Wednesday, October 16, 2019
Capstone PROJECT Article Example | Topics and Well Written Essays - 500 words
Capstone PROJECT - Article Example Martin Luther King was one of the major champions of great principle, laboring and sacrificed his life to advance the cause the equal rights for all individuals within United States of America (Bloom & Blake Web). Various people have discussed about the American dream but so far it has never been achieved Short documentary film to be created by own cinematic masterpiece in a showcase (Crosby et al Web). My opinion and belief on the American dream is that it will one day be achieved (Gibson &Mark Web). The impact of achieving the American dream will provides the people of American the first chance to job opportunities. The objectives should reflect the past and present beliefs, values and experiences. Further, the objectives try to demonstrate the thoughtful consideration of rhetorical choices to achieve the purpose (Kopple Web). To admire the political rights to all including the Republic and Democrats, the leaders elected are supposed to be committed. However, it helps in gaining a proper critical distance while considering the Kingââ¬â¢s advice (Mailer Web). The King suggested people to love their enemies in order to foster the development and continuity of the people within the United States. The project will have a professional quality workmanship. This can be achieved through proper working skills in collecting the necessary informationââ¬â¢s (Newlin Web). Further, the parameter should contain a meaningful and purposeful chosen text track that can provides understandable and content of the American Dream (Ramsay Web). While using the while using visuals and audios, both should have an open meaning to allow quick understanding to the people of the United States. The process of projects varies with the choice of the researcher. However, the process used should have maximum provision of evidence and facts to all individuals (Obama Web). Use of the photographs is always preferred since it always tries to provide facts and is durable.
Tuesday, October 15, 2019
Arab spring Annotated Bibliography Example | Topics and Well Written Essays - 500 words
Arab spring - Annotated Bibliography Example The authors argue that todays students require an altogether different training than the students who preceded them. They say that the 21st Century education is of low standard, The article analyse a person desires yearnings, academics, disposition, values, convictions, social life, attitude and governmental issues, this book paints a faultless representation of todays people. The book offers advice on how to handle current students. The authors of the article Tarek al-Tayeb Mohamed Bouazizi, a Tunisian road seller who sets himself ablaze on 17 December 2010, in challenge of the appropriation of his wares and the badgering and mortification that he reported was delivered on him by a metropolitan authority and her helpers. His protest turned into an impetus for the Tunisian Revolution and the more extensive Arab Spring, actuating shows and mobs all around Tunisia in dissent of social and political issues in the nation. General societys resentment and roughness strengthened emulating Bouazizis passing, heading then-President Zine El Abidine Ben Ali to venture down on 14 January 2011, following 23 years in power. This source was useful because it inspired protests in several other Arab countries, plus several non-Arab countries. The young Tunisian man acts as a role model in fight for human rights and freedoms. According to this article The Worlds Muslims: Unity and Diversity, Pew Forum estimates that 87-90% of the worldââ¬â¢s Muslims are Sunnis, while 10-13% are Shias. This new study of Muslims by Pew explores the religious practices and beliefs of the worldââ¬â¢s 1.6 billion Muslims. While there is broad agreement on core tenets of Islam, the study also finds that Muslims differs significantly on the importance of religion in their lives and on the groups and practices they accept as part of Islam. The survey was conducted in 39 countries or territories with substantial Muslim populations and
Verbal Abuse against Children Essay Example for Free
Verbal Abuse against Children Essay Verbal abuse is increasingly being recognized for its negative effects (Visaing, Straus, Gelles, Harrop, p. 223-238). Subjecting children to the victimization of their mothers is a severe form of psychological maltreatment. Despite the parents attempts to shield the children from adult violence, most children witness some violence against their mothers and are likely to at least hear the violence (Phillips, Lukens, Casriel, p. 111-121). Hiding in their bedrooms out of fear, the children may hear repeated threats of injury, verbal assaults on their mothers character, objects hurled across the room, suicide attempts, beatings, and threats to kill (Rosenberg, p. 85-89). Such exposure arouses a mixture of intense feelings in the children that include fear that the mother will be killed, guilt that they could not stop the violence, divided loyalties, and anger at the mother for not leaving (James Madison University, Center for Child Abuse Education, p. 114). Even a single episode of violence can produce posttraumatic stress disorder in the children (Stullman, Schoenenberger, Hanks, p. 32). Thus, the father who batters is at risk for emotionally traumatizing the children because he already has a history of doing so. The immediate problems of the children can be divided into two broad categories: (1) internalized problems such as withdrawn or anxious behavior and (2) externalized problems such as aggressive and delinquent behaviors. Some children show both types. In one study three-fourths of the children of battered women exhibited clinically significant behavioral problems, compared with only 13 percent of those in a control group (Jaffe, Wolfe, Wilson, Zak, p. 142-146). The impact on behavior may be greatest for children who are exposed to the most conflict between the parents and are treated punitively. The effects may differ by gender, but the findings are not consistent (for example, Davis Carlson, p. 278-291). The children may also develop hearing, speech, and learning difficulties (Penfold, p. 108-114). Teenage children may turn to alcohol and drug use. The ability of the children to solve social problems is also impaired. The children tend to do poorly on measures testing their understanding of social situations and the thoughts and feelings of others and are less able to deal with an emergency (Jaffe et al. , p. 45). Exposure to violence is likely to teach male children how to be abusive throughout their lives, thus contributing to the intergenerational transmission of violence. Factors That May Affect Risk of Abuse Besides knowing which parent is most at risk for physically or emotionally abusing their children, there may be important factors that raise or lower the level of risk, including parental separation and parents traumas, psychological profiles, and participation in treatment. Parental Separation Many men who batter cling to the marital relationship after separation and continue to harass and physically abuse their partners. Some wives are killed during separation in the context of custody disputes or visitation (Saunders Browne, p. 379-402). An abuser may try to control his partner by having the children act as spies, or he may lash out at the children if he views his partner and children as a single entity and feels vengeful (Chesler, p. 67). Wallerstein and Kellys study of divorced families illustrates how men who batter try to convince the children and the court that their partners are either morally bankrupt or emotionally unfit to continue mothering (pp. 28-29). The children will also be exposed to more violence if either partner is a victim or offender in a new relationship. However, the risk of exposure differs for men and women. It does not seem, as practice lore has it, that battered women are likely to find a new abuser. Pagelow (p. 65) found that only 33 percent of the battered women in her study were in more than one violent relationship. The national norm of all marriages that have experienced violence at some point is about the same-28 percent (Straus, Gelles, Steinmetz, p. 62-64). On the other hand, abusers may have more than a 50 percent chance of battering in a new relationship, with rates ranging from 57 percent to 86 percent in two nonrandom studies (Pagelow, 76). Parents Childhood Traumas Perhaps the most common truism among those trying to determine the potential for child abuse is that being abused as a child is a strong predictor of becoming a child abuser. In the past it was believed that because both battered women and their partners were likely to have been abused in childhood, both have about the same chance of abusing their children. Recent evidence, however, suggests that two pieces of practice lore need to be modified. First, all studies do not find that either battered women or their partners are more likely to have been abused in childhood. Hotaling and Sugarman (p. 101-124) found that four out of 13 studies they reviewed did not confirm the notion that battered women or men who batter were abused in childhood. A more consistent risk marker was for the men to have witnessed violence between parents (14 out of 16 studies). When witnessing violence is combined with being abused in childhood, an especially potent risk factor is created for becoming a woman and child abuser (Straus et al. , p. 68-95). Second, it was also believed that most parents who abuse their children were abused themselves. There is a positive relationship between being abused and becoming an abuser, but the relationship is not as strong as was once thought (Jayaratne, p. 23-43). Kaufman and Zigler (p. 186-198) concluded from their review of studies that about 30 percent of those who were abused as children were likely to become abusers. If a broader definition of abuse is used, as in the national study by Straus (p. 213-234), only 15 percent of those who were frequently abused by their parents abused their own children. Of those who were not abused, 8 percent abused their children. Bowker, Arbitell, and McFerron ( p. 158-175) concluded from their survey of battered women that male dominance and violence against wives, especially marital rape, was a much more important link to child abuse by fathers than the fathers childhood victimization. When there is a link between childhood victimization and later abuse, there is some evidence that it is stronger in men. Miller and Challas (p. 29-43) found that of those who were abused as children, 31 percent of the men and 19 percent of the women were rated as being at high risk for abusing their own children. Parents Psychological Profiles Psychological evaluations are frequently ordered in contested child custody cases, and social workers need to know the strengths and limits of these evaluations. In general, the prediction of dangerous behavior is best made from past violent behavior and not from general personality traits. Wolfe (p. 462-482) concluded from his literature review that underlying personality attributes and traits have been unable to detect any patterns associated with child abuse beyond general descriptions of displeasure in the parental role and stress-related complaints (p. 465). A more relevant indicator of risk for child abuse is the Child Abuse Potential Inventory (Milner, p. 41-54). Men who batter have been shown to score higher on this measure than nonbatterers (Milner Gold, p. 169-172). In custody and visitation evaluations, the measure needs to be supplemented with interview and background data (Saunders, p. 208-235). Evaluations are often complicated by the ability of many of the men who batter to function well while their partners appear pathological (Ayoub, Grace, Paradise, Newberger, p. 191-207). Despite appearances, the men are likely to have longstanding, severe problems such as alcoholism and emotional wounds from childhood traumas. A large proportion has personality disorders. Hotaling and Sugarmans (p. 101-124) review did not find similar chronic problems in battered women. There is evidence that if the women develop psychological problems, they are the direct result of battering. The nonviolent tactics of men who batter are also likely to contribute to the womens emotional turmoil. Many tactics are similar to those used against prisoners of war. The men often isolate the women; blame them for the abuse; falsely accuse them of infidelity; and put labels on them like crazy, stupid, or whore (Walker, p. 34). The men may also make death threats, especially if the women try to leave. When a woman learns that her partner wants custody of the children, her stress can become overwhelming, because her goal in leaving her partner is often to protect the children. Posttraumatic stress disorder and depression are the likely outcomes of such an ordeal. When Rosewater (p. 86-96) administered the Minnesota Multiphasic Personality Inventory to a group of battered women, their average profile showed features consistent with borderline personality disorder and schizophrenia. She interpreted the findings, not as a sign of severe psychopathology, but as an indication that battered woman can be severely traumatized by the battering and fear of its recurrence. Therefore, using psychological test scores and courtroom behavior to assess the parenting abilities of battered women must be done with extreme caution. Crites and Coker (p. 9-13) noted that the battered woman may appear in court to be unstable, nervous, inarticulate, or angry because of her ordeal. The author worked on a case in which the judge interpreted a womans attempt to find safety as pathological, stating that she had shown evidence of impulsivity and poor judgment because of her recent precipitous move to another state. Crites and Coker (p. 40-43) noted that therapists as well as judges make such interpretations. Another symptom-flat affect-may also works against the women. Women may develop such an affect to guard against painful memories. Practitioners, attorneys, and judges may mistakenly assume that the womans apparent indifference to danger means that she accepts it, rather than seeing that she is suffering from psychic numbing. A battered womans psychological state can certainly affect her ability to parent. For example, battered womens depression appears to be related to their childrens problems as much as the childrens exposure to violence (Wolfe, Jaffe, Wilson, Zak, p. 657-665). If severe, maternal depression can lead to neglect of the childrens needs. A major goal in assessment is to determine the likelihood that the depression will lift once the woman is safely away from her abuser. Some battered women turn to drug and alcohol abuse to cope with their depression, pain, and fear. The goal of assessment is to determine the prognosis for recovery once she is safe from violence. Drug and alcohol abuse by women makes it easier to see them as bad victims. When drug or alcohol abuse or depression impairs a battered woman, she may be held liable for her partners abuse of the children, an extension of societys stereotype that places mothers in the role of ultimate protector of their children. Just as in cases of father-daughter incest where mothers are sometimes veiwed as complicit, many courts contend that women could have stopped their partners from physically abusing the children (Crites Coker, p. 42). Schechter (cited in Suh, 1989) suggested that victims can put us in touch with our own vulnerability, and some who cant tolerate those feelings find it easier to turn them into anger at the victim (p. 63). Practitioners are not immune from these feelings. They may see the woman as passive, uncooperative, and ambivalent rather than as caught between the fear of battering and the agencys requirements for child protection. An innovative program described by Schechter and Gary (1992) provides advocacy for battered women in a pediatric setting, which is ideal for helping battered women because they often seek help for their children before seeking it for themselves. A peer advocate works with the woman to help keep her and her children safe. Parents Participation in Treatment If interventions could efficiently and effectively reduce the child abuse potential of either or both parents then custody and visitation recommendations could be made based on the completion of treatment or other interventions. Unfortunately, some interventions used with these cases are ineffective or even hazardous for battered women and their children. For example, the unqualified application of family systems theories and mediation models can be risky. Many of these models assume equal power among family members and equal responsibility for causing family problems. Abuse is often seen as arising from poor communication or alcoholism. If divorce counselors use such models, battered women and their children may be placed at greater risk for abuse. The patriarchal structure of the family is supported, and consequently there is an increased risk of woman abuse. Furthermore, if conjoint sessions are used, the mother or children may reveal continued abuse or a desire for the father to leave the family. The family may be left unprotected from the mans rage after the counseling session. Divorce mediators may apply some of these same principles. Walker and Edwall (p. 127-154) concluded that abusive men are unlikely to be able to put their childrens needs ahead of their own. Mediators may believe that they can equalize the power difference, but battered women carry with them a terror that makes them prone to give in. Also, mediation offers no enforcement of agreements, and in many states what is revealed to the mediator is not held in confidence. Some mediators seem to provide more safety because they have separate assessment and mediation sessions (Zemmelman, Steinman, Knoblauch, p. 32-37). Magana and Taylor (p. 50-64) provided special training and protocols for mediators and found that separate sessions and protective measures were more likely in the most violent cases. Out of concern for power and safety issues, some states are now exempting battered women from required mediation. A number of guidelines are available for mediators and judges to help them screen for abuse and decide on a course of action (Crises Coker, 9-13). Innovative treatments to help men who batter end their violence have not been evaluated extensively. Social workers and their clients need to know that recidivism rates after treatment can be fairly high, ranging from about 15 percent to 40 percent more than one year after treatment (Saunders Azar, p. 481-545). In addition, many men leave treatment prematurely even when they are legally mandated to attend. Also, psychological abuse by many of the men is not reduced after treatment (Saunders Azar, p. 481-545). Treatment programs for men who batter usually do not contain material on parent training. However, many methods of anger management for men who batter are the same as those used to help abusing parents (for example, Schinke, Schilling, Barth, Gilchrist, Maxwell, p. 13-26). Thus, men who batter have the potential for transferring the same skills to their parenting role. There is some evidence that the men have lower child abuse potential after treatment. A study by Stacey and Shupe (p. 64) showed a substantial reduction in actual child abuse by men as reported by their partners. Problems with Visitation and Joint Custody Joint custody laws are now in effect in most states to encourage or mandate the sharing of parental responsibilities. Joint custody has many advantages when a woman has adequate financial resources and a partner who is nonabusive and supports her as a parent. However, many practitioners are having second thoughts about joint custody because of financial hardships for women and the risk of renewed trauma to the children (Geffner Pagelow, p. 151-159). Elkin (p. 18-24) listed the types of parents for whom joint custody is appropriate. These parents are committed to making joint custody work out of love for their children, are willing and able to negotiate differences, and are able to separate husband and wife roles from parental roles. These are rarely the characteristics of domestic violence cases. Emery and Wyer (p. 472-480) have contended that joint custody is contraindicated when there has been family violence. Elkin (p. 18-24) listed contraindicating factors that often coexist with wife abusefor example, a history of alcohol or other drug dependency, the parents inability to agree on childrearing, and family disorganization. One problem with joint custody is that battered women may agree to it because they are coerced and do not want to look bad in a sole custody trial. Conclusion Recent legislation reflects the growing reservations about joint custody. Most states now have statutory clauses to take marital violence into account when making custody decisions. It is hoped that such laws will counter the trend that places financial ability and two-parent families as the highest standards in awarding custody. Men who batter are likely to win custody with these standards because they usually have higher incomes and remarry sooner than their ex-partners. Joint custody and visitation allow abusers continued contact with their partners. Supervised visitation may provide important father-child contact that prevents idealization of the absent father. It is ironic that women were once told to fabricate cruel treatment by their spouses to obtain a divorce, yet today, cruelty to women and children is often not believed, especially mothers charges of child abuse in the midst of a custody dispute. Abuse may be revealed only after separation because the mother feels safer reporting it then, or abuse may start in the years immediately following separation because it is a very stressful time. Many battered women face a catch-22; when the abuse spills over to their children, they may seek shelter or flee to another state, yet they may be punished for doing so. One judge stated that a womans extensive contacts with a battered womans shelter meant that her environment was characterized by self-interest and excessive liberalism (Fredericks, 1986, p. 2). Works Cited Ayoub, C. C., Grace, P. F., Paradise, J. E., Newberger, E. H. Alleging psychosocial impairment of the accuser to defend oneself against a child abuse allegation. Child and Youth Services, 15 (1991), 191-207. Bowker L. H., Arbitell, M., McFerron, J. R. On the relationship between wife beating and child abuse. ln K. Yllo M. Bograd (Eds.), Feminist perspectives on wife abuse (pp. 158-175). Beverly Hills, CA: Sage Publications, 1988. Chesler, P. Mothers on trial: The battle for children and custody. Seattle: Seal Press, 1987. Crites, L., Coker, D. What therapists see that judges might miss: A unique guide to custody decisions when spouse abuse is charged. JudgesJournal, 27(2) (1988). 9-13, 40-43. Davis, L. V., Carlson, B. E. Observations of spouse abuse: What happens to the children? Journal of Interpersonal Violence, 2(3) (1987), 278-291. Elkin, M. Joint custody: Affirming that parents and families are forever. Social Work, 32 (1987), 18-24. Emery, R. E., Wyer, M. M. Divorce mediation. American Psychologist 42(5) (1987), 472-480. Fantuzzo, J. W., Lindquist, C. U. (1990). The effects of observing conjugal violence on children. Journal of Family Violence, 4, 77-94. Geffner, R., Pagelow, M. D. Mediation and child custody issues in abusive relationships. Behavioral Sciences and the Law, 8 (1990), 151-159. Hotaling, G. T., Sugarman, D. B. An analysis of risk markers in husband to wife violence: The current state of knowledge. Violence and Victims, 1 (1986), 101-124. Jaffe, P. G., Wolfe, D. A., Wilson, S. K. Children of battered women. Newbury Park, CA: Sage Publications, 1990.
Monday, October 14, 2019
Internet Protocol (VoIP) Technology
Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term ââ¬Å"voice over IPâ⬠is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, ââ¬Å"Current voice-over-IP products,â⬠describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as ââ¬Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular contextâ⬠. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against ââ¬Å"reinventing-the-wheelâ⬠to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact ââ¬â it will always hold faults and à «gapsà » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: â⬠¢ Disclosure from interior users with spiteful purpose; â⬠¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; â⬠¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; â⬠¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set Internet Protocol (VoIP) Technology Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term ââ¬Å"voice over IPâ⬠is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, ââ¬Å"Current voice-over-IP products,â⬠describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as ââ¬Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular contextâ⬠. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against ââ¬Å"reinventing-the-wheelâ⬠to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact ââ¬â it will always hold faults and à «gapsà » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: â⬠¢ Disclosure from interior users with spiteful purpose; â⬠¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; â⬠¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; â⬠¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set
Sunday, October 13, 2019
An Analysis of Human Resources Management at TNT Essay -- Business Hum
An Analysis of Human Resources Management at TNT TNT is the European market leader in global express distribution, logistics and international mail. Wherever a company operates TNT will make sure that their documents, consignments and business mail are delivered safely and on time using their integrated air and road networks. Their international operations are focused on the key areas of world trade in Europe, Asia, North and South America. They also have strong domestic networks in Australia and Europe. Their operational networks are supported by sophisticated technology which as well as ensuring service reliability provides real-time, on-line information on the status of the consignment. Their central philosophy is to put the customer at the heart of their business. They aim to be companiesââ¬â¢ business partner devising solutions for all their customers' distribution needs by combining their core capabilities to create new products and services. The HRM of TNT empower employees to provide the fastest and most reliable service which involves upholding the quality principles for the benefit of all stakeholders involved with the organisation thereby enabling them to achieve the vision. The quality principles of TNT are: customer care, leadership, people, communication, resources, suppliers, processes and the impact on society. For each of this principles the HRM makes sure and show how its needs to be carried out: à · Customer Care: Always listening to and building first class relationships with their customers to help TNT provide excellent standards of service and client satisfaction. à · Leadership: Inspiring all members of the TNT team to be outstanding achievers and building on their make it happen policy through clear direction, support and accountability. à · People: Recognising individual and team achievements, promoting from within wherever possible and encouraging everyone to enjoy rewarding careers that provide security and job satisfaction. à · Communication: Working hard at all times to encourage clear and honest two-way communications which foster teamwork, they must get through attitude and staff involvement through an open management style. à · Resources: Employing the best people in a first class working environment and supporting them with ongoing training, reliable equip... ...ager or by the job holderââ¬â¢s superior. The performance appraisal gives the managers the chance to reward employees and to thank them for doing a good job. Appraisal normally takes place once or twice a year. In some organisations it happens every month every three months. The more often it is done the better. At TNT appraisals happens every six months. The benefits of performance appraisal for the organisation are: à · It helps employees to identify training needs. à · It may reveal other problems ââ¬â for example, there may be workplace difficulties with other staff (eg it might be caused by sexual or racial harassment). à · It may untap useful new skills. à · It improves communications between employees and managers ââ¬â a few words of encouragement and praise for doing a good job are often highly motivating. à · It provides disciplinary documentation ââ¬â if the employer needs to dismiss somebody, the existence of through appraisal records, which identify the personââ¬â¢s inabilities, or lack of effort will be very useful. à · It helps to fix pay rises ââ¬â increasingly people get performance related pay which is based upon the appraisal interview.
Friday, October 11, 2019
Induction of Staff Essay -- Health Care, Nurse Bank Staff
Induction of staff is a vital step undertaken by the administration to ensure that their staffs remain effective in provision of services to consumers. The aim of this research is to analyse how effective induction of nurses is in retaining the nurse bank staff. From the population sample of the nurses and other staff members, the research will seek to address the views of the sample population to understand how effective induction is. Pre test designs The participants that have been selected to serve as a sample are placed in several groups from where they can now be researched on. The researcher is expected to monitor the effect of the new stimuli that has been introduced on the sample groups and how the sample population reacts to it. It is advisable that the sample be chosen at random in order for the results not to be biased. This helps to isolate and nullify any nuisance. Sampling Method To obtain valid data, a sample has to be chosen from the whole population as it is time consuming to handle the whole population. The sample should be comprised of workers and their employers and some patients who have been granted services from the medical institution. In the selection of the population, stratified sampling will be adopted in order for the research to pay attention to a given subgroup hence it is not easy to confuse information (Byrnes, 2008). This division into the given sub population could be done with reference to the area of specialization with reference to their skills and knowledge to obtain their views on induction. Data Collection The key issue here is not on how we collect data but on how to ensure that we obtain data that is useful. The data will therefore help the researcher to obtain a working as... ... effects that appear in the context but it would be advisable if you remain constant in interviewing all respondents. Appropriate tools and measurement devices have to be obtained to ensure reliability and validity. Data Analysis Interviews can be analyzed by the use of observation where researchers note the way respondent answers questions during the interview. Given the fact that the interview is structured it is easier for the researcher to analyze the data using statistical packages like SPSS (Bryman, Hardy & Hard, 2009). The advantage of statistical significance is that samples reflect the realities in a population. The researcher will also have to put the ethical issues into consideration before conducting survey on opinion from nurses. Permission will be also sorted from the PCT regarding data protection and confidentiality (Best & Krierger, 2004).
Maya Angelou Stories Essay Essay
Maya Angelou, within amazing stories has revealed the importance of perseverance, staying strong in moments of struggle, having the will to overcome difficulties, as well as having dreams that sometimes seem unreachable and yet believing that it is a gift to survive. In many of her motivating quotes, she expresses, ââ¬Å"Iââ¬â¢m always inspired by men and women who riseâ⬠¦That ability to rise is nobleness of the human spirit. This clearly displays how her optimism in life has made her rise when fallen and has helped her make life teaching contributions by writing stories and poems that become valuable for all humans to endure lifeââ¬â¢s rough path also helping readers see life with a different perspective. In the stories, ââ¬Å"I know why the Caged Bird Singsâ⬠, ââ¬Å"New Directionsâ⬠, and in the poems ââ¬Å"Caged Birdâ⬠and ââ¬Å"Woman Workâ⬠, Angelou has written about many of her own experiences and taught us what humans will encounter, ââ¬Å"fail at, dream, and still survive. â⬠Even the ones who have suffered the most have a lot to teach. The story, ââ¬Å"I know why the Caged Bird singsâ⬠and poem, ââ¬Å"Caged birdâ⬠are important comparison regarding Angelouââ¬â¢s lesson. These contents are both similar since in the story, Angelou observes how all the cotton pickers long freedom making it a metaphor to caged birds in a way that all they want is to be free and able to fly. Most commonly, they both share the same feeling of being lost and trapped and lack the same rights as the ones that are free. The caged bird represents the cotton pickers and the African Americans meaning that they cannot have freedom and are ensnared in a world of no rest and hard work, regarding their colored skin. This shows how the cotton pickers and caged birds have dreams that sometimes even seem unreachable and impossible to defeat since they never even had the chance to think that someday, freedom would form part in their lives. Angelou reveals throughout these selections, how people faced hardships growing up in the segregated south. This story also shows Angelouââ¬â¢s true account of growing up as the poem connects to the way she probably felt as she experienced difficulties. She recites, ââ¬Å"The sounds of the new morning had been replaced with grumbles bout cheating houses, weighted scales, snakes, skimpy cotton and dusty rows. In later years I was to confront the stereotyped picture of gay song-singing cotton pickers with such inordinate rage that I was told even by fellow Blacks that my paranoia was embarrassing. But I had seen the fingers cut by the mean little cotton bolls, and I had witnessed the backs and shoulders and arms and legs resisting any further demands. â⬠This clearly illustrates how hard everything became and how the only thing she could do to bring her hopes up and release her anger, was sing, just like the caged bird. Angelou says in her poem, ââ¬Å"the caged bird sings with a fearful trill of things unknown but longed for still and his tune is heard on the distant hill for the caged bird sings of freedom. â⬠Indeed, as Angelou? s feelings relate to the caged birdsââ¬â¢ feelings, all they could ask for was freedom. In the selection, ââ¬Å"New Directions,â⬠Angelou as the speaker is very motivational in what life may teach to people and how they should deal with certain outcomes of failure. She is a persevering woman that always looks forward for what good is to come and is very conscious about difficulties she may encounter in the way. This story shows how life has many courses from which people can choose and sometimes there are possibilities of getting lost or going the wrong way but what she tries to display and let people interpret is that no matter how many ways one turns, or how many times one gets lost, it is never too late to change direction and strive for success. Clearly, failure is an important step that leads to success; it all depends on one? s attitude towards achieving it. Angelou really shows the value of perseverance and how humans should encounter problems. She says, ââ¬Å"She had indeed stepped from the road which seemed to have been chosen for her and cut herself a brand-new path. In years that stall became a store where customers could buy cheese, meal, syrup, cookies, candy, writing tablets, pickles, canned goods, fresh fruit, soft drinks, coal, oil, and leather soles for worn-out shoes. â⬠This displays a great example on how she failed in many jobs, took different paths, but with will and tenacity ended up with her own perfect stall that finally succeeded and made her feel proud. To achieve goals, humans have to turn many ways which sometimes will be full of rocks and others full of flowers until they find their own piece of land and make up their garden. This is what Angelou reveals with this great selection. A good mother does not only care for her child, guide him all way through, pay for his education but keeps on working until sometimes rest is not even part of their lives due to all the duties and responsibilities that are far more important than rest. This next poem, ââ¬Å"Woman Workâ⬠expresses in detail how even though some people work the entire day with almost no hours of sleep and rest, still survive. Angelou illustrates how the only thing some humans desire is to rest while others complain about working for a few times a day or even a few times a week or month. This deeply reveals how hard life can be for some people that do not even ask for luxurious gifts but for the gift of rest only. In this poem, Angelou tries to convey how the woman feels by listing various activities making it seem never ending by the use of rhythm. She states, ââ¬Å"Storm, blow me from here with your fiercest wind let me float across the sky ââ¬ËTil I can rest again. â⬠This shows how the woman even sees the serenity in life as an unreachable goal. It is deeply a strong theme of how the ones who have freedom and have the necessary money to live have to be grateful while others, who do not, are entirely grateful for few hours of rest. To conclude, Angelou was not only a woman who went through many hard times as a child and further on learned life lessons, but is a woman to venerate and thank for great contributions that she has made by her amazing written selections; both poems and stories that help readers build their own perspective of life in general. To display these contents, within her stories and poems, she used many metaphors, rich language, rhythm and descriptive actions that bring the audience into the readings and make them feel as if they were living it themselves. They once said anonymously, ââ¬Å"Sometimes you have to get knocked down lower than youââ¬â¢ve ever been, to stand up taller than you ever were. â⬠This quote defines the rule of life. To rise, everyone has to have fallen. Every time life brings people down, life itself teaches them to come back up with perseverance and handling problems properly. All themes that Angelou reveals are lessons that will only make humans fly freely, sing higher and rise into better persons granting them the choice of what direction to go and what path to build.
Subscribe to:
Posts (Atom)