Monday, January 27, 2020
Important Characteristics Of The Wigig Technology Computer Science Essay
Important Characteristics Of The Wigig Technology Computer Science Essay Wireless Gigabit is an up-and-coming technology expected to enable wireless connectivity of up to 7Gbps in data, display and audio applications. The organization sponsoring this technology is the Wireless Gigabit Alliance. Features of Wigig: Some of the important characteristics of the Wigig technology are listed below: Wigig is capable of providing a wireless network which its speed is up to 7Gbps, while the fastest current 802.11n has theoretically the highest speeds up to 600Mbps. WiGig is operated at 60GHz which allows a wider channel and supports super-fast transfer speeds. It can transfer data between 1Gbps to 7Gbps, 60 times more than Wi-Fi. Wigig can be able to support the Tri band devices. WiGig is a multi-gigabit communication technology which is an ideal standard for the use of streaming HD video so it can display full 1080 pixels of the PC to the TV via a wireless network. How does Wigig works: Wigig will primarily be used within a single room to provide wireless connectivity between home entertainment equipment. It will enable very fast data transfers and streaming media which is 10 times faster than the old wireless technologies, in addition to wireless connections for cameras, laptops. Deliverables Technical Issues Current and future expectations of WiGig deployment. Types of challenges or difficulties are there related to WiGig implementations. Kinds of organisations might need these new standards. Security Issues Discuss and analyse the security issues that might arise due to wide deployment of WiGig Alliance. (802.11 security issue and the Galois/Counter Mode of the AES encryption algorithm) Discuss and analyse cross layer security framework in Wireless LAN deployment. Is that framework will improve security in WLAN or not. Technical Issues Current Wigig deployment The industry standard relevant to Wigig is IEEE 802.11ad. Draft 1.0 of the specification was published in Jan 2011. Per the draft standard, signals will occupy the unlicensed 60 GHZ frequency band and all 802.11 ad-compliant devices will provide backward compatibility with 802.11 standard. As a result, tri-band devices will operate at 2.4, 5.0 and 60 GHz. The Wigig specification includes main features to maximize performance, minimize implementation complexity and cost, enable backward compatibility with existing Wi-Fi and provide advanced security. Key features include: Support for data transmission rates up to 7 Gbps. Wigig operates at 60 GHz band that means it has much more spectrum available, the channels are much wider, enabling multi-gigabit data rates. Wigig defines 4 channels, each 2.16 GHz wide which is 50 times wider than the channels available in 802.11n. Seamless switching between 2.4/5/60 GHz bands Based on IEEE 802.11, Wigig provides native Wi-Fi support and enables devices which has tri-band radios to be able to transparently switch between 802.11 network operating in any frequency band including 2.4/5/60 GHz Support for beamforming, a technology which maximize the signal strength and enable robust communication at distances beyond 10 meters. WiGig is integrated a technology, called Beamforming. It allows the radio beam is shot to the right target with the best performance; minimize waste in the process of transmission. Thus, WiGig uses energy more efficient than traditional Wi-Fi connection. Beamforming employs directional antennas to reduce interference and focus the signal between two devices into a concentrated beam. This allows faster data transmission over longer distances. Beamforming is defined within the PHY and MAC layers. During the beamforming process, two devices establish communication and then fine-tune their antenna settings to improve the quality of directional communication until there is enough capacity for the desired data transmission. The devices can quickly establish a new communications pathway using beams that reflect off walls when an obstacle blocks the line of sight between two devices or if someone walks between them. http://genk2.vcmedia.vn/N0WoyYblO3QdmZFKPMtKnadHAHTevz/Image/2012/04/2_6a565.jpg Advanced security using the Galois/Counter Mode of the AES encryption algorithm. AES-GCM is an authenticated encryption algorithm designed to provide both authentication and privacy. Developed by David A McGrew and John Viega, it uses universal hashing over a binary Galois field to provide authenticated encryption. GCM was designed originally as a way of supporting very high data rates, since it can take advantage of pipelining and parallel processing techniques to bypass the normal limits imposed by feedback MAC algorithms. This allows authenticated encryption at data rates of many ten of Gbps, permitting high grade encryption and authentication on system which previously could not be fully protected. Different types of layers take part in the working of the wireless gigabit technology, physical layer (PHY) deals with all the devices of low and high power and maintain the status of communication. Protocol adaption layers (PALs) are being developed to support specific system interfaces including data buses for PC peripherals and display interfaces for HDTVs, monitors and projectors. Supplements and extends the 802.11 Medium Access Control(MAC) layer and is backward compatible with the IEEE 80211 standard Power Management Wigig devices can take advantage of a new scheduled access mode to reduce power consumption. Two devices communicating with each other via a directional link may schedule the periods during which they communicate; in between those periods, they can sleep to save power. 802.11 ad draft standard is compared to other wireless technology http://images-news.easyvn.net/upload/2011/12/08/article/cong-nghe-khong-day-60-ghz-cho-docking-usb-hdmi_3.jpg Wigig in future WGA has announced the launch of a new wireless connection standard, Wigig 1.1 ready for certification. The Wigig 1.1 is added 2 new PALs specifications, the Wigig Display Extension (WDE) and Wigig Serial Extension (WSE) to supplement the previously published Wigig Bus Extension (WBE) and MAC/PHY specifications. Structure of Wigig Wigig is defined in 2 layers based on IEEE 802.11. They are Physical and Medium Access Control layers. These layers enable native support for IP networking over 60Ghz band. They make simpler and less expensive to produce devices that can communicate over both Wigig and existing Wi-Fi using tri-band radios (2.4GHz, 5GHz and 60 GHz). http://farm3.static.flickr.com/2390/5791077356_c2146fb4f0.jpg Physical Layer The physical layer of the 802.11 ad standardized 2 wireless data exchange techniques: Orthogonal frequency-division multiplexing (OFDM) Single carrier (SC) The 802.11ad divides the 60GHz band into four 2.16 GHz wide channels. Data rates of up to 7 Gbits/s are possible using OFDM with different modulation schemes. A single channel version for low power operation is available and can deliver a speed up to 4.6 Gbits/s. These wide channels enable WIgig to support applications that require extremely fast communication, such as uncompressed video transmission. The PHY in 802.11ad is split into Physical Layer Convergence Protocol (PLCP) and the Physical Medium Dependent (PMD) sub layers. The PLCP parses data units transmitted/received using various 802.11 media access techniques. The PMD performs the data transmission/reception and modulation/demodulation directly accessing air under the guidance of the PLCP. The 802.11 ad MAC layer to great extend is affected by the nature of the media. For instance, it implements a relatively complex for the second layer fragmentation of PDUs. Medium Access Control (MAC) layer Wigig shares MAC layer with existing 802.11 networks enables session switching between 802.11 networks operating in the 2.4 GHz, 5GHz and 60 GHz bands, resulting in uninterrupted wireless data communications. The 802.11 ad MAC layer has been extended to include beamforming support and address the 60 GHz specific aspects of channel access, synchronization, association and authentication. Protocol Adaption Layer (PALs) PAL is a layer added to network transmissions to help adapt to older standards. It allows wireless implementations of key computer and consumer electronics interfaces over 60GHz Wigig networks. The version 1.0 A/V and I/O protocol adaption layer (PAL) specifications have been developed to support specific system interfaces including extensions for PC peripherals and display interfaces for HDTVs, monitors and projectors. The Wigig Bus Extension (WBE) Define high-performance wireless implementations of widely used computer interfaces over 60GHz. Enable multi-gigabit wireless connectivity between any two devices, such as connection to storage and other high-speed peripherals The Wigig Display Extension (WDE) Support wireless transmission of audio/visual data Enable wireless DisplayPort and other display interfaces that include the High-bandwidth Digital Content Protection 2.0 feature. Offers key A/V applications, such as the transmission of lightly compressed or uncompressed video from a computer or digital camera to an HDTV, monitor or projector. http://img84.imageshack.us/img84/2195/fig2m.jpg Modulation Coding Scheme (MCS) The specification supports two types of modulation and coding schemes, which provide different benefits. Orthogonal frequency-division multiplexing (OFDM) supports communication over longer distances with greater delay spreads, providing more flexibility in handling obstacles and reflected signals. The single carrier, suited to lower applications, achieves a data rate up to 4.6 Gbits/s, while OFDM enables 7 Gbits/s. Usage Models Wigig has a high compatibility and is used for many purposes. Wigig can act as an alternative method which is used for replacing old connectivity standards such as: USB, DisplayPort, PCIe and HDMI. In addition, it is backward compatible with most devices which using 802.11 connectivity in the 2.4 GHz and 5 GHz bands. The main function of Wigig is to connect home entertainment devices together tablets, smartphones, PC, TV and more. http://images-news.easyvn.net/upload/2011/12/08/article/cong-nghe-khong-day-60-ghz-cho-docking-usb-hdmi_2.jpg Challenges or difficulties are there related to WiGig implementations. The biggest technical challenge is that these networks will operate in much higher frequencies, around 60 GHz. The higher the frequency is, the greater the propagation loss over distance. Another challenge is 60 GHz radio are absorbed by wood, bricks, human body and particularly paint are far more opaque to 60 GHz waves. Thus, Wigig is most suitable for in-room applications. Attenuation of various materials by frequency Besides that, the beamforming of compliant equipment needs to be within line of sight of receiving devices in order to work well. Even a person stepping between two communicating devices can break the signal. With these weaknesses, they will prevent Wigig from being implemented popularly in the future. Moreover, most today devices only support 802.11 a/g/n; it will take time to replace all these devices with new devices which support 802.11ad standard. Kinds of organisations might need these new standards WiGig is a multi-gigabit communication technology which is an ideal standard for the use of streaming HD video so it can display full 1080 pixels of the PC to the TV via a wireless network. In addition, its speed is up to 7 Gbps which is very useful for so many organizations such as: Multimedia organization (newspapers, advertisement, movie) Financial organization (Bank, office, tax) Education organization (TAFE, university) Medical organization (Hospital) IT organization (Intel, Dell, Apple etc.) Government Military Security Issues Due to Wigig is based on IEEE 802.11 standards; it has the same security issues with 802.11 a/b/g/n. Easy to access Wireless LANs are easy to find. To enable clients to find them, networks must transmit Beacon frames with network parameters. The information needed to join a network is also the information needed to launch an attack on a network. Beacon frames a not processed by any privacy functions, which means that your 802.11 network and its parameters are available for anybody with an 802.11 card. Attackers with high-gain antennas can find networks from nearby roads or buildings and may launch attacks without having physical access to your facility. Solution: Enforce Strong Access Control Ensuring that wireless networks are subject to strong access control can mitigate the risk of wireless network deployment. Networks should place access points outside of security perimeter devices such as firewalls, and administrators should consider using VPNs to provide access to the corporate network. Strong user authentication should be deployed, preferably using new products based on the IEEE 802.1x standard. 802.1x defines new frame types for user-based authentication and leverages existing enterprise user databases, such as RADIUS. Rogue Access Points Easy access to wireless LANs is coupled with easy deployment. When combined, these two characteristics can cause headaches for network administrators and security officers. Any user can run to a nearby computer store, purchase an access point, and connect it to the corporate network without authorization. Rogue access deployed by end users poses great security risks. End users are not security experts, and may not be aware of the risks posed by wireless LANs. Many deployments that have been logged and mapped by war drivers do not have any security features enabled, and a significant fraction have no changes from the default configuration. Solution: Regular Site Audits Like any other network technology, wireless networks require vigilance on the part of security administrators. The obvious way to find unauthorized networks is to do the same thing that attackers do: use an antenna and look for them so that you find unauthorized networks before attackers exploit them. Physical site audits should be conducted as frequently as possible. Unauthorized Use of Service Several war drivers have published results indicating that a clear majority of access points are put in service with only minimal modifications to their default configuration. Unauthorized users may not necessarily obey your service providers terms of service, and it may only take one spammer to cause your ISP to revoke your connectivity. Solution: Design and Audit for Strong Authentication The obvious defence against unauthorized use is to prevent unauthorized users from accessing the network. Strong, cryptographically protected authentication is a precondition for authorization because access privileges are based on user identity. VPN solutions deployed to protect traffic in transit across the radio link provide strong authentication. MAC Spoofing and Session Hijacking 802.11 networks do not authenticate frames. Every frame has a source address, but there is no guarantee that the station sending the frame actually put the frame in the air. Just as on traditional Ethernet networks, there is no protection against forgery of frame source addresses. Attackers can use spoofed frames to redirect traffic and corrupt ARP tables. At a much simpler level, attackers can observe the MAC addresses of stations in use on the network and adopt those addresses for malicious transmissions. Attackers can use spoofed frames in active attacks as well. In addition to hijacking sessions, attackers can exploit the lack of authentication of access points. Access points are identified by their broadcasts of Beacon frames. Any station which claims to be an access point and broadcasts the right service set identifier (SSID, also commonly called a network name) will appear to be part of an authorized network. Attackers can, however, easily pretend to be an access point because nothing in 802.11 requires an access point to prove it really is an access point. At that point, the attacker could potentially steal credentials and use them to gain access to the network through a man-in-the-middle (MITM) attack. Solution: Adopt Strong Protocols and Use Them Using methods based on Transport Layer Security (TLS), access points will need to prove their identity before clients provide authentication credentials, and credentials are protected by strong cryptography for transmission over the air. Session hijacking can be prevented only by using a strong cryptographic protocol such as IPsec. Using strong VPN protocols which require the use of strong user authentication with 802.1x. Traffic Analysis and Eavesdropping 802.11 provides no protection against attacks which passively observe traffic. The main risk is that 802.11 does not provide a way to secure data in transit against eavesdropping. Frame headers are always in the clear and are visible to anybody with a wireless network analyser. Security against eavesdropping was supposed to be provided by Wired Equivalent Privacy (WEP). However, it protects only the initial association with the network and user data frames. Management and control frames are not encrypted or authenticated by WEP, leaving an attacker wide latitude to disrupt transmissions with spoofed frames. Solution: Perform Risk Analysis When addressing the threat of eavesdropping, the key decision is to balance the threat of using only WEP against the complexity of deploying a more proven solution. If wireless LAN is being used for sensitive data, WEP may very well be insufficient for your needs. Strong cryptographic solutions like SSH, SSL, and IPsec were designed to transmit data securely over public channels and have proven resistant to attack over many years, and will almost certainly provide a higher level of security. Key Problems with WEP Repeat in key stream which allows easy decryption of data for a moderately sophisticated adversary. Weak implementation of the RC4 algorithm leads to an efficient attack that allows key recovery Subject to brute force attacks (Short Keys) Easily compromised keys (Shared keys/No Key management) Message modification is possible No user authentication occurs Subject to Man in the Middle attacks WPA Benefits Improved Cryptography Strong Network access control Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys Key Management Replay Protection Provides for data and header integrity Flaws While (Temporal Key Integrity Protocol) TKIP (a message integrity check algorithm is to verify the integrity of the packets) Michael significantly improve WEP security, design limitations result in cryptographic weaknesses. Limitations of Michael to retrieve the keystream from short packets to use for re-injection and spoofing. WPA2 Benefits Strong Cryptography Support for Legacy Equipment Strong Network Access Control Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys Key Management Replay Protection Provides for data and Header Integrity Roaming Support Security issue There is a flaw that was discovered. It is called WPS (wireless protected setup); it is the little initial setup that most new/newer routers come with. The WPS is a button which we need to hit when we want to initially set up connection. That is the security flaw thats used now to crack wpa/wpa2. There is a free program to exploit this flaw (reaver) and it has about a 100% success rate in cracking wpa/wpa2. Galois/Counter Mode (GCM) GCM is a block cipher mode of operation providing both confidentiality and data origin authentication. It was designed by McGrew and Viega. Benefits Support communication speeds of 10 Gbps Provides strong encryption based on the Advanced Encryption Standard (AES) Be able to implement in hardware for performance and efficiency Security Issues GCM provides no message authentication There are some security issues if GCM mode is used incorrectly. GCM is not suited for use with short tag lengths or a very long message. The user should monitor and limit the number of unsuccessful verification attempts for each key. It is strongly recommended to use all 16 bytes for the tag, and generally no less than 8 bytes. The same length of tag must always be used for a given key. The initialization vector (IV) must be unique for each operation for a given key. Security is destroyed for all text encrypted with the same key if the IV is used for different plaintext. Using 12 bytes randomly generated IV is ok and so is a counter that is controlled over so that it can never be repeated. Cross layer security framework in Wireless LAN deployment Cross-layer design appears to be a suitable approach for future contributions in the framework of WLANs able to address emerging issues related to ever-higher performance, energy consumption, mobility. The single layer security is often inefficient and inadequate for provisioning secure data transmission in WLAN. In generally, the security of a network is determined by the security it has over all the layers. Thus, the cross-layer security framework needs to be proposed in WLAN. The security framework may support many components like intrusion detection system, Trust framework and adapted link layer communication protocol. In order to carry out practical cross-layer security framework in WLAN, we need to follow: Component based security: Security measures must be provided to all the components of a protocol stack as well as to the entire network. The developers should focus on securing the entire network. Robust, simple and flexible designs: Security mechanisms should construct a trustworthy system out of untrustworthy components and have the capability to detect and function when need arises. This should also support scalability. Various types of active and passive attacks have been recorded in WLAN A denial of service (DoS) attack: In DoS attack, a malicious node could prevent another node to go back to sleep mode which in turn causes battery depletion. Eavesdropping and invasion: If no sound security measures are taken, invasion becomes fairly an easy task due to wireless communication. An adversary could easily extract useful information from the unattended nodes. Hence, a malicious user could join the network undetected by impersonating as some other legitimate node, to have access to secret data, disrupt the network operations, or trace the activity of any node in the network. Physical node tampering leading to node compromising. Forced battery exhaustion of a node. Radio jamming at the physical layer. There are some types of cross-layer security Cross-layer security design for intrusion detection All approaches pertaining to intrusion detection schemes have been focused on routing and MAC protocols. The existing secure protocols or intrusion detection schemes are normally presented for one protocol layer. So, the effect of these schemes is sandwiched to attacks to a particular layer. They are seldom effective to attacks from different protocol layers; however, security concerns may arise in all protocol layers. It is necessary to have a cross-layer based detection framework that consolidates various schemes in various protocol layers. Cross-layer security design for power efficiency As previously mentioned, energy conservation is one of the primary concerns for sensor networks design, so it should be considered across protocol layers from the beginning stage through subsequent stages of the design to achieve the trade-off between energy consumption, network performance and complexity, and maximize the longevity of the entire network. Our cross-layer approach can achieve this while providing network security provisioning. For instance, the carrier detection is responsible for DoS attacks. A detrimental or malicious node can exploit then interplays in MAC layer to frequently request for channels. This not only prohibits other nodes from connecting with the destination, but also can deplete its battery energy due to frequent responses. To overcome this issue, the information can be collected from other layers and the detrimental node can be recognized and then be limited or isolated. Conclusion After analysing the security risks of WLAN and investigating the advantages of cross-layer security framework, I believe that the cross-layer design is a unique candidate to improve security in WLAN. Summary Wigig or 802.11ad based on the 802.11 standard is a new wireless technology which provides data rates up to 7Gbps over the unlicensed 60 GHz. It will primarily be used within a single room to provide wireless connectivity between home entertainment equipment. It will enable very fast data transfers and streaming media which is 10 times faster than the old wireless technologies. However, Wigig still has some challenges which are the limitation of propagation loss and distance. That is why it can primarily be used within a room or an office. But Wireless Gigabit Alliance claimed that Wigig can be used beyond 10 meters by using beamforming technology in the near future.
Saturday, January 18, 2020
Marketing and Private Label Products
Topic: Zapposââ¬â¢s private label products Recommendation: To persuade the Zappos. com sell private label products to increase the revenue and decrease the transportation costs Audience Analysis: The board of Zappos. com, Operation Department Manager, Marketing department manager. Accountants of Financial department manager. Agenda: 1. Double-Digit annual sales decrease. 2. Blooming sales by selling private label products 3. Benefits and concerns of implementing this project 4. conclusion I. Introduction Zappos, worldââ¬â¢s greatest online shoes retailer.Though we hit 1 billion in our annual sales last year, two years before we expected, we are now confronted with challenge to keep stable growth in revenue. our profit has been decreased slightly since we committed next day delivery. During the economic recession times, we have to make some change to conquer this problem. As Marketing department staff, my proposal is that we could produce and sell our private label products. we have good reputation and large customer network. We can raise our profit by produce and sell private label productsTransitions Letââ¬â¢s get started with the problem II. Body A. Double digit sales decrease during the economic recession times 1. During the economic recession times, our revenue remain growing slightly, however our growth rate has been decreased rapidly. Letââ¬â¢s see the chart of our annual sales growth rate since 2001-2009. 2. Since many brands sell Canadian distribution rights to other partners, we can not sell these brands on its Canadian site. As a result, we canââ¬â¢t set a distribution center there to achieve substantial volume. B. Solution 1.Selling private label shoes which are designed in US headquarter, manufacture in China. 2. Corperate with Chinese local factory to sign a contract to produce guaranteed qualified shoes. C. Benefits 1. Selling products from suppliers is less profitable than selling private label items. ââ¬Å"If you can find a way t o add 10 points of margin, youââ¬â¢re going to have a big success in that product line,â⬠says Schmid, chairman and founder of J. Schmid & Associates in Shawnee Mission, KS. Selling products from suppliers is less profitable than selling private label items.As we can see from the chart of Gross margin. 2. Selling à private label supports a catalogââ¬â¢s brand positioning. ââ¬Å"Having hard-to-find or unique merchandise sets you apart ââ¬â and this is especially [important] for a cataloger D. Counters 1. To Manufacture private label shoes, Zappos will increase R&D expenditures. It might be a problem for companyââ¬â¢s operation cash flow. 2. Another big concern of sell private label shoes is risk of bad reputation of private label shoes. But I have confidence in our product department.Transition: I have demonstrated the current problem weââ¬â¢ve met and I listed the advantages of selling private label items, the cost and benefits we would gain if we do this pro ject. And the last, the next steps to be taken for this proposal. III. Conclusion 1. As we realized that our annual sales growth rate has decreased rapidly, also our gross margin has been maximized. Zappos should improve all aspects of its business to prepare for the difficult economic times 2. By outsourcing manufacture to China and designing in US, it can bring Zappos low cost, high quality shoes. . Final Recommendation: As Board of Directors of Zappos. com, you should consider selling private label shoes to our customers. References: 1. http://blog. minethatdata. com/2008/04/zappos-sales-trajectory-and-customer. html 2. http://bls. gov/fls/chartbook/section3. htm 3. http://blog. minethatdata. com/2009/09/zappos-profit-and-loss-statement-2007. html 4. http://blogs. zappos. com/blogs/ceo-and-coo-blog/2008/02/19/zapposcom-update-february-19-2008
Friday, January 10, 2020
Hong Kong Business Law Assignment
Hong Kong Business Law Assignment 1 1. Zoe wants to sue the retailer to claim back property damage of $22,000. The consumer claim to sue the retailer of HK$22,000 is a minor monetary claim. The Smalls Claims Tribunal was set up to deal with monetary claims involving amounts not exceeding HK$50,000. It is an inferior court which provides a quick , inexpensive and informal method of adjudicating disputes relating to minor monetary claim. Legal representation is not allowed.It is most feasible for Zoe to claim back the HK$22,000 with minimal litigation costs. 2. Possess 0. 05 gram ketamine is categorized as a summary offence. Legal actions for summary offences can be heard in the Magistracy. The Magistracy was set up to exercise criminal jurisdiction over a wide range of indictable and summary offences meriting up to 2 years' imprisonment and a fine of $100,000. Magistrate can also issue warrants, bind a person over to keep the peace and a grant bail. 3. Annie will bring an action under the tort law.Tort law concerns with claims for property damage and personal injuries directly arising out of breaches of a duty of care owed by one individual to another. Tort law provides compensation for both injury to the person and property, causing pure economic loss and for injury. The District Court has limited jurisdiction in both civil and criminal matters. It has civil jurisdiction to hear monetary claims from $ 50,001 and up to $ 1 million. The common types of civil action that the District Court deals with are claims for breach of contract and tort claims.Legal actions for tort claims can be heard in the district court. As Annie wants to claim for claim compensation of HK $85,000, the amount is within the civil jurisdiction of the District Court. Annie can apply to the District Court and a judge will determine whether or not Annie's case will succeed. 4. Bonnie Li can apply to the Labour Tribunal for the unreasonable dismissal by Asia Construction Materials Ltd. Labour Tribunal was set up to provide a quick, inexpensive and informal method of setting disputes between employees and employers. Legal representation is not allowed.It deals with claims arising from the breach of a term of a contract of employment including employment protection. An employee may claim for remedies against an employer under situation of unreasonable dismissal. It is most feasible for Bonnie Li to recover salary in lieu of notice, relevant accrued fringe benefits owed by the employer and other associated compensation with minimal litigation costs. 5. Henry can apply to the Court of First Instance of the High Court for a legal action for judicial review of the decision of the Legislative Council.Constitutional Law are rules which effect distribution and exercise of power and relate to legislature, the executive institutions and the judiciary. Under the Basic Law, legislative council of HKSAR is deemed in law as ââ¬Å"legislature of the Regionâ⬠. Because the Court of First Instance can exercise supervisory jurisdictions. Supervisory jurisdiction is exercised over inferior courts, tribunals, administrative authorities or public bodies acting judicially through applications for judicial review procedure by the alleged aggravated party. A judge will determine whether or not Henry's case will succeed.
Thursday, January 2, 2020
My Personal Goals to License Track Counseling Program
This essay will address in subsections the reason why I am seeking a specialization in a license track counseling program. I t will address how I will do my best to obtain experience through volunteer work. I will discuss in detail part of my life experience as well as my interpersonal skills that made an impact on my decision to become a Mental Health Counselor. In addition, I will also explain in details the license requirement that I will need to practice in the state of Florida. This is the state where I want to practice. 1. Rationale for seeking specialization in a license-track counseling program License counselors are a highly-skilled professional who uses combine traditional psychotherapy and a problem solving approach. These professional counselors create a path for change and find a solution to the problem the client is experiencing. The reason why I am seeking a specialization in a license track counseling program is due to my past experiences. I feel that what I overcame in my past life, I can help others move beyond the obstacles they are experiencing. Therefore, I want to obtain my Masters in the Mental Health Counseling program and attain my license afterwards. 2. Impact of previous employment, volunteer work, and other human service or counseling experiences. This section must address: Unfortunately, I have not worked or have done volunteer work to gain experience in the counseling profession. However, I will give it my best effort to volunteer in a anShow MoreRelatedCounselor Interview : Counselor And Interview1252 Words à |à 6 Pagesinterviewing a counselor in the community counseling setting as I, myself is on the same track with the same interest, and motivation. However, while my interest falls toward community settings or private practice, I interviewed a counselor who works at Cuyahoga Community College on the east side campus. She has been counselor about 13 years. Prior to the interview my understanding was, working as a counselor in a school stings, it would need to have school counseling license. As she further explained it, asRead MoreInterview Of A Helping Professional1376 Words à |à 6 Pagesneed for clients to pay for these counseling sessions because it is a part of the benefits from the military. Most of the time, they do group counseling whic h includes ten to twelve, but they also do some individual and family. For the group counseling, it always takes about three hours each time, and the program is thirty-five daysââ¬â¢ long. After the program, the following care of clients will be continued for another year. Primary, as a counselor, they have to track daily notes and document everything;Read MoreA Brief Note On The United States Of Nepal900 Words à |à 4 PagesI was evicted from Bhutan in early 1990 with my parents when the ethnic war intensified between the Bhutanese government and Lhotsampas (folks who lived in the southern part of Bhutan). Therefore, I ended up emigrating to the eastern part of Nepal as a refugee. I started my education in a refugee camp when I was six years old and graduated from high school at the age of eighteen. Since then I have learned the value of education in the competitive job markets. After spending almost two decades ofRead MoreMy Opinion On My Critical Thinking Skills Essay1441 Words à |à 6 Pagesimportance in using my own words and the importance of rereading and checking my material before turning it in. I gained much knowledge on the different sorts of vocations in psychology, and sub careers. This course has set me up for the other courses that I will need to finish my degree. My critical thinking skills have been enhanced which has improved my thought process. The course was pretty much how I expected it to be. I knew what was expected of me and had excellent input on my strong points andRead MoreWedding Project Plan For A Wedding Essay1400 Words à |à 6 Pagesthat the approval rate would be quick. We will complete the project on the due date within th e 5 months as planned after the engagement date. à · We will start with church marriage counseling for success tips beforehand to help with conflict, differences and for mutual understanding on family, relatives, goals, dreams and inspirations. Planning 1. Small engagement party. We plan to have an engagement party at Palomino in Bellevue for 20 guests consisting of friends, family and some workmatesRead MoreThe Criminal Justice System And Are Introduced Into A New World3989 Words à |à 16 Pagesovercome obstacles with employment skills, employment opportunities, housing, educational opportunities, finances, substance abuse treatment, supervision, counseling, and health treatment then it would be easier for the individual to integrate into a community. Prisoners that are to be released need employment skills, practical living skills, personal growth skills, and social skills in addition to family and spiritual support. (Gaynes, E., Lalley, J., 2005, p. 31) When institutions use resources toRead MoreCreating a Social Program for the Homeless2776 Words à |à 11 PagesFinal Project: Creating a Social Program I have decided to create a social program that identifies the social problem of Homelessness. The new human services, social program will target helping homeless individuals and families to get off the streets. In order to have a successful program I have to come up with an outline and cover all of the basics. This program will have many different resources available to homeless or about to be homeless individuals and families. There are so many homeless peopleRead MoreHistory And Role Development Of The Nurse Practitioner4389 Words à |à 18 Pagesof the Nurse Practitioner History and Role Development of the Nurse Practitioner Ishani Patel La Salle University Budzi, Lurie, Singh, and Hooker (2010) state, ââ¬Å"Nurse Practitionersââ¬â¢ (NP) interpersonal skills in patient teaching, counseling, and patient centered care contribute to positive health outcomes and patient satisfaction.â⬠According to their research they encourage healthcare systems in the U.S. to hire more NPs to allow for better access affordable, and quality care (DeniscoRead MoreBba 8th Sem Report Purbanchal University8856 Words à |à 36 Pagesnumber of academic creditor and classroom years. An internship program is an educational plan which combines classroom theoretical knowledge and practical work experience in industrial, business, or government work situations. These help students to have opportunity to signify academic theories and principles to action, to test out career interests and to develop skills and abilities through carefully planned and supervised programs related to the career of their choice. Internship is a practicalRead MoreAnalysis of Recruitment Selection Strategies of Icici Prudential Life Insurance Ltd.10344 Words à |à 42 Pagesveneration honor I acknowledgement all those whose guidance and encouragement has made successful in winding up this. I take this opportunity to thank Mrs. Preeti for her support and encouragement which helped me in the completion of this report. I extend my gratitude and thankfulness to Arya College of engee. And research center. Date: Signature: PREFACE Recruitment and selection is a multifaceted concept. The relevance
Subscribe to:
Posts (Atom)