Monday, September 30, 2019

Peter Pan Generation Is Growing Up

Paola Lagunas Spindler English 101 Essay 3 November 2 0, 2012 The Peter Pan Generation is Growing Up There are no longer any adventures in library wonderlands in literature today, kids are forced to  experience  hard reality at a much younger age. Maria Tartar author of â€Å"No More Adventures In Wonderland† asserts the evolution of children’s and young adult villains in stories. Peter Pan, the lost boy, who never grew up, is one of her examples, giving Captain Cook a childish effect, J. M.Barrie (author of Peter Pan), gives the child the security that the good guys win the battle between the silly and  playful  adventure stories. Alice in Wonderland, a book about a girl losing herself down a rabbit hole and then battling the red queen,and her card soldiers, also give this story a secure and childish effect. Tartar believes authors have helped villains evolve from whimsically devilish to brutal and dark. The children books, intended before for a fun time are no w becoming suspenseful sit down novels. According to Tartar, authors â€Å"have crossed.Creating a perverse twist on such stories as Clifford the big red dog, The Graveyard book, a picture book about a serial killer hand who holds a knife and kills his four family member is a perfect example of authors new twist on entertainment. Harry Potter, a national best seller, is about a child’s parents dying at the start of the story, the protagonist fighting death, and loosing family and friends until the end where a well planned murder with the entire character base give a grand final to this seven book series. However, Tartar gives the prize of absolute horrific monsters to Suzanne Collins, author of The Hunger Games.Collins has turned the child reading the book into the villain. Katniss Everdeen (protagonist) fights against 12-18 year old children, in a brutal battle for living. Opening her reader’s eyes into seeing children's  exposure  to books about death, and stori es about despair and devastation, Tartar declares that books are evolving to fast for the chilren of today, with this, tartar proves how the Peter Pan generation is growing up. The villains in children’s books are changing; they are evolving, becoming more complex, growing, but, the children too are getting older. Once bedtime characters, villains are now becoming nightmare enhancers.Children that at the age of 4 were reading Alice in Wonderland, Peter Pan, and Cinderella are now the 16 year old's reading Hunger Games. The stories now being published differentiate from the previous stories but the readers do too. Providing that four year old's are still reading classics such as Peter Pan; young adults expanded their interest to  good but devastating  stories. The main reason why these stories are reaching such  exposure  is due to advertisement. Althought Tartar assures the stories for children are growing up, the reader has also matured, and the aurhots have started to developed a more consuming story.Using logos, Tartar points to the  dilemma  of the ‘expanding children story’ and it serves as slate for her reader's minds. This will help her prove the evolution of the story. If any one person compares Alice in Wonderland to The Hunger Games, the evolution of the ‘narratives about loss, suffering, and redemption’ the reader will be persuaded into Tartar’s point of view. Once Tartar sets up the juxtaposition for these two movies, she is able to effectively point out the difference between the stories, however, she takes a different approach and traces the origins of the books to issues with the authors.In past times, Tartar explains, there was such a thing as â€Å"Author's Sunday afternoons†, authors enjoyed a nice picnic, took their Saint Bernard for a walk and breathed in pure air and ideas. Authors are a now more complex. J. K Rowling, author of best seller Harry Potter, writing her first book unde r candle, and coffee shop light because she had no way to pay for electricity in her apartment, she experianced poverty. Suzanne Collins, as a child had anxieties about the possibility of her father’s death as a Vietnam veteran, was able to use this to her advantage in books about death.Authors have clearly evolved with their stories, and expanded their relationship to many more readers. This new diversity  of authors is allowing them to write deeper stories with darker backgrounds and meanings for matured readers. Even though Tartar points out the complexity of the authors and stories, she fails to point out that these both lead to the maturing of the children. Capturing a balance of danger and enchantment, the stories of Peter Pan and Alice in Wonderland provide the  audience  with an idea for the possibilities of adventure quest in childhood.The traditional villains frighten the readers, but their â€Å"juvenile antics strip them from any real authority. † Boo ks such as these are written for children under the age of twelve because of the foolish way the characters portray evil. Books such as the hunger games are written for teenagers, knowing this helps the author write appropriate topics of more complex aspects. However, Tartar has a fault in her argument by comparing a bedtime story to a story such as The Hunger Games. When an author compares two stories, one being The Hunger Games and one being Alice in wonderland, the author has one point; there is a difference.There is of course a difference, an evil wich who only dresses in red and black and hearts is no comparison to a child aspiring to manage the kiling of 23 children in order to obtain glory. Almost as different as the villains are, so are the protagonist, a young girl falling into a rabit hole to apear in a world in which she deals with silly magic tricks, is definetly not the same as a young girl coming from poverty going into an arena to try to survive natural disasters, and run away from 23 people who are out to kill her.This is where the fault in Tartars argument it, she manages to point the difference, but fails to admit that 4 year olds are not reading The Hunger Games, just like 16 year olds are not reading Alice in Wonderland. Part of why the authors are crossing over into more evolved stories is because the children’s and young adult category dominate the Best sellers charts. These devastating stories about depresion, war and death are being asked for not just by children, but adults too are picking up the copies. Helping a story achieve better  success  in the charts, the books attract a broader audience.The reason why Suzanne Collins and J. K Rowling talk so freely about death compared to J. M. Barrie is because these books are directed towards different audiences. Audiences  that  clearly  ask for this type of story, if  these  stories weren't being  successful  with all ages, they would not have been so  successful ly  sold after being  published. These books are helping a the young adult genre, they are a perfect conection of safe and suspense, they connect the topics for childre and adults. It is important to realize that they are different books, by different authors, that are intended for different audiences.Today's  authors did not think about targeting the same audience that Peter Pan was written for because it is absurd to believe that these books are intended for the same age, but they are intended however, the same reader. The reader of Peter pan, is now the reader of The Hunger games because the 10 years difference between the publishing of the two is also a 10 year difference in the reader. This time period of difference allows the authors to publish books about death,  depression  and horrible traumas because it is becoming more socially acceptable by matured readers.

Sunday, September 29, 2019

Mcdonalds Energy Drink Research Report Essay

The purpose of this report is to investigate past trends and forecasts of the energy drink market. Included in this report, is information on market size, target population and statistical data on growth history and growth projections. The aim is to determine if adding energy drinks to McDonalds offerings will create a profitable segment for their menu. The market research collected and contained in this report consists of secondary data. This research was authorized by: McDonalds Corporation. Current market research shows that the energy drink market has grown into a multi-billion dollar business, which has been reported as being the fastest growing segment in the beverage industry since bottled water. The US energy drink industry is expected to more than double in the 5 years preceding 2013. (Comprehensive Reviews) Eighteen to twenty-four year olds or college students are the largest segment of energy drink consumers. (NutritionJ) The conclusion of this report suggests that the growth of the energy drink market has been greater than most other liquid refreshment beverage sectors in the US in the past five years and that this trend will continue. It is recommended that McDonalds Corporation add energy drinks to their offerings and target college-aged students. Introduction Fast food consumption in the US has declined during the recent economic crisis. To stay profitable, many fast food chains have introduced low-cost or â€Å"value† items too keep sales up. Along with low-cost items, many fast food chains have added specialized items or niche items to attract customers that can more conveniently buy these at a fast food store. McEnergy 3 Energy drinks have continued to gain popularity since Red Bull was launched in 1997. More than 500 new energy drinks were launched worldwide in 2006 and beverage companies are reaping the rewards of the exploding energy drink industry. This report examines the energy drink market and its potential to become a niche item in a fast food chain along with the population to target. Methods. This report was conducted using a secondary statistical data and secondary research that was gathered using a focus group and survey of college age participants. The statistical data was obtained from New York City-based Beverage Marketing Corporation which is the leading research firm dedicated to the global beverage industry. The statistical data regarding the previous growth patterns and growth forecasts will be discussed in the results. The focus group and survey were done by Nutrition Journal and focuses on energy drink consumption patterns among college students. The survey was based on responses from a 32-member college student focus group and a field test, a 19-item survey was used to energy drink consumption patterns of 496 randomly surveyed college students. (nutritionj) The population was defined as undergraduate students at a state university located in the Central Atlantic Region of the United States. 85% of the undergraduates were 18-24 years of age, 12% were 25-40 years of age and 3% 41 years of age or older. Sixty two percent of the entire student body is female. The sampling units were individual college students that were generated with a McEnergy 4 non-probability method of asking students around campus if they would like to participate. (Nutritionj) Results Fifty one percent of participants reported consuming at least one, energy drinks a month. Thirty four percent of participant reported consuming at least two energy drinks a month. Table 1 % of college energy drink users reporting amount and frequency of energy drink consumption by situation in an average month Energy drinks consumed Days/month ________________________________________________ Situation n 1 2 >2 1-4 5-10 >10 Insufficient Sleep 169 64 22 14 74 18 8. Need general energy 165 63 21 16 74 18 8 Studying or project 125 50 36 14 85 10 5 Driving long distance 114 63 23 14 86 9 5 With alcohol 136 27 24 49 73 18 9 Treat hangover 42 74 10 16 74 14 12 N= 253 college energy drink users (nutritionj) The US refreshment beverage market grew by 1. 2% in 2010The growth of the energy drinks market is up 5. 4% in the past year. (beveragemarketing) From 2004 to 2009 the McEnergy 5 overall growth of the energy market is up over 240% (Wiley) The shift from consumption of sports drinks such as Gatorade and Powerade towards energy drinks should continue. In the last year, carbonated soft drinks remain the largest liquid refreshment beverages category but their volume slipped 0. 8% from 13. 9 billion gallons in 2009 to 13. 8 billion gallons in 2010, which resulted in their market share decreasing. (beveragemarketing) Table 2 U. S Liquid Refreshment Beverage Market Change in Volume by Segment 2009-2010 Percent Change Segments 2009-2010 RTD Tea 12. 5% Sports Drinks 9. 4% RTD Coffee 8. 1% Energy Drinks 5. 4% Bottled Water 3. 5% Value-Added Water 0. 2% Fruit Beverages -2. 0% Carbonated Soft Drinks -0. 8% Total LRB 1. 2% Source: Beverage Marketing Corporation (BeverageMarketing) McEnergy 6 Conclusion The energy drink market has grown into a multi-billion dollar business, which has been reported as being the fastest growing segment in the beverage industry since bottled water. Having grown 240% in the past five years, the only beverage sectors to grow faster that energy drinks last year were ready-to-drink tea, ready-to-drink coffee and sports drinks. McDonalds already distributes these other three beverages and would benefit by adding the next fastest growing beverage sector, energy drinks. Despite the large market share that carbonated beverages owns, there is a demand and shift towards other beverage sectors as evidenced by a decrease in carbonated beverage market share last year. A large segment of energy drink consumers is the college-aged consumer. With over 50% of college students drinking at least one energy drink a month and 34% at least two a month, this would be a good population to target. Recommendations Include energy drinks to the offerings at McDonalds fast food restaurants. Target college-aged students with initial locations and marketing strategies. McEnergy 7 References: – Gonzalez de Mejia, E. & Heckman, M. A. & Sherry, K. (2010). Energy Drinks: An Assessment of Their Market Size, Consumer Demographics, Ingredient Profile, Functionality, and Regulations in The United States. Comprehensive Reviews in Food Science and Food Safety. Retrieved from: http://onlinelibrary. wiley. com/doi/10. 1111/j. 1541-4337. 2010. 00111. x/pdf – West, T. (2011). The Energy Market is Still Full of Growth Potential Reports. Wholesale News. Retrieved from: http://web. ebscohost. com. lib. kaplan.edu/ehost/pdfviewer/pdfviewer? vid=12&hid=123&sid=eeec713f-80bc-4ca6-b6ce-02c68e0f1f50%40sessionmgr112 – The US Liquid Refreshment Beverage Market Increased by 1. 2% in 2010. (March 2011). Beverage Marketing Corporation Reports. Retrieved from: http://www. beveragemarketing. com/? section=pressreleases – Aeby, V. G. & Barber-Heidal, K. & Carpenter-Aeby, T & Malinauskas, B. M, & Overton, R. F. (2007). A Survey of Energy Drink Consumption Patterns Among College Students. Nutrition Journal. Retrieved from: http://www. nutritionj. com/content/6/1/35.

Saturday, September 28, 2019

Why are policies in Germany so difficult to reform Essay

Why are policies in Germany so difficult to reform - Essay Example These included the modern poor relief, the Bismarckian paradigm or ‘worker policy’, protocorporatist social policy, and scientific social work. While the Bismarckian paradigm addressed workers as reliant on state policy, the proto-corporatist paradigm considered them as a partial subject. The latest measures taken by ‘conservative corporatist’ or Bismarckian welfare capitalistic regimes of Germany have not been examined through systematic comparative research (Bleses and Seeleib-Kaiser, 2004). However, literature related to welfare state change depicts the development of the Bismarckian family of welfare systems, and their distinction from other regimes. Bismarckian welfare systems confront the greatest challenges and require the most intensive changes. At the same time, there is documentary evidence of the Bismarckian welfare systems’ inability to implement essential reforms, state Palier and Martin (2007). On the other hand, Palier and Martin (2007) argue that in Germany over the last three decades, social insurance programmes have been developed, and changes incorporated in the Bismarckian welfare systems. Initially the emphasis was on raising social expenditure and social contribution towards funding a ‘labour shedding’ strategy to resolve the economic crisis. ... Two decades ago, researchers began investigating the ways in which mature welfare states including Germany, responded to those pressures. The findings indicated an absence of fundamental policy shifts, along with a significant contradiction that although structural pressurs for change could not be ignored for longer, there was relative stability in welfare state programmes. The two main approaches of historical institutionalism (Pierson 1994, 1996) and welfare regime theory (Esping-Andersen, 1990, 1999) helped to explain the continued stability inspite of the growing requirements for core changes to take place. According to these two approaches, â€Å"powerful institutional and electoral mechanisms and regime-specific characteristics prevented comprehensive reforms of European welfare states† (Stiller, 2010, p.9). At the same time, these explanations have been challenged, with increasing numbers of substantial reforms taking place across Europe, from the late 1990s onwards. Th is generated extensive research interest in the reasons and manner in which welfare state reform occurs. In the Federal Republic of Germany, the well-established Sozialstaat has undergone significant reform efforts, as seen from Katzenstein’s (2005) observation that major reform efforts related to labour markets, economic policymaking and social policy, together with partisan conflict and political stalemate, may have created a â€Å"recalibration or a dismantling of Germany’s semisovereign state† (Katzenstein, 2005, p.304). This development is significant because Germany has not demonstrated policy flexibility in the past. In fact, the country’s government had long been regarded as the key example of

Friday, September 27, 2019

Read the Ethnography Shadowed lives (undocumented immigrants in Essay

Read the Ethnography Shadowed lives (undocumented immigrants in American society) by Leo R. Chavez and use it to discuss social institution supported by case studies - Essay Example The paper refers to the case studies mentioned by Leo Chavez (1997: 121-140), in which the author has discussed the pathetic financial condition of the people of South America and the methodologies they adopt to escape financial miseries. In his work â€Å"Shadowed Lives†, Chavez has also pointed out the efforts and struggle made by these individuals in order to come out of their pecuniary embarrassments by migrating towards North America by hook or crook. He has indicated towards the illegal migrants living in the USA for financial purposes. He views that Mexicans have highest proportion of migration to San Diego and other states of the USA. Chavez is of the opinion that since man maintains strong and unconditional emotional ties with his family; he is always determined to work for the uplift of his family members. Since man cannot live far from his family for long, he also strives to bring his family in the same prosperous areas and states of the USA, where he has gone for job or labor. The rapid migration leads to cause social and cultural imbalances in the population statistics of the entire region on the one hand, and accelerates the level of struggle and miseries of the undocumented immigrants on the other. The illegal or undocumented population faces unabated problems in society, and has to bribe the security personnel for re-crossing the state boundaries to meet their family members. It has aptly been stated that family has been the most fundamental institution of every society and culture of the globe at large since ever, which is responsible for the fulfillment of man’s all basic needs and desires. Man is born and dies in family, and obtains food, clothes, shelter, protection and emotional support from this basic institution of society. The family is a social institution found in all societies that unites people in

Thursday, September 26, 2019

Religion and Society Essay Example | Topics and Well Written Essays - 2750 words

Religion and Society - Essay Example United States where on one hand enjoy a multicultural society with religious pluralism; on the other hand it feels as if a threat has been developed in the name of secularization. However this must not be the case in a country where liberal secularization remains in the eye of the scholarly beholder and where the observer possesses the right to decide if a symbol or form has been transformed or not. In American society where religious institutions play an extensive role in the economic regulation, denominational organizations, churches, and religiously affiliated institutions at the same time they contribute substantially to the growth of the domestic and international economy. On one hand we consider America as a multi-religious society, while on the other we take into account those facts that create a link between religion and economy. In order to understand the connection between the two, one can first consider those developments that occur outside this domain i.e., economy in a à ¢â‚¬Ëœnon-religious’ environment. As with all socially significant categories, the reflection of religion upon any economy (stabilizing or destabilizing) depends to some extent on the difference between what counts as religion and what does not. For example, American society at the time of Reformation enjoyed a double compatibility in the name of religion. On the one hand, the visibility, power, and clearly religious identity of the Roman Catholic Church provided a concrete institutional model served the religion positively. On the other hand, however, early America witnessed a time when there was gradual development of other institutional domains that increasingly, over subsequent centuries, established themselves as independent of religious support and eventually even of religious legitimation (Dillon, 2003, p. 43). The development, which America has witnessed throughout centuries, resulted in a capitalist economy in which the sovereign political state emerged inclusive of the administrative and military arms. Such development was the result of multicultural spectrum, which was influenced by religiously, shaped society cultural and racial values, therefore the related domain of positive law, modern science, and later also academic education, medicalized health, art, mass media, and sport all developed. In this scenario the rise of two individual systems 'religious' and 'nonreligious' were critical for developing and treating religion as something distinct and different, therefore there was no option for a growing economy other than to include 'religion' on a broad spectrum in everyday lives of Americans. Not only did religion in this context appeared in contrast to other nonreligious social values, but it modelled itself to some extent in order to cover up all economic threats, therefore religi on also helped in institutional reconstruction. Now that the time has come religion in America has moulded itself in many social forms, it would not be wrong to acknowledge that the way religion has modernized American economy, has never happened in the past. An example is when decades ago, early American religious missionaries worked hard to retain their religious consensus and the moral values of the earlier world out of which they came. At the same time they were enthusiastic about new improvements in transportation and communication along with their entrepreneurial business mindedness in manufacturing and industrialization (Porterfield, 2001, p. 48). Relationship between social class and

Wednesday, September 25, 2019

Summary and response Essay Example | Topics and Well Written Essays - 750 words - 1

Summary and response - Essay Example In her own words she notes, â€Å"I am strongly opposed to young children playing tackle football.† In another instance, she notes that, by children taking part in competitive sports, they will be deprived of their ability to develop competitive aspects. In conclusion, Statsky affirms her position by noting that competitive sports only stresses on the aspects of competition and winning. By only using such credible information, she is able to relay the intended message which is plainly illustrated in her statement in which she strongly develops the image that competitive sports may be harmful to children. In her opinion, children should just be allowed to play sports that are appropriate to them and suits their abilities and needs. By these statements, it is clearly and strongly evident how Statsky has developed her arguments against such plays among children, and the recommendations she gives as alternatives for such children. Looking at the arguments set forth in the essay, I would categorically state that I agree with Statsky’s position regarding competitive sports for young children, although to a partial degree. This is because; I also value the essence of competitive theory, which forms the basis of competitive growth even in sports. However, I am mesmerized by the manner in which the author organizes and presents her arguments on the topic. In this response, I would specifically concentrate on the points that seemingly make her essay to be very effective and how she manages to build on such credibility. Particularly, she appears to be consistent in her reasoning considering that her opinions are well-supported in the essay thus, allowing readers to be convinced by it. I think that the success achieved in conveying the message across is one main achievement that is made possible and feasible by the engagement of various kinds of

Tuesday, September 24, 2019

Reflective report Assignment Example | Topics and Well Written Essays - 1000 words

Reflective report - Assignment Example Since the trends are ever-changing, and new ideas are always coming up, it is imperative that a businessperson strives to keep up with them to maintain significance in the economy (Peltonen, 2012, p. 70). This paper showcases my reflection on personal and professional development that I got after reading texts by Hofstede. & Minkov, Belbin and Jared Diamond and others revolving around culture, organization and teamwork. It also scrutinizes the useful aspects I acquired around internal business, economics and research methods based on the same books. In his book, Hofstede presents the cultural dimensions theory that provides a framework for cross-cultural communication. The reading offers a valuable insight into effects of a society’s culture on the values of its members and the way these values relate to behaviour (Hofstede, 1980, p. 90). I learn that the society behaves differently according to its culture. In a society that exhibits a high degree of power distance accepts hierarchies without the need for justification. Society with low power distance, seek equal distribution of authority (Tuckman, 1965, p. 390). In addition, individualistic societies put too much stress on personal achievements and rights while collective organizations promote the culture of cohesion and unity (Rhodes, 2014, p. 116). People living in societies with cultures having high uncertainty avoidance tend to be anxious and emotional and try minimizing this uncertainty as opposed to those with low uncertainty avoidance that are more tolerant to c hange (Hofstede, Hofstede and Minkov, 2010, p. 33). It is important as a businessman to consider the cultural set-up of a society before establishing a business in it. Such an action will determine how well the people will accept my business in that the corporation, what quality of employees I will get and consequently how well the company will perform. A society that is indulgent and impulsive will likely result in more sales for my

Monday, September 23, 2019

Critical Issues Contributing to the Persistence of Poverty in our Essay

Critical Issues Contributing to the Persistence of Poverty in our Affluent Society - Essay Example know it,† which effectively withdrew critical support from women, particularly single mothers, and consequently the children they are committed to raise. Shocking as her claims seem to be, Sidel’s facts appear to concur with official statistics by research institutes and policy studies by international organizations. Sidel presents trends and data from the 1970’s to the 1980’s. However, well, into the 1990s, the trends she wrote of continue to hold. In the following table are data compiled by the Levy Economics Institute of Bard College that shows women are worse off than men in both income and asset poverty. It has also been reported that the proportion of the poor in female-headed households climbed from 1959 (17.8%) to 2005 (31.1%). The poverty rate for women-headed households is a much higher figure than other types of households. This trend has led to the development of a phenomenon termed â€Å"the feminization of poverty† by researchers. (Sawhill, 1996) It was also Sidel’s contention that in the late 1970s and 1908s, the United States had the highest poverty rate among Canada, France, Germany, the Netherlands, Sweden, and the United Kingdom. A more recent study dated 2003, the poverty rates and percentage of low-wage workers among several countries showed the same trend to persist, with the United States exhibiting the highest rates in both measures. From the foregoing table, it is verified that in the 1990s, the United States continued to register the highest rate for poverty (10.7%) and low rage workers (25%) than the other six countries mentioned by Sidel, confirming her assertion that these are due to conditions prevalent in the United States that are not present or are present to a lesser degree in the other countries. To say, however, that the persistence of poverty in the United States compared to other countries is due entirely to the plight of women and children is generalizing too much to the point of ignoring other issues.

Sunday, September 22, 2019

Training and Development in Small Businesses Essay

Training and Development in Small Businesses - Essay Example The potential challenges that the management of the company may face will be discussed. It will also include different effects of detecting the gaps in the organization. This paper will suggest a competitive training strategy. The whole paper will be done on a step by step basis. It will be very helpful for Syntel Inc. It is very important for Syntel Inc to implement proper training and development strategies to improve their business performances. Syntel is an IT consulting company. Training and development will help them to learn new modern sides of different programming languages. In modern day business the organization comes across different critical projects related with modern programming languages (Barcus, 2007). The organization needs to train its employees properly to manage those projects. If proper training is not being provided by the company then employees will not be able to complete those complex projects properly. Training and development is needed to maintain the supply of talents continuously into the organization. Often it is being noticed that experienced employees are leaving the company. It is a loss for the organization. But that loss can be managed if well trained back up employees are ready with the company. It will not interrupt the performances of Syntel Inc. Different t raining and development programs will increase the efficiency of workers of the company. Once the efficiency of workers is increased then automatically productivity of the company will also increase. Increased productivity will improve the performance of the organization. Being a small business organization resources of Syntel are limited. It is very important for the management of the company to utilize their resources intelligently. Only suitable training and development programs for employees can increase the capacity of the whole workforce. Once the

Saturday, September 21, 2019

Egypt and Mesopotamia Essay Example for Free

Egypt and Mesopotamia Essay Almost all things have its identified origin. The society that presently exists also has its beginnings that could be rooted from the ancient civilization. These civilizations became the foundation of the modern world that is presently observable. Two of the most notable ancient civilizations are that of Egypt and Mesopotamia. The Egyptian civilization progress in one of the largest arid desert areas in the world that is even larger than the whole Europe. This became possible due to the River Nile that crosses a nearly rainless desert from south to north that carries the waters of Lake Victoria as far as 3,000 miles of the Mediterranean Sea. In relation with Egypt’s strategic location, its organization is not simply attributed from the need of a collective effort to survive but rather they have developed into a progressive civilization through the sophisticated utilization of their natural resources. They were able to wisely use their resources in order to establish agricultural living through their invention of the irrigation system. Being the case, they were able to establish a strong livelihood through the trade of agricultural products that becomes the basis for their social development and culture. The Egyptian dominance was further enhanced by their creation of an independent writing system, construction projects as well as a military that defeated foreign invaders. Nevertheless, the decline of this civilization could be attributed to the faults of succeeding pharaohs who have abused their power and exploited their people. On the other hand, ancient Mesopotamia also known as the â€Å"land between two rivers† which is the alluvial plain of Tigris and Euphrates also has its own story on how it developed into a civilization. Similar to ancient Egypt, Mesopotamia also has abundant natural resources, which enable them to develop their agricultural sector. They also invented their own form of irrigation to aid them in planting agricultural products. However, they failed to develop their agricultural sector in order to establish trade with other lands. This is due to the varying climate that affects the steady supply of goods that would sustain trade like that of Egypt. Mesopotamia also has their form of writing and architectural skills. Nevertheless, they are more recognized in terms of their arts especially in the creation of pottery. Likewise, Mesopotamia also has the same form of government like Egypt. Their ruler is a king that has almost similar powers to a pharaoh and they also have their subordinates. Moreover, the greatest weakness of this civilization is that it greatly relied in slaving and exploiting common people in order to develop their civilization. Similar to Egypt, Mesopotamia’s failure to establish a kind of governance that gives importance to common people is its greatest weakness. The above discussions show that these ancient civilizations have their respective strengths and weaknesses. The factors that characterized ancient Egypt and Mesopotamia also became the basis for their comparison, which makes their similarities and differences observable. BIBLIOGRAPHY Kemp, Barry J. Ancient Egypt. New York: Routledge, 2006. Pollock, Susan. Mesopotamia. United Kingdom: Cambridge University Press, 1990.

Friday, September 20, 2019

Internet Protocol (VoIP) Technology

Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term â€Å"voice over IP† is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, â€Å"Current voice-over-IP products,† describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as â€Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular context†. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against â€Å"reinventing-the-wheel† to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact – it will always hold faults and  «gaps » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: †¢ Disclosure from interior users with spiteful purpose; †¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; †¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; †¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set Internet Protocol (VoIP) Technology Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term â€Å"voice over IP† is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, â€Å"Current voice-over-IP products,† describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as â€Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular context†. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against â€Å"reinventing-the-wheel† to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact – it will always hold faults and  «gaps » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: †¢ Disclosure from interior users with spiteful purpose; †¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; †¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; †¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set

Thursday, September 19, 2019

Priorities and Hunting in Lord of the Flies :: Lord of the Flies Essays

" We can help them find us. We must make a fire."(P. 41). While the boys were making huts for shelter, Jack was off hunting instead of helping with the huts. All he cared about was that the boys needed meat, which was indeed true, but they also needed shelter. As Ralph, Piggy and Simon are working on a shelter they are listening to, " And then," said Jack, " when I've had a bathe and something to eat I'll just trek over to the other side of the mountain and see if I can see any traces. Coming?"(P.62). In the beginning, the boys got along great, but I think that it works against each other. Ralph and Jack get along so good that when things get kind of bad it just goes way bad. "Almost too heavy." Jack grinned back. "Not for the two of us."(P. 43). The book starts by Ralph and Piggy meeting in the jungle of a stranded island. They wander to the beach wondering if there is any other kids on the beach. When they find a shell , "the conch", they blow into it and make a bellowing sound. At the sound of the "conch", every boy, big and small, comes to the beach. Along with a group of boys is Jack Merridew, the leader of a choir. When the assembly begins, they decide that they want a chief. The kids all believe that the boy with the "conch" should be chief. They also decide that there is no "beastie", which Jack also obsesses about hunting and takes much of his attention. Immidiatly Jack is offended and has something against Ralph, even though he seems to hide his jealosy. When Jack's obsession for hunting overrides all other reality he decides to start his own tribe. Many of the boys choose to follow. One night when they have a feast over a dead sow of the tribe a figure considered to be the beast is beaten and stabbed with spears. It was really Simon. The ones who don't join the tribe are now the outcasts of the island. One night Jack and two of his tribe members raid the huts of Ralph, Piggy and Samneric. They stole Piggy's glasses, which only had one glass anyway, now making him blind in both eyes. The next day Ralph, Piggy and Samneric travel to the other side of the Island to get the glasses back.