The Shellcoder's Handbook
The Shellcoder's Handbook
The Shellcoders
Handbook
Discovering and Exploiting Security Holes
Second Edition
Chris Anley
John Heasman
Felix FX Linder
Gerardo Richarte
The Shellcoders Handbook: Discovering and Exploiting Security Holes
(1st Edition) was written by Jack Koziol, David Litchfield, Dave Aitel,
Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassell.
The Shellcoders
Handbook
Discovering and Exploiting Security Holes
Second Edition
Chris Anley
John Heasman
Felix FX Linder
Gerardo Richarte
The Shellcoders Handbook: Discovering and Exploiting Security Holes
(1st Edition) was written by Jack Koziol, David Litchfield, Dave Aitel,
Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassell.
The Shellcoders Handbook, Second Edition: Discovering and Exploiting Security Holes
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright 2007 by Chris Anley, John Heasman, Felix FX Linder, and Gerardo Richarte
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-0-470-08023-8
10 9 8 7 6 5 4 3 2 1
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy fee
to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978)
646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley
Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or
online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or
warranties with respect to the accuracy or completeness of the contents of this work and specifically
disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No
warranty may be created or extended by sales or promotional materials. The advice and strategies con-
tained herein may not be suitable for every situation. This work is sold with the understanding that the
publisher is not engaged in rendering legal, accounting, or other professional services. If professional
assistance is required, the services of a competent professional person should be sought. Neither the
publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or
Website is referred to in this work as a citation and/or a potential source of further information does not
mean that the author or the publisher endorses the information the organization or Website may provide
or recommendations it may make. Further, readers should be aware that Internet Websites listed in this
work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please con-
tact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993
or fax (317) 572-4002.
QA76.9.A25S464 2007
005.8 dc22
2007021079
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons,
Inc. and/or its affiliates, in the United States and other countries, and may not be used without written
permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is
not associated with any product or vendor mentioned in this book.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may
not be available in electronic books.
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page v
vii
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page viii
you to the community, he has published some technical papers and open
source projects, presented in a few conferences, and released part of his train-
ing material. He really enjoys solving tough problems and reverse engineering
any piece of code that falls in his reach just for the fun of doing it.
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page ix
Credits
ix
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page x
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page xi
Acknowledgments
I would first like to thank all of the people that have made this book possi-
ble the (many) authors, of course: Gerardo Richarte, Felix FX Linder, John
Heasman, Jack Koziol, David Litchfield, Dave Aitel, Sinan Eren, Neel Mehta, and
Riley Hassell. Huge thanks are also due to the team at Wiley our excellent
Executive Editor Carol Long and our equally excellent Development Editor
Kevin Kent. On a personal note Id like to thank the team at NGS for a great
many hangovers, technical discussions, hangovers, ideas, and hangovers.
Finally, Id like to thank my wife Victoria for her enduring patience, love, and
gorgeousness.
Chris Anley
I would like to thank my friends and family for their unwavering support.
John Heasman
I would like to thank my friends from Phenoelit, who are still with me despite
the turns and detours life takes and despite the strange ideas I have, technical
and otherwise. Special thanks in this context go to Mumpi, who is a very good
friend and my invaluable support in all kinds of activities. Additional thanks
and kudos go to the SABRE Labs team as well as to Halvar Flake, who is
responsible for the existence of this team in the first place. Last but not least, I
thank Bine for enduring me on a daily basis.
Felix FX Linder
I want to thank those in the community who share what excites them, their
ideas and findings, especially the amazing people at Core, past and present,
and my pals in the exploit writing team with whom the sudden discovery
xi
80238ffirs.qxd:WileyRed 7/12/07 6:28 AM Page xii
xii Acknowledgments
never ends it is quite often simple and enlightening. I also want to thank
Chris and John (co-authors) and Kevin Kent from Wiley Publishing, who all
took the time to go through my entangled English, turning it more than just
readable. And I want to thank Chinchin, my love, whos always by my side,
asking me questions when I need them, listening when I talk or am quiet, and
supporting me, always.
Gerardo Richarte
80238ftoc.qxd:WileyRed 7/11/07 7:22 AM Page xiii
Contents
xiii
80238ftoc.qxd:WileyRed 7/11/07 7:22 AM Page xiv
xiv Contents
Chapter 3 Shellcode 41
Understanding System Calls 42
Writing Shellcode for the exit() Syscall 44
Injectable Shellcode 48
Spawning a Shell 50
Conclusion 59
Chapter 4 Introduction to Format String Bugs 61
Prerequisites 61
What Is a Format String? 61
What Is a Format String Bug? 63
Format String Exploits 68
Crashing Services 69
Information Leakage 70
Controlling Execution for Exploitation 75
Why Did This Happen? 84
Format String Technique Roundup 85
Conclusion 88
Chapter 5 Introduction to Heap Overflows 89
What Is a Heap? 90
How a Heap Works 91
Finding Heap Overflows 91
Basic Heap Overflows 93
Intermediate Heap Overflows 98
Advanced Heap Overflow Exploitation 105
Conclusion 107
Contents xv
xvi Contents
Contents xvii
xviii Contents
Contents xix
xx Contents
Contents xxi
xxii Contents
of disk space, and every minute of processor time. A separate computer gathered
these statistics and sent monthly bills to laboratory departments.
And so it happened that on my second day at work, Dave wandered into my office,
mumbling about a hiccup in the Unix accounting system. Someone must have used a few
seconds of computing time without paying for it. The computer's books didn't quite
balance; last month's bills of $2,387 showed a 75-cent shortfall.
Now, an error of a few thousand dollars is obvious and isn't hard to find. But
errors in the pennies column arise from deeply buried problems, so finding these
bugs is a natural test for a budding software wizard. Dave said that I ought to
think about it.
"First-degree robbery, huh?" I responded.
"Figure it out, Cliff, and you'll amaze everyone," Dave said.Well, this seemed
like a fun toy, so I dug into the accounting program. I discovered our accounting
software to be a patchwork of programs written by long-departed summer students.
Somehow, the hodgepodge worked well enough to be ignored. Looking at the mixture of
programs, I found the software in Assembler, Fortran, and Cobol, the most ancient
of computer languages. Might as well have been classical Greek, Latin, and
Sanskrit.
As with most home-brew software, nobody had bothered to document our accounting
system. Only a fool would poke around such a labyrinth without a map.
Still, here was a plaything for the afternoon and a chance to explore the
system. Dave showed me how the system recorded each time someone connected to the
computer, logging the user's name, and terminal. It timestamped each connection,
recording which tasks the user executed, how many seconds of processor time he
used, and when he disconnected.
Dave explained that we had two independent accounting systems. The ordinary
Unix accounting software just stored the timestamped records into a file. But to
satisfy some bureaucrat, Dave had built a second accounting system which kept more
detailed records of who was using the computer.
Over the years, a succession of bored summer students had written programs to
analyze all this accounting information. One program collected the data and stashed
it into a file. A second program read that file and figured how much to charge for
that session. Yet a third program collected all these charges and printed out bills
to be mailed to each department. The last program added up all user charges and
compared that total to the result from the computer's internal accounting program.
Two accounting files, kept in parallel by different programs, ought to give the
same answer.
For a year, these programs had run without a glitch, but weren't quite perfect
this week. The obvious suspect was round-off error. Probably each accounting entry
was correct, but when added together, tenths of a penny differences built up until
an error of 75 cents accumulated. I ought to be able to prove this either by
analyzing how the programs worked, or by testing them with different data.
Rather than trying to understand the code for each program, I wrote a short
program to verify the data files. In a few minutes, I had checked the first
program: indeed, it properly collected the accounting data. No problem with the
first.
The second program took me longer to figure out. In an hour I had slapped
together enough makeshift code to prove that it actually worked. It just added up
time intervals, then multiplied by how much we charge for computer time. So the 75-
THE CUCKOO'S EGG Page 6 of 254
networks. Any of our scientists can log into our computer, and then connect to
a distant computer. Once connected, they can log into the distant computer by
entering an account name and password. In principle, the only thing protecting the
networked computer is the password, since account names are easy to figure out.
(How do you find account names? Just use a phone book most people use their names
on computers.)
Dockmaster's electronic mail message was a curiosity, and Dave passed it to
Wayne, attaching a question, "Who's Dockmaster?" Wayne forwarded it to me with his
guess "Probably some bank."
Eventually, Wayne bounced the message to me. I guessed Dockmaster was some Navy
shipyard. It wasn't important, but it seemed worth spending a few minutes looking
into.
The message gave the date and time when someone on our Unix computer tried to
log into Dockmaster's computer. So I scrabbled around the accounting files, looking
at Saturday morning's records. Again, the two accounting systems disagreed. The
stock Unix accounting file showed a user, Sventek, logging in at 8:25, doing
nothing for half an hour, and then disconnecting. No timestamped activity in
between. Our home-brew software also recorded Sventek's activity, but it showed him
using the networks from 8:31 until 9:01 A.M.
Jeez. Another accounting problem. The time stamps didn't agree. One showed
activity when the other account said everything was dormant.
Other things seemed more pressing, so I dropped the problem. After wasting an
afternoon chasing after some operator's mistake, I wasn't about to touch the
accounting system again.
Over lunch with Dave, I mentioned that Sventek was the only one connected when
Dockmaster reported the break-in. He stared and said, "Joe Sventek? He's in
Cambridge. Cambridge, England. What's he doing back?" Turned out that Joe Sventek
had been the laboratory's Unix guru, a software wizard who built a dozen major
programs over the past decade. Joe had left for England a year ago, leaving behind
a glowing reputation throughout the California computer community.
Dave couldn't believe Joe was back in town, since none of Joe's other friends
had heard from him. "He must have entered our computer from some network," Dave
said.
"So you think Joe's responsible for this problem?" I asked Dave.
"No way," Dave replied. "Joe's a hacker of the old school. A smart, quick,
capable programmer. Not one of those punks that have tarnished the word 'hacker.'
In any case, Sventek wouldn't try to break into some Maryland computer. And if he
did try, he'd succeed, without leaving any trace."
Curious: Joe Sventek's been in England a year, yet he shows up early Saturday
morning, tries to break into a Maryland computer, disconnects, and leaves behind an
unbalanced accounting system. In the hallway I mention this to Wayne, who's heard
that Joe's on vacation in England; he's hiding out in the backwoods, far away from
any computers. "Forget that message from Dockmaster. Sventek's due to visit
Berkeley RSN and he'll clear it up."
RSN? Real Soon Now. Wayne's way of saying, "I'm not sure when."
My worry wasn't Sventek. It was the unbalanced accounts. Why were the two
accounting systems keeping different times? And why was some activity logged in one
file without showing up in the other?
Back to the accounting system for an afternoon. I found that the five-minute
THE CUCKOO'S EGG Page 8 of 254
time difference between the time stamps came from our various computers' clocks
drifting over the months. One of our computer's clocks lost a few seconds every
day.
But all of Sventek's activities should have appeared in both tallies. Was this
related to last week's accounting problem? Had I screwed things up when I poked
around last week? Or was there some other explanation?
Chapter 2
Ive never liked the term computer science. The main reason I
dont like it is that theres no such thing. Computer science is a grab
bag of tenuously related areas thrown together by an accident of
history, like Yugoslavia. At one end you have people who are really
mathematicians, but call what theyre doing computer science so
they can get DARPA grants. In the middle you have people work-
ing on something like the natural history of computersstudying
the behavior of algorithms for routing data through networks, for
example. And then at the other extreme you have the hackers, who
are trying to write interesting software, and for whom comput-
ers are just a medium of expression, as concrete is for architects
18
hackers and painters
Perhaps one day computer science will, like Yugoslavia, get bro-
ken up into its component parts. That might be a good thing.
Especially if it meant independence for my native land, hacking.
Bundling all these different types of work together in one de-
partment may be convenient administratively, but its confusing
intellectually. Thats the other reason I dont like the name com-
puter science. Arguably the people in the middle are doing some-
thing like an experimental science. But the people at either end,
the hackers and the mathematicians, are not actually doing sci-
ence.
The mathematicians dont seem bothered by this. They happily
set to work proving theorems like the other mathematicians over
in the math department, and probably soon stop noticing that the
building they work in says computer science on the outside. But
for the hackers this label is a problem. If what theyre doing is
called science, it makes them feel they ought to be acting scientic.
So instead of doing what they really want to do, which is to design
beautiful software, hackers in universities and research labs feel
they ought to be writing research papers.
In the best case, the papers are just a formality. Hackers write
cool software, and then write a paper about it, and the paper be-
19
hackers & painters
20
hackers and painters
The only external test is time. Over time, beautiful things tend
to thrive, and ugly things tend to get discarded. Unfortunately, the
amounts of time involved can be longer than human lifetimes.
Samuel Johnson said it took a hundred years for a writers rep-
utation to converge.1 You have to wait for the writers inuential
friends to die, and then for all their followers to die.
I think hackers just have to resign themselves to having a large
random component in their reputations. In this they are no dif-
ferent from other makers. In fact, theyre lucky by comparison.
The inuence of fashion is not nearly so great in hacking as it is
in painting.
21
hackers & painters
22
hackers and painters
If universities and research labs keep hackers from doing the kind
of work they want to do, perhaps the place for them is in compa-
nies. Unfortunately, most companies wont let hackers do what
they want either. Universities and research labs force hackers to
be scientists, and companies force them to be engineers.
I only discovered this myself quite recently. When Yahoo
bought Viaweb, they asked me what I wanted to do. I had never
liked business much, and said that I just wanted to hack. When I
got to Yahoo, I found that what hacking meant to them was im-
plementing software, not designing it. Programmers were seen
as technicians who translated the visions (if that is the word) of
product managers into code.
This seems to be the default plan in big companies. They do it
because it decreases the standard deviation of the outcome. Only
a small percentage of hackers can actually design software, and
its hard for the people running a company to pick these out. So
instead of entrusting the future of the software to one brilliant
hacker, most companies set things up so that it is designed by
committee, and the hackers merely implement the design.
If you want to make money at some point, remember this, be-
cause this is one of the reasons startups win. Big companies want
to decrease the standard deviation of design outcomes because
they want to avoid disasters. But when you damp oscillations, you
lose the high points as well as the low. This is not a problem for
big companies, because they dont win by making great products.
Big companies win by sucking less than other big companies.
23
hackers & painters
24
hackers and painters
Because hackers are makers rather than scientists, the right place
to look for metaphors is not in the sciences, but among other kinds
of makers. What else can painting teach us about hacking?
25
hackers & painters
26
hackers and painters
Another example we can take from painting is the way that paint-
ings are created by gradual renement. Paintings usually begin
with a sketch. Gradually the details get lled in. But it is not
merely a process of lling in. Sometimes the original plans turn
out to be mistaken. Countless paintings, when you look at them
in x-rays, turn out to have limbs that have been moved or facial
features that have been readjusted.
Heres a case where we can learn from painting. I think hack-
ing should work this way too. Its unrealistic to expect that the
specications for a program will be perfect. Youre better off if
you admit this up front, and write programs in a way that allows
specications to change on the y.
(The structure of large companies makes this hard for them to
do, so here is another place where startups have an advantage.)
Everyone by now presumably knows about the danger of pre-
mature optimization. I think we should be just as worried about
premature designdeciding too early what a program should do.
The right tools can help us avoid this danger. A good pro-
gramming language should, like oil paint, make it easy to change
your mind. Dynamic typing is a win here because you dont have
to commit to specic data representations up front. But the key
to exibility, I think, is to make the language very abstract. The
easiest program to change is one thats short.
27
hackers & painters
28
hackers and painters
29
hackers & painters
30
hackers and painters
31
hackers & painters
You need to have empathy not just for your users, but for your
readers. Its in your interest, because youll be one of them. Many
a hacker has written a program only to nd on returning to it six
months later that he has no idea how it works. I know several
people whove sworn off Perl after such experiences.9
Lack of empathy is associated with intelligence, to the point
that there is even something of a fashion for it in some places. But
I dont think theres any correlation. You can do well in math and
the natural sciences without having to learn empathy, and people
in these elds tend to be smart, so the two qualities have come to
be associated. But there are plenty of dumb people who are bad
at empathy too.
32
hackers and painters
33
Feature: Crop circles physicsworld.com
Coming soon to
a field near you
Serious studies of crop circles have long been hampered
by conspiracy theories and the secretive nature of
circle-makers plus scientists reluctance to engage with
a fringe topic. But, as Richard Taylor argues,
discovering how circle artists create their most complex
patterns could have implications for biophysics
Richard Taylor is One evening in July 1996 I was staying above a country
director of the pub near Avebury in Wiltshire, enjoying a weeks holi-
Materials Science day drive around the prehistoric sites of southern
Institute at the England. In the middle of the night, I awoke to the
University of Oregon, hushed sounds of three men talking in the car park
US, e-mail rpt@
below. They were huddled around a large sheet of
uoregon.edu
paper, and after 15 minutes of furtive discussion, they
sped off down a country lane. That same evening, 194
crop circles spanning a total of 115 m appeared in a
nearby field at Windmill Hill. Their pattern, which was
derived from an equation developed by Gaston Julia
in 1918, consisted of circles that defined three inter-
twined fractals (figure 1). This Triple Julia pattern is
mathematically complex: as late as the 1980s, even the
best computers lacked the processing power needed to
generate it on screen. Had those three men managed
to physically imprint the same pattern into a wheat field
during the short hours of that midsummer night? And
if so, how did they do it?
Some 15 years on, scientists still do not know the
answer. With more than 10 000 patterns documented
over the years, crop formations remain a major scien-
tific mystery, one that plays out in our fields and thus
in our food supply at the rate of one event worldwide
every summer evening. Physicists who have conducted
serious research on the techniques of crop-circle artists
have come away with fascinating insights, including
some that have led to practical advances, such as a
patented technique for accelerating crop growth. With
recent announcements that climate change has sup-
pressed crop growth by 3%, such advances offer clear
potential rewards for society. Yet crop-circle research
is not for the faint of heart, because physicists who enter
it must deal with media manipulation, hate-mail, con-
spiracy theories, supposed alien collaborations and
new-age nonsense not to mention the risk of being
viewed as less than serious by their colleagues.
Photolibrary
At a Glance: Crop circles
Crop circles are patterns formed within crop fields and represent the work of the
most science-oriented art movement in history
First reported in the 1600s, these patterns appear around the world at a rate of
one every evening
The patterns, which can feature up to 2000 individual shapes, are often built using
hidden mathematical relationships such as diatonic ratios
Biophysicists have interpreted swollen stalks as evidence that the crops were
exposed to microwaves during formation of the circles, leading to patented
techniques for accelerated crop growth
When the astronomer Gerard Hawkins analysed the designs of 25 crop circles, he found
evidence that circle artists were using construction lines (blue) as guides to determine where
rings and circles (yellow) should be imprinted in the field.
The design of Bower and Chorleys original pictograph.
Instead, the construction lines dictate their relative owy textures that evolve over days in the sunlight due to
sizes and positions with precision and lead to some the stalks phototropic responses.
highly exotic properties. In particular, ratios of various Hence, to imprint their vast pictographs before sun-
diameters and areas within the designs were found to rise, todays artists have to work in co-ordinated teams.
cluster around the diatonic ratios for the white keys One such team is known as the Circlemakers, and when
on a piano. These ratios are the frequency ratios of in a rare breach of secrecy it allowed BBC film-
notes: middle D to C, for example, is 297/264 Hz = makers to document its construction of a 100-circle
9/8. The idea that crop formations possess a funda- roulette pattern in 1998, team members were observed
mental geometric harmony analogous to musical physically implanting circles at the remarkable rate of
chords has inspired musicians to use computer algo- one every minute. Circlemaker Will Russell summa-
rithms to convert formations into melodies. The best- rized their motivation: To push the boundaries of what
known translator is Paul Vigay, and samples of his people think is humanly possible, while his colleague
music are available at http://bit.ly/lbUJQq. Rod Dickinson stressed that this rate was sufficient to
Todays crop-circle designs are more complex than imprint the Triple Julia pattern in one night.
ever, featuring up to 2000 individual shapes arranged Despite such claims, the larger scale and higher pre-
using intricate construction lines that are invisible to the cision of the Triple Julia design would have made it sig-
casual observer. The increase in available computing nificantly more challenging to create than the
power has also meant that iterative equations are now Circlemakers roulette. There are further signs that tra-
frequently used to generate fractal shapes such as the ditional physical imprinting techniques are reaching
Triple Julia design, which reappeared in Switzerland their limits. One of 2009s pictographs required three
last year. Other famous fractal icons such as the nights to complete, and its pattern progression is shown
Mandelbrot set, the Julia set and the Koch snowflake in figure 4. If artists want to maintain the movements
have also popped up regularly in crop fields since 1991. secrecy and anonymity, it is clear that they will need to
exploit more efficient construction methods.
Making a crop circle
Even the preliminary stage of crop-circle construction Biophysical speculations
mapping the proposed design is not an easy task. Intriguingly, experiments carried out by biophysicists
The appearance of the first Triple Julia formation in raise the possibility that some circle-makers may
July 1996 was pre-empted by a single Julia formation already be changing their methods. Independent stud-
several weeks earlier. This warm-up design took a ies published in 1999 and in 2001 reported evidence
team of 11 surveyors five hours just to measure out, and consistent with what you would expect to see if the
a surveying company later estimated that one of its crops had been exposed to radiation during the forma-
engineers would have required at least five days to map tion of patterns. The patterns studied date back to the
out each of the three intertwining patterns. But once mid-1990s, and include the original Triple Julia.
their maps are complete, crop-circle artists face a still Figure 5 shows the results of an investigation of pul-
more difficult problem: how do you imprint patterns in vini, the visco-elastic joints that occur along wheat
crops that are a challenge even to draw on paper? stalks. Eltjo Haselhoff, a medical physicist, found that
Traditional circle-makers employed stompers pulvini on bent stalks within a 9 m-wide circle were If artists want
(wooden planks attached to two hand-held ropes), string elongated compared with undamaged crops in the to maintain the
and garden rollers, plus bar stools to allow artists to vault same field. Although several well-understood factors movements
over undisturbed crops. Despite their primitive appear- can cause pulvini to swell, including gravitropism (the
ance, stompers are a surprisingly efficient tool for flat- directional growth of stalks in response to gravity) and secrecy and
tening crops, especially when driven by skilled hands. lodging (bending of stalks caused by wind or rain anonymity, it is
However, modern designs have evolved beyond the tra- damage), Haselhoff dismissed them based on the mag- clear that they
ditional requirement that stalks be flattened rather than nitude of the increase, and its symmetric fall-off from will need to
broken: formations now feature stalks that are carefully the circles centre to its edge. exploit more
sculpted to create intricate textures within the geome- Haselhoffs findings built on the earlier research of
tries. For example, the stalks in each of the circles of the William Levengood, a biophysicist at a Michigan-based
efficient
Triple Julia pattern formed a spiral. Multiple layers of crop-seed consultancy called Pinelandia Biophysics construction
bent stalks can also be woven together, creating shad- Laboratory. Levengood, who found similar results on methods
4 Work in progress
This Woman Crop formation was created at Milk Hill, Wiltshire, over three nights in 2009. The first three photos from left to right were taken on 21 June (by Russell
Stannard), 23 June and 30 June (both by John Montgomery) respectively and show the patterns evolution. The unfinished-looking circles in the patterns tail (shown in
detail in the fourth photo) have prompted speculation that the artists were planning to continue the design on a fourth night.
95% of 250 crop formations in seven countries, pro- cover-up operation. I surfed the conspiracy websites to
posed that the elongated pulvini were a result of super- find out who I was supposedly conspiring with and
heating from electromagnetic radiation. Such found that the most likely culprit was a collaboration
radiation, he theorized, would cause stalks to fall over between the UK, German and US secret services!
and cool in a horizontal position. He found further evi- Although aliens and government conspiracies cannot
dence for superheating in changes in the crops cellular be excluded with 100% surety, Occams razor (which
structure and in the numerous dead flies stuck to seed states that explanations involving the fewest assump-
heads in the formations. tions are the most likely) supports the human-artist sce-
Levengood and Haselhoff both followed up their nario. Might some artists therefore be supplementing
work by removing crop seeds from the field and plac- physical implantation techniques with microwaves?
ing them in growth chambers controlled for light, Intriguingly, a group of crop-circle enthusiasts called
humidity and temperature. They found that while seeds the BLT Research Team claims to be able to replicate
taken from the surrounding crop grew at normal rates, the observed changes to pulvini using 30 s exposures to
seeds from the formations grew up to four times slower microwaves generated by magnetrons from readily
in 90% of the measured formations. available microwave ovens. Todays magnetrons are
Although both researchers findings were published small and light, and some require only 12 V battery
in Physiologia Plantarum (W C Levengood 1994 92 356 power supplies. Haselhoff and Levengood used the
and 1999 105 615; E H Haselhoff 2000 1 124), a peer- BeerLambert principle, which relates the absorption
reviewed journal dedicated to the science of plant of radiation to the properties of the material, to model
growth, their results failed to bring the crop-circle the radial dependence of the pulvini swelling. For a typ-
debate to a close. The authors own speculations did ical 9 m circle, Haselhoffs model indicated a radiation
not help matters: Levengood interpreted his results as point source placed 4 m above the circles centre. Once
evidence of Meadens plasma vortex theory, while superheated with this source, the stalk orientation
Haselhoff proposed that the sources of radiation were could be readily sculpted, speeding up circle creation.
the mysterious balls of light that some observers have Although this appealing hypothesis fits the published
reported hovering over formation sites. Under the cir- facts, biophysicists will clearly need to expand on these
cumstances, scientists reluctance to explore such con- preliminary experiments if such speculations are to
troversial findings has outweighed their curiosity, and become accepted.
neither Levengood nor Haselhoffs work has ever been
reconfirmed or disproved by subsequent studies. Still seeking solutions
Consequently, their research merely fuelled the long- Determining the technology behind crop-circle mak-
running discussions about human hoaxers, atmospheric ing has implications beyond mere curiosity and art
effects and, of course, extraterrestrial artists. Last June appreciation. Traces of some patterns (ghost forma-
I entered the debate by suggesting in Nature (465 693) tions) can still be seen in the subsequent years crop,
that terrestrial artists would not need to bend any laws, suggesting long-term damage to the crop field consis-
but they would need mathematical skills to plot todays tent with Levengoods observations of stunted seed
epic designs and scientific awareness to exploit techno- growth. Crop formations are harvested every year, and
logical advances. This suggestion was met with anony- so these damaged crops are entering our food chain.
mous hate-mail from UFOlogists and others accusing Intriguingly, Levengoods results showing stunted
me of spreading misinformation as part of a massive growth came from crop circles that appeared early in
3.0
2.0
1.0
0
b0 b1 b2 b3 b4 b5 b6 b7 b8
b8
b7
b6
b5
b4
b3
b2
b1
b0
Eltjo Haselhoffs studies of wheat stalks show that the length of stalk joints, or
pulvini, varies with their position relative to crop circles. (a) Average length of
pulvini (yellow bars) and their standard deviation (red bars) as measured at the
nine different locations b0b8 (b). At each location, 20 samples were measured.
Positions b8 and b0 lie outside the circular formation, and the average lengths of
pulvini there matched those measured in the remainder of the field.
Pizza Money
A
n early and apparent difference between the Two Johns internal
human engines was the way they processed time. It was the kind of
difference that made them perfect complements and the kind that
could cause irreparable conflict.
Carmack was of the moment. His ruling force was focus. Time existed for
him not in some promising future or sentimental past but in the present
condition, the intricate web ol problems and solutions, imagination and code.
He kept nothing from the pastno pictures, no records, no games, no compu-
ter disks. He didnt even save copies of his first games, Wraith and
Shadowforge. There was no yearbook to remind of his time at school, no
magazine copies of his early publications. He kept nothing but what he needed
at the time. His bedroom consisted of a lamp, a pillow, a blanket, and a stack
of books. There was no mattress. All he brought with him from home was a
cat named Mitzi (a gift from his stepfamily) with a mean streak and a reckless
bladder.
Romero, by contrast, was immersed in all moments: past, future, and
present. He was an equal opportunity enthusiast, as passionate about the
present as about the time gone and the time yet to come. He didnt just
dream, he pursued: hoarding everything from the past, immersing himself in
the dynamism of the moment, and chatting out the plans for what was to
come. He remembered every date, every name, every game. To preserve the
past, he kept letters, magazines, disks, Burger King pay stubs, pictures, games,
receipts. To inflate the present, he pumped up any opportunity for fun, tell-
45
ing a better joke, a funnier story, making a crazier face. Yet he wasnt manic,
he knew how to focus. When he was on, he was onloving everything, every-
body. But when he was off, he was offcold, distant, short. Tom Hall came up
with a nickname for the behavior. In computers, information is represented
in bits. A bit can be either on or off. Tom called Romeros mood swings the bit
flip.
That fateful morning of September 20, 1990, Romeros bit flipped right
on. It was a date he seared into his memory and Carmack would soon forget,
but it was equally important to both. Carmack had used his laser focus to
solve an immediate challenge: how to get a PC game to scroll. Romero used
Carmacks solution, Dangerous Dave in Copyright Infringement, to envision
what would come. Carmack had created a palette that Romero used to paint
the future. And the future, it became clear, had nothing to do with Softdisk.
After seeing Carmack, Romero couldnt contain his excitement. He darted
around the office, pulling others to come in and check out the game. Oh my
God, look at this, he said, as a couple of employees watched the demo play.
Is that the fucking coolest thing on the planet or what?
Oh, one of the guys replied lethargically, thats pretty neat.
Thats pretty neat? Romero responded. Wait a minute: this is like the
fucking coolest thing ever! Dont you understand?
The guys shrugged and said, Whatever, then returned to their offices.
Fucking idiots! Romero declared. By the time everyone else arrived, he
was on the verge of exploding. Tom, Jay, Lane, and Adrian were all in the
Gamers Edge office, watching amusedly as Romero held court, playing the
demo. Oh my God, Romero said, this is the fucking coolest thing ever! We
are fucking gone! We have to do this! We have got to start our own company
and get out of here with this, because Softdisk aint doing anything with it!
No ones going to see this! We need to do this on our own! This is too big to
waste on this company!
Jay was hanging on the doorway, his finger tips gripping the frame.
Eh, come on. he said, chortling. Hed seen Romeros giddiness before.
It was an enthusiasm that bordered on hyperbole. Romero got this excited
when he won a round of Pac-Man. He was a human exclamation point.
Romero froze, hands in the air. Dude, he said gravely, Im totally
serious.
Jay stepped in and shut the door behind him. Romero explained his ra-
tionale. First oft, this was a robust, sixteen-color game; Softdisk was interested
only in doing four-color games that appealed to the lowest common denomi-
nator of users. Second, this was essentially the Nintendo-style game made for
a PC, something on par with the bestselling console title in the world: Mario.
That meant the game was sure to sell, because everyone was getting a PC
and, naturally, everyone would want a fun video game to play. It was perfect.
46
They already had the ideal team: Carmack, the graphics guru and resi-
dent Whiz Kid; Romero, the multitalented programmer and company cheer-
leader; Adrian, the artist and dark visionary; and Tom, game designer and
comic book surrealist. Although Romero was still displeased with Lane, he
was willing to give him one more chance to pull through. Regardless, the core
chemistry was potent. Carmacks steadfastness balanced Romeros elusive
passion. Adrians grisly tastes countered Toms cartoon comedy. All they
needed was someone to do the business sidehandle the finances, balance
the books, manage the team. Everyone looked to Jay. Dude, Romero told
him, youve got to be a part of this too.
Jay gave them his biggest bartender smile and agreed. Heres what I
think we should do, he said. This needs to be taken right to the top of
Nintendo. Now! If they could get a deal to do a PC port of Super Mario
Brothers 3, they could be in business, serious business. They decided to take
the weekend to make a complete demo of the game, with a few added levels
as well as the inclusion of the Mario character, and Jay would send it off.
There was only one problem, but it was sizable. It they were going to
moonlight this game, they didnt want Softdisk to know. This meant they
couldnt do it in the office. They would have to work on it at home. Thing
was, they didnt have the computers they needed to get the job done. The
five of them sat quietly in the Gamers Edge office, pondering the problem as
Dangerous Dave looped across the screen.
Carmack and Romero had both been without the computers they wanted
earlier in life. So this wouldnt be the first time they came up with a way to get
them.
The cars backed up to the Softdisk office, trunks open, waiting in the night.
It was late Friday night, long after all the other employees had returned home
to their families and television sets. No one would use the PCs from the office
on Saturday and Sunday, so they might as well make use of them, the gamers
figured. They werent stealing the computers, they were borrowing them.
After loading Softdisks computers in their cars, Romero, Jay, Carmack,
Tom, and Lane caravanned out of downtown. They drove away from the
run-down buildings, down the highway, until the scenery began to change to
low-hanging trees and swamps. Late-night fishermen lined a bridge with their
lines, in the purple-black murk. A bridge led them to South Lakeshore Drive,
the border of Shreveports main recreational front and main water supply,
Cross Lake.
Carmack, Lane, Jay, and an Apple II programmer at Softdisk named Jason
Blochowiak had scored a enviable coup not long before when they found a
four-bedroom house for rent right along these shores. Jay had bought a cheap
boat, which they docked there and used for frequent outings of knee board-
47
ing and skiing. In the large backyard was a swimming pool and a barbecue,
with which Jay, a cooking enthusiast, grilled up Flintstonean slabs of ribs.
The house itself had plenty of windows looking out on the scene, a large
living room, even a big tiled bathroom with a deep earth-tone-tiled Jacuzzi
tub. Jay had installed a beer keg in the fridge. It was a perfect place to make
games.
Over the weekend while making the Super Mario demo, the gamers put
the house to the ultimate test. They hooked two of the Softdisk computers up
on a large table that Carmack had been using to hold all-night Dungeons and
Dragons sessions with the guys. Romero and Carmack sat there program-
ming together. Tom did all the graphics and Lane animated the familiar little
turtle. Earlier they had videotaped the entire game play of Super Marie Broth-
ers 3. To capture all the elements, Tom kept running back and forth, pressing
pause on the VCR so he could copy the scenes.
Over those seventy-two hours, they fell into crunch mode. No one slept.
They consumed huge quantities of caffeinated soda. Pizza deliveries came
repeatedly. Jay worked the grill, churning out a stream of burgers and hot
dogs, which often went uneaten. They got the game down to a T: Marios
squat little walk, the way he bopped the animated tiles, sending out the coins,
the way he leapt on the turtles and kicked their shells, the clouds, the Venuss-
flytraps, the pipes, the smooth scrolling. By the time they finished, the game
was virtually identical to the bestselling hit in the world. The only noticeable
difference was the title screen, which, under the Nintendo copyright, credited
the makers, a company name the guys borrowed from Romero and Lane,
Ideas from the Deep.
With the game done, Jay put together a letter explaining who they were
and how they wanted Nintendo to take the unprecedented step of licensing
Super Mario for the PC. Hopes high, the boys taped up the box and sent it on
its way to Nintendo. When the response came back a few weeks later, it was
short and sweet. Nice work, the company said, but Nintendo had no interest
in pursuing the PC market. It was happy where it was as the world leader in
consoles. It was a disappointment for the group, especially following the ela-
tion of the lake house programming marathon. But it was not the end by any
means. There had to be someone out there who would appreciate their ac-
complishment. Romero knew just the guy.
Not long before, Romero had received his very first fan letter while working
at Softdisk. It was typewritten and cordial. Dear John, it read, Loved your
game. Just wanted to let you know it was a great game and I think you are
very talented. Have you played The Greatest Pyramid? It is almost the same
as your game. I was wondering if you made that game too? Or if you were
inspired by it? I can send you a copy if you want. Also whats your high score
48
for your game? Have you been programming long and what language did
you use? I am thinking about writing a game and any tips you have would be
helpful. Thanks from a big fan! Sincerely, Byron Muller.
Romero, the pack rat, had immediately taped the letter up on his wall and
showed it off to Carmack, Tom, Lane, and Adrian. A couple weeks later, he
got another fan letter, handwritten and a bit more urgent. Dear John, it
read, I loved your game (Pyramids of Egypt), it is better than another pyra-
mid type game that was in Big Blue Disk a few issues ago. I finished the
game alter staying up until 2:00 A.M. last night! Great fun! Whats your best
score on the game? Is there a secret key that advances to the next level auto-
matically? Do you know of any similar games? Please call me collect if you
want or please write. Thanks a million, Scott Mulliere. P.S. I think I found
a minor bug (undocumented feature?) in the game!
WowRomero beamedanother fan! He taped this letter up on the wall
next to the other one and, again, bragged to Carmack and Adrian, who rolled
their eyes. Soon after, Romero was flipping through PC Games Magazine
when he came to a brief article about Scott Miller, a twenty-nine-year-old
programmer who was having great success distributing his own games. In-
trigued, Romero read to the bottom of the article, where it listed Scotts ad-
dress: 4206 Mayflower Drive, Garland, Texas, 75043.
He paused. Garland, Texas. Garland, Garland, Texas? Who did he know
in Garland, Texas, on Mayflower Drive? He set down the magazine and looked
up on his wall. The fan letters! By now he had accumulated several of them
and, to his amazement, though they all were signed by different names, each
and every one had the same return address: Mayflower Drive, Garland.
Romero was pissed. Here he was showing off to the other guys about all
his supposed fans, when in fact it was just some loser fucking with his mind.
Who the fuck does Scott Miller think he is? Romero whipped around to his
keyboard and banged out a letter in fury: Scott: You, sir, have serious psy-
chological problems Whats the deal with the 16 million odd names youve
been writing under to reach me? Huh, Byron Muilliere, Brian Allen, Byron
Muller? How old are you, really? 15?
Romero fumed for a couple pages, then left the letter on his desk. The
next day, he came back cooled off and wrote another note.
Dear Mr. Miller, he typed, I have taken a considerable amount of time
to reply to your last letter. The reason is because I was infuriated when I
found out that you had written to me previously about 3-4 other times, all
under different names and I didnt know what was going on. My previous
reply is a real scorcher; thats why I didnt send it earlier. I am sending it
anyway just so you can see how pissed I was at the time. I am writing this
cover letter to soften the previous reply and to tell you that I am somewhat
intrigued by your numerous approaches. He sealed up both letters together
and sent them to Garland once and for all.
49
A few days later, Romeros home phone rang. It was Scott Miller.
Romero laid into him about sending those fake fan letters, but Scott had
other things on his mind. Fuck those letters! Scott said breathlessly. The
only reason I did that was because I knew my only chance to get ahold of you
was to go through the back door.
Game companies at the time were extremely competitive and secretive,
especially when it came to their programming talent. When Romero had been
a young gamer, programmers like Richard Garriott or Ken and Roberta
Williams always got top billing, their names advertised in big letter on the
box. But by the early nineties, times had changed. Companies were not above
poaching. As a precaution, many game publishers would loom over their
staffs, monitoring calls to make sure that no one was trying to make a steal.
Scott, well aware of the sensitivity of his call, had chosen instead to try to lure
Romero into contacting him. It worked, though ironically not as originally
intended. He hadnt meant to piss Romero off. But now that he had his atten-
tion, he wasnt about to let it go.
We gotta talk, Scott continued eagerly. I saw your game Pyramids of
Egypt. It was so awesome! Can you do a few more levels of it? We can make a
ton of money.
What are you talking about?
I want to publish your game, Scott said, as shareware.
Shareware. Romero was familiar with the concept. It dated back to a guy
named Andrew Fluegelman, founding editor of PC World magazine. In 1980,
Fluegelman wrote a program called PC-Talk and released it online with a note
saying that anyone who liked the wares should feel free to send him some
appreciation money. Soon enough he had to hire a staff to count all the
checks. Fluegelman called the practice shareware, an experiment in eco-
nomics. Over the eighties other hackers picked up the ball, making their
programs for Apples, PCs, and other computers available in the same honor
code; Try it, if you like it, pay me. The payment would entitle the customer to
receive technical support and updates.
The Association of Shareware Professionals put the business, largely do-
mestic, between $10 and 520 million annuallyeven with only an estimated
10 percent of customers paying to register a shareware title. Forbes magazine
marveled at the trend, writing in 1988 that if this doesnt sound like a very
sound way to build a business, think again. Shareware, it argued, relied not
on expensive advertising but on word of mouth or, as one practitioner put it,
word of disk. Robert Wallace, a top programmer at Microsoft, turned a
shareware program of his called PC-Write into a multimillion-dollar empire.
Most authors, however, were happy to break six figures and often made little
more than $25,000 per year. Selling a thousand copies of a title in one year
was a great success. Shareware was still a radical conceit, one that, further-
more, had been used only for utility programs, like check-balancing programs
50
and word-processing wares. It had never been exploited for games. What was
Scott thinking?
As they talked, it became clear to Romero that Scott knew exactly what
he was doing. Scott, like Romero, was a lifelong gamer. The son of a NASA
executive, he was a conservative-looking guy with short, dark hair. He had
spent his high school days in Garland hanging out in the computer lab during
the day and at the arcade after school. He even wrote a strategy guide called
Shootout: Zap the Video Games, detailing all the ways, to beat the hot games of
1982, from Pac-Man to Missile Command. Scott soon took the inevitable path
and started making games of his own.
When it came time to distribute the games, Scott took a long, hard look at
the shareware market. He liked what he saw: the fact that he could run every-
thing himself without having to deal with retailers or publishers. So he fol-
lowed suit, putting out two text-based games in their entirety and waiting for
the cash to roll in. But the cash didnt roll; it didnt even trickle. Gamers, he
realized, might be a different breed from those consumers who actually paid
for utility shareware. They were more apt simply to take what they could get
for free. Scott did some research and realized he wasnt alone; other program-
mers who had released games in their entirety as shareware were broke too.
People may be honest, he thought, but theyre also generally lazy. They need
an incentive.
Then he got an idea. Instead of giving away the entire game, why not give
out only the first portion, then make the player buy the rest of the game directly
from him? No one had tried it before, but there was no reason it couldnt
work. The games Scott was making were perfectly suited to such a plan be-
cause they were broken up into short episodes or levels of play. He could
simply put out, say, fifteen levels of a game, then tell players that if they sent
him a check he would send them the remaining thirty.
In 1986, while working for a computer consulting company, Scott self-
published his first game, Kingdom of Krozan Indiana Jones-style adven-
tureas shareware, making the initial levels available through BBSs and
shareware catalogs. There was no advertising, no marketing, and virtually no
overheadexcept for the low cost of floppy disks and Ziploc bags. Because
there were no other people to pay off, Scott could price his games much lower
than most retail titles: $15 to $20 as opposed to $50 to $40. For every dollar
he brought in, Scott was pocketing ninety cents. By the time he contacted
Romero, he had earned $ 150,000 by word of mouth alone.
Business was so good, Scott explained, that hed quit his day job to start
his own shareware game publishing company, called Apogee. And he was
looking tor other games to publish. Romero was making perfect shareware
games and he didnt even know it, Scott said. An ideal shareware game had to
have a few ingredients: short action titles that were broken up in levels. Be-
cause the shareware games were being distributed over BBSs, they had to be
51
small enough for people to download them over modems. Large, graphically
intensive games, like those being published by Sierra On-Line, were simply
too big for BBS-based distribution. Games had to be small but fun and fast,
something adrenal and arcade-style enough to hook a player into buying
more. If Romero would give him Pyramids of Egypt, Scott would handle all
the marketing and order processing; the guys would receive some kind of
advance plus a 55 percent royalty rate, higher than theyd get from any major
publisher.
Romero was intrigued, but there was a problem. We cant do Pyramids
of Egypt, he explained, because Softdisk owns it. He could hear the disap-
pointment in Scotts sigh. Hey, he added, Screw that game! Its crap com-
pared to what were doing right now.
A few days later, Scott received a package with the Super Mario Brothers
3 demo from Ideas from the Deep. When he fired up the game, he was knocked
out. It looked just like the console versionsmooth scrolling and everything.
He grabbed the phone and talked to Carmack for hours. This guy is a genius,
Scott thought. Hes outthinking everybody. By the time they were through
talking, Scott was more than ready to make a deal. The gamers said they
would use this new technology to create a title specifically for Apogee to
release as shareware. Great, Scott said, Lets do it.
Now they just had to come up with a game.
After their initial conversation, Romero asked Scott to show them his seri-
ousness by sending them an advance. Scott responded with a check for two
thousand dollars, half his savings. There was only one thing he wanted in
return: A game by Christmas, two months away.
Romero, Carmack, Adrian, Lane, Tom, and Jay convened in the Gamers
Edge office to come up with the game. Tom was quick to point out that,
because they were using this console-style technology, they should make a
console-style game, something like Mario but different. Fueled by the en-
ergy, he was quick to volunteer himself with a fair amount of the bravado that
was becoming a requisite part of their clan.
Come on, what theme do you want? Tom said. Tell me, I can do
anything. How about science fiction?
They liked the idea. Why dont we do something, Carmack said, where
a little kid genius saves the world or something like that? Mmm.
Okay, yeah! Tom said. I have a great idea for something like that.
And in a blur he sped from the room and locked himself in his office in the
Apple II department. He could feel his head opening up, the ideas pouring
out in what sounded like the voice of Walter Winchell. Tom had long been a
huge fan of Warner Bros cartoons; Chuck Jones, the Looney Tunes animator,
was a god to him. Hed also watched Dan Aykroyds impression of The
52
Untouchables Eliot Ness as a kid. He thought about all these things, plus
Mario, plus, for flavor, a routine by the comedian George Carlin about people
who use bay leaves as underarm deodorant and go around smelling like bean
with bacon soup.
Tom typed until he had three paragraphs on his paper. Pulling it out of
the printer, he dashed back into the Gamers Edge office and read these words
in his best Winchell impression:
The gamers werent just Softdisk guys anymore, they were, as they called
themselves, the IFD guys, co-owners of Ideas from the Deep. Softdisk, as a
result, took on an even greater pallor. But it was a day job, a job they all
needed since there was no real money coming in yet and no guarantee that it
would come in at all. They decided, then, to continue working on titles for
Gamers Edge during the day while they churned out Commander Keen from
the lake house at night.
They became all the more efficient at borrowing the Softdisk comput-
ers. Every night after work theyd back their cars up to the office and load the
machines. The next morning theyd come in early enough to bring the com-
puters back. They even got a little cocky about it. Though the machines were
top of the line, they wanted some minor adjustments made. Jay began
moseying on down to the Softdisk administration office to request new parts.
Al Vekovius took notice of the requests but didnt think too much of them.
He was still gung ho about Gamers Edge and the potential to break into the
PC marketplace. So whatever the gamers wanted, the gamers would have.
53
From October to December 1990, they worked virtually nonstop to get
Keen done for Scott by Christmas. And it wasnt just one Keen; it was a trilogy
called Invasion of the Vorticons. Trilogies were common in the games indus-
try for the same reason they were common in books and films; they were the
best way to build and expand a brand identity. Tom, who assumed the role of
creative director, mapped out the game plan.
Mario, this was not. As a hero, an eight-year-old misfit who steals his
dads Everclear for rocket fuel was more identifiable than a middle-aged Ital-
ian plumber. It was as if the gamers had followed that golden rule of writing
about what they knew. Tom, as a kid, used to walk around in a Green Bay
Packers helmet and red Converse sneakers, just like Billy Blaze. And. in a
sense, they were all Billy Blazes, oddball kids who modified technology to
create elaborate means of escape. Keen was a punk, a hacker. And he was
saving the galaxy, just as countless hackers like Carmack and Romero used
technology to save themselves.
The roles were set: Carmack and Romero were the programmers, and
Tom the lead designerthe person in charge of coming up with the game play
elements, from the story and setting to the characters and weapons. Carmack
and Romero were happy to leave Tom to the creative work; they were too
busy programming. Carmack was refining his engine, getting the smooth
scrolling down to the point where Keen could move as fluidly left or right as
he could up or down, Romero, meanwhile, was working the editor, the pro-
gram that allows the developers to put together the graphics of the game
characters, rooms, monsters. It was essentially a game designers construc-
tion kit. Carmack and Romero were in sync.
Not everyone else gelled quite as well. Lane was now officially kicked out
of the Keen development. Despite Romeros fondness for him as a friend, he
felt that Lanes energy was lacking. Adrian was having problems of his own.
Though he was recruited later to help them work on Keen, Adrian hated the
project. It was too cutesy. Tom had a target audience in mind: kids, he
said, or those who have kidlike mentalities like we do. Adrian hated kiddie
stuff. Even more, he hated cutesy. Worst of all was cutesy kiddie. And now
here he was having to sit all night drawing pizza slices, soda pop, and candy.
Tom came up with a little character called a Yorp with a big fat green body
and one periscopelike eye over his head. Even the monsters were cute. In
most games, when a character died, it would simply disappear, vanish. But
Tom had other notions. He was eager to incorporate some larger philosophi-
cal ideas, as he said. He loosely based character on ideas hed read in Freuds
Civilisation and Its Discontents; a guard was made to represent an id. He
wanted to teach kids that when people or even aliens die, they really die, they
leave corpses. So he wanted the dead creatures in the game to just remain:
not graphic or bloody corpses, just dead Yorps. Cute dead Yorps.
54
The cuteness of the characters wasnt the only thing bugging Adrian, it
was the cuteness of their creator. Tom was getting on his nerves. He would
run around the house, craning his neck and making sounds to show Adrian
exactly what the alien creatures in the games were supposed to look like.
Romero would usually crack up at these displays. Adrian took a liking to
Romero, who shared his taste in heavy metal and his appreciation ol sick
humor; but Tom, in Adrians mind, was just plain annoying. To make mat-
ters worse, they had to share a desk, and Tom was so full of energy that he
kept bobbing his knee up and down, inadvertently hitting the table when
Adrian was trying to draw. But it was better than working at the last open
space in the house, next to the litter box used tor John Carmacks cat, Mitzi.
Tom had no idea how Adrian felt. He thought he was just quiet.
For the majority of the time, however, those late nights at the lake house
were a perpetual programming party. With Iggy Pop or Dokken playing on
the stereo, the guys all worked into the wee hours. Occasionally, theyd take a
break to play Super Mario on the Nintendo or maybe a round of Dungeons
and Dragons. Carmack had been building a large D&D campaign for the
guys, and on Saturday nights theyd gather around a table and play into the
early morning hours. With Carmack as Dungeon Master, the game took on
depth and complexity. It was quickly becoming the longest and deepest D&D
game hed ever created. And there were no signs of it letting up.
Other times, theyd cruise the lake on the boat. Jay quickly became the
designated driver; his impeccable focus gave him the ability to drive not only
fast but steady. A couple times they let Romero drive, but he was having too
much fun, steering the boat precipitously off course. Jay also fell comfortably
into the role of manager or, in a sense, frat house president. While the guys
worked, he would grill up ribs on the barbecue or restock the sodas. They
were under the gun and needed all the help they could get.
They didnt need any help getting motivated, however. Carmack, in par-
ticular, seemed almost inhumanly immune to distraction. One time, Jay tested
Carmacks resolve by popping a porno video into the VCR and cranking it to
full volume. Romero and the others immediately heard the oohs and aahs,
and, turned around cracking up. Carmack, though, stayed glued to his moni-
tor. Only after a minute or so did he acknowledge the increasingly active
groans. His sole response was Mmm. Then he returned to the work at
hand.
55
called Shadow Knights. Al had never seen a side scrolling like this tor the PC.
Wow, he told Carmack, you should patent this technology.
Carmack turned red. If you ever ask me to patent anything, he snapped,
Ill quit. Al assumed Carmack was trying to protect his own financial inter-
ests, but in reality he had struck what was growing into an increasingly raw
nerve for the young, idealistic programmer. It was one of the few things that
could truly make him angry. It was ingrained in his bones since his first read-
ing of the Hacker Ethic.
All of science and technology and culture and learning and academics is
built upon using the work that others have done before, Carmack thought.
But to take a patenting approach and say its like, well, this idea is my idea,
you cannot extend this idea in anyway, because I own this ideait just seems
so fundamentally wrong. Patents were jeopardizing the very thing that was
central to his life: writing code to solve problems. If the world became a place
in which he couldnt solve a problem without infringing on someones pat-
ents, he would be very unhappy living there.
Carmack was becoming more blunt and insulting about other topics as
well, most notably the rest of the Softdisk staff. Youve got a lot of terrible
programmers here, he said. They just stink. It was as if Carmack simply
didnt care how he alienated himself from the rest of the employees.
Al began dropping by the Gamers Edge office more often, only to dis-
cover more strange behavior. He once walked in to find Carmack, Romero,
and Tom huddled around Romeros computers with their backs to the door.
When Al made his presence known, they quickly dispersed. He stepped over
and asked them what was going on. Nothing but dirty jokes, Al, Romero
replied, gingerly. When Al looked at the screen, it was suspiciously blank.
Later he commented to Carmack that Romero was acting strangely, which
struck Al as odd since Romero was always so nice. Carmack considered this
momentarily, then, as always, blurted out his unedited perception of the truth:
Romero was just being friendly, Carmack said. When you turn your back,
he hates your guts.
By Thanksgiving, the guys were immersed in the death schedule back at
the lake house. Sleep was not an issue. Neither was showering. Eating was
something they essentially had to remind themselves to do. To help keep
them fed while they crunched on Keen, Scott had begun sending the team
weekly hundred-dollar checks labeled pizza bonus, playing off the pepperoni
slice icon that appeared in Keen. Pizza was ids fuel. It was, as Carmack en-
joyed noting, the perfect invention: hot, quick, and containing a variety of
food groups. When Jay opened an envelope from Scott and waved the check
in the air, everyone would declare pizza money!
Scott was confident hed see a return on his investment. He had initiated a
full-on blitz. Because of his own success, he had built strong ties with the
heads of various BBSs and shareware magazines across the country. He called
56
every one of them, preparing each for a game that would revolutionize the
industry. Before long, whenever people logged on to a BBS, they would see a
title screen reading: Coming soon From Apogee: Commander Keen. Scott
was putting his reputation on the line. But there was never a doubt in the
gamers minds that Keen would deliver.
Torn was in overdrive on the design, bouncing ideas like Ping-Pong balls
off Romero. If Romero doubled over laughing, he knew he was on the right
track. Scott offered his own advice for the game. One of the reasons for
Mario Brothers popularity, he wrote them in a letter, is that you can con-
tinue playing the game in search of secret or hidden bonuses, et cetera. I
would really like to see something like this implemented in Keenit would
really add to the game I think,
Like duh! The guys responded. They loved finding secrets in games.
Already secrets were like a subculture among programmers. Sometimes there
were secret levels, or inside jokes, or tricks that had no real bearing on the
outcome of the game. These were called Easter eggs. The mother of all eggs
occurred in 1980, when intrepid Atari 2600 geeks stumbled on a secret room
in the geometric role-playing game Adventure, only to find the flashing words
Warren Robinett. Some players haplessly shot at the name. Others just
scratched their heads. Robinett was a disgruntled Adventure programmer
who wanted recognition following a corporate takeover.
Tom came up with some tricks for Keen. In episode one, players could
find a secret hidden city it they pulled a combination of moves, like throwing
themselves in the line of fire of an ice cannon. Around the game he inserted
cryptic signs written in what was supposed to be the Vorticon alphabet. If
players stumbled into a secret area, they could get the translations.
The guys were so enthusiastic that they decided to put in a preview of
their upcoming games, which, at the time, didnt exist. They described more
installments of Keen as well as a new game based on characters and elements
of Carmacks evolving Dungeons and Dragons world. The Fight for Justice,
they wrote, A completely new approach to fantasy gaming. You start not as
a weakling with no foodyou start as Quake, the strongest, most dangerous
person on the continent. You start off with the hammer of thunderbolts, the
ring of regeneration, and a trans-dimensional artifact all the people you
meet will have their own personalities, lives, and objectives The Fight for
Justice will be the finest PC- game yet.
The lake house was filled with the sense of unlimited possibilities. And
the bond between Carmack and Romero was becoming stronger by the day.
It was like two tennis players who, alter years of destroying their competition,
finally had a chance to play equals. Romero pushed Carmack to be a better
programmer. Carmack pushed Romero to be a better designer. What they
shared equally was their passion.
57
This was most clear to Carmack one late weekend night. He was sitting in
the house working at his PC as lightning flashed outside. Mitzi curled lazily
on top of his monitor, her legs draping over the screen. The heat of her body
was causing Carmacks heat-sensitive display to ooze its colors. He pushed
Mitzi gently from the monitor, and she scurried away with a hiss.
A rainstorm had picked up, and it was mighty. Cross Lake spilled into the
backyard like the prelude to a horror movie. The lake was so high that it
pushed the ski boat to the top of the boathouse. Long black water moccasins
slithered toward the deck. The bridge leading to Lakeshore Drive was com-
pletely washed out. When Jay arrived after having been out for the day, there
was no way to get in. It was, as he described it, a turd floater of a storm,
bringing everything from the bottom of the lake to the surface. He turned
away to wait it out.
Romero arrived with a friend later to find the bridge even worse than
when Jay got there. There was simply no way he was going to get his car over
the flooded expanse. And there were probably alligators and moccasins now
making it their home.
Back in the house, Carmack resigned himself to working on his own that
night. After all these hours, he had come to appreciate Romeros diverse range
of talents, gleaned from years of making his own Apple II games. Romero
had been not only a coder but an artist, a designer, and a businessman. On
top of all that, he was fun. Romero didnt just love games; in a sense, he was a
game, a walking, talking, beeping, twitching human video game who never
seemed to let anything get him down. Like a game character, he could always
find an extra life.
Just then the door behind Carmack swung open. Mitzi dashed under his
feet. Carmack turned to see Romero standing there with his big thick glasses,
soaking wet up to his chest, lightning flashing behind him, a big smile on his
face. It was a real moment, a moment so impressive that Carmack actually
saved it in his thin tile of sentimental memories. This one he wanted for
future access: the night Romero waded through a stormy river to work.
58
praise like we have rarely heaped on any program. Keen sets a new stand-
ard for shareware games, declared another. For stimulating, velvet-smooth
and cutting edge PC arcade action, wrote a third, there is nothing better
than Commander Keen from Apogee Software. Nothing. The game wasnt
just on par with Nintendo, it concluded, it was better.
Fans couldnt agree more. They were deluging Apogee with letters of
praise and letters inquiring about the next games in the Keen series. All the
main BBSs were ablaze with conversation about Keentricks, secrets, strate-
gies. Gamers were pleading tor information to decode the Vorticon alphabet.
Scott was so swamped that he recruited his mother and his first employee, a
teenage programmer named Shawn Green, to help with the demand. When
Shawn showed up for work the first morning, he was greeted by Scotts mother,
standing in her bathrobe holding two cordless phones. The second she handed
him one, it started to ring.
Romero, Carmack, and the rest of the group celebrated with a huge party
at the lake house on New Years Eve. The stereo cranked Prince. The grill
smoked. Revelers boated around the lake. Romero, who rarely drank, made
this night a special occasion. It had been a great year but a tough yearone
that had cost him his wife and kids. Faced with the choice, hed chosen the
game life over the family life. Though he spoke frequently with his boys and
saw them as often as he could, he was living with a new family now: the
gamers. And he wanted this night together to last.
He, Tom, and Jay were drunk on white wine and champagne in the
kitchen. Romero saw Carmack standing in the corner by himself, sober. Come
on, Carmack, he slurred, you gotta drink, dont be a baby! Its going to be
1991!
Normally in these situations Carmack wanted nothing less than to disap-
pear into the wallpaper. This kind of scenesocializing, cavortingwas never
his domain. He would rather be reading or programming. But contrary to
what the other guys might have thought, he wasnt inhuman. He was fun
loving too, just in his own way. He was thrilled to be working for himself,
making games, collaborating with people he admired and respected. It took
only a little coaxing from Romero to get Carmack to join them in downing
several glasses of champagne. The strongest thing theyd seen him drink be-
fore was Diet Coke. Some time later Romero found Carmack leaning quietly
against the kitchen wall. Hey, man, Romero said, You feeling buzzed yet?
You getting drunk, Carmack?
I am losing control of my faculties, Carmack replied. Mmm.
Then he stumbled away. Romero got a lot of mileage out of that response,
repeating it robotically to everyone throughout the night. It was good to see
Carmack loosen up.
59
Two weeks later, Jay walked out to the mailbox and came back brandishing
an envelope. It was the first residual check from Apogee. Pizza money!
they all said, as he opened it up. The check was for $10,500. With barely any
overhead expenses, it was gravy. At this rate theyd be making more than
$100,000 in their first year, more than enough for them to quit their day jobs
at Softdisk.
Al Vekovius still had no idea that they were moonlighting on the Keen
games, let alone doing it on the company computers. Gamers Edge was do-
ing quite well, and their latest games, Catacomb II and Shadow Knights, were
drawing raves. Softdisk had about three thousand subscriber who had paid
$69.96 per year to receive Gamers Edge every month. They knew he was
counting on them and werent sure how hed react to their mass departure.
Carmack and Romero made it clear they didnt care. This was their break,
after all. Tom, by contrast, was nervous about the move. He was worried
about getting sued by Softdisk, ruining their chances not only for making it
on their own but for enjoying the fruits of Keens success. Romero scoffed at
his worries. Dude, whats Al going to do if he sues you? You dont have
anything for him to get. All you have is a piece-of-shit couch, he said, point-
ing to the broken sofa in the living room. I mean, what the fuck? What are
you worried about losing?
Jay also expressed concern, urging the guys to handle this delicately with
their boss. Dont drop a bomb on him, he implored.
Dont worry, Romero said with his characteristic optimism. Every-
things going to be fine.
However, Als suspicions began to mount when an employee mentioned
something about the Gamers Edge guys moonlighting on their own games.
Al confronted Carmack, who he knew had a tough, it not impossible, time
telling lies. It was like feeding questions into a computer or adding numbers
on a calculatorthe answer always came out right. I admit it, Carmack said.
Weve been using your computers. Weve been writing our own games on
your time. Later he and Romero broke the news: They were going to leave,
and they were taking Adrian Carmack, their art intern, with them.
Al felt like hed walked into his house to find that someone had broken
his windows and stolen his television. But he didnt let himself get too far
down. Immediately he tried to turn the situation around.
Look, he said, lets try to salvage something out of this. Lets go into
business together! Lets form a new company! Ill support you. And you guys
write whatever games you want and Ill handle selling them. Well split eve-
rything fifty-fifty. And I wont take any legal action against you.
The offer caught them by surprise. They had assumed Big Al was going
to sue them, not finance their business. Now there was a new golden oppor-
tunity. All they wanted to do was have their own business, and they had no
60
interest in dealing with the hassles of taxes and distribution. If Al was going
to handle that stuff, what the hell? They agreed.
But when Al returned to the Softdisk office, he walked into a mutiny. The
entire company had gathered to demand an explanation. Carmack and
Romero came back from lunch and bragged about some big special deal they
were getting, one of the employees said. Whats the deal? Here these jokers
had cheated the company, used the company computers, and now youre
giving them hall of a new company? Why are you rewarding them?
Because its good business! AI said, because these guys are good!
Theyre going to make money for the company. Well all be successful. No
one was buying it. Either the gamers go, they said, or all thirty of them were
going to quit. Al sighed deeply and walked back to the Gamers Edge office.
You guys went and told everyone about this and created a nightmare, he
said. Do you realize what you have done?
Well, Carmack replied, we wanted to be truthful.
Yeah, but I could have positioned it a lot better, he said. I cant afford
to lose my staff. The deals off.
61
Chapter five Transport 109
proposals
Chapter five
is often competition for this limited space,
For Outer London town centres, measures to
whether it is for road space or rail paths. In
improve bus accessibility, public realm, walking
striking the right balance the proposals in this
and cycling will generally be prioritised. There
chapter recognise that all the varying needs
may be places where a number of options are
of London need to be met the needs for
possible. In these cases further work will be
international links (as a global city), for national
required to assess the most effective solution,
links (as a national capital), and more local links
bearing in mind the cost of the scheme in
(London is a place where people live, visit and
construction and during operation. The need
work). The proposals set out in this chapter
to recognise affordability and business case
cater for all of these needs.
constraints will be paramount given the current
financial environment, and this will inevitably
232 The specific transport proposals have to
preclude some schemes.
be considered in terms of effectiveness,
acceptability and cost. There may be an obvious
234 Due to the dispersed nature of trips in Outer
best mode for the task, for example, only
London, the role of the car is acknowledged as
rail-based modes can provide the sufficient
sometimes necessary, particularly for medium
capacity to cater for the very high volume
to longer distance trips. The use of cleaner,
same time, same place demand that occurs
low emission cars will be encouraged over others.
twice a day during the week to, and from,
central London. Similarly, regular high to
235 Most freight is moved by road. While a mode
medium volume demand over a short to
shift from road to rail and water is needed to
medium distance, particularly in growing areas
achieve the goals of the strategy, for some
types of freight, and for many servicing trips, economic sectors, as well as more flexible
access by road will remain a requirement. The working practices. This highlights the need for a
strategy therefore needs to ensure that the transport strategy that is integrated with other
freight left on the roads (which will be the broader policy areas such as land use planning,
majority) is moved as efficiently as possible education and healthcare provision.
while contributing to goals of the strategy.
This will require cleaner, better driven vehicles, 237 The proposals for each mode or policy area
better journey planning and the integration of contained in the following chapter are derived
freight and land use planning. from how they can best support the strategic
transport policies set out in chapter four, with
236 Interventions can also be temporal as well as regard to the nature of the mode and policy
spatial. The need to satisfy and cater for peak objectives. They have also been developed
demand means there is spare capacity off-peak. using an integrated approach, taking account
Greater use of transport throughout the week of wider strategies within London such as the
can help cover the fixed costs of provision and London Plan, EDS, Air Quality and Housing
make the best use of investment. The seven- strategies, as well as looking beyond the GLA
day week, 365-days-a-year, diverse economy boundary to the Greater South East region.
is something the London Plan seeks to
encourage through policy support for tourism,
retail, arts and entertainment and emerging
Chapter five
international rail services, which may result
238 London is more dependent on rail than any
in an increase in international high-speed rail
other city in the UK: 70 per cent of all rail
services to/from London. This will provide
travel (including Tube journeys) in the UK is to,
an opportunity to encourage European
from or within the Capital. Londons success is
destinations and to use Stratford International
bound up with the future of its rail network and
station to reduce congestion at St Pancras
services. It is vitally important, therefore, that
International, and provide better international
Network Rail and the train operating companies
connections to the Isle of Dogs and east London.
better serve the citys needs, and that the
Mayor has greater input and influence over
planning and delivery of their services. Proposal 1
The Mayor, through TfL, and working with
5.2.2 International and National Rail the DfT, Network Rail, the operators of
links and services international rail services and other transport
stakeholders, will encourage the provision
International rail passenger links of direct international rail services to a wider
239 The strategy fully supports expansion of range of European destinations, with some
international rail services that improve Londons of those new services serving Stratford
connectivity with Europe and provide a viable International station.
alternative to air travel.
Chapter five
is required to determine the optimum location
to the southwest and south Wales. The West for such an interchange.
Coast Main Line to the west Midlands, the
northwest and Scotland has recently benefited
Proposal 4
from a 9bn upgrade allowing faster and
more frequent services. However, according The Mayor and TfL support the development
to Network Rail, by 2020, the main line from of a national high-speed rail network and
London to Birmingham and the northwest will will work with the DfT, Network Rail, High
be full, given projected growth. Speed Two and other transport stakeholders
to ensure that the main London terminal for
248 Proposals for a second high-speed line to link any new high-speed line is centrally located,
the centre of London with Birmingham, in well-connected to the existing public
the first instance, as part of a possible wider transport network, and widely accessible
domestic high-speed rail network, are currently to maximise access to jobs and Londons
being considered by the DfT. This is based on population. It is currently considered that
a detailed set of proposals developed by High Euston best meets these criteria. Further
Speed Two, the company set up by the DfT evaluation will be made of this and other
to investigate options for a new-high speed potential termini, in particular, in relation
line from London to the West Midlands and to links to Heathrow.
potentially beyond. According to the DfTs
High Speed Rail Command Paper, published
in March 2010, such a new line could deliver
well over 2 of benefits for every 1 spent on
Chapter five
such as the Thames Gateway. Without Crossrail, central section during peak periods. According
London will be prevented from continuing the to forecasting work undertaken by TfL, an
development of its second business centre at additional 5.8 million passenger kilometres
Canary Wharf, and maximising its contribution are added to peak capacity and Crossrail will
to the wider UK economy. deliver significant crowding relief on the Tube
(including the Central, Piccadilly, Metropolitan,
255 Crossrail provides the largest single increase Hammersmith & City, Circle and Jubilee lines)
in public transport capacity exactly where and the DLR.
it is most needed. It will add 10 per cent to
the overall capacity of Londons rail network 256 As a project of national significance, Crossrail
through the provision of 24 high-capacity, will bring transport improvements that will be
10-coach trains an hour in each direction in the felt across the country. The scheme will be a
Spotlight
Chapter five
people at the peak of construction between 2013 It will be important that other public investment
and 2015, and will contribute to an ongoing pool is coordinated to maximise these benefits.
of skilled workers through the new tunnelling To this end, the LDA is developing a Crossrail
academies being established by the Mayor. In the Regeneration Investment Plan to identify and
longer-term, Crossrail will generate an estimated prioritise potential interventions that would bring
1,000 jobs when fully operational. Crossrail will further regeneration benefits to the areas around
also require the services of regionally-based key Crossrail stations.
manufacturers and other suppliers.
257 London is the centre of the Greater South East to implement HLOS. As such, HLOS is now a
region of England, the fastest developing area committed programme of National Rail funding
of the country, with a number of nationally from the DfT to 2014. The process is planned
designated Growth Areas. Continued economic to be repeated for control period five, from
growth is mutually beneficial much of 2014 to 2019.
Londons workforce live beyond the GLA area.
It is therefore important to look across regional 259 The improvements to Londons rail network
boundaries. Future extensions of Crossrail, to to be achieved by 2014 through HLOS, forms
the east and west, could help reduce congestion a key element of the MTS and it is essential
and improve connectivity and, together with that Thameslink and the remainder of the
longer trains, ensure maximum benefit is committed HLOS1 programme are completed
derived from the Crossrail infrastructure. to their original planned specification.
The improvements are shown in Figure 31,
Proposal 6 and include:
The Mayor, through TfL, and working with Improvements to capacity on each of
the DfT, Network Rail, train operating Londons main radial rail corridors, including
companies and other stakeholders, will the Thameslink programme and 900 new
consider future extensions of Crossrail that carriages by 2014 (Thameslink by 2016)
reduce congestion and improve connectivity Improved reliability
on London commuter routes.
Acceptance of Oyster at all National Rail
stations in London from January 2010
5.2.4 Londonwide rail links
and services Improving access at stations through
the Access for All obstacle-free stations
High Level Output Specification investment programme. Approximately 50 per cent of
in rail capacity stations in the first phase are located in
London or the South East
258 In July 2007, the DfT presented the HLOS
detailing the development of the National Enhancements to the freight gauge
Rail network to 2014 (control period four). and route capacity on the Felixstowe
The HLOS was accompanied by a Statement Nuneaton line (providing a direct route
of Funds Available (SoFA), which detailed avoiding London for freight trains, which
proposals for funding arrangements for the releases capacity for more passenger trains
railways in the same time period to deliver in London)
the proposals put forward in the HLOS. The Gauge enhancements to the Gospel Oak
SoFA has now been reviewed by the Office Barking line, which will provide a route
of Rail Regulation, agreed with the DfT and for rail freight services from the east to the
approval given to Network Rails Delivery Plan north of London
Spotlight
Thameslink
The Thameslink Programme is a 5.5bn project of 127 per cent by 2016. Large-scale works
to deliver a high capacity, north-south rail spine include the rebuilding of Blackfriars station,
through central London that complements which will become the first station to span the
the east-west Crossrail route. It is planned for Thames, providing direct access to both the north
completion in 2016 and will provide greater and south banks; Farringdon, will have 12-car
capacity, higher frequencies, new services and platforms and become a major interchange
improved access to central London from a range between Thameslink and Crossrail; London
of destinations within the Capital and across Bridge will be significantly rebuilt to provide a
southeast England. major increase in capacity and better facilities for
passengers. A new station will also be provided
Major benefits from the works to expand the
at Brent Cross/Cricklewood as part of the
capacity and operating network that will use comprehensive redevelopment of this area.
Thameslink, include a capacity increase in the
core section between Farringdon and Blackfriars
Chapter five
Wood Green
Harrow Romford
Ilford
Uxbridge
Ealing
Shepherds
Bush
Hounslow
Kingston
Bromley
Croydon
Sutton
1
Committed in HL0S control period four
Figure 32: National Rail and Tube stress on radial corridors into central London
H Central O H Central O
London London
G A G A
F B F B
E D C K L E D C K L
J M J M
I N I N
H Central O H Central O
London London
G A G A
F B 2031 (with full F B
2031 (with no further strategy, including
E D C E D C
investment beyond 2017) unfunded schemes)
Chapter five
Moderately stressed On average residents in the corridor experience moderate levels of crowding on rail public
corridor transport on their way to central London during morning peak for some part or all of their journey
Highly stressed On average residents in the corridor experience high levels of crowding on rail public transport on
corridor their way to central London during morning peak for some part or all of their journey
Severely stressed On average residents in the corridor experience severe levels of crowding on rail public transport on
corridor their way to central London during morning peak for some part or all of their journey
West Coast capacity Thameslink capacity enhancement Great Northern capacity West Anglia
enhancement (serving Luton airport) enhancement four-tracking, serving
Stansted airport
Croxley link
Great Eastern capacity
High Speed Two enhancements
Enhanced orbital
rail links
DLR extensions and
capacity enhancements
Crossrail extensions
Rail/Tube improved
capacity and connectivity
Longer trains on South Tramlink to southeast London,
Longer trains on Central and Thameslink enhancements including potential
South Western lines (serving Gatwick airport) and extensions Bakerloo line extension
Key
Opportunity Area
Rail termini
London terminals capacity Upgrade of all National Rail
Route improvements upgrades and strategic stations and services to London
interchanges Overground standards and
London-wide improvements integration with Oyster
Chapter five
levels of crowding and congestion after the may be required on a number of rail
measures in the TfL Business Plan and HLOS corridors, such as the Brighton Main Line.
have been implemented. The effectiveness
of these schemes at reducing rail and Tube Chelsea Hackney line
crowding, when combined with other capacity
improvements on the Underground network, 263 The Chelsea Hackney line (or Crossrail 2) provides
are shown in Figure 34. significant new rail capacity on the northeast to
southwest corridor and major congestion relief
262 In order to support Opportunity Areas set out to existing rail and Tube lines. The route of the
in the London Plan, it may be appropriate to line is safeguarded by Government and it is
improve access to rail services by providing essential that this safeguarding remains in place to
additional stations. The case for such new stations protect this important new line. Forecast demand
will be identified as part of the sub-regional shows that crowding and congestion remains a
planning and Opportunity Areas Planning significant issue in this corridor (Figure 32), even
Framework processes. with new investments such as Crossrail and
Thameslink in place. This new line is needed in
the longer term to reduce crowding on existing
routes, but also to provide the capacity that is
required to meet Londons growth and provide
connections to the National Rail network,
including dispersal of people across London from
the main line termini. The introduction of HS2
will increase this need considerably.
Chapter five Transport proposals
124 Mayors Transport Strategy
Figure 34:The potential benefits from implementing measures beyond those in the TfL Business Plan
and HLOS to reduce crowding on Londons rail and Tube network
Increased crowding
in 2031 as a result of
growth in employment
and population Proportion crowded in 2031 without any new investment would be 67%
70
Proportion of passenger kilometres
crowded (weekday morning peak)
50
Proportion crowded in 2031 would be 50%
40
30
Proportion crowded in 2031 with the full strategy package would be 32%1
20 Total impact
of the
strategy
10 on rail
crowding2
0
Crossrail, Tube Further Chelsea Further DLR Other investment
1. It would not be good value line upgrades, investment on Hackney line* extensions, including Airtrack,
for money or of benefit to the investment on the the National Rail Bakerloo line Crossrail
economy to attempt to National Rail network, north and south extensions and
eliminate all crowding network including extensions to extensions and other service
2. Rail crowding includes Thameslink and the DLR, Croxley link* improvments*
crowding on the Tube, DLR, other funded Northern line
National Rail and Tramlink measures and Underground
upgrades
Figure 35: National Rail punctuality (London and southeast operators total, including peak services)
National Rail punctuality (London and southeast operators total, including peak services)
Percent of arrivals within five
95
minutes of scheduled time
90
85
80
75
70
2002/03 2003/04 2004/05 2005/06 2006/07 2007/08 2008/09
264 It is important that the route of the Chelsea Station capacity enhancements
Hackney line is reviewed to ensure it is providing
the maximum benefits and value for money. 266 Many National Rail stations are congested,
especially at peak times and enhancements
to station capacity are required to improve
Proposal 9
customer service and to enable Londons
The Mayor will support new rail capacity in growth in rail demand to be accommodated.
the broad southwest to northeast corridor, Schemes will be taken forward where they are
for example, new lines or services using the shown to be value for money and affordable.
Chelsea Hackney line safeguarded alignment.
TfL will undertake a review of the route to
Proposal 11
ensure it is providing the maximum benefits,
including helping the onward dispersal of The Mayor, through TfL, and working
passengers from central London termini and with the DfT, Network Rail, train operating
value for money. companies and London boroughs, will seek
to deliver capacity enhancements at some
Chapter five
National Rail reliability of Londons most congested stations. The
highest priorities include:
265 National Rail punctuality has improved
a) Central London termini station
considerably since 2002/03 as a result of
congestion relief and onward distribution
the improved maintenance of infrastructure
enhancements (the potential of all onward
by Network Rail, investment in new trains
modes will be considered)
and signalling, franchise reorganisation
to better reflect rail network geography, b) Clapham Junction station capacity
franchise performance incentives and improved enhancement (new improved links
timetabling. However, despite these substantial between platforms, additional entrances
achievements, there is still room for further and more ticketing facilities)
improvement (see Figure 35). c) Improved capacity at National Rail stations
with severe congestion, including Finsbury
Proposal 10 Park, Bromley South, Wimbledon, Vauxhall
The Mayor, through TfL, will seek to ensure and Barking
that the DfT, Network Rail and the train d) Improved capacity at National Rail stations
operating companies achieve the HLOS with moderate congestion, including
public performance measure for reliability, Willesden Junction, Balham, West Croydon,
as well as an overall reduction in significant Putney, Norwood Junction and Surbiton
lateness and cancellations for London and
southeast services.
Improving customer standards across the means, on-system and off, scheduled
National Rail network in London and real time
Security features such as lighting,
267 Despite improvements in National Rail services
CCTV and Help points
being delivered by Network Rail, TfL and
others over the next 10 years, rail passengers Graffiti removal, litter removal
still do not always benefit from the level of and cleaning
service or frequencies that those who travel Train frequency of at least four trains
on the Tube enjoy, particularly outside peak per hour on each route where the
hours. The Mayor is keen that London benefits infrastructure allows, up to 23:00
from a full seven-day railway, supporting the
Capitals diverse economy with regular, frequent First and last trains broadly aligned with
services operating seven-days-a-week, without the Undergrounds operating hours
disruptions due to engineering works, except Cycle parking to basic standard and
where absolutely necessary. The Mayor also monitoring regime at every station
believes that train operating companies within two years
should provide sufficient capacity in terms
of train lengths, to sufficiently meet demand 269 This will require the influencing of the franchise
at all times. This includes weekends when process, but could be better achieved by the
acute crowding can occur due to shorter Mayor having greater powers over suburban
train formations. passenger services. It will also require a
reduction in disruption to passenger journeys
268 The Mayor will promote a common service at weekends, acknowledging that sometimes,
standard across the London rail network and the undertaking of maintenance works at
believes that Overground service standards these times will remain inevitable. Network Rail
provide an evidenced template to follow. This is already looking at how some engineering
has been adopted almost in full for the recent works could be undertaken through shorter
South Central refranchise with more than 40 overnight possessions instead, possibly through
stations and extensive patterns of routes. undertaking more preparatory work off-site.
The specified minimum standards include:
Staffing over the traffic day
Oyster acceptance and retailing via ticket
machines within Travelcard Zones 16
Station facilities such as seating
and shelters
Multi-modal customer information at
stations, through posters and electronic
Spotlight
Chapter five
and encouraging interchange at stations away
or near, capacity during peak periods need to be from the central London termini, would also
reviewed to ensure they are safe and efficient help onward dispersal (see proposal 46).
into the future.
South Acton
Chapter five
2012 London Overground Service
All train services will be four carriages long by 2012
Step-free access from the platform to the street
(existing and planned)
Watford Junction Euston (3tph)
Richmond Stratford (4tph)
Camden Road Stratford (2tph, peak hours only)
Stratford Clapham Junction (2tph)
Willesden Junction Clapham Junction (2tph)
Dalston Junction Clapham Junction (4tph)
Highbury & Islington Crystal Palace (4tph)
Highbury & Islington New Cross (4tph)
Dalston Junction West Croydon (4tph)
Gospel Oak Barking (4tph)
tph trains per hour
273 An extension of the DLR to Dagenham Dock 275 Beyond these initial improvements,
has been identified as a key component of the consideration will be given to looking at
current housing plans for Barking Riverside. further extensions of Tramlink, with a strong
There is also further scope to extend the DLR focus on a potential north-south axis, in
network in the longer term to provide better order to accommodate Croydons future
links to Stratford, improved orbital links and growth needs, and potentially to improve
connectivity in the Thames Gateway, and better east-west links to neighbouring Outer London
integration with the central London transport town centres to support improved orbital
system, for example, through a westwards connectivity. Both short extensions to provide
extension from Bank to Victoria. better access from key centres to Tramlink, and
longer extensions opening up completely new
routes are being considered.
Proposal 15
The Mayor, through TfL, will support
Proposal 16
safeguarding the route of the DLR
Dagenham Dock extension as part of the The Mayor, through TfL, and working with
housing proposals for Barking Riverside, the London boroughs and other transport
and will investigate the feasibility of further stakeholders, will investigate the feasibility
capacity and network expansion of the DLR of providing extra capacity on the Tramlink
including options south of Lewisham, west network and will review potential benefits
of Bank and north of Stratford International. of extensions to the system.
Chapter five
277 The strategy for the Tube is based on journeys and have higher capacity.
understanding customer needs by combining Where possible, innovative technologies
a reliable train service with the highest and design solutions will be used, for
standards of customer care. This means example, regenerative braking and
renewing the networks infrastructure walk-through carriages
(rolling stock, signalling, track, civil Signalling existing trackside assets,
structures and stations) to allow train which are more than 40-years-old in many
service capacity to keep up with rising cases, will be replaced with computer
levels of demand, and creating a welcoming based systems which will reduce delays
and secure environment, offering personal and increase network capacity by allowing
service to customers, providing accurate for a higher frequency of service. New
and timely service information, and creating service control centres will enable better
ease of access. information provision to customers and
allow staff to manage the train service
278 LU has embarked on its largest investment more effectively, delivering improved
programme for 70 years, focusing on improving journey time reliability and minimising
reliability, delivering faster journey times, along service disruptions
with increasing capacity across the network.
Track reduce the backlog of investment
to reduce safety risks, and remove speed
restrictions brought in to manage safety
risks to increase capacity
Civil structures renew assets such as employing many TfL Travel Tools to help
bridges, viaducts, embankments and customers plan their journeys.
drainage systems to maintain a safe service,
reduce the risks of flooding, and the service 282 By 2012, this programme will deliver an upgrade
effects of speed and weight restrictions of the Jubilee, Victoria and Northern lines. By
2020, upgrades will have been completed on
Stations modernise stations by
the Piccadilly line, Sub-Surface Railway and
replacing safety and service critical
the Bakerloo line, with a further upgrade on
systems such as fire, public address,
the Northern line. These are described in the
CCTV, lifts and escalators
Spotlights on pages 133, 137 and 138. The
280 Much of this work is brought together in a replacement of the Central line fleet will follow,
programme of line upgrades which will provide delivered into service from 2020. Considerable
some of the capacity required to support the benefits and efficiencies can be achieved
Capitals economy and meet the demands of by specifying lighter, more energy efficient
the future. Without the line upgrades it would and higher capacity trains for this and the
not be possible to maintain the service that is Bakerloo line.
currently delivered. Work to upgrade each line is
therefore the cornerstone of the strategy for the Proposal 17
Tube. By the end of the current programme, the The Mayor, through TfL, will seek to deliver
Tube network will provide up to an additional upgrades to all Tube lines in a phased
30 per cent capacity. New trains and signalling programme to provide a significant increase
systems will allow more trains to run, providing in network capacity. This will involve a
quicker and more comfortable journeys. Beyond combination of new rolling stock and/
this, the Tube will require investment to ensure or signalling systems and other asset
that its asset condition remains in a state of replacement. As part of this, continued
good repair and does not fall to the levels seen investment to bring the network to a good
through earlier decades of under-investment. state of repair and maintain it at that level
will be supported.
281 The network faces the tremendous challenge
of keeping London moving on a daily basis 5.3.3 Station refurbishments
while simultaneously rebuilding the system.
and accessibility
This massive task cannot be achieved without
some disruption to services. In order to facilitate 283 Between 2003 and 2009, 124 stations
these works and carry out regular essential were refurbished and this programme will
maintenance, some weekend closures are continue subject to availability of funding.
necessary. The high profile campaign advising This programme is delivering key system
customers to check before they travel has improvements (CCTV, public address,
proven highly successful and will continue, communications equipment and fire systems),
Chapter five Transport proposals
133
Spotlight
Chapter five
capacity into central London.
1
See Spotlight on Northern line Upgrades 1 and 2 on page 138
as well as improving customer service features. 286 Congestion relief is required at the key central
These include, passenger Help points, new London interchanges of Victoria, Tottenham
electronic information displays in ticket halls and Court Road, Bond Street, Paddington
on platforms, improved seating and lighting, as (Hammersmith & City) and Bank. Capacity
well as improvements to accessibility features increases at these stations will optimise the
such as tactile strips and colour-contrasted benefits of investment from the line upgrades,
handrails for visually impaired people. Crossrail and other developments. They will also
greatly improve central London step-free access.
284 TfL is committed to improving accessibility
from street level to platform level on the Tube 287 Further station improvements at, for example,
network. Over time, TfL will seek to increase the Vauxhall, Finsbury Park and Highbury &
accessibility of the network, building upon the Islington, will improve strategic access to, or
foundation of step-free stations already in place interchange across, the network (see section
(see section 5.9). 5.10.2, Strategic interchanges).
Proposal 18 Proposal 19
The Mayor, through TfL, will continue to The Mayor, through TfL, and working with
deliver an ongoing programme of Tube the London boroughs, private developers
station refurbishments and asset stabilisation and other transport stakeholders, will
to ensure stations are operable and deliver develop and implement a prioritised
customer service requirements, and continue programme to deliver station capacity and
to improve station accessibility over the life accessibility enhancements at Londons most
of the strategy. congested Underground stations, including:
a) Congestion relief schemes to complement
5.3.4 Station congestion relief Tube line upgrades and/or integrate
285 To relieve congestion experienced by Tube with Crossrail at the key central London
customers at key locations across the network, interchanges of Victoria, Tottenham
and to enable quicker journeys, some stations Court Road, Bond Street, Paddington
require more extensive improvements to ensure (Hammersmith & City) and Bank
safe and efficient station operations while also b) Schemes at further strategic Tube
enhancing passengers journey experience. The interchanges that are critical to
delivery of capacity enhancements to strategic Londons transport system (for example,
Underground stations and interchanges is critical Vauxhall, Finsbury Park, Highbury
to the functioning of the Tube as an integrated & Islington, Holborn, Camden Town,
network to assist existing passenger flow, and Oxford Circus, Edgware Road and
cater for future increases in demand. Northern line City branch, in particular
Old Street and Moorgate)
Chapter five
closed systems where the major proportion aspires to the highest standards of customer
of the energy that enters (for example, train care. Customers most value getting from A
motors) is released as heat, which in turn raises to B as quickly and reliably as possible, but
temperatures in the tunnels and on the trains. valued almost as much are the different aspects
As a result of increased train service capacity of service experienced during the journey.
(primarily through higher train frequencies) Customers value personal security, a welcoming
and reduced journey times (mainly through environment, accurate and timely information,
quicker acceleration and faster maximum and when they need assistance, they want high
speeds), electricity use on the Underground quality personal service from staff.
is anticipated to increase by 2020, resulting
in more heat being released in the tunnels. 290 In 2008, for the third year running, the
This will be exacerbated by increasing Underground carried more customers than ever
passenger numbers and possible increases in air before, in excess of one billion. At the same
temperature due to climate change. Therefore time, customer satisfaction with the service also
maintaining safe temperatures on deep reached a record high of 79 out of 100. Most
tunnelled sections of the Tube will present an people scored the overall service provided at
ever increasing challenge in future. Already the nearly eight out of 10.
Tube has implemented a programme to tackle
heat on the network, and this will continue over 291 Customer information and personal service
the duration of the strategy. from staff will be especially important as the
renewal programme, which can disrupt service,
is delivered over the next decade. TfL will
continue to invest in customer-focused training
Chapter five Transport proposals
136 Mayors Transport Strategy
for Tube staff including disability awareness 5.3.7 Further improvements and
training, and in information systems to deliver extensions to the network
the right information to customers when they
want it, when planning or undertaking journeys 294 Beyond the funded investment programme,
on the network. even with the introduction of Crossrail and
Thameslink, crowding will remain on the Tube
292 Customers value the presence of staff especially network. This crowding is shown in Figure 20
when travelling at night. The Underground and contributes to the corridor stress shown
will continue to staff its stations and invest in in Figure 32.
systems which enhance the management of
the station, such as CCTV, as well as ensuring 295 There are opportunities for improvements
stations are well-lit and visibly managed, all to other aspects of the transport system,
clean and graffiti free. particularly the (national) rail network to
relieve crowding on the Tube. Potential new
293 There is a rich heritage of art and design on lines, such as Chelsea Hackney, would also
the Tube. High quality, value for money design be designed in part to reduce Tube crowding
will continue to be a feature of the Investment where possible. These potential enhancements
Programme. Art on the Underground, LUs art are described in section 5.2.
programme, continues the Tubes long tradition
of working with artists. Licensed busking and 296 Over the lifetime of this strategy, there are also
Poems on the Underground bring music opportunities for further enhancements and
and poetry to the wide-ranging audience of extensions to the Tube network to improve
customers on the network. These initiatives journey times and provide additional capacity
can delight customers and improve the essential for the continued growth of London.
travelling environment. Any potential schemes will be subject to a
thorough value for money and feasibility
Proposal 21 analysis, and will be considered in the light of
any future funding constraints. They will also
The Mayor, through TfL, will continue to be integrated with enhancements to other
develop and implement measures to deliver elements of the transport system, in particular
the highest standards of customer care on the rail network.
the Underground, including the provision of
high quality information about engineering 297 Further enhancements (beyond the funded
works that affect regular Tube services, and upgrades) to the Northern line are possible.
improved information on the accessibility of With private sector funding, there is the
the Tube network highlighting step-free and potential to extend the line to Battersea to
mostly step-free routes. support developer-led growth in the Vauxhall/
Nine Elms/Battersea Opportunity Area, an area
Spotlight
Chapter five
significantly, the new trains will be the first to
From December 2009, a new service pattern be air-conditioned on the Tube network.
was introduced on the Circle line, almost
Spotlight
Woodside Park
32
the morning peak by 18 per cent and increase
Edgware
Burnt Oak
Mill Hill East
West Finchley 24
22
Finchley Central
K
Kentish T wn
To
24
forecast growth in demand will continue to place 28
28 24 20
Belsize Park
Camden To
T wn
Angel
32
24
Old Street
28 Goodge
22
24
Street Moorgate
20
20 Court Road Bank
Clapham North
Stockwell
Clapham Sou
outh
Balham
24 32
Tooting Broadway
T
South Wimbledon
32
Chapter five
improvements. connectivity and journey times, while
providing relief to congested National
299 The Croxley rail link, providing a new Rail approaches to central London from
connection between Croxley station on the the south/southeast, subject to resources
Watford branch of the Metropolitan line and and the results of further study
the now closed Croxley Green branch line c) A link at Croxley to join the Watford
is a long standing proposal championed by branch of the Metropolitan line to
Hertfordshire County Council. Although outside Watford Junction (funding to be secured
the GLA boundary, the link is supported by Hertfordshire County Council in
by the Mayor as it improves the regional conjunction with the DfT)
connectivity of northwest London by linking
the Tube network to the important National
Rail interchange at Watford Junction and the
employment, retail, leisure and healthcare
opportunities in Watford town centre.
300 The bus has become one of Londons transport 303 Buses play a key role in providing access to jobs
success stories over the last decade. The and services and are the most widely-used form
Capitals buses now carry 2.2 billion passengers of public transport across London. Buses are the
each year the highest level since 1962, with predominant mode for public transport within
service levels also at their highest since 1957. the suburbs and Inner London. Outer London,
Figure 37 shows the trend since 1971. in particular, relies on the bus network to provide
access to, and between town centres. Buses
301 Key achievements include: also facilitate longer radial trips into London by
All buses are fitted with the iBus real time feeding into railway stations and by enabling
audio and visual Next Stop signs passengers to get to their final destinations in
central London. An effective bus network also
A highly accessible network, where more
helps in reducing traffic volumes and overall
than 90 per cent of London residents
C02 emissions.
are within 400 metres (approximately a
five minute walk) of a bus stop and all
304 These roles will remain essential as London
buses (except heritage Routemasters)
develops. The bus network will need to
are wheelchair accessible
respond to changing demands. Improvements
Reliability is at the highest level ever in the quality of the experience offered to
recorded. This has been achieved through passengers will need to be consolidated and
additional resources, incentivised contracts, (where possible) enhanced to meet increasing
improved bus priority, enforcement and expectations.
central London Congestion Charging
Measures to make the system easier to
5.4.2 Bus network development
use, including straightforward service 305 Londons bus network is subject to a continuous
patterns, better information, improved bus development process, enabling it to respond to
stops and stations, simplified ticketing and changing travel needs. This is passenger-led,
improvements to driver training based on based on research and consultation.
compulsory disability awareness training
Vehicle enhancements such as CCTV 306 Compared to other major world cities,
coverage of the whole fleet, successful trials Londons bus network performs either equally
of both diesel-electric hybrid and hydrogen well, or better than average, on several key
fuel cell engine technology performance indicators, including accessibility.
The cost efficiency of the bus network in
London is 20 per cent ahead of most major to change, including new homes, workplaces,
international cities. London currently has a shopping centres and leisure attractions.
comprehensive orbital bus network, enabling
direct orbital journeys between neighbouring 308 Where major change or development is taking
centres in Outer London, shown in Figure 39. place in London, TfL will continue to work
closely with the boroughs and developers to
307 Continued development of the network will be ensure the needs and demands on the bus
necessary so that it can carry on responding network are fully understood, that plans for
2,500
journey stages (millions)
Number of passenger
2,000
Figure 35
1,500
Chapter five
1,000
1987/88
1989/90
1991/92
1993/94
1995/96
1997/98
1999/00
2001/02
2003/04
2005/06
2007/08
1971
1973
1975
1977
1979
1981
1983
85
mean attribute score/100
80
Customer satisfaction
75
70
65
60
1998/09 1999/00 2000/01 2001/02 2002/03 2003/04 2004/05 2005/06 2006/07 2007/08
Bus service overall evaluation Information (bus stop and bus interior) Level of crowding
Personal safety and security average (at stop and on bus) Reliability (journey time x time waited)
Figure 39: Selected orbital and other bus services in Outer London
Wood Green
Brent Cross
Harrow Romford
Ilford
Uxbridge Stratford
Ealing
Shepherds
Bush Woolwich
Hounslow
Kingston
Bromley
Croydon
Sutton
Key
Selected orbital bus services Metropolitan town centre Major centre
Other bus services Potential metropolitan town centre District centre
any changes to the network are identified, and 310 The development of the bus network will need
opportunities for funding are fully explored. to support other transport investment, such
as Crossrail and other railway improvements.
309 It is essential that the bus network continues to In addition, there will be ongoing alterations
be developed in such a way to cater for the overall to the nature and distribution of services and
shape and scale of growth across London. TfL facilities provided by others, such as healthcare
will undertake reviews of the strategic priorities and education, which the bus network will need
underlying the process approximately every five to reflect.
years to ensure the bus network reflects the
pace of development in London, responds to 311 Keeping the bus network as accessible as it
the challenges and opportunities of growth, and is today will also be essential as the fleet will
aligns with possible revisions of the London Plan. continue to be the only city-wide accessible public
Chapter five
transport mode despite improved accessibility
of the rail networks. Similarly, buses can operate Proposal 23
24-hours-a-day, supporting Londons 24-hour The Mayor, through TfL, and working
economy, whereas rail services often cannot due with the London boroughs and other
to necessary maintenance constraints. stakeholders, will keep the development
of the bus network under regular review,
312 Network development will also consider the including reviews of the strategic priorities
improvement and efficiencies that can be underlying the process approximately
achieved at busy interchanges and major every five years, to ensure it caters for
transport hubs, both existing and emerging. growth in population and employment,
while maintaining ease of use, attractive
frequencies and adequate capacity,
reliable services, good coverage and good
interchange with other modes. All proposals
for change will be appraised to ensure that
they deliver good value for money and that
the funds available are being invested in
optimum service improvements.
Spotlight
5.4.3 Bus service quality 316 Bus information has been transformed over
the last 10 years. Improved spider maps and
313 As Londons economy grows, pressures on road timetables are in place throughout the network.
space will mean a continued requirement to iBus has provided Next Stop announcements
ensure that appropriate measures are taken to (audio and video) on all buses, and has
maintain an attractive and reliable service for improved information on Countdown signs at
bus users. bus stops. Further development will include
delivery of real time information through
314 Bus priority measures such as bus-only roads, mobile phones and the internet, as well as
bus lanes and selective vehicle detection at an expanded number of signs at stops.
traffic signals are essential tools in ensuring
that the limited people-carrying capacity
Proposal 24
of the road network is being used most
effectively. These measures help reduce bus The Mayor, through TfL, and working
journey times, improve bus reliability and with the London boroughs and other
increase the efficiency of the bus network, stakeholders, including developers, will
Chapter five
especially when they are considered as part improve bus passengers journeys by
of a whole route approach. Bus priority measures, including:
measures are systematically identified, a) Incentivising bus operating contracts
appraised and delivered at key locations, and expanding staff training in order to
including town centres and their approaches, consolidate reliability improvements
at new development sites, and links where bus
b) Introducing measures such as bus priority
passengers represent a significant proportion
at critical locations
of all road users.
c) Ensuring that the appropriate enforcement
315 Quality incentive contracts have been very of bus priority is carried out
successful in incentivising operators to
d) Implementing the Countdown 2 project
maintain a high level of reliability, and the iBus
to deliver expanded access to real
system improves operators ability to control
time information and develop further
services effectively.
integration with digital communications
to provide real time bus information
Chapter five
Proposal 26
PHVs offer a range of valuable services across
The Mayor, through TfL, and working with the Capital, making a similar number of trips
the London boroughs and other stakeholders in total to taxis. The PHV trade is very diverse,
will support improvements to the taxi service covering all vehicles1 for up to eight passengers
through a number of measures, including: offered for hire with the driver. As well as the
a) Continued highway priority for taxi familiar minicabs and people-carriers, this
services, for example, access to bus lanes includes chauffeur and executive cars, some
patient transport and school support services
b) Reduced taxi vehicle emissions and and a wide range of specialised operators.
development of low emission taxis Private hire also encompasses a number of
c) Provision of parking and waiting facilities, niche limousine and other bespoke services for
including rest facilities which little or no alternatives exist. PHV services
are spread more evenly across London than
d) Provision of ranks and facilities
taxi activity. Like taxis, PHVs are particularly
at interchanges
important at night when other public transport
e) Taxi marshalling is limited. For those travelling with mobility
f) Action against touting and illegal cabs impairments, heavy luggage or seeking to reach
a remote location, PHVs are a good quality,
g) Improved driving behaviour, to be value for money solution.
encouraged through the licensing
procedure of taxi drivers
1
Except taxis
locations for coach station facilities to provide their legally required break from driving.
easier access to the coach network, while Ensuring that adequate facilities are available
retaining good access to central London for is a key function of the London Coach Forum,
coach operators. which is coordinated by TfL, and provides a
valuable engagement mechanism with the
328 Another challenge for coach operators, industry. TfL, working with the boroughs, will
especially those who provide private hire or continue to develop facilities for coaches,
charter services, is the location and availability balancing the needs of coaches with the needs
of pick-up and set down areas and, more of other road users. To support this, the Mayor
importantly, parking where drivers can take will set out specific coach parking standards
Chapter five
5.6 Managing the road network road length, but carrying more than 30 per
cent of Londons traffic (see Figure 40).
5.6.1 Introduction The London boroughs are highways and
332 Londons road network serves a variety of traffic authorities for the remaining strategic
purposes. It is, most obviously, the means by and local roads in their individual borough
which people travel from A to B by foot, cycle,
334 TfL manages traffic signals and traffic
motorcycle, taxi, car, bus and by which the
control systems on all roads throughout
vast majority of freight is moved, accounting
London and, under the Traffic Management
for over 80 per cent of all trips in London.
Act, has a Network Management Duty to
The Mayors focus on smoothing traffic flow
coordinate traffic management and other
applies to all of these user groups. But the road
interventions on the highway, and to facilitate
network also constitutes a very large proportion
the overall movement of people and goods
of Londons public realm, where people can
across the Capital.
relax, socialise and enjoy the atmosphere of
this world city (this role is discussed in detail
Chapter five
5.6.2 Road congestion
in the 'better streets' section). There are
conflicts between and within these two roles, 335 Road congestion manifesting itself in delay,
and the Mayor, through TfL, and the boroughs poor reliability and low network resilience
will continue to seek to resolve these where is a major issue for Londons transport system.
possible, taking into account the specific Congestion costs an estimated 2bn in lost
function and circumstances of the part of the economic productivity, adversely affects
road network involved. However, the overriding Londoners quality of life, causes frustration
objective is to maximise the efficient use of this to road users, contributes to a deterioration of
scarce resource, and this section outlines the air quality and leads to higher CO2 emissions.
principal ways in which the Mayor proposes to
achieve this. 336 Levels of delay, reliability and resilience are
determined principally by the relationship
333 Responsibility for managing Londons road between the supply and demand for road
network is shared between the Highways space. The supply (also known as the effective
Agency, TfL and the London boroughs: road capacity) is determined by the amount
The Highways Agency manages the M25, of physical road space available, junction
M1, M11 and M4 motorways capacity, speed limits, the condition of highway
infrastructure including traffic signals, the
TfL is responsible for the Transport for
volume and duration of road maintenance
London Road Network (TLRN), the busiest
works, utilities works and the incidence of
and most economically important radial and
vehicle collisions and breakdowns. The demand
orbital arterial routes crossing the Capital,
placed upon the network capacity comprises
accounting for around five per cent of total
Chapter five Transport proposals
152 Mayors Transport Strategy
21
J 23
25
K L M
27
18
I
28
H 29
16 N
G
13
O 30
A
F 2
12
3
E 4
10 B
9
D
8
C
7 6
Key
Motorway Major orbital routes
8 Motorway junction A Major radial corridor*
Transport for London Road Network
Collisions 31%
Vehicle breakdowns 8%
Local authority planned works 15%
Local authority unplanned works 2%
Utility planned works 11%
Utility unplanned works 8%
Special events 4%
Unplanned events 1%
Other (spillages, etc) 20%
Note: Based on data gathered by the London Traffic Control Centre in 2008/09
moving vehicles, pedestrians, cyclists, parking 339 Delay and journey time reliability vary according
Chapter five
and loading. to route, direction and time of travel, seasonal
factors, roadworks, traffic lights, planned and
337 Generally speaking, on a largely saturated road unplanned events, and traffic volume. Figure 41
network as in London, for a given capacity of shows the causes of unusual severe congestion,
road, as traffic volumes rise, speeds will reduce which affect journey time reliability, by duration
and congestion increases, leading to longer of delay, as recorded by the London Streets
journey times, less reliable journeys and lower Traffic Control Centre. The chart shows that
levels of customer satisfaction. In 2008, only almost 40 per cent of unusual congestion is
25 per cent of Londoners were satisfied with caused by collisions and vehicle breakdowns,
the levels of traffic congestion. and over a third is caused by planned and
unplanned road works.
338 As population and economic activity increases,
so will pressure on the road network, potentially 340 Poor reliability and predictability of journey
leading to significantly more delay, less reliable times means those who use the road network
journey times and reduced resilience of the have to allow significantly longer for their
network to planned or unplanned interventions. journeys to ensure they reach their destination
These congestion effects, in turn, are likely to on time. Improving the reliability of journey
reduce the productivity and competitiveness of times on the road network (even if average
the Capital as a whole, and particularly those delays increase due to rising traffic volumes
areas where local economies depend on reliable or other factors) is of significant benefit to
road transport, for example, Outer London motorists, freight operators and other users of
town centres. the road network. It enables them to predict
better how long a journey may take, allowing
for efficient and economic planning of social and smarter travel measures and the
and commercial activities and to reduce the continued operation of the central London
total amount of time they would otherwise Congestion Charging scheme in the original
need to allow to make their journey. area, provided for in chapter five)
5.6.3 Smoothing traffic flow 343 As outlined in section 5.27, the Mayor
proposes to remove the Western Extension of
341 Smoothing traffic flow is the term used for the Congestion Charging zone. The removal
the Mayors broad approach to managing road of the zone is part of the Mayors broader
congestion and, in particular, improving traffic transport strategy. This includes the proposals
journey time reliability and predictability. The to better manage and smooth traffic flow,
aim of the smoothing traffic flow approach as set out below, to mitigate the potential
to managing the road network is to improve effects of removal on congestion and emissions
conditions for cyclists and pedestrians as well on the road network formerly covered by the
as vehicular traffic. charging zone.
342 Smoothing traffic flow has six components: 5.6.4 Maximising the efficient and
Maximising the efficient and reliable reliable operation of the road network
operation of the existing road network
344 The poor reliability of journey times means
Minimising the impact of planned those who need or wish to use the network
interventions on the road network that have have to plan for the worst case scenario when
the potential to disrupt traffic flows predicting how long their journey may take.
Minimising the disruption caused by This makes for the inefficient and uneconomic
unplanned events (collisions, emergencies, use of time and energy in respect of ordinary
etc) as they occur and returning the day-to-day activities and can lead to journeys
network to its planned steady state being predicted to last for longer than the
operation as soon as possible actual average journey time. Increasing the
Maintaining road network assets in a reliability of journey times on the road network
good state of repair in the interests of (even if average journey times are increased by
safety and efficiency increased traffic volume) can result in motorists
having a better prediction of how long a
Where a net benefit under proposal 35 can journey may take that is closer to the actual
be shown, developing the road network average journey time.
Achieving targeted modal shift from
car journeys to more sustainable modes 345 The Mayor and TfL, working closely with the
(supported by the improvements in public boroughs, will therefore manage, as far as is
transport, walking and cycling conditions reasonably practical, the overall road network
and prioritise measures that improve the 346 A key component in the future management of
reliability of journey times. the road network is to increase the knowledge
of how the network operates and to employ
Proposal 30 the most effective solutions and technological
developments to ensure its efficient operation.
The Mayor, through TfL, and working
To do this, TfL will continue to develop its
with the London boroughs and other
state-of-the-art dynamic traffic control system
stakeholders, will introduce measures to
ensuring that the system grows in capability
smooth traffic flow to manage congestion
as the next generation of technological
(delay, reliability and network resilience) for
advances allow it to do so cost-effectively.
all people and freight movements on the
This will bring together real time operational
road network, and maximise the efficiency of
data, historic analysis and predictive modelling
the network. These measures will include:
to more effectively respond to planned and
a) Further investment in intelligent traffic unplanned disruption, and to proactively
control systems (such as the urban manage the available road capacity in real
Chapter five
traffic control system, SCOOT) and the time; for example, through increased on-street
infrastructure to support them control and by providing real time information
b) Allowing motorcycles and scooters to use to drivers in a way that supports their journey
TLRN bus lanes subject to a trial period decisions. This capability will be deployed more
and evaluating its impact widely across the Capital, to better manage
the road traffic effects of expected economic
c) Upgrading, rationalising or removing and population growth and to support the
traffic management equipment and development of Outer London.
optimising timings at signal controlled
junctions to keep traffic moving 347 In the period of the strategy, consideration
d) Working with the DfT to pilot and will be given to the increased use of real time
develop the concept of pedestrian communications from vehicle to vehicle, and
countdown at traffic signals to optimise between vehicles and on-street infrastructure
the amount of green time for both and a central traffic management control
pedestrians and road traffic system. The development of intelligent
transportation systems (ITS) technology will
e) Planning and implementing a targeted allow the upgrading of Londons traffic signal
programme of improvements to the network. The aim is to create a state-of-the-
existing road network, including junction art traffic signal control system for the 21st
upgrades to improve traffic flow on the century capable of maximising the efficient
most congested sections of the network, use of road capacity in London.
and to improve conditions for all road users
Chapter five
on the movement of people and goods, by:
Reducing and mitigating the impacts through
a) Strengthening the Mayors Code of effective real time traffic management
Conduct for Roadworks to further improve
Taking appropriate remedial actions on
coordination between different highway
the ground
authorities and utilities across London
Providing effective real time information
b) Utilising LondonWorks to improve
roadworks planning, coordination and Developing pre-arranged plans to deal with
information availability events which can cause high risks to the
safety of the public when they occur
c) Encouraging collaboration between utility
companies and the use of innovative road
355 How these unplanned interventions that
engineering techniques such as minimum
adversely affect the normal operation of the
dig technology and temporary plating over
road network are managed has a direct impact
roadworks
on the resulting levels of traffic disruption.
d) Implementing the concept of lane rental Highway and traffic authorities, the police and
charges for utilities to reflect the value utilities therefore have an important role in
of their temporary possession of road identifying the potential causes of unplanned
capacity (in terms of cost of delay to the events, minimising response and clear-up times,
road user) and to incentivise reductions and effectively managing traffic around such
in the duration of roadworks incidents to minimise disruption.
356 Improving the accessibility and availability of and roadworks, and has remained stable at 50
customer information about when and how to per cent in recent years. However, roads are
travel, and how to avoid as far as practicable vital public spaces which all of us use every
the impact of incidents and interventions on the day. The condition of roads and pavements is
network, can improve Londoners ability to move therefore fundamental to the quality of the
around the city reliably. This can include better urban environment.
information about incidents before journeys
begin (for example, through media available in Proposal 34
homes, offices and shopping centres), once they
The Mayor, through TfL, and working
are underway (for example, through improved
with the London boroughs and other
radio announcements), and in the immediate
stakeholders, will work in collaboration to
vicinity of the event (for example, through the
maintain cost-effectively Londons road
use of variable message signs).
network assets in a good state of repair in
order to maximise their operational safety
Proposal 33 and effectiveness, and to promote road user
The Mayor, through TfL, and working with satisfaction. This will include:
the London boroughs and other stakeholders, a) Conducting programmes for the
will improve the real time management of maintenance of roads, pavements,
unplanned interventions and incidents on the bridges, tunnels and traffic systems so
road network, and improve communications to that the TLRN and borough road network
minimise the disruption and raise levels of public is serviceable
satisfaction with road network management.
b) Ensuring highway structures are
5.6.7 Maintaining road network assets inspected regularly
for safety and efficiency c) Developing a Tunnels Safety Enhancement
Programme taking account of, among
357 Londons roads, pavements, bridges, tunnels other matters, fire risks, lighting,
and traffic control systems represent billions communications and surveillance
of pounds worth of public assets. Maintaining
them in a state of good repair is vital for the 5.6.8 Developing the road network
safe and efficient operation of the network and
to achieve a good quality of life and economic 359 Due to limited space, the approach taken in
productivity. London is generally to get more from the
existing road network rather than conducting
358 Customer satisfaction with the physical condition a comprehensive road building or widening
of roads and pavements in London is generally programme. However, the strategy recognises
higher than that for the management of traffic the potential need for local road capacity
enhancements in certain circumstances, such promote mode shift towards public transport,
as river crossings (see section 5.8), where there walking and cycling.
can be demonstrated an overall net benefit
against the criteria set out proposal 35, below. 361 However, the precise effectiveness of this
This approach is consistent with London Plan complete package of measures over the 20 year
policy 6.12. period of the strategy is uncertain. The level and
distribution of any such growth-induced delay
Proposal 35 and deterioration of journey time reliability by
2031 will be dependent upon future investment
The Mayor, through TfL, and working with and travel patterns, neither of which are
the London boroughs and other stakeholders precisely known. In addition, during this period
will give consideration to new road schemes there is expected to be continuing technical
where there is an overall net benefit when and social change that will affect the pattern of
judged against the following criteria: demand for road space and the way in which the
a) The contribution to Londons sustainable road network can be managed.
Chapter five
development/regeneration including
improved connectivity 362 Furthermore, peoples behavioural responses
and increased use of sustainable modes in the
b) The extent to which congestion (average
future may differ from their responses today.
vehicle delay, unreliable journey times and
For example, as a result of reduced rate and/or
poor levels of network resilience) is reduced
free public transport fares, todays children and
c) How net benefit to Londons environment teenagers in London make greater use of public
can be provided transport than their predecessors and could
d) How conditions for pedestrians, cyclists, continue this higher level of use into adulthood,
public transport users, freight transport inspired further by the behavioural legacy of the
and local residents can be improved 2012 Games. As a result rates of car ownership
and use may be lower than todays levels.
e) How safety for all is improved
All proposals will demonstrate how any 363 Because of these uncertainties, the effectiveness of
disbenefits will be mitigated. the proposals in the strategy may be greater than
can be quantified using conventional techniques.
5.6.9 Outcomes
364 Figure 42 illustrates the potential effectiveness
360 The measures to smooth traffic flow described of the transport strategy on reducing average
previously will directly tackle the causes of vehicle delays on the road network, showing
growth-induced congestion on Londons road both the estimated level (in dark blue)
network. They are supported by measures and possible greater levels of effectiveness
elsewhere in the strategy to improve and that might be achieved. Although a better
understanding of journey time reliability is measures in the strategy achieve their maximum
being gained rapidly through TfLs traffic effectiveness then further interventions would
monitoring processes, still too little is known not be required, however, with lower levels of
to usefully forecast levels of future reliability. effectiveness there would be a need for further
Improvements to journey time reliability, while interventions in the longer term.
expected, are therefore not shown. If the
The policy measures shown in this figure will also improve journey time reliability which is a priority for Londoners and is the strategic outcome
measure for smoothing traffic flow. The relative effectiveness of these interventions will also vary spatially, for example between the CAZ, Inner and
Outer London
Spotlight
Managing roadworks
It is estimated there are around 500,000 level of disruption being experienced on Londons
holes dug in Londons roads each year. Until busiest main roads.
recently there was limited ability to control the
The Mayor wishes to introduce a targeted lane
roadworks taking place in London. This imposed
rental scheme. This scheme would apply charges to
unacceptable costs in terms of congestion and
those undertaking roadworks at the busiest time
damage to the road surface.
of the day and on the most congested parts of the
The London Permit Scheme began in January network. These charges could be avoided by works
2010, with the immediate support of TfL and 18 promoters if, for example, they undertook works at
London boroughs, and expressions of interest non traffic sensitive times or employed innovative
from other boroughs have followed. The scheme working practices to allow the carriageway to
aims to ensure that roadworks are undertaken return to traffic use at peak times.
in the least disruptive manner, are completed as
The objective of the scheme would be to focus
quickly as possible, and are coordinated so all
on the most congested roads in London and
works required at a single location take place at
the most important pinch points on the TLRN
the same time, wherever practical. In its first three
Chapter five
and aim to reduce the volume and duration of
months of operation, TfL approved around 12,000
roadworks. The scheme would incentivise works
applications to undertake works on the TLRN;
promoters by using charges that reflect the value
1,800 were refused. This alone will have reduced
of their temporary possession of road capacity
the overall number of roadworks occurring and
(in terms of cost of delay to the road user).
5.7 The Blue Ribbon Network with land-based public transport, scheduled
commuter services may not be as cost-
5.7.1 Introduction effective to provide, and can produce higher
carbon emissions per passenger. However, if
365 The Blue Ribbon Network encompasses the loadings increase, the per capita economic
Thames, the canals, tributary rivers, streams, and environmental costs will fall. As further
docks, reservoirs and lakes within London (as residential, commercial and leisure facilities
shown in Figure 43), a considerable proportion develop in the Thames Gateway as well as
of which is navigable by passenger and freight west London, river services may become more
vessels. Building on the policies in the London popular, making better use of new and existing
Plan, the strategy aims to maximise the capacity. Including leisure trips, a total of five
networks potential for passenger and freight million passenger journeys are estimated to
services, thereby relieving other congested have been made on the Thames in London
and crowded modes. in 2009/10.
5.7.2 Making better use of the Thames 368 In order to maximise the potential of the
for passenger services river in the build-up to the 2012 Games and
beyond, the Mayor has led the development of
366 The Thames has been a strategic asset for
a River Concordat between the Port of London
London throughout its history, providing a vital
Authority (PLA), British Waterways, ODA, boat
link for people and goods. Currently, Londons
operators, pier owners, riparian boroughs,
river traffic comprises a variety of freight and
TfL, the LDA and other organisations with an
passenger services for commuters and tourists.
interest in improving passenger services on
At present, services operate from 22 piers
the Thames. The River Concordat Action Plan
between Putney and Woolwich, nine of which
identifies six core workstreams:
are under TfL management.
Providing an integrated and enhanced
367 Riverbus services provide a comfortable, service for the 2012 Olympic Games
accessible and occasionally faster alternative Increasing pier provision
to other modes for those within the catchment
Improving service quality
zone of piers. In 2008/09 nearly 900,000
journeys were made by peak-time commuters Integrating ticketing with land transport
on the river. Demand has increased by over Improving pier signage
600,000 journeys since 2003/04, driven by
riverside property development and commercial Improving passenger information
developments in the Docklands, as well as
improvements to services part-funded by
TfL, boroughs and developers. In comparison
4
8
3
5 10
9
1
7
6
11
12 17
16
14
15
13
Chapter five
Key 1. Grand Union Canal 8. Salmons Brook 15. River Wandle
Larger tributary rivers 2. River Brent 9. River Roding 16. Ravensbourne River
3. Silk Stream 10. River Rom 17. River Cray
Canals and river navigation 4. Pymmes Brook 11. Ingrebourne River
5. Moselle Brook 12. River Crane
Large lakes and docks 6. Regents Canal 13. Hogsmill River Note: Not all tributaries
7. River Lee Navigation 14. Beverley Brook are shown
River Thames
369 The following supporting areas are also being services. Work is ongoing to further integrate
given consideration: ticketing and passenger information with
Boat yard provision other modes of transport. Lack of customer
awareness of services on the river has been
Skills cited as one of the key barriers to greater use.
More reliable management information Better signage at public transport interchanges
and inclusion within the Legible London
Reducing the environmental impact of
wayfinding system may encourage more people
services
to use river services. Improved branding will
help customers choose the most appropriate
370 Early outcomes of the concordat include a
service for their needs.
new direct service between Canary Wharf and
London Bridge and the extension of Oyster
371 Feasibility work undertaken by TfL has
pay as you go ticketing on Thames Clippers
identified scope for additional passenger
services in east London, to complement 373 Additionally, there may be scope for a new
public transport networks. Potential exists passenger cruise terminal on the Thames
to connect new developments on either side where there is capacity to accommodate large
of the river with each other, the Docklands vessels, which is supported by London Plan
and central London. These would improve policy 7.26. A new terminal could also support
cross-river connectivity, capacity and boost Londons tourism and aid local regeneration
the local economy. In the short-term, this schemes, although the location would have
could include new services between North to be considered in light of other proposals,
Greenwich (The O2) and East India pier, as such as new river crossings.
well as enhancements to the Woolwich Ferry.
There may also be demand for a new vehicle 5.7.3 Pier capacity and supporting
ferry service serving Gallions Reach. Further infrastructure
consideration to river crossings in east London
is given in section 5.8. 374 A Pier Plan, commissioned by the LDA, has
reviewed the current status of piers from
372 Options for increasing passenger use of the river Putney to the Thames Gateway region and
will be explored over the period of this strategy made recommendations for where additional
through the sub-regional planning process, pier capacity should be located.
development planning, as well as through the
on-going work of the concordat. Proposals 375 The most pressing need for more pier capacity
for new services from developers, operators, is in central London where demand is highest,
local and central Government and other agencies, and competition for space between leisure
will be welcomed by the Mayor. Sustained and commuter services is the greatest. TfL
commitment will be required from these partners will extend Tower Millennium Pier and the
to ensure services remain viable over the course concordats pier capacity workstream is
of the MTS. developing low-cost solutions to enable the
expansion of other central London piers.
Proposal 36
376 Outside central London, TfL will undertake
The Mayor, through TfL, and working with feasibility work to identify if there is a need to
the Port of London Authority, ODA, boat build new piers at North Greenwich and Canary
operators, pier owners, riparian boroughs Wharf to relieve existing facilities. Further
and other interested parties, will continue opportunities for new piers will be explored by
by means of the River Concordat to work the pier capacity workstream in line with the
to enable the development of Londons river Pier Plan and in conjunction with developers,
services to reach their full potential and to pier owners and other stakeholders; funding
better integrate river services into the land- will be sought from a range of sources.
based public transport network.
377 The concordats pier capacity workstream is 5.7.4 Making better use of other rivers
also developing pier amenity standards to help and canals for passenger services
ensure more consistent levels of service across
the network. 380 Current infrastructure investment in the
waterways surrounding the Olympic Park
378 New river traffic management facilities may site, together with increased marketing and
also help optimise pier use and reduce conflicts promotion is intended to leave a legacy of
between different passenger services. However, increased recreational use. Opportunities to
this may entail alterations to the current provide leisure cruises around the park following
regulatory framework and would require the full the 2012 Games are currently being explored.
participation of partners in the River Concordat
and Government. 381 Concordat partners including British Waterways,
the ODA and boroughs can help identify
379 The Mayor also recognises the need for opportunities to increase use of other waterways
sufficient supporting infrastructure for in London such as the River Lee Navigation and
waterborne transport both passenger and Grand Union Canal. Where passenger services
Chapter five
freight. In particular the need for boat yards on these waterways are viable they will likely be
to inspect, service and repair vessels. A report for leisure use, as journey times are generally
conducted by the GLA in 2007 identified slow. New or expanded service provision will
the lack of suitable facilities in London and be dependent on potential demand and local
recommended that at least one additional environmental impacts.
facility be developed to cater for the larger
vessels operating on the Thames. 382 There are also opportunities to improve
pedestrian and cycle access to the Blue Ribbon
Proposal 37 Network and improve the quality of towpaths
for a range of leisure and non-leisure trips.
The Mayor, through TfL, and working
with the London boroughs and other 5.7.5 Making better use of rivers and
stakeholders, will encourage the provision canals for waterborne freight
of more pier capacity, particularly in central
London and will seek financial support for 383 The Mayor recognises that transporting freight
new piers when considering development (including waste) by water is a less damaging
proposals in the vicinity of the Thames. The option environmentally and can help ease the
Mayor, through TfL, will also work with the impacts of congestion on the road network.
Port of London Authority, boroughs and The shift from road freight to waterborne
operators to identify and promote suitable freight and increasing goods transported (by
boat yard facilities in London. tonnage) from the current 1.84m tonnes
per year is an important element in reducing
Case study
vehicle emissions and improving the quality of 387 This strategy supports the retention of these
life in London. The Port of London within the wharves. Furthermore, the Mayor believes
Greater London boundary remains a significant that there is potential for additional transfer
port facility, handling a range of goods. from road to water, particularly for deliveries to
central and west London. This will necessitate
384 Water transport is particularly suited to bulk the reactivation of some of the safeguarded
movements of relatively low value cargoes for wharves that are not currently in use, and
which speed is less critical, aggregates and may require the addition of further wharves
waste/recyclates are prime examples. Within in appropriate locations to serve this demand.
London there are also other cargos such as Road access will also be a consideration at
sugar, vehicle parts, metals, timber, foodstuffs, these sites.
fuel, oil and other bulk liquids. Water
transport is also well-suited to construction 388 TfL has researched the opportunities for
and demolition activities connected with freight transport on Londons canal network
building development. In the Olympic Park at and, along with British Waterways will promote
Stratford, waterways have been upgraded so these opportunities further. This will involve
Chapter five
construction material can be transported by the consideration of whether to safeguard a
water rather than road. The new Three Mills number of wharves on the canal network.
Lock in Bromley by Bow can accommodate
barges weighing up to 350 tonnes (equivalent Proposal 38
to 17 average HGV loads).
The Mayor, through TfL, and working with
385 Future potential for such movements include the Port of London Authority, London
major construction projects such as Crossrail boroughs and operators, will seek to ensure
and the Thames Tideway Sewers. A range of that existing safeguarded wharves are fully
Government grants are available to operators utilised for waterborne freight (including
to offset both capital and operational costs. waste), and will examine the potential to
increase the use of the Thames and
386 Increasing waterborne freight will also depend Londons canal network for waterborne
on the availability of wharf facilities to transfer freight transport.
cargo between land and water. The Mayor has
safeguarded 50 such wharves on the Thames
and tidal tributaries and London Plan policy
will ensure that these sites are maintained
and used for waterborne freight (including
waste) transport.
Chapter five
d) Consideration of a longer-term fixed link at
crossing the river due to vehicle restrictions at
Gallions Reach to improve connectivity for
the Blackwall and Rotherhithe tunnels and at
local traffic, buses, cyclists and to support
Tower Bridge. The vessels and landing stages are
economic development in this area
coming towards the end of their life, and there is
an opportunity to replace the existing equipment e) The encouragement of modal shift from
with more efficient modern vessels. private cars to public transport, using
new rail links including High Speed One
396 The recent TfL review of potential river domestic services, Crossrail and the
crossing sites and options indentified several DLR extension to Woolwich, reducing
areas where more investigation and work is road demand, and so road congestion
warranted. The package of river crossings will at river crossings, where possible
have regard to the needs of all potential users, f) Support for Government proposals to
including vehicles, freight, public transport, reduce congestion at the Dartford crossing
walking and cycling. The package of new river
crossings in east London is shown in Figure 44.
Crossrail
Potential lower
Thames crossing at,
or downstream of,
Dartford (study
being led by the DfT)
Key
Potential shorter-term schemes
Potential longer-term schemes
Crossrail
Existing foot tunnels
Chapter five
comprehensive system, but also, in places,
notably the Tube and rail networks, one which been done for each tranche announced to
does not fully meet the accessibility needs of date. The East London line extension and
Londoners, particularly mobility or sensory North London line enhancements will provide
impaired people. a number of new and upgraded step-free
stations on the London Overground network.
400 Much is being done to address this issue (see
spotlight on transport accessibility). TfLs 402 As the Tube network is renewed, it will be
Business Plan sets out transport projects that made more accessible. New trains to be
are committed to be delivered before 2020, introduced on most Underground lines
many of which will improve the physical will comply with Rail Vehicle Accessibility
accessibility of Londons transport system. Regulations (RVAR), and Underground
In particular, Crossrail will revolutionise the station refurbishments will provide or include,
accessibility of central London with step-free for example:
interchanges at key stations such as Bond Audible and visual information on all
Street and Tottenham Court Road. In addition, platforms and in all ticket halls
accessibility improvements will be delivered
Improved handrails to ensure appropriate
as part of the Tube upgrades (for example,
heights and designs and provide a visual
addressing platform-train interface and
contrast with the wall
installing platform humps at key locations) as
well as step-free access at key 2012 Games Improved steps and stairs to provide a visual
Underground stations and through major contrast at the leading edge of each riser
interchange schemes for example, Bank and and tread
Spotlight
Chapter five
platform and on all staircases The Mayor, through TfL, and working with the
DfT, Network Rail, the London boroughs and
Increasing the amount of seating in ticket others will improve the physical accessibility
halls, on platforms and in long corridors of the transport system by prioritising
and walkways step-free access at strategic interchanges,
Providing more priority seating on trains, at improving street accessibility in town centres
stations, in ticket halls and on platforms and around accessible stations and maximising
the accessibility benefits of new transport
Further improving the safety and security
schemes, such as Crossrail. In doing so, the
of stations by increasing the coverage and
Mayor will seek to maximise the benefits of
quality of CCTV, providing safer waiting
investment by ensuring that resources are
areas at specific stations with Help and
focused on improving accessibility for the
Information points in every ticket hall and
maximum number of people, while ensuring
corridor and on every platform
an equitable balance across London.
Providing accessible unisex toilets at all
step-free stations where toilets already exist 406 In particular, it will be important to maximise
the benefits of the accessible bus fleet as this
403 In addition, trials of platform humps have been is a relatively quick and cost effective way of
successfully completed, and are being rolled- enhancing physical accessibility to the transport
out across the Tube system as new rolling system throughout London.
stock is introduced, as well as using other
infrastructure changes to provide level access 407 The Mayor recognises that the Blue Badge
on to trains. parking scheme has contributed significantly
Chapter five Transport proposals
174 Mayors Transport Strategy
to expanding travel opportunities for those 5.9.3 Improving staff service and the
with severe mobility difficulties. He supports attitudes of customers
the provision of priority parking places for
Blue Badge holders, particularly in town centre 410 It is recognised that the approach of some
locations, at public services and stations, and staff and the attitude of some customers
a 100 per cent discount from the Congestion needs to reflect a more considerate approach
Charge scheme. to the needs of all users of public transport.
This can be achieved through raising customer
408 Further details of the approach to improving the service standards, improved customer
physical accessibility of Londons transport network relations programmes and disability awareness
will be provided in TfLs Disability Equality Scheme campaigns, so that those passengers who
(DES). This is a statutory document, updated every require additional assistance receive it as a
three years, which sets out in further detail what matter of course.
TfL is going to do to ensure that the services it
offers are accessible to disabled people. Proposal 42
5.9.2 Enhancing information provision The Mayor, through TfL, and working
with the London boroughs and other
409 Information is a critical enabler to making stakeholders, will improve attitudes of
the right choice about travel options and transport staff and travellers towards each
needs to be timely and accessible. Disabled other to ensure excellence in customer
people identify improvements in this area service and a courteous, safe and friendly
as being a key factor in their ability to travel travelling environment that does not present
independently and with a feeling of confidence a barrier to travel.
and personal safety. Enhancing pre-trip and
in-trip journey information and improving the 411 Some people with mobility difficulties may
legibility of interchanges and facilities, will need to build up confidence before using the
bring benefits to all Londoners, and will go public transport system independently. The
some way to removing barriers to travel. Mayor will support travel-mentoring initiatives
that help mobility impaired people to become
Proposal 41 accustomed to using the accessibility features
on Londons public transport system.
The Mayor, through TfL, and working
with the London boroughs and other
412 Staff that are available throughout service
stakeholders, will improve the availability,
hours to provide assistance, information and
quality, quantity and timeliness of
reassurance to all customers are particularly
information about the transport system to
valued by disabled people. All bus stations,
remove barriers to travel.
Tube and London Overground stations will
continue to be staffed from first to last service. unable, to use mainstream public transport
However, there remains the need for greater services some or all of the time.
consistency in availability and the training of
staff across the transport network. 415 Dial-a-Ride is a very successful and popular
service, currently catering for around 1.3
Proposal 43 million trips a year. Customer satisfaction rating
is also running at more than 90 per cent.
The Mayor, through TfL, will work to ensure
a greater staff availability to provide direct 416 Funding of door-to-door services has
assistance to customers and continue to significantly increased over the past few
improve customer experience, by enhancing years, delivering a number of enhancements.
staff training to ensure that the access needs Improvements to Dial-a-Ride have included
of disabled passengers are understood by all extending eligibility, scrapping fares and making
frontline staff. improvements to the call centre and booking
system. TfL continues to jointly fund Taxicard
5.9.4 Door-to-door transport with the London boroughs and fully fund Capital
Chapter five
Call, both of which provide subsidised transport
413 Door-to-door transport takes people all the
to people who have mobility impairment and
way from the origin of their trip to their
difficulty using public transport. Demand
final destination. Unlike mainstream public
continues to outstrip the supply for door-to-
transport, where people generally have to
door services and discussions between TfL and
access the system at predetermined stops,
London Councils are ongoing to explore the best
door-to-door transport can, in most cases, pick
use of resources in maintaining and improving
up and drop off passengers anywhere. The
these services.
general aim of schemes such as Dial-a-Ride,
Capital Call and Taxicard is to provide transport
options for people for whom the mainstream Proposal 44
transport network remains inaccessible. The Mayor, through TfL, will support door-to-
door services for people with mobility problems
414 Dial-a-Ride is a free door-to-door transport who require this form of transport service.
service for disabled people who cant use buses,
trains or the Tube. It can be used for many 5.9.5 Accessibility Implementation Plan
types of journeys, making it easier for disabled
people or people with lower levels of mobility 417 An accessibility implementation plan, as
to go shopping and visit friends. Eligibility for required by the GLA Act, is set out in section
Dial-a-Ride membership includes those people 7.2 of this strategy.
who have a permanent or long-term disability
which means they are unable, or virtually
Strategic interchanges will help to relieve passenger dispersal pressures at central London rail termini
through two primary means:
1) Enable interchange to orbital public 2) Enable interchange between National Rail and
transport services to avoid the need Underground/bus services at a point prior to
to enter central London the rail termini, thereby reducing pressure at
overcrowded rail termini interchanges
Origin
Origin
Destination
Destination
interchanges can support the alleviation of journey experiences, and help address key
crowding and congestion, maximise access environmental and quality of life concerns,
to business and employment markets (on a such as air quality, health and noise pollution.
London-wide, national and international scale), In collaboration with partners and stakeholders,
improve connectivity, improve passenger TfL has published Interchange Best Practice
Tottenham
Hale
Seven Sisters/
South Tottenham Walthamstow Central/Queens Road
Finsbury Park
Hackney Downs/Central
Chapter five
West Hampstead
Highbury Stratford Barking
Willesden Junction & Islington
Queens
Park West Ham
Ealing Broadway
Woolwich
Vauxhall Elephant & Castle Arsenal
Peckham Rye
Richmond Lewisham
Clapham Junction Herne Hill
Tulse Hill Catford/Catford Bridge
Balham
Wimbledon
East Croydon
Spotlight
Chapter five
5.11 London 2012 Olympic 423 The London 2012 Active Travel Programme
will use the Games as a catalyst to encourage
and Paralympic Games spectators and the public to walk and cycle
more before, during and after the Games. The
5.11.1 The 2012 Games legacy
programme will help to raise awareness about
421 s highlighted in chapter four, the Games
A the benefits of walking and cycling as a mode
provides London with a unique opportunity to of transport nationwide, and help increase
change peoples behaviour and encourage a the number of such journeys across London
lower carbon, healthier life style by increasing and the UK.
the awareness and use of walking, cycling and
public transport. This is particularly important 424 To promote healthy and environmentally
in Stratford, where the Olympic Park will be sustainable lifestyles beyond the Games,
fully accessible by public transport, as well initiatives are being developed to encourage
as walking and cycling routes. The level of walking and cycling in the five Olympic boroughs
accessibility can be seen in Figure 47. of Tower Hamlets, Hackney, Greenwich, Newham
and Waltham Forrest; and within the area of the
422 Transport can support the wider legacy benefits Olympic Park.
of the 2012 Games in two key ways:
425 TfL is also providing extra funding for boroughs
Firstly, new transport infrastructure being
in advance of the 2012 Games for public
delivered for the Games will improve
realm improvement schemes at sites that will
accessibility to jobs and services for local
attract significant visitor numbers during the
people and offer a wider choice of travel
Games. These will transform the quality of
modes, for example, walking and cycling
the environment and urban realm in line with
routes and access to new DLR stations.
the principles of better streets and provide
This will also contribute towards reducing
a lasting legacy in the local area. Further
car dependency and road congestion, and
interventions may be appropriate.
reduce carbon and other emissions
Secondly, promotion of more active modes 426 Additional complementary transport
of travel following the Games, building on infrastructure investments may also be required
the inspiration of the athletic performances to realise the local benefits of the Olympic Park
through targeted awareness programmes. that will be transformed through the Olympic
These include smarter travel to support Legacy Masterplan.
improvements in health and the local
environment
Figure 47:Olympic Park legacy international, national, regional and local connections
to north London
Stratford International
Chapter five
Improved bus network with a
n c rd
re
Olympic
ent
tow tratfo
ay
to central London Greenw
Elevated n
B e c k to
to
to central London Pudding Mill to Essex
and Heathrow airport Lane
Bow Road West Ham
Bow Church
428 In order to better understand the additional Partners and their responsibilities
interventions that may be required to ensure The monitoring area within the five
maximum synergy with other intervention Olympic boroughs
programmes, to maximise benefits of transport
investment and ensure transport fully supports Key indicators and targets within the
the principle of convergence outlined in chapter monitoring area and London-wide
four, the Mayor proposes to develop a Transport
Actions and interventions required to
Legacy Action Plan with key partners. The plan
meet the targets
will be embedded in the sub-regional transport
plan process and delivered through the TfL Annual review of targets
Business Plan and the boroughs LIPs.
5.12 Londons airports increase passenger demand for surface rail and
road access on already congested networks.
429 This section focuses on airport capacity However, the DfT has stated that a detailed
and surface access to airports. The Mayors surface access strategy is not a prerequisite
approach to broader aviation issues is outlined for a policy decision regarding a third runway.
in section 4.2.2.1 Supporting and developing Current forecasts suggest that by 2030, with a
Londons international, national and inter- third runway, non-transfer passenger numbers
regional transport connectivity and in draft could more than double, to 91 million per
replacement London Plan policy 6.6. Measures year. This would reduce resilience and increase
to improve the carbon efficiency of air transport crowding, congestion and delays elsewhere
are set out in section 5.22 Reducing carbon along rail and road corridors serving Heathrow
dioxide emissions of this strategy, including and across west London as a whole. Public
proposal 101. transport would become less attractive for users,
especially at peak times. Airport expansion
5.12.1 Airport capacity would further threaten to reduce the quality
Chapter five
of life of many London residents.
430 Demand for air travel will continue to pose a
major challenge for London. The number of 433 Noise pollution currently affects a large number
passengers travelling through London area of residents underneath the Heathrow flight
airports amounted to almost 140 million in paths. DfT modelling estimated that in 2008
2008, making this area the busiest in the world. over 250,000 people were within the Leq (used
Unconstrained, demand is expected to rise to as the national airport noise exposure index)
290 million passengers each year by 2031. noise contour of 57 decibels or above. Measures
Current airport capacity in the South East will, to reduce noise pollution from aircraft are
however, limit trips to 180 million passengers outlined in proposal 89.
a year. This could have the effect of limiting
Londons economic growth and putting its 434 Air quality is also a serious issue at Heathrow.
competitive position at risk. The airport is at risk of failing to meet EU
NO2 maximum limit values in 2015. Surface
431 Committed capacity enhancements, principally access trips further compromise air quality:
Crossrail and the Piccadilly line upgrade, are an extra three million car trips per year are
designed to accommodate demand based on forecast between 2010 and 2015. Measures
projected growth to existing permitted levels to improve air quality are outlined in section
of airport use. 5.21 and policy 3 of the draft Mayor's Air
Quality Strategy.
432 A third runway at Heathrow would increase
capacity ultimately to 702,000 air traffic 435 Nevertheless, the Mayor recognises that
movements per year. This would significantly adequate airport capacity is critical to the
includes widening the M11 between junctions any airport serving London. DLR infrastructure
6 and 8 (between the M25 and Stansted) to support this growth is in place, though
and the provision of further rail capacity further rail vehicles are required to provide the
(including a new fleet of Stansted Express trains required service capacity.
ordered in 2009).
443 TfL has worked with airport operators through
441 BAA has submitted proposals to provide an their airport transport forums to help improve
additional runway at Stansted, which could see surface access to airports. Continued close
the number of passengers using the airport engagement with airport operators and
rise from 35 million to 68 million by 2030. local boroughs will be essential to serve the
The Mayor has concerns about the impact increasing numbers of air passengers and
this expansion will have on public transport encourage a shift from private car to reduce
services into London and believes that essential congestion and improve surrounding air quality.
improvements to Tottenham Hale Underground
station and along the West Anglia main line Proposal 50
need to be funded before planning permission
Chapter five
The Mayor, through TfL, and working with
is granted.
the London boroughs, DfT, airport operators,
Network Rail, train operating companies
Proposal 49 and other stakeholders, will seek to improve
The Mayor believes the aviation industry access to Londons airports for passengers
should meet its full environmental and and staff by public transport, particularly
external costs and supports the position of from those parts of London which do not
The Future of Air Transport White Paper currently have good access by rail or bus; and
published in 2003. This states that airport for goods through better management of the
operators should be responsible for paying road network, development of consolidation/
the costs of upgrading or enhancing road, break-bulk centres and encouragement of
rail or other transport networks or services access by rail and waterway.
where these are needed to accommodate
additional passengers travelling to, and from,
expanded or growing airports.
Annotated bibliography entries have two parts. The top of the entry is the
citation. It is the part that starts Parsons, Matt and that lists information like
the name of the writer, where the evidence appeared, the date of publication, and
other publishing information.
The second part of the entry is the summary of the evidence being cited. A good
annotated bibliography summary provides enough information in a sentence or
two to help you and others understand what the research is about in a neutral
and non-opinionated way.
The first two sentences of this annotation are an example of this sort of very brief,
just the facts sort of summary. In the brief summaries of entries in an
annotated bibliography, stay away from making evaluations about the source
I didnt like this article very much or I thought this article was great. The
most important goal of your brief summary is to help you, colleagues, and other
potential readers get an idea about the subject of the particular piece of evidence.
Summaries can be challenging to write, especially when you are trying to write
them about longer and more complicated sources of research. Keep these
guidelines in mind as you write your own summaries.
Dont quote from what you are summarizing. Summaries will be more
useful to you and your colleagues if you write them in your own words.
Instead of quoting directly what you think is the point of the piece of
evidence, try to paraphrase it. (For more information on paraphrasing
your evidence, see Chapter 3, Quoting, Paraphrasing, and Avoiding
Plagiarism).
Dont cut and paste from database abstracts. Many of the periodical
indexes that are available as part of your librarys computer system
include abstracts of articles. Do no cut this abstract material and then
paste it into your own annotated bibliography. For one thing, this is
plagiarism. Second, cutting and pasting from the abstract defeats one of
the purposes of writing summaries and creating an annotated
bibliography in the first place, which is to help you understand and
explain your research.
Different writers will inevitably write slightly different summaries of the same
evidence. Some differences between different writers summaries of the same
piece of evidence result from different interpretations of what it important in the
research; theres nothing wrong with that.
Theres nothing more frustrating than finding an excellent article or book chapter
you are excited about incorporating into your research project, only to realize
you have forgotten where you found the article or book chapter in the first place.
This is extremely frustrating, and its easily avoided by doing something like
writing an annotated bibliography.
You could use other methods for keeping track of your research. For example,
you could use note cards and write down the source information as a proper
citation, then write down the information about the source that is important. If
the material you know you want to use from a certain source is short enough,
you might even write a direct quote, which is where you write down word for
word what the source says exactly as it is written. At other times, you can write
a paraphrase, which is where you write down what the source means using your
own words.
While note cards and other methods have their advantages, annotated
bibliographies are an extremely useful tool for keeping track of your research.
An annotated bibliography:
Centralizes your research into one document that you can keep track of
both as a print-out of a word-processed file and as a file you save
electronically.
Allows you to copy and paste citation information into the works cited
part of your research project.
An annotated bibliography also gives you the space to start writing and thinking
a bit about how some of your research might fit into your project. Consider these
two sample entries from an annotated bibliography from a research project on
pharmaceutical advertising:
2002. <http://www.emich.edu/halle>.
Even from the limited amount of information available in these entries, its clear
that a relationship between these articles exists. Both are similar articles about
how the doctor/patient relationship is affected by drug advertising. But both are
also different. The first article is from the newspaper The Nation, which is in
many ways similar to an academic journal and which is also known for its liberal
views. The second article is from a trade journal (also similar to academic
journals in many ways) that obviously is an advocate for the pharmaceutical
industry.
But remember: However you decide to keep track of your research as you
progress through your projectannotated bibliography, note cards, or another
methodthe important thing is that you need to keep track of your research as
you progress through your project!
The reasons you need to find twice as many sources as you are likely to use is
that you want to find and use the best research you can reasonably find, not the
first pieces of research you can find. Usually, researchers have to look at a lot
more information than they would ever include in a research writing project to
begin making judgements about their research. And by far the worst thing you
can do in your research is to stop right after you have found the number of
sources required by the instructor for your project.
This same sort of copy and paste function also comes in handy when doing
research on the web. For example, you can usually copy and paste the citation
information from your librarys online database for pieces of evidence you are
interested in reading. In most cases, you should be able to copy and paste
information you find in your librarys online database into a word processing
file. Many library databasesboth for books and for periodicalsalso have a
feature that will allow you to email yourself results from a search.
Keep two things in mind about using computers for your annotated
bibliographies:
You will have to reformat whatever information you get from the Internet
or your librarys databases in order to meet MLA or APA style.
Dont use the copy and paste feature to plagiarize! Simply copying
things like abstracts defeats one of the important purposes for writing an
annotated bibliography in the first place, and its cheating.
As you conduct your research for your research writing project, compile an
annotated bibliography with 15-20 entries. Each entry in your annotated
bibliography should contain a citation, a brief summary of the cited
material. You will be completing the project in phases and a complete and
revised version of it will be due when you have completed your research.
Also, you should work on this assignment in parts. Going to the library and
trying to complete this assignment in one sitting could turn this into a dreadful
writing experience. However, if you complete it in stages, you will have a much
better understanding of how your resources relate to each other.
You will probably need to discuss with your instructor the style of citation you
need to follow for your research project and your annotated bibliography.
Following a citation style isnt difficult to do, but you will want to be consistent
and aware of the rules from the beginning. In other words, if you start off
using MLA style, dont switch to APA style halfway through your annotated
bibliography or your research project.
Last, but not least, you will need to discuss with your instructor the sorts of
materials you need to include in your research and your annotated bibliography.
You may be required to include a balance of research from scholarly and non-
scholarly sources, and from traditional print resources (books, magazines,
journals, newspapers, and so forth) and the Internet.
Do you know who wrote the material you are including in your annotated
bibliography? What qualifications does your source say the writer has?
Why do you think the writer wrote it? Do they have a self-interest or a
political viewpoint that might make them overly biased?
Are you keeping your summaries brief and to the point, focusing on the
point your research source is trying to make?
If its part of the assignment, are you including a sentence or two about
how you see this piece of research fitting into your overall research
project?
Are the summaries you are including brief and to the point? Do your
readers understand what the cited articles are about?
If you are including a sentence or two about each of your resources, how
do these sentences fit with your working thesis? Are they clarifying parts
of your working thesis that were previously unclear? Are they suggesting
changes to the approach you took when you began the research process?
Based on the research you have so far, what other types of research do
you think you need to find?
I begin this chapter with an analysis of self-concept. I have reviewed how self-concept is
organized and the role the parents, teachers and peers play in the shaping the self-concept
of children. Additionally, I have identified the key factors that facilitate self-concept and
self-esteem. Facilitating self-understanding and enhancing self-esteem is the focus of this
chapter. The rationale for enhancing self-image and selfesteem is discussed in the section
Aims and rationale.
Section 1
206
parents subjective opinion. Thus, two children with a similar behaviour pattern would have
different self-pictures according to the message relayed by their respective parents.
Teachers are the second most influential people in school-going childrens life
(Lawrence, 1996). Like parents, teachers also pass judgements on them. Sometimes the
labels the teachers give the child may be in sync with the label the parents have given.
Sometimes there may be a conflict. Fontana (1995) maintains that both reinforcement and
conflicts carry potential threats. In both cases the child is denied the opportunity for
developing the clear, rational notion of self.
Self-concept is organized. Most researchers (Damon and Hart, 1991) agree that
self-concept is generally characterized by orderliness and harmony. It is this organized
quality of self-concept that gives consistency to the personality. The idea behind this view
is that if it were not organized and changed readily we would not have individuality; we
would lack a consistent and dependable personality.
Success and failure have an impact on self-concept making it dynamic and ever
developing. In the healthy personality, there is constant assimilation of new ideas and
expulsion of old ideas throughout life, which make it dynamic.
Lawrence (1996) recommends that we look at self-concept as developing in three
areas:
self-image;
ideal self;
self-esteem.
Self-image is the individuals conceptualisation of his/her mental and physical
characteristics. The earliest image formed by a child is given by the parents. Going to
school and meeting other adults and children generates new experiences for the child.
She/he now learns whether she/he is good at learning or otherwise and whether or not
she/he is popular. Lawrence (1996) suggests that the more experiences one have the richer
the self-image.
Cooley (1902) developed the looking-glass theory of self. This metaphor illustrated
that the image an individual forms of his/herself was created by the perception of how
others perceived them. That is, the appraisals of others act as mirror reflections that provide
the information we use to define our own sense of self. Hence, we are in very great part
207
what we think other people think we are. This implies that parents, siblings, teachers, and
significant others have a great power in shaping the childs self-image.
The ideal self is the picture we form within us, of the person we would like to be.
Peer comparisons, values of the society we live in, media are significant factors that have
effect on our ideal self, as the image of the ideal self is formed by comparing him/herself to
others. The school child accepts the ideal images from the significant people around
him/her and strives to attain them.
Self-esteem is the individuals evaluation of discrepancy between self-image and
ideal self. It refers to an individual's sense of his/her value or worth, or the extent to which a
child values, approves of, appreciates and likes him/herself (Blascovich and Tomaka,
1991). The most broad and frequently cited definition of self-esteem within psychology is
that self-esteem is a favourable or unfavourable attitude toward the self (Rosenberg 1965:
p.15). James (1890) states that the intervening variable is personal expectation. His formula
is:
Self-esteem = Success
Pretensions
That is increasing self-esteem results when success is improved relative to expectations.
Lawrence (1996) argues that without this discrepancy, without levels of aspiration,
an individual can become poorly adjusted and indifferent to progress. He adds that just like
the nerve impulse is always active, even the psyche needs to be active and it would be an
error to imagine the ideal state as one of total relaxation. For a person to be striving is a
normal state, anything otherwise it would lead to neurotic behaviour.
My focus
The focus of my work is on facilitating self-understanding and enhancing self-
esteem. Kant, the German philosopher, proposed that self-knowledge is the beginning of all
wisdom, thus if we know ourselves well it would give a good foundation on which to build
our lives. This knowledge would enable us to know our likes and dislikes, strengths and
weakness, which would allow us to change our negative behaviour, maintain self-control
and become more responsible humans. Franken (1994) suggests that when people know
themselves they can maximize outcomes because they know what they can and cannot do
(p. 439).
208
Aims and rationale
Asking how self-understanding can be enhanced is a critical question. Here I would like to
explain my work in encouraging understanding of the self.
What I find interesting in the studies (e.g. Fontana, 1995; Lawrence, 1996; Mruk,
1999) concerning self-concept and self-esteem is the practical implication of the theories
suggested by the researchers in this field. To me the teacher, it is clear that I am in a
position to be able to influence a students self-esteem through my lessons and interactions
with them. My understanding of the principles of self-concept and self-esteem helped me to
have a better perception of the process. My relationship with the students benefited because
of the re-newed awareness the children had of themselves. It was a fourfold process, they
learnt about themselves and others as I learnt about them and myself.
I wanted to help the children learn about themselves, to enable them to develop into
competent, mature, self-motivated children. They would then feel more confident so they
would be able to cope with the stress that they faced in school and in life in general. Self-
esteem enhancement, as it has been observed, contributes positively towards both academic
achievements as well as towards personal and social development (Fontana, 1995). Schools
can aid students in these pursuits by helping them to develop the habit of excellence in
scholarship while at the same time nurturing the self-belief that is necessary to maintain that
excellence throughout their lives. Bandura (1986) maintained that educational practices
should be gauged not only by the skills and knowledge they impart for present use but also
by what they do to children's beliefs about their capabilities, which affects how they
approach the future. Students who develop a strong sense of self-esteem are well equipped
to educate themselves when they have to rely on their own initiative.
By the time I started teaching self awareness (23.10.2002), ten months into the
module, the children were competent in understanding emotions. The lessons in self-
understanding and self-esteem enhancement where planned keeping in mind the four
themes suggested by Lawrence (1996: p.29):
1. Trust activities
2. Expression of feelings
3. Positive feedback activities
4. Risk taking exercise
209
These four topics were adapted to organize the lessons on self-understanding and
self-esteem enhancement, which would target:
Sharing feelings
Guessing the emotion
Remembering good times
Thinking positively
Positive feed back
Taking risk
Making friends
Trusting one another
The uniqueness of me
the process of image-making could help them discover a part of themselves that
mostly resides in their unconsciousness. Art was a way of displaying to the children,
(Eisner, 1993: p. 5)
The design of the lessons on self was based on the celebration of the individuality. I used
puppets and poems to enable the students to witness, experience and understand something
unique. The curriculum on self continued by introducing the children to the concept of
personal metaphor. In the narrative Flicker of colour I have reflected on and analysed the
first few lessons on understanding self.
Finding an entry point to teach the children about the self was a daunting task. I
was perplexed as to how I would demonstrate or explain the uniqueness of each child when
I hit upon the idea of using the poems from Old Possum's Book of Practical Cats by Eliot
(1939). Moving away from the premise of performing a play to watching it, I planned
the finger-puppet show of Cats as I wished to explore a different artistic technique and
incorporate it into my class. I specially designed finger puppets depicting the different cats,
210
like Shimbleshanks, Mungojerry and Rumpleteazer, Old Deuteronomy and Rum-Tum-
Tugger.
211
What do you like?
How do you see yourself?
What are your favourite animals and birds? Why do you like them?
How would you describe your friend?
What are the characteristics of your friend that appeal to you?
With help of the students input I compiled a list of descriptive words, which would help
them acquire a new name with an enriched image (see Table 14, Table 15 and Table 16,
Table 17).
Flowers Rose
Colours White Red Purple
213
Table 17:How their friends saw them
A flicker of colour
The material of the story is taken from the transcript of five classes (Class 20-24) held on
the 22nd, 23rd, 25th October and 16th and 23rd November 2002.The puppet show and the
mask making and using masks classes were held in October 2002, during the Diwali
vacations. Sarla narrates the following story. I choose Sarla as the narrator to re-present
my analysis, as it was she who used masks and the understanding of the self again, in
Class 48-18.10.2003. Nihar, Lali, Manni, Samir are the students and the Wise-one is me.
The lines sensible everyday names, names that never belong to more than one cat, a
name that's particular, a name that never belong to more than one are lines quoted
from the poem The Naming of Cats by Eliot (1939).
In the narrative A flicker of colour I have reflected on the lessons in which:
I performed the puppet show, with finger puppets (In the last meetings she had cats
dancing at her fingertips),
214
the children performed with identical cat masks ( we begged her to makes us into
cats. but we all looked same and behaved in a similar manner.)
the children made individual masks (.. Then we gathered together the next day, and
tried to created new identities for ourselves)
the children played a American Indian naming game(The Wise-one suggested we
should begin by giving ourselves unique name)
The lines She would often carry music refer to the cassette player I carried to play
music during the sessions when the children did the walk and statue activities, the
manuscript- my journal, which I always carried to class and food- refers to the snacks we
partook during longer classes.
All the travellers sat on the floor crossed legged and wondered what we
would do next, when the Wise-one came in. She was older than us, not
grey haired and all, but older in years than the rest of us and therefore
we decided she was wiser than us. She would often carry music with her, a
manuscript...always, and sometimes food for us. She is kind and we like
to be with her ...we trust her.
The Wise-one is a storyteller and magician. Even when she talked
everyday, ordinary stuff she made them magical and we liked to listen to
her. Sometimes, Samir flew around like his namesake, the wind and created
chaos, but the Wise-one never got angry and was patient with him. She
could control the wind! The Wise-one made us realise how important he was
to our group. He was the first of us to do something well. So what, she
said if he does not do anything now besides ruffling us up. The wind-
Samir would settle down one day and do something creative again.
In the last meetings she had cats dancing at her fingertips. These cats
came from a far off place called England; they actually belonged to
someone called Eliot. With her husky voice she sang songs of cats that
were fat, were wicked, were thieves, were good and were proper. These
cats experienced affection, pain, warmth, and hatred, just like us. We
thought she was entertaining us but No!! She was helping us see
ourselves.
We liked her songs so much that we begged her to makes us into cats.
Which she did, but we all looked same and behaved in a similar manner.
That did not suit us. How could we be the same? We were different.
Chandani said, he is a boy and I am a girl!
We are wearing different clothes, said Nihar.
215
Our hair is different, said someone else.
The Wise-one agreed and said we could be as different from each other as
much as we know ourselves. We did not understand what that meant but we
were excited just to know we were different. We impulsively threw away
the masks which made us same. Then we gathered together the next day, and
tried to create new identities for ourselves...but we were still pale and
looked nearly like each other. How were we to become our real vibrant
selves?
The Wise-one suggested we should begin by giving ourselves unique name.
We all had sensible everyday names, but the Wise-one said Eliots cats
had names that never belong to more than one cat. She said even we
needed a name that's particular,...A name that's peculiar... a name
that never belong to more than one...
She then acquainted us with a custom of the natives of America. The Red
Indians had names like Running Brook and Flying Eagle. We had not heard
about these people and were interested to learn more. So the Wise-one
told us about a girl, who had blue-eyes, like the clear brook and she ran
fast...her name was Running Brook.
We all sat down and started talking about what we liked and did not
like...it may sound to you like it was a quiet and organised process. But
do you know what it sounds like when all eight (Mukul and Pratik rarely
travel with us) are talking? So much noise and excitement! I like this
and I like that...No, I said that first...but Wise-one I like such
and such too!
To help us remember what we said the Wise-one wrote for us, in her
manuscript. We found that all of us liked to run, and jump, play cricket,
eat chocolates and drink Pepsi. Did this mean all of us would have one
name?
The Wise-one, not giving up, went on asking us questions about ourselves
and we went on answering... We began with different animals and went on
to details about our character.
Kanha runs fast, smiles a lot, is shy, he laughs a lot, he is trouble
some, said Lali.
He is forgetful, said Nihar.
Putting all his characteristics together we thought of the name Naughty-
bird or Lively-trouble. However, Kanha did not like the names and we left
it at that and went on to Nihar.
Nihar is an enigma, he is so quiet, he always sits a little behind when
we sit in a circle. Even when we sit all huddled up he is always in the
back. He doesnt do things with us but sits back and watches. When we all
216
met for the first time he would not even tell us his name. Just
imagine!?? Telling your name is the simplest thing possible. We all do
know him now, after eleven months of travelling together, but he is still
very quiet and shy. He has a fascination for things that are grand. Good
cars, nice bungalow, lions and peacocks- they are our national animal and
bird, he said. His mother told the Wise-one Nihar ko proud se reheneka
mangta meaning Nihar wants to live with pride and dignity. He is good at
drawing.
Should we name him Shy Painter?
No, we all protested ...what a boring and drab name...
Royal Bulldog?
No, no. Nihar is not ferocious or ugly.
We went on concocting names...at last we reached a name for him...Lion
King.
We had begun an exciting journey of self-discovery...
Annual program
Most schools in India have an annual program, after the half yearly examinations (Chapter
5, p.145). It is an important function attended by the families of the student and usually
showcases the talents of the students studying in the school.
In this section I moved towards a product dance- drama (Chapter5, p.145) however
lessons followed a process-oriented mode. I have described and reflected on the
particulars of the process. The account includes a step-by-step description of the process of
making and performing and ultimately assessing the dance-drama. I have included my
reflections, in Times New Roman Bold, as they occur, as they are interrelated and
interactive with the process.
217
Revealed a growth in their creativity.
Moved at a good pace towards self-understanding.
The lessons were geared towards using drama to teach pertinent current issues and
building on them in an on-going way. They were partially planned in that I had an idea of
what I wanted as the final shape. I had wanted to use the concept and design of street
theatre (see Glossary) for the play even though the play was to be performed on a
conventional or proscenium stage.
The children had witnessed a rehearsal of another group of students who were to
represent the school for a street theatre competition (Chapter 5, p.146) where they watched
me work with their older school friends. After the rehearsal my students and I had a
discussion about street theatre. Therefore when we started working for the annual program,
the children had a clear idea about street theatre.
The making of the annual program play had a feel of an open lesson, as the initiative
of the direction of the drama and the dialogues was negotiated with the children from the
outset. I had planned the lessons in such a manner that I would lead the children to the point
where the drama would need to be focussed and brought to a resolution. I had taken a
flexible route as I could not in the beginning anticipate with a degree of certainty what the
possible outcome of the play would be. I was prepared to bailout the children if need be and
bring the drama to a resolution. However, I planned to do that only at the very end.
Lali was now beginning to express her views and after a year somebody besides Manni
answered first (e.g. Chapter 5, p.105, Appendix 5, p.30-1).
218
Sarla: Population [population explosion]
Swaroop: You said population yes, and you even said pollution?
Sarla: Yes.
Swaroop: Samir?
Samir: What?
I repeated my initial question, however he did not have an answer, he said, I no facing.
Meaning he did not have any problems, nor did he see any problems around him.
Not listening during reflection time was a problem I faced with Samir.
219
All the while Samir went on distracting others, especially Nihar. However, Nihar in
spite of the distraction would answer questions directed to him, and would also give
his opinion to statements made by others. Manni at one point even commented that
Samir should do whatever he is doing during recess time. All the children were
extremely involved in the discussion and could pick up the links even though I had to
often stop to correct Samirs behaviour.
The pledge:
How would I like my country to be? was something I suggested the children think about
and answer in the next class. I was pleased hear the childrens observations in the following
class.
Manni: First we have to bring peace and how do you say Shanti [spiritual peace]?
Peace and shanti in our country then violence will go away.
Chandani: Pollution is a problem and because of that hole[in the ozone layer] is
getting bigger we should do something to stop pollution.
Nihar: Miss, the computer virus.
Sarla: Miss, what about the HinduMuslim fighting we are all brothers and
sisters are we not?
Manni: Yes, Miss what about Gandhijis India?
Samir wanted to know what the name of his character would be.
Swaroop: Your name is Samir. Everybody in the play uses his or her own name. So you
have to say I am Samir. I dont like what is happening in my country. And I
will do this and that to make our country better. You are going to be the
scriptwriters.
Transcript: Class 28-8.1.2003
The play:
The play began with a bhajan [prayer/hymn] Raghupati raghava raja Ram, which
Gandhiji popularised during the Indian Independence movement. All the children
walk in chanting.
Swaroop: In this play there is no story but it has a very strong message.
220
Manni: like Gandhijis three monkeys (see Glossary); see no evil, hear no evil,
speak no evil.
Transcript: Class 28-8.1.2003
Mannis idea of the Gandhian message of truth verses evil was the reason I
chose the bhajan, which introduced the theme of the play and the actors. The
lines Ishvara Allah thero naam, subko sanmati de bhagavan translated into
English mean; Ishvar and Allah are the names used by Your devotees, the
Hindus and Muslims, but You are only One, so it does not matter what name is
used to address You. God [bhagvan] grant all true knowledge and goodwill
[sanmati]. This hymn attempts to understand the mentality of truth or sense of
being, around which Gandhiji spun his life and his unique struggle.
The children represented the evils/problems that are damaging our environment and
country. They try to catch Manni, playing the part of the white dove, representing
peace, and persuade her to go with them.
Sarla and Chandani: I am menghaee [high prices and cost of living] I will not let
you survive.
Nihar and Samir: I am a computer virus; I will corrupt your systems.
Snehal: I am a thief come with me I will teach you to steal.
Kanha: I am a terrorist, join me and we will destroy the country.
Manni, the white dove, flies around on stage trying to dodge these tribulations, and
finally sits down to meditate. However, here too she finds no peace.
Lali: I am a great religion, come to me I will give you freedom.
Manni: No. I do not want to follow your ways. I do not need any one great religion. I
am a Hindustani [Indian] and humanity is my religion.
(Addressing the audience)
This is not our Hindustan [India]. Do you know how we want our Hindustan
to be?
The children then walk up one by one to the mike which is placed centre downstage,
introduce themselves to the audience and convey their messages to their friends.
I am Snehal; lets keep Mumbai clean and green.
221
I am Lali; how we live is important, not how long we live.
I am Pratik; I think we are all equal in Gods eyes, we should not believe in castes and
races.
I am Nihar; I think we should not fight with each other we should live in peace.
I am Sarla, since my childhood I have been taught not to tell lies. I think honesty is
the best policy.
I am Samir; I wish I could remove poverty from our country.
Finally all the children join hands and dance to a song on national integration.
Assessment
The children performed extremely well in the annual program. However, that was
not the question upper most in my mind. What was important was the fact that they went on
stage and performed with abundant energy and enthusiasm in front of an audience that
consisted of over 1500 peers, teachers and parents. This act in itself showed they had made
great gains in their self-confidence (cf. Appendix 2, p.4). It was the first time all of them
performed in a proper theatre, as up till the fifth standard the children in this school, only
performed on a makeshift stage, in the school compound. Five of the ten had never
performed in front of an audience of any size. The only child who did not go on stage
during the grand rehearsal and the final show was Mukul. No amount of cajoling by his
classmates could persuade him to step on stage. On my part I did not compel him to
perform as I did not want to distress him by forcing him to do something he did not want.
At the same time I did not want him to feel utterly useless therefore I asked him to help
backstage with the music system.
The children filled in two assessment sheets after the annual program. The first
sheet: part 1(Appendix 11) was designed to encourage reflection-on-action, during the
making of the play and behaviour prior to the performance and during performance. In this
sheet the children assessed their classmates behaviour and their own. The students had to
indicate agreement or disagreement with each item on at a three-point scale: Agree (scored
as 3), Not Sure (scored as 2) and Disagree (scored as 1), higher scores indicating favourable
attitudes. The sheet was developed to provide an assessment of attitudinal and behavioural
changes in students. The items included reflections on the childrens achievement in:
222
self expression;
self-acceptance;
self-awareness;
acceptance of others;
awareness of others.
I found that they showed significant understanding in completing this questionnaire
as compared to the questionnaire filled up by them at the end of Cycle 1. I believe this is
because:
The questions framed in this sheet (Appendix 11) were more relevant to their
immediate experience. Like:
Did your friend pay attention during rehearsals?
Gave ideas during the planning stage.
Listened to the teachers instructions.
This was the third self-assessment sheet the children were filling up and could now
understand the concept of self-assessment.
To make the assessment more effective I talked the children through the sheet,
explaining the questions one by one.
Swaroop: I had instructed you not to give instructions on stage, so if you gave
instructions on stage you did not follow my [the teachers] instructions.
Who did not follow my instructions on stage? Remember most of you
were nervous before going on stage? I was nervous.
Shenal: Yes, Miss? (With utter disbelief, the fact that I was nervous surprised most
of them).
Swaroop: Yes, I was very nervous who else was nervous? I remember Manni
saying lets not go on stage...----
---I want to explain the last question. Remember when we rehearsed our
play. We worked in narrow rooms like the geography room later we
worked in a normal classroom (see photograph a. and b. on p.148-9)
then we performed on stage, which was big. Who adjusted to working
on stage? Remember there were some children who stuck to each other in
spite of my saying spread out spread out.
Transcript: Class 34-1.2.2003
223
Talking them through the questions did not to colour their views. All the children
expressed their opinion. This can be observed in the scoring sheet, all of which have a
distinct scoring pattern (Appendix 12). The only question that has an identical pattern of
answers was the group liked working with him or her, where eight children obtained an
ideal score of 27 points, and Mukul and Samir attained a virtually ideal score of 25 points.
This is because in actual fact everyone enjoyed working with each other.
The second sheet (Appendix 13) the children filled concerned, reactions of their
friends and significant others and how the children felt on receiving the feedback.
I met the childrens class teachers and music teachers after the program to assess the
change in the childrens behaviour after the program.
Music Teacher1: I cannot believe it was Nihar on stage ...and he spoke so well! Previously
Nihar always stayed in the background and tried to disappear into the
crowd. He showed total involvement for [sic] this play.
Music Teacher 2: Manni was superb! I liked the way she was so in charge of the play and
so confident.
Music Teacher 3: All the children performed so well their musical drama was the best in
the annual program.
Their class teachers filled in a short questionnaire (Appendix 14) in February 2003,
three weeks after the annual program. Their answers helped me to understand the change in
the students behaviour in school.
Eight of the children showed a marked improvement.
Kanha, who according to the teacher was not confident before and was an introvert
had become confident, started speaking in class and took active part in class
activities.
Samir was shy and wandered aimlessly and would not write unless he was
watched (teachers words). Now he loves working in a group, is friendly, more
confident, good at project work, got himself upgraded with latest happenings
[annual program]. (Samirs class teacher)
Chandani who was not confident initially became more confident and had also
showed remarkable change in her academic work.
224
Manni had become more confident. She had now started making an effort to answer
in class; she was not worried about being incorrect. Her class friends/peer group
accept her as an achiever, they listen to her when she talks and respect her opinion.
Mukul was shy and moody and avoided contact, but now tries to answer in class and
is friendly. Has become more self-assured and asks the teacher to repeat or explain
something he has not understood.
Sarla is more confident and is happy in class. She was greatly motivated by the fact
that she played an active part in a highly successful venture in the annual program.
Lali always complained in class now she is more obedient and responsible.
However there is no sharp change, the change was gradual. Her class teacher
narrated an incident when Lali came to the staff room to give her a card, Lali
paused at the entrance, squared her shoulder, held the head up and walked in
confidently.
Nihar was disinterested in class work and fidgety; now he is a friendly, tries to
complete his work in time and is gaining in self-confidence.
Snehal and Pratik did not show any change in school. Pratik was very irregular in
his attendance, at the same time he was comparatively more confident to the other children
even when we started in January, 2002 as can be seen in the creativity assessment
(Appendix16). Snehal too, was a good and clever boy- as described by his parents in the
first interview in January 2002. He was regular in his attendance and from the beginning
was well behaved, he answered well and as one can see in the creativity scores (Table 23,
p.266) he started of on a medium level of some what present-average score n=3.1 and
progressed only to moderately present average score n= 4.1.
All the parents were extremely pleased by the way the children performed on stage
and changed the way they viewed their childrens abilities. The children on the other hand
experienced a boost in self-esteem with the complements received from their parents and
significant others. These are some of their reflections:
Chandani: I was playing passing the parcel at a party and as a forfeit auntie asked me to
perform the dance I did in the annual program because everybody said I did
dance well.
Sarla: My Grandmother said my play was soooo good, now my uncles want to see
225
me act. My mother said she was so proud of me after we travelled home on the
school bus together, as all the children complimented her on my achievements.
Manni: My mother said I was excellent I feel so proud.
Samir: Everybody was clapping for our play. My friends say they dont know how I
could act and dance so well.
Lali: I am feeling proud of myself, because my teacher and parents said I was
excellent.
Transcript: Class 34 -1.2.2003
Making the play for the annual program and performing was a critical event in the
childrens learning (Chapter 5, p.145), it improved the childrens attitude in areas of self-
expression, self-acceptance, acceptance of others and self-awareness. It enabled the
students to become more accepting of others ideas and feelings and increases their
awareness of their own feelings and motivations. Importantly for the underachieving
students, it encouraged them to develop a strong sense of themselves as capable persons
and that their ideas were valuable. These skills are important not only for school
achievement but also personal development, improved relations with others, readiness to
learn and ultimate success.
Deepening understanding
The curriculum on self-understanding proceeded with trust walk exercises with the view
to help the children practise co-operation with each other, to help them empathise with
each other and to develop trust in each other
The focus of my research is not just concerned with children as they are at the
present, but as they will one day will become. The individuals notion of him/herself is
undergoing constant change, particularly in childhood. When the children in my drama
class experienced sudden success, their self-esteem was enhanced. However, I think it was
a gradual change which was initiated by emotional understanding and then further with
understanding of self. I perceive it as a movement towards self-maturity: that is, towards
self-concepts that are realistic and self-accepting (Fontana, 1995: p 244).
Psychologists like Erikson (1980), Rogers (1969), and Maslow (1970) suggest that a
well-balanced person is:
226
aware of his/her worth;
able to empathise with others;
able to relate to others warmly and with an open mind, instead of using them for
personal reasons.
It would be incorrect to think that maturity only comes with the initiation of
adulthood and that mature children are old before their time. Mature children are those who
development is appropriate with their years and experience and show the qualities
suggested above (Fontana, 1995).
I used the trust walk or blind walk exercise (Appendix 17) with the view to help
the children practise co-operation with each other, to help them empathise with each other
and to develop trust. Reflections during these trust lessons played the most important role
in understanding self and others. Without the use of discussions during reflection time the
trust walk exercise waters down to an ordinary game.
I paired the children, one child blindfolded and the other acting as the guide. If the
child was uncomfortable with the idea of being blindfolded I asked them to merely close
their eyes. I did not want this experience to be frightening to the children and/or make them
feel like a victim (Gorchakov, 1954; Bolton, 1998). For the first exercise I did not allow
any child to take his/her partner outside the classroom for reasons of safety. However, to
make it challenging I arranged the small, nursery room chairs around the room to act as
obstacles.
I asked them to lead the blind partner by the hand in complete silence. After five
minutes, I asked the participants change roles. In the beginning, this exercise did not
work as everyone kept opening their eyes and peeking through the blindfold and
thereby defeating the cause.
To make the blind walk a challenge I asked them to take the blind partner round
the room and count the number of times the blind person banged into an object. This
not only made the game exciting but also made the guide treat the blind person more
carefully.
I then introduced oral communication into the game, where the guide could talk to the
blind person and ask him, for example, to stop, or be careful and walk slowly.
The most exciting blind walk game was played in the school compound, as it covered
a huge area of different levels and surfaces.
227
The hall on the ground floor by itself was interesting as it had pillars, a snacks
counter and chairs.
There were different levels, like one step down, three steps down and a short
flight of steps, too.
A small childrens playground with swings and slides and monkey bars.
Just near by, in the safety of the compound was a parked school bus.
The blind walk exercise performed on 15.2.2003 was the third time the children played
this game. By now they were getting comfortable at the thought of being lead by their
classmate.
Swaroop: How do you feel when you were blind?
Snehal: I was scared I would fall down.
Swaroop: Did feel scared the first time you did the stairs?
Sarla: Yes, Miss.
Chandani: I got scared ...I was nervous, because she took me in the garden. She showed
(sic) me all the toys ...and took me on the slide.
Swaroop: What about the guides? What did you think at that time?
Sarla: If I did not take care of her I will fall her [make her fall down].
so we should be careful.
228
I help my Ba [grandmother]
Chandani: who is blind. So we have to care for him (sic). If she falls down we have to be
responsible. We have to catch them if they are falling down. We must try to
make the blind person feel as if they are seeing.
Snehal: I kept thinking that you must not fall down. (He acted as my guide)
Swaroop: Sarla was very careful. She made her partner touch the wall while coming down
the stairs.
Transcript: Class 36-15.2.2003
While we were playing in the school compound a girl (pseudonyms: Shruti) who
had come to school for some reason on a holiday asked for permission to join in. She was
so fascinated by the game that I allowed her to join in. Her reaction to Sarla being her guide
is worthy of note, as she merely identified Sarla as a student of the school. They had
however never met before as they were in different standards.
Swaroop: What did you feel when Sarla took you around the compound?
Shruti: I felt nice. I did not feel scared. Sarla was taking good care of me.
Swaroop: Yes, I noticed the way she held your hand in hers
Transcript: Class 36-15.2.2003
The fact that a stranger felt comfortable at being led in the blind walk by Sarla
speaks volumes for her ability to show care for a person.
In October, nearly twenty-one months after we stared the drama module, imbibing
Heathcote's idea of teaching-at-risk (in Bolton, 1986), I handed the power over to the
children. The class and I negotiated that each child would conduct a class of his/ her choice.
Sarla chose the mask making and the understanding of the self lessons for her class. She
took the students back to the mask making class and each of the children made their own
mask after discussing and reflecting on the class in which they chose their personal
metaphors (secret identity see p.230). The following story is in Sarlas voice as she
conducted the class (see Chapter 5, p.164). The story is based on the analysis of transcript
and data of Class 48-18.10 2003. I remember the old days... is a critique of the Sarlas
development from the days when she followed me around (see Appendix 3, p.12-3) to the
229
time when she confidently performed in the dance-drama, directed the same (Chapter 5,
p.150), and conducted a successful class in Understanding Self.
230
[Rani means queen] wild animals like Running Leopard and Chatterbox
Monkey.
Nihar insisted he was the national flower of India, the lotus, because he
did not want to become a cat again ... Shenal transformed into a
sunflower ...Mukul became a rabbit ...Samir and Kanha ...became wild and
exotic animals and I metamorphosed into a queen of hearts...
The magic worked! This time we had become brightly coloured and had very
definite identities. We were not like the pale sun on a cloudy monsoon
day. We were like the vibrant sun in the Indian summer.
231
145
Chapter Eight
The Geek Squad
B rands dont get much bolder than The Geek Squad, the technology support
company. From a one-man start-up in 1994 the company has grown to become
an internationally admired brand offering technical support for home users and
small businesses when their computer hard drive crashes or they get a virus. But
that was just the start of their ambition. The Geek Squad, with just 100 locations,
merged with US retail consumer electronics brand, Best Buy, in 2002 and absorbed
Best Buys then 700 stores on its path to global domination. If there was ever a
case of a minnow swallowing a whale this was it. Today the company numbers
well over 1,000 stores and 150,000 employees, and has recently bought 50 per
cent of the UKs Carphone Warehouse to bring the Best Buy brand to the UK.
Despite the 40 per cent year-on-year growth rate, the company feels small,
with Robert Stephens, the founder, still actively involved in hiring and training
new people. One of Roberts favourite sayings is: We only have temporary custody
of talent, and the enormous lengths that he goes to in creating a bold, zany culture
where geeks can feel at home is testament to this belief.
The whole organization dramatizes the Geek Squad experience through language,
organizational structure, titles and even the uniforms the Special Agents wear. It
has created an enormous word-of-mouth effect. As Robert says, Marketing is a tax
that you pay for being unremarkable.
Bold practices
Despite never being visited by customers, Agents working in the call centres
all wear the Geek Squad uniform to preserve their identities.
The words Geek Squad are moulded on the soles of the Agents shoes so that
in the event they are walking in snow they leave an imprint of the logo as free
advertising.
Robert Stephens
founder and chief inspector
Robert Stephens started the Geek Squad Robert Stephens
in 1994 with $200. His vision for the com- 2011 The Geek Squad
pany is global domination.
I believe if Microsoft had just told everybody We would like to dominate the
operating system, and said so in that clear, unambiguous language, they would
have at least earned respect for clarity and consistency. So were very honest, our
goal is simple: Complete global domination of the technology services market. Of
course, this doesnt mean physical domination, rather domination by reputation.
You need to be clear about what your goal is and thats ours. Notice that our mission
says technology services. Our plan was always to support screens and networks
but when I first started in 1994, there werent many networks around so it was
mainly screens. Now there are screens in your pocket, on your mobile phone,
screens in your car and screens in your living room. Now you can kind of see
were just going to be doing the same thing for the next 2030 years as more
and more screens proliferate on more and more networks.
In the early 1990s, as normal people started buying computers, there was such
a rush to keep up with the demand that Dell and Microsoft and the other manufac-
turers just focused on moving boxes and product. Service was an afterthought.
But when commoditization occurs, as it does in every industry sooner or later, service
becomes a great differentiator. Now hardware commoditization has occurred and
it is increasingly happening with software. Commoditization and complexity are
creating too many choices for consumers, too many buttons to push, too many soft-
ware updates to keep track of, and customers like their lives made simple: one
number to call when they need help. So that was my big idea.
The DNA
Then I said, Why dont I give it a name thats generic and that implies intelligent
people banding together in the service of whatever support you need and the
148 Chapter Eight The Geek Squad
name itself is the advertising. It tells you everything you need to know about the
brand, the organizational culture, what the people are like and what they do. Its a
kind of paradox between the individual smart person the geek but then the
power of the network the squad. No one individual in this company will know
everything but together they know everything. And so that was the genesis of the
DNA. Once I went down that path, it kind of liberated me to say Im going to go
with a name that is also humorous. So we became The Geek Squad.
You know, humour is a subtle form of self-confidence. If you poke fun at your-
self, it means you have knowledge about yourself and are comfortable with what
you are. It is also very useful in my industry, which often gets criticized for being
arrogant, talking down to customers and not revealing their knowledge. So this is
going to be a company that is comfortable with itself, it knows that the geek is in
the social ascent and the jock is reliant on the geek to get their technology to
work. But the way to win over the public is to make fun of ourselves because a
company can humanize its brand by using different forms of humour. We employ
a kind of British dry wit, which is essentially comedy with a straight face. The
names already funny, so were not going to be silly when we get to your home. In
fact, it works even better if we dont acknowledge the humour at all: we just show
up on time, were dressed smartly, we get the job done efficiently. So behind
what may look like marketing gimmicks are some very intricately woven
brand elements that are inseparable from the actual function we perform.
is just as much about what you do as what you dont do. So the values are the light
source that attracts people to a company. I think people are drawn to Apple, theyre
drawn to Virgin; we have an intuitive sense about what we think their brand values
are and theyll be pretty close to what the founders probably intended; thats what
makes them strong brands.
Then the next question is, how true are you to those values? In the company
name, in the design of the logo, in the uniform, in the call centre experience. If you
have a phone number, if you have a website, if you have an e-mail address that you
communicate to customers; you are in the service business; the rest of what you do
is merely those things that help drive that experience. I realized early on that you
cannot design a customer experience because it is whatever the customer perceives
it to be. What you can do, though, is to influence that experience through the people
you hire. So what I began to realize is that I had a company name and logo that were
created to be distinct and supported by the uniforms and the cars, each taking a
functional role in creating our image, but that the key to success was that I had
to hand off that responsibility to each new employee and trust them to deliver
our brand.
attract people from our target employee market and it costs less than an ad
on monster.com. I would argue that recruitment should be your most authentic
form of advertising.
I call myself the promise maker in this business. We have promise makers and
promise keepers and my team worries about the promises we make to custom-
ers. So what should the customer experience be like? What price will we charge
for it? How should we communicate the promise? How do we talk about it with
our employees? What levels of quality do we expect from the promise keepers?
Our job is to answer all these questions.
Our most powerful channel for making promises is through our 150,000 retail
Best Buy employees. We have millions of customers walking into our stores
every year and coming into contact with those 150,000 employees. What those
employees say and believe about the Geek Squad is far more important than
any television ad that we might run.
154 Chapter Eight The Geek Squad
But this kind of thinking is what enables us to preserve our authenticity. There
are things we do today that we could do far more economically but might
sacrifice our authenticity and so we choose not to do them. For example, mould-
ing a Geek Squad logo on the bottom of our Agents shoes so that if they just
happen to walk in snow, the imprint of the logo will be left behind and people will
see that the Geek Squad was there. Consultants would take a look at the things
we do and describe them as waste. But they would be missing the point. We
generally believe that we have two icons that dramatize the brand. They are the
Geek Squad uniform and the black and white car. These are what consumers
remember and describe as differentiating us from competitors.
most of their lives, may not have felt like superheroes but knew inside they had
superhero-like qualities. In coming to the Geek Squad, they felt like they came to
a company that understood and appreciated them.
I believe that this should be possible in nearly every business context if you
ask the question, How can I create a culture that makes employees feel like we
understand and appreciate them? And whether you are selling dental supplies
or cars it should be possible to create a culture that feels right for the people
who work there.
We have a tradition of using real Agents in almost all our advertising. For ex
ample, take our proposition Geek Dreams, which is about promising to find a
solution to your technical challenges. Say I want to watch my home theatre under-
water in my pool, is that possible? Our Agents will see if they can build a system
that would be capable of being viewed and heard underwater. This is consistent
with our culture of geeks rising to the challenge of whether or not technology
can be used to deliver an experience. We feature our Agents doing heroic things
for customers. This is just one example of how we use the Agents as our main
marketing weapon.
I am sceptical that senior management in a large company can ever really be
close enough to their customers. We all do our best to make sure were getting
out to the markets enough and that were talking to enough customers. Any good
manager will do that, but there are just physical limitations in running a large
organization that prevent you from ever being as smart as you should be. But if
you allow your employees to have a very loud voice on how youre running the
business they will take care of that for you.
If youre lucky enough in business to have your original visionary leader,
make sure you value their contribution appropriately and give them the right
voice in setting the direction for the company and maintaining the culture. You so
often read about companies starting up, getting to a certain size and then parting
from their founder because that person is an entrepreneur, not a professional man-
ager. I think its a very short-sighted approach that ends up costing the company
dearly because the value that that original visionary creates is very hard for an ac-
countant to capture, though it is real nonetheless.
We have a real community that people are proud to be part of in a way thats
very difficult to find in a lot of business environments. For example, I was talking
to an Agent in one of our stores recently who was among the first generation
of Agents who were hired. He was telling me that he had his badge framed and
fastened to the wall in his living room. I cant think of any other business where
an employee would be so proud to be part of that business, that they would take
a piece of their uniform and frame it and put it on a wall. That story made a big
impact on me because it sums up what the Geek Squad is all about.
158 Chapter Eight The Geek Squad
Mission Impossible
My first impression of Geek Squad
Geek Squad Badge 2011 The Geek Squad
was the recruitment experience. I
came up from my home in Bath to London and the recruitment day was structured
like a Mission: Impossible task. I had to meet the interviewers for a briefing at an
advertising agency in central London which was kind of a daunting place to meet
for this little boy coming from Bath. Then we went for a drink somewhere and they
said, Okay, the next person you need to talk to is waiting at this location, so off
you go. And then when I got there I had to find my way to another location.
All I had was my phone to rely on but I found my way round London quite nicely.
I then realized that this was all part of the process: to see if I could navigate
around London and get to a place by a certain time just by using my phone. In
the end I was interviewed by seven people and that was the first time I felt
a company had taken the time to make it an experience rather than just
an interview.
The interviewers were different too. Some of them were just chatting about
technology, so I guess they got a sense of how genuine I was with micro-technology,
others just asked about movies and stuff, it was pretty cool. It was mostly How
you hanging, dude? you know, getting to me rather than looking at my CV and
going, Hmm, youve got this qualification, when did you get that? So yes, it was
quite cool.
Lee Williams the Double Agent 159
show up at the appointment and if you are there at least five minutes early you are
awarded your badge but if you are later than that he has gone!
Most of our bonus is based on the customers opinions of us. So well say to our
customers after weve visited them, How did you find the experience? and the big
question is Would you recommend us to a friend? And if we get a no to that bad
mark. If we get a yes to that a
good mark, so depending on how
many of those you get a month
thats what your bonus is based on.
The motivation for this job is
definitely not money or anything like
that but just seeing how you can
change peoples situations. It seems
quite simple to us to fix something
that can make such a difference to
someones life. So, you know, being
a hero is the big reward here...
when you save somebodys child-
hood pictures or something like that, Baby Geek 2011 The Geek Squad
its quite awesome.
I came across Geek Squad about 18 months ago through positive word of mouth
from other people. I never really saw any marketing, Im not even sure if they do
any. It was one of those brands that had a mythology about it and friends said to
me, Hey, have you heard of this company called the Geek Squad? You really should
try them, theyre amazing.
Im not that technically gifted and there is a growing anxiety about the amount
of electronic equipment that you have in your home and the fact that you dont
know how to use any of it and cant get the different bits to talk to each other.
So friends whove had the Geek Squad treatment became evangelists about it.
I guess the notion of having someone come to your home and solve all your
technological problems in one fell swoop was just a huge gap in the market
that needed filling.
singular message and such a pared-down approach that you cant believe it will
be as good as it is. Thinking about the customer journey I had, it was brilliant at
every single stage. So, from going on the website to making the initial phone call,
where the person I spoke to was extraordinarily helpful... you know, when trying
to figure out a time normally for support people you end up having to fit your diary
around theirs, whereas this was, When is it most convenient for you morning,
noon, night?
I was told who the Agent was who was going to turn up, what his name was,
where he was coming from and why he was coming. Lee Williams is his name.
(Editors note: the same Agent who was featured in the previous section.)
Bold lessons
Think big
The vision of the Geek Squad is The complete and total domination
of the computer support business. This was defined when Robert
Stephens was still working out of his home with start-up funds of just
$200, which shows that your vision need not be limited by your resources.
Be the brand
Robert Stephens is indistinguishable from his Agents. He wears the
Geek Squad uniform and is ready to swing into action at a moments
notice when there is a computer problem. Shaun was giving a keynote
speech at a conference and had a problem transferring the file. Robert
immediately came to the rescue and provided a complimentary Geek
Squad USB drive. Problem solved. Ass saved.
Relentless authenticity
Many companies will take their marketing ideas so far, until they cost too much
money or until they perceive they have performed their useful function. The
Geek Squad are different; whether it be the logos on the soles of the shoes or
the naming and uniform of non-customer-facing staff, it pursues its distinctive
approach relentlessly regardless of whether any tangible return on investment
is generated. It does so because its entire approach is founded on a culture of
authenticity geeks behave like geeks even when the customer isnt watching.
The Geek Squads insight was that you could turn peoples fear of and dependency
on technology into an opportunity to entertain as well as reassure them. They
created a wow experience by emphasizing a very human approach. Our next
bold brand, Zappos, has similarly taken what could be a remote, technologically
driven experience shopping online and found a way of ensuring it has a high
human factor. Its made the provision of wow its mantra. Like the Geek Squad it
encourages its people to be humble.
CHAPTER NINE
Chapter Objectives
1.0 Support Equipment To Collect ............................................................................... 1
2.0 Support Equipment To Be Built .............................................................................. 6
Good To Know - Lapse Rates, Dew Points, And A Stable Atmosphere............................... 26
Near Space Humor - Near Space Comix #1 .................................................................... 33
Launch Equipment
Lanyard release (see Section 2.3)
Kite winders (see Section 2.3)
Several pairs of leather gloves
Note: Do not use the leather gloves when working with the balloon
Place two inexpensive bed sheets or picnic blankets on the ground before unpacking the balloon.
Even when filled indoors, the balloon must be protected from dirt on the ground. The abrasive nature
of dirt damages the balloon skin during filling. Sew the bed sheets or picnic blankets together to
create a large enough clean work space. For those mornings the grass is wet or when the balloon is
filled on a gravely surface, place a tarp on the ground before the bed sheets. This may not be
necessary with the picnic blankets as they may have a waterproof lining. Balloon Crews usually fill
the balloon working on their knees. Help them out by giving them kneeling pads. Kneeling pads are
available at garden supply stores. Capsule closeout can be performed on a launch tower or the bed of
a truck, but its easier if done on a table. Bring a portable folding table to the launch site if the
Launch Crew cannot closeout the near spacecraft on a truck bed.
should not rely solely on the human memory to recall launch calculations and plans. Have a small
white board and dry erase marker handy at the launch site to record launch plans like weights and
lifts. Barring a white pad, at least have access to a note pad and pencil to document the same
information (dont forget to bring your notes back with you for use in a final report on the mission
please do not litter). Before launch the interior space of each module is filled with loose Styrofoam
peanuts. Purchase the real peanut-shaped peanuts and not the disc-shaped peanuts. Do not use the
cornstarch based biodegradable peanuts that turn to mush when exposed to water unless you want to
hose out the modules of the near spacecraft. Stores like Mailboxes Etc sell Styrofoam peanuts. Use
clean peanuts, do not use recycled ones. Finally purchase a mesh laundry bag to store the Styrofoam
peanuts. Along with some mesh laundry bags; stores sell an opened plastic frame for holding the bag
open. Purchase one of these if you can find it.
Miscellaneous Tools
The miscellaneous tools are seldom needed, but at times they are needed, they will save a launch. A
set of wire cutters are needed to perform surgery on the avionics or to cut bad zip ties. If a nylon line
must be cut in the field, use the lighter to melt the cut end of the nylon line to prevent it from fraying.
There should be no frayed nylon lines, either melt them or cover them in duct tape. A quick wipe
with a lens brush before launch allows the near spacecraft to return higher quality images. Keep
spare shipping tags with the launch equipment to label capsules with lost or damaged shipping tags or
for those times when the original shipping tag needs to be updated at the last minute. A digital
multimeter (DMM) is needed to measure battery voltages before flight (ensuring discharged batteries
are not sent on a mission) and to troubleshoot last minute errors. A DMM is another one of those
tools that can literally save a launch. Flashlights are needed for those early morning launches. Dont
rely solely on headlights, as there are times you need to look into the airframe. Carry spare items
like, nuts, bolts, and washers, spare fuses (if used in the avionics), spare BNC barrel connectors for
antennas, and twist ties into the launch equipment also. Use a clear plastic container to hold these
small items as it makes it easier to determine if the container has the parts needed without having to
open it (and risk spilling small parts). Many of the miscellaneous tools are easy to lose, so pack them
inside a small box or durable bag. The storage box or bag needs to be closed tightly to keeps item
from falling out, so purchase a container with a lid or integral seal like a zip lock seal. Finally several
large gym bags or plastic boxes are needed to haul this equipment around.
Besides making it easy to move the launch equipment, boxes or bags keep the launch equipment
together and reduce the chances of losing them. Launch equipment lost or left at home ruins a
launch. Imagine how aggravating it is to fill a $50 balloon with $75 worth of helium and discover
there is no load line at the launch site. Do not use cardboard boxes to store equipment as they are not
durable enough in the long run and will eventually let equipment fall out. Divide the launch
equipment among several bags or boxes or else it becomes too difficult for one person to move the
bags. Besides, packing lots of equipment into a container too small results in broken equipment. The
bed sheet and kneepads are large enough to need their own bag. Besides, you dont want potentially
dirty bed sheets and kneepads inside the other equipment bags. The balloon should have its own bag
or box. Do not carry other equipment in the same container as the balloon.
The possibility of damage to the balloon is too great. Wrap the balloon with an inexpensive towel for
additional cushioning and remember to not remove a balloon from its shipping bag until it is ready to
be filled. Finally, label every bag or box with its contents or function. Keep all the launch equipment
containers stored together and only use them to launch balloons.
Remove jewelry and watches when carrying tanks, as their weight will damage them (two people can
carry a tank). At the launch site, place the tanks on their side; do not leave them standing up.
Weighing Frame
Balloon Filler
Two Launch Lanyards and a lanyard release
Launch Tower
Warning Signs
2.1.1. Materials
3/4" square pine trim, twelve inches long
Three inexpensive eyebolts, nuts, and washers
Four snap swivels (use the larger ones)
Woven Dacron kite line, #200 test
Printed sign and laminator
Two #6-32 mounting hardware, one-inch long
2.1.2. Procedure
Locate and mark the center of the pine trim
Mark one inch from both ends of the pine trim
Drill three holes at the marked locations that are large enough for the eyebolts
Bolt the eyebolts to the pine trim
Eyebolts in Weighing
Frame
Note: The two eyebolts at the end terminate on the same side and the middle eyebolt
terminates on the opposite side of the pine trim
Cut two lengths of woven Dacron kite line three feet long and melt the cut ends
Find and mark the center of the kite lines
Tie the Dacron line at its middle into the two eyebolts located at the end of the pine trim
Note: Use a simple overhand knot
Tie the snap swivels to the ends of the woven Dacron
Note: This is one of the few places you can use snap swivels in a near space program
With a word processor, type a sign saying something to the effect,
Balloon Filler
2.2.1. Materials
Visit your local welding supply store for the following parts (support your local businesses when
possible). Your welding shop may use a different supplier, but the parts listed are commonly used in
welding.
2.2.2. Procedure
Regulator Modification
Remove the string cutter if the regulator has one
Note: The string cutter is used to cut strings for toy helium balloons and has a sharp edge
Remove the tilt valve
Note: The tilt valve is the rubber filler value for toy balloons. The tilt valve is sealed when
straight and lets helium flow when tilted
Oxygen Hose
Ask a Welding Shop to do the following
On one end of the hose, install the following:
7325 Ferrule
541 barb to NPT
This end of the hose connects to the PVC pipe
Regulator Side of
oxygen hose
PVC Filler
Screw AW15A into regulator end of oxygen hose
Screw AW15A into regulator
Find and mark the center of the PVC cap (don't sweat if its not perfect)
Drill a 1/4" hole in the bottom of the PVC end cap.
Pass the male pipe into the hole in the PVC cap
Bolt the PVC cap to the hose with a BF 4HP Bushing
Note: At this point you should have an hose that is secured tightly to a PVC cap
Fill around the BF 4HP Bush with either epoxy of RTV
Note: This makes an airtight seal around the hose where it enters the PVC cap
Note: Be careful you don't overfill the cap, as you still have to glue the PVC pipe into it.
Let the adhesives set over night
Look over the fill making sure there are no open gaps that can leak helium gas
Diagram of
PVC End of
hose
Sand the ends of the PVC pipe to make it free of burrs that may abrade the balloon nozzle
Test the fit of the cap and pipe and ensure the PVC pipe seats deeply into the cap where the
PVC cement can weld them together
Cement the PVC pipe into the PVC cap with PVC cement
Let the cement set for a couple of minutes before testing the connection.
Cut two feet of sisal cord
Fold the sisal in half and tie to the bottom of the PVC pipe, where it meets the PVC cap
Wrap the sisal in duct tape where it is tied around the PVC pipe
The launch lanyard forms a tripod structure around the stack. One person on the lanyards (the one
with the diameter PVC pipe) is the lanyard release. The two other people control the kite winders.
Crews holding the winders raise the balloon keeping it under full control. There is virtually no risk of
string burn with this system. The lanyards and kite winders method allows the balloon to safely be
lowered if necessary.
In the past I have purchased a pair of kite winders for the lanyard lines ($7.00 for a small winder). To
keep the cost down I used small kite string winders. They were sufficient to hold the line, but being
small, they made it difficult to raise the stack smoothly. Every turn of the small winders sent
snapping shocks up the lanyards to the balloon neck. Ive made larger winders from wood in the past,
but those required tools that many people do not have at home. Mark Conner (N9XTN)
recommended I use winders made from PVC pipe similar to the ones he makes. So here are the
instructions I developed from Marks concept. Thanks for the idea, Mark. Modify these directions as
necessary.
PVC Winder
2.3.1. Materials
Six feet of PVC pipe
Eight Ts
Four caps
One can of PVC cement (use the smallest can)
Small saw (an Exacto saw or hack saw works well)
Beaded chain
2.3.2. Procedure
Cut the PVC pipe as follows
Four pieces 4 long
Four pieces 5 long
Four pieces 6 long
Divide the pieces into two piles. Each pile constructs a single winder.
PVC glue gives a few seconds to work with it. So first glue together the pieces that dont have
critical alignment issues.
In Rapid Succession
Glue the remaining Ts onto the open end of the four-inch pipe and them glue the two
halves together to finish the winder
Lay the completed winder on a flat surface and press down on its corners
Let the PVC cement set for an hour
Theres raised lettering on the center port of the Ts. Two of those will rub against the hands of crews
using the winder, so file off the raised lettering and smooth the surface of the Ts.
Cut one last piece of PVC pipe to a length of twelve inches (the lanyard release)
Sand the cut ends smooth
stack. When the winder is tied to the end of the lanyard, its weight may let the lanyard wrap around
the parachute and shroud lines. This is not a problem during the ascent of the stack, but is big trouble
during the descent after balloon burst. Without weights hanging off the ends of the lanyard cord, the
cord tends to swing away from the parachute when the stack spins during the ascent. If the lanyard
line is twisted when it is wound on the winder, then the lanyard line will untwist itself in the air when
released from the PVC release and will tie a knot in the lanyard ring. The untwisting lanyard can tie a
knot in the lanyard ring, snagging the lanyard ring and preventing the launch. So wrap the lanyard
lines on their winders by laying the lanyard on the ground first, and then wrap it onto the winder. Do
not wrap the line onto a stationary winder, but instead wind the winder, taking up the lanyard line.
This method will reduce the chances of twisting the lanyard lines as they are wound on the winders.
Since the near space stack is about 50" tall, wind at least 200' of 1/16" woven nylon line on
each winder
Melt the ends of the lanyards with a lighter
Tie a one-inch diameter loop at the free end of the lanyard line
Finished
Winder
Pass the looped ends of both lanyards through the same side of the lanyard ring
Module closeout and testing can be performed on a table at the launch site. But when it comes time
to connect their link lines and umbilical together, invariably the link lines get twisted around one
another. To prevent the twisting, place the modules to a gantry-like structure that supports the
modules in a flight-like configuration. The spacing between the modules is shorter then they are in
flight, but good enough for linking the modules together correctly. The gantry also provides a
structure for mounting laptops, heaters, extension cords, and wheels. Why wheels? Once the near
spacecraft is assembled on the gantry, the gantry also acts like a dolly. One person can move the
entire near spacecraft around, if necessary.
The launch tower described in this section has two removable platforms for setting the near spacecraft
modules on. The platforms are removable to make it easier to transport the tower. On the back of the
gantry are two optional coat hooks for wrapping an extension cord. The extension cord provides
power to the tower if an outlet is available. Long Velcro straps attached to the side of the tower lock
the modules against the gantry. This way the modules can't shift around or fall off. The Velcro straps
extend around the back of the tower where they can strap the parachute to the back of the tower.
2.4.1. Materials
square pine trim
1/8 plywood door skin
thick Styrofoam
At least twelve feet of one-inch wide Velcro tape (non-sticky back variety)
Assorted fasteners like screws and finishing nails
Wood glue
Paint (red and white is traditional)
70-pound bag of tube sand (traction sand for cars and trucks)
Note: The TVNSP launch tower was constructed in a kitchen using hand tools and clamps.
2.4.2. Procedure
Built the tower to suit your specifications. The directions below describe how TVNSP built its
launch tower.
Tower
The TVNSP launch tower is six feet tall and made up of six, one-foot tall repeating units. Cross
braces are glued diagonally between levels of the tower. Occasional sheets of 1/8 plywood door skin
covers sides to strengthen the tower. The TVNSP launch tower is not as wide as an airframe, so the
left and right sides of airframes extend beyond the edges of the launch tower.
Cut four lengths of pine to match the height of the tower (these are the vertical elements
of the tower)
Note: TVNSP extended the length of the front two vertical elements by six inches to
Platforms
Measure the width of the launch tower
Note: You need an accurate measurement; dont use the planned dimensions of the tower,
measure it to be sure
Determine how long you want the platforms to be (platform depth)
Note: TVNSP platforms extend about ten-inches from the tower
Cut two pieces of Styrofoam to the measured width of the tower and to the desired
platform depth
Cut four pieces of pine trim to a length equal to depth of the tower and the extension length
of the platforms (platform rails)
Lay two pieces of pine beside the cut Styrofoam with one pine trim on each side
Measure the width of the Styrofoam and pine (the platform width)
Cut four pieces of 1/8 plywood door skin to a dimension of the platform width and the
platform depth
Glue and clamp the platform rails to the sides of the face of the platform with the Styrofoam
between the rails
Note: The umbilical should run along the same side of both modules and not wrap around
Umbilical Placement
The left diagram shows
bad umbilical placement,
resulting in a twisted
umbilical. On the right,
good umbilical placement,
keeping the entire
umbilical on the same
side.
Note: Have a second crewmember verify the split key rings are still properly attached to the
Dacron loops of the abrasion jacket. Often, when someone is attaching a swivel to a split
ring, they begin disconnecting the split ring from the Dacron loops of the abrasions jacket.
Drape parachute over the back of the tower and Velcro it to the launch tower
Module Heaters
Launch Tower
Module Heater
If an extension cord is available at the launch site, then handheld hair driers can be operated at the
tower. The warmed air from a drier at low setting can be directed inside the modules while they wait
for launch. The higher internal temperature of the capsules at launch keeps them from cooling down
as much during the flight. Be sure the hair driers are set to a low enough temperature that they do not
melt the plastic inside the modules. Use flexible aluminum heater duct (or other materials able to
withstand the heat) to direct heat flow into the modules.
Another possible modification to the launch tower is to incorporate a removable table or platform for
a laptop into the towers design. A laptop platform allows the closeout crew to monitor the near
spacecraft before launch while its still sitting on the launch tower. They can also load test programs
into the near spacecraft before launch, letting them test experiments on the near spacecraft. Be sure
the closeout crew loads the flight code into the flight computer before the launch. Launching the near
spacecraft with test code makes for a real bummer of a flight.
2.5.1. Materials
square pine trim
1/8 plywood door skin or masonite
Light duty steel chain
#6-32 mounting hardware
Fluorescent paper
Laminator
2.5.2. Procedure
A less dense item floats in a denser medium because it displaces less weight than the same volume of
the medium. A warm parcel of air in the atmosphere is less dense than the colder air surrounding it.
The buoyancy of warm air keeps it floating (rising) as long as the air parcel remains warmer than the
air surrounding it, as can be seen with hot air balloons.
The troposphere is not heated by its exposure to the Sun, but instead by its contact with the ground.
As a result, the troposphere cools with increasing altitude. The amount the air temperature changes
per change in altitude is called the lapse rate. At the same time the buoyant air parcel rises, the
atmospheric pressure around it is lowering. The lowering air pressure forces the air parcel to expand.
The Ideal Gas LawB states that the temperature of an adiabatic parcel of air lowers as its pressure
exerted on it lowers. The term adiabatic means that no matter or energy enters the air parcel. While
not strictly true for an air parcel, it is close enough to adiabatic for our needs.
Now add another factor to the change in temperature of our buoyant (and expanding) parcel of air,
phase change. Does it take the same amount of energy to raise the temperature of a volume of water
by two degrees Celsius from 94 to 96 C as it takes to raise the temperature of the same volume of
water by two degrees Celsius from 96 to 98 C? The answer is yes, or close enough for our
purposes. How about raising the temperature of the same volume of water by two degrees Celsius
from 99 to 101 C. Does it take the same amount of energy as in the last two examples? The answer
is a definite no. The volume of water remained in the liquid phase in the first question, but changed
phases in the second question. Water cannot remain a liquid at 101 (this is an ideal example)C
without the water molecules first gaining enough energy to break free of each other (to go from a
liquid to a gas). The energy required to change the phase of any liquid to a vapor is called the heat of
vaporization. What happens to this energy after water changes phases? Its stored in the motion of
the water molecules. Until the water molecules in the water vapor slow down enough to begin
sticking together to form a liquid, the energy required to vaporize the liquid remains trapped in the
kinetic energy of the water molecules. Note that the water vapor is an invisible gas and not the white-
colored steam coming from a boiling teakettle.
Keeping this in mind, what happens when water vapor in the atmosphere changes phase from a gas to
a liquid? First we begin to see what was invisible water molecules begin to appear as tiny droplets of
liquid water. Since these droplets grow large enough to Rayleigh scatter all wavelengths of visible
light, the droplets appear to be white when seen in a large enough quantity. A large enough quantity
of water droplets is called a cloud. The second noticeable change is that energy trapped in the kinetic
energy of the water molecules in the vapor phase becomes available to warm the air. Remember that
the water molecules absorbed enough energy to change phases. Now that this energy is no longer
needed to maintain the vapor phase of water it has to go somewhere, since energy, like mass, cannot
be created or destroyed. As a result the energy is released and heats the surrounding air. The energy
released when vapor condenses to form a liquid is called the latent heat.
So now our picture looks like this. The Sun shines on the ground, warming it up. The air in contact
with the ground also begins to warm up. A warm air parcel containing water vapor begins rising
because it is warmer than the air surrounding it. As the air parcel rises it expands and cools. As long
as the air parcel remains warmer than the surround air, it continues rising and cooling until its dew
point is reached. At this point, the water molecules begin changing phase from a gas to a liquid. As
the water molecules change phase they warm the air parcel. The air parcel continues cooling as it
rises, but not as quickly as before the water began condensing. This process is most effective on
spring afternoons, when the ground is warming from the increasing hours of sunlight and the air aloft
is still chilly from the winter. The Suns light only warms the very top layer of ground, but thats
enough to warm the air.
In a stable atmosphere, any air parcel that becomes a bit warmer than the surrounding air will only
rise a short altitude before cooling down enough to stop being buoyant. A stable atmosphere has little
vertical mixing and if it has clouds, they tend to be stratoform types. In an unstable atmosphere, any
air parcel that becomes a bit warmer than the surrounding air will continue rising because it never
cools enough to stop being buoyant. An unstable atmosphere has lots of vertical mixing and if it has
clouds, they tend to be cumuliform types.
Just to add unnecessary complication, but to be excruciatingly correct, regardless of their temperature,
water molecules in the air are always changing from the liquid to the gas phase and back again. At
lower temperatures more water molecules transition from a gas to a liquid than transition from a
liquid to a gas. But for our purposes, water molecules begin condensing from a vapor a liquid once
the temperature drops below the dew point of the gas. The dew point by the way depends on the
amount of water vapor dissolved in the atmosphere. Dissolved? Yes, gases can dissolve into each
other just as metals are dissolved into each other in an alloy.
The decrease in atmospheric density and pressure ideally follows a simple rate of a 50% change in
pressure with every 18,000-foot change in altitude. As a result the temperature of a buoyant air parcel
decreases at a fixed rate for every fixed increase in altitude. However, because of the change in phase
when the temperature of the air parcel drops below its dew point, there are two lapse rates. Since the
air parcel is nearly isolated from the surrounding air, we can refer to these lapse rates as being
adiabatic. The lapse rate for an air parcel at a temperature above its dew point is called the dry
adiabatic lapse rate. The lapse rate for the same air parcel once its temperature is below its dew point
is called the moist adiabatic lapse rate.
The dry adiabatic lapse rate is 5.4 F per 1000 feet and the moist adiabatic lapse rate is between 20
and 40 F per 1000 feet. For those practicing to use the metric system, the dry adiabatic lapse rate is
9.80 C per kilometer (close enough to 100 per kilometer) and the moist adiabatic lapse rate is between
40 and 70 C per kilometer.
After processing air temperature and altitude data from a near space flight, create a new column for
the lapse rate at each recorded altitude. Take the air temperature at a given altitude and subtract the
air temperature in the previous record. Divide the change in air temperate by the change in altitude
between the two records. Since the lapse rate is given in units of 1000 feet, multiple the results of the
previous division by 1000. The equation in each cell looks like this
Where:
The D column is the altitude in feet column
The G column is the air temperature in degrees F
Note: Graphing the lapse rate in the troposphere is more important than in the stratosphere.
Create graph of lapse rate and altitude. Place the altitude in feet in the vertical column and the lapse
rate for each altitude in the horizontal column. Label the graph as the Lapse Rate for that particular
flight. One thing youll notice is that the lapse rate is negative in the troposphere and positive in the
stratosphere (if calculated there). If you dont observe this, then youve done something wrong in
making your graph. Youll also notice that there are a lot of zigzags in the graph. Its not as smooth
as we would like. Part if this is due to the fact that the atmosphere really is messy. But its also due
to the fact that the temperature sensor and GPS altitude have errors that are constantly varying in
direction and magnitude.
So far, so good. But with this graph you can also determine of the if the atmosphere is stable or not.
Determine at what attitude the air temperature drops below the dew point. This can be determined by
a report from the National Weather Service at the time of launch. You can also determine the dew
point at launch yourself with a sling psychrometer. See the next section for directions for making a
sling psychrometer and how to use it to determining dew points. Once you have the dew point, insert
a new column to the spreadsheet, called the Ideal Lapse Rate. This column has one of two numbers
in it, either 5.4 or 3 (the average of the moist adiabatic lapse rates). Put a 5.4 in the column where the
row has an air temperature above the dew point and a 3 into the column with a row with an air
temperature below the dew point. Now update the Lapse Rate graph with a second series, the Ideal
Lapse Rate column and only plot it to the tropopause. Use a different color or different line style for
the two lapse rate columns. Now print this graph.
Lapse
Rate
Graph
with
Stability
Line
When the ideal lapse rate is smaller (more negative) than the lapse rate calculated from flight data, the
atmosphere is stable at that altitude. When the ideal lapse rate is greater (more positive) than the
calculated lapse rate, then the atmosphere is unstable at that altitude. So in the example above, the
atmosphere is stable until an altitude of around 8,000 feet when the dew point is 65 F.
Theory of Operation
Energy is required to evaporate water. That energy can come from an object that the water is sitting
on when it evaporates. So a thermometer bulb covered in evaporating water indicates a lower
temperature when compared to a dry thermometer bulb because the heat of vaporization required
evaporating the water is coming from the thermometer. The amount of cooling depends on a
combination of how much heat flows out of the thermometer bulb into evaporating water and how
much heat is flowing into the bulb from the surrounding air. How fast water evaporates from the bulb
depends on the air temperature and the amount of water dissolved in the air (called the absolute
humidity and given in units of grams of water per kilogram of air). The maximum amount of water
that can be dissolved into the air depends on the atmosphere's temperature. The ratio of the maximum
amount possible to the current absolute humidity is the relative humidity. If the absolute humidity
doesnt change, then as the air temperate rises, the relative humidity decreases and as air temperate
drops, the relative humidity increases. The temperature at which the air can hold no more water than
is currently dissolved in the air is called the dew point. Ideally, at the dew point, condensation
becomes visible on cars and grass. In reality, dew usually appears at temperatures above the dew
point because of the presence of condensation nuclei. Of course if the dew point is below the freezing
point of water, then you dont get dew, but frost instead.
The sling psychrometerD consists of two thermometers mounted in close proximity. One is exposed
to the air while the other one is covered in evaporating water. The sling psychrometer swings to force
air to pass over the thermometer bulbs. The temperatures of the two thermometers are referred to as
the dry bulb temperature and the wet bulb temperature. Columns on a table determine the dew point
and relative humidity of the air by comparing the dry bulb temperature to the difference between the
dry bulb and wet bulb measurements.
Completed Sling
Psychrometer
Materials
Two small thermometersE
Or
Two garden thermometersF
A base (use either a thick plastic or model aircraft plywood)
Short length of shoelace
Cotton thread
-20 bolt, 5 to 6 inches long
Brass or aluminum tubing, large enough to cover the bolt without binding
-20 nut
Three -20 washers
-20 acorn nut
4-40 hardware for bolting the thermometers to the base, include lock washers
Construction
You have two choices here. Either the thermometers can be mounted side by side or on opposite
sides of the psychrometer base. However, keep in mind the following. The handle needs to be
mounted to the top of the base. The handle is used to swing the psychrometer. Also, the thermometer
to become the wet bulb must be mounted such that its bulb extends beyond the base on the side
opposite from the handle.
Handle
Lay the thermometers on the material chosen to be the base
Determine the position of the bolt handle and the thermometers
Drill a hold for the -20 bolt
Attach the bolt to the base with washers and a nut
Attach the acorn nut to the end of the bolt and measure the open space between the bottom
nut and the base of the acorn nut
Cut the aluminum or brass tubing to this length
Remove the acorn nut and slide the tubing over the exposed threads of the -20 bolt
Place a washer over the end of the tubing and screw on the acorn nut
Note: The acorn nut will tighten enough against the tubing to keep it from spinning because
the tubing is too long
Estimate how much the tubing needs to be shortened before it can spin freely around the bolt
Remove the tubing and shorten it
Test the fit again
Note: You want the tubing just short enough that the tube can spin when the acorn nut is
tightly screwed to the bolt, but without bolt threads or metal edges exposed. The tubing
forms a comfortable grip for the sling psychrometer without exposing your hands to rapidly
spinning sharp metal edges.
Cut the tubing again if necessary
Thermometers
Remember that the thermometer to become the wet bulb must be mounted such that its bulb extends
beyond the base. However, do not extend the thermometer bulb much beyond the base, just enough
to expose the bulb.
Carefully drill 4-40 holes in the thermometer bodies to mount the thermometers securely to
the psychrometer base
Use bolts and lock washers to ensure the thermometers are securely mounted
Note: You want to ensure the thermometers do not go flying away every time you take a
measurement
Take the sling psychrometer outside and spin it a few minutes
Note: Keep people and important possessions away from the potential ballistic trajectory of
a thermometer when swinging the sling psychrometer for the first time
Check the bolts after the test; make sure theyre still tight
Use the short length of cotton shoelace to cover the wet bulb like a sock
Use the cotton thread to tie the lace above and below the bulb.
If the bulbs do not indicate the same temperature, then write on the sling psychrometer the
correction needed.
In this table, the dry bulb reading is found in the vertical column on the left, while the wet bulb
depression is found in the row on the top. Cross-reference the row and column and youll find two
numbers. The first number is the dew point and the second number is the relative humidity in
percent. Record the dew point at the time of launch.
40 38 35 33 30 25 18 7 -14
45 43 41 38 36 31 25 18 7 -14
50 48 46 44 42 37 32 26 18 8 -13
55 53 51 50 48 43 38 33 27 20 9 -12
60 58 57 55 53 49 45 40 35 29 21 11 -8
65 63 62 60 59 55 51 47 42 37 31 24 14
70 69 67 65 64 61 57 53 49 44 39 33 26 -11
75 74 72 71 69 66 63 59 55 51 47 42 36 15
80 79 77 76 74 72 68 65 62 58 54 50 44 28 -7
85 84 82 81 80 77 74 71 68 64 61 57 52 39 19
90 89 87 86 85 82 79 76 73 70 67 63 59 48 32
95 94 93 91 90 87 85 82 79 76 73 70 66 56 43
100 99 98 96 95 93 90 87 85 82 79 76 72 63 52
Example
Say you measure a dry bulb temperature of 70 F and a wet bulb temperature of 60 F.
Subtract the 60 from the 70 to get a wet bulb depression of 10 F. Go to the table and find the
intersection of the 70 F air temperature row with the 10 F wet bulb depression column. Youll find
the numbers 70/56. This indicates the relative humidity is 70% and the dew point is 56 F. The air is
holding 70% of the water vapor it can hold at this temperature and if the air temperature drops below
56 F, there will be dew. Note that if the dew point is below 32 F, then there will be no frost until
the air temperature drops below the dew point. So if can be below freezing without there being frost.
Be sure to add measuring the wet and dry bulb temperatures to your launch checklist (if these
measurements are needed).
A
One regulator is the Profill Balloon Regulator (Crammer Decker), model BR 3855 with gauge and hand
tightener. If the regulator does not have a hand tightener, then also purchase a crescent or box wrench.
B
As you no doubt recall from high school chemistry, the Ideal Gas Law is stated in the equation:
PV=nRT
Where:
P is the pressure exerted by gas
V is the volume occupied by a gas
n is the amount of gas (in moles) in a sample or parcel
R is Boltzmanns constant
T is the temperature in an absolute scale (Kelvin or Rankin)
C
Water can remain a liquid below 0 degrees Celsius or above 100 degrees Celsius. But eventually the water
does change phases, either with a little more time or with a further change in temperature. The purer the water,
the longer it can remain a liquid.
D
The name originates from psychro (cold), not psych (mind)
E
These are available at school supply stores or science catalogs
F
When purchasing thermometers, select two that read the same temperature
G
Table from http://www.jsu.edu/depart/geography/mhill/phygeogone/unit2/dewtablf.html, Dr. M.H. Hill,
Jacksonville State University
Outline
I. Instincts
A. Motivation is the process that arouses, directs, and maintains behavior.
B. In the past, behaviors often were explained in terms of an instinctan unlearned,
complex pattern of behavior that occurs in the presence of certain stimuli.
C. William McDougall believed that humans were motivated by 18 instincts.
1. As more behaviors needed explaining, the list of instincts grew.
2. Truth is, instincts may name, but they dont explain.
3. Still, the approach reminds us that we may engage in some behaviors for
reasons that are basically biological, physiological, and inherited.
III. Incentives
A. Incentives are stimuli an organism may be motivated to approach or avoid.
B. Whereas drives are said to push behaviors, incentives pull behaviors from
without
C. Many of the principles are similar to those of operant conditioning.
IV. Balance or Equilibrium
A. There are several theories that involve the concepts of balance or equilibrium.
B. Walter Cannons theory of homeostasis claimed that internal physiological conditions
seek a balanced set point.
C. Arousal theories suggest that for every task there is an optimal and balanced level of
activation required to complete the task well.
D. Leon Festingers theory of cognitive dissonance argues that we are motivated to
maintain a state of balance or equilibrium among cognitions.
V. Temperature Regulation
A. We are driven to regulate our body temperature.
B. When body temperature changes from normal, the first reaction is physiological.
1. The attempt is to return to set point by a process mediated by the
hypothalamus.
2. The hypothalamus is a small structure near the limbic system in the center of
the brain, associated with temperature regulation, feeding, drinking, and sex.
C. If automatic processes are insufficient, we are driven to engage in behavior to change
body temperature.
1. Discuss how instinct, drive, and incentive have been used to explain motivated
behaviors.
2. Explain how the concept of balance or equilibrium can be used to explain motivated
behaviors.
5. Describe the symptoms of anorexia nervosa and bulimia, and explain the prognosis
for each disorder.
6. Discuss the ways in which the sex drive is a unique, physiologically based drive, and
explain how the cognitive and affective systems operate in the human sexual motive.
9. Explain the male and female sexual dysfunctions and their causes.
13. Discuss the different perspectives and controversies surrounding the classification of
emotion and the search for basic, or primary, emotions.
14. Describe the activities of the sympathetic division of the autonomic nervous system
during states of emotionality.
16. Explain the James-Lange and Cannon-Bard theories on the roots of emotion.
17. Discuss the two factors involved in the two-factor theory of emotion.
18. Define the cognitive appraisal theory of emotion and the content process model.
19. Explain how facial expressions help to convey emotion across cultures.
Key Terms and Concepts
motivation____________________________________________________________________
______________________________________________________________________________
instincts______________________________________________________________________
______________________________________________________________________________
need__________________________________________________________________________
______________________________________________________________________________
drive_________________________________________________________________________
______________________________________________________________________________
secondary drive________________________________________________________________
______________________________________________________________________________
incentive______________________________________________________________________
______________________________________________________________________________
homeostasis___________________________________________________________________
______________________________________________________________________________
arousal_______________________________________________________________________
______________________________________________________________________________
cognitive dissonance____________________________________________________________
______________________________________________________________________________
obesity________________________________________________________________________
______________________________________________________________________________
anorexia nervosa_______________________________________________________________
______________________________________________________________________________
bulimia nervosa________________________________________________________________
______________________________________________________________________________
homosexuality_________________________________________________________________
______________________________________________________________________________
heterosexuality_________________________________________________________________
______________________________________________________________________________
gay___________________________________________________________________________
_____________________________________________________________________________
lesbian_______________________________________________________________________
______________________________________________________________________________
need to achieve (nAch)__________________________________________________________
______________________________________________________________________________
Thematic Apperception Test (TAT)_______________________________________________
______________________________________________________________________________
need for power_________________________________________________________________
______________________________________________________________________________
need for affiliation______________________________________________________________
______________________________________________________________________________
need for intimacy_______________________________________________________________
______________________________________________________________________________
loneliness_____________________________________________________________________
______________________________________________________________________________
emotion_______________________________________________________________________
_____________________________________________________________________________
valenced state__________________________________________________________________
______________________________________________________________________________
parasympathetic division (of the ANS)_____________________________________________
______________________________________________________________________________
______________________________________________________________________________
aggression_____________________________________________________________________
______________________________________________________________________________
Practice Test Questions
Multiple Choice
3. What is the major problem with using the concept of instinct to explain human behavior?
___a. There are too many human instincts to keep track of.
___b. There are too few human behaviors that have a biological basis.
___c. Referring to instincts may describe behaviors, but it doesnt explain them.
___d. Too many human instincts have opposites, such as needs to socialize and needs to
be alone.
5. Approaches to motivation that focus on stimuli outside the organism are approaches that
focus on
___a. incentives. ___c. arousal.
___b. drives. ___d. homeostasis.
11. In what way is the sex drive in humans most different from the sex drive in rats?
___a. It does not appear until after puberty.
___b. Its satisfaction does not determine the survival of the individual.
___c. It is strongly affected by learning and experience.
___d. Its physiological basis is largely hormonal.
13. At the moment, which of these can be taken as the most reasonable hypothesis for the
development of a homosexual orientation?
___a. genetic differences in X and Y chromosomes
___b. the lack of a father-figure in single-parent homes
___c. unsatisfying or frustrating sexual encounters in early adolescence
___d. hormonal imbalances that occur during prenatal development
14. If given a choice, a person with a high need to achieve (aAch) would probably chose a job in
which he or she
___a. could succeed with very little effort.
___b. would be in a position to control the fate of others.
___c. would be working with as many people as possible.
___d. could do well, but only with effort and hard work.
15. Of the following, which question reflects a current debate concerning the nature of
emotions?
___a. Do facial expressions express emotions?
___b. Are cognitions required for an emotional experience?
___c. Does becoming emotional involve the ANS?
___d. Do emotions serve any useful adaptive functions?
20. In emotional states, the major role of the cerebral cortex seems to be to
___a. trigger reactions in lower centers, like the limbic system.
___b. increase heart rate and blood pressure.
___c. cognitively interpret the situation at hand.
___d. cause the organism to engage in fight or flight.
True/False
1. ____True ____False The concepts of balance, equilibrium, and set-point refer only to
physiological conditions or physiological processes.
2. ____True ____False Arousal theory tells us that ones performance on a task will continue
to improve as ones level of arousal continues to increase.
3. ____True ____False Although our hypothalamus may inform us that we are hungry or
thirsty, learning and experience inform us about what to eat or drink.
4. ____True ____False The prognosis for anorexia nervosa is significantly better than the
prognosis for bulimia.
5. ____True ____False Whereas men are motivated by a need to achieve, women are
motivated by a fear of failure.
6. ____True ____False Emotions that we classify as negative seldom have any survival
value.
7. ____True ____False Most psychologists agree that there are four basic, or primary,
emotions.
8. ____True ____False The only emotions that appear to be universal are joy and fear.
Answers to Practice Test Questions
Multiple Choice
1. b We say that motivation arouses, directs, and maintains behavior. Now memory is surely
involved in motivationits involved in nearly everythingbut it is less central than the
other three.
2. d Actually, the more complex, or higher a psychological process, the more likely that
motivation will be a significant factor. The best choice here is the nearly physiological
process of sensation.
3. c There is value to the notion of instinct, of course, but with regard to human behavior,
instinct tends more to name and describe than to explain anything.
4. a Dont get rattled just because I dropped a name in here. In virtually anyones system
including Hulls needs give rise to drives.
5. a Drives, arousal, and homeostasis all refer to conditions or states within the organism,
whereas incentives are thought of as being out there in the environment.
6. d By definition, homeostasis is a condition of balance or equilibrium.
7. a This one is fairly obvious. The hypothalamus would be the best guess if you werent sure
it seems to be involved in almost all physiological drives.
8. b Most of the water in our bodies is stored within the cells.
9. c Clearly it has an impact, but curiously, of these choices, the sense of fullness of the
stomach is the least important.
10. c Alternatives a and b are both true. Alternative d is true of anorexia, but not bulimia.
11. c Alternatives a, b, and d are true of the sex drive for both humans and rats. The sex drive
and sexual behaviors in rats do not seem to be much affected by learning or experience.
12. c Only the third alternative is true, and beyond that, the others are very false.
13. d The total picture is far from clear. Were quite sure that none of the observations made in
the first three alternatives are even relevant, and we are becoming quite convinced that
the fourth alternative makes the best statement that we can make right now..
14. d The best alternative here is the last one.
15. b I dont think that any of the others are debatable at all, but there is now quite a discussion
centering on the role or even the necessity of cognition for emotional experiences.
16. a Heart rate increases, it doesnt decrease in fact, think of this item in terms of what
would you like to have happen if you were faced with a bear in the woods?
17. c It is not possible to have an emotional reaction without the processes named in
alternatives a, b, and d. If there is ever a judgment made about the adaptive value of an
emotion, it would be made later.
18. d This one is sort of silly, isnt it? Different theorists have different ideas, and for now the
safest thing that we can say is that it depends mostly on which theorist youd like to
believe.
19. b As weve seen, all of the parts of the brain tend to work together and all of its aspects are
involved in all reactions, but having said that, it is the limbic system that is most involved
in emotionality.
20. c The main role of the cerebral cortex is to bring a cognitive, thoughtful analysis to the
situation that is being experienced.
21. b Remember, the James-Lange approach is nearly the opposite of common sense, arguing
that we respond (internally, perhaps) first, then experience an emotion.
22. a This has less to do with emotion than it does with the difference between humans and
nonhumans. Only humans can talk (verbalize) about how we feel.
True/False
1. F At one point in history, we might have been able to say that this statement was true, but
now we see that these concepts can be applied well beyond physiological functioning.
2. F Well, at first, maybe, but what makes this statement false is that if arousal continues to
rise, eventually it will become so high as to be debilitating.
3. T If the truth of this statement is not obvious, you only need think about it for a moment
longer.
4. F No, in fact, quite the opposite is true.
5. F With regard to achievement and failure, there is little evidence that there are any sensible
gender differences at all.
6. F Actually, some of the negative emotions fear, for example may have more
survival value than some of the positive emotions.
7. F Heres this one again. Previously, it was item #4 in multiple-choice form. Psychologists
have come to no general agreement on the number of primary emotionsand are
wondering if there even is such a thing as a primary, basic, emotion.
8. F The text addresses the universality of facial expressions of emotion and suggests that
anger, fear, disgust, sadness, and happiness are all expressed in the same way across
cultures. This does not mean that there are not even more emotional expressions in
common, as yet not confirmed.
Experiencing Psychology
This is a little exercise that demonstrates just how complex emotions can be particularly for
those who would like to organize or categorize basic human emotions.
JOY or HAPPINESS is commonly considered to be a basic emotion. There are a great many
words in our language that are somehow related to the basic concept of joy or happiness. Here is
a list of some of them:
Write each of these (and any others you can think of) on a sheet of paper. Read each of the
following statements to others and ask them to indicate which of these words best describes the
situation being described. For which item(s) on the list was there the most agreement? Did you
notice any sex differences in which terms were chosen?
1. Colleen didnt think that she would be accepted at the college she most wanted to attend, but
she just received notification that she had been accepted.
2. Toms uncle told him that he was sending him a check. Tom was expecting a check for about
$100. He has just opened the envelope from his uncle and found a check for $3000.
3. One of Juanitas professors has just read her paper to the class as an example of a thoughtful
and well-written paper.
4. An instructor who usually dresses very conservatively has just walked into class wearing an
oversized T-shirt with a picture of Mickey Mouse on the front.
5. A male student that Mary admires very much has just asked her if she will meet with him and
help him with his math assignment.
6. Sams mother had a brain tumor surgically removed two days ago. Sam has just received
word from his father that the tumor was not malignant.
7. Jans best friend has just told her that she and Jack, whom Jan admires and likes a lot, are
planning to get married at the end of the term.
8. Julio worked hard campaigning for Alice Hawkins for student body president. He has learned
that she has been elected with 71 percent of the votes.
9. It is Fathers Day. The picnic is over, and Ralph is thinking about what great kids he and
Evelyn have and how beautiful his six grandchildren are.
10. Gail went to visit her friend Margaret. When she arrived, seventeen of her friends were there
to give her a surprise birthday party.
11. The party that Judy had worked so hard to plan was a great success. The guests have all
gone home, and Judy is exhausted. She is thinking about the party as she settles herself into
bed.
12. Joes favorite team just won the Super Bowl.
Psychology on the Internet
http://allpsych.com/psychology101/motivation.html
(the AllPsych Online websites are not very dramatic, are a bit wordy, but nonetheless provide good
summaries of important issues this can be said for this site on approaches to motivation)
http://changingminds.org/explanations/theories/a_motivation.htm
(the list of approaches to motivation found in Chapter Ten is not an exhaustive one (although we
do believe that we have included the most important). Here you will find a description of some
that we have sampled and several that we have not. Before clicking to the various theories
presented here, click on the link to ChangingMinds.org homepage to get a sense of why some
theories from Chapter Ten are listed, and why some are not.)
http://www.purchon.com/biology/osmoregulation.htm
(a website on thirst and theres a lot of good information here. I suspect that some students may
be immediately attracted to the link, What happens if you drink too much beer?)
http://www.eufic.org/gb/food/pag/food12/food121.htm
(a few words and good advice from the European Food Information Center concerning the
necessity of maintaining levels of bodily fluids. It is short.)
http://www.i-sis.org.uk/ObesityEpidemic.php
(manyif not mostof the Internet websites with obesity in their URLs are commercial sites
trying to sell you something to either treat obesity or keep you from becoming obese. This non-
commercial website from the UK is a product of the Institute for Science in Society.)
http://www.obesity.org
(The American Obesity Association calls itself The Leading Organization for Advocacy and
Education on Obesity. Their homepage also claims that they think that theirs is the most
comprehensive site on obesity and overweight on the Internet. On this claim I am ready to
agree. Typical of good websites, the strength of this one is in the extensiveness of their links.)
http://www.cdc.gov/nccdphp/dnpa/obesity
(If the American Obesity Association (above) has not answered all of your questions, you can
turn here. It is from The Centers for Disease Control and Prevention. There are many links
here.)
http://www.niddk.nih.gov/index.htm
(the website of the National Institute of Diabetes and Digestive and Kidney Diseases of the
National Institutes of Health. It approaches obesity from a medical perspective their outline
looks like a copy of our issues in Chapter Ten.)
http://www.nationaleatingdisorders.org
http://www.edauk.com
(Both of these websites on eating disorders can be highly recommended.)
http://health.yahoo.com/health/centers/sexual_health/2390
(not terribly exciting, and focusing on problems with sexuality is this site, called the Sexual
Health Center)
Although your textbook divides the topic of emotion into five sections, from Defining and
Classifying Emotions to the Frustration-Aggression Hypothesis, the Internet has no such
organization. Hence, the following websites are presented more or less in order, and covering
the entire issue of emotionality.
http://plato.stanford.edu/entries/emotion
(the Stanford Encyclopedia of Philosophy includes this lengthy, relevant essay on the nature of
emotions. It is wordy, but it covers a lot of familiar ground. I suggest starting at the top and
working your way down through what is here. Toward the bottom is a link to Other Internet
Resources. Go there and then to Links on Emotion what comes up is nearly
overwhelming.)
http://emotion.nsma.arizona.edu/emotion.html
(the Emotion Home Page perhaps my best find so far. What a grand and glorious
repository if information about emotion research. You can easily spend hours exploring here,
overturning a new gem with nearly every click of your mouse.)
http://changingminds.org/explanations/emotions/emotions.htm
(Simple-appearing at first, this website has many very good links. It takes up issues such as
basic emotions, purpose of emotions, and the seven deadly sins and seven virtues all of
them emotions at that!)
http://www.paulekman.com
(this website is devoted to Paul Ekman and his research on the facial expression of emotions.
The homepage is simple and navigating it is easy. A good bit of what you will find here is
surprisingly commercial. You probably will find the link PUBLICATIONS most satisfying.)
Chapter Eleven
Taylor Series
A power series is thus a sequence of special polynomials: each term is obtained from
the previous one by adding a constant multiple of the next higher power of (x a).
Clearly the question of convergence will depend on x , as will the limit where there is one.
The k th term of the series is ck (x a)k so the Ratio Test calculation looks like
c k +1 (x a)k +1 c
r(x) = lim = x a lim k +1 .
k ck (x a) k k c
k
Recall that our series converges for r(x) < 1 and diverges for r(x) > 1 . Thus this
ck +1
series converges absolutely for all values of x if the number lim = 0 . Otherwise, we
k ck
ck
have absolute convergence for | x a | < lim and divergence for
k c
k +1
ck ck
| x a | > lim . The number R = lim is called the radius of convergence,
k c k ck +1
k +1
and the interval | x a |< R is called the interval of convergence. There are thus exactly
n
three possibilities for the convergence of our power series ck (x a) k :
k= 0
11.1
(ii)The series converges for all values of x ; or
(iii)There is a positive number R so that the series converges for | x a |< R and
diverges for | x a | > R .
Note that the Ratio Test tells us nothing about the convergence or divergence of the
series at the two points where | x a |= R .
Example
n c k! 1
Consider the series k!x k . Then R = lim k = lim = lim = 0.
k=0 k c
k +1
k (k +1)! k k +1
Another Example
n c 3k 1 1
Now look at the series 3k (x 1)k . Here R = lim k = lim k +1 = lim = .
k=0 k c
k +1
k 3 k 3 3
1 1
Thus, this one converges for | x 1|< and diverges for | x 1|> .
3 3
Exercises
Find the interval of convergence for each of the following power series:
n
1. (x + 5)k
k=0
n 1
2. (x 1)k
k=0 k
11.2
n k
3. (x 4)k
k = 0 3k + 1
n 3k
4. (x +1) k
k = 0 k!
n k!
5. (x 9) k
k = 0 7(k +1)
2
It is known that this function has a derivative, and this derivative is the limit of the
derivative of the series. Moreover, the differentiated series has the same interval of
convergence as that of the series defining f . Thus for all x in the interval of convergence,
we have
f '( x) = kc (x a)
k
k 1
.
k=1
We can now apply this result to the power series for the derivative and conclude that
f has all derivatives, and they are given by
f (p ) (x) = k(k 1)K(k p + 1)c (x a) k
k p
.
k= p
Example
11.3
1
We know that = x k for | x |< 1 . It follows that
1 x k=0
1
(1 x) 2
= kx k 1 = 1+ 2x + 3x 2 + 4x3 +K
k =1
for | x |< 1 .
It is, miraculously enough, also true that the limit of a power series can be integrated,
and the integral of the limit is the limit of the integral. Once again, the interval of
convergence of the integrated series remains the same as that of the original series:
x
ck
f (t)dt = k +1(x a)
k +1
.
a k=0
Example
We may simply integrate the Geometric series to get
xk +1
log(1 x) = , for 1 < x < 1, or 0 < 1 x < 2.
k=0 k + 1
It is also valid to perform all the usual arithmetic operations on power series. Thus if
f (x) = c x k
k
and g(x) = d x k
k
for | x |< r , then
k=0 k=0
f (x) g(x) = (c k dk )x k , for | x |< r .
k =0
Also,
k
f (x)g(x) = ci dk i c kx k , for | x |< r .
k= 0 i= 0
The essence of the story is that power series behave as if they were infinite degree
polynomialsthe limits of power series are just about the nicest functions in the world.
11.4
Exercises
n
6. What is the limit of the series x 2k ? What is its interval of convergence?
k=0
n
7. What is the limit of the series 2(1) k kx 2k 1 ? What is its interval of convergence?
k =1
9. Suppose f (x) = c (x a)
k
k
. What is f (p ) (a) ?
k=0
11.5
Example
n x 2k + 1
The Taylor series for f (x) = sin x at x = a is simply (1)k . An easy
k=0 (2k +1)!
calculation shows us that the radius of convergence is infinite, or in other words, this
power series converges for all x . But is the limit sin x ? Thats easy to decide. From
Section 9.3, we know that
n
x 2 k+ 1 | x |2 n+ 3
sin x (1)k ,
k =0 (2k +1)! (2n + 3)!
Exercises
10. Find the Taylor Series at a = 0 for f (x) = ex . Find the interval of convergence and
11. Find the Taylor Series at a = 0 for f (x) = cos x . Find the interval of convergence and
12. Find the derivative of the cosine function by differentiating the Taylor Series you
found in Problem #11.
13. Find the Taylor Series at a = 1 for f (x) = logx . Find the interval of convergence and
11.6
14. Let the function f be defined by
0, for x = 0
f (x) = 1/ x 2 .
e , for x 0
Find the Taylor Series at a = 0 for f. Find the interval of convergence and the limit of
the series.
11.7
odels of
M
12 Assessment
Janine Bolger and Patrick Walker
Key Themes
Assessment is a core activity of social work practices, which should be a process
capable of responding to dynamic factors in the lives of service users.
Assessment is underpinned by a series of principles that serve to guide and
direct practice.
The legal and policy context of assessment is essential to understand as this
sets a mandate for appropriate social work practice.
Models and frameworks for assessment provide guides for practitioners and are
underpinned by the skills and knowledge to inform the what, how and why of
assessment.
Assessment is founded on partnership with service users, but may be undertaken
in both voluntary and involuntary contexts.
INTRODUCTION
The concept of assessment is generally associated with notions of appraisal, making
judgements, forming opinions or calculating the value of something. Whilst these
provide a helpful starting point, they require much further examination when applied
to a social work context, where assessment is a discrete, core activity and a key skill.
This chapter will introduce you to elements of social work assessment, incorporating
principles, context, models, frameworks, skills and practice issues. It will draw reference
from across the range of service user groups and invites you to reflect on and critically
explore the material.
To begin to understand the meaning of assessment in social work, consider your
understanding of assessment in your day-to-day life. Everyone makes numerous
assessments every day in order to navigate their way through the daily interactions
and situations that they face. In making these day-to-day assessments you will use a
wide variety of perspectives that give meaning to the information that is presented,
or help sift the information that is presented or found. Perhaps personal experience
helps you, or perhaps your own cultural beliefs offer a way of interpreting situations or
environments. Some of these factors will have relevance to assessment in social work
and highlight the importance of being self-aware.
For our purposes we would propose to define assessment in social work as a structured
activity with the characteristics shown in Figure 12.1.
PRINCIPLES OF ASSESSMENT
The purpose of this section is to offer some principles, or core common features, of
assessment. The discussion here cannot be prescriptive, but rather is indicative, for
reasons that will become apparent. Assessments are frequently context-specific and
consequently are shaped by the inclusion of particular elements and influenced by the
manner in which the assessment is undertaken.
Case Study
Consider the following three different types of assessment that may take place
under the auspices of services for children and young people:
As a consequence, we need to be very clear about our role, remit and the context of any
assessment.
Guiding principles help clarify and direct practice in all areas of assessment. They
may be drawn from ethical frameworks, theoretical perspectives, legal obligations and
practice guidance and are important because, although various frameworks can be
Purposeful
and appropriate
Leads to
Dynamic and
planning and
responsive
future action
Involves
judgement to Based on
support engagement
decision-making and inclusion
Assessment
used in assessment, it should be remembered that, as Statham and Kearney point out,
social work can never be a purely technical activity based simply on assessment formats,
models or methods (2007: 102, emphasis added). This suggests that some underpinning
and orientating principles are required when beginning and undertaking the assessment
process. Five key principles are presented here.
and points the reader towards Bradshaws (1972) taxonomy of need, summarized as:
Normative need, which is identified according to a norm (or set standard); such
norms are generally set by experts. Benefit levels, for example, or standards of unfit-
ness in houses, have to be determined according to some criterion.
Comparative need concerns problems that emerge by comparison with others who
are not in need. One of the most common uses of this approach has been the com-
parison of social problems in different areas in order to determine which areas are
most deprived.
Felt need, which is based on the perspective of the people who have it.
Expressed need, which is need people say they have. People can feel need that they
do not express and they can express needs they do not feel.
Need, as a principle, can determine what the social worker may require to explore in
assessment. If children need, for example, a secure relationship with their parent or
caregiver, to grow and develop, then the absence of it becomes a risk to them. Similarly,
if an adult with mental health problems needs support and counselling to manage
auditory hallucinations, then an absence of such support may significantly impact on
the persons health and well-being. By understanding need and drawing on broader
knowledge and theory, the practitioner is able to consider the persons situation and to
explore approaches to relieving the unmet need.
Exercise
The word need is used commonly by everyone, so the expression needs-led
should be fairly straightforward. However, think about when you and others use the
word and substitute the word want in place of need. How often is want a more
appropriate term, and how often is need the correct description of the situation?
Bronfenbrenner later added a fifth level, the chrono-system, this being the dimension of
time relating to an individuals life events and environment for example the influence
of time in relation to reactions to the death of a parent, relocation, a relationship
breakdown and so on.
See the article by Hill (2002) on the Companion Website (www.sagepub.co.uk/
SocialWork) which reviews the social network approach to social work assessment.
and capacity for change (Daniel et al., 2010). An assessment that explores strengths
can reveal an individuals or familys ability to resolve their difficulties using their own
skills and expertise without becoming disempowered through service involvement. The
very process of assessment can help individuals or families to identify and utilise latent
strengths and thus reduce dependency on professionals.
This principle is relevant when working with all service users and in all domains of social
work, whether the practice base is termed Children and Families, Learning Disability
Services, Social Work with Older People and so on. Assessments that purely focus on
deficits are not only likely to be demoralising and incomplete, but also run the risk of
being oppressive, result in inappropriate labelling and potentially limit an individuals (and
their networks) abilities to resolve their difficulties themselves. Compensatory strengths
need to be explored, identified and added in to the equation whenever they are present.
Exercise
Consider your own situation now. What are the positives and negatives in your own
situation? How do you interact with your family and how does your family interact
with neighbours, friends, work and the wider community? How much of this is relevant
to your current situation?
an effective interpersonal process that facilitates the achievement of goals that can-
not be reached when independent professions act on their own
The Procedural model, often associated with guidance related to legislation, involves
using systems that are devised to ensure consistency and thoroughness in data col-
lection. Consequently, eligibility for and allocation of services is often decided upon
as a result of the collection of such data. This can provide only a snapshot assessment,
directing the assessment away from examining the individuals strengths and abili-
ties, and can divert from individual rights or concerns over quality of life (Milner and
OByrne, 2009). The concern is that such systems can replace rather than support or
inform judgements made by professionals (Barry, 2007 cited in Milner and OByrne,
2009), and may be viewed as rigid, time-consuming (lots of forms) and one-way,
in that it meets the needs of the worker and agency rather than that of the service-
user. The difficulty arises when information is collected on an individual by different
professionals with a different focus (i.e., health, housing etc.) but stored separately.
This results in an inadequate understanding of the total experience of any individual
by any one professional. Workers can become caught up in the process of gathering
information rather than in trying to understand what the service user needs. On a
more positive note, this systematic manner of collecting large amounts of data has
also contributed to the evidence base for social work practice.
The Questioning model of assessment focuses on the nature of the questions and how
the information is used. Using this approach problems and solutions reside with the
individual and the social workers task is to identify the problem and highlight the
most appropriate approach to resolve the issue. A criticism of this model is that it
can be seen as oppressive given that the social worker takes on the role of expert and
makes the final decision. However, if questions are asked in order to try to under-
stand what is impacting on the current situation, and if a range of perspectives are
sought, then this does not have to be the case.
When adopting the Exchange model the service user becomes the expert with regard
to their own needs and through their involvement in their own assessment becomes
empowered. It acknowledges that the workers expertise lies in their problem-solving
abilities. The aim, through development of trust, is to seek a compromise between
choices and needs through involvement of all parties. The worker takes on responsi-
bility for managing the process of assessment. The focus is on a holistic assessment
of the context in relation to the individual over time (Coulshed and Orme, 2012).
Specific frameworks have been outlined in the Case Study to demonstrate how models of
assessment can support particular frameworks or approaches to information gathering.
Case Study
1. The Common Assessment Framework (CAF) in England and Wales, the
UNOCINI Assessment Framework in Northern Ireland and the GIRFEC(GettingitRight
forEveryChild) approach in Scotland focus on how practitioners across all services
for children and adults can work together to ensure that children and young people
have their needs met with reference to a range of outcomes and indicators that
can be applied in any setting and circumstance. The approach is underpinned by
a set of common values and principles. The success of such approaches depends
on a standardised assessment and the application of shared tools and models. All
approaches require a lead professional.
The five outcomes of CAF concern being healthy, staying safe, enjoying and
achieving, making a positive contribution and achieving economic well-being
(Childrens Workforce Development Council, 2009). It consists of a pre-assessment
checklist to decide who would benefit from an assessment (focusing on the
development of the child/young person, parents and carers, and family and
environment); a standard recording format; and a process to enable practitioners in
the children and young peoples workforce to undertake a common assessment and
to move forward on the result through the development of an action plan.
In sharing information with other professionals, recording information on a single
system, identifying needs and services, establishing a plan and reviewing both the
plan and provision, it would appear that a Procedural model is being employed.
2. The SingleSharedAssessment(SSA) in Scotland, the SingleAssessmentProcess
(SAP) for older people in England, the Unified Assessment in Wales and the
Northern Ireland Single Assessment Tool (NISAT) combine elements of both
Procedural and Questioning models. SSA is the streamlining of the assessment
process to enable the needs and outcomes for the individual to be identified and
subsequent interventions and services put in place (Scottish Government, 2009b: 1).
(Continued)
(Continued)
The sharing of information across agencies is crucial and so the process encourages
joint working.
In a SSA a lead professional coordinates the gathering of information for the
assessment and ensures that a plan is made and reviewed and that the identified
services are delivered. Care Management is the name for this process, and it is
focused on the needs of individuals with complex or changing needs. Three different
types of assessment (Simple, Comprehensive or Specialist) can be carried out,
depending on the needs of the service user, and assessment is undertaken by
different professionals depending on their levels of training and expertise. The legal
context for Care Management is provided through the National Health Service and
Community Care Act 1990 and in Scotland is augmented by the Regulation of Care
(Scotland) Act 2001 and the Community Care and Health (Scotland) Act 2002. The
process of a SSA involves service users and carers and is intended to be person-
centred. However, for older people information is also gathered through an Indicator
of Relative Need questionnaire which consists of 12 multiple choice questions under
section headings: activities of daily living; personal care; food/drink preparation;
mental well-being and behaviour; and bowel management. The answers to each
question are scored and the totals for each section are calculated. The scores are
intended for planning purposes and not to determine eligibility for services.
3. Motivational interviewing (see Chapter 23), used in substance misuse counselling,
is both client-centred and semi-directive. The approach attempts to increase the
service users awareness of the consequences of their behaviour and to encourage
reflection on the benefits that might be achieved through change. The approach is
non-judgemental, non-adversarial and non-confrontational. The eight key interviewing
techniques: asking leading questions; reflecting resistance; acknowledging the
advantages of behaviours; raising awareness of discrepancy between the present
and the desired situation; elaborating on self-motivational statements; offering non-
dogmatic information; voicing the service users doubts and summarising selectively
(Miller and Rollnick, 1991) fit well with the Exchange model of assessment.
Having chosen a specific model and framework for assessment the social worker must
also consider the knowledge that underpins assessment. The range of knowledge used
to support the assessment should include an awareness of developmental theories,
social systems theories, policies, organisational knowledge and knowledge of research.
The point is to bring together information and resources in order to personalise the
provision (Statham and Kearney, 2007).
support the service user to draw on their own resources to examine alternative ways to
improve their situation and to build their confidence. As previously outlined, assessments
focusing on deficits may serve only to disempower the service user and reinforce
inequalities between them and the social worker. The social workers role is to develop
the service users capability to assist themselves. This is known as empowerment.
A good assessment relationship involves the social worker in:
examining the personal and environmental strengths of the service user and carrying
out a multidimensional assessment of such strengths
utilising meaningful and appropriate language
negotiating mutual agreement over the assessment
apportioning no blame. (Cowager, 1994)
Any attempt to form a genuine partnership will involve good skills of listening and
interviewing and will focus on the individual rather than the procedure.
are made by the service user without the facilitation of a social worker (this is the highest
level of involvement). Decisions might be service user life decisions, decisions to protect
others, or decisions about resources or service delivery. Unless an individuals capacity is
in question or there is a concern that the safety of others might be compromised, service
users should have control over decisions about their own lives. The reason to choose a
lower rather than a higher level of involvement must be justified and limits should be
placed on the type of involvement only if there are grounds to do so (OSullivan, 2011).
Exercise
Read Chapter 15 and try to identify situations where service user involvement might
be problematic.
There is an expectation that violence will be rewarded, i.e. by influencing the decision
or withdrawal of the worker.
There is a belief that no other action is possible, e.g. where there is evidence that
violence has been used frequently as a coping mechanism. (Breakwell, 1989)
In conclusion, resistance may be seen as a way in which service users attempt to regain
some of their perceived loss of power and control by refusing to recognise risks to self or
others, not accepting the need for change, or being unwilling to accept options presented
to them. The concept of principled negotiation might assist in finding a way forward.
By focusing on the interests rather than the attitudes of those involved, separating the
people from the problem and trying to find options for mutual interest before agreeing
criteria for evaluating the result of the negotiations, a resolution to any stalemate might
be found. However, legal and policy requirements might mean that negotiation is not
an option (e.g. because of protection issues) or that due to their personal values and
principles an individual might be unwilling to negotiate on certain matters (e.g. around
the use of alcohol). In planning a response discussions should take place with colleagues
and relevant agencies, involving the service user wherever possible. Any response should
recognise that safe practice is beneficial for both the worker and the service user.
Critical Thinking
In assessment work, collaborative approaches building on service users expertise are
vital. The current practice agenda, especially personalisation and self-directed support,
emphasises the role of self-assessment. Gardner (2011: 43) notes that there has been much
professional resistance to the concept and she highlights that we mistakenly assume that
self-assessment involves only the service user. In self-assessment, however, service users
are major participants because, quite simply, they know themselves best. The social worker
participates too, supporting, offering information and assistance. Gardners interpretation
of self-assessment is interesting and provides a useful point for you to consider.
During, or after your most recent period of practice learning, critically appraise your
practice in respect of a collaborative assessment.
To read about the findings of pilot projects focusing on self-assessment in adult social
work settings, visit the Companion Website (www.sagepub.co.uk/SocialWork) and see
the article by Abendstern et al. (2013).
CONCLUSION
This chapter has offered particular frameworks, methodologies and supporting
theoretical concepts which are integral in good social work assessment. The following
central themes should be borne in mind when undertaking assessment in work with
service users:
Reflective Questions
1 Considering the concepts of need and Bronfenbrenners Ecological Systems
Theory identify what a person requires from their immediate caregivers or family
in order to develop or progress. Go on to consider how a persons development
or progress may be influenced by the wider world and what difference being
part of a supportive community environment can make.
2 What questions might you ask during the assessment process in order to
explore strengths? Consider how the questions you ask interface with the
model of assessment being used.
3 As part of preparing for one of your social work placements or practice oppor-
tunities spend time researching the legal and policy context of the field you
will be working in. During placement, reflect on how legislation and policy
shape the work that your placement agency undertakes. Does working in dif-
ferent settings impact on the extent to which social work practice is statutorily
driven?
RECOMMENDED READING
Milner, J. and OByrne, P. (2009) Assessment in Social Work. Basingstoke: Palgrave
MacMillan.
Parker, J. and Bradley, G. (2010) Social Work Practice: Assessment, Planning, Intervention
and Review (Transforming Social Work Practice), 3rd edn. Exeter: Learning Matters.
Walker, S. and Beckett, C. (2010) Social Work Assessment and Intervention. Lyme Regis:
Russell House Publications.
Socket Programming
This chapter presents key concepts of intercommunication between programs running on dierent computers
in the network. It introduces elements of network programming and concepts involved in creating network
applications using sockets. The chapter introduces the java.net package containing various classes re-
quired for creating sockets and message communication using two dierent protocols. It provides several
example programs demonstrating various capabilities supported by Java for creating network applications.
O Aer learning the contents of this chapter, the reader will be able to:
B Chapter
understand fundamental concepts of computer communication
J understand sockets and ports
E understand java.net package features
program Java Sockets
C
T
I
create comprehensive network applications using sockets
13
V
E
S
13.1 INTRODUCTION
Internet and WWW have emerged as global ubiquitous media for communication and changed the way
we conduct science, engineering, and commerce. They are also changing the way we learn, live, enjoy,
communicate, interact, engage, etc. The modern life activities are getting completely centered around or
driven by the Internet.
To take advantage of opportunities presented by the Internet, businesses are continuously seeking new
and innovative ways and means for offering their services via the Internet. This created a huge demand
for software designers and engineers with skills in creating new Internet-enabled applications or porting
existing/legacy applications to the Internet platform. The key elements for developing Internet-enabled
applications are a good understanding of the issues involved in implementing distributed applications and
sound knowledge of the fundamental network programming models.
Socket Programming 347
Fig. 13.4 Establishment of path for two-way communication between a client and server
The Interfaces
ContentHandlerFactory
FileNameMap
SocketImplFactory
URLStreamHandlerFactory
350 Object-Oriented Programming with Java
Exceptions
BindException
ConnectException
MalformedURLException
NoRouteToHostException
ProtocolException
SocketException
UnknownHostException
UnknownServiceException
A simple Server Program in Java The steps for creating a simple server program are:
1. Open the Server Socket:
ServerSocket server = new ServerSocket( PORT );
2. Wait for the Client Request:
Socket client = server.accept();
Socket Programming 351
Program 13.1
// SimpleServer.java: A simple server program.
import java.net.*;
import java.io.*;
public class SimpleServer {
public static void main(String args[]) throws IOException {
// Register service on port 1254
ServerSocket s = new ServerSocket(1254);
Socket s1=s.accept(); // Wait and accept a connection
// Get a communication stream associated with the socket
OutputStream s1out = s1.getOutputStream();
DataOutputStream dos = new DataOutputStream (s1out);
// Send a string!
dos.writeUTF(Hi there);
// Close the connection, but not the server socket
dos.close();
s1out.close();
s1.close();
}
}
A simple Client Program in Java The steps for creating a simple client program are:
1. Create a Socket Object:
Socket client = new Socket(server, port_id);
2. Create I/O streams for communicating with the server.
is = new DataInputStream(client.getInputStream());
os = new DataOutputStream(client.getOutputStream());
3. Perform I/O or communication with the server:
Receive data from the server: String line = is.readLine();
Send data to the server: os.writeBytes(Hello\n);
4. Close the socket when done:
client.close();
An example program illustrating establishment of connection to a server and then reading a message
sent by the server and displaying it on the console is given below:
352 Object-Oriented Programming with Java
Program 13.2
// SimpleClient.java: A simple client program.
import java.net.*;
import java.io.*;
public class SimpleClient {
public static void main(String args[]) throws IOException {
// Open your connection to a server, at port 1254
Socket s1 = new Socket(localhost,1254);
// Get an input file handle from the socket and read the input
InputStream s1In = s1.getInputStream();
DataInputStream dis = new DataInputStream(s1In);
String st = new String (dis.readUTF());
System.out.println(st);
// When done, just close the connection and exit
dis.close();
s1In.close();
s1.close();
}
}
Running Socket Programs Compile both server and client programs and then deploy server program
code on a machine which is going to act as a server and client program, which is going to act as a client.
If required, both client and server programs can run on the same machine. To illustrate execution of server
and client programs, let us assume that a machine called mundroo.csse.unimelb.edu.au on which we
want to run a server program as indicated below:
[raj@mundroo] java SimpleServer
The client program can run on any computer in the network (LAN, WAN, or Internet) as long as there
is no rewall between them that blocks communication. Let us say we want to run our client program on a
machine called gridbus.csse.unimelb.edu.au as follows:
[raj@gridbus] java SimpleClient
The client program is just establishing a connection with the server and then waits for a message. On
receiving a response message, it prints the same to the console. The output in this case is:
Hi there
which is sent by the server program in response to a client connection request.
It should be noted that once the server program execution is started, it is not possible for any other server
program to run on the same port until the rst program which is successful using it is terminated. Port
numbers are a mutually exclusive resource. They cannot be shared among different processes at the same
time.
do not come without performance costs, it would be better to use a lighter transport protocol. This kind of
service is accomplished by the UDP protocol which conveys datagram packets.
Datagram packets are used to implement a connectionless packet delivery service supported by the UDP
protocol. Each message is transferred from source machine to destination based on information contained
within that packet. That means, each packet needs to have destination address and each packet might be
routed differently, and might arrive in any order. Packet delivery is not guaranteed.
The format of datagram packet is:
Program 13.3
// UDPServer.java: A simple UDP server program.
import java.net.*;
import java.io.*;
public class UDPServer {
354 Object-Oriented Programming with Java
Program 13.4
// UDPClient.java: A simple UDP client program.
import java.net.*;
import java.io.*;
public class UDPClient {
}
try {
aSocket = new DatagramSocket();
byte [] m = args[0].getBytes();
InetAddress aHost = InetAddress.getByName(args[1]);
int serverPort = Integer.valueOf(args[2]).intValue();
DatagramPacket request =
new DatagramPacket(m, args[0].length(), aHost, serverPort);
aSocket.send(request);
byte[] buffer = new byte[1000];
DatagramPacket reply = new DatagramPacket(buffer, buffer.length);
aSocket.receive(reply);
System.out.println(Reply: + new String(reply.getData()));
}
catch (SocketException e) {
System.out.println(Socket: + e.getMessage());
}
catch (IOException e) {
System.out.println(IO: + e.getMessage());
}
finally {
if (aSocket != null)
aSocket.close();
}
}
}
Program 13.5
// MathService.java: A basic math interface.
public interface MathService {
public double add(double firstValue, double secondValue);
public double sub(double firstValue, double secondValue);
public double div(double firstValue, double secondValue);
public double mul(double firstValue, double secondValue);
}
The implementation of this interface is not related to any network operation. The following code shows
a very simple implementation of this interface:
Program 13.6
// PlainMathService.java: An implementation of the MathService interface.
public class PlainMathService implements MathService {
The implementation of the MathServer is quite straightforward, which looks pretty similar to the echo
server mentioned previously. The difference is that the MathServer have to consider the specic protocol
dened by the math server and client communication. The program uses a very simple protocol operator:
rst_value:second_value. It is the math servers responsibility to understand this protocol and delegate to
the proper methods such as add, sub, mul, or div.
Program 13.7
// MathServer.java : An implementation of the MathServer.
import java.io.*;
import java.net.*;
A test client program that can access the math server is shown below:
Program 13.8
// MathClient.java: A test client program to access MathServer.
import java.io.*;
import java.net.Socket;
public class MathClient {
public static void main(String [] args){
String hostname = localhost;
int port = 10000;
if (args.length != 2) {
System.out.println(Use the default setting...);
}
else {
Socket Programming 359
hostname = args[0];
port = Integer.parseInt(args[1]);
}
try {
// create a socket
Socket socket = new Socket(hostname, port);
// perform a simple math operation 12+21
BufferedWriter writer = new BufferedWriter(
new OutputStreamWriter(socket.getOutputStream()));
writer.write(+:12:21);
writer.newLine();
writer.flush();
// get the result from the server
BufferedReader reader = new BufferedReader(
new InputStreamReader(socket.getInputStream()));
System.out.println(reader.readLine());
reader.close();
writer.close();
}
catch (Exception e) {
e.printStackTrace();
}
}
}
Program 13.9
// QueryStringFormatter.java: encodes a string with non-ASCII characters.
import java.io.UnsupportedEncodingException;
import java.net.URLEncoder;
Program 13.10
// TextBasedSearchEngine.java:
import java.io.*;
import java.net.*;
13.7
Developing network applications is made possible in Java by using sockets, threads, RMI,
clustering, and Web services. These technologies allow for the creation of portable, ecient, and
maintainable large and complex Internet applications. The java.net package provides a powerful
and exible set of classes for implementing network applications.
Typically, programs running on client machines make requests to programs on a server
machine. These involve networking services provided by the transport layer. The most widely
used transport protocols on the Internet are TCP (Transmission control Protocol) and UDP
(User Datagram Protocol). TCP is a connection-oriented protocol providing a reliable ow of data
between two computers. It is used by applications such as the World Wide Web, e-mail, p, and
secure shell. On the other hand, UDP is a simpler message-based connectionless protocol which
sends packets of data known as datagrams from one computer to another with no guarantees of
arrival. Network applications using UDP include Domain Name Systems (DNS), streaming
media applications as IPTV, VoIP, and online games. Both protocols use ports for application-
to-application communication. A port is a logical access point represented by a positive 16-bit
integer value. Each service oered by a computer is uniquely identied by a port number. Each
Internet packet contains both destination IP address and the port to which the request is to be
delivered. Some ports are reserved for common services such as p, telnet, smtp, hp, hps, and
login. Port numbers >=1024 are generally used for user-level services.
Sockets provide an interface for programming networks at the transport layer. Using sockets,
network communication is very much similar to performing le I/O. A socket is an endpoint
of a two-way communication link between two programs running on the network. The source
and destination IP address, and the port numbers constitute a network socket. Two key classes
from java.net package used in creation of server and client programs are ServerSocket,
which represents a server socket, and Socket, an instantiation of which performs the
actual communication with the client. Datagram communication is also supported through
DatagramPacket and DatagramSocket classes. Writing and reading data between server and
the client is also supported through the URLconnection class.
13.8 EXERCISES
Objective Questions
13.1 ______ is a connection-oriented and reliable protocol, ______ is a less reliable protocol.
13.2 The TCP and UDP protocols use ______ to map incoming data to a particular process running on a
computer.
13.3 Datagrams are normally sent by ______ protocol.
13.4 Java uses ______ class representing a server and ______ class representing the client that uses TCP
protocol.
13.5 ______ is used to wait for accepting client connection requests.
13.6 Class ______ is used to create a packet of data for UDP protocol.
13.7 If something goes wrong related to the network, ______ will be thrown when dealing with TCP/
UDP programming in Java.
13.8 The main purpose of URL encoding is to maintain the ______ between various platforms.
13.9 Based on the URL encoding mechanism, www.test.com/test me&test you becomes ______.
Socket Programming 363
Review Questions
Programming Problems
13.27 Write a simple program that can read a host name and convert it to an IP address.
13.28 Write a URL-based program that pulls content from www.buyya.com.
13.29 Write a ping-pong client and server application. When a client sends a ping message to the server,
the server will respond with a pong message. Other messages sent by the client can be safely
dropped by the server.
13.30 Rewrite the math server application, instead of using the TCP socket, use the UDP datagram
socket.
13.31 Write an online dictionary application, users are able to search online dictionary and get the
meaning of the words. The online dictionary should maintain its indexing in order to enhance the
performance and scalability.
13.32 Write a simple crawler program that can parse certain HTML information and nd out the
hyperlinks within the HTML. (Use the URLConnection class to implement this application).
13.33 Write a Socket-based Java server program that responds to client messages as follows: When it
receives a message from a client, it simply converts the message into all uppercase letters and sends
back the same to the client. Write both client and server programs demonstrating this.
Chapter 14 Work Programme Provider Guidance
Produce a product which sets out your minimum service standards, and the first
step in your complaints process. Jobcentre Plus will give this to participants at
their referral interview to the Work Programme.
How To
1. The Government is clear that you, as a provider, are best placed to know
what works for participants. As such, we are not specifying what support
you should deliver. However, participants should know what they can
expect from you before they take part in your provision.
2. How you communicate and market your services is your decision, but we
do require that you provide a summary of the minimum service standards
that you will offer to all participants joining the Work Programme.
3. You are responsible for providing your local Jobcentre Plus contact(s) with
a product which sets out your minimum service standards for all
participants. The document should also clearly explain that you have a
complaints process, and the first step a participant should take if they are
not content with the service they are receiving while they are with you.
5. The minimum standards reflect what was in your successful bid; and must
be presented in a form that is accessible and easy for participants to
understand.
1 V2.00
From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World.
By David Easley and Jon Kleinberg. Cambridge University Press, 2010.
Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/
Chapter 15
437
438 CHAPTER 15. SPONSORED SEARCH MARKETS
Figure 15.1: Search engines display paid advertisements (shown on the right-hand side of
the page in this example) that match the query issued by a user. These appear alongside
the results determined by the search engines own ranking method (shown on the left-hand
side). An auction procedure determines the selection and ordering of the ads.
present its a business that generates tens of billions of dollars per year in revenue, and it is
responsible, for example, for nearly all of Googles revenue. From our perspective, its also
a very nice blend of ideas that have come up earlier in this book: it creates markets out of
the information-seeking behavior of hundreds of millions of people traversing the Web; and
we will see shortly that it has surprisingly deep connections to the kinds of auctions and
matching markets that we discussed in Chapters 9 and 10.
Keyword-based ads show up on search engine results pages alongside the unpaid (or-
ganic or algorithmic) results. Figure 15.1 shows an example of how this currently looks
on Google for the query Keuka Lake, one of the Finger Lakes in upstate New York. The
algorithmic results generated by the search engines internal ranking procedure are on the
left, while the paid results (in this case for real estate and vacation rentals) are ordered on
the right. There can be multiple paid results for a single query term; this simply means that
the search engine has sold an ad on the query to multiple advertisers. Among the multiple
slots for displaying ads on a single page, the slots higher up on the page are more expensive,
since users click on these at a higher rate.
The search industry has developed certain conventions in the way it sells keyword-based
15.1. ADVERTISING TIED TO SEARCH BEHAVIOR 439
ads, and for thinking about this market its worth highlighting two of these at the outset.
Paying per click. First, ads such as those shown in Figure 15.1 are based on a cost-per-
click (CPC) model. This means that if you create an ad that will be shown every time a
user enters the query Keuka Lake, it will contain a link to your companys Web site
and you only pay when a user actually clicks on the ad. Clicking on an ad represents an
even stronger indication of intent than simply issuing a query; it corresponds to a user who
issued the query, read your ad, and is now visiting your site. As a result, the amount that
advertisers are willing to pay per click is often surprisingly high. For example, to occupy
the most prominent spot for calligraphy pens costs about $1.70 per click on Google as of
this writing; occupying the top spot for Keuka Lake costs about $1.50 per click. (For the
misspelling calligaphy pens, the cost is still about $0.60 per click after all, advertisers
are still interested in potential customers even if their query contains a small but frequent
typo.)
For some queries, the cost per click can be positively stratospheric. Queries like loan
consolidation, mortgage refinancing, and mesothelioma often reach $50 per click or
more. One can take this as an advertisers estimate that it stands to gain an expected value
of $50 for every user who clicks through such an ad to its site.1
Setting prices through an auction. There is still the question of how a search engine
should set the prices per click for different queries. One possibility is simply to post prices, the
way that products in a store are sold. But with so many possible keywords and combinations
of keywords, each appealing to a relatively small number of potential advertisers, it would
essentially be hopeless for the search engine to maintain reasonable prices for each query in
the face of changing demand from advertisers.
Instead, search engines determine prices using an auction procedure, in which they solicit
bids from the advertisers. If there were a single slot in which an ad could be displayed, then
this would be just a single-item auction such as we saw in Chapter 9, and there we saw
that the sealed-bid second-price auction had many appealing features. The problem is more
complicated in the present case, however, since there are multiple slots for displaying ads,
and some are more valuable than others.
We will consider how to design an auction for this setting in several stages.
(1) First, if the search engine knew all the advertisers valuations for clicks, the situation
could be represented directly as a matching market in the style that we discussed in
1
Naturally, you may be wondering at this point what mesothelioma is. As a quick check on Google reveals,
its a rare form of lung cancer that is believed to be caused by exposure to asbestos in the workplace. So if
you know enough to be querying this term, you may well have been diagnosed with mesothelioma, and are
considering suing your employer. Most of the top ads for this query link to law firms.
440 CHAPTER 15. SPONSORED SEARCH MARKETS
Chapter 10 essentially, the slots are the items being sold, and theyre being matched
with the advertisers as buyers.
(2) If we assume that the advertisers valuations are not known, however, then we need
to think about ways of encouraging truthful bidding, or to deal with the consequences
of untruthful bidding. This leads us directly to an interesting general question that
long predates the specific problem of keyword-based advertising: how do you design a
price-setting procedure for matching markets in which truthful bidding is a dominant
strategy for the buyers? We will resolve this question using an elegant procedure called
the Vickrey-Clarke-Groves (VCG) mechanism [112, 199, 400], which can be viewed as
a far-reaching generalization of the second-price rule for single-item auctions that we
discussed in Chapter 9.
(3) The VCG mechanism provides a natural way to set prices in matching markets, in-
cluding those arising from keyword-based advertising. For various reasons, however,
it is not the procedure that the search industry adopted. As a result, our third topic
will be an exploration of the auction procedure that is used to sell search advertising
in practice, the Generalized Second-Price Auction (GSP). We will see that although
GSP has a simple description, the bidding behavior it leads to is very complex, with
untruthful bidding and socially non-optimal outcomes. Trying to understand bidder
behavior under this auction turns out to be an interesting case study in the intricacies
of a complex auction procedure as it is implemented in a real application.
5 b y 2
2 c z 1
Figure 15.2: In the basic set-up of a search engines market for advertising, there are a certain
number of advertising slots to be sold to a population of potential advertisers. Each slot has
a clickthrough rate: the number of clicks per hour it will receive, with higher slots generally
getting higher clickthrough rates. Each advertisers has a revenue per click, the amount of
money it expects to receive, on average, each time a user clicks on one of its ads and arrives
at its site. We draw the advertisers in descending order of their revenue per click; for now,
this is purely a pictorial convention, but in Section 15.2 we will show that the market in fact
generally allocates slots to the advertisers in this order.
sue: a relevant, high-quality ad in a high slot will receive more clicks than an off-topic ad,
and in fact we will describe how to extend the basic models to deal with ad relevance and ad
quality at the end of the chapter. The third assumption interaction among the different
ads being shown is a more complex issue, and it is still not well understood even within
the search industry.
This is the full picture from the search engines side: the slots are the inventory that it is
trying to sell. Now, from the advertisers side, we assume that each advertiser has a revenue
per click: the expected amount of revenue it receives per user who clicks on the ad. Here too
we will assume that this value is intrinsic to the advertiser, and does not depend on what
was being shown on the page when the user clicked on the ad.
This is all the information we need to understand the market for a particular keyword:
the clickthrough rates of the slots, and the revenues per click of the advertisers. Figure 15.2
shows a small example with three slots and three advertisers: the slots have clickthrough
rates of 10, 5, and 2 respectively, while the advertisers have revenues per click of 3, 2, and 1
respectively.
442 CHAPTER 15. SPONSORED SEARCH MARKETS
c z 10, 5, 2 0 c z 10, 5, 2
(a) Advertisers valuations for the slots (b) Market-clearing prices for slots
Figure 15.3: The allocation of advertising slots to advertisers can be represented as a match-
ing market, in which the slots are the items to be sold, and the advertisers are the buyers.
An advertisers valuation for a slot is simply the product of its own revenue per click and
the clickthrough rate of the slot; these can be used to determine market-clearing prices for
the slots.
Constructing a Matching Market. We now show how to represent the market for a
particular keyword as a matching market of the type we studied in Chapter 10. To do this,
it is useful to first review the basic ingredients of matching market from Chapter 10.
The participants in a matching market consist of a set of buyers and a set of sellers.
Each buyer j has a valuation for the item offered by each seller i. This valuation can
depend on the identities of both the buyer and the seller, and we denote it vij .
The goal is to match up buyers with sellers, in such a way that no buyer purchases two
different items, and the same item isnt sold to two different buyers.
To cast the search engines advertising market for a particular keyword in this framework,
we use ri to denote the clickthrough rate of slot i, and vj to denote the revenue per click of
advertiser j. The benefit that advertiser j receives from being shown in slot i is then just
ri vj , the product of the number of clicks and the revenue per click.
In the language of matching markets, this is advertiser js valuation vij for slot i that
is, the value it receives from acquiring slot i. So by declaring the slots to be the sellers,
the advertisers to be the buyers, and the buyers valuations to be vij = ri vj , the problem
of assigning slots to advertisers is precisely the problem of assigning sellers to buyers in a
matching market. In Figure 15.3(a), we show how this conversion is applied to the example in
Figure 15.2, yielding the buyer valuations shown. As this figure makes clear, the advertising
set-up produces a matching market with a special structure: since the valuations are obtained
15.2. ADVERTISING AS A MATCHING MARKET 443
by multiplying rates by revenues, we have a situation where all the buyers agree on their
preferences for the items being sold, and where in fact the valuations of one buyer simply
form a multiple of the valuations of any other buyer.
When we considered matching markets in Chapter 10, we focused on the special case
in which the number of sellers and the number of buyers were the same. This made the
discussion simpler in a number of respects; in particular, it meant that the buyers and sellers
could be perfectly matched, so that each item is sold, and each buyer purchases exactly one
item. We will make the analogous assumption here: with slots playing the role of sellers
and advertisers playing the role of buyers, we will focus on the case in which the numbers
of slots and advertisers are the same. But it is important to note that this assumption
is not at all essential, because for purposes of analysis we can always translate a scenario
with unequal numbers of slots and advertisers into an equivalent one with equal numbers, as
follows. If there are more advertisers than slots, we simply create additional fictitious slots
of clickthrough rate 0 (i.e. of valuation 0 to all buyers) until the number of slots is equal to
the number of advertisers. The advertisers who are matched with the slots of clickthrough
rate 0 are then simply the ones who dont get assigned a (real) slot for advertising. Similarly,
if there are more slots than advertisers, we just create additional fictitious advertisers who
have a valuation of 0 for all slots.
Each seller i announces a price pi for his item. (In our case, the items are the slots.)
Each buyer j evaluates her payoff for choosing a particular seller i: it is equal to the
valuation minus the price for this sellers item, vij pi .
The prices are market-clearing if this graph has a perfect matching: in this case, we
can assign distinct items to all the buyers in such a way that each buyer gets an item
that maximizes her payoff.
In Chapter 10, we showed that market-clearing prices exist for every matching market, and
we gave a procedure to construct them. We also showed in Chapter 10 that the assignment
444 CHAPTER 15. SPONSORED SEARCH MARKETS
of buyers to sellers achieved by market-clearing prices always maximizes the buyers total
valuations for the items they get.
Returning to the specific context of advertising markets, market-clearing prices for the
search engines advertising slots have the desirable property that advertisers prefer different
slots, and the resulting assignment of advertisers to slots maximizes the total valuations of
each advertiser for what they get. (Again, see Figure 15.3(b).) In fact, it is not hard to work
out that when valuations have the special form that we see in advertising markets each
consisting of a clickthrough rate times a revenue per click then the maximum valuation
is always obtained by giving the slot with highest clickthrough rate to the advertiser with
maximum revenue per click, the slot with second highest rate to the advertiser with second
highest revenue per click, and so forth.
The connection with matching markets shows that we can in fact think about advertising
prices in the more general case where different advertisers can have arbitrary valuations for
slots they need not be the product of a clickthrough rate and a revenue per click. This
allows advertisers, for example, to express how they feel about users who arrive via an ad
in the third slot compared with those who arrive via an ad in the first slot. (And indeed, it
is reasonable to believe that these two populations of users might have different behavioral
characteristics.)
Finally, however, this construction of prices can only be carried out by a search engine if
it actually knows the valuations of the advertisers. In the next section we consider how to
set prices in a setting where the search engine doesnt know these valuations; it must rely
on advertisers to report them without being able to know whether this reporting is truthful.
In the case of a single-item auction, we saw in Chapter 9 that these problems are handled
by running a second-price auction, in which the single item is awarded to the highest bidder at
a price equal to the second-highest bid. As we showed there, truthful bidding is a dominant
strategy for second-price auctions that is, it is at least as good as any other strategy,
regardless of what the other participants are doing. This dominant strategy result means
that second-price auctions avoid many of the pathologies associated with more complex
auctions.
But what is the analogue of the second-price auction for advertising markets with multiple
slots? Given the connections weve just seen to matching markets in the previous section,
this turns out to be a special case of an interesting and fundamental question: how can we
define a price-setting procedure for matching markets so that truthful reporting of valuations
is a dominant strategy for the buyers? Such a procedure would be a massive generalization
of the second-price auction, which though already fairly subtle only applies to the case
of single items.
The VCG Principle. Since a matching market contains many items, it is hard to directly
generalize the literal description of the second-price single-item auction, in which we assign
the item to the highest bidder at the second-highest price. However, by viewing the second-
price auction in a somewhat less obvious way, we get a principle that does generalize.
This view is the following. First, the second-price auction produces an allocation that
maximizes social welfare the bidder who values the item the most gets it. Second, the
winner of the auction is charged an amount equal to the harm he causes the other bidders
by receiving the item. That is, suppose the bidders values for the item are v1 , v2 , v3 , . . . , vn
in decreasing order. Then if bidder 1 were not present, the item would have gone to bidder 2,
who values it at v2 . The other bidders still would not get the item, even if bidder 1 werent
there. Thus, bidders 2 through n collectively experience a harm of v2 because bidder 1 is
there since bidder 2 loses this much value, and bidders 3 through n are unaffected. This
harm of v2 is exactly what bidder 1 is charged. Indeed, the other bidders are also charged
an amount equal to the harm they cause to others in this case, zero, since no bidder is
affected by the presence of any of bidders 2 through n in the single-item auction.
Again, this is a non-obvious way to think about single-item auctions, but it is a principle
that turns out to encourage truthful reporting of values in much more general situations:
each individual is charged the harm they cause to the rest of the world. Or to put it
another way, each individual is charged a price equal to the total amount better off everyone
else would be if this individual werent there. We will refer to this as the Vickrey-Clarke-
Groves (VCG) principle, after the work of Clarke and Groves, who generalized the central
idea behind Vickreys second-price auction for single items [112, 199, 400]. For matching
markets, we will describe an application of this principle due to Herman Leonard [270] and
446 CHAPTER 15. SPONSORED SEARCH MARKETS
Gabrielle Demange [128]; it develops a pricing mechanism in this context that causes buyers
to reveal their valuations truthfully.
In the optimal matching without buyer y present, buyer x still gets a (so she is un-
affected), while buyer z gets item b, for an improved valuation of 3. The total harm
caused by y is 0 + 3 = 3, and so this is the price that y should pay.
Finally, in the optimal matching without buyer z present, buyers x and y each get the
same items they would have gotten had z been there. z causes no harm to the rest of
the world, and so her VCG price is 0.
With this example in mind, we now describe the VCG prices for a general matching
market. This follows exactly from the principle weve been discussing, but it requires a bit
2
As always, we can handle unequal numbers of buyers and sellers by creating fictitious individuals and
valuations of 0, as in Section 15.2.
15.3. ENCOURAGING TRUTHFUL BIDDING IN MATCHING MARKETS: THE VCG PRINCIPLE447
a x 30, 15, 6
If x weren't there, y
would do better by
20-10=10, and z would
do better by 5-2=3,
b y 20, 10, 4 for a total harm of 13.
c z 10, 5, 2
(a) Determining how much better off y and z would be if x were not present
a x 30, 15, 6
If y weren't there, x
would be unaffected,
and z would do better
by 5-2=3, for a total
b y 20, 10, 4 harm of 3.
c z 10, 5, 2
(b) Determining how much better off x and z would be if y were not present
Figure 15.4: The VCG price an individual buyer pays for an item can be determined by working out how
much better off all other buyers would be if this individual buyer were not present.
of notation due to the multiple items and valuations. First, let S denote the set of sellers and
B denote the set of buyers. Let VBS denote the maximum total valuation over all possible
perfect matchings of sellers and buyers this is simply the value of the socially optimal
outcome with all buyers and sellers present.
Now, let S i denote the set of sellers with seller i removed, and let B j denote the set
of buyers with buyer j removed. So if we give item i to seller j, then the best total valuation
Si
the rest of the buyers could get is VBj : this is the value of the optimal matching of sellers
and buyers when weve taken item i and buyer j out of consideration. On the other hand, if
buyer j simply didnt exist, but item i were still an option for everyone else, then the best
S
total valuation the rest of the buyers could get is VBj . Thus, the total harm caused by
448 CHAPTER 15. SPONSORED SEARCH MARKETS
buyer j to the rest of the buyers is the difference between how theyd do without j present
S Si
and how they do with j present; in other words, it is the difference VBj VBj . This is the
VCG price pij that we charge to buyer j for item i, so we have the equation
S Si
pij = VBj VBj . (15.1)
The VCG Price-Setting Procedure. Using the ideas developed so far, we can now
define the complete VCG price-setting procedure for matching markets. We assume that
there is a single price-setting authority (an auctioneer) who can collect information from
buyers, assign items to them, and charge prices. Fortunately, this framework works very well
for selling advertising slots, where all the items (the slots) are under the control of a single
agent (the search engine).
The procedure is as follows:
1. Ask buyers to announce valuations for the items. (These announcements need not be
truthful.)
2. Choose a socially optimal assignment of items to buyers that is, a perfect matching
that maximizes the total valuation of each buyer for what they get. This assignment
is based on the announced valuations (since thats all we have access to.)
3. Charge each buyer the appropriate VCG price: that is, if buyer j receives item i
under the optimal matching, then charge buyer j a price pij determined according to
Equation (15.1).
Essentially, what the auctioneer has done is to define a game that the buyers play: they
must choose a strategy (a set of valuations to announce), and they receive a payoff: their
valuation for the item they get, minus the price they pay. What turns out to be true, though
it is far from obvious, is that this game has been designed to make truth-telling in which
a buyer announces her true valuations a dominant strategy. We will prove this in the
next section; but before this, we make a few observations.
First, notice that theres a crucial difference between the VCG prices defined here, and
the market-clearing prices arising from the auction procedure in Chapter 10. The market-
clearing prices defined there were posted prices, in that the seller simply announced a price
and was willing to charge it to any buyer who was interested. The VCG prices here, on the
other hand, are personalized prices: they depend on both the item being sold and the buyer
it is being sold to, The VCG price pij paid by buyer j for item i might well differ, under
Equation (15.1), from the VCG price pik that buyer k would pay if it were assigned item i.3
3
Despite this, there is are deep and subtle connections between the two kinds of prices; we explore this
issue further in the final section of this chapter.
15.4. ANALYZING THE VCG PROCEDURE: TRUTH-TELLING AS A DOMINANT STRATEGY449
Another way to think about the relationship between the market-clearing prices from
Chapter 10 and the VCG prices here is to observe how each is designed to generalize a
different single-item auction format. The market-clearing prices in Chapter 10 were defined
by a significant generalization of the ascending (English) auction: prices were raised step-
by-step until each buyer favored a different item, and we saw in Section 10.5 that one could
encode the single-item ascending auction as a special case of the general construction of
market-clearing prices.
The VCG prices, on the other hand, are defined by an analogous and equally substantial
generalization of the sealed-bid second-price auction. At a qualitative level, we can see the
harm-done-to-others principle is behind both the second-price auction and the VCG prices,
but in fact we can also see fairly directly that the second-price auction is a special case of
the VCG procedure. Specifically, suppose there are n buyers who each want a single item,
and buyer i has valuation vi for it, where the numbers vi are sorted in descending order so
that v1 is the largest. Lets turn this into a matching market with n buyers and n sellers by
simply adding n1 fictitious items; all buyers have valuation 0 for each fictitious item. Now,
if everyone reports their values truthfully, then the VCG procedure will assign item 1 (the
real item the only one with any value) to buyer 1 (who has the highest valuation), and
all the rest of the buyers would get fictitious items of zero value. What price should buyer
S S1
1 pay? According to Equation (15.1), she should pay VB1 VB1 . The first term is buyer
2s valuation, since with buyer 1 gone the socially optimal matching gives item 1 to buyer
2. The second term is 0, since with both buyer 1 and item 1 gone, there are no remaining
items of any value. Thus, buyer 1 pays buyer 2s valuation, and so we have precisely the
pricing rule for second-price sealed-bid auctions.
i j
j
S-i h
S-h
V V
B-j B-j
Figure 15.5: The heart of the proof that the VCG procedure encourages truthful bidding
comes down to a comparison of the value of two matchings.
her item i. Then her payoff is vij pij . We want to show that buyer j has no incentive to
deviate from a truthful announcement.
If buyer j decides to lie about her valuations, then one of two things can happen: either
this lie affects the item she gets, or it doesnt. If buyer j lies but still gets the same item
i, then her payoff remains exactly the same, because the price pij is computed only using
announcements by buyers other than j. So if a deviation from truth-telling is going to be
beneficial for buyer j, it has to affect the item she receives.
Suppose, therefore, that buyer j lies about her valuations and gets item h instead of item
i. In this case, her payoff would be vhj phj . Notice again that the price phj is determined
only by the announcements of buyers other than j. To show that there is no incentive to lie
and receive item h instead of i, we need to show that
If we expand out the definitions of pij and phj using Equation (15.1), this is equivalent to
showing
S Si S Sh
vij [VBj VBj ] vhj [VBj VBj ].
S
Both sides of this inequality contain the term VBj , so we can add this to both sides; in this
way, the previous inequality is equivalent to showing
Si Sh
vij + VBj vhj + VBj . (15.2)
We now argue why this last inequality holds. In fact, both the left-hand side and the
right-hand side describe the total valuation of different matchings, as shown in Figure 15.5.
The matching on the left-hand side is constructed by pairing j with the item i she would
get in an optimal matching, and then optimally matching the remaining buyers and items.
In other words, it is a matching that achieves the maximum total valuation over all possible
perfect matchings, so we can write the left-hand side as
Si
vij + VBj = VBS . (15.3)
In contrast, the matching on the right-hand side of Inequality (15.2) is constructed by pairing
j with some other item h, and then optimally matching the remaining buyers and items. So
it is a matching that achieves the maximum total valuation only over those matchings that
pair j with h. Therefore,
Sh
vhj + VBj VBS .
The left-hand side of Inequality (15.2), the maximum valuation with no restrictions on who
gets any slot, must be at least as large as the right-hand side, the maximum with a restriction.
And this is what we wanted to show.
Nothing in this argument depends on the decisions made by other buyers about what to
announce. For example, it doesnt require them to announce their true values; the arguments
comparing different matchings can be applied to whatever valuations are announced by the
other buyers, with the same consequences. Thus we have shown that truthfully announcing
valuations is a dominant strategy in the VCG procedure.
To close this section, lets go back to the specific case of keyword-based advertising, in
which the buyers correspond to advertisers and the items for sale correspond to advertising
slots. Our discussion so far has focused on finding and achieving an assignment of advertisers
to slots that maximizes the total valuation obtained by advertisers. But of course, this is
not what the search engine selling the advertising slots directly cares about. Instead it cares
about its revenue: the sum of the prices that it can charge for slots. It is not clear that
the VCG procedure is the best way to generate revenue for the search engine. Determining
which procedure will maximize seller revenue is a current topic of research. It could be
that the best a seller can do is to use some procedure that generates an optimal matching
452 CHAPTER 15. SPONSORED SEARCH MARKETS
and potentially one that is better than VCG at converting more of the total valuation
into seller revenue. Or it could be that the seller is better off using a procedure that does
not always yield an optimal matching. And it may be that some version of a revenue-
equivalence principle such as we saw for single-item auctions in Chapter 9 holds here
as well, showing that certain classes of auction provide equivalent amounts of revenue to the
seller when buyers behave strategically.
In the next sections, we sample the general flavor of some of these revenue issues by
considering the alternative to VCG that the search industry has adopted in practice a
simple-to-describe auction called the Generalized Second Price auction that induces complex
bidding behavior.
Analyzing GSP. GSP was originally developed at Google; once it had been in use for
a while in the search industry, researchers including Varian [399] and Edelman, Ostrovsky,
15.5. THE GENERALIZED SECOND PRICE AUCTION 453
and Schwarz [144] began working out some of its basic properties. Their analysis formulates
the problem as a game, using the definitions from Chapter 6. Each advertiser is a player, its
bid is its strategy, and its payoff is its revenue minus the price it pays. In this game, we will
consider Nash equilibria we seek sets of bids so that, given these bids, no advertiser has
an incentive to change how it is behaving.4
First, well see that GSP has a number of pathologies that VCG was designed to avoid:
truth-telling might not constitute a Nash equilibrium; there can in fact be multiple possible
equilibria; and some of these may produce assignments of advertisers to slots that do not
maximize total advertiser valuation. On the positive side, we show in the next section
that there is always at least one Nash equilibrium set of bids for GSP, and that among
the (possibly multiple) equilibria, there is always one that does maximize total advertiser
valuation. The analysis leading to these positive results about equilibria builds directly on
the market-clearing prices for the matching market of advertisers and slots, thus establishing
a connection between GSP and market-clearing prices.
Hence, while GSP possesses Nash equilibria, it lacks some of the main nice properties of
the VCG procedure from Sections 15.3 and 15.4. However, in keeping with our discussion
from the end of the last section, the search engines ultimately have an interest in choosing a
procedure that will maximize their revenue (given the behavior of the advertisers in response
to it). Viewed in this light, it is not clear that GSP is the wrong choice, though it is also far
from clear that it is the right choice. As mentioned at the end of Section 15.4, understanding
the revenue trade-offs among different procedures for selling keyword-based advertising is
largely an open question, and the subject of current research.
There are two slots for ads, with clickthrough rates of 10 and 4. In the figure, we
also show a third fictitious slot of clickthrough rate 0, so as to equalize the number of
advertisers and slots.
There are three advertisers x, y, and z, with values per click of 7, 6, and 1 respectively.
Now, if each advertiser bids its true valuation, then advertiser x gets the top slot at a
price per click of 6; since there are 10 clicks associated with this slot, x pays a cumulative
price of 6 10 = 60 for the slot. Advertiser xs valuation for the top slot is 7 10 = 70, so its
4
In order to analyze Nash equilibrium in the bidding game we will assume that each advertiser knows
the values of all other bidders. Otherwise, they do not know the payoffs to all players in the bidding game
and we could not use Nash equilibrium to analyze the game. The motivation for this assumption is that we
envision a situation in which these bidders have been bidding against each other repeatedly and have learned
each others willingnesses to pay for clicks.
454 CHAPTER 15. SPONSORED SEARCH MARKETS
4 b y 6
0 c z 1
Figure 15.6: An example of a set of advertisers and slots for which truthful bidding is not
an equilibrium in the Generalized Second Price auction. Moreover, this example possesses
multiple equilibria, some of which are not socially optimal.
payoff is 70 60 = 10. Now, if x were to lower its bid to 5, then it would get the second slot
for a price per click of 1, implying a cumulative price of 4 for the slot. Since its valuation
for the second slot is 7 4 = 28, this is a payoff of 28 4 = 24, which is an improvement over
the result of bidding truthfully.
Multiple and non-optimal equilibria. The example in Figure 15.6 turns out to illus-
trate some other complex properties of bidding behavior in GSP. In particular, there is more
than one equilibrium set of bids for this example, and among these equilibria are some that
produce a socially non-optimal assignment of advertisers to slots.
First, suppose that advertiser x bids 5, advertiser y bids 4, and advertiser z bids 2. With
a little effort, we can check that this forms an equilibrium: checking the condition for z is
easy, and the main further things to observe are that x doesnt want to lower its bid below
4 so as to move to the second slot, and y doesnt want to raise its bid above 5 to get the
first slot. This is an equilibrium that produces a socially optimal allocation of advertisers to
slots, since x gets slot a, while y gets b and z gets c.
But one can also check that if advertiser x bids 3, advertiser y bids 5, and advertiser z
bids 1, then we also get a set of bids in Nash equilibrium. Again, the main thing to verify is
that x doesnt want to raise its bid above ys, and that y doesnt want to lower its bid below
xs. This equilibrium is not socially optimal, since it assigns y to the highest slot and x to
the second-highest.
There is much that is not understood in general about the structure of the sub-optimal
equilibria arising from GSP. For example, it is an interesting open question to try quantifying
15.5. THE GENERALIZED SECOND PRICE AUCTION 455
a x 70, 28, 0
b y 60, 24, 0
c z 10, 4, 0
Figure 15.7: Representing the example in Figure 15.6 as a matching market, with advertiser
valuations for the full set of clicks associated with each slot.
how far from social optimality a Nash equilibrium of GSP can be.
The Revenue of GSP and VCG. The existence of multiple equilibria also adds to the
difficulty in reasoning about the search engine revenue generated by GSP, since it depends
on which equilibrium (potentially from among many) is selected by the bidders. In the
example weve been working with, well show that depending on which equilibrium of GSP
the advertisers actually use, the revenue to the search engine can be either higher or lower
than the revenue it would collect by charging the VCG prices.
Lets start by determining the revenue to the search engine from the two GSP equilibria
that we worked out above.
With bids of 5, 4, and 2, the 10 clicks in the top slot are sold for 4 per click, and the 4
clicks in the second slot are sold for 2 per click, for a total revenue to the search engine
of 48.
On the other hand, with bids of 3, 5, and 1, the 10 clicks in the top slot are sold for 3
per click, and the 4 clicks in the second slot are sold for 1 per click, for a total revenue
to the search engine of 34.
Now, how do these compare with the revenue generated by the VCG procedure? To work
out the VCG prices, we first need to convert the example from Figure 15.6 into a matching
market, just as we did in Section 15.2: for each advertiser and each slot, we work out the
advertisers valuation for the full set of clicks associated with that slot. We show these
valuations in Figure 15.7.
456 CHAPTER 15. SPONSORED SEARCH MARKETS
40 a x 70, 28, 0
4 b y 60, 24, 0
0 c z 10, 4, 0
Figure 15.8: Determining market-clearing prices for the example in Figure 15.6, starting
with its representation as a matching market.
The matching used by the VCG procedure is the one which maximizes the total valuation
of all advertisers for the slot they get; this is achieved by assigning slot a to x, slot b to y,
and slot c to z. Now, we work out a price to charge each advertiser for the full set of clicks
in the slot it gets, by determining the harm each advertiser causes to all others. The harm x
causes to y and z can be computed as follows: without x present, y would move up one slot,
obtaining an increased valuation of 60 24 = 36, and z would move up one slot, obtaining
an increased valuation of 4 0 = 4. Therefore, x should pay 40 for the full set of clicks in
the first slot. Similarly, without y present, z would get 4 instead of 0, so y should pay 4
for the set of clicks in the second slot. Finally, since z causes no harm to anyone, it pays 0.
Thus, the total revenue collected by the search engine is 44.
So we find that in this example, the answer to the question, Does GSP or VCG provide
more revenue to the search engine? is indeed that it depends on which equilibrium of GSP
the advertisers use. With the first equilibrium of GSP that we identified, the revenue is
48, while with the second, the revenue is 34. The revenue from the VCG mechanism is in
between these two values, at 44.
and slots, one can always construct a set of bids in Nash equilibrium and moreover one
that produces a socially optimal assignment of advertisers to slots. As a consequence, there
always exists a set of socially optimal equilibrium bids for the GSP procedure.
To give the basic idea for how to construct an equilibrium, we do it first on the example
from Figure 15.6. In fact, weve just seen two equilibria for this example in the previous
section, but the point here is to see how a socially optimal one can be easily constructed
by following a few simple principles, rather than by trial-and-error or guesswork. Well then
identify the principles from this example that carry over to construct equilibria in general.
An Equilibrium for Figure 15.6. The basic idea is to use market-clearing prices to guide
us to a set of bids that produce these prices. To construct market-clearing prices, we first
convert the example from Figure 15.6 into a matching market by determining advertisers
valuations for each slot, as we did at the end of the previous section (in Figure 15.7). We
then determine market-clearing prices for this matching market, as shown in Figure 15.8.
These market-clearing prices are cumulative prices for each slot single prices that cover
all the clicks associated with that slot. We can easily translate back to prices per click by
simply dividing by the clickthrough rate: this produces a price per click of 40/10 = 4 for the
first slot, and 4/4 = 1 for the second slot. It will turn out not to be important how we price
the fictitious third slot per click, but it is fine to give it a price of 0.
Next, we find bids that result in these prices per click. This is not hard to do: the prices
per click are 4 and 1 for the two slots, so these should be the bids of y and z respectively.
Then the bid of x can be anything as long as its more than 4. With these bids, x pays 4
per click for the first slot, y pays 1 per click for the second slot, and z pays 0 per click for
the (fake) third slot and the allocation of advertisers to slots is socially optimal.
Having used the market-clearing prices to guide us toward a set of bids, we now use
the market-clearing property to verify that these bids form a Nash equilibrium. There are
several cases to consider, but the overall reasoning will form the general principles that
extend beyond just this example. First, lets argue that x doesnt want to lower its bid. If it
drops down to match ys bid, then it can get the second slot at the price that y is currently
paying. Similarly, it could match zs bid and get the third slot at the price that z is currently
paying. But since the prices are market-clearing, x doesnt want to do either of these things.
For similar reasons, y doesnt want to drop its bid to get the third slot at the price z is
currently paying.
Next, lets argue that y doesnt want to raise its bid. Indeed, suppose that it raised its
bid to get the first slot to do this, it would need to match xs current bid. But in this
case, x becomes the second-highest bidder, and so y would get the first slot at a price per
click equal to xs current bid, which is above 4. Because the prices are market-clearing, y
doesnt prefer the first slot to its current slot at a price per click of 4, so it certainly doesnt
458 CHAPTER 15. SPONSORED SEARCH MARKETS
prefer the first slot to its current slot at a higher price per click. Thus, y doesnt want to
raise its bid. Similar reasoning shows that z doesnt want to raise its bid.
This concludes the analysis: no advertiser wants to raise or lower its current bid, and so
the set of bids in this example forms a Nash equilibrium.
It is not hard to carry out the construction and the reasoning used here in general; we
show how to do this next.
GSP always has a Nash equilibrium: The General Argument Now lets consider
a general instance where we have a set of advertisers and a set of slots; by adding fake slots
of 0 value if necessary, we will assume that these two sets have the same size.
Lets suppose that the advertisers are labeled 1, 2, . . . , n in decreasing order of their
valuations per click, and lets suppose that the slots are labeled 1, 2, . . . , n in decreasing
order of their clickthrough rates. We first represent the set of advertisers and slots using a
matching market, and we consider any set of market-clearing prices for the slots, denoted
p1 , p2 , . . . , pn in order. Again, these are prices for the full set of clicks in each slot; we
will consider the price per click of each slot below. In Section 15.2, we argued that since
a perfect matching in the resulting preferred-seller graph maximizes the total valuation of
each advertiser for the slot it gets, it follows that the advertiser with the highest valuation
per click gets the top slot, the advertiser with next-highest valuation gets the second slot,
and so forth, with advertiser i getting slot i.
We now show how to get this outcome from an equilibrium set of bids in GSP. Our plan is
first to construct a set of bids that produces this same set of market-clearing prices, together
with the same socially optimal matching of advertisers to slots. Then, we will show that
these bids form a Nash equilibrium.
Constructing the bids. For the first step, we start by considering the prices per click
that we get from the market-clearing prices: pj = pj /rj . We start by arguing that these
prices per click decrease as we move down the slots: p1 p2 pn . To see why this
is true, lets compare two slots j and k, where j is numbered lower than k, and show that
pj pk .
Since the prices are market-clearing, advertiser k is at least as happy with slot k as it
would be with slot j. In slot k, its total payoff is the product of its payoff per click, vk pk ,
times the clickthrough rate rk . In slot j, its total payoff would be the product of its payoff
per click there, vk pj , times the clickthrough rate rj . Now, the clickthrough rate is higher
in slot j, yet slot k is preferred; so it must be that the payoff per click is smaller in slot j.
That is, vk pj is smaller than vk pk , or equivalently, pj pk . This inequality is precisely
the fact we were looking for.
Now that we have decreasing prices per click, we can construct the bids were looking
15.7. AD QUALITY 459
for. We simply have advertiser j place a bid of pj1 for each j > 1, and we have advertiser 1
place any bid larger than p1 . Notice that this is exactly what happened when we constructed
an equilibrium for the example in Figure 15.6. With these bids, we have all the desired
properties: for each j, advertiser j is assigned to slot j and pays a price per click of pj .
Why do the bids form a Nash equilibrium? To show why these bids form a Nash
equilibrium, we adapt the principles that we used in analyzing the equilibrium for Figure 15.6.
We first argue that no advertiser will want to lower its bid, and then that no advertiser will
want to raise its bid either.
Consider an advertiser j, currently in slot j. If it were to lower its bid, the best it could
do is to pick some lower slot k, bid just under the current bid of advertiser k, and thereby
get slot k at the price that advertiser k is currently paying. But since the prices are market-
clearing, j is at least as happy with its current slot at its current price as it would be with
ks current slot at ks current price. So in fact, this shows that no advertiser will want to
lower its bid.
How about raising a bid? The best advertiser j could do here is to pick some higher slot
i, bid just above the current bid of advertiser i, and thereby get slot i. What price would j
pay for slot i if it did this? Its forcing advertiser i one slot down, and so it would pay the
current bid of advertiser i. This is actually larger than what advertiser i is currently paying
for slot i: advertiser i is currently paying the bid of advertiser i + 1, which is lower. So the
upshot is that j would get slot i at a price higher than the current price of slot i. Since
the market-clearing condition says that j doesnt even prefer slot i at the current price, it
certainly wouldnt prefer it at a higher price. This shows that no advertiser wants to raise
its bid either, and so the set of bids indeed forms a Nash equilibrium.
15.7 Ad Quality
What weve discussed thus far forms part of the basic framework for thinking about search
advertising markets. Of course, there are numerous further issues that come up in the use
of this framework by the major search engines, and in this section and the next we briefly
discuss a few of these issues. We begin with the issue of ad quality.
The assumption of a fixed clickthrough rate. One of the assumptions weve made
throughout the analysis is that a fixed clickthrough rate rj is associated with each slot j
in other words, that the number of clicks this slot receives is independent of which ad you
place there. But in general this is not likely to be true: users will look at the thumbnail
description of an ad placed in a given slot (evaluating, for example, whether they recognize
the name of the company placing the ad), and this will affect whether they click on the ad.
460 CHAPTER 15. SPONSORED SEARCH MARKETS
And this, in turn, affects how much money the search engine makes, since its charging per
click, not per impression.
So from the search engines point of view, the worrisome scenario is that a low-quality
advertiser bids very highly, thus obtaining the first slot under GSP. Users are then not
interested in clicking through on this ad (maybe they dont trust the company, or the ad is
only minimally relevant to the query term). As a result, it sits at the top of the list as the
high bidder, but the search engine makes almost no money from it because users rarely click
on the ad. If the search engine could somehow expel this ad and promote the higher-quality
ads, it could potentially make more money.
Again, our model as described cant really address this, since it starts from the assumption
that an ad in position i will get clicks at rate ri , regardless of which ad it is. This pure
version of GSP, using the model from Sections 15.5 and 15.6 is essentially what the company
Overture used at the time it was acquired by Yahoo!, and hence what Yahoo! used initially
as well. And indeed, it suffers from exactly this problem advertisers can sometimes occupy
high slots without generating much money for the search engine.
The role of ad quality. When Google developed its system for advertising, it addressed
this problem as follows. For each ad submitted by an advertiser j, they determine an
estimated quality factor qj . This is intended as a fudge factor on the clickthrough rate: if
advertiser j appears in slot i, then the clickthrough rate is estimated to be not ri but the
product qj ri . The introduction of ad quality is simply a generalization of the model weve
been studying all along: in particular, if we assume that all factors qi are equal to 1, then
we get back the model that weve been using thus far in the chapter.
From the perspective of our matching market formulation, its easy to incorporate these
quality factors: we simply change the valuation of advertiser j for slot i, from vij = ri vj to
vij = qj ri vj . The rest of the analysis remains the same, using these new valuations.
Google has adapted the GSP procedure analogously. Rather than assigning advertisers to
slots in decreasing orders of their bids bj , it assigns them in decreasing order of the product of
their bid and quality factor qj bj . This makes sense, since this is the ordering of advertisers by
expected revenue to the search engine. The payments change correspondingly. The previous
rule paying the bid of the advertiser just below you can, in retrospect, be interpreted
more generally as paying the minimum bid you would need in order to hold your current
position. This rule carries over to the version with quality factors: each advertiser pays the
minimum amount it would need to keep its current position, when ranked according to qj bj .
With these changes, its possible to go back and perform the analysis of GSP at this
more general level. Close analogues of all the previous findings still hold here; while the
introduction of quality factors makes the analysis a little bit more complicated, the basic
ideas remain largely the same [144, 399].
15.8. COMPLEX QUERIES AND INTERACTIONS AMONG KEYWORDS 461
a bid on this exact phrase. If the rules of the keyword-based advertising market are defined
too strictly that the search engine can only show ads for words or phrases that have been
explicitly bid on then it seems as though both the search engine and the advertisers are
losing money: there clearly are advertisers who would be happy to be displayed for this
query.
The question of which ads to show, however, is quite a difficult problem. A simple
rule, such as showing the advertisers that placed the maximum bid for any of the words
in the query, seems like a bad idea: probably there are advertisers who have placed very
high bids on vacation (e.g. companies that sell generic vacation packages) and ski (e.g.
companies that sell skis), and neither of these seems like the right match to the query. It
seems important to take into account the fact that the query, through its choice of terms, is
specifying something fairly narrow.
Furthermore, even if relevant advertisers can be identified, how much should they be
charged for a click, given that they never expressed a bid on exactly this query? The main
search engines tend to get agreements from advertisers that theyll extrapolate from their
bids on certain queries to implied bids on more complex queries, such as in this example,
but working out the best way to do this is not fully understood. These issues are the subject
of active work at search engine companies, and again the subject of some very interesting
potential further research.
3 a x 12, 4, 2
1 b y 8, 7, 6
0 c z 7, 5, 2
Figure 15.9: A matching market, with valuations and market-clearing prices specified, and
a perfect matching in the preferred-seller graph indicated by the bold edges.
Consider for instance the matching market shown in Figures 15.3 and 15.4. In Figure 15.3
we see a set of market-clearing prices constructed using the procedure from Chapter 10. In
Figure 15.4, we see that these same prices arise as the VCG prices too.
Nor is it the special structure of prices arising from clickthrough rates and revenues per
click that causes this. For instance, lets go back to the example used in Figure 10.6 from
Chapter 10, which has valuations with a much more scrambled structure. Weve re-drawn
the final preferred-seller graph arising from the auction procedure in Figure 15.9, with the
(unique) perfect matching in this graph indicated using bold edges. This is the matching
that maximizes the total valuation of buyers for the item they get, so we apply the definitions
from earlier in the current chapter to determine the VCG prices. For example, to determine
the price that should be charged for seller as item, we observe
If neither a nor x were present, the maximum total valuation of a matching between
the remaining sellers and buyers would be 11, by matching y to c and z to b.
If x werent present but a were, then the maximum total valuation possible would be
14, by matching y to b and z to a.
The difference between these two quantities is the definition of the VCG price for item
a; it is 14 11 = 3.
We could perform the corresponding analysis to get the VCG prices for items b and c, and
wed see that the values are 1 and 0, respectively. In other words, we again find that the
VCG prices are also market-clearing prices.
464 CHAPTER 15. SPONSORED SEARCH MARKETS
In this section, we show that the relationship suggested by these examples holds in
general. Our main result is that despite their definition as personalized prices, VCG prices
are always market-clearing. That is, suppose we were to compute the VCG prices for a
given matching market, first determining a matching of maximum total valuation, and then
assigning each buyer the item they receive in this matching, with a price tailored for this
buyer-seller match. Then, however, suppose we go on to post the prices publicly: rather than
requiring buyers to follow the matching used in the VCG construction, we allow any buyer to
purchase any item at the indicated price. We will see that despite this greater freedom, each
buyer will in fact achieve the highest payoff by selecting the item she was assigned when the
VCG prices were constructed. This will establish that the prices are market-clearing under
the definition from Chapter 10.
First Steps Toward a Proof. Lets think for a minute about how you might prove such
a fact, once you start to suspect from simple examples that it might be true. Its tempting
to start with the very compact formula defining the VCG prices Equation (15.1) and
then somehow reason about this formula to show that it has the market-clearing property.
In fact, its tricky to make this approach work, and its useful to understand why. Recall
that Equation (15.1) says that if item i is assigned to buyer j in the optimal matching, then
we should charge a price of
S Si
VBj VBj ,
S Si
where VBj is the total valuation of an optimal matching with j removed, and VBj is the
S
total valuation of an optimal matching with both i and j removed. Now, the term VBj is in
fact a sum of many smaller terms, each consisting of the valuation of a distinct buyer for the
Si
item she is assigned in an optimal matching. VBj is similarly a sum of many terms. But
S Si
the key conceptual difficulty is the following: VBj and VBj arise from different matchings
potentially very different matchings and so there is no direct way to compare the sums
that they represent and easily subtract the terms of one from the other.
To make progress, we need to actually understand how the matchings that define these
S Si
two terms VBj and VBj relate to each other at a structural level. And to do this, we will
show that matchings achieving these respective quantities can in fact arise from a common
set of market-clearing prices: there is a single set of market-clearing prices on the set of
S Si
items S so that matchings achieving each of VBj and VBj arise as perfect matchings in the
preferred-seller graphs of related but slightly different matching markets. This will enable
us to see how the two matchings relate to each other and in particular how to build one
from the other in a way that lets us subtract the relevant terms from each other and thus
analyze the right-hand side of Equation (15.1).
For all this to work, we need to first understand which set of market-clearing prices
actually correspond to the VCG prices. There are many possible sets of market-clearing
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY465
prices, but with some checking, we can see that in our examples, the VCG prices have
corresponded to prices that are as small as possible, subject to having the market-clearing
property. So lets consider the following way to make this precise. Over all possible sets of
market-clearing prices, consider the ones that minimize the total sum of the prices. (For
example, in Figure 15.9, the total sum of prices is 3 + 1 + 0 = 4.) We will refer to such
prices as a set of minimum market-clearing prices. In principle, there could be multiple sets
of minimum market-clearing prices, but in fact we will see that there is only one such set,
and they form the VCG prices. This is the crux of the following result, proved by Leonard
[270] and Demange [128].
Claim: In any matching market, the VCG prices form the unique set of market-
clearing prices of minimum total sum.
The First Fact: The Preferred-Seller Graph for Minimum Market-Clearing Prices.
The first of our two facts talks about the structure of the preferred-seller graph in the case
when a set of market-clearing prices has minimum total sum. As a first step, lets go back
466 CHAPTER 15. SPONSORED SEARCH MARKETS
h k
price 0 i* m
Figure 15.10: The key property of the preferred-seller graph for minimum market-clearing
prices: for each item of price greater than 0, there is an alternating path, beginning with a
non-matching edge, to an item of price 0.
to the initial example of market-clearing prices from Chapter 10, and in particular com-
pare preferred-seller graphs for two different sets of market-clearing prices on the same set
of valuations, shown in Figures 10.5(b) and 10.5(d). Notice that the prices in the first of
these, Figure 10.5(b), are larger and more spread out, while the prices in Figure 10.5(d)
in fact have minimum total sum. This corresponds to a difference in the structures of the
preferred-seller graphs as well. The preferred-seller graph in Figure 10.5(b) is very sparse,
with just three separate edges that constitute a perfect matching. The preferred-seller graph
in Figure 10.5(d) is much denser: although it too contains only one perfect matching, it has
additional edges that seem to serve as supports, anchoring the matching in place.
We now show that this anchoring effect is a general one: essentially, whenever a set of
market-clearing prices has minimum total sum, the preferred-seller graph must contain not
only a perfect matching, but also enough other edges to form a path linking each item to
an item of price 0. In fact, the paths we construct will be alternating paths in the sense
defined in Section 10.6: for a given perfect matching in the graph, the edges on the paths
will alternate between being part of the matching and not part of the matching. We will
refer to these two kinds of edges as matching edges and non-matching edges respectively.
Here is the exact statement of the first fact, shown schematically in Figure 15.10.
4 a w 7, 5, 4, 2
3 b x 6, 5, 2, 1
1 c y 5, 6, 2, 2
0 d z 4, 4, 2, 1
Figure 15.11: A matching market with market-clearing prices of minimum total sum. Note
how from each item, there is an alternating path, beginning with a non-matching edge, that
leads to the item of zero price.
a w 7, 5, 4, 2
b x 0, 0, 0, 0
c y 5, 6, 2, 2
d z 4, 4, 2, 1
Figure 15.12: If we start with the example in Figure 15.11 and zero out buyer x, the structure
of the optimal matching changes significantly.
will show that the minimum market-clearing prices are all anchored via alternating paths to
zero-priced items.
The Second Fact: Zeroing Out a Buyer. Our second main fact will relate the minimum
S
market-clearing prices to a matching that achieves the value VBj , the first term on the right-
hand side of Equation (15.1).
To explain how this fact works, we start with a useful way to think about the quantity
S S
VBj . Formally, VBj is the maximum total valuation of any matching in the market where
j has been removed, but where all items have been kept. But heres a different, equivalent
S
way to define VBj . Suppose that we were to change js valuations for every item to 0; well
call this the version of the matching market in which j has been zeroed out. To find an
optimal matching in this market with j zeroed out, we note that it doesnt matter which
item j gets (since j values them all at zero); therefore, we can first optimally match all the
other buyers with items, and then give j whatever is left over. The value of the resulting
S S
matching is VBj . In other words, VBj is the value of the optimal matching in the market
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY469
4 a w 7, 5, 4, 2
3 b x 0, 0, 0, 0
1 c y 5, 6, 2, 2
0 d z 4, 4, 2, 1
Figure 15.13: However, even after we zero out buyer x, the same set of prices remain market-
clearing. This principle is true not just for this example, but in general.
where j is zeroed out: she is still present, but all her valuations are now equal to 0.
Now, an optimal matching in the market with j zeroed out may have a very different
structure than an optimal matching in the original market different buyers may get
completely different items. For example, Figure 15.12 shows the unique optimal matching
in the market from Figure 15.11 after we zero out x: other than buyer y, who still gets
item b, the assignment of items to all other buyers has changed completely. This is another
reflection of the difficulty in reasoning about Equation (15.1): when we remove buyers or
items, the matchings can rearrange themselves in complex ways.
Despite this, there is an important connection between the original market and the zeroed-
out market: the minimum market-clearing prices for the original market are also market-
clearing for the zeroed-out market. We illustrate this for our example in Figure 15.13: keeping
the same prices that were used in Figure 15.11, we see that the preferred-seller graph still has
a perfect matching even after x has been zeroed out, and this means that the prices are still
market-clearing. Moreover, we can observe some additional features of this example. First,
x now receives an item of price 0. Second, consider the payoff of each other buyer, defined
470 CHAPTER 15. SPONSORED SEARCH MARKETS
as the valuation minus the price of the item she gets. For each other buyer, the payoff is the
same in Figures 15.11 and 15.13.
Our second fact shows that all these observations hold in general.
(i) The prices p are also market-clearing for the market in which j is zeroed
out.
Moreover, for any perfect matching in the preferred-seller graph of the zeroed-out
market,
Again, we defer the proof of Fact 2 to later in the section, but it is not hard to establish the
proof using Fact 1. Essentially, when we zero out j, we look at the item i that j formerly got
in the original market, before she was zeroed out. We follow the alternating path provided
by Fact 1 from i down to an item i of price 0. We then show that assigning item i to j, and
shifting the assignment to all other buyers using the edges on this alternating path, gives us
a perfect matching in the preferred-seller graph of the zeroed-out market at the same prices.
This shows that the same prices are in fact market-clearing for the zeroed-out market, and
will establish parts (ii) and (iii) of the claim as well.
Proving the Claim Using Facts 1 and 2. With Facts 1 and 2 in place, we can finish
the proof of our main claim, that the minimum market-clearing prices are defined by the
VCG formula.
To start, lets review some notation. As before, let vij denote the valuation that a buyer
j has for an item i. Let pi be the price charged for item i in our market-clearing prices, and
let P be the sum of the prices of all items. Suppose that buyer j is matched to item i in the
perfect matching in the preferred-seller graph. Buyer j receives a payoff of vij pi from this
item i; we will use zj to denote this payoff,
zj = vij pi , (15.4)
and Z to denote the sum of the payoffs of all buyers from the items they are matched with.
Next, lets recall two basic observations that were made in earlier sections. First, each
buyer j achieves a payoff of vij pi from the item to which she is matched. As we noted in
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY471
Chapter 10, if we add these expressions up over all buyers, we get the following relationship
for the matching M of buyers to items:
This is Equation (15.3) from Section 15.4, and it follows simply because one way to achieve
an optimal matching is to first pair i with j (obtaining a valuation of vij ), and then optimally
match all the remaining buyers and items.
Finally, lets consider this same formula
for the market in which j has been zeroed out, using the same set of market-clearing prices
and a perfect matching in the preferred-seller graph that Fact 2 provides. The total valuation
S
of this matching is VBj , as we argued earlier. The prices havent changed, so their total
sum is still P . Finally, whats the total payoff? By part (ii) of Fact 2, the payoff for buyer
j has dropped from zj , which it was in the original market, to 0. By part (iii) of Fact 2,
the payoff for every other buyer has remained the same. Therefore, the total payoff in the
zeroed-out market is Z zi . Putting all these together, we have the equation
S
Z zi = VBj P. (15.7)
Since we now have equations that relate the two terms on the right-hand of Equation
(15.1) to a common set of quantities, we can finish the proof using a small amount of algebraic
manipulation. Lets first subtract Equation (15.7) from Equation (15.5): this gives us
zi = VBS VBj
S
.
Next, lets expand zi using Equation (15.4) and expand VBS using Equation (15.6). This
gives us
Si S
vij pi = vij + VBj VBj .
Canceling the common term of vij and negating everything, we get
S Si
pi = VBj VBj ,
which is the VCG formula we were seeking. This shows that the market-clearing prices of
minimum total sum are defined by the VCG formula, and hence proves the claim.
472 CHAPTER 15. SPONSORED SEARCH MARKETS
i j
h k
?
Figure 15.14: In order for a matching edge from a buyer k to an item h to leave the preferred-
seller graph when the price of i is reduced by 1, it must be that k now strictly prefers i.
In this case, k must have previously viewed i as comparable in payoff to h, resulting in a
non-matching edge to i.
A First Step Toward Fact 1. To prove Fact 1, we consider a set of minimum market-
clearing prices, and an item i whose price is greater than 0, and we try to construct an
alternating path (beginning with a non-matching edge) from i to some zero-priced item.
As a first step toward this, to convey the idea at the heart of the argument, lets show
something simpler: that this item i, of price pi > 0, is connected to at least one non-matching
edge (in addition to its matching edge to the buyer j that obtains it). Clearly it will be
necessary to establish the presence of such a non-matching edge in any case, if we want
ultimately to show that i has an alternating path all the way down to a zero-priced item.
So suppose, by way of contradiction, that i is not connected to a non-matching edge: its
only edge is the matching edge to buyer j. In this case, we claim that we can subtract 1
from the price pi , and the resulting modified prices will still be market-clearing. This would
be a contradiction, since we assumed our market-clearing prices have minimum total sum.
Clearly if we subtract 1 from pi , it is still non-negative, so we just need to show that
the preferred-seller graph still contains a perfect matching. In fact, well show the stronger
fact that the preferred-seller graph still contains all the matching edges that it used to have.
Indeed, how could a matching edge leave the preferred-seller graph after the price reduction?
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY473
X
(1) No matching edges from a
buyer in X to an item not in X.
i
(2) No non-matching edges
from an item in X to a buyer
not in X.
h k
Figure 15.15: Consider the set X of all nodes that can be reached from i using an alternating
path that begins with a non-matching edge. As we argue in the text, if k is a buyer in X,
then the item to which she is matched must also be in X. Also, if h is an item in X, then
any buyer to which h is connected by a non-matching edge must also be in X. Here is an
equivalent way to phrase this: there cannot be a matching edge connecting a buyer in X to
an item not in X, or a non-matching edge connecting an item in X to a buyer not in X.
The only item that became more attractive was item i, so for a matching edge to leave the
preferred-seller graph, it must be that some buyer k other than j, who used to be matched to
an item h, drops its edge to h because it now strictly prefers i. This situation is pictured in
Figure 15.14. Now, since is price was only reduced by 1, and since all prices and valuations
are whole numbers, if k now strictly prefers i to h after the price reduction, it must have
formerly viewed them as tied. But this means that before the reduction in is price, k had a
preferred-seller edge to i. Since k was matched to h, this k-i edge would be a non-matching
edge in the preferred-seller graph, which is not possible since is only edge in the preferred-
seller graph was its matching edge to j. This completes the chain of conclusions we need:
no matching edge can leave the preferred-seller graph when is price is reduced by 1, so the
reduced prices are still market-clearing, and this contradicts the assumption that we had
474 CHAPTER 15. SPONSORED SEARCH MARKETS
......
e n
Figure 15.16: We can reduce the prices of all items in X by 1 and still retain the market-
clearing property: as we argue in the text, the only way this can fail is if some matching
edge connects a buyer in X to an item not in X, or some non-matching edge connects an
item in X to a buyer not in X. Either of these possibilities would contradict the facts in
Figure 15.15.
A Proof of Fact 1. The argument above is the key to proving Fact 1; for the complete
proof, we need to move from simply showing the existence of a non-matching edge out of i
to a full alternating path, beginning with such an edge, all the way to a zero-priced item.
To do this, we start at the item i, and we consider the set X of all nodes in the bipartite
graph (both items and buyers) that can be reached from i, using an alternating path that
begins with a non-matching edge. Here are two simple observations about the set X.
(a) For any buyer k who is in X, the item h to which she is matched is also in X. Fig-
ure 15.15 helps make clear why this must be true. The alternating path that reached
k from i must have ended on a non-matching edge, so by adding the matching edge to
h to the end of this path, we see that h must also be in X.
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY475
(b) For any item h that is in X, and any buyer m connected to h by a non-matching edge
in the preferred-seller graph, the buyer m must also be in X. This is a direct companion
to the previous fact, and also illustrated by Figure15.15: the alternating path that
reached h from i must have ended on a matching edge, so by adding the non-matching
edge to m to the end of this path, we see that m must also be in X.
If this set X contains an item of price 0, we are done: we have the path we want. If
this set X doesnt contains an item of price 0, then we complete the proof using the same
price-reduction idea we saw earlier, in our warm-up to the proof of Fact 1: in this case, we
will reduce the price of each item in X by 1, show that the resulting prices are still market-
clearing, and thereby contradict our assumption that we had the minimum market-clearing
prices. It will follow that X must contain a zero-priced item.
Here is the main thing we need to show.
Suppose we reduce the price of each item in X by 1. Then all matching edges
that were in the preferred-seller graph before the price reduction remain in the
preferred-seller graph after the price reduction.
The argument is essentially the same as the one we used earlier, when we were reducing the
price of just item i. We ask: how could a matching edge leave the preferred-seller graph after
the reduction? Figure 15.16 shows what must happen for this to be possible: a buyer n was
formerly matched to an item e, and now some other item f has strictly higher payoff after
the price reduction. Since all valuations, prices, and payoffs are whole numbers, and no price
changed by more than 1, it must be that e and f used to be tied for the highest payoff to n
(so n had edges to both of them in the preferred-seller graph before the reduction) and f is
in the set X while e is not (so f had its price reduced while es price remained the same).
Now we get a contradiction to one of our basic observations (a) and (b) about the set X:
Since n was matched to e, and e is not in X, observation (a) says that n must not be in X;
but since n was not matched to f , and f is in X, observation (b) says that n must be in X.
This contradiction n must both be in X and not be in X shows that no matching edge
can leave the preferred-seller graph after the price reduction. And this in turn establishes
that the reduced prices are still market-clearing after the price-reduction, contradicting our
assumption that they were the minimum market-clearing prices.
This concludes the proof, and if we look back at how it worked, we can see that it bears
out our intuition for how the non-matching edges serve to anchor all the items via alternating
paths to the items of price 0. Specifically, if this anchoring did not happen, then there would
be a set X that was floating free of any connections to zero-priced items, and in this case
the prices of all items in X could be pushed further downward. This cant happen if the
market-clearing prices are already as low as possible.
476 CHAPTER 15. SPONSORED SEARCH MARKETS
i j
h k
i* m
Figure 15.17: The first step in analyzing the market with j zeroed out: find an alternating
path from item i to which buyer j was matched in the original market to a zero-priced
item i .
A Proof of Fact 2. To prove Fact 2, we start with a matching market with minimum
market-clearing prices p, and we consider the preferred-seller graph for these prices. Now,
suppose that we zero out a buyer j, but keep the prices the same. The resulting preferred-
seller graph is now different, but wed like to show that it still contains a perfect matching.
How does the preferred-seller graph change when we zero out j, keeping the prices fixed?
For buyers other than j, their edges remain the same, since they have the same valuations
and observe the same prices. For j, on the other hand, the zero-priced items are now the
only items that give her a non-negative payoff, so her edges in the preferred-seller graph now
go to precisely this set of zero-priced items. Notice, for example, that this is what happens
to the preferred-seller graph as we move from Figure 15.11 to Figure 15.13: the zeroed-out
buyer x has its preferred-seller edge shift from item b to the zero-priced item d.
Because we know that the preferred-seller graph in the original market has the structure
guaranteed by Fact 1, we can view this change to the preferred-seller graph in the way
suggested by Figures 15.17 and 15.18. Before zeroing out j, when it is matched to some item
i, there is an alternating path in the preferred-seller graph, beginning with a non-matching
edge, from i to a zero-priced item i . After zeroing out j, there is a preferred-seller edge
15.9. ADVANCED MATERIAL: VCG PRICES AND THE MARKET-CLEARING PROPERTY477
i j
h k
i* m
Figure 15.18: The second step in analyzing the market with j zeroed out: build the new
preferred-seller graph by rewiring js preferred-seller edges to point to the zero-priced items.
i j
h k
i* m
Figure 15.19: The third and final step in analyzing the market with j zeroed out: observe
that the rewired preferred-seller graph still contains a perfect matching, in which j is now
paired with i .
constructed, and let k be any buyer other than j. Either k gets the same item she had in
the perfect matching for the original market, in which case she gets the same payoff or
else k shifts from one item to another along the alternating path. In this latter case, since
k had edges to both of these items in the preferred-seller graph of the original market, she
receives the same payoff from each of them, and so again ks payoff remains the same. This
completes the proof of Fact 2, and hence fills in the final details needed to complete the
proof of the overall claim.
15.10 Exercises
1. Suppose a search engine has two ad slots that it can sell. Slot a has a clickthrough
rate of 10 and slot b has a clickthrough rate of 5. There are three advertisers who are
interested in these slots. Advertiser x values clicks at 3 per click, advertiser y values
clicks at 2 per click, and advertiser z values clicks at 1 per click.
Compute the socially optimal allocation and the VCG prices for it. Give a brief
15.10. EXERCISES 479
2. Suppose a search engine has three ad slots that it can sell. Slot a has a clickthrough
rate of 6, slot b has a clickthrough rate of 5 and slot c has a clickthrough rate of 1.
There are three advertisers who are interested in these slots. Advertiser x values clicks
at 4 per click, advertiser y values clicks at 2 per click, and advertiser z values clicks at
1 per click. Compute the socially optimal allocation and the VCG prices for it. Give
a brief explanation for your answer.
3. Suppose a search engine has three ad slots that it can sell. Slot a has a clickthrough
rate of 5, slot b has a clickthrough rate of 2, and slot c has a clickthrough rate of 1.
There are three advertisers who are interested in these slots. Advertiser x values clicks
at 3 per click, advertiser y values clicks at 2 per click, and advertiser z values clicks at
1 per click.
Compute the socially optimal allocation and the VCG prices for it. Give a brief
explanation for your answer.
4. Suppose a search engine has two ad slots that it can sell. Slot a has a clickthrough
rate of 4 and slot b has a clickthrough rate of 3. There are three advertisers who are
interested in these slots. Advertiser x values clicks at 4 per click, advertiser y values
clicks at 3 per click, and advertiser z values clicks at 1 per click.
(a) Suppose that the search engine runs the VCG Procedure to allocate slots. What
assignment of slots will occur and what prices will the advertisers pay? Give an expla-
nation for your answer.
(b) Now the search engine is considering the creation of a third ad slot which will have
a clickthrough rate of 2. Lets call this new ad slot c. Suppose that search engine does
create this slot and again uses the VCG Procedure to allocate slots. What assignment
of slots will occur and what prices will the advertisers pay? Give an explanation for
your answer.
(c) What revenue will the search engine receive from the VCG Procedure in parts (a)
and (b)? If you were running the search engine, given this set of advertisers and slots,
and could choose whether to create slot c or not, what would you do? Why? (In
answering this question assume that you have to use the VCG Procedure to allocate
any slots you create.)
5. Suppose a search engine has two ad slots that it can sell. Slot a has a clickthrough
rate of 12 and slot b has a clickthrough rate of 5. There are two advertisers who are
480 CHAPTER 15. SPONSORED SEARCH MARKETS
interested in these slots. Advertiser x values clicks at 5 per click and advertiser y values
clicks at 4 per click.
(a) Compute the socially optimal allocation and the VCG prices for it.
(b) Suppose the search engine decides not to sell slot b. Instead, it sells only slot a
using a sealed-bid, second-price auction. What bids will the advertisers submit for slot
a, who will win, and what price will they pay?
(c) Which of these two possible procedures (a) and (b) generate the greater revenue
for the search engine? By how much?
(d) Now lets see if the result in part (c) is general or not. That is, does it depend
on the clickthrough rates and values? Let there be two slots and two advertisers; let
the clickthrough rates be ra for slot a and rb for slot b, with ra > rb > 0; and let the
advertisers values be vx and vy , with vx > vy > 0. Can you determine which of the
two procedures generates the greater revenue for the search engine? Explain.
6. Chapter 15 discusses the relationship between the VCG Principle and second price
auctions. In particular, we saw that the VCG Principle is a generalization of the idea
behind second price auctions to a setting in which there is more than one object being
sold. In this problem we will explore this relationship in an example. Suppose that a
seller has one item, which well call item x. There are three buyers, whom well call a,
b, and c. The values that these buyers (a, b, and c) have for the item are 6, 3, and 1,
respectively.
(a) Suppose that the seller runs a second price auction for the item. Which buyer will
win the auction and how much will this buyer pay?
(b) Now lets suppose that the seller uses the VCG procedure to allocate the item.
Remember that the first step in the running the VCG procedure when there are more
buyers than items is to create fictional items, which each buyer values at 0, so that the
number of items to be allocated is the same as the number of bidders. Lets call these
additional (fictional) items y and z. Find the allocation that results from running the
VCG procedure. What are the prices charged to each buyer for the item that they
receive? Explain why the price that buyer a pays is the harm that he causes to the
remaining bidders by taking the item he is assigned.
16
Haemophilus influenzae
type b (Hib)
H. INFLUENZAE meningitis notifiable (except in scotland)
the disease
Haemophilus influenzae can cause serious invasive disease, especially in
young children. Invasive disease is usually caused by encapsulated strains of
the organism. Six typeable capsular serotypes (af) are known to cause
disease; non-typeable encapsulated strains can occasionally cause invasive
disease. Before the introduction of vaccination, type b (Hib) was the prevalent
strain. The proportion of typeable to non-typeable strains depends largely on
the prevalence of the type b strain. Non-encapsulated strains are mainly
associated with respiratory infections such as exacerbation of chronic bronchitis
Haemophilus
march 2011
The most common presentation of invasive Hib disease is meningitis, frequently
accompanied by bacteraemia. This presentation accounts for approximately
60% of all cases (Anderson et al., 1995). Fifteen per cent of cases present with
epiglottitis, a potentially dangerous condition that presents with airway
obstruction. Bacteraemia, without any other concomitant infection, occurs in
10% of cases. The remainder is made up of cases of septic arthritis,
osteomyelitis, cellulitis, pneumonia and pericarditis. The sequelae following
Hib meningitis may include deafness, seizures, and intellectual impairment. In
studies conducted in Wales and Oxford, 8 to 11% had permanent neurological
sequelae (Howard et al., 1991; Tudor-Williams et al., 1989). The case fatality
rate from Hib meningitis is 45%.
Individuals can carry Hib bacteria in their nose and throat without showing
signs of the disease. Before Hib vaccine was introduced, about four in every
100 pre-school children carried the Hib organism; after the vaccine was
introduced, carriage rates fell below the level of detection (McVernon et al.,
2004). Hib is spread through coughing, sneezing or close contact with a
carrier or an infected person.
127
The efficacy and safety of the conjugate Hib vaccines have been demonstrated
Haemophilus
in large field trials in Finland, the United States and in the UK, where
march 2011
efficacy ranged from 83 to 100% (Black et al., 1991a; Black et al., 1991b;
Eskola et al., 1990). Studies comparing different vaccines, using the present
UK primary schedule, have shown that 90 to 99% of children developed protective
levels of antibodies following three doses of vaccine (Booy et al., 1994). Cases
of invasive disease in fully vaccinated children (vaccine failures) have been
reported from some countries, including the UK (Heath and McVernon,
2002). A small proportion of such cases have underlying conditions, such as
immunoglobulin deficiency, predisposing the child to vaccine failure.
Since the introduction of Hib immunisation in the UK, disease incidence has
fallen (see Figure 16.1). In 1998, only 21 cases of invasive Hib were reported
in England and Wales in children under five years of age (0.65 per 100,000)
compared with 803 in 1991 (20.5 per 100,000). In infants under one year of
age, the highest risk age group for disease, reported cases fell by over 95%
(from 300 to 7). Notifications of H. influenzae meningitis for the same period
declined from 485 to 29. In 1998, coverage by the second birthday was 95%.
128
1,000
Hib vaccine introduced
900
800
300
200
100
0
1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005
Year
Figure 16.1 Laboratory reports of Hib disease in England and Wales (19902005)
From 1999, there was a small but gradual increase in the number of cases of
Haemophilus
march 2011
(McVernon et al., 2003). Reasons for this increase in vaccine failures are
thought to include an effect of the DTaP/Hib combination vaccine which was
in use at that time and a waning of the impact of the catch-up programme
when the vaccine was introduced. In this latter group, who were immunised
at an older age, the efficacy was higher than in children vaccinated routinely
as infants.
In 2003, a booster campaign was implemented with call-back of children aged
six months to four years (Chief Medical Officer et al., 2004). Following the
campaign, cases have begun to return to the low levels achieved previously (see
Figure 16.1). In 2006, following studies that showed that protection against
Hib waned during the second year of life (Trotter et al., 2003), a booster dose
(combined with MenC as Hib/MenC) was introduced.
storage
Haemophilus
march 2011
presentation
Hib vaccines are available as part of combined products DTaP/IPV/Hib or
Hib/MenC. The combined product, DTaP/IPV/Hib is supplied as a cloudy
white suspension either in a single dose ampoule or pre-filled syringe. The
suspension may sediment during storage and should be shaken to distribute
the suspension uniformly before administration.
Hib/MenC is supplied as a vial of white powder and 0.5ml of solvent in a
pre-filled syringe. The vaccine must be reconstituted by adding the entire
contents of the pre-filled syringe to the vial containing the powder. After
130
addition of the solvent, the mixture should be shaken well until the powder is
completely dissolved. After reconstitution, the vaccine should be administered
promptly, or allowed to stand between +2C and +8C and used within 24 hours.
administration
Vaccines are routinely given intramuscularly into the upper arm or anterolateral
Haemophilus
march 2011
and Deeks, 2000; Zuckerman, 2000). However, for individuals with a
bleeding disorder, vaccines should be given by deep subcutaneous injection to
reduce the risk of bleeding.
Hib-containing vaccines can be given at the same time as other vaccines such
as MMR, MenC, hepatitis B, and pneumococcal. The vaccines should be
given at a separate site, preferably in a different limb. If given in the same
limb, they should be given at least 2.5cm apart (American Academy of
Pediatrics, 2003). The site at which each vaccine was given should be noted
in the patients records.
disposal
Equipment used for vaccination, including used vials or ampoules, should be
disposed of at the end of a session by sealing in a proper, puncture-resistant
sharps box (UN-approved, BS 7320).
131
primary immunisation
infants and children under ten years of age
The primary course of Hib vaccination in infants consists of three doses of a
Hib-containing product with an interval of one month between each dose.
DTaP/IPV/Hib is recommended for all children from two months up to ten
years of age. Although one dose of Hib vaccine is effective from one year of
age, three doses of DTaP/IPV/Hib should be given to children who have either
not been immunised or who have not completed a primary course, in order to
be fully protected against diphtheria, tetanus, pertussis and polio. If the
primary course is interrupted it should be resumed but not repeated, allowing
an interval of one month between the remaining doses.
influenzae type b (Hib)
Children of one to ten years of age who have completed a primary course of
Haemophilus
march 2011
diphtheria, tetanus, pertussis and polio but have not received Hib-containing
vaccines, should receive a single dose of Hib/MenC vaccine.
Reinforcing immunisation
A reinforcing (booster) dose of Hib/MenC is recommended at 12 months for
children who have received a complete primary course of three Hib-containing
vaccine injections. The Hib/MenC vaccine can be given at the same time as the
pneumococcal conjugate and MMR vaccines.
132
Haemophilus
history. For the full list of immunisations for these groups, see Table 7.1 in
march 2011
chapter 7.
133
contraindications
There are very few individuals who cannot receive Hib-containing vaccines.
Where there is doubt, appropriate advice should be sought from a consultant
paediatrician, immunisation co-ordinator or consultant in communicable
influenzae type b (Hib)
march 2011
Confirmed anaphylaxis occurs extremely rarely. Data from the UK, Canada
and the US point to rates of 0.65 to 3 anaphylaxis events per million doses of
vaccine given (Bohlke et al., 2003; Canadian Medical Association, 2002).
Other allergic conditions may occur more commonly and are not
contraindications to further immunisation. A careful history of the event will
often distinguish between anaphylaxis and other events that are either not due
to the vaccine or are not life-threatening. In the latter circumstance, it may be
possible to continue the immunisation course. Specialist advice must be
sought on the vaccines and circumstances in which they could be given. The
risk to the individual of not being immunised must be taken into account.
134
precautions
Minor illnesses without fever or systemic upset are not valid reasons to
postpone immunisation. If an individual is acutely unwell, immunisation may
be postponed until they have recovered. This is to avoid confusing the
differential diagnosis of any acute illness by wrongly attributing any signs or
symptoms to the adverse effects of the vaccine.
Haemophilus
Canada (Le Saux et al., 2003) and their experience suggests that further doses
march 2011
were not associated with recurrence or worsening of the preceding events
(S Halperin and R Pless, pers. comm., 2003).
premature infants
It is important that premature infants have their immunisations at the
appropriate chronological age, according to the schedule. The occurrence of
apnoea following vaccination is especially increased in infants who were born
very prematurely.
Very premature infants (born 28 weeks of gestation) who are in hospital
should have respiratory monitoring for 48-72 hrs when given their first
immunisation, particularly those with a previous history of respiratory
immaturity. If the child has apnoea, bradycardia or desaturations after the first
135
neurological conditions
influenzae type b (Hib)
136
Evidence of a neurological
abnormality prior to immunisation
Yes No
Defer immunisation.
Immunise as normal Consider referral to
paediatrician or paediatric
neurologist
Haemophilus
march 2011
Defer and immunise
Immunise as normal once the condition has
stabilised
Seizures associated with fever are rare in the first six months of life and most
common in the second year of life. After this age, the frequency falls and they
are rare after five years of age.
When a child has had a seizure associated with fever in the past, with no
evidence of neurological deterioration, immunisation should proceed as
recommended. Advice on the prevention and management of fever should be
given before immunisation.
137
When a child has had a seizure that is not associated with fever, and there is
no evidence of neurological deterioration, immunisation should proceed as
recommended. When immunised with DTP vaccine, children with a family
or personal history of seizures had no significant adverse events and their
developmental progress was normal (Ramsay et al., 1994).
neurological abnormalities following immunisation
If a child experiences encephalopathy or encephalitis within seven days of
immunisation, the advice in the flow chart in Figure 16.3 should be followed.
It is unlikely that these conditions will have been caused by the vaccine and
should be investigated by a specialist. Immunisation should be deferred in
children where no underlying cause is found and the child does not recover
completely within seven days, until the condition has stabilised. If a cause is
identified or the child recovers within seven days, immunisation should
proceed as recommended.
If a seizure associated with a fever occurs within 72 hours of an immunisation,
further immunisation should be deferred until the condition is stable if no
underlying cause has been found and the child does not recover completely
within 24 hours. If a cause is identified or the child recovers within 24 hours,
immunisation should continue as recommended.
influenzae type b (Hib)
deferral of immunisation
Haemophilus
march 2011
adverse reactions
Pain, swelling or redness at the injection site are common and may occur more
frequently following subsequent doses. A small, painless nodule may form at
the injection site; this usually disappears and is of no consequence. The incidence
of local reactions is lower with tetanus vaccines combined with acellular
pertussis vaccines than with whole-cell pertussis vaccines, and similar to that
after diphtheria (DT) vaccine (Miller, 1999; Tozzi and Olin, 1997).
Fever, convulsions, high-pitched screaming, and episodes of pallor, cyanosis
and limpness (HHE) occur with equal frequency after both DTaP and DT
vaccines (Tozzi and Olin, 1997).
138
Yes No
Yes No
Haemophilus
fully investigate
march 2011
Immunise once the
condition
has stabilised
Confirmed anaphylaxis occurs extremely rarely. Data from the UK, Canada
and the US point to rates of 0.65 to 3 anaphylaxis events per million doses of
vaccine given (Bohlke et al., 2003; Canadian Medical Association, 2002).
Other allergic conditions may occur more commonly and are not
contraindications to further immunisation.
Hib/menc conjugate vaccine
Mild side effects such as irritability, loss of appetite, pain, swelling, redness
at the site of the injection and slightly raised temperature commonly occur.
139
march 2011
Where there is any individual in the household of a case who is also at risk, the
index case and all household contacts should be given rifampicin prophylaxis.
Those at risk in the household include all children under ten years of age and
vulnerable individuals of any age (e.g. those who are immunosuppressed or
asplenic) regardless of their immunisation status. The purpose of this
recommendation is to prevent transmission of Hib to vulnerable individuals
within a household. Further information is available at:
140
www.hpa.org.uk/Topics/InfectiousDiseases/InfectionsAZ/Haemophilus
InfluenzaeTypeB/Guidance/
Vaccines
Pediacel (diphtheria/tetanus/5-component acellular pertussis/inactivated
polio vaccine/H. influenzae type b (DTaP/IPV/Hib) manufactured by
Sanofi Pasteur MSD.
Menitorix (Hib/MenC) manufactured by GlaxoSmithKline.
These vaccines are supplied by Healthcare Logistics (Tel: 0870 871 1890) as
part of the national childhood immunisation programme.
Haemophilus
centres. Details of these are available from Scottish Healthcare Supplies
march 2011
(Tel: 0141 282 2240).
References
American Academy of Pediatrics (2003) Active immunization. In: Pickering LK (ed.) Red
Book: 2003 Report of the Committee on Infectious Diseases, 26th edition. Elk Grove
Village, IL: American Academy of Pediatrics, p 33.
Anderson EC, Begg NT, Crawshaw SC et al. (1995) Epidemiology of invasive
Haemophilus influenzae infections in England and Wales in the pre-vaccination era
(19902). Epidemiol Infect 115: 89100.
British HIV Association (2006) Immunisation guidelines for HIV-infected adults:
www.bhiva.org/pdf/2006/Immunisation506.pdf.
Black SB, Shinefield HR, Fireman B et al. (1991a) Efficacy in infancy of oligosaccharide
conjugate Haemophilus influenzae type b (HbOC) vaccine in a United States population
of 61,080 children. Pediatr Infect Dis J 10: 97104.
Black SB, Shinefield H, Lampert D et al. (1991b) Safety and immunogenicity of oligosac
charide conjugate Haemophilus influenzae type b (HbOC) vaccine in infancy. Pediatr
Infect Dis J 10: 2.
141
Bohlke K, Davis RL, Marcy SH et al. (2003) Risk of anaphylaxis after vaccination of
children and adolescents. Pediatrics 112: 81520.
Booy R, Hodgson S, Carpenter L et al. (1994) Efficacy of Haemophilus influenzae type
b conjugate vaccine PRP-T. Lancet 344 (8919): 3626.
Canadian Medical Association (1998) Pertussis vaccine. In: Canadian Immunization
Guide. 5th edition. Canadian Medical Association, p 133.
Canadian Medical Association (2002) General considerations. In: Canadian Immunization
Guide, 6th edition. Canadian Medical Association, p 14.
Chief Medical Officer, Chief Nursing Officer and Chief Pharmaceutical Officer
(2004) Planned Hib vaccination catch-up campaign further information. www.dh.gov.
uk/ cmo/letters/cmo0302.htm
Department of Health (2001) Health information for overseas travel, 2nd edition. London:
The Stationery Office.
Diggle L and Deeks J (2000) Effect of needle length on incidence of local reactions
to routine immunisation in infants aged 4 months: randomised controlled trial. BMJ
321: 9313.
Eskola J, Kayhty H, Takala AK et al. (1990) A randomised, prospective field trial of a
conjugate vaccine in the protection of infants and young children against invasive
Haemophilus influenzae type b disease. NEJM 323 (20): 13817.
influenzae type b (Hib)
Heath PT and McVernon J (2002) The UK Hib vaccine experience. Arch Dis Child
86:3969.
Haemophilus
march 2011
Howard AJ, Dunkin KT, Musser JM and Palmer SR (1991) Epidemiology of Haemophilus
influenzae type b invasive disease in Wales. BMJ 303: 4415.
Klein NP, Massolo ML, Greene J et al. (2008) Risk factors for developing apnea after
immunization in the neonatal intensive care unit. Pediatrics 121(3): 463-9.
McVernon J, Andrews N, Slack MPE and Ramsay ME (2003) Risk of vaccine failure after
Haemophilus influenzae type b (Hib) combination vaccines with acellular pertussis.
Lancet 361: 15213.
McVernon J, Howard AJ, Slack MP and Ramsay ME (2004) Long-term impact of
vaccination on Haemophilus influenzae type b (Hib) carriage in the United Kingdom.
Epidemiol Infect 132 (4): 7657.
Mark A, Carlsson RM and Granstrom M (1999) Subcutaneous versus intramuscular
injection for booster DT vaccination in adolescents. Vaccine 17: 206772
Miller E (1999) Overview of recent clinical trials of acellular pertussis vaccines.
Biologicals 27: 7986.
Miller E, Southern J, Kitchin N et al. (2003) Interaction between different meningococcal
C conjugate vaccines and the Hib component of concomitantly administered diphtheria/
tetanus/pertussis/Hib vaccines with either whole-cell or acellular pertussis
142
antigens. 21st Annual Meeting of the European Society for Paediatric Infectious
Diseases, Sicily.
Ohlsson A and Lacy JB (2004) Intravenous immunoglobulin for preventing infection in
preterm and/or low-birth-weight infants. Cochrane Database Syst Rev(1): CD000361.
Pfister RE, Aeschbach V, Niksic-Stuber V et al. (2004) Safety of DTaP-based combined
immunization in very-low-birth-weight premature infants: frequent but mostly benign
cardiorespiratory events. J Pediatr 145(1): 58-66.
Plotkin SA and Orenstein WA (eds) (2004) Vaccines, 4th edition. Philadelphia: WB
Saunders Company, Chapter 8.
Pourcyrous M, Korones SB, Arheart KL et al. (2007) Primary immunization of premature
infants with gestational age <35 weeks: cardiorespiratory complications and C-reactive
protein responses associated with administration of single and multiple separate vaccines
simultaneously. J Pediatr 151(2): 167-72.
Ramsay M, Begg N, Holland B and Dalphinis J (1994) Pertussis immunisation in children
with a family or personal history of convulsions: a review of children referred for specialist
advice. Health Trends 26: 234.
Le Saux N, Barrowman NJ, Moore D et al. (2003) Canadian Paediatric Society/Health
Canada Immunization Monitoring Program Active (IMPACT). Decrease in hospital
admissions for febrile seizures and reports of hypotonic-hyporesponsive episodes presenting
to hospital emergency departments since switching to acellular pertussis vaccine in
Canada: a report from IMPACT. Pediatrics 112 (5): e348.
Schulzke S, Heininger U, Lucking-Famira M et al. (2005 ) Apnoea and bradycardia in
preterm infants following immunisation with pentavalent or hexavalent vaccines. Eur J
Pediatr 164(7): 432-5.
Tozzi AE and Olin P (1997) Common side effects in the Italian and Stockholm 1 Trials.
Dev Biol Stand 89: 1058.
Trotter CL, Ramsay ME and Slack MPE (2003) Rising incidence of Haemophilus influenzae
type b disease in England and Wales indicates a need for a second catch-up vaccination
campaign. Commun Dis Public Health 6: 558.
Tudor-Williams G, Frankland J, Isaacs D et al. (1989) Haemophilus influenzae type b
disease in the Oxford region. Arch Dis Child 64: 51719.
Zuckerman JN (2000) The importance of injecting vaccines into muscle. BMJ
321: 12378.
143
80238bindex.qxd:WileyRed 7/11/07 7:42 AM Page 705
Index
NUMERICS arrays, 12
0day, definition, 4 ASCII, converting to Unicode,
0day kernel vulnerabilities, Unix, 210211
636642 ASCII Venetian implementation,
214217
A ASLR (Address Space Layout
AAAS (ASCII Armored Address Randomization), 313, 396399
Space), 394395 asm( ) statements, 132
abusing frame-based exception assembler references, 430
handlers, 161166 assembly language, 6
existing handlers, 162164 C code constructs, 710
alphanumeric filters, exploits, C++ code constructs, 710
writing, 205209 registers and, 6
application layer attacks, database asymmetry, problems, 511512
software, 618619 attack detection, bypassing
arbitrary free vulnerabilities, 271 alternate encodings, 514
arbitrary size overflow, stack attack signatures, 517
overflows, 232233 file-handling features, 515517
architectural failures length limitations, 517520
asymmetry and, 511512 stripping bad data, 513514
authentication and, 512 auditing binaries. See binary
authorization and, 512 auditing
boundaries and, 508509 auditing source code
data translation and, 509511 automated analysis tools, 484
archives, paper, 438
705
80238bindex.qxd:WileyRed 7/11/07 7:42 AM Page 706
706 Index AC
Index CD 707
708 Index DE
Index EG 709
710 Index GI
Index KN 711
K Linux
kernel, Unix protections
exec_ibcs2_coff_prep_zmagic( ) ASLR, 418419
vulnerability, 647652 heap, 420
breakpoints, calculating, 652654 stack data, 419420
execution, redirecting, 654655 W^X, 417418
kernel mode payload, 658665 Windows comparison, 111114
offsets, calculating, 652654 loop constructs, 490
process descriptor, 655658 ltrace (Unix), 434
return address, overwriting,
654655
root, 665672 M
overflows malloc, 89
0day kernel vulnerabilities, memory, Cisco IOS, 343344
636642 memory management, modem, 4
vulnerability types, 627636 Microsoft toolchain, debugging and,
Solaris vfs_getvfssw( ), 642344, 124
672678 modeling network protocols, 469
kernel, Windows SPIKE, 472480
introduction, 682683 modem, memory management, 4
kernel-mode payloads, 695 mount( ) system call, 645646
rootkit, 703 MyExceptionHandler function, 158
security, subverting, 701703 MySQL, 1-bit patch, 578580
user-mode payload, 699701
user-mode processes, 696698
mode flaws, 681682 N
programming flaws, 683684 NASM (Netwide Assembler), 431
heap overflows, 688 NetCat, 434
repurposing attacks, 689 Network IDS (Intrusion Detection
shared object attacks, 689 System), 279
stack overflows, 684687 network layer attacks, database
user-mode addresses, insufficient software, 608618
validation, 688689 network related shellcode, 599
KiUserExceptionDispatcher networks, protocols, modeling, 469
function, 161 NEXTSTEP, OS X and, 314
NGS (Next Generation Security
L Software), 504
lazy binding, 280 non-executable stacks
LIFO (last in first out), 5 exploiting, 197202
linking Return to libc, 3538
dynamic, 279 non-null termination issues, 492
unsafe unlinking, 402
80238bindex.qxd:WileyRed 7/11/07 7:42 AM Page 712
712 Index NP
Index PS 713
714 Index S
Index ST 715
716 Index TV
V
U variables
UltraSPARC processors, 224 local, placement, 168
unhandled exception filter, uninitialized variable usage,
overwrite pointer to, 185191 499500
Unhandled Exception Filter Vectored Exception Handling, 123,
mechanism, 185 181
UnhandledExceptionFilter function, Venetion technique, 213217
168 ASCII implementation, 214217
Unicode, 210 versioning, 598599
converting from ASCII, 210211 Visual C++, 431
decoder, 218221 vtables, 562563
exploits, instruction set, 212213 vulnerabilities
Unicode filters, exploits, writing, arbitrary free, 271
209211 binary
Unicode-based vulnerabilities, IIS WebDAV, 568570
exploiting, 211213 LSDs RPC-DCOM, 567568
uninitialized variable usage, 499500 Microsoft SQL Server bugs,
Unix 566567
fstat (BSD), 435 Cisco IOS, 346347
kernel, command-line interface, 348
exec_ibcs2_coff_prep_zmagic( ) protocol parsing code, 347
vulnerability, 647672 security, 347348
kernel overflows services, router, 347
0day kernel vulnerabilities, definition, 4
636642 different-sized integer conversions,
vulnerability types, 627636 497498
ltrace, 434 double free, 270, 498
OS X and, 315316 extinct bug classes, 487
80238bindex.qxd:WileyRed 7/11/07 7:42 AM Page 717
Index VW 717
718 Index WX