Saturday, August 31, 2019

Principles of Assessment in Lifelong Learning

Principles of assessment in lifelong learning Task A part a The assessment process is a vital part to teaching in the lifelong learning sector. All assessment requires the collection and recording of evidence of student learning. There are many aspects to assessment which will begin from the point of the leaner completing their initial application form. The principles of assessment come under three different headings, Initial assessment, formative assessment and summative assessment. Each of the assessment criteria come with specific outcomes for the learner this will assure the learner is getting the best possible outcome to their learning.Looking at figure 6. 1 Gravells, A (pg112) assessment cycle as shown below The initial assessment will be the crucial part of the learning journey. This will provide the relevant information needed to decide the leaner’s starting point. It is the level from which the learner’s progress and also achievement can be calculated. As state d by Green, M. (2003) â€Å"Initial assessment needs to be done with learners rather than to them. It should be of benefit to learners and help them feel positive about themselves and their potential to learn. Initial assessment may start with establishing the learners, interests, aspirations; experience and motivation or it may be part of a â€Å"getting to know you† activity in induction. It allows you to look at the learning styles which are relevant to each learner. Whatever method you choose it needs to be flexible and should reflect the nature of the learner. From using a range of assessment methods it will enable you to summarize the learners starting point. Whichever method is chosen, it is important that initial assessment contains some form of skill/knowledge assessment which can be validated by the tutor.The initial assessment will allow the planning for any other services which may be required to assist the learner. It is essential that all interaction which take s place with the learner on the initial interview is recorded, this is done for the protection of the learner also the tutor can refer back to any conversation which has taken place. The recording of information will make sure the learner is on the correct course at the correct level, the learner actually wants to access the course. Planning for the assessment is basically you and your learner agreeing on which type and which methods of assessment are suitable.This will vary from learner to learner as they all have different needs and also very often different learning styles. Also included in the planning assessment is setting appropriate target dates setting with both the learner this could also involve other members of staff. Assessment activity is all about how to assess the activity and what methods could be used. For example if it is a student led assessment they could be completing the requested assignment or even gathering some form competent evidence. If tutor/assessor led this could be observation, questioning or even photographic evidence.After the three initial assessments have been completed it is then time to look at the assessment decision and feedback, this enables the tutor to make the decision on whether the learner has been successful or otherwise. This is the point in which the tutor/assessor is able to give constructive feedback to the learner stating if any further actions are required. Reviewing the progress means that any assessment plan can be review and altered at any one time to meet the learners required needs at the time, or upon completion of either the programme or the course.The review process enables you as the tutor to sit with your learner and give the opportunity you both time to discuss any relevant issues you may feel will aid in their learning. By reviewing the assessment activities which you use this will give you an opportunity to amend any if necessary. The formative assessment is the second strand of the assessment pr ocess. â€Å"formative assessments are ongoing practices that help both the teacher and student evaluate and reflect on how they are both doing, and what changes either or both might need to make to become a more effective teacher and learner. Larry Ferlazzo (no date) Assessment for learning is also known as formative assessment. Assessment for learning is the process of seeking and interpreting evidence in use by learners and their teachers to decide where the learners are in their learning, where they need to go, and how best to get there. Since the goal of formative assessment is to gain an understanding of what students know (and don't know) in order to make responsive changes in teaching and learning. Techniques such as teacher observation and classroom discussion have an important place alongside analysis of tests and homework.Much of what tutors and learners do in the classroom can be described as assessment for learning. (Black and Wiliam, 1998) says â€Å"Assessment for l earning can be defined as ‘all those activities undertaken by teachers and/or by their students, which provide information to be used as feedback to modify the teaching and learning activities in which they are engaged’ Formative assessment should occur regularly throughout the instructional process and, According to the National Center for Fair and Open Testing (NCFOT) (1999), Careful documentation can allow formative assessments to be used for summative purposes.The manner in which summative assessments are reported helps determine whether they can be easily translated for formative purposes–especially by the student, teacher, and parent. (Ainsworth & Viegut, 2006) state â€Å"By varying the type of assessment you use over the course of the week, you can get a more accurate picture of what students know and understand, obtaining a â€Å"multiple-measure assessment ‘window' into student understanding† Some examples of a formative assessment could b e: * Asking questions * observations * self assessments * quizzes (sometimes) * learner record keepingThomas R. Guskey suggests â€Å"that for assessments to become an integral part of the instructional process, teachers need to change their approach in three important ways. They must â€Å"1) use assessments as sources of information for both students and teachers, 2) follow assessments with high-quality corrective instruction, and 3) give students second chances to demonstrate success† (2007). Assessment of learning is also known as summative assessment, assessments used to sum up a learners achievement. Summative assessment can be carried out as particular stages of the course or learning rogramme are completed, or at the end, whichever seems appropriate. Where achievement is recorded on an on-going basis, summative assessment may mean bringing all the evidence together, rather than carrying out an additional set of assessment activities. This means that all the requireme nts stipulated by the examining body are all collated and correct. Assignments to be marked and graded appropriately, making sure the work is that of the learners and no one else’s. . Examples of summative assessment can be a written examination. Reliability is essential as they are used numerically to classify learners and compare them to each other.Traditional unit tests (multiple choice, true/false and sort answer questions) are poor summative assessments as they rarely require the application of skills and concepts or the demonstration of understandings rather than a mere reporting of information. The best summative assessments often incorporate the essential question(s) that have focused the unit, requiring students to answer one or more of the essential questions drawing upon ideas from personal experience, from the texts studied, and from new text(s) encountered as a part of the assessment. Assessment methodsWithin my area of childcare/sexual health I use many varied t ypes of assessment. The assessment criteria I use are based on the level of the learner and the suitability to the specific unit within the assignment. By using various methods of assessment I get a clearer picture of what went well with both tutor and learner and what was not so good so improvements can be made. Use accurate assessment to effectively plan to ensure all groups of students are suitably challenged and supported. Use a variety of strategies (ASL) to ensure students know where they are and what they need to do to improve in relation to their target grades.These must include: * Skilful Questioning and other forms of oral feedback (relating to lesson objectives) which gauge and probe student understanding, as well as re-shaping of explanations and tasks. * Frequent written feedback (Marking), which follows Strengths, Attitude to learning, Level and Target (SALT) and where targets set are detailed enough that students can make progress. * Peer and/or self-assessment Photog raphic assessment Photographic assessments are used usually with another form of assessment, observation or verbal.Photographic assessment allows the learner to do practical activities and have a photographic record of their achievements these can then be placed either into a book or a file and annotated by the learner which will explain the type of activity which had taken place. If this is done on a regular basis with activities at different levels the learner can see the progress which has been made. If and when using photographic evidence it should always be signed and authenticated by both the learner and the tutor. Is it valid? Yes as the photographic evidence will show as long as the photograph is annotated, dated and signed by a tutor/teacher.If the evidence is not current i. e. the picture taken six months before the criteria may have changed so photographic evidence may not be required or be insufficient for the amount of work needing to be produced. As with positives ther e are also some negative points with this kind of assessment. * Some learners may not give permission to be photographed * It may mean learners are absent purposely to avoid taking part in the lesson. * You need to make sure all the equipment works and you have all your resources to hand. Verbal QuestioningThis is an excellent way to find out if the learner has understood the task which has been set for them. You can use the lesson objective in this case to keep referring back to. The questioning can be either informal or formal. You could state you are going to recap the lesson, stating you will be asking each learner a question at the end. This method is used quite a lot as it continually assess the learner knowledge. Giving the students positive feedback throughout telling them no answer is wrong getting them to expand on the answer they have just given.Demonstrations can be done with this method as you could demonstrate the subject at hand, asking questions continually and the s tudents responding accordingly. * The down side is often learners are worried they will give the wrong answer. * They may feel embarrassed taking in front of others Observation Observational assessment is the perfect way to observe the students as they work on a specific project. This promotes independent learning; gaining more than one view point also the learning is timed and controlled. This enables the teacher to roam around the classroom, occasionally offering guidance and encouragement as the students work.Whist walking around the classroom the teacher is able to take notes on how students are performing and also whether or not modifications need to be made to the assignment. The observation works well when the teacher wishes to monitor how students work together in groups or individually. The observational process is also a useful to monitor behavior within the session. This is turn enables the teacher to move the learner(s) if necessary. * Students may not participate in the session as they feel they don’t have the relevant information to give. May not get a true reflection of the outcome as some learners may come out with untruths. Portfolios Many aspects of the portfolio and the portfolio process provided assessment opportunities that contributed to improved work through feedback, conversations about content and quality, and other assessment relevant discussions. The collection also served to demonstrate progress and inform and support summative evaluations. The relationship between assessment and instruction requires re-examination so that information gathered from learner discussions can be used for instructional purposes.The disadvantages of this could be * Time consuming for staff marking them * Difficult to ensure reliability between staff * Can encourage cheating re ownership of work It is important that all learners being assessed by this means must have a shared understanding of the level expected of their work. It is good practice to show learners relevant examples and suggest a proposed format, including suggesting a physical size, as this will help your back! If the nature of the evidence needed from students is transparent, this can aid the marking and go towards reliability between staff.Also preparing a marking proforma for all staff should help. As portfolio building is usually time consuming, offer interim assessment opportunities so that learners can receive advice on whether the evidence they are assembling is appropriate. Consider assessing the portfolios as a team, with each giving comments on a feedback sheet which could also have positives on the portfolio as this aids feedback for learners. Self-Assessment/Peer Assessment Learners can only achieve a learning goal if they understand that goal, and can assess what they need to do to reach it.The ability to assess one’s own work is essential in acquiring that understanding. Peer assessment is also valuable because the interchange will be in a l anguage that learners themselves would use, also because learning is enhanced when leaners themselves tak on the roles of teachers and examiners of others. Self-assessment and peer assessment is used to log the progress. This can be done by mind mapping in different colours. First colour what they know, second colour some of the information you have imparted, third colour all the information and what their peers know.This could be done on several different occasions to assess the progress which has been made, also to identify any areas of improvement, show the strengths of the learner. Below is a chart which I use and can be altered to allow for differentiation and levelling. The peer assessment could be a quiz which they complete they exchange papers to mark each other’s. This can give a sense of ownership to the student. In conclusion I feel that assessment is a necessary part of the learning process for both learner and tutors alike. It enables tutors and educational estab lishments to keep up to date records of the progress of each learner.Ofsted or any other government expectorate will able to see regular progress, marking from the members of staff and also positive comments with identifiable areas of any improvement required. Task B The assessment process is an on-going process to which all learners should be involved in. One of the main objectives to assessment is to enable all learners to take part at their own level. The need for inclusivity is paramount when doing assessment to enable each learner to be assessed at their own level. If necessary other services may need to be involved i. English as an additional Language (EAL) this will need liaison with each subject leader and the co-ordinator for EAL. This will then look at the specific needs of the learner, ensure that assessment practice conforms with equality of opportunity, and monitor the performance of EAL and ethnic minority students, setting them relevant challenging targets, and finall y analyse and interpret the performance of EAL and ethnic minority students at the end of key stages. Whichever assessment method I have chosen it needs to address the intended curriculum outcomes and also the continuum of learning that is required to reach the outcomes.As I am assessing the learners they need to understand clearly what they are trying to learn, and what is expected of them. In turn they are given feedback I give them around the quality of their work and what in turn they can do to improve it. The advice they are given from me the tutor will go to making the necessary improvements. During this time they learners are fully involved in deciding what needs to be done next, and the relevant people who can give them help if required.

Friday, August 30, 2019

Online School vs. Public School Essay

Sloan Consortium stated that, â€Å"More than one million students attended classes via the Internet in 2008. Of those million, around 200,000 were enrolled in full-time virtual schools, meaning they attend all of their classes online.† I have been doing Online Schooling for two years but before that I went to public school. Online schooling is a better choice than public schooling because you have more control, there is no drama, and you have more free time. I prefer online homeschooling because I can control my pace. I get to decide when I want to work and I don’t have to study all day, everyday like I normally would. The course schedule is also up to me; courses can be done one at a time or in groups. During my first year at an online school I did five courses at one time. It’s now my second year and I am doing one course at a time, which I definitely prefer. At Public schools, course schedules are picked for me and I would have no control. You also can’t control what is going on in your school environment. One of the best things about online school is that there is never any drama. I really hate gossiping, which is a big problem at public schools. Because I only interact with other kids from my school by way of the internet there is no pettiness between us. Kids my age fight over friends and boyfriends or girlfriends. There’s nothing to fight about when you live as far away from each other as we do. At normal schools though, you see everyone everyday. When your constantly with the same group of people, someone’s feelings are always getting hurt and there is constant arguments. Many of situations involve your â€Å"friends†. If your friends with someone you can’t be friends with anyone they don’t like, which can get very complicated. 3 When doing school online, you have much more free time. If I stay caught up, I’m able to do things after school and on the weekends. When I was in public school, I had far too much homework to do anything. Now I’m able to take a few days off for vacation or because I’m sick and not have to worry about falling far behind. While at public school all of my time was filled by homework, but now I’m able to spend hours after school with my horse or just relaxing. Some of my family has expressed concern about me not  interacting with children my age because I don’t go to public school. Because of online schooling, I’m able to hang out with my friends at our barn. Before I switched I never saw any of my friends outside of school because I never had the time. Online schooling is a much better choice than public schooling. The benefits of online school far outweigh those of public schooling. With Online schooling you have so many more choices, everything is up to you! There are many different schooling choices but online schooling has made my life easier and stress free. I definitely suggest that you look into online schooling as an alternative to public school. It may not be right for everyone, but it might be right for you.

Thursday, August 29, 2019

Canadian Museum of Nature Web Analysis Essay Example for Free

Canadian Museum of Nature Web Analysis Essay The Canadian Museum of Nature’s website is an average piece of work that gathers audience from both English and French speaking individuals. The museum’s Web presence is elegant and simple to use, clearly separating the English segment from the French segment to allow easier navigation throughout the site, which, considering the size and diversity of the system it represents, makes you wonder how the designers and creators managed to pull it off in such a simple way. Rhetorical Design The Canadian Museum of Nature’s website is intended to promote the museum’s products and services on offer at the museum among English speaking and French speaking tourists. Almost anyone visiting this website is most likely looking for information about a certain service or item relating to natural history and tourism, so it is safe to state that the primary audience for this website are nature lovers and tourists wishing to visit Canada or local Canadians looking for a place just to have a good time enjoying the marvels of nature. However, there is something for everyone in this website. Even for those who don’t intend to visit the museum but want to win something, there’s a photo contest section on the home page that might serve to draw more traffic to the site. This enhances the possibility of attracting more members to join in the course of the museum. The website also has links that connect to 5 of their other websites, basically to diversify and exert their web and market presence in the field of nature. The context of the website explores the versatility of the Canadian Museum of Nature’s Internal organization and products and services offered by the museum. Information on the home page is divided into eleven primary categories: Calendar of activities, visitor information, teacher zone, about the museum, renewal, exhibitions, polar year, collections, research, library and products & services. The site also has quick links on shopping, becoming a member, donating to the cause, staff, press room and there is also a link for visitors to post comments and questions to the staff. All these information is carefully and strategically placed on the page to allow for easy navigation and still leaves a lot of space on the site. Congested sites tend to be an eye sore to the readers, but as for this one, no one has to worry about having to go through dozens of information to get to what you’re looking for. Interface Design The entire website is filled with photos of animals and artifacts of natural history which blends in very well with the overall theme of the website. Each page contains at least three amazing photos that keep the visitor glued to the website, even if just for the photos. Actually, come to think of it, the website contains very little text, it is only the overall design and beautiful photos that keep visitors busy on the site since there’s nothing much to read from the website. The home page contains very clear navigational links on the left hand side of the page to other sections of the website with its interface being simple, consistent and functional. However, due to the limited amount of information on the website, the interface does not provide sufficient feedback and does not have a real time visitor – support staff dialog system. Visitors have to leave a message on the contact us section and wait for an unknown amount of time for a feedback. All pages contain site navigation links. Site Design Text on the website is aligned to the left side of the screen, which is very effective for both the new and ordinary users of the site. The design of the site reflects the basic hierarchical organization of the Canadian Museum of Nature. From the home page, links to other major divisions can be easily accessed from the left hand corner; with each major hyperlink having a page that directs the user to other major sub-divisions; which leads the user to the exact information that can best satisfy the user’s specific need. The information on the pages, although minimal, gives a clear understanding of the basic intention of the site owners. The home page contains links to virtually everything someone would be looking for within the website. On the top right hand corner of the site, there’s an appropriately placed site index which is very helpful in the navigation of the website. The site relies heavily on indexes as it is virtually impossible to find what you looking for without linking to a page that contains the sort of information that will be of help to the visitor. Page Design The web pages in this site are designed for users with 15 inch monitors. Since navigation throughout the site relies heavily on the site index and table of contents, the pages reveal a consistent visual hierarchy. The designers of this site rely on museum’s logo on each page as a header to constantly remind the user that they are still on the site, although the site could use the inclusion of a table on the calendar of activities segment to help the reader cut to the chase and find the exact thing he’s looking for instead of browsing through the links. Typography Only three font types have been used throughout the website, in order to make it neat at professional-like, with Verdana being the outstanding one. Coupled with a white background and text that are aligned to the left side of the page, the pages are full of life and bring out the message in a rather natural and easy way. Editorial Style The text in this site is brief and exact to the point even though it doesn’t cover entirely everything a visitor would most likely want to know about. The site does not use titles or subtitles as it contains functional links that act as titles. Graphics & Multimedia The website is fairly simple and does not contain a lot of graphics – only nature photos, which are significant in building the theme of the site – and absolutely no audio, video, animation or multimedia of any sort and therefore it makes it easy for the pages to load faster, even with slower internet connectivity. Overall Impression To sum it up, the website has a fairly simple design. The fact that only three font types have been used in the entire site makes it easy to read through without straining . It is most likely to attract twice as much attention and traffic since it is written in two languages with clear and large enough text. Also, it appeals to its audience due to the fact that it has incorporated exquisite photos of what’s on offer at the museum and there’s also the constant use of the color green, which is a symbol of nature. The green color is likely to blend in with the visitor’s impression of the museum. What I liked most about this website is its simple yet comprehensive design and the fact that it is written for a much more broader audience i. e. the English and French. However, the website is too shallow and doesn’t have enough information for visitors. This makes new visitors to the site dig deeper than the site in order to find information that’s featured in the website. On a general point of view, the website can be rated â€Å"Average†. Canadian Museum of Nature Web Analysis. (2017, Mar 15).

Wednesday, August 28, 2019

Limit switches Research Paper Example | Topics and Well Written Essays - 750 words

Limit switches - Research Paper Example The theoretical understanding on how the sensor operates and achieves it roles is also adequately highlighted considering the glaring points and lastly there is a conclusion that considers all the possible developments that should be embraces in the sensors if they have to be dependable. Introduction It is important to understand that limit switches are the type of sensor that are used for the recognition of absence or presence. In this doing, limit switches as a form of sensors do have the arm, lever, plunger and knob that is either physically of mechanical activated to make contact with adjusted objects, with the contact existing between the objects and the switch’s actuator and moves it to the ‘limit’. With this kind of operation, it is possible to mount a limit switch in a remote location to enable its actuation by another object and not necessarily a human being. A limit switch plays the following roles; detecting the presence and absence, speed detection, co unting, detection of movement range, breaking of circuits when required due to unsafe situations (Zhang 57a). As a sensor, limit switches have various advantages and disadvantages alike, some of the advantages includes; it can sustain switches with high level current of up to 10A, it can also with stand most of the environmental conditions, finally, it is more precise and accurate coupled with its being economical in sensing (Zhang 49a). The weaknesses of the same system are that there has to be a physical contact for the sensor to operate and again, the mechanical parts of the sensor can always wear out. History of Sensor With the initial invention being that of the micro switch, there has been remarkable improvement in the development of the limit switches to ensure some of the most complicated controls are managed. The picture below illustrates one of the limit switches currently used in Moving parts of abridge Who invented the Sensor? The invention of a limit switch dates back t o 1932 when Peter McGall came up with the micro switch when he was employed by one of the battery companies, Burgess (Zhang 67b). From then, there has been development of a limit switch to the contemporary usage with the same application. How and where  is it Currently used in Industry Many industries use the application that is provided by limit switches, in food and beverages industries, there is intense freezing of food. In the freezing process, there is the use of the automatic pallet staking system that uses a wobble stick limit-switch for detection of the loading of pellets in the right position. The switch then sends the signals to the conveyor for the transfer of the load through the vertical door to the freezer for quick freezing (Zhang 77b). In most of the manufacturing industries, there is need for closing the doors in the fastest way possible in cases of contamination or fire, the doors are at times designed to close at a speed of six feet per second. The speed can res ults into breakages and destruction of the doors, there is then need that the doors slow when about to completely open or close, this is a achieved with the help of the limit switches. There are many other places where limit switches are used for the control of further damages. Theory behind Sensor/ how it works Limit switches operates on the simple fact that they switch on and off depending on the activity, that takes place. In this regard, for the limit switch to initiate a response there is obviously a

Tuesday, August 27, 2019

Foundations of Managment & Organization Essay Example | Topics and Well Written Essays - 3000 words

Foundations of Managment & Organization - Essay Example There are two aspects that are normally connected to rationalization. The first aspect includes the question on the number and size of the institution in the sector (Morgan 2006). The second aspect is determination as to whether the institutions are despite their numbers can be collaborated to minimize duplication of duties by the entire system (Morgan 2006). It important to note that rationalization has both beneficial aspect and disadvantageous side of its application on an existing company. By the virtue that the core objective of introducing rationalization is to bring quality services, the issues of costs reduction is out of question (Morgan 2006). It should be noted that rationalization will result in increased prices of goods and services in the company. When relating this with Travelodge hotel, rationalization has made customers even not to pay for services they don’t (Morgan 2006). Travelodge just like many hotels have embraced the need to offer quality services. In most scenarios, customers do not mind about the high costs accelerated by rationalization rather, they focus more on clean and confortable place where one can get a good night sleep (Morgan 2006). Therefore, despite the speculation that rationalization will reduce prices, the truth is that it contributes to high costs of goods and services offered (Rodrigues 2001). It should also be noted that rationalization which people believe will modify the institution to be bigger and larger is a misguided notion (Rodrigues 2001). It is not a guarantee that by improving the quality of services within an institution should also be accompanied by expansion of its size and departments. Application of rationalization tools will guarantee advancement in quality service pleasing to customers but it will not enhance business expansion. It is important to note that despite Travelodge applying

Monday, August 26, 2019

Cybercrime Research Paper Example | Topics and Well Written Essays - 2000 words

Cybercrime - Research Paper Example This IP operated similar to a house address and represented a specific group or a company. Therefore there was an automatic controls system on the internet IP could be traced. This stopped people from trying to use internet as a means of stealing money or another fraud activity because they knew that it could be traced back to them. In the last decade however the growth of internet has been phenomenal. From a mere few million users of the nineties it has grown in to billions. This growth has made it impossible to maintain the old system. Moreover the wireless internet system has made it even more difficult to track internet criminals. This is because airports, bus terminals and even Starbucks coffee shops all have wireless internet facilities. These facilities operate on temporary IPs. This therefore means that each time you connect to the internet a new IP address is assigned to your computer. Thus it becomes almost impossible to track and convict criminals on internet fraud. The co nviction becomes even more difficult as it is not easy to prove anything in the court of law. One of the most popular cyber crimes is the Credit Card frauds. This type of fraud has increased over the years with the increase in usage of credit cards. The availability of all types of services through credit cards ensures that they become an attractive option for fraud, especially when it comes to online purchases. There are millions of business in US and Europe which only accept payments through credit cards. This is no longer restricted to online services as it did in the nineties. Businesses like Netflix have ensured that customers rely completely on credits cards for all types of consumer items. Credit card fraud is the term used for describing the fraud or theft of money committed by using the credit cards in illegal payments and money transactions to obtain illegal goods and services or to illegally transfer funds from others accounts. They are among

The Crusades Essay Example | Topics and Well Written Essays - 1250 words - 1

The Crusades - Essay Example They left for Acre in 1217, and joined John of Brienne, ruler of the Kingdom of Jerusalem, Hugh I of Cyprus, and Prince Bohemund IV of Antioch to fight against the Ayyubids in Syria" (Crusade, Wikipedia). The campaign started with seizes of Damietta, in June, 1218 and they gained little success with conquering one tower outside the city on 25th August. But then epidemic swept through the crusader's camp and one of the many casualties was Robert of Couron. But by November the crusaders were able to capture the sultan's port under Francis of Assisi. He tried to negotiate with the sultan numerous times but failed. Slowly but surely the crusaders were gaining footholds in their campaign and ultimately seized Cairo. But their march to Cairo was proved to be disastrous as it was the flooding season of the Nile and "with supplies dwindling, a forced retreat began, culminating in a night attack by Al-Kamil that resulted in a great number of crusader losses and eventually the surrender of the army by Pelagius. The terms of this surrender meant the relinquishing of Damietta to Al-Kamil and an 8 year peace agreement with Europe in return for the original piece of the cross and the prisoners held from the failed advance on Cairo". (http://en.wikipedia.org/wiki/Fifth_Crusade) The Sixth Crusade: The Emperor Frederick II of Germany had taken the crusading vow when he was young during his coronation ceremonies. And now it was his turn to salvage the holy land. The Kingdom of Jerusalem was ruled by John of Brienne who was actually had been acting as king. Fredric married his daughter Yolanda and started his campaign in 1228. Though Fredrick was barred considerably with internal conspiracies and movements he was able to force Al-Kamil, the sultan of Egypt into negotiation thereby winning the possession of Nazareth, Sidon, Jaffa, Bethlehem, and all of Jerusalem except the Dome of the Rock in February 18, 1229. Fredrick was not allowed to rebuild the wall of Jerusalem, destroyed by Al-Mu'azzam, nephew of Saladin, in 1217 but he entered in to the city victorious and was crowned king on March 18th. But due to constant restraints by the conspirators back home Fredrick left Jerusalem in May and in 1244 when the truce ended Jerusalem was taken by the Mamluks. The Seventh Crusade: The Seventh Crusade was started by King Louis IX of France. For his campaign to recover the holy land King Louis IX became known as Saint Louis later in his life. Some scholars believe that this title was given to him simply because of his great devotion to God and not for his crusade campaign. The Mamluks took possession of Jerusalem in 1244. Louis felt it was his duty to announce his version of Crusade. King Louis IX of

Sunday, August 25, 2019

Government Essay Example | Topics and Well Written Essays - 500 words - 3

Government - Essay Example In contrast, unitary governance system is characteristic of power centralization. Instead of having independent states or provinces, as it is the case in the United States, a unitary system functions based on subnational units. Critical to note is that these subnational units are subject to the influence of the central government. In this respect, the central authority governs local governments under the unitary system. Great Britain and France are good examples of governments that practice the unitary system. While national and state governments share power under federalism, the central government decentralizes or delegates power to subnational units under the unitary form of government (Lansford 44). Political cultures that adopt federalism are those that believe in more than one body of legislation. These cultures lack parliamentary systems, and instead rely on bicameral constitutional provisions for legislation formulation and implementation. In contrast, most unitary governments are unicameral. In order to share and subsequently regulate power, legislation at the state or province level is either approved or rejected by the head of the national government. Most importantly, both state and national governments work together in social, economic, or political matters. Religious beliefs and practices vary from one region to another. In the United States, religious freedom is constitutionally provided for. In other words, the constitution makes it clear religion and state are two different entities. What this means is that the government, through congress, cannot interfere with an individual’s choice, belief, or practice of religion. The constitutional provisions made in the First Amendment accord protection to the religious freedoms of the American people. The free exercise clause prohibits congress from interfering with religious beliefs or practices of the American people (Horwitz 63). On

Saturday, August 24, 2019

An overview of Western Civilization Essay Example | Topics and Well Written Essays - 2000 words

An overview of Western Civilization - Essay Example Under the philosophy, different scholars prompted the discovery of schools of thought such as the Pythagoreanism, Sophism, and Platonism. These schools of thought have significantly shaped the thinking of people living in those times. Another exemplar facet of Western Civilization is the religion. Around 700 BCE, Ancient Rome came into power and led many people in subjecting to Roman Catholic which believes in God, Jesus Christ, and the Holy Spirit to be one person equal in power. Roman Catholic was gaining its popularity among people in those times. Popes were being praised, people come at their feet and kiss them, and they generally gave what they have materially in order to gain the attention and blessings of the popes. Amidst the church’s great influence is a man who courageously sees and speaks of its flaws. Looking at the prose titled â€Å"Grand Inquisitor†, Fyodor Dostoevsky boldly scrutinized it with an aim of â€Å"an attack to the Catholic Church†. Apart from a system of education and religion mentioned earlier, Western Civilization promoted values and issues such as rational argument, human rights, equality, democracy and free thought. Regarding the last, the prose gave nothing but a wide array of reflections. One point in the prose states, â€Å"†¦gift of freedom with which the ill-fated creature is born† (Dostoevsky). The gift of freedom stemmed out from Jesus Christ’s choice when he was on earth, at a time when Satan approached him in the mountains to tempt him. The three temptations to Christ, were first, the earthly bread. This was followed by casting his own self while at the same time trusting that he will be saved by the angels, and the third, choosing the word kingdom to gain unity upon earth. The issue of freedom revolved around these three temptations. The Grand Inquisitor presented the results and the curse or consequences of Christ rejections of the three while questioning the nature of man. Regarding the first temptation, the Grand Inquisitor mentioned that Christ’s failure of choosing the earthly bread over the heavenly bread resulted to unhappy people with freedom. This is shown by this passage, â€Å"†¦the terrible gift that had brought them such suffering†¦Ã¢â‚¬  Freedom allowed people to carry on independently. Freedom casted a provider, or a leader, according to the Grand Inquisitor. Thus, people suffer because having no ruler is like being a sheep driven into confusion and misery. It is a common human nature to worship and be a slave of someone, â€Å"Feed men, and then ask of them virtue! That’s what they’ll write on the banner which they will raise against Thee†. Such philosophy is seen when human chose to be led by political leaders like Hitler, Mussolini, and Stalin (Dostoevsky). They were willing to give up their freedom and be in subjection to rulers who would give them the earthly bread despite the persecutions they impose. Another scene which illustrates that is when Christ went down from the heavens to make miracles like resurrecting a dead one and healing the ailing ones. Upon seeing the miracles performed by Jesus, people came at his feet and started to do acts of worship to hi m. The Grand Inquisitor pointed out that Christ must have satisfied people if only he did not reject Satan’s temptation. That way, he will serve for the sake of many and make himself famous as a grand provider just like what the pillars of the church are doing. The second temptation reveals that Christ’

Friday, August 23, 2019

The Radical Past of Liberal Feminism Essay Example | Topics and Well Written Essays - 1500 words

The Radical Past of Liberal Feminism - Essay Example Although all groups had the similarity in fighting for women’s rights the approaches to classify the problem and define the methods to improve the women’s position were quite unlike. Any idea which is worth existence in society is inevitable to create an interest group and be originated from the political system. Feminism was not an exception. Thus, two confrontational ideas of the political system – Marxist and bourgeois – gave the names of the two feminists’ groups which argued different approaches to women’s freedom and equal rights. Critics’ review of both groups can help clearly understand these differences. Feminista.com online journal critically examines Marxist and liberal approaches to women’s freedom without supporting any of them. They argue that neither Marxist societal focus on women’s financial independence nor liberal feminists’ accusations of women’s unequal position based on biological gender could not help women to change something. (One Purpose, Many Voices). Let us have a deeper look why both approaches were not successful. Marxist feminism bought up the idea of turning the capitalist society into socialist one where no one (see men) has financially higher position and, therefore, women gain financial freedom. Yet, to have nothing means to be free. But who wants to not have any possessions or property for the idea of equal rights? If there is no property there is no control. If there is no control there is no any society, even socialist society. Thus, women should have been strived for gaining higher financial position rather than dismissing men from their financially dominant scale. Many feminists could not support Marxist approach because they were willing to be equal rich instead of being equal poor. Comparing with Marxist approach liberal feminists had quite an opposite focus. While Marxists desired to change a society as a structure liberalists focused on changing individuals in their society.  

Thursday, August 22, 2019

Hybrid cars Essay Example for Free

Hybrid cars Essay Industrialization has contributed to high-energy consumption across the world. The developed countries consume the larger share due to more industries that operate there. The release of pollutant substances into the atmosphere has led to global warming whose dangerous effects are already being felt today. The motor industry, being one of the largest pollutants, has been seeking new technologies that would lead to less pollution. The amounts of carbon dioxide by the motor industry are large enough for the industry to get concerned. In the early days, most cars were solely powered by fuel combustion engines alone. Such vehicles did not have much power as the new hybrid engines of nowadays. The fuel engines also produced large quantities of harmful gases. With the current debate on environmental issues, car manufacturers have resulted to developing more energy efficient vehicles that will produce equal or more power as earlier engines but with less harmful effects. The idea of developing hybrid car engines was borne from the successful introduction of hybrid powertrains. These hybrid powertrains were found more fuel efficient and this triggered car manufacturers to adopting the technology to the car industry (Haan et al, 2006). Hybrid cars are those cars whose engines use more than one power sources. Much criticism as well as commendation of these hybrid cars has been witnessed. The main issues of contention are the fuel efficiency of the hybrid vehicles over other engine cars and the effect of the hybrid cars on the economy. Some authors have argued that as much as hybrid vehicles lead to fuel efficiency, there are counter effects that negate any gains made. Studies have been done to quantify these factors to authenticate the allegations and interesting findings have come up. () In a study by Haan and others, they aimed at assessing the extent to which hybrid cars had changed people’s choice of buying cars. It had been argued that the introduction of hybrid cars led to people abandoning the fuel efficient vehicles they used earlier in favour of hybrid cars. The study was an assessment of the various ways that policy makers in different countries intended to address issues of pollution by cars. Several measures had been proposed and they centered on reducing the demand for cars, reducing energy consumption per vehicle per distance in kilometers and reduction of carbon emissions (Haan, 1082). Hybrid cars were considered energy efficient and that fewer pollutants were released (http://www. activehybrid. com). It was, however, generally argued that the hybrid cars had other counter effects. The study by Haan sought to quantify this. This suggests that there was an argument that hybrid cars, for some reason, were bought as additional cars thus increasing the number of cars owned by a household. Governments aim at reducing number of cars per household and hybrid cars worked against this principle. Following this argument, there was a general view that the lesser taxes charged on hybrid cars had led to the influx of the cars into the markets. (http://www. activehybrid. com/). The results of the study indicate that hybrid cars indeed reduce emissions. If a government is to effectively reduce the amount of emissions from the motor industry, hybrid cars have to be adopted. Policy should, therefore, allow more hybrid cars and to encourage this, tax reductions on hybrid cars should be sustained. The study further identified that hybrid cars do not increase the number of cars per household. The increment that was recorded was due to other factors unassociated with hybrid cars themselves. The findings of this study quell fears that hybrid cars have an overall effect that harm the economy (http://www. activehybrid. com/Why-Hybrids-are-the-Vehicles-of-Choice-these-days. html). Authors expressed that it was insufficient to evaluate a vehicle’s pollution level without considering other factors involved in the vehicle’s life cycle. Authors expressed a need of focusing not only on the output emission levels of the final product but also on the processes involved in developing these cars. Economic factors had to be considered to justify the efficiency of any type of car engine including hybrid. The cost aspect also had to be checked, to assess the economic viability of the car engines, the prices of having batteries was analyzed, fuel costs also, and driving range (Granovskii, 1186). Granovskii and others carried out a study to assess the environmental factors. The study sought to quantity the amounts of greenhouse gases related by each of the types of engines considered. The various other pollutants emitted in the manufacture and repair of batteries were also analyzed. The results of this study show that in comparison with the electric car, hybrid car was superior in car emission produced. More pollutants were released. The prices of electric cars were less than those of hybrid cars. There results suggest that if electric power would be generated and conserved in the car engines, the gains from such an electric engine would be more than that from hybrid cars. However, the study found that no car engine was superior to all other on all fronts. On every aspect the different cars engines should advantages over others. The hydrogen engine, though, did not have any advantage over other engine types except that it had least pollution. The study further indicated that when natural gases are used for generation of electricity in an engine, the hybrid is better than other engine types (Anderson). Manufacturers had further developed intelligent technology that enabled cars to sense their environments and adjust their fuel consumption levels. The developers of this technology strongly believed that this technology was the most fuel efficient that should be adopted to replace the hybrid cars. The new technology engine was proposed as fuel saving and less pollutant than all other engine types. A review of literature in a study done by Manzie and others reveal that hybrid cars had high initial costs that dispelled many customers from buying them. Hybrid engines had been found to be more fuel efficient in trains and this technology was extended to the cars. The study by Manzie focused on identifying any benefits realized from the use of hybrid and communication technologies in fuel economy. A situation model was used in evaluation of the fuel economy of combining these two technologies. The study was carried out in Australia. The hybrid model used in this consisted of the hybrid electric vehicle. The speed of the vehicle was evaluated when the technologies are combined. Several control procedures were put to ensure the result are not skewed to any side (http://www. hybrid-vehicles. net/). The results of the study indicate that there were significant improvements in fuel economizing. Less fuel was consumed by the hybrid vehicles. Telematics, which combine intelligent capabilities in a car, were found to be cost effective and fuel efficient. The results also indicate that there may be challenges in adopting the new telematics technology because it affects overtaking between intelligent and unintelligent cars. The study indicated that hybrid systems alone consumed less fuel. A combination of hybrid and telematics technology to create an intelligent hybrid car led to more improvements in fuel consumption. There are benefits that are associated with the hybrid cars. Studies have shown that these cars consume less fuel, release fewer pollutants and have more power. Today the hybrid model car engines are being improved their capabilities. Hybrid cars are environmental friend. These cars are also cheap enabling people to acquire vehicles fast and save money to do other important things. The hybrid cars have now found their way into United States military operations (Mehney). It is evident from the above analysis that hybrid vehicles consume less energy than combustion engines. The evidence is not only in theory but has been supported by empirical evidence. The several control measures applied in each study ensure that the results are a true representation of the actual situation. Hybrid cars have all evidently been found to release fewer pollutants into the atmosphere. In fact, this is the technology that every country serious on reducing pollution should emphasize on. The criticism of the hybrid cars has not presented empirical evidence to authenticate allegations. Most of these allegations are generalizations. It seems that the hybrid technology poses a threat to some manufacturers and that is why they resist it. The technology, however, has revealed its evidence and we can go by it. Manufacturers need to focus on building energy efficient cars such as the hybrid ones. Works Cited Granovskii, Mikhail. , Dincer, Ibrahim and Marc A. Rosen. â€Å"Economic and environmental comparison of conventional, hybrid, electric and hydrogen fuel cell vehicles† Journal of Power Sources. Volume 159, 2, (2006): 1186-1193. Haan, Peter. , Peters, Anja and Scholz W. Roland. †The Automobile Industry Sustainability† Journal of Cleaner Production. Volume 15, 11-12, (2006): 1076-1084. â€Å"Hybrid cars are an excellent choice! † 2007 Hybrid Cars Blog 15 August 2007 http://www. activehybrid. com/ â€Å"Hybrid Vehicles† 2005, 15 August 2007 http://www. hybrid-vehicles. net/ . Manzie, Chris. , Watson, Harry and Halgamuge, Saman. â€Å"Fuel economy improvements for urban driving: Hybrid vs. intelligent vehicles† Transportation Research Part C: Emerging Technologies Volume 15, Issue 1, 2007: 1-16. Mehney, Paul. â€Å"Public Affairs Officer Army Unveils First Hybrid-Electric Propulsion System for New Combat Vehicles,† Aug 15, 2007. US Army. 15 August 2007 http://www. army. mil/-newsreleases/2007/08/15/4424-army-unveils-first-hybrid-electric-propulsion-system-for-new-combat-vehicles/. Anderson, Tony. â€Å"Proven Ways to Increase Your Gas Mileage†, July 1, 2007, 15 august 2007 http://www. gasmileagemanual. com/? gclid=CO3UhKPF940CFQWIlAodGRsjMA. â€Å"Why Hybrids Are The Vehicles Of Choice These Days. † 15 August 2007, http://www. activehybrid. com/Why-Hybrids-are-the-Vehicles-of-Choice-these-days. html.

Wednesday, August 21, 2019

Youth Violence Essay Example for Free

Youth Violence Essay Youth violence in the United States is a major social problem that will inevitably get worse. Criminologists and state authorities are more concerned on the issue of youth violence than adult violence because the crimes involving the youth are becoming more violent and are continuously increasing the number of juvenile offenders (Zimring, 1998, xi). During the mid 1990s, the increasing rate of violence involving the youth alarmed state authorities that committee hearings in the Congress had been scheduled for it. In one of the hearings, Representative Bill McCollum said that â€Å"even though there is a decline in rates of violence, the increasing rate of violent crimes by young offenders are alarming† (cited in Zimring, 1998, xi) In a report published by the Office of the Juvenile Justice and Prevention Program of the U. S. Department of Justice, there are nearly 2. 2 million arrests of persons below 18 years old (Snyder, 2008). This involves theft, arson, robbery, murder, drug abuse, weapons law violation and rape. In this year alone, almost one of very eight crimes recorded in the United States are committed by juvenile offenders (Snyder, 2008). There are also more than 619,453 offenses, of which 181,468 youth offenders arrested, recorded from various schools in the country for a five-year period from 2000 up to 2004 (Noonan Vavra, 2007). Of those recorded, the age brackets of the offenders are: 38. 0 percent 13-15 year olds; 30. 7 percent 16-18 year; 18. 2 percent 19 or older; and 11. 0 percent -10-12 year olds. (Noonan Vavra, 2007). Zimring (1998) believes that the lenient treatment on juvenile delinquents and crimes involving the youth in the 1980s may have been contributed to its increase in the 1990s. (p. 7) There are already numerous studies and researches done to study the reasons behind such antisocial behavior of the youth. Prothrow-Stith Spivak (2004) believes that the cycle of violence usually starts at home (p. 49). Youths who witnessed violence at home when they were still a child, are most likely to commit a criminal offense upon reaching the puberty stage. There are also numerous factors that are most likely related to youth violence, such as: alcohol, binge drinking and drug abuse; media hype and cultural norms that patronize or promote violence in the society; vulnerability of young persons, particularly adolescents; racial discrimination; poverty; and violent or not unfriendly family background (Prothrow-Stith Spivak, 2004, p. 49). Now, the challenge among state authorities is to conduct effective prevention programs on the issue. Counselors and psychiatrists believe that prevention program is more effective than having a stricter juvenile justice system. Prothrow-Stith Spivak (2004) challenge the people concerned in the prevention of youth violence to actually confront the status quo and the whole juvenile justice system (p. 227). Professionals that are usually working with juvenile offenders should be trained on how to understand the illnesses, sufferings and offenses of the offenders rather than just reacting on actual cases. Most programs funded by state agencies available for the youth are usually for the treatment of the problems encountered by them, rather than helping the youth to prevent and handle it. Millions of public funds have been spent on persecuting and incarcerating offenders but minimal funds have been allocated into stopping the current problem of adolescent people getting involved in illicit and violent behaviors (Prothrow-Stith Spivak, 2004, p. 230). Youth violence is undeniably a national issue to that needs to be addressed. The resolution of this issue however is not only an area of concern of state authorities, but also a collective conscious effort of sectors that should be involved such as the family, media, school authorities and even the youth themselves. Only with the proper understanding and analysis on the problem that will ensure the resolution of it. References Noonan, J. J Vavra, M. C. (2007, October) Crime in Schools and Colleges: A Study of Offenders and Arrestees Reported via National Incident-Based Reporting System Data. The Card Report. Prothrow-Stith, D. Spivak, H. R. (2004) Murder Is No Accident: Understanding and Preventing Youth Violence in America. San Francisco: Jossey-Bass. Snyder, H. N (2008, November). Juvenile Arrests 2006. Juvenile Justice Bulletin. Retrieved March 27, 2009, from http://www. ncjrs. gov/pdffiles1/ojjdp/221338. pdf. Zimring, F. E. (1998) American Youth Violence. New York: Oxford University Press.

Tuesday, August 20, 2019

Internet Protocol (VoIP) Technology

Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term â€Å"voice over IP† is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, â€Å"Current voice-over-IP products,† describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as â€Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular context†. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against â€Å"reinventing-the-wheel† to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact – it will always hold faults and  «gaps » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: †¢ Disclosure from interior users with spiteful purpose; †¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; †¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; †¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set Internet Protocol (VoIP) Technology Internet Protocol (VoIP) Technology Abstract Voice over Internet Protocol (VoIP) technology has come of age and is quickly gaining momentum on Broadband networks. VoIP packetizes phone calls through the same routes used by network and Internet traffic and is consequently prone to the same cyber threats that plague data networks today. It presents lower cost and greater flexibility for a venture but presents considerable security challenges. Many solutions for VoIP security are projected, however these solutions should take into account the real-time constriction of voice service and their methods be supposed to address probable attacks and overhead related with it. One of these solutions is to make use of Firewalls, which implement a security strategy by examining and straining traffic arriving or leaving from a protected network. This is normally done by evaluating an incoming packet to a set of policies and performing the corresponding rule action, which is accept or reject. Undesirably packet examinations can require considerable interruptions on traffic due to the difficulty and size of policies. Consequently, improving firewall performance is significant for the VoIP networks. In this paper, we propose a new firewall deign that is able to dynamically update firewall policy based on Neural Network and achieve packet examinations under rising traffic loads, higher traffic speeds, and stringent QoS necessities. The design consists of several firewalls configured in parallel that jointly impose a defense strategy. Every firewall outfits part of the rule and incoming packets is processed through all the firewalls concurrently. Once the neural network is trained, it continuously updates the firewall policy using the selected parameters to perform its evaluation. Since many firewalls are utilized to process each packet, the proposed parallel firewall system has considerably lower delays and a higher throughput than other firewalls. Introduction Voice over IP the transmission of voice over traditional packet-switched IP networks is one of the hottest trends in telecommunications. Although most computers can provide VoIP and many offer VoIP applications, the term â€Å"voice over IP† is typically associated with equipment that lets users dial telephone numbers and communicate with parties on the other end who have a VoIP system or a traditional analog telephone. (The sidebar, â€Å"Current voice-over-IP products,† describes some of the products on the market today.) As with any new technology, VoIP introduces both opportunities and problems. It offers lower cost and greater flexibility for an enterprise but presents significant security challenges. As with any new technology, VoIP introduces both opportunities and problems.. Security administrators might assume that because digitized voice travels in packets, they can simply plug VoIP components into their already secured networks and get a stable and secure voice network. Quality of service (QoS) is fundamental to a VoIP networks operation. A VoIP application is much more sensitive to delays than its traditional data counterparts. Latency turns traditional security measures into double-edged swords for VoIP. Tools such as encryption and firewall protection can help secure the network, but they also produce significant delay. Latency isnt just a QoS issue, but also a security issue because it increases the systems susceptibility to denial-of-service attacks. To succeed in a VoIP network, a DoS attack need not completely shut down the system, but only delay voice packets for a fraction of a second. The necessary impediment is even less when latency-producing security devices are slowing down traffic. As described in the introduction, parallelization offers a Scalable technique for improving the performance of network firewalls. Using this approach an array of m firewalls processes packets in parallel. However, the two designs depicted in differ based on what is distributed: packets or rules. The design was Consisted of multiple identical firewalls connected in parallel, each firewall j in the system implements a local policy Rj where Rj = R. Arriving packets are distributed across the firewalls for processing (one packet is sent to one firewall), allowing different packets to be processed in parallel. Since each packet is processed using the policy Rj = R, policy integrity is maintained. A neural network is a group of interconnected nodes. The well-known example is the human brain, the most complicated and difficult neural network. We can make very fast and reliable choice in portion of a second. In the face of the clear neatness of usual thinking, outcome are usually not-white and -black or binary, but quite engage a broad diversity of alert and secreted inputs, we have an wonderful facility to recognize well-known patterns as well as extraordinary patterns more or less directly, the neural network approach effort to reproduce the way humans visually the usual consumer speedily studies to identify spam from correct connection. The reason for this is generally since we illustration our brains both on reason to a broad variety of message content and the brain learns to create lightning-fast, very exact guess. The capacity of utilizing packet changed networks as a transmit standard for real-time tone of voice connections has drawn broad awareness among both research and possible communities alike. The current progress in speech conventions and high speed information communication technology hold up the notice in equipment such as voice over Internet protocol (VoIP), the mathematical character of information interchange and the energetic routing method engaged in packet-switched networks outcomes in an unbalanced network delay (jitter) practiced by IP packets. [chris miller]. Although a data-parallel firewall can achieve higher throughput than a traditional (single machine) firewall, it suffers from two major disadvantages. First, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall. Successful connection tracking is difficult to perform at high speeds using the data-parallel approach Second, distributing packets is only beneficial when each firewall in the array has a significant amount of traffic to process (never idle), which only occurs under high traffic loads. In order to understand parity in a carrier network maintaining secrecy, the studying techniques to know excluded traffic from partial information, such as the header information and show pattern of a series of packets. The propose a traffic credit technique for a direct request which uses mathematical information such as incidence of packet coming. This method is to be used for stop idea by recognize traffic generate by not only VoIP but video request as well. By using this method, travel that is clearly mediator excluded is not needed, the quality of traffic that is classified into best services, such as urgent situation message and moving sharing, is certain, and, for best effort services, suitable operation are perform so that capital can not be busy by a few edge, so as to understand fairness in symbol services. This advance is to applications that generate traffic from the presentation of the traffic. It can be underground into the following three types regarding the granularity of the observed traffic. [Toshiya Okabe Tsutomu Kitamura 2006]. Transaction-level behavior This approach is a system focus on the skin of an application-level action, such as an HTTP request message, and its response, an HTTP response message or MAIL message. With this progress, a request is indirect from the change patterns, the size of each message. A method to order maintain by the time-series changes in the size of messages. These techniques are useful for sense a signal protocol, but are not suitable for discovery of real-time message traffic whose features are boring and last for a fairly long time. [Toshiya Okabe Tsutomu Kitamura 2006] Flow-level behavior This method is to make out an application from mathematical information such as the inter-arrival time, period of the run, packet size. Here, a run is defined as a sequence of packets having a common source address, source port, destination address, destination port and transport protocol. It is extract skin of size data message request flows, such as HTTP, FTP and SMTP graceful from side to side a network, in order to create workload for a network simulator and classify traffic into three lessons, bulk data message such as FTP, informal message. [Toshiya Okabe Tsutomu Kitamura 2006] Packet-level behavior This is techniques that identify a request from the header or load of a single packet. A group method mainly based on port facts has been used but its efficiency has been lost due to the arrival of P2P applications that illegitimately use chance port numbers and port numbers for HTTP to traverse a Firewall. [Toshiya Okabe Tsutomu Kitamura 2006]. Average packet length and variation The result of extract skin correlated to the normal packet size and difference in packet size. Difference in packet size here indicates the number of types of packet size for a request whose packet size is fixed. It is the result of take out the skin of voice applications. The packet size of the voice application is lesser than that of the other application. [ Takayuki Shizuno 2006] As with any new knowledge, VoIP introduce both opportunity and problems. It offers lesser cost and greater give for an project but presents significant security challenge. Security administrator strength suppose that because digitized voice actions in packets, the plug VoIP mechanism into their previously protected networks and get a stable and secure voice network address translation (NAT), and most VoIP mechanism have counterpart in data network, VoIPs presentation stress mean you must extra ordinary network software and hardware with special VoIP mechanism. Packet network depend on many configurable bound: IP and physical addresses of say terminal of routers and firewalls. VoIP networks add specific software, to place and route calls. Many network bound are recognized with passion each time a network part is restart or when a VoIP phone is restart or added to the network.. So many nodes in a VoIP network have dynamically configurable bound; But VoIP systems have much stricter presentation constraint than data networks with important implication for security. [ Takayuki Shizuno 2006]. Quality-of-service issues Quality of service is basic to a VoIP networks process. A VoIP request is much more responsive to delay than its customary data matching part. In the VoIP language, this is the latency problem. Latency turns conventional safety measured. Tools such as encryption and firewall defense can help secure the system, but they also set up important delay. Latency isnt just a QoS issue, but also a safety issue because it increases the system weakness to denial-of-service attacks. To do well in a VoIP network, a DoS attack need not totally shut down the system, but only delay voice packets for a part of a second. The necessary let is even less when latency-producing security devices are slowing down traffic. Another QoS issue jitter, refers to no uniform delays that can cause packets to turn up and be process out of series. The Real-Time Transport Protocol (RTP), which is used to move voice media, so packets received out of order cant be reassembled at the move level, but must be rearrange at the request level, introduce major above your head. When packets turn up in order, high jitter causes them to arrive at their target in spurts. To control jitter, network expensive can use buffers and implement QoS-supporting network elements that let VoIP packets when larger data packets are listed in front of them. The buffer can use one of several plans to resolve when to let go voice data, counting several scheme that adapt the payout time also encompass packet loss. In addition to the usual packet loss issue related with data networks, even VoIP packets that reach their target can be make useless by latency and jitter. [thomas j. walsh and d. richard kuhn ]. Project Background Neural network is the bury order growing fast in current years. It is jointly of a massive deal of easy giving out units of neuron with providing connect as a neural network. It can replicate the information distribution task of human being brain, with huge talent of nonlinear estimate, consecutively storage, large-scale similar development, and self-training lessons. The information distribution in the neural network is recognizing by the communication between the neurons, and the storage of data and in progression as increase physical interconnection of the network parts. [, a. shelestov, v. pasechnik, a. sidorenko, n. kussul , 2006]. A parallel firewall (also called a load-balancing firewall) is a scalable approach for increasing the speed of inspecting network traffic. As seen in figure .the system consists of multiple identical firewalls connected in parallel. Each firewall in the system implements the complete security policy and arriving packets are distributed across the firewalls such that only one firewall processes any given packet. How the load-balancing algorithm distributes packets is vital to the system and typically implemented as a high-speed switch in commercial products. Although parallel firewalls achieve a higher throughput than traditional firewalls and have a redundant design, the performance benefit is only evident under high traffic loads. Furthermore, stateful inspection requires all traffic from a certain connection or exchange to traverse the same firewall, which is difficult to perform at high speeds. This paper introduces a new scalable parallel firewall architecture designed for increasing network speeds and traffic loads. The design consists of multiple firewalls where each firewall implements only a portion of the security policy. Since the policy is divided across the firewalls, rule distribution guidelines are provided that maintains integrity, ensuring the new parallel design and a traditional single firewall always reach the same decision. Unlike the previous parallel design, When a packet arrives to the new architecture it is processed by every firewall in parallel, thus the processing time required per packet is reduced. Simulation results for the new architecture (consisting of four firewalls) yielded a 74% reduction in processing time as compared to other parallel firewall designs. Furthermore, the proposed architecture can provide stateful inspections since a packet is processed by every firewall. Therefore, the new parallel design is a scalable solution that can offer better performance and more capabilities than other designs. In list-based rule symbol, when packets arrive at a firewall, it is in sequence check against the system in the rule list until a match is found or attainment the end of the list. Then, the parallel action is applied to mass or pass the packet. To make the policy complete of match is always found for each packet, the computational difficulty of the sort process depends on the length of rule as the depth of result a matched rule in the rule list. Apply more composite policy can result in major traffic wait which is not only a presentation block in high speed environment but also can make it weaker to rejection of service attacks. Moreover, attractive the filter time is more difficult for multimedia applications that require firm quality of service promise. Although hardware solutions can very much decrease the packet giving out time, they are costly for large policy and improvement hardware may not be suitable in inheritance systems. on the other hand, better data structure for inner policy symbol and better search mechanism have been planned to provide relatively and effective solution to benefit on hand hardware systems. The rules are group to allow multidimensional search by at once eliminate multiple rules with few comparison. While tries have shown great agree in improving the search time, the storage condition and difficulty in maintain try and policy honesty increases as more rules . Moreover, a policy trie does not take into report the traffic personality. In a method for trie sorting is proposed that sustain the policy honesty while reorder rules for unreliable traffic situation. The number of contrast as compare to the original trie. Traffic-aware optimization of list-based firewalls has been addressed in rules are assigned matching probability that depend on the traffic information. Other firewall models have been planned to signify and analyze policy whether for central or distributed firewall architectures with main focus on identify rule conflicts and variance; Wireless local (WLAN) and wireless personal (WPAN) area networks are being used increasingly to implement VoIP forces. The main drives for using these architectures are user mobility. Behind realible real-time repair is one of the major concerns for generally use of VoIP in these wireless IPbased networks and safety is now getting the notice of researchers. The security and efficiency are consisting requirements. [El-Sayed M. El-Alfy and Shokri Z. Selim 2007] Literature Review Introduction: Literature Review is the process of finding information for help on searching for resources on the Internet. Reading intensively in the chosen topic area is essential, but the task can prove daunting if they do not approach it in a systematic way. The continuous number of high-profile Internet security breeches reported in the mass media shows that despite an emphasis on security processes that there is still a gap between theory and practice. Not only is there a need to develop better software engineering processes but also theoretical security improvements need to find their way into real systems. Software design patterns are defined as â€Å"descriptions of communicating objects and classes that are customized to solve a general design problem in a particular context†. As software design patterns have proven their value in the development of production software, they are a promising new approach to help in both the theoretical development and practical implementation of better security processes. First, many/most software developers have only a limited knowledge of security processes and patterns are a proven way to improve their understanding. Second, patterns work against â€Å"reinventing-the-wheel† to promote learning best practices from the larger community to save time, effort, and money with easily accessible and validated examples. Third, code can be reused since the same security patterns arise in many different contexts Investigating existing resources in our area of research will generally cover three areas: Exploratory investigations, as part of the development and evaluation of possible topics in an area Investigation is some depth, sufficient to support a formal research and dissertation proposal Complete research that is described in the literature / research section of the dissertation. [from Writing the Doctoral Dissertation, To Author names] 2. Related Research Work Available: Wireless local (WLAN) and wireless personal (WPAN) area networks are being used progressively to implement VoIP services. The main motivation for using these architectures are user mobility, setup flexibility, increasing transmission rate and low costs, despite this convergence depends on the answers of several technical problems Supporting reliable real-time service is one of the major concerns for widely deployment of VoIP in these ireless IPbased networks and security is now receiving the attention of researchers. The problem of offering security to WLAN and WPAN is that security does not come for free and, security and efficiency are conflicting requirements. The introduction of a security mechanism such as the IPSec encryption-engine to overcome these issues impacts directly in the speech quality of established calls and in the channel capacity. Moreover, largely deployed radio technology standards as IEEE 802.11 and Bluetooth used to achieve wireless connectivity have several constraints when delivering real-time traffic, as transmission errors at the channel, introducing delay and loss which with security mechanisms impact can lead to low quality VoIP calls. Although these technologies offer some security mechanisms, they have some flaws which need to be addressed by an additional level of security. In this paper we focus on the IPSec protocol to achieve the data secrecy due to its widely deployment and implementation of many encryption algorithms. During final decades information technology founded on the computer networks take part in an essential role in different areas of human being action. Troubles of huge importance are assigned on them, such as maintenance, communication and mechanization of information processing. The safety level of processed information is able to differ from private and viable to military and state secret. Herewith the destruction of the information secrecy, reliability and accessibility may cause the spoil to its proprietor and contain important unattractive consequences. Hence the trouble of information safety is concerned. Many associations and companies expand safety facilities that need important aids. In additional, the impracticality of creating wholly protected system is a recognized fact – it will always hold faults and  «gaps » in its understanding. To guard computer systems such familiarized mechanisms as classification and verification, methodologies of the delimitation and limit of the access to data and cryptographic techniques are applied. But they hold following drawbacks: †¢ Disclosure from interior users with spiteful purpose; †¢ Complexity in access separation caused by data sources globalization, which cleans away difference between personal and foreign topics of the system; †¢ Diminution of efficiency and communication complexity by reason of methods for access control to the sources, for occasion, in e-commerce; †¢ Effortlessness of passwords description by crating arrangements of simple users relations. Hence classification and audit systems are utilized beside with these methods. between them are interruption. Intrusion Detection Systems (IDS). IDS are generally separated to systems detecting previously identified attacks (mishandling exposure systems) and variance exposure systems registering the life cycle differences of the computer system from its usual (distinctive) action. Besides, IDS are divided to network-based and host-based category by data source. Network-based IDS examine network dataflow, caring its members, almost not moving the output of their work. Network-based systems do not utilize data about progression from divide workstation. A firewall is a mixture of hardware and software used to put into practice a security policy leading the flow of network traffic between two or more networks. In its simplest form, a firewall acts as a safety barrier to control traffic and manage links between internal and external network hosts. The actual means by which this is able varies and ranges from packet sort and proxy service to stateful examination methods. A more difficult firewall may hide the topology of the network it is employed to keep, Firewalls have recognized to be useful in trade with a large number of pressure that create from outer a network. They are becoming ever-present and necessary to the action of the network. The constant growth of the Internet, coupled with the increasing difficulty of attacks, however, is placing further stress and difficulty on firewalls design and management. . [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Furthermore, the need to deal with large set of varied safety policy and rules impose additional load on firewalls, thus depiction the presentation of the firewall highly serious to enforce the network safety policy. In this context, the defense that a firewall provides only the policies it is configured to execute, but evenly importantly the speed at which it enforces these policy. Under attack or deep load, firewalls can simply become a bottleneck. As the network size, bandwidth, and giving out power of networked hosts carry on increasing, there is a high demand for optimizing firewall operation for improved performance. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Multi-dimensional firewall research group of people to focus on mounting various optimizations to make firewalls more resourceful and steady. In spite of significant progress in the design of firewalls, the techniques for firewall optimization remains static and fail to get used to to the always varying dynamics of the network. This is frequently due to their failure to take into account the traffic individuality by the firewall, such as source and purpose, service requests and the resultant action taken by the firewall in reply to these requests. Moreover, current firewall designs do not support adaptive difference discovery and counter measure device. As a result, they run the risk to become unbalanced under attack. The object of this paper is to address the above failing and develop a sound and effective toolset to hasten firewall operation and adapt its performance to the dynamically altering network traffic individuality. Achieve this goal, however is tough, as the number of policy and safety rules a firewall has to enforce for enterprise network. In addition, there is a need for preserve high policy addition. This is further compounded by the limited resources of firewalls relation to the increased ability of the network to process and forward traffic at very high speed. [ Subrata Acharya, Jia Wang, Albert Greenberg 2006] Methodolgy Network Firewall Parallelization Firewall parallelization is a scalable move toward for attaining the speed of system traffic assessment [Carsten Benecke,1999] necessary for improved network paces and traffic loads. In this section data parallel [Carsten Benecke,1999] and function parallel designs [Errin W. Fulp,2002] for parallel firewalls are explained. Similar to their distributed computing descriptions necessitate, data parallel partition the information set across the array of firewalls, while function parallel distributes the work set across the array of firewalls. The data parallel technique is a scalable substitute to a single firewall that permits for better throughput potentials. Function parallel techniques can diminish the dispensation time necessary on any firewall node yielding enhanced presentation. In addition, unlike data parallel designs, the proposed function parallel architecture can offer stateful assessments. This proposal shows that function parallel designs are scalable solution that can offer better performance and more facilities than other designs. Parallel Firewall Architecture: Function Parallel Firewall [W. Fulp and Ryan J] consists of multiple firewalls coupled in parallel and a gatedevice, as shown in figure. Every firewall in the system outfits a local strategy, where incoming packets are disseminated across the firewalls for processing (one packet is sent to one firewall), permitting different packets to be processed in parallel. Because every packet is processed by the policy, reliability is maintained. The common operation of the scheme can be described as follows. When a packet reaches to the function-parallel system it is promoted to all the firewall and the gate. Each firewall processes the packet with its local policy, as well as any state information. The firewall then signals the gate representing either no match was found, or offers the rule number and action if a match was found. As local policies are a division of the original, a no-matchis a suitable answer and is necessary for the function-parallel design. The gate stores the outcomes and establishes the final action to achieve on the packet using the Firewall rule. Parallel Firewall System Components A function parallel system consists of a collection of firewall nodes. Packets are replicated to all firewall nodes as they go into the system. Policies must be disseminated across the system such that they specify an accept set identical to the original accept set and no local policys accept set can overlap another local policys accept set. The received packets are then combined into one stream to arrive at the destination. A control plane is also essential to permit common system management. Firewall Nodes The firewall nodes contain a network interface card for every network input and control plane. This design implements the firewall nodes as PCs running the Linux operating system with a kernel that supports iptables. It must be stated that iptables was selected for an profitable feature of provisional rule dispensation. By default there are built-in sets of policies called chains divided by whether they hold traffic bound for procedures pay attention on local input devices, proposed for routing throughout the system to another network or outbound and supplied from a local procedure. In addition iptables has support for user defined chains. The user defined chains can be called if a packet matches a rule in a sequence. Packet Duplicator Packet Duplicator is essential on all links which will input traffic into the system. In Ethernet networks packet duplication is easily achieved with a network hub because any packets arriving on a hub port are copied to all other hub ports. But, in high speed networks hub technology is not presented. The only available devices in high speed networks to attain duplication are network taps. These devices are used for duplicating network traffic, usually used in intrusion detection systems that necessitate network monitoring. Control Plane In a single firewall system, protected customer communication can be offered through the prerequisite of physical existence. To generate a protected technique of management, communication to the collection of firewall nodes can be quarantined on a separate control plane. In the simplest form this entails a separate subnet which all firewall nodes survive on. Component Integration Joining these components into a functional design can be cut down into two network representations. The first utilizes simply one packet duplicator and can simply offer protection for traffic from one source. The second topology allows two networks to communicate bi-directionally through the system. One-Directional System This technique only thinks about packets traveling in one direction; for example, only packets are moving from source to destination. The collection of firewall nodes use the same IP address and MAC address and all will take the incoming network interface card in immoral mode. All but one firewall node will allow existing networking equipment outside of the system to cooperate with no alterations. The firewall node which does respond to user requirements can also be permitted to respond to ICMP ping requests in order to formulate the system additional compatible. For the outgoing network interface cards, any IP or MAC can be used as long as it permits communication with the destination. Bi-directional System The Bi-directional system considers packets moving in both directions; for example, packets traveling from source to destination and then back to source. Set