Tuesday, December 31, 2019

Examine the Causes of World War II

Many of the seeds of World War II in Europe were sown by the Treaty of Versailles that ended World War I. In its final form, the treaty placed full blame for the war on Germany and Austria-Hungary, as well as exacted harsh financial reparations and led to territorial dismemberment. For the German people, who had believed that the armistice had been agreed to based on US President Woodrow Wilsons lenient Fourteen Points, the treaty caused resentment and a deep mistrust of their new government, the Weimar Republic. The need to pay war reparations, coupled with the instability of the government, contributed to massive hyperinflation which crippled the German economy. This situation was made worse by the onset of the Great Depression. In addition to the economic ramifications of the treaty, Germany was required to demilitarize the Rhineland and had severe limitations placed on the size of its military, including the abolishment of its air force. Territorially, Germany was stripped of its colonies and forfeited land for the formation of the country of Poland. To ensure that Germany would not expand, the treaty forbade the annexation of Austria, Poland, and Czechoslovakia. Rise of Fascism and the Nazi Party In 1922, Benito Mussolini and the Fascist Party rose to power in Italy. Believing in a strong central government and strict control of industry and the people, Fascism was a reaction to the perceived failure of free market economics and a deep fear of communism. Highly militaristic, Fascism also was driven by a sense of belligerent nationalism that encouraged conflict as a means of social improvement. By 1935, Mussolini was able to make himself the dictator of Italy and transformed the country into a police state. To the north in Germany, Fascism was embraced by the National Socialist German Workers Party, also known as the Nazis. Swiftly rising to power in the late 1920s, the Nazis and their charismatic leader, Adolf Hitler, followed the central tenets of Fascism while also advocating for the racial purity of the German people and additional German Lebensraum (living space). Playing on the economic distress in Weimar Germany and backed by their Brown Shirts militia, the Nazis became a political force. On January 30, 1933, Hitler was placed in a position to take power when he was appointed Reich Chancellor by President Paul von Hindenburg The Nazis Assume Power A month after Hitler assumed the Chancellorship, the Reichstag building burned. Blaming the fire on the Communist Party of Germany, Hitler used the incident as an excuse to ban those political parties that opposed Nazi policies. On March 23, 1933, the Nazis essentially took control of the government by passing the Enabling Acts. Meant to be an emergency measure, the acts gave the cabinet (and Hitler) the power to pass legislation without the approval of the Reichstag. Hitler next moved to consolidate his power and executed a purge of the party (The Night of the Long Knives) to eliminate those who could threaten his position. With his internal foes in check, Hitler began the persecution of those who were deemed racial enemies of the state. In September 1935, he passed the Nuremburg Laws which stripped Jews of their citizenship and forbade marriage or sexual relations between a Jew and an Aryan. Three years later the first pogrom began (Night of Broken Glass) in which over one hundred Jews were killed and 30,000 arrested and sent to concentration camps. Germany Remilitarizes On March 16, 1935, in clear violation of the Treaty of Versailles, Hitler ordered the remilitarization of Germany, including the reactivation of the Luftwaffe (air force). As the German army grew through conscription, the other European powers voiced minimal protest as they were more concerned with enforcing the economic aspects of the treaty. In a move that tacitly endorsed Hitlers violation of the treaty, Great Britain signed the Anglo-German Naval Agreement in 1935, which allowed Germany to build a fleet one third the size of the Royal Navy and ended British naval operations in the Baltic. Two years after beginning the expansion of the military, Hitler further violated the treaty by ordering the reoccupation of the Rhineland by the German Army. Proceeding cautiously, Hitler issued orders that the German troops should withdrawal if the French intervened. Not wanting to become involved in another major war, Britain and France avoided intervening and sought a resolution, with little success, through the League of Nations. After the war several German officers indicated that if the reoccupation of the Rhineland had been opposed, it would have meant the end of Hitlers regime. The Anschluss Emboldened by Great Britain and Frances reaction to the Rhineland, Hitler began to move forward with a plan to unite all German-speaking peoples under one Greater German regime. Again operating in violation of the Treaty of Versailles, Hitler made overtures regarding the annexation of Austria. While these were generally rebuffed by the government in Vienna, Hitler was able to orchestrate a coup by the Austrian Nazi Party on March 11, 1938, one day before a planned plebiscite on the issue. The next day, German troops crossed the border to enforce the Anschluss (annexation). A month later the Nazis held a plebiscite on the issue and received 99.73% of the vote. International reaction was again mild, with Great Britain and France issuing protests, but still showing that they were unwilling to take military action. The Munich Conference With Austria in his grasp, Hitler turned towards the ethnically German Sudetenland region of Czechoslovakia. Since its formation at the end of World War I, Czechoslovakia had been wary of possible German advances. To counter this, they had built an elaborate system of fortifications throughout the mountains of the Sudetenland to block any incursion and formed military alliances with France and the Soviet Union. In 1938, Hitler began supporting paramilitary activity and extremist violence in the Sudetenland. Following Czechoslovakias declaration of martial law in the region, Germany immediately demanded that the land be turned over to them. In response, Great Britain and France mobilized their armies for the first time since World War I. As Europe moved towards war, Mussolini suggested a conference to discuss the future of Czechoslovakia. This was agreed to and the meeting opened in September 1938, at Munich. In the negotiations, Great Britain and France, led by Prime Minister Neville Chamberlain and President Édouard Daladier respectively, followed a policy of appeasement and caved to Hitlers demands in order to avoid war. Signed on September 30, 1938, the Munich Agreement turned over the Sudetenland to Germany in exchange for Germanys promise to make no additional territorial demands. The Czechs, who had not been invited to conference, were forced to accept the agreement and were warned that if they failed to comply, they would be responsible for any war that resulted. By signing the agreement, the French defaulted on their treaty obligations to Czechoslovakia. Returning to England, Chamberlain claimed to have achieved peace for our time. The following March, German troops broke the agreement and seized the remainder of Czechoslovakia. Shortly thereafter, Germany entered into a military alliance with Mussolinis Italy. The Molotov-Ribbentrop Pact Angered by what he saw as the Western Powers colluding to give Czechoslovakia to Hitler, Josef Stalin worried that a similar thing could occur with the Soviet Union. Though wary, Stalin entered into talks with Britain and France regarding a potential alliance. In the summer of 1939, with the talks stalling, the Soviets began discussions with Nazi Germany regarding the creation of a  non-aggression pact. The final document, the Molotov-Ribbentrop Pact, was signed on August 23, and called for the sale of food and oil to Germany and mutual non-aggression. Also included in the pact were secret clauses dividing Eastern Europe into spheres of influence as well as plans for the partition of Poland. The Invasion of Poland Since  World War I, tensions had existed between Germany and Poland regarding the free city of Danzig and the Polish Corridor. The latter was a narrow strip of land reaching north to Danzig which provided Poland with access to the sea and separated the province of East Prussia from the rest of Germany. In an effort to resolve these issues and gain  Lebensraum  for the German people, Hitler began planning the invasion of Poland. Formed after World War I, Polands army was relatively weak and ill-equipped compared to Germany. To aid in its defense, Poland had formed military alliances with Great Britain and France. Massing their armies along the Polish border, the Germans staged a fake Polish attack on August 31, 1939. Using this as a pretext for war, German forces flooded across the border the next day. On September 3, Great Britain and France issued an ultimatum to Germany to end the fighting. When no reply was received, both nations declared war. In Poland, German troops executed a blitzkrieg (lightning war) assault combining armor and mechanized infantry. This was supported from above by the Luftwaffe, which had gained experience fighting with the fascist Nationalists during the Spanish Civil War (1936-1939). The Poles attempted to counterattack but were defeated at the Battle of Bzura (Sept. 9-19). As the fighting was ending at Bzura, the Soviets, acting on the terms of the Molotov-Ribbentrop Pact, invaded from the east. Under assault from two directions, the Polish defenses crumbled with only isolated cities and areas offering prolonged resistance. By October 1, the country had been completely overrun with some Polish units escaping to Hungary and Romania. During the campaign, Great Britain and France, who were both slow to mobilize, provided little support to their ally. With the conquest of Poland, the Germans implemented Operation Tannenberg which called for the arrest, detainment, and execution of 61,000 Polish activists, former officers, actors, and intelligentsia. By the end of September, special units known as  Einsatzgruppen  had killed over 20,000 Poles. In the east, the Soviets also committed numerous atrocities, including the murder of prisoners of war, as they advanced. The following year, the Soviets executed between 15,000-22,000 Polish POWs and citizens in the  Katyn Forest  on Stalins orders.

Sunday, December 22, 2019

Comparing The Ideas Of Edwin Sutherland - 1257 Words

Comparing the ideas of Edwin Sutherland from his 1940 publication of White-Collar Criminality with attitudes towards crime in the world today, specifically in George Ritzer’s Essentials of Sociology textbook, I believe that Sutherland would be fairly happy with the treatment of crime. The textbook’s treatment of the topic of crime aligns very well with Sutherland’s outlook. Ideas of crime seemed to be treated fairly in the text, avoiding the classic pitfalls of saying that crime is always associated with lower class sectors. With every mention of low social class and its positive correlation with crime, the book seems to come right back and explain the same thought another way. I think Sutherland would appreciate this attempt at teaching†¦show more content†¦131). This is such a true observation of crime and deviance in our society. Deviances are defined by an extremely biased subset of people. Those that create easily breakable laws are the same ones that will never find themselves in the situation where they need to break these laws. The same idea can be seen in some cities of the world today where a fine can be imposed on someone for sleeping on the street. Those who want people off the streets are the same people that will never foreseeably find themselves without a home to return to. As far as Sutherland’s possible opinion on how criminology has progressed since his time, I believe that he would be pleased in some areas and disappointed in others. Since Sutherland’s time, there has been a wider spread of accessible knowledge via technology. This increased ability for news to travel connects our world in ways that Sutherland never saw. This could have aided Sutherland’s view towards white-collar crime in the fact that when a white-collar crime is committed and found out today, there is little stopping that story from getting out. White collar crimes, when found out and prosecuted, are tremendous news stories. People can’t help but spread the news of a successful business man or CEO being caught red handed. And when these stories get out, they spread, and their negative views on white-collar crime spread too. Middle and lower class people seem to instantly rally against any successful businessman or person ofShow MoreRelatedThe Strengths Of Labelling Theory And Differential Association Theory1703 Words   |  7 Pagestheory of Differential Association by Edwin H. Sutherland falls under the tradition of the Chicago school of Criminology. Sutherland’s theory seeks to explain how the transmission of criminal values occurs. He described a constant battle between two cultures, one which contains negative definitions and values of criminal behaviour and one which contains positive definitions and values of criminal behaviour(Lilly, Cullen, and Bali. 2015). According to Sutherland, depending on the ind ividual’s exposureRead MoreHow do Differential Association Theories best Demonstrate that Criminal Behaviour is a ‘Learned Behaviour’1007 Words   |  5 Pagesdefinitions favourable to violation of law over definitions unfavourable to violation of law. Meaning, criminal behaviour appears when one is exposed to more social message favouring conduct than pro-social messages (Sutherland, 1947). Differential association theory can be understood as comparing two important dimensions. The initial dimension is behavioural- interaction and explains deviance as being produced through â€Å"direct association and interaction with others who engaged in certain kind of behaviourRead MoreThe Social And Emotional Development Of An Adolescent Essay1919 Words   |  8 Pagesgiven time. Dr. Anderson also accounted for things such as racial discrimination and the unemployment rate within these neighborhoods (Anderson, Holder, Robinson, Rose, 2009). At the conclusion of the study, the researcher’s results supported the idea that the environments adolescents are surrounded by have a direct impact on their own personal lifestyle. Many households were found to lack appropriate parenting styles and were categorized as being verbally and emotionally abusive. On a slightlyRead MoreEssay on The Rich Get Richer and the Poor Get Prison12486 Words   |  50 Pagesnot make up the majority of the inmates in our jails and prisons, they make up a proportion that far outstrips their proportion in the population.2 Here, too, the image we see is distorted by the processes of the criminal justice system itself. Edwin Sutherland and Donald Cressey write in their widely used textbook Criminology that Numerous studies have shown that African-Americans are more likely to be arrested, indicted, convicted, and committed to an institution than are whites who commit the sameRead MoreElectronic Media vs Print (Thesis Paper)13276 Words   |  54 Pages ââ€" ª Primary research has been conducted through a multiple choice/’yes’ and ‘no’ survey submitted to individuals in the general public as well as students in the MEDC 6000 class. I’ve used a multiple choice/’yes’ and ‘no’ survey to gain a general idea about the preference people have between media and print communication. This general data has served to lend credence to my secondary research focusing on society’s partiality of media over print as their primary source for information. ââ€" ª Secondary

Saturday, December 14, 2019

Product Line Study of Wockhardt Hospital by Shezah Salam Free Essays

string(40) " Birmingham of metal on metal implants\." About Wockhardt Hospital Group Wockhardt hospital, a subsidiary of Wockhardt ltd. , is India’s leading super specialty hospital chain with branches in Mumbai, Bangalore, Hyderabad, Kolkata, Nagpur, Nasik, Surat , Rajkot, Kalyan and Bhavnagar. As associate hospitals of Harvard Medical, USA in India, Wockhardt hospitals benefit from the extensive learning and experience of Harvard Medical School and its affiliated institutions world-wide. We will write a custom essay sample on Product Line Study of Wockhardt Hospital by Shezah Salam or any similar topic only for you Order Now This association helps Wockhardt Hospitals to stay at the forefront of medical technology and techniques, way ahead of others. Wockhardt Hospitals, Mumbai, has become the first superspeciality hospital in South Asia to achieve accreditation from Joint Commission International (JCI), USA. JCI is the gold standard in global healthcare standards. With this, Wockhardt Hospitals joins an exclusive group of 71 hospitals worldwide, which have passed JCI’s stringent clinical quality standards. Their dedication to build a patient driven environment through the creation and exchange of knowledge is the decisive factor for their success. They constantly strive to upgrade the knowledge and competence of our human resources by constantly training with methodologies that meet global standards. Members of their medical team extensively travel to some of the best healthcare centers and teaching Institutions across the world to update their knowledge and acquire new competencies to hone their skills. The quality of healthcare services at their group hospitals in India is at par with the best centres anywhere in the world at a fraction of the cost in US, UK and Canada. Core Competencies Being a Specialty hospital, Wockardt’s core competencies lie in the following fields: †¢ Neurology and Neurosurgery †¢ Heart and cardiac care †¢ Cardio Thoracic and Vascular surgery †¢ Orthopedics and Joint Replacements †¢ Minimal Invasive surgery Wockhardt Product Line Based on the core competencies of the hospital, Wockhardt Hospitals offers the following highly specialized services known as their ‘centers of excellence’: 1. Wockhardt Heart –Care A center for excellence in interventional Cardiology and Cardiac Surgeries in the country, it has to its name a history of path-breaking procedures, be it the first-ever Conscious Off Pump Coronary Artery Bypass Surgery and Awake Heart Surgery in India. Collectively Wockhardt group hospitals have now have tremendous experience of performing over 40000 Cardiac Surgeries and 75000 interventional cardiology procedures since its inception The same expertise and care is now available across various cities of India where Wockhardt Superspecialty Hospitals have been set up and each one of them have a Wockhardt Heart Care. These heart care are also a teaching center for clinicians from the sub-continent and now a preferred destination for cardiac patients not only from India but also from all over the US, UK, Canada, Middle East and Africas. According to the Wockhardt heart care philosophy, a life isn’t saved until it is fully redeemed. Which means that anyone who comes in with a heart ailment, is not healed until they go back to their normal life, exactly like it was before. This is why Wockhardt treats surgery as just another stepping stone in the complete healing process. Their post operative facilities stand testimony to this belief. Their advanced rehabilitative care included dedicated nutritionists, dieticians, fitness equipment, counselors and our infection control policies; just a few initiatives that see you through the road to recovery. 2. Wockhardt Brain and Spine Care Wockhardt Brain Spine specialties in Bangalore and Mumbai provides advanced micro-surgical techniques to treat complex Brain Spine disorders. This super specialty center is amongst the few in Asia equipped with most advanced Neuro-navigation and Endoscopic facilities to perform complex brain and spine neurosurgeries. Wockhardt Brain Spine Care has a vastly experienced team of Neurosurgeons and Neurologists, backed by the most comprehensive neuro-diagnostic and imaging facilities, positions the hospital among the best in the region. Neurological services extend to the very latest in diagnostic equipment such as EEG, ENMG, and Video-monitoring, 1. 5 Tesla MRI and 64-Slice CT Scan. 3. Bone and Joint Center The Wockhardt Bone joint Care has evolved as the Centre of Excellence for joint replacement surgeries and is equipped to treat all types of musculo-skeletal problems ranging from surgeries to minimally invasive Arthroscopic surgeries. The Wockhardt Bone and Joint Care is equipped to treat all types of musculo-skeletal problems ranging from Trauma Surgery to Minimally Invasive Arthroscopy Surgery. The hospital also specilalises in surgery for joint replacements, sports medicine, ligament repair, knee surgery, spine surgery and physical therapy for rehabilitation. Wockhardt Bone Joint Care has complete technology and advanced skills to perform Microscopic Lumber Cervical Discectomy, Endo-scopic Spine Surgery and Arthroscopic surgeries such as Ligament Reconstruction in the knee, Subacromial Decom-pression in the shoulder. 4. Minimal Access Surgery The Wockhart Minimal Access Surgery Hospital is equipped with High-end technology to perform precision surgery in this newly developed modality of surgical treatment, which until recently required large incisions on the human body. It encompasses operative procedures for the nervous system, ENT, thorax, abdomen, urinary tract, reproductive system and joints. This technology not only minimises surgical trauma, pain and blood loss but also shortens hospitalisation and improves aesthetics. Traditionally surgeons had to cut wide and deep (Incision) to reach (Access) organs for large incisions caused pain, were prone to infections/ hernia and often rendered poor cosmetic results. These factors were the underlying cause of significant mortality and morbidity. Minimal Access Surgery (MAS) makes it possible for surgeons to reach (Access) various organs in the body cavities through small incisions (Minimal). Wockhardt Minimal Access Surgery Hospital has acquired complete State-of –the-art range of endoscopic technology required for carrying our minimal access surgery. These include: Endovision Tricam SL, Harmonic Scalpel, Medical grade monitor, CO2 Insufflator and a wide range of high precision instruments. 5. Hip-resurfacing centre Wockhardt provides high quality and cost effective hip replacement surgery services. Their Minimally Invasive Hip Resurfacing/ Replacement Surgery: Removes only unhealthy bone and replaces it with a metal on metal articulation. †¢ It preserves the normal bone of the hip – patients can squat, sit cross-legged without the risk of dislocation. †¢ Everlasting – based on 35-year history in Birmingham of metal on metal implants. You read "Product Line Study of Wockhardt Hospital by Shezah Salam" in category "Papers" †¢ Excellent restoration of full function. †¢ Femoral head remains viable after BHR surgery. It does not sacrifice normal bone during primary surgery. †¢ Activity restriction not required after surgery, as there is hardly any risk of dislocation. Patient can indulge in full sporting activities without risk of dislocation. Patients have gone back to sports like competitive Judo and Squash after surgery. †¢ Overall 99% success rate – ideal option for the younger or more active patient 6. Women Care Wockhardt Hospitals Woman Care program is a culmination of strengths derived from our association with HMI, and conceptualized in line with the world renowned Harvard associated Brigham Women’s Hospital. A 30, 000 sq ft area is exclusively dedicated to Woman care with consultation suites, delivery rooms, operating rooms, dedicated to obstetrics, a 12-bed neo-natal ICU a nursery. Our Woman health care programmes, besides minimal access gynaecological services, also include preventive clinics (early diagnosis of breast, uterine, ovarian and cervical cancer), Infertility clinics Menopausal clinics. Other services offered by Wockhardt: †¢ Liver Transplant and Digestive Diseases †¢ Joint Replacements †¢ Women and Child Care †¢ Trans Nasal Brain Tumor Surgery †¢ Urology and Andrology †¢ Obesity Surgery †¢ Dental Care †¢ Surgical Oncology †¢ Parkinson’s Disease Surgery Product Mix |Heart Care |Brain and Spine | |A. CARDIO – THORACIC AND VASCULAR SURGERIES |Spinal Surgeries | | |[pic] | | |Microscopic lumbar discectomy or decompression | | | | |[pic] |[pic] | |Beating Heart Bypass Surgery (Off – Pump Coronary|Microscopic anterior cervical discectomy | |Bypass Surgery) | | |[pic] | |[pic] |Endoscopic discectomy | |Conscious Off Pump Coronary Artery Bypass Surgery| | |- COPCAB (Awake Coronary Artery Bypass Surgery |[pic] | |-ACAB) |Spinal decompression with or without fusion | | | | |[pic] |[pic] | |On-Pump Coronary Artery Bypass Surgery |Endoscopic fusion of spine | | | | |[pic] |[pic] | |Redo Bypass Surgery |Percutaneous Endoscopic Lumbar Discectomy | | | | |[pic] |Degenerative Disc Disease | |Valve Surgery |[pic] | | |Minimally-invasive spinal fusion and advanced instrumentation | |[pic] | | |MVR with Correction of Atrial fibrillation using |[pic] | |Maze III Procedure |Total disc replacement surgery | | | | |[pic] |[pic] |Vascular Surgery |Spinal deformity corr ection and stabilization | | | | |[pic] |[pic] | |Thoracic Pulmonary Surgeries |Endoscopic fusion of spine | | | | |[pic] |[pic] | |Adult Paediatric Open Heart Surgeries |Percutaneous Endoscopic Lumbar Discectomy | | | | | |Osteoporosis of the spine | | |[pic] | | |Vertebroplasty | | | | |B. INTERVENTIONAL CARDIOLOGY PROCEDURES |[pic] | | |Kyphoplasty | | | | | |[pic] | |[pic] |Spondylolisthesis | |Coronary Angiography Angioplasty (both Femoral | | | Radial Approach) |[pic] | | Posterior spinal instrumentation | |[pic] | | |Angiogram Angioplasty of arteries of Neck, Leg |Abnormal curvature within the spine-scoliosis | |, Arm, Kidney | | | | | |[pic] |[pic] | |Permanent pacemaker (Single Double Chamber) |Thoracoscopic deformity correction | | | | |[pic] |[pic] | |Valvuloplasty |Posterior correction of Scoliosis or Kyphosis with instrumentation | | | | |[pic] | | |EP Study Diagnostic Ablation | | | |Other spine surgeries | |[pic] |[pic] | |ASD closure with device |Tuberculosis of Spine – Thoracoscopic Spinal Surgery with Para spinal abscess | | |drainage | | | | | |[pic] | | |Spine Tumor Surgery | | | | |C. CARDIAC REHABILITATION PROGRAMME |[pic] | | |Spine Trauma | | | | | |Brain surgeries | | |[pic] | | |Microsurgery for Brain Tumors | | | | | |[pic] | | |Endoscopic Brain Surgery | | | | | |[pic] | | |Trans Nasal Endoscopic Brain Tumor Removal | | | | | |[pic] | | |Skull Base Surgery | | | | | |[pic] | | |Brain Trauma Surgery | | | | |[pic] | | |Congenital Cranial Deformity | | | | | |[pic] | | |Stereotactic Brain Surgery for Tumor and Functional Neurosurgery | | | | | |[pic] | | |Craniofacial Surgery with FMS (Facio-Maxillary Surgery) | | | | | |[pic] | | |Brain Surgery for Abnormal Blood Vessels | | | | | |[pic] | | |Brain Surgery for Epilepsy | | | | | |[pic] | | |Brain Surgery for Removal of Blood Clots | | | | | |[pic] | | |Interventional/ Neuro-endovascular Therapy for Cerebro-vascular Diseases and Tumor| | | | | |[pic] | | |Interventional/ Neuro-endovascular Therapy for Cerebro-vascular Diseases and Tumor| | | | Product Mix (contd. ) Bone and join t care |Minimal access surgery |Women Care |Hip Replacement |Other Specialties | |Arthroscopic surgery:Key hole | |The NEST – Bithing Services |Minimally invasive hip |Liver Transplant and | |surgery for disorders of knee and | | |replacement surgery |Digestive Diseases | |shoulder |[pic] |LDRP birthing suites, Private | | | |Minimal Access Spine surgery |DIAGNOSTIC ENDOSCOPY |deluxe, Twin-deluxe and multi-bed | |Joint Replacements | |Hip Resurfacing | |Painless deliveries | | | |Paediatric Bone Joint Surgeries |[pic] |Management of high risk | |Women and Child Care | |Fracture Treatment |Upper GI Scopy |pregnancies/Late pregnancies | | | |Sports Medicine | |The Lamaze Classes | |Trans Nasal Brain Tumor| |Speciality Clinic for Arthritis |[pic] |Ante-natal classes | |Surgery | |Trauma Pain Management |Colonoscopy | | | | |Osteoporosis | |Clinics | |Urology nd Andrology | |Lifestyle Modification Programme |[pic] | | | | |(Rehabilitation) |ERCP |Menopause Clinic | |Obesity Sur gery | |Patient Education Programme | |Infertility Clinic | | | |Total Knee Replacement |[pic] |Adolescent Clinic | |Dental Care | |Unicondylar Knee Replacement |Bronchoscopy | | | | |Total Hip Replacement | |Minimal Access Gynaecological | |Surgical Oncology | |Hip Resurfacing / Surface | |Surgeries | | | |Replacement Arthroplasty | | | |Parkinson’s Disease | |Shoulder Replacement |[pic] |Laproscopic hysterectomy | |Surgery | |Neck Elbow Replacement |EMERGENCY LAPAROSCOPY |Laproscopic tubectomy | | | | | |Laproscopic overectomy | | | | |[pic] | | | | | |LAPAROSCOPIC PROCEDURES |Operative Gynaecological Surgeries | | | | | | | | | | |[pic] |Hyserectomy | | | | |Hernia procedures |Ovarian cysts | | | | | |Malignancies | | | | |[pic] Surgeries on the fallopian tube | | | | |Gallbladder stones and liver |Removal of fibroids | | | | |procedures: | | | | | | | | | | | |[pic] | | | | | |Procedures on esophagus/ | | | | | |myotomy | | | | | | | | | | | |[pic] | | | | | |Nissen fund oplication | | | | | | | | | | | |[pic] | | | | | |Procedures on the stomach | | | | | |cancer | | | | | | | | | | | |[pic] | | | | | |Procedures on the small | | | | | |intestine | | | | | | | | | | |[pic] | | | | | |Procedures on pancreas | | | | | | | | | | | |[pic] | | | | | |Procedures on other organs | | | | | | | | | | | |[pic] | | | | | |Hepatic Resection for | | | | | |Malignant Liver | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |[pic] | | | | | |VIDEO ASSISTED THORACIC | | | | |SURGERY | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |[pic] | | | | | |LAPAROSCOPIC COLONIC | | | | | |CANCER/RECTAL CANCER SURGERY | | | | | | | | | | Product Hierarchy Product analysis: Wockhardt Heart Care With its latest technological advances and ethical management practices Wockhardt pledges to provide international standard cardiac care to its patients. Wockhardt Heart Care, with the best Cardiac Surgeons, Cardiologist Medical Staff delivers world standard heart care with the highest degree of convenience, care and compassion at a reasonable cost. ore Branding Strategy: â€Å"Heart is Wockhardt† is how Wockhardt Hospital and Heart Institute has come to be known as since the past 17 years. A center for excellence in interventional Cardiology and Cardiac Surgeries in the country, it has to its name a history of path-breaking procedures, be it the first-ever Conscious Off Pump Coronary Artery Bypass Surgery and Awake Heart Surgery in India. The Wockhardt branding strategy concentrates on depicting an image of overall heart care. According to the Wockhardt philosophy a life isn’t saved until it’s completely redeemed. This is why they treat surgery as just another stepping stone in the complete healing process. Another facet in the 360 degree care they offer. Pricing Startegy: With Wockhardt Hospitals, even the most cost-sensitive traveler can get the best and most specialized services and luxury amenities. Procedure / Treatment |Wockhardt Hospitals, India ($) |USA ($) |UK (GBP) | |Open Heart |8,500 |100,000 |20,000 | |Surgery (CABG) | | | | |Total Knee |7,000 |48,000 |15,000 | |Replacement | | | | |Hip Resurfacing |8,500 |55,000 |15,000 | |LA Hysterectomy |4 ,500 |22,000 |6,000 | |Lap Cholcystectomy |4,500 |18,000 |4,000 | |Spinal Decompression Fusion |8,500 |60,000 |32,100 | |Obesity Surgery |9,800 |65,000 |12,000 | |(Gastric Bypass) | | | | Product Level [pic] Points of Parity of Wockhardt heart care and other hospital chains †¢ Well experienced doctors †¢ Latest technology †¢ Luxurious Ambience †¢ Large variety of surgeries Points of Difference of Wockhardt Heart Care and other Hospital Chains †¢ Rehabilitation Centers (Including dietician, gyms, etc. ) †¢ Greater heart surgery specialties †¢ Tie up with Harvard Medical Association †¢ World Class Services and Facilities †¢ Joint Commision International Accreditation †¢ Ground Breaking Medical Breakthroughs: The Four Prong Strategy: Nobody wanted to treat a 12 year old girl with a congenital cardiac defect of criss-crossed ventricles and arteries. Medication could only do so much and a temporary fix of the valves would only buy time. T he team at Wockhardt Hospitals wanted more for the girl; we wanted to give her a normal life of a 12 year old. It took a whole year of tests and scans and 4 high risks surgeries to re-arrange the girls heart; but it the end we challenged the odds and emerged successful. o The Radio Maze Therapy: Heart specialists at Wockhardt have found an extremely advantageous procedure surgical procedure which will offer a permanent solution during atrial fibrillation – An abnormal fast beating of the heart caused by disturbed electrical discharges. The surgery uses the technique of irrigated radio frequency modified maze procedure, which is performed to treat atrial fibrillation along with an open heart surgery for valve replacement. o Wake-up to a new world: A 78 year old patient walked into Wockhardt Hospitals with chest pain. An emergency angiogram indicated the urgent need for a bypass. The problem ? He was a smoker and affected lungs meant that he could not tolerate general anaesthesia. And he had other complications, like diabetes and renal problems which eliminated heart lung machines. In most other hospitals, this would have been the end of the story. But our team came up with a medical plan to perform a minimally invasive coronary bypass without general anaesthesia or a ventilator support, using the technique called high epidural analgesia. The operation lasted 45 minutes and was a success, and the patient was awake all through. o The Brains behind the heart: A 22 year old was brought to Wockhardt Hospitals with a rare condition. He has a cancerous tumour in his heart. Something that is normally found in the brain. A condition like this is so rare that there isn’t even enough medical literature about it. But that didn’t stop our team. In an epic surgery that lasted longer than 6 hours, they successfully removed the tumour and literally rebuild a large part of his heart. o The 900gm Miracle: Most hospitals wouldn’t operate on Jonathan. He was four months old and weighed 900grams. He was almost the size of a palm. Jonathan’s heart was just one-inch–long and had a one –centimetre fungal mass in the right chamber, which had infected his blood. An open heart surgery was his only chance of survival, but was risky, considering his loss of weight. A risk that most hospitals were not willing to take. They wanted to wait till Jonathan gained more weight, which meant they needed more time. Time is what he did not have. But the team at Wockhardt had belief. Belief in their skills and belief that they would save Jonathan’s life. The six hour surgery was a success. Jonathan was reborn. ———————– Marketing Management: A product line study of Study by Shezah Salam Roll no: 2120 How to cite Product Line Study of Wockhardt Hospital by Shezah Salam, Papers

Friday, December 6, 2019

Gay Marriages Essay Research Paper The constitution free essay sample

Gay Marriages Essay, Research Paper The fundamental law states that all work forces are created equal. If this is true, so why is at that place so much contention affecting a individual # 8217 ; s sexual penchant? Martin Luther King said it best when he stated that everyone has a dream. Why so rain on person # 8217 ; s dream when all they want to make is love each other? Homosexuals are contending for what they deserve: the freedom that every citizen has the right to love whoever they want to. Let us discourse what cheery relationships are truly all about. The stereotype has it that homosexualism is merely approximately # 8220 ; dirty # 8221 ; sex. On the other manus, homosexualism is simply a penchant and much more about love and fondness. All relationships, including cheery 1s, are based on common attractive force, love and fondness. Peoples in love get married everyday so what injury is done to society if a jurisprudence is passed legalising same sex matrimonies? I say allow them take their lives how they see fit. We will write a custom essay sample on Gay Marriages Essay Research Paper The constitution or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page People # 8217 ; s stereotypes and society # 8217 ; s hypocritical positions on people all affect the homosexual community in making their ends. Peoples are unreal when the subject of homosexualism is concerned. Normal society will state they are in favour of equal rights for homophiles, but when speaking about same sex matrimony, the society does non hold with that. Statisticss show that about three in four people are against cheery matrimonies. The ground for that is that normal persons do non cognize what the significance of homosexualism is. The different definitions of what matrimony should be struggle between homophiles and straight persons. Peoples oppose cheery matrimonies because it is based on the premise that homosexuals have a pick in who they can experience attracted to, but world is different. Many people believe that homosexuals could take to be heterosexual if they truly wanted to. But in kernel, most homophiles do non hold a pick. Gay twosomes are capable of loving kids as consecutive twosomes. Although, society does non accept the thought of homosexual twosomes raising kids. I do non understand why that would be a job. The ground being that scientific surveies have shown kids raised with normal parents and homosexual parents are the same. Psychologists tell us that what makes the difference is the love given from the parents, non the gender. It is fact that many homosexuals twosomes raise adopted kids and with every bit much love and attention as a heterosexual twosome would raise their kids. Additionally, many people believe that homosexualism in general is merely about sex but it is more than that. Homosexual matrimonies should non hold any consequence on homophiles today. Homosexuals do non trouble oneself anyone and maintain to themselves. Logically, no injury is done in our society because they lead their ain private lives. Gay communities are built to assist each other and to back up the rights of homophiles when they are being threatened. They want to hold the same rights as straight persons have so they can populate their lives peacefully and fruitfully in society. As I can see today, homophiles are harmless people, extremely educated and progressive in the humanistic disciplines and concern. Since they can gain a life for themselves, and demo love to one another, authorities should esteem their picks and human rights. The homosexual community is unafraid. They are unafraid because they have fought so many conflicts in clang between homophobic people and themselves. Peoples are non really open minded when it comes to the homosexual community. They fear that homophiles will pervert them in some manner or are unsafe to their kids. These thoughts are all portion of society # 8217 ; s deceptive positions. Not merely are homophiles looked down upon because of their sexual penchant, but besides the favoritism is worse when minorities are involved. By and large, people should be treated every bit no affair what. The manner you live your personal life is your pick, non the pick of the authorities or society. In the fundamental law, it states that every homo being has the right to privateness. So, why can homosexuals non pattern their ain right for privateness? Why can they non acquire married? Any Jack and Jill on the street can acquire # 8220 ; hitched. # 8221 ; I think it is clip for Jack and Jack to hold a nice ceremonial excessively.

Friday, November 29, 2019

William Shakespeare Argumentative Essay Example For Students

William Shakespeare Argumentative Essay William Shakespeare wrote the play The Taming of the Shrew in the 1590s. In these times it was popular in Elizabethan England to ridicule Catholics. The Italian setting allows the playwright to snipe at Italian Catholics for comic effect. It is a comical play in contrast to a number of Shakespeares other works, which are classed as historical or tragedy. It is a story within a story. The background plot is about a drunken man who is made to believe he is a lord after being thrown out of the pub one night. The second and main story is about the shrew, Katherina. The label of a shrew is given to Katherina because she is constantly nagging and moaning at people in Padua. This connects her with a Shrew because these mammals make a sexual whining noise during the mating season. This is one of the many sexual innuendos we are given throughout the play, making it comical for both an Elizabethan and modern audience. We will write a custom essay on William Shakespeare Argumentative specifically for you for only $16.38 $13.9/page Order now Katherina and Petruchio are newly married, which many characters find shocking as no-one appears to like Katherina. Now Katherina is married her perfect young sister Bianca is free to marry; the agreement with their father was that Katherina had to marry first. Bianca means white in Italian, which has connotations of innocence and purity.  Since the day of their marriage Petruchio has been acting in a strange fashion. Arriving at the wedding extremely late, on a donkey, dressed in rags was not the ideal way to charm his woman. Then he whisks a tired, hungry Katherina off to his home in Verona (miles from Padua) straight after the ceremony. While on route, Grumio has began to tell the other servants back at the house what Katherina is really like. Grumio tells Curtis of Katherinas violent ways Whose hand- she being now at hand- them shalt soon feel. This suggests that Grumio and the other servants are going to be struck by Katherinas wicked hands. The play is quite physical in nature, and violence is often used for comical purposes. Grumio warns the servants of her being in a rotten mood due to her falling from her horse getting very muddy and Petruchio not really showing a care in the world. So Petruchio and Katherina have returned home to Verona, with the servants expecting an unpleasant mistress to return with their master. The servants seem to be wrong, as the Petruchio they used to have a laugh and a joke with had changed, and this fierce woman was fine, in fact the fierce person was Petruchio. As soon as he walked through the door he was moaning; Where be these knaves? A starving Katherina is finally sat at the table ready to eat after her long tiring journey. The food is plated and brought to the table, appearing to be a lovely piece of mutton from Catherines point of view. However, from Petruchios twas burnt and dried away. It was fine but for some reason Petruchio is acting strangely and not allowing Katherina to eat. As the servant clears the meat, Petruchio trips him again making more work for the servants. He is killing her in her own humour (as noted by Peter). Basically Petruchio is doing to others what Katherina used to do to, allowing her to experience the consequences of such actions. Hes giving her a taste of her own medicine. Shakespeare uses juxtaposition here, with Petruchio being kind and considerate to Katherina while he is repeatedly being horrible to the servants. In the process of Petruchio being cruel to the servants, he is also depriving Katherina of vital wants and needs like sleep and food. The way Petruchio acts is unusual and Katherina doesnt seem to like it. She tries to protect the servants patience I pray you begging Petruchio to take it easy on his servants. Now Petruchio has gained power over the shrew, allowing her to appear kind but making her pray for his good will. .u2c711f521233a445a2b4b9e2eb99636b , .u2c711f521233a445a2b4b9e2eb99636b .postImageUrl , .u2c711f521233a445a2b4b9e2eb99636b .centered-text-area { min-height: 80px; position: relative; } .u2c711f521233a445a2b4b9e2eb99636b , .u2c711f521233a445a2b4b9e2eb99636b:hover , .u2c711f521233a445a2b4b9e2eb99636b:visited , .u2c711f521233a445a2b4b9e2eb99636b:active { border:0!important; } .u2c711f521233a445a2b4b9e2eb99636b .clearfix:after { content: ""; display: table; clear: both; } .u2c711f521233a445a2b4b9e2eb99636b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2c711f521233a445a2b4b9e2eb99636b:active , .u2c711f521233a445a2b4b9e2eb99636b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2c711f521233a445a2b4b9e2eb99636b .centered-text-area { width: 100%; position: relative ; } .u2c711f521233a445a2b4b9e2eb99636b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2c711f521233a445a2b4b9e2eb99636b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2c711f521233a445a2b4b9e2eb99636b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2c711f521233a445a2b4b9e2eb99636b:hover .ctaButton { background-color: #34495E!important; } .u2c711f521233a445a2b4b9e2eb99636b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2c711f521233a445a2b4b9e2eb99636b .u2c711f521233a445a2b4b9e2eb99636b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2c711f521233a445a2b4b9e2eb99636b:after { content: ""; display: block; clear: both; } READ: Othello Shakespeare EssayDuring the next section of the play we are given an insight into Petruchios strange ways during a soliloquy. Petruchio reveals to us that he is trying to man his haggard, by trying to tame his wild hawk (Katherina). He refers to His falcon is now passing sharp and empty, which again links his wife to animals. In the Elizabethan chain of being, animals were below the level of humans. He is sort of suggesting she is at the bottom of the natural order acting like an animal and needs to be taught how to become a proper human at the top end of the scale. Petruchio is trying to confuse Katherina and in doing so is making her obey patriarchal society, whe re she needs to obey Petruchio at all times. Also as a soliloquy is just between Petruchio and the audience, it creates dramatic irony. The servants have no idea that Petruchio is trying to do this to tame Katherina. They simply think that their master has changed. One reason I can think for Petruchio not revealing his plan to the servants, is so it looks more realistic. He doesnt want all the servants to be playing along and make it look like a setup. The fact the servants do not know Petruchios plans adds to the comic effect of the scene. The newly married couples are reunited for a big feast for Lucentio and Biancas celebration. Katherina, is still being thought of as a shrew from her previous time in Padua, and the other wives continue joking about Katherinas shrewish behaviour: Your husband being troubled with a shrew. The widow displays an aggressive nature, daring to argue with the male characters by passing judgement on them. Bianca also reveals a rude and abusive side to her character again questioning the men like the widow. This is a contrast to her supposedly being pure. I mean to shift my bush. Her language has sexual connotations. The women are tested to see their obedience to their husbands and for once Katherina has come out as the most obedient, the most tamed. She came straight to her master unlike the other two mistresses. Love, fair looks true obedience. Katherina has just proved to the other couples that she is now playing the correct role of a wife. Loving and willing to adhere to her husbands every need. As if Katherina hasnt proved herself enough, she goes and rubs salt into the other womens wounded pride my mind hath been as big as one of yours. This acknowledges she has previously acted as a misguided shrew but has since changed her act.  I believe Petruchio has tamed Katherina. Initially I didnt believe he had managed and thought she was just putting on an act in front of her new household, but when she acknowledges her behaviour (in her final speech) I believe she has changed. All the effort Petruchios put in throughout the play had paid off and he finally tamed the shrew.

Monday, November 25, 2019

Exxon Valdez Essays - Exxon Valdez Oil Spill, Oil Pollution Act

Exxon Valdez Essays - Exxon Valdez Oil Spill, Oil Pollution Act Exxon Valdez INTRODUCTION On March 24, 1989 at 4 minutes past midnight, the oil tanker ExxonValdez struck a reef in Alaska's breath-taking Prince William Sound. Instantaneously, the quiet waters of the sound became a sea of black. We've fetched up - ah - hard aground north of Goose Island off Bligh Reef, and - ah - evidently leaking some oil, Joseph Hazelwood, captain of the ship, radioed the Coast Guard Marine Safety Office back in Valdez. That some oil turned out to be a total of 11,000,000 gallons of crude oil leaking from the ruptured hull of the ship. By the time a containment effort was put forth, a weather storm had helped to spread the oil as much as three feet thick across 1,400 miles of beaches. A little over ten years have passed since the largest oil spill and the greatest environmental disaster in American history, but the waters and its surroundings are still recovering. At first, many people repeated what was then thought as common knowledge, oil dissipates, nature heals quickly, all will be well in a year or two. This has not been the case with the Exxon Valdez. This massive 987-foot tanker has left a lingering, long-term effect on the natural habitat that surrounds these pristine waters, along with an enormous socio-economic effect that has left many people wondering when and where the next oil spill will be. Many associated with the recovery process, and its more than one hundred projects per year, say it will take longer than a human lifetime to determine if a full recovery is possible (Fine 1999). RESULTS AND DISCUSSION The Exxon Valdez oil spill was initially thought of as a two to three year clean-up project. As time went ahead, scientists and clean-up crews realized that it would take a longer period of time and require a lot more effort than originally planned. Up to this point, the oil has contaminated a national forest, four wildlife refuges, three national parks, five state parks, four critical habitat areas and a state game sanctuary, which spreads along 1,400 miles of the Alaskan shoreline. Recent scientific studies show that the oil continues to wreak havoc among many spawning salmon, herring, and other species of fish. This is even more devastating when considering that much of the wildlife around the sound is dependant on the high calorie, high fat content of the herring as their prime food source. Among the many casualties were 2,800 sea otters, 300 harbour seals, 250 bald eagles, as many as 22 killer whales, and an estimated quarter-million seabirds. It is unclear how many billions of salmon and herring eggs and intertidal plants succumbed to the oil smothering. Within an ecosystem, each living thing depends on other living things. That means that when the fish died in Prince William Sound, there was less food for the seals that normally eat them. As those seals died, there was less food for the killer whales that eat seals (Knickerbocker 1999). This has led to a domino effect within the food chain, victimizing many of the animals surrounding the area. Intertidal mussel beds are still contaminated to this day. Twenty-three species of wildlife were effected by this oil spill, and only two species, the bald eagle and the river otter, have fully recovered. The species that are well on their way to a comeback include pink salmon, Pacific herring, sea otters, mussels, black oyster catcher, common murre, marbled murrelet, and sockeye salmon. As with any environmental disasters, there are some animals that are showing little or no clear improvement since the spill occurred. This group includes harbour seals, killer whales, harlequin ducks, common loons, cormorants, and the pigeon gullomot. In some areas, that have been hardest hit by the oil spill, many of the species have an elevated level of mortality. Even though the Exxon Valdez is the most-studied oil spill in world history, it is also a particularly difficult one to research because of the lack of baseline data on the ecology of Prince William Sound (Birkland 1998). Among all the animal casualties, there is another victim, people. Thousands have been forced to bare the consequences of the Exxon Valdez oil spill. Throughout the years, the waters of Alaska have

Thursday, November 21, 2019

The analysis by Steel Tube division of Engineering Products Plc Assignment

The analysis by Steel Tube division of Engineering Products Plc accountant - Assignment Example Center of discussion in this paper is a financial analyst for Steel Tube division of Engineering Products Plc named Roger Davis. He is having a tough time convincing the management for a project proposal. The analysis by his accountant and the additional information obtained from other sources has added to his woes. Roger Davis needs to convince his managing director about the viability of a new proposal for computer numerically controlled (CNC) milling machine. The MD is not ready to spend money on the project unless it can start yielding profits within 3 years. However, the accountant’s analysis shows an overall loss for the project over the next 4 years. It won’t be prudent to expect much from the project after this period. Roger has collected a lot of additional information as well. But he has not been able to justify the viability of the project with given information. Most of the information available to Roger seems relevant at first sight. However, the consultant charges of  £18,000 have already been paid by the company. Hence, they would not make much difference to the investment decision. Also acquiring opening stock at the beginning of the year rather than considering the same at year end would have minimal impact on the decision (the impact due to time value of money would be very small as compared to other numbers) and hence should be neglected for analysis. In addition there are pieces of information which don not directly reflect the performance of the project and must be excluded for a fair evaluation. They would be discussed in greater detail in section 5. 4. Cash flow Analysis using all additional information The accountant’s analysis was quite limited. Therefore, additional information collected by Roger needs to be incorporated in the financial analysis (Johnson, Derek). The same has been done in Table 4.1. The methodology for the same is discussed here. Table 4.1: Cash Flow Analysis using Accountant’s Analysis a nd Additional Information    Year       0 1 2 3 4 Total Sales    400.00 600.00 800.00 600.00    Cost of Sales    180.00 300.00 380.00 300.00    Labour Cost    80.00 120.00 120.00 80.00    Revised Other production expenses    64.00 66.00 68.00 84.00    Depreciation    40.00 40.00 40.00 40.00    Administrative Overhead    54.00 76.00 74.00 74.00    Interest on loans    22.00 22.00 22.00 22.00    Total Cost    440.00 624.00 704.00 600.00    PBT    -40.00 -24.00 96.00 0.00    PBDT    0.00 16.00 136.00 40.00    Depreciation for Tax purpose    60.00 45.00 33.75 25.31    Cumulative Depreciation for Tax purpose    60.00 105.00 138.75 164.06    PBT (for Tax purpose)    -60.00 -29.00 102.25 14.69    PAT (for Tax purpose)    -42.00 -20.30 71.58 10.28    Net profit (for company)    -62.00 -25.30 77.83 24.97    Scrap sales 20.00 0.00 0.00 0.00 20.00    Cash benefits due to sell-off of existing machine 0.00 18.00 18.00 18.00 18.0 0    Additional advertising expenses -40.00 -8.00 -8.00 -8.00 -8.00    Consultant expenses -18.00 0.00 0.00 0.00 0.00    Reduction in sales of competing products    -60.00 -60.00 -60.00 -60.00    Net cash flow -38.00 -112.00 -75.30 27.83 -5.03

Wednesday, November 20, 2019

Global Credit Crunch Essay Example | Topics and Well Written Essays - 2000 words

Global Credit Crunch - Essay Example The overall financial solutions to UK clients thus would be greatly affected. (CEBR, 2008)1 Therefore it is necessary to find necessary solutions to various aspects of present global credit crisis to strengthen the UK economy. The global credit crunch has had the attention each and every human being for bad reasons. The present crisis has effected in job lay offs around the world mostly in the developed countries like USA, the UK, Japan, etc. As mentioned earlier, one of the root causes was excessive lending by the banks to the customers. In other words, the banks and other financial institutions lured the customers to borrow loan without any hassle such like low interest rates, 24 hours approval of loan, pay the installments after one year, etc. Such were the schemes offered by various banks to attract the wide range of customers mainly from housing sector.2 The banking authorities didn't even bother to check the liability of the person to whom they are lending, whether the person was able to pay back the money. The Bishop of London quoted in the Daily Telegraph that 'it is becoming clearer how far we have been mortgaging our children's tomorrow to fund our today, both financially and in our use of the finite resources of earth'.3 Looking at the past experiences of financial crisis occurred during the last millennium, it can be assumed that the process of borrowing from the financial institutions will be a Herculean task. The need to restore capital ratios and to recover the losses incurred, it is understandable the borrowers will have lesser flexibilities, less leverage, hike in interest rates and fees will soar at historical high. (John L. Moscione : p.6)4 The customers will have to face a strict scrutiny of their valuable documents before receiving loans as a process to identify previous lack luster performance by the bank officials. Implications for Lending The present crisis is the result of irregularities by the bank and financial institutions in providing loans to the customers without proper verification of their documents and checking the liability of the person. Excessive liquidity with the financial institutions was the foundation for excessive lending by the banks to rake in more customers. In a bid to acquire more customers, they offered lucrative schemes which were spontaneously grabbed by the seekers. Credit crisis was inevitable in view of real estate market boom in recent years which blew the bubble by way of irregular mortgages, unverified loans without scrutinizing the income or assets of the borrower. This facilitated borrowers to indulge in fraud and leveraging of accounts. Most of the loans were approved on the house mortgage which was another cause for real estate boom all over the world. Selling and buying of houses were on spurge, with rates touching the all time high. According to statistics from the Bank of England, total net lending to individuals in January 2009 was 1.1 billion which was lower as compared to December 2008 that stood at 2.1 billion. The total net lending secured on dwellings was 0.7 billion in January 2009 as compared to 1.8 billion in December 2008.5 It is learnt from the

Monday, November 18, 2019

Explain How Far Wilfred Owen Challenges the Notion that it is Sweet Essay

Explain How Far Wilfred Owen Challenges the Notion that it is Sweet and Noble to Die For Your Country Using The Poems Dulce et - Essay Example Even after a war ends the violent and troubling memories keep haunting a soldier’s mind. Sometimes when the soldier becomes physically disabled he is unable to carry out the normal activities of life and to such a man what remains are only the memories with which he has to live throughout. When the young children in their schools are told how noble it is to fight for one’s land and people, it might sound really righteous but the truths which unfold as one takes a closer look at the consequences of war especially on the lives of those noble doers, one is bound to be discouraged and all motivations in favor of warfare seem meaningless in front of sheer humanity. He draws out visual images in some of his poems, where the physical, and mental suffering of the troops are vividly described. In the war poems, ‘Dulce et Decorum Est’ and ‘Disabled’ he challenges the notion that dying for one’s country is sweet and noble. The poem ‘Dulce et Decorum Est’ describes just another day in the World War I when the soldiers are marching towards their place of rest but at that very moment gas bombs begin to drop around them. They hurry for their masks and weapons but some of the ravaged bodies fail to save themselves from the attack. The author writes in a personal tone and tells the readers what he witnesses as vividly as possible with frequent use of similes –â€Å"But someone still was yelling out and stumbling,/ And flound'ring like a man in fire or lime† (Owen, line9). He focuses the description now on a single person who dies in the attack and this vision continuously haunts him in his dreams later on. He gradually shifts from first person to third person and then to second person in his address. Towards the end the poet conveys to the people at home their experience of violence and distress and wishes that they could witness the same. At the very beginning he stressed upon the very appearance of the people marching towards their place of rest. He does not address the men as soldiers or warriors; rather he compares them to old beggars and hags. He even uses the metaphoric comparison between their walk and the term ‘cursed’ which he uses to describe the miserable conditions as they march through the muddle trenches. The experience seemed to have them under some kind of a curse. The poet at times uses the technique of creating a caesura or a pause in a line of the poem in order to signify the realism precisely. The language is brief and curt as he mentions ‘Men marched asleep’ (Owen,line4). This sentence makes the men look like ghost figures walking in the dark. They are so exhausted that they almost are falling asleep. The poet uses alliterations I the form of repeated words beginning with ‘l’ – â€Å"Many had lost their boots/But limped on, blood-shod. All went lame; all blind† (Owen, line4). The words indicate they were cover ed in blood and therefore the war has enveloped their physical and mental forms. The idea here is to put forth the dragging effect on the readers just as the fatigued soldiers dragged themselves towards the tent. He changes drastically the motion by using brief lines: â€Å"Five-nines/that dropped behind. Gas!/Gas! Quick boys!†(Owen, line7), which generates the effect of fast action amidst the slow movements. Suddenly there seems to be a rush for safety. The fear struck cries and bombs falling all around leads to the environment, which brings on merciless deaths that render a stomach

Saturday, November 16, 2019

Network System for Secure Communication

Network System for Secure Communication Methodology: The main methodology involved behind this research project is to provide the importance of such technology from professionals and well referred articles. Some of the general interviews will be added to the project with details showing their interest towards the current technology and also the change they see in communicating with the new technology. It on the hands of the components of IP Security that contribute to this level of secure communication: The IP Security (IPSec) Driver is used to monitor, filter, and secures the traffic throughout the system. The (ISAKMP/Oakley) abbreviated as Internet Security Association Key Management Protocol performs key exchange and management functions that oversee security issues between hosts, and provide keys which can be used with security algorithms. The IP Security Policy and the Security Associations are derived from those policies that define the security environment where two hosts can communicate. The function of Security Association API is to provide the interface between the IPSec driver, the Policy Agent and the ISAKMP. The function of the management tools is to create policies, monitor IP Security statistics, and log IP Security events. The main methodologies which are under consideration for this project are Classical encryption technologies, IP sec Tunnel, IP sec VPN, Internet Key Exchange methods, Block Cipher Data Encryption, Advanced Encryption, Symmetric ciphers, Public private key functions, Digital signature etc, which have suggested me to design a better system. Implementation: The main reason behind selecting IPSec is that it so powerful that it provides security to IP layer, and also forms the basis for all the other TCP/IP protocols. This is generally composed of two protocols: Authentication Header (AH); Encapsulating Security Payload (ESP); IPSec Implementation Methods: IPSec is comprised of several implementations architectures which are defined in RFC 2401. The IPSec implementation also depends on various factors including the version of IP used (v4 versus v6), the basic requirements of the application and other factors. End Host Implementation: Implementing IPSec in all host devices provides the most flexibility and security. It enables â€Å"end-to-end† security between any two devices on the network. Router Implementation: Router implementation however is a much simpler task since we only make changes to a few routers instead of hundreds or thousands of clients. It only provides protection between pairs of routers that implement IPSec, but this may be sufficient for certain applications such as virtual private networks (VPNs). The idea will be implemented after proper testing of various available methodologies. The current strategy for implementation is as follows:. We use certain open source softwares which provide encryption and decryption methods and authentication. In the actual system, the user is asked to enter details of files to be sent and also some other details about the password and the public keys if included. The required software are used in a way which helps to run a smooth process and secure operation. CONTENTS Acknowledgement I owe many thanks to people who helped supported me in doing my dissertation. Firstly, I would like to express my immense gratitude to my respected professor Mr. Dr. XXX, YYYY University, London for his support and motivation that has helped me to come up with this project. He supported me when its needed and suggested me in understanding various methodologies in my project. He also took care of my project with attention to achieve my goal. I thank to my Institution and faculty members for giving me an opportunity to do my dissertation and also for library, computer lab facilities for doing my dissertation to achieve practical results which can resolve my project related issues. I also extend my Heart full thanks to my family friends. I owe my special thanks to my Dad and his colleagues who gave me suggestions on doing my Dissertation. Abstract In the present system the network helps a particular organization to share the data by using external devices. The external devices are used to carry the data. The existing system cannot provide security, which allows an unauthorized user to access the secret files. It also cannot share a single costly printer. Many interrupts may occur within the system. Though it is advantageous we have numerous disadvantageous, somebody writes a program and can make the costly printer to misprint the data. Similarly some unauthorized user may get access over the network and may perform any illegal functions like deleting some of the sensitive information Security is the term that comes into picture when some important or sensitive information must be protected from an unauthorized access. Hence there must be some way to protect the data from them and even if he hacks the information because he should not be able to understand whats the actual information in the file, which is the main intention of the project. The project is designed to protect the sensitive information while it is in transaction in the network. There are many chances that an unauthorized person can have an access over the network in some way and can access this sensitive information. My main topic focuses on IPSec (Internet Protocol Security) is an extension to the IP protocol specified by IETF which provides security to the IP and the upper-layer protocols and cryptography in a network sharing system. It was first developed for the new IPv6 standard and then â€Å"back ported† to IPv4. The IPSec architecture is described in the IPSec uses two different protocols AH (Authentication Header) and ESP (Encapsulating security payload) to ensure the authentication, integrity and confidentiality of the communication. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised reading of packet contents. [2] Cryptography is the technique used to secure the data while they are in transactions. Encryption and Decryption are two techniques used under cryptography technology. Data cryptography is the art of securing the resource that is shared among the applications. The main idea behind the design is to provide a secured communication between the networks showing network level performance practically by differentiating different operating system which can ensure the security, authenticity by considering, analyzing and testing any best available methodologies. 1. Introduction: Businesses today are focused on the importance of securing customer and business data. Increasing regulatory requirements are driving need for security of data. There have been many methods which have evolved over the years to address the need for security. Many of the methods are focused at the higher layers of the OSI protocol stack, thus compensating the IPs lack in resolving security issues. These solutions can be implemented in certain situations, but they cannot be generalized because they are particularly too many applications. For example, Secure Sockets Layer (SSL) can be used for certain applications like World Wide Web access or FTP, but there are many other applications which cannot be resolved with this type of security. A solution is required to allow security at the IP level was very necessary so that all higher-layer protocols in TCP/IP could take advantage of it. When the decision was made to develop a new version of IP (IPv6), this was the golden opportunity to resolve not just the addressing problems in the older IPv4, but also resolve lack of security issues as well. Later a new security technology was developed with IPv6 in mind, but since IPv6 has taken long time to develop, and thus a solution was designed to be usable for both IPv4 and IPv6. The technology which brings a secure communications to the Internet Protocol is known as IP Security, commonly abbreviated as IPSec. IPSec services allow users to build secure tunnels through certain networks. All the data that passes through the entrusted net is encrypted by the IPSEC gateway machine and decrypted by the gateway at the other end. The result obtained is a Virtual Private Network or VPN. This network is effectively private even though it includes machines at several different sites which are connected by the insecure Internet. Cryptography technique is used to secure the data while they are in transactions. Encryption and Decryption are two techniques which are used under cryptography technology. Data cryptography is the art of securing the resource that is shared among the applications. The Encryption and Decryption are termed as two powerful security technologies that are widely implemented to protect the data from loss and deliberate compromise. In this project the networking allows the company to share files or data without using certain external devices. Some unauthorized users may get access over the network and perform some illegal functions in certain cases like deleting files while the transaction is still on at that time encryption and then decryption techniques are implemented to secure the data. Many other attacks in cryptography are considered which lead me to research on different types of IPSec implementation methodologies in order to design the best model such that it may be suitable for the present trend of networking systems also form a platform to enable communication to the outside world. Thus in orders to implement IPSec, certain modifications are required to the systems communications routines and certain new systems processes conduct secret key negotiations. What is IPSec? An extension to the IP protocol is considered as IPSec which provides high level security to the IP and to the upper-layer protocols. This was initially developed for the new IPv6 standard and then was back ported to IPv4. IPSec provides the following security services: data origin authentication, connectionless integrity, replay protection, data confidentiality, limited traffic flow confidentiality, and key negotiation and management. It has been made mandatory by the IETF for the use of IPSec wherever feasible; the standards documents are close to completion, and there are numerous implementations. Overview of IPSec Architecture: The IPSec suite defined as a framework of open standards. The following protocols are used by IPSec to perform various functions. [2][3] IPSec provides three main facilities which are explained below: Internet key exchange(IKE and IKEv2) : This is used to set up a security association (SA) which can be done by handling negotiation of protocols and algorithms and generating the encryption and authentication keys which can be used by IPSec.[4][5] Authentication Header (AH): This is used to provide connectionless integrity and data origin authentication for IP datagrams and also provides protection against replay attacks.[6][7] Encapsulating Security Payload (ESP): This is used to provide confidentiality, data origin authentication, connectionless integrity, anti-replay service, and limited traffic flow confidentiality. [9] Both authentication and encryption are generally desired in this mechanism. Assure that unauthorized users do not penetrate the virtual private network Assure that eavesdroppers on the Internet cannot read messages sent over the virtual private network. Since both the above features are generally desirable, most implementations are likely to use ESP rather than AH. Security Association: The security Association mechanism is used for authentication (AH) and confidentiality (ESP) A one way relationship between a sender and a receiver that affords security services to the traffic carried on it. Security services are afforded to an SA for the use of AH or ESP but not both. SA identified by three parameters: Security Parameter Index (SPI) IP destination address Security protocol identifier Overview of IPSec Services and Functions: IPSec is not only assumed as a single protocol, but is rather considered as a set of services and protocols which provide a complete security solution to the IP network. These services and protocols are combined to provide various types of protection. Since IPSec usually works at the IP layer, it provides protection for any higher layer TCP/IP application or protocol without using any additional security methods, which is considered as a major strength for its implementation. General types of protection services offered by IPSec include: Encryption of user data to achieve privacy. Authentication and message integrity has to be achieved to ensure that it is not changed on route. Protection against certain types of security attacks, such as replay attacks. The ability of the devices to negotiate the security algorithms and keys required in order to meet their security needs. wo security modes called tunnel and transport are implemented to meet the various network needs. Features Benefits: IPSec is observed to be transparent by the end users. The users on the security mechanisms need not be trained. IPSec assures security measures for individuals. There is no requirement to change the software on a user or a server system. Strong security measures are applied to the entire traffic crossing the perimeter. 2. Objective: IPSec is mostly designed in order to encrypt the data between the two systems without any spoofing attacks. It is a key force of defence against internal and external attacks. However, other than these, there are many other security strategies which have prevented the security attacks. The main idea in my research is to provide a better approach to the implementation of IP Security by analyzing the present methodologies. In the implementation of this design, I am also considering different operating systems to provide a better approach towards security which can prove to be good in ideal ways. The design of such an approach is helpful in restricting any unauthorised access to the network and also helps in providing a secure and authenticated access. The main idea behind the design is to provide a secured communication between the networks independent of the operating system which can ensure the security, authenticity by considering, analyzing and testing any two best available methodologies. In my overview of RFCs available in the Internet such as Cryptography the receiver end of a particular communication channel is not aware of the sender unless the sender transmits some information with private and public keys with cipher text which can prove his authenticity. Now the receiver sends the same package with his signature and then the receiver is also authenticated mutually. Attacks may occur in different ways. There are also many ways where in such communications can be detected and using techniques like eavesdropping or sniffing or man in the middle attack. These are the three major problems for secure communications. In my research, I will attempt to design a procedure which can be easily followed in order to overcome such problems. There are many techniques available now which are better than normal communication. The major problem in such techniques is the implementation of man in the middle attack. There have been many advances to try and rectify the problems but there has always been a flaw in the design. My research is to design a system using the current technologies used to encrypt and authenticate. These techniques play a major role in the implementation of IP Security. The major interest would be in areas like encryption, decryption and authentication. Additions will be done to this research as it is implemented. The goal is to use research existing systems and to suggest a system which makes it even hard to break. It is not 100% immune to attacks but the attack may take longer to break the system than the present rate. This system will also be very safe and will be easy to use in daily life rather than something with a dozen processing steps to be followed. 2.2 SCOPE With the rapid development of Multimedia data management technologies over the internet there is need to concern about the internet there is need to concern about the security and privacy of information. In multimedia document, dissipation and sharing of data is becoming a common practice for internet based application and enterprises. As the internet forms the open source the present for all users security Forms the critical issue. Hence the transfer of information over the internet forms the critical issue. At the present situations the cryptographic techniques are used for providing ‘SECURITY. 2.3 PROJECT PERSPECTIVE The project â€Å"Network system for Secure Communication† is totally enhanced with the features that enable us to feel the real-time environment. Todays world is mostly employing the latest networking techniques instead of using stand-alone PCs. IPSec tunnelling or Encryption, information scrambling technology is an important security tool. By properly applying, it can provide a secure communication channel even when the underlying system and network infrastructure is not secure. This is particularly important when data passes through the shared systems or network segments where multiple people may have access to the information. In these situations, sensitive data and especially passwords should be encrypted in order to protect it from unintended disclosure or modification. 2.4 PROPOSED SYSTEM In this system ‘security is the term that comes into picture when some important or sensitive information must be protected from an unauthorized access. Hence there must be some way to protect the data from them and even if he hacks the information, The proposed system provides the ‘security and it does not allow unauthorized users to access the secret files. As per the ISO standards the security parameters are: Confidentiality Authentication Integrity Key distribution Access control CONFIDENTIALITY: Confidentiality is the protection of transmitted data from passive attacks. It can protect the data from unauthorized disclosure. AUTHENTICATION: A process used to verify the integrity of the transmitted data, especially a message. It is the process of proving ones identity to someone else. INTEGRITY: The sender and the receiver want to ensure that the content of their communication is not altered during transmission. KEY DISTRIBUTION: Key distribution can be defined as a term that refers to means of delivering a key to the communicating parties, without allowing others to see the key. ACCESS CONTROL: It is a ability to limit and control the access to host systems and applications via communication links. 3.Literature Review This project emphasis design and evaluates a computer-based system using appropriate process and tools. Most of the industry wide routers in the network implement their functionality in hardware and therefore we believe that hardware based routers are more efficient than a software-based router implementation besides that most of the work is in the research community which will be performed, using software-based routers utilizing off-the-shelf PCs. Various works have to be attempted which evaluates different protocol stack, however none of them use hardware-based routers, has such a wide range of metrics, and none investigated mechanisms. My research methodology emphasis surveys, forums from the internet and articles from IEEE (Institute of Electrical and Electronics EngineersorIEEE) a quantitative approach in advance technology. I also consider various other thesis and books which are best suitable for my project. Here following are the network related definitions, and few protocols from application layer, network and internet layer also discussed which actually gives clear idea of understanding the concepts. 3.1 IPSec Standards: IPSec is actually a collection of techniques and protocols; it is not defined in a single Internet standard. Instead, a collection of RFCs defines the architecture, services and specific protocols used in IPSec. Some of the most important of these are shown below: [RFC 2401] Security Architecture for the Internet Protocol (IPSec overview) The main IPSec document describes the architecture and general operation of the technology, and showing how the different components fit together. [RFC 2402] IP Authentication Header It defines the IPSec Authentication Header (AH) protocol used for ensuring data integrity and origin verification. [RFC 2403] The Use of HMAC-MD5-96 within ESP and AH Describes a particular encryption algorithm for use by AH and ESP called Message Digest 5 (MD5), HMAC variant. [RFC 2404] The Use of HMAC-SHA-1-96 within ESP and AH Describes a particular encryption algorithm for use by AH and ESP called Secure Hash Algorithm 1 (SHA-1), HMAC variant. [RFC 2406] IP Encapsulating and Security payload (ESP) It describes the IPSec Encapsulation Security Payload (ESP) protocol that provides data encryption for confidentiality. [RFC 2408] Internet Security Association and Key Management Protocol (ISAKMP) It defines methods for exchanging keys and negotiating security associations. [RFC 2409] The Internet Key Exchange (IKE) Describes the Internet Key Exchange (IKE) protocol used to negotiate security associations and exchange keys between devices for secure communications. It is based on ISAKMP and OAKLEY. [RFC 2412] The OAKLEY Key Determination Protocol It describes a generic protocol for key exchange. [RFC 2131] Dynamic Host Configuration Protocol (DHCP) DHCP allows a host to obtain an IP address automatically, as well as to learn additional information about subnet mask, the address of its first-hop router, and the address of its local DNS server. [RFC 2131; RFC 3022] Network Address Translation (NAT)- In an attempt to provide transparent routing to hosts, NAT devices are used to connect an isolated address realm with private unregistered addresses to an external realm with globally unique registered addresses. Domain Name System (DNS): It is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various other information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. For example, www.example.com translates to 208.77.188.166. Windows Internet Name Service (WINS): It is Microsofts implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively WINS is to NetBIOS names, like DNS is to domain names in fact its a central mapping of host names to network addresses. Like DNS it is broken into two parts, a Server Service (that manages the encoded Jet Database, server to server replication, service requests, and conflicts) and a TCP/IP Client component which manages the clients registration and renewal of names, and takes care of queries. VPN (Virtual Private Network) : It is a virtual computer network that exists over the top of an existing network. The purpose of a VPN is to allow communications between systems connected to the VPN using an existing shared network infrastructure as the transport, without the VPN network being aware of the existence of the underlying network backbone or without the VPN interfering with other network traffic on the backbone. A VPN between two networks is often referred to as a VPN Tunnel. Most VPN technologies can be separated into two broad categories, Secure VPNs and Trusted VPNs. Internet Protocol version 6 (IPv6): It is the next-generation Internet Protocol version designated as the successor to IPv4. It is an Internet Layer protocol for packet-switched internetworks. The main driving force for the redesign of Internet Protocol was the foreseeable IPv4 address exhaustion. IPv6 was defined in December 1998 by the Internet Engineering Task Force (IETF) with the publication of an Internet standard specification, RFC 2460. IPv6 has a vastly larger address space than IPv4. This results from the use of a 128-bit address, whereas IPv4 uses only 32 bits. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion. Due to its security and flexibility entire Internet will be deployed byIPv6 in 2012 as expected. Tunnelling: In computer networks tunnelling protocol (delivery protocol) encapsulates the different payload protocol i.e., It carries a payload over an incompatible delivery-network. It can also provide a secure path through an untrusted network without any data loss. Transport Layer Security (TLS): Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption. Internet Key Exchange: Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a security association (SA) in the IPSec protocol suite. IKE uses a Diffie-Hellman key exchange to set up a shared session secret, from which cryptographic keys are derived. Public key techniques or, alternatively, a pre-shared key, are used to mutually authenticate the communicating parties. 4.IPSec System Architecture Authentication Header and Encapsulating Security Payload are commonly called â€Å"protocols†, though this is another case where the validity of this term is debatable. They are not really distinct protocols but are implemented as headers that are inserted into IP datagrams, as we will see. They thus do the â€Å"grunt work† of IPSec, and can be used together to provide both authentication and privacy. IPSec protocols: The IPSec protocol family consists of two protocols: Authentication Header (AH) and Encapsulated Security Payload (ESP). Both these protocols are independent IP. AH is the IP protocol 51 and ESP is the IP protocol 50 Authentication Header: This is a member of the IPSec protocol suite. Authentication Header provides connectionless data integrity and data origin authentication of IP packets. Further, it can also provide protection against the replay attacks by using the sliding window technique and by discarding the old packets. Authentication Header also gives protection for the IP payload and all the header fields of an IP datagram. AH generally operates on the stop of IP, by using the IP protocol number 51. An AH packet diagram is shown below which describes how an AH packet can be constructed and interpreted: Field meanings: Next header: This field is an 8-bit field that mainly identifies the type of the next payload obtained after the Authentication Header. The value of this field can be chosen from the set of defined IP Protocol Numbers. RESERVED These fields are usually reserved for the future use. Payload length This defines the size of Authentication Header packet. Sequence number This field represents a monotonically increasing number which is used to prevent certain replay attacks. Security parameters index (SPI) This field is used to identify the security parameters, in combination with the IP address, and then identify the security association techniques implemented with this packet. Authentication data This field contains the integrity check value (ICV) which is necessary to authenticate the packet. This field may also contain padding. Encapsulating Security Payload: ESP which can be expanded as Encapsulating Security Payload is a member belonging of the IPSec protocol suite. IPSec achieves integrity, origin authenticity, and confidentiality protection of packets. This protocol also supports encryption-only and authentication-only configurations. However usage of only encryption technique without authentication is not recommended because it is termed insecure. ESP does not protect the IP packet header like the Authentication Header (AH) does. The packet diagram below shows how an ESP packet is constructed and interpreted: Field meanings: Security paramete Network System for Secure Communication Network System for Secure Communication Methodology: The main methodology involved behind this research project is to provide the importance of such technology from professionals and well referred articles. Some of the general interviews will be added to the project with details showing their interest towards the current technology and also the change they see in communicating with the new technology. It on the hands of the components of IP Security that contribute to this level of secure communication: The IP Security (IPSec) Driver is used to monitor, filter, and secures the traffic throughout the system. The (ISAKMP/Oakley) abbreviated as Internet Security Association Key Management Protocol performs key exchange and management functions that oversee security issues between hosts, and provide keys which can be used with security algorithms. The IP Security Policy and the Security Associations are derived from those policies that define the security environment where two hosts can communicate. The function of Security Association API is to provide the interface between the IPSec driver, the Policy Agent and the ISAKMP. The function of the management tools is to create policies, monitor IP Security statistics, and log IP Security events. The main methodologies which are under consideration for this project are Classical encryption technologies, IP sec Tunnel, IP sec VPN, Internet Key Exchange methods, Block Cipher Data Encryption, Advanced Encryption, Symmetric ciphers, Public private key functions, Digital signature etc, which have suggested me to design a better system. Implementation: The main reason behind selecting IPSec is that it so powerful that it provides security to IP layer, and also forms the basis for all the other TCP/IP protocols. This is generally composed of two protocols: Authentication Header (AH); Encapsulating Security Payload (ESP); IPSec Implementation Methods: IPSec is comprised of several implementations architectures which are defined in RFC 2401. The IPSec implementation also depends on various factors including the version of IP used (v4 versus v6), the basic requirements of the application and other factors. End Host Implementation: Implementing IPSec in all host devices provides the most flexibility and security. It enables â€Å"end-to-end† security between any two devices on the network. Router Implementation: Router implementation however is a much simpler task since we only make changes to a few routers instead of hundreds or thousands of clients. It only provides protection between pairs of routers that implement IPSec, but this may be sufficient for certain applications such as virtual private networks (VPNs). The idea will be implemented after proper testing of various available methodologies. The current strategy for implementation is as follows:. We use certain open source softwares which provide encryption and decryption methods and authentication. In the actual system, the user is asked to enter details of files to be sent and also some other details about the password and the public keys if included. The required software are used in a way which helps to run a smooth process and secure operation. CONTENTS Acknowledgement I owe many thanks to people who helped supported me in doing my dissertation. Firstly, I would like to express my immense gratitude to my respected professor Mr. Dr. XXX, YYYY University, London for his support and motivation that has helped me to come up with this project. He supported me when its needed and suggested me in understanding various methodologies in my project. He also took care of my project with attention to achieve my goal. I thank to my Institution and faculty members for giving me an opportunity to do my dissertation and also for library, computer lab facilities for doing my dissertation to achieve practical results which can resolve my project related issues. I also extend my Heart full thanks to my family friends. I owe my special thanks to my Dad and his colleagues who gave me suggestions on doing my Dissertation. Abstract In the present system the network helps a particular organization to share the data by using external devices. The external devices are used to carry the data. The existing system cannot provide security, which allows an unauthorized user to access the secret files. It also cannot share a single costly printer. Many interrupts may occur within the system. Though it is advantageous we have numerous disadvantageous, somebody writes a program and can make the costly printer to misprint the data. Similarly some unauthorized user may get access over the network and may perform any illegal functions like deleting some of the sensitive information Security is the term that comes into picture when some important or sensitive information must be protected from an unauthorized access. Hence there must be some way to protect the data from them and even if he hacks the information because he should not be able to understand whats the actual information in the file, which is the main intention of the project. The project is designed to protect the sensitive information while it is in transaction in the network. There are many chances that an unauthorized person can have an access over the network in some way and can access this sensitive information. My main topic focuses on IPSec (Internet Protocol Security) is an extension to the IP protocol specified by IETF which provides security to the IP and the upper-layer protocols and cryptography in a network sharing system. It was first developed for the new IPv6 standard and then â€Å"back ported† to IPv4. The IPSec architecture is described in the IPSec uses two different protocols AH (Authentication Header) and ESP (Encapsulating security payload) to ensure the authentication, integrity and confidentiality of the communication. It uses strong cryptography to provide both authentication and encryption services. Authentication ensures that packets are from the right sender and have not been altered in transit. Encryption prevents unauthorised reading of packet contents. [2] Cryptography is the technique used to secure the data while they are in transactions. Encryption and Decryption are two techniques used under cryptography technology. Data cryptography is the art of securing the resource that is shared among the applications. The main idea behind the design is to provide a secured communication between the networks showing network level performance practically by differentiating different operating system which can ensure the security, authenticity by considering, analyzing and testing any best available methodologies. 1. Introduction: Businesses today are focused on the importance of securing customer and business data. Increasing regulatory requirements are driving need for security of data. There have been many methods which have evolved over the years to address the need for security. Many of the methods are focused at the higher layers of the OSI protocol stack, thus compensating the IPs lack in resolving security issues. These solutions can be implemented in certain situations, but they cannot be generalized because they are particularly too many applications. For example, Secure Sockets Layer (SSL) can be used for certain applications like World Wide Web access or FTP, but there are many other applications which cannot be resolved with this type of security. A solution is required to allow security at the IP level was very necessary so that all higher-layer protocols in TCP/IP could take advantage of it. When the decision was made to develop a new version of IP (IPv6), this was the golden opportunity to resolve not just the addressing problems in the older IPv4, but also resolve lack of security issues as well. Later a new security technology was developed with IPv6 in mind, but since IPv6 has taken long time to develop, and thus a solution was designed to be usable for both IPv4 and IPv6. The technology which brings a secure communications to the Internet Protocol is known as IP Security, commonly abbreviated as IPSec. IPSec services allow users to build secure tunnels through certain networks. All the data that passes through the entrusted net is encrypted by the IPSEC gateway machine and decrypted by the gateway at the other end. The result obtained is a Virtual Private Network or VPN. This network is effectively private even though it includes machines at several different sites which are connected by the insecure Internet. Cryptography technique is used to secure the data while they are in transactions. Encryption and Decryption are two techniques which are used under cryptography technology. Data cryptography is the art of securing the resource that is shared among the applications. The Encryption and Decryption are termed as two powerful security technologies that are widely implemented to protect the data from loss and deliberate compromise. In this project the networking allows the company to share files or data without using certain external devices. Some unauthorized users may get access over the network and perform some illegal functions in certain cases like deleting files while the transaction is still on at that time encryption and then decryption techniques are implemented to secure the data. Many other attacks in cryptography are considered which lead me to research on different types of IPSec implementation methodologies in order to design the best model such that it may be suitable for the present trend of networking systems also form a platform to enable communication to the outside world. Thus in orders to implement IPSec, certain modifications are required to the systems communications routines and certain new systems processes conduct secret key negotiations. What is IPSec? An extension to the IP protocol is considered as IPSec which provides high level security to the IP and to the upper-layer protocols. This was initially developed for the new IPv6 standard and then was back ported to IPv4. IPSec provides the following security services: data origin authentication, connectionless integrity, replay protection, data confidentiality, limited traffic flow confidentiality, and key negotiation and management. It has been made mandatory by the IETF for the use of IPSec wherever feasible; the standards documents are close to completion, and there are numerous implementations. Overview of IPSec Architecture: The IPSec suite defined as a framework of open standards. The following protocols are used by IPSec to perform various functions. [2][3] IPSec provides three main facilities which are explained below: Internet key exchange(IKE and IKEv2) : This is used to set up a security association (SA) which can be done by handling negotiation of protocols and algorithms and generating the encryption and authentication keys which can be used by IPSec.[4][5] Authentication Header (AH): This is used to provide connectionless integrity and data origin authentication for IP datagrams and also provides protection against replay attacks.[6][7] Encapsulating Security Payload (ESP): This is used to provide confidentiality, data origin authentication, connectionless integrity, anti-replay service, and limited traffic flow confidentiality. [9] Both authentication and encryption are generally desired in this mechanism. Assure that unauthorized users do not penetrate the virtual private network Assure that eavesdroppers on the Internet cannot read messages sent over the virtual private network. Since both the above features are generally desirable, most implementations are likely to use ESP rather than AH. Security Association: The security Association mechanism is used for authentication (AH) and confidentiality (ESP) A one way relationship between a sender and a receiver that affords security services to the traffic carried on it. Security services are afforded to an SA for the use of AH or ESP but not both. SA identified by three parameters: Security Parameter Index (SPI) IP destination address Security protocol identifier Overview of IPSec Services and Functions: IPSec is not only assumed as a single protocol, but is rather considered as a set of services and protocols which provide a complete security solution to the IP network. These services and protocols are combined to provide various types of protection. Since IPSec usually works at the IP layer, it provides protection for any higher layer TCP/IP application or protocol without using any additional security methods, which is considered as a major strength for its implementation. General types of protection services offered by IPSec include: Encryption of user data to achieve privacy. Authentication and message integrity has to be achieved to ensure that it is not changed on route. Protection against certain types of security attacks, such as replay attacks. The ability of the devices to negotiate the security algorithms and keys required in order to meet their security needs. wo security modes called tunnel and transport are implemented to meet the various network needs. Features Benefits: IPSec is observed to be transparent by the end users. The users on the security mechanisms need not be trained. IPSec assures security measures for individuals. There is no requirement to change the software on a user or a server system. Strong security measures are applied to the entire traffic crossing the perimeter. 2. Objective: IPSec is mostly designed in order to encrypt the data between the two systems without any spoofing attacks. It is a key force of defence against internal and external attacks. However, other than these, there are many other security strategies which have prevented the security attacks. The main idea in my research is to provide a better approach to the implementation of IP Security by analyzing the present methodologies. In the implementation of this design, I am also considering different operating systems to provide a better approach towards security which can prove to be good in ideal ways. The design of such an approach is helpful in restricting any unauthorised access to the network and also helps in providing a secure and authenticated access. The main idea behind the design is to provide a secured communication between the networks independent of the operating system which can ensure the security, authenticity by considering, analyzing and testing any two best available methodologies. In my overview of RFCs available in the Internet such as Cryptography the receiver end of a particular communication channel is not aware of the sender unless the sender transmits some information with private and public keys with cipher text which can prove his authenticity. Now the receiver sends the same package with his signature and then the receiver is also authenticated mutually. Attacks may occur in different ways. There are also many ways where in such communications can be detected and using techniques like eavesdropping or sniffing or man in the middle attack. These are the three major problems for secure communications. In my research, I will attempt to design a procedure which can be easily followed in order to overcome such problems. There are many techniques available now which are better than normal communication. The major problem in such techniques is the implementation of man in the middle attack. There have been many advances to try and rectify the problems but there has always been a flaw in the design. My research is to design a system using the current technologies used to encrypt and authenticate. These techniques play a major role in the implementation of IP Security. The major interest would be in areas like encryption, decryption and authentication. Additions will be done to this research as it is implemented. The goal is to use research existing systems and to suggest a system which makes it even hard to break. It is not 100% immune to attacks but the attack may take longer to break the system than the present rate. This system will also be very safe and will be easy to use in daily life rather than something with a dozen processing steps to be followed. 2.2 SCOPE With the rapid development of Multimedia data management technologies over the internet there is need to concern about the internet there is need to concern about the security and privacy of information. In multimedia document, dissipation and sharing of data is becoming a common practice for internet based application and enterprises. As the internet forms the open source the present for all users security Forms the critical issue. Hence the transfer of information over the internet forms the critical issue. At the present situations the cryptographic techniques are used for providing ‘SECURITY. 2.3 PROJECT PERSPECTIVE The project â€Å"Network system for Secure Communication† is totally enhanced with the features that enable us to feel the real-time environment. Todays world is mostly employing the latest networking techniques instead of using stand-alone PCs. IPSec tunnelling or Encryption, information scrambling technology is an important security tool. By properly applying, it can provide a secure communication channel even when the underlying system and network infrastructure is not secure. This is particularly important when data passes through the shared systems or network segments where multiple people may have access to the information. In these situations, sensitive data and especially passwords should be encrypted in order to protect it from unintended disclosure or modification. 2.4 PROPOSED SYSTEM In this system ‘security is the term that comes into picture when some important or sensitive information must be protected from an unauthorized access. Hence there must be some way to protect the data from them and even if he hacks the information, The proposed system provides the ‘security and it does not allow unauthorized users to access the secret files. As per the ISO standards the security parameters are: Confidentiality Authentication Integrity Key distribution Access control CONFIDENTIALITY: Confidentiality is the protection of transmitted data from passive attacks. It can protect the data from unauthorized disclosure. AUTHENTICATION: A process used to verify the integrity of the transmitted data, especially a message. It is the process of proving ones identity to someone else. INTEGRITY: The sender and the receiver want to ensure that the content of their communication is not altered during transmission. KEY DISTRIBUTION: Key distribution can be defined as a term that refers to means of delivering a key to the communicating parties, without allowing others to see the key. ACCESS CONTROL: It is a ability to limit and control the access to host systems and applications via communication links. 3.Literature Review This project emphasis design and evaluates a computer-based system using appropriate process and tools. Most of the industry wide routers in the network implement their functionality in hardware and therefore we believe that hardware based routers are more efficient than a software-based router implementation besides that most of the work is in the research community which will be performed, using software-based routers utilizing off-the-shelf PCs. Various works have to be attempted which evaluates different protocol stack, however none of them use hardware-based routers, has such a wide range of metrics, and none investigated mechanisms. My research methodology emphasis surveys, forums from the internet and articles from IEEE (Institute of Electrical and Electronics EngineersorIEEE) a quantitative approach in advance technology. I also consider various other thesis and books which are best suitable for my project. Here following are the network related definitions, and few protocols from application layer, network and internet layer also discussed which actually gives clear idea of understanding the concepts. 3.1 IPSec Standards: IPSec is actually a collection of techniques and protocols; it is not defined in a single Internet standard. Instead, a collection of RFCs defines the architecture, services and specific protocols used in IPSec. Some of the most important of these are shown below: [RFC 2401] Security Architecture for the Internet Protocol (IPSec overview) The main IPSec document describes the architecture and general operation of the technology, and showing how the different components fit together. [RFC 2402] IP Authentication Header It defines the IPSec Authentication Header (AH) protocol used for ensuring data integrity and origin verification. [RFC 2403] The Use of HMAC-MD5-96 within ESP and AH Describes a particular encryption algorithm for use by AH and ESP called Message Digest 5 (MD5), HMAC variant. [RFC 2404] The Use of HMAC-SHA-1-96 within ESP and AH Describes a particular encryption algorithm for use by AH and ESP called Secure Hash Algorithm 1 (SHA-1), HMAC variant. [RFC 2406] IP Encapsulating and Security payload (ESP) It describes the IPSec Encapsulation Security Payload (ESP) protocol that provides data encryption for confidentiality. [RFC 2408] Internet Security Association and Key Management Protocol (ISAKMP) It defines methods for exchanging keys and negotiating security associations. [RFC 2409] The Internet Key Exchange (IKE) Describes the Internet Key Exchange (IKE) protocol used to negotiate security associations and exchange keys between devices for secure communications. It is based on ISAKMP and OAKLEY. [RFC 2412] The OAKLEY Key Determination Protocol It describes a generic protocol for key exchange. [RFC 2131] Dynamic Host Configuration Protocol (DHCP) DHCP allows a host to obtain an IP address automatically, as well as to learn additional information about subnet mask, the address of its first-hop router, and the address of its local DNS server. [RFC 2131; RFC 3022] Network Address Translation (NAT)- In an attempt to provide transparent routing to hosts, NAT devices are used to connect an isolated address realm with private unregistered addresses to an external realm with globally unique registered addresses. Domain Name System (DNS): It is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various other information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. For example, www.example.com translates to 208.77.188.166. Windows Internet Name Service (WINS): It is Microsofts implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively WINS is to NetBIOS names, like DNS is to domain names in fact its a central mapping of host names to network addresses. Like DNS it is broken into two parts, a Server Service (that manages the encoded Jet Database, server to server replication, service requests, and conflicts) and a TCP/IP Client component which manages the clients registration and renewal of names, and takes care of queries. VPN (Virtual Private Network) : It is a virtual computer network that exists over the top of an existing network. The purpose of a VPN is to allow communications between systems connected to the VPN using an existing shared network infrastructure as the transport, without the VPN network being aware of the existence of the underlying network backbone or without the VPN interfering with other network traffic on the backbone. A VPN between two networks is often referred to as a VPN Tunnel. Most VPN technologies can be separated into two broad categories, Secure VPNs and Trusted VPNs. Internet Protocol version 6 (IPv6): It is the next-generation Internet Protocol version designated as the successor to IPv4. It is an Internet Layer protocol for packet-switched internetworks. The main driving force for the redesign of Internet Protocol was the foreseeable IPv4 address exhaustion. IPv6 was defined in December 1998 by the Internet Engineering Task Force (IETF) with the publication of an Internet standard specification, RFC 2460. IPv6 has a vastly larger address space than IPv4. This results from the use of a 128-bit address, whereas IPv4 uses only 32 bits. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion. Due to its security and flexibility entire Internet will be deployed byIPv6 in 2012 as expected. Tunnelling: In computer networks tunnelling protocol (delivery protocol) encapsulates the different payload protocol i.e., It carries a payload over an incompatible delivery-network. It can also provide a secure path through an untrusted network without any data loss. Transport Layer Security (TLS): Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as cipher text). In many contexts, the word encryption also implicitly refers to the reverse process, decryption. Internet Key Exchange: Internet Key Exchange (IKE or IKEv2) is the protocol used to set up a security association (SA) in the IPSec protocol suite. IKE uses a Diffie-Hellman key exchange to set up a shared session secret, from which cryptographic keys are derived. Public key techniques or, alternatively, a pre-shared key, are used to mutually authenticate the communicating parties. 4.IPSec System Architecture Authentication Header and Encapsulating Security Payload are commonly called â€Å"protocols†, though this is another case where the validity of this term is debatable. They are not really distinct protocols but are implemented as headers that are inserted into IP datagrams, as we will see. They thus do the â€Å"grunt work† of IPSec, and can be used together to provide both authentication and privacy. IPSec protocols: The IPSec protocol family consists of two protocols: Authentication Header (AH) and Encapsulated Security Payload (ESP). Both these protocols are independent IP. AH is the IP protocol 51 and ESP is the IP protocol 50 Authentication Header: This is a member of the IPSec protocol suite. Authentication Header provides connectionless data integrity and data origin authentication of IP packets. Further, it can also provide protection against the replay attacks by using the sliding window technique and by discarding the old packets. Authentication Header also gives protection for the IP payload and all the header fields of an IP datagram. AH generally operates on the stop of IP, by using the IP protocol number 51. An AH packet diagram is shown below which describes how an AH packet can be constructed and interpreted: Field meanings: Next header: This field is an 8-bit field that mainly identifies the type of the next payload obtained after the Authentication Header. The value of this field can be chosen from the set of defined IP Protocol Numbers. RESERVED These fields are usually reserved for the future use. Payload length This defines the size of Authentication Header packet. Sequence number This field represents a monotonically increasing number which is used to prevent certain replay attacks. Security parameters index (SPI) This field is used to identify the security parameters, in combination with the IP address, and then identify the security association techniques implemented with this packet. Authentication data This field contains the integrity check value (ICV) which is necessary to authenticate the packet. This field may also contain padding. Encapsulating Security Payload: ESP which can be expanded as Encapsulating Security Payload is a member belonging of the IPSec protocol suite. IPSec achieves integrity, origin authenticity, and confidentiality protection of packets. This protocol also supports encryption-only and authentication-only configurations. However usage of only encryption technique without authentication is not recommended because it is termed insecure. ESP does not protect the IP packet header like the Authentication Header (AH) does. The packet diagram below shows how an ESP packet is constructed and interpreted: Field meanings: Security paramete