Tuesday, May 19, 2020

Performance Is Key Aspect Behind The Success Or Failure Of A Firm - Free Essay Example

Sample details Pages: 11 Words: 3204 Downloads: 3 Date added: 2017/06/26 Category Management Essay Type Cause and effect essay Did you like this example? Performance is a key aspect behind the success or a failure of a firm or organization. The success or failure of an organization depends upon the performance of the employee. This requires that all noses are pointing in the same direction, as every person in the organization contributes to the company objectives via his or her activities (Flapper, 1995). Don’t waste time! Our writers will create an original "Performance Is Key Aspect Behind The Success Or Failure Of A Firm" essay for you Create order However, there are a lot of factors that affect the performance among the employee in a firm or organization. The hierarchical system inside the company has always been a source of parent-child dynamism. Employees have developed a considerable amount of dissatisfaction due to this parent-child dynamism. Since, people may not function properly and learn well under the atmosphere permeated with judgment; it has been a painstaking job these days for managers to find ways for better performance in a firm or organization. A newer and better managerial tool should be developed and implemented because under a hierarchal system, someone may feel dominated. Hence to motivate the employee is very crucial to get the job done inside an organization. Hence a deep understanding of performance management process inside a company or organization is one of the utmost concerns of this research. Since TESCO is Britains leading retailer, is one of the top three retailers in the world, and is very conven ient to the researcher in terms of feasibility, availability, practicality and locality; the researcher has chosen TESCO as a target research area. Purpose/Aims/Rationale/Research Questions My objectives are twofold. First I shall investigate the factors that are responsible for performance of employee in TESCO. In doing so, it is assumed that the most important factor that effects the performance is TESCO shall also be investigated. Secondly, I shall investigate how performance is controlled and monitored in TESCO. Although there are a lot of theoretical basis for performance management, where different kinds of researches have done in different organizations, there are very few researches done in TESCO. Since, TESCO is a well established retailer that provided thousands of jobs every year, research of TESCO could play a vital role to uncover important insights about performance management. Research questions What are the factors that affect the performance of employee in TESCO? What is the most influential factor that affects the performance of employee in TESCO? How is the performance of employee controlled and monitored in TESCO? Hypotheses H0 : Motivation effects the performance. H1: H0 is not true. H0: Effective Communication has a positive relationship with performance H1: H0 is not true. Review of Literature Performance depends on education, training and experience as it could be slow and a lengthy process. However, motivation can be improved quickly. Below listed are some steps for motivation. Positive reinforcement/ high expectations Effective discipline and punishment Treating people fairly Satisfying employee needs Setting work related goals Restructuring jobs Base rewards on job performance The success and continuity of an organization depend on its performance, which may be defined as the way the organization carries its objectives into effect. This requires that all noses are pointing in the same direction, as every person in the organization contributes to the company objectives via his or her activities. A good manager keeps track of the performance of the system he or she is responsible for by means of performance measurement (PM). His/her staff carrying responsibility for certain activities within the system, need PM to see how well they are performin g their tasks. This also holds for the employees actually executing the various process steps. So performance indicators (PIs) are important for everyone inside an organization, as they tell what has to be measured and what are the control limits the actual performance should be within (Flapper et al, 1995) What you measure is what you get. Senior executives understand that their organizations measurement system strongly affects the behaviour of managers and employees. Executives also understand that traditional financial accounting measures like return-on-investment and earnings-per-share can give misleading signals for continuous improvement and innovation-activities todays competitive environment (Norton Kaplan, 1992). 3.1 Theories of Motivation There is an old saying that you can take a horse to water but you cannot force it to drink, it will drink only if it is thirsty. It will only drink water if it is thirst or in other words if it is motivated to drink. Whether working in a simple restaurant or in a extremely competitive business market, they must be motivated or driven to it. Performance is understood as a function of ability and motivation. Job performance= ÃÆ'† Ãƒ ¢Ã¢â€š ¬Ã¢â€ž ¢ (ability) (motivation) 3.1.1 Definition of Motivation A motive is a reason for doing something. Motivation is concerned with the factors that motivate people to behave in certain ways (Armstrong, 1999: pp-22). Motivation is incidental to or defined by goal directed behavior (Locke Et al, 1995). It means that motivation is concerned with strength and direction of that behavior. In other words it means that motivation takes place when people expect that an action is probable to lead to an achievement of a goal and a valued reward and will satisfy their needs and desires. Well-motivated people are therefore those with clearly defined goals who take action which they expect will achieve those goals (Armstrong, 1999: pp-22). It is undoubtedly clear that motivation affects the performance. Hence, motivation among the employee is a very crucial driving factor in a firm or an organization. The process of motivation The process of motivation can be modelled as shown in the figure below. This model is grounded on the needs of a particular person where it shows that motivation is a result of conscious of unconscious recognition of unsatisfied needs. Needs create wants, which means desire(s) to get goods or obtain something. 2. Establish Goal 1. Need 3. Take action Attain Goal (Fig 1.1 Source: Armstrong, 1993) Goals are then established which will satisfy these needs and then a action is taken in the expectation that the action will facilitation the achievement of the particular goal imagined/setup by him/her. If the goal is achieved, then the need shall be satisfied and the behavior will repeat next time when same kind of need emerges and if the goal is not achieved then the behavior or action is less likely to be repeated. This model illustrates the motivation process from a individualistic perspective. It is based on the motivational theories related to needs (achievements), goals, equity, behaviour modelling (reactance) and expectancy. It is also influenced by three concepts relating to motivation and behaviour: reinforcement (Hull, 1951), homeostasis, intrinsic and extrinsic theories. This model can be used to illustrate a process of motivation which involves setting of corporate goals that will likely be able to meet the individual and ultimately organizational needs and wants and encourage the behaviour required to achieve those goals. 3.3 Theory of Performance A generalized theory of performance does not exist. However, there are theories of performance built on specific disciplines of studies such economics, psychology etc. Organizational behaviour describes as the criterion problem. We might want to extend it to the study of HRM. Performance management is a concept that has been spreading in developing countries relative to developed countries. There are various ways of understanding PM, from different aspects like theoretical, practical etc. However most of them agree that PM is a process of optimal management and allocation of resources that will help in achieving a common goal in an organization. (Edis, 1995) argues that PM is a management process which people and their jobs to strategy and objectives of the organization. On the other hand Slater et al (1998) argue that PM is a value adding process of organizational performance. PM is defined within private sector as systematic and data oriented approach to manage peoples behaviour at work that relies of positive reinforcement as a major as a major way of optimising performance. Who are the real stake holders of performance and is performance same as outcomes? Generally performance can be seen as a company dominated criterion but outcome can be seen in a much broader sense and depends on a lot factors. These factors can be for example, environmental issues, job satisfaction, contribution towards the community or society etc. In an organizationally determined performance criterion, there might be a risk that some of these factors are ignored. PM is also defined as an integrated set of planning and review procedures, which cascades down through the organisation to provide a link between each individual and the overall strategy of the organisation (Rogers, 1994). (NAHT, 1991) describes PM as a mix of managerial strategies and techniques via which jobholders have better understanding about what the organization is trying to achieve; understand what is expect ed from their job and are provided with regular feedback on how they have been doing and have a continuous support from their managers and have an opportunity to understand, and judge their performance. PM is not just appraisal; neither is it just incentives and financial rewards. PM is a much broader concept. Performance appraisal could play a vital role in performance management but it is a part of an integrative approach, incorporating process, attitudes and behaviours that will ultimately produce effective and coherent strategies for raising levels of effective individual performance. 4. Research Methodology 4.1 Research Philosophy Different research philosophies have been seen in earlier research. In business researches broadly two different research philosophies have been classified, positivism and interpretivism. The two paradigms differ from each other in the way they answer the following questions (Figueirido Cunha, 2007). a) The ontological question enquires about what can be known; b) The epistemological question looks into what is knowledge and what knowledge can we get; c) The methodological question enquires about how we can build on that knowledge; d) The ethical question asks what is the worth, or value, of the knowledge we build. Orlikowski and Baroundi (1991 p.5) described the differences between what is traditionally viewed as positivist or interpretive as follows: Positivist studies are premised on the existence of a priori fixed relationship within phenomena which are typically investigated with structured instrumentation [ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦]positivist studies are characterized by evidence of formal propositions, quantifiable measures of variables, hypotheses testing, and the drawing of inferences about a phenomenon from the sample to a stated population [ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦] interpretative studies assume that people create and associate their own subjective and intersubjective meanings as they interact with the world around them. Interpretative researchers thus attempt to understand phenomena through accessing the meanings that participants assign to them [ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦] reject the possibility of an objective or factual account of events and situations, seeking instead a relativistic, albeit shared, understanding of phenomena Positivistic and interpretative research philosophies are so different to each other that they are almost mutually exclusive to each other in terms of Assumptions, roles of researcher and the characteristics . According to a positivistic approach the researcher is outside the gla ss and the research occurs behind the glass where the researcher observes the phenomenon without interfering it. However, the case is quite different in interpretivism which generally acknowledges the researches participation and interaction with the subject and attempt to reflect their bias as integrals to insights derived (DeLuca et al 2008) The research we are trying to undertake requires an interaction of the researcher with the subject as it requires observation of a social phenomenon. Interpretive research can help researchers to understand human thought and action in social and organizational contexts; it has the potential to produce deep insights into information systems phenomena including the management of information systems and information systems development (Klein and Myers 1999 p.67). 4.2 Approach of the study The exploratory nature of the problem makes the researcher to follow case study method. Although survey research has been very popular among the social science researchers, this kind of research may not provide a deep insight about a phenomenon. Field studies and interviews during case studies can provide richer data that that cannot be achieved via survey research method and can measure the casual effects more closely (Abrahamson, 1983). Although the research sounds more qualitative, considerations shall also be given to validity and reliability of the data. To be clear, the current research study is qualitative in nature but it shall follow both qualitative frameworks in data analysis. Data triangulation could serve as a medium to validate the data. Primary data shall be collected through questionnaires and interviews and secondary data can be collected through documentations, and other source of information, especially internet. 4.3 Qualitative and Quantitative research approach Qualitative research explores attitudes, behaviour and experiences through different methods such as interviews or focus groups. It attempts to get in-depth opinion from the participants. Since it is about attitude, behaviour or experiences, the sample size is relatively low in this kind of research. Since the research topic is also about behavioural studies, qualitative research can be quite useful in addressing the research problem. Quantitative research generates statistics through the use of large scale survey research, using tools like questionnaire or interviews (structured). This type of research involves a large number of samples, hence is believed to be highly reliable. However, this research method has been blamed to have less contact with the participants, hence less engagements, and hence shallow data, in comparison to qualitative method which is believed to draw deeper inferences. 4.4 Research tools Case study shall be done in a TESCO store to understand the performance management process in that particular organization. Semi structured Interviews along with questionnaires shall be the research tools, those of which will provide both qualitative and quantitative data. Secondary data shall also be collected via mediums like internet. Making an enquiry to learn a lesson from the expertise that practices it requires a closer integration with subject of analysis for some amount of time. Under such conditions, survey research is believed to more effective in comparison to other qualitative research methods (See Holloway, 1997). 4.5 Definition of Case study Meriam (1998) defines case study as an entity which is studied as a single unit and has clear boundaries; it is an investigation of a system, an event, a process or a programme. However the definition of case study has changed with time and disciplines of studies. It is used in varieties of qualitative and quantitative research; however in this research it describes the qualitative study. Case studies differ from other qualitative approaches because of its three distinct characteristics; specificity, boundedness and multiplicity (Holloway, Ibid, Yin Opt cited). Yin argues that an empirical inquiry is preferred when the subject is to be studied is a contemporary phenomenon with a real life situation, when boundaries between phenomenon and content are not clearly evident, and in which multiple source of evidence is used. 4.6 Why survey within a case study approach? Like in other qualitative research, a case study can just function as exploring the phenomenon in a specific context. A single case study may not always be generalizable; it is just a step towards generalization. It is wise to use number of steps towards generalization. It has been seen that researchers use number of sources in their data collection for example observation, documents and interviews etc, so that the study can be brighter and can gain a maximum validity. Observation and documentary research are the most common strategies that are used in case study research (Holloway, op.cit). However, when the purpose of the study is to understand the context of a contemporary phenomenon and extract lessons, a case study research approach can be an invaluable exploratory device (Gill and Johnson, 1997). According to Preece (1994), and Sharp Howard (1996), a case study is a complex research activity, which may combine a number of general research instruments, such as interviews, obs ervations, discussions, questionnaires, focus groups etc. 4.7 Maintenance of validity and Reliability Reliability and validity are tools of an essentially positivist epistemology. (Watling, as cited in Winter, 200, p. 7). Joppe (2000) defines reliability as: ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦The extent to which results are consistent over time and an accurate representation of the total population under study is referred to as reliability and if the results of a study can be reproduced under a similar methodology, then the research instrument is considered to be reliable. (p. 1) Joppe (2000) provides the following explanation of what validity is in quantitative research: Validity determines whether the research truly measures that which it was intended to measure or how truthful the research results are. In other words, does the research instrument allow you to hit the bulls eye of your research object? Researchers generally determine validity by asking a series of questions, and will often look for the answers in the research of others. (p. 1) The qualitative data is always in a risk of lacking validity and reliability because of its relatively smaller sample size. Hence a proper consideration should be given about how to maintain validity and reliability of a research. An invalid or unreliable research study is not of any real importance. If the validity or trustworthiness can be maximized or tested then more credible and defensible result (Johnson, 1997, p. 283) may lead to generalizability which is one of the concepts suggested by Stenbacka (2001) as the structure for both doing and documenting high quality qualitative research. Hence the quality of a research depends on generalizability and thereby trustfulness and validity of the research. Maxwell (1992) on the other hand believes that the degree to which an account is generalizable is a key factor of distinguishing qualitative and quantitative research approaches. Hence, in this sense validity in qualitative method is very specific to a test to which it is applied in qualitative research, which is Triangulation. 4.7.1 Triangulation Triangulation is typically a strategy (test) for improving the validity and reliability of research or evaluation of findings. Mathison (1988) elaborates this by saying: Triangulation has risen an important methodological issue in naturalistic and qualitative approaches to evaluation [in order to] control bias and establishing valid propositions because traditional scientific techniques are incompatible with this alternate epistemology. (p. 13) Patton (2000) argues that triangulation strengthens a study by combining methods. This can mean using several kinds of methods or data, including using both quantitative and qualitative approaches (p. 247). However there are some serious attacks on triangulation (See Barbour, 1998). She argues while mixing paradigms can be possible but mixing methods within one paradigm, such as qualitative research, is problematic since each method within the qualitative paradigm has its own assumption in terms of theoretical frameworks we bring to be ar on our research (p. 353). One of the paradigm of social research is constructivism, which views knowledge as a social process and may change within the change in circumstances. Crotty (1998) has defined constructivism from social perspective that the view that all knowledge, and therefore all meaningful reality as such, is contingent upon human practices, being constructed in and out of interaction between human beings and their world, and developed and transmitted within an essentially social context (p. 42). In any qualitative research, the aim is to engage in research that probes for deeper understanding rather than examining surface features (Johnson, 1995, p. 4) and constructivism may facilitate toward that aim. The constructivist notion, that reality is changing whether the observer wishes it or not (Hipps, 1993), is an indication of multiple or possibly diverse constructions of reality. Constructivism values the multiple realities that people have inside their mind. Hen ce different kinds of methods should be used to uncover those realities and validating the research process in such a constructive environment is highly important.

Wednesday, May 6, 2020

The Physics of Boomerangs Essay - 1379 Words

The Physics of Boomerangs The successful flight of a boomerang looks as though it never should happen. Its more or less circular flight path comes from the interaction of two physical phenomena: the aerodynamic lift of the arms of the boomerang and the spinning boomerang’s maintenance of angular momentum. Briefly put, the airfoil at the boomerang’s forward rotating edge provides more lift than its rearward rotating edge. This elevates one side of the boomerang. The spinning object maintains angular momentum by turning at a right angle to its axis of rotation. When the spin and the velocity of boomerang are just right, it flies away and returns in an aesthetically satisfying circle. The boomerang’s distinctive flight starts with†¦show more content†¦But when a fluid encounters an obstruction in an open situation--a current in a river hitting a stick or an airfoil in the air--the same general rule applies. As the fluid accelerates around an object, its pressure decreases. If an airfoil is moving through the air, then the air accelerates as it goes over it. If the air foil were symmetrical, the air pressure would drop on both sides and the foil would have no net force acting on it. But if one side of a foil were curved and the other flat, then the pressure on the curved side would be less and the foil would be drawn in the direction of the lower air pressure (or the higher pressure on the flat side would push the foil in the direction of the curved side). For example, when rules allow, race cars have an upside down foil along their bottoms to increase down force and with it, their cornering ability. Much more commonly, airplane wings and helicopter rotors use the curved foil to create low pressure areas on their top sides to allow the higher pressure under the wing/rotor to push the wing/rotor upward. The introductory chapter of John Allen’s Aerodynamics: The Science of Air in Motion describes a complex interaction between the object the the air in motion around it. He explains that theShow MoreRelatedPhysics of Boomerangs638 Words   |  3 PagesBoomerangs are one of the first throwing machines invented by humans. Boomerangs first developed as an improvement of the carved throwing sticks. Usually made of wood and they were banana shaped; both arms were carved into curved surfaces. Typically 3 ft long and weighing 5-10 lbs. they were effective hunting tools. When thrown, boomerangs traveled parallel to the ground as far as 650 ft The physics of a Boomerang can be broken down into three simple reasons: 1. A boomerang has 2 arms or wings, similarRead MoreCompare And Contrast Batman Of Dc And Iron Man925 Words   |  4 Pagesintellect and enormous amounts of money to create technology for their powers. Iron Man, whose true name is Anthony â€Å"Tony† Stark, entered MIT at age 15 to study electrical engineering. He received a master’s degree in electrical engineering and physics. Using this, he developed weapons for the military. While driving back from a weapons test site, he and his military escort were attacked by terrorists. After getting kidnapped by the terrorists, they wanted to use him to create a weapon of mass destructionRead MoreA History of Roller Coasters Essay2453 Words   |  10 Pagessubcategories of roller coasters that go with them. For steel roller coasters the subcategories are hydraulic launched, air launched, multi-looper, catapult, inverted, hyper, spinning, four dimensional, traditional, corkscrew, impulse, boomerang, and gigantic inverted boomerang. When it comes to wooden roller coasters there aren’t nearly as many subcategories of roller coasters. Subcategories for the wooden roller coasters are the outback, wooden twister, terrain, M oebis, racing, dueling, looping, andRead MoreAnalysis Of The Unconstitutional 40 Year War On Students Essay1641 Words   |  7 Pagesstimulus will elicit some sort of response. Similarly, Isaac Newton taught us that one force provokes another, in direct opposition to it. Although various life experience may â€Å"elicit† a response, our emotions tend to gravitate towards the laws of physics rather than biology. It may seem counterintuitive, but the pressure of provocation is arguably the best method of impelling us to act. Adversity, after all, stimulates, coerces, and sharpens people in ways that prosperity simply cannot. Indeed, itRead More beach erosion Essay examples3156 Words   |  13 Pagespermeable they are, the more energy will dissipate before it reaches landward development or natural resources.nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp;. Simple solutions boomerang Cities like Miami Beach that built ri ght up to the bluffs above the beach soon noticed that the bluffs were eroding, bringing the ocean a bit too close for comfort. The city responded by reinforcing the bluffs with sea walls. But the walls reflectedRead MoreInnovators Dna84615 Words   |  339 Pagessister â€Å"thinking big thoughts†; she played girls’ cricket avidly and was lead guitarist in an all-girl rock band (it’s no surprise that she still performs on stage at PepsiCo events). She ï ¬ nished a multidisciplinary undergraduate degree in chemistry, physics, and math before getting her MBA in Calcutta. Nooyi then worked in the textile industry (Tootal) and consumer products industry (Johnson Johnson) before getting a master’s of public and private management at Yale. After graduation, she shiftedRead MoreDeveloping Management Skills404131 Words   |  1617 Pagesgraphics say that by viewing images instead of numbers, a fundamental change in the way researchers think and work is occurring. People have a lot easier time getting an intuition from pictures than they do from numbers and tables or formulas. In most physics experiments, the answer used to be a number or a string of numbers. In the last few years the answer has increasingly become a picture† (Markoff, 1988, p. D3). To illustrate the differences among thinking languages, consider the following simple problem:

Information Technologies Mobile Ad Hoc Network

Questions: 1. Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type.2. Explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model?3.Calculate the approximate bit rate and signal level(s) for a 3.5 MHz bandwidth system with a signal to noise ratio of 133.4.Compare IPv4 and IPv6 private addressing. Discuss address ranges and relative sizes. Why don't the same private addresses in different locations cause conflict on the Internet?5. According to RFC1939, a POP3 session is one of the following states: closed, authorization, transaction or update. Draw a diagram to show these four states and how POP3 moves between them.6. What is a Distributed Hash Table (DHT) and how is it used in P2P networks? Briefly, explain how a DHT works with an example of a P2P network. Answers: 1. Star topology is the connection of the nodes to the central hub. The advantages of this type of topology are many; the system is easy to install in a premise as the networking needs only a central hub and the wires that are used to connect the nodes or the computers to the hub (Bisht Singh, 2015). The star network can be seen in most of the offices where the central LAN server can be observed with which the computers are connected. The Bus topology is the networking method in which the central bus is used for connection between the nodes, the advantage of the system is lesser wire and a common backbone, in which transfer is decided by the bus master, which ensures connection between the nodes (Jiang, 2015). This topology is used in Industrial Ethernet where the RTUs send signals after equal interval of time Mesh topology is the networking where each node is connected to each other through a separate communication media. This distributed networking makes the system most versatile for sensitive networks (Lim, 2016). This networking topology is used in MANET (Mobile Ad hoc Network) in which the mobile device is connected to multiple devices as it moves through the space, hence making a larger interconnected space. Topologies Advantages Disadvantages Star Topology Node failure doesnt affect the working of the system Easy to install Easy fault diagnosis Updating or modification is easy Expensive as it needs more cable Failure of the central node will cripple the system Terminators are required at the end of the cable Problem identification is difficult Bus Topology Very reliable for small networks Cheaper as requires lesser amount of cable Easy to extend and update Since only the bus master is given the power to transfer the next transfer has to wait till the transfer is complete Bus failure will result in termination of services Mesh Topology This topology is most versatile as, in case of redundancy the data can be rerouted through other nodes Provides best data privacy Network errors are easier to diagnose Costliest topology as the wire needed for the networking is very high Table 1: The advantages and the disadvantages of Topologies (Table Source: As created by the author) 2. The OSI (Open Systems Interconnection) model is developed by ISO (International Organization for Standardization) and aims to standardize the communication between the communicating devices to enhance the interoperability of devices, whereas TCP/IP is just a standard for interconnection. TCP/IP lacks the generic structure of the OSI model. OSI model consists of seven layers which divide the labor for interaction with one another on the contrary the TCP/IP model contains only five layers that makes the task of each layer complex. OSI layer has dedicated transport layer which ensures data packet delivery to the destination which saves the data loss which is common in TCP/IP. Finally the separate layer structure makes the OSI model much more versatile and easier to update compared to five layered TCP/IP model. In his textbook author Tanenbaum (2003) have discussed in detail about the failure of OSI model.The failure of the model has been attributed to three major factors which are timing, technology and the implementation and politics. The time was bad for implementation as the release of the model was delayed due to extensive research that has been carried out for the modeling and which resulted in extensive expenditure on TCP/IP. The technology was not up to the mark as few layers were empty and the others were overloaded (Severance, 2013). Due to these issues, the earlier models of the OSI were buggy. Finally, the patch up of TCP/IP with Unix buried the last hope of implementation on large-scale (Why is TCP/IP used rather than OSI? - 77624 - The Cisco Learning Network, 2016). 3. The channel capacity: 4. Private addresses are the IP addresses that are not directly connected to the internet. These IP addresses are meant for an internal network like LAN, etc., the router which connects the computer to the internet uses tools like Network Address Translator (NAT) for connecting to the internet (Matousek Skacan KoÃ…â„ ¢enek, 2013). IPv4 IPv6 Address length of IPv4 is 32 bits IPv6 has 128-bit long address They are represented in decimal numbers They are represented by the hexadecimal numbers Two types of configuration are available (manual and automatic) Only automatic configuration is available Identification of packet flow is not available Flow label is available forIPv6 header Table 3: Comparison between IPv4 and IPv6 (Table source: As created by author) IPv4 which has an address length of 32 bits has the maximum address of 1016-2, but the IPv6 which used hexadecimal digits instead of decimal has a wider range of 1028 addresses. Hence IPv4 has an addressing constraint whereas IPv6 doesn't have an addressing constraint. The private addresses are used only on the local networks and are prohibited from using it in public internet. For the purpose of public interaction, the separate address is generated by NAT which removes the concept of IP conflict. Hence same IP address can be used in different networks without any conflict of interest. 5. The POP3 commands are highly dependent upon the present states which are namely the closed state, authorization state, and transaction and finally the update state after which the connection is closed again. The authorization starts after the connection has been established between the client and the server. For the connection, the between the two sides TCP three-way handshake is used. During the authorization, the client sends the username and password, and the authorization is granted to the user. In the second state, the information about the transaction state is provided, and the data regarding the e-mails are provided (Fujiwara Newman Yao, 2013). During the transaction, the STAT for the status, LIST for the content, RETR for returning the messages and DELE for deletion of the messages are the major signals. The messages are updated following the initial transactions, and apart from the above, various other signals are generated for the update. Finally, during the close session, QUIT command is generated for terminating the connection. Image 4: The four states of POP3 and how it moves through the stages (Image Source: As created by author in Visio) 6. A hash table is the data structure used for implementation of the arrays for mapping the keys to the values which help in finding and retrieving the desired values. Hence the DHT could be understood as the distributed system that offers services similar to hash tables. P2P (Peer-to-Peer) is an application that is structured in a way to distribute the tasks among the peers so that the workload is distributed among the peers and the workload is reduced. In a P2P system, the every peer is an equal contributor and equipotent in term of resource allocation. The peers of the system allocate a portion of their computing resources for carrying out the tasks (He et al.,2016). The most common type of structured P2P systems is implemented through DHT. In DHT, the hash tags are given to the various segments that are available with the different peers. The foundation of the DHT consists of abstract keyspace which are bit-strings. A program then slits the partnership of the keyspace among the peers, then an overlay network communicates between the nodes to which allows them to track the real file (DAcunto et al., 2013). BitTorrent is a similar P2P program which uses its protocol for transferring and receiving the files. It is a two tier P2P that also allows searches across the network. BitTorrent is completely server less as the files are distributed all over the network and the distributed computing from the shared computers. The user of the service becomes a decentralized connected network. References Bisht, N., Singh, S. (2015). Analytical Study if different Network Topologies. DAcunto, L., Chiluka, N., Vink, T., Sips, H. (2013). BitTorrent-like P2P approaches for VoD: A comparative study.Computer Networks,57(5), 1253-1276. Fujiwara, K., Newman, C., Yao, J. (2013). Post Office Protocol Version 3 (POP3) Support for UTF-8. He, Q., Dong, Q., Zhao, B., Wang, Y., Qiang, B. (2016). P2P Traffic Optimization based on Congestion Distance and DHT.Journal of Internet Services and Information Security (JISIS),6(2), 53-69. Jiang, R. (2015). A review of Network Topology. Lim, F. P. (2016). A Review-Analysis of Network Topologies for Microenterprises.Small,3, 15-000. Matouek, J., SkaÄ an, M., KoÃ…â„ ¢enek, J. (2013, April). Towards hardware architecture for memory efficient IPv4/IPv6 Lookup in 100 Gbps networks. InDesign and Diagnostics of Electronic Circuits Systems (DDECS), 2013 IEEE 16th International Symposium on(pp. 108-111). IEEE. Severance, C. (2013). Andrew Tanenbaum: Writing the Book on Networks.Computer,46(12), 9-10. Tanenbaum, A. S. (2003). Computer networks, 4-th edition.Ed: Prentice Hall. Why is TCP/IP used rather than OSI? - 77624 - The Cisco Learning Network. (2016). Learningnetwork.cisco.com. Retrieved 19 September 2016, from https://learningnetwork.cisco.com/thread/77624