142 research outputs found

    Class and social inequality in Ian Mcewan’s Atonement

    Get PDF
    Atonement, perhaps Ian McEwan’s best-known novel, is considered an epic of British postmodernist literature because it touches on a variety of contemporary topics. Although Atonement focuses primarily on themes such as love and repentance, it also deals with social class, status, and power, which are analysed in this paper. Furthermore, social stratification and inequality form the crux of this analysis. Using Max Weber’s theory of social stratification, and the characters as examples, this research considers how much social division truly exists in the novel, which serves as a mirror to British society. Moreover, various forms of social mobility are examined, as well as the solutions to those problems which are not only present in fiction, but also in reality. Ian McEwan’s Atonement talks about these issues and more, he sets problems and poses questions that challenge our lives’ perspectives, hence making it a unique literary gem

    Impact of Encryption on Qos in Voip

    Get PDF
    This paper studies the impact of different encryption algorithms on the quality of Voice over Internet Protocol (VoIP). Assuring Quality of Service (QoS) is one of the primary issues in any IP based application that examines the voice quality of VoIP. This paper examines QoS in terms of lost packet ratio, latency and jitter using different encryption algorithms along with firewalling at the IP layer. The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth available and encryption used. Findings include the need for the provision of bandwidth for encryption, and even when adequate bandwidth is provided encryption algorithms can increase lost packet ratios and packet latency, and reduce.Overall, the results indicate the implementation of encryption algorithms may degrade the voice quality even if bandwidth is adequate

    Secure and Mobile Multimedia Convergence

    Get PDF

    VoIP: Making Secure Calls and Maintaining High Call Quality

    Get PDF
    Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.Les eines modernes de comunicació multimèdia han de tenir alta seguretat, alta disponibilitat i alta qualitat de servei (QoS). Cap tipus d¿implementació de seguretat tindrà un impacte directe en la qualitat de servei. En aquest article s¿investiga com la seguretat d'extrem a extrem impacta en la qualitat de servei de veu sobre el Protocol d'Internet (VoIP). La qualitat de servei es mesura en termes de pèrdua de proporció de paquets, latència i jitter utilitzant diferents algoritmes d¿encriptació, sense seguretat i només amb l'ús de tallafocs IP en local i en xarxes d'àrea àmplia (LAN i WAN). Els resultats de les proves de laboratori indiquen que l'impacte general sobre el rendiment de VoIP depèn de la disponibilitat d'ample de banda i l'algorisme de xifrat que s'utilitza. La implementació de qualsevol algorisme de xifrat en entorns de baix ample de banda degrada la veu a causa de l'augment de la pèrdua de paquets i latència dels paquets de qualitat, però quan l'ample de banda augmenta les trucades de VoIP xifrades proporcionen un millor servei en comparació amb un entorn sense seguretat.Las herramientas modernas de comunicación multimedia deben tener alta seguridad, alta disponibilidad y alta calidad de servicio (QoS). Ningún tipo de implementación de seguridad tendrá un impacto directo en la calidad de servicio. En este artículo se investiga como la seguridad de extremo a extremo impacta en la calidad de servicio de voz sobre el Protocolo de Internet (VoIP). La calidad de servicio se mide en términos de pérdida de proporción de paquetes, latencia y jitter utilizando diferentes algoritmos de encriptación, sin seguridad y sólo con el uso de cortafuegos IP en local y en redes de área amplia (LAN y WAN). Los resultados de las pruebas de laboratorio indican que el impacto general sobre el rendimiento de VoIP depende de la disponibilidad de ancho de banda y el algoritmo de cifrado que se utiliza. La implementación de cualquier algoritmo de cifrado en entornos de bajo ancho de banda degrada la voz debido al aumento de la pérdida de paquetes y latencia de los paquetes de calidad, pero cuando el ancho de banda aumenta las llamadas de VoIP cifradas proporcionan un mejor servicio en comparación con un entorno sin seguridad

    Converged voice access to data (CVAD)

    Get PDF
    The rapid growth of the Internet and widespread use of mobile computing and telephony has resulted in a broad range of ways to communicate and access information. Data and telecommunications convergence promises a wide range of possible solutions that will increase productivity, reduce costs, and provide new opportunities and revenues for enterprises. However, such converged telecommunications and data services have been largely isolated to static environments where fixed Personal Computers (PC) and an Internet connection are used in conjunction with various software tools to simulate a pseudo converged session. Generally, data presented on the internet and in enterprise applications is not available on voice networks and vice-versa. Due to the versatile nature of today's enterprise, a feature-rich, flexible, adaptive and widely accessible convergence solution is required. This paper presents an Interactive Voice Response (IVR) driven approach that uses Converged Voice Access to Data (CVAD) services. The CVAD solution offers enhanced service effectiveness, flexibility and convenience for professionals on the move

    Voice over internet protocol on mobile devices

    Get PDF
    Voice over Internet Protocol (VolP) is a way to carry out a telephone conversation over a data network. VoIP products promise converged telecommunications and data services that are cheaper, more versatile and provide good voice quality as compared to traditional offerings. Although VoIP is widely used, VoIP on mobile devices is still in its infancy. Currently, there are a number of VoIP solutions for mobile phones. However, VolP solutions developed using Java 2 Platform Micro Edition (J2ME) are not available. Java based solutions are widely compatible with many devices. In this paper; strong focus has been granted to cross-device compatibility through the use of the widely supported J2ME framework. The implemtation details of VolP client using J2ME are illustrated

    Re-configurable VoiP interactive response

    Get PDF
    Organizational alliances are rapidly being formed as a means for effective cooperation with a common goal within a targeted value chain. The combination of such communication, coordination and cooperation leads to new organisational forms and scenarios within the Digital Ecosystem space that require technological support. Convergence refers to the move towards concurrently coupled telecommunications services with enterprise and internet data.Voice over Internet Protocol (VoIP) is a telecommunications solution that uses a data network such as the internet to transport voice traffic. VoIP data is transported alongside other data over an existing network. VoIP has introduced significant cost savings, functionality and convenience that is functionally comparable to traditional telecommunication offerings. However, current IT&T solutions have failed to use this powerful technology beyond simple telephony applicattoos.This paper presents a flexible VoIP Interactive Voice Response (IVR) interface that offers simplified convergence of telecommunications services that are coupled with enterprise and internet data

    Prototype Design and Analysis of Wireless Vibration Sensor

    Get PDF
    Since the technology era began, sensor systems have been frequently updated. In order to keep the sensor up to date, components are designed using a modular approach that can be updated with the latest technology. The objective of this paper is to illustrate the design of a vibration sensor that integrates an enhanced Mechanism for Hardware Health Monitoring (MHHM). The design achieves the digitizing, wireless communication and modularity aspects of this system as required. The selection of appropriate components is also presented in the paper as a guide

    ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys

    Get PDF
    Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.Les xarxes de sensors tenen moltes aplicacions en el control i la monitorització de les propietats del medi ambient, com ara el so, l¿acceleració, la vibració i la temperatura. A causa dels limitats recursos en la capacitat de càlcul, la memòria i l'energia són vulnerables a molts tipus d'atacs. L'especificació ZigBee basada en l'estàndard 802.15.4, defineix un conjunt de capes, adaptada específicament per a xarxes de sensors. Aquestes capes suporten missatgeria segura mitjançant criptografia simètrica. Aquest article presenta dues formes diferents per agafar la clau de xifrat en ZigBee: atac a distància i atacs físics. També les enquesta i classifica alguns atacs addicionals que es poden realitzar en les xarxes ZigBee: espionatge, falsificació, reproducció i atacs DoS en les diferents capes. A partir d'aquesta anàlisi, es demostren algunes vulnerabilitats existents en l'esquema de seguretat en tecnologia ZigBee.Las redes de sensores tienen muchas aplicaciones en el control y la monitorización de las propiedades del medio ambiente, como el sonido, la aceleración, la vibración y la temperatura. Debido a los limitados recursos en la capacidad de cálculo, la memoria y la energía son vulnerables a muchos tipos de ataques. La especificación ZigBee basada en el estándar 802.15.4, define un conjunto de capas, adaptada específicamente para redes de sensores. Estas capas soportan mensajería segura mediante criptografía simétrica. Este artículo presenta dos formas diferentes para coger la clave de cifrado en ZigBee: ataque a distancia y ataques físicos. También las encuesta y clasifica algunos ataques adicionales que se pueden realizar en las redes ZigBee: espionaje, falsificación, reproducción y ataques DoS en las diferentes capas. A partir de este análisis, se demuestran algunas vulnerabilidades existentes en el esquema de seguridad en tecnología ZigBee

    Smart Camp: A Sustainable Digital Ecosystems Environment

    Get PDF
    Seamlessly integrating energy saving with the habits of daily life is an ambitious goal. It becomes even a bigger challenge in a remote area, like the Western-Australian Outback. Harsh environment, high temperatures and hard working conditions demand great exertion from humans and make one’s well-being an integral part of life. To bring both together – environmental sustainability and life quality – is a new interdisciplinary approach in the field of computer science. A “Smart Camp” is a new low rate wireless personal area network (LR-WPAN)-based solution, which provides accommodations in a remote mining site with a smart automation and information system to contribute toenvironmental sustainability and to provide amenities for its inhabitants. The Smart Camp intends to monitor and control household appliances with the aim to reduce the overall energy consumption. Additionally, multi-media components will be implemented, which aim to make the occupants life more pleasant by adding value to their habitat
    corecore