Monday, September 30, 2019

The Moths

Through the use of Symbolism and Characterization In the short story â€Å"The Moths† by Helena Maria Viramontes, the author uses symbolism and characterization to paint the scene of a girl in a literary fiction that has lost her way and ends up finding herself within her Grandmother through the cycles of life.Through the eyes of an unnamed girl we relive a past that has both a traumatic ending and a new leash on life; however, we do not get there without first being shown the way, enter â€Å"The Moths†. The author utilizes opposite ends of the light spectrum to signify beginnings and endings by painting a vivid picture for the reader: â€Å"There comes a time when the sun is defiant.Just about the time when moods change, inevitable seasons of a day, transitions from one color to another, that hour or minute or second when the sun is finally defeated, finally sinks into the realization that it cannot with all its power to heal or burn, exist forever, there comes an il lumination where the sun and earth meet, a final burst of burning red orange fury reminding us that although endings are inevitable, they are necessary for rebirths, and when the time came, just when I switched on the light in the kitchen to open Abuelita’s soup, it was probably then that she died† (Viramontes 4).She explains to the reader why the sun causes different shades of red and orange throughout the day, the shades themselves represent a life span of different ages, which turn different colors with the coming seasons â€Å"of the day†, as opposed to the year, at the end of that day the sun dies and a new moon is born in place of that sun, and when a moon dies the sun is reborn the next day, and so goes the cycle of life. With this the narrator also states that â€Å"endings are inevitable† and so when we look at the Grandmother we already know that she will die because her end is, as the narrator says â€Å"inevitable†.The final line in the excerpt is perhaps the single most important piece that ties all of the usage of symbolism together. When the narrator turns the light on, a new day has started in the form of a rebirth caused by her Grandmothers death, you see, the moon in the story is not as present as the sun, however, we know that the Grandmother’s name is â€Å"Luna†, which translated in the narrators native tongue of Spanish is â€Å"moon†, we know her language is Spanish because of the consistent use of Latin terms like; â€Å"Placa†, â€Å"Menudo†, or even â€Å"Heliotrope†, which is a native plant of Peru.Since the moon is the polar opposite of the sun we can say that, in the human element of the story there is Grandma Luna which is currently at the ending of her â€Å"moon life† and at the beginning of her rebirth towards a new day as the â€Å"sun†, the light bulb, as a symbol of rebirth representing the sun, appears one more time in the story, where in the wake of her Grandmothers death, the narrator is watching the moths â€Å"fluttering to light†, carrying her Grandmother’s soul to a place were it can become reborn.I believe that the author’s carefully chosen name of â€Å"Luna† for the Grandmother was in fact to show the reader that our death is inevitable but our rebirth in terms of happiness is changeable.Equally important in the story is the use of characterization to show the reader exactly who the protagonist in the story is and what kind of life she is living, we first read of her sisters and how they act in contrast to the protagonist: â€Å"I [the narrator] wasn't even pretty or nice like my older sisters and I just couldn't do the girl things they could do†, the narrator first bluntly tells the reader that she is different from her sisters and then shows the reader exactly how they are not the same through the use of characterization, â€Å"My hands were too big to handle the fin eries of crocheting or embroidery and I always pricked my fingers or knotted my colored threads time and time again while my sisters laughed and called me bull hands with their cute waterlike voices. †. With all of this information we can tell that the narrator is having difficulty in her own path and does not feel comfortable in her own body, it seems that she is more of a boy then a girl according to the standards set forth by her mother and father. But why is it that the narrator should conform to these standards? At this point we already know that they are in contrast to each other but the reason as to why is deep rooted through yet another mean, conformity.Her father is very devoted to his religious beliefs and wants his family to conform, â€Å"He would pound his hands on the table, rocking the sugar dish or spilling a cup of coffee and scream that if I didn't go to mass every Sunday to save my goddamn sinning soul, then I had no reason to go out of the house, period. P unto final. †, the narrator has issues with this because she does not want to conform to something she does not herself believe in. The reader knows she feels uncomfortable in a church because she says â€Å"I was alone. I know why I had never returned† when she went to the chapel, therefore we are left to the conclusion that the narrator has a free spirit that yearns to become free of the beliefs that have been bestowed upon her. In other words she is completely opposite of her entire family, or so we see thus far.Grandma Luna is an interesting character, she does not have many lines in the story but the presentation of her character plays a very important role as to who exactly she is, where she came from, where she is going, but even more important, where she is leading the narrator. The Grandmother’s life parallels that of the narrator in the respect that sometime during her life she was also defiant, â€Å"The scars on her back which were as thick as the li fe lines on the palms of her hands made me realize how little I really knew of Abuelita†. This line is informative to the narrator, for the first time she realizes that she is not alone in her personal beliefs.She also wants to become free like her Grandmother is, â€Å"I liked her porch because it was shielded by the vines of the chayotes and I could get a good look at the people and car traffic on Evergreen without them knowing†, she likes the porch because the vines are growing in and around her Grandmothers home, she also feels protected by the vines. We also know she cares for her Grandmother, because of the way she talks about her, â€Å"Really, I told my Ama it was only fair†. Even before her realization of Grandma Luna’s defiance the narrator felt a strong connection to her, but seeing the scars she has a great sense of why it is that she gets along so well with her Grandmother. They are both very much alike, and she feels â€Å"safe† around her, â€Å"I [the narrator] always felt her gray eye on me.It made me feel, in a strange sort of way, safe and guarded and not alone. Like God was supposed to make you feel†, the authors choice of the word â€Å"was†, tells us that god does not make her feel safe, instead it is her Grandmother whom she confides in. The narrator herself is defiant and even disrespectful at times, however her defiance is not done without reason; it is done because of her personal beliefs. Her mother and father have strong religious beliefs and try to force those beliefs upon her, when she does not want to conform she fakes going to church and instead, goes over to her Grandmother’s home where she finds comfort in helping her Grandmother with her daily chores.Viramontes chooses to keep the narrator unnamed so that the reader feels like they are taking on the role of the narrator, if she had named her â€Å"Alice† or â€Å"Lisa† then the audience might not have felt a strong connection with the narrator and the message of rebirth and changing your own mental status to achieve a form of enlightenment, may not have been accomplished. In the end we realize the purpose of the story, it tells about the rebirth any individual can make by changing the way they see the world. The narrator saw the world brand new for the first time in a different light because of her Grandmother’s death and subsequent rebirth through the moths, carrying her soul to â€Å"new light†. It’s not in a literal sense that the narrator is born again; instead it’s more of a mental status change that the narrator has undergone, and because of that she is at peace with herself. The Moths Through the use of Symbolism and Characterization In the short story â€Å"The Moths† by Helena Maria Viramontes, the author uses symbolism and characterization to paint the scene of a girl in a literary fiction that has lost her way and ends up finding herself within her Grandmother through the cycles of life.Through the eyes of an unnamed girl we relive a past that has both a traumatic ending and a new leash on life; however, we do not get there without first being shown the way, enter â€Å"The Moths†. The author utilizes opposite ends of the light spectrum to signify beginnings and endings by painting a vivid picture for the reader: â€Å"There comes a time when the sun is defiant.Just about the time when moods change, inevitable seasons of a day, transitions from one color to another, that hour or minute or second when the sun is finally defeated, finally sinks into the realization that it cannot with all its power to heal or burn, exist forever, there comes an il lumination where the sun and earth meet, a final burst of burning red orange fury reminding us that although endings are inevitable, they are necessary for rebirths, and when the time came, just when I switched on the light in the kitchen to open Abuelita’s soup, it was probably then that she died† (Viramontes 4).She explains to the reader why the sun causes different shades of red and orange throughout the day, the shades themselves represent a life span of different ages, which turn different colors with the coming seasons â€Å"of the day†, as opposed to the year, at the end of that day the sun dies and a new moon is born in place of that sun, and when a moon dies the sun is reborn the next day, and so goes the cycle of life. With this the narrator also states that â€Å"endings are inevitable† and so when we look at the Grandmother we already know that she will die because her end is, as the narrator says â€Å"inevitable†.The final line in the excerpt is perhaps the single most important piece that ties all of the usage of symbolism together. When the narrator turns the light on, a new day has started in the form of a rebirth caused by her Grandmothers death, you see, the moon in the story is not as present as the sun, however, we know that the Grandmother’s name is â€Å"Luna†, which translated in the narrators native tongue of Spanish is â€Å"moon†, we know her language is Spanish because of the consistent use of Latin terms like; â€Å"Placa†, â€Å"Menudo†, or even â€Å"Heliotrope†, which is a native plant of Peru.Since the moon is the polar opposite of the sun we can say that, in the human element of the story there is Grandma Luna which is currently at the ending of her â€Å"moon life† and at the beginning of her rebirth towards a new day as the â€Å"sun†, the light bulb, as a symbol of rebirth representing the sun, appears one more time in the story, where in the wake of her Grandmothers death, the narrator is watching the moths â€Å"fluttering to light†, carrying her Grandmother’s soul to a place were it can become reborn.I believe that the author’s carefully chosen name of â€Å"Luna† for the Grandmother was in fact to show the reader that our death is inevitable but our rebirth in terms of happiness is changeable.Equally important in the story is the use of characterization to show the reader exactly who the protagonist in the story is and what kind of life she is living, we first read of her sisters and how they act in contrast to the protagonist: â€Å"I [the narrator] wasn't even pretty or nice like my older sisters and I just couldn't do the girl things they could do†, the narrator first bluntly tells the reader that she is different from her sisters and then shows the reader exactly how they are not the same through the use of characterization, â€Å"My hands were too big to handle the fin eries of crocheting or embroidery and I always pricked my fingers or knotted my colored threads time and time again while my sisters laughed and called me bull hands with their cute waterlike voices. †. With all of this information we can tell that the narrator is having difficulty in her own path and does not feel comfortable in her own body, it seems that she is more of a boy then a girl according to the standards set forth by her mother and father. But why is it that the narrator should conform to these standards? At this point we already know that they are in contrast to each other but the reason as to why is deep rooted through yet another mean, conformity.Her father is very devoted to his religious beliefs and wants his family to conform, â€Å"He would pound his hands on the table, rocking the sugar dish or spilling a cup of coffee and scream that if I didn't go to mass every Sunday to save my goddamn sinning soul, then I had no reason to go out of the house, period. P unto final. †, the narrator has issues with this because she does not want to conform to something she does not herself believe in. The reader knows she feels uncomfortable in a church because she says â€Å"I was alone. I know why I had never returned† when she went to the chapel, therefore we are left to the conclusion that the narrator has a free spirit that yearns to become free of the beliefs that have been bestowed upon her. In other words she is completely opposite of her entire family, or so we see thus far.Grandma Luna is an interesting character, she does not have many lines in the story but the presentation of her character plays a very important role as to who exactly she is, where she came from, where she is going, but even more important, where she is leading the narrator. The Grandmother’s life parallels that of the narrator in the respect that sometime during her life she was also defiant, â€Å"The scars on her back which were as thick as the li fe lines on the palms of her hands made me realize how little I really knew of Abuelita†. This line is informative to the narrator, for the first time she realizes that she is not alone in her personal beliefs.She also wants to become free like her Grandmother is, â€Å"I liked her porch because it was shielded by the vines of the chayotes and I could get a good look at the people and car traffic on Evergreen without them knowing†, she likes the porch because the vines are growing in and around her Grandmothers home, she also feels protected by the vines. We also know she cares for her Grandmother, because of the way she talks about her, â€Å"Really, I told my Ama it was only fair†. Even before her realization of Grandma Luna’s defiance the narrator felt a strong connection to her, but seeing the scars she has a great sense of why it is that she gets along so well with her Grandmother. They are both very much alike, and she feels â€Å"safe† around her, â€Å"I [the narrator] always felt her gray eye on me.It made me feel, in a strange sort of way, safe and guarded and not alone. Like God was supposed to make you feel†, the authors choice of the word â€Å"was†, tells us that god does not make her feel safe, instead it is her Grandmother whom she confides in. The narrator herself is defiant and even disrespectful at times, however her defiance is not done without reason; it is done because of her personal beliefs. Her mother and father have strong religious beliefs and try to force those beliefs upon her, when she does not want to conform she fakes going to church and instead, goes over to her Grandmother’s home where she finds comfort in helping her Grandmother with her daily chores.Viramontes chooses to keep the narrator unnamed so that the reader feels like they are taking on the role of the narrator, if she had named her â€Å"Alice† or â€Å"Lisa† then the audience might not have felt a strong connection with the narrator and the message of rebirth and changing your own mental status to achieve a form of enlightenment, may not have been accomplished. In the end we realize the purpose of the story, it tells about the rebirth any individual can make by changing the way they see the world. The narrator saw the world brand new for the first time in a different light because of her Grandmother’s death and subsequent rebirth through the moths, carrying her soul to â€Å"new light†. It’s not in a literal sense that the narrator is born again; instead it’s more of a mental status change that the narrator has undergone, and because of that she is at peace with herself.

Sunday, September 29, 2019

Black House For David Gernert and Ralph Vicinanza

You take me to a place I never go, You send me kisses made of gold, I ‘ll place a crown upon your curls, All hail the Queen of the World! -The Jayhawks. Right Here and Now . . †¦..RIGHT HERE AND NOW,as an old friend used to say,we are in the fluid present,where clear-sightedness never guarantees perfect vision. Here:about two hundred feet,the height of a gliding eagle,above Wisconsin's far western edge,where the vagaries of the Mississippi River declare a natural border.Now:an early Friday morning in mid-July a few years into both a new century and a new millennium,their way-ward courses so hidden that a blind man has a better chance of seeing what lies ahead than you or I.Right here and now,the hour is just past six a.m., and the sun stands low in the cloudless eastern sky,a fat,confi-dent yellow-white ball advancing as ever for the first time toward the fu-ture and leaving in its wake the steadily accumulating past,which darkens as it recedes,making blind men of us all. Below,the early sun touches the river ‘s wide,soft ripples with molten highlights.Sunlight glints from the tracks of the Burlington Northern Santa Fe Railroad running between the riverbank and the backs of the shabby two-story houses along County Road Oo,known as Nailhouse Row,the lowest point of the comfortable-looking little town extending uphill and eastward beneath us.At this moment in the Coulee Country, life seems to be holding its breath.The motionless air around us carries such remarkable purity and sweetness that you might imagine a man could smell a radish pulled out of the ground a mile away.

Saturday, September 28, 2019

Tom Perrotta's The Cosmic Significance of Britney Spears Essay

Tom Perrotta's The Cosmic Significance of Britney Spears - Essay Example When one attempts to find out the reason behind her cosmic significance, it is evident that she is so close to her family members and truthful to her boyfriend. She is cute, strictly religious, and down to earth. She feels proud of her southern identity and is conscious to preserve it forever. From a general viewpoint, she is able to withstand change in her life. She is amazingly unaffected by her global mega stardom. Moreover, she presents herself through two different ways. In her private life, she is shy but in public life she is so bold to express her opinion and ideas. Because of her unique personality, she enjoys the imposed musical identity. Moreover, she is ready to accept it as the part of her life. Her music is familiar to all and is easily enjoyable to music lovers. Her music is with a universal appeal and it exerts a strong influence to the whole humanity. Her music does not belong to an actual place, group or individual consciousness, but to humanity. Her cosmic signific ance is more evident from her music, which is universal, but never particular. The iconic stature that Britney exemplifies is not just that of a teen idol. She is more than that because pop stars are considered as cultural figures in America. In a multicultural and multiracial society, pop music is a way to exhibit race and celebrity. Britney is an era defining superstar, who is ready to find out answers to the questions on our existence and our future. She possesses more in common with other iconic artists like Elvis Presley, Madonna and Kurt Cobain. But her position is far ahead of these iconic artists. Perrotta went through Britney’s book namely, Heart to Heart, and its effect on him was terrific because it influenced and changed his opinion about her. Britney is portrayed in this book as a girl who is so simple and down to earth. When the author decided to complete the essay on Britney, it was the time of September 11

Friday, September 27, 2019

Net External Wealth and Real Exchange Rate Essay

Net External Wealth and Real Exchange Rate - Essay Example If the value of currency of a nation appreciates, then the value of its indebtedness in terms of foreign assets falls. This helps to improve the nations NFA situations and vice versa (Williamson, 2008). The nominal exchange rate (e) explains the amount of home currency (units) that can be purchased with a given unit of a foreign currency. Thus a rise in e refers to the depreciation or devaluation of the currency of a nation. On the other hand, the fall in e refers to the appreciation or evaluation of the currency of a nation. Real exchange rate is defined as the simple ratio of the price level (Pd) of the domestic currency and the price value of the foreign currency (Pf ). The real exchange rate of a nation (Q) = Pd/e*Pf , It refers to the amount of goods and services of a domestic country that can be purchased by a unit of money of a foreign nation (CNB, 2013). When analysts assess the changes in the exchange rates in the international trade, they rely more on the real exchange rate than nominal exchange rate. A real appreciation refers to a rise in the real exchange rate while a nominal appreciation refers to a decrease in the nominal exchange rate (Feenstra and Taylor, 2008). Relationship between Net Foreign Asset and Real Exchange Rate The relationship existing between the net foreign assets of a country and the real exchange rate has been a debatable issue of concern since 1920. If a steady state open economy model is considered, then the following relations can be established: tb = -r*b (1) (States that a steady trade deficit can exist in a nation = net investment income on net foreign asset position). rer = -Otb + ?X (2) (States that if the other factors in the economy (X) are... This paper stresses that the net external wealth of a nation relates to the balance of payment conditions of the country. The net foreign asset of a nation is the difference of the value of the asset owned by the nation from the rest of the world and the value of the asset of the country owned by the foreign countries in the world. The changes in the exchange rates of a nation largely influence the values of its foreign assets and liabilities. If the value of currency of a nation appreciates, then the value of its indebtedness in terms of foreign assets falls. This helps to improve the nations NFA situations and vice versa. When analysts assess the changes in the exchange rates in the international trade, they rely more on the real exchange rate than nominal exchange rate. A real appreciation refers to a rise in the real exchange rate while a nominal appreciation refers to a decrease in the nominal exchange rate. This report makes a conclusion that the traditional belief that the real exchange rate and NFA is inversely related is no longer feasible in the modern era, after the occurrence of globalization. A country in its economy can now always afford to encourage foreign direct investment and augment the level of its NFA. This is due to the fact that though the extent real exchange rate or currency value of the country would fall in the short run, the positive returns from the investments in the long run would substantially help the nation improve its real exchange rate. Therefore post-globalization, real exchange rate is assumed to have a positive relationship with NFA

Thursday, September 26, 2019

University fees should not be abolished Essay Example | Topics and Well Written Essays - 1000 words

University fees should not be abolished - Essay Example Before getting into the issue itself it is necessary to provide some discussion on the reasons why in some cases universities took on the initiative to abolish fees.The actions of the university are more or less the same in almost all developed countriesIn recent times some ideas have become redundant and politically incorrect. Most incoming students in the universities stand in long queue to get admission into the universities for the courses that have been closed for hours before they arrived. In such cases it is discouraging to ask students to pay for wasting time. The universities of the developed nations could not compete with the American economic system as they failed to bridge the gap in actual learning created by the public universities. Arguments There has been a long standing concern that pupils from lower socio economic backgrounds are forced to stay out from attaining higher education especially from attending universities. The social mobility is constraint due to high i nter generational correlation in attainment of education. Even if the concerns regarding the equity are left out then also efficiency is lost for the society as a whole. Two sets of actions can be undertaken to analyze the reason for the situation to arise. The first action can be directed towards intensive studies while the second action can be directed towards the policies necessary to address the issue. ... If en economic policy aims to eliminate a monopoly while the market becomes competitive as well as efficient the monopolist will be in a worse off situation. A competitive economy will result in Pareto optimal allocation when there is presence of full information in the economy and there is absence of externalities. Increasing returns to scale in technology is absent. The government can intervene into the market to facilitate the flow of information, manage the existing externalities, provide public goods and manage the income distribution within the society. The university or the college staffs can shift the resources effectively for more efficient allocation so as to ensure maximum outputs given inputs. As there inefficiencies in technical and allocation exist a significant portion of available resources go wasted. The state and university college is confronted with the Production Possibility Frontier. A tool can be designed for the purpose which will embody the resource constraint s and simplified assumptions on the college and university’s production possibilities. The assumptions as are follows: Two goods are produced while resources are fully utilized and budget is endowed as resources. The feasible and the non feasible mixes of output are depicted in the PPF. A Pareto efficient situation is possible only in cases where there are feasible mixes of output. Technical efficiency reflects the ability of a firm to avoid waste and attain maximum output level from a given set of inputs. The firm can attain such type of situation by mainly two ways. The firm produce as much output as possible by using the technology and inputs or by using just optimal amount

Wednesday, September 25, 2019

Globalization Spread The Happiness Essay Example | Topics and Well Written Essays - 1500 words

Globalization Spread The Happiness - Essay Example ame time it should be noted that globalization has caused more problems in America than in any other countries in the form of economic crisis or recession. At the same time heavily populated countries like India, China, Brazil, Russia, Mexico etc have developed a lot after the introduction of globalization. In fact China is the number one exploiter of globalization at present even though it was reluctant in introducing globalization principles in its territories at the beginning. Supporters of globalization are of the view that globalization benefits the world through the promotion of such ideals as human rights, democracy, and freedom and that it enhances the prosperity of the world through free trade, free investment and better technology.   This paper argues that globalization brings happiness in the world and its drawbacks are negligible considering its advantages. Even though there are many reasons for supporting globalization, this paper limits its focus only to the economic, political and cultural benefits of globalization. Holst (2007) has pointed out that â€Å"economic interpretations of globalization cantered around three forms of capital; financial, productive and commercial (Holst). Moreover, Dharam Ghai (1997) has pointed out that â€Å"free market and private enterprise were the principal mechanisms for promoting economic activities in the sphere of economic globalization† (Ghai, p.1). Cross cultural business have been increased a lot as a result of globalization. Imports and exports between different countries were also increased because of the liberalized rules implemented in many countries as part of globalization. Earlier, it was difficult for a company to establish a business unit in overseas countries. However, at present, many countries started to liberalize their rules for attracting foreign direct investment because of the late awareness that external capital is necessary to the economic development of a country. â€Å"This is an era of

Tuesday, September 24, 2019

Social Media Marketing Research Paper Example | Topics and Well Written Essays - 1000 words

Social Media Marketing - Research Paper Example Social media marketing refers to the concept of gaining traffic and attention through launching and running promotional campaigns, through identifying and engaging with influencers and interested parties through social media. Social media marketing is most especially effective and vital for businesses, institutions and organizations that rely heavily on referral and the word-of-mouth as their marketing and communication strategies, considering that there is no easier ways to make referrals or pass word of mouth, than through the social media, owing to its extensive coverage and accessibility. Social media marketing is thus a category of internet marketing, which applies the social media networks as the platforms for communicating and achieving the branding goals of an institution. Fundamentally, this form of marketing entails sharing of written content, audio, images and videos through the social networks, to make such contents accessible by other parties within the social media netw orks, for marketing and branding the institution. Posing for a moment to dissect the assertions that Social Media Marketing is effective for referrals and word of mouth communication, it is apparent that there is no better way to market an educational institution, than through referrals and the word of mouth. Social media is the most effective channel of discovering and combining news with promotional content, while also serving as the most effective tool for building links to different other networks. Thus, finding and responding to online conversation can be the most effective way of marketing, since social media enables even small business which has no established systems and channels of advertisement, as well as those facing resource shortages to reach more customers. (Deis & Kyle, 2010). Therefore, social media does not only offer an opportunity to advertise and promote a brand, but also an opportunity to combine and reinforce the branding content with more informative news, and in a more entertaining and interactive way, that is rarely offered by other communication and promotional channels. Thus, despite the concept of Social Media Marketing being a comparatively recent phenomenon, its role in the current business world has shifted from that of a trendy presence, into a necessary marketing and advertising platform for any business that seeks to remain relevant both in the traditional and the digital marketing (DeMers, 2013). According to a report published by the Forbes Magazine, the 2012 Social Media Marketing Industry indicated that 94% of all businesses that had a marketing department utilized the social media as one of their major

Monday, September 23, 2019

Health communication Essay Example | Topics and Well Written Essays - 750 words

Health communication - Essay Example le control attained by obtaining referral to a specialist, which directly improved recovery in those patients who felt the doctors measures to be directly pertinent to their personal distress. The close relations of patient satisfaction, treatment established, and subsequent results need extra careful thought in social studies. There exists an argument that while interpretive theoretical, frameworks have accredited a constitutive purpose to the function of communication in meaning construction not much concentration has been given to the manner in which social relations of power act as a go-between in this process of meaning creation. Ideology, nonetheless, is a helpful heuristic concept that gives a way of contextualizing the communication procedure in such power relations. Communication includes not only the procedure of generating meaning, but is also inherent to the means by which relations of power get produced and reproduced (Thomas, 2006 P. 116). The idea of ideology is presented as the abstract connection between communication and authority. The social construction is a key research standpoint in medical sociology. First, some ill health are entrenched with cultural meaning that is not directly resulting from the natural history of the condition, which shapes how society reacts to those troubled and impacts the experience of that ill health. Second, every illness has a social construction at the empirical level, based on how persons come to appreciate and survive with their sickness. Third, medical information about ill health and disease is not provided by nature but is created and developed by claims-makers and concerned parties. Social constructions provide a significant counterpoint to medicine’s mainly deterministic approaches to illness and disease, and it can assist us widen policy discussions and choices. Sharing stories are becoming a powerful tool in the health profession, which helps to combine and exchange knowledge. Sharing experiences

Sunday, September 22, 2019

Articles of Confederations Fails Essay Example for Free

Articles of Confederations Fails Essay In order for a country to work to its fullest potential, it needs a great government. This government needs to do three important tasks. It needs to set up laws, enforce the laws, and provide many different services. Also, it needs to make sure it brings everyone together. Finally, if the government has a problem it should be able to be fixed easily. When the 13 colonies had the Articles of Confederation it couldn’t do many of the things it was supposed to do, thus it failed as a government. First, the Articles couldn’t fulfill the purposes of government like it was supposed to. They were supposed to set up many laws to keep the states and the country as a whole in order. They couldn’t do that; so instead the states made up their own rules and followed them. That also caused the states to become more independent. Also, since there were no laws, that means that the government couldn’t enforce any laws. Although, it could provide some services, but that was the only purpose the government could fulfill. Who wants a government that can’t do what it was meant to do? The Articles didn’t fulfill the purposes of government and that is why it failed as a government. Next, a strong a government can bring it’s entire nation together, unlike the Articles of Confederation. Nobody in the states really liked or agreed with the Articles. The 13 different states started making up their own rules and just followed them. This caused separation between the states, which was not good in the least bit. In order to have a good country, it is much better if the government can unite everyone. The Articles of Confederations couldn’t bring it’s nation together, so it failed as a government. Finally, the Articles couldn’t been fixed easily. It took all the 13 states to agree on something to be fixed within the Articles. If one state didn’t want a change it didn’t happen. That means that it would be very hard to fix anything with the government. The Articles could not fix itself for fulfilling the purposes of government or uniting the country. For a country starting out with its first government, they should’ve have known there were probably going to be problems. Usually, the first time you try something it doesn’t work out perfectly. With that, they should have made a way to easily fix the Articles, but they could not. With this huge problem, the United States definitely needed a change of government. The Articles of Confederation could not easily be fixed, a final reason to why it failed as a government. We had the Articles, for many reasons. They could not fulfill the purposes of government under it. Also, we couldn’t bring all the 13 states together as a nation, protect the people of the country, or fix the problems of government with ease. The states needed all of those items to become a great country. Instead, it caused many problems for the people of the states. In conclusion, the Articles of Confederation were overturned for the greater good.

Saturday, September 21, 2019

Five Important Factors to Success Essay Example for Free

Five Important Factors to Success Essay Employers today look for a variety of skill sets and personal strengths in an individual and hire those whom they feel will contribute most to their company. As an individual applying for employment or an internship with a company, one should be well aware of the necessary requirements and the recommended skill sets that each company looks for in a potential employee. While there are many different factors that can impact an individual’s success in gaining an internship or employment, there are five factors that especially highlight one’s qualifications. The first thing that employers search for in a future employee is the quality and extent of the individual’s academic background. â€Å"The importance of a college education has become quite evident in terms of earning potential within today’s economy† (College View). A knowledge base of all general education classes along with classes that focus on the individual’s major are an extremely desired asset for most high-income jobs. Specialization of one’s education builds and structures the skills and strengths that an individual will need to be successful in their desired industry. Within this one industry, employers have to start what is called a â€Å"weed out† process in order to narrow down their applicant list. One of the most highly used techniques among these businesses is creating an automatic drop list based on academic achievement for the recent college graduates. Each college graduate will have taken the same set of classes for a particular major, therefore, if one student’s grades do not compare to those of the high achievers, they will have less of a chance finding employment or an internship. However, these college graduates with lower grade point averages are still more likely to obtain important job positions than those who lack a degree altogether. According to College View, â€Å"attending college provides opportunities for graduates which are not as widespread to those who have not received a higher education.† Leadership is a key factor in building one’s path to success. Success Magazine says â€Å"leadership is everything, whether you are leading a life, a community, an organization or a business, or you are in school.† Businesses looking to hire employees want to ensure that each applicable individual demonstrates the initiative to take on projects and fully complete them in an organized and timely manner. According to Success Magazine, it is extremely important that new hires â€Å"develop the abilities of leaders in the areas of strategic and critical thinking, enhancing relationships, negotiating, managing risks, people, change, conflicts and financials, making the right decisions, managing work-life balance† in order to become successful in their new position. Businesses also look for leadership like characteristics in their potential new hires such as integrity, honesty, drive, and excellence. These qualities within an individual will help a company progress and become more successful. Hiring new employees is a risk for each company. Because of this liability, businesses want to make decisions in which they feel confident that will benefit their company due to the fact that it is so costly to hire a new employee undergoing extensive training. Having a leadership background can definitively increase an individual’s likelihood of gaining employment or an internship. Recruiters find it significant that their potential new hires show diligent involvement and a proactive attitude throughout their years attending a university. Being involved with organizations on and off a university campus will greatly benefit an individual because of the variety of different learning, volunteer, and career opportunities given by each of the organizations. Small Business Advice found that a proactive employee â€Å"is not going to sit back and wait for opportunities to land in their lap. Instead, they are going to go out and get what it is they want.† Employees want to make sure that the people they are going to hire will work proactively and in the best interest of the company and nobody else. Individuals that show experience with commitments of an organization in which they are involved demonstrate a more effective work ethic. Small Business Advice says â€Å"you will never see a leader sitting back and waiting for someone to tell them what to do and when to do it.† This is exactly what a company looks for in a new hire. Networking is an extremely important part of successfully gaining employment or internships. The most successful people in the world today would not have been able to achieve such great measures if they hadn’t encountered other influential people. People and connections are the greatest resources an individual has. If an individual has connections with respectable and influential people, they are more likely to succeed in their business. Applicants must put their name and qualifications out there in a positive for all to see in order to begin constructing their own effective social network. A way for individuals in college to network is to join organizations and meet with professors and other academic advisors. The more connections one has, the more likely they will receive a job or internship within a company. It is absolutely necessary that an applicant or new hire demonstrate professional behavior at all times. Recruiters are looking to hire individual’s that will represent their company in a good light 100 percent of the time. No matter where one is or what one does in their free time, if they are publicly misrepresenting themselves, and therefore, the company as a whole, the business will no longer allow that individual to continue portraying the company in such a bad manner and will fire them. A professional businessperson is always on the best of their behavior and always keeps the goals and priorities of the company before their own personal goals and priorities. There are numerous factors that influence a recruiter’s decision to hire a new employee. However, the five main factors are a strong academic background, leadership, proactive involvement, networking and professional behavior.

Friday, September 20, 2019

Voice over Internet Protocol (VoIP) Technology

Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are:  · Conversion of voice to analog and digital signal.  · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP:  · H.323 [12]  · IP Multimedia Subsystem (IMS)  · Session initiation Protocol (SIP) [5]  · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network Ø To formally define the network security problems and unauthorized access incidents Ø To define the most accredited security techniques and security methods Ø To evaluate the prototype system and packet feature mechanism Ø Email and other internet message are easily integrated with the voice applications Ø To support the multimedia applications, which provides less cost effective services for video conference, gaming Ø To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. Ø Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. Ø Present offline message passing between the users by selecting a user from predefined offline user list Ø Present textual communication 1.3 Research Method Ø Provide authentication to the end users for accessing the VoIP services Ø Design secure VoIP Configuration system Ø Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. Ø Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. Ø This research enhance security methods by analyzing the modern security challenges Ø To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance Ø Balance VoIP security and performance by measuring the services and network traffic Ø To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows Ø Computer to computer based services Ø PC to phone and phone to PC based services Ø Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are Ø VoIP service providers Ø Modem Ø Internet services Ø ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are Ø Latency Ø Jitter Ø Packet loss Ø Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are Ø Time spent on routers and long network distance Ø Security measures Ø Voice data encoding Ø Queuing Ø Packetization Ø Composition and decomposition Ø Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section â€Å"RTP profiles and pay load format specification† of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to â€Å"handshake† with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ‘voicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows Ø Software Related: Ø Device related Ø Protocol related Ø System Configuration related Ø Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic Ø Software applications Ø Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are Ø PCs Ø Telephone adaptors Ø Modems Ø VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. â€Å"H.323 is a complicated protocol†. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p Voice over Internet Protocol (VoIP) Technology Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are:  · Conversion of voice to analog and digital signal.  · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP:  · H.323 [12]  · IP Multimedia Subsystem (IMS)  · Session initiation Protocol (SIP) [5]  · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network Ø To formally define the network security problems and unauthorized access incidents Ø To define the most accredited security techniques and security methods Ø To evaluate the prototype system and packet feature mechanism Ø Email and other internet message are easily integrated with the voice applications Ø To support the multimedia applications, which provides less cost effective services for video conference, gaming Ø To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. Ø Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. Ø Present offline message passing between the users by selecting a user from predefined offline user list Ø Present textual communication 1.3 Research Method Ø Provide authentication to the end users for accessing the VoIP services Ø Design secure VoIP Configuration system Ø Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. Ø Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. Ø This research enhance security methods by analyzing the modern security challenges Ø To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance Ø Balance VoIP security and performance by measuring the services and network traffic Ø To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows Ø Computer to computer based services Ø PC to phone and phone to PC based services Ø Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are Ø VoIP service providers Ø Modem Ø Internet services Ø ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are Ø Latency Ø Jitter Ø Packet loss Ø Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are Ø Time spent on routers and long network distance Ø Security measures Ø Voice data encoding Ø Queuing Ø Packetization Ø Composition and decomposition Ø Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section â€Å"RTP profiles and pay load format specification† of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to â€Å"handshake† with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ‘voicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows Ø Software Related: Ø Device related Ø Protocol related Ø System Configuration related Ø Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic Ø Software applications Ø Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are Ø PCs Ø Telephone adaptors Ø Modems Ø VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. â€Å"H.323 is a complicated protocol†. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p