The advantage of the 2004 Bankruptcy Law is that it was born when the economy was developing and the operating mechanism was strongly shifting to a market economy. This means that the high level of competition leads to more and more enterprises going bankrupt. In addition, the content of the 2004 Bankruptcy Law itself has many advances compared to the 1993 Enterprise Bankruptcy Law, which also contributes significantly to the more effective implementation of this Law in practice. Specifically:
Firstly , the concept of bankruptcy or the concept of an enterprise falling into bankruptcy has been improved. This is an important concept of Bankruptcy Law. As analyzed above, the concept of bankruptcy in the law of each country is different. Depending on this concept in bankruptcy law, the management and policy of the State towards bankruptcy is positive or negative, and is inclined to protect which side: the creditor or the debtor.
According to the 1993 Bankruptcy Law, creditors have the right to file a petition for bankruptcy if the debtor fails to pay the debt after 30 days from the date of debt collection, and the stipulation is that the debtor must pay the employee's salary for 3 consecutive months. However, in reality, creditors will never exercise their right to file a petition for bankruptcy against their debtors because they must prove that the debtor is making losses in business operations, which is beyond the ability of the creditor. The 2004 Bankruptcy Law (Article 3) introduces the concept of bankruptcy: "Enterprises and cooperatives that are unable to pay their debts when due upon request by the creditor are considered bankrupt." This is an improvement of the 2004 Bankruptcy Law in simplifying the procedures for considering bankrupt enterprises. The debtor is no longer required to prove that the debtor is making losses as before, and therefore the bankruptcy declaration procedure will be faster.
Second , the Bankruptcy Law 2004 affirms that bankruptcy proceedings are a special judicial procedure.
Bankruptcy proceedings can be divided into three main stages:
Maybe you are interested!
-
Mapreduce And Hdfs (Optimal Features Of Mapreduce When Combined With Hdfs):hdfs Is Just A Distributed File System With Management Mechanisms Inside It.
-
Mobile Phone Usage in Hanoi Inner City Area zt2i3t4l5ee zt2a3gsconsumer,consumption,consumer behavior,marketing,mobile marketing zt2a3ge zc2o3n4t5e6n7ts - Test the relationship between demographic variables and consumer behavior for Mobile Marketing activities The analysis method used is the Chi-square test (χ2), with statistical hypotheses H0 and H1 and significance level α = 0.05. In case the P index (p-value) or Sig. index in SPSS has a value less than or equal to the significance level α, the hypothesis H0 is rejected and vice versa. With this testing procedure, the study can evaluate the difference in behavioral trends between demographic groups. CHAPTER 4 RESEARCH RESULTS During two months, 1,100 survey questionnaires were distributed to mobile phone users in the inner city of Hanoi using various methods such as direct interviews, sending via email or using questionnaires designed on the Internet. At the end of the survey, after checking and eliminating erroneous questionnaires, the study collected 858 complete questionnaires, equivalent to a rate of about 78%. In addition, the research subjects of the thesis are only people who are using mobile phones, so people who do not use mobile phones are not within the scope of the thesis, therefore, the questionnaires with the option of not using mobile phones were excluded from the scope of analysis. The number of suitable survey questionnaires included in the statistical analysis was 835. 4.1 Demographic characteristics of the sample The structure of the survey sample is divided and statistically analyzed according to criteria such as gender, age, occupation, education level and personal income. (Detailed statistical table in Appendix 6) - Gender structure: Of the 835 completed questionnaires, 49.8% of respondents were male, equivalent to 416 people, and 50.2% were female, equivalent to 419 people. The survey results of the study are completely consistent with the gender ratio in the population structure of Vietnam in general and Hanoi in particular (Male/Female: 49/51). - Age structure: 36.6% of respondents are <23 years old, equivalent to 306 people. People from 23-34 years old accounting for the highest proportion: 44.8% equivalent to 374 people, people aged 35-45 and >45 are 70 and 85 people equivalent to 8.4% and 10.2% respectively. Looking at the results of this survey, we can see that the young people - youth account for a large proportion of the total number of people participating in the survey. Meanwhile, the middle-aged people including two age groups of 35 - 45 and >45 have a low rate of participation in the survey. This is completely consistent with the reality when Mobile Marketing is identified as a Marketing service aimed at young people (people under 35 years old). - Structure by educational level: among 835 valid responses, 541 respondents had university degrees, accounting for the highest proportion of ~ 75%, 102 had secondary school degrees, ~ 13.1%, and 93 had post-graduate degrees, ~ 11.9%. - Occupational structure: office workers and civil servants are the group with the highest rate of participation with 39.4%, followed by students with 36.6%. Self-employed people account for 12%, retired housewives are 7.8% and other occupational groups account for 4.2%. The survey results show that the student group has the same rate as the group aged <23 at 36.6%. This shows the accuracy of the survey data. In addition, the survey results distributed by occupational criteria have a rate almost similar to the sample division rate in chapter 3. Therefore, it can be concluded that the survey data is suitable for use in analysis activities. - Income structure: the group with income from 3 to 5 million has the highest rate with 39% of the total number of respondents. This is consistent with the income structure of Hanoi people and corresponds to the average income of the group of civil servants and office workers. Those People with no income account for 23%, income under 3 million VND accounts for 13% and income over 5 million VND accounts for 25%. 4.2 Mobile phone usage in Hanoi inner city area According to the survey results, most respondents said they had used the phone for more than 1 year, specifically: 68.4% used mobile phones from 4 to 10 years, 23.2% used from 1 to 3 years, 7.8% used for more than 10 years. Those who used mobile phones for less than 1 year accounted for only a very small proportion of ~ 0.6%. (Table 4.1) Table 4.1: Time spent using mobile phones Frequency Ratio (%) Valid Percentage Cumulative Percentage Alid <1 year 5 .6 .6 .6 1-3 years 194 23.2 23.2 23.8 4-10 years 571 68.4 68.4 92.2 >10 years 65 7.8 7.8 100.0 Total 835 100.0 100.0 The survey indexes on the time of using mobile phones of consumers in the inner city of Hanoi are very impressive for a developing country like Vietnam and also prove that Vietnamese consumers have a lot of experience using this high-tech device. Moreover, with the majority of consumers surveyed having a relatively long time of use (4-10 years), it partly proves that mobile phones have become an important and essential item in people's daily lives. When asked about the mobile phone network they are using, 31% of respondents said they are using the network of Vietel company, 29% use the network of of Mobifone company, 27% use Vinaphone company's network and 13% use networks of other providers such as E-VN telecom, S-fone, Beeline, Vietnammobile. (Figure 4.1). Figure 4.1: Mobile phone network in use Compared with the announced market share of mobile telecommunications service providers in Vietnam (Vietel: 36%, Mobifone: 29%, Vinaphone: 28%, the remaining networks: 7%), we see that the survey results do not have many differences. However, the statistics show that there is a difference in the market share of other networks because the Hanoi market is one of the two main markets of small networks, so their market share in this area will certainly be higher than that of the whole country. According to a report by NielsenMobile (2009) [8], the number of prepaid mobile phone subscribers in Hanoi accounts for 95% of the total number of subscribers, however, the results of this survey show that the percentage of prepaid subscribers has decreased by more than 20%, only at 70.8%. On the contrary, the number of postpaid subscribers tends to increase from 5% in 2009 to 19.2%. Those who are simultaneously using both types of subscriptions account for 10%. (Table 4.2). Table 4.2: Types of mobile phone subscribers Frequency Ratio (%) Valid Percentage Cumulative Percentage Valid Prepay 591 70.8 70.8 70.8 Pay later 160 19.2 19.2 89.9 Both of the above 84 10.1 10.1 100.0 Total 835 100.0 100.0 The above figures show the change in the psychology and consumption habits of Vietnamese consumers towards mobile telecommunications services, when the use of prepaid subscriptions and junk SIMs is replaced by the use of two types of subscriptions for different purposes and needs or switching to postpaid subscriptions to enjoy better customer care services. In addition, the majority of respondents have an average spending level for mobile phone services from 100 to 300 thousand VND (406 ~ 48.6% of total respondents). The high spending level (> 500 thousand VND) is the spending level with the lowest number of people with only 8.4%, on the contrary, the low spending level (under 100 thousand VND) accounts for the second highest proportion among the groups of respondents with 25.4%. People with low spending levels mainly fall into the group of students and retirees/housewives - those who have little need to use or mainly use promotional SIM cards. (Table 4.3). Table 4.3: Spending on mobile phone charges Frequency Ratio (%) Valid Percentage Cumulative Percentage Valid <100,000 212 25.4 25.4 25.4 100-300,000 406 48.6 48.6 74.0 300,000-500,000 147 17.6 17.6 91.6 >500,000 70 8.4 8.4 100.0 Total 835 100.0 100.0 The statistics in Table 4.3 are similar to the percentages in the NielsenMobile survey results (2009) with 73% of mobile phone users having medium spending levels and only 13% having high spending levels. The survey results also showed that up to 31% ~ nearly one-third of respondents said they sent more than 10 SMS messages/day, meaning that on average they sent 1 SMS message for every working hour. Those with an average SMS message volume (from 3 to 10 messages/day) accounted for 51.1% and those with a low SMS message volume (less than 3 messages/day) accounted for 17%. (Table 4.4) Table 4.4: Number of SMS messages sent per day Frequency Ratio (%) Valid Percentage Cumulative Percentage Valid <3 news 142 17.0 17.0 17.0 3-10 news 427 51.1 51.1 68.1 >10 news 266 31.9 31.9 100.0 Total 835 100.0 100.0 Similar to sending messages, those with an average message receiving rate (from 3-10 messages/day) accounted for the highest percentage of ~ 55%, followed by those with a high number of messages (over 10 messages/day) ~ 24% and those with a low number of messages received daily (under 3 messages/day) remained at the bottom with 21%. (Table 4.5) Table 4.5: Number of SMS messages received per day Frequency Ratio (%) Valid Percentage Cumulative Percentage Valid <3 news 175 21.0 21.0 21.0 3-10 news 436 55.0 55.0 76.0 >10 news 197 24.0 24.0 100.0 Total 835 100.0 100.0 When comparing the data of the two result tables 4.4 and 4.5, we can see the reasonableness between the ratio of the number of messages sent and the number of messages received daily by the interview participants. 4.3 Current status of SMS advertising and Mobile Marketing According to the interview results, in the 3 months from the time of the survey and before, 94% of respondents, equivalent to 785 people, said they received advertising messages, while only a very small percentage of 6% (only 50 people) did not receive advertising messages (Table 4.6). Table 4.6: Percentage of people receiving advertising messages in the last 3 months Frequency Ratio (%) Valid Percentage Cumulative Percentage Valid Have 785 94.0 94.0 94.0 Are not 50 6.0 6.0 100.0 Total 835 100.0 100.0 The results of Table 4.6 show that consumers in the inner city of Hanoi are very familiar with advertising messages. This result is also the basis for assessing the knowledge, experience and understanding of the respondents in the interview. This is also one of the important factors determining the accuracy of the survey results. In addition, most respondents said they had received promotional messages, but only 24% of them had ever taken the action of registering to receive promotional messages, while 76% of the remaining respondents did not register to receive promotional messages but still received promotional messages every day. This is the first sign indicating the weaknesses and shortcomings of lax management of this activity in Vietnam. (Table 4.7) div.maincontent .s1 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s2 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s3 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent .s4 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: 6pt; } div.maincontent .s5 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s6 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s7 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s8 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s9 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s10 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 12pt; } div.maincontent .s11 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 14pt; } div.maincontent .s12 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s13 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s14 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 13pt; } div.maincontent .s15 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: 6pt; } div.maincontent .s16 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 5.5pt; vertical-align: 3pt; } div.maincontent .s17 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 8.5pt; } div.maincontent .s18 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; font-size: 14pt; } div.maincontent .s19 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; font-size: 14pt; } div.maincontent .s20 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s21 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s22 { color: black; font-family:"Courier New", monospace; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s23 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s24 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s25 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s26 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s27 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 1.5pt; } div.maincontent .s28 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 11pt; } div.maincontent .s29 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 13pt; } div.maincontent .s30 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 13pt; } div.maincontent .s31 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s32 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10.5pt; } div.maincontent .s33 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 11pt; } div.maincontent .s35 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 10.5pt; } div.maincontent .s36 { color: #F00; font-family:Arial, sans-serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 10.5pt; } div.maincontent .s37 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 10.5pt; } div.maincontent .s38 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 8.5pt; vertical-align: 5pt; } div.maincontent .s39 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10.5pt; } div.maincontent .s40 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 7pt; vertical-align: 4pt; } div.maincontent .s41 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 10.5pt; } div.maincontent .s42 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 11pt; } div.maincontent .s43 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 7.5pt; vertical-align: 5pt; } div.maincontent .s44 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 7pt; vertical-align: 5pt; } div.maincontent .s45 { color: #F00; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 10.5pt; } div.maincontent .s46 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 7pt; vertical-align: 5pt; } div.maincontent .s47 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 11pt; } div.maincontent .s48 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s49 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: -2pt; } div.maincontent .s50 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9.5pt; } div.maincontent .s51 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: -1pt; } div.maincontent .s52 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: -2pt; } div.maincontent .s53 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s54 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9.5pt; vertical-align: -1pt; } div.maincontent .s55 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10.5pt; } div.maincontent .s56 { color: #00F; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 14pt; } div.maincontent .s57 { color: #00F; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s58 { color: #00F; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 14pt; } div.maincontent .s59 { color: #00F; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s60 { color: #00F; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; font-size: 13pt; } div.maincontent .s61 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s62 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s63 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .content_head2 { color: #F00; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s64 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 13pt; } div.maincontent .s67 { color: black; font-family:Arial, sans-serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9.5pt; } div.maincontent .s68 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 12pt; } div.maincontent .s69 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 12pt; } div.maincontent .s70 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; tex
-
Qos Assurance Methods for Multimedia Communications zt2i3t4l5ee zt2a3gs zt2a3ge zc2o3n4t5e6n7ts low. The EF PHB requires a sufficiently large number of output ports to provide low delay, low loss, and low jitter. EF PHBs can be implemented if the output port's bandwidth is sufficiently large, combined with small buffer sizes and other network resources dedicated to EF packets, to allow the router's service rate for EF packets on an output port to exceed the arrival rate λ of packets at that port. This means that packets with PHB EF are considered with a pre-allocated amount of output bandwidth and a priority that ensures minimum loss, minimum delay and minimum jitter before being put into operation. PHB EF is suitable for channel simulation, leased line simulation, and real-time services such as voice, video without compromising on high loss, delay and jitter values. Figure 2.10 Example of EF installation Figure 2.10 shows an example of an EF PHB implementation. This is a simple priority queue scheduling technique. At the edges of the DS domain, EF packet traffic is prioritized according to the values agreed upon by the SLA. The EF queue in the figure needs to output packets at a rate higher than the packet arrival rate λ. To provide an EF PHB over an end-to-end DS domain, bandwidth at the output ports of the core routers needs to be allocated in advance to ensure the requirement μ > λ. This can be done by a pre-configured provisioning process. In the figure, EF packets are placed in the priority queue (the upper queue). With such a length, the queue can operate with μ > λ. Since EF was primarily used for real-time services such as voice and video, and since real-time services use UDP instead of TCP, RED is generally not suitable for EF queues because applications using UDP will not respond to random packet drop and RED will strip unnecessary packets. 2.2.4.2 Assured Forwarding (AF) PHB PHB AF is defined by RFC 2597. The purpose of PHB AF is to deliver packets reliably and therefore delay and jitter are considered less important than packet loss. PHB AF is suitable for non-real-time services such as applications using TCP. PHB AF first defines four classes: AF1, AF2, AF3, AF4. For each of these AF classes, packets are then classified into three subclasses with three distinct priority levels. Table 2.8 shows the four AF classes and 12 AF subclasses and the DSCP values for the 12 AF subclasses defined by RFC 2597. RFC 2597 also allows for more than three separate priority levels to be added for internal use. However, these separate priority levels will only have internal significance. PHB Class PHB Subclass Package type DSCP AF4 AF41 Short 100010 AF42 Medium 100100 AF43 High 100110 AF3 AF31 Short 011010 AF32 Medium 011100 AF33 High 011110 AF2 AF21 Short 010010 AF22 Medium 010100 AF23 High 010110 AF1 AF11 Short 001010 AF12 Medium 001100 AF13 High 001110 Table 2.8 AF DSCPs The AF PHB ensures that packets are forwarded with a high probability of delivery to the destination within the bounds of the rate agreed upon in an SLA. If AF traffic at an ingress port exceeds the pre-priority rate, which is considered non-compliant or “out of profile”, the excess packets will not be delivered to the destination with the same probability as the packets belonging to the defined traffic or “in profile” packets. When there is network congestion, the out of profile packets are dropped before the in profile packets are dropped. When service levels are defined using AF classes, different quantity and quality between AF classes can be realized by allocating different amounts of bandwidth and buffer space to the four AF classes. Unlike EF, most AF traffic is non-real-time traffic using TCP, and the RED queue management strategy is an AQM (Adaptive Queue Management) strategy suitable for use in AF PHBs. The four AF PHB layers can be implemented as four separate queues. The output port bandwidth is divided into four AF queues. For each AF queue, packets are marked with three “colors” corresponding to three separate priority levels. In addition to the 32 DSCP 1 groups defined in Table 2.8, 21 DSCPs have been standardized as follows: one for PHB EF, 12 for PHB AF, and 8 for CSCP. There are 11 DSCP 1 groups still available for other standards. 2.2.5.Example of Differentiated Services We will look at an example of the Differentiated Service model and mechanism of operation. The architecture of Differentiated Service consists of two basic sets of functions: Edge functions: include packet classification and traffic conditioning. At the inbound edge of the network, incoming packets are marked. In particular, the DS field in the packet header is set to a certain value. For example, in Figure 2.12, packets sent from H1 to H3 are marked at R1, while packets from H2 to H4 are marked at R2. The labels on the received packets identify the service class to which they belong. Different traffic classes receive different services in the core network. The RFC definition uses the term behavior aggregate rather than the term traffic class. After being marked, a packet can be forwarded immediately into the network, delayed for a period of time before being forwarded, or dropped. We will see that there are many factors that affect how a packet is marked, and whether it is forwarded immediately, delayed, or dropped. Figure 2.12 DiffServ Example Core functionality: When a DS-marked packet arrives at a Diffservcapable router, the packet is forwarded to the next router based on Per-hop behavior is associated with packet classes. Per-hop behavior affects router buffers and the bandwidth shared between competing classes. An important principle of the Differentiated Service architecture is that a router's per-hop behavior is based only on the packet's marking or the class to which it belongs. Therefore, if packets sent from H1 to H3 as shown in the figure receive the same marking as packets from H2 to H4, then the network routers treat the packets exactly the same, regardless of whether the packet originated from H1 or H2. For example, R3 does not distinguish between packets from h1 and H2 when forwarding packets to R4. Therefore, the Differentiated Service architecture avoids the need to maintain router state about separate source-destination pairs, which is important for network scalability. Chapter Conclusion Chapter 2 has presented and clarified two main models of deploying and installing quality of service in IP networks. While the traditional best-effort model has many disadvantages, later models such as IntServ and DiffServ have partly solved the problems that best-effort could not solve. IntServ follows the direction of ensuring quality of service for each separate flow, it is built similar to the circuit switching model with the use of the RSVP resource reservation protocol. IntSer is suitable for services that require fixed bandwidth that is not shared such as VoIP services, multicast TV services. However, IntSer has disadvantages such as using a lot of network resources, low scalability and lack of flexibility. DiffServ was born with the idea of solving the disadvantages of the IntServ model. DiffServ follows the direction of ensuring quality based on the principle of hop-by-hop behavior based on the priority of marked packets. The policy for different types of traffic is decided by the administrator and can be changed according to reality, so it is very flexible. DiffServ makes better use of network resources, avoiding idle bandwidth and processing capacity on routers. In addition, the DifServ model can be deployed on many independent domains, so the ability to expand the network becomes easy. Chapter 3: METHODS TO ENSURE QoS FOR MULTIMEDIA COMMUNICATIONS In packet-switched networks, different packet flows often have to share the transmission medium all the way to the destination station. To ensure the fair and efficient allocation of bandwidth to flows, appropriate serving mechanisms are required at network nodes, especially at gateways or routers, where many different data flows often pass through. The scheduler is responsible for serving packets of the selected flow and deciding which packet will be served next. Here, a flow is understood as a set of packets belonging to the same priority class, or originating from the same source, or having the same source and destination addresses, etc. In normal state when there is no congestion, packets will be sent as soon as they are delivered. In case of congestion, if QoS assurance methods are not applied, prolonged congestion can cause packet drops, affecting service quality. In some cases, congestion is prolonged and widespread in the network, which can easily lead to the network being "frozen", or many packets being dropped, seriously affecting service quality. Therefore, in this chapter, in sections 3.2 and 3.3, we introduce some typical network traffic load monitoring techniques to predict and prevent congestion before it occurs through the measure of dropping (removing) packets early when there are signs of impending congestion. 3.1. DropTail method DropTail is a simple, traditional queue management method based on FIFO mechanism. All incoming packets are placed in the queue, when the queue is full, the later packets are dropped. Due to its simplicity and ease of implementation, DropTail has been used for many years on Internet router systems. However, this algorithm has the following disadvantages: − Cannot avoid the phenomenon of “Lock out”: Occurs when 1 or several traffic streams monopolize the queue, making packets of other connections unable to pass through the router. This phenomenon greatly affects reliable transmission protocols such as TCP. According to the anti-congestion algorithm, when locked out, the TCP connection stream will reduce the window size and reduce the packet transmission speed exponentially. − Can cause Global Synchronization: This is the result of a severe “Lock out” phenomenon. Some neighboring routers have their queues monopolized by a number of connections, causing a series of other TCP connections to be unable to pass through and simultaneously reducing the transmission speed. After those monopolized connections are temporarily suspended, Once the queue is cleared, it takes a considerable amount of time for TCP connections to return to their original speed. − Full Queue phenomenon: Data transmitted on the Internet often has an explosion, packets arriving at the router are often in clusters rather than in turn. Therefore, the operating mechanism of DropTail makes the queue easily full for a long period of time, leading to the average delay time of large packets. To avoid this phenomenon, with DropTail, the only way is to increase the router's buffer, this method is very expensive and ineffective. − No QoS guarantee: With the DropTail mechanism, there is no way to prioritize important packets to be transmitted through the router earlier when all are in the queue. Meanwhile, with multimedia communication, ensuring connection and stable speed is extremely important and the DropTail algorithm cannot satisfy. The problem of choosing the buffer size of the routers in the network is to “absorb” short bursts of traffic without causing too much queuing delay. This is necessary in bursty data transmission. The queue size determines the size of the packet bursts (traffic spikes) that we want to be able to transmit without being dropped at the routers. In IP-based application networks, packet dropping is an important mechanism for indirectly reporting congestion to end stations. A solution that prevents router queues from filling up while reducing the packet drop rate is called dynamic queue management. 3.2. Random elimination method – RED 3.2.1 Overview RED (Random Early Detection of congestion; Random Early Drop) is one of the first AQM algorithms proposed in 1993 by Sally Floyd and Van Jacobson, two scientists at the Lawrence Berkeley Laboratory of the University of California, USA. Due to its outstanding advantages compared to previous queue management algorithms, RED has been widely installed and deployed on the Internet. The most fundamental point of their work is that the most effective place to detect congestion and react to it is at the gateway or router. Source entities (senders) can also do this by estimating end-to-end delay, throughput variability, or the rate of packet retransmissions due to drop. However, the sender and receiver view of a particular connection cannot tell which gateways on the network are congested, and cannot distinguish between propagation delay and queuing delay. Only the gateway has a true view of the state of the queue, the link share of the connections passing through it at any given time, and the quality of service requirements of the traffic flows. The RED gateway monitors the average queue length, which detects early signs of impending congestion (average queue length exceeding a predetermined threshold) and reacts appropriately in one of two ways: − Drop incoming packets with a certain probability, to indirectly inform the source of congestion, the source needs to reduce the transmission rate to keep the queue from filling up, maintaining the ability to absorb incoming traffic spikes. − Mark “congestion” with a certain probability in the ECN field in the header of TCP packets to notify the source (the receiving entity will copy this bit into the acknowledgement packet). Figure 3. 1 RED algorithm The main goal of RED is to avoid congestion by keeping the average queue size within a sufficiently small and stable region, which also means keeping the queuing delay sufficiently small and stable. Achieving this goal also helps: avoid global synchronization, not resist bursty traffic flows (i.e. flows with low average throughput but high volatility), and maintain an upper bound on the average queue size even in the absence of cooperation from transport layer protocols. To achieve the above goals, RED gateways must do the following: − The first is to detect congestion early and react appropriately to keep the average queue size small enough to keep the network operating in the low latency, high throughput region, while still allowing the queue size to fluctuate within a certain range to absorb short-term fluctuations. As discussed above, the gateway is the most appropriate place to detect congestion and is also the most appropriate place to decide which specific connection to report congestion to. − The second thing is to notify the source of congestion. This is done by marking and notifying the source to reduce traffic. Normally the RED gateway will randomly drop packets. However, if congestion If congestion is detected before the queue is full, it should be combined with packet marking to signal congestion. The RED gateway has two options: drop or mark; where marking is done by marking the ECN field of the packet with a certain probability, to signal the source to reduce the traffic entering the network. − An important goal that RED gateways need to achieve is to avoid global synchronization and not to resist traffic flows that have a sudden characteristic. Global synchronization occurs when all connections simultaneously reduce their transmission window size, leading to a severe drop in throughput at the same time. On the other hand, Drop Tail or Random Drop strategies are very sensitive to sudden flows; that is, the gateway queue will often overflow when packets from these flows arrive. To avoid these two phenomena, gateways can use special algorithms to detect congestion and decide which connections will be notified of congestion at the gateway. The RED gateway randomly selects incoming packets to mark; with this method, the probability of marking a packet from a particular connection is proportional to the connection's shared bandwidth at the gateway. − Another goal is to control the average queue size even without cooperation from the source entities. This can be done by dropping packets when the average size exceeds an upper threshold (instead of marking it). This approach is necessary in cases where most connections have transmission times that are less than the round-trip time, or where the source entities are not able to reduce traffic in response to marking or dropping packets (such as UDP flows). 3.2.2 Algorithm This section describes the algorithm for RED gateways. RED gateways calculate the average queue size using a low-pass filter. This average queue size is compared with two thresholds: minth and maxth. When the average queue size is less than the lower threshold, no incoming packets are marked or dropped; when the average queue size is greater than the upper threshold, all incoming packets are dropped. When the average queue size is between minth and maxth, each incoming packet is marked or dropped with a probability pa, where pa is a function of the average queue size avg; the probability of marking or dropping a packet for a particular connection is proportional to the bandwidth share of that connection at the gateway. The general algorithm for a RED gateway is described as follows: [5] For each packet arrival Caculate the average queue size avg If minth ≤ avg < maxth div.maincontent .s1 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 15pt; } div.maincontent .s2 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 15pt; } div.maincontent .p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; } div.maincontent .s3 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s4 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s5 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s6 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s7 { color: black; font-family:Wingdings; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; } div.maincontent .s8 { color: black; font-family:Arial, sans-serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 15pt; } div.maincontent .s9 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; } div.maincontent .s10 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9pt; vertical-align: 6pt; } div.maincontent .s11 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; } div.maincontent .s12 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10pt; } div.maincontent .s13 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-d
-
The Preposition “Auf” Viewed From a Cognitive Perspective Compared with Vietnamese
-
Example Illustrating a Summary of an English Text
+ First stage: The stage of investigating the enterprise's ability to pay its debts. In this stage, if the debtor does not want to fall into the next stage, he must prove to the Court his ability to pay his debts. If the Court finds that the debtor is no longer able to pay the debt when due, the next stage will be applied immediately.
+ Second stage: Stage of resolving the request for bankruptcy declaration. This stage mainly focuses on developing a reconciliation plan to restore the business operations of the enterprise. If reconciliation is not possible or the reconciliation plan is not implemented successfully, the Court will move on to the next stage.
+ Third stage: Bankruptcy and liquidation of business assets.
In bankruptcy proceedings, the tasks of the constituent procedures are largely independent of each other. Performing the tasks of one procedure is not always a prerequisite for performing the tasks of another procedure. For example, the tasks of the business recovery procedure are completely different from the tasks of the asset liquidation procedure, and performing the tasks of the recovery procedure is not a prerequisite for the asset liquidation procedure but may eliminate the need for the asset liquidation procedure itself...
The progress recorded in the 2004 Bankruptcy Law is the provisions on the specific relationship between the constituent procedures in the bankruptcy procedure. This allows the Court to resolve the request for bankruptcy declaration flexibly depending on the specific situation. The Court can decide to declare bankruptcy to the debtor immediately without accepting the bankruptcy declaration request (Clause 1, Article 87 of the 2004 Bankruptcy Law) or after accepting it (Clause 2, Article 87) or when suspending the asset liquidation procedure (Article 86). The rehabilitation procedure is no longer a mandatory procedure before the asset liquidation procedure in the process of resolving the bankruptcy declaration request. Not only that, when the task of this procedure cannot be performed or is performed unsuccessfully, it can be converted to the asset liquidation procedure immediately (Articles 79, 80).
2. Difficulties and shortcomings.
2.1. The scope of subjects entitled to file a petition for bankruptcy declaration is still too narrow.
Bankruptcy law is primarily to protect the property rights of creditors. Therefore, the subjects entitled to file a petition to open bankruptcy proceedings for enterprises and cooperatives are creditors. According to the provisions of the Bankruptcy Law 2004, there are three types of creditors: secured creditors, partially secured creditors and unsecured creditors.
Article 6 (Bankruptcy Law 2004) stipulates:
+ A partially secured creditor is a creditor whose debt is secured by the value of an enterprise, cooperative or third party whose security value is less than that debt.
+ A secured creditor is a creditor whose debt is secured by the value of an enterprise, cooperative or third party whose security value is equal to that debt.
+ An unsecured creditor is a creditor whose debt is not secured by any value of the enterprise or cooperative.
According to the 2004 Bankruptcy Law, only three entities have the right to request bankruptcy proceedings: bankrupt enterprises or cooperatives, creditors and representatives of employees. However, only unsecured creditors and partially secured creditors can file a petition, while secured creditors and public authorities such as the Court, Inspectorate, Tax Department, etc. do not have this right. In reality, creditors in our country rarely file a petition for bankruptcy or if they do, it is for other purposes than protecting their rights. They often seek measures to recover debts, which they think is easier, while filing a petition for bankruptcy is both time-consuming and sometimes impossible because the assets of a indebted enterprise are very small while the creditors are numerous.
2.2. Bankruptcy settlement procedures are still prolonged.
In addition to the reason that the feasibility of bankruptcy law is not high, when conducting a bankruptcy case, the related parties (insolvent enterprises, creditors, and the Court) carry out the steps according to the bankruptcy law slowly and uncooperatively, leading to the time to resolve a bankruptcy case in our country often lasting at least one year instead of the four to six months expected by law.
The case of Tamexco Company in Ho Chi Minh City took more than 3 years from the time it filed its bankruptcy petition until it was declared bankrupt by the court. This discouraged related parties such as creditors, employees, and even competent State agencies such as the Court.
One of the main reasons for this delay is due to weaknesses in the corporate finance implementation regime. Currently, the legal provisions on auditing are very diverse and related to auditing when an enterprise falls into bankruptcy, there are at least the following documents: Decree No. 189/CP dated December 23, 1994 guiding the implementation of the Enterprise Bankruptcy Law 1993 (Article 11); Law on State-owned Enterprises 2003 (Article 89); Law on Enterprises 1999 (Article 92); Decree 105/2004/ND-CP dated March 30, 2004 on independent auditing (Article 10), all of which contain the content that annual reports of companies and enterprises must be audited. Therefore, how to apply these documents consistently is a difficulty that often occurs in practice, for example:
Point a, Clause 4, Article 15 of the Bankruptcy Law 2004 stipulates: “report on the business performance of the enterprise or cooperative, explaining the causes and circumstances related to the insolvency; if the enterprise is a joint stock company that is required by law to be audited, the financial statements must be audited by an independent audit organization”, while Clause 2, Article 4 of the Bankruptcy Law 2004 stipulates: “ In case there is a difference between the provisions of the Bankruptcy Law and the provisions of other laws on the same issue, the provisions of the Bankruptcy Law shall apply ”.
However, applying this regulation, when receiving a request to open bankruptcy proceedings (regardless of economic sector), local courts require that the annual financial report of the enterprise be audited. If available, the application will be accepted for settlement. If the financial report has not been audited, the application will be returned. Therefore, the time for accepting and settling a request to declare bankruptcy is often prolonged due to waiting for an audit. This leads to the consequence that transactions made within 03 months before the date the Court accepts the request to open bankruptcy proceedings are considered invalid according to Clause 1, Article 43 of the Bankruptcy Law 2004.
2.3. Many enterprises and cooperatives fall into bankruptcy without filing for bankruptcy because the provisions in the 2004 Bankruptcy Law are not yet specific.
In fact, many businesses know that they are in bankruptcy but do not file for bankruptcy. This is also the main reason why the number of businesses declared bankrupt is very small.
In addition to bankruptcy, businesses can also choose another path, which is dissolution or abandonment. Compared to bankruptcy, dissolution is a quicker way to end a company's operations. In addition, the director of the company that conducts dissolution can still continue to establish a business or run another company, but if they choose bankruptcy, they cannot. Many companies choose the safe measure of "doing nothing". For example, the Agricultural and Forestry Construction and Import-Export Company has been insolvent since 2004 and has not yet declared bankruptcy. The Agricultural and Forestry Construction and Import-Export Company is a company under the Hanoi Department of Agriculture and Rural Development with 9 member enterprises, 5 branches in the provinces and 5 functional and professional departments. In a short time, the company has been involved in two criminal cases, and now only one building remains at No. 01, Lane 1002, Lang Street, Dong Da District, Hanoi, and two security guards along with a number of other key positions. Some foreign businesses operating in Vietnam have fled back to their home countries when their businesses have suffered losses. Two businesses, Anjin Shoes Co., Ltd. and Vina Haeng Woon Industry Co., Ltd. (in Ho Chi Minh City) managed by Korean businessmen, have fled when their businesses have suffered losses.
went bankrupt, leaving hundreds of Vietnamese workers unemployed, without paying salaries and insurance.
3. Causes of shortcomings in the implementation of the 2004 Bankruptcy Law
The 2004 Bankruptcy Law was amended a lot compared to the 1994 Enterprise Bankruptcy Law, but in practice, the application of the law encountered many difficulties and inadequacies due to the following reasons:
3.1 The law's feasibility is not high
For state-owned enterprises, bankruptcy or not depends too much on the owner, that is, the Ministry or the Provincial People's Committee, which is the governing body of the enterprise. For some reasons, both collective reasons and personal reasons of some people, and it is not excluded that because of the incorrect perception of some business leaders, because of their own achievement motives, of a minority of people, they delay or prolong the bankruptcy of the enterprise when the enterprise has lost its ability to pay.
Even if a business wants to file a petition to open bankruptcy proceedings without the consent of the competent authority, it cannot do so. Furthermore, according to regulations, only non-state enterprises are bound by the request to open bankruptcy proceedings, while for state-owned enterprises, this obligation is considered a right. In the current context, it is clear that doing so is creating conditions for businesses to avoid bankruptcy.
For business owners themselves, due to various personal motives, they do not report or file for bankruptcy when the business has lost its ability to pay its debts. People avoid responsibility by retiring or waiting for a transfer to a new workplace, while others who replace them will be the ones who have to deal with the consequences that should have been their fault. In many cases, when a business files a petition to open bankruptcy proceedings with the Court, the business is left with only a house, an empty or insignificant account, only a few security guards to look after the counselors, and the workers have long since left to make a living.
Another reason is that the opportunity cost of bankruptcy for a business is too large compared to the benefits that the business receives. The biggest benefit here is that after being declared bankrupt, the business will no longer have to worry about paying debts (except for private businesses), and for businesses that are able to recover, they will be given the opportunity to repair and operate again. Meanwhile, in return for the above benefits, businesses have to face many troubles. In addition to having to make six different reports for the court, businesses have to pay advance bankruptcy costs and waste time. If done smoothly, just the period from opening bankruptcy proceedings to opening asset liquidation proceedings will take at least six months. But in reality, successful bankruptcies also take at least more than a year. In addition, according to the regulations, bankrupt business owners and business managers will be banned by the court from establishing businesses and from holding managerial positions for one to three years from the date the business is declared bankrupt. This regulation has also affected the mentality of businesses that are facing bankruptcy and do not want to file for bankruptcy.
Creditors are also not interested in filing a petition to open bankruptcy proceedings against their debtors. The reason is that according to regulations, when a business opens bankruptcy proceedings, it is mandatory to publicly notify all creditors. From here, creditors develop a mentality of preventing creditors from going to court by filing a petition to declare bankruptcy: if a petition is filed, it is easy for the business to become bankrupt and debtors to flock to it, then the creditors' own rights may not be in their turn, so it is better to stay silent and find a way to collect the debt or sue in a separate lawsuit, which still has the possibility of recovery.
3.2 Documents guiding the implementation of the law are still slow.
The documents guiding the implementation of the law are still slow, the content of the instructions is not suitable for reality or is too general, making it difficult for researchers to apply the law. For example, the Bankruptcy Law of 2004 was passed on June 15, 2004, effective from October 15, 2004, but it was not until July 11, 2006 that the Government issued a Decree guiding the activities of asset management and liquidation teams, leading to
The psychology of waiting, fear of making mistakes and not daring to do anything, is also the main reason why in the whole year of 2005, the whole country's Court sector was only able to resolve one bankruptcy case.
Up to now, to implement LPS 2004, the following sub-law documents have been issued:
+ Decision No. 01/2005/QD-TANDTC/KHXX dated April 27, 2005 of the Chief Justice of the Supreme People's Court on the Working Regulations of the Panel of Judges in charge of conducting bankruptcy proceedings.
+ Resolution No. 03/2005/ND-HDTP dated April 28, 2005 of the Council of Judges of the Supreme People's Court guiding the implementation of a number of provisions of the Bankruptcy Law.
+ Decree No. 94/2005/ND-CP dated July 11, 2006 of the Government guiding the application of the Bankruptcy Law to special enterprises and the organization of the operation of the Asset Management and Liquidation Team.
+ Joint Circular No. 19/2008/TTLT-BTC-BTP dated February 19, 2008 of the Ministry of Finance - Ministry of Justice guiding the establishment, management, use and determination of funds to ensure the operation of civil judgment enforcement agencies and the Asset Management and Liquidation Team of bankrupt enterprises and cooperatives.
In addition, many documents are still in the process of research. For example, the document guiding the Bankruptcy Law on the specific recovery and handling of assets to suit the specific nature of bankruptcy because it is fundamentally different when handling mortgaged assets, assets seized to ensure the enforcement of civil judgments against individuals, households, or businesses that are not in bankruptcy has not yet been built.
II. Application of the 2004 Bankruptcy Law in Hanoi City
1. Practical application of regulations on resolving requests to open bankruptcy proceedings for enterprises in Hanoi city and issues raised.
Hanoi and Ho Chi Minh City are the two cities with the largest concentration of enterprises and cooperatives in the country. This also means that the number of bankruptcies in these two cities is much larger than in other provinces and cities. Below