Tuesday, November 26, 2019
Brown v. Board of Education Essays - Free Essays, Term Papers
Brown v. Board of Education Essays - Free Essays, Term Papers Brown v. Board of Education Subject: History Brown v. Board of Education Brown v. Board of Education In 1896 the Supreme Court had held in Plessy v. Ferguson that racial segregation was permissible as long as equal facilities were provided for both races. Although that decision involved only passenger accommodations on a rail road, the principle of "separate but equal" was applied thereafter to all aspects of public life in states with large black populations. Brown v. Board of Education of Topeka, Kansas, decided on May 17, 1954, was one of the most important cases in the history of the U.S. Supreme Court. Linda Brown had been denied admission to an elementary school in Topeka because she was black. Brought together under the Brown designation were companion cases from South Carolina, Virginia, and Delaware, all of which involved the same basic question: Does the equal protection clause of the 14th Amendment prohibit racial segregation in the public schools? It was not until the late 1940's that the Court began to insist on equality of treatment, but it did not squarely face the constitutionality of the "separate but equal" doctrine until it decided the Brown case. In a brief, unanimous opinion delivered by Chief Justice Earl Warren, the Court declared that: "separate education facilities are inherently unequal" and that racial segregation violates the equal protection clause of the 14th amendment. In a moving passage, the chief justice argued that separating children in the schools solely on racial grounds "generates a felling of inferiority as to their status in the community that may affect their hearts and minds in a way unlikely to be undone." Although the decision did not bring about total integration of blacks in the schools, it resulted in efforts by many school systems to remove the imbalance by busing students. The Court's decision had far reaching effects, influencing civil rights legislation and the civil rights movement of the 1960's.
Saturday, November 23, 2019
Potential 2020 Republican Presidential Candidates
Potential 2020 Republican Presidential Candidates President Donald Trumps surprise win in 2016 was good news for many in the Republican Party. But the outsider non-politicians win did not make all conservative members of the GOP happy. Some preferred a standard-bearer for the party who fit a more traditional mold than the outspoken New York real estate developer and reality TV star. Others saw him as someone who doesnt actually hold the conservative values he espoused. Three Republicans already have indicated their interest in challenging Trump in the 2020 primary season, and pundits speculate that at least one more might join the race. Bill Weld Former Massachusetts Gov. Bill Welds last run for office was as vice president on the Libertarian Party ticket, but the former Massachusetts governor re-joined the Republican Party to officially challenge President Trump in April 2019. Despite Trumps 90 percent approval rating among GOP voters, Weld insisted in a CNN interview that he can beat the sitting president. His strategy includes getting on the ballot in states that allow for crossover voting, meaning that people who traditionally vote for Democrats are allowed to vote in the Republican primary. Larry Hogan Maryland Gov. Larry Hogan is a moderate Republican who has said he would consider running against Trump in 2020 only if he thought he had a reasonable chance of winning. But polling even in his home state has shown that while Marylanders love him as their governor, Republicans favor Trump in a 2020 primary contest 68 percent to 24 percent. Hogan announced in June 1, 2019 he would not run, saying he would instead lead an advocacy group called An America United. John Kasich Former Ohio Gov. John Kasich already challenged Trump once, in the 2016 primaries, and came up short. The former Ohio governor was tenacious nonetheless and stayed in the fight until the bitter end. Kasich has continued his criticisms of the president as a cable news commentator. Heà was rumored to be considering a 2020 campaign, but on May 31, 2019, he announced that he will not run, telling CNN, There is no path right now for me. I dont see a way to get there. Justin Amash Rep. Justin Amash of Michigan is a vocal Trump critic in the U.S. House of Representatives and began being talked about as a challenger to the president after he was the lone Republican in the House to join Democrats in calling for Trumps impeachment in May 2019. But the speculation was not over whether Amash would challenge Trump in the GOP primary. Instead, observers wondered whether the libertarian-minded Amash might indeed jump to the Libertarian party where he might steal enough electoral votes to be a spoiler in the general election. Others Other more conservative Republicans are not interested in challenging a sitting president, either because they support his policies or because they dont want to hurt their own political futures. Those likely waiting for the 2024 election include names like Vice President Mike Pence, Sen. Marco Rubio of Florida, Sen. Ted Cruz of Texas, former U.N. Ambassador Nikki Haley, Sen. Rand Paul of Kentucky, former Wisconsin Gov. Scott Walker, or even former Alaska Gov. Sarah Palin.
Thursday, November 21, 2019
Media, Culture and Identity Essay Example | Topics and Well Written Essays - 1000 words
Media, Culture and Identity - Essay Example The media therefore plays an important role in the formation of a cultural identity because of the vital role that it (the media) plays in the communication process. It is seen that communication is an important part in the formation of a cultural identity as it is the means through which people interact and through the interaction, the culture is transmitted. The media is therefore seen to play a vital role in the formation and in the transmission of cultural identity for different people. The media is important in that it facilitates the process of communication between the different people in a community. By facilitating the process of communication, the media makes a major contribution in the creation and in the spread of culture. The media also has an important role in the evolution of the different cultural practices. The media can be said to extend the human capability to create, spread, and store messages. By extension, the media also enhances the human capability to engage i n activities that are relevant to the different aspects of culture. When the process of communication is facilitated, the cultural practices can be spread. What is seen in the media is also a reflection of the cultural activities that are being engaged in by the people in the society (Gentz and Kramer 2). The increase in the consumption of media has been instrumental in the formation of identity. The introduction of new media and new media technologies has been linked to the formation of new patterns of identification. The cultural orientation of a given group of people and the way that people identify themselves change when they begin to consume the different kinds of new media and new technologies that are available to them. An example of the new media and media technology that has influenced the way people identify themselves and their cultural identity is the increased uptake of satellite television and the increased use of the internet. This is because of the interconnectedness and the high level of interaction that is offered by the new media. Media plays an important role in the formation of culture and identity in that it has increased the level of mobility that the community has access to. The mobility that the media offers is from the increased access to symbolic world that is enabled by the media. The media technology also brings change in cultural identity in that it increases the level of self sufficiency among the members of the given community. The interdependence that is offered by the media has led to a situation in which the global events and happenings have a major impact on the local culture. The local cultures of those who consume the media assimilate the culture of those that they watch and read about from the different media sources. The media is a major source of information as well as a source of cultural information. When it comes to transmitting cultural information the different actors and events in the media are typified into the d ifferent codes. They (actors and events) are also made to generic forms that are in line with the culture of a given society. The media through the different actors and events recreates the codes through which the events and actors are interpreted. The physical and social institutions as well as the cultural spaces have been reconstructed by the media, through the introduction of unlimited access to events and actors that are not physically
Tuesday, November 19, 2019
Geologic hazard project Essay Example | Topics and Well Written Essays - 1250 words
Geologic hazard project - Essay Example Earthquakes are not isolated events as they occur in sequences. Most often, each series is dominated by an event with a larger magnitude than all others in the sequence. Smaller earthquakes and aftershocks may follow the main shock, sometimes several hours, months, or even several years later. Earthquakes are inevitable in many parts throughout the world. It can damage the infrastructure. It causes ground shaking, ground displacement, flooding and fire that can cause great damage to the people of the region affected. For example, when an earthquake occurred in the state of Washington, more than a billion dollars worth of buildings got destroyed. Roads and bridges in the region affected became inaccessible, water pressure fail and gas lines break and leak leading to fires spread that causes severe damage. Earthquakes cause Water level in the sea to rise suddenly, causing very high waves, several meters in height, which then flood the coastal areas. These possibly give rise to tsunamis, causing damage to coastal areas (Ammon). It is important to have earthquake knowledge and learn about how to minimize its effects. Its preparedness can reduce the number of the casualties, and the value of the properties destroyed. To understand earthquakes allows saving lives and to reduce damages, injuries. It also allows to build buildings more earthquakes resistant and find the locations that are more prone to earthquake. Earthquakes have been recorded throughout history for many years. Even before seismographs in early times, there are a record of mysterious ground shaking. It occurs when rocks break along an underground fault. The ground shaking causes vibrations through the earth. The magnitude of the shaking varies on how great the movement along the fault is. When plates shift, they create shockwaves that go through the earth.The shock
Sunday, November 17, 2019
Iraq invaded Kuwait in 1990 Essay Example for Free
Iraq invaded Kuwait in 1990 Essay The invasion was the result of a long-standing territorial dispute. Iraq accused Kuwait of violating the Iraqi border to secure oil resources, (on July 17, 1990 Saddam Hussein accused Kuwait and the United Arab Emirates of flooding the world oil market. In addition, he singled out Kuwait for the production of oil from a disputed supply, the Rumaila oil field), and demanded that its debt repayments should be waived. (7:1) Direct negotiations were begun in July 1990, but they were destined soon to fail; along with reassurance from the United States making a claim that they would not get involved (the famous meeting of Saddam Hussein with April Glaspie, the United States Ambassador to Iraq, on the 25th of July, 1990). This was the go ahead that Hussein needed. (8:1) Arab mediators convinced Iraq and Kuwait to negotiate their differences in Jiddah, Saudi Arabia, on August 1, 1990, but that session resulted only in charges and countercharges. A second session was scheduled to take place in Baghdad, the Iraqi capital, but Iraq invaded Kuwait the next day. (9:1) Iraqi troops overran the country shortly after midnight on 2nd August 1990. The U. S. fell short on its claim to not get involved and instantly declared interest in keeping Saudi Arabia safe. (10:1) The History of Operation Desert Strom: On the morning of August 2, 1990 the mechanized infantry, armor, and tank units of the Iraqi Republican Guard invaded Kuwait and seized control of that country. The invasion triggered a United States response, Operation DESERT SHIELD, to deter any invasion of Kuwaits oil rich neighbor, Saudi Arabia. On August 7, deployment of U. S. forces began. United Nations Security Council Resolutions 660 and 662 condemned Iraqs invasion and annexation and called for the immediate and unconditional withdrawal of Iraqi forces. On August 20 President Bush signed National Security Directive 45, U. S. Policy in Response to the Iraqi Invasion of Kuwait, outlining U. S. objectives which included the immediate, complete, and unconditional withdrawal of all Iraqi forces from Kuwait, and the restoration of Kuwaits legitimate government to replace the puppet regime installed by Iraq. (2) A U. N. ultimatum, Security Council Resolution 678, followed on November 29, 1990. It stipulated that if Iraqi dictator Saddam Hussein did not remove his troops from Kuwait by January 15, 1991 a U. S. -led coalition was authorized to drive them out. Early in the morning of January 17, Baghdad time, the U. S. -led coalition launched air attacks against Iraqi targets. On February 24, coalition ground forces begin their attack. On February 27, Kuwait City was declared liberated, and with allied forces having driven well into Iraq, President Bush and his advisers decided to halt the war. A cease-fire took effect at 8:00 the following morning. (3) A crucial element of the Persian Gulf war was the Iraqi launch of its modified Scud missiles. Iraq originally obtained Scud missiles, along with much of the rest of its military equipment, from their producerthe Soviet Union. This 1970s study provides basic data on various aspects of the Scud Bincluding, among others, its range, payload, warhead type, and accuracy. It also provides information on the background of the missile and conclusions based on U. S. materiel exploitation of one or more Scuds. (4) On December 2, 1990, six weeks before the United States and its allies initiated Operation Desert Storm, Iraq test launched three Scud missiles from sites in eastern Iraq, which impacted in western Iraq. This DIA report, based at least in part on data from Defense Support Program launch detection satellites, provides first notification of the launch and basic data on the nature of the missilesincluding type, launch sites and impact areasas well as other relevant information. It was reported that the Iraqi test firing allowed the U. S. to fine-tune its launch detection system, which proved of great value during Desert Storm. (5) During the Persian Gulf War Iraq fired 88 Iraqi-modified Scuds at Israel, Saudi Arabia, and Bahrain. The Scud attacks on Israel threatened to provoke Israel into a counterattack, which the U. S. wished to avoid for fear that it would shatter the Allied coalition. From the beginning of the war destruction of Iraqi Scuds represented a high priority for U. S. and allied forceswhich involved the use of space systems, aerial platforms, and special operations forces. Destruction of Iraqs mobile Scud forces proved far more difficult than expected, in part due to Iraqi tactics. At wars end there had been no confirmed kills of mobile Scuds. This post-war DIA assessment focuses on a number of subjects, including pre-war intelligence assumptions, Iraqi Scud deployment and dispersal, the capabilities of Iraqs extended range Scuds, and means of measuring the effectiveness of the counter-Scud effort. It concluded that the lessons learned during Operation DESERT STORM can provide the framework for developing a more effective, realistic approach to targeting both Third World ballistic missiles and Soviet mobile intercontinental ballistic missiles in the future. (6) A key element in allied success in the Persian Gulf War was the U. S. -British led air campaign prior to the commencement of the ground campaign. That air campaign marked the first major use of the F-117A, Nighthawk, stealth fighter, the existence of which was declassified in 1988 shortly before its first combat in Operation JUST CAUSE in Panama in 1989. This chronology, in addition to covering events related to F-117A deployment and operations, provides a day-by-day, wave-by-wave, account of operations against Iraqi targets. It provides specifics on targets, bombs dropped, and the 37th Fighter Wings general assessment of the effectiveness of the attacks. Subsequent studies of F-117A operations, such as that of the General Accounting Office, were more skeptical of the F-117A effectiveness. (7) What is the situation now in the context of 1990 war?
Thursday, November 14, 2019
Gender Issues In Lysistrata Essay -- essays research papers
Human beings are amazing creatures. Our history has shown spectacular and shameful events from day one. Throughout the course of history we have seen both war and peace. More war than peace, but the point still remains. That we, as a human race, have accomplished many wonderful intellectual break-throughs but we have also done very stupid deeds. Its amazing how a creature of such great intelligence could separate, segregate, discriminate, dehumanize, and enslave members of its own human race. à à à à à The world as we speak is existing because of gender issues. Going back to days of Adam and Eve. When God asked Adam not to eat from the apple tree, it was Eve, with her feminine lure, who was able to convince Adam to disobey Gods rules and eat the apple. Yet when God came to punish Adam for disobeying the rules, Adam pointed to Eve and blamed her for luring him into the sin of eating the apple. Yet in reality it was the serpent, which was the devil, that lured them into eating the apple. But of course Adam, being male had to blame Eve, the female. Which is typical male behavior to blame the woman, my sister says. In general men donââ¬â¢t take responsibility for their actions. Michealangelo has portrayed all this on the Sistienth Chapel. He has painted a picture that is portraying God punishing Adam for eating the apple. In this painting Adam loses his masculine image by pointing to Eve and blaming her for the problems that were caused by eating the apple. à à à à à Men threw out history have always been perceived as strong, powerful, heroic beings. Men are depicted as fighters, providers, and of course first class citizens. While woman on the other hand have always been perceived as weak, fainty, delicate homemakers, and unintelligent. Their main purpose in life is to cater for the men, and take care of the house and kids. And of course they were perceived as second class citizens. à à à à à The focus of this paper is to analyze the gender issues and differences that existed in all three plays. I would like to relate and compare these issues to our past as humans and to our modern day present. à à à à à We see a wide array of controversial gender issues arise in Lysistrata. This play starts off by showing the main character as a strong independent woman. The beginning of the play focuses on Lysistrata resentment and anger toward the woman of the town. She sees her ow... ...uff and leave the town, with out ridicule and hardship. They seemed to be ââ¬Å"stuck';, in the sense that is very hard to leave a small town. à à à à à The role of the women was to get married, stay home and take care of the kids, while the man provides and puts food on the table. This view is still somewhat shared with our society today. à à à à à In conclusion it would be safe to say that all three plays relate gender issues to their time set. We can see many similarities within all three of these plays, and we can also see similarities that arise with our culture today. Even though today women are not treated as bad as they were. It is sad to say that even in the year 2000 women donââ¬â¢t have equal rights and donââ¬â¢t get equal treatment. Women still make .70 cents to the dollar as men. Their role is still to be the homemaker. And they hold such a small percentage of any policy making position. To think of all the lost talent and all the advances that could have been made to help our society is truly a sad and inhuman thought, that can get any one angry with our history. If one was to really think about it, the human race has not made much progress with the treatment of women.
Tuesday, November 12, 2019
Analysis of Secure Real Time Transport Protocol on Voip over
Mohd Nazri Ismail / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 898-902 Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment Mohd Nazri Ismail Department of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA [emailà protected] unikl. edu. my Abstract- In this research, we propose to implement Secure Real Time Transport Protocol (SRTP) on VoIP services in campus environment. Today, the deployment of VoIP in campus environment over wireless local area network (WLAN) is not considered on security during communication between two parties.Therefore, this study is to analyzed SRTP performance on different VoIP codec selection over wired. We have implemented a real VoIP network in University of Kuala Lumpur (UniKL), Malaysia. We use softphone as our medium communication between two parties in campus environment. The results show that implementation of SRTP is able to improve the VoIP quality between on e-to-one conversation and multi conference call (many-to-many). In our experiment, it shows that iLBC, SPEEX and GSM codec are able to improve significantly the multi conference (many-to-many) VoIP quality during conversation.In additional, implementation of SRTP on G. 711 and G. 726 codec will decrease the multi conference (many-to-many) VoIP quality. Keywords- Codecs, Softphone, SRTP, WLAN I. INTRODUCTION AND RELATED WORKS University of Kuala Lumpur (UniKL) has implemented a real VoIP over wireless LAN in campus environment. This implementation is not covered any security features. Therefore, the objective of this study is to enable the security function using Secure Real Time Transport Protocol (SRTP).We will study the performance of SRTP on different codec such as G. 711, G. 726, GSM, iLBC and SPEEX. iLBC is a speech codec developed for robust voice communication over IP, it uses 13. 33 Kbps. It provides low delay and high packet loss robustness for low-bit rate codecââ¬â¢s. SPEEX codec is open source patent-free audio compression format designed for speech. Codec is an algorithm used to encode and decode the voice conversation. Secure Real Time Transport Protocol (SRTP) defines a profile of Real Time Transport Protocol (RTP), intended to provide ncryption, message authentication and integrity and replay protection to the RTP data in both unicast and multicast applications. Previous work is to evaluate the trade-off existing between quality of service and security when SRTP [6] is employed to protect RTP (Real Time Protocol) sessions on VoIP calls [5]. There is no such study has been conducted on comparison of VoIP one-to-one call and multi conference call (many-to-many) performance using SRTP functionality. With its promise of inclusion, innovation, and growth, VoIP also brings challenges. VoIP is not easy to secure.It suffers all of the problems associated with any Internet application, and VoIP security is complicated by its interconnection to the PS TN. A host of trust, implementation, and operational complexities make securing VoIP particularly complex. In fact, the same aspects that make the VoIP software model so powerfulââ¬âits flexible, open, distributed designââ¬âare what make it potentially problematic [7][8]. Various security requirements have to be met to secure VoIP transmission: Authentication, Privacy and Confidentiality, Integrity, Non repudiation, Non replay and Resource availability [9].The threats faced by a VoIP are similar to other applications including: unwanted communication (spam), privacy violations (unlawful intercept), impersonation (masquerading), theft-of service, and denial-of-service [10]. II. METHODOLOGY We have setup a real wireless network environment to analyze and measure implementation of VoIP service using security function (SRTP) at University of Kuala Lumpur (UniKL) in Malaysia. This study posits several research questions: i) what is the STRP performance level of the VoIP over WLAN based on one-to-one call and multi conference call? nd ii) which codecs are able to provide better improvement of VoIP conversation? Figure 2. 1 and Figure 2. 2 show the flow of VoIP conversation call between one-to-one and multi conference. We measure our voice quality using human perception. Mean Opinion Score (MOS) technique is the best approach to measure and ISSN : 0975-3397 898 Mohd Nazri Ismail / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 898-902 validate voice quality between one-to-one call and multi conference call. Figure 2. 3 shows the measurement of VoIP performance over WLAN using SRTP implementation.We also test on different codecs selection such G. 711, G. 726, GSM, iLBC and SPEEX. III. ANALYSIS AND RESULTS Figure 2. 1: VoIP over One-to-One Conversation This section measures and compares VoIP performance over WLAN using SRTP function. In voice and video communication, quality usually dictates whether the experience is a good or bad one. Besides the qualitative description we hear, like ââ¬Ëquite good' or ââ¬Ëvery bad', there is a numerical method of expressing voice and video quality. It is called Mean Opinion Score (MOS). MOS can be tested using: i) human perception; ii) simulation model; and iii) automated system [1] [2].MOS gives a numerical indication of the perceived quality of the media received after being transmitted and eventually compressed using codecs. MOS is expressed in one number, from 1 to 5, 1 being the worst and 5 the best. MOS is quite subjective; as it is based figures that result from what is perceived by people during tests (refer to Table 3. 1). We will select five different users to evaluate and rate the VoIP performance using SRTP and without SRTP functionality. When users cannot get a dial tone or there are excessive delays in ringing the other partyââ¬â¢s phone, VoIP performance is unacceptable.Call quality is a function of packet loss rate, delay, and jitter is typically represented as a MOS [3], [4]. Table 3. 1: Mean Opinion Score (MOS) Ratings Mean Opinion Score (MOS) Ratings Excellent 5 (Perfect. Like face-to-face conversation Figure 2. 2: VoIP over Many-to-Many (Multi Conference) Conversation Good Fair Poor Bad or radio reception) 4 (Fair. Imperfections can be perceived, but sound still clear. This is (supposedly) the range for cell phones) 3 (Annoying) 2 (Very annoying. Nearly impossible to communicate) 1 (Impossible to communicate) Figure 3. shows the configuration of codec protocol such as G. 711, G. 726, GSM, iLBC and SPEEX. This 3CX softphone is able to active ââ¬ËEcho Cancellationââ¬â¢ and ââ¬ËSRTPââ¬â¢. The VoIP experiments will receive two types of modes: i) one-to-one call conversation; ii) multi conference call (many-to-many). Figure 3. 2 shows the result of VoIP one-to-one conversation. Figure 3. 3 shows the result of VoIP multi conference (many-to-many) call. Figure 2. 3: Measurement and Evaluation of VoIP over WLAN using SRTP Approach ISSN : 0975-3397 899 Mohd Nazri Ismail / (IJCSE) International Journal on Computer Science and Engineering Vol. 2, No. 03, 2010, 898-902 improvement on VoIP quality performance and at the same time able to provide element of security (refer to Table 3. 3 and Figure 3. 5). The significant improvement is GSM and SPEEX codecs after implemented SRTP. Table 3. 2: Multi Conference without SRTP User Codec Figure 3. 1: 3CX Softphone Codec and SRTP Configuration G. 711 G. 726 GSM iLBC SPEEX User 1 3 4 1 2 5 User 2 3 3 1 2 4 User 3 2 3 1 3 4 User 4 3 4 1 2 4 User 5 2 4 1 2 5 Figure 3. 2: One-to-One Call Conversation Result Figure 3. 4: Users Rate VoIP for Multi Conference Call Without SRTP Table 3. : Multi Conference with SRTP User Codec G. 711 G. 726 GSM iLBC SPEEX Figure 3. 3: Multi Conference Call (many-tomany) Conversation Result Most of the users agreed and rates this VoIP without SRTP will provide a good quality for G. 711 and G. 726 codecs. Other users agreed a nd rates 4 to 5 ratings for SPEEX codec without using SRTP during multi conference conversation (refer to Table 3. 2 and Figure 3. 4). After implemented SRTP on VoIP during multi conference session occurs, it shows some User 1 2 3 4 5 5 User 2 1 3 4 5 5 User 3 1 2 3 4 5 User 4 2 2 3 4 5 User 5 1 2 3 4 5 ISSN : 0975-3397 900Mohd Nazri Ismail / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 898-902 Table 3. 5: One-to-One Call with SRTP User Codec G. 711 G. 726 GSM iLBC SPEEX User 1 2 3 2 4 5 User 2 1 3 2 4 4 User 3 1 2 2 4 5 User 4 2 2 2 4 4 User 5 2 3 2 4 5 Figure 3. 5: Users Rate VoIP for Multi Conference Call With SRTP Most of the users agreed and rates this VoIP oneto-one call without SRTP will also provide low quality for G. 711, G. 726 and GSM codecs. Other users agreed and rates 3 and 5 ratings for iLBC and SPEEX codecs without using SRTP during one-to-one call (refer to Table 3. and Figure 3. 6). After implemented SRTP on VoIP during o ne-to-one session occurs, it shows significant improvement on VoIP quality performance for G. 711, G. 726, GSM, iLBC and SPEEX over WLAN (refer to Table 3. 5 and Figure 3. 7). Table 3. 4: One-to-One Call Without SRTP User Codec G. 711 G. 726 GSM iLBC SPEEX User 1 2 1 2 3 5 User 2 2 2 2 3 4 User 3 2 1 2 4 4 User 4 1 1 1 3 4 User 5 1 2 2 4 4 Figure 3. 7: Users Rate VoIP for One-to-One Call with SRTP Figure 3. 8 and Figure 3. 9 show the average MOS score for VoIP conversation over one-to-one call and multi conference call (many-to-many), respectively.VoIP Conversation over Multi Conference Call: Before implemented SRTP, the average MOS score for G. 711 is 2. 5, 3. 5 for G. 726, 1 for GSM, 2. 1 for iLBC and 4. 5 for SPEEX. After implemented SRTP, the average MOS score for G. 711 and G. 726 are decreased the ratings approximately 1 to 2. 5. GSM, iLBC and SPEEX codecs show the average MOS score are 3. 5, 4. 5 and 5. GSM, iLBC and SPEEX codec show the increasing of VoIP performance after i mplemented SRTP (refer to Figure 3. 8). VoIP Conversation over One-to-One Call: Before implemented SRTP, the average MOS score for G. 711 is 1. , 1. 4 for G. 726, 1. 8 for GSM, 3. 5 for iLBC and 4. 2 for SPEEX. After implemented SRTP, the average MOS score shows the significant improvement for G. 711, G. 726, GSM, iLBC and SPEEX codecs. Therefore, implementation of SRTP can improve the VoIP quality performance for one-to-one call over WLAN (refer to Figure 3. 9). Figure 3. 6: Users Rate VoIP for One-to-One Call without SRTP ISSN : 0975-3397 901 Mohd Nazri Ismail / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 898-902 dependency conditions that could influence voice quality.Future work, we will extend our experiment on VoIP over VPN implementation in Campus environment. References [1]. Moura N. T. ; Vianna B. A. ; Albuquergue C. V. N; Rebello V. E. F & Boeres C. ââ¬Å"MOS-Based Rate Adaption for VoIP Sourcesâ⬠. IEEE International Confe rence on Communication, pp. 628-633, 2007. [2]. Masuda M. & Ori K. ââ¬Å"Delay Variation Metrics for Speech Quality Estimation of VoIPâ⬠. Institute of Electronics, Information and Communication Engineers (IEIC) Technical Report, Vol. 101(11), pp. 101-106, 2001. [3]. R. G. Cole & J. H. Rosenbluth. ââ¬Å"Voice over IP Performance Monitoringâ⬠. SIGCOMM Computer Communication Rev.Vol. 31(2), pp. 9-24, 2001. [4]. L. Ding & R. Goubran. ââ¬Å"Speech Quality Prediction in VoIP Using the Extended e-Model. Global Telecommunication Conference, GLOBECOM ââ¬â¢03. IEEE, Vol. 7, pp. 3974-3978, 2003. [5]. Alexandre P. ; Edjair M. ; & Edjard M. ââ¬Å"Analysis of the Secure RTP Protocol on Voice over Wireless Networks using Extended MedQoSâ⬠. Proceedings of the 2009 ACM symposium on Applied Computing, pp. 86 ââ¬â 87, 2009. [6]. M. Baugher, D. McGrew, M. Naslund, E. Carrara, & K. Norrman. ââ¬Å"The Secure Real- Time Transport Protocol (SRTP)â⬠. RFC 3711 (Proposed Standa rd), March 2004. [7] Douglas C. Sicker & Tom L. VoIP Security: Not an Afterthoughtâ⬠, FEATURE: Q focus: Voice Over IP, Vol. 2(6), pp. 56-64, 2004. [8] Vesselin I. , Theodor T. , & Amdt T. ââ¬Å"Experiences in VoIP telephone network security policy at the University of Applied Sciences (FHTW) Berlinâ⬠, Proceedings of the 2007 international conference on Computer systems and technologies, Bulgaria, Vol. 285(3), 2007. [9] Wafaa B. D. , Samir T. , & Carole B. ââ¬Å"Critical vpn security analysis and new approach for securing voip communications over vpn networksâ⬠, Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modelling,Chania, Crete Island, Greece, pp. 2-96, 2007. [10] Nekita A. C. , & Chhabria S. A. ââ¬Å"Multiple design patterns for voice over IP securityâ⬠, Proceedings of the International Conference on Advances in Computing, Communication and Control, Mumbai, India, pp. 530 ââ¬â 534, 2009. Figure 3. 8: VoIP Conversa tion over Multi Conference Call over WLAN Figure 3. 9: VoIP Conversation over One-to-One Call over WLAN IV. CONCLUSION AND FUTURE WORK Based on the results, implementation of SRTP using GSM, iLBC and SPEEX codecs are able to generate high quality of VoIP conversation WLAN for one-to-one conversation and multi conference call (many-to-many).After implemented SRTP for multi conference call (many-to-many), the MOS result indicates that G. 711 and G. 726 codec will decrease the performance of VoIP conversation over WLAN. Overall of our finding, it confirms that enable SRTP will improve and increase the quality of one-to-one VoIP conversation and VoIP over multi conference call (only for iLBC, GSM and SPEEX codecs). Since the manual/human MOS tests are quite subjective and less than productive in many ways, there are nowadays a number of software tools that carry out automated MOS testing in a VoIP deployment.Although they lack the human touch, the good thing with these tests is that the y take into account all the network ISSN : 0975-3397 902 Copyright of International Journal on Computer Science & Engineering is the property of Engg Journals Publications and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.
Subscribe to:
Posts (Atom)