
The physical infrastructure is critical towards ensuring the integrity of every network system. This infrastructure defines the physical layer of the network. The infrastructure therefore encompasses everything that makes connectivity possible. The infrastructure might include interconnected elements. These Network Elements (Nes) can be assembled by a specified internet provider or be supplied by a manufacturer (Hultell et al. 3). Many systems have numerous interconnected elements. Different components are required in order to complete the wireless network system. Such components include connectors, closures, and cables (Hultell et al. 6).
Features of Wireless Networks that Can Benefit a Business
Experts believe that business organizations can benefit from the use of wireless networks. This is the case because wireless network improves connectivity and boosts the level of productivity (Cardei and Du 338). Wireless connection makes it easier for different individuals to have access to different documents, resources, and emails. The features presented below can benefit many businesses.
Location Flexibility
Workers in a company that uses wireless network have uncontrolled access to the internet. They can access a wide range of applications, files, links, and documents thus improving the level of productivity. The workers can move from area A to B while having access to the internet (Szabo et al. 6). That being the case, the employees in the organization can collaborate in order to achieve the targeted results.
Mobile Connectivity
As mentioned earlier, wireless network is advantageous for businesses because employees can roam without losing connectivity. Some businesses can operate in regions that do not have access to wired internet connection. Wireless LAN can make it possible for companies to manage their inventories and operations. This opportunity makes it possible for businesses to operate effectively (Stojmenovic 93). Wireless access can be used to support the performance of different departments without using wired connections.
Reach and Coverage
Wireless network increases the level of coverage and reach. Individuals in an organization can access internet without having to move to a fixed computer. Employees can access different types of information from the main server (Hultell et al. 7). Colleagues and stakeholders will also benefit from the internet coverage. The increased level of mobility makes it possible for every worker to focus on the targeted business goals.
Adaptability
The other important aspect of wireless network is adaptability. Businesses can adapt new typologies depending on the anticipated traffic rates. The company can consider new infrastructures depending on the targeted changes and goals (Negus 6). New nodes can also be added in order to produce the targeted goals. The concept of adaptability therefore makes it possible for businesses to support the changing needs of their workers. New network demands are easily addressed using wireless connections.
Cost Effectiveness
The use of wireless technology is something that reduces costs for companies and businesses. Wired networks required numerous resources and skilled labor to implement. Such networks should also be maintained in order to function optimally. Unlike wired connections, wireless network is easy to maintain. The system does not require extra costs to scale up (Hultell et al. 7).
Case Study: Successful Implementation of Wireless Technology
Cisco Systems
The case study of Cisco Systems Incorporation shows how wireless network can support the goals of many businesses. Cisco implemented the use of wireless connections in 2000 (Wireless Case Study: How Cisco WLAN Became Primary Corporate User Network par. 3). The ultimate objective was to address the changing demands of many workers. The company wanted the use the technology to support the existing wired connections.
Within two years, more employees were using wireless connections to access the internet. The IT department conducted a study in 2005 to determine the unique aspects of wireless networking. The use of WLAN was observed to be beneficial. Consequently, the firm redesigned the wireless network to become the major access point (Wireless Case Study: How Cisco WLAN Became Primary Corporate User Network par. 4).
Several advantages were observed regarding the use of wireless network at Cisco Systems. For example, more people believed that WLAN was effective and easy to use. As well, the survey indicated that more employees became more productive than ever before. The productive time was observed to increase significantly thus making it possible for the firm to achieve its business goals (Wireless Case Study: How Cisco WLAN Became Primary Corporate User Network par. 2).
The companys engineering and marketing departments recorded positive outcomes. This case study therefore shows clearly that employees can use wireless network to communicate with each other. The use of wireless network at Cisco is something that has continued to increase productivity.
Issues Faced
The company faced a number of issues before implementing the use of wireless network. The first issue to consider was the initial costs associated with the implementation process. The company spent a lot of money to implement the system. Cisco Systems has been designing and marketing a wide range of networking devices (Wireless Case Study: How Cisco WLAN Became Primary Corporate User Network par. 5).
This position made it easier for Cisco Systems to implement a powerful wireless network. The pioneers of the project also considered its feasibility. From the very beginning, the company used wired network to support its workers. In 2002, a survey was conducted to establish the major issues and opportunities associated with the use of wireless network. Cisco Systems decided to support and implement wireless network as the best mode of internet access in 2005. This move led to numerous benefits for the organization.
Effectiveness of Wireless Networks for Emergency Services and the Police
Wireless networks have been associated with exchange and sharing of information (Stojmenovic 41). Regions that have access to wireless networks can respond to emergencies within the shortest time possible. Cities with wireless networks make it easier for individuals to communicate with the relevant agencies whenever there is a disaster. Stojmenovic argues that wireless connections improve the speed of response to various disasters or emergencies (56). Individuals who have access to the internet can respond to various incidents within the shortest time possible.
Experts believe that wireless network is one of the best tools for dealing with various incidents. Emergency medical services (EMS) providers, firefighters, and the police play a significant role towards supporting the safety of many citizens (Negus 7). Wireless networks make it possible for these agencies to support the needs of different citizens. Individuals in a region with free wireless connection will be able to inform the right authorities. Wireless connections make it possible for responders to manage their resources and tools. They can also share their ideas with different stakeholders in order to respond to various emergencies.
The government should therefore provide cost-effective wireless connections to different cities and organizations. More people should also be sensitized about the importance of wireless networks. They should be ready to communicate with different emergency agencies in order to get the best support (Szabo et al. 6). This move will make it possible for different agencies and civilians to share information. Such agencies will get quality information that can be used to respond to different emergencies. This move has the potential to safeguard the lives of more people (Stojmenovic 87). Wireless networks are powerful lifesaving tools that can support the safety and health needs of more people in the country.
Works Cited
Cardei, Mihaela and Ding-Zhu Du. Improving Wireless Sensor Network Lifetime through Power Aware Organization. Wireless Networks 11.1 (2005): 333-340. Print.
Hultell, Johan, Klas Johansson and Jan Markendahl 2013, Business models and resource management for shared wireless networks. Web.
Negus, Kevin. History of Wireless Local Area Networks (WLANs) in the Unlicensed Bands. Information Economy Project 1.1 (2008): 1-13. Print.
Stojmenovic, Ivan. Handbook of Wireless Networks and Mobile Computing. New York: Wiley, 2002. Print.
Szabo, Csaba, Zolta Horvath and Karoly Farkas 2014, Wireless Community Networks: Motivations, Design and Business Models. Web.
Wireless Case Study: How Cisco WLAN Became Primary Corporate User Network 2016. Web.
RFID is an acronym for Radio Frequency identification. The technology is grossly involved with the collection of data using some special electronic tags. There is a special chip that makes up the tags which are used for data collection. It can be exemplified to normal bar code readers in the way that they identify objects and collect the necessary data for the objects. The main advantage of this technology is the reduction of the human and labor intensity in the process of collection of data (Hatem & Habib, 5).
Data mining is all about the analysis of data from various sources and making a summary of useful information which can be found in the data. There are various tools like special software which can be used in the field of data mining. In this process, diverse information, say from a large database can be used to find how the various items correlate.
The centrality in the management and consequent retrieval of large amounts of data is defined as data warehousing. A data warehouse has a lot of databases managed in a centralized repository of information. When data has been centralized, user access is set to the maximum and further analysis of the data can hence be made faster.
This paper seeks to address the implementation of RFID on data mining and n the United Arab Emirates. The paper will consist of a general insight into the implementation of the technology in the country as it is today, current state of the technology, and an analysis of the projections that are aimed at improving the technology and possible future impacts of the technology in the UAE (Al Jaroodi, 14).
RFID in the UAE
Most of the companies in the competitive market today have focused on the increase in productivity with minimum operational costs. To make this a reality, there has to be an adaptation of the necessary business models as well as a gross improvement in the required business architecture. With the use of RFID, the businesses get more streamlined and also most of the operations are optimized. There are some components which form the general architecture of this technology as shown below
According to the above diagram, there is communication between the computer, the object and the RFID reader in a certain protocol
The RFID reader sends some electromagnetic waves which carry a signal which is used to identify the object. The objects return back some information to the reader which is used for identification purposes
The objects have a special RFID tag which is the one that sends the information which has been requested by the object
The computer has a database in which it stores all the information that it receives from the RFID reader
In the past, most of the readers could not use current mobility systems but used a special connection to the host computer through the Ethernet or through the serial port.
In the United Arab Emirates today, there has been quite some diverse usages of the RFID system for example in the process of electronic tolling or in one of its modes called SALIK. In this technology the tags which are used in the system are passive RFID tags. In the system motorists are supposed to buy a prepaid card which is then fixed to the windshields of their cars. Once the car passes through the toll stations, a certain fee is automatically deducted from the card on the screen. Depending on the gate that the motorist will use to pass some certain area a standard fee for that gate is deducted. This is a technology that helped in the reduction of congestion within the busy areas of the country and the cities.
In the employment of this technology, it takes advantage of the passive RFID tags as stated. The tags get some power from the transceivers which are located at the gates of the toll stations. This means that the tags do not require having additional power like the use of a battery. The mode of information retrieval in the RFID as discussed earlier is automated and so the data is relayed to the central warehouse (data repository) in a remote manner and through the use of the tags. This is due to the fact that the incorporation of the tags to be read by radio waves helps the readers to be able to read them even from longer distance depending on the mode which is applied.
This system has had a lot of advantages to the United Arab Emirates. The traffic at the gate is put under control as the vehicles do not necessarily have to stop to pay the toll fees as the process is monitored dynamically and in real time.
Another application is the one which is in use by the Damas stores in Dubai. In this stores which majors in jewellery, there are special tags which are fitted into the objects in store that make the object pass through the inventory records once a reader gets the information. This was mainly aimed at the reduction of theft. Due to the status of the information in the central database, any transaction or running of a reader on any of the stored items takes place almost immediately. This is aimed at the revolution of stock checks.
In the United Arab Emirates, there has been a proposal of an integration of this technology with the use of wireless sensor networks for management of buses. Due to the expense that comes in with normal wire cabling, a wireless solution is one of the best ideas in which either the user can use Bluetooth or Zigbee which will help in the extension of the reader of the RFID waves. Bluetooth has the advantage of allowing for the creation of personal area networks which have a short range. It is also simple to maintain the Bluetooth connection. The rate of data transfer using this mode is generally 1Mbps though it has a high level consumption of energy and also a range of about 10 meters which makes it not practicable (Cheng-Ming, 150).
On the other hand Zigbee saves more energy though the data rates are much lower as compared to Bluetooth. It is a low cost technology which also allows for meshing of the devices which means that multiple nodes can be communicating with a surety of information reception even with the failure of one of the nodes. Due to the style of the proposed implementation which is in a bus station, the low cost of the technology allows the possibility of having the ability to transmit the information from various spots which can be affordable to fix.
In this application, the communication of the object and the reader is triggered once the object approaches the reader. In such a case, without any object in scene, the reader is often not active. On the approach of the object the software being held by the reader is informed of the approaching object via the mode of transmission used, in this case Zigbee (Qing-Jie K. et al, 41).
The RFID middleware in use is the one which is responsible for handling such an event. It sends a command back to the RFID reader so that it can be set to a mode in which it is prepared to read. The reader at this point reads the tag which is attached to the object and consequently sends its identity information to a computer which holds the central database. On passage of this object, the reader becomes inactive again and waits for the next object.
Using this approach, it is possible to track the movement of buses in the area on a real time basis and thus the management can be able to handle time related issues. On reception of this information, the central database (data warehouse) can have a live display of the information which helps keep the passengers at bay or else duly informed of the movements. The operators can also take advantage of this information to fully utilize the available buses considering that all the movement is dynamically tracked and can hence be dynamically diverted.
To have effective monitoring, all buses can have RFID sensors which monitor the inflow of passengers in real time without the intervention of any person. Also there can be other external sensors which inform the administrators of the whereabouts of their fleet as the bus is recorded once it gets to a station and once it gets out. The displays used in real time can be LCD screens.
Moving back to the concept of data mining and data warehousing, there is a consistent utilization of this two principles in line with RFID. The information which is gathered from the buses comes in two major ways. The passenger traffic in and out of a bus and the arrival of a bus to a station and from a bus station are monitored. When this data is collected, it is relayed to a centrally located computer using RFID technology and other middleware. This information is noticeably collected from a number of buses and relayed to one single place which can hence be referred to as the data warehouse. Data mining occurs in the way that the management has access to this data and can be able to adjust the bus movements. With such information, the operators can foretell their earnings as they have all the needed information before them. Data mining, being the concept of analysis with the capability of making a distinct summary is thus established (Chien, 15).
Conclusion
Despite the age of this technology, it has picked a lot of pace in the realm of management and the chain of supply. The technology has enhanced the management of data and performances of different organizations to high standards. This paper has discussed the various ways in which the technology has been implemented in the UAE. It is recommended that more research should be done on how the network should be enhanced to make it more mobile. If this was to be enhanced, then a better management of many systems would occur.
References
Al Jaroodi, Jameela et al. Middleware for RFID systems: An Overview 2009 33rd Annual IEEE International Computer Software and Applications Conference (2009)
Cheng-Ming, Jimmy Li, An Integrated Software Platform for RFID-Enabled Application Development, in proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, (2006).
Chien, Yeun. SASI: A New Ultra-Lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Transactions on Dependable and Secure Computing 4(4), (2007).
Hatem, Ben. & Habib, Haman. Bus Management System Using RFID in WSN European and Mediterranean Conference on Information Systems 2010 (2009).
Qing-Jie Kong. et al A fusion-based system for road-network traffic state surveillance: a case study of shanghai, IEEE Intelligent Transportation Systems Magazine, vol. 1, no. 1, pp. 37-42 (2009)
Since most organizations now have an online presence, it has become important for them to design good websites so that their online users can access their products and services. As such, it is important to ensure that the general design, links, graphics, text, navigation bars and buttons are easy to use and understandable. Most radio stations now have an online presence and using their websites, listeners can listen to podcasts on different programmes. In addition, users can also follow news by the hour and leave their comments as well. Both the British Broadcasting Corporation (BBC) and the National Public Radio (NPR) have websites from where online listeners can listen to the different programmes, news, and debates featured by these radio stations. This report is an attempt to compare and contrast the BBC and NPR radio websites. In this case, the report shall describe the key design and navigation features of the two websites. In addition, the report also analyzes the elements of the two radio stations that appeals to him.
Comparing And Contrasting
BBC Radio Website:
In terms of the design features of the BBC radio website, the background has not interrupted the text used. In addition, the text used is easily readable. There is also a perfect hierarchy of the contents of the website. The text columns are a bit narrow and consequently, the user can be able to read the text without straining. In terms of graphics, the website does not have big buttons, and for every graphic link, a matching text link has been included. For example, under the BBC Radio 1 link, there is a text link that when you click on it, it leads you to the various programmes in that particular radio station (BBC Radio 2011). The general design of the website is also very good, and the webpage opens up pretty fast.
The different pages can also be downloaded quickly. Graphic elements such as subheads, photos, and pull quotes, among others have been used well and as a result, it is easier to break up large text areas. There are no observable dead links on the BBC radio website. Accordingly, the different links used on the different pages are in a good working condition. The BBC website is also compatible with different browsers, including Internet Explorer, Opera, and the AOL browser, among others. This means that regardless of the browsers one has, he/she can easily listen to and follow programmes on the BBC radio website.
For any website, a good navigation design is vital because it enables users to access the site contents with relative ease using the most logical and intuitive structures. A well designed website enables users to visit key pages from where they can access the contents of the website. This not only enables the users to meet their needs, but also those of the business or organization. One of the simplest but effective techniques is by having a page module in the website which displays the extract or summary contents of the different pages of a website.
The BBC World Service website has such a news module on its home page (BBC Radio 2011). The module contains such items as news, weather, sports, TV, Radio, travel, and many more. For example, when a user clicks on the news icon, he/she is taken through the latest news on the website in the world of technology, business, art/entertainment, sports, health, and many more. This is beneficial to the users because they are normally encouraged to read more on the areas of their preference. The module contents are dynamic such that whenever there is a new story that has been prepared by editors in any of these aforementioned subcategories, it appears on the site automatically.
NPR Radio Website:
Like the BBC World Service website, the NPR radio website also has a navigation bar on its homepage from where users can choose the radio station to listen to, read the latest headlines news, access arts and life stories, and sample the latest music (NPR 2011). The homepage for the NPR radio has also utilized graphic design well, just like the BBC World Service radio website. For example, one does not have to strain to read the text because it is easily readable.
In addition, whenever you click on a link to a page, it opens up pretty fast without delay. Both the BBC World Service and NPR websites uses the top horizontal navigation bar design. Consequently, users can utilize it as the main site navigation menu. The navigation items on both sites are button-pushed, or tabbed-shaped. Unlike the NPR website, some of the BBC website navigation items are button shaped. The use of the top horizontal bar navigation has its own drawbacks, in that the user is normally limited in terms of the number of links to use without having to rely on sub-navigation. This is a disadvantage to such sites as the BBC World Service website because it has multiple pages and is normally visited by millions of users daily. The users are forced to resort to the use of sub-navigation, and this is an involving procedure.
Another similarity between the BBC World Service and NPR websites is that both have used the breadcrumb navigation technique. Breadcrumbs are very important when using a website that has multiple pages because a user cannot get lost easily since they can always find their way back to the home page. Breadcrumbs also functions as a secondary navigation tool, in that they aid in supporting the primary navigation system of a given site. In case for example, a user is on the BBC Radio 1 section and he/she wants to return to the homepage, all that the user needs to do is to click on the suitable breadcrumb navigation item and he/she will be redirected back to the homepage. Another similarity between the BBC World Service and the NPR websites is the presence of search navigation. This tool suits the two websites well, bearing in mind that they have multiple pages with loads of contents that users have to navigate through. Using the search navigation tool, users can go to a specific section of the website (for example, the sports section on BBC World Service website) without having to traverse though the other sections.
What I Like
BBC Station Website:
What I like about the BBC World Service website is the ease with which one can get to a desired website. This has been made possible by the use of proper navigation tools, in addition to the proper design of the website design features. It is also very hard for a user to get lost in any of the website pages because all that one has to do is to click on the breadcrumbs icon and he/she will be redirected back to the homepage. The home page of the BBC radio website has a navigation bar that enables the audience to not only see what is on radio, but also to listen to the various stations of the BBC World Service online. In addition, the navigation bar also allows listeners to listen to any programme that they might have missed. Also, listeners can use the navigation bar to examine information pertaining to a given programme, such as the names of guests, or the music played. By clicking on the Now On Air view on the main homepage, one can listen to any station that he/she desires. At the top of the homepage, there is also the product navigation bar that allows one to easily switch from one station to another.
One can also use the Programme Finder button to access the programme page and once there, you can obtain programme information or get a certain programme that you have missed. The navigation tool also allows users to locate the desired content via the schedule. One can also easily navigate through programmes through the categories section because of the inclusion of a Categories link. The link leads the user to the categories index page. Alternatively, in case the user has decided to click on say, Radio 1, he/she will get be able to directly access the categories that are deemed as the most important for that particular radio station. In addition, the BBC World Service website has an allowance for the user to choose the language that he/she wants to read the contents in. This shows that the website is very multilingual. It also offers the user multiple ways to listen to the various programmes, such as via the Internet, using the iPlayer, Podcasts, and schedules.
NPR Station Website:
What I like about the NPR website is that one can actually add listen to audio stories on their station of choice, and also add such stories to his/her playlist using a media player of choice. This means that even when you have not logged in to the NPR website, you can still listen to the audio stories that you downloaded to the media player. One can also listen to hourly news via podcasts. In addition, the website also has a link to social media. What this means is that with just the click of a button, you can be redirected to your social media of choice. This way, the staff and journalists at NPR are able to engage with the members of the public. Users are able to explore Facebook posts YouTube videos, and the latest tweets. This means that users can follow NPR on social media for the latest developments.
Conclusion
A website is a useful tool that companies with an online presence can use to market their products and services to their online users. Both the BBC World Service and the NPR uses website to engage their online listeners. In this case, the navigation and website designs of the two websites are important because they dictate the flow of traffic to these sites. The general design of the two websites is good, meaning that users can be able to navigate through the different website pages with relative ease. This is important because with so many options to choose from, users should not strain to get what they want from the website. In particular, the BBC World Service website allows users to choose the language that they would want to view the websites. This means that even for listener in France, he/she can still listen to their favourite program in French. The two websites have also made use of the latest technology to connect users. For example, there is an allowance for mobile application, listening to news on podcasts or the iPlayer.
Bibliography
BBC Radio. BBC World Service. 2011. Web.
NPR. National Public Radio: News & analysis, world, US, music & arts. 2011. Web.
David Margolese, born in Canada, is the pioneer of satellite radio enterprises (Jones and Hill, 2010). At the age of around twenty years, Margolese discontinued his studies and started a paging company.
David would later turn his concentration to cellular phone enterprise but failed to obtain funding from venture capitalists who failed to see any chance of growth in the cellular phone business (Jones and Hill, 2010). According to them, the cellular phones would remain a preserve of the rich, especially the Chief Executive Officers of large corporations and ambassadors.
Margolese fought on until 1980 when his efforts bore fruits. He brought in Ameritech who agreed to invest funds in Cantel, a company owned by Margolese. Later on, he joined hands with among others, Ted Rodgers of Rodgers Communications to start Rogers Wireless, the biggest telephony firm by 2001 in Canada. Margolese became a venture capitalist at the age of 31 when he traded his interest for $2 billion (Jones and Hill, 2010).
As a venture capitalist, Margolese met Robert Briskman, a former technician with NASA and the chief of operations at a fallen satellite-messaging firm called Geostar. Briskman and some of his former workmates at Geostar had started a company, Satellite Radio CD, but were short of funds required to commercialize the invention (Jones and Hill, 2010).
Initially, Margolese invested a paltry one million US dollars before making up his mind that his future lay in the satellite radio enterprise. He changed its name to CD Radio. As much as he liked the idea of satellite radio, he had to overcome several hardships.
It would be costly to set up a profitable radio enterprise, the Federal Communications Commission had to be persuaded to grant airwaves to satellite radio and it would be costly to purchase special receivers and the difficulty of converting potential clients to buy satellite radios yet they has the terrestrial radios. Advertising would be costly and risky too (Jones and Hill, 2010).
As earlier envisaged, it took long for the Federal Communications Commission to accede to CD Radios request. The delay resulted from the opposition from National Association of Broadcasters (NAB), which viewed satellite radio as a potential killer to local radio services. Overall, Federal Communications Commission agreed to auction the spectrum in 1997 and sold them to CD Radio and XM Radio (Jones and Hill, 2010). CD Radio changed its name to Sirius Radio.
Both firms planned to offer over close to a hundred channels. Sirius Radio intended to dedicate 50 channels to commercial free music while the rest would offer advertising space on the rest of the channels. XM intended to offer between fifteen and twenty channels free of commercials and seven minutes per hour space for advertisements on the rest of the channels. In addition to commercials, the two stations introduced a subscription fee of between ten and twenty US dollars (Jones and Hill, 2010).
Sirius and XM Radios intended to put satellites in elliptical orbits at over 20,000 miles above the earth. The satellites would have a useful life of around fifteen years and with that in mind, both stations kept spare satellite in case of any failure by the existing ones. On 16 February 2000, the two companies signed a pact to design a unified standard for satellite that would enable customers to tune in to both stations from one radio. Such unified services kicked off in 2004 (Jones and Hill, 2010).
The two companies would later install repeaters in various cities and establish recording studios. XM established three such studios each in Washington, D.C., New York and Nashville. Sirius established its studio complex in New York City. XM got an exclusive pact with General Motors and Honda to have the satellite radios set up in new cars while Sirius collaborated with Ford and DaimlerChrysler.
General Motors committed to initially do 1,240,000 set ups and thereafter, 600,000 per year. Honda would ship 400,000 cars installed with XM Radios in 2005 (Jones and Hill, 2010).
Concerning capital, XM raised around 2.6 billion US dollars from investors as well as strategic partners in January 2004 while Sirius raised 2.5 billion US dollars by 2004. Much of the funds raised went towards setting up of infrastructure with XM spending 470 million US dollars for three satellites, 267 million US dollars for setting up repeaters systems and 130 million US dollars on control equipment (Jones and Hill, 2010).
XM Radio launched in early 2001, a year behind schedule, backed by advertising campaign worth over 100 million US dollars. XM Radio charged a fee of 9.95 US dollars per month per subscriber. Sirius launched its services in July 2002 and charged a subscription fee of 12.95 US dollars per month per subscriber with the justification that its services were free of commercial adverts.
XM Radio led Sirius Radio with a very big margin with XM Radio boasting of 347,000 to Sirius 30,000 by close of 2002. Sirius had installed 133 repeaters in 92 localities while XM had 800 repeaters in 60 areas at the close of 2003 (Jones and Hill, 2010).
XM Radio maintained its leadership over Sirius Radio by surpassing the 500,000 subscribers mark in April 2003 and projected over one million subscribers by the end of the same year. Sirius had slightly over 100,000 subscribers by mid 2003 projecting 300,000 subscribers by end of the same year.
Concerning sales, XM was way ahead of Sirius thanks to General Motors aggressive selling (Jones and Hill, 2010). General Motors launched the satellite radio in 25 out of 57 models and intended to push the number to 44. The company had projected sales of 800,000 fitted with XMs radio in 2004 and 1.1 million in 2005.
On its side, Honda sold 200,000 and 400,000 cars fitted with XM radios in 2004 and 2005 respectively. Toyota, Volkswagen and Audi also collaborated with XM and the radios were available as options in their cars (Jones and Hill, 2010). Overall, DaimlerChrysler committed to install 550,000 radios by mid 2007 while Ford planned to begin factory installations of Sirius Radios by end of 2007(Jones and Hill, 2010).
In 2001, Sirius suffered a blow when the CEO, David Margolese resigned abruptly. Luckily, though, Sirius converted 700 million US dollars in debt and 525 million US dollars in stock to equity. In addition, the company got a lifeline when three of its initial investors agreed to pump 200 million US dollars in cash (Jones and Hill, 2010).
In 2003 and 2004, both companies made milestones in their differentiation deals. Sirius brought in the National Football League for a seven-year deal to exclusively broadcast football matches costing Sirius 188 million US dollars in cash and 32 million US dollars more for warrants. XM signed a deal in 2004 signed an eleven-year contract worth 650 million US dollars with Major League Baseball granting exclusive rights to XM to air matches (Jones and Hill, 2010).
Internal Strengths and Weaknesses
Since their take off, both stations realized continued growth in revenues. This is because they offered premium services, which found ready market by an audience that was yearning for a break from the tradition of terrestrial radio stations. The terrestrial radio stations had stuck to the same format and had a limited geographical radius after which the signal would fade.
Statistics revealed that 48 percent of the existing FM and AM stations used three formats in their program country music, news bulletin and sports, and adult content for modern times. In addition, the number of programs was limited and this meant most artists could not get a chance for airtime (Jones and Hill, 2010).
The duopoly in the satellite radio systems created by the Federal Communication Commission comprising of Sirius Radio and XM Radio meant that most of the customers would either choose one of the other. In later process, the two merged to form Sirius XM Radio thus having the whole market. Handled well, the duopoly or monopoly could cash in and realize great sales. This is because the conventional FM and AM stations no longer appealed to the audience (Jones and Hill, 2010).
Deriving from the issue of the traditional television versus the cable television and premium movie channels, it was evident that subscribers were willing to pay for the premium services. Statistics showed that more than 69 percent of TV households subscribed to basic cable television and 20 percent who subscribed to satellite television (Jones and Hill, 2010).
The duopoly got able financial and strategic investors. XM landed an exclusive pact with General Motors and Honda while Sirius had an exclusive pact with FORD and DaimlerChrysler.
Such exclusive deals enhanced distribution of the two radios through the manufacturers who among other things agreed to either fit the radios or work with dealers for customers who chose the radios. XM reaped so much from the deal since General Motors fitted 1,240,000 radios initially and was to fit 600,000 radios per year from 2004 to May 2007 (Jones and Hill, 2010).
In addition to the exclusive deals, the radio companies got strategic investors and financial investors. XM had General Motors, Hughes Electronics, Clear Channel Communications, American Honda and Hearst Communications as strategic partners. Financial investors for XM included Columbia Capital, Madison Dearborn Partners, Baystar Capital and Eastbourne Capital. XM Radio raised 2.5 billion US dollars by 2004(Jones and Hill, 2010).
The companies landed exclusive deals from sports associations. In December 2003, Sirius signed a seven-year exclusive pact with the National Football League to air soccer matches, a pact that cost Sirius Radio 188 million US dollars in cash. In October 2004, Sirius signed another five-year exclusive deal with Howard Stern which cost Sirius Radio around 500 million US dollars (Jones and Hill, 2010).
In October 2004, XM Radio landed an eleven-year exclusive pact with Major League Baseball, which offered XM Radio exclusive rights to air matches through satellite. The matches included the famous World Series. During the same period, XM Radio started a channel for Opie and Anthony who had been off air due to profanities. This channel increased the revenues for XM Radio with 1.99 US dollars per month per subscriber (Jones and Hill, 2010).
Though the companies experienced delays in launching their satellite Radio, they adopted strong structures that were able to broadcast as envisaged. This gave the subscribers a reason to continue with the subscriptions because at no place does the case study point out to defective facilities (Jones and Hill, 2010). Sirius Radio solved some initial problems and business continued operating smoothly regardless of the time lost.
The number of subscribers continued to increase steadily for the two stations. XM Radio, which launched seven months ahead of Sirius Radio, had 347,000 subscribers by the end of year 2002. It hit the 500,000 mark the following year and projected one million subscribers by the end of 2003. Sirius projected a subscriber number of 300,000 by the end of the year 2003(Jones and Hill, 2010).
Internal Weaknesses
In as much as the motor manufacturers provided a channel of distribution, the two companies over relied on them instead of looking for other ways from the beginning. As such, it became risky for the two radio stations when sales in cars went down.
The slowdown in sales turned out into a great crisis in 2008 as austere measures regarding credit in the United States of America led to a drastic fall in car sales. For instance, projections for 2008 forecast sale of 13.5 million cars compared to 16.1 million in 2007. Worse still, the forecasts for 2009 pointed at sales of 13.1 million cars (Jones and Hill, 2010).
The decrease in car sales meant decrease in sales of radios since the car dealers were the major distributors for satellite radios. This was a weakness for the two companies since they chose one major distributor (Jones and Hill, 2010).
The two companies concentrated so much on satellite radio and failed to engage in differentiation of their services. This is a weakness because customer preferences change with time and just as people got used to conventional FM and AM radios, they could still get bored with the satellite radios. Technology is changing rapidly as seen with the launch of internet radio and a possibility of the same on motor vehicles too (Jones and Hill, 2010).
Another weakness was in the penetration strategies. The use of auto dealers at the beginning yet people were yearning for satellite radio even in the homes was a bad move. The companies would have used more dealers to penetrate the ready market (Jones and Hill, 2010).
In comparison with the internet technology, satellite technology seems obsolete and stations entrenched in it might find it hard to continue in business in the near future. A combination of the two types of technologies would go a long way in assisting the satellite radio stations a chance of survival and growth.
It should also be important to note that the radio stations took too long to launch giving way to other innovations to launch. In fact, the satellite radios became a favorite of the middle-aged people as the young people preferred to listen to iTunes through their iPods (Jones and Hill, 2010).
After the merger, unfortunately, the share price fell from a high of 3.4 US dollars to a low of 0.40 US dollars per share as the market capitalization for the new firm went down to 1.2 billion US dollars. Such a trend could lead to a delisting from the stock exchange and this would make it extremely hard for the company to raise capital from the public (Jones and Hill, 2010).
Opportunities
Although using auto manufacturers was as a risk, the company should have increased the number of manufacturers. Top among these were Nissan and Toyota companies. These two companies had initially granted XM Radio the dealer option for installation of the XM Radios while Toyota had given Sirius Radio the same option.
These two auto manufacturers are among the fastest growing in the industry and it would be prudent for the merged company to strike a pact with Toyota and Nissan for possible factory fitted radios (Jones and Hill, 2010).
The merger realized between XM radio and Sirius radio is an opportunity for the new firm to extend and expand its business since expenses for running the businesses as separate entities has gone down considerably. As such, funds previously used for recurrent expenditure like salaries could pay for advertising and other promotions (Jones and Hill, 2010).
Since the internet radio is a reality and a competitor to Sirius XM Radio, the company should venture into internet radio too and quickly utilize the Wimax technology for car radios. This will assist the company in retaining its customers as well as tapping the young generation, which does not prefer the satellite radio (Jones and Hill, 2010).
There is another opportunity of collaborating with the FM and AM stations that are so numerous in the United States of America. Sirius and XM Radios did it at some point in their history and it would be beneficial if they ventured even more. Sirius XM could offer to allocate some channels to the FM and AM stations for a fee and this would only mean more revenues of the new company, Sirius XM (Jones and Hill, 2010).
There exists another opportunity of working with companies like Apple to enable Sirius XM stream through the internet. In future, such collaboration would see Sirius XM extend its reach outside America to the whole world and reach the young adults.
Since there is no limitation for channels, Sirius XM can still come up with more premium programs like free music programs to retain the existing clients.
Threats
Internet radio is a real threat to satellite radio since the era of smartphone offers subscribers more choices for radio other than the terrestrial and satellite (Jones and Hill, 2010). The digital age could also embrace internet radio more than the satellite radio. Internet radio is available in any region in the world unlike satellite, which is also limited by geographical distances. In addition, all a client needs is a computer and internet connection and proceeds to utilize the computer while listening to the radio at the same time.
Terrestrial radio is another threat for Sirius XM (Jones and Hill, 2010). Previously, it was not a real threat but with the entrance of consolidators like Clear Channel Communication, the battle is slowly shaping up. Clear Communications Channel has utilized economies of scale concept and designed a branded format for radio programs and its pop format is picking up so well. Terrestrial radios are in the process of moving towards digital broadcasting and this would really challenge Sirius XM Radio.
The emergence and development of satellite television and cable television systems is another threat to Sirius XM (Jones and Hill, 2010). These systems providers are offering digital radio programs as part of their normal offering of television services and the radio programs come at no extra cost.
Demography poses a threat. The young people are more inclined to digital products while the satellite radio appeals to the middle aged. This implies that the digital products have a longer future than the satellite radio (Jones and Hill, 2010).
SWOT Analysis
Sirius XM, formerly two separate radio stations, has exhibited more strengths than weaknesses in their history. Federal Communication Commissions decree of allowing only two companies to buy the spectrum granted them a duopoly and later a monopoly after the merger. Monopolies can thrive very well in business if there are proper structures and avoidance of complacency. The subscriber number continued increasing rapidly with the inception of the two companies and should continue rising if the management works on the weaknesses.
Sirius XM should harness the strength of the presence of strong strategic and financial investors well enough to sustain the business at all times. The company needs to seek for more deals to increase premiums for the business to grow. The company can turn its weaknesses into strengths as well. The issue of poor market penetration calls for trained sales and marketing team with proper coordination. The team should focus on opening up new markets and creating rapports with existing and potential distributors, as well as getting new customers.
They should have set targets against the company overall targets. The same team should enable the company overcome the weakness of over concentrating on auto manufacturers for distribution purposes as they acquire alternative routes for distribution. Sirius XM should upgrade the relatively obsolete technology to modern levels to compete effectively with other players in the industry.
Concerning differentiation as a weakness, the company can venture into other lines of business for stabilitys sake. Such lines would involve coming up with clothing lines targeting the teams they work with like soccer leagues among others.
The weaknesses at Sirius XM are easily surmountable and this means that the company is still competitive and if proper strategies are in place, the company has a very high chance of becoming profitable. The issue of low share price needs adequate advertising coupled with the sales and marketing campaigns to convince potential investors to own the company through purchase of shares.
Concerning the threats the company is currently facing, with certainty, the company is able to turn threats into opportunities. The company should venture into internet radio too and harness the internet to promote the satellite services through advertisements on the websites.
The company should update its official website often to show any new feature on the satellite radio as well as the premiums charged to create awareness. The company should also engage Wimax technology to provide radios to cars for the generation that is not comfortable with the satellite radios.
Sirius XM should engage the cable television and satellite television providers for a possible collaboration in their programs. For instance, Sirius would sign an agreement with cable television in which the cable television would air Sirius XMs programs at a fee paid by Sirius XM so that the programs remain free to the clients purchasing the cable television systems. Sirius XM radio would better engage the satellite television for putting up their advertisements through the satellite television.
Terrestrial radios are a threat to Sirius XM but these are potential partners in the business. The companies have a chance of getting their programs broadcast through the satellite radio as they do advertisements for Sirius XM (Jones and Hill, 2010).
Turning those threats into opportunities combined with the existing opportunities show that the company should engage in designing strategies for better business. The opportunities are numerous and include the presence of strong strategic and financial investors, more auto manufacturers like Toyota and Nissan, and differentiation of services.
Corporate-Level Strategy
Corporate level strategy refers to strategies that deal with the wide and long term investigations of the type of business the firm is in or wants to be and how it wants to get where it intends (Business Dictionary.com, 2013). To accomplish its goals, a firm may decide to venture into new line of business, or boost the current performance through various ways, merge or acquire related companies or coming up with priorities on how to invest the available resources (Business Dictionary.com, 2013).
Sirius XM Radio is a satellite radio firm based in America, with over 100 radio channels. The company delivers its programs through 800 plus gadgets including car radios, home radios and office radios (Sirius XM Satellite Radio, 2013). Currently the companys broadcasts are available through the internet at the companys website: Sirius.com and through the Sirius XM Internet Radio (Sirius XM Satellite Radio, 2013).
Sirius XMs mission is to acquire maximum subscribers and maximum possible revenues. Its goals include influencing peoples attitude towards subscribing for radio services. The company endeavors to convince people why it is worth to pay premium for radio programs in the best possible way.
The second goal relates to enhancing the client experience so that the client gets better services all through (Sirius XM Satellite Radio, 2013). The company also aims at increasing the number of conversions from trial customer to subscribers. Overall, the company targets to minimize the number of subscribers who disconnect the companys services by stopping their subscriptions (Sirius XM Satellite Radio, 2013).
Sirius XM works in all ways to enhance revenue accruing per client as well as minimizing costs accruing from marketing. In other words, the company aims at reducing overall costs as it increases revenues from clients (Sirius XM Satellite Radio, 2013).
The company aims at communicating with the customer from the day the customer subscribes to the rest of their subscriptions with Sirius XM to create and sustain a rapport that depicts that Sirius XM understands the customer throughout the clients full cycle with the company (Sirius XM Satellite Radio, 2013).
To accomplish this, the company will afford the appropriate offer to the appropriate client at the appropriate time while at the same time avoiding the equating of offer to change in prices. The second way is to have a deep understanding of the clients by getting a 360-degree outlook of the clients relationship with Sirius XM Radio (Sirius XM Satellite Radio, 2013). Lastly, the company shall collect and use improved client knowledge to prognosticate points of change and keep the customers history intact.
Sirius XM pursues related diversification as its corporate strategy. This resulted mainly from the competition the company faced from terrestrial radio, internet radio, cable television and satellite television (Sirius XM Satellite Radio, 2013). As such, they have currently taken up to providing broadcasting through the internet, and applications such as Apple App and through cellular phones that have the Android software (Sirius XM Satellite Radio, 2013).
This is related diversification because the company sticks to the same business of broadcasting but uses different modes other than the satellite broadcasting (Business Dictionary.com, 2013).
This strategy is advantageous in that, it enables the company to stick to its core business while at the same time keeping up with the competition of the day. Since the company is experienced in the field, adopting new methods becomes relatively easy. It is a multi-business system, which provides information through broadcasting and also manufactures and sells radios through various agents.
As per the SWOT analysis, it is possible and already happening at Sirius XM. They have diversified into internet radio, and provision of broadcasts through cellular phones. They have strong financial and strategic partners who are willing to pump more finances into the business even when the business is not doing well which shows the level of confidence in the business.
The primary modes of distribution through the auto dealers should increase by bringing in other auto companies. The company is already doing so with companies like Toyota and Nissan and it is possible to negotiate with other companies like Audi (Jones and Hill, 2010).
Broadcasting and selling of satellite radios is broad enough and tasking and as such, Sirius XM is in a better position if it sticks to its core business and diversifies in related services instead of venturing into completely new businesses. As earlier, observed, signing exclusive deals with companies and athletics groups is better still.
The merger between Sirius and XM Radios was a good move since they consolidated the resources that each had. There are some teething problems like depreciation of the share. The remedy for such a problem is thorough sales and marketing campaigns and advertisements. In future, Sirius XM should try to acquire some terrestrial radio stations that would provide more local reach and enhance the awareness of the company.
Business Strategy
There are three types of business strategy, which include cost strategies, differentiated products and services strategies and focus strategies (Business Dictionary.com, 2013). Successful companies use cost strategy. It involves selling goods or providing services at relatively low prices a benefit, which accrues from taking advantage of economies of scales. Consumers benefits from savings realized from the economies of scale.
However, a firm relying on this strategy must retain some of the savings to boost its profits. Differentiated products and services strategies involves adding special features to an already existing product or service and charging customers for the extra features. Differentiation leads to increased profits that accrue from the premium charged (Business Dictionary.com, 2013).
Focus strategies is a combination of cost and differentiation strategies. As such, the firm engages in both cost strategy and differentiation strategy depending on the type of clients in a particular market. The firm must understand the market well before applying this strategy as it is risky if the market is complex. This strategy targets the urban middle class clients by providing such clients with a near perfect combination of cost savings and differentiated goods (Business Dictionary.com, 2013).
Sirius XM employs differentiation strategies as seen in its adoption of internet streaming and broadcast through applications like Apple App and android cellular phones (Sirius XM Satellite Radio, 2013). This strategy aims at solving the various threats that the company has faced in the past. Such threats include that of demography where the satellite systems did not appeal to the young but to the middle aged only. This would have denied the company a future.
As such, Sirius XM differentiated into internet streaming. Secondly, the threat from cable television too pushed Sirius XM to differentiate to collaborate with Apple Incorporation to provide such streaming through their application and this too would assist to capture the young people (Sirius XM Satellite Radio, 2013).
Sirius XM has also opened up different radio channels to cater for different tastes by different audiences. Such channels include comedies, talk shows, sports news, commercial free music channels and news bulletins.
Differentiation is what the company needed most to overcome the threats in the industry, which mostly came from the terrestrial radio stations, cable television, satellite television and internet radio. The strategy has worked well for Sirius XM because the company can now compete with any company in the same industry. They have a say in the latest internet radio technology and are available online throughout the world.
Further, the company is in a position to adopt focus strategy; it can combine both cost and differentiation strategy. The company can collaborate with cable television to offer their programs through the free programs that cable television provides to customers. Sirius XM would pay some fees to cable television so those customers who are not able to subscribe to the premium-programming can use the cable television to tune in.
In addition, the company would develop exclusive programs to already existing clients at a premium. Comedy shows and talk shows hosted by famous people like Oprah are likely to retain customers even at an extra fee as long as the company develops such programs even further. The Opie comedy show can be made more interactive to attract a greater audience but at an extra fee.
Structure and Control Systems at Sirius XM
Sirius XM Radio has five top management staff including the Chief Executive Officer, Executive President and Chief Content Officer, Executive President Sales and Operations, Executive Vice President and Chief Administrative Officer, Executive Vice President and General Counsel and the Executive Vice President and Chief Financial Officer (Sirius XM Satellite Radio, 2013).
The above corporate structure is lean and efficient. The presence of a Chief Executive Officer depicts a hands-on officer since this is an employee hired by the board of directors and is not one of the owners. As such, the Chief Executive Officer position is merit based and the board cannot easily manipulate him. It would have been different if a managing director, who would have been one of the owners chosen by the others to manage the business with limited or no skills for the job, headed the structure.
The business strategy adopted by Sirius XM of differentiation requires a person who does not have any conflict of interest and most Chief Executive Officers do not have such interests. Below the Chief Executive Officer is an Executive President who is in charge of content. Sirius XM is a broadcasting company and having such a senior person in charge of content shows that the company is ready to pursue the strategy from the top.
This person plans for broadcast programs. In addition, the officer also influences differentiation of products and services. This includes addition of new channels, improvement of existing ones as well as bringing in new programs on existing channels.
The presence of another Executive President this time for operations and sales is a show of commitment to the growth of the business. Any content designed by the content president and team needs to reach the potential and existing clients to advise them on such things as rates, the new programs, channels and so on. This team would work closely with numerous marketing relationships that already exist.
Again, the presence of an executive president is a clear indication that Sirius XM is committed to its strategy. There exists a department dealing with business development. This department is very crucial in any business and more so to Sirius XM Radio. Guided by an executive president, the department can really enhance business by coming up with new content and channels.
The department of human resources is a pointer to the fact that Sirius XM takes the issue of its employees with seriousness. However, the board should create another position to deal with systems on a technical level so that the content so improved does not lack structures for dissemination. This position would require a qualified technician who would double up as the coordinator for systems maintenance and work closely with companies that collaborate with Sirius XM to manufacture the radios.
This would ensure that such things as systems breakdown do not occur. In addition, such a department or person would also keep the company informed on the latest subcomponents that would make the system better. The same person would be in charge of all technicians in the industry with several assistants under him/her.
Sirius XM rewards its employees relatively well as well as its managers. This arises from the fact that the staff turnover rate is quite low. The management too rarely suffers from high turnover. With this in place, it therefore means that control systems at Sirius XM are intact and that the salary gap between the management and the employee is fair.
Recommendations
Sirius XM is a viable and profitable business, which can even be more profitable if the company puts certain measures. Concerning the inherent weaknesses of the company, it is proper that the company should continue engaging every available marketing relationship and avoid concentrating on any one of the m. as seen earlier, over reliance on auto manufacturers for distribution of radios suffered greatly during the 2008 financial meltdown as it led to lower sales of the cars.
The sale of cars especially from General Motors, Honda, and DaimlerChrysler as well as FORD affected the number of radios from the then separate entities of Sirius Radio and XM Radio. This was a bit risky for the company. Therefore, there is need to constantly spread risk through acquisition of several marketing relationships.
Secondly, the management at Sirius XM should seek exclusive deals with sports club to increase their justification for premium charges on their broadcast programs. Many young people who like sports are likely to subscribe to the companys programming.
Sirius XM should keep pace with the unfolding Wimax technology, which enables subscribers to receive internet streaming through their car radios. In addition, the company should carry out research on how to enhance the internet radio to reach clients outside Unites States of America
Lastly, Sirius XM Radio needs to keep on updating its satellite technology and blend it with the internet infrastructure so that the young can accept to subscribe to their programs.
References
Business Dictionary.com. (2013). BusinessDictionary. Web.
Jones, G. and Hill, C. (2010). Theory of Strategic Management with Cases. 9th ed. Thomson South-Western: China, pp.173-185.
Radio frequency identification chip is a system that assists retailers in transmitting items or peoples identity through wireless radio waves. The transmission makes use of unique coding to ensure the identity of the sent package is safe and confidential.
Most of the retailers prefer it for security purposes, as there is no need for contacts or physical encounters for the communication to take place (Harley, Jacobsen and Shai 89). The data sent through Radio Frequency Identification is not cumbersome to read as one can do it through human body or any non-metallic objects.
The simplest Radio Frequency Identification system consists of three major parts; an antenna, a transceiver whose main component is a decoder, and a transponder that has a program of an exceptional message.
The Radio Frequency Identification has assisted large retailers in transmitting data safely, to be read by the intended receiver and then processed accordingly. RFID helps large retailers to transmit the information of a certain object in a confidential manner such that the price details, cash transaction, and even the colors of the item are decoded.
Large retailers have made use of RFID for many years because of its ability to follow any load on transit. Moreover, some of its added benefits to the users include asset tracking (National Research Council 12). In large companies there are a list of the objects that are likely to be lost, the objects that are used occasionally, and those that are hard to obtain when in need. Large companies take the advantage of RFID to place some tags on such objects.
For instance, NYK Logistics has used RFID to track its containers. In manufacturing companies, RFID has assisted in several occasions like following up the ongoing process and in reducing imperfections during the process of manufacturing. Through this, the manufacturing companies experience an increased output as it is in a position of producing products of different versions.
Some of the famous retailers like Wal-Mart and Tesco are among the major users of RFID whereby their supply chain is more advanced and efficient. Through this system, they are also able to ensure that all the products that the customers may require at any time and in any quantity are available in their stores (National Research Council 23).
These retailers can now serve their customers better by the use of this system and enjoy an increased output from their businesses. The RFID has also served as a suitable payment system especially for road charges without necessarily stopping.
In many countries, this system is helping customers to pay for their services in big restaurants through the windows for quick and convenient services. Another major benefit of using RFID is for security purposes of homes, offices, and other buildings.
This system also serves as an electronic means to manage the accessibility of areas where security is essential. For the big companies, their employees make use of this system to open the gate and the doors by just holding a badge with minimal tear and wear because there is no contact required (Harley, Jacobsen and Shai 105).
Although Radio Frequency Identification is associated with many benefits, several disadvantages come with it. The major disadvantage of RFID is its cost because its tags range between 8 and 18 cents, making it more difficult to implement. In terms of cost, most of people prefer using bar codes. In addition, the RFID chips are attached to the item by use of adhesive tape that can easily be detached encouraging theft.
Anyone with a reader can take advantage of following up the items with RFID. Competitors can trace companys product movements because there is no need for sight-to-sight communications when decoding the data. During the rainy seasons, tags can spoil. Readers sometimes make common mistakes when several tags are read at the same place. At times, reader may skip an object or account for an object that does not exist in the package.
Works Cited
Harley, Connie, Lynne Jacobsen and Robkin Shai. Radio Frequency identification handbook for librarians. London: Libraries Unlimited, 2007.
National Research Council. Radio frequency identification technologies: a workshop summary. New York: National Academies Press, 2005. Web.