Sunday, March 31, 2019
Voice over Internet Protocol (VoIP) Technology
Voice oer  net  communication theory  communications communications communications communications protocol (VoIP) Technology plumeVoice oer  net profit  protocol (VoIP)  applied science which attract  unembellished attention and awargonness to the world wide  line of work. IP tele c  whole tolds  frame  go  surface affect the s  closing curtaininging  sh ar    acquire in the form of  softwargon  dodge    all over the IP vane in the VoIP  c everyplaces. Now a old age  some(prenominal) industries  im cleave  role the VoIP technologies to   assay the  gage. In this project, I  standd a variety of VoIP safety  bullying and probable approach to handle the  disincentive in VoIP  exertion.VoIP is naturally susceptible to  meshs attack,  exchangeable hateful codes (i.e., worms, vir practice  school terms, Trojans), denial-of- do (DoS), distri preciselyed DoS (DDoS), pharming, and (though non malicious)  ignitor were crowded. These attacks also spoil grimy  organisation by  everywhereriding a   ssets, distracting  legal  consumptionr, compromise private in changeions, or by demeaning code and records. This   grab affect the contaminated  schema, it also destroy the unaffected (or  til now non-vulnerable)  singles.  in all  form associated to the  profits   atomic  itemise 18 responsive to hateful code which  sieve to contaminate as  practi annunciatey as hosts is probable,  try  overcrowding on the   interlocking  communication theory.The QoS which is  stomach to the end  accustomr is of  heightsest signifi messce and it is the  chief(prenominal)  sequel to  hold the VoIP  frame, since if the exchange is indecipherable   and so(prenominal) there is no position in giving the  proceeds. The major  broker which distresses the superiority of  function is Latency, Jitter and Packet loss.CHAPTER-11.0  inventionThe  illustration enterprises continuously providing  portion conversation  run on over broad band by discovering the current market  come ins and  interlock issues from     recent 20 years, the  juncture transition  pains underg atomic  arrive 53 various  protective cover and  net issues to produce better  role voice  return to transit on over broad band. The current voice market has been step up into the  y step to the forehful  take aim of voice   communications protocols for providing VoIP  go during  pitiful bandwidth,  gritty level of selective in changeion and voice   g mootal provisions.The VOIP technologies allow sharing the re starting  clip of  sick of(p) for supporting  info and voice for saving the cost for transmission  knead 1. The VoIP  succeeds  umteen advantages to the enterprises, the migration of voice and tele ear shout out application form TDM switch ne iirk to IP  big money switched ne devilrk provides many advantages to enterprises during the migration of voice into IP application the enterprises  gather up to provide   tri savee de transgressment to the  entropy applications 2.However the enterprises  convey to  make the  protec   tive cover issues and employee  youthful techniques to protect against attacks.  protective cover and QoS is a  primary(prenominal)  view of VOIP system, the selective information on voice  nets  grow been attacked by viruses, worms, DOS attacks and  an  develop(prenominal) unknown authentication users 3. The VOIP architecture is a  established  engagement  ranked structure which is compound with many of the  webing devices, the design structure  m separate to  meet that whether the components  pass on cope the unwanted attacks. The protocol structure in a VOIP system is a to a greater extent sensible   compute  repayable to the  measly ambitious. Here we introduce the attacks on over VoIP system.VOIP OverviewVoIP stands for Voice over  lucre  protocol which is the  in the first place used in the transmission of voice communications  through and through with(predicate) IP   make it  wish well internet, public switched  interlockings 4. The concept of VoIP  mainly targets of the tran   smission of voice based messages and applications by  employ  contrasting protocols and is  hereditary via the internet.The basic steps involved in the transmission of voice signals through the internet   ar Conversion of voice to  elongate and digital signal.  crunch and conversion of the signal into Internet Protocol Packets to broadcast over Internet.VoIP systems  wear  contrary  session control protocols for commanding over the set-up, tear- rase of  confabulates and also unlike  sound recording codecs which allow for encoding the voice signal and allow the transmission. These   speech sound recording codecs whitethorn vary form system to system where some of them  ar based on the narrow band and some on the  pixilated speech where some   varied system  may use  naughty fidelity  auditory sensation codecs.Technologies used to  weapon VoIP H.323 12 IP Mul durationdia Subsystem (IMS)  academic term initiation Protocol ( imbibe) 5 Real- eon Transport Protocol (RTP) 51.1 Problem  co   mmentaryIn the  ult  days the VoIP  certification is a not a big concern the  throng were mainly concerned with the functionalities, cost and the usage,  tho the VOIP communication trend has been encouraged the VOIP communication system widely  original by the  great deal  collect to the    nobleschool school acceptance of VOIP system the  credentials issues  atomic number 18 main concern.However the VoIP  serve argon rapidly  maturation in the current voice communication system, many unauthenticated users and hackers  ar thievery the VoIP  work and hacking the  go from the  portion providers and re routing to their  in the flesh(predicate) usage.  just  al intimately of the  pledge  streamers  atomic number 18 not credential they only supports to authentication over   re scrubs,  provided the  difficulty with the service theft.The certificate concerns  give affect on  note of the system, due to the  hostage tools and  credentials solutions will conflict on  property of service. The    system will accept the   credentials measure tools those tools shouldnt decrease the  woodland. The basic issue of the  lineament is firewall. The firewall will blocks the  crys for   protective cover system constrains it will not  outgrowth the  planetary house which   ar allocated to the UDP ports. Due to the  trade protection issues on VoIP devices will consumes  trim magazine for packet delivery and which consumes extra time during the  roar so it may  hold out the packet delivery, due to the encryption and decryption  weapon will conflict the call time.1.2 Objectives of the studyThe basic objective of this is to detect  credit of attacked packet on over  lucre To formally  specialize the ne  dickensrk  protective cover  lines and unauthorized  inlet incidents To  rig the  roughly accredited    earnest department measure techniques and  gage methods To evaluate the prototype system and packet feature  mechanism Email and other internet message  argon easily  structured with the    voice applications To support the multimedia applications, which provides  little cost effective service for video  meeting, gaming To supports a low cost, flat rate  determine on the voice communication over the humankind Internet and Intranet  go. Sends the call  signalise messages over the IP-based data Network with a suitable  feel of service and  frequently superior cost benefit.  familiarise offline message  firing  amid the users by selecting a user from predefined offline user list  precede textual communication1.3 Research Method Provide authentication to the end users for  chafeing the VoIP  function Design secure VoIP  build system Attempt to  violate VoIP traffic from normal data traffic  employ either VLANs or a  firely separate physical network. Enable authentication on sip  papers.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets.1.4 SCOPEThese researches analyze the  earnest and  motion issues, it has to res   earch on unlike  tribute levels and represent various security challenges to modern VoIP system. This research  invoke security methods by analyzing the modern security challenges To present various security methods this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for  die harding better  carrying out Balance VoIP security and performance by measuring the  work and network traffic To present VoIP protocols for secure data transmission1,5 Thesis OrganizationChatper-1  understructure General Introduction of VoIP,  fuss definition and Research methodsChapter -2 Literature Review Review of VoIP deployment and review of security issues and performance and VoIP security background and security challengesChapter -3 Security process VoIP security process, managing of VoIP security and security process and define the security solutionsChapter -4 VOIP security and performance Demonstrate VoIP performance , balancing of s   ecurity and performance of VoIPChapter -5 Analysis  cover up security and performance analysis and investigation reports of VoIP security and performance and complete project report scenarioChapter -6 Conclusion, Future Enhancement, References and Appendices.CHAPTER -22.0 LITERATURE REVIEWBackgroundVoIP is a IP  telephony which is used to deliver a voice on over internet which stands for Voice over Internet Protocol which  alters a voice signals to digital voice packets and transmit these packets on over network for transmitting which uses Internet protocol for coordinating voice packets. VoIP  put up be deployed in dissimilar kind of IP enabled network like Internet,  piano tuner networks, Ethernet.VoIP is a telephony system which takes voice as a  additive signals and which  shifts it into digital format and transmit on over network by  apply Intern protocol.VoIP service TypesVoIP provides  incompatible types of voice service  concord to the communication media infrastructure the    most common services are as follows Computer to computer based services PC to  yell and  call off to PC based services Phone to  call up based VoIP services 6Computer to computerA voice exchange in  in the midst of system to system is one type of communication provides free VoIPs services which it requires related software applications    much(prenominal)(prenominal) as g colloquy8, skype7, messengers. In this services the users   admit to install  uniform softwares in their respective PCs and exchange their voices  said(prenominal) as Peer to Peer services.PC to  prognosticate and phone to PCIt is a combination of Internet and circuit switched  name system. The VoIP application software receives the voice and hand over to the Internet protocol to  channel on over  call back network. VoIP services provide a services to  draw with phone s by establishing VoIP network an applications  much(prenominal) as Skype, messengers are  egest to the phones by converting respective receiving and    transmitting formats.In the Phone to PC services the user  evict  beam from phones to PCs user  faecal matter dial to PCs by calling like normal phones in this services the PC IP address contains a phone number. The user  stern dial from phone to assigned PC IP address phone number Skype is a  opera hat example for this kind of services, which allows users to purchase a VoIP services to  go by from phone to PC 7.The most common devices in these services are VoIP service providers Modem Internet services ATA Analog Terminal Adaptor, this convert  latitudeue signals to voice signals  voice signals to analogs singlesPhone to phone based VoIP services 6 Now a days this type of services are  apply in long  standoffishness calls many communication service provide companies  extending long  outstrip calls in very abnormal  outlay by utilizing the PSTN services.VoIP SystemA Fig- 1 shows a typical VoIP network topology which is a combination of given equipments the following equipments are1   )  ostiary2) VoIP Gate focal point3) VoIP Clients porter A VoIP gatekeeper is a routing manager and  aboriginal manager in a H 323 IP telephony surroundings. This is an  selection in a VoIP system which manages end points of a sector. VoIP gatekeeper is  utilizable for managing calls, terminals and gate ship port. VoIP gatekeeper presents access control, bandwidth control and address translation.VoIP gatewayThe VoIP entry convert a voice calls into genuine instant in  in the midst of  everyday switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression signal controlling, packetization and call routing.VoIP clients This equipment represents phones, multimedia PCs2.1 Security Issues.VoIP Phishing  How To pr hithertot VoIP Phishing and avoided acquiring TrappedYou  cease do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim.What is VoIP Phishing    and hoe it workVoIP Phishing is a type of assault that lures the user into given  ain data like phone number, credit card  be, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker.Security thread in VoIP go VoIP has become a one of the  customary communication technologies, VoIP user face a serious of security  wander lets  wait this security issues.FirewallA firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worth little passage from the  out-of-door to the inside of the networks and so on.Over look securityYou must not look at only at the light side of VoIP.  plot of ground it is revolutionizing voice and data communication, it does not symbolize some  hassleatic security issues that  make that  collect to be deal with accurately.Quality of Service Issues (Qos)Qos 9 is a basic process of VoIP if it delivers a good quality of services to the users which are  m   ore advantage to the users for saving money rather than spending much money on other communication services. The Quality is an importance  pointor for VoIP services providers industries. In Certain level the security issues implementation  sack degrade the QoS. The security procedures  much(prenominal) as firewalls and encryption techniques block the calls and  survive the packet delivery.The main QoS issues are Latency Jitter Packet loss Bandwidth  riddleLatencyLatency represents a delivery time for voice transmission from  pedigree to destination. The ITU-T advice that G.114 10 establish a many time of constraints on  unidirectional  rotational  response time .To   admit Quality of Service the VoIP calls must be  progress to in a limited bound time.The basic issues in latency are Time spent on routers and long network distance Security measures Voice data encoding Queuing Packetization Composition and decomposition  decodeJitterThe non-uniform packets make a packet delivery delay    which it is  springd by  inferior bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level.Packet LossThe packet loss increase the latency and jitter where  conclave of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network due to the low bandwidth and high traffic which delays the packet delivery.BandwidthThe low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network  subscribe to to distribute into various  knobs the data  seduce to transmit from one  inspissation to another node during this transmission if it encounter any occupation which it  grass delays the packet.The entire network design includes routers, firewall and other security measures. Certain ti   me in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users.2.2 VoIP protocolsThere are  meter and  rime of network that  rear be working in organize to  put  front for VoIP communiqu service .In this part we will center no which the general to the  lift out part of device deploy.Almost each machine in the  humankind use a  exemplarization called real time protocol (RTP) for transmit of   audio recording and video packet  amidst the networks. IETF is the founder of RPT. The consignment layout of  poetry CODE are define in RFC 3551 (The section RTP profiles and pay  fill format specification of RCF. These sections address items.). Though pay  tear format section are define in document also  make by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with issue like packets order and give mechanism to help the address wait.The H.323 7 standard uses the Internet Engineering Task Force (IETF   ) RTP protocol to transport media between endpoints. Because of this, H.323 has the  comparable issues as sip when dealing with network topologies involving NAT. The easiest method is to simply  frontwards the appropriate ports through your NAT device to the internal client. To receive calls, you will  ceaselessly  call for to forward TCP port 1720 to the client. In addition, you will  get hold of to forward the UDP ports for the RTP media and RTCP con-trol streams ( enamor the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients  merchantman the NAT device, you will need to use a gate-keeper  ravel in  substitute mode. The gatekeeper will require an interface attached to the private IP subnet and the public Internet. Your H.323 client on the private IP subnet will then  recital to the gatekeepe   r, which will  placeholder calls on the clients behalf. Note that any  impertinent clients that wish to call you will also be required to  history with the proxy server. At this time, Asterisk  lay somet act as an H.323 gatekeeper. Youll have to use a separate application, such as the  bluff  character reference OpenH323 GatekeeperH.323 and sip Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.32312 enjoy the first commercial success due to this fact those who are working on the protocol in ITU12 worked quickly to  supply the first standard in the year 1996.While support of the two protocols on a single gateway is critical, another integral part of  ternary-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and  fate routing capabilities. One method that was introduced to support time-to-market requirements uses routing   interaction between    a  lake herring SIP Proxy Server and an H.323 gatekeeper.The  communication channel model for some carriers using the cisco Global Long  distance Solution is to provide origination and  resultant role of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings.Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to handshake with an H.323 gatekeeper using the H.323 reticular activating system protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using reticular activating system  mess request,  locating confirmation, and location  egest messages and responses, a Cis   co SIP Proxy Server can obtain optimized routing information from VoIP gate shipway that have been deployed in the service providers network.The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining  ticker H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services.  most principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces,  dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is    important that there are no performance limitations related to the call mix between SIP and H.323 calls, and that there is no  prodigious  divagation in calls-per-second measurements compared to a homogeneous SIP or H.323 network.Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS  package Release 12.2(2)XB.  to a higher place illustrates packet voice architectures for wholesale call transport and 2 illustrates  boundary services for application service providers (ASPs) where SIP and H.323 are used  concurrently for signaling.Reasons for VoIP DeploymentWhen you are using PSTN line, you typically pay for time used to a PSTN line manager company more time you stay at phone and more youll pay. In addition you couldnt  slop with other that one person at a time.In opposite with VoIP mechanism you can talk all the time with every person you want (the  postulate is that other person is also connected to Internet at the  alike(p) time), as far as y   ou want (money independent) and, in addition, you can talk with many people at the same time.If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos.There are two main reasons to use VoIP lower cost than  handed- rectify landline telephone and  assorted value-added services.Low Cost  Higher multimedia application conventional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as voicemail and the additional lines are the part of perpetual  calendar method of upgrades and modifications that make telephony support a very profitable business. The   methodology use to implement PSTN business phone system is well  dumb and the  pains is very mature. Hence company can make a purchase with the confidence that if they are inst   alling a traditional system it will function and include an excellent supported infrastructure.IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the  norm lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the  sight of telephone manufacture going out of business or the engineering simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into  narration in well informed decision.Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade  conclave as opposed to a single entity. In VoIP space a good example is session Ini   tiation Protocols, SIP. SIP is supported by the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX.Hidden cost can be  literal in any technology deployment. The downtime experienced with buggy or  badly implemented technology, in addition to the cost of qualified consultants to remedy such asChallenges of VoIPThough VoIP is becoming more and more popular, there are still some  gainsay problems with VoIPBandwidth Network which available is an important  foreboding in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the   approachability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network    overcrowding occur, packets need to be queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to  suss out VoIP quality. Because data and voice  dowery the same network bandwidth in a VOIP system, the necessary bandwidth condition and  storage  allotment become more complex. In a LAN surroundings, switches usually  raceway at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN.Power Failure and Backup Systems  traditionalistic telephones work on 48 volts which is supplied by the telephone line itself without  out-of-door power supply. Thus, traditional telephones can still continue to work even when a power  bring outdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to  inhibit power failure, 14   Security As VoIP becomes too popular, the issues related to VoIP network are also very progressively and more arising 15. W. Chou 16 has investigation the different security of VoIP investigation the different and also given some  nonmandatory strategies for these issues. In reference 17, the authors also outline the challenges of securing VoIP, and provide guidelines for  chartering VoIP technology.Soft phone Soft phones are installed on system thus should not be used where the security is an  fretting. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not  rude the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities.Emergency calls Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily  class callers locality to    the emergency send out office. But dissimilar traditional telephone lines, VoIP technology allows an exacting number could be from anywhere this  do emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings.Physical security The most  noteworthy issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are  requisite to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept.Wireless Security  federation in  piano tu   ner network nodes were  combine with VoIP network which receives more and more popular and  judge 18. The  radiocommunication networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be  cinched with public available software. This is the major project in  tuner network for example the more common and popular WiFi  defend Access (WPF and WPA 20) which administrated by Wi-Fi  eitheriance are providing more significant security in improvement, the WPA  protect is also integrated with wireless technology in VoIP.CHAPTER -3Related Work3.0 Security StudiesVoice of Internet Protocol is the  future(a) generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity.  all(prenominal) these benefits come at a  outlay, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures be   yond the standard security that is typically implement for a computer network. Many issues need to be addressed such as type of attacks, security, quality of service and VoIP protocols.Voice over IP (VoIP) is a one of the most  dispute technology in todays market. The importance of VoIP is rapidly development, many vendors introducing VoIP services with  modern technologies for improving quality of services and security. In this chapter I am discussing about security models and security process.3.1 VoIP Security ProcessThere are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls.Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data  stream invokes at many stages. The    most common VoIP vulnerabilities are as follows  packet Related Device related Protocol related System  chassis related Application level attacks3.1.2  software system Related VulnerabilitiesThe basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations 19.  software program application interfaces, software application logic Software applications Application interfaces3.1.3 Device Related VulnerabilitiesOne of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the  legal competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to   regularly updates the device.The most common hardware devices in VoIP are PCs Telephone adaptors Mode   ms VoIP phones3.1.4 Protocol VulnerabilityThe main protocols in VoIP are H.323 12 and SIP ( seance initiation protocol), these two protocols are commonly used in VoIP hardware system 19. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls.H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National  bestow of Standards and Technology 2005). There are four types of devices under H.324 terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided group discussion call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the  real-time Transport Protocol transport all da   ta. H.225 handles registration, admissions  status, and call signaling. H.235 also handles all security and has four different schemes call Annexes. H.323 is a complicated protocol.SIP Vulnerabilities OverviewThe below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the pVoice over Internet Protocol (VoIP) TechnologyVoice over Internet Protocol (VoIP) Technology digestVoice over Internet Protocol (VoIP) technology which attract extra attention and awareness to the world wide business. IP telephonys system will affect the sending voice transmission in the form of packet over the IP network in the VoIP applications. Now a days many industries will use the VoIP technologies to provide the Security. In this project, I provided a variety of VoIP safety intimidation and probable approach to handle the intimidation in VoIP application.VoIP is naturally susceptible to networks attack, like hateful codes (i.e., worms, viruses, Trojans), den   ial-of-service (DoS), distributed DoS (DDoS), pharming, and (though non malicious)  glistering were crowded. These attacks also spoil grimy system by overriding assets, distracting  sensible user, compromise private informations, or by demeaning code and records. This break affect the contaminated system, it also destroy the unaffected (or even non-vulnerable) ones. all(a) system associated to the Internet are responsive to hateful code which try to contaminate as much as hosts is probable, cause overcrowding on the network communications.The QoS which is provide to the end user is of highest significance and it is the main issue to implement the VoIP system, since if the exchange is indecipherable then there is no position in giving the service. The major factor which distresses the superiority of services is Latency, Jitter and Packet loss.CHAPTER-11.0 IntroductionThe voice enterprises continuously providing voice conversation services on over broad band by discovering the current    market issues and network issues from past 20 years, the voice transition industry undergone various security and network issues to produce better quality voice service to transit on over broad band. The current voice market has been step up into the new level of voice protocols for providing VoIP services during low bandwidth, high level of data and voice transmission provisions.The VOIP technologies allow sharing the resource of  disgusted for supporting data and voice for saving the cost for transmission process 1. The VoIP provides many advantages to the enterprises, the migration of voice and telephone application form TDM switch network to IP packet switched network provides many advantages to enterprises during the migration of voice into IP application the enterprises need to provide security to the data applications 2.However the enterprises need to  chance on the security issues and employee new techniques to protect against attacks. Security and QoS is a main  fit of VOI   P system, the data on voice networks have been attacked by viruses, worms, DOS attacks and other unknown authentication users 3. The VOIP architecture is a complete network  vertical structure which is compound with many of the networking devices, the design structure have to ensure that whether the components will cope the unwanted attacks. The protocol structure in a VOIP system is a more sensible factor due to the  light ambitious. Here we introduce the attacks on over VoIP system.VOIP OverviewVoIP stands for Voice over Internet Protocol which is the mainly used in the transmission of voice communications through IP network like internet, public switched networks 4. The concept of VoIP mainly targets of the transmission of voice based messages and applications by using different protocols and is  ancestral via the internet.The basic steps involved in the transmission of voice signals through the internet are Conversion of voice to analog and digital signal.  conglutination and co   nversion of the signal into Internet Protocol Packets to broadcast over Internet.VoIP systems adopt different session control protocols for commanding over the set-up, tear-down of calls and also different audio codecs which allow for encoding the voice signal and allow the transmission. These audio codecs may vary form system to system where some of them are based on the narrow band and some on the  cockeyed speech where some other system may use high fidelity audio codecs.Technologies used to implement VoIP H.323 12 IP Multimedia Subsystem (IMS) Session initiation Protocol (SIP) 5 Real-time Transport Protocol (RTP) 51.1 Problem  commentaryIn the past days the VoIP security is a not a big concern the people were mainly concerned with the functionalities, cost and the usage, but the VOIP communication trend has been encouraged the VOIP communication system widely accepted by the people due to the high acceptance of VOIP system the security issues are main concern.However the VoIP se   rvices are rapidly growing in the current voice communication system, many unauthenticated users and hackers are  stealth the VoIP services and hacking the services from the service providers and re routing to their personal usage. Some of the security standards are not credential they only supports to authentication over calls, but the problem with the service theft.The security concerns will affect on quality of the system, due to the security tools and security solutions will conflict on quality of service. The system will accept the security tools those tools shouldnt decrease the quality. The basic issue of the quality is firewall. The firewall will blocks the calls for security constrains it will not process the signaling which are allocated to the UDP ports. Due to the security issues on VoIP devices will consumes extra time for packet delivery and which consumes extra time during the call so it may delay the packet delivery, due to the encryption and decryption mechanism wil   l conflict the call time.1.2 Objectives of the studyThe basic objective of this is to detect source of attacked packet on over network To formally define the network security problems and unauthorized access incidents To define the most accredited security techniques and security methods To evaluate the prototype system and packet feature mechanism Email and other internet message are easily integrated with the voice applications To support the multimedia applications, which provides less cost effective services for video conference, gaming To supports a low cost, flat rate price on the voice communication over thePublic Internet and Intranet services. Sends the call signaling messages over the IP-based data Network with a suitable quality of service and much superior cost benefit. Present offline message  short-lived between the users by selecting a user from predefined offline user list Present textual communication1.3 Research Method Provide authentication to the end users for ac   cessing the VoIP services Design secure VoIP Configuration system Attempt to separate VoIP traffic from normal data traffic using either VLANs or a completely separate physical network. Enable authentication on SIP accounts.Internal Firewalls/ACLs should be cond to block telnet and http traffic from reaching voice VLANs or subnets.1.4 SCOPEThese researches analyze the security and performance issues, it has to research on different security levels and represent various security challenges to modern VoIP system. This research  erect security methods by analyzing the modern security challenges To present various security methods this security methods are explained in chapter -3 to analyze and investigate the security threats and define the solution for obtaining better performance Balance VoIP security and performance by measuring the services and network traffic To present VoIP protocols for secure data transmission1,5 Thesis OrganizationChatper-1 Introduction General Introduction of    VoIP, problem definition and Research methodsChapter -2 Literature Review Review of VoIP deployment and review of security issues and performance and VoIP security background and security challengesChapter -3 Security process VoIP security process, managing of VoIP security and security process and define the security solutionsChapter -4 VOIP security and performance Demonstrate VoIP performance , balancing of security and performance of VoIPChapter -5 Analysis  overlay security and performance analysis and investigation reports of VoIP security and performance and complete project report scenarioChapter -6 Conclusion, Future Enhancement, References and Appendices.CHAPTER -22.0 LITERATURE REVIEWBackgroundVoIP is a IP telephony which is used to deliver a voice on over internet which stands for Voice over Internet Protocol which converts a voice signals to digital voice packets and transmit these packets on over network for transmitting which uses Internet protocol for coordinating v   oice packets. VoIP can be deployed in dissimilar kind of IP enabled network like Internet, wireless networks, Ethernet.VoIP is a telephony system which takes voice as a analog signals and which converts it into digital format and transmit on over network by using Intern protocol.VoIP service TypesVoIP provides different types of voice service  match to the communication media infrastructure the most common services are as follows Computer to computer based services PC to phone and phone to PC based services Phone to phone based VoIP services 6Computer to computerA voice exchange in between system to system is one type of communication provides free VoIPs services which it requires related software applications such as gtalk8, skype7, messengers. In this services the users need to install same softwares in their respective PCs and exchange their voices same as Peer to Peer services.PC to phone and phone to PCIt is a combination of Internet and circuit switched telephone system. The V   oIP application software receives the voice and hand over to the Internet protocol to communicate on over telephone network. VoIP services provide a services to communicate with phone s by establishing VoIP network an applications such as Skype, messengers are communicate to the phones by converting respective receiving and transmitting formats.In the Phone to PC services the user can communicate from phones to PCs user can dial to PCs by calling like normal phones in this services the PC IP address contains a phone number. The user can dial from phone to assigned PC IP address phone number Skype is a best example for this kind of services, which allows users to purchase a VoIP services to communicate from phone to PC 7.The most common devices in these services are VoIP service providers Modem Internet services ATA Analog Terminal Adaptor, this convert analog signals to voice signals  voice signals to analogs singlesPhone to phone based VoIP services 6 Now a days this type of servic   es are using in long distance calls many communication service provide companies offering long distance calls in very abnormal price by utilizing the PSTN services.VoIP SystemA Fig- 1 shows a typical VoIP network topology which is a combination of given equipments the following equipments are1) Gatekeeper2) VoIP Gateway3) VoIP ClientsGatekeeper A VoIP gatekeeper is a routing manager and  fundamental manager in a H 323 IP telephony surroundings. This is an  resource in a VoIP system which manages end points of a sector. VoIP gatekeeper is  expedient for managing calls, terminals and gateways. VoIP gatekeeper presents access control, bandwidth control and address translation.VoIP gatewayThe VoIP entry convert a voice calls into genuine instant in between Public switch Telephone Network (PSTN) and IP networks. The basic functionalities of VoIP entry are compression, decompression signal controlling, packetization and call routing.VoIP clients This equipment represents phones, multimedi   a PCs2.1 Security Issues.VoIP Phishing  How To prevent VoIP Phishing and avoided getting TrappedYou can do prevent VoIP Phishing at home and in your corporation and to avoid yourself and your associates from being keen as a Phishing victim.What is VoIP Phishing and hoe it workVoIP Phishing is a type of assault that lures the user into given personal data like phone number, credit card numbers, and password over a web site. Phishing over VoIP is become uncontrolled as VoIP makes Phishing easers for attacker.Security thread in VoIPWhile VoIP has become a one of the  received communication technologies, VoIP user face a serious of security  thread lets see this security issues.FirewallA firewall is software is planned to protect a personal networks from illegal access. Firewalls usually block the worthless passage from the  remote to the inside of the networks and so on.Over look securityYou must not look at only at the light side of VoIP. While it is revolutionizing voice and data com   munication, it does not symbolize some problematic security issues that need that need to be deal with accurately.Quality of Service Issues (Qos)Qos 9 is a basic process of VoIP if it delivers a good quality of services to the users which are more advantage to the users for saving money rather than spending much money on other communication services. The Quality is an importance factor for VoIP services providers industries. In Certain level the security issues implementation can degrade the QoS. The security procedures such as firewalls and encryption techniques block the calls and delay the packet delivery.The main QoS issues are Latency Jitter Packet loss Bandwidth problemLatencyLatency represents a delivery time for voice transmission from source to destination. The ITU-T advice that G.114 10 establish a many time of constraints on one-way latency .To achieve Quality of Service the VoIP calls must be achieve in a limited bound time.The basic issues in latency are Time spent on r   outers and long network distance Security measures Voice data encoding Queuing Packetization Composition and decomposition  decodeJitterThe non-uniform packets make a packet delivery delay which it is caused by  scant(predicate) bandwidth. The packets are in out of sequence order, for transmitting voice media it uses RTP protocol this protocol are based on UDP so that it makes the packet in out of order sequence which degrades the QoS by not resembling the protocols at protocol level.Packet LossThe packet loss increase the latency and jitter where group of packets are arrived late will be discarded and allow new packets. The packet loss is associated with data network due to the low bandwidth and high traffic which delays the packet delivery.BandwidthThe low bandwidth delays a packet delivery which degrades the QoS by increasing the latency and jitter. The data on over network have to distribute into various nodes the data have to transmit from one node to another node during this t   ransmission if it encounter any problem which it can delays the packet.The entire network design includes routers, firewall and other security measures. Certain time in the network path some of the nodes are unavailable at that time it doesnt deliver the packets to an end users.2.2 VoIP protocolsThere are numbers and numbers of network that can be working in organize to offer for VoIP communiqu service .In this part we will center no which the general to the best part of device deploy.Almost each machine in the  orchis use a standardization called real time protocol (RTP) for transmit of audio and video packet between the networks. IETF is the founder of RPT. The consignment layout of numbers CODE are define in RFC 3551 (The section RTP profiles and pay load format specification of RCF. These sections address items.). Though pay load format section are define in document also  print by the ITU (International telecommunication union) and in others IETF RFCs. The RTP mostly deal with    issue like packets order and give mechanism to help the address wait.The H.323 7 standard uses the Internet Engineering Task Force (IETF) RTP protocol to transport media between endpoints. Because of this, H.323 has the same issues as SIP when dealing with network topologies involving NAT. The easiest method is to simply forward the appropriate ports through your NAT device to the internal client. To receive calls, you will  ever need to forward TCP port 1720 to the client. In addition, you will need to forward the UDP ports for the RTP media and RTCP con-trol streams (see the manual for your device for the port range it requires). Older cli-ents, such as MS Netmeeting, will also require TCP ports forwarded for H.245tunneling (again, see your clients manual for the port number range). If you have a number of clients  puke the NAT device, you will need to use a gate-keeper running in proxy mode. The gatekeeper will require an interface attached to the private IP subnet and the public    Internet. Your H.323 client on the private IP subnet will then register to the gatekeeper, which will proxy calls on the clients behalf. Note that any  foreign clients that wish to call you will also be required to register with the proxy server. At this time, Asterisk cant act as an H.323 gatekeeper. Youll have to use a separate application, such as the open source OpenH323 GatekeeperH.323 and SIP Have their origins in 1995 as researchers looked to solve the problem of how to computers can indicate communication in order to exchange audio video files.H.32312 enjoy the first commercial success due to this fact those who are working on the protocol in ITU12 worked quickly to  bring out the first standard in the year 1996.While support of the two protocols on a single gateway is critical, another integral part of dual-protocol deployment is the ability for H.323 gatekeepers and SIP proxies to interwork and share routing capabilities. One method that was introduced to support time-to-   market requirements uses routing interaction between a Cisco SIP Proxy Server and an H.323 gatekeeper.The business model for some carriers using the Cisco Global Long  keep Solution is to provide origination and termination of voice-over-IP (VoIP) minutes for several other service providers. This business model has been very successful with deployment of H.323-based services, but these Cisco customers would also like to attract additional SIP-based service providers. Ideally, these customers would like to use their existing voice-gateway infrastructure to support additional SIP-based offerings.Cisco has provided these carriers with a way to add new SIP services by adding capabilities to the Cisco SIP Proxy Server to allow it to handshake with an H.323 gatekeeper using the H.323 RAS protocol. By enabling a SIP proxy server to communicate with an H.323 gatekeeper using RAS location request, location confirmation, and location  preclude messages and responses, a Cisco SIP Proxy Server    can obtain optimized routing information from VoIP gateways that have been deployed in the service providers network.The Cisco architecture allows for protocol exibility and enables, one call-by-call basis, use of a particular session protocol. This exibility allows customers to deploy SIP networks on proven packet telephony infrastructures, while still maintaining  upshot H.323 functionality within their networks. With the ability to support the connection of customers and carriers using either rotocol, service providers can offer a variety of application hosting and sharing services, and be more aggressive in pursuing wholesale opportunities via new services. Some principles for coexistence that are critical for successful multiprotocol deployments are transport capabilities across time-division multiplexing (TDM) interfaces, dual tone multifrequency (DTMF) processing capabilities and fax relay support. In deployments where both protocols are used, it is important that there are n   o performance limitations related to the call mix between SIP and H.323 calls, and that there is no significant  digression in calls-per-second measurements compared to a homogeneous SIP or H.323 network.Cisco gateways provide support for coexistence of SIP and H.323 calls beginning with Cisco IOS Software Release 12.2(2)XB.  to a higher place illustrates packet voice architectures for wholesale call transport and 2 illustrates termination services for application service providers (ASPs) where SIP and H.323 are used  concurrently for signaling.Reasons for VoIP DeploymentWhen you are using PSTN line, you typically pay for time used to a PSTN line manager company more time you stay at phone and more youll pay. In addition you couldnt talk with other that one person at a time.In opposite with VoIP mechanism you can talk all the time with every person you want (the needed is that other person is also connected to Internet at the same time), as far as you want (money independent) and, i   n addition, you can talk with many people at the same time.If youre still not persuaded you can consider that, at the same time, you can exchange data with people are you talking with, sending images, graphs and videos.There are two main reasons to use VoIP lower cost than traditional landline telephone and various value-added services.Low Cost  Higher multimedia applicationTraditional telephone system requires highly trained technicians to install and custom configuration. Companies find the need to call the service of specialist to implement, simple tasks like moving adding a phone. Modules such as voicemail and the additional lines are the part of perpetual  bike of upgrades and modifications that make telephony support a very profitable business. The methodology use to implement PSTN business phone system is well  understand and the industry is very mature. Hence company can make a purchase with the confidence that if they are installing a traditional system it will function and    include an excellent supported infrastructure.IDC reports the number of VoIP ports shipped in 2005 will be equal to traditional analogues deployment. Non to be taken lightly, the  average out lifespan of a voice system range from 5-10 years. In 5 to 10 years, an analogues telephone system will be the exception as opposed to the telephone standards. Qualified technicians, whom are required to work on propriety system, will be difficult to come by. In addition, the  conniption of telephone manufacture going out of business or the technology simply being repulsed by a more agile and less costly alternative, are both risks that must be taken into account in well informed decision.Fortunately a company can take few preventive to protect them from outdated system. One such step is use of standards technologies that are back by a number of company and possibly trade group as opposed to a single entity. In VoIP space a good example is session Initiation Protocols, SIP. SIP is supported by    the large majority of vendors and is considered the industry standard protocol for VoIP. Beyond analogue lines that terminate from an ISP, The traditional telephony market does not have much interoperability. For example it is not be integrate an Avaya PBX with a Nortel PBX.Hidden cost can be  positive in any technology deployment. The downtime experienced with buggy or  peaked(predicate) implemented technology, in addition to the cost of qualified consultants to remedy such asChallenges of VoIPThough VoIP is becoming more and more popular, there are still some challenging problems with VoIPBandwidth Network which available is an important anxiety in network. A network can be busted down into many nodes, associations and produce a big quantity of traffic flow, therefore, the availability of each node and link where we only focus on the bandwidth of the VoIP system. An in a data network, bandwidth overcrowding can cause QoS problems, when network overcrowding occur, packets need to b   e queued which cause latency as well as jitter. Thus, bandwidth must be accurately reserved and billed to ensure VoIP quality. Because data and voice share the same network bandwidth in a VOIP system, the necessary bandwidth condition and allocation become more complex. In a LAN surroundings, switches usually running at 100 Mbps (or 1000 Mbps), upgrading routers and switches can be the effective ways to address the bandwidth bottleneck inside the LAN.Power Failure and Backup Systems Traditional telephones work on 48 volts which is supplied by the telephone line itself without  international power supply. Thus, traditional telephones can still continue to work even when a power breakdown occurs. However, a backup power system is also required with VOIP so that they can continue to operate during a power breakdown. An organization usually has an uninterruptible power system (UPS) for its network to  pass over power failure, 14Security As VoIP becomes too popular, the issues related to    VoIP network are also very progressively and more arising 15. W. Chou 16 has investigation the different security of VoIP investigation the different and also given some  facultative strategies for these issues. In reference 17, the authors also outline the challenges of securing VoIP, and provide guidelines for adopting VoIP technology.Soft phone Soft phones are installed on system thus should not be used where the security is an anxiety. In todays world, worms, viruses, Trojan houses, spy wares and etc are everywhere on the internet and very complex to defend. A computer could be attacked even if a user does not open the email attachment, or a user does nothing but only visit a compromise web site. Thus use of soft phones could bring high risks for vulnerabilities.Emergency calls Each traditional telephone link is joined to a physical location, thus emergency tune-up providers can easily  quest for callers locality to the emergency send out office. But dissimilar traditional tele   phone lines, VoIP technology allows an exacting number could be from anywhere this make emergency services more problematical, because these emergency call centers cannot get the callers location or it may not be possible to send out emergency services to that location. Although the VoIP providers provide some solutions for emergency calls, there is at rest need of manufacturing principles in VOIP surroundings.Physical security The most significant issue in VoIP network is Physical security. An attacker can do traffic psychoanalysis once actually they access to VoIP. In between server and gateway, like to determine which parties are communicating. So the physical security policy and some controls are needed to control the VoIP network access mechanism. Otherwise, risks such as insertion of snuffer software by attackers could cause data and all voice connections being intercept.Wireless Security  affiliation in wireless network nodes were integrated with VoIP network which receives m   ore and more popular and accepted 18. The wireless networks are very feeble as compared to Wired Equivalent Privacy (WEP). The algorithm for 802.11 is week because WEP can be cracked with public available software. This is the major project in wireless network for example the more common and popular WiFi protected Access (WPF and WPA 20) which administrated by Wi-Fi Alliance are providing more significant security in improvement, the WPA protected is also integrated with wireless technology in VoIP.CHAPTER -3Related Work3.0 Security StudiesVoice of Internet Protocol is the  undermentioned generation telecommunications method. It allows to phone calls to be route over a data network thus saving money and offering increased features and productivity. All these benefits come at a price, vulnerability. It is easier to attack and exploit a voice and data network. VoIP will need extra security measures beyond the standard security that is typically implement for a computer network. Many i   ssues need to be addressed such as type of attacks, security, quality of service and VoIP protocols.Voice over IP (VoIP) is a one of the most challenging technology in todays market. The importance of VoIP is rapidly growing, many vendors introducing VoIP services with  mature technologies for improving quality of services and security. In this chapter I am discussing about security models and security process.3.1 VoIP Security ProcessThere are many VoIP protocols in the market. Some are proprietary while others are open standards. The two most popular open protocols are H.323 and SIP. They were designed by two different organizations and operate slightly differently. They both have problems with the use of random ports problems with NAT translations and firewalls.Security for VoIP devices and VoIP network is a complex process, securing of VoIP protocols and data  float invokes at many stages. The most common VoIP vulnerabilities are as follows Software Related Device related Protoc   ol related System Configuration related Application level attacks3.1.2 Software Related VulnerabilitiesThe basic flaws in software vulnerable are operating services and functions problems and quality, operating system interface and administrations 19. Software application interfaces, software application logic Software applications Application interfaces3.1.3 Device Related VulnerabilitiesOne of the most common security threats effects on VoIP hardware devices. In early days the most of the VoIP systems are designed with limited energy power, computing power. Due to the  sonorous competition in the market many vendors are keeping low cost, they are designing with low cast VoIP hardware devices but due to the changes of software applications, other system infrastructure the system need to regularly updates the device.The most common hardware devices in VoIP are PCs Telephone adaptors Modems VoIP phones3.1.4 Protocol VulnerabilityThe main protocols in VoIP are H.323 12 and SIP (Sessio   n initiation protocol), these two protocols are commonly used in VoIP hardware system 19. These protocols overwhelmed with security issues. SIP protocol is a complex protocol which maintains the security in SIP RFC. In SIP the network address translation crack security and which doesnt examine firewalls.H.323 is an International Telecommunication Union standard for audio and video communication across a packet network (National  wreak of Standards and Technology 2005). There are four types of devices under H.324 terminals, Gateways, Gatekeepers and Multi-Point Conference Units. The terminals are phones and computers. Gateway provides an exit to other networks. The Gatekeeper handles addressing and call routing while the MCU provided conference call support. H.323 uses other protocols to perform other vital tasks. UDP packets using the  real-time Transport Protocol transport all data. H.225 handles registration, admissions  status, and call signaling. H.235 also handles all security    and has four different schemes call Annexes. H.323 is a complicated protocol.SIP Vulnerabilities OverviewThe below shows a SIP call flow using SIP and UDP protocols, user can send a voice call through proxy server, the p  
Saturday, March 30, 2019
Management, Leadership and Public Health Planning
Management, Leadership and Public wellness  cookingStudent Name Aphrodis Ndayisaba0. IntroductionThe complexity and dynamism of   healthcargon systems well-nigh the world make them require strong, knowledgeable and skilful managers and  leadership. The need for  rough-and-ready health managers and leaders is of paramount grandness in  altogetherowing organisations and professionals to  get hold of their  tendencys. recrudesce of the knowledge and skills that healthc atomic number 18 services managers and leaders should  mother  include  training and  multifariousness  commission.In this essay, we  bequeath discuss, using a health  leap out and examples, the  measuring sticks under taken in  prep  serve well and later on we  willing be discussing on  miscellaneous   charges that healthc are services managers and leaders would partake to effect organisational  assortment.1. The  gaits in a health  readying  butt against correspond to Ardal et al (2006), a plan is defined as a map, as a    preparation, as an arrangement. Planning defines the  mode where the organisation or a person is heading and how to r from  to each one one there. sundry(a) activities are undertaken in health planning  work out. It is  give tongue tod that health planning  mold follows as the same basic steps as  both planning  answer and these steps form a cycle which is  comm save repeated in the planning process for programs, populations, systems or health goals. The  unavoidableness of repeated cycle is due to the prevailing conditions which some or all may push to the change of the existing plan. For example, new evidences to create, restore or support health are released unceasingly, thus to incorporate these evidences into plans, the planning process should be cyclical (Ardal  al, 2006).According to Ardal et al (2006), most planning cycles  counterbalance seven steps which are canvass the  purlieu backing directionsput  problems and  take exceptions disclose ranges of  ascendants to the pro   blem and challengesIdentify the preferred solutionsImplementationEvaluationAccording to the same source, some people might argue that planners are only  manifold in the first five steps yet planners are also instrumental in understanding and supporting to shape the  death penalty plan and  rating. They may be invited to provide support in these latter(prenominal)(prenominal) activities.To discuss on these steps, we use an example of a community health  take to on fighting against malaria in a local district.1.1. Surveying the environmentThis step is  touch with the  discipline collection to determine the  menstruum  feature regarding the issue under  condition. The assessment of the current  location is  make from various perspectives. For example, in the planning process for the project to fight against malaria, those involved in the planning process can review the  old plans  nigh the project. According to Chatora and Tumusiime (2004), the review of the previous plans is essential    in the planning process as it helps find out whether the government policy changed over a period of time and what its impact on the plan. Additionally, the planners can review the previous plans to see any change on  indisputable key  learning in the planning  wish well demographic information on the  tote up of the  locate population, social, economic and cultural factors, community engagement in the process and health delivery. Similarly, the review of the previous plans provides information on the change   slightly resources like human, financial and material resources and about the performance of the previous plans.1.2. Setting directionsThis step involves goals and objectives setting and the establishment of the standards against which the existing health/ illness  status or existing organisational or system performance will be compared with. Simply put, at this stage, health planners seek to answer the key  query where do we want to go? or what do we want to  chance upon. In    other words, the health planners identify the desirable future state or outcome for the issue in question.For example, during the planning process of the project intended to fight against malaria in the district, those involved may set the target of having zero death due to malaria in the district during a certain period.1.3. Identification of problems and challengesThis step is concerned with the identification and quantification of the shortfalls  mingled with the existing  locating and the desirable situation. To identify problems and challenges, the  operable data should be taken into consideration data from health information management system, community surveys, census, reports, and anecdotes alike.Problems can be either primary or secondary. On one hand, Primary problems include illnesses identified in the community like malaria, tuberculosis HIV infection, leprosy or other  colligate to socioeconomic factors like inequity, unfairness or  patient of dissatisfaction. On the ot   her hand, secondary problems or contributory problems are those problems related to poor health systems like shortage of health resources, poor health delivery services and poor management skills which contribute to the primary problems (Chatora Tumusiime, 2004).For example, during the process of planning the project to fight against malaria, planners have to make use of various data sources to determine the causes of the deficit between the current situation and the   desire after situation about malaria in their district1.4. Identification of range of solutions to problems and challengesAt this stage, a range of solutions to each identified problem and challenge is identified. Also, at this stage, an assessment of each possible solution, using criteria like feasibility with the  on hand(predicate) resources, cost- rough-and-readyness, is done so that each solution can be compared with each other to ease the process of previousitisation.For example, in planning process about commun   ity health project to fight against malaria, each identified problem and challenge that impede the initiatives to fight malaria a solution should be sought to it.However, given the complexity of this step in identifying solutions to the problems and challenges, creativity is of paramount importance as some problems and challenges may not have readily  forthcoming solutions (Ardal  al, 2006).1.5. Identification of preferred solutionsThis step is concerned with the selection of a solution or a range of solutions to deal with the identified problems and challenges in the  higher up step. The selection of the solutions may require to take into consideration fiscal and  governmental context and other limiting factors (Ardal  al, 2006).For example, in choosing solutions to the problems and challenges to the fight against malaria, government policies and guidelines and the  for sale resources and other limiting factors should be not be ignored.1.6. ImplementationThis step deals with the im   plementation of the selected solutions and it is preceded by the development of implementation plan.1.7. EvaluationIt  utter that this step may start with the development of an evaluation plan well prior to the  tangible evaluation. This step is concerned with the evaluation of the outcomes of the implemented solutions to determine if the latter resulted in achieving the goals set in the planning process. It is also concerned with the evaluation of the environment in which the plan was carried out to determine if any change occurred hence helping depict whether the implemented solutions were less effective, more effective or irrelevant. Additionally, it involves developing ongoing tracking system methods to be  apply to continuously make identification and assessment of the planned or unwitting outcomes of the implemented actions (Ardal  al, 2006).2. Various ways to effect organisational changeHealthcare organisations, like any other organisations, either public or private  continuo   usly undergo changes. The need for change or reform in these organisations is  account to be fundamental to the management process. Managers of these organisations need to adapt how they work when confront with contextual changes such as the emerging new technologies, changes in environmental pressures, demographics, political ideologies, socioeconomic context and rising demand and cost (Goodwin et al, 2006). So, organisations have to change as their  familiar and external environment constantly change.numerous  baffles and theories of change management have been proposed in the literature. These  impersonates include the 7-S  object lesson, PESTELI, soft systems methodology, Kurt Lewins classic three-phase model of change-unfreeze, move or change and unfreeze, John Kotters popular 8 step change model, etc. (Goodwin et al,2006 The State of Queensland, 2014). It is stated that each model has its own advantages and disadvantages and no one  go on is  exceed in all circumstances. Indee   d it is not so much the actual model or theory that is  crucial, but more that the approach that is taken is relevant to the circumstances (The state of Queensland, 2014). In essence, the  take up change model appear to make use of and adjust aspects of various models to meet the  socialization of the organisation in question and the context of change needed. Basically, it is reported that the goal of all change management is to secure the involvement of each and  each one to the change and align individual and team  demeanour and skills with the change (The state of Queensland, 2014)For the case of the director of the Directorate of Public Health who of necessity to replenish the image of the organisation after observing that it was getting negative,  below are the proposed ways that can be partaken to effect the health organisational change. They are the analytical tools that they can be used to develop a  lucid strategic response to the situation like the one mentioned above.The    7S modelPESTELI bonkers systems methodologyProcess modellingSWOT analysis2.1. The 7S modelThe 7S model is one of the diagnostic tools that healthcare organisation managers can use to  ingest situational analysis to assess the gap between what is and what ought to be and it is often a tool that can be used for the justification for change management programmes. This model suggests that there are seven criteria which require the harmonisation of each other. These criteria are the followingStrategy this criteria is concerned with the plan or  pass over of action that leads to the allocation of organisations resources to achieve its goals.Structure This involves the  great(p) characteristics of the organisational chart. This is related to the organisational leadership structure and how its parts are interconnected  in spite of appearance the organisation.Systems This  banner is concerned with the processes and procedures and the information flow around the organisation.Staff This criter   ion is concerned with the categories of human resources within the organisation.Style This is related to leadership  stylus that the managers use to reach the organisations goals.Shared values This is concerned with the guiding principles that the organisation instil to its members.Skills This is related to the staff capacity of the organisation.Goodwin et al (2006) state that the 7S model can be used in  twain ways in identifying strengths and weaknesses by taking into consideration the linkage between each criteria and how change made in one criterion will impact on all of the others.Despite its attractiveness of its dual  stress on soft and hard organisational components, it is criticised of providing one-sided organisational culture with the only  touch on focus on the similarities that stick to the organisation and ignore other important aspects like conflict and disagreement (Goodwin et al, 2006).2.2. PESTELIPESTELI is described as checklist used to  poll the environment in wh   ich the organisation operates. It stands forP Political factors political  pulse and influences that have an effect on organisational performance or other options  fan out to the organisation.E Economic influences competitive nature that the organisation faces and the financial resources available within the economy.S Social trends change in demographics, trends in the behaviour and attitude of people regarding how they live, work and think.T Technological innovations new ways of doing new and old things and mitigating new or old problems be it equipment or new ways thinking or organising.E Ecological factors this involves  specify wider ecological system to which the organisation belongs and the manner the latter interacts with.L legislative requirement these extend from the employment law to environmental regulations.I  intentness analysis this is concerned with reviewing of the rousing quality of the industry to which the organisation belongs.As the 7S model, PESTELI can be used    to conduct an analysis of the favouring factors in the environment in which the organisation operates and those that hinder the progress (Goodwin et al, 2006).2.3. Soft systems methodologyIt is a tool which helps in articulating complex social processes. This is done by  pitch together concerned people so that they can express their points of view, challenge them and test them. The following steps are undertaken when using this toolIdentify a problem and its causes from the stakeholders, cultural and political perspectives, without any attempt to implement a preconceived structure or to over-simplify the processes in place.Articulate  get-go definitions of relevant systems purpose, dynamics, inputs and outputs.Discuss on the situation with the stakeholders by describing the needed activities to achieve the root definitions using for instance process mapping tool or cause-and-effect diagram.Compare models with reality by observing, discussing and defining what to alter on the structu   re, process and attitude.Take action to implement the proposed solutions.Despite the importance of this tool in making change happening, it was criticised of being time consuming and costly. Also, there are concerns of whether organisational members are enough motivated to undertake the task to its end (Iles and Sutherland, 2001 cited in Goodwin et al, 2006).2.4. Process modellingProcess modelling is used as an approach to capture and clarify different views and expectations of a process. It helps increase the understanding of the situation at hand and how the proposed new one will make a difference. Simply put, the aim of this tool is to capture the dynamics of a situation so that those involved can brainstorm and come up with the best practices to change the current process.2.5. SWOT analysisSWOT analysis is  other important tool used to examine an organizations internal strengths and weaknesses, its opportunities for growth and improvement, and the threats the external environmen   t presents to its survival (Harrison, 2010). It is a systematic way of examining why an organization needs to change. SWOT stands for Strengths, Weaknesses, Opportunities, and Threats.This tool can be used in combination with other tool. For example, it is used together with the 7S model to identify organisational internal factors and PESTELI to identify external factors that hinder the growth or the normal functioning of the organisation.REFERENCESARDAL, S. ET AL, 2006. The Health Planners Toolkit. http//www.health.gov.on.ca/transformation/providers/information/resources/health_planner/module_1.pdf 6-11-14.CHATORA, R.,  TMUSIIME,P., 2004. District Health Management Team Training Modules. Module 4 Planning and Implementation of District Health Services. https//www.k4health.org/sites/default/files/Module%204.pdf 5-11-14.GOODWIN, N. ET AL., 2006. Managing Health Services. London Open University Press.HARRISON,J., 2010. Essentials of Strategic Planning in Healthcare. Washington AUPHA P   ress.THE  earth OF QUEENSLAND, 2014. Change Management Best Practices Guide Five (5) key factors  uncouth to success in managing organisational. changehttp//www.psc.qld.gov.au/publications/subject-specific-publications/assets/change-management-best-practice-guide.pdf 6-11-14.1  
Tax Reform In The United States Economics Essay
 evaluate Reform In The  linked States Economics EssayThis research  c all over discusses the theme of  evaluate  mitigate in the  linked states. Nowa sidereal days this issue is an actual one. M any(prenominal) Ameri rats  ar  gratifyed greatly in this issue and even express their  in-person opinions on this topic. The research  newsprint discusses different problems with the current  impose  corpse and represents some  roots concerning some changes in the US    impose reform.Key  lecture  tax, tax  placement, tax reform.1. IntroductionIt is impossible to carry out  sassy transformations for the purpose of steady  climb upment of the economy without formation an effective tax system.  revenue reform is a process which changes tax policies of the   grown medication. It is  cognize that  on that point  be different goals of this process  such as reduction of the tax level of all the  large number, changing tax system for   more than(prenominal)  reformist effect, simplification of tax    system. A good tax reform can improve the life of many people.1.1. Significance of the studyThis research paper discusses one of the  well-nigh important issues in the development of the  scotchal system  tax reform. This issue is an actual one not  completely for the  united States but for any country of the world because financial sector plays a key  piece in the present day development of the economy.  revenue reform is a main tool of the  government activityal  concur. In the  consideration of tightening business competition there is a necessity to  hold in appropriate measures in getting over the consequences of the financial and economic crises 2008-2009. So, tax reforms have such functions which  bequeath help to stimulate economical  return and innovative activity, and to  attach social protection.1.2. Definition of termsIn  parliamentary law to conduct a good research on tax reforms it is  necessity to represent some economical terms which will be  utilize in the process o   f research. They  be the following ones tax revenuees are  stomachments which are  do by the natural and legal persons (enterprises, organizations and citizens) for the government revenues in mandatory manner. It is a duty of everybody to pay taxes.  evaluatees are necessary because by means of taxes the government has an opportunity to control some economical processes in the country.They help to develop and reduce some kinds of business, to guide the development of these or those brunches of industry, to influence the economic activity of some enterprises and organizations, to balance consumers supply and demand, to regulate the amount of  specie in circulation.Tax system is the total of taxes, fees and former(a) obligatory payments which are  cookn according to the legislative acts. The main characteristic features of any tax system include the following onesthe total of taxes fixed by the governmentthe complex of principles, forms and methods of their putting into operationthe s   ystem of tax authorities, forms and methods of tax controlrights and duties of the participants of tax relationsorder and conditions of the tax process. (Roach, 2006)2. Discussion themesThis research paper touches upon the themes which are closely connected with the topic of the paper. It discusses issues and problems with current system in the United States. Moreover it gives some new ideas for tax reform.2.1.Some Facts from the history of Tax Reforms in the USAAccording to the historical data, there were a  trade of various  front lines in the USA which had the main goal to reform the  solicitation and the management of taxes in the country. Thus, the Whiskey Rebellion which took place in 1799, is considered to be the first effort to carry out tax reform in the USA.From the historical sources we learn that George Washington who was the US President at that  succession sent about 13000 troops to the western part of the state  pascal in order to put down the rebellions. Another  pre   gnant  elbow grease against tax reforms took place at the end of the 19th century. henry George, who was an  neat American economist of that time, was at the head of that apparent motion. The main goal of that movement was to abolish all forms of  tax revenue other than the Single tax on land values. He offered this single tax in his book  shape up and Poverty in 1879.This plan was not put into practice although it got support. This movement on tax policy was spread not only in the United States but  too on Australia and New Zealand. However, the organization which is called The Henry George Foundation of America continue to promote this form of taxation reform. (Barker, 1985)It is  gon that  some(prenominal) organizations in the United states are engaged in tax reform in the country among which are Americans for Tax Reform, Americans for Fair Taxation, Americans for  trustworthy Taxes. These and other organizations have already promoted some ideas concerning tax simplification in t   he United States which include Flat tax plans, Fair tax and  two-part tax reform proposals. (Tuerck et al., 2007)2.2 The Structure of Taxation in the United States and its  heartIt is known that the system of taxation in the United states is a  forward-looking one. It means that the  per centumage of income which is  nonrecreational by the household will increase with the increasing income. In other words those people who earn more will pay a higher  prize of taxes.  here is an  patternA person earns $100,000 a year, he will pay 25% of it  $25,000.A person earns $30,000 a year, he will pay only 10%tax rate  $3,000.However, there may be  likewise regressive and proportional tax systems.Some Reasons for using the Progressive tax system in the USAProgressive tax system stands for the  idea that those people who earn more should pay more tax rate because they have more opportunities to pay and they will not forego the most necessary things such as health care or  pedagogics. drop-off of    inequalities in the society. (Roach, 2006)2.3. Different types of taxes in the USA in that respect are several different types of taxes in the United States. All these taxes are collected by the Internal Revenue services. They are the following onesIncome taxesCorporate taxes. These taxes are establish on the companys income per a financial year.Investment taxes. These taxes are usually paid when a person receives some dividends and capital gains. (Smith, 2010)There are also some other types of taxes which are paid by the individuals income tax,  sales tax,  plaza tax, social security tax, medicare tax and others. (McIntosh 2010)Taxes on business include  national which include four groups income, self employment, payroll and excise, state which include  putting surface state business taxes (sales tax, employment tax and business income tax) and local which are collected by cities and counties in order to supplement services for this or that area. (La Rose, 2010)2.4. Problems with    the Current Tax System in the United StatesThe US Tax System is considered to be a complex one. It has its peculiarities which differ it from the tax systems of other countries of the world. However, the US Tax system has both advantages and disadvantages. The last ones require  certain changes. Here is the list of problems with the current Tax System in the United StatesA fabulously complex tax system with numerous layers of taxation on the same money taxes on income and salaries, ans savings. According to the statistical data, four of five  position-class Americans pay more in payroll taxes than in income taxes. (Walby, 2008)High rate of unemployment (about 10,3 million persons).Little of the mortgage interest deduction refer to those people who are at low and middle level of income.(Walby, 2008)About 18% of taxpayers have got out of the system. The income taxes fail to take the cash payments and other unjustified transactions concerning illegal immigrants.The income taxes assist    imports over the US production by excluding imports from Us tax and it penalizes the US exports giving an opportunity to some foreign countries to impose taxes when our goods are delivered to their shops. This fact  regaining the US exports and even costs the Americans their jobs. (17% price advantage over the US goods.)(Tuerck et al., 2007)The income tax system puts the highest corporate tax rate enforcing companies to be  primed(p) in other countries.Great problems with education, many students do not know about the financial aid which can be given to them. College education became too expensive. College graduates have debts of more than $19.000 when they leave college.A great  lie with of manufacturing jobs were lost due to breaking out the US manufacturing trade deficit. (Arduin, LafferMoore Econometrics, 2006)2.5.  hearingInterviewer Hello What is your attitude to the present day tax system?  atomic number 18 you satisfied with it?Mr. Brown, an engineer/49 years old Good day I     sound off I pay too much in taxes.Mr. Wilson, a doctor/29 The Tax Code is too  enigmaticMs. Whinthrop, a manager/41 I pay through the  schnozzle on income and payroll taxes and they say we still dont have balanced budgetsMs. Hartcoph, a student/20 I think rich people do not pay their fair share.Mr. Carack, a worker/27 Oh,  pocketable guys like me cannot take advantage of the tax code like those people who earn much and corporations do.Ms. Curts, a pensioner/71 You know, fifteen percent of Americans do not pay any income tax any moreMr. Bronks, a builder/38 Our current tax system taxes the  light but not the rich. The programs are all for the benefit of the rich and on the backs of the poor.Analyzing the above mentioned interview, we can say that many people are not satisfied with the current tax system. They consider it should be changed. Most Americans  occupy fair Tax plan. (Kotlikoff, et al., 2006)Some words about the main idea of this plan. The Fair Tax is a proposal to replace    the following taxes as the federal official corporate income tax, the federal payroll tax, the federal estate tax, the federal gift tax, the federal generation-skipping tax with a federal retail sales tax, assessed at a single rate. The Fair Tax guarantees a  discount to each household which will be based on its demographic composition. The main idea is that the rebate ensures that households who live at or  infra the poverty line in the United States will pay no taxes on net income. (Kotlikoff et al., 2006)2.6. Some New Ideas for Tax Reform in the United StatesOf course, it is very difficult to judge but I think that there should be some changes in the tax system of the Unites States. Here are some ideas for tax reformThose countries which supply the United States with their products (for example, China) should pay more for import of their products.It is necessary to replace the existing federal Tax Code of the United States into a more simplified version.It will be good to impose    no taxes on export and corporate  gelt in order to save jobs and to make the US companies more competitive.There should be no taxes on education tuition fees.Non-filers should pay taxes when they  bargain for goods or use services.Those who get low incomes should not pay any taxes.3. ConclusionIn conclusion, it is necessary to say that taxes play an important role both in the economy of the country and in the life of citizens. Tax money is used by the government to run the most significant activities. This money may also be invested in some projects which will be beneficial for all the citizens of the country. It is very important to have such a tax system in the country which will be appropriate for citizens of all the levels of income and will allow all of them to live a full life. That is why we need tax reforms.  
Friday, March 29, 2019
Relationship Between Multiculturalism and Liberalism
Relationship Between Multi ethnicism and LiberalismIn the context of  semipolitical thought, it would be so hard to think of multi paganism separate from  blanket(a)ism. Beyond the scope of political theory, the internal and external dynamics of the countries, the relationship between  land and the  ships company  shed been rein compel on the values of democracy and liberalism. This essay aims to  look for and explain the relationship between multiethnicalism and liberalism e additionally liberal egalitarianism  within the frame of  nonage   blush outs.Multiculturalism started to manifest itself in the political realm  subsequently 1980s. There    ar two main events that triggered the rise of multiculturalism Firstly, after the  go under of communism in Eastern Europe,  disciplineism has become the prominent  divisor of the democratization process. Secondly, a  unfermented wave of  re manalism has risen among  any(prenominal)  aggroups in Western democratic countries. It has been obs   erved that even the Western  severalises that built on liberal values could  non completely overcome the problems regarding  ethnic and  spiritual groups in their societies. Now, we live in  more than and more  modify and multicultural societies. Immigration and minorities  defecate been an imminent part of the debates of everyday  governance for a very long time. The politicians include their views and policies in their electoral campaigns, surveys are held to get more information   nigh public  horizon and more  all  historic(p)ly political theorist are looking for new  shipway and perspectives as coping or integrating strategies. For instance, the question of the illiberal minorities and the  peril of them to violate the liberal principles was  unceasingly  on that point as a  moot and debatable  unmatchable. Thus, this case brings us two important questions to discuss To what  consequence should we protect the minority  rightlys and how should we recognize the minority identitie   s?For many, it is an undoubtedly accepted  event that liberal  submit should be neutral  barely what should be the  carriage of this neutral state when it comes to the clash between the values of bulk and minority?If we ever need to take  unrivaled thing for granted in liberal state, it would be the strong idea that  each(prenominal)  singular should  get to the necessary rights and opportunities to follow the ways which lead them to a  satisfactory  life-time. Moreover, individuals should be free while deciding on their own understanding of good life and should  obey their goals freely. Therefore, this principle requires that individuals who are coming from  various backgrounds from the majority and having different religious and cultural customs and values should  besides pursue their understanding of good life without giving up their own. An other important aspect of liberal  political orientation concerning individual rights is that no state or government has the right to  inven   tionualize a project of good life and impose it upon its citizens. (Kukathas, 1992 p. 108) Thus, in my opinion any attempts stepping out of this line could be easily labelled as assimilative regarding religious and cultural minorities.At this  betoken, it would be  nonable to remind that, in the liberal state, an individuals realm of  license ends when a nonher individuals begins. This is accepted as another important principle of liberal state regarding individual freedom which is  similarly seen as a guarantee of the individual freedom of each member in the society. In this case, the rights that groups have been entitle could go as far as that they would threat or violate the human rights and values. What should be the  locating of the liberal state  roughly an intervention? Do individuals  cull to be a part of these groups and communities?The Proper Attitude of the Liberal  equalitarian towards MulticulturalismLiberal egalitarians favour a system in which state treats its citizen   s  as and creates  much(prenominal) an environment that each member of the society gets a  good share from the resources and available opportunities. Although, this might seem as a  crystallize principle at first sight, two conclusions  loafer be  set from this principle. First, the state should not  deputise with the distribution of resources or try to  equipoise the gap its citizens and second, liberal egalitarian attitude requires that each religious and cultural  confederacy should have equal chance to survive and continue to  do their customs in the society. In contemporary modern democratic states such as UK, France, USA and Canada we see that states spare necessary social, political and fiscal resources for the survival and continuity of different religious communities and minority  polishs. The reason for that is culture is considered as an important aspect in shaping  onenesss own identity and his/ her own interpretation of good life.The second point of view acknowledges th   at the state should be neutral and acts within the frame of laissez faire liberalism. Otherwise, the state can create inequalities among its citizens by implementing redistributive policies or entitling minority groups with special rights. Thus, the state should take the  tokenish part in the affairs of different cultural and religious groups and by nothing or minimum it  supplys citizens to be  hard-boiled equally. (Patten, 1992, p.1-3)Kymlicka and Multiculturalism DebateKymlicka locates his whole ideas on liberal theory and he is an important successor of liberal tradition. Thus, he places individual autonomy prior to the community and communal values. As a political philosophy, liberalism has often been seen as  principally concerned with the relationship between the individual and the state, and with limiting state intrusions on the liberties of citizens (Kymlicka,Liberalism, p. 1).For  just about scholars, this component of liberalism is seen as a strong one about multicultural   ist affairs. In my opinion, this can be easily seen as one of the weaknesses of liberalism when it comes to the  peck with the problems regarding minorities and minority rights. If we are stuck with the idea that liberal ideology is the only  detonating device under which both majority and minority values can be represented and  muckles can live happily together. In one of his essays,  both Models of Pluralism and Tolerance, Kymlicka also  begs a masterst Rawlss ideas about individual rights and defends the capabilities of group rights.Whereas Kymlicka believes that a well- cognitive process  determine can be built on the idea of group rights, some scholars  equivalent Kukathas argue that there is no necessity for abandoning the liberal ideologys individualist principles and create new inequalities. (Kukathas, 1992 p.4) Thus, this part will be foc determinationd on this second form of tolerance which is named as group rights by Kymlicka. (Kymlicka, 1992 p.1)Kymlickas theory is also    famously known for his  trait between different types of minorities based on their cultural aspects. According to him, there are societal cultures of national minorities and the cultures of poly ethnic societies. National minorities are the ones who  perpetually  film for their self-governmental rights. It is hard for them to get satisfied just by  being entitled to some special rights. For them, self-government is the only option for their survival in multicultural society which is composed of a majority and different minority groups. Kymlicka argues that poly ethnic groups would of all time be weaker and less demanding in their right claims because of the fact that they are immigrant communities. Their right claims would be about practicing their cultural and religious customs. These communities should  unendingly bear in mind that they come from another  ground and culture to be hosted in a new one and they also have some duties such as learning a new language or integrating with    the local community.In his book, Politics in the Vernacular, Kymlicka frequently uses the term societal culture and states that societal culture should be considered as a fundamental basis for the modern state. It is a concept consisted of both private and public spheres of life which is composed of a  special K language which has historical roots on a given territory,  communal educational, political, legal institutions. Moreover, societal culture is  approximatelyly the result of a national building process and it includes linguistic standardization and institutional  consolidation. (Kymlicka, 2000 p. 53) Thus, he goes one step further from the idea that culture is an important aspect of self-  see and self- realization which paves the way for self- realization i.e. a good life. He adds institutionalization and  certain(a) functioning administrative mechanisms to the shared history and values. National minorities mostly have certain tragic events, massacres or genocides in their    history and they always feel or  baptistry the threat of assimilation or discrimination in the nation building process. This is why Kymlicka makes certain specializations between immigrant groups and national minorities. National minorities face with the results of the events that they did not have no say in the decision  fashioning process in the most undesirable ways whereas immigrants mostly (here he seems to forget that some immigrants are forced to leave their countries because of wars or other terrific events) leave their country,in which they could practice their culture in the ways they want, voluntarily for the sake of better economic opportunities.What Kymlicka understands from citizenship based on group  secern rights is that ensuring the justice between members of different groups. Thus, the idea behing establishing group rights are not only about the idea of that communal rights are prior to individual ones but also about the need for establishing different rights for d   ifferent groups harmonize to their needs and vulnarabilities in the society. ( Luoboyck, p.9)Tolerance vs. RecognitionI think in the most of the relevant literature, scholars did not pay enough attention to the distinction between tolerance, acceptance and recognition. Specifically, for the followers of the liberal tradition, the emphasis has always been on the rights, equality, equal rights, equal opportunities, equal treatment and so on without even asking the people that is that what you  real want? It is observed that these different people are not only in the need to be  identify but also recognized as who they are. The special rights that they are entitled to by liberal democratic state do not always give them to chance of being recognized or accepted in the eyes of the members of the society or even before law. This is why the ideas of Taylor is really important in the multiculturalism debate. ( Taylor, 1994 p.25)In the history of politics, there has been an important  miscue    from honor to dignity which has also come with the emphasis on the  leveling of rights and identities. The age of the more privileged citizens has come to an end, at least in the eyes of the state and before law. It would be very optimistic to claim that all inequalities have been disappeared in this way. As Taylor argues, for many people this  equalization only brought an equality for civil rights and voting rights. There are also others who claim that it also has affected the socioeconomic aspects of life but I would not agree with them. It requires more than changing votes to shape public opinion and regulate everyday life which contains many social and economic inequalities like equal pay or integrated settlement policies. Although, there are still many problems to overcome, equal citizenship has been accepted as an universal value.Thus, in the new age of politics of difference, liberal egalitarians should be ready to reconsider the classical understanding of the principles of    liberal democratic state in  hostelry to give more than they used to. They should be ready to present a lot of rights and immunities in  severalise to recognize and accept the differences and try not to create a melting pot.Some still might argue that individual rights come before communal or group rights but the implications of this idea is mostly seen in Anglo- American world. (Taylor, 1994 p.32) I think this is one of the major reasons for why in Anglo- American world, there is always an on-going  lawsuit for creating a common identity, one nation, one language for all on the one hand, and promoting the self and the individualism on the other. In my opinion, from the perspective of Taylor, they can easily be accused of implementing assimilation strategies in the name of creating a melt pot. This would be a  endangermentous trap that the liberal state should carefully avoid. The equal use of resources, equal rights and treatment and states hands off laissez faire policies may lead    to the danger of extinction for some cultures and identities.In todays political realm, the functioning of state mechanisms  fold up that the state cannot isolate itself from the decision making process of cultural affair. As Kymlicka and Taylor also mentions, the state still has the power of making decisions about  prescribed language, some religious ceremonies, official languages that are used in education, public radio and television broadcasting. Thus, the state still remains as a powerful figure to decide which cultures and religions continue to exist in the society. Thus, the liberal state should be ready to intervene when and where there is a necessity.When it comes to the features of these special rights for minorities, Lubbock indicates some principles. First, he states that all the members of the community in question have to accept the culture as it is acknowledged and there must always be an open door for anyone wants to exit in necessary cases. Moreover, a liberal demo   cratic government can never adopt an attitude which tolerates illiberal actions of minority cultures or their customs. The basic principles of human rights are always prior to other policies and special rights. Second, liberal democratic governments have the  responsibleness to keep the religious and special cultural practices of minorities at a minimum acceptable level which would be  qualified enough. If a minority group is able to practice their customs at a sufficient level, than there would be no part to take for government. Otherwise, government should intervene and try to create a balanced situation in order to make sure that the minority people in question are able to practice their culture and religion. Thus, while polyethnic groups are being  defend by some special rights within the boundaries of existing laws and regulations, this should not  take into account these groups to have internal restrictions. The intention behind establishing polyethnic rights is to protect the   se groups from external suppressions and the danger of extinction or assimilation. Thus, it would not be so rightful to allow polyethnic groups to have the right to make regulations and restriction on its members individual rights and freedoms.( Loobuyck, p.8-9) wise ChallengesKymlicka believes in the supremacy of societal cultures over immigrant groups and more importantly  sapphic and gay community. It appears to me that Kymlicka andh his contemporaries do not give enough  immensity to LGBT community as a minority group which has serious right claims. In many books of Kymlicka, there is nearly no words about LGBT people and recently he tackled the issue with respect to the Qubcois gays and lesbians and his use of language gives the impression of he is not quite familiar with the  sexual urge studies literature  he does not even use the term LGBT.   human being separatism would involve cutting oneself off from the culture one was brocaded in, and relinquishing ones sense of nationa   l identity and cultural membership. Thus gay nationalism is neither feasible nor desirable for most gays. The task, therefore must be fight homophobia within the larger society, to gain recognition and acceptance for gays and lesbians within its schools, media, courts, businesses and so on ( Kymlicka, 1992 p. 90- 95)Although, Kymlicka continues to produce  precious ideas and theories, it should be accepted that there are some challenges that he could not foresee. The liberal democratic state would also be challenged by the problems or right claims that come from contemporary political movements and groups which do not have to be ethnicity based. Now there are the questions of the right claims of non-ethnic groups particularly LGBT community, forced migration, refugees and new generations of immigrant communities who did not choose to migrate but their parents made a decision to migrate like the Turkish people in Germany. In these situations, it becomes harder to talk about a matter    of choice. In these cases, is it still  likely to claim that societal culture and the minority groups that are based on societal culture are more valuable than the others? This could be one question that the liberal state had to answer.These ideas blur the line between integration and assimilation. It should be considered that the members of these groups are also political subjects that can influence the legislations  by dint of their political power. Thus, the leading elements of liberal state should consider the option of recognition rather than mere inclusion and integration with the majority.ConclusionThis paper has  open up the debate with the strong relationship between liberalism and multiculturalism to elaborate the question of How far should liberal egalitarians be prepared to countenance the special rights claims of minority cultures?.References  
Subscribe to:
Comments (Atom)
 
