Saturday, January 25, 2020
Concepts of Computer Networking
Concepts of Computer Networking CHAPTER 1: NETWORKING CONCEPTS NETWORKING BASICS: At its most elementary level, a computer network consists of two computers connected to each other by a cable that allows them to share data. All computer networking, no matter how sophisticated stems from that simple system. While the idea of connecting two computers by a cable may not seem extraordinary, inretrospect it has proven to be a major achievement in communications. Computer networking arose as an answer to the need to share data in a timely fashion. Personal computers are powerful tools that can process and manipulate large amounts of data quickly, but they do not allow users to share that data efficiently. Before networks, users needed either to print out documents or copy document files to a disk for others to edit or use them. If others made changes tothe document, there was no easy way to merge the changes. This was, and still is, known as working in a stand-alone environment. TYPES OF NETWORKS: Computer networks can be categorized in the following types. LOCAL AREA NETWORK (LAN): A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet . The most common type of local area network is an Ethernet LAN. The smallest home LAN can have exactly two computers; a large LAN can accommodate many thousands of computers. Many LANs are divided into logical groups called subnets. METROPOLITAN AREA NETWORK (MAN): MAN stands for metropolitan area network .It is a network of devices within an area of one to ten kilometers or with in a city. It may be a single network such as a cable television network or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN to LAN as well as device to device. WIDE AREA NETWORK (WAN): A WAN stand for wide area network .It is spread through out the world. A WAN that is wholly owned and used by a single company is often referred to as an enterprise network. It can connect computers and other devices on opposite sides of the world. A WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet. INTRANET: Anintranetis a privatecomputer networkthat usesInternet Protocoltechnologies to securely share any part of an organizations information or operational systems within that organization. The term is used in contrast tointernet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internalwebsite, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. EXTRANET: Anextranetis a private network that usesInternet protocols,networkconnectivity. An extranet can be viewed as part of a companysintranetthat is extended to users outside the company, usually via theInternet. It has also been described as a state of mind in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast,business-to-consumer(B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. INTERNETWORK: An Internetwork is a collection of two or more LANs connected by WANs. Internworks are referred to interchangeably as data networks or simply networks. The most popular internetwork is the Internet which is open to public. COMPONENTS OF NETWORK: A data communication system has two main components:- HARDWARE COMPONENTS: Devices and media are the physical elements or hardware of the network Hradware is often the visible components of the network platform such as a laptop, a PC or swtich etc used to connect the devices. Ocassionally some components might not be so visible. DEVICES: Devices of the network can be of two types that are the end devices and the intermediary devices, we explain both the types:- END USER DEVICES: An end use device refers to a piece of equipment that is either the ousce or the destination of a message on a network. Network users usaully only see or touch an end device, which is most often a computer. Another can generic term for an end device that sends or receives messages is a host. E.g host and end devices are Printers, Computers, Scanners, Webcams etc. INTERMEDIARY DEVICES: Intermediary devices connect the indivisual hosts to the network or can connect multiple networks to form an internetwork. Intermediary devices are not all the same. Some work inside the LAN to perfom switching functions and others help route messages between networks. Example of intermediary devices are Switches, Hubs and Routers etc. NETWORK MEDIA: Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. The three main types of media in use in a network are: COPPER: A twisted pair cable usually used as a medium inside a LAN environment. FIBEROPTICS: Made up of glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. WIRELESS: It connects local users through air using electromagnetic waves. SOFTWARE COMPONENTS: Software components can be divided in to two parts, services and processes. SERVICES: A network service provide information in responce to a request. Services include many of the common netowrk applications people use every day, like e-mail hosting services and web hosting services. For an instance we can take example of YAHOO enterprise, they provide mail services as well as web services, there are a number of companies offering these kind of services. PROCESSES: Processes provide the funtionality that directs and moves the messages through the network. Processes are less obvious to us ut are critical to the opeation of networks. For example viewing a webpage invokes one network process, clicking on a hyperlink causes a web browser to communicate with a web server, in the same way many network processes can take place at the same time. NETWORK TOPOLOGIES: Topology of a network is the geometrical representation of the relationship of all the links and linking devices to one another. PHYSICAL TOPOLOGIES: There are four basic physical topologies possible mesh, star, bus, and ring. MESH TOPOLOGY: In a mesh topology every device has a dedicated point to point connection to every other device .A fully connected mesh network therefore has n(n-1)/2 physical channels to link n devices . STAR TOPOLOGY: In star topology each device has a dedicated point to point connection only to a central controller usually called a hub . The devices are not directly connected to each other .Unlike a mesh topology ,a star topology does not allow direct traffic between devices the controller acts as an exchange : if one device wants to send data to another it sends the data to the controller which then relays the data to the other connected device. BUS TOPOLOGY: A bus topology on the other hand is multi point one long cable acts as a back bone to link all the devices in a network nodes are connected to the bus cable by drop lines and taps a drop line is a connection running between the devices and the main cable a tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. RING TOPOLOGY: In a ring topology each device has a dedicated point to point connection only with the two devices on either side of it . A signal is passed along the ring in one direction from device to device until it reaches to its destination protocols. LOGICAL TOPOLOGIES: The Logical topology defines how the systems communicate across the physical topologies. There are two main types of logical topologies: SHARED MEDIA TOPOLOGY: In a shared media topology, all the systems have the ability to access the physical layout whenever they need it. The main advantage in a shared media topology is that the systems have unrestricted access to the physical media. Of course, the main disadvantage to this topology is collisions. If two systems send information out on the wire at the same time, the packets collide and kill both packets. Ethernet is an example of a shared media topology. TOKEN BASED TOPOLOGY: The token-based topology works by using a token to provide access to the physical media. In a token-based network, there is a token that travels around the network. When a system needs to send out packets, it grabs the token off of the wire, attaches it to the packets that are sent, and sends it back out on the wire. As the token travels around the network, each system examines the token. When the packets arrive at the destination systems, those systems copy the information off of the wire and the token continues its journey until it gets back to the sender. When the sender receives the token back, it pulls the token off of the wire and sends out a new empty token to be used by the next machine. PROTOCOLS: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard. NETWORK PROTOCOLS: For devices to communicate over the network, they must follow different protocols that perform the many tasks to be completed. The protocols define the following: The format of the message The way intermediary dvices share information about the path to the destination The method to handle update messages between intermediary devices The process to initiate and terminate communications between hosts INTERACTION OF PROTOCOLS: Interaction between protocols can be clearly understood by a simple example, the way that a web server and a web client interacts. HTTP defines the formatting and content of the requests and responses exchanged between the client and server. Both the client and server implements HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the message are transported between the client and server. TCP is the transport protocol that divides the HTTP messages in to smaller pieces to be sent to the destination client, it is also responsible for controlling the size and rate at which messages are exchanged between the client and the server. Another protocol called IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and selecting the best path to the destination host. TECHNOLOGY INDEPENDENT PROTOCOLS: Protocols that guide the network data are not dependent on any specific technology to carry out the task. Protocols describe what must be done to communicate, not how the task is to be completed.This is the reason that enables different kind of devices such as telephones and computers to use the same network infrasturcture to communicate. PROTOCOLS AND REFRENCE MODELS: Networking professionals use two networking models to comminicate within the industry, they are protocol models and reference models. Both were created in the 1970s. A protocol model is a model that closely matches the structure of a particular protocol suite. The hierarhical set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols with in the protocol suite. A refrence model provides a common referecen for maintaining the consistency within alkl types ofn etwork protocols and services. The primary function of a refercen model is to aid in clearer understanding of the functions and process involved. The OPEN SYSTEMS INERCONNECTION (OSI) the most well known reference model. OSI MODEL: In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. APPLICATION LAYER: The topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference models application layer on the receiving computer. PRESENTATION LAYER: The presentation layer, defines the format used to exchange data among networked computers. Think of it as the networks translator. When computers from dissimilar systems need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computers application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. SESSION LAYER: The session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. TRANSPORT LAYER: The transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it. NETWORK LAYER: The network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. DATA LINK LAYER: The data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. The electrical representation of the data is known to this layer only. PHYSICAL LAYER: The bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers. TCP/IP MODEL: The TCP/IP protocol does not exactly match the OSI reference model. Instead of seven layers, it uses only four. Commonly referred to as the Internet Protocol Suite, TCP/IP is broken into the following four layers: NETWORK ACCESS: Network access layer communicates directly with the network. It provides the interface between the network architecture (such as token ring, Ethernet) and the Internet layer. INTERNET: The Internet layer, corresponding to the network layer of the OSI reference model, uses several protocols for routing and delivering packets. Router are protocol dependent, they function at this layer of the model and are used to forward packets from one network or segment to another. Several protocols work within the Internet layer. TRANSPORT: The transport layer, corresponding to the transport layer of the OSI reference model, is responsible for establishing and maintaining end-to-end communication between two hosts. The transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also handles retransmissions of packets. The transport layer can use either TCP or User Datagram Protocol (UDP) protocols depending on the requirements of the transmission. APPLICATION: Corresponding to the session, presentation, and application layers of the OSI reference model, the application layer connects applications to the network. It contains all the higher-level protocols. COMPARISON BETWEEN OSI MODEL AND TCP/IP MODEL: The OSI and TCP/IP reference models have much in common. Both are based on the concept of a stack of independent protocols. Also, the functionality of the layers is roughly similar. For example, in both models the layers up through and including the transport layer are there to provide an end-to-end, network-independent transport service to processes wishing to communicate. These layers form the transport provider. Again in both models, the layers above transport are application-oriented users of the transport service. The differece between OSI and TCP/IP model is that the Application layer of TCP/IP model operates at the upper three layers of OSI model, they are application layer, presentation layer and session layer, also the Network layer of TCP/IP model works at the lower two layers of OSI model that are, data link layer and physical layer. TCP/IP PROTOCOL The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexibility and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services. SOME IMPORTANT TCP/IP PROTOCOLS: INTERNET PROTOCOLv4 (IP): Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a header to the packet so that it can be routed through the network using dynamic routing tables. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for time to live). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network. IPV4 HEADER: The key fields of the ipv4 are as follows:- SOURCE ADDRESS: Senders ip address DESTINATION ADDRESS : Receivers ip address TIME TO LIVE (TTL): Numeber of hops a packet must traverse before getting discarded. TYPE OF SERVICE (TOS): It is for a sending host to specify a preference for how the datagram would be handled as it makes its way through an internet. PROTOCOL: This field defines the protocol used in the data portion of the IP datagram. FLAG AND FRAGMENT: A three-bit field follows and is used to control or identify fragments VERSION: Protocol version. INTERNET HEADER LENGTH: The second field (4 bits) is the Internet Header Length (IHL) telling the number of 32-bitwordsin the header. PACKET LENGTH: This 16-bit field defines the entire datagram size, including header and data, in bytes. ADDRESS RESOLUTION PROTOCOL (ARP): Before an IP packet can be forwarded to another host, the hardware address of the receiving machine must be known. The ARP determines hardware addresses (MAC addresses) that correspond to an IP address. If ARP does not contain the address in its own cache, it broadcasts a request for the address. All hosts on the network process the request and, if they contain a map to that address, pass the address back to the requestor. The packet is then sent on its way, and the new information address is stored in the routers cache. HEADER: Some important fields of ARPs header are as follows:- HARDWARE TYPE: This field specifies the Link Layer protocol type PROTOCOL TYPE: This field specifies the upper layer protocol for which the ARP request is intended HARDWARE LENGTH: Length of a hardware address PROTOCOL LENGTH: Length (in octets) of alogical addressof the specified protocol OPERATION: Specifies the operation that the sender is performing SENDER HARDWARE ADDRESS: Hardware (MAC) address of the sender. SENDER PROTOCOL ADDRESS: Upper layer protocol address of the sender. TARGET PROTOCOL ADDRESS: Hardware address of the intended receiver. TARGET HARDWARE ADDRESS: Upper layer protocol address of the intended receiver. TRANSMISSION CONTROL (TCP): The TCP is responsible for the reliable transmission of data from one node to another. It is a connection-based protocol and establishes a connection (also known as a session, virtual circuit, or link), between two machines before any data is transferred. To establish a reliable connection, TCP uses what is known as a three-way handshake. This establishes the port number and beginning sequence numbers from both sides of the transmission. HEADER: Following are some important fields of TCP header: SOURCE PORT: Identifies the sending port. DESTINATION PORT: Identifies the receiving port. SEQUENCE NUMBER: This is the initial sequence number. ACKNOWLEDGEMENT NUMBER: A 32 bit acknowledgement number. DATA OFFSET: Specifies the size of the TCP header in 32-bit words. USER DATAGRAM PROTOCOL (UDP): A connectionless protocol, the UDP, is responsible for end-to-end transmission of data. Unlike TCP, however, UDP does not establish a connection. It attempts to send the data and to verify that the destination host actually receives the data. UDP is best used to send small amounts of data for which guaranteed delivery is not required. While UDP uses ports, they are different from TCP ports; therefore, they can use the same numbers without interference. HEADER: Some key headers of UDP are as follows: SOURCE PORT: This field identifies the sending port. DESITNATION PORT: This field indentifies the receiving port LENGTH: A 16-bit field that specifies the length in bytes of the entire datagram CHECKSUM: The 16-bitchecksumfield is used for error-checking of the headeranddata. NETWORK ADDRESSING: There are millions of computers in use on the web and billions of messages traversing networks at any given time, so prper addresing is essential to make sure that the sent messages arrives intact at the proper destination. Addressing of data happens in three different layers of the OSI model. The PDU at each layer adds address information for use by the peer layer at the destination. CHAPTER 2: ROUTING Fundamentals ROUTING: Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data networks such as the Internet, and transportation networks. Our main concern will be routing in packet switched networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes; typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers with multiple network cards can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the routers memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths. TYPES OF ROUTING: STATIC ROUTING: Static routing is manually adding routes to the routing table, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes make sense and can even improve the performance of a network. Some of these include stub networks and default routes. DYNAMIC ROUTING: Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. Dynamic routing uses routing protocols for routing information automatically over the internertwork. STATIC VS DYNAMIC ROUTING: Before going further we need to examine the difference between static and dynamic routing. ROUTING PROTOCOLS: Before going in to the details of dynamic routing we must understand what are routing protocols. Routing protocols implement algorithms that tell routers the best paths through internetworks. Routing protocols provide the layer 3 network state update. In short, routing protocols route datagrams through a network. Routing is a layer 3 function, thus, routing and routed protocols are network-layer entities. Routing tables on the layer 3 router are populated by information from routing protocols. A routed protocol will enter an interface on a router, be placed in a memory buffer, then it will be forwarded out to an interface based on information in the routing table TYPES OF DYNAMIC ROUTING PROTOCOLS: Dynamic routing protocols can be divided in to the following broad catagories. CLASSFUL AND CLASSLESS ROUTING PROTOCOLS: CLASSFUL ROUTING PROTOCOLS: Classful routing protocols do not send subnet mask information in routing updates. This was at the time when network address were allocated on the basis of classes i.e A, B or C. These routing prtocols did not include subnet mask in routing update because the the network mask was determined by first octet of the network address. Classfull routing protocols can still be used in todays networks but they cannot be used in all situations because they do not include the subnet mask. Classfull routing protocols cannot be used where the network is subnetted using more then one subnet mask, in other words we can say that classfull routing protocols do not support variable-lenght subnet mask (VLSM). In the following figure the classfull version of the network support similar subnet masks i.e all /24. CLASSLESS ROUTING PROTOCOLS:
Friday, January 17, 2020
Principles of Marketing Chapter 1
Marketing -Is the process of building profitable customer relationships by creating value for customers and capturing value in return -Satisfying customer needs 2 GOALS OF MARKETING â⬠¢To attract new customers by promising superior value â⬠¢To keep and grow current customers by delivering satisfaction MARKETING PROCESS 1. Understanding the Marketplace and Customer Needs 1. 1. Needs, Wants, and Demands 1. 1. 1. NEEDS ââ¬â states of felt deprivation. 1. 1. 2. WANTS ââ¬â the form human needs take as shaped by culture and individual personality. 1. 1. 3. DEMANDS ââ¬â human wants that are backed by buying power. 1. 2.Marketing Offerings (Products, services, and experiences) ââ¬â some combination of products, services, information, or experiences offered to a market to satisfy a need or want. â⬠¢Marketing Myopia ââ¬â the mistake of paying more attention to the specific products a company offers than to the benefits and experiences produced by these products. 1. 3. Customer Value Satisfaction ââ¬â are key building blocks for developing and managing customer relationships. 1. 4. Exchanges and Relationships ââ¬â the act of obtaining a desired object from someone by offering in return. 1. 5. Markets ââ¬â set of all actual and potential buyers of a product or service. . Designing a Customer-Driven Marketing Strategy â⬠¢ Marketing Management ââ¬â the art and science of choosing target markets and building profitable relationships with them. 2. 1. What customers will we serve? (Whatââ¬â¢s our target market? ) 2. 1. 1. MARKET SEGMENTATION ââ¬â dividing the market into segments of customers 2. 1. 2. TARGET MARKETING ââ¬â selecting which segments it will go after. 2. 2. How can we serve these customerââ¬â¢s best? (Whatââ¬â¢s our value proposition? ) ââ¬â is the companyââ¬â¢s set of benefits or values it promises to deliver to consumers to satisfy their needs. 2. 2. 1. MARKETING MANAGEMENT ORIENTATIONS 2. 2. 1. . THE PRODUCTION CONCEPT ââ¬â the idea that consumers will favour products that are available and highly affordable and that the organization should therefore focus on improving production and distribution efficiency. 2. 2. 1. 2. THE PRODUCT CONCEPT ââ¬â the idea that consumers will favour products that offer the most quality, performance, and features and that the organization should therefore devote its energy to making continuous product improvements. 2. 2. 1. 3. THE SELLING CONCEPT ââ¬â the idea that consumers will not buy enough of the firmââ¬â¢s product unless it undertakes a large-scale selling and promotion effort. . 2. 1. 4. THE MARKETING CONCEPT ââ¬â the marketing management philosophy that achieving organizational goals depends on knowing the needs and wants of target markets and delivering the desired satisfactions better than competitors do. 2. 2. 1. 5. THE SOCIETAL MARKETING CONCEPT ââ¬â a principle of enlightened marketing that holds th at a company should make good marketing decisions by considering the consumersââ¬â¢ wants, the companyââ¬â¢s requirements, consumersââ¬â¢ long-run interests, and the societyââ¬â¢s long-run interests. 3.Preparing an Integrated Marketing Plan and Program ââ¬â consists of the firmââ¬â¢s marketing mix, the set of marketing tools the firm uses to implement its marketing strategy. â⬠¢Marketing Mix (4Ps) a)Product b)Price c)Place d)Promotion 4. Building Customer Relationships ââ¬â most important step in marketing process 4. 1. Customer Relationship Management ââ¬â the overall process of building and maintaining customer relationships by delivering superior customer value and satisfaction 4. 2. Relationships Building Blocks: Customer Value and Satisfaction 4. 2. 1.CUSTOMER PERCEIVED VALUE ââ¬â the customerââ¬â¢s evaluation of the difference between all the benefits and all the costs of a market offering relative to those of competing offers. 4. 2. 2. CU STOMER SATISFACTION ââ¬â the extent to which a productââ¬â¢s perceived performance matches a buyerââ¬â¢s expectations. 4. 3. Customer Relationship Levels and Tools 4. 3. 1. FREQUENCY MARKETING PROGRAMS ââ¬â reward customers who buy frequently or in large amounts. 4. 3. 2. CLUB MARKETING PROGRAMS ââ¬â offers members special benefits and create member communities. 4. 4. The Changing Nature of Customer Relationships 4. 4. 1. RELATING WITH MORE CAREFULLY SELECTED CUSTOMERS True Mass Marketing ââ¬â selling in a standard way to any customer who cares along. â⬠¢Selective Relationship Management ââ¬â targeting fewer, more profitable customers 4. 4. 2. RELATING FOR THE LONG TERM ââ¬â serving chosen customers in a deeper, more lasting way to retain current customers and build long term relationships with them. 4. 4. 3. RELATING DIRECTLY ââ¬â serving customers without going to a store ââ¬â by telephone, mail order, catalogues, kiosks, and online. 4. 5. Partner Relationship Management ââ¬â working close in other company or departments and outside the company to jointly bring greater value to customers. . 5. 1. PARTNERS INSIDE THE COMPANY ââ¬â linking all departments of a firm in the cause of creating customer value. 4. 5. 2. MARKETING PARTNERS OUTSIDDE THE FIRM â⬠¢Supply Chain ââ¬â describes a longer channel, stretching from raw materials to components to final products that are carried to final buyers. â⬠¢Strategic Alliances ââ¬â strategic partners if they hope to be effective 5. Capturing Value from Customers 5. 1. Creating Customer Loyalty and Retention ââ¬â the value of the entire stream purchases that a customer would make over a lifetime of patronage. 5. 2.Growing Share Customer ââ¬â the portion of the customerââ¬â¢s purchasing that a company gets in its product categories. 5. 3. Building Customer Equity ââ¬â the total combined customer lifetime values of all the companyââ¬â¢s custom ers. 5. 4. Building the Right Relationships with the Right Customers CLASSIFICATIONS OF CUSTOMERS â⬠¢Strangers ââ¬â Little fit between companyââ¬â¢s offerings and customerââ¬â¢s needs; lowest profit potential â⬠¢Butterflies ââ¬â Good fit between companyââ¬â¢s offerings and customerââ¬â¢s needs; high profit potential â⬠¢True Friends ââ¬â Good fit between companyââ¬â¢s offerings and customerââ¬â¢s needs; highest profit potential. Barnacles ââ¬â Limited fit between companyââ¬â¢s offerings and customerââ¬â¢s needs; low profit potential THE NEW MARKETING LANDSCAPE 1. New Digital Age ââ¬â marketers must harness marketing technology 2. Rapid Globalization ââ¬â take advantage of global opportunities 3. The Call for more Ethics and Social Responsibility ââ¬â marketers must ensure that they set in an ethical and socially responsible way. THE GROWTH FOR NOT-FOR-PROFIT MARKETING (Examples) â⬠¢Colleges â⬠¢Hospitals â⬠¢Mu seums â⬠¢Zoos â⬠¢Symphony Orchestra â⬠¢Churches
Thursday, January 9, 2020
Roosevelt, Immigration, and Americanism Essay example
As one of the presidents during the Progressive Era, Theodore Roosevelt led the United States of America through a series of dramatic changes that interrupted the lives and ideologies that Americans during the time were more than familiarized with. Industrialization, womenââ¬â¢s suffrage, the sexual revolution, imperialism, and ââ¬Å"muckrakingâ⬠journalism were just a few of the controversial, yet significant characteristics of this era. However, perhaps one of the largest and most vital influences during this time period came from the outside. Immigration was an issue that Roosevelt himself addressed rather perceptibly in his paper entitled ââ¬Å"True Americanism,â⬠which first appeared in a magazine called The Forum in April, 1894. However, it is notâ⬠¦show more contentâ⬠¦The immigrants were not the only ones undergoing difficulty, however. The United States also experienced difficulty taking in the immigrants. Since almost all immigrants were in dire need o f jobs, they tended to settle in urban areas where jobs could be easily located. Often times, immigrants would settle in areas dominated by other immigrants who speak the same language or were from the same country. Consequently, the cities became more congested than ever, and city services were not always successful in keeping up with the surge of newcomers. Although most immigrants were able to find and pursue jobs, many of them were jobs that native-born Americans refused to practice. Regardless of their jobs, living conditions, and/or nationalities, immigrants grew to play a huge part in many areas of American society. According to Roosevelt, Americanism is a characteristic of those Americans who perform their allotted tasks by facing them steadily and bravely, seeing but not fearing the dangers (6). It is a sense of brotherhood. As Roosevelt states in his paper: ââ¬Å"Above all, we must stand shoulder to shoulder, not asking as to the ancestry or creed of our comrades [immigrants], but only demanding that they be in very truth Americans, and that we all work together, heart, hand, and head, for the honor and the greatness of our common country (6).â⬠Roosevelt categorizesShow MoreRelatedRoosevelt, Immigration, and ââ¬Å"Tru Americanismâ⬠1706 Words à |à 7 PagesTheodore Roosevelt led the United States of America through a series of dramatic changes that interrupted the lives and ideologies that Americans during the time were more than familiarized with. Industrialization, womenââ¬â¢s suffrage, the sexual revolution, imperialism, and ââ¬Å"muckrakingâ⬠journalism were just a few of the controversial, yet significant characteristics of this era. However, perhaps one of the largest and most vital influences during this time period came from the outside. Immigration was anRead MoreThe New Colossus By Jane Addams Essay1364 Words à |à 6 PagesImmigration to America is often a decision based solely on the idea that America has some sort of redeeming qualities for a chance at a better life. Americaââ¬â¢s founding ideals of ââ¬Å"life, liberty, and the pursuit of happinessâ⬠are what compel foreigners to escap e the troubles and oppression of their homeland and cross over onto American soil. The tales of America being the ââ¬Å"land of opportunityâ⬠have continued to lure and attract people to immigrate. The Industrial Revolution of the nineteenth centuryRead MoreGerstle s Historiographical Of Mainstream Americanism1327 Words à |à 6 Pages2016 Gerstleââ¬â¢s Historiographical of Mainstream Americanism Gary Gerstle attempts to reinterpret twentieth-century American history in light of the power of race (and to a much lesser extent, or even not at all, class and gender). The American Crucible conceptualizes American liberals as well as whiteness scholarsââ¬â¢ synthetic historiographical interpretations on mainstream Americanism like Theodore Roosevelt and Franklin Roosevelt- Theodore Roosevelt especially, due the authorââ¬â¢s attention to the meaningRead MoreThe Issue Of Immigration Has Been On The Forefront Major Debates1684 Words à |à 7 PagesThroughout Americaââ¬â¢s history, the issue of immigration has been on the forefront major debates. Immigration is among one of the most stimulating topics of discussion. Often when discussing immigration the question of assimilation also arises and whether or not immigrants are truly doing so. Since the beginning of this country, immigrants and even natives of the land have been pressured to assimilate to ââ¬Å"Americanâ⬠Culture and to commit to its standards. When a group of people fail to assimilate toRead MoreThe Rights Of A Citizen1247 Words à |à 5 Pagessupport our constitution and defend it. Along with defending our country, if it was needed, We have to respect the laws and other citizens. Franklin D. Roosevelt spoke during his presidency in 1943 saying, ââ¬Å"The principle on which this country was founded and by which it has always been governed is that Americanism is a matter of the mind and heart; Americanism is not, and never was, a matter of race and ancestry. A good American is one who is loyal to this country and to our creed of liberty and democracyRead MoreWorld War I And The Great War1488 Words à |à 6 Pagesinvolvement in the war as a beneficial event. The most significant change that came as a result of American involvement in World War I was social change. When World War I began in 1915, it coincided with a rise of radicalism and a new wave of immigration. Both of these events fostered their own form of social change that grew and matured as the war went on and America entered. The radicalists of the IWW and the members of the socialist party assertively opposed American involvement in the war. ManyRead MoreThe Popularization Of Technology : The Development Of Urbanization And Urbanization1063 Words à |à 5 Pagesmassive inclination of immigration. In 1880 to 1910, there was a 280% influx of the amount of miners, 100% for textile workers, and 230% increase of railway workers (Lebergott, 1966). Stanley Lebergott, an economist from Wesleyan University, demonstrated that there was a 42.3% inflation of non farming labor force jobs in retrospect to farming jobs from 1800-1910. (Lebergott, 1966). The rise of technology brought the ri se of potential careers which allowed for the rise of immigration. These series of coherentRead MoreHow Did The Cold War Affect Asian American Experiences?1030 Words à |à 5 PagesAsian Americans against racism would invite condemnation of the white Americans. Nevertheless, famed Americans of Asian origin voiced against racism. Until the year 1950, the Japanese were kept beyond the purview of new immigration reforms. Early 1950s saw the Japanese given immigration rights to join hands with Americans to fight communism, which had earlier invaded China by the late 1940s. In 1945, America allowed its citizens who fought the war in different parts of Asia to bring their wives fromRead MoreCauses Of The Irish Famine1370 Words à |à 6 Pagesafter a few years with newly acquired wealth was one of the main reasons they came to the United States. America served as a symbol of something higher monetary prosperity. It represented the hope of freedom. The most important reason for Chinese im migration was economic hardship due to the growing British dominance over China after Britain defeated China in the Opium War. As they struggled to find work, Chinese immigrants were fighting for their lives. During their first few decades in the United StatesRead MoreThe Global War to the Great Depression627 Words à |à 2 Pages desired no part in this scramble for order, turning its back to the international world. Through the Great War to the Great Depression, the transforming world not only caused America to withdraw from the world, but also allowed Franklin Delano Roosevelt an opportunity to refine all aspects of American standards and life. Despite only a brief participation in the Great War, a diplomatically satiated America swiftly closed its doors to the international world. However, this was not without good reason;
Subscribe to:
Posts (Atom)