Tuesday, December 31, 2019

Iago, By William Shakespeare - 1669 Words

In William Shakespeare’s Othello, the antagonist Iago is arguably the most heinous villain in all of literature. His ability to shape shift in and out of character is what makes him unique. His tactics are similar to that of a cold blooded chameleon. Iago’s art of persuasion, his mastery of rhetoric as well as his ability to sense his victims’ insecurities and weaknesses, is what makes him so diabolically ruthless. Throughout the play, one can truly see the power of words and their delivery, and the massive influence that they can have over people. Iago employs charlatan techniques to appeal to his victims’ emotional, logical and ethical weaknesses for his own selfish political gain. Iago’s rhetorical methods entrances many of the key characters and leads them to arrive at the assumptions he wants them to reach. Through these methods, Iago is able to transform Othello from a calm, collected, composed general to an insecure, emotional, and mal leable puppet. Through his manipulation of all the key characters, Iago is nonetheless able to remain in favored perception, as he is ironically referred to as â€Å"honest Iago†. What makes Iago so intriguing, is his ability to carry out his selfish agenda without being detected. Iago utilizes reverse psychology, indirect insinuations, and explicit imagery to deceive others and force them under his spell. Iago’s intentions are always veiled throughout the play. Iago uses a plethora of rhetorical strategies primarily againstShow MoreRelatedThe Concept Of Iago By William Shakespeare1163 Words   |  5 Pagesâ€Å"The Concept of Iago† William Shakespeare’s plays all have a common theme: death. There is almost always death, and the play of â€Å"Othello† is no different since it ends in a â€Å"tragedy.† It begins with a man named Iago who speaks to Roderigo of how he should have received the position of lieutenant that was instead given to Cassio, a inexperienced man in his words, by Othello, the General. Iago shows distaste towards Othello, the play then goes through the story of Iago attempting to receive the positionRead MoreIago, By William Shakespeare1563 Words   |  7 PagesShakespeare’s malicious characters, Iago seems to be one of a kind. At the beginning of the play, Iago is described as a character who is a good liar with a silver tongued eloquence. However, he turns out be a more villain in the end, putting other characters in peril without any justifiable reason. In Act 1 Scene 1 (Shakespeare, 1997), Iago shows discontentment toward Othello for placing him as lieutenant in stead of promotion. This part clearly shows why Iago is upset and feels hatred. However,Read MoreThe Character of Iago in William Shakespeare Essay665 Words   |  3 PagesThe Character of Iago in William Shakespeare In the extract Iago truly shows himself to be a man of great impression upon people around him, and mostly of course people of his choice, in this case Roderigo being his victim of persuasion. Most importantly to be regarded is that Iagos methods are structured almost completely behind the way in which he communicates, and put Read MoreWilliam Shakespeare s Othello - The Jealous Iago !1171 Words   |  5 Pages1102 The Jealous Iago! Jealousy is a strong emotion which everyone has experienced in some point or time in their life. Throughout Othello by William Shakespeare, the character Iago is known as â€Å"honest Iago† and deals with the roots of jealously. Iago uses jealousy, lies, and deception to manipulate and hurt other characters for his own personal gain. Iago is consumed with jealousy for Michael Cassio and Othello because he was not chosen as lieutenant, and Cassio was. Because of Iago jealously and hatredRead MoreIago By William Shakespeare s Othello Essay914 Words   |  4 Pageson today. Behind every lie, there is a motive for doing so. In Shakespeare s Othello, Iago is no exception to this rule. He is living a dual life of lies. On one face Iago is a trustworthy friend who is attempting to set up Roderigo with the love of his life. His other face is the one whose main goal is to be the Lieutenant of the Venetian Army. In order to reach that status he must ruin the relationship of Cassio an d Othello. Iago uses each other character against others and against themselvesRead MoreIago By William Shakespeare s Othello946 Words   |  4 Pages Iago’s selfish ways may stem from deep-rooted envy. Cassio, a handsome, well-mannered, likeable strategist was promoted above Iago, despite having no practical experience; unlike Iago who has been Othello’s ensign on the field for many years. Iago’s contempt for Cassio’s â€Å"bookish theoric† as â€Å"mere prattle, without practise† is grounded in jealousy, and his dismissive way of comparing strategy to fighting on the battlefield reveals his dislike of Cassio early in the first scene of the play. In thisRead MoreIago By William Shakespeare s Othello1292 Words   |  6 PagesIago is able to manipulate different characters throughout Othello by appearing to be honest and trustworthy, and using this to make people believe what he is saying is the truth. This means that Iago can tell them what he wants, in order to achieve whatever he desires. Simply, Iago is a two-faced character. A very ironic part of the play is when Iago says, â€Å"By J anus†, as Janus is a two- faced Roman god. The first person/character is Rodrigo. Rodrigo is blinded by his love for Desdemona and is preparedRead MoreIago ´s Facade in William Shakespeare ´s Othello520 Words   |  2 Pagesdescribes the villainous Iago better than this. Iago hides behind the faà §ade of a loyal soldier while secretly manipulating the world around him not only for personal gain but also in order to ruin the lives of those he feels have wronged him. Even those close to Iago, such as his loyal servant Roderigo, who think they know him, are being deceived. Throughout the play Iago shows his ability to manipulate people based on their good traits, one key example being Othello. Iago ruins Othello’s life byRead MoreWilliam Shakespeare s Othello - A Diagnosis Of Literary Character, Iago1460 Words   |  6 Pages A Diagnosis of literary Character,Iago In a Shakespearean tragedy, no man is left out in the vicious storyline of fate. Meaning in every situation there must be a character that is fraudulent and misleading. To which this character would tell false lies to hopefully make the plot end in disaster. In the dramatic play Othello, Shakespeare unleashes the tale of an interracial marriage between a Moor (Othello) and a Venetian woman. Which continuously builds on internal dialogue, race, genderRead MoreBetraying and Lying in Othello by William Shakespeare1726 Words   |  7 Pagesuntruthfulness are a keen description of Iago. Iago causes pain in a lot of the characters life because he is unhappy about his life; Therefore, Iago is the main problem in everyone’s life. In Othello the main characters are Othello, Desdemona, Iago, and Cassio. Iago causes great conflict between Othello and Desdemona, along with Cassio and Othello. Iago causes all the conflict because he is angry at Othello for making Cassio lieutenant. After Iago put his plan in action he led Othello to a

Monday, December 23, 2019

Evaluate the Methods Used by the Psychodynamic Approach

Charlotte King Orion 12 Psychology EXAM QUESTIONS Evaluate methods used by the psychodynamic approach. One of the methods used by the psychodynamic approach is case studies. Case studies are used to practice their therapy on to see if it actually works. The therapy created by Sigmund Freud, is called psychoanalysis. An example of one of the case studies would be the case study of Little Hans. Hans was at the age where he noticed he had a penis and therefore played with it a lot. His mother noticed this and told him to stop it otherwise she would call the doctor and get him to cut it off. Hans later on developed a phobia of horses, so his father got in touch with Freud and told him about Hans’ strange behaviour and he suggested that†¦show more content†¦Secondary elaboration occurs when the unconscious mind strings together wish-fulfilling images in a logical order of events, further obscuring the latent content. According to Freud this is why the manifest content of dreams can be in the form of believable events. On 24 July 1895, Freud had his own dream that was to form the basis of his theory. He had been worried about a patient, Irma, who was not doing as well in treatment as he had hoped. Freud in blamed himself for this, and was feeling guilty. Freud dreamed that he met Irma at a party and examined her. He then saw a chemical formula for a drug that another doctor had given Irma flash before his eyes and realised that her condition was caused by a dirty syringe used by the other doctor. Freud was no longer guilty. Freud interpreted this dream as wish-fulfilment. He had wished that Irma s poor condition was not his fault and the dream had fulfilled this wish by informing him that another doctor was at fault. Based on this dream, Freud went on to propose that a major function of dreams was the fulfilment of wishes. Another method used in psychoanalysis is free association. Free Association or the Talking Cure is based on the psychodynamic model of abnormality. Psychotherapy places great significance on childhood experiences, such as the psychosexual stages, and on repressed impulses and unresolved conflicts in the unconscious. The aim of psychotherapy is to bringShow MoreRelatedThe Philosophy Of Psychology Is Defined As The Scientific Study Of The Human Mind And Behavior1281 Words   |  6 Pages‘Discourse on method’ (1637) and ‘The mediations’ (1641). It claims of the mind and the body being of two separate entities that come together to create the human experience. During the 18th century, the first psychological laboratory was established in Leipzig, Germany by Wilhelm Wundt (1879) who is also known as the father of psychology. Wundt brought about the theory of structuralism, where he used introspection to focus on the basic elements of consciousness. However, this method was seen to beRead MoreCognitive Theories And Theories Of Psychology1526 Words   |  7 Pagesorder to understand certain behavior. The most common approaches in psychology are psychodynamic, behavior, cognitive, humanistic, and biological approaches. The ultimate goal of each method is to help individuals change unhealthy thoughts, behaviors, and emotions. However, these different approaches use different techniques to form assumptions and explanations about abnormality. In this essay, cognitive and psychodynamic are the two approaches that will be discussed. Even though these two approachesRead MoreWeakness in Sigmound Freud’s Theories799 Words   |  4 PagesThis essay will attempt to highlight and evaluate the strengths and weaknesses of the three main theories of counselling within the module covered this term. The three approaches in discussion are psychodynamics, cognitive behavioural and humanistic. The psychodynamic theory originated from Sigmund Freud, a medical doctor and philosopher (1856 - 1939) founded in the 1900s. Freud developed his ideas whilst working as a psychiatrist in Vienna, collecting information from his patients such as feelingsRead MorePsychodynamic Theories And Theories Of The Psychodynamic Theory Essay1702 Words   |  7 Pages This paper attempts to explore psychodynamic theory in depth as well as its presentation in real life as presented by Sigmund Freud. It presents an analysis of the theory in terms of its historical developments and perspectives as well as the ideas of its main supporters. Further, the paper also attempts to bring to light the hidden and unambiguous assumptions made by the theory concerning individuals, groups, families, systems and communities. Additionally, It will attempt to highlight the relationshipRead MoreEvaluating the Main Theories of Counselling Essay1695 Words   |  7 PagesThis essay will attempt to highlight and evaluate the strengths and weaknesses of the three main theories of counselling within the module covered this term. The three approaches in discussion are psychodynamics, cognitive behavioural and humanistic. The psychodynamic theory originated from Sigmund Freud, a medical doctor and philosopher (1856 - 1939) founded in the 1900s. Freud developed his ideas whilst working as a psychiatrist in Vienna, collecting information from his patients such as feelingsRead MoreBriefly Outline the Key Features of a Cognitive-Behavioural Approach to Counselling1478 Words   |  6 Pagescognitive-behavioural approach to counselling and discuss some of the ways in which this approach differs from one of the other main approaches to counselling. In part two reflect on and write about which of the two approaches discussed in your essay you prefer and why. This essay will explain key aspects of a cognitive-behavioural approach to counselling. Revealing how this method of counselling differs from the psychodynamic approach, and demonstrating my preferred method. The first of these approachesRead Morecounselling theory essay1690 Words   |  7 PagesIntroduction In this essay I will describe key elements of Psychodynamic theory, Person-Centred theory and Cognitive-Behavioural theory. I will also identify the key differences between the above theories. I shall also describe how counselling theory underpins the use of counselling skills in practise. I will then end with my conclusion. 1.1 Key elements of psychodynamic theory Dr Sigmud Freud (1856-1939), is the founder of the psychodynamic approach. Dr Sigmud Freud believed that childhood experiencesRead MorePsychodynamic Perspectives : The Psychodynamic Perspective1345 Words   |  6 PagesThe Psychodynamic Perspective: The Psychodynamic perspective in Psychology examines the theory that our personality and mental disorders are created outside of our awareness by processes in our unconscious mind. It examines the idea that our unconscious outweighs our actual consciousness and that there is more than what we credit ourselves for and/or are potentially unconsciously blocking. One of the best known approaches of this perspective is by using psychoanalysis. This approach highlights andRead MorePersonality, Cognitive, And Learning Approach Essay1878 Words   |  8 Pageson empirical studies while others are based on clinical case studies or theories. Some common aspects of personality include psychodynamic, trait approach, cognitive, genetic, and learning approach. The cognitive approach emphasizes how our behavior is influenced by how we process, mentally represent, and store information. Psychologists who take the cognitive approach suggests that mental processes can help us understand several ki nds of social and individual behaviors, from problem solving,Read MoreTheories Of Classical Conditioning, Psychodynamic, Cognitive And Humanistic1224 Words   |  5 PagesThere are four theoretical approaches in Psychology. In this essay I will evaluate and analyse the four main approaches which are: Behaviourist, Psychodynamic, Cognitive and Humanistic. Behaviourists believe that everyone is born as a ‘blank slate’ and that all behaviours are learned through interaction with the environment around you. They believe that we learn new behaviour through classical conditioning, operant conditioning and social learning theory. Classical conditioning occurs when two

Sunday, December 15, 2019

Cellular System Components Free Essays

string(275) " is used over many of the GSM network interfaces; †¢ base station system application part \(BSSAP\) – BSSAP is used over the A interface; †¢ direct transfer application part \(DTAP\) – DTAP is used between MS and MSC; DTAP is carried over the Abis and the A interface\." Introduction to GSM Networks Figure 1. 1 is a schematic overview of the main components in a GSM network. The various interface labels are the formal names given to these interfaces. We will write a custom essay sample on Cellular System Components or any similar topic only for you Order Now More details about these interfaces are found in GSM TS 03. 02 [26]. The GSM network consists mainly of the following functional parts: †¢ MSC – the mobile service switching centre (MSC) is the core switching entity in the network. The MSC is connected to the radio access network (RAN); the RAN is formed by the BSCs and BTSs within the Public Land Mobile Network (PLMN). Users of the GSM network are registered with an MSC; all calls to and from the user are controlled by the MSC. A GSM network has one or more MSCs, geographically distributed. †¢ VLR – the visitor location register (VLR) contains subscriber data for subscribers registered in an MSC. Every MSC contains a VLR. Although MSC and VLR are individually addressable, they are always contained in one integrated node. †¢ GMSC – the gateway MSC (GMSC) is the switching entity that controls mobile terminating calls. When a call is established towards a GSM subscriber, a GMSC contacts the HLR of that subscriber, to obtain the address of the MSC where that subscriber is currently registered. That MSC address is used to route the call to that subscriber. †¢ HLR – the home location register (HLR) is the database that contains a subscription record for each subscriber of the network. A GSM subscriber is normally associated with one particular HLR. The HLR is responsible for the sending of subscription data to the VLR (during registration) or GMSC (during mobile terminating call handling). CN – the core network (CN) consists of, amongst other things, MSC(s), GMSC(s) and HLR(s). These entities are the main components for call handling and subscriber management. Other main entities in the CN are the equipment identi? cation register (EIR) and authentication centre (AUC). CAMEL has no interaction with the EIR and AUC; hence EIR and AUC are not further discussed. †¢ BSS – th e base station system (BSS) is composed of one or more base station controllers (BSC) and one or more base transceiver stations (BTS). The BTS contains one or more transceivers (TRX). The TRX is responsible for radio signal transmission and reception. BTS and BSC are connected through the Abis interface. The BSS is connected to the MSC through the A interface. †¢ MS – the mobile station (MS) is the GSM handset. The structure of the MS will be described in more detail in a next section. A GSM network is a public land mobile network (PLMN). Other types of PLMN are the time division multiple access (TDMA) network or code division multiple access (CDMA) network. GSM uses the following sub-division of the PLMN: CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network ? 006 John Wiley Sons, Ltd Rogier Noldus 2 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network To HLR from other PLMN D HLR D C Core network To/from other network MSC ISUP E MSC A BSC Abis BTS Um Um A ISUP GMSC ISUP BSC Abis BTS Um Um Base station system Air interface MS MS MS MS Figure 1. 1 GSM network architecture †¢ Home PLMN (HPLMN) – the HPLMN is the GSM netwo rk that a GSM user is a subscriber of. That implies that GSM user’s subscription data resides in the HLR in that PLMN. The HLR may transfer the subscription data to a VLR (during registration in a PLMN) or a GMSC (during mobile terminating call handling). The HPLMN may also contain various service nodes, such as a short message service centre (SMSC), service control point (SCP), etc. †¢ Visited PLMN (VPLMN) – the VPLMN is the GSM network where a subscriber is currently registered. The subscriber may be registered in her HPLMN or in another PLMN. In the latter case, the subscriber is outbound roaming (from HPLMN’s perspective) and inbound roaming (from VPLMN’s perspective). When the subscriber is currently registered in her HPLMN, then the HPLMN is at the same time VPLMN. 1 †¢ Interrogating PLMN (IPLMN) – the IPLMN is the PLMN containing the GMSC that handles mobile terminating (MT) calls. MT calls are always handled by a GMSC in the PLMN, regardless of the origin of the call. For most operators, MT call handling is done by a GMSC in the HPLMN; in that case, the HPLMN is at the same time IPLMN. This implies that calls destined for a GSM subscriber are always routed to the HPLMN of that GSM subscriber. Once the call has arrived in the HPLMN, the HPLMN acts as IPLMN. MT call handling will be described in more detail in subsequent sections. When basic optimal routing (BOR) is applied, the IPLMN is not the same PLMN as the HPLMN. The user of a GSM network is referred to as the served subscriber ; the MSC that is serving that subscriber is known as the serving MSC. Examples are: †¢ mobile originated call – the MSC that is handling the call is the serving MSC for this call; the calling subscriber is the served subscriber; †¢ mobile terminated call – the GMSC that is handling the call is the serving GMSC for this call; the called subscriber is the served subscriber. 1 The CAMEL service requirement, GSM TS 02. 78 [12] uses this strict de? nition. The term VPLMN is, however, commonly used to denote any network other than the HPLMN. Introduction to GSM Networks 3 1. 1 Signalling in GSM The various entities in the GSM network are connected to one another through signalling networks. Signalling is used for example, for subscriber mobility, subscriber registration, call establishment, etc. The connections to the various entities are known as ‘reference points’. Examples include: †¢ †¢ †¢ †¢ A interface – the connection between MSC and BSC; Abis interface – the connection between BSC and BTS; D interface – the connection between MSC and HLR; Um interface – the radio connection between MS and BTS. Various signalling protocols are used over the reference points. Some of these protocols for GSM are the following: †¢ mobile application part (MAP) – MAP is used for call control, subscriber registration, short message service, etc. ; MAP is used over many of the GSM network interfaces; †¢ base station system application part (BSSAP) – BSSAP is used over the A interface; †¢ direct transfer application part (DTAP) – DTAP is used between MS and MSC; DTAP is carried over the Abis and the A interface. You read "Cellular System Components" in category "Papers" DTAP is speci? ed in GSM TS 04. 08 [49]; †¢ ISDN user part (ISUP) – ISUP is the protocol for establishing and releasing circuit switched calls. ISUP is also used in landline Integrated Services Digital Network (ISDN). A circuit is the data channel that is established between two users in the network. Within ISDN, the data channel is generally a 64 kbit/s channel. The circuit is used for the transfer of the encoded speech or other data. ISUP is speci? ed in ITU-T Q. 763 [137]. When it comes to call establishment, GSM makes a distinction between signalling and payload. Signalling refers to the exchange of information for call set up; payload refers to the data that is transferred within a call, i. e. voice, video, fax etc. For a mobile terminated GSM call, the signalling consists of exchange of MAP messages between GMSC, HLR and visited MSC (VMSC). The payload is transferred by the ISUP connection between GMSC and VMSC. It is a continual aim to optimize the payload transfer through the network, as payload transfer has a direct cost aspect associated with it. Some network services are designed to optimize the payload transfer. One example is optimal routing. 1. 2 GSM Mobility Roaming with GSM is made possible through the separation of switching capability and subscription data. A GSM subscriber has her subscription data, including CAMEL data, permanently registered in the HLR in her HPLMN. The GSM operator is responsible for provisioning this data in the HLR. The MSC and GMSC in a PLMN, on the other hand, are not speci? c for one subscriber group. The switching capability of the MSC in a PLMN may be used by that PLMN’s own subscribers, but also by inbound roaming subscribers; see Figure 1. 2. In Figure 1. 2, the GSM user who is a subscriber of PLMN-A roams to PLMN-B. The HLR in PLMN-A transfers the user’s subscription data to the MSC in PLMN-B. The subscriber’s subscription data remains in the MSC/VLR as long as she is served by a BSS that is connected to that MSC. Even when the user switches her MS off and then on again, the subscription data remains in the MSC. After an extended period of the MS being switched off, the subscription data will be purged from the MSC. When the subscriber switches her MS on again, the subscriber has to re-register with the MSC, which entails the MSC asking the HLR in the HPLMN to re-send the subscription data for that subscriber. 4 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network Transfer of subscription data to MSC/VLR HLR PLMN-A MSC MS Subscriber roams to other PLMN PLMN-B MSC Figure 1. 2 Transfer of GSM subscription data for a roaming subscriber When the subscriber moves from one MSC service area (MSC-1) to another MSC service area (MSC-2), the HLR will instruct MSC-1 to purge the subscription data of this subscriber and will send the subscription data to MSC-2. 1. 3 Mobile Station The MS, i. e. the GSM handset, is logically built up from the following components: †¢ mobile equipment (ME) – this is the GSM terminal, excluding the SIM card; †¢ subscriber identi? ation module (SIM) – this is the chip embedded in the SIM card that identi? es a subscriber of a GSM network; the SIM is embedded in the SIM card. When the SIM card is inserted in the ME, the subscriber may register with a GSM network. The ME is now effectively personalized for this GSM subscriber; see Figure 1. 3. The characteristics of the SIM are speci? ed in GSM TS 11. 11 . The SIM card contains information such as IMSI, advice of charge parameters, operator-speci? c emergency number, etc. For the UMTS network an enhanced SIM is speci? ed, the universal subscriber identity module (USIM); refer 3GPP TS 31. 02. 1. 4 Identi? ers in the GSM Network GSM uses several identi? ers for the routing of calls, identifying subscribers (e. g. for charging), locating the HLR, identifying equipment, etc. Some of these identi? ers play an important role for CAMEL. 1. 4. 1 International Mobile Subscriber Identity The international mobile subscriber identity (IMSI) is embedded on the SIM card and is used to identify a subscriber. The IMSI is also contained in the subscription data in the HLR. The IMSI is used for identifying a subscriber for various processes in the GSM network. Some of these are: KPN SIM + ME = MS Figure 1. 3 Components of the mobile station Introduction to GSM Networks 5 3 digits MCC Maximum 15 digits 2 or 3 digits MNC MSIN Figure 1. 4 Structure of the IMSI †¢ location update – when attaching to a network, the MS reports the IMSI to the MSC, which uses the IMSI to derive the global title (GT) of the HLR associated with the subscriber; †¢ terminating call – when the GSM network handles a call to a GSM subscriber, the HLR uses the IMSI to identify the subscriber in the MSC/VLR, to start a process for delivering the call to that subscriber in that MSC/VLR. †¢ roaming charging – a VPLMN uses the IMSI o send billing records to the HPLMN of a subscriber. Figure 1. 4 shows the format of the IMSI. †¢ mobile country code (MCC) – the MCC identi? es the country for mobile networks. The MCC is not used for call establishment. The usage of MCC is de? ned in ITU-T E. 212 [129]. The MCC values are allocated and published by the ITU-T. †¢ mobile network code (MNC) – the MNC identi? es the mobile network within a mobile country (as identi? ed by MCC). MCC and MNC together identify a PLMN. Refer to ITU-T E. 212 [129] for MNC usage. The MNC may be two or three digits in length. Common practice is that, within a country (as identi? d by MCC), all MNCs are either two or three digits. †¢ mobile subscriber identi? cation number (MSIN) – the MSIN is the subscriber identi? er within a PLMN. The IMSI is reported to the SCP during CAMEL service invocation. The IMSI may be needed, for example, when identifying a country; countries in North America have equal country code (country code = 1), but different MCC (e. g. Canada = 303; Mexico = 334). 1. 4. 2 Mobile Station Integrated Services Digital Network Number (MSISDN Number) The MSISDN is used to identify the subscriber when, among other things, establishing a call to that subscriber or sending an SMS to that subscriber. Hence, the MSISDN is used for routing purposes. Figure 1. 5 shows the structure of the MSISDN. †¢ country code (CC) – the CC identi? es the country or group of countries of the subscriber; †¢ national destination code (NDC) – each PLMN in a country has one or more NDCs allocated to it; the NDC may be used to route a call to the appropriate network; †¢ subscriber number (SN) – the SN identi? es the subscriber within the number plan of a PLMN. CC NDC SN 1, 2 or 3 digits Maximum 15 digits Figure 1. 5 Structure of the MSISDN 6 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network IMEI TAC 6 digits FAC 2 digits FAC 2 digits SNR 6 digits SNR 6 digits spare 1 digit IMEISV TAC 6 digits SV 2 digits Figure 1. 6 Structure of IMEI and IMEISV The MSISDN is not stored on the subscriber’s SIM card and is normally not available in the MS. 2 The MSISDN is provisioned in the HLR, as part of the subscriber’s pro? le, and is sent to MSC during registration. The MSISDN is also reported to SCP when a CAMEL service is invoked. One subscriber may have multiple MSISDNs. These MSISDNs are provisioned in the HLR. At any one moment, only a single MSISDN is available in the MSC/VLR for the subscriber. . 4. 3 International Mobile Equipment Identi? er The international mobile equipment identi? er (IMEI) is used to identify the ME [or user equipment (UE) in UMTS network]. Each ME has a unique IMEI. The IMEI is hard-coded in the ME and cannot be modi? ed. Figure 1. 6 shows the structure of the IMEI. The IMEI is not used for routing or subscriber identi? cation. Refer to GSM TS 0 3. 03 [27] for the type approval code (TAC), ? nal assembly code (FAC) and serial number (SNR). The software version (SV) may be included in the IMEI (‘IMEISV’) to indicate the version of software embedded in the ME. The IMEI is always encoded as an eight-octet string. As from CAMEL Phase 4, the IMEI(SV) may be reported to the SCP. 1. 4. 4 Mobile Station Roaming Number The mobile station roaming number (MSRN) is used in the GSM network for routing a call to a MS. The need for the MSRN stems from the fact that the MSISDN identi? es a subscriber, but not the current location of that subscriber in a telecommunications network. The MSRN is allocated to a subscriber during MT call handling and is released when the call to that subscriber is established. Each MSC in a PLMN has a (limited) range of MSRNs allocated to it. An MSRN may be allocated to any subscriber registered in that MSC. The MSRN has the form of an E. 164 number and can be used by the GMSC for establishing a call to a GSM subscriber. An MSRN is part of a GSM operator’s number plan. The MSRN indicates the GSM network a subscriber is registered in, but not the GSM network the subscriber belongs to. Figure 1. 7 shows how the MSRN is used for call routing. The MSRN is not meant for call initiation. GSM operators may con? gure their MSC such that subscribers cannot dial numbers that fall within the MSRN range of that operator. 1. 5 Basic Services All activities that may be done in the GSM network, such as establishing a voice call, establishing a data call, sending a short message, etc. , are classi? ed as basic services. In order for a subscriber to use a GSM basic service, she must have a subscription to that service. 3 The handling of a basic 2 GSM subscribers may program their MSISDN into the phone; this has, however, no signi? cance for the network. 3 Exceptions are Tele Service 12 (emergency call establishment) and Tele Service 23 (Cell Broadcast). Subscribers do not need a subscription to these Tele Services to use them. Introduction to GSM Networks 7 return MSRN request MSRN HLR VMSC MSRN GMSC incoming call MSISDN Figure 1. 7 Usage of MSRN during call establishment to a GSM subscriber service is fully standardized. Hence, a subscriber may use a basic service in any GSM network she roams to, provided that that basic service is supported in that network. The HLR will send a list of subscribed basic services to the MSC/VLR, during registration. When a GSM subscriber initiates a call, the MS supplies the serving MSC with a set of parameters describing the circuitswitched connection that is requested. These parameters are the bearer capability (BC), low-layer compatibility (LLC) and high-layer compatibility (HLC), as will be described below. The MSC uses the BC, LLC and HLC to derive the basic service for this call. The rules for deriving the basic service from LLC, HLC and BC are speci? ed in GSM TS 09. 07 [55]. The MSC then checks whether the subscriber has a subscription to the requested basic service, i. e. whether the subscription data in the VLR contains that basic service. If the service is not subscribed to, then the MSC disallows the call. The basic service is not transported over ISUP. When a CAMEL service is invoked, the MSC reports the requested basic service to the SCP. The SCP may use the indication of the requested basic service for call service processing. Examples include: †¢ video calls may be charged at a higher rate than speech calls; †¢ for data calls and fax calls, the CAMEL service shall not play any announcements or tones. Basic services are divided into two groups: tele services and bearer services. 1. 5. 1 Tele Services Table 1. 1 provides an overview of the available tele services (TS); see also GSM TS 02. 03 [3]. 1. 5. 2 Bearer Services Table 1. provides an overview of the available bearer services (BS). The two bearer service groups are sub-divided into a variety of bearer services with different characteristics. Refer to GSM TS 02. 02 [2]. 1. 5. 3 Circuit Bearer Description Bearer capability, low-layer compatibility and high-layer compatibility are descriptors of a circuitswitched (CS) connection. When a GSM subscriber initiates a call , the BC, LLC and HLC are transported from MS to MSC over DTAP. The MSC includes the parameters in the ISUP signal to the destination. These parameters are also reported to the SCP during CAMEL service invocation. That enables a CAMEL service to adapt the service logic processing to the type of call. Figure 1. 8 shows the relation between LLC, HLC and BC on the DTAP and the corresponding parameters on ISUP. 8 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network Table 1. 1 Tele service 11 12 Tele services Description Telephony Emergency calls Comment This TS represents the normal speech call The emergency call uses the characteristics of telephony (TS11), but may be established without subscription and bypasses various checks in the MS and in the MSC This TS relates to receiving an SMS. This TS is not sent to the MSC/VLR. When an SMS is sent to the subscriber, the HLR checks whether the destination subscriber has a subscription to TS 21 This TS relates to the sending of an SMS This TS relates to the capability of an SMS that is sent as a broadcast SMS This TS relates to the capability to establish a speech and fax (group 3) call This TS relates to the capability to establish a fax (group 3) call This TS relates to the capability to participate in a group call as speci? ed in GSM TS 03. 8 [35] This TS relates to the capability to receive a voice broadcast as speci? ed in GSM TS 03. 68 [35] 21 Short message MT 22 23 61 62 91 92 Short message MO Cell broadcast Alternate speech and fax group 3 Automatic fax group 3 Voice group call Voice broadcast Table 1. 2 Tele service 20 30 Bearer services Description Asynchronous data bearer services Synchronous data bearer services Comment May be used for asynchronous services from 300 bit/s to 64 kbit/s. May be used for synchronou s services from 1. 2 to 64 kbit/s. This BS may be used, amongst other things, for multimedia services such as video telephony. 4 DTAP (GSM TS 04. 08) Low layer compatibility High layer compatibility Bearer capability MSC ISUP (ITU-T Q. 763) Access transport [low layer compatibility] User teleservice information User service information Figure 1. 8 Transfer of LLC, HLC and BC through DTAP and ISUP †¢ Low-layer compatibility – the LLC is transported transparently between the calling entity and called entity; it may be used by the respective entities to adapt codecs for interworking purposes. LLC describes mainly characteristics related to the data transfer. 4 3GPP Rel-7 may include a dedicated bearer service for video telephony. Introduction to GSM Networks 9 †¢ High-layer compatibility – the HLC is also transported transparently between the calling entity and called entity; it is used to describe the requested service, such as telephony, Fax, video telephony, etc. †¢ Bearer capability – the BC describes the characteristics of the 64 kbit/s circuit requested for the call. 1. 6 Supplementary Services Supplementary services (SS) in GSM are a means of enriching the user experience. An SS may, for example, forward a call in the case of no reply from the called party, bar certain outgoing or incoming calls, show the number of the calling party to the called party, etc. In order to use an SS, a GSM user needs a subscription to that SS. The subscription to supplementary services is contained in the HLR and is sent to the MSC/VLR during registration. The supplementary services are fully standardized. A GSM subscriber can therefore use her supplementary services in any GSM network, provided that the network supports these supplementary services, and have the same user experience. Table 1. 3 SS group Line identi? cation GSM supplementary services Supplementary services Calling line identi? cation presentation (CLIP) Calling line identi? cation restriction (CLIR) Connected line presentation (COLP) Connected line restriction (COLR) Calling name presentation (CNAP) Call forwarding – unconditional (CFU) Call forwarding – busy (CFB) Call forwarding – no reply (CFNRY) Call forwarding – not reachable (CFNRC) Call de? ction (CD) Explicit call transfer (ECT) Call waiting (CW) Call hold (CH) Call completion to busy subscriber (CCBS) Multi-call (MC) Multi-party call (MPTY) Closed user group (CUG) Advice of charge – information (AOCI) Advice of charge – charge (AOCC) User-to-user signalling – service 1 (UUS1) User-to-user signalling – service 2 (UUS2) User-to-user signalling – service 3 (UUS3) Barring of all outgoing calls (BAOC) Barring of outgoing international calls (BOIC) Barring of outgoing international calls except to the home country (BOIC-exHc) Barring of all ncoming calls (BAIC) Barring of all incoming calls when roaming (BICROAM) enhanced multi-level precedence and pre-emption (eMLPP) GSM TS 02. 81 [13] Name identi? cation Call forwarding 02. 96 [24] 02. 82 [14], Call offering Call completion 02. 72 [11] 02. 91 [22] 02. 83 [15], 02. 93 [23], 22. 135 [69]a 02. 84 [16] 02. 85 [17] 02. 86 [18] 02. 87 [19] Multi-party Community of interest Charging Additional information transfer Call barring 02. 88 [20] Call priority 2. 67 [10] a For the multi-call service, there is no GSM TS available, but only a 3GPP TS (22. 135). 10 CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Netwo rk Supplementary services may be provisioned for an individual basic service or for a group of basic services, e. g. a subscriber may have barring of all outgoing calls for all tele services and all bearer services, except SMS (tele service group 20). Such a subscriber is barred from establishing utgoing calls (except emergency calls), but may still send short messages. Some supplementary services may be activated or deactivated by the user. Examples include call forwarding and call barring. An operator may decide to bar certain subscribers or subscriber groups from modifying their supplementary services. Table 1. 3 shows the Supplementary Services. They are combined in service groups. Subscriptions are per individual Supplementary Service. The right-most column indicates the GSM technical speci? ations (TS) that specify the service requirement for the respective Supplementary Service(s). The chapters on CAMEL Phases 1–4 describe the interaction between CAMEL and the various supplementary services. Not all GSM networks support all supplementary services. Many of the supplementary services in GSM have equivalent supplementary services in ISDN. The ISDN supplementary services are described in ITU-T recommendations. GSM TS 02. 03 [3] describes how the supplementary services may be activated, deactivated and invoked. How to cite Cellular System Components, Papers

Friday, December 6, 2019

Customer Satisfaction and Loyalty Relationship- myassignmenthelp

Question: Discuss about theCustomer Satisfaction and Customer Loyalty Relationship. Answer: Introduction Competition in the finance sector is getting stiff due to the rapid increase of financial institutions. Many banks are looking for sustainable ways to deal with the high competition for long-term results. Many scholars and researchers are on the verge to study more about the operations in finance sector such as customer satisfaction, employee engagement, customer loyalty, quality of services and efficiency. These studies will give insights to better understand what customers want and thus improve for them to be served better (Arokiasamy, 2013) Banks must embark on quality service delivery to their customers for them to attract and maintain them for long-term business. The competitive edge and change of demands are forcing many banks to adapt to the delivery of excellent services to their customers. This study aims to investigate whether customers in the financial sector are well satisfied which will finally result in customer loyalty. Problem Statement Several studies have been associated with consumer loyalty and satisfaction as previously mentioned. Walsh et al (2008), argues that customer satisfaction on loyalty has more weight as switching costs and quality goes hand in hand with satisfaction. According to Parida Baksi (2011) ensuring the successful provision of services, you must ensure the good and quality relationship with your customers. It will generally result in customer loyalty and satisfaction. Organizations which provide the best services to their clients usually emerge as the most superior. Kheng et al. (2010), together with Gregoire Fisher (2008), claims that superiority performance results to increase in profit margin, market share, good customer relations, good customer loyalty and creation of the good business image. It is with no doubt a fully satisfied customer will always come back and refer to others for the good services. In the contemporary business environment, customer satisfaction is a priority. Marketing concepts developed by different researchers show that a customer who has been served well and satisfied will always come back without hesitation. Customer loyalty and satisfaction are the key long-term goals of any business. New customers are costlier as compared to old customers who just come back; loyal customers are more beneficial to the organization According to Mittal Frennea (2010), consumer loyalty is the end assessment of a specific item or service. It happens if the focused-on execution of the item or service is to earlier needs or desires of the client. The consumer loyalty with what the organization offers is foreordained by the general convictions of the items and administrations of the organization and the apparent execution of the items and services. Arnold Palmatier (2011), suggest that loyalty of a customer is the observable behavior of a customer that shows satisfaction and the morale to continue operating with the organization. A customer who wants to get back to the organization and purchase more or recommend to other people about the company indicates the comfort of the customer with the company. Loyal customers are a regular source of income as they help the organization market their products and services through referrals as well as their reliability. The problem that prompts this study is to investigate the connection between consumer loyalty and consumer satisfaction. It will be wholly compared and contrasted in the financial sectors such as banks. Aims and objectives This study aims to investigate how client loyalty and satisfaction is correlated with each other. Matzler et al. (2008), suggested that organization is able to meet the customers needs by measuring the level of their services. It means that organizations must work hard to ensure customer requirements are met in the most appropriate way. Study objectives are as follows: Investigate the correlation between customer loyalty and satisfaction Find out the advantages of customer satisfaction in an organization Investigate factors that influence client satisfaction and loyalty Determine organizations role in promoting and loyalty and satisfaction of consumers Come up with recommendations to assist financial institutions to improve on service delivery for customer satisfaction Brief methodology Questionnaires will be used to collect data from respondents. The questionnaire will have 4 divisions. Part one will include personal data such as sex, education, and religion. The second division will measure on participants expectation levels of service delivery in terms of quality. It will contain the areas that capture the services provided by the organization. It will have a scale of 1-5 from disagree to agree in all parts. Part three will determine the level of customers satisfaction which will provide the following questions for the respondents to answer: What is your satisfaction level provided by the nature of your account? How can you rate customer service by your bank? Are you satisfied with the loan services by your bank? Are you comfortable with the services offered by your bank? Part four will measure the levels of the respondent towards the companys loyalty. Data analysis methods and Secondary data A survey will be used to test the feasibility of the study. Findings for the prior conducted research will also be used to compare and contrast the results obtained. The respondents will be customers from local banks in Melbourne who have one or more accounts who will be tested on their behaviors, attitudes, expectations, and opinions. Quantitative research approach will be applied in this study. Considerations as those of gender, age, level of education and professionalism will also be put in place. Conclusion Despite many studies that have been carried out by different researchers in the field of service delivery, more studies need to be done so as to make the necessary changes in the finance sector. Technology should be included in future studies for measuring service quality. Future studies must be in line with the current trends in the finance sector to meet the consumer's requirements. References Arnold, T. J., Fang, E. E., Palmatier, R. W. (2011). The effects of customer acquisition and retention orientations on a firms radical and incremental innovation performance.Journal of the Academy of Marketing Science,39(2), 234-251. Arokiasamy, A. R. (2013). The impact of customer satisfaction on customer loyalty and intentions to switch in the banking sector in Malaysia.The journal of commerce,5(1), 14-21. Grgoire, Y., Fisher, R. J. (2008). Customer betrayal and retaliation: when your best customers become your worst enemies.Journal of the Academy of Marketing Science,36(2), 247-261. Kheng, L. L., Mahamad, O., Ramayah, T., Mosahab, R. (2010). The impact of service quality on customer loyalty: A study of banks in Penang, Malaysia.International journal of marketing studies,2(2), 57. Matzler, K., Fller, J., Renzl, B., Herting, S., Spth, S. (2008). Customer satisfaction with Alpine ski areas: the moderating effects of personal, situational, and product factors.Journal of Travel Research,46(4), 403-413. Mittal, V., Frennea, C. (2010). Customer satisfaction: a strategic review and guidelines for managers. Parida, B. B., Baksi, A. K. (2011). Customer retention and profitability: CRM environment.SCMS Journal of Indian Management,8(2), 66. Walsh, G., Evanschitzky, H., Wunderlich, M. (2008). Identification and analysis of moderator variables: investigating the customer satisfaction-loyalty link.European Journal of Marketing,42(9/10), 977-1004.