Monday, May 18, 2020

Virtual Network For Development Execution - Free Essay Example

Sample details Pages: 11 Words: 3393 Downloads: 5 Date added: 2017/06/26 Category Statistics Essay Did you like this example? A Mobile Ad hoc Network (MANET) is a self-configuring network that is formed and deformed on the fly by a collection of mobile nodes without the help of any prior infra-structure or centralized management (Xiao et al., 2006). These networks are characterized as infrastructure less, mobile, autonomous, multi-hopped, self-organized and self-administered, having dynamic topology and unpredictable traffic patterns etc. A great deal of research is being carried out to solve various issues of MANET. These issues include Routing, MAC Layer Issues, Power Management, Transport Protocol, Quality of Service, Billing, Addressing, Service Discovery, Data Management and Security, etc., (Sesay et al., 2004), (Quan et al., 2004) and (Royer et al., 2004). Don’t waste time! Our writers will create an original "Virtual Network For Development Execution" essay for you Create order One of the most important questions in MANET is the middleware Konark, designed specifically for discovery and discovery of services available around the vicinity of any node. A service can be any hardware, software or any other entity that a user might be interested to utilize and Service Discovery is the process of discovering the services based on user preferences. An efficient and scalable approach to service discovery can lead to the development a large number of potential applications. For example, in a vehicular ad hoc network, vehicles might be interested in knowing the services provided by a near by fuel station. Similarly, in a battlefield soldiers might be interested in sharing the situation about the whole battlefields. Due to the dynamic nature of MANET, there are always spatial and temporal variations in the availability of services. Hence a service discovery strategy should be highly robust, efficient and dynamic in nature. In this paper we have proposed an efficient and flexible approach to service discovery in MANET by extending the work of (Danta et al., 2004). Rest of the sections are organized as follows: first we will provide a review of existing approaches to service discovery. We will then discuss our approach to virtual network architecture. Then we will discuss about the proposed model. Then the Simulation result. Finally we will conclude the paper with future work. LITERATURE REVIEW The service discovery protocols that have been proposed in the literature can be classified as directory less (e.g.IBM DEAPspace, UPnP and Konark) or directory based architecture (e.g. Salutation, JINI, SLP) (Cho et al., 2005) SLP (Sesay et al., 2004), (Service Location Protocol, 1999) and represents the service by means of URL and attributes. JINI is based on Java and uses Interfaces and RMI mechanisms for service discovery process. Due to the lack of semantic information, the protocols can only perform exact matching of services using identifier and attributes. To support service discovery based on semantics, DReggie (Sesay et al., 2004) (an extension of JINI) is proposed. DReggie semantically represents the services by means of DAML and compares the service using a PROLOG reasoning engine. GSD (Quan et al., 2004) also describes the services semantically by means of DAML. They group all the services based on semantics for efficient discovery of services. In order to address heterogeneity of MANET, (Helal et al., 2003) proposed a middleware Konark, designed specifically for discovery and delivery of device independent services in ad-hoc networks. (Danta et al., 2004) Proposed a totally different approach to service discovery by extending AODV protocol and provided service discovery at network layer. As a result when a service discovery request is initiated to discover a service, a route is also established towards the service provider. Hence, when the client wants to use the service, a new route request is not required. VIRTUAL NETWORK ARCHITECTURE Virtual network is based on service-oriented architecture. Implementation of virtual network in the form of an extensible set of distributed services enables on-demand user-driven creation of logical communication space. Moreover, since both distributed applications and virtual network are based on the same architecture, distributed applications can manage the virtual network. Separation of logical and physical communication space is based on indirect service invocation. Each physical node that constitutes virtual network contains a locally installed Overlay Service. The Overlay Service is a special-purpose service that receives, transmits, and delivers the messages in the virtual network communication space. The locally installed Overlay Service receives the messages from the distributed programs executing on local node and delivers them to the Overlay Service on the target node. The Overlay Service executing on the target node delivers the messages to the target services on behalf of the calling distributed programs. In order to invoke application services or coordination mechanisms, distributed programs use target service WSDL document to generate the proxy for the target service. Service proxy contains the instructions for formatting the SOAP messages for interaction with the target service and target service communication parameters. Indirect service invocation is achieved by the modification of the proxy communication parameters. Physical address of target service contained in the WSDL document is modified and redirected to the physical address of the local Overlay Service. Additionally, service proxy puts the logical address of target service into the header of the SOAP message. The Overlay Service on the local node accepts the message from the distributed program, analyses logical addresses in the message header, and redirects the received message to t he Overlay Service on the target node. The Overlay Service on the local node determines the physical address of the target node based on the locally stored mapping relation. Mapping relation is stored in the Naming Table document. The Overlay Service on the target node contains the service proxies for all locally installed services. It selects the proxy for the target service and delivers the message to the given service on behalf of the calling program. The path of the message through the network is determined during the run-time according to the virtual network mapping relation. To enable secure invocation of services in logical communication space of virtual network, we introduce certain extensions to the SOAP message structure. Figure 1 shows the structure of a SOAP message used for secure service invocation in communication space of virtual network. Elementary SOAP message, often called SOAP envelope, consists of SOAP body and SOAP header. SOAP body contains application-specific data used for regular service invocation. SOAP header is an extensible data structure. We use the SOAP header extensions defined in the WS-Addressing and WS Security specifications. WS-Addressing elements contain the information about logical addresses of the invoked services. WS-Security elements contain the security-related information about the encrypted and digitally signed portions of the SOAP message, encryption keys, and cryptographic and hash algorithms. Since all information necessary for message processing are embedded into the message, the message is self-contained and independent of the physical transport protocol. Overlay Service consists of five modules: Local Interface Directory (LID), Router, Address Resolution Manager (ARM), Secure Communication (SC), and Membership Manager. The Local Interface Directory (LID) module contains the proxies of the locally installed services. Each time new service is installed on the local physical node, it should be registered in the LID module of the local logical node. During the service registration, the LID module builds the service proxy for the registered service. Service administrator or an application for automated service installation starts the service registration by providing the WSDL document of the installed service to the LID module. Based on the information contained in the WSDL document, the LID module compiles the executable code of the service proxy and embeds it into the local file system. The executable code of the service proxy is used by the Router module during the delivery of messages to the locally installed services. The Address Resolution Manager (ARM) module maintains the information about the virtual network mapping relation. Mapping relation is stored in the Naming Table document as the (logical address, physical address) value pairs. The ARM module adds the records into the Naming Table if new node is joining the virtual network, removes the records from the table if an existing node is leaving the network, and updates the table if logical node migrates from one physical location to the another one. Joining and removing logical nodes to and from the virtual network are user-driven processes. Migration of logical nodes among physical nodes is application-driven process that can be initiated by an application monitoring network conditions, node workloads, node failures etc. The Secure Communication (SC) module performs the encryption/decryption and the digital signing of the SOAP messages. To keep the messages self-contained and independent of the physical transport protocol, the SC module performs message-level security in accordance with the WS-Security specification. The Router module is a central module of the Overlay Service. It coordinates the process of the delivery of messages to the target services. The Router module accepts the messages on input interface and routes them to the specified destination. If message destination is a local node, the Router module delivers the message to the locally installed service. Otherwise, it forwards the message to the Overlay Service on the remote logical node. Central unit of the Router module is SOAP Parser. SOAP Parser analyses addressing information contained in the header of the received message. Using embedded XPath expression, SOAP Parser fetches the logical address of the destination node from the SOA P message header. Logical address of the destination node is compared with the logical address of the local node. If two addresses match, the Router module delivers the message to the local service. If they differ, it forwards the message to the remote node. The Router module sends the message to the SC module to decrypt the message content and to verify the digital signature. During the analysis of the plaintext message, the Router module fetches the service name from the message header. Then it contacts the LID module in order to retrieve the proxy for given service. Using service proxy, the Router module delivers the message to the target service. The interaction scenario if message is designated to the remote logical node. The Router module contacts the ARM module in order to retrieve the physical address of the destination node. Before forwarding the message to the remote node, the Router module sends it to the SC module to encrypt and digitally sign the message content. Using the retrieved physical address, the Router module forwards the message to the Router module of the destination nodes Overlay Service. Service-oriented architecture of the virtual network enables on-demand creation of logical communication space according to the requirements of distributed applications. Distributed application administrators can manage the membership of the virtual network by adding and removing logical nodes dynamically. To join the network, new logical node has to exchange the virtual network mapping relation with the existing nodes. The Membership Manager is a module of the Overlay Service that coordinates the exchange of the virtual network mapping relation among logical nodes. The administrator of new node provides logical and physical addresses of this node to the local Membership Manager module. This module contacts the ARM module of an existing node in order to retrieve currently valid virtual network mapping relation. It extends the retrieved mapping relation with its own (logical address, physical address) value pair and embeds it into local ARM module. The process of joining new node to the virtual network finishes with propagation of the new node mapping relation record to all remaining members of the virtual network. Reverse algorithm will be started if an existing node is leaving the virtual network. Virtual network provides a basis for the development of advanced mechanisms for managing portability, reliability, and performance of service-oriented applications. Basic elements of an execution environment for virtual network based applications are shown in Figure 2. Service Deployment and Discovery subsystem and Reliability and Performance Management subsystem utilize virtual network to perform application transparent service migration. Service Deployment and Discovery is a distributed system for remote on-demand installation and uninstallation of services. Reliability and Performance Management monitors operability and load of network nodes. If non-operational node or node under heavy load is detected, Reliability and Performance Management subsystem instructs Service Deployment and Discovery subsystem to migrate services from such node to node offering better performance. At the same time, Reliability and Performance Management subsystem updates the naming table of virtual netwo rk, redirecting the messages for same logical node to different physical location. PROPOSED MODEL 1. SERVICE DISCOVERY IN MANET: We are proposing an efficient approach to service discovery for MANET by extending the concept proposed in (Danta et al., 2004). Nodes will be using an extension of AODV routing protocol to search on demand for a service provider along with an appropriate route to access that service. We are extending the concept of (Danta et al., 2004) by allowing a node to not only pull the service provider information on-demand, but a node will also be pushing the service advertisements periodically along with the route information. The novelty of our strategy is that unlike most of the service discovery protocols (e.g. JINI, UPnP, Deapspace and SLP), an appropriate path towards the service provider is available after the completion of service discovery process. In addition to employing AODV, we are also explicitly pushing the service advertisement to adjacent nodes along with appropriate routing information. This information can be saved by adjacent nodes based on their preferences and can also be propagated ahead. So, in most of the cases, a service discovery SREQ request can be served from nodes local service table and doesnt need to be propagated on the network. The integration of service discovery with the network layer is motivated by the survey done. The development of a cross layer service discovery solution is always useful in the network of energy constrained mobile devices because: 1) putting service discovery at the network layer will reduce the control messages Overhead 2) less number of messages is exchanged among devices, hence processing overhead is reduced. We believe that the periodic advertisements of services (as done in our approach) will not cause too much traffic overhead because a number of service advertisements can always be transmitted in a single message. Also, for each service discovery, service discovery and route determination is done in a single request. Hence, less number of messages is exchanged among nodes. However, the disadvantage of our approach is that it is dependent on routing protocol and can work only for AODV routing protocol. The details of our proposed approach in pseudo code are described. Every node will maintain a Routing Table to hold routing information and a Service table to maintain information about the services provided by it and other nodes along with other information like the life time of the services, the provider of the service etc. The nodes will periodically broadcast the services provided by it to its peer nodes by means of a message UPDATE_SERVICE_TABLE (UST). The message contains the service advertisements along with the routing information corresponding to the provider of each service. The receiving node can store the service advertisements it heard from its neighbour based on its preferences and interests. In addition, to avoid network congestion, if a node hears a service advertisement it reschedules its broadcast at a later time to avoid network congestion. If a node wants a service, it will first of all check its service table for a possible match. If a service is found in the service table, node can immediately requests the provider for the desired service. However, if no appropriate service provider is found in the local service table, a service discovery request SREQ will be issued to find out a service provider for this service. The SREQ is served based on Ad hoc On Demand Distance Vector Routing Protocol (Danta et al., 2004). The SREQ message is propagated along the network. Any node receiving the SREQ message will first check in its service table for corresponding service. If a match is found, an appropriate reply SREP message will be generated. If no match is found, the intermediate nodes will propagate the message SREQ to adjacent neighbours. In addition to that, it will cre ate a temporary reverse route towards source of the message. When a node receives an SREP message, it will check its routing table, delete the corresponding temporary reverse route and create a forward entry towards the destination. The node will then send the SREP message towards the source. The RREP message will contain complete details of the services it provides. 2. SERVICE ORIENTED COMPUTING Virtual computing for service-oriented applications introduces a level of indirection between distributed application and physical network. Virtual computing establishes logical communication space on top of physical network with an application-level defined addressing scheme. Distributed programs that implement coordination logic of distributed application are developed in logical communication space of virtual computing. Instead of addressing physical locations of application services and coordination mechanisms, they use logical addresses defined by virtual network computing. Using logical addressing, distributed application is logically separated from the physical network. Logical separation of distributed application and physical network enables application transparent migration of services, because distributed application uses logical service distribution. During the application execution, virtual network masquerades the changes in the physical locations of services from the coordination logic of distributed application. Organization of the virtual network is shown in Figure 4. Virtual network consists of logical nodes. Logical nodes are services that virtualize physical nodes into application-level controlled resources. Application-level control of physical nodes is enabled through application-driven management of virtual network mapping relation. Mapping relation determines the arrangement of logical nodes over physical nodes. Virtual network computing mapping relation allows the assignment of arbitrary number of logical nodes to the single physical node. Many-to-one characteristic of mapping relation enables the adjustment of virtual network computing to arbitrary configuration of physical network. Adjustment of the mapping relation during the application setup enables portability of distributed applications between different working environments, regardless of available number of network nodes and their physical addresses. Runtime adjustment of the mapping relation enables application transparent migration of services, which can be useful for managing the reliability and performance of distributed application. SIMULATION RESULTS To simulate our approach, we have developed our own simulation software. The simulator creates n nodes dynamically and links them randomly. Every node is randomly chosen to be either capable of storing or not storing advertisements. Nodes are randomly assigned a number of services. While simulation is running, after every half second, a random number of requests are generated and based on an improbability of 0.5 either a link is randomly created or broken. We have compared the results based on Request Acquisition Latency i.e. the time duration in which a service discovery request is initiated and the service discovery process is completed. The result when no service advertisement is broadcasted periodically with the result when broadcast capability is added. The situation when 50 nodes were simulated with a total of 25 services available on the network. In this situation, 174 requests were generated in a simulation time of 30 seconds. When no broadcasting was done 147 requests were replied with request acquisition latency between replied in between 0-0.2s. But when broadcasting was done, the 154 requests were replied in between 0-0.2s. This shows that by adding broadcasting functionality, performance of service discovery strategy has improved. Similarly in the case of 100 nodes, we can see that broadcasting of service advertisements has improved the request acquisition latency. CONCLUSION In this paper, we propose a model for development and execution of service-oriented applications based on virtual computing in mobile ad hoc network. The proposed approach is very flexible, efficient and can be adopted to work in any environment. Advanced mechanisms built upon the virtual network utilize logical communication space and service migration to provide distributed application portability, reliability, and performance. Virtual network computing consists of a set of distributed overlay services capable of receiving, transmitting, and delivering messages on behalf of application services. Service-oriented architecture of the virtual network enables user and application-driven management of logical communication space. As part of our future work, we plan to extend the virtual network computing infrastructure with an application-level routing procedure for anonymous communication to preserve the privacy of service providers and consumers. Furthermore, we plan to upgrade the virtual network with an extensible security framework that allows user and application-driven customization of the service access control, service usage tracking, and communication security by integrating custom developed security services into the virtual network. ACKNOWLEDGEMENT We wish to thank Mr. I. Jayaram ­Ãƒâ€šÃ‚ ­an, Assistant Librarian, Anna University, Coimbatore for providing the literature and Mr. Babu, Head, Department of CSE, Kings Engineering College for encouraging us to carryout research activity.

Wednesday, May 6, 2020

The Blue Rim Memory And A Tree Telling Of Orpheus

Denise Levertov is the poet who wrote â€Å"The Blue Rim Memory† and â€Å"A Tree Telling of Orpheus,† in which she portrays a theme of morals and religious beliefs though post modernism, anachronism, and liberalism. Levertov was born in llford, United Kingdom and later moved to Massachusetts where she taught in universities such Brandeis University, MIT and Tufts University. Levertov wrote â€Å"The Blue Rim Memory† and â€Å"In the Land of Shinar† which brought her the fame and enabled her to begin her pilgrimage journey towards the deep spiritual, personal, and political understanding . Levertov took part a large movement to help the country’s state. â€Å"On a small scale, the decade of the 1970s was a time of personal change in the subject matter of Levertov s poetry, and, on a large scale, these were years of sometimes odd, sometimes benign change†¦Ã¢â‚¬  The time period which Levertov began her poetry, th e time period began to reflect on her work, causing her ideas to thrash around involuntarily. â€Å"Because Levertov never received a formal education, her earliest literary influences can be traced to her home life in Ilford, England†¦Levertov and her older sister, Olga, were educated by their Welsh mother, Beatrice Adelaide Spooner-Jones, until the age of thirteen. The girls further received sporadic religious training from their father, Paul Philip Levertoff, a Russian Jew who converted to Christianity and subsequently moved to England and became an Anglican

Hys Dairies Case Study Essay - 1094 Words

| Case Study 3.1 | Hy Dairies, Ltd. | | Rochelle Beauport, Assistant Brand Manager at Hy Dairies, is a member of a visible minority group. She enjoys her position with the company as she finds it both challenging and it has the ability to directly impact the company’s profitability. During her most recent annual performance review, Beauport was offered a new position as a Market Research Co-ordinator. This position is a lateral move. Syd Gilman, the Vice President of Marketing, is offering Beauport the position as a reward for her efforts in improving the sales of Hy Dairies’ Gourmet Ice Cream. While the market research co-ordinator position is not typically thought to be a route to top management, it is a position that Gilman†¦show more content†¦The social identity theory is defined as people defining themselves by the groups they belong to or have an emotional attachment to. Beauport felt that, as a woman and a visible minority, she was being stereotyped as being unable to handle a senior mark eting position. Furthermore, she had been told by her most recent employer prior to Hy Dairies that this was the case for most women. As a result of this, Beauport is making the assumption that Hy Dairies has the same practices regarding career opportunities in their marketing department and are using this offer to move her into a less visible support role in that department. However, Syd Gilman has offered her this new position with the intention of helping Beauport further her career with the company. Gilman, for his part, assumed that Beauport would be very happy and excited to have this new opportunity. He felt that they would share a similar outlook on their employment and this move was the best method to advance careers with Hy Dairies. Gilman thought that Beauport would be excited at the opportunity to ‘follow in his footsteps’, though it appears that he neglected to share with Beauport that his career had followed exactly that path to a senior management position with the organization. In reality, Gilman and Beauport have different backgrounds, social characteristics, and work experience, and as aShow MoreRelatedCase Study: Hy Dairies, Inc.†866 Words   |  4 PagesCase Study Hy Dairies, INC.† The case study, â€Å"Hy Dairies, Inc.†, highlights an individual, Rochelle Beauport, whose career with the company seemed promising after a successful two quarters of increased sales of Hy’s gourmet ice cream. Syd Gilman, the vice president of marketing, was so impressed with Beauport’s effort and hard work that he decided to positively reinforce her achievement by offering her a position where he believed she would gain experience from higher profile work (Human BehaviorRead MoreCase 3.1 Hy Dairies1695 Words   |  7 PagesCase Study 3.1 HY DAIRIES, INC. Discussion Questions: 1. Apply your knowledge of stereotyping and social identity theory to explain what went wrong here. The case covers issues of how perceptions affect individual decision-making process. As an introduction, Syd Gilman, the vice marketing president at Hy Dairies perceived Rochelle Beauport as a potential marketing staff responsible to improve the sagging sales of Hy’s gourmet ice cream brand, thus decided to reward her with a new post of

International Relation and Global Economy

Question: Describe about comparison between local and chinese economies and relation between economic growth and personal freedom. Answer: Comparison between local and Chinese economies Global: The US economies are a community that relies on industries, farming and other activities. Therefore, the people of such economies do not use global indicators to plan their activities. However, with rise in technology and education, the local economies highly consider global indicators to enhance their farming and agriculture and be prepared if there is any drop in the rainfall in particular season. Apart from that, Chinese economy is well developed in comparison to local economies. This economy largely make use of global indicators to make decision to which nation should be product delivered that will ensure higher exchange rate (Lieberthal Jisi, 2012). Ethical: Both local and Chinese economies consider ethical indicators to make firm and right decisions. The local economy makes right use of products in their farm to produce quality product for the consumers. However, Servaes (2012) mentioned that in order to earn produce higher quantity, the people compromises with the quality. On the contrary, the Chinese economy also takes account ethical indicators in product production and shipment. It helps the economy to trade their product in international market and increase the customer base. On the other hand, the government of Chinese economy focuses on the well-being of their people and takes decision what is ethically right for the people. Political: Chinese economy is established market economy. The central government in China takes major economic decision so that opportunities can be increased in the market. The political environment is moreover stable which makes Chinese economy to grow stronger. On the other hand, the political environment in local economies is not that stable and is said to be corrupt. As a result, the growth of people that lives in local economies is meagre and receives less support from the government. Physical: According to Kissinger (2012), physical condition of local economies is poor as their earning is less. Therefore, they are not able to receive better physical treatment support. On the other hand, it has been seen that death rate is higher in local economies. As a result, some NGOs and government provide free medical service to improve their health and physical condition. On the contrary, the people relating to Chinese economy are in good position to avail better physical treatment and support. Moreover, the government also provide and arrange medical facility to improve the health condition of people. Societal: Chinese economy tries to understand the wants, culture, taste and preference of the society and its people so that best value can be provided to them. As a result, the people are able to avail all the requirements that they need. On the other hand, in case of local economy, the societal indicators are also highly considered (Nathan Scobell, 2012). As it helps the people know about the requirements of society so that they can involve themselves in the production of product that best suits society demand. Size and Growth of economies Chinese economy is expanding at 9.4% annual rate and $8.22 trillion economy of China is the world second largest in comparison to US $15.68 economy. Moreover, China is the biggest exporter and second biggest importer across globe. The per capita GDO of China in 2012 was $9233 whereas US has $49965. Apart from that, China is a dynamic capitalist nation where there is no freedom of speech. Moreover, people are sent to prison if they protest and also labour unions, civil liberties do not exist. Therefore, Chinas economy is capitalist economy having authoritarian government. Furthermore, the growth rate and size of population have drastically grown. China is considered as only risk to US power (Lawrence, 2012). However, the foreign policy that is followed by China is defensive so that they do not suffer huge loss. Apart from that, US are considered as political power by Chinese as they can harm the interest of China. The growth rate of China is more than US which means that China can cover will be successful in covering large market than US in coming years. However, US have edge over Chinese economy and are successful in meeting the demand of the people all around the globe. Moreover, US policy towards China involves encouraging free trade, direct investment and open markets. Therefore, it can be mentioned that democracy and capitalism can go hand in hand (Morrison, 2011). Impact on internet on two national economies The government of China has invested huge on technology due to increase in wages and losing low cost advantage. Therefore, internet technology is on disadvantage side. On the other hand, the US does not have any issues and people are freely accessing internet. In China, the internet is sprouting and the government can block Twitter but Sina Weibo is provided to people, which is a blogging site. Therefore, it largely influences the society if China by giving information within the nation (Zhao, 2015). However, it does not provide opportunity to people to connect with world rather they are constrained within the nation. On the other hand, as per BCG study, internet has helped US to gain $684 billion in 2010. The use of internet in US is rising year after year as it provides easy service to the people to trade and exchange with the world. Apart from that, about 4.7% has been accounted to GDP of US from internet (Lawrence, 2013). Therefore, in order to match with internet technology, Chi na needs to make huge investment and allow people to use it freely. Capitalism in relation to national political policies The US economy is considered as capitalist economy where the group of body controls capital or money and takes economic decisions. Moreover, it can be discussed that the people that has wealth and power aims to increase their profit level. Therefore, government of US takes full control over the economy and makes policies that will best benefit the society and nation in terms of economic growth, foreign exchange, customers, etc. However, now US have been considered as mixed economy so that private commercial interest can be balanced by engaging with the private enterprise (Nye Jr et al. 2012). On the other hand, the economy of China has risen significantly and is successful in lowering down the poverty level. China is authoritarian political system where the leaders take most of the decision for the economy. On the other hand, the economic system of China does not allow corporation to shape or refuse the decision made by the government. Therefore, national policies are decided by the government and enforced in the society (Kissinger, 2012). Relation between economic growth and personal freedom It has been seen that there is imbalance trade and financial flows between China and US that has tighten the economic tangles and mutual relationship. US is not highly dependent on the financing of China of their scarcities. Private saving rate has risen in US and also current account deficit has declined. On the other hand, both the countries have increased their trades and US has tuned as major export markets in China. It can be noticed that exports from China has rose to $296 billion from $100 billion to US in 2009. As a result, it helped in building mutual trading partners. Apart from that, many US firms have opened their subsidiary or manufacturing unit in China such as Apple. Therefore, it can be understood that relation between in terms of trade and industries globalisation has increased between both the nations (Salidjanova, 2011). However, China does not consider US as a dominant export market. Moreover, China holds large trade surplus with US and also it can be mentioned th at large exchange reserves has been invested by China in US bonds. References Kissinger, H. A. (2012). The Future of US-Chinese Relations.Foreign Affairs,91(2), 44-5. Lawrence, S. V. (2012).US China Relations: Policy Issues. DIANE Publishing. Lawrence, S. V. (2013, August). US-China Relations: An Overview of Policy Issues. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE. Lieberthal, K., Jisi, W. (2012). Addressing US-China Strategic Distrust. Morrison, W. M. (2011). China-US trade issues. Nathan, A. J., Scobell, A. (2012). How China Sees America.Foreign Affairs,91(5), 32-47. Nye Jr, J. S., Rachman, G., Mead, W. R., Mearsheimer, J., Walt, S., Feaver, P. D., ... Lizza, R. (2012).The domestic sources of American foreign policy: insights and evidence. J. M. McCormick (Ed.). Rowman Littlefield Publishers. Salidjanova, N. (2011).Going out: An overview of China's outward foreign direct investment. US-China Economic and Security Review Commission. Servaes, J. (2012). Soft power and public diplomacy: The new frontier for public relations and international communication between the US and China.Public Relations Review,38(5), 643-651. Zhao, S. (2015). A New Model of Big Power Relations? ChinaUS strategic rivalry and balance of power in the AsiaPacific.Journal of Contemporary China,24(93), 377-397.

Business Writing Sunselect Property Group

Question: Discuss about the Business Writing for Sunselect Property Group. Answer: Introduction: Sunselect Property Group (SPG) is an established property developer. It is based in Sydney, New South Wales, Australia. It is one of the leading property development companies for more than 50 years. SPG has been developing commercial and residential properties in all over Australia and has been very successful. It has a diversified developmental business. SPG has covered the development of residential housing and apartments, commercial properties such retail and industrial properties, ownership and management of investment property and general property management. However, in the initial years, sustainability of the projects was not in the priority list of SPG. That led to decline in their popularity, especially in the last decade when sustainability became a major issue in the world (Bebbington, Unerman and O'Dwyer 2014). Hence, to improve their image and goodwill, the company has given efforts to modify their CSR profile. Now, developing sustainable projects has been the primary agenda of SPG. SPG has started the development of a sustainable housing project, named The Greenfields Development. It is a low-rise, high density housing project, aimed at providing affordable and energy efficient housing. It promotes sustainable living. Sustainability has become a key issue in the world. Every organization must contribute to save the environment for the future generation. It is responsibility of the companies, named as Corporate Social Responsibility (CSR). SPG has focused on three key areas of sustainability for this housing project; those are energy efficiency, water consumption and management and waste management (Crane, Matten and Spence 2013). Restoring Resources: Energy Efficiency: SPG has aimed at developing energy efficient housing for the people. It has planned for using less of finite sources and more of infinite or renewable energy sources. The energy consumption increases the emission of greenhouse gases, which contributes in the global warming. As per the record of Climate Change website, households account for one-fifth of the greenhouse gas emissions of Australia. A household include many features, which consume energy, such as, heating and cooling (40%), lighting (8%-15%), hot water supply (21%), appliances (33%), entertainment and home office equipment (10%) and home automation (McGee 2013). All these are integral parts of an average household. The Greenfields Development project of SPG commits to increase the energy efficiency of the housing by handling the sustainability issues. Water Consumption andManagement: Water is another important factor of living. Hence, using and reusing water is a goal for SPG for sustainability objectives. Water is most essential utility for a household. Since, the resource is not abundant everywhere, it should be used carefully to reduce the waste. It has been found that when the water is free or cheap, the level of wastage is maximum. Hence, water consumption and management is a vital part of the sustainability agenda of the company (Willis et al. 2013). The waste water management is also important. Reusing the water reduces water bills, uses of fewer water resources, cut down the water pollution. However, the waste water treatment facilities must be adequate and equipped with modern technologies so that waste water management becomes cost effective (Fane, Reardon and Milne 2013). WasteManagement: The environment is polluted from the vast amount of wastes from households and industries. Hence, waste management is crucial for sustainability. SPG is committed to reduce waste and reusing those whenever possible through implementation of new systems of waste management. In Australia, around 42% of the total solid waste is building waste (Reardon et al. 2013). Minimizing the waste can result in significant amount of environmental, social and economic benefits. The three Rs of waste management are: Reduce, Reuse and Recycle. Reduce consumption of resources by developing smaller houses help to conserve the scarce resources effectively for future generation and reduce waste. The Greenfields Development of SPG is a low rise, high density housing project which fulfils this agenda. Reuse existing buildings and raw materials help to decrease the demand for new resources and hence saves money and wastes of resources. Since, a housing project involves huge amount of energy and resources, hence, reusing the materials from existing but abandoned or old buildings can help to minimize wastes and save resources and money. Recycle of resources which have no more life or left over also help to reduce wastes and lower the demand for new materials (Guerrero, Maas and Hogland 2013). SPG has applied all of these steps of waste management in their new housing project for incorporating sustainability. Recommendations: Following the major sustainability responsibilities, SPG can take the measures mentioned below: For Energy Efficiency: Incorporation of energy efficient LED lighting in all the future housing and commercial projects. Using more of renewable energy sources such as, solar, wind and water. Plan to achieve minimum 5 star NABERS Energy tenancy rating for each of the corporate tenancies, and 5 star NABERS Energy portfolio rating for all commercial properties by 2020 (Hylan, d Lyons and Lyons 2013). Reducing energy intensity in all companies by 20% by 2020. For Water Consumption and management: Reusing the waste water for every new developmental project by 2020. Reducing water intensity in all companies by 20% by 2020. Decreasing water intensity in all existing commercial and housing properties by 1.5% per year. For Waste management: Plan to achieve 90% recycling rate across all types of business by 2020. Development of waste management plans for all existing housing and commercial projects by 2020. Implementing operational waste management plan for all corporate offices of SPG by 2018. Conclusion: In the modern world, where climate change, global warming are major issues, the sustainability of environment have taken the top position in the list of CSR of every organization across the world. SPG is no exception. It has started to incorporate the sustainable developmental plans in its business. For all the new property developmental projects, SPG includes the sustainability issues like energy efficiency, water consumption and management and waste management as the top priorities. Thus, the new project The Greenfields Development is a housing project of SPG which addresses the sustainability issues of business. References: Bebbington, J., Unerman, J. and O'Dwyer, B., 2014.Sustainability accounting and accountability. Routledge. Crane, A., Matten, D. and Spence, L. ed., 2013. Corporate social responsibility: in a global context. In: Corporate social responsibility: readings and cases in a global context, 2nd ed. Abingdon: Routledge. Fane, S., Reardon, C. and Milne, G., 2013. Wastewater reuse. 1st ed. [ebook] YourHome. Available at: https://www.yourhome.gov.au/sites/prod.yourhome.gov.au/files/pdf/YOURHOME-Water-WastewaterReuse.pdf. Guerrero, L.A., Maas, G. and Hogland, W., 2013. Solid waste management challenges for cities in developing countries.Waste management,33(1), pp.220-232. Hyland, M., Lyons, R.C. and Lyons, S., 2013. The value of domestic building energy efficiencyevidence from Ireland.Energy Economics,40, pp.943-952. McGee, C., 2013. Energy. 1st ed. [ebook] YourHome. Available at: https://www.yourhome.gov.au/sites/prod.yourhome.gov.au/files/pdf/YOURHOME-Energy-Energy.pdf. Reardon, C., Fewster, E., Harkeness, T. and Alviano, P., 2013.Waste Minimization. 1st ed. [ebook] YourHome. Available at: https://www.yourhome.gov.au/sites/prod.yourhome.gov.au/files/pdf/YOURHOME-Materials-WasteMinimisation.pdf. Willis, R.M., Stewart, R.A., Giurco, D.P., Talebpour, M.R. and Mousavinejad, A., 2013. End use water consumption in households: impact of socio-demographic factors and efficient devices.Journal of Cleaner Production,60, pp.107-115.