Wednesday, October 30, 2019

Weeks v. United States Essay Example | Topics and Well Written Essays - 500 words

Weeks v. United States - Essay Example The police had entered his house without a warrant and searched through his personal property. Finding objects, namely papers, that they felt would lead to a conviction, they confiscated the personal property of Weeks, later using it against him during the trial. The evidence that the police had obtained proved vital in leading to a conviction. However, Weeks, in a stand for his rights filed a complaint, bringing to light this violation. The case reached the Supreme Court, who decided that Weeks’ rights had indeed been violated by the illegal search and seizure of his property and that the resulting decision should be reversed (Weeks vs. U.S., 1914). Now there are many who would argue on behalf of the exclusionary rule. For example, the exclusionary rule has often been considered a candidate for abolishment but it has been argued that â€Å"the drive to abolish the exclusionary rule is fundamentally misguided on constitutional grounds, for the rule can and should be justified on separation of power principals, which conservatives generally support† (Lynch, 1998). However, the constitution was established to uphold principals that the founding fathers believed were important to the country. No doubt, they did not envision a place where the truth could be suppressed and criminals could get away with crimes due to issues of ‘red tape’. The exclusionary rule has the ability to suppress the truth. In fact, this rule is not actually contained in the constitution but is said to be derived from the constitution. As it has been reported, â€Å"the justices who announced the rule viewed it is as judicially implied but constitutionally mandated† (Seligman, 2010). However, what is brought forth through implication is subject to perception, and so arguable. Any instance where those proven guilty beyond a doubt can get away is an issue that needs to be examined and reformed. Otherwise, the law can become meaningless and void; its powers without effect. In

Monday, October 28, 2019

Roca Case Study Essay Example for Free

Roca Case Study Essay Roca Radiadores S. A. is an entirely Spanish-owned company which has achieved extraordinary international expansion. To answer the question what motivated Roca to start internationalization we need to pay attention to the history and further expansion of Roca. Roca began its activities in 1915 as Compania Roca Radiadores S. A, a company that exclusively made cast iron radiators for domestic heating at its factory in Gava, near Barcelona. Over the course of about 60 years, Roca established its first foreign subsidiary in France because by that time, all the possibilities of further expansion in the Spanish market were extremely limited. Roca’s capital is wholly owned by the family group arising from its founders. The shareholders currently comprise over 50 members of the Roca family. The total turnover has been increasing steadily, reaching now over 800 million euro, with profits over 35 million euro per year. Roca has a stable financial statement. Roca makes decisions very slowly, evaluating the risks involved. It hardly uses bank loans, thus financing its growth mainly on reserves. Roca sells its products in over 70 countries in the six continents. Roca began increasing its international commitments as exports volumes rose. It was extremely difficult to start up exports in different countries. It faced technical barriers, varying national customs in different countries, trading limits, social differences in different countries, but there were several factors which motivated Roca to start its expansion and thus gain from internationalization: 1.  All the possibilities of further expansion in the Spanish market were extremely limited. So, it explains desire to grow 2. Stable financial statement (Its growth is based mainly on reserves, not on loans) 3. Higher profitability after entering the international market 4. Obtain prestige in the domestic market 5. There is no information in the case study about competitors, but clearly there are always competitors and this fact must be taken into consideration in discussing Roca’s internationalization process. Assuming that there are competitors, Roca was motivated to internationalize its sales and operations because internationalization would help it reach greater economies of scale in order to be more competitive. Furthermore, Roca would want to move against other competitors in foreign markets Roca has successfully overcome through all the initial stages of internationalization process such as exports or licences and production capacity and now it is on the final fourth stage as a global and multinational company. Roca went beyond the limits of the domestic market in 1974, when it opened the first subsidiary of the ROCA FRANCE in France. Since then, the company has opened a number of subsidiaries in over 70 countries, not only Western Europe, but also the countries of Latin America, Eastern Europe, the Far East, and emerging countries. Since then Roca has became one of the largest exporters of Catalonia. Also, in order to reduce costs Roca inaugurated mostly export-oriented factories for the production of Roca goods; producing in countries such as Settat, Morocco where they entered into a number of external agreements. Roca is always careful when entering into a new country, choosing only those where there is strong demand for their products. With the development of the internationalization process Roca has established the Department of Expansion, which is responsible for gathering information about foreign markets, competition situation, consumers, as well as the economic situation in the country of concern. Also Roca always takes into account the features of each country, like differences in water pressure, type of waste pipes employed, national customs, etc. nd making modifications to production processes in each country. Roca is one of the worlds largest manufacturers of sanitary and heating division, air conditioning and ceramics, and so its organizational process cannot be identified only by one model. A combination of a global-centralized and a decentralized organizational structure is best for the company, since the decisions that Roca must make are highly specialized depending upon whether it pertains to managing the global company or managing a local subsidiary. The model Roca follows entails that the decisions of the global Roca company should be taken at the level of the parent company while at the subsidiary level decisions that must be made to reduce costs by acquiring information about partners, distributors, etc. are under the umbrella of the subsidiary. The parent company, Roca, must address the core issues of development of the whole company as well as control interest, establish new subsidiaries in new regions and look after the work for the company according to a variety of financial and managerial reports that it receives from the subsidiaries. It also should engage subsidiaries to the search for new ways of development on their localizations. In particular, while opening a new production or establishing relations in a new market, the parent company may enter into temporary contracts, which will operate until the subsidiary is established on a new location. These are the decisions that best made in a global-centralized organization structure. At the same time the main aim of each subsidiary is to be responsible to the parent company for a profit and loss basis. Unprofitable subsidiaries can be easily dropped off and their managers should understand it. Although subsidiaries are sovereign they benefit from any goodwill and recognition of the whole company. So the subsidiaries are interested in their profitability, each subsidiary should search for new contacts, watch out for the productive organization of work of the company and then file reports on their operations with their parent companies to the parent company. So each subsidiary is responsible for the reputation of the company on the local level while the parent company is doing it on the global one. Roca has chosen to create production subsidiaries as its entry strategy for various countries because subsidiaries allow the parent company to achieve a closer and more continuous contact with the market. The creation of a subsidiary also decreases the number of intermediaries and makes it possible for the parent company to obtain a deeper knowledge of the market. Financially, the production subsidiaries allow Roca to avoid import barriers, which in turn reduces the final price of the product. Production subsidiaries also provides Roca with a better understanding of the host market, and makes it easier and quicker to adapt products for the foreign market and to respond to market changes. With all these advantages associated with the usage of production subsidiaries, it is evident why Roca chose the creation of production subsidiaries as its entry strategy. Roca’s international organization is flat in order to give subsidiaries greater autonomy since subsidiaries are closer to its markets. This not only provides Roca with better insight into foreign markets but also allows Roca to commence international operations more rapidly since basic infrastructure already exists. Thus, Roca can beat out potential competitors. The flat organizational hierarchy means that decisions can be made more quickly, which is necessary when a company owns so many subsidiaries, as Roca does. From another angle, since one of Roca’s major advantages is its reputation for high-quality, durable products, production subsidiaries will allow Roca to maintain control over its production processes and therefore maintain the high quality of its product offerings. The factors that led Roca to choose creating production subsidiaries as its entry strategy for specific countries such as Portugal, China, India, and Poland because after considering factors such as local costs, market size, tariffs, laws and political considerations, these countries were likely the ones with conditions most amenable to foreign investment through establishment of production subsidiary facilities. These countries in particular have lower costs of production due to lower labor costs. For example, India has many resources and capabilities in the IT business, a high number of English speakers, and significant government support for foreign investment. Furthermore, since Roca has a large product range, it would be difficult to transport the different products from just a few central distribution centers instead of the production subsidiaries. Lastly, the nature of the hygienic furnishings industry is such that not much specialized technological know-how is necessary. There is not a lot of innovation that relates to hygienic furnishings and so there is not a lot to bar competitors from entering the market. Thus, production subsidiaries will allow Roca to begin selling in foreign markets more rapidly, thus preempting potential competitors. The most significant drawback to this method is the high cost involved with creating or acquiring production subsidiaries. Usually, acquiring firms overpay for the assets of the acquired firm. Furthermore, there may be issues of culture clash between Roca and the newly acquired company. Acquiring firms also requires many resources and effort on the part of Roca because Roca must first identify appropriate companies to acquire. Roca Radiadores has had tremendous success in regards to entering new markets. They achieved this by pursuing a strategy which entails primary integration through a distributor and later switching operations to a subsidiary. These tactics were employed by Roca Radiadores in: France, Portugal, the Dominican Republic, Italy, Belgium, United Kingdom, Germany, Argentina, Poland, China and India. To fully comprehend the success of Roca’s strategies we will dissect some of the big moves Roca made and found success in pursuing this strategy. The first international venture Roca pursued was Roca France, where Roca only employed a sales subsidiary, not a distributor. It would seem frivolous to employ a distributor in France due to its close proximity to Spain. However, the inclusion of the sales subsidiary was a wise tactic, enabling Roca France to isolate and accurately determine who their customer base was. The localized sales subsidiary was able to focus on infiltrating the market and broadening the scope of Roca’s presence in the French market without diverting attention away from Spanish operations. The sales subsidiary offered a means for Roca to exist in the French market, leading them to reduce the responsibilities of the distributor. The expansion into Portugal was the first venture which required cooperation between the distributors who was replaced by a subsidiary. Roca Portugal evolved over a series of years; initial entrance involved distribution of sanitary products and later heating and cooling products. Years after observing market performance and gathering information about the Portuguese market, Roca saw an opportunity to expand further by purchasing a porcelain factory to produce sanitary products; the purchase drove costs down for Roca and eliminated imports. As the process was redefined quality standards were reduced, but the reason for this is because the Portuguese market appeared to be insensitive to changes in quality, but adept to changes in price. Having employed a distributor provided Roca the ability to test their success in the Portuguese market, unlike the French market where they required high quality products similar to those sold in Spain. The switch to a subsidiary was facilitated through a merger with York Portugal, a company specializing in air-conditioning and heating systems and therefore established a new firm Roca York AR E Refrigeroca. To determine demand Roca relied on past performance of the porcelain company acquisition as well as the heating and cooling systems. The merger and the creation of the subsidiary both for sales and distribution allowed Roca to reduce costs of outsourcing responsibilities to third parties, expanding Roca’s scope of control over the product line and expansion process. Granted, by this point in time, Europe had removed any trade barriers and tariffs, but localizing the operation kept costs down and made Roca products highly competitive in the Portuguese market. Similar strategies were pursued in Italy and Latin America. The strategy Roca chose to pursue was tactically sound considering that they were capable of expanding both within and outside of the European continent. It was an ideal strategy for expansion because of said variables: gaining information about the market, competition, capable and knowledgeable sales force, legal knowledge, and language proficiency. This plan allowed Roca to easily identify who the customer base is, how to target them and what their user needs are. If Roca sought the advice of a market researcher, there would be high costs associated with the service. Distributors had a higher incentive to ensure that they reach the target customer; they stand to gain a portion of the sales. Information attained from the distributor will serve a means to gauge if it is worthwhile to subsidize and commit to the market. Distribution methods would allow Roca to accurately gauge who is their key competitor and determine how they can compete, either on price or quality. By valuing their competitors through the research provided, there will be a clearer image whether there is room for growth or if the market is saturated. Access to an experienced sales force provides knowledge as to how to engage the customers and will be knowledgeable of which channels of distribution need attention. Through observation of the distributor’s sales force, Roca can observe and later on replicate the methods they used when they expand to a subsidiary. The final two variables which emphasize why the tactic of entering through a distributor is ideal include fluency in the language and an all encompassing understanding of the legal structure. Language fluency is vital to success in a foreign country, especially where the language varies from the company’s place of origin. The distributor would be responsible for converting any and all information into the language spoken into that area, including: advertisements, websites, packaging, directions and more. Had the distributor not been in place to serve as an intermediary there would be huge costs incurred in an effort to customize informational and marketing processes. Having a reliable source to advise Roca about legal constraints will avert them from violating regulations as well as help them capitalize on all that the law has to offer to protect Roca and its products. Beyond the scope of the distributor is the responsibility of the subsidiary. A simple power transfer occurs where Roca regains control of the operation in the foreign location and reduces the role of the intermediary, the distributor. At this juncture issues with language barriers, legal issues, and customer identification have been dealt with. The subsidiary is therefore a means to solidify Roca’s presence in the market and further expand their market share in this area. There are some drawbacks to this model. Consider the fact that the distributor may be unreliable. Roca had to rely on the distributor to provide accurate information about the market and the customer base. Were the distributor reluctant or unsuccessful in ascertaining this, continued involvement in the market may lead to stagnant sales and possibly a failed international expansion. Furthermore, the strategy entails a significant power shift for Roca. In this case there is a possibility that Roca loses sight of the sanctity of the Roca brand therefore threatening the longevity of Roca. However, the greatest drawback can be expected from the sales force who are not salaried employees. The sales force has no incentive to be loyal to Roca, so there should be a swift transition from distributor to subsidiary to take on salaried employees who will be a bit more consciences about their performance and the success of the company.

Saturday, October 26, 2019

Rousseau and the Positive Theory of Liberty Essays -- Philosophy

Liberty impacts two main areas of political thought; the state of nature and the social contract. This essay will examine wither or not it is proper to characterize Jean Jacque Rousseau as holding a positive theory of liberty. To determine to what extends this is true the following areas must be taken into account and explored; the definitions of liberty and freedom, Isaiah Berlin’s concept of positive and negative liberty, Rousseau understands of Liberty and also why Rousseau’s theory can be characterised as positive liberty. The main argument of this essay is that Rousseau does hold a positive theory of liberty. Jean Jacque Rousseau was born on the 28th June 1712 and died on the 2nd July 1778. Rousseau was a major Genevan philosopher, writer, and composer of 18th-century during the Romanticism era. His political philosophy was heavily influenced by the French Revolution and the American Revolution and also influenced his overall development of modern political, sociological and educational thought. Some of Rousseau’s famous works include the Social Contract or Du contrat social (1762) and Emile (1762). Firstly before establishing withers or not Rousseau’s theory of liberty is characterized as positive it important to begin defining what Liberty actually is. The Oxford dictionary defines liberty as ‘the state of being free within society from oppressive restrictions imposed by authority on one’s behavior or political views’ (Oxford Dictionaries ). Isaiah Berlin (1909-97) argues that there are two different concepts of liberty: negative and positive. He states the negative liberty is ‘namely freedom from constraint or interface’ (Warburton, 2004, p. 232) or in other words absence of coercion, barriers, restraint or obstacl... ...rieved 12 2010, 9, from Oxford Dictionaries : http://www.oxforddictionaries.com/view/entry/m_en_gb0315030#m_en_gb0315030 (n.d.). Retrieved 12 2010, 9, from Stanford Encyclopedia of Philosophy: http://plato.stanford.edu/entries/liberty-positive-negative/ Berlin, I. (1969). Two Concepts of Liberty. In Four Essays on Liberty. London: Oxford University Press. Haddock, B. (2008 ). A History of Political Thought . Cambridge: Polity . Replogle, R. (1989). Recovering the Social Contract. Rowman & Littlefield Publishers Inc. Rousseau, J. J. (1923). The Social Contract and Discourses translated with an Introduction by G.D. H. Cole . Londan and Toronto: J.M Dent and Sons. Shklar, J. (1969). Men and Citizens: A study of Rousseau's social theory. Cambridge: Cambridge UNiversity Press. Warburton, N. (2004). Philosoph: Basic Reading Second Edition . New York : Routledge .

Thursday, October 24, 2019

Nonprofit organizations Essay

TASC which stands for treatment alternative for safe communities is nonprofit making organization providing access to recovery and specialized services for people involved in corrections, criminal justice, public aid systems and child welfare. TASCS programs serve more than 30,000 people each year across Illinois every year including transitional programs for providing management for clinical case to over 4,000 adults each year who enter the community after incarceration. TASC work together with other service providers and partners to offer treatment, support recovery and establish faith –based organization. Addiction treatment field has grown in the past three decades due to expansion of market for illicit drugs in United States which started in 1960s and need for treatment services and intervention. In the areas of societal changes, key leaders have provided guidance on development in the last thirty years. They have shown their understanding on the need and possibilities for the field, they assess environmental landscape in order to anticipate the coming trends, take care of appropriate risks, act collectively in advancing the field and use influence and power in achieving a common vision. New leaders have been developed who are involved in identification and possible growth of individual who will be leaders of the field of alcohol, prevention and treatment of drugs in the years to come. Beyond leadership being understood as competencies and individual skills, cultures need to be developed about leadership at all levels in the organization. Leadership is involved in working together with others to advance the overall field. It explores, define and implement strategies to bring together diverse entities under common purposes and goals. There is a framework for developing leaders by convening efforts such as initiative for partners’ recovery. the main goals of efforts that are made in development of leadership is to make sure there is continuing evolution in leadership and having sound public policy and quality services to everyone. Fragmentation of philosophies has marked the field of preventing substance abuse and treatment of addiction for more than one century. Right now views are different concerning standardizing treatment methods, using medication-assisted treatment, purpose of recovery movement and outcome measures. Instead of a unified voice being presented, the field is described as multiple movements with many leaders and institutions having different agendas. Recently, the field is coming together with common philosophies to understand the science of recovery from addiction. Leadership understands societal context where the field is located. Plan for future of addiction treatment begin by assessing current environment and anticipating forces and trends for shaping the years to come. Forces in the society are external to control of the field yet for the people who will be involved in treatment and recovery; their future will be shaped by the people within the field by understanding opportunities and challenges that may emerge. The skills for a leader in treating addiction are complex. They need understanding of clinical and all service aspects and have business skills such as property acquisition, financing, contracting and managing profit and nonprofit organizations for organization to be viable and competitive. Leadership is involved in being capable of moving others forward to achieve strategic vision and his skills are strategic planning, financial development, mentoring and communication. Management is involved in putting in place all infrastructure and processes for effective working of organization. Vital management and business skills include team building, development of product and service, human resource development and marketing.

Wednesday, October 23, 2019

How might ‘Naturlism’ be defined within theatrical context

How might ‘Naturalism' be defined within theatrical contexts? Movement in theatre developed late 19th century, presenting ordinary life as accurately as possible, influenced by novelists and playwrights such as Ibsen and Emile Zola. The idea of naturalistic plays was to portray harsh and gritty subject matters, which would emphasize the wrongs in contemporary life which would often be frowned upon and alienate 19th-century audiences. However, by seeing the wrongs in society there is a believe that people will try and better themselves. Naturalism existed only in it's historical momentsTheatre imitating life. Naturalism brought science into the game, with more electricity in theatres, removal of audience, putting them in the dark as if they were eavesdropping. Importance of everyday and ordinary. Potential tool for improving humanity by showing the wrongs. Brought in the fourth wall, analytical distance. extending the idea to the imaginary boundary between the audience and the s tage. Character is more important than plot/action. The model of theatre as scientific ideas and the idea that human beings are distinguished by society, like showing the ubject as a product of social forces.Playing around with that idea, like Emile Zola did in his play â€Å"Miss Julie† dropping a high class girl into a test tube with a servant (lower class) of particular type/ character and see what happens. Playwrights tried to get as far away from the theatrical side of plays, by using techniques such as making real time and fictional time the same. It would always be very accurately documented, especially social detail. Lineage or Heredity always played a big part and were controlled by the environments which would explain the ehavior and status of the characters.Naturalism showed a slice of life as it really is, without putting up a show for the audience you see a gritty unpleasant side of life which pays very close attention to detail and behavior, often including batt le of sexes, Heredity or Lineage and lots of psychological detail about why the characters are doing what they are doing taking their past and course through life to this point in time into consideration. Which leaves the audience to study the characters outside of what they see in front of them. Reveals the private side of life.Naturalism played a great role in later theatre evolving to Hypernaturalism and symbolism. Theatre of Naturalism will open up new perspectives for anyone interested in theory or theatre, whether scholars or the wider theatre-loving or performing public. Naturalism is a torm ot Realism, but was a more scientific approach than realism which is interested in cause and effect – both inherited and environmental Human psychology Has true view of the outside world but only focuses on what's going on the inside even though characters come and go

Tuesday, October 22, 2019

Free Essays on Cars

Electric Cars Electric Cars History: Early electric vehicles may have appeared as early as 1830. Scottish inventor Robert Davidson constructed the world's first prototype electric vehicle in 1837, but historians generally credit J.K. Starley, an English inventor, and Fred M. Kimball of Boston with building the first practical electric cars in 1888. Later in the in the decade, William Morrison of Des Moines, Iowa, constructed his version of the electric vehicle in 1891. His vehicle required 24 storage battery cells, took 10 hours to charge, and could run for 13 hours. It could carry up to 12 people and had a 4-horsepower motor. His car could reach speeds up to 14 miles per hour. Morrison, however, never mass-produced his vehicle. The first commercially produced electric vehicle was the Electrobat. It was manufactured by Philadelphia-based Morris and Salom Company. In 1896, the Woods Motor Vehicle Company of Chicago became the first American manufacturer of electric cars. The Electrobat was one of s everal electric cars, which competed in a race sponsored by Illinois publisher H.H. Kohlsaat. He had challenged inventors to come up with a car that could travel the distance from Chicago to Evanston and back (58 miles). Electric cars and gas cars competed against each other in this competition. Although none of the cars performed in an especially notable manner, the electric cars failed miserably. It seemed that the slushy country roads generated a great deal of friction, which drained the strength of the batteries quickly. Shortly after the Kohlsaat race, Thomas Edison said he believed gasoline, not electricity, would provide the dominant power source for the automobile of the future. "As it looks at the present," he said, "it would seem more likely that (the cars) will be run by a gasoline or naphtha motor of some kind. It is quite possible. However, that an electric storage battery will be discovered which will prove more economical, bu... Free Essays on Cars Free Essays on Cars Electric Cars Electric Cars History: Early electric vehicles may have appeared as early as 1830. Scottish inventor Robert Davidson constructed the world's first prototype electric vehicle in 1837, but historians generally credit J.K. Starley, an English inventor, and Fred M. Kimball of Boston with building the first practical electric cars in 1888. Later in the in the decade, William Morrison of Des Moines, Iowa, constructed his version of the electric vehicle in 1891. His vehicle required 24 storage battery cells, took 10 hours to charge, and could run for 13 hours. It could carry up to 12 people and had a 4-horsepower motor. His car could reach speeds up to 14 miles per hour. Morrison, however, never mass-produced his vehicle. The first commercially produced electric vehicle was the Electrobat. It was manufactured by Philadelphia-based Morris and Salom Company. In 1896, the Woods Motor Vehicle Company of Chicago became the first American manufacturer of electric cars. The Electrobat was one of s everal electric cars, which competed in a race sponsored by Illinois publisher H.H. Kohlsaat. He had challenged inventors to come up with a car that could travel the distance from Chicago to Evanston and back (58 miles). Electric cars and gas cars competed against each other in this competition. Although none of the cars performed in an especially notable manner, the electric cars failed miserably. It seemed that the slushy country roads generated a great deal of friction, which drained the strength of the batteries quickly. Shortly after the Kohlsaat race, Thomas Edison said he believed gasoline, not electricity, would provide the dominant power source for the automobile of the future. "As it looks at the present," he said, "it would seem more likely that (the cars) will be run by a gasoline or naphtha motor of some kind. It is quite possible. However, that an electric storage battery will be discovered which will prove more economical, bu... Free Essays on Cars The issue of electric car has been arising nowadays. But many of us never really find a true example of the uses of electric cars in everyday life. From the article â€Å"Electrical Engineering†, an Australian built his own electric car from a second hand Porsche. The article proves that having a private electric cars is no longer a dream. But do all people know the good things and the bad things about having a private electric car? Now, what electric vehicles really are? Simply put, electric vehicles are vehicles that are powered by an electric motor instead of an internal combustion engine. Electric vehicle use electricity as the â€Å"fuel† instead of gasoline or some other combustible fuel. The electric motor in an electric vehicle converts electricity, usually from a battery pack, into mechanical power to turn the wheels. Major auto manufacturers are producing high-performance electric vehicles not only in the form of cars but also in a wide range of styles and sizes, including, mini-vans, sport utility vehicles and pickup trucks. Electric vehicles today come as small as bicycles and motor scooters and as big as buses. In Melbourne for example, we are using electric powered trams as public transport. Many people fancy electric vehicles because they had many advantages compared with petrol fueled vehicles. The benefits are : Quiet, Clean Driving Experience  ­ On a personal level, electric vehicles offer a quiet, fume-free, smooth driving experience. Since the motor does not operate when the vehicle is at a stop, an electric vehicle has no â€Å"idle† noises. When an electric vehicle is under power, the sounds are the soft sound of the motor and the tires rolling over the roadway. High Performance  ­ First-time electric vehicle drivers are consistently surprised by the quality of the electric vehicle driving experience. electric vehicles provide fast acceleration by delivering power instantly to the whee... Free Essays on Cars Ford The Model T greatly contributed to the spread of motorization by introducing various mechanisms for easy driving, such as a planetary gear transmission, as well as a low price owing to mass production that cut costs. A total of 15,007,033 units were built from 1908 to 1927, and the car triggered a revolution in social life-style. The Model T introduced various features to facilitate driving, and the transmission was integrated with the engine. Its planetary gears two forward and one back could be shifted without use of a clutch. These mechanisms were also intended to meet mass-production system. Benz Various countries claim to be the first to produce a gasoline-powered automobile. Although there is room for argument, Germany's Karl Benz is now accorded this distinction with the threewheeler he produced in 1886. The engine, placed over the rear axle, is a horizontal, fourcycle, single-cylinder type was the first automobile equipped with a differential gear. The small one-cylinder engine of this vehicle was mounted horizontally behind the seat in a frame developed from the prevailing tricycles. Its 0.9 horsepower was transmitted to the rear wheels via belt and chain, enabling a top speed of about 15km/h. A lever connected to a rack-and-pinion controlled the lone front wheel, which steered the vehicle. By: William W. Bottorff Several Itialians recorded designs for wind driven vehicles. The first was Guido da Vigevano in 1335. It was a windmill type drive to gears and thus to wheels. Vaturio designed a similar vehicle which was also never built. Later Leonardo da Vinci designed a clockwork driven tricycle with tiller steering and a differential mechanism between the rear wheels. A Catholic priest named Father Ferdinand Verbiest has been said to have built a steam powered vehicle for the Chinese Emporer Chien Lung in about 1678. There is no information about the vehicle, only the event. Since Jam...

Monday, October 21, 2019

Economic Deflation and How to Prevent It

Economic Deflation and How to Prevent It Is the problem that there is more to printing money than printing money? Is, in fact, the way printed money gets into circulation, that the Fed buys bonds, and thus gets money into the economy? What is the logical rabbit trail that leads to inflation from printing money? Would solving deflation this way work with todays low-interest rates? Why or why not? Deflation has been a hot topic since about 2001 and the fear of deflation does not look like it will subside anytime soon. What Is Deflation? This article on why money has value explains that inflation occurs when money becomes relatively less valuable than goods. Then deflation is simply the opposite, that over time money is becoming relatively more valuable than the other goods in the economy. Following the logic of that article, deflation can occur because of a combination of four factors: The supply of money goes down.The supply of other goods goes up.Demand for money goes up.Demand for other goods goes down. Before we decide that the Fed should increase the money supply, we have to determine how much of a problem deflation really is and how the Fed can influence the money supply. First, well look at the problems caused by deflation. Most economists agree that deflation is both a disease and a symptom of other problems in the economy. In Deflation: The Good, The Bad and the Ugly, Don Luskin at Capitalism Magazine examines James Paulsens differentiation of good deflation and bad deflation. Paulsens definitions are clearly looking at deflation as a symptom of other changes in the economy. He describes good deflation as occurring when businesses are able to constantly produce goods at lower and lower prices due to cost-cutting initiatives and efficiency gains. This is simply factor 2 The supply of other goods goes up on our list of the four factors which cause deflation. Paulsen refers to this as good deflation since it allows GDP growth to remain strong, profit growth to surge and unemployment to fall without inflationary consequence. Bad deflation is a more difficult concept to define. Paulsen simply states that bad deflation has emerged because even though selling price inflation is still trending lower, corporations can no longer keep up with cost reductions and/or efficiency gains. Both Luskin and I have difficulty with that answer, as it seems like half an explanation. Luskin concludes that bad deflation is actually caused by the revaluation of a countrys monetary unit of account by that countrys central bank. In essence, this is really factor 1 The supply of money goes down from our list. So bad deflation is caused by a relative decline in the money supply and good deflation is caused by a relative increase in the supply of goods. These definitions are inherently flawed because deflation is caused by relative changes. If the supply of goods in a year increases by 10% and the supply of money in that year increases by 3% causing deflation, is this good deflation or bad deflation? Since the supply of goods has increased, we have good deflation, but since the central bank hasnt increased the money supply fast enough we should also have bad deflation. Asking whether goods or money caused deflation is like asking When you clap your hands, is the left hand or the right hand responsible for the sound?. Saying that goods grew too fast or money grew too slowly is inherently saying the same thing since were comparing goods to money, so good deflation and bad deflation are terms that probably should be retired. Looking at deflation as a disease tends to get more agreement among economists. Luskin says that the true problem with deflation is that it causes problems in business relationships: If you are a borrower, you are contractually committed to making loan payments that represent more and more purchasing power - while at the same time the asset you bought with the loan to begin with is declining in nominal price. If you are a lender, chances are that your borrower will default on your loan to him under such conditions. Colin Asher, an economist at Nomura Securities, told Radio Free Europe that the problem with deflation is that in deflation [theres] a declining spiral. Businesses make less profits so they cut back [on] employment. People feel less like spending money. Businesses then dont make any profits and everything works itself into a declining spiral. Deflation also has a psychological element as it becomes rooted in peoples psychologies and becomes self-perpetuating. Consumers are discouraged from buying expensive items like automobiles or homes because they know those things will be cheaper in the future. Mark Gongloff at CNN Money agrees with these opinions. Gongloff explains that when prices fall simply because people have no desire to buy - leading to a vicious cycle of consumers postponing spending because they believe prices will fall further - then businesses cant make a profit or pay off their debts, leading them to cut production and workers, leading to lower demand for goods, which leads to even lower prices. While I havent polled every economist who has written an article on deflation this should give you a good idea of what the general consensus on the subject. A psychological factor that has been overlooked is how many workers look at their wages in nominal terms. The problem with deflation is that the forces causing prices in general to drop should cause wages to drop as well. Wages, however, tend to be rather sticky in the downward direction. If prices rise 3% and you give your employees a 3% raise, theyre roughly as well off as they were before. This is equivalent to the situation where prices drop 2% and you cut the pay of your employees by 2%. However, if employees are looking at their wages in nominal terms, theyll be much happier with a 3% raise than a 2% pay cut. A low level of inflation makes it easier to adjust wages in an industry whereas deflation causes rigidities in the labor market. These rigidities lead to an inefficient level of labor usage and slower economic growth. Now weve seen some of the reasons why deflation is undesirable, we must ask ourselves: What can be done about deflation? Of the four factors listed, the easiest one to control is number 1 The supply of money. By increasing the money supply, we can cause the inflation rate to rise, so we can avoid deflation. In order to understand how this works, we first need a definition of the money supply. The money supply is more than just the dollar bills in your wallet and the coins in your pocket. Economist Anna J. Schwartz defines the money supply as follows: The U.S. money supply comprises currency - dollar bills and coins issues by the Federal Reserve System and the Treasury - and various kinds of deposits held by the public at commercial banks and other depository institutions such as savings and loans and credit unions. There are three broad measures economists use when looking at the money supply: M1, a narrow measure of moneys function as a medium of exchange; M2, a broader measure that also reflects moneys function as a store of value; and M3, a still broader measure that covers items that many regard as close substitutes of money. How the Money Rupple Is Influenced The Federal Reserve has several options at its disposal in order to influence the money supply and thereby raise or lower the inflation rate. The most common way the Federal Reserve changes the inflation rate is by changing the interest rate. The Fed influences interest rates causes the supply of money to change. Suppose the Fed wishes to lower the interest rate. It can do this by buying government securities in exchange for money. By buying up securities on the market, the supply of those securities goes down. This causes the price of those securities to go up and the interest rate to decline. The relationship between the price of a security and interest rates is explained on the third page of my article The Dividend Tax Cut and Interest Rates. When the Fed wants to lower interest rates, it buys a security, and by doing so it injects money into the system because it gives the holder of the bond money in exchange for that security. So the Federal Reserve can increase the money supply by lowering interest rates through buying securities and decrease the money supply by raising the interest rates by selling securities. Influencing interest rates is a commonly used method of reducing inflation or avoiding deflation. Gongloff at CNN Money cites a Federal Reserve study that says Japans deflation could have been dodged, for example, if the Bank of Japan (BOJ) had only cut interest rates by 2 more percentage points between 1991 and 1995. Colin Asher points out that sometimes that if interest rates are too low, this method of controlling deflation is no longer an option, as currently in Japan where interest rates are practically zero. Changing interest rates in some circumstances is an effective way of controlling deflation through controlling the money supply. We finally get to the original question: Is the problem that there is more to printing money than printing money? Is, in fact, the way printed money gets into circulation, that the Fed buys bonds, and thus gets money into the economy?. Thats precisely what happens. The money the Fed gets to buy government securities has to come from somewhere. Generally, it is just created in order for the Fed to carry out its open market operations. So in most instances, when economists talk about printing more money and the Fed lowering interest rates theyre talking about the same thing. If interest rates are already zero, as in Japan, there is little room to lower them further, so using this policy to fight deflation will not work well. Fortunately, interest rates in the U.S. have not yet reached the lows of those in Japan. Next week well look at seldom used ways of influencing the money supply that the United States may want to consider in order to fight deflation. If youd like to ask a question about deflation or comment on this story, please use the feedback form.

Sunday, October 20, 2019

19 Halloween Costumes for College Guys

19 Halloween Costumes for College Guys With Halloween just around the corner, everyone is making the all-important choice about what to wear this year. For college guys, this isnt easy. That is why we have prepared a list of 20 Halloween Costumes for College Guys that will make you stand out at your next Halloween party! 1. The Where’s Waldo Costume You cant go wrong with a recognizable costume like Where’s Waldo. It is familiar, fun, and requires a very simple striped shirt, blue jeans, and matching beanie. You will have a blast hiding in plain sight at any Halloween party! Image credit: Pinterest 2. The Chick Magnet Costume Meeting girls this Halloween wont be a problem when you dress up as a â€Å"chick magnet.† Ask yourself, who doesnt love a huge magnet? Making this one on your own is pretty simple. Just a few pieces of cardboard, some paint, and a trip to the store for some adorable little plastic chicks to stick on the ends. Image credit: Pinterest 3. The Spartan Costume (Created From Beer Cartons) The movie â€Å"300† inspired a whole generation of college guys to dress up as Spartans. Now in 2018, a traditional Spartan costume has become a bit basic. When not make your own out of your favorite beer cans and cartons like the guy below. The instructions are easy to follow and you can use any of your favorite beer packaging for shields, swords, and helmets. THIS IS HALLOWEEN!! Image credit: Pinterest 4. The One Night Stand Costume Nothing makes a better conversation starter than a funny costume. This literal version of the common college phrase â€Å"one night stand† is the perfect way to break the ice at any Halloween party. Making it is easy and you can get pretty clever with the items you keep on top of it. Image credit: Pinterest 5. The Tinder Profile Costume Chances are that you want to meet someone special this Halloween. Why stress over a costume that attracts people when you already have a way to connect? Going as your own Tinder profile gives people you want to meet the chance to swipe left or right in person. Who knows, maybe you’ll find a match this Halloween! Image credit: Pinterest 6. The Twister Board Costume Playing on nostalgia is a grand tradition of Halloween and going as al all-time-favorite board game is a great way to stand out at your next Halloween party. This Twister costume, for example, gives you a fun and colorful costume that you can use to get twisted up into the Halloween spirit! Image credit: Pinterest 7. The â€Å"50 Shades Of Grey† Costume Everyone loves a good play on words. Especially when it comes to the steamy romantic fiction novel 50 Shades of Grey. While the subject matter of the book might not be appropriate for every Halloween festivity, putting a twist on the costume can be fun and creative. Consider what this guy did below by going to your local hardware or paint store and grabbing every sample of grey you can find so you can tape it to your body. You can even make a fancy hat! Image credit: Pinterest 8. The Ball Pit Costume This costume is a bit on the nose but hilarious and creative nonetheless. Dressing up as everyone’s favorite place to play as a kid the ball pit gives you the chance to let people get â€Å"interactive† with your costume. Making your own requires some suspenders, a basket, and a whole lotta balls. Image credit: Pinterest 9. The Lumberjack Costume From Paul Bunyan to Mr. Brawny, it’s safe to say that everyone loves a lumberjack. There is just something about a man that can survive on his own in the wilderness that makes him immediately magnetic and charming. Dressing up as one for Halloween is sure to make you a party favorite. This costume is one of the easiest on the list to make for yourself. You just need a flannel t-shirt, suspenders, an ax or hatchet, and boots. Image credit: Pinterest 10. The Missing Person On A Milk Carton Costume If you dont have the time to come up with a full head to toe costume, then we suggest working on the head. This missing persons milk carton costume is an easy way to join in on the Halloween celebration without having to put too much effort into a full costume. Moving boxes are perfect for making your own milk box. Image credit: Pinterest 11. The Error Costume Not Found Costume Halloween may be one of the most popular holidays in the USA, but not everyone wants to get into the spirit of it. But that doesnt mean they cant at least participateor at least let people know they arent participating. If you arent a fan of Halloween but dont want the ridicule of not dressing up for the party you are going to, consider a clever costume like the guy below that reads â€Å"Error 404. Costume Not Found.† At least people will know you tried. Image credit: Pinterest 12. The Sexy Fireman Costume Women arent the only ones who can turn a normal costume into a sexy one. If Halloween is more about showing off your body, then you cant go wrong with this sexy fireman costume. It is basically the same as a regular fireman costume but with no shirt, six-pack abs, and a charming smile. Image credit: Pinterest 13. The Top Gun Costume Show everyone at your next Halloween party how sexy and dangerous you can be with a classic Top Gun costume. It is easy to make yourself and really only requires some military patches, dog tags, aviator sunglasses, and a cool slick hairdo! Image credit: Pinterest 14. The Boy Scout Costume In college, you might find a new use for your old boy scout uniform. Why not make it this year’s Halloween costume. The hilarity of a full grown man in a childs uniform is sure to make you a hit at this years Halloween party. You can even add new badges for beer pong, procrastination, and pizza eating! Image credit: Pinterest 15. The Aladdin Costume A Halloween costume can be hard to choose. But with the Aladdin Costume from the hit Disney movie, you’ll have a fun and familiar way to celebrate Halloween this year. Make your own and accent it with details like a flying carpet, magic lamp, and toy monkey on your back. Image credit: Pinterest 16. The Inmate Costume Take a page from the hit series â€Å"Orange Is The New Black† and dress up like a prison inmate for Halloween this year. Its an easy costume that just requires a jumpsuit and a black marker. You can even add details like shackles, tattoos, and tin cups. Image credit: halloweencostumes.com 17. The Jager Bomb Costume It is a well-known fact that drinking and college seem to go hand in hand. Why not capitalize on that this Halloween and go as one of college students’ all-time favorite shots: The Jager Bomb. Image credit: Pinterest 18. The Shining Costume It is often said that â€Å"Imitation is the best form of flattery.† Nothing could be truer of your favorite novels and books. So why not show how much you love your favorite works of literature like the guy below who has taken a page from The Shining. The added benefit is that you can let everyone know you have arrived to the party by walking into the room and yelling, â€Å"HERES JOHNNY!† Image credit: Pinterest 19. The Deadmau5 Costume If you love Halloween but hate socializing at parties, then this DeadMau5 costume is the perfect solution to your social anxiety. The iconic mouse head of this famous Canadian DJ and producer has a spooky and fun vibe to it that will fit right in with the spirit of Halloween. Making it is easy! Image credit: Pinterest Guys, you’ll have no excuse this year for showing up to your college Halloween bash without a costume! These fun costume ideas are sure to make you the hit of the party. And if you need even more ideas, check out this post with Halloween costume ideas!

Saturday, October 19, 2019

How the development of corporate governance improved the overall Dissertation

How the development of corporate governance improved the overall quality of uk band management - Dissertation Example In the course of the presentation and interpretation of results, it was established that banks that pay the best of salaries and have an effective remuneration programs retain their employees over a very long periods of time in their organisations. In the same way, those that paid less suffered frequent cases of employee turnover in the forms of resignation and unannounced quitting of position. Literature has indeed showed that when companies put in proactive efforts through the standardisation of remuneration as suggested by the UK corporate governance code to retain their employees, there is a superlative impact that this would have on company performance (Iedema and Poppe, 2001). First and foremost, it will be noted that companies with long serving employees can be assured of a human resource base that is in-tuned with the organisational culture in place at the workplace (National Technical Information Services, 1987). Subsequently, the rhythm of customer participation will be eas ily read by such employees, who would in turn offer services and products that meet customer specification. In the long run, customers who have their specifications met will become satisfied with service received and will want to continue doing business with the bank. Another factor that links employee retention to bank performance is the fact that employees who have worked among themselves for long get along easily and better. Often times when new employees would have to come in who will be coached and guided as to how to deliver service, the rates of productivity of such employees will not be as effective as those who can work independently or with limited support (Ilies and Scott, 2006). Meanwhile, the levels of productivity recorded by banks can be translated directly into tangible fiscal growth. Acknowledgement I would like to acknowledge the efforts of all people who have been of help to me in the course of writing this dissertation. Names like ................. are worth ment ioning. Thank you to you all. Contents Chapter 1: Introduction 1 1.1 Research background 1 1.2 Research rationale 1 1.3 Research aims and objectives 4 Chapter 2: Literature Review 5 2.2 Corporate governance in the banking industry 7 2.5 Operational Risk 12 2.5.1 Regulatory and Statutory framework for enforcing Corporate Governance 13 2.7 Measurement of Bank Performance 19 Chapter 3: Methodology 21 3.1 Introduction 21 3.2 Aims and Objectives of the Research 21 3.3 Research Approach 22 3.4 Research Design 22 3.5 Research Theory and Strategy 23 3.6 Research Method 24 3.7 Reliability and Validity 26 3.8 Limitations 26 Chapter 4: Findings 27 Chapter 5: Discussion 40 Chapter 6. Conclusion, Limitations and Recommendations 55 6.1 Conclusion 55 6.2 Limitations 58 6.3 Recommendations 60 Reference 61 Chapter 1: Introduction 1.1 Research background Undoubtedly, the degree of the collapses brought about by the Financial Crisis across the world as well as the ramification for the entire global ec onomy is documented in many other places. Consequently, many would want to know whether the failure is as a result of poor corporate governance or not. As a response to isolated cases such as the Marconi collapse in 2001 in the UK, many would argue that it was not a failure of corporate governance because the collapse was mainly after a misguided strategy

Friday, October 18, 2019

ESL Cause and Effect Essay Example | Topics and Well Written Essays - 1000 words

ESL Cause and Effect - Essay Example Those native in a country expect that immigrants should get integrated into the society. One of the ways this is expected to be achieved, is by having those individuals learning the language of the country and with respect to America, students are required to study English (Kessler& Quinn, 1982). Thus it was thought necessary that the way to assimilate different culture is through making English the uniform language of instruction. The assimilationist orientation was institutionalized by reducing public funding to private and church associated schools and banning bilingual programs in public schools. Bilingual textbooks were burnt with teachers were fired, taken to court, and convicted for clearing up concepts in childrens own native languages. Language minority students display low accomplishment in English only classrooms. When compared with the national norms, they are behind in every subject areas. In addition to losing their native languages, these students exhibit low achievement in English only classrooms. When compared with the national norms, they lag behind in all subject areas. A large number of them eventually drop out or are pushed out of school (Kessler& Quinn, 1982). Classrooms are full of students representing diverse cultural, ethnic, and national origins. They speak one of the many different immigrant languages back home, and have diverse religious, socioeconomic, and educational backgrounds. This means that different approaches would be required but this becomes quite difficult. School failure of language minority students is was attributed to childrens supposed inadequate intellectual, cognitive, and linguistic abilities. It was widely believed that knowing two languages resulted in mental confusion, subdued cognitive and academic development, and led to low achievement of language minority students. Another commonly held belief was that some ethnic groups were genetically

Gay Marriage Research Paper Example | Topics and Well Written Essays - 1250 words

Gay Marriage - Research Paper Example Gay marriages should not be allowed and there should be no constitutional amendment to allow the gays and lesbians to obtain the legal marriage certificate. Gay marriage is an unnatural way of living. Had gay marriage been a natural way of living, gays would have been able to make babies from their relationship. Two people living together in a gay marriage contract cannot suffice each other’s emotional needs, even if they feel physically satisfied being together. Even if they happen to be satisfied both emotionally and physically, the connection may not last forever. Likewise, a woman needs the love of a man for concerns including and beyond physical satisfaction. A man is incomplete without a woman and vice versa. This can be estimated from the fact that no couple but the one comprising members of the opposite sex is able to produce children biologically. Gays are not able to produce children, so they can never experience what it feels like to be a parent. Although some gays tend to adopt a child, yet it has its own negative implications upon the adopted child as will be discussed later. Even if they do adopt children, they are never able to connect to them in a way they would have connected to their biological children owing to the fact that they know they are adopted and not their own children. â€Å"Popular stereotypes suggest either that lesbian and gay parents do not exist, or that children suffer irreparable harm if brought up in the households of lesbian or gay parents† (Patterson and Redding 29). From every aspect, life of a gay is unnatural. Gay marriage is an unreligious way of living. God has created everything for a purpose. Nothing has been made useless. Likewise, God has provided human beings with a system according to which they should live. Most of the religions, particularly the Abrahamic religions condemn the practice of homosexuality. Islam not only forbids gay marriage but also declares severe punishments for the people involv ing in this act. Religious scriptures provide accounts of God’s fury over the nations that have indulged in the practice of homosexuality in the past. Specifically, both Bible and Quran describe how the People of Lot (P.B.U.H.) were cursed and punished by God Almighty when they did not give up the practice of homosexuality despite repeated warnings made by the Prophet Lot (P.B.U.H.). â€Å"Scholars of shari’a, Islamic law, interpret homosexuality to be not merely a sin, but a crime as well† (Kligerman 54). We fundamentally derive our norms and values from religion. Had there been no religion, we would have had no guidelines to follow and there would be no means to judge whether a certain action was right or wrong. Since religion has prohibited us from indulging in the practice of homosexuality, there is no way we can justify the act. Legalization of gay marriage is essentially an offense of the religious teachings and violation of the religious principles. Gay m arriage is supported in the name of modernity and people who oppose gay marriage because they practice religion are said to be conservative and narrow minded. A vast majority of people who speak in favor of gay marriages have started to talk about religious principles as man made. With that being said, our fundamental beliefs are being challenged along with our belief in God. â€Å"A part of the cost of the voluntary but â€Å"

Thursday, October 17, 2019

Smallpox Vaccination Essay Example | Topics and Well Written Essays - 1250 words

Smallpox Vaccination - Essay Example Since smallpox vaccine comes with side effects, it is argued that it should not be administered. It is true that the smallpox vaccine is associated with certain side effects: it is estimated that approximately one in 1 million primary vaccinees and one in 4 million revaccinees will die from adverse vaccine reactions (Maurer et al. 889). There are more severe health related complications that may follow either primary vaccination or revaccination. For instance, it may have and impact on the nervous system that may result in postvaccinial encephalitis, encephalomyelitis, and encephalopathy, and more serious skin infections. Progressive vaccinia (vaccinia necrosum) generally occurs in individuals with weakened immune systems and eczema vaccinatum generally occurs in people with eczema and related skin diseases. Such complications may progressively result in severe disability, permanent neurological damage, and sometimes even death. History of vaccination has seen approximately 1 death per million primary vaccinations and 1 death per 4 million revaccinations. In most of the cases death is often the result of postvaccinial encephalitis or progressive vaccinia. ... Hence, smallpox vaccines should be produced further and should be used in case of any sudden outbreak. It is estimated that 300-500 million deaths in the 20th century was due to smallpox. The World Health Organization estimated that in 1967, 15 million people were the victims of the disease and that two million died in that year due to smallpox (WHO Factsheet n. pag, 2007). World Health Organization certified the eradication of smallpox in 1979 after successful vaccination campaigns throughout the 19th and 20th centuries (WHO A52/5, 1999). While the last case of smallpox in the United States was in 1949, the last naturally occurring case in the world was in Somalia in 1977. After the disease was eliminated or eridicated from the world, routine vaccination against smallpox among the general public was stopped because it was no longer necessary for prevention. United States discontinude the smallpox immunisation in 1972 and also halted the production of vaccine in 1983. Today, stockpiled vaccine has been used only for laboratory researchers working on orthopoxviruses. Since most of the population today is considered to be nonimmune, there is concern raised as to whether smallpox immunization should be resumed or not. This is in view of the current threat from the bioterrorists (Baltimore and McMillan 110-4). There are four factors that have contributed to skepticism of smallpox vaccine's effectiveness. The dubious notion that lesions from cowpox, a disease of cattle, could prevent smallpox, a related but different human disease is the first point. Secondly during the 19th century, which preceded modern bacteriology and the age of refrigeration, it was impossible to know exactly what was in any given dose of vaccine. Thirdly the reported amplification

Organization of IT and information systems (Amazon company) Essay

Organization of IT and information systems (Amazon company) - Essay Example Computers, servers, and data management systems are some of the key components of an IT department. These components perform various complex functions related to management of information. IT department of a company plays a critical role in the success of the company in the 21st century. Today, there is hardly any company or organization, which does not make use of information technology for managing data and information in an organized way. Amazon is one of the leading global internet companies of the world. It is a platform for the sale of different kinds of products such as books, toys, furniture, and music CDs. Amazon holds the pride of being the largest retailer of America. Amazon Company was launched online by Jeff Bezos in 1995. Amazon S3 and Amazon EC2 are those products, which have contributed significantly to the success of the company. Farmer (2008) asserts, â€Å"Their core competency is their ability to develop and leverage their technology stack, including SimpleDB, EC2, and S3, towards making retail ultra-efficient†. Amazon Company has many competitors who are trying to snatch the market domination from Amazon but none of the competing companies has been successful in the purpose yet. Some of the major competitors of Amazon include Elastra, eMusic, and Alice.com. It is due to the implementation of an effective and efficient management information system that the company has achieved market dominati on in a very short span of time leaving behind all of its competitors. At present, Amazon is recognized as one of the largest online shopping companies of the world. In the later part of this report, we will discuss those factors that are driving use of the information system in the company. We will also analyze the impact of information system on the company in terms of benefits and limitations. Let us first get to know what management information system actually is in order to get a

Wednesday, October 16, 2019

Smallpox Vaccination Essay Example | Topics and Well Written Essays - 1250 words

Smallpox Vaccination - Essay Example Since smallpox vaccine comes with side effects, it is argued that it should not be administered. It is true that the smallpox vaccine is associated with certain side effects: it is estimated that approximately one in 1 million primary vaccinees and one in 4 million revaccinees will die from adverse vaccine reactions (Maurer et al. 889). There are more severe health related complications that may follow either primary vaccination or revaccination. For instance, it may have and impact on the nervous system that may result in postvaccinial encephalitis, encephalomyelitis, and encephalopathy, and more serious skin infections. Progressive vaccinia (vaccinia necrosum) generally occurs in individuals with weakened immune systems and eczema vaccinatum generally occurs in people with eczema and related skin diseases. Such complications may progressively result in severe disability, permanent neurological damage, and sometimes even death. History of vaccination has seen approximately 1 death per million primary vaccinations and 1 death per 4 million revaccinations. In most of the cases death is often the result of postvaccinial encephalitis or progressive vaccinia. ... Hence, smallpox vaccines should be produced further and should be used in case of any sudden outbreak. It is estimated that 300-500 million deaths in the 20th century was due to smallpox. The World Health Organization estimated that in 1967, 15 million people were the victims of the disease and that two million died in that year due to smallpox (WHO Factsheet n. pag, 2007). World Health Organization certified the eradication of smallpox in 1979 after successful vaccination campaigns throughout the 19th and 20th centuries (WHO A52/5, 1999). While the last case of smallpox in the United States was in 1949, the last naturally occurring case in the world was in Somalia in 1977. After the disease was eliminated or eridicated from the world, routine vaccination against smallpox among the general public was stopped because it was no longer necessary for prevention. United States discontinude the smallpox immunisation in 1972 and also halted the production of vaccine in 1983. Today, stockpiled vaccine has been used only for laboratory researchers working on orthopoxviruses. Since most of the population today is considered to be nonimmune, there is concern raised as to whether smallpox immunization should be resumed or not. This is in view of the current threat from the bioterrorists (Baltimore and McMillan 110-4). There are four factors that have contributed to skepticism of smallpox vaccine's effectiveness. The dubious notion that lesions from cowpox, a disease of cattle, could prevent smallpox, a related but different human disease is the first point. Secondly during the 19th century, which preceded modern bacteriology and the age of refrigeration, it was impossible to know exactly what was in any given dose of vaccine. Thirdly the reported amplification

Tuesday, October 15, 2019

Critically discuss the proposition; ''organisational culture cannot be Essay

Critically discuss the proposition; ''organisational culture cannot be managed'' - Essay Example The move raises the question of how easy it is to manage or to change organisational cultures. There is widespread criticism of the common culture management approaches by various scholars; in recent studies, it is evidenced that managers are continually engaging themselves in planned cultural interventions (Griffin & Moorhead 2011). Their main concerns are that organisational cultures determine the image and the performances of organisations and failure to address the issue would signify failure in organisational goals. The studies indicate that managing organisational cultures is the most common and popular form of managerial interventions. Organisational atmospheres usually change and organisational cultures evolve with time and generations in an organisation (Alvesson, 2002). Organisations emerge because of a group of people having a common goal of working together to achieve a common goal. For a single person, the tasks would be challenging or impossible. The process it takes for organisational culture formation starts creation of small groups of individuals with a common idea or notion in organisational operations. These finally generate long-lasting organisational cultures that pass from one generation to another. In the past two decades, the issues of organisational culture have had much attention especially in the health sector. The Health sector is a critical area where cultures determine various aspects in the services and operations (Scott et al., 2003). In the UK, for example, the central governments have been actively promoting structural change in the UK National Health Services (NHS). It is in an effort to secure sufficient gains in the health care performance (Davies et al., 2000). The main goal of the central government policies lies on the development of cultural changes in view of structural change.

Problem Solving Process Essay Example for Free

Problem Solving Process Essay 1. Define the problem This is often where people struggle. They react to what they think the problem is. Instead, seek to understand more about why you think theres a problem. Define the problem: (with input from yourself and others). Ask yourself and others, the following questions: 1.What can you see that causes you to think theres a problem? 2.Where is it happening? 3.How is it happening? 4.When is it happening? 5.With whom is it happening? (HINT: Dont jump to Who is causing the problem? When were stressed, blaming is often one of our first reactions. To be an effective manager, you need to address issues more than people.) 6.Why is it happening? 7.Write down a five-sentence description of the problem in terms of The following should be happening, but isnt or The following is happening and should be: As much as possible, be specific in your description, including what is happening, where, how, with whom and why. (It may be helpful at this point to use a variety of research methods. Defining complex problems: If the problem still seems overwhelming, break it down by repeating steps 1-7 until you have descriptions of several related problems. Verifying your understanding of the problems: It helps a great deal to verify your problem analysis for conferring with a peer or someone else. Prioritize the problems: If you discover that you are looking at several related problems, then prioritize which ones you should address first. Note the difference between important and urgent problems. Often, what we consider to be important problems to consider are really just urgent problems. Important problems deserve more attention. For example, if youre continually answering urgent phone calls, then youve probably got a more important problem and thats to design a system that screens and prioritizes your phone calls. Understand your role in the problem: Your role in the problem can greatly influence how you perceive the role of others. For example, if youre very stressed out, itll probably look like others are, too, or, you may resort too quickly to blaming and reprimanding others. Or, you are feel very guilty about your role in the problem, you may ignore the accountabilities of others. 2. Look at potential causes for the problem †¢Its amazing how much you dont know about what you dont know. Therefore, in this phase, its critical to get input from other people who notice the problem and who are effected by it. †¢Its often useful to collect input from other individuals one at a time (at least at first). Otherwise, people tend to be inhibited about offering their impressions of the real causes of problems. †¢Write down what your opinions and what youve heard from others. †¢Regarding what you think might be performance problems associated with an employee, its often useful to seek advice from a peer or your supervisor in order to verify your impression of the problem. †¢Write down a description of the cause of the problem and in terms of what is happening, where, when, how, with whom and why. 3. Identify alternatives for approaches to resolve the problem At this point, its useful to keep others involved (unless youre facing a personal and/or employee performance problem). Brainstorm for solutions to the problem. Very simply put, brainstorming is collecting as many ideas as possible, then screening them to find the best idea. Its critical when collecting the ideas to not pass any judgment on the ideas just write them down as you hear them. (A wonderful set of skills used to identify the underlying cause of issues is Systems Thinking.) 4. Select an approach to resolve the problem †¢When selecting the best approach, consider: †¢Which approach is the most likely to solve the problem for the long term? †¢Which approach is the most realistic to accomplish for now? Do you have the resources? Are they affordable? Do you have enough time to implement the approach? †¢What is the extent of risk associated with each alternative? (The nature of this step, in particular, in the problem solving process is why problem solving and decision making are highly integrated.) 5. Plan the implementation of the best alternative (this is your action plan) 1.Carefully consider What will the situation look like when the problem is solved? 2.What steps should be taken to implement the best alternative to solving the problem? What systems or processes should be changed in your organization, for example, a new policy or procedure? Dont resort to solutions where someone is just going to try harder. 3.How will you know if the steps are being followed or not? (these are your indicators of the success of your plan) 4.What resources will you need in terms of people, money and facilities? 5.How much time will you need to implement the solution? Write a schedule that includes the start and stop times, and when you expect to see certain indicators of success. 6.Who will primarily be responsible for ensuring implementation of the plan? 7.Write down the answers to the above questions and consider this as your action plan. 8.Communicate the plan to those who will involved in implementing it and, at least, to your immediate supervisor. (An important aspect of this step in the problem-solving process is continually observation and feedback.) 6. Monitor implementation of the plan Monitor the indicators of success: 1.Are you seeing what you would expect from the indicators? 2.Will the plan be done according to schedule? 3.If the plan is not being followed as expected, then consider: Was the plan realistic? Are there sufficient resources to accomplish the plan on schedule? Should more priority be placed on various aspects of the plan? Should the plan be changed? 7. Verify if the problem has been resolved or not One of the best ways to verify if a problem has been solved or not is to resume normal operations in the organization. Still, you should consider: 1.What changes should be made to avoid this type of problem in the future? Consider changes to policies and procedures, training, etc. 2.Lastly, consider What did you learn from this problem solving? Consider new knowledge, understanding and/or skills. 3.Consider writing a brief memo that highlights the success of the problem solving effort, and what you learned as a result. Share it with your supervisor, peers and subordinates.

Monday, October 14, 2019

Voice over Internet Protocol (VoIP) Technology

Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are:  · Conversion of voice to analog and digital signal.  · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP:  · H.323 [12]  · IP Multimedia Subsystem (IMS)  · Session initiation Protocol (SIP) [5]  · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network Ø To formally define the network security problems and unauthorized access incidents Ø To define the most accredited security techniques and security methods Ø To evaluate the prototype system and packet feature mechanism Ø Email and other internet message are easily integrated with the voice applications Ø To support the multimedia applications, which provides less cost effective services for video conference, gaming Ø To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. Ø Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. Ø Present offline message passing between the users by selecting a user from predefined offline user list Ø Present textual communication 1.3 Research Method Ø Provide authentication to the end users for accessing the VoIP services Ø Design secure VoIP Configuration system Ø Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. Ø Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. Ø This research enhance security methods by analyzing the modern security challenges Ø To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance Ø Balance VoIP security and performance by measuring the services and network traffic Ø To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows Ø Computer to computer based services Ø PC to phone and phone to PC based services Ø Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are Ø VoIP service providers Ø Modem Ø Internet services Ø ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are Ø Latency Ø Jitter Ø Packet loss Ø Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are Ø Time spent on routers and long network distance Ø Security measures Ø Voice data encoding Ø Queuing Ø Packetization Ø Composition and decomposition Ø Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section â€Å"RTP profiles and pay load format specification† of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to â€Å"handshake† with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ‘voicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows Ø Software Related: Ø Device related Ø Protocol related Ø System Configuration related Ø Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic Ø Software applications Ø Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are Ø PCs Ø Telephone adaptors Ø Modems Ø VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. â€Å"H.323 is a complicated protocol†. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p Voice over Internet Protocol (VoIP) Technology Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are:  · Conversion of voice to analog and digital signal.  · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP:  · H.323 [12]  · IP Multimedia Subsystem (IMS)  · Session initiation Protocol (SIP) [5]  · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network Ø To formally define the network security problems and unauthorized access incidents Ø To define the most accredited security techniques and security methods Ø To evaluate the prototype system and packet feature mechanism Ø Email and other internet message are easily integrated with the voice applications Ø To support the multimedia applications, which provides less cost effective services for video conference, gaming Ø To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. Ø Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. Ø Present offline message passing between the users by selecting a user from predefined offline user list Ø Present textual communication 1.3 Research Method Ø Provide authentication to the end users for accessing the VoIP services Ø Design secure VoIP Configuration system Ø Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. Ø Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. Ø This research enhance security methods by analyzing the modern security challenges Ø To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance Ø Balance VoIP security and performance by measuring the services and network traffic Ø To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows Ø Computer to computer based services Ø PC to phone and phone to PC based services Ø Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are Ø VoIP service providers Ø Modem Ø Internet services Ø ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are Ø Latency Ø Jitter Ø Packet loss Ø Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are Ø Time spent on routers and long network distance Ø Security measures Ø Voice data encoding Ø Queuing Ø Packetization Ø Composition and decomposition Ø Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section â€Å"RTP profiles and pay load format specification† of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to â€Å"handshake† with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ‘voicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows Ø Software Related: Ø Device related Ø Protocol related Ø System Configuration related Ø Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic Ø Software applications Ø Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are Ø PCs Ø Telephone adaptors Ø Modems Ø VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. â€Å"H.323 is a complicated protocol†. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p