Thursday, September 5, 2019
Voice over Internet Protocol (VoIP) Technology
Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are: à · Conversion of voice to analog and digital signal. à · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP: à · H.323 [12] à · IP Multimedia Subsystem (IMS) à · Session initiation Protocol (SIP) [5] à · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network ÃË To formally define the network security problems and unauthorized access incidents ÃË To define the most accredited security techniques and security methods ÃË To evaluate the prototype system and packet feature mechanism ÃË Email and other internet message are easily integrated with the voice applications ÃË To support the multimedia applications, which provides less cost effective services for video conference, gaming ÃË To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. ÃË Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. ÃË Present offline message passing between the users by selecting a user from predefined offline user list ÃË Present textual communication 1.3 Research Method ÃË Provide authentication to the end users for accessing the VoIP services ÃË Design secure VoIP Configuration system ÃË Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. ÃË Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. ÃË This research enhance security methods by analyzing the modern security challenges ÃË To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance ÃË Balance VoIP security and performance by measuring the services and network traffic ÃË To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows ÃË Computer to computer based services ÃË PC to phone and phone to PC based services ÃË Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are ÃË VoIP service providers ÃË Modem ÃË Internet services ÃË ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are ÃË Latency ÃË Jitter ÃË Packet loss ÃË Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are ÃË Time spent on routers and long network distance ÃË Security measures ÃË Voice data encoding ÃË Queuing ÃË Packetization ÃË Composition and decomposition ÃË Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section ââ¬Å"RTP profiles and pay load format specificationâ⬠of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to ââ¬Å"handshakeâ⬠with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ââ¬Ëvoicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows ÃË Software Related: ÃË Device related ÃË Protocol related ÃË System Configuration related ÃË Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic ÃË Software applications ÃË Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are ÃË PCs ÃË Telephone adaptors ÃË Modems ÃË VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. ââ¬Å"H.323 is a complicated protocolâ⬠. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p Voice over Internet Protocol (VoIP) Technology Voice over Internet Protocol (VoIP) Technology ABSTRACT: Voice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application. VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), denial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious) sparkle were crowded. These attacks also spoil grimy system by overriding assets, distracting valid user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. All system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications. The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss. CHAPTER-1 1.0 Introduction The voice enterprises continuously providing voice conversation services on over broad band by discovering the current market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions. The VOIP technologies allow sharing the resource of WAN for supporting data and voice for saving the cost for transmission process [1]. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications [2]. However the enterprises need to identify the security issues and employee new techniques to protect against attacks. Security and QoS is a main aspect of VOIP system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users [3]. The VOIP architecture is a complete network hierarchical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the poor ambitious. Here we introduce the attacks on over VoIP system. VOIP Overview VoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks [4]. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is transmitted via the internet. The basic steps involved in the transmission of voice signals through the internet are: à · Conversion of voice to analog and digital signal. à · Compression and conversion of the signal into Internet Protocol Packets to broadcast over Internet. VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the compressed speech where some other system may use high fidelity audio codecs. Technologies used to implement VoIP: à · H.323 [12] à · IP Multimedia Subsystem (IMS) à · Session initiation Protocol (SIP) [5] à · Real-time Transport Protocol (RTP) [5] 1.1 Problem Definition In the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged; the VOIP communication system widely accepted by the people; due to the high acceptance of VOIP system the security issues are main concern. However the VoIP services are rapidly growing in the current voice communication system, many unauthenticated users and hackers are stealing the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft. The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call; so it may delay the packet delivery, due to the encryption and decryption mechanism will conflict the call time. 1.2 Objectives of the study The basic objective of this is to detect source of attacked packet on over network ÃË To formally define the network security problems and unauthorized access incidents ÃË To define the most accredited security techniques and security methods ÃË To evaluate the prototype system and packet feature mechanism ÃË Email and other internet message are easily integrated with the voice applications ÃË To support the multimedia applications, which provides less cost effective services for video conference, gaming ÃË To supports a low cost, flat rate pricing on the voice communication over the Public Internet and Intranet services. ÃË Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. ÃË Present offline message passing between the users by selecting a user from predefined offline user list ÃË Present textual communication 1.3 Research Method ÃË Provide authentication to the end users for accessing the VoIP services ÃË Design secure VoIP Configuration system ÃË Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. ÃË Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets. 1.4 SCOPE These researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. ÃË This research enhance security methods by analyzing the modern security challenges ÃË To present various security methods; this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance ÃË Balance VoIP security and performance by measuring the services and network traffic ÃË To present VoIP protocols for secure data transmission 1,5 Thesis Organization Chatper-1: Introduction: General Introduction of VoIP, problem definition and Research methods Chapter -2: Literature Review: Review of VoIP deployment and review of security issues and performance and VoIP security background and security challenges Chapter -3: Security process: VoIP security process, managing of VoIP security and security process and define the security solutions Chapter -4: VOIP security and performance: Demonstrate VoIP performance , balancing of security and performance of VoIP Chapter -5: Analysis Report: security and performance analysis and investigation reports of VoIP security and performance and complete project report scenario Chapter -6: Conclusion, Future Enhancement, References and Appendices. CHAPTER -2 2.0 LITERATURE REVIEW Background VoIP is a IP telephony which is used to deliver a voice on over internet; which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network; for transmitting which uses Internet protocol for coordinating voice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet. VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol. VoIP service Types VoIP provides different types of voice service according to the communication media infrastructure; the most common services are as follows ÃË Computer to computer based services ÃË PC to phone and phone to PC based services ÃË Phone to phone based VoIP services [6] Computer to computer: A voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk[8], skype[7], messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services. PC to phone and phone to PC: It is a combination of Internet and circuit switched telephone system. The VoIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network; an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats. In the Phone to PC services the user can communicate from phones to PCs; user can dial to PCs by calling like normal phones; in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number; Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC [7]. The most common devices in these services are ÃË VoIP service providers ÃË Modem ÃË Internet services ÃË ATA: Analog Terminal Adaptor, this convert analog signals to voice signals voice signals to analogs singles Phone to phone based VoIP services [6]: Now a days this type of services are using in long distance calls; many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services. VoIP System A Fig- 1 shows a typical VoIP network topology which is a combination of given equipments; the following equipments are 1) Gatekeeper 2) VoIP Gateway 3) VoIP Clients Gatekeeper: A VoIP gatekeeper is a routing manager and central manager in a H 323 IP telephony surroundings. This is an option in a VoIP system which manages end points of a sector. VoIP gatekeeper is useful for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation. VoIP gateway: The VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression; signal controlling, packetization and call routing. VoIP clients: This equipment represents phones, multimedia PCs 2.1 Security Issues. VoIP Phishing How To prevent VoIP Phishing and avoided getting Trapped You can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim. What is VoIP Phishing and hoe it work VoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker. Security thread in VoIP While VoIP has become a one of the conventional communication technologies, VoIP user face a serious of security threads lets see this security issues. Firewall A firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the outside to the inside of the networks and so on. Over look security You must not look at only at the light side of VoIP. While it is revolutionizing voice and data communication, it does not symbolize some problematic security issues that need that need to be deal with accurately. Quality of Service Issues (Qos) Qos [9] is a basic process of VoIP; if it delivers a good quality of services to the users which are more advantage to the users for saving money; rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery. The main QoS issues are ÃË Latency ÃË Jitter ÃË Packet loss ÃË Bandwidth problem Latency: Latency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 [10] establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time. The basic issues in latency are ÃË Time spent on routers and long network distance ÃË Security measures ÃË Voice data encoding ÃË Queuing ÃË Packetization ÃË Composition and decomposition ÃË Decoding Jitter: The non-uniform packets make a packet delivery delay; which it is caused by insufficient bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol; this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level. Packet Loss: The packet loss increase the latency and jitter; where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network; due to the low bandwidth and high traffic which delays the packet delivery. Bandwidth: The low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes; the data have to transmit from one node to another node during this transmission if it encounter any problem which it can delays the packet. The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users. 2.2 VoIP protocols There are numbers and numbers of network that can be working in organize to offer for VoIP communiquà © service .In this part we will center no which the general to the best part of device deploy. Almost each machine in the globe use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section ââ¬Å"RTP profiles and pay load format specificationâ⬠of RCF. These sections address items.). Though pay load format section are define in document also published by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait. The H.323 [7] standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will always need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients behind the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then re gister to the gatekeeper, which will proxy calls on the clients behalf. Note that any external clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 Gatekeeper H.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.323[12] enjoy the first commercial success due to this fact those who are working on the protocol in ITU[12] worked quickly to publish the first standard in the year 1996. While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper. The business model for some carriers using the Cisco Global Long Distance Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings. Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to ââ¬Å"handshakeâ⬠with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location reject messages and responses, a Cisco SIP Proxy Server can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network. The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining core H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant deviation in calls-per-second measurements compared to a homogeneous SIP or H.323 network. Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB. Above illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used simultaneously for signaling. Reasons for VoIP Deployment When you are using PSTN line, you typically pay for time used to a PSTN line manager company: more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time. In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, in addition, you can talk with many people at the same time. If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos. There are two main reasons to use VoIP: lower cost than traditional landline telephone and diverse value-added services. Low Cost Higher multimedia application: Traditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as ââ¬Ëvoicemail and the additional lines are the part of perpetual cycle of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well understood and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and include an excellent supported infrastructure. IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the average lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the prospect of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision. Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX. Hidden cost can be substantial in any technology deployment. The downtime experienced with buggy or poorly implemented technology, in addition to the cost of qualified consultants to remedy such as Challenges of VoIP: Though VoIP is becoming more and more popular, there are still some challenging problems with VoIP: Bandwidth: Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN. Power Failure and Backup Systems: Traditional telephones work on 48 volts which is supplied by the telephone line itself without outside power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to overcome power failure, [14] Security: As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising [15]. W. Chou [16] has investigation the different security of VoIP investigation the different and also given some optional strategies for these issues. In reference [17], the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology. Soft phone: Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities. Emergency calls: Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily track callers locality to the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere; this made emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings. Physical security: The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept. Wireless Security: Connection in wireless network nodes were integrated with VoIP network which receives more and more popular and accepted [18]. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP. CHAPTER -3 Related Work 3.0 Security Studies Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols. Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with advanced technologies for improving quality of services and security. In this chapter I am discussing about security models and security process. 3.1 VoIP Security Process: There are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls. Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data streaming invokes at many stages. The most common VoIP vulnerabilities are as follows ÃË Software Related: ÃË Device related ÃË Protocol related ÃË System Configuration related ÃË Application level attacks 3.1.2 Software Related Vulnerabilities: The basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations [19]. Software application interfaces, software application logic ÃË Software applications ÃË Application interfaces 3.1.3 Device Related Vulnerabilities: One of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the heavy competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device. The most common hardware devices in VoIP are ÃË PCs ÃË Telephone adaptors ÃË Modems ÃË VoIP phones 3.1.4 Protocol Vulnerability: The main protocols in VoIP are H.323 [12] and SIP (Session initiation protocol), these two protocols are commonly used in VoIP hardware system [19]. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls. H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National Institute of Standards and Technology 2005). There are four types of devices under H.324: terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the Real-Time Transport Protocol transport all data. H.225 handles registration, admissions status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. ââ¬Å"H.323 is a complicated protocolâ⬠. SIP Vulnerabilities Overview The below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p
Wednesday, September 4, 2019
Iconography :: Essays Papers
Iconography Iconography, in art history, the study of subject matter in art. The meaning of works of art is often conveyed by the specific objects or figures that the artist chooses to portray; the purpose of iconography is to identify, classify, and explain these objects. Iconography is particularly important in the study of religious and allegorical painting, where many of the objects that are picturedââ¬âcrosses, skulls, books, or candles, for exampleââ¬âhave special significance, which is often obscure or symbolic. The use of iconographic symbols in art began as early as 3000 BC, when the Neolithic civilizations of the Middle East used nonhuman or animal figures to represent their gods. Thus, the Egyptian mother goddess Hathor was associated with the cow and usually appeared in relief sculpture and wall paintings as a cow-headed woman. The sun god Ra had a hawk's head, and the creator Ptah appeared as a bull. In ancient Greece and Rome, each of the gods was associated with specific objects. Zeus (Jupiter), the father of the gods, was often accompanied by an eagle or a thunderbolt; Apollo, the god of art, by a lyre; Artemis (Diana), the hunter, by a bow and quiver. In addition, the Romans perfected the use of secular allegorical symbols. For example, a woman surrounded by bunches of grapes and sheaves of wheat would be readily understood as a representation of the bounties of the earth. Early Christian art during the period of Roman persecution was highly circumspect, and innocuous objectsââ¬âthe fish and the doveââ¬âwere used to symbolize Christ and the Holy Spirit. Later Christian art, however, became replete with iconographic symbols. In particular, many of the saints became associated with specific objectsââ¬âSaint Peter with two keys, for instance, or Saint Catherine with a broken wheel. During the Renaissance and through the 18th century, allegorical paintings were especially popular, as artists constructed elaborate symbolic schemes to illustrate such themes as the vanity of human existence.
Tuesday, September 3, 2019
The FLSA: Exempt Vs. Non-exempt Employees Essay -- Labor Compare Contr
The FLSA: Exempt Vs. Non-exempt Employees President Franklin D. Roosevelt enacted the FLSA on June 25, 1938. It was signed in as a federal labor law to provide criteria for governing general labor practices such as overtime, minimum wages, child labor protections and equal pay. The Fair Labor Standards Act is a long and extensive document in and of itself. It defines many exceptions and exemptions. For purposes of this paper the portion of the FLSA that will be concentrated on is the difference between exempt and non-exempt employees. à à à à à Letââ¬â¢s begin by defining exempt and non-exempt. Non-exempt employees are those that are paid on an hourly basis and receive overtime compensation at one and one-half times their base pay for all hours worked in excess of some standard threshold. In most cases this ââ¬Å"thresholdâ⬠is 40 hours, but that is not always the case. Dividing the annual salary by 2080 to give a base hourly amount can derive the base pay for most, not all but most, employees. Exempt employees are those that do not receive compensation of any kind for hours worked in excess of whatever the threshold maybe. By definition of law exempt employees must be paid on a salary basis and job duties performed by said employee must be high-level such as executive, administrative or professional. To decide whether an employee meets the criteria for being exempt, there are two tests ââ¬â the duties test and the salary basis test. à à à à à For the salary basis test, employees ...
Monday, September 2, 2019
Russian Bureaucracy Essay -- Russian Government, Politics
The growth of the Russian bureaucracy from the Imperial to Soviet era is overwhelming. According to Alekinskii, in 1897, 435,000 civilians worked for the public bureaucratic sector. This means for every 292 members of the populous there would be one public servant plied for representation (Alekinskii, 178). By 1897, the bureaucracy in Russia was no older than sixty years. Prior to the 1830s state bureaucrats did not truly exist; shortly thereafter, seniority dictated which workers would progress upwards in the public institutions in which he or she worked (John Le Dunne). This could be interpreted as the first sign of the development of bureaucracy in Imperial Russia. Russian bureaucracy, at least in the Soviet and Imperial sense, does not mimic the traditionally accepted Weberian notion of bureaucracy and bureaucratic development. Some scholars feel Russia could be portrayed as the true birthplace of a pure bureaucratic system. In other countries, such as the United States or Norwa y, the bureaucracy gained power slowly in an already stable political and social environment. This is not the case in Russia. According to Hollander, a major difference in the Imperial and Soviet bureaucracies from prescribed Western norms surrounds politicization (Hollander, 305). The bureaucracy developed through class oppression and political upheaval over centuries. It can be said that a truly stable political and social environment in Russia is only about twenty years old; in spite of this, the Russian bureaucracy existed and thrived for centuries prior to the social awakening. How did Russia often express itself during times of censorship and control? Literature. Despite being written during the times of Tsars and Imperialists, works like Nik... ...overeignty.â⬠The American Journal of International Law. Vol. 43: No. 1 (January, 1949). 21-36. Hollander, Paul. ââ¬Å"Observations on Bureaucracy, Totalitarianism, and the Comparative Study of Communism.â⬠Slavic Review. Vol. 26: No. 2 (June, 1967). 302-307. Lincoln, W. Bruce. The Great Reforms: Autocracy, Bureaucracy, and the Politics of Change in Imperial Russia. (DeKalb: N. Illinois University Press, 1990). Pinter, Walter M., ââ¬Å"The Social Characteristics of the Early 19th Century Russian Bureaucracy.â⬠Slavic Review. Vol. 29: No. 3 (September, 1970). Pipes, Richard. Ryavec, Karl W. Russian Bureaucracy: Power and Pathology. (Lanham: Rowman and Littlefield Publishers, Inc., 2003). Ulam, Adam B. The Russian Political System. (New York: Random House Inc., 1975). Wade, Rex A. The Russian Revolution, 1917. (New York: Cambridge University Press, 2005).
Sunday, September 1, 2019
I wish I was the richest person on earth Essay
I wish I was the richest person on earth, I wish I was the president of Maldives, I want to be a singer, I want to be a doctor. Iââ¬â¢m sure you have dreams like these, well, not precisely, but Iââ¬â¢m sure you will have dreams. Anyway, most of the times we see that people hesitate to become what they want to be and often give up on their first or second try. Why do they give up? Havenââ¬â¢t they heard the saying, ââ¬Å"Failure is the key to successâ⬠? Respected teacher and my amicable friends, today Iââ¬â¢m here to give a speech regarding the address given by J. K Rowling ââ¬Å"the fringe benefits of Failure and the importance of Imagination. â⬠Every great achievement was once considered impossible. Here I am pointing out three incredible people who were once said nothing before they became famous. First there is Thomas Edison, the creator of the bulb; in his early years, teachers told Edison he was ââ¬Å"too stupid to learn anything. â⬠Work was no better, as he was fired from his first two jobs for not being productive enough. Even as an inventor, Edison made 1,000 unsuccessful attempts at inventing the light bulb. Of course, all those unsuccessful attempts finally resulted in the design that worked. Next is the person who is known as one of the most iconic faces on TV as well as one of the most richest and successful women in the world; Oprah Winfrey. She faced a hard road to get to that position, however, enduring a rough and often abusive childhood along with numerous career setbacks including being fired from her job as a television reporter because she was ââ¬Å"unfit for TV. â⬠Last but, not the least; Walt Disney who was fired by a newspaper editor because, ââ¬Å"he lacked imagination and had no good ideas. â⬠After that, he started a number of businesses that didnââ¬â¢t last too long and ended with bankruptcy and failure. He kept plugging along, however, and eventually found a recipe for success that worked. From these people we have learned to never give up on our dreams. Earlier I asked a question, ââ¬Å"Why do they give up? â⬠Why do they actually give up? Maybe because they think it is impossible or maybe people around them say that their dream is stupid. Or maybe their parents want them to be what they want and they tend to follow their parentsââ¬â¢ dream. Whatever the reason might be, you should know that you canââ¬â¢t gain anything without trying. You know the saying, ââ¬Å"no pain, no gainâ⬠right? The commencement speech given by J. K Rowling ââ¬Å"the fringe benefits of failure and the importance of imaginationâ⬠tells us how important it is to dream and never give up plus it also helped us to learn from our mistakes and itââ¬â¢s not a big deal when you fail. You have to work hard to achieve your goal or dream. In her speech she also included the importance of imagination. Take a minute and consider the world you live in. Well, one thing is for sure ââ¬â a hundred years ago, the world didnââ¬â¢t resemble the world in which we live in today. Consider jet airplanes. Consider computers and the Internet. These developments just didnââ¬â¢t appear mysteriously on the horizon one fine day. They all are here today because of imagination. Albert Einstein once said that ââ¬Å"Logic will get you from A to B. Imagination will take you everywhere. â⬠which tells us how important imagination is. Finally I would like to say, failing isnââ¬â¢t the end of the world. Nobody is perfect. So try, try and try again until you finally reach the end of the tunnel. If you donââ¬â¢t go after what you want, you will never have it. If you donââ¬â¢t ask, the answer is always no. If you donââ¬â¢t step forward, youââ¬â¢re always in the same place. If you fell down yesterday, stand up today. An arrow can only be shot by pulling it backwards, when life is dragging you back with difficulties, it means itââ¬â¢s going to launch you into something great. So just focus and keep aiming, and donââ¬â¢t forget to keep imagining. Thank you.
Saturday, August 31, 2019
Motivated You To Study Social Work Education Essay
My motive to analyze societal work comes from my passion about assisting people who are less advantaged. Having spent the last five old ages working in a societal attention environment helped me to gain that my passion lies in assisting the most vulnerable members of our society. I found working as a Care Assistant highly disputing but besides rewarding.A Attending a multi-disciplinary attention reappraisals gave me a great insightA A into a societal worker function. I found out that societal work can assist service users maintain their self-respect and independency, give wider picks of support, protect from maltreatment every bit good as cut down admittances to infirmary. I hope that analyzing societal work will give me a valuable accomplishments and cognition needed for effectual professional pattern as a societal worker.2.A A A What type of scholar are you?Last twelvemonth on the Access class through the exercising on the category I have identified my learning manner [ Appendix 1 ] . A Knowing and understanding my acquisition manner helped me to larn more efficaciously and place chances to better my acquisition. Harmonizing to Honey and Mumford ( 1982 ) Learning Style Model I perform strongly as a Reflector. A As a Reflector I learn by detecting and believing about what happened. I like to stand back and detect experiences from many different positions. I like to roll up information ( the more that better ) , and prefer to believe about it exhaustively before coming to any decisions. I prefer to take a back place in meetings and treatments. I ever listen to others before doing my ain point. I learn less good when being thrown in at the deep terminal with no clip to fix and when moving as leader or role-playing in forepart of others. Having identified my learning manner, I now understand that as a reflector I am a ââ¬Ëslow ââ¬Ë scholar and necessitate more clip to analyze, that is why it is of import to be after my survey efficaciously. I besides need to seek to acquire involved more in meeting and treatments alternatively of sitting back and listen.A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A A AMy preferable manner of acquisition was besides determined by finishing the Learning Styles Questionnaire on C_Space [ Appendix 2 ] . Harmonizing to the questionnaire I learn best by ocular manner. Information presented in images, diagrams or charts is easy remembered.A I like to watch the lector closely and be able to see the instructor organic structure linguistic communication to to the full understand the content of a lesson. I besides like to utilize colorss in my surveies such as colored markers to foreground information. A As a ocular scholar it is of import to do certain that I sit ever in a place in the schoolroom where I can see things clearly.3.A A A How do others comprehend your values and abilities?Recently I asked my best friend how they perceive my values and abilities. The feedback I have been given was as follow: You are reasonable, cautious, careful & A ; practical. I see you as clever, gifted, or talented, but modest. Not a individual who makes friends excessively rapidly or easy, but person who ââ¬Ës highly loyal to friends you do do and who expects the same trueness in return. Those who truly acquire to cognize you recognize it takes a batch to agitate your trust in your friends, but every bit that it takes you a long clip to acquire over if that trust is of all time broken. My fellow pupils see me as confident, unfastened minded and positive individual. So far, the feedback signifier my coachs was ever positive, nevertheless I am prepared to can take negative feedback. Receiving feedback is great chance to derive utile information and penetration into what we need to develop or better in order to turn professionally.AAAA4.A A A How do you near larning? How have you improved your accomplishments for survey ( including IT ) ?AAHaving developed a figure of schemes and techniques on last twelvemonth class enabled me to do the most efficient usage of my clip, resources, and possible. I approach my surveies strategically and consistently by working out where to put my clip and energies. Choosing the right topographic point to analyze is of import as I work most efficaciously in a well ââ¬â organised survey country. I like to work in a comfy and free from distractions place with a good lighting and a room to distribute my book and documents. Time direction is ââ¬Å" a vehicle that can transport you from wherever you are to wherever you want to be â⬠( Tracy 2007:2 ) Time direction in the key accomplishment to manage my coursework and to acquire it done on clip. Good clip direction accomplishments enable me to use my clip in a more effectual manner and let me to carry through more undertakings in a shortest possible manner. A survey clip tabular array is an indispensable ingredient in effectual clip direction. I have created a hebdomadal clip table [ Appendix 3 ] A to assist me organize my day-today undertakings, which keeps me positive and focused on my perusal, and helps me accomplish my marks. I have besides learned to prioritize my work by making the little and easy undertakings foremost and taking them out of the manner, before seeking to undertake larger pieces of work. I have created ââ¬Å" things to make â⬠name [ Appendix 4 ] . I use it to put day-to-day precedences and to cut down determination devising and concern. The ability to do clear and concise notes is another of import accomplishment that I have developed through my survey. Taking notes helps me to derive a deeper apprehension of the topic and gaining control the indispensable points of the subject. It besides helps to do sense of what is to be learned and to retrieve it subsequently. Having identified my preferable learning manner I know now that I work good with patterned notes, such as atomic, spider gms, diagrammatic and head maps. This method was described by Buzan ( 1992 ) in his book ââ¬Å" Use your caput â⬠. He calls the technique ââ¬Å" Mind Mapping â⬠. Mind maps allow for greater activity when entering thoughts and information, every bit good as leting the note-taker to tie in words with ocular representations ( Buzan, 1992 ) . Patterned notes involve composing the chief subject in the Centre of the page, and so compose related thoughts around it and associate them up to demo their relationship to the chief thoug ht. Pattern notes are more ocular, and are really active signifier of acquisition. For illustration of my note taking please see [ Appendix 5 ] . I have besides learned how to read efficaciously by being selective, scanning, planing and oppugning as I read. Computer helps me to analyze in many different ways. It helps me to research online for information, make structured notes, making charts, graphs and tabular arraies and to organize and maintain path of my surveies. Although I have used computing machine in the yesteryear there was countries that I still had to better. Last twelvemonth on the entree class I have learned how to work with dispersed sheets, databases, and make a power point presentation, which helped me to better my IT skills. [ Appendix 6 ]A5.A A A What factors affect your acquisition?AHaving many duties as an grownup scholar I must equilibrate against the demands of larning. Personally, the factor impacting my acquisition is English as a 2nd linguistic communication I do happen it difficult at the times to show myself in the manner that I wish to. It besides lower my assurance and self ââ¬â regard. Bing capable to gags about my amusing speech pattern in the yesteryear made me experience nervous when talking in for epart of others. However, my assurance in that country improved dramatically since get downing the class. Distractions while analyzing could be another country that affects my acquisition. I need a quiet and organized topographic point to analyze without any break. I have learned to understate distractions while I work by promoting others to esteem my rights to work without break. I keep my phone off when I am analyzing to avoid phone calls that could upset my acquisition. Self ââ¬â regard and deficiency of confidence.A Before I took an Access Course my ego ââ¬â regard every bit good as assurance were really low. I did non believe in my abilities and felt really dying about traveling back to instruction after a long interruption. Having a positive feedback from the coachs every bit good as fellow pupils helped me to construct up my self- regard and go a confident pupil.AAA6.A A A How do you go an effectual job convergent thinker in your life?Problem resolution is one of the cardinal accomplishments in societal work pattern. Social workers use a job ââ¬â work outing attack in working with persons, households, groups and communities. As a societal work pupil, it is really of import to me to go an effectual job convergent thinker. In my personal life I have learned facing instead than avoiding jobs. I tend to work out my jobs utilizing a simple technique. The first phase is to specify the job. To understand why the job exist and looking at the root cause of the job. Second I explore the job by looking at how does the job impact me or others? The following measure is looking for possible solutions and choosing a realistic solution that is most relevant to me. Finally I put my solution into action. It is nevertheless of import to measure the effectivity of my solution.A7.A A A How do you go more effectual, independent and confident self- directed learner?Autonomous acquisition is ââ¬Å" a procedure in which persons take the enterprise, with or without the aid of others, in naming their acquisition demands, explicating larning ends, placing human and material resources for acquisition, taking and implementing appropriate acquisition schemes, and measuring larning results â⬠( Knowles, 1975:14 ) . Harmonizing to Malcolm Knowles ( 1984 ) grownups learn otherwise than immature people. In his theory of grownup larning Knowles pointed that grownups are self- directed in their learning.A ââ¬Å" As a individual matures his self-concept moves from one of being a dependent personality toward one of being a autonomous homo being â⬠A ( Knowles, 1984:12 ) . As an grownup pupil I take duty for my acquisition procedures, such as goal-setting, instructional design and rating of my learning procedure. Bing organised helps me to pull off my surveies efficaciously. In order to go more independent scholar I need to be motivated to larn, able to pull off my clip efficaciously, and reflect upon my acquisition. Effectiveness of larning depend on ââ¬Å" holding your province of head, infinite, clip, and stuffs organised in the ways that best suit your acquisition â⬠( Cottrell, 2008:67 ) .8.A A A How did you work hand in glove with others? ?I am a portion of a Care squad working in a attention place for people with dementedness. Bing a portion of the squad I have learned how to work co- operatively with my work co-workers. As a squad member I have learn contribute to accomplishing the end of run intoing the demands of clients. Apart from work I besides work co ââ¬â operatively with others in group work undertakings on categories. We were put to groups to finish specific undertaking. I worked hand in glove by sharing my thoughts, being and active hearer, esteem other people positions, work together with the members of group to finish the undertaking successfully. Working in groups gave me a great chance to derive assurance and develop interpersonal accomplishments, such as active hearing and inquiring and communicating accomplishments.9.A A A How do you associate your larning to the modern-day context of societal work pattern?Working in a Social Care as a Carer my function involves supplying practical support, and enabling service users to keep their independency to take Fuller and unafraid life. I besides build partnerships with people I work with, seeking to win them trust and promoting them to get by and acquire most out of life. I relate my acquisition to the modern-day context of societal work by i mplementing my current accomplishments and cognition to my work scenes. Skills such as interpersonal accomplishments help me to understand the importance of actively listening and sympathizing with service users in order to come in the universe from their point of view.A I am besides more cognizant about the group kineticss in my work topographic point and importance of effectual squad working in order to accomplish the desire outcomes.A Since making the grade I besides developed an anti ââ¬â discriminatory pattern. I started to associate the theories to pattern to understand the causes of favoritism and ways to dispute it efficaciously.
Friday, August 30, 2019
Eradicating Social Ills
ASSIGNMENT 2 FIK 3042 ENGLISH FOR COMMUNICATION 2 ERADICATING SOCIAL ILLS AMONGST TEENAGERS GROUP: EL-AO4 Prepared by NAME| ID NUMBER| TELEPHONE NUMBER| Kasthuri Bai A/P Thangarajah| D20111049818| 013-9801264| Lecturer : Dr. Lajiman bin Janoory Dateline :6th November 2011 ERADICATING SOCIAL ILLS AMONGST TEENAGERS. Nowadays, the social ills amongst teenagers are so rampant that they are posing a great problem in the society . Before we go further , let us see what are actually these social ills among the teenagers.There are many types of social ills that are affecting our teenagers at an alarming rate. Some of them are addiction to drugs , smoking,gangsterism,vandalism,bullying,illegal racing and many more. Everyday we hear and see the effects of these social ills in the form of suicide,accidents,rapes,snatch thieves and brutal crimes. The effects of these social ills amongst teenagers are affecting the nation badly and causing great setbacks in the country. The spreading of social il ls have to be stopped immediately to save our youngsters who are the future generation.How are we going to eradicate these social ills if we do not know the root causes of these problems Therefore,before we find ways to eradicate the social ills amongst our teenagers, let us also dwell in the root causes of why the youngsters of nowadays fall an easy prey to the negative elements awaiting them. These causes can be categorized into several factors,mainly due to family crisis and external factors such as the influence of friends and environment.Living in this materialistic world can be very challenging to even adults,so what more to say for a teenager who is still struggling between adulthood and childhood. The need for good guidance ,counceling and parental love is essential to these youngsters. Whom should they turn to if the circumstances arise? Can they turn to their parents? Yes, under normal circumstances ,parents should be the childââ¬â¢s number one counsellor but,is this th e case in most childââ¬â¢s life? In fact the parents are the last to know about their childââ¬â¢s problem,which is a pity!This is because nowadays,mostly both parents are working and are too busy chasing their own goals, that they fail to see what their children are undergoing. Usually these parents leave their children to fend for themselves or in the care of a babysitter who most of the time doesnââ¬â¢t put her heart into the responsibility given . The outcome is , the child feels neglected and deprived of parental love. Another reason is when a child comes from a broken family,the frustration and anger is taken upon the poor child.As a result a child grows up to be insecure and lacking in direction. Hence falling an easy prey to the awaiting threats outside. Children are also stressed when parents are not understanding and pressure them to study something which is not of their interest . Parents who subject their own desires and ambitions on their children can cause a lo t of unnecessary pressure on them. Peer pressure and the need to proof oneself in order to be accepted is also another factor why the teenagers so easily succumb to the social ills around them.Constant innovation and development also provide boundless network which promotes extreme socialisation among our teenagers. Hence the exposure to all the unwanted elements in the society! Teenagers who do not know how to cope with stress, resort to these unwelcome means of escapism. We have seen some of the main reasons of why the social ills are spreading like an epidemic amongst our teenagers. What can we do to help them or to curb these social ills? There are a few very important things that can be done to nip the bud from the beginning itself.Firstly,the role of a family is very important . Parents who are responsible,who allocate enough quality time with their children can be a source of confidence for their children. Children will be able to rely on their parents for any advice and grow up to be a confident and secured person. These children often will not fall prey to the social ills as they are able to differentiate between good and bad and have no need for any form of escapism as they get enough love from their parents. Parents also must make sure that their children do ot lack of religious knowledge. As we know, all religion wants its followers to be a good human and abide by the rules. So if a child is given enough religious education and is taught to respect the humankind then,the chances of him or her resorting to violence is slim. Too much freedom and too much money given to teenagers will only mean trouble. Therefore parents should act wisely and explain to their youngsters why sometimes they cannot have whatever they want and why they must always obtain their parentsââ¬â¢ permission before going out.Parents should always be aware of their childââ¬â¢s whereabouts but at the same time should not also be too strict and practice veto power at home. The y should be able to compromise,understand and respect their childââ¬â¢s feelings too. Maintaining a healthy relationship with children is an important measure in reducing these social ills amongst teenagers. Otherwise most teenagers will choose to rebel against their parents and try to prove to everyone that they are in control of their lives Besides the role of family ,the role of teachers and counsellors in schools is also very important in preventing social ills amongst teenagers.A teacher must always be sensitive to a childââ¬â¢s problem . A teacher must be able to gain a childââ¬â¢s trust in order for the child to confide in her or him. A teacher must make it her responsibility to solve a childââ¬â¢s problem and not be someone who simply wants to teach but is not much bothered about the childââ¬â¢s affair. Teachers can help a lot to curb these social ills if they play their role kindly and caringly. They should notice things and try to help the youngsters by send ing them to a counsellor or by counselling them themselves.While teaching in class , a teacher must always stress on the moral values and teach their students to avoid falling prey to bad influences. The education department and the mass media must always remind these teenagers to avoid doing all these illegal activities and the repercussions should anything unpleasant happen. The enforcement agencies can be invited to give talks and show slides of what is happening and how bad it can turn into,to create awareness amongst teenagers. A lot of opportunities must be created to allow teenagers to involve hemselves in activities such as outdoor games,indoor games,dancing and drawing classes,photography clubs and some social services that will divert the attention of these teenagers . The teenagers will not only be occupied but will also benefit from these extra activities. This healthy activities can be organised by the residential commitees or by the ââ¬Å"ketua kampungâ⬠. Healthy competition with lucrative prizes can be held to attract these teenagers. The State government and the district office can help with these measures.Money used to cure the victims of the social ills in the form of rehabilitation centres and their medication can be put into a more healthy usage such as the above mentioned activities. After all one must agree that ââ¬Å"Prevention is better than Cureâ⬠As a conclusion , everybody has to play an important role in eradicating social ills amongst teenagers . Eventhough these problems seem difficult to solve but as an Ethopian proverb says, ââ¬Å"When the spider webs unite,you can tie up a lion. â⬠(Infinity Web Development, LLC, 2002-2011) (OPpapers, 2011)
Subscribe to:
Posts (Atom)