Sunday, January 26, 2020

Benefits Of Ict In Smes Information Technology Essay

Benefits Of Ict In Smes Information Technology Essay Introduction Research indicates that Information and Communication Technology (ICT) offers promising opportunities for organizations to meet the challenges of an ever-changing environment (Kapurubandara and Lawson, 2006). ICTs are recognized as key tools in management processes, having a remarkable potential to contribute to sustained competitive advantage for businesses (Ion and Andreea, 2008). In Small and Medium Sized Enterprises (SMEs), ICT can be used as a business tool to reduce costs, create stronger links with customers, innovate and facilitate market niche (Kutlu and Ozturan, 2009). Although there are difficulties associated with the use ICT in SMEs, however this study highlights the benefits associated with the use of ICT a Nigerian SMEs and identifies some problems facing the Nigerian SME sector. Significance of SMEs The importance of Small and Medium Sized Enterprises (SMEs) cannot be overlooked in the economic development of any country since SMEs play a critical role in every countrys economic development and Nigeria is no exception. SMEs have been fully recognized both in developed and developing countries as the main engine of economic growth and a major factor in promoting private sector development and partnership (Okongwu, 2001). SMEs are often seen as vital for the growth and innovation of dynamic economies as they create employment (Mutula and Brakel, 2006). They are flexible and can adapt quickly to changing market demands as supply situations help diversify economic activity that has significant contribution to imports and exports (Ongori, 2009). Thus, SMEs contribute more and more to the national and international economies of the world. According to Wattanapruttipaisan (2003), the significance of SMEs for growth, productivity and competitiveness of the economies in both developed and developing countries is universally recognized since SMEs contribute to improved living standards, bring about substantial local capital formation and achieve high level of productivity and capability. They are recognized as the principal means of achieving equitable and sustainable industrial diversification and dispersal. The contributions of SMEs to the Nigerian economy are not contestable as about 10% of the total manufacturing output and 70% of the industrial employment are by SMEs. SMEs also promote industrial and economic development through the utilization of local resources, production of intermediate goods and the transformation of rural technology (Aina, 2007). Nigerian SMEs do not only provide employment and income for majority of its citizens but also, SMEs are acknowledged as the breeding ground for domestic entrepreneurial capabilities, technical skills, technological innovativeness and managerial competencies for the private sector development (SMEDAN, 2005, Aina, 2007). The benefits of SMEs to any economy are easily noticeable as SMEs are known to contribute to the development of several economies in terms of output of goods and services, creation of jobs at relatively low capital cost, especially in the fast growing service sector and they provide a vehicle for the reduction of income disparities thus developing a pool of skilled or semi-skilled workers as a basis for the future industrial expansion (Aina, 2007). SMEs also improve forward and backward linkages between economically, socially and geographically diverse sectors of many economies and provide opportunities for development (SMEDAN, 2005). Therefore, the development of SMEs is an essential element in the growth strategy of most economies and holds particular significance for Nigeria. SMEs have been defined by SMEDAN as: Size Category Employment Assets (N million) excluding land and building 1 Micro Enterprises Less than 10 Less than 5 2 Small enterprises 10-49 5- less than 50 3 Medium enterprises 50-199 50- less than 500 (SMEDAN, 2005) In Nigeria, SMEs cover the entire range of economic activity within all sectors and share a number of common problems. These problems as identified by the Small and Medium Enterprises Development Agency of Nigeria (SMEDAN) and other similar studies include low market access to credit, poor information flow, discriminatory legislation, poor access to land, weak linkages among different sectors, weak operating capabilities in terms of skills, lack of knowledge and attitudes, lack of infrastructural facilities among others. Information and Communication Technology (ICT) Information and Communication Technology (ICT) refers to a wide range of computerized technologies. ICT is any technology that enables communication and the electronic capturing, processing and transmission of information. These technologies include products and services such as desktop computers, laptops, handheld devices, wired or wireless intranet, business productivity software such as text editor and spreadsheet, enterprise software, data storage and security, network security and so on (Ashrafi and Murtaza, 2008). In Nigeria, commonly used ICTs include Personal Digital Assistants (PDAs), Automated Teller Machines (ATMs), mobile phones, and smart cards. The Role of ICT in SMEs In the present knowledge-based economy, it is important for SMEs to adopt processes that would enable them provide services that would bring about competitive advantage. ICT has a significant positive impact on organizational performance (Maldeni and Jayasena, 2009). ICT is crucial to SMEs as it is a major catalyst and enabler of organizational change (Hazbo et al, 2008). Modern businesses are not possible without the use of ICT which is having a significant impact on the operations of SMEs and it is claimed to be essential for the survival and growth of economies in general (Berisha-Namanil, 2009). ICTs provide opportunities for business transformations (Chibelushi, 2008). It also provides SMEs the opportunity to conduct business anywhere (Jennex et al, 2004). It is commonly accepted that ICT provides many potential benefits to organizations so as to make them more efficient, effective and competitive (Fink and Disterer, 2006). ICT increases richness and reach (Evans and Wurster, 19 97). This refers to the way companies communicate, collaborate, conduct transactions internally with their customers, suppliers and distributors via the internet and the ability for local SMEs to participate in the digital economy (Golding, et al, 2008). According to Erumban and de Jong (2006), ICT has created a revolution by making the world seemingly smaller and improving potential economic growth. Pavic et al (2007) argue that SMEs have the opportunity to achieve a competitive advantage from the advances in ICT through innovation, marketing, efficiency gains, better quality and customer responsiveness. Also, Levy et al (2002) found some evidence which shows that SMEs act proactively in relation to the use of ICT. The European Commission (2008) state that SMEs could use ICT in order to grow and to become more innovative. The use of ICT in SMEs should be encouraged as it can help to improve technical and managerial skills, making available e-business solutions for SMEs and addressing the high cost of ownership of ICT equipment. Also, Love et al (2004) ascertains that the use of ICT provides many benefits to SMEs at different levels (operational level, tactical level and strategic level). In addition, Ongori (2009) states that the use of ICT would help change the way businesses operate in this era of globalization by changing business structures and increasing competition, creating competitive advantage for businesses and by changing business operations. Therefore, SMEs must have an ability to compete and dynamically respond to rapidly changing markets as it plays a significant role in an organizations growth and success. According to Kapurubandara and Lawson (2006), for survival in a competitive global economy and staying abreast, it is apparent that SMEs embrace ICT as it is becoming imperative for SMEs to gain competitive advantage and for stability in international markets. This implies that there are several benefits associated with the use of ICT. Benefits of ICT in SMEs The benefit of ICT cuts across all sectors of the economy and all the fields of human activities (Udo and Edoho, 2000). ICT can improve the standard of living and enhance business operations as well as organizational efficiency (Udo and Edoho, 2000). Appropriate use of ICT can assist SMEs to gain competitive advantage by reducing costs and improving core business processes. According to Brynjolfsson and Hitt (2000), the use of ICT can help to cut down the costs of coordination, communication, information processing and also enable efficient service provision at lower cost. ICT is a strategic tool that enables users to be efficient and effective (Sewanyana, 2009). The diffusion of ICT in many countries by different sectors of the economy have been found to have direct positive impact on the organizations efficiency and have led to more rapid acceleration of development in these countries (Achimugu et al, 2009). In Nigeria, preliminary investigations show that only few SMEs presently u se ICT. However, there has not been a formal study to ascertain the impact of ICT in these organizations. According to Fullanteli and Allegra (2003), ICT offer enterprises a wide range of possibilities for improving their competitiveness. They provide mechanisms for getting access to new market opportunities and specialized information services such as distance consulting, continuous training, new advisory modes, and so on. Organizations can exchange real-time information and build closer relationships with their customers, suppliers and business partners; customer can receive immediate feedback that allows companies to react fast to changing customer demands and recognising new market niches. This means that organizations that are able to exploit the potentials offered by ICT can handle innovative processes such as Supply Chain Management (SCM), Customer Relationship Management (CRM) and Knowledge Management (KM) more effectively (Fullanteli and Allegra, 2003). Since, ICT has been described as critical to the competitiveness and growth of SMEs (Apulu and Latham, 2009), it is important for it to be applied in the relevant manner in order to reap the far-reaching payoffs of ICT. Shiels et al (2003) state that technology would not lead to business growth except it is aligned with a business strategy. This means that having the right technology in the right place and at the right time would assist to improve business performance and also aid competitiveness and sustainability (Swift, 2009). Once ICT is integrated into a business process, it becomes a useful tool in many stages of the value chain (Swift, 2009). The use of ICT in SMEs helps to improve communication ability to exchange data, teamwork, customer relations services, market share and so on. It allows companies to obtain, process, accumulate and exchange information (Ion and Andreea, 2008). Another benefit of using ICT in SMEs is the fact that high efficiency is obtained in business transactions due to a fast and accurate processing of information (Ion and Andreea, 2008). Lal (2005) further states that web-enabled services increase the competitiveness of SMEs because they change the relationship with customers by creating a stronger link between firms and clients. The use of ICT in SMEs facilitates cooperation within the company, between the company and other firms. Similarly, Swift (2009) states that SMEs benefit from the use of ICT as it increases productivity, efficiency of internal business and operation and connects SMEs more easily and cheaply to external contact. Other benefits include increasing business competitiveness; vertical integration with other related initiatives, meeting stakeholders of various institutions; networking with other parties; creating of an enabling environment and the development of an internal competence in capturing market opportunities (Swift, 2009). Hence, the investment in ICT will result in increasing SMEs rates of sales and share of market, improve their Return on Investments (ROI), reduce cost and assist them to develop new products and/or markets. Chowdhury and Wolf (2003) argue that SMEs use ICTs both as input in the production process and in the transaction process selling their products or acquiring inputs. ICT enhances enterprise performance through indirect cost savings such as labour costs, increased labour productivity and direct cost reduction of firms input (Chowdhury and Wolf, 2003; Love et al, 2006). On top of these short-run impacts of ICT in the production process, the use of ICTs in the transaction process can foster input and output market expansion. However, in the long run ICT may have a bigger impact as it can completely restructure the production process and transaction methods and also increase flexibility and improve outputs (Chowdhury and Wolf, 2003). In order words, it can be concluded that ICTs can influence the performance of an enterprise in multifaceted ways. In addition, ICT has been widely perceived as major tools for kick-starting ailing economies and consequently in assisting developing societies to catch up with the developed world. ICT can assist groups that have lost out of the mainstream of development (Obijiofor et al, 2005). ICTs have valuable potentials for developing SMEs through more effective use and better integration in their business processes. This will bring about a change among SMEs and make them more competitive, innovative and also generate growth (Obijiofor et al, 2005). Nevertheless, several factors hinder SMEs from fully realizing these benefits. According to Liedholm (2002); Ducombe and Molla, (2009), SMEs especially in Africa suffer from many constraints related to an unfriendly policy and regulatory environment, lack of finance, lack of skills, access to markets and market information, lack of infrastructure among others and Nigerian SMEs is no exception. Problems of SMEs in Nigeria Several problems are militating against the development of SMEs in Nigeria. As a developing economy, one of the most worrying among these constraints is the issue of funding (Aina, 2007). This is because most banks are afraid of funding SMEs for the reason that they want to minimize their risk profile. Also, the Nigerian economic situation is not very attractive to investors (Aina, 2007). This forms a major constraint to SMEs growth in the country. In Nigeria, there is the problem of inadequate and inefficient infrastructural facilities, which tend to escalate costs of operation as SMEs are forced to resort to private provisioning of utilities such as water supply, electricity, and so on (Udechukwu, 2003). Other problems include lack of adequate credit for SMEs traceable to the reluctance of banks to extend credit as well as inadequate collateral by SME operators, weak demand for products arising from low and declining consumer purchasing power and lack of patronage of locally produced goods by those in authority (Onugu, 2005). All these problems hinder the effective use of ICT in Nigerian SMEs. Electricity constraint is a major factor that affects the use of ICT in Nigerian SMEs. In many rural areas, there are no electricity supplies; while in the towns and cities where there is electricity, its presence is limited. Electricity generation and distribution therefore negatively affect the diffusion levels of ICT in the country (Akpan-Obong, 2007). Nigerian population lacks access to electricity. Therefore unless power supply is stabilized, as well as expanded to the rural areas, electricity is likely to remain a key factor hindering the development of SMEs in Nigeria. There is also the problem of multiplicity of regulatory agencies and taxes which has always resulted in high cost of doing business, poor management practices and low entrepreneurial skill arising from inadequate educational and technical background of many SME owners (Udechukwu, 2003). Similarly, developmental policies weigh in favour of large firms and sometimes foreign owned firms leaving SMEs in a distressed and vulnerable position. Corruption, lack of transparency, very high bureaucratic costs and lack of government interest in supporting the roles of SMEs in national economic development and competitiveness. The most worrying of all among these challenges is funding. Most SMEs enterprises are not attractive prospects for banks as they want to minimize their risk profile. Also, In Nigeria, provision of public infrastructure is grossly inadequate and poor (Posu, 2006). Necessary telecommunication services, as public infrastructure, needed for meaningful investment are very expensive and inadequate. Research Method Case studies are the most common qualitative method used in information systems research (Cassell and Symon, 2004; Burns, 2000; Yin, 1993; Orlikowski and Baroudi, 1991). Sauer (1993) is of the opinion that research in information systems is best done by case study. A case study research is useful when a phenomenon and context are not clearly evident (Yin, 2003). It also allows us to study a phenomenon within its natural context (Yin, 2009). Therefore given the exploratory nature of this study, the qualitative case study approach is adopted. According to Yin (1994), case study methodology offers a means of testing existing theories while providing a probable analytic generalization. This study is based on primary research from interviews and secondary research including internal documents and academic sources. The case study was selected based on the size of the company, in accordance with the definition of SMEs in Nigeria and also based upon the post-ICT experience in the company. Semi-structured interviews were used to gather details of the SME. Questions related to the business aspects of the company, drivers for ICT adoption, barriers to ICT adoption, use of ICT, ICT infrastructure, competition and benefits of ICT were asked at some point in the interview. In terms of the analysis of the interviews, notes were compiled during each interview which gave an accurate reflection of the information gathered. In addition, some company documents were reviewed. Furthermore, extensive amount of secondary data was collected and reviewed from various sources which included books and academic journals. A general introduction to the organization involved is provided below , followed by a discussion on the benefits of ICT within the organization. The company in this paper has been given pseudonyms and some details of the company have been shrouded to maintain company confidentiality. Case Study MACO is a small manufacturing company located in Port-Harcourt, Nigeria and was established in 2003. Presently, the company has fourty employees all of which are full time workers. The companys goal is to satisfy its present and future customers by developing level of services superior to those of its competitors. MACOs vision is to satisfy customer needs by providing promt and efficient services and to create a secured and viable engineering solution to its customers. In 2005, the company decided to implement an ICT system called ERP (Enterprise Resource Planning) due to the competitive nature of the market and the need to stand out from the crowd. Another reason behind the companys decision to use the new system was as a result of the challenges MACO was facing with its customers in terms of tendering and purchase processes and in the production capacity planning. The ERP system helps in the companys production capacity planning and control, so that the scheduling and resource allo cation for different projects can be planned ahead before the project begins. The ERP system has given MECO a huge opportunity. The company can now easily target new customers, survive and grow in this competitive climate and also build long term relationships with its customers. Discussion SMEs have been recognized for playing very important roles towards the economic growth, development and stability of several economies. SMEs play a vital role in employment generation and immensely contribute to the Gross Domestic Products (GDPs) of several countries (OECD, 2000). With reference to the case study presented above, it can be said that there are several benefits associated with the use of ICT. ICT offers SMEs a competitive edge over its competitors (for example increase in production capacity planning and control) hence, it is vital for Nigerian SMEs to use ICT. It should be regarded as a critical tool for SMEs competitiveness. Based on the literature review, some major factors that affect Nigerian SMEs are lack of infrastructural facilities and lack of electricity. Furthermore, lack of resources is another major factor. Hence, the Nigerian government should set up different agencies to look into the various problems associated with SMEs in Nigeria. The government can provide an enabling environment in which ICT can realize its full potential. They can help to address the problems and challenges of awareness and infrastructure under- development (Payne, 2001). Nowadays several organizations have moved from manual paper-based to ICTs for internal processing of information, and from telephony to ICTs for external communication. Thus access to ICT has provided people with a foundation for building up and applying knowledge globally and particularly in developing nations (Ani et al, 2007). Through the use of ICT, modern society has been described as an information age and the knowledge economy. In the present knowledge based economy, the use of ICT can to bring the same competitive advantage to small and medium sized enterprises as brought to large enterprises. ICTs are also making it possible for developing countries to participate in the world economy in ways that simply were not possible in the past. Hence, information and communication technologies should be regarded as a strategic tool in SMEs. The use of ICTs in SMEs should therefore, be considered as part of the wider informal to formal transition process for information systems. There is need for SMEs to undertake continuous improvement of their existing processes, products and services. They need to introduce products and services with extended capabilities to create more value for their customers (Hanif and Sajjad, 2009). On one hand, ICT provides all enterprises with a lot of opportunities for their business activities. On the other hand, SMEs have always been considered to be the major economic players and strong sources of economic growth. Therefore, it is apparent that the use of ICT in SMEs is critical in every economy including Nigeria. As a result of Nigerian SMEs not being fully ICT-enabled they are unable to keep up with the pace of globalization. Thus they are deprived of ways by which ICTs can improve it their business processes. ICTs have the potential to improve SMEs business processes as it brings about better insights. Hence, the government needs to address these issues to encourage ICT enabled SMEs. Nigeria can as well leapfrog from its present status of  under development to a fully developed global giant, as it cannot afford to stand alone (Elebeke, 2009). Todays business world has been deeply influenced by ICT and its application among business is widespread. ICT are rapidly changing global production, work and business methods and trade and consumption patterns in and between enterprises and consumers (Alam and Noor, 2009). Also, SMEs are often seen as a vital source of growth and innovation in a dynamic economy and consequently small businesses help to diversify the economy and at the same time create employment (Machacha, 2002, Banda et al, 2004). Therefore, the ability for SMEs to survive in an increasingly competitive global environment is largely dependent upon their capacity to leverage technologies. Conclusion and Recommendations The use of ICT can provide a platform for future growth of SMEs however; the use of ICT in Nigerian SMEs is relatively low due to many factors militating against their growth. For Nigerian SMEs to effectively use ICT, technological infrastrucures should be put in place by the government to support ICT use. Based on the literature review and case study, it is certain that there are several benefits associated with the use of ICT. Hence, effective use of ICT in Nigeria SMEs would bring about enormous opportunities for these SMEs. Therefore, for an SME to set itself apart from its competitors and also have a sustainable competitive advantage there is a need to invest in ICT. There is also a need for the government to intensify the efforts of promoting the use of ICT in Nigerian SMEs since ICT is known to improve managerial practices in SMEs and also assist SMEs to grow and become more innovative. Finally, the Nigerian government must invest largely in the SME sector by making more funds available to SMEs and putting structures in place to ensure a successful investment. The integration of ICT in Nigerian SMEs would help integrate these SMEs into the world IT village.

Saturday, January 18, 2020

Internet and Intranet Connectivity Through Wireless Local Area Network (Wlan)

CHAPTER 1 Introduction Chapter 1 Introduction 1. 1 What is WLAN? 1. 1. 1 WLAN Wireless Local Area Network (WLAN) is a kind of local area network which established using a wireless link between the service providers and the clients using some wireless equipment. This network development is based on the IEEE 802. 11 standard. 1. 1. 2 IEEE 802. 11 IEEE 802. 11 denotes a set of Wireless LAN/WLAN standards developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The term 802. 11x is also used to denote this set of standards and is not to be mistaken for any one of its elements. There is no single 802. 1x standard. The term IEEE 802. 11 is also used to refer to the original 802. 11, which is now sometimes called â€Å"802. 11 legacy† [1]. The 802. 11 family currently includes six over-the-air modulation techniques that all use the same protocol. The most popular techniques are those defined by the b, a, and g amendments to the original standard; security was originally included and was later enhanced via the 802. 11i amendment. 802. 11n is another modulation technique that has recently been developed; the standard is still under development, although products designed based on draft versions of the standard are being sold. Other standards in the family (c–f, h, and j) are service enhancements and extensions or corrections to previous specifications. 802. 11b was the first widely accepted wireless networking standard, followed by 802. 11a and 802. 11g [1]. 802. 11b and 802. 11g standards use the 2. 40 GHz (gigahertz) band, operating (in the United States) under Part 15 of the FCC Rules and Regulations. Because of this choice of frequency band, 802. 11b and 802. 11g equipment can incur interference from microwave ovens, cordless telephones, Bluetooth devices, and other appliances using this same band. The 802. 1a standard uses the 5 GHz band, and is therefore not affected by products operating on the 2. 4 GHz band. Table 1. 1: Protocol Summary of IEEE 802. 11 Protocol Legacy 802. 11a 802. 11b 802. 11g 802. 11n Release Date 1997 1999 1999 2003 2006 Operating Frequency GHz 2. 4-2. 5 5 2. 4-2. 5 2. 4-2. 5 2. 4 and/or 5 Throughput (Typ) Mbps 0. 7 23 4 19 74 Data Rate (Max) Mbps 2 54 11 54 248 = 2Ãâ€" 2 ant Range (Indoor) meters ~25 ~30 ~35 ~35 ~70 Range (Outdoor) meters ~75 ~100 ~110 ~115 ~160 2 1. 2 Why it should be used? Bangladesh entered the Internet world in 1993 using offline E-mail services. Online Dial-up services started in 1996 through VSAT based data connectivity. But it is not possible to give a Dial-up connection to all because; it uses the BTTB’s telephone line. While Dial-up is active the phone line is busy and it is not possible to give a client more than 4/5 Kbps speed. Using an ADSL modem it can be increased to more than 2 Mbps. But it is not enough for a corporate user and also it is very costly and there are many other problems which has described below. The Ethernet connectivity can give a maximum of 100 Mbps. But its range is too small. Wireless LAN has vast benefits over wired network in some aspects. In our country especially in big cities like Dhaka, it is very hard job to establish a wired network all over the city. Because, it is over populated, buildings were made with out any proper plan and also the roads. Generally the wire lines are established over head, which is not so secured. Wire can be broken due to any kind of natural or man made problem. It may be theft. Or it can be misused by any one by taking a parallel line from it. It may create leak of data security. It is also very expensive to establish a copper wire network road by road and maintenance of it. Besides that there are many rivers, cannels in our county, and also hill tracks in some parts. It is not possible to give a wired network over those. For all those reasons it is not a wise decision to use a wired network in our country. A Wireless LAN can be more reliable, low cost, convenient network considering above aspects. There are a number of Internet Service Provider (ISP) companies in our country giving Wireless LAN support to the clients. Those are known as Wireless ISP. These ISPs give internet or intranet service to the clients as their requirements. Those networks are reliable and also secured. It is easy to establish a connection in the company’s coverage area using a wireless device at the client end. The Wireless ISP Company should have proper resources to give that coverage. A model of a Wireless ISP company’s wireless part for Bangladesh is given below. The nation wide link can be a optical fiber or microwave link. Here the main coverage is shown in Dhaka city and thus BSSs are shown at here is more than one. It can be expand the network in other areas by adding additional equipments required to establish a BSS. And also it can give coverage on other areas by establish same network on that area. Figure 1. 1: Model of a Wireless ISP 1. 3 Why one should be interested in WLAN field? The telecom industry is changing with breathtaking speed. There are a lot of telecommunication and Wireless ISP companies working in our country and there are a lot of companies to come. At present telecommunication is the most challenging and interesting field out of all other e ngineering fields. All the telecom company has some common structure. So, there are many similarities between a mobile or PSTN (Public Switched Telephone Network) operator and a Wireless ISP. The skills one gather from a Wireless ISP can use in the telecom companies. The man can be skilled on installing different devices, surveying a site, proposing a link budget. He can face the practical problems occur in installing radio networks and can be skilled in solving those problems and also troubleshoot the devices and the radio link. In the mobile operators, there are many restrictions. One can not work with all things. But as still Wireless ISP companies are smaller in our country one can get opportunity to work in different sections which will increase his experiences and skills. Lastly it can be say that, as it is a challenging field, the person likes facing challenges will enjoy working in this field 4 1. 4 Organization of this report This Internship report has seven chapters in total. The second chapter contains theory about the radio frequency properties and different modulation techniques In third chapter, different RF antennas and it accessories are described. Fourth chapter contains the Wireless LAN’s theory and architecture in brief. Chapter five analyzes to survey a site, and how to budget a link. The sixth chapter describes the device installation process for the APERTO and CANOPY devices. The seventh and final chapter is the concluding chapter where limitations of this works are reported and few suggestions of our work are provided along with the concluding remarks. 1. 5 Aims and objectives 5 RF Properties and Modulation Techniques CHAPTER 2 6 Chapter 2 RF Properties and Modulation Techniques 2. 1 Radio Frequency 2. 2. 1 Radio Frequency Radio frequencies are high frequency alternating current (AC) signals that are passed along a copper conductor and then radiated into the air via an antenna. An antenna converts/transforms a wired signal to a wireless signal and vice versa. When the high frequency AC signal is radiated into the air, it forms radio waves. These radio waves propagate (move) away from the source (the antenna) in a straight line in all directions at once. 2. 2. 2 RF Behaviors RF is sometimes referred to as â€Å"smoke and mirrors† because RF seems to act erratically and inconsistently under given circumstances. Things as small as a connector not being tight enough or a slight impedance mismatch on the line can cause erratic behavior and undesirable results. The following sections describe these types of behaviors and what can happen to radio waves as they are transmitted. Gain Gain, illustrated in Figure 2. 1, is the term used to describe an increase in an RF signal' amplitude [2]. Gain is usually an active process; meaning that an external s power source, such as an RF amplifier, is used to amplify the signal or a high-gain antenna is used to focus the beam width of a signal to increase its signal amplitude. Figure 2. 1: Power gain However, passive processes can also cause gain. For example, reflected RF signals combine with the main signal to increase the main signal' strength. Increasing the RF s signal' strength may have a positive or a negative result. Typically, more power is s better, but there are cases, such as when a transmitter is radiating power very close to legal power output limit, where added power would be a serious problem. 7 Loss Loss describes a decrease in signal strength (Figure 2. 2). Many things can cause RF signal loss, both while the signal is still in the cable as a high frequency AC electrical signal and when the signal is propagated as radio waves through the air by the antenna. Resistance of cables and connectors causes loss due to the converting of the AC signal to heat. Impedance mismatches in the cables and connectors can cause power to be reflected back toward the source, which can cause signal degradation. Objects directly in the propagated wave' transmission path can absorb, reflect, or s destroy RF signals. Loss can be intentionally injected into a circuit with an RF attenuator. RF attenuators are accurate resistors that convert high frequency AC to heat in order to reduce signal amplitude at that point in the circuit. [2] Figure 2. 2: Power loss Being able to measure and compensate for loss in an RF connection or circuit is important because radios have a receive sensitivity threshold. A sensitivity threshold defined as the point at which a radio can clearly distinguish a signal from background noise. Since a receiver’s sensitivity is finite, the transmitting station must transmit signal with enough amplitude to be recognizable at the receiver. If losses occur between the transmitter and receiver, the problem must be corrected either by removing the objects causing loss or by increasing the transmission power. Reflection Reflection, (as illustrated in Figure 2. 3) occurs when a propagating electromagnetic wave impinges upon an object that has very large dimensions when compared to the wavelength of the propagating wave [3]. Reflections occur from the surface of the earth, buildings, walls, and many other obstacles. If the surface is smooth, the reflected signal may remain intact, though there is some loss due to absorption and scattering of the signal. Figure 2. 3: Reflection 8 RF signal reflection can cause serious problems for wireless LANs. This reflecting main signal from many objects in the area of the transmission is referred to as multipath. Multipath can have severe adverse affects on a wireless LAN, such as degrading or canceling the main signal and causing oles or gaps in the RF coverage area. Surfaces such as lakes, metal roofs, metal blinds, metal doors, and others can cause severe reflection, and hence, multipath. Reflection of this magnitude is never desirable and typically requires special functionality (antenna diversity) within the wireless LAN hardware to compensate for it. Refraction Refraction describes the bending of a radio wave as it passes through a medium of different density. A s an RF wave passes into a denser medium (like a pool of cold air lying in a valley) the wave will be bent such that its direction changes. When passing through such a medium, some of the wave will be reflected away from the intended signal path, and some will be bent through the medium in another direction, as illustrated in Figure 2. 4. [3] Figure 2. 4: Refraction Refraction can become a problem for long distance RF links. As atmospheric conditions change, the RF waves may change direction, diverting the signal away from the intended Diffraction Diffraction occurs when the radio path between the transmitter and receiver is obstructed by a surface that has sharp irregularities or an otherwise rough surface [3]. At high frequencies, diffraction, like reflection, depends on the geometry of the obstructing object and the amplitude, phase, and polarization of the incident wave at the point of diffraction. Diffraction is commonly confused with and improperly used interchangeably with refraction. Care should be taken not to confuse these terms. Diffraction describes a wave bending around an obstacle (Figure 2. 5), whereas refraction describes a wave bending through a medium. Taking the rock in the pond example from above, now consider a small twig sticking up through the surface of the water near where the rock. As the ripples hit the stick, they would be blocked to a small degree, but to a larger degree, the ripples would bend around the twig. This illustration shows how diffraction acts with obstacles in its path, depending on the makeup of the obstacle. If Object was large or jagged enough, the wave might not bend, but rather might be blocked. 9 Figure 2. 5: Diffraction Diffraction is the slowing of the wave front at the point where the wave front strikes an obstacle, while the rest of the wave front maintains the same speed of propagation. Diffraction is the effect of waves turning, or bending, around the obstacle. As another example, consider a machine blowing a steady stream of smoke. The smoke would flow straight until an obstacle entered its path. Introducing a large wooden block into the smoke stream would cause the smoke to curl around the corners of the block causing a noticeable degradation in the smoke' velocity at that point and a significant s change in direction. Scattering Scattering occurs when the medium through which the wave travels consists of objects with dimensions that are small compared to the wavelength of the signal, and the number of obstacles per unit volume is large [3]. Scattered waves are produced by rough surfaces, small objects, or by other irregularities in the signal path, as can be seen in Figure 2. 6. Figure 2. 6: Scattering Some outdoor examples of objects that can cause scattering in a mobile communications system include foliage, street signs, and lampposts. Scattering can take place in two primary ways. First, scattering can occur when a wave strikes an uneven surface and is reflected in many directions simultaneously. Scattering of this type yields many small amplitude reflections and destroys the main RF signal. Dissipation of an RF signal may occur when an RF wave is reflected off sand, rocks, or other jagged surfaces. When scattered in this manner, RF signal degradation can be significant to the point of intermittently disrupting communications or causing complete signal loss. 10 Second, scattering can occur as a signal wave travels through particles in the medium such as heavy dust content. In this case, rather than being reflected off an uneven surface, the RF waves are individually reflected on a very small scale off tiny particles. Voltage Standing Wave Ratio (VSWR) VSWR occurs when there is mismatched impedance (resistance to current flow, measured in Ohms) between devices in an RF system. VSWR is caused by an RF signal reflected at a point of impedance mismatch in the signal path. VSWR causes return loss which is defined as the loss of forward energy through a system due to some of the power being reflected back towards the transmitter. If the impedances of the ends of a connection do not match, then the maximum amount of the transmitted power will not be received at the antenna. When part of the RF signal is reflected back toward the transmitter, the signal level on the line varies instead of being steady. This variance is an indicator of VSWR. [2] As an illustration of VSWR, imagine water flowing through two garden hoses. As long as the two hoses are the same diameter, water flows through them seamlessly. If the hose connected to the faucet were significantly larger than the next hose down the line, there would be backpressure on the faucet and even at the connection between the two hoses. This standing backpressure illustrates VSWR, as can be seen in Figure 2. . In this example, you can see that backpressure can have negative effects and not nearly as much water is transferred to the second hose as there would have been with matching hoses screwed together properly. Figure 2. 7: VSWR-like water through a hose VSWR Measurements VSWR is a ratio, so it is expressed as a relationship between two numbers. A typical VSWR value would be 1. 5:1. The two numbers re late the ratio of impedance mismatch against a perfect impedance match. The second number is always 1, representing the perfect match, where as the first number varies. The lower the first number (closer to 1), the better impedance matching your system has. For example, a VSWR of 1. 1:1 is better than 1. 4:1. A VSWR measurement of 1:1 would denote a perfect impedance match and no voltage standing wave would be present in the signal path. Effects of VSWR Excessive VSWR can cause serious problems in an RF circuit. Most of the time, the result is a marked decrease in the amplitude of the transmitted RF signal. However, 11 since some transmitters are not protected against power being applied (or returned) to the transmitter output circuit, the reflected power can burn ut the electronics of the transmitter. VSWR' effects are evident when transmitter circuits burn out, power s output levels are unstable, and the power observed is significantly different from the expected power. The methods of changing VSWR in a circuit include proper use of proper equipment. Tight connections between cables and connectors, use of impedance matched hardware throughout, and use of high-quality equipment with calibration reports where necessary are all good preventative measures against VSWR. VSWR can be measured with high-accuracy instrumentation such as SWR meters, but this measurement is beyond the scope of this text and the job tasks of a network administrator. 2. 2 Spread Spectrum 2. 2. 1 Spread Spectrum Spread spectrum is a communications technique characterized by wide bandwidth and low peak power. Spread spectrum communication uses various modulation techniques in wireless LANs and possesses many advantages over its precursor, narrow band communication [4]. Spread spectrum signals are noise-like, hard to detect, and even harder to intercept or demodulate without the proper equipment. Jamming and interference have a lesser affect on a spread spectrum communication than on narrow band communications. For these reasons, spread spectrum has long been a favorite of the military. 2. 2. 2 Narrow Band Transmission A narrowband transmission is a communications technology that uses only enough of the frequency spectrum to carry the data signal and no more, spread spectrum is in opposition to that mission since it uses much wider frequency bands than is necessary to transmit the information. This brings us to the first requirement for a signal to be considered spread spectrum. A signal is a spread spectrum signal when the bandwidth is much wider than what is required to send the information. [4] Figure 2. 8 illustrates the difference between narrowband and spread spectrum transmissions. One of the characteristics of narrow band is high peak power. More power is required to send a transmission when using a smaller frequency range. In order for narrow band signals to be received, they must stand out above the general level of noise, called the noise floor, by a significant amount. Because its band is so narrow, and high peak power ensures error-free reception of a narrow band signal. 12 Figure 2. 8: Narrow band verses Spread Spectrum on a frequency domain A compelling argument against narrowband transmission-other than the high peak power required to send it-is that narrow band signals can be jammed or experience interference very easily. Jamming is the intentional overpowering of a transmission using unwanted signals transmitted on the same band. Because its band is so narrow, other narrow band signals, including noise, can completely eliminate the information by overpowering a narrowband transmission; much like a passing train overpowers a quiet conversation. 2. 2. 3 Spread Spectrum Technology Spread spectrum technology allows taking the same amount of information than previously using a narrow band carrier signal and spreading it out over a much larger frequency range. For example, 1 MHz at 10 Watts with narrow band, but 20 MHz at 100 mW with spread spectrum. By using a wider frequency spectrum, we reduce the probability that the data will be corrupted or jammed. A narrow band jamming attempt on a spread spectrum signal would likely be thwarted by virtue of only a small part of the information falling into the narrow band signal' frequency range. s s Most of the digital data would be received error-free [4]. Today' spread spectrum RF radios can retransmit any small amount of data loss due to narrowband interference. While the spread spectrum band is relatively wide, the peak power of the signal is quite low. This is the second requirement for a signal to be considered spread spectrum. For a signal to be considered spread spectrum, it must use low power. These two characteristics of spread spectrum (use of a wide band of frequencies and very low power) make it look to most receivers as if it were a noise signal. Noise is a wide band, low power signal, but the difference is that noise is unwanted. Furthermore, since most radio receivers will view the spread spectrum signal as noise, these receivers will not attempt to demodulate or interpret it, creating a slightly more secure communication. 2. 2. 4 Frequency Hopping Spread Spectrum (FHSS) Frequency hopping spread spectrum is a spread spectrum technique that uses frequency agility to spread the data over more than 83 MHz. Frequency agility refers to the radio’s ability to change transmission frequency abruptly within the usable RF frequency band [4]. In the case of frequency hopping wireless LANs, the usable portion of the 2. GHz ISM band is 83. 5 MHz, per FCC regulation and the IEEE 802. 11 standard. 13 How FHSS Works In frequency hopping systems, the carrier changes frequency, or hops, according to a pseudorandom sequence. The pseudorandom sequence is a list of several frequencies to which the carrier will hop at specified time intervals before repeating the pattern. The transmitter uses this hop sequence to select it s transmission frequencies. The carrier will remain at a certain frequency for a specified time (known as the dwell time), and then use a small amount of time to hop to the next frequency (hop time). When the list of frequencies has been exhausted, the transmitter will repeat the sequence. Figure 2. 9 shows a frequency hopping system using a hop sequence of five frequencies over 5 MHz band. In this example, the sequence is: 1. 2. 449 GHz 2. 2. 452 GHz 3. 2. 448 GHz 4. 2. 450 GHz 5. 2. 451 GHz Figure 2. 9: Single frequency hopping system Once the radio has transmitted the information on the 2. 451 GHz carrier, the radio will repeat the hop sequence, starting again at 2. 449 GHz. The process of repeating the sequence will continue until the information is received completely. The receiver radio is synchronized to the transmitting radio' hop sequence in order to s receive on the proper frequency at the proper time. The signal is then demodulated and used by the receiving computer. Effects of Narrow Band Interference Frequency hopping is a method of sending data where the transmission and receiving systems hop along a repeatable pattern of frequencies together. As is the case with all spread spectrum technologies, frequency hopping systems are resistant-but not immune-to narrow band interference. In example in Figure 2. 9, if a signal were to interfere with our frequency hopping signal on, say, 2. 51 GHz, only that portion of the spread spectrum signal would be lost. The rest of the spread spectrum signal would remain intact, and the lost data would be retransmitted. 14 In reality, an interfering narrow band signal may occupy several megahertz of bandwidth. Since a frequency hopping band is over 83 MHz wide, even this interfering signal will cause little de gradation of the spread spectrum signal. Frequency Hopping Systems The IEEE and Open-Air standards regarding FHSS systems describe: 1. The frequency bands which may be used 2. Hop sequences 3. Dwell times 4. Data rates The IEEE 802. 1 standard specifies data rates of 1 Mbps and 2 Mbps and Open-Air (a standard created by the now defunct Wireless LAN Interoperability Forum) specifies data rates of 800 kbps and 1. 6 Mbps. In order for a frequency hopping system to be 802. 11 or Open-Air compliant, it must operate in the 2. 4 GHz ISM band (which is defined by the FCC as being from 2. 4000 GHz to 2. 5000 GHz). Both standards allow operation in the range of 2. 4000 GHz to 2. 4835 GHz. Channels A frequency hopping system will operate using a specified hop pattern called a channel. Frequency hopping systems typically use the FCC’s 26 standard hop patterns or a subset thereof. Some frequency hopping systems will allow custom hop patterns to be created, and others even allow synchronization between systems to completely eliminate collisions in a co-located environment. Figure 2. 10: Co-located frequency hopping system Though it is possible to have as many as 79 synchronized, co-located access points, with this many systems, each frequency hopping radio would require precise synchronization with all of the others in order not to interfere with (transmit on the same frequency as) another frequency hopping radio in the area. The cost of such a set of systems is prohibitive and is generally not considered an option. If synchronized radios are used, the expense tends to dictate 12 co-located systems as the maximum. 15 If non-synchronized radios are to be used, then 26 systems can be co-located in a wireless LAN; this number is considered to be the maximum in a medium-traffic wireless LAN. Increasing the traffic significantly or routinely transferring large files places the practical limit on the number of co-located systems at about 15. More than 15 co-located frequency-hopping systems in this environment will interfere to the extent that collisions will begin to reduce the aggregate throughput of the wireless LAN. Dwell Time In frequency hopping systems, it must transmit on a specified frequency for a time, and then hop to a different frequency to continue transmitting. When a frequency hopping system transmits on a frequency, it must do so for a specified amount of time. This time is called the dwell time. Once the dwell time has expired, the system will switch to a different frequency and begin to transmit again. Suppose a frequency hopping system transmits on only two frequencies, 2. 401 GHz and 2. 402 GHz. The system will transmit on the 2. 01 GHz frequency for the duration of the dwell time100 milliseconds (ms), for example. After 100ms the radio must change its transmitter frequency to 2. 402 GHz and send information at that frequency for 100ms. Hop Time When considering the hopping action of a frequency hopping radio, dwell time is only part of the story. When a frequency hopping radio jumps from frequency A to frequency B, it must change the transmit frequency in one of two ways. It ei ther must switch to a different circuit tuned to the new frequency, or it must change some element of the current circuit in order to tune to the new frequency. In either case, the process of changing to the new frequency must be complete before transmission can resume, and this change takes time due to electrical latencies inherent in the circuitry. There is a small amount of time during this frequency change in which the radio is not transmitting called the hop time. The hop time is measured in microseconds ( µs) and with relatively long dwell times of around 100-200 ms, the hop time is not significant. A typical 802. 11 FHSS system hops between channels in 200-300  µs. With very short dwell times of 500 – 600 µs, like those being used in some frequency hopping systems such as Bluetooth, hop ime can become very significant. If we look at the effect of hop time in terms of data throughput, we discover that the longer the hop time in relation to the dwell time, the slower the data rate of bits being transmitted. 2. 2. 5 Direct Sequence Spread Spectrum (DSSS) Direct sequence spread spectrum is very widely known and the most used of the spread spectrum types, owing most of its popularity to its ease of implementation and high data rates. The majority of wireless LAN equipment on the market today uses DSSS technology. DSSS is a method of sending data in which the transmitting and receiving systems are both on a 22 MHz-wide set of frequencies. The wide channel enables devices to transmit more information at a higher data rate than current FHSS systems. 16 How DSSS Works DSSS combines a data signal at the sending station with a higher data rate bit sequence, which is referred to as a chipping code or processing gain. A high processing gain increases the signal’s resistance to interference. The minimum linear processing gain that the FCC allows is 10, and most commercial products operate under 20. The IEEE 802. 11 working group has set their minimum processing gain requirements at 11. The process of direct sequence begins with a carrier being modulated with a code sequence. The number of–chips-in the code will determine how much spreading occurs, and the number of chips per bit and the speed of the code (in chips per second) will determine the data rate. Direct Sequence Spread Spectrum (DSSS) Direct sequence spread spectrum is very widely known and the most used of the spread spectrum types, owing most of its popularity to its ease of implementation and high data rates. The majority of wireless LAN equipment on the market today uses DSSS technology. DSSS is a method of sending data in which the transmitting and receiving systems are both on a 22 MHz-wide set of frequencies. The wide channel enables devices to transmit more information at a higher data rate than current FHSS systems. How DSSS Works DSSS combines a data signal at the sending station with a higher data rate bit sequence, which is referred to as a chipping code or processing gain. A high processing gain increases the signal’s resistance to interference. The minimum linear processing gain that the FCC allows is 10, and most commercial products operate under 20. The IEEE 802. 11 working group has set their minimum processing gain requirements at 11. The process of direct sequence begins with a carrier being modulated with a code sequence. The number of-chips-in the code will determine how much spreading occurs, and the number of chips per bit and the speed of the code (in chips per second) will determine the data rate. Channels Unlike frequency hopping systems that use hop sequences to define the channels, direct sequence systems use a more conventional definition of channels. Each channel is a contiguous band of frequencies 22 MHz wide and 1 MHz carrier frequencies are used just as with FHSS. Channel 1, for instance, operates from 2. 401 GHz to 2. 423 GHz (2. 412 GHz  ± 11 MHz); channel 2 operates from 2. 406 to 2. 429 GHz (2. 417  ± 11 MHz), and so forth. Figure 2. 11 illustrates this point. 17 Figure 2. 11: channel allocation and Spectral relationship The chart in Table 2. 1 has a complete list of channels used in the United States and Europe. The FCC specifies only 11 channels for non-licensed use in the United States. Each of the frequencies listed in this chart are considered center frequencies. From this center frequency, 11 MHz is added and subtracted to get the useable 22 MHz wide channel. Easy to see that adjacent channels (channels directly next to each other) would overlap significantly. Table 2. 1: DSSS channel frequency Assignment Channel ID 1 2 3 4 5 6 7 8 9 10 11 FCC Channel Frequencies GHz 2. 412 2. 417 2. 422 2. 427 2. 432 2. 437 2. 442 2. 447 2. 452 2. 457 2. 462 ETSI Channel Frequencies GHz N/A N/A 2. 422 2. 427 2. 432 2. 437 2. 442 2. 447 2. 452 2. 457 2. 462 To use DSSS systems with overlapping channels in the same physical space would cause interference between the systems. DSSS systems with overlapping channels should not be co-located because there will almost always be a drastic or complete reduction in throughput. Because the center frequencies are 5 MHz apart and the channels are 22 MHz wide, channels should be co-located only if the channel numbers are at least five apart: channels 1 and 6 do not overlap, channels 2 and 7 do not overlap, etc. There is a maximum of three co-located direct sequence systems possible because channels 1, 6 and 11 are the only theoretically non-overlapping channels. The 3 non-overlapping channels are illustrated in Figure 2. 2 18 Figure 2. 12: DSSS non-overlapping Channel 2. 2. 6 Comparing FHSS and DSSS Both FHSS and DSSS technologies have their advantages and disadvantages, and it incumbent on the wireless LAN administrator to give each its due weight when deciding how to implement a wireless LAN [4]. This section will cover some of the factors that should be discussed when determining which technology is appropriate f or your organization, including: 1. Narrowband interference 2. Co-location 3. Cost 4. Equipment compatibility 5. Data rate and throughput 6. Security 7. Standards support Narrowband Interference The advantages of FHSS include a greater resistance to narrow band interference. DSSS systems may be affected by narrow band interference more than FHSS because of the use of 22 MHz wide contiguous bands instead of the 79 MHz used by FHSS. This fact may be a serious consideration if the proposed wireless LAN site is in an environment that has such interference present. Co-location An advantage of FHSS over DSSS is the ability for many more frequency hopping systems to be co-located than direct sequence systems. Since frequency hopping systems are-frequency agile-and make use of 79 discrete channels, frequency hopping systems have a co-location advantage over direct sequence systems, which have a maximum co- location of 3 access points. 19 Figure 2. 13: Co-location Comparison However, when calculating the hardware costs of an FHSS system to get the same throughput as a DSSS system, the advantage quickly disappears. Because DSSS can have 3 co-located access points, the maximum throughput for this configuration would be: 3 access points ? 1 Mbps = 33 Mbps At roughly 50% of rated bandwidth, the DSSS system throughput would be approximately: 33 Mbps / 2 = 16. 5 Mbps To achieve roughly the same rated system bandwidth using an IEEE 802. 11 compliant FHSS system would require: 16 access points ? 2 Mbps = 32 Mbps At roughly 50% of rated bandwidth, the FHSS system throughput would be approximately: 32 Mbps / 2 = 16 Mbps In this configuration, an FHSS system would require 13 additional access points t o be purchased to get the same throughput as the DSSS system. Also, additional installation services for these units, cables, connectors, and antennas would all need to be purchased. Cost: When implementing a wireless LAN, the advantages of DSSS may be more compelling than those of FHSS systems, particularly when driven by a tight budget. The cost of implementing a direct sequence system is far less than that of a frequency hopping system. DSSS equipment is widely available in today’s marketplace, and its rapid adoption has helped in driving down the cost. Only a few short years ago, equipment was only affordable by enterprise customers. Today, very good quality 802. 11b compliant PC cards can be purchased for under $100. FHSS cards complying with either the 802. 11 or Open-Air standards typically run between $150 and $350 in today' market depending on the manufacturer and the standards to which the cards s adhere. 20 Equipment compatibility and availability The Wireless Ethernet Compatibility Alliance (WECA) provides testing of 802. 11b compliant DSSS wireless LAN equipment to ensure that such equipment will operate in the presence of and interoperate with other 802. 11b DSSS devices. The interoperability standard that WECA created and now uses is called Wireless Fidelity, or Wi-Fi, and hose devices that pass the tests for interoperability are-Wi-Fi compliant-devices. Devices so deemed are allowed to affix the Wi-Fi logo on the related marketing material and devices themselves showing that they have been tested and interoperate with other Wi-Fi compliant devices. There are no such compatibility tests for equipment that uses FHSS. There are standards such as 802. 11 and Open-Air, but no organization h as stepped forward to do the same kind of compatibility testing for FHSS as WECA does for DSSS. Due to the immense popularity of 802. 11b compliant radios, it is much easier to obtain these units. The demand seems only to be growing for the Wi-Fi compliant radios while the demand for FHSS radios has remained fairly steady, even decreasing to some degree over the past year. Data rate and throughput The latest frequency hopping systems are slower than the latest DSSS systems mostly because their data rate is only 2 Mbps. Though some FHSS systems operate at 3 Mbps or more, these systems are not 802. 11 compliant and may not interoperate with other FHSS systems. FHSS and DSSS systems have a throughput (data actually sent) of only about half of the data rate. When testing the throughput of a new wireless LAN installation, achieving 5-6 Mbps on the 11 Mbps setting for DSSS or 1 Mbps on the 2 Mbps setting common using DSSS. When wireless frames are transmitted, there are pauses between data frames for control signals and other overhead tasks. With frequency hopping systems, this interframe spacing is longer than that used by direct sequence systems, causing a slow-down in rate that data is actually sent (throughput). Additionally, when the frequency hopping system is in the process of changing the transmit frequency, no data is sent. This translates to more lost throughput, albeit only a minor amount. Some wireless LAN systems use proprietary physical layer protocols in order to increase throughput. These methods work, yielding throughputs as high as 80% of the data rate, but in so doing, sacrifice interoperability. Security: It is widely touted-and is a myth-that frequency hopping systems are inherently more secure than direct sequence systems. The first fact that disproves this myth is that FHSS radios are only produced by a minimal number of manufacturers. Of this small list of manufacturers, all of them adhere to standards such as 802. 1 or Open-Air in order to sell their products effectively. Second, each of these manufacturers uses a standard set of hop sequences, which generally comply with a pre-determined list, produced by the standards body (IEEE or WLIF). These 2 items together make breaking the code of hop sequences relatively simple. 21 Other reasons that make finding the hop sequence quite simple is that the channel number is broadcasted in the clear with each beacon. Also, the MAC address of the transmitting access point can be seen with each beacon (which indicates the manufacturer of the radio). Some manufacturers allow the administrator the flexibility of defining custom hopping patterns. However, even this custom capability is no level of security since fairly unsophisticated devices such as spectrum analyzers and a standard laptop computer can be used to track the hopping pattern of a FHSS radio in a matter of seconds. Standards Support: DSSS has gained wide acceptance due to low cost, high speed, WECA' Wi-Fi s interoperability standards, and many other factors. This market acceptance will only accelerate due to the industry moving toward newer, faster DSSS systems such as the new 802. 1g and 802. 11a compliant wireless LAN hardware. WECA' new Wi-Fi5 s interoperability standard for 5 GHz DSSS systems operating in the UNII bands will help move the industry along even faster in the same direction it is already headed. The new standards for FHSS systems include Home RF 2. 0 and 802. 15 (in support of WPANs such as Bluetooth), but none for advancing FHSS systems in the enterp rise. 2. 2. 7 BPSK In BPSK, the phase of the carrier is varied to represent binary 1 or 0 . Both peak amplitude and frequencies remain constant as the phase changes. For example, if a phase of 0 represents binary 0, then the phase 180 represents binary 1. the phase of the signal during each bit duration is constant. And its value depends on the bit (0 or 1). Figure 2. 14 shows a conceptual view of BPSK. BPSK is also known as 2-PSK. because two different phases (0 and 180) are used. The table below shows BPSK which makes the relationship of phase to bit value. Bit 0 1 Phase 0? 180? Figure 2. 14: BPSK. 2. 2. 8 QPSK The diagram for the signal is given in Figure 2. 15. A phase of 0 now represents 00; 90 represents 01; 180 represents10; and 270 represents 11. This technique is called QPSK. The pair of bits represented by each phase is called a dibit. 22 Bit 00 01 10 11 Figure 2. 15: QPSK. Phase 0? 90? 180? 270? 2. 2. 9 QAM QAM is a Combination of ASK and PSK so that a maximum contrast between each signal unit (bit, dibit, tribit, and so on) is achieved. QAM takes the advantages of the fact that it is possible to send two different signals simultaneously on the same carrier frequency . by using two copies of the carrier frequency. One shifted by 90 with respect to the other. For QAM, each carrier is ASK modulated. The two independent signals are simultaneously transmitted over the same medium. In QAM the number of amplitude shifts is fewer than the number of phase shifts. Because amplitude changes are susceptible to noise and require greater shift distances than do phase changes, the number of phase shifts used by a QAM system is always larger than the number of amplitude shifts. [5] Figure 2. 16: QAM. 23 2. 2. 10 Orthogonal Frequency division Multiplexing (OFDM) Orthogonal Frequency division Multiplexing offers the highest data rates and maximum resistance to interference and corruption of all the signal manipulation techniques in use in 802. 1 today [5]. Although it is not considered a spread spectrum technique by the FCC, OFDM shares many qualities with spread spectrum communicators, including using a low transmit power and wider-than-necessary bandwidth. OFDM is used to provide data rates up to 54 Mbps in 802. 11a and 802. 11g. How OFDM Works OFDM achieves high data rates by squeezing a large number of Communication Channels into a given frequency band. Normally, two c ommunication channels must be separated by a certain amount of bandwidth or they overlap and interfere. Specially, each Channel has harmonics that extend up and down the frequency space, decreasing in amplitude as they get farther from the channels fundamental signal. Even if two channels are non-overlapping, their harmonics may overlap and the signal can be corrupted. An OFDM communicator can place adjacent communication channels very precisely in the frequency space in such a way that the channels harmonics exactly cancel each other, effectively leaving only the fundamental signals. OFDM achieves high data rates by dividing a single communication channel into a large number of closely-spaced, small bandwidth sub-carriers. Each sub-carrier individually has a relatively low data rate, but by transmitting data in parallel on all sub-carriers simultaneously, high data rates can be achieved. Figure 2. 17: OFDM frequency plot. Figure 2. 17 shows an example of a frequency spectrum for an OFDM transmitter. Each of the peaks represents a single sub-carrier, and the sub-carriers together make up the communications channel. The sub-carriers are precisely aligned so that the zero-points of their harmonics overlapped exactly. The majority of the harmonic energy will cancel out, leaving just the sub-carriers. 4 CHAPTER 3 RF Antenna and Accessories 25 Chapter 3 RF Antenna and Accessories 3. 1 Introduction Antennas are most often used to increase the range of wireless LAN systems, but proper antenna selection can also enhance the security of your wireless LAN. A properly chosen and positioned antenna can reduce the signal leaking out of workspace, and make signal interception extremely difficult. 3. 2 RF Antennas An RF antenna is a device used to convert high frequency (RF) signals on a transmission line (a cable or waveguide) into propagated waves in the air [6]. The electrical fields emitted from antennas are called beams or lobes. Antenna convert electrical energy into RF waves in the case of a transmitting antenna, or RF waves into electrical energy in the case of a receiving antenna. The physical dimensions of an antenna, such as its length, are directly related to the frequency at which the antenna can propagate waves or receive propagated waves. The physical structure of an antenna is directly related to the Shape of the area in which it concentrates most of its related RF energy. There are three generic categories of RF antennas: 1. Omni-directional 2. Semi-directional 3. Highly-directional Each category has multiple types of antennas, each having different RF characteristics and appropriate uses. As the gain of an antenna goes up, the coverage area narrows so that high-gain antennas offer longer coverage areas than low-gain antennas at the same input power level. 3. 2. 1 Omni-directional (Dipole) Antennas The dipole is an omni- directional antenna, because it radiates its energy equally in all directions around its axis. Dipole antenna is Simple to design; dipole antenna is standard equipment on most access points. Directional antennas concentrate their energy into a cone, known as a â€Å"beam. † Figure 3. 1: Dipole doughnut 26 Figure 3. 1 shows that the dipole' radiant energy is concentrated into a region that s looks like a doughnut, with the dipole vertically through the â€Å"hole† of the â€Å"doughnut. † The signal from an omni-directional antenna radiates in a 360-degree horizontal beam. If an antenna radiates in all directions equally (forming a sphere), it is called an isotropic radiator, which is the theoretical reference for antennas, but rather, practical antennas all have some type of gain over that of an isotropic radiator. The dipole radiates equally in all directions around its axis, but does not radiate along the length of the wire itself – hence the doughnut pattern. The side view of a dipole radiator as it radiates waves in Figure 3. 2. Figure 3. 2: Dipole-side view If a dipole antenna is placed in the center of a single floor of a multistory building, most of its energy will be radiated along the length of that floor, with some significant fraction sent to the floors above and below the access point. Figure 3. 3 shows examples of some different types of omni-directional antennas. Figure 3. 3: Sample omni-directional antenna Figure 3. 4 shows a two-dimensional example of the top view and side view of a dipole antenna. Figure 3. 4: Coverage area of an omni-directional antenna High-gain omni-directional antennas offer more horizontal coverage area, but the vertical coverage area is reduced, as can be seen in Figure 3. 5. 27 Figure 3. 5: Coverage area of high gain omni-directional antennas This characteristic can be an important consideration when mounting a high-gain omni antenna indoors on the ceiling. If the ceiling is too high; the coverage area may not reach the floor, where the users are located. Usages Omni-directional antennas are used when coverage in all directions around the horizontal axis of the antenna is required. Omni-directional antennas are most effective where large coverage areas are needed around a central point. For example, placing an omni- directional antenna in the middle of a large, open room would provide good coverage. Omni-directional antennas are commonly used for point-tomultipoint designs with a hub-n-spoke topology. Used outdoors, an omni-directional antenna should be placed on top of a structure (such as a building) in the middle of the Figure 3. 6: Point to multipoint link coverage area. For example, on a college campus the antenna might be placed in the center of the campus for the greatest coverage area. When used indoors, the antenna should be placed at the middle of the building or desired coverage area, near the ceiling, for optimum coverage. Omni-directional antennas emit a large coverage area in a circular pattern and are suitable for warehouses or tradeshows where coverage is usually from one corner of the building to the other. 3. 2. 2 Semi directional Antenna Semi directional antennas direct the energy from the transmitter significantly more in one particular direction rather than the uniform circular pattern that is common with the omni- directional antenna; Semi-directional antennas come in many different styles and shapes. Some semi- directional antennas types frequently used with wireless LANs are Patch, Panel, and Yagi (pronounced â€Å"YAH-gee†) antennas. All of these antennas are generally flat and designed for wall mounting. Each type has different coverage characteristics. Figure 3. shows some examples of semidirectional antennas. 28 Figure 3. 7: Sample semi-directional antenna Semi-directional antennas often radiate in a hemispherical or cylindrical coverage pattern as can be seen in Figure 3. 8. Figure 3. 8: Coverage area of a semi-directional antenna Usages Semi-directional antennas are ideally suited for short and medium range bridging. For example, two office buildings that are across the street from one another and n eed to share a network connection would be a good scenario in which to implement semidirectional antennas. In a large indoor space, if the transmitter must be located in the corner or at the end of a building, a corridor, or a large room, a semi-directional antenna would be a good choice to provide the proper coverage. Figure 3. 9 illustrates a link between two buildings using semi-directional antennas. Figure 3. 9: Point to point link using semi-directional antenna In some cases, semi-directional antennas provide such long-range coverage that they may eliminate the need for multiple access points in a building. For example, in a long hallway, several access points with omni antennas may be used or perhaps only one or two access points with properly placed semi-directional antennas – saving the customer a significant amount of money. In some cases, semi- directional antennas have back and side lobes that, if used effectively, may further reduce the need for additional access points. 29 3. 2. 3 Highly directional antenna Highly-directional antennas emit the most narrow signal beam of any antenna type and have the greatest gain of these three groups of antennas. Highly-directional antennas are typically concave, dish-shaped devices, as can be seen Figures 3. 10 and 3. 11. These antennas are ideal for long distance, point-to-point wireless links. Some models are referred to as parabolic dishes because they resemble small satellite dishes. Others are called grid antennas due to their perforated design for resistance to wind loading. Figure 3. 10: sample of a highly directional antenna Figure 3. 11: sample of a highly directional grid antenna Figure 3. 12: Radiation pattern of a highly directional antenna Usages High-gain antennas do not have a coverage area that client devices can use. These antennas are used for point-to-point communication links, and can transmit at distances up to 25 miles. Potential uses of highly directional antennas might be to connect two buildings that are miles away from each other but have no obstructions in their path. Additionally, these antennas can be aimed directly at each other within a building in order to â€Å"blast† through an obstruction. This setup would be used in order to get network connectivity to places that cannot be wired and where normal wireless networks will not work. 0 3. 2. 4 Antenna Gain An antenna element without the amplifiers and filters typically associated with it is a passive device. There is no conditioning, amplifying, or manipulating of the signal by the antenna element itself. The antenna can create the effect of amplification by virtue of its physical shape. Antenna amplification is the result of focusing the RF ra diation into a tighter beam, just as the bulb of a flashlight can be focused into a tighter beam creating a seemingly brighter light source that sends the light further. The focusing of the radiation Measured by way of beam widths, which are measured in degrees horizontal and vertical. For example, an omni-directional antenna has a 360-degree horizontal beam width. By limiting the 360-degree beam width into a more focused beam of, say, 30 degrees, at the same power, the RF waves will be radiated further. This is how patch, panel, and Yagi antennas (all of which are semi-directional antennas) are designed. Highly directional antennas take this theory a step further by very tightly focusing both horizontal and vertical beam widths to maximize distance of the propagated wave at low power. . 2. 5 Intentional Radiator As defined by the Federal Communication Commission (FCC), an intentional radiator is an RF device that is specifically designed to generate and radiate RF signals. In terms of hardware, an intentional radiator will include the RF device and all cabling and connectors up to, but not including, the antenna, as illustrated in Figure 3. 13 below . Figure 3. 13: Intentional Radiator Any reference to â€Å"power output of the Intentional Radiator† refers to the power output at the end of the last cable or connector before the antenna. For example, consider a 30- milliwatt transmitter that loses 15 milliwatts of power in the cable and another 5 milliwatts from the connector at the antenna. The power at the intentional radiator would be 10 milliwatts. As an administrator, it is your responsibility to understand the FCC rules relating to Intentional Radiators and their power output. Understanding how power output is measured, how much power is allowed, and how to calculate these values are all covered in this book. FCC regulations concerning output power at the Intentional Radiator and EIRP are found in Part 47 CFR, 1 3. 2. 6 Equivalent Isotropically Radiated Power (EIRP) EIRP is the power actually radiated by the antenna element, as shown in Figure 3. 14. This concept is important because it is regulated by the FCC and because it is used in calculating whether or not a wireless link is viable. EIRP takes into account the gain of the antenna. Figure 3. 14: Equivalent Isotropically Radiated Power Suppose a transmittin g station uses a 10-dBi antenna (which amplifies the signal 10fold) and is fed by 100 mill watts from the intentional radiator. The EIRP is 1000 mW, or 1 Watt. The FCC has rules defining both the power output at the intentional radiator and the antenna element. 3. 3 RF Accessories When wireless LAN devices connect together, the appropriate cables and accessories need to purchase that will maximize throughput, minimize signal loss, and, most importantly, allow making connections correctly. Different types of accessories are needed in a wireless LAN design. [7] 1. RF Amplifiers 2. RF Attenuators 3. Lightning Arrestors 4. RF Connectors 5. RF Cables 3. 3. 1 RF Amplifiers An RF amplifier is used to amplify, or increase the amplitude of, RF signal, which is measured in +dB. An amplifier will be used when compensating the loss incurred by the RF signal, either due to the distance between antennas or the length of cable from a wireless infrastructure device to its antenna. Most RF amplifiers used with wireless LANs are powered using DC voltage fed onto the RF cable with an injector near the RF signal source (such as the access point or bridge). Sometimes this DC voltage used to power RF amplifiers is called â€Å"phantom voltage† because the RF amplifier seems to magically power up. This DC injector is powered using AC voltage from a wall outlet, so it might be located in a wiring closet. In this scenario, the RF cable carries 32 both the high frequency RF signal and the DC voltage necessary to power the in-line amplifier, which, in turn, boosts the RF signal amplitude. Figure 3. 15 shows an example of an RF amplifier (left), and how an RF amplifier is mounted on a pole (right) between the access point and its antenna. Figure 3. 15: A sample of a fixed gain Amplifier RF amplifiers come in two types: unidirectional and bi-directional. Unidirectional amplifiers compensate for the signal loss incurred over long RF cables by increasing the signal level before it is injected into the transmitting antenna. Bi-directional amplifiers boost the effective sensitivity of the receiving antenna by amplifying the received signal before it is fed into the access point, bridge, or client device. Configuration and Management RF amplifiers used with wireless LANs are installed in series with the main signal path seen below in Figure 3. 16. Amplifiers are typically mounted to a solid surface using screws through the amplifier’s flange plates. Configuration of RF amplifiers is not generally required unless the amplifier is a variable RF amplifier. If the amplifier is variable, the amplifier must be configured for the proper amount of amplification required, according to RF math calculations. The manufacturer' user manual will s explain how to program or configure the amplifier. Figure 3. 16: RF amplifier placement in the wireless LAN system 3. 3. 2 RF Attenuators An RF attenuator is a device that causes precisely measured loss (in dB) in an RF signal. While an amplifier will increase the RF signal, an attenuator will decrease it. Consider the case where an access point has a fixed output of 100mW, and the only antenna available is an omni-directional antenna with +20 dBi gain. Using this equipment together would violate FCC rules for power output, so an attenuator could be added to decrease the RF signal down to 30mW before it entered the antenna. This configuration would put the power output within FCC parameters. Figure 3. 17 shows examples of fixed-loss RF attenuators with BNC connectors (left) and SMA connectors (right). Figure 3. 18 shows an example of an RF step attenuator. 33 Figure 3. 7: Sample of a fixed loss Amplifier Figure 3. 18: A sample of a RF step attenuator (Variable loss) Configuration and Management Figure 3. 19 shows the proper placement in a wireless LAN for an RF attenuator, which is directly in series with the main signal path. Fixed, coaxial attenuators are connected directly between any two-connection points between the transmitter and the antenna. For example, a fixed, coaxial antenn a might be connected directly on the output of an access point, at the input to the antenna, or anywhere between these two points if multiple RF cables are used. Variable antennas are generally mounted to a surface with screws through their flange plates or simply placed in a wiring closet on a shelf. Configuration of RF attenuators is not required unless a variable attenuator is used, in which case, the amount of attenuation required is configured according to your RF calculations. Configuration instructions for any particular attenuator will be included in the manufacturer' user manual. s Figure 3. 19: RF attenuator placement in a wireless LAN 3. 3. 3 Lightning Arrestors A lightning arrestor is used to shunt transient current into the ground that is caused by lightning. Lightning arrestors are used for protecting wireless LAN hardware such as access points, bridges, and workgroup bridges that are attached to a coaxial transmission line. Coaxial transmission lines are susceptible to surges from nearby lightning strikes. Lightning arrestor are only needed for outdoor antennas that are 34 Susceptible to lighting sticks in the vicinity. They are not necessary for indoor antennas because of the existing building ground. A lightning arrestor can generally shunt surges up to 5000 Amperes at up to 50 volts. Lightning arrestor performs the following function 1. Lightning strikes a nearby object 2. Transient current are induced in the antenna or the RF transmission line 3. The lightning arrestor senses these currents and immediately ionizes the gases held internally to cause a short (a path of almost no resistance) directly to earth ground. Figure 3. 20: Lightning Arrestors installed in a network 3. 3. 4 RF Connectors RF connectors are specific types of connection devices used to connect cables to devices or devices to devices. Traditionally, N, F, SMA, BNC, and TNC connectors (or derivatives) have been used for RF connectors on wireless LANs. In 1994, the FCC and DOC (Canadian Department of Communications) ruled that connectors for use with wireless LAN devices should be proprietary between manufacturers [7]. For this reason, many variations on each connector type exist such as: 1. N-type 2. Reverse polarity N-type 3. Reverse threaded N-type Figure 3. 21: Sample N-type and SMA Connector 35 Choosing an RF Connector There are five things that should be considered when purchasing and installing any RF connector, and they are similar in nature to the criteria for choosing RF amplifiers and attenuators. . The RF connector should match the impedance of all other wireless LAN components (generally 50 ohms). 2. Know how much insertion loss each connector inserted into the signal path causes. The amount of loss caused will factor into your calculations for signal strength required and distance allowed. 3. Know the upper frequency limit (frequency response) specified for the particular connectors. This point will be very important as 5 GHz wireless LANs become more and more common. Some connectors are rated only as high as 3 GHz, which is fine for use with 2. GHz wireless LANs, but will not work for 5 GHz wireless LANs. Some connectors are rated only up to 1 GHz and will not work with wireless LANs at all, other than legacy 900 MHz wireless LANs. 4. Beware of bad quality connectors. First, always consider purchasing from a reputable company. Second, purchase only high-quality connectors made by name-brand manufacturers. This kind of purchasing particularity will help eliminate many problems with sporadic RF signals, VSWR, and bad connections. 5. Make sure you know both the type of connector (N, F, SMA, etc. ) that you need and the sex of the connector. Connectors come in male and female. Male connectors have a center pin, and female connectors have a center receptacle. 3. 3. 5 RF Cables Proper cables are needed for connecting an antenna to an access point or wireless bridge. Below are some criteria to be considered in choosing the proper cables for your wireless network. 1. Cables introduce loss into a wireless LAN, so make sure the shortest cable length necessary is used. 2. Plan to purchase pre-cut lengths of cable with pre-installed connectors. Doing minimizes the possibility of bad connections between the connector and the cable. Professional manufacturing practices are almost always superior to cables manufactured by untrained individuals. 3. Look for the lowest loss cable available at your particular price range (the lower the loss, the more expensive the cable). Cables are typically rated for loss in dB/100-feet. The table in Figure 5. 29 illustrates the loss that is introduced by adding cables to a wireless LAN. 4. Purchase cable that has the same impedance as all of your other wireless LAN components (generally 50 ohms). 5. The frequency response of the cable should be considered as a primary decision factor in your purchase. With 2. 4 GHz wireless LANs, a cable with a rating of at least 2. 5 GHz should be used. With 5 GHz wireless LANs, a cable with a rating of at least 6 GHz should be used. 36 Table 3. 1: Coaxial Cable attenuation ratings LMR Cable 100A 195 200 240 300 400 400UF 500 600 600UF 900 1200 1700 30 3. 9 2. 0 1. 8 1. 3 1. 1 0. 7 0. 8 0. 54 0. 42 0. 48 0. 29 0. 21 0. 15 50 5. 1 2. 6 2. 3 1. 7 1. 4 0. 9 1. 1 0. 70 0. 55 0. 63 0. 37 0. 27 0. 19 150 8. 9 4. 4 4. 0 3. 0 2. 4 1. 5 1. 7 1. 2 1. 0 1. 15 0. 66 0. 48 0. 35 220 10. 9 5. 4 4. 8 3. 7 2. 9 1. 9 2. 2 1. 5 1. 2 1. 0. 80 0. 59 0. 43 450 15. 8 7. 8 7. 0 5. 3 4. 2 2. 7 3. 1 2. 2 1. 7 2. 0 1. 17 0. 89 0. 63 900 22. 8 11. 1 9. 9 7. 6 6. 1 3. 9 4. 5 3. 1 2. 5 2. 9 1. 70 1. 3 0. 94 1500 30. 1 14. 5 12. 9 9. 9 7. 9 5. 1 5. 9 4. 1 3. 3 3. 8 2. 24 1. 7 1. 3 1800 33. 2 16. 0 14. 2 10. 9 8. 7 5. 7 6. 6 4. 6 3. 7 4. 3 2. 48 1. 9 1. 4 2000 35. 2 16. 9 15. 0 11. 5 9. 2 6. 0 6. 9 4. 8 3. 9 4. 5 2. 63 2. 0 1. 5 2500 39. 8 19. 0 16. 9 12. 9 10. 4 6. 8 7. 8 5. 5 4. 4 5. 1 2. 98 2. 3 1. 7 37 CHAPTER 4 Wireless LAN 38 Chapter 4 Wireless LAN 4. 1 Wireless LAN (WLAN) 4. 1. 1 Wireless LAN Linking of t

Friday, January 10, 2020

Social Problems

What is a social problem? A social problem is a condition that at least some people in a community view as being undesirable. Everyone would agree about some social problems, such as murders and DWI traffic deaths. Other social problems may be viewed as such by certain groups of people. Teenagers who play loud music in a public park obviously do not view it as a problem, but some other people may consider it an undesirable social condition. Some nonsmokers view smoking as an undesirable social condition that should be banned or restricted in public buildings. Every newspaper is filled with stories about undesirable social conditions. Examples include crime, violence, drug abuse, and environmental problems. Such social problems can be found at the local, state, national and international levels. You will be focusing in the Public Policy Analyst on social problems in your own community. Specific community locations Your own community consists of†¦ your school and your school district; your village, town or city; your county. The four examples of social problems above could possibly exist in all of these communities. For example, there could be a problem of increased stealing within your school or throughout the school district. Likewise, local police agencies—village, town, city and county—maintain statistics on crimes such as thefts within their jurisdiction. When you describe the social problem in step 1, you must specify the geographical setting. Some examples include Lehman High School, the Bronx High School District, the Bronx, New York City, or New York State. As mentioned before, PPA will be used only for local and state social problems. Social Problems of the Philippines Includes: OWADAYS, PHILIPPINES HAVE LOTS OF SOCIOLOGICAL PROBLEMS. SOME OF THESE ARE THE FF. -UNEMPLOYMENT -POVERTY Poverty is the state of one who lacks a certain amount of material possessions or money. [1] Absolute poverty or destitution refers to the one who lacks basic human needs, which commonly includes clean and fresh water, nutrition, health care, education, clothing and shelter. About 1. 7 billion people are estimated to live in absolute poverty today. Relative poverty refers to lacking a usual or socially acceptable level of resources or income as compared with others within a society or country. [1] For most of history poverty had been mostly accepted as inevitable as traditional modes of production were insufficient to give an entire population a comfortable standard of living. [1][2] After the industrial revolution, mass production in factories made wealth increasingly more inexpensive and accessible. Of more importance is the modernization of agriculture, such as fertilizers, in order to provide enough yield to feed the population. 3] The supply of basic needs can be restricted by constraints on government services such as corruption, debt and loan conditionalities and by the brain drain of health care and educational professionals. Strategies of increasing income to make basic needs more affordable typically include welfare, accommodating business regulations and providing financial services. Today, poverty reduction is a maj or goal and issue for many international organizations such as the United Nations and the World Bank. -POLLUTION -STREET CHILDREN ILLITERACY Some of the Social Issues which is a part of Social Problems in the Philippines are: alling Income The Philippine GDP per capita shrank to US$990 in 2000 from US$1,129 in 1997 while the GNP per capita contracted to US$1,033 from US$1,197. This was a result of the Asian financial crisis, which caught up with the Philippines in 1998. After expanding 5. 2 percent in 1997, the country's GDP backpedaled by 0. 5 percent in 1998. It grew by only 3. 4 percent in 1999 and 4 percent in 2000. With a high population growth rate of 2. percent annually, economic growth in 1999 and 2000 did little to improve the real per capita income of Filipinos. Peso Drops 14 Times vs. US Dollar According to Senator Ralph Recto, the country's per capita income has barely grown in the past 21 years. He said that the per capita income of P12,913 in 2001 is only P318 higher t han P12,595 in 1980. â€Å"In today's pesos, the P318 increase in 21 years amounts to nothing at all. † he said. Senator Recto also noted that the value of the peso has depreciated by as much as 1,373 percent against the dollar since 1960. The Poor and the Rich In its 2000 survey of family income and expenditure, the NSO said that the average income of the population's 10th decile, representing the richest 10 percent of the Filipinos, was 14 times higher than the average earnings of the first decile, representing the poorest 10 percent. Each decile was representing about 8 million Filipinos. Poverty Threshold: P13,916 While the per capita income declined between 1997 and 2000, prices of consumer goods and services increased by almost 20 percent during the three-year period or over six percent annually. The National Statistical Coordination Board (NSCB) was forced to raise by 23 percent the national per capita poverty threshold to P13,916 in 2000 from P11,319 in 1997. Unequal Regional Development The Asian Development Bank (ADB) reported that Metro Manila's per capita gross regional domestic product (GRDP) in 2000 was more than twice that of the national average and more than five times that of Bicol region. Data from the National Statistical Coordination Board (NSCB) showed that 11 of the country's 16 regions had a poverty incidence of over 30 percent as of 2000. The five other regions with lower poverty levels are all located in Luzon. The NSCB placed the poverty incidence in the country (the proportion of families with per capita incomes below the poverty threshold) at 28. 4 percent in 2000, up from 28. 1 percent in 1997. In terms of population, poverty incidence was estimated at 34 percent in 2000, also up from 33 percent in 1997. The NSCB data showed that in 2000, the National Capital Region or Metro Manila had the lowest poverty incidence of 5. 7 percent among families. It was followed by four other regions in Luzon, with Region 3 (Central Luzon) registering a poverty incidence of 17 percent; Region 4 (Southern Tagalog), 20. percent; Region 2 (Cagayan Valley), 24. 8 percent; and Region 1 (Ilocos), 29. 6 percent. Two regions in Luzon – Region 5 (Bicol), the southernmost region in Luzon, and the Cordillera Administrative Region (CAR) – had a poverty incidence of over 30 percent. About 49 percent of families in Bicol were suffering from poverty while 31. 1 percent of families in CAR were also in the same category. All regions in the Visayas had over 30 percent of poverty incidence. Region 6 (Western Visayas) had a poverty incidence of 37. 8 percent; Region 7 (Central Visayas), 32. percent; and Region 8 (Western Visayas), 37. 8 percent. All regions in Mindanao also had over 30 percent of poverty incidence. Region 9 (Western Mindanao) had a poverty incidence of 38. 3 percent; Region 10 (Northern Mindanao), 32. 9 percent; Region 11 (Southern Mindanao), 31. 5 percent; Region 12 (Central Mindanao), 48. 4 percent; Autonomous Region for Muslim Mindanao (ARMM), 57 percent; and Caraga, 42. 9 percent. 32 Million Poor Filipinos With the adjustment on poverty threshold, the number of Filipinos considered poor or affected by poverty incidence swell to 30 million or 39. percent of the population in 2000 from 36. 8 percent in 1997. According to the Commission on Population (Popcom), the figure could have further climbed to 32 million or 40 percent of the population in 2002. In terms of number of families, poverty incidence affected 33. 7 percent of all Filipino families in 2000 from only 31. 8 percent in 1997. 5. 1 Million Poor Families The NSO reported that in 2000, poverty incidence affected 19. 9 percent of families in urban areas and 46. 9 percent in rural areas. Real number of poor families climbed to 5. 1 million, 1. 5 million of them in urban areas and 3. million in rural areas. Some 2. 5 million families were living in subsistence level, meaning their income was not enough to buy their basic food requirements. Poor and Near Poor, 58 Percent In its 2001 report, the World Bank said 12. 7 percent of Filipinos were â€Å"poor†, a term it assigned to those who lived on less than US$1 a day while 45. 9 percent were â€Å"near poor† or those who lived on less than US$2 a day. A 2002 survey conducted by the local poll group Social Weather Stations (SWS) showed that 58 percent of its 1,200 respondents had considered themselves poor. The survey, conducted on March 4 to 23, 2002, also disclosed that 52 percent of the respondents believed that their quality of life had deteriorated over the past 12 months while only 15 percent said otherwise. Only 80 Percent Had Access to Safe Water Access to safe drinking water dropped to 80 percent among Filipino families in 2002 from 81. 4 percent in 1999, according to the Annual Poverty Indicators Survey (APIS) conducted by the National Statistics Office (NSO). In real figure, however, the number of families with access to safe drinking water climbed by 6. 2 percent to 12. 46 million in 2002 from 11. 999 million in 1999 largely because of the 8 percent population growth during the three-year period. 86. 1 Percent Had Toilets The Annual Poverty Indicators Survey (APIS) conducted by the National Statistics Office (NSO) in 2002 showed that the percentage of Filipino families with access to sanitary toilet improved to 86. 1 percent in 2002 from 85. 8 percent in 1999. In real number , this translates to 13. 713 million families with sanitary toilet in 2002, up from 12. 662 million families three years earlier. 79 Percent Had Electricity The Annual Poverty Indicators Survey (APIS) conducted by the National Statistics Office (NSO) in 2002 showed that around 12. 581 million families or 79 percent of the total had electricity in 2002, up from only 10. 809 million or 73. 3 percent of all families in 1999. 72 Percent Had Strong Houses The Annual Poverty Indicators Survey (APIS) conducted by the National Statistics Office (NSO) in 2002 showed that 11. 497 million Filipino families or 72. 2 percent of the total had their roofs made of strong materials and 9. 888 million had their outer walls made of strong materials. 7 Percent Owned House and Lot The Annual Poverty Indicators Survey (APIS) conducted by the National Statistics Office (NSO) in 2002 showed that 10. 593 million Filipino families or 66. 5 percent of the total had their own house and lot in 2002, with only 546,000 of them or 5. 1 percent using the government's finance program to purchase their house and lot. Some 3. 425 million families or 21. 5 percent of the to tal had lands other than residence in 2002 while 376,000 families acquired lands through the government's Comprehensive Agrarian Reform Program (CARP). Ibon: Poverty Affects 87. 5 Percent Ibon Foundation Inc. , a research think-tank that was accused by President Gloria Macapagal-Arroyo as leftist, reported that poverty incidence actually affected 13. 4 million Filipino families or 87. 5 percent of all families in the country. The independent research agency based its computation on data from the National Wage Commission. Ibon said that the daily cost of living for a family of six was P530 in Metro Manila and P435 in the whole country, as of April 2002. 16 Percent Experiences Hunger A survey conducted by Social Weather Stations (SWS) in March 2001 showed that 16. 1 percent of its respondents had experienced hunger at least once in the last three months. About 6 percent of the households surveyed also claimed that they were experiencing hunger often or always. 20 to 34 Percent of Filipinos Undernourished About 20 to 34 percent of 74. 2 million Filipinos in the period 1998 to 2000 was undernourished, according to the Food and Agriculture Organization (FAO) in its report entitled â€Å"The State of Food Insecurity in the World 2002. The situation in the Philippines was worse that those in Indonesia, Myanmar, Thailand and Vietnam where only 5 to 19 percent of the population was undernourished. Only less than 2. 5 percent of population in Malaysia was undernourished while there was no record of similar problem in Singapore and Thailand. Only Cambodia, with 35 percent or more of its population being undernourished, was worse off than the Philippines. The FAO reported that there are some 840 million undernourished people in the world today while the World Bank said about 1. billion people lived on less than US$1 per day. Some 25,000 people reportedly die of hunger and poverty each day. Measured annually, around six million children under the age of five are dying of hunger. 6 of 10 Policemen are Poor A study concuted by the UP Variates and the CORPS Foundation in July 2002 showed that 32 percent of Metro Manila policemen claimed that their monthly income they took home were below the poverty threshold of P8,877 a month while nearly 90 percent admitted they had debts to government and private lending institutions. Nearly 50 percent had no bank savings. 1. 391 Million Families with Working Children Child labor remains a problem in the country. As of 2002, there were 1. 391 million families or 12. 8 percent of the total that had working children aged from five years old to 17 years old. 4 Million Children, Working So critical was the poverty incidence in the country that many Filipino children had to find work in 2001. According to the NSO, 4 million out of the total 25 million Filipino children were working during the survey period from October 1, 2000 to September 30, 2001. Most of these working children were male, aged 10 to 17 years old, unskilled and unpaid. They worked as farmers, fishermen, hunters, vendors, and factory workers. Some 221,000 children did heavy physical work; 1. 1 million faced physical hazards; 942,000 suffered injuries at work; and 754,000 had work-related illnesses. These figures were consistent with the findings of an international institution. According to the United Nations Children's Emergency Fund (Unicef), some four million Filipino children were forced to work as of 2002 because their parents could not find jobs. Around 67 percent of these children were working in the agricultural sector and had to stop going to school. About 50 percent of the children were feeding their respective families. 15 Million Children, Malnourished A 2002 study conducted by the Philippine Congress showed that about 15. 6 million or more than 60 percent of the 25 million Filipino children (below 18 years old) were malnourished. In a separate study conducted by the Food and Nutrition Research Institute (FNRI), three out of 10 Filipino pre-schoolers were found malnourished or underweight in 2001. In actual numbers, there were 3. million malnourished pre-school children. RP Imported 24 Million Bags of Rice The Philippines, which remains largely rural and agricultural, has become the world's fourth largest importer of rice, after Indonesia, Nigeria and Iran. Citing a report of the US Department of Agriculture, Representative Satur Ocampo said the country imported about 1. 18 million tons metric tons of rice in 2001 and a total of 1. 2 million metric tons (24 million 50-kilogram bags) of rice in 2002. 1. 5 Million Street Children The Philippines has one of the world's largest populations of street children. A 1996 report of the non-government movement End Child Prostitution in Asian Tourism (ECPAT) showed that the Philippines had 1. 5 million children living or working in the street of 65 cities. Metro Manila alone had at least 75,000 street children. ECPAT claimed that many children in the street were working as pickpockets and beggars and that around 60,000 children were either sexually exploited or driven to prostitution. According to the Dangerous Drugs Board, 325,000 children were using illegal substance, particularly rugby. About 100 million children in the world were said to be living in the street as of 1994. . 8 Million Illiterate Filipinos According to the Functional Literacy Education and Mass Media Survey (FLEMMS) conducted in 2001, about 2. 8 million Filipinos could not read and write while 7. 4 million others are functionally illiterate. Functional illiteracy refers to the inability of a person to use his skills in reading, writing and counting to improve his life. 10. 8 M illion Unemployed, Underemployed The Department of Labor and Employment (DOLE) said that as of April 2002, there were 4. 866 million unemployed Filipinos accounting for 13. percent of the total labor force estimated at 35. 052 million workers. About 5. 922 million others or 19. 6 percent of the labor force were also underemployed, meaning they had no regular sources of income. 26 Percent of College Graduates Unemployed A study commissioned by the Trade Union Congress of the Philippines (TUCP) in 2002 showed that 26. 2 percent of college graduates aged 24 years old and below were unemployed. In comparison, only 13. 6 percent of high school graduates and 9. 1 percent of elementary dropouts were unemployed during the same period. Workers, Only 30. 6 Percent of Population Measured against the whole population (80 million), those who were working at least 40 hours a week estimated at 24. 264 million workers comprised only 30. 5 percent of all people in the Philippines as of April 2002. 40 Percent of Voters Unaware of Rights In June 2002, the Parish Pastoral Council for Responsible Voting (PPCRV), an independent Catholic organization, announced that almost 40 percent of their respondents composed of Filipino voters were unaware of their voting rights. Prices Up by 6 Percent According to the Department of Trade and Industry (DTI), prices of goods and services moved up by over 6 percent in 2001. In particular, prices of fuel, light and water increased by an average of 11. 5 percent, year-on-year in 2001. Rice in the Philippines reportedly costs three times as much as it does in Thailand. Price of Medicine, Three Times as Much Prices of eight common drugs in the country were three times as much as they were in India, according to the Department of Health (DoH). For example, a 20-milligram tablet of Adalat Retard or Nifedine 20 that cost over P34 in the Philippines in 2001 was only priced at about P5. 4 in India in the same year. The Department of Trade and Industry (DTI) has accused local pharmaceutical firms belonging to the Pharmaceutical and Healthcare Association of the Philippines (PHAP) of dictating prices of medicine in the country. 5 Million Housing Backlog According to the National Housing Authority (NHA), some 5 million Filipino families were in need of permanent houses in the whole country. 3. 4 Million Squatters In its 2002 study, the Asian Development Bank (ADB) has cited the need to improve the lives of some 3. 4 million Filipinos living in the slums of Metro Manila. ,521 Disabled Filipinos, Driving As of October 2002, the National Council for the Welfare of Disabled Persons (NCWDP) disclosed that some 3,521 disabled Filipinos have licenses to drive vehicles. The number of disabled driver included 2,550 partially blind, 56 with impaired hearing and speech, 777 with impaired lower limbs and 138 with impaired upper limbs. Philippine Justice System According to the Supreme Court, about 45 percent of Philippine courts – regional trial courts, municipal courts, and municipal circuit trial courts – had no judges as of September 2002. Meanwhile, the Department of Justice said there was a 22 percent vacancy in positions of prosecutors in the whole country. Just how the courts administered justice with such a wide vacancy in positions of judges and prosecutors paints a picture of disillusionment among victims waiting impatiently for justice. The vacancy in these positions usually means delay in the implementation of justice, which in turn discourages people from actually filing cases in courts. 88 Signatures for Housing Permit As of 2001, it took 88 signatures to get an approval to build a house in the Philippines. President Arroyo ordered that the number of signatures be trimmed to 45. P35 Billion Lost to Project Anomalies The chairman of the Committee on Appropriations at the lower chamber of Congress said the Philippine government lost P21 billion to graft and corruption stemming from scheming contracts entered into by senators and congressmen in 2001. The amount excluded money lost to corruption involving projects executed by other government officials. Meanwhile, Senator Edgardo Angara said that around P35 billion is lost to graft and corruption in government infrastructure projects annually. Such anomalies come in the form of rigged public bidding, substandard work and cost padding. (Source: Philippine Daily Inquirer) P21 Billion Lost to Procurement Process The Philippine government has been losing some P21 billion to corrupt officials involved in the procurement process, the none-government organization Procurement Watch Inc. (PWI) reported. At the same time, a survey conducted by the Social Weather Stations (SWS) showed that 15 percent of the cost of all government contracts is lost to corruption. P104 Billion Pork Barrel Aside from legislating laws, Filipinos senators and congressmen have made it their responsibility to distribute development projects in their respective districts. Each one of the 24 senators receives some P200 million in development funds annually while each one of about 218 congressmen receives P100 million in annual appropriations. In total, all these development funds for legislators, collectively known as procurement budget or pork barrel, amount to P104 billion annually. According to House appropriations committee chairman Rolando Andaya Jr. , ome P21 billion or nearly 20 percent of this amount is pocketed by some legislators, other government officials and contractors each year. (Source: Philippine Daily Inquirer) RP, Fourth Most Corrupt in Asia In its 2002 survey, the Hong Kong-based Political and Economic Risk Consultancy (PERC), which asked 1,000 foreign businessmen in 12 Asian countries, has ranked the Philippines as the fourth most corrupt country in Asia closely behind I ndonesia, India and Vietnam. The Philippines received a score of 8. 0 in the survey, on a scale of 0 to 10, with 0 the best possible score for a country with no corruption. PERC said Singapore was the least corrupt in the region, with a score of 0. 9. In a separate survey also in 2002, Transparency International (TI) ranked the Philippines 77th among 102 countries in terms of fighting graft and corruption. The Philippines got a score of 2. 6 in corruption perception index, with 10 the highest possible score for the country that has no corruption. Finland was ranked number 1, with a score of 9. 7. Bangladesh was at the bottom of the list, with a score of 1. 2. P85 billion Ill-Gotten Wealth Recovered In its claim as of 2002, the Presidential Commission on Good Government said that it has recovered a total of P85 billion in ill-gotten wealth since it was created in 1986. 2. 8 Million Income Tax Payers While there were 15 million salaried workers in the country in 2000, only 2. 8 million actually paid income taxes. According to Senator Ralph Recto, of the total individual income tax returns filed in 2000, 1. 953 million were by salaried workers (1. 350 million of whom were government employees) and only 536,000 by businessmen and non-salaried professionals (like doctors and lawyers). In real amount, ordinary workers paid some P63. 8 billion while non-salaried individuals, mostly businessmen and professionals, contributed only P7. 3 billion for a total of P81. 8 billion in individual income taxes. The senator disclosed that about 56. 2 percent of salaried and non-salaried workers in the country failed to settle their individual income taxes in 2000. Over the past 11 years, leakage from the individual income tax amounted to P608 billion. This was on top of the P610 billion that were lost to leakage in the value added tax (VAT) scheme. US$205 Billion Tax Evasion A study conducted by the research unit of US bank Morgan Stanley said that the Philippine government lost some US$205 billion in potential revenues from 1965 to 2001. The figure was computed based on the estimated annual tax leakage of US$7. 6 billion or P380 billion. It was higher than the government's estimate. According to the Department of Finance (DoF), some P242 billion (US$4. 65 billion) in potential government revenues is lost to tax evaders yearly. In its 1998 study, the Department of Finance said some P69. 85 billion was lost because of leakage in the value-added tax, P59. 3 billion in corporate income tax, P98. 95 billion in personal income tax, P2. 56 billion in excise tax, P6. 4 billion in documentary stamp tax, P1. 18 billion in interest withholding tax on bank deposits, P2. 33 billion in fringe benefits tax, P1. 5 billion in gross receipts tax, and P370 million in insurance tax. P187 Billion Tax Incentives to Corporations The government dangled some P187. 2 billion tax incentives to the largest foreign and local companies in the country in 2001. These incentives came in the form of income tax holidays and duty-free importation of raw materials from other countries. Companies, which benefited from such tax incentives were those registered at Board of Investments (BOI), Philippine Economic Zone Authority (PEZA) and other investment promotion agencies. P147 Billion Budget Shortage The country's fiscal deficit reached P147. 03 billion (US$2. 95 billion) or 4. 1 percent of the gross domestic product (GDP) estimated at P3. 6 trillion (US$72 billion) in 2001. While the government spent P710. 8 billion, its total revenues amounted to only P563. 73 billion. Public sector funding requirement (PSFR) reached P189 billion. Debt servicing or payments to interests of domestic and foreign borrowings reached P27. billion. To augment its budget requirements in 2001, the government sourced 87 percent of its total financing from domestic funds and 13 percent from foreign loans and aid. The government relied heavily on fixed-rate Treasury bonds as it issued P208. 42 billion worth of these short-term fixed-income securities. The situation was worse in 20002. The gov ernment said the budget deficit would climb to P223 billion or 5. 6 percent of the GDP by the end of the year. The original target was only 4 percent. P781 Billion Government Budget According to the Department of Budget and Management (DBM), the government has a total budget of P780. billion for 2002. Budget deficit is expected to reach at least P150 billion in 2002. Of the 2002 budget, some P233. 9 billion or 30 percent is to be poured into social services; P204. 2 billion or 26 percent to debt interest payments; P158. 9 billion or 21 percent to economic services; P136. 1 billion or 18 percent to general services; and P41. 5 billion or 5 percent to defense. Among government agencies, the Department of Education, Culture and Sports (DECS) had the largest share of the pie at P103 billion while the Department of National Defense (DND) got P60. billion. US$53. 4 Billion Foreign Debt The Central Bank said that as of March 2002, total foreign debt of the Philippines amounted to US$53. 4 billion. Public debt was placed at P2. 62 trillion as of June 2002. US$45 Billion in Infrastructure Needs According to the World Bank, the Philippines would need some US$35 billion to US$45 billion in fresh investments from the private sector to improve its infrastructures (roads, bridges, railways, telecommunication facilities, etc. ) over the next ten years. Two People's Revolts Fourteen years after the historic â€Å"People Power Revolution† that ousted the Marcos dictatorial rule in 1986, two people's revolts rocked Metro Manila in the first half of 2001. This was followed by several attempts to repeat the ugly May 1 mob rebellion staged by supporters of deposed President Joseph Estrada. In the absence of a legal framework governing people's revolts, political stability became harder to establish. Foreign Affairs Secretary and former Senator Blas Ople called for a â€Å"sober† examination of the people power phenomenon and warned that a fresh call to stage another revolution would threaten the country's political stability. In a Senate resolution, Senator Blas Ople urged the chamber to assess the merits of â€Å"people power† as an instrument of political change and its constitutional implications. Episode of Turbulence Even President Arroyo, who was a beneficiary of the January 2001 people's revolt, appealed for an end to what she called an episode of turbulence and threats. â€Å"In a living democracy, no group has the right to hold policy-making hostage by threatening to overthrow the executive on every issue of policy disagreement,† she said. 34 Percent Says Democracy Works The Filipino people were also dismayed. In a national survey conducted by the University of the Philippines (UP) Center for Leadership, Citizenry and Democracy in November 2001, only one of three Filipino respondents or 34 percent claimed they were satisfied with the way democracy works in the country. In contrast, about 42 percent of the respondents said otherwise. (Source: Philippine Daily Inquirer) Violent Elections A manifestation of poor peace and order situation in the Philippines is the death of at least 87 people in the barangay (village) and Sangguniang Kabataan (Youth Council) elections in July 2002. The police said another 45 individuals were injured in 183 violent confrontations among candidates and their henchmen. Ironically, the police described the situation as generally peaceful because fewer people died this year, compared with previous barangay elections. On July 15, the Filipino people elected 41,945 barangay chairmen, a similar number of youth leaders and 293,615 barangay council members. 25,000 Armed Rebels There are two major insurgency movements in the Philippines, namely: the communist insurgency and the Muslim separatist movement. According to military estimates, there were 25,000 armed rebels as of the first quarter of 2002. These included 11,930 communist guerillas, 12,500 active members of the Moro Islamic Liberation Front (MILF) and hundreds more belonging to Muslim extremist Abu Sayyaf, Abu Sufia and Pentagon groups. 347 Clashes with the Reds The Armed Forces of the Philippines (AFP) recorded 347 armed confrontations with the communist guerillas, resulting in the death of 189 rebels and 120 government soldiers in 2001. Moro Leader in Prison In November 2001, former Moro National Liberation Front (MNLF) chairman Nur Misuari who signed a peace pact with the government in 1996 broke the agreement and led another armed struggle along with his loyal supporters. He was facing sedition charges at a prison camp in Laguna province. Muslim Extremists The Abu Sayyaf (Bearers of the Sword) is a Muslim extremist group that was fighting for an independent Islamic state in Mindanao. Since 1994, it has burned a Christian town, beheaded a number of innocent civilians, abducted foreigners and planted bombs in crowded areas. The AFP claimed that it was able to reduce the Abu Sayyaf force from 4,000 in 1994 to 600 in June 2001 and to 60 in May 2002. In April 2000, the group took 21 hostages, mostly European tourists from the Sipadan Island in Sabah, Malaysia and brought them to Sulu province in Mindanao. The hostages were freed four months later upon payment of US$20 million ransom by the Libyan government. On May 27, 2001, the Abu Sayyaf abducted an American couple along with another American and 17 Filipinos from a beach resort in Palawan province. The group had beheaded the other American but freed the Filipino hostages. Some 1,000 American troops went to Mindanao to coordinate, advise and train Filipino soldiers in the rescue mission of the American couple. On June 7, 2002, American hostage Martin Burnham and Filipino nurse who was also taken by the group were killed during an encounter between the Muslim extremists and the pursuing Filipino troops in Zamboanga del Norte province. Gracia Burnham was wounded but survived. Camp Abu Bakar Falls The former Estrada administration declared an ugly all-out war against Moro Islamic Liberation Front (MILF) rebels in the year 2000. While the government was able to siege Camp Abu Bakar, the main camp of the MILF, the war resulted in numerous bombings in the south and Metro Manila. There were also summary executions of Filipino Christians in Mindanao. On May 7, 2002, the Arroyo government and the MILF signed an interim peace agreement in Putrajaya, Malaysia. While the agreement called for the government's rehabilitation and development of areas devastated by the war in 2000, it did not call for the laying down of arms by the Muslim dissidents. Cost of War: P100 Billion The World Bank said the recurring armed conflict between government soldiers and Muslim fighters would cost southwestern Mindanao over P100 billion in the next 10 years in terms of lost or stagnant investments. 2 Million Unlicensed Guns Around 2 million unlicensed guns were circulating in the Philippines on top of the 775,000 legally registered firearms. The figures were disclosed during the â€Å"Regional Seminar on Implementing the UN Program of Action on Small Arms and Light Weapons† which was held in Quezon City in July 2002. A statement issued during the seminar also claimed that the 2 million unlicensed firearms and light weapons, including pistols, rifles, machine guns, grenade launchers and shoulder-fired missiles, were responsible for the death of four million people in 46 major conflicts in the country in the 1990s. President Gloria Macapagal-Arroyo has ordered the national police to intensify the campaign against loose firearms. Reports said there are about 328,329 loose firearms nationwide. In 2002, the national police confiscated 7,633 loose firearms. The Department of Interior and Local Government said that of the 12,000 firearms used in crimes in 2002, more than 10,000 of which were unlicensed. 37,254 Index Crimes Some 37,254 index crimes were reported to the police in the year 2000 alone. The police claimed to have solved 32,445 or 87 percent of these cases. Index crimes refer to crimes committed against lives and properties. P1. 25 Billion Ransom The Citizens Action Against Crime, a non-government organization, claimed that around 2,100 people, many of them Filipino-Chinese businessmen, have become victims of kidnap-for-ransom gangs in the Philippines and paid ransom amounting to about P1. 25 billion from 1993 to 2002. The group added that in 2002 alone, kidnap victims paid a total ransom amounting to P211 million. News reports said kidnap-for-ransom syndicates victimized over 240 individuals, including 20 foreigners in 2001. In the first half of 2002, another 80 individuals, including 30 foreigners, became victims of kidnapping. While Manila-based publications tagged the Philippines as the world's kidnap capital, the Philippine National Police (PNP) quickly denied this, claiming that Colombia owns the title. 1,877 Cars Stolen The Philippine National Police (PNP) documented a total of 1,877 car theft cases in 2000. Police data showed that a total of 2,219 vehicles were reported stolen in Metro Manila in 2002. This meant that six cars were stolen in the metropolis each day and 185 cars each month in 2002. 8 Rape Victims Per Day Some 3,145 cases of rape were reported in the country in 2001. This translates to 8 cases of rape each day and one rape incident in every three hours during the year. The figure only covers rape incidents reported to the police. There were also 5,735 murder cases and 4,079 homicide incidents reported in the country in 2001 alone. 5,185 Sex Crimes Against Children According to the Social Welfare and Development, there were a total of 5,185 sex crimes committed against children in the Philippines in 2000, and 3,980 cases in 2001. Sex crimes refer to rape, incest, and acts of lasciviousness. 143 Escapees The Bureau of Jail Management reported that 143 prisoners escaped from their cells in 2000. Of these fugitives, 89 were recaptured. 25,000 Inmates The Bureau of Corrections said that in 2002, it was holding 25,002 inmates, 16,134 of whom are at the New Bilibid Prisons (NBP), which has a holding capacity of only 8,700. 314 Political Prisoners As of December 2002, the National Bilibid Prison in Muntinlupa was hosting 314 political prisoners. 239 Dismissed Cops in 2002 In the campaign against erring policemen, the national police reported that it dismissed from the service 239 commissioned and non-commissioned officers who were among the 4,447 policemen who were charged administratively for various offenses in 2002. The national police is encouraging the public to report crimes or ask for police assistance in case of emergency by sending a short messaging service (SMS) or text message to 2920. P300 Billion Illegal Drug Industry According to Interior and Local Government Secretary Joey Lina, the crime syndicates produce and trade P300-billion worth of illegal drugs in the country annually. The Dangerous Drugs Board also disclosed that some 1. 8 million Filipinos are hooked on illegal drugs while 1. 6 million others are casual users. 1. 8 Million Drug Users According to the International Narcotics Control Board, the use of methamphetamine hydrochloride or shabu has become â€Å"the most popular drug of abuse† in the Philippines. The Anti-Narcotics Group of the Philippine National Police disclosed that around 1. 8 million of the 80 million Filipinos were regular drug users. The agency also disclosed that about 70 percent of marijuana supply in the world might be coming from the Cordillera region in northern Luzon. It claimed that marijuana fields have been found among the 300,000 hectares of Cordillera farmlands in the past. In 1999, the police conducted 7,956 raids and arrested 11,004 individuals on drug-related cases. 55,000 Mail Order Brides to US According to women's group Gabriela, about 55,000 Filipino women have entered the United States as mail order brides as of 1997. Another 20,000 mail order brides went to Australia. 15 Women Beaten Daily As of 2002, militant women's group Gabriela said at least 15 women and six children are beaten up daily. In 2001, Gabriela recorded 5,668 cases of wife battering and 2,274 cases of maltreatment of children. Two-Thirds of Young Workers Had Premarital Sex A survey conducted by the Trade Union Congress of the Philippines (TUCP) in 2002 showed that 30 percent of the country's young workforce claimed to be sexually active, with 10 percent of the single male respondents claiming to have casual sex. The study titled â€Å"Issues Affecting Young Filipino Workers† also showed that 37 percent of young males have had sex with more than one partner – usually with prostitutes – prior to marriage while two-thirds of married female and male workers said they had premarital sex with the people they eventually married. In a separate report, a study conducted by the University of the Philippines Population Institute in the year 2000 showed that 23 percent of 16. 5 million Filipinos aged between 15 and 24 have engaged in premarital sex. According to the TUCP, about 6. 5 million Filipino workers were belonging to the 15 to 24 year age group as of 2002. 400,000 Prostitutes Despite the fact that prostitution is illegal in the country, women's group Gabriela said that around 400,000 Filipinos were working as prostitutes as of 1998. 100,000 Child Prostitutes According to the United Nations Children's Fund (Unicef), about 60,000 to 100,000 Filipino children were working as prostitutes as of 1997. Prostitution was present in 37 provinces then. The major child prostitution dens were found in Manila, Angeles City, Puerto Galera, Davao City and Cebu City. The Philippines has reportedly become a favorite destination of pedophiles from the US, Australia and Europe. The Department of Social Welfare and Development (DSWD) has documented 8,335 cases of child abuse from 1991 to 1996. 400,000 Abortions A study released by the University of the Philippines Population Institute in February 2003 said that there were 400,000 cases of abortion in the country each year, despite the fact that abortion is illegal here. Vagina Economy While hundreds of surviving Filipino women are still demanding justice from the Japanese government for their travails in the hands of Japanese troops who held them as sex slaves during World War 2, thousands of young Filipino women are ironically asking the Philippine government to ease the rules in the deployment of entertainers to Japan. One government agency that tried to screen the recruitment of young Filipino women as entertainers in Japan eventually found itself in deep controversy. The Technical Education and Skills Development Authority (TESDA), the country's main agency tasked to uplift standards of non-degree and non-formal skills training of Filipino workers, was under fire for allegedly delaying the issuance of certification to some 20,000 young Filipino women to work as entertainers or â€Å"overseas performing artists† in Japan in 2002. The Philippine Association of Recruitment Agencies Deploying Artists (PARADA), the association of recruitment agencies deploying young Filipino women as entertainers in Japan accused TESDA director general Dante Liban of deliberately delaying the issuance of the so-called Artist Record Books (ARB) to 20,000 prospective overseas performing artists in 2002. Applicants need an ARB to get a visa from the Japanese embassy. PARADA alleged that a group of people in TESDA were demanding P25,000 for an ARB from applicants who do not want to undergo testing. Without irregularity, the ARB is supposed to cost only P300. Because of the alleged irregularity in TESDA, PARADA claimed that 20,000 Filipino women lost the opportunity of earning US$800 a month in Japan. Data from the Philippine Overseas Employment Administration (POEA) showed that deployment of Filipino entertainers to Japan slowed to 50,000 persons in 2002 from 70,000 in 2001. But a group of Filipinos said that the single biggest controversy was not the delay in the issuance of ARBs to young Filipino women but the deployment of thousands of them to work as prostitutes or sex workers in other countries. Labor Undersecretary Lucila Lazo even went to the extent of calling it as â€Å"vagina economy†. There are around 180,000 Filipino entertainers in Japan sending US$200 million each year. Many of these women were vulnerable to abuse and some driven to prostitution by the Japanese Yakuza gang. According to the Movement for Responsible Enterprise (MORE), a civic group of concerned Filipinos, the Philippine government provided cover to save Japan from the embarrassment of hosting Filipino prostitutes. â€Å"The government made them appear like performing artists, sent to Japan as entertainers,† it added. Filipino entertainers were eventually called â€Å"Japayuki†, which was an original concoction made by Japanese media referring to young girls working as prostitutes. The Philippine government allows the deployment of Filipino women as young as 18 years old. The civic group also called on religious and militant groups to join the campaign against the continued deployment of Filipino entertainers abroad. â€Å"Let us all destroy this national disgrace. Stop the trafficking of women. Our national honor is priceless. We must defend it at all cost, at all times,† it said. P8 Billion Annual Gambling Revenues Gambling is a major social problem in the country. Not even the ouster of President Joseph Estrada from Malacanang Palace, on charges of receiving â€Å"jueteng† money from syndicates, could abate the problem. Jueteng is said to be a P40-billion business in the Philippines, annually. While declaring â€Å"jueteng† as illegal, the government promotes other forms of gambling such as casino operations, lottery and recently text games. In May 2002 alone, the Philippine Amusement and Gaming Corp. (Pagcor), the government agency tasked to collect gambling revenues, reported an income of P1. 81 billion. For the whole of 2000, Pagcor reported a net income of P8 billion, the second largest amount earned by any Philippine company in that year. Text Gambling No one seems to be bothered by the growing trend of text gambling in the Philippines. Due to the popularity of short messaging service (SMS) or text messaging in the country, broadcast stations and telecommunication companies have connived to endorse the now hugely popular text games. Here, the participants, mostly television viewers or radio listeners, put their bet in the form of a text message worth P10 each for the chance to win large prizes. Although less pronounced as a form of gambling, text gambling is no different than other number games like lottery, jai alai or jueteng. Companies Lose P3. 5 Billion to Counterfeiting According to the Brand Protection Association (BPA), a group of 15 multinational companies based in the country, their member companies lost P3. 5 billion to makers and distributors of fake brand products in the first three quarters of 2002 alone. As a result, the government also lost P1. 3 billion in potential revenues. The BPA also disclosed that the government confiscated fake goods amounting to P2. 4 billion in the first nine months of 2002 alone, up from P800 million in the whole of 1998. The BPA said that the counterfeiting and piracy problem is not limited to CD's, VCDs and computer softwares but also affects top brands of garments, bags, wallets, medicines, liquified petroleum gas (LPGs), batteries, lamps, bulbs and switches, brandy, vodka, cigarettes, soaps and shampoo, laser printer toner and ink cartridges, sofa beds, hacksaws, toys and electronic goods. About 86 makers of product lines are said to be affected by counterfeits, which are boldly sold at formal distribution channels like shopping malls, department stores and supermarkets. â€Å"Not because these companies are in on it, but because they are also fooled,† Mr. Wallace clarified. The BPA said that the fake drugs and smuggled medicines comprise 30 percent of total products in the pharmaceutical sector. The lighting sector is burdened by a 5 to 15 percent penetration of fake products while about 63 percent of softwares sold in the country is considered pirated. Most of the fake products sold in the country, the BPA added, come from China. P1. 1 billion Smuggled Fuel A study conducted by the Asian Institute of Management Policy Center (AIM-PC) suggested that some P1. 1 billion worth of diesel fuel were smuggled into the country between 1999 and 2001. Some 300,000 liters or 2,000 barrels of diesel are reportedly smuggled and sold in the country each day. The policy think tank blamed several owners of barges and tankers/trucks; ship captains and seamen; past and present officials of oil firms; owners of depots and storehouses; and importers and owners of import terminals as responsible for the smuggling. The culprits reportedly got help from officials and employees of the Bureau of Customs, the Philippine Navy and the Coast Guard. Alcohol, Most Abused Drug Liquor is said to be the most abused substance in the Philippines and the world. While there remains to be a concrete study on the effects of alcoholism, many index crimes such as homicides, physical injuries and sex-related offenses are often associated with alcohol. Adding to these are the numerous accidents caused by drunk driving. Many Filipino families were also ruined by alcoholism, with young children exposed to the evils of their drunken fathers. Sadly, the government does not do anything about it. San Miguel Corp. , a beverage conglomerate that is the top seller of beer and gin, is also the country's largest corporation. In 1998 alone, the company sold 327. 6 million bottles of beer. 1. 25 Billion Liters of Beer In 1995, Filipinos consumed 146,000 bottles of wine, making them the top wine drinkers in Asia. A more shocking report is that Filipinos consumed 1. 25 billion liters or 3. 9 billion bottles of beer in 1998 alone. In the year 2001, beverages comprised nearly 2. 3 percent of the average Filipino's expenditures. A 1994 survey conducted by the University of the Philippines showed that almost 5. 3 million or 60 per cent of Filipino youths were drinking alcoholic beverages. Of the total, 4. 2 million were males and 1. 1 million, females. A conclusion was that there were more alcoholic drinkers than smokers among Filipino youths, who were starting to drink alcohol at the age of 16 or 17 years old. 21. 6 Percent of Students Smoke A global youth tobacco survey (GYTS) in the Philippines showed that as many as 21. 6 percent of Filipino students were smoking cigarettes. The percentage was 32. 6 percent among male students and 12. 9 percent among female students. Some students believed that smoking would win them more friends and make them look cool. Tobacco comprised 2. 4 percent of the average Filipino's expenditures in 2001. 6,100 Tons of Garbage Daily According to the Metro Manila Development Authority (MMDA), the metropolis produces some 6,100 tons of garbage daily. In 2001, the total volume of recyclable materials that ended up in junkshops and recycling plants reached 120,162 metric tons. The Cost of Air Pollution The World Bank has reported that air pollution in the Philippines results in a yearly loss of US$1. 5 billion in medical treatment, lost wages, low productivity and deaths that severely impact the Filipinos' quality of life. The World Bank report also said that air pollution results in 2,000 deaths each year and causes US$1. 5 billion in lost wages, medical treatment in the four metropolis of Baguio, Manila, Cebu and Davao The World Bank also said that the country needs US$500 million (P25 billion) to implement the Clean Air Act of 1999 over the next 10 years. In its Philippines Environment Monitor 2002, the World Bank said the government spends US$400 million in health cost as a result of air pollution in four urban centers alone, namely: Metro Manila, Cebu, Davao and Baguio where about a quarter of the population lives. Such a health cost is said to be 0. 6 percent of the country's gross national product. The World Bank cited a 2001 survey showing that more than 72 percent of Metro Manila's residents were alarmed by air pollution and 73 percent said they were not aware that the government was doing anything to address it. The World Bank said air pollutants such as ozone and nitrogen oxides continue to spread. In its study, the World Bank said fine particle emissions result in about 2,000 premature deaths and 9,000 cases of chronic bronchitis in the country's four largest urban areas annually. These emissions of pollutants were largely blamed on public buses, jeepneys, utility vehicles, trucks and motorcycles that continue to emit visible smoke despite the government's anti-smoke belching campaign. As of 2001, there were 3. 9 million land vehicles in the country. 2 Million Filipinos Exposed to Tuberculosis A World Bank report in 2002 said that around 22 million Filipinos were exposed to tuberculosis. Nearly 740 Filipinos are afflicted with tuberculosis, while 68 die of the disease each day. The report added that Filipinos spend a total of P160 billion to cure the disease each year. 578 AIDS Cases The Department of Health has recorded 1,761 HIV-positive cases and 578 AIDS cases from January 1984 to Sept ember 2002. Most of these cases involved persons aged 20 to 39 years old. However, the US Central Intelligence Agency said that there were about 28,000 Filipinos infected with HIV or AIDS and that 1,200 of died in 1999 alone. P30 Trillion for Reforestation In January 2003, a study by the Green Tropics International (GTI) claimed that the Philippines would need P30 trillion to reforest country's denuded mountains in over 85 years. 2. 7 Trips by Metro Manilans Each Day Studies made by the Traffic and Engineering Center (TEC) of the Department of Public Works and Highways (DPWH) showed that as of 2002, Metro Manilans were making an average of 2. trips individually and 12 million trips collectively each day. Before this, a study by Japan International Cooperation Agency (JICA) in 1999 showed that the Philippines was losing some P140 billion annually to traffic congestion. It said the national economy was directly losing P40 billion in the forms of gasoline and diesel fuel, man-hours, electricity, salaries of traffic aides and increased expenses for mobile phon es. Indirectly, the country was losing P100 billion in the forms of lost business opportunities, depreciated value of real property and increased cause of health care due to air pollution. Cost of Traffic Problem: US$3. 6 Billion The San Francisco-based Filipinas Magazine reported that traffic congestion costs the Philippine economy some US$3. 6 billion annually. Citing a government study, the magazine said the traffic problem, particularly in Metro Manila, results in a US$1 billion loss to wasted gasoline and electricity, man-hours and hiring of traffic aides; and US$2. 6 billion to missed business opportunities, reduced sales and investment disincentives. The study added that total loss would exceed US$36 billion in ten years. It noted that the average speed of a vehicle has slowed to 12. 6 kilometers per hour today from 18 kilometers per hour ten years ago. Get-Rich-Quick Schemes If it sounds too good to be true, it usually is. This was how the corporate watchdog Securities and Exchange Commission (SEC) described the usual promise made by pseudo-investment firms in luring the public to invest substantial amount in their get-rich-quick schemes. The SEC warned that pseudo-investment firms that are not registered with the government office have already duped many investors, including foreigners and Filipino-Americans. Some victims, who have placed investments ranging from P10,000 to P50 million, were not able to recover their money and its supposed interest. The SEC has already issued cease-and-desist orders (CDOs) on the operations of several pseudo-investment firms that have been in operation without licenses. According to the corporate watchdog, some of these firms act as lending investors, investment firms, and financial companies that issue securities to the public. The companies promote their services by telephone calls, mails or personal visits and usually offer investors huge interest on every investment placed, without explaining the risks involved. They also require immediate investments. The pseudo-investment firms give promise that a minimum investment of P10,000 to P100,000 would earn a monthly interest of 15 percent. Among the promotional gimmicks of these pseudo-investments firms are seminars that use the lines â€Å"You can become a millionaire in three years† and â€Å"You can turn your financial dreams into reality†. Investors usually discover that they have been duped only when the checks issued to them bounced. Pyramiding Scam As of January 2003, the Securities and Exchange Commission (SEC), the government corporate watchdog said that investment firms engaged in the so-called pyramiding operation have duped at least 2 million Filipinos of as much as P70 billion. World's 4th Most Accident-Prone Country According to the International Red Cross and Red Crescent Societies, the Philippines was the fourth most accident prone country in the world. The two institutions arrived at this conclusion after finding out that some 5,809,986 Filipinos were killed or injured as a result of disasters or man-made calamities over a ten-year period (1992-2001). Ahead of the Philippines in the accident list were China, India and Iran. On a separate report, the Philippine National Red Cross said 31,835 Filipinos were killed and 94,369,462 others were affected by natural disasters and calamities in a span of 20 years. (Source: Philippine Daily Inquirer) Shallow Knowledge of History Congressman Edmund Reyes of Marinduque province quoted an NFO-Trends survey showing that Filipino youth had a â€Å"very shallow appreciation† of the country's history and cultural heritage. The survey showed that only 37 percent of the 1,420 respondents aged 7 to 21 years old, were able to sing the National Anthem and only 28 percent could recite â€Å"Panatang Makabayan†. When asked to name Filipino heroes, the respondents could only name up to two heroes. A Day's Labor For A Burger In 2001, the minimum daily wage in Metro Manila remained at P250, the highest among the country's 16 regions. An office worker in Makati, who was hired on a contractual basis by a job placement agency, did not receive P250 by the end of a working day. After tax, social security and other deductions were made on top of the share deductions by the agency, the office worker went home with only P200. However, he had to calculate his transportation and meal allowance that amounted to over P100. In other words, what was left in his pocket by the end of the day was less than P100. To treat himself after a hard day's work, he decided to stop by a popular fastfood restaurant. He ordered a big burger, a large can of cola and French fries. He was billed P100. Before sleeping at night, he remembered that he had to buy a new pair of shoes. He reached for his pocket and found it empty. Yet, he considered himself lucky because he was unmarried and was living with his parents who were giving him free breakfast every morning. He was lucky because he had no wife to support and no children to send to school. He was lucky because he was healthy and did not have to buy medicine. Social Problems Social Problems