Saturday, November 30, 2019

Monitoring System free essay sample

Introduction Desmark Motor Monitoring System is a system made to help the retailer in recording the customers information in a fastest way and to make the process easier. Desmark Motor Monitoring System will tally each inputted information given from the customer and will show the list of all motorcylce products only. This system is just use when theres a client who wants to purchase an item and to view its record. The system is also used only by the retailer or the admin of Desmark Motor Monitoring System for better security. This study aims to develop a System for the said establishment. A Monitoring system is a method of monitoring the availability of the product and the client who purchased the product. It provides the client As Desmark continues to expand, it has evolved and continues to exert more effort to provide customers with life-building technology for their satisfaction. Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. We will write a custom essay sample on Monitoring System or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. 1. 2 Statement of the Problem Due to the absence of the Honda Desmark Motor Monitoring System the following problems were observed: Possibility of redundant files. Cataloging searching is time consuming. Prone to record losses. 1. 3 Objective of the Study The proponent aims to develop a Product Monitoring System. These are the following solutions in regards to the problems. Reduction of redundant records/information. To make the searching easy and fast. To lessen record losses. 1. 4 Scope and Delimitation of the Study This study will provide Desmark with a better way of managing the availability of the product. The information can be accessed only by an authorized personnel or staffs security issues are also addressed. And will focus on the motorcycle product and customer will not include payment transactions. 1. 5 Significance of the Study This study benefits the following: Client, With the help of this study, customer will be able to access this transaction anytime anywhere within the specific country where you registered only. And it may help also to make the work easier and faster. School, The study will help the address the upcoming concern regarding the common problems in monitoring system. CEIT Faculty Members. The study will help the teachers understand the benefits of a health monitoring system. Researchers, The study will help the researchers address the problem about monitoring system in an easier and convenient manner. It will also guide them and enhance their skills and capabilities in handling monitoring techniques. Future Researchers, The study will help and guide them in improving future researches in handling monitoring system prior to the demands of the client. Definition of Terms The following definitions are to clear up and focus on the term as they pertain to this study. Technology. The systematic scientific study of technique. The application of science to the solution of practical problems. Automation. The process of getting work performed without any human effort except that of instructing one or more machines what to do and when to do it. Entertainment. To engage a person or audience by providing amusing or interesting material. Monitoring system. Supervision of activities in progress system to ensure they are on-course and on-schedule in meeting the objectives and performance targets. Monitoring techniques. Mechanisms the team use to monitor changes. REFERENCES [1] Chestnutt, J. ; Carnegie Mellon Univ. , Pittsburgh ; Michel, P. ; Kuffner, J. ; Kanade, T. http://www. cuecent. com/includes/pdfs/IVMS_brochure. pdf [2] Honda, H. ; Aptina Japan, Tokyo, Japan ; Osawa, S. ; Shoda, M. http://www. google. com. ph/? gfe_rd=crei=y8sVU776KszA8gflt4GgBQ#q [3] Wako Res. Center, Honda RD Co. Ltd. , Saitama, Japan http://en. wikipedia. org/wiki/Honda [4] Hirose, M. ; Haikawa, Y. ; Takenaka, T. http://www. hondaph. com/about http://www. papercamp. com/group/scope-and-limitations-in-monitoring-system/page-270 Chapter 2 Review of Related Literature and Studies This chapter presents the overview of the related literature and the studies, which serve as the background information relevant to the problem of the studies. 2. 1 Related Literature 2. 2 Related Studies Youve probably seen your chart at your doctors office. In fact, you may have charts at several doctors offices. If youve been in the hospital, you have a chart there, too. These charts are your medical records. They may be on paper or electronic. To keep track of all this information, its a good idea to keep your own personal health record. What kind of information would you put in a personal health record? You could start with Your name, birth date, blood type, and emergency contact information Date of last physical Dates and results of tests and screenings Major illnesses and surgeries, with dates A list of your medicines and supplements, the dosages, and how long youve taken them Any allergies Any chronic diseases Any history of illnesses in your family CHAPTER 3 RESEARCH METHODOLOGY This chapter explains the different phases that are used to carry out fully in developing the system. Such phases are the analysis modelling, system design, system requirements and Gantt chart. 3. 1 Analysis Modelling In Analysis Modelling stages gives out the details on the context diagram which show the flow of developing the Monitoring system. Context Diagram The context diagram contains the process that generalizes the function of the entire system in relationship to external entities. 3. 2 System Design On this stage, the researcher gives details on the development of the â€Å"Honda Desmark Motor Monitoring System†, and how its been design. The latter’s used various diagram that illustrate the flow and the different application of the system. Data Flow Diagram The Data Flow Diagram shows the main processes within the â€Å"Honda Desmark Motor Monitoring System. † Entity Relationship Diagram The entity relationship diagram enables the project team to identify data objects and their relationship using a graphical notation. During the making of analysis model, the project team initially an Entity Relationship Diagram for the Monitoring System. Gantt Chart 3. 3 Data Dictionary The data dictionary contains the field name, domain, with the parameters of attributes,constraints and the description of attributes. Table login Name Domain Constraints Description username String Not null Admin Username Password String Not null Admin Password Table Register Name Domain Constraints Description Username String Null Employee Username Password String Null Employee Password Confirm Password String Null Employee Confirm Password Gender String Null Employee Gender First Name String Null Employee First Name Last Name String Null Employee Last Name Address String Null Employee Address Employee Number String Null Employee Number Contact Number String Null Employee Number Employee Account Name Domain Constraints Description First Name String Null Employee First Name Last Name String Null Employee Last Name Employee Number Integer Null Employee Employee Number Contact Number String Null Employee Contact Number Gender String Null Employee Gender Customer Account Name Domain Constraints Description First Name String Null Customers’ First Name Last Name String Null Customers’ Last Name Motor Brand String Null Customers’ Motor Brand Motor Number Integer Null Customers’ Motor Number Gender String Null Customers’ Gender Customer Number Integer Null Customers’ Number Address String Null Customers’ Address Home Number Integer Null Customers’ Home Number Phone Number Integer Null Customers’ Phone Number Stock Monitoring Name Domain Constraints Description Model Name String Not Null Brand Model Name Model Number Integer Not Null Brand Model Number Quality String Not Null Brand Quality Price Interger Not Null Brand Price Availability String Not Null Brand Availability Credit App 1 Name Domain Constraints Description First Name String Null Credit App_ First Name Last Name String Null Credit App_ Last Name Middle Name String Null Credit App_ Middle Name Sex String Null Credit App_ Sex Citizenship String Null Credit App_ Citizenship Birthday String Null Credit App_ Birthday Civil Status String Null Credit App_ Civil Status Tin String Null Credit App_ Tin Date Issued Date Null Credit App_ Date Issued Place Issued String Null Credit App_ Place Issued Address String Null Credit App_ Address Length of Stay String Null Credit App_ Length of Stay Home Phone Number Integer Null Credit App_ HomePhone Number Office Phone Number Integer Null Credit App_ OfficePhone Number Mobile Phone Number Integer Null CreditApp_ MobilePhone Number Email Address String Null Credit App_ Email Address Name of Spouse String Null Credit App_ Name of Spouse Age Interger Null Credit App_ Age Credit App 2 Name Domain Constraints Description Name String Null Credit App_ Name Home Address String Null Credit App_ Home Address Residence String Not Null Credit App_ Residence Civil Status String Not Null Credit App_ Civil Status Sex String Not Null Credit App_ Sex Home Phone Number Integer Null Credit App_ Relation w/ Applicant String Null Credit App_ Relation w/ Applicant Birthday String Null Credit App_ Birthday Tin String Null Credit App_ Tin Mobile Phone Number Interger Null Credit App_MobilePhone Number Present Employer String Null Credit App_ Present Employer Date Hired String Null Credit App_ Date Hired Position String Null Credit App_ Position Employer’s Address String Null Credit App_ Employer’s Address Employment Status String Not Null Credit App_ Employment Status Credit App 3 Name Domain Constraints Description Brand String Not Null Credit App_ Brand Model String Null Credit App_ Model Color String Null Credit App_ Color LCP String Null Credit App_ LCP Downpayment Interger Null Credit App_ Downpayment 1 Month String Null Credit App_ 1 Month 3 Months String Null Credit App_ 3 Months 6 Months String Null Credit App_6 Months 12 Months String Null Credit App_ 12 Months 18 months String Null Credit App_18 months 24 Months String Null Credit App_24 Months 30 Motnhs String Null Credit App_ 30 Motnhs Remarks String Null Credit App_ Remarks Approve String Null Credit App_ Approve Approve w/ Condition String Null Credit App_ Approve w/ Condition Disapproved String Null Credit App_ Disapproved 3. 4 System Requirements This show the various hardware and software requirements. Hardware Requirements Some possible hardware components to be used for the developing the system Laptop Rating 2. 9 Windows Experience Index Processor:Intel(R)Atom(TM)CPU N550 @1. 50GHz RAM: 1:00GB System Type: 32-bit operating system Optical Mouse Software Requirements The following are the software requirements to be used in the study: Programming Language: MS Visual Basic 6. 0 Database: My SQL Microsoft Word Microsoft Access Monitoring system free essay sample ABSTRACT Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. In this study, an RFID based system has been built in order to produce a time-attendance management system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI was developed using visual basic. Net. The Time-Attendance Management System provides the functionalities of the overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. We will write a custom essay sample on Monitoring system or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This interface was installed in the host computer. Keywords: Radio-frequency identification, RFID technology, radio waves INTRODUCTION Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID chips contain a radio transmitter that emits a coded identification number when queried by a reader device. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. This small type is incorporated in consumer products, and even implanted in pets, for identification. The tags information is stored electronically. The RFID tag includes a small RF transmitter which transmits an encoded radio signal to interrogate the tag, and receiver which receives the message and responds with its identification information. Some RFID tags do not use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source. The RFID system design includes a method of discriminating several tags that might be within the range of the RFID reader. RFID can be used in many applications. A tag can be affixed to any object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has used RFID to reduce counting, looking for things and auditing items. Many financial institutions use RFID to track key assets and automate compliance. Also with recent advances in social media RFID is being used to tie the physical world Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 168 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 with the virtual world. RFID in Social Media first came to light in 2010 with Facebooks annual conference. RFID is a superior and more efficient way of identifying objects than manual system or use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags (those without a battery) can be read if passed within close enough proximity to an RFID reader. It is not necessary to show the tag to the reader device, as with a bar code. In other words it does not require line of sight to see an RFID tag, the tag can be read inside a case, carton, box or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can only be read one at a time. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. They are grouped under the automatic identification (Auto-ID) technologies. RFID tags are not an improved bar code as the proponents of the technology would like you to believe. An RFID system consists of three components which include: an antenna, a transceiver and a transponder (the tag). The antenna and the transceiver are often incorporated into one reader. The antenna uses radio frequency waves to transmit a signal that activates the transponder. When activated, the tag transmits data back to the antenna. The RFID can read the tag using Radio Frequency, meaning that the RFID reader can be read from a distance, right through your clothes, wallet, bags etc. An RFID tag consists of unique ID for each tag. The RFID technology has been in existence since the early 1920s. This technology has been used in libraries, museums, race timing, toll collection and contactless payment, tracking of persons and animals etc. The RFID attendance system is an automatic embedded system used in taking attendance of registered persons in a particular organization. The RFID attendance system offers an organization, the efficiency and convenience associated with RFID technology at a low cost. This method is fast as well as simple. Each employee uses an RFID card and the reader records the data when the employee enters or exits. RFID devices and software must be supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). Nowadays, there are lots of companies around the world and some of them consist of workers up to 10 thousand or more. To handle a large number of workers may be a problem especially to get the attendance of the workers. The manual process means that whenever a worker comes to work, he goes to sign at the time officer’s table. This manual process has some flaws because in a case where a worker bribes the time officer or is familiar with him, the time officer may tamper with the attendance records. This would be a big problem in the company and might affect the productivity and management of the company. The suitable solution for this problem is by designing a system that will record attendance automatically. In this project, RFID system is used to record the numbers of employees’ attendance automatically. The ID cards of the employees is embedded with RFID tag which is read by a reader. This RFID system is interfaced to a database through a computer. This method is more effective to prevent problem encountered when getting attendance manually. Below is the block diagram of an RFID attendance system. Related Works The use of Radio-frequency identification (RFID) technology in automated electronic environment and for tracking objects has been widely researched upon by researchers and deployed by various organizations as part of their automation systems. References [21] and [7] provide examples of a real RFID contact less data link deployments that utilize RFID technology for object tracking and automated data collection solution. RFID is a technology that uses radio waves to transfer data from Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 169 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object In 1945, Leon Theremin invented an espionage tool (for spy activities) for the Soviet Union which retransmitted incident radio waves with audio frequency information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency even though this device was covert listening device, not an identification device or tag, it is considered to be a predecessor of radio frequency identification (RFID) technology because it was likewise passive, being energized and activated by waves from an outside source. Similar technologies such as the IFF (identification friend and foe) transponder developed in the United Kingdom, was routinely used by the allies in the World War 2 to identify aircrafts as friend or foe. Transponders are still used by most powered aircrafts to this day. Mario . W. Cardullo was the first to have received the United States patent for an active RFID tag with re-writable memory on January 23, 1973 [4]. In that same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicates a reader near a door, when the reader detects a valid identification number stored within the tag, the reader unlocks the door. Walton licensed the technology to Schalge lock of San Francisco, a lock maker and other companies [1]. Time and attendance systems are a major part of today’s human resource systems, take organization towards better human resource practice, systems and excellence. The implementation of time and attendance system has a lot of advantages for the manager. The kind of system that is implemented depends upon what the organization is trying to achieve by implementing the system. There are different types of automatic attendance systems; each type of system is suited to different needs and requirements [9]. Some of the most common types include; biometric attendance system, magnetic stripe attendance system, barcode attendance system, and RFID attendance system. Barcode Attendance System The barcode system is a common type of time and attendance system through which the efficiency of measuring and tracking employees’ time could be increased to a great degree. With the automation through barcode technology, the errors previously made in the manual payroll or attendances are eliminated. As a result, the system provides high levels of accuracy and reliability in tracking of employee attendance. In addition, the costs associated with the installation of the system are not too much relative to the cost of payroll or attendance errors. The implementation of the barcode system is easy. Every employee is issued a badge/card in which there is a barcode. In order to check into or out of the company, the badge/card is swapped on the time clock, and the data is captured by the clock. This data from the clock can be downloaded by the manager or the administrator and then used for updating and maintaining time and attendance records. The Universal Product Code (UPC) is a unique 12-digit number assigned to retail merchandise that identifies a product and the vendor. The Universal Product Code (UPC) on a product typically appears adjacent to its barcode, the machine-readable representation of the Universal Product Code (UPC). The UPC for a particular product is always the same. The first six digits is the vendor unique identification number. All the products that the vendor sells will have the same first six digits in their UPCs. The next five digits identify the product. The last digit is called the check digit. This is used to verify that the UPC for that specific product is correct. Each time that UPC is read, typically by a scanner reading the barcode, a calculation is done. And, if the check digit is different compared from the one that is calculated, then the computer knows that there is something wrong with the UPC. Figure 1 is a pictorial diagram of a barcode with its universal product code (UPC) [11]. Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 170 ISSN-L: 2223-9553 ISSN: 2223-9944 9553, Academic Research International Vol. 2, No. 2, March 2012 Fig. 1 picture of a barcode Biometric Attendance System This is the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes which include:-face fingerprints, ecked. include: face retina, hand geometry, vein, voice etc. The computer uses any of these biometric identification schemes to determine who you are, and based your identity authorize your different levels of access authorize [12]. Under this system, there is time and attendance software that is paired with a time clock for employees which uses biometric technology for authentication purposes. When these systems are in use, the employees can use their finger prints for clocking in and clocking out. This method has the great benefit that the entire process is easy as well as quick. Other advantages include elimination of the cost previously incurred in getting the employees cards. In the other systems that uses card other (magnetic stripe and barcode systems), there is an ongoing expense associated with the damage, misplacement and stealing of cards and the continuous need for their restoration and maintenance. Magnetic Stripe Attendance System In the magnetic stripe attendance system, data is encoded in the magnetic stripe of the employee card. When the card, is swiped through the employee time clock, the information in the card’s magnetic stripe is recorded by the time clock. This system also reads one card at a time and also requires contact reads with the reader. Figure 2 is a pictorial diagram of a card embedded with magnetic strip. Fig. 2 picture of a magnetic stripe card Radio Frequency Identification (RFID) A radio-frequency identification system comprises hardware shown in figure 3a 3b, known as frequency interrogators or readers and tags, also known as labels, as well as RFID software or RFID tags , middleware. RFID tags are of two major types, which include Active Tag and Passive Tag. and Fig. 3a RFID tag Copyright  © 2012 SAVAP International www. savap. org. pk Fig. 3b RFID card and reader www. journals. savap. org. pk 171 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 RFID tags can be either passive, active or battery assisted passive. Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts or beacons its signal. A battery assisted passive has a small battery on board that is activated when in the presence of a RFID reader. Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal. Depending on mobility, RFID readers are classified into two different types: fixed RFID and mobile RFID. If the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a bubble of RF energy that can be tightly controlled if the physics is well engineered. This allows a very definitive reading area for when tags go in and out of the interrogation zone. On the other hand, if the reader is mobile when the reader reads tags, it is called mobile RFID. An Electrical Engineering student of the University of Malaysia; Mohd Firdaus Bin Mahyidin designed RFID technology students’ attendance system 2008 [10], which only takes attendance of students and stores the information in the database. The block diagram of his project is shown figure 4. However, this system does not the incorporate a door unit which allows access to only registered users. Fig. 4: RFID Technology Students attendance system. Comparing Barcode with RFID is done on table 1. Table 1: comparisons between Barcode and RFID 1 2 3 4 5 6 7 Barcode Rely on the user to make contact to the reader, hence cannot be read from a distance In Barcode, only one card read at a time is allowed. Embedded information cannot be updated, hence the restriction of the repeated overwriting if the embedded election information for each card It does not allow for the increase technologies like surveillance cameras to be activated with an employee being in the vicinity. RFID Do not require contact with reader, hence can be read from a distance. Multiple read at a time is permitted Embedded information can be updated; this allows the repeated over-writing if embedded electronic information for each card. RFID has increased technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. It is slower and requires time of sight to RFID is faster and does not require line of function. sight. It has lower data storage transponder. It has higher data storage. This transponder is bogus, and cannot be The transponder is miniaturized, and can be incorporated in small items. incorporate in other items. For example in 2009 researchers successfully glued RFID micro-transponder to live ants [1] Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 172 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Radio Frequency Identification (RFID) Attendance System RFID READER GRAPHICAL USER INTERFACE (GUI) DATABASE MICROCONTROLL COMPUTER ER DOOR UNIT POWER SUPPLY UNIT Fig. 5 Block diagram of an RFID attendance system with door unit The RFID attendance system offers the organization, the efficiency and convenience associated with RFID technology at a low cost. Each employee uses an RFID card and the reader records the data when the employee enters or exits. Operations RFID devices and software are supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). The RFID tag can be read from a distance and the embedded electronic information for each card can be over written repeatedly. This increases technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. The RFID attendance system is faster, and does not require line of sight. The RFID system has higher data storage. In the RFID systems, the transponders are also easy to conceal or incorporate in other items. For example in 2009, researchers successfully glued RFID micro transponder to live ants in order to study their behavior [1]. Furthermore, multiple RFID cards can be read all at the same time. Information about the employees’ access and attendance can be stored on the database. RFID Frequency band Frequency refers to the size of the radio waves used to communicate between the RFID system’s components. It can be assumed that higher frequency resulting faster data transfer rate and longer reading distance. However as frequency increases, the sensitivity to environmental factor also increases. RFID system currently operates at Low Frequency, High Frequency and Ultra High Frequency. Generally a lower frequency means a lower read range and slower data read rate, but increased capabilities for reading near or on metal or liquid surfaces. The frequency chart is shown in table 2 [18]. Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 173 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Table 2: RFID Frequency Table Frequency band Description Operating range Application benefits Drawbacks Access control, animal tracking point of sale application, product authentication, vehicle immobilizer etc Smartcards library books, airline baggage etc Works well around water and metal products Short range slower rate Low cost of tag High read rate when compared to low frequency 125KHz to 134KHz Low frequency Less 0. 5m to 1. 5ft than read and read 13. 56M Hz High frequency Less 1m to 3ft than 860MHz To 930MHz Ultra high frequency (UHF) 3m to 9ft Parking lot access, electronic toll collection etc EPC standard built around this frequency Does not work well with high water or metal content 2. 4GHz microwave 1m to 3ft Airline baggage, electronic toll collection Most expensive Fastest rate read Miniaturization RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro-transponders to live ants in order to study their behavior [6]. This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances. Hitachi holds the record for the smallest RFID chip, at 0. 05mm x 0. 05mm. This is 1/64th the size of the previous record holder, the mu-chips. Manufacture is enabled by using the silicon-on-insulator (SOI) process. These dust-sized chips can store 38-digit numbers using 128-bits read only memory (ROM) [7]. A major challenge is the attachment of the antennas, thus limiting read range to only millimeters. The Radio Frequency Identification (RFID) Application Areas In 2010 three key factors drove a significant increase in RFID usage. They include; decreased cost of equipment and tags, increased performance to a reliability of 99. 9% and a stable international standard around UHF passive tag. The areas of significant use are financial services for Information Technology asset tracking and healthcare with more than 60% of the top medical device companies using passive UHF RFID in 2010. RFID is becoming increasingly prevalent as the price of the technology decreases [7]. Therefore, the current uses include: Electronic Vehicle Registration With security of cars being a major concern in many countries, RFID technology is being leveraged by government for Vehicle Registration [21] [13]. This helps detect stolen cars and in their retrieval [14] [18]. Payment by Mobile Phones Since summer 2009, two credit card companies have been working with Dallas, Texas-based Device Fidelity to develop specialized microSD cards. When inserted into a mobile phone, the microSD card can be both a passive tag and an RFID reader [19]. After inserting the microSD, a users phone can be linked to bank accounts and used in mobile payment. Diaryqueen in conjunction with Vivotech has Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 174 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 also begun using RFIDs on mobile phones as part of their new loyalty and rewards program. Patrons can ask to receive an RFID tag to place on their phone. After activation, the phone can receive promotions and coupons, which can be read by Vivotechs devices [16]. Similarly,Nokias 2008 device, the 6212, also has RFID capabilities. Credit card information can be stored, and bank accounts can be directly accessed using the enabled handset. The phone, if used as a vector for mobile payment, has added security in that users would be required to enter a passcode or PIN before payment is authorized [16]. Transportation Payments Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Car-Sharing The Zipcar car-sharing service uses RFID cards for locking and unlocking cars and for member identification [20]. Toll Roads The tags, which are usually the active type, are read remotely as vehicles pass through the booths, and tag information is used to debit the toll amount from a prepaid account. The system helps to speed traffic through toll plazas as it records the date, time, and billing data for the RFID vehicle tag. This has been introduced in some places in Nigeria. Public Transit (bus, rail, subway) In South Korea, t-money cards can be used to pay for public transit. It can also be used in most convenience stores and vending machines in subways as cash. 90% of cabs in Seoul accept card payment, including most major credit cards and the T-money card. T-money replaced UPASS, first introduced for transport payments in 1996 using MIFARE technology [15]. Also, in Hong Kong, mass transit is paid for almost exclusively through the use of an RFID technology, called the octopus card. This has also been used in various other countries like Canada, Russia etc [15]. Asset Management and Retail Sales RFID combined with mobile computing and Web technologies provide a way for organizations to identify and manage their assets. It was initially introduced to major retail by Craig Patterson, Knoxville, TN. Mobile computers, with integrated RFID readers, can now deliver a complete set of tools that eliminate paperwork, give proof of identification and attendance. Web based management tools allow organizations to monitor their assets and make management decisions from anywhere in the world. Web based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for example, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data. Organizations are already using RFID tags combined with a mobile asset management solution to record and monitor the location of their assets, their current status, and whether they have been maintained. RFID is being adopted for item-level retail uses. Aside from efficiency and product availability gains, the system offers a superior form of electronic article surveillance (EAS) and a superior self checkout process for consumers. The financial services technology consortium (FSTC) set a technical standard for tagging Information Technology assets [21] and other industries have used that standard as a guideline. For instance the US State Department is now tagging IT assets with passive RFID using ISO/IEC 18000-6 standard [8]. Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 175 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Schools and Universities School authorities in the Japanese city of Osaka are now chipping childrens clothing, back packs, and student IDs in a primary school. Similarly, Whitcliffe Mount School in cleckheaton England uses RFID to track pupils and staff in and out of the building via a specially designed card. In the Philippines, some schools already use RFID in IDs for borrowing books and also gates in those particular schools have RFID ID scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teachers attendance [8]. Human Implants Implantable RFID chips designed for animal tagging are now being used in human beings. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. In 2004 Conrad chase offered implanted chips in his night clubs in Barcelona and Rotterdam to identify their VIP customers, who in turn use it to pay for drinks. In 2004, the Mexican Attorney Generals office implanted 18 of its staff members with the verichip to control access to a secure data room [15]. Fig. 6a Hand with the planned location of the RFID chip Fig. 6b The hand just after the operation to insert the RFID tag was completed. The yellow is from the iodine disinfection before inserting the chip APPLICATIONS OF RFID TECHNOLOGY IN NIGERIA The RFID technology has been suggested to be applied in various sectors in Nigeria to reduce corruption. These sectors include; the monitoring of crude oil, tracking the movement of money, drug agencies and monitoring containers entering the country. Other proposed applications include: the cloning of documents such as certificate of occupancy, bills of lading and university certificates etc. An RFID technology company in Nigeria started providing anti-money laundering (AML) solutions to banks. The technology tracks the movement of money and alerts the Nigerian Financial Intelligence Unit of any suspicious activities. The company is providing the service to five major Nigerian banks. This technology has been used by NAFDAC to reduce the importation and distribution of counterfeit drugs 2008 [17]. SYSTEM DESIGN AND IMPLEMETATION METHODOLOGY The method/approach used in achieving this project design include; the designing of a hardware unit consisting of a motor interfaced with a designed database and graphical user interface(GUI) that will be responsible for taking and storing the data received from the reader. And the software development Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 176 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 unit consisting the Microsoft visual studio, Microsoft . Net framework and Microsoft access. This is done by comparing the information received from the RFID reader to the information stored in the database. The Hardware The hardware architecture consists of the UME4100 RFID tag, the SEEED 125 KHz RFID reader, the ATMEL AT89S52 microcontroller, the computer, the door unit, the power supply unit, the universal serial bus (USB), USB to serial converter, the RS-232 interface, the universal asynchronous receiver transmitter (UART) and the serial data transmission. The RFID reader in figure 7 uses low frequency band, and practically, the reading distance between the tag and the reader is about 7cm. The output of this reader is transmitted serially, and data is transmitted at 9600 baud rates. However, this reader has been chosen because it has a DB9 female header, which can be used to connect to the serial port of personal computer, and it can display the unique ID of the tag in Window operating system. Its applications includes Pet Toys and Access Control System Fig. 7 The SEEED RFID reader [2] (module and antenna) The figure 8 shows the RFID tags used in this paper. These RFID tags are passive tags thus it has no internal power supply. These tags activated by radio frequency transmitted by the reader. The reading distance is about 7 cm. When the RFID reader receives the data from the tag, the data then will be compared with the data in the database to identify the holder of the tag. Fig. 8 The UEM4100 RFID tag This design consists of the RS-232 circuit, the motor circuit and the microcontroller. The RFID reader sends signals to the RS-232 circuit which interfaces with the serial port. The microcontroller is programmed to receive signals from the RS-232 circuit and sends signals to control the motor circuit which controls the direction of movement of the door. The crystal oscillator generates pulses that enable the microcontroller to execute instructions. The microcontroller codes are written with assembly language. The motor unit controls the movement of the door. The microcontroller sends signals to the transistor which acts as a switching device. These transistors allow current flow into the relay. The RS-232 converts the transistor-transistor logic data to enables communication with the serial port. The Software The software development unit consisting: the Microsoft visual studio, Microsoft . Net framework and Microsoft access [3]. Copyright  © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 177 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Microsoft Access Database: There are two databases designed using Microsoft Access 2007. The databases named â€Å"regDB† and â€Å"attendance†. The â€Å"regDB† database stores information of registered users. This information is used by the administration to identify and manipulating attendance information.

Tuesday, November 26, 2019

Rainbows End + the Lost Thing Essay (Belonging) Essays

Rainbows End + the Lost Thing Essay (Belonging) Essays Rainbows End + the Lost Thing Essay (Belonging) Essay Rainbows End + the Lost Thing Essay (Belonging) Essay Describe how the concept of Belonging is shown in your prescribed text and at least one other related text. Belonging is the complex process whereby perceptions of self and social allegiances are forged or not forget. It is a concept and not a theme, meaning it is a general idea, which encompasses the idea of not belonging. According to Abraham Maslow, belonging is essential in human development and not belonging is a barrier in achieving self-actualisation. The concept of Belonging is not static as it may change overtime for a number of different reasons such as an individual’s socio-economic background, geographic location and many other barriers. Although individuals may not belong to self, people, places, communities or the larger world everyone must belong. It is inevitable. For example, a criminal who has been imprisoned and isolated from the rest of society still belongs to himself, the prison and the other prisoners. No man is an island, entire of itself† is a famous quote by John Donne, which represents this idea of belonging, where no body can be totally isolated. From his studies, Maslow developed a hierarchy of needs whereby the physiological needs of food, shelter and water were the fundamentals of human life and self-actualisation was considered to be the pinnacle of the hierarchy. Between these two stages was the need for belonging to self, people, places, communities and the larger world. The barriers to self-actualisation are shown through a variety of texts, whereby composers highlight differences between two subjects and demonstrate forms of segregation through the use of a variety of methods. In Rainbow’s End by Jane Harrison this idea is portrayed through the use of an extended metaphor of the colour white. The reoccurrence of the colour white represents the Aboriginal society conforming to the English settlers. For example, in Act 1 Scene 6 the inspector comments that Nan Dear’s â€Å"whites are so white†. This shows us that the white society expects the Indigenous people to ‘wash away’ their traditions and way of life and so to conform to them. This same technique is shown where Nan Dear finds an advertisement in the newspaper in Act 2 Scene 6 and says â€Å"they’ve got this new powder that guaranteed to turn your skin white. † to Dolly. Due to the differences in skin colour and tradition Aboriginals were seen as lower class citizens and were alienated from the white society. Harrison shows this through the use of a simile in Act 1 Scene 1B where Gladys describes the hessian used to hide the Aboriginal housing from the Queen as â€Å"a band-aid over a sore†, which creates a negative image of the Indigenous people and their housing. This idea of being different from others around you is also excellently shown in Shaun Tan’s picture book The Lost Thing where the majority of the book’s images are made up of dull, unattractive colours such as browns, greys and whites that create a plain and ordinary background. The colour of ‘the thing’ is a bright red that immediately catches the reader’s eyes, drawing their attention to it. This use of contrast of colour shows that ‘the thing’ is lost, as it obviously does not belong to its surroundings. The exceptional use of these techniques to develop an idea of segregation as a barrier to self-actualisation causes the responder to explore the character’s feelings of isolation and rejection. Although people may feel isolated and alienated from everything around them, they are never alone. It is not possible to be completely disconnected from everything. For example, a man who has lost all his family and friends and is the only person alive on an island can still relate to the island itself, any living things such as animals and plants and many other things that he shares similarities with. This theme is explored in Rainbows End through Harrison’s use of a number of effective techniques. In Act 1 Scene 2B Dolly whistles loudly to her cousins and yells â€Å"Oi! You little monkeys, get that ruddy bicycle back ‘ere or I’ll give youse a kick up the moom! † before turning to Errol and sarcastically saying â€Å"And you were worried about losing your map! †. This change of accent and use of word choice between when Dolly is talking to her cousins and when she is talking to Errol shows that Dolly is trying to link with Errol even though they are from different cultures and have different coloured skin. This use of diction emphasises Dolly’s attempt to conform to Errol based on the fact that they are both humans rather than distinguishing between minute factors such as cultural background. This same message is also portrayed through the use of stage directions and dramatic irony in Act 2 Scene 1 where Errol returns to apologise to Dolly about what happened the previous night. As Errol walked in Dolly’s direction, Gladys and Nan Dear (assuming Errol was the one that raped her), step towards Dolly showing the families sense of unity with one another. However, the audience knows from the previous scene that Errol was not guilty of raping Dolly, rather it was her cousin. So despite the emotional carnage that Dolly experienced such as feelings of neglect when she was left in the rain after she was taken advantage of by her cousin, Dolly still is a firm member of the family. This very significant message used by composers is also created in Tan’s award winning picture book The Lost Thing where Tan uses intertextuality of a painting called Collins Street, 5pm by John Brack. In Tan’s version of the painting he includes ‘the thing’ in the background of the image to show how despite it clearly not fitting-in with the people crowding the street it still has a purpose and meaning in the picture and therefore it is an important sector of the final image. The idea that â€Å"no man is an island, entire of itself† demonstrated by composers causes the responder to recognise the larger picture in which they can associate themselves with. Through the vast majority of techniques mentioned, it can be seen that many composers incorporate the concept of Belonging in their texts to help intrigue their target audience. The idea of belonging being a need and alienation being a barrier to self-actualisation incorporated with the fact that we are each like a piece of a giant jigsaw puzzle, whereby our connections are what make us belong, therefore meaning that belonging is inevitable.

Friday, November 22, 2019

How to Start a Book Discussion Club

How to Start a Book Discussion Club A book club is a great way to meet new friends and read good books. This step-by-step  guide will help you start a book club that can last for years. How to Start a Book Discussion Group Get together a core group - It is much easier to start a book club with two or three people who already have some connection. Ask around the office, playgroups, your church, or civic organizations. Sometimes you might find enough people to start a book club right away. Often youll at least recruit some help in completing the rest of the steps.  Set a regular meeting time - An ideal size for a book club is eight to 11 people. As you can imagine, it is often difficult to coordinate that many peoples  schedules. Go ahead and set a regular meeting time and date for your book club with your core group. For instance, meet the second Tuesday of the month at 6:30 p.m. By setting the time before advertising the book club, you avoid playing favorites when working around schedules and you are upfront about what commitment is required.Advertise your book club - The best advertising is often word of mouth. If your core group doesnt know of other people to ask, then advertise in your circles of interest (school, work, church) with fliers or announcements.   Establish ground rules - Get together with your potential book club members and set the groups ground rules. You might want everyones input. However, if you have set ideas of what you want, then set the rules with your core group and announce them at this first meeting. The ground rules should include how books are chosen, who hosts, who leads discussions and what kind of commitment is expected.Meet - Set a schedule for the first few months and start meeting. If the book club is small at first, dont worry about it. Invite people as you go. Some people will be more likely to join an already established book club because they feel less pressure than they would as a founding member.Keep meeting and inviting people - Even if your book club is an ideal size, from time to time youll have the chance to invite new people as other members move away or drop out. Hopefully, youll always have a core group, and together you can reload. Example Ground Rules for Book Clubs Hosting Duties: You may decide to rotate hosting duties. The host may select the book, lead the discussion, and provide the meal or select the restaurant or coffee shop where you meet and perhaps provide appetizers and drinks.Food and Drink: Food is not required, but it helps the discussion roll and makes the book club meetings more fun. Some book clubs meet at a different restaurant each month. Sometimes meetings are held in peoples homes. (Check out this sample book club schedule  for some suggestions). How to Choose Books Some groups vote on what books they are going to read at the beginning of the year. Others let the host for the month choose. You can also use the bestsellers lists or a national book club such as Oprahs Book Club  as a guide. No matter how your book club chooses books, you also need to decide if there will be any restrictions on the choices (ie, just fiction, paperbacks, etc.).   You may want to base choices on whether they are available at the library or have a long waiting list, and whether they are available in electronic format or audiobook format. Leading the Discussion Be prepared with discussion questions. You can search for these online for most bestsellers. Even if youre shy about leading, a few creative pointers can get the ball rolling.

Thursday, November 21, 2019

Ethics Essay Example | Topics and Well Written Essays - 1500 words - 7

Ethics - Essay Example Most would not think cheating Uncle Sam out of such a small amount as ‘unethical.’ These types of behavior illustrate both how conditioning and association function to determine our course in life. While we are influenced by how we were taught regarding what is right and wrong within a given situation and we make decisions based upon our association with these rules, ethics can ultimately only be quantified on a personal level. Slavery was just as wrong then as now and cheating is always wrong even if it’s the government that is the victim. During the days of slavery, many knew it to be wrong and it bothers some to exceed the speed limit or dodge taxes even to the smallest extent but why the disparity? The discrepancy lies within the experiences of the individual, what they witnessed as acceptable behavior and were taught as children. Whether or not a society progresses in a positive, productive manner ultimately depends upon how ethical it collectively decides to be, a reflection of the importance it gives to educating its citizens on understanding their own personal ethical conduct. Because society is, at its most basic level, a collection of individuals, it is necessary to define one’s own philosophy of proper business ethics before moving out into the field. For me, proper business ethics should include an individual’s constant attention to the common good and justice, which includes issues of sustainability and eco-efficiency as well as leading by example at the individual and organizational level. Ethical business practices give customers, employees, partners and shareholders reassurance that they will not be cheated. The ethical approach that favors the common good suggests that a corporation’s actions should benefit, ultimately, all of a community or society. According to Socrates, knowledge of oneself

Tuesday, November 19, 2019

Vertebrate Evolution Essay Example | Topics and Well Written Essays - 750 words

Vertebrate Evolution - Essay Example The issue of whether a more developed species is advanced or not is subject to how one defines advancement, and is not tackled in this paper because of its subjectivity. Related species usually share similar morphological and or anatomical characteristics. They can either be ancestor-descendant, or descendants from the same ancestor. The proximity of their relation is defined by the amount of evolutionary changes that occurred between them. For example, humans are closer to four-legged animals than to fish. Humans are closer to monkeys than they are to horses because of their opposable thumb. However, not all organisms that have a characteristic in common are closely related. Bats and birds are the only groups of vertebrates that share flight, but bats descended from a lineage of non-winged animals, and are thus more related to humans than they are to birds. Possible relations among groups (A, B and C) can be depicted through a cladogram (Figure 1). Cladistics, the process behind making a cladogram, is usually based on morphology, but can also be made from anatomy or embryology, for example. It is a branching diagram in which the base is occupied by the closest common ancestor. It may be extant, and as such be one of the groups, but it may also be hypothetical, like in this case, and as such is left as blank. From it, a character that differentiates the groups from their closest common ancestor is placed on the branch leading to A, B, and C (tick mark). Because groups A and B are more closely related to each other than to C, the defining characteristic that made them different from C is also placed in the diagram (double tick mark). Points of bifurcation represent hypothetical ancestors. A number of cladograms can be made in relating A, B, and C to one another, but it is usually the tree with the minimum number of evolutionary changes t hat is preferred (Kent and Carr 2004,

Saturday, November 16, 2019

Alternative Medicine Essay Example for Free

Alternative Medicine Essay The widespread use of alternative medicine nowadays has driven scientists to study it and understand the reasons of the high demand for unconventional treatment. According to Zollman C, and Vickers A. (1999), complementary and alternative medicine (CAM) can be defined as therapeutic and diagnostic disciplines which are exogenous of the institutions where modern methods of treatment are exist and taught. Eisenberg D. (1993), defines CAM as â€Å"medical interventions which are commonly not taught at medical schools and not generally provided at hospitals in the US†. These two definitions are not fully satisfactory because, firstly, some forms of CAM which were tested by scientists and appeared to be safe and effective and found a place in conventional medical mainstream. Secondly, CAM is not about medical intervention, which means impacts of taken drugs. The majority of CAM is based on psychology, spirituality, sociology and traditional Chinese medicine (TCM), which make trials difficult. However, despite the fact that conventional medicine is scientific based and proven by science, many people still use alternative medicine instead or as a compliment to the modern one. Research shows that the majority of the patients at an Accident and Emergency department used to refer to some forms of CAM. (Waterbrook A.L, 2008). Other studies show that over the period of the last 20 years an increase in interest in CAM was observed. Approximately 30% of the UK population (Ernst, 1996) and almost the same in the USA (Kuhn, 1999, Wooton and Sporber, 2001) have used alternative medicine. Referring to these sources it is seen that the demand for CAM remains high nowadays; however, the importance here is not to evaluate the reasons why people still use alternative medicine but to prove or disprove the outweighing advantages of CAM over conventional medicine. The key point is to understand what there is about CAM that differentiates it from modern health care. It is argued that individuals to date embrace CAM because it meets consumer needs and provides health care without any side effects, curing an illness completely not just minimizing the pain for a short period. However, despite the popularity of CAM, the effectiveness cannot be fully trusted and thoroughly tested, whereas, conventional medicine is based on s cience study and research and scientifically proven. The aim of this essay is to compare and contrast two approaches of medical health care and to prove that advantages of modern medicine outweigh those of alternative methods of treatment in many aspects  and to show that CAM has many disadvantages which have been revealed during surveys. First of all, it is better to learn the history and some forms of unconventional medicine to have background knowledge on it. While modern medicine developed due to science evolvement, CAM always existed from many centuries ago till these days. It takes roots from traditional Chinese medicine (TCM)found on herbal remedies also including psychological, spiritual aspects in their treatment. In contrast to modern medicine, TCM focuses not solely on disease but also on maladjustment of human body and whole functioning process. The most commonly used forms of CAM are herbal therapy, health food and vitamins consumption, massage, relaxation techniques, chiropractic, acupuncture and placebo (Sutherland L.M , 1994). According to the type of treatment they provide, CAM practitioners can be put into four groups, although there is no defined way of classification for unconventional treatment. The first, psychological and spiritual group comprises faith healers, mystics providing paranormal healings and those who use specific methods affecting human psychology such as hypnosis, mental imaging and laughter therapy. Those, who advice herbal remedies, vitamin and multivitamin supplements and particular diets like macrobiotic diet, are in the second, nutritional group. The drug and biologic category includes highly trained specialists in the drug, various chemicals and vaccine use. It can be injections to improve the immune system, injections of animal live cells and homeopathy. The fourth group consists of chiropractors, touch and massage therapists and acupuncturists, where treatment involves some physical forces. There are also other treatments which are problematic or incapable of being classified, such as iridology, aroma therapy and the identification of internal illness by examination of the eye iris (Rubel A, Murray R, 1992). Increasing popularity of CAM and reasons driving people to choose unconventional medicine as a compliment to conventional one or instead of it can be clearly explained. First of all, some people refuse from modern health care because of dissatisfaction with it or with the physicians, particularly when a prognosis offering no hope for a patient is announced or when a patient experiences revulsion or painful effects of treatment. Dissatisfaction with health care provider is also can be one of the reasons of using CAM. Studies at University of Limpopo revealed that patients were disappointed with attitudes of doctors. They claimed that  physicians did not provide sufficient time for consultation, some of which were only 10 to15 minutes. In addition, it is argued that health care providers behaved as if they were cognizant of everything and often not explaining about illness and not providing information about treatment (Ogunbanjo G, 2008). This might be the reason of disappointment and stimulating people to seek alternative treatments. On the contrary, approach of homeopaths was likely to be preferred by patients. According to the research done by professor Gboyega Ocunbanjo at University of Limpopo (2008), relationship between patient and CAM practitioner played more crucial role what than type of treatment was used. Homeopaths supported patients not only physically but morally, they spent more time on discussion of the problem than mainstream medicine doctors did, relationship was person-to-per son, rather than patient and physician (Ogunbanjo G, 2008). Consequently, the patients felt themselves more independent and respected by practitioners and made further visits. However, results of this study revealed no potential advantage of CAM, but only psychological aspect of it. It showed significance of relationship between CAM practitioner and patient and moral support given by homeopaths, missing any proofs on real treatment of alternative medicine. Other studies also showed that reasons of switching to CAM depended more on personal belief in paranormal, extra-sensory and spirituality rather than dissatisfaction with conventional medicine. Survey held by Custers K et al (2009), exposed that preference of CAM was based more on paranormal belief among general public than attitudes towards science. Many CAM practitioners prevailed that alternative therapies disobey severe restrictions of reductionist research. They state that their services are individualized, natural, taking into account mental and social aspects, rather than just the symptoms of illness, and justify a radical change in the approach of surveys. However, these arguments are built on misinterpretations, and often dealing with the obstacles requires giving the meaning of the research question and afterward obtaining optimal research equipment which corresponds it. For instance, randomized controlled clinical trials are the least prejudiced approach for discovering a genuine answer, if some form of CAM is aimed to be tested for effectiveness (Ernst E, 2000). Still the central question occurs there designed to establish the future role of the CAM in the mainstream health care. Each form of CAM must be  tested by scientists, because some of them are harmless but others not and some are effective, whereas others can be pure placebos and even dangerous for human health.In 1992, an Office of Alternative Medicine was established in the National Institutes of Health to test unconventional remedies. Results were no comforting, because 28 methods of treatment out of 30 research grants that the office gave have had outcome in â€Å"final reports† in 1993 (National Institutes of Health, 1992). However, probably after six years Medline search found that only 9 of the 28 research grants were published. Five of them were in two journals which are not in the list of the 3500 journal titles in Countway library of Medicine’s collection (Chou C.K, McDougall J.A, Ahn C, Voru N, 1997). None of the remained four alternative remedies was teste d by clinical trial that would allow making any summary on the efficacy of a complementary treatment (Reid S.A, Duke L.M, Allen J.B, 1998). Another research hold by Ernst E (2000), revealed the failure of more than 100 different alternative therapies recommended for treatment of asthma. Ideology of CAM intentionally disregards biologic mechanism, often discredits modern science and bases on ancient practices and herbal remedies which are in some way considered being at the same time more effective and less hazardous than modern methods of treatment. Before 20th century, majority of herbal remedies were botanicals, obtained from plants. For instance, purple foxglove was discovered to fight edema, the opium poppy to be helpful for cough, pain and diarrhea, and cinchona bark to reduce fever. However, human cost for taking therapies with botanicals was great, because, firstly, they had negative impacts on human body, causing another illness. Secondly, doses of botanicals were random, due to unknown amount of active components (Angell M, 1998). More significant, most of herbal remedies did not work at all, and some even were dangerous or might cause death. One could only distinguish between advantageous and ineffective or toxic botanicals through anecdotes received by word of mouth (Angell M, 1998). The beginning of the 20th century brought dramatic changes to human healthcare due to huge advance in medical science. The foundation of methods of the identification and purification of the active components in botanicals made their efficacy and safeness greater. After morphine was released from opium poppy, digitalis from the purple foxglove and quinine from cinchona bark, treatment became effective without harming human body  and other functions (Angell M, 1998). Further of medical advances are remarkable. As example, treatments with heparin, aspirin, beta-adrenergic blockers and thrombolytic agents have decreased mortal rate from myocardial infarction; nucleoside analogues and a protease inhibitor combination can repel the origins of AIDS in people with HIV; childhood leukemia in most cases can be cured by a cocktail of cytotoxic drugs. In addition, the beginning of the 21st century was the key period of invention of vaccines fighting many epidemic scourges, such as poliomyelitis, measles, diphtheria, hepatitis B and some forms of pneumococcal pneumonia, including the foundation of efficient an tibiotics curing many other health problems (Coppes et al, 1998). To support these statements, it is seen that United States has experienced dramatic increase in the life expectancy of the country, approximately by three decades. Partly, the reason for that is better sanitation and living standards, but mostly, due to advances in health care (Coppes et al, 1998). One may state that conventional medicine also based on anecdotes, which are published in peer-reviewed journals. However, these case reports are completely different from the anecdotes of CAM. Journals publishing about modern medicine are reviewed and assessed by experts. Hence, they describe well-structured new opening in a defined terms. If, for instance, a journal received paper of a patient’s recovery from pancreas cancer after taking rhubarb diet, publishers would demand documentation of illness and its scope. They would ask for other patients, who did not regain after rhubarb diet, and might propose trying testing the method on other diseased people. After the results of these and other requirements are satisfactory, journal might publish a case report – not as an announcement of a treatment, but as a suggestion of a hypothesis th at ought to be tested in a formal clinical trial. In contrast to modern medicine, anecdotes about unconventional treatments lack such documentation and peer-reviewing as they are usually published in magazines and books for public reading (Angell M, 1998). Angell M, (1998) argues that herbal remedies may also be sold without any knowledge of their mechanism of action. According to DiPoalo and his colleagues’ report (1998), herbal mixture named PC-SPES, where PC stands for prostate cancer and spes is the Latin word for â€Å"hope†, has sufficient estrogenic activity. Estrogens are defined as a group of any steroid hormone, which activate changes in female  reproductive system, after which female secondary sexual typical features develop in human (http://dictionary.reference.com/browse/estrogen, 2011). Despite this, PC-SPES is still sold as helping patients’ immune system, who have prostate cancer which is disobedient to estrogen treatment (Alternative Medicine Digest, 1997). Consequently, a lot of men receiving PC-SPES have taken uncertain quantity of hormonal treatment without being informed. Complementary and alternative medicine is not always cheap and may even require more expenditure than conventional medicine. Researches in 1984 estimated that patients’ annual expenditure on unconventional health care was 10 bill ion dollars in the US (Subcommittee on Health and Long-Term Care of the Select Committee on Aging, 1984) and the results of the surveyin 1997 showed 1.6 billion pounds annual expenditure in the UK on CAM (White A, Resch K, Ernst E, 1997). According to Eisenberg et al (1998), 1990s research results estimated that number of visits to CAM practitioners in the US was 425 million, whereas number of call on to conventional health care providers was 388 million in the same year. Annual expenditure on CAM was approximately $ 13.7 billion, in compare to $12.8 billion spent annually on whole hospitalizations in the US in 1990. Another survey held in the US in 1997 considered out-of-pocket expenditure on alternative medicine to be $27 billion which was equal to out-of-pocket expenditure for all modern medicine services (Eisenberg et al, 1998). Indeed, some forms of alternative medicine are more expensive than modern health care. One reason for that might be individual approach of the practitioners towards patients. Homeopaths may receive high fees from patients visiting them. Second reason can be increasing belief in CAM among people, which drives them to use it more and try other alternative remedies. Individuals start to recei ve herbal treatments, consult homeopaths and visit CAM practitioners very regularly, including them into their lifestyle, which is costly in the long-run. To conclude, it is seen that CAM has many disadvantages in compare to conventional medicine, which depends on science and study research. First of all, most forms of CAM failed clinical trials as being hazardous, ineffective and some even being able to cause death in particular cases. Secondly, botanicals such as opium poppy and purple foxglove helped to cure cough and edema, respectively, at the same time destroying human body due to content of active toxic components. In addition, CAM is based on anecdotes,  which are received by word of mouth or published or books for public reading. It cannot be fully trusted, because of not being tested or failure in formal clinical trials. One cannot be sure in efficacy of alternative medicine, as the case with PC-SPES, which despite containing great amount of estrogens is sold to prostate cancer diseased people till these days. Ultimately, research revealed that annual expenditure on CAM was higher than for conventional medicine in the UK an d the US. In contrast, modern medicine is scientifically proven and provides only those treatments which passed clinical trials. The treatments are published only in peer-reviewed journals and are not announced as a cure, but are suggested as possible treatment. Conventional medicine can be trusted and it shows real treatment. The most significant advantage of conventional health care is the increase in the life expectancy of people due to advance in medicine. Also, illnesses which had no cure in the past, like child leukemia, heart related diseases and most forms asthma can be treated now. Therefore, there should be no alternative to modern medicine, because advantages of it are clear, while there is still discussion on unconventional medicine. Some forms of CAM might be used as compliment to conventional medicine, but not as alternative to it. People should be more informed about CAM and its inefficiency to provide effective and safe health care as modern medicine does.

Thursday, November 14, 2019

Double Standard Essay -- essays research papers fc

The existence of a double standard for Women today is a main reason why women become extremely radical. Women that do not appreciate being stereotyped and discriminated against, protest in forms of rallying and with lawsuits against people or institutions of society. The areas of society that use or even enforce a double standard against women may consider women to be inferior to men. This idea of superiority is discrimination. Often the work place, sports, and within homes do we see this idea of a double standard for women. There has always been a double standard for women. The early twentieth century was tough for most women. They were expected to stay at home, take care of the children and cook meals for their husbands. Women were viewed as simple objects that belonged to men. It was common for women or even young girls to dress like boys, they would be raised under strict eyes and forced to learn how to cook and clean, just like their mothers did. The work force consisted mostly of men, workers and higher executive style positions. During the mid twentieth century a woman would earn about half of what men earned for the same exact job, and with the same qualifications. The reason behind this was that a woman, especially a married woman is likely to work less due to the risk of having a child. In the work place the pay for women and number of managerial jobs, doctors, and lawyers has increased, however, equal pay is still a goal. The â€Å"glass ceiling† effect is an idea tha...

Monday, November 11, 2019

Ipv4 to Ipv6 Transition

I P v 4 TO IP v 6 TRANSITION – UPDATE 2011 An overview of the new Internet a ddressing protocol, its implications for b usiness and government, and Telstra’s a pproach to the transition. WHITE PAPER September 2011 TABLE OF CONTENTS EXECUTIVE SUMMARY PAGE 3 WHAT IS IPv6? PAGE 4 IPv4 ADDRESS RUN OUT PAGE 5 WHAT HAPPENS WHEN IPv4 ADDRESSES RUN OUT? PAGE 6 GOVERNMENT MANDATES PAGE 8 INDUSTRY READINESS FOR IPv6 PAGE 10 WHAT DOES THE TRANSITION MEAN FOR BUSINESS? PAGE 13 WHAT IS TELSTRA’S APPROACH TO THE TRANSITION? PAGE 14 WHAT SHOULD BUSINESSES DO NOW?PAGE 16 CONCLUSION PAGE 18 APPENDIX – IP ADDRESSING PAGE 19 REFERENCES PAGE 21 WHY TELSTRA? PAGE 22 FIGURES & TABLES FIGURE 1 IPv6 ECOSYSTEM PAGE 6 FIGURE 2 DUAL-STACK SUPPORTS BOTH PROTOCOLS IN PARALLEL WITHIN ONE NETWORK PAGE 7 FIGURE 3 EXAMPLE OF A DUAL-STACK ACCESS TO THE INTERNET PAGE 14 TABLE 1 IP ADDRESS HEADER FORMATS PAGE 19 TABLE 2 INDIVIDUAL ADDRESSES AND NOTATION PAGE 20 TABLE 3 UNIQUE LOCAL ADDRESS R ANGE PAGE 20 2 EXECUTIVE SUMMARY IPv4 is the dominant addressing protocol used on the Internet and most private networks today.With the current exponential growth in Internet users worldwide, combined with the limited address range of IPv4, the number of available public IPv4 addresses remaining is very limited. IPv6 is the next-generation Internet protocol that will replace IPv4, providing a vastly expanded address space. This white paper provides an update on the current industry status of IPv6, how the IPv4 to IPv6 transition will affect some organisations, and Telstra’s perspective on the transition. Internet Transition IPv4, the dominant addressing protocol, is rapidly running out of capacity and will be replaced by IPv6The protocol that governs communication on the Internet (and most intranets) today is called Internet Protocol version 4, or IPv4. The popularity of the Internet has caused a shortage of public IPv4 addresses and they are quickly running out, with the glo bal registry of IPv4 addresses from the IANA (Internet Assigned Numbers Authority) exhausted in February 2011 and the Asia-Pacific regional registry in April 2011I. Other Regional Internet Registries (RIRs) are expected to be exhausted between 2012 and 2014II. Once this happens, no more IPv4 addresses will be allocated to Internet service providers (ISPs).Individual ISP run-out will depend upon how well each ISP manages its address pools compared to the rate of each ISP’s subscriber growth. The transition from IPv4 to IPv6 is a popular issue and one which the industry will spend more time managing in the coming years. The transition is complex and will require IPv6 support by an end-to-end industry ecosystem. The ecosystem includes customer premise equipment, modems/home gateways, network systems, management (OSS/BSS, tools), content and applications. Telstra’s Approach Telstra’s approach is based on the dual-stack solution, allowing both IPv4 and IPv6 addresses to co-existTelstra will ensure that customers can migrate to IPv6 at their own pace, with minimal impact to services Telstra has been planning for the IPv6 transition for a number of years. We have a defined transition strategy and a well-advanced IPv6 implementation program. Our strategy for IPv6 introduction is based on the dual-stack solution, allowing both IPv4 and IPv6 addresses to co-exist until the transition to IPv6 is complete. This approach will make sure that the transition occurs with minimal impact to customers. Customers will not be forced to move to IPv6 overnight – they can deploy and migrate to IPv6 as they become ready.Telstra is already testing dual-stack technology on a number of key networks and products to seamlessly introduce IPv6. Similar to service providers, businesses face a challenge in undertaking the complex transition of their IPv4 internal ecosystems without impacting services. Just as Telstra has done, it is advised that every online or IT-ba sed business should prepare an IPv4 to IPv6 transition strategy. Telstra will provide timely information and updates on our own program of work to assist customers, suppliers and others in the industry to manage their transition. 3 WHAT IS IP v 6?IPv6 was designed during the mid-1990s, when the Internet Engineering Task Force (IETF) realised that IPv4 address size constraints would soon be a major impediment to the continued growth of the Internet. IPv6 was first known as the Next Generation Internet Protocol (IPng) during development within the IETF. Since 1998, it has officially been known as IPv6. In the transition to IPv6, both IPv6 and IPv4 will co-exist until IPv6 eventually replaces IPv4. The most obvious difference between IPv6 and IPv4 is the vastly expanded IP address space available The most obvious difference between IPv6 and IPv4 is the address size.IPv6 addresses comprise 128 bits, whereas IPv4 addresses comprise 32 bits. This difference results in a huge expansion in available IP address space: ? I Pv4: 2 32 a ddresses equals 4. 3 billion addresses (less than the global human p opulation of 4. 7 billion) ? I Pv6: 2 128 a ddresses. Because the last 64 bits are used to allocate a ddresses within a subnet, that leaves 2 64, which equals 18 billion billion s ubnet addresses. IPv6 is not backwardly compatible with IPv4 Whilst IPv6 performs the same address function as IPv4, IPv6 is not backwardly compatible with IPv4. Therefore, an IP data session must use either IPv4 or IPv6 end-to-end.IPv6 and IPv4 can be used together with translation mechanisms such as Application Layer Gateways when the applications are known and supported end-to end. 4 IP v 4 ADDRESS RUN OUT The global top-level registration body, IANA (Internet Assigned Numbers Authority), exhausted its supply of available IPv4 addresses in February 2011. APNIC (Asia Pacific Network Information Centre) is the Regional Internet Registry which allocates IP addresses in the Asia-Pacific region. U nfortunately for Australia, APNIC effectively ran out of addresses in April 2011. The Asia-Pacific is also the highest growth region for IP address llocation. Telstra and any other ISP in the Asia-Pacific region are now only eligible for a total allocation of 1024 further addresses from APNIC. There will be no further large allocations of IPv4 addresses for Asia-Pacific ISPs Because no further large allocations of IPv4 addresses are available, the ability of Asia-Pacific ISPs to allocate IPv4 addresses for new customers depends on the number of addresses they already hold, the rate at which they are using them for new services, and the ISP’s capability to adopt address translation technologies, which may reduce their rate of address demand.These factors will be different for each ISP, so it is likely that ISPs across the industry will run out of IPv4 addresses across a wide timeframe – some may run out within only a couple of years, others may be able to delay that exh austion well into the future. 5 WHAT HAPPENS WHEN IP v 4 ADDRESSES RUN OUT? Internal enterprise networks using private IPv4 addresses will not be affected IPv4 and IPv6 will co-exist on the Internet for many years Firstly, internal enterprise networks using private IPv4 addresses will not be impacted.Nor will the run-out impact existing IPv4 networks and IPv4 based services already allocated IPv4 addresses — they will continue to operate normally. Secondly, IPv4 and IPv6 will co-exist in the Internet for many years, quite likely for decades. Unlike Y2K, there is no cut-off date when IPv4 use will cease and the world will fully migrate to IPv6. The plan is for gradual transition: different regions and industry players will move to IPv6 at different rates. Consequently, end users will need the capability to access both IPv4 and IPv6 content and services on the Internet. This dual apability may be inherent in the end users’ equipment, or may be provided transparently by t heir or the content publishers’ ISPs. To enable this dual protocol access during the transition period, technology solutions were developed in conjunction with the development of the IPv6 protocol in the mid-1990s. Three categories of transition technologies exist: ? Tunnelling – encapsulates one protocol within another (e. g. IPv6 in IPv4, IPv4 in IPv6) ? Protocol Translation – translates packets between protocols (e. g. IPv6 to IPv4) ? Dual-stack – support both protocols in parallel within one network. Telstra’s dual-stack path nables both protocols to co-exist on our networks Telstra has chosen the dual-stack path, enabling both protocols on its networks. The use of dual stack will ensure our customers have the current functionality of IPv4 always available to them even while they start deploying IPv6 in their systems. The transition from IPv4 to IPv6 is a known issue which the industry will have to manage over the coming years. The transition w ill take time as it will require IPv6 support by an industry end-to-end eco-system including CPE, modems/home gateways, networks, systems (OSS/BSS, tools), content and applications.Figure 1: IPv6 Ecosystem Systems & tools Carrier/ ISP Client apps Consumer electronics Modems Operating systems Mobile handsets Public IPv6 Content/Apps Global Internet Network vendors Content/Apps Systems & tools Servers IPv6 is the accepted solution, however, moving the entire ecosystem to IPv6 will take many years Source: Telstra 6 WHAT HAPPENS WHEN IP v 4 ADDRESSES RUN OUT? Telstra continually monitors industry developments with regard to the other transition technologies and we may choose to apply other methods where appropriate. Co-existence of IPv4 and IPv6Dual-stack (IPv6/IPv4) remains the accepted industry direction for the introduction of IPv6. Tunnelling has sometimes been used by early IPv6 adopters where native IPv6 has not been available end-to-end. IPv4 to IPv6 protocol translation mechanis ms may also be applied in the future in certain circumstances. Figure 2: Dual-stack supports both protocols in parallel within one network Applications TCP/UDP IPv6 IPv4 Physical Layer Dual Stack Backbone Applications TCP/UDP IPv6 IPv4 Physical Layer 7 GOVERNMENT MANDATES Some Governments have set mandates to ensure a well-managed transition rom IPv4 to IPv6 before IPv4 addresses run out The importance of continued Internet growth has been recognised by many governments due to its critical role for areas such as e-commerce, healthcare services and public information dissemination. This has led some governments to set IPv6 technology mandates to ensure a well-managed transition from IPv4 to IPv6 prior to the run-out of IPv4 addresses. The smooth and ordered adoption of these technologies will ensure continued Internet connectivity for all of their citizens. Initially targeted at enterprises, institutions and government elated Internet services, IPv6 mandates are now being issued for consumer broadband services The technology mandates have been primarily targeted at enterprises, institutions and departments that provide governments with their Internet connectivity services. Only recently IPv6 mandates for consumer broadband services have been issued. North America In August 2005, the US OMB (Office of Management and Budgets) issued Memorandum M 05 22: Transition Planning for Internet Protocol Version 6 (IPv6). This sets the US Federal Agencies a hard deadline for compliance to IPv6 on their core IP networks.This mandate led many major US Service Providers (e. g. AT&T, Sprint, Verizon, QWest, NTT America) to develop government and enterprise solutions to allow agencies to buy IPv6 products and services to meet their core connectivity requirements. In practice, all of the agencies met the mandate because they were able to demonstrate that their backbone networks were capable of carrying IPv6 packets by the agreed deadline. However, there was no need to actually im plement IPv6-based services. A draft roadmap for IPv6 adoption by the US Government has recently been prepared. EuropeThe European Commission communicated an IPv6 action plan in May 2008. The target was to have 25% of European customers accessing the Internet using IPv6 by 2010, which challenges all players (ISPs, content providers, customer premise equipment vendors, governments and organisations) to work towards this target. Asia Many Asian countries, including China, Japan and Korea have been early adopters of IPv6 due to government mandates. For example: ? C hinese Government Strategy: C hina Next Generation Internet (CNGI) sets o ut a five year plan (2006-2010) for the adoption of IPv6 Korean Government Strategy: T he Korean Government has the strategic IPv6 Promotion Plan II, which sets a vision of deploying IPv6 for the public sector. 8 GOVERNMENT MANDATES Australia The AGIMO (Australian Government Information Management Office) has set the following timeframes for IPv6 adopt ion within the Australian Government and its departments: ? Preparation Jan 2008 – December 2009 ? Transition Jan 2010 – December 2011 ? Implementation Jan 2012 – December 2012. The Australian Department of Defence has also mandated a move to IPv6. 9INDUSTRY READINESS FOR IP v 6 Industry has been slow to adopt IPv6 since few commercial drivers exist Across the globe, the industry has been slow to adopt IPv6, since very few commercial drivers for migration have existed at present. By its very nature, the Internet involves a huge number of disparate groups and thus a coordinated approach is difficult to achieve. The lack of a commercial imperative is due to a ‘chicken and egg’ situation: why support IPv6 in the equipment if there are no IPv6 services, and why create an IPv6 service if nobody can use it?This situation is now changing with the occurrence of the global IPv4 exhaustion. Nevertheless, while many parts of the industry are now supporting IPv 6, others are lagging behind. The following is a brief analysis of the readiness of key industry sectors: Network Equipment Generally, network equipment vendors already provide IPv6 dual-stack support In the main, network equipment vendors already provide IPv6 support (dual-stack) for the core and edge of networks. Key vendors have been hardware and softwareready for several years, with equipment deployed in small-scale trials.Even though IPv6 capability has existed in most network routing equipment for some time, it has often not been enabled for use. Network control path functions like DNS, DHCP and RADIUS, however, are not yet uniformly supported for IPv4/IPv6 dual-stack across all vendors. These remain among the ‘work in progress’ issues for the industry. Internet Infrastructure Global IPv6 interconnectivity is now growing rapidly Global IPv6 Backbones As IPv4 and IPv6 do not interwork, it is essential there is global IPv6 interconnectivity similar to the IPv4 Inter net today. The global network of IPv6 interconnectivity is now growing rapidly.We expect there will be a substantial interconnected Australian IPv6 backbone between many, if not most, ISPs by the end of 2011. Domain Name Servers IPv6 devices will resolve Internet domain names into IP addresses using IPv6 entirely A critical step along the path to IPv6 was implemented on 4 February 2008, when ICANN (Internet Corporation for Assigned Names and Numbers) assigned IPv6 addresses and provided IPv6 connectivity to six of the Internet’s root domain name servers (DNS). Similar enhancements are being made to other top-level DNS (e. g. for . com and . org). The APNIC servers for the . u domain also have IPv6 connectivity. These enhancements to DNS will allow IPv6 devices to resolve Internet domain names into IP addresses entirely using IPv6. Service Providers To connect to the global IPv6 Internet, customers will need to use a service provider that supports IPv6 and provides the require d connectivity through to the global IPv6 backbones. 10 INDUSTRY READINESS FOR IP v 6 Enterprise Virtual Private Networks (VPN) Service providers in the US have begun offering dual-stack VPN services largely to support federal agencies in response to US Government mandates.Telstra’s dualstack IPv6 VPN product capabilities are in an advanced stage of development. Broadband There are still few consumer broadband IPv6 offerings from ISPs, but it is expected there will be an increasing number in the Australian market during 2011-12. Customer Environment In general, few modem gateways and other consumer on-premise equipment currently support IPv6 Consumer Modems and IP Devices In general, very few modem gateways and other CPE appliances in use by consumers currently support IPv6. The main exception includes some high-end PDA mobile phones running Windows Mobile, and some CPE made for specific markets such as Japan.In the vast majority of cases, these IPv4-only devices will not be economically upgradeable to support IPv6. This is because the device is not upgradeable in any way, or because additional resources (e. g. flash memory or RAM) are required to support IPv6. IPv6 capability from many consumer gateway vendors is only starting to be released during 2011. The long lifespan of broadband modem gateways means that many consumers will not have IPv6 connectivity capability for several years unless they opt to replace their modem with a dual-stack capable gateway. Mobile HandsetsDual-stack IPv4/IPV6 capability is expected to become available on selected new mobile handsets during 2011/12. Carriers will need to support IPv6 in their networks for handset use of IPv6 to be possible. Operating Systems Most, if not all, mainstream consumer and business operating systems available now have IPv6/IPv4 dual stack capability. However, legacy systems with either no or limited IPv6 capability (such as Windows XP) are expected to be in widespread use for several years yet . 11 INDUSTRY READINESS FOR IP v 6 Applications and Content ApplicationsMany applications will work when used with IPv6. Others will need to be checked and modified Applications have to be specifically written to take advantage of IPv4/IPv6 dual stack capabilities in the underlying operating system. In many cases, applications will work correctly when used over an IPv6 network. Others will need to be checked and modified to meet the dual-stack requirements and take advantage of IPv4/IPv6 dualstack capabilities built in to most recent underlying operating systems. Applications can be divided into the following major categories: ?S erver applications: Servers typically include web servers, database s ervers and mail servers, but can also include others such as those used for multiplayer online gaming. The applications running on these servers respond to requests from client applications which are carried across I P networks ? C lient applications: End users run client applications whi ch initiate requests to server applications across IP networks (the web browser being the most common example) ? Peer-to-peer applications: In this case the end user application acts as both a c lient and a server and can communicate directly with other users across I P networks.Most applications interface at the IP socket layer and won’t be affected whether the transport is IPv4 or IPv6. However, some applications may have been originally written in a way that ties them to IPv4, and these will have to be modified. Some examples include: ? Use of hard coded IPv4 addresses ? IP address data structures that only cater for IPv4 size addresses ? U ser interfaces that display an IP address, or allow an IP address to be e ntered only in IPv4 format. Many applications, including web browsers, already support dual-stack function. Others are subject to the planned timing of upgrades by the application developer.Ideally, applications should be agnostic to the use of IPv4 or IPv6. An ap plication that supports dual-stack will usually give preference to IPv6 if it is available, otherwise it will fall back to using IPv4. Content Providers Most major Internet content providers have yet to move to a dual-stack architecture Most major Internet content providers are yet to make the move to a dual-stack architecture. Some have established specific IPv6-only versions of their site to enable IPv6 access to users who have IPv6 connectivity, and who deliberately choose to use IPv6 (e. . ipv6. google. com and www. v6. facebook. com). Many Internet content providers are beginning to plan for a dual-stack architecture. This was exhibited when many content providers participated in World IPv6 Day (held on 8 June 2011) to trial IPv6 at a global level. 12 W HAT DOES THE TRANSITION MEAN FOR BUSINESS? Multinational enterprises and those that deal with government departments are most likely to be impacted by government mandates. This will drive the need to support IPv6 (e. g. Australi an Government departments implementing IPv6 in 2012).The IPv4 public address run-out will mostly affect businesses in their external connections Public IPv4 address shortages will have minimal impact on Enterprise VPNs due to the prevailing use of private IPv4 addressing. The IPv4 public address run-out will mostly affect businesses in their external connections to consumers and the broader Internet. Each business needs to consider whether to deliver IPv6 based services to consumers who prefer to use IPv6. Businesses must ensure an IPv6 communication path from the enterprise edge to where IPv6 supported applications are hostedConsumers will move to dual-stack CPE configured with an IPv6 address as well as an IPv4 address (either public or private) in order to access both IPv4 and IPv6 content. Businesses that host applications accessible via the Internet will need to cater for consumers with IPv4 or IPv6 public addresses. Since each protocol needs to work endto-end, for businesses t he transition does not end with deployment of dual-stack devices at the enterprise edge. It also requires enterprise network design changes to make the communication path IPv6-capable from the enterprise edge to where IPv6 supported applications are hosted.Businesses face a similar challenge to service providers, such as Telstra, in making the IP addressing transition. Transitioning to IPv6 requires the full ecosystem to move (i. e. network equipment, modems, consumer devices, operating systems, applications, content servers, IT systems, etc). Therefore, the transition from IPv4 to IPv6 will be a large and complex task that will require significant coordination across the full spectrum of players involved in end-to-end IP services. 13 WHAT IS TELSTRA’S APPROACH TO THE TRANSITION? Telstra has been planning for this transition for a number of years.We have a defined transition strategy and a well-advanced IPv6 implementation program. Telstra has prepared for the transition thro ugh a clear strategy and implementation program Our strategy for IPv6 introduction is based on the dual-stack approach, allowing both IPv4 and IPv6 addresses to co-exist until the transition to IPv6 is complete. This approach will make sure that the transition occurs with minimal impact on customers – they are not forced to move to IPv6 overnight and can deploy and migrate to IPv6 as they become ready.Telstra is already testing a number of key networks and products to seamlessly introduce IPv6 across our services. Timing for implementation in each product will depend on business drivers and equipment availability (e. g. CPE). It covers services across Telstra Internet Direct (TID), Enterprise networks, Consumer Broadband, Mobiles and Telstra’s global networks. Figure 3: Example of a dual-stack access to the Internet Customer Service Provider LNS DNS Apps, Content & Systems Global Internet Content Providers IPv4 content/apps ADSL Modem Cable CMTS Modem ServiceProvider P oP Domestic Backbone Global Internet Backbones Dual-stack content/apps Wireless IPv6 content/ apps LNS Large installed base of IPv4-only CPE Dual-Stack Outside Service Provider Control Largely installed base of IPv4-only content/apps Outside Service Provider Control Dual-Stack enables a smooth transition, supporting both IPv6 and IPv4 Source: Telstra TID and IP-VPN Services The benefits of dual-stack technology for TID and IP-VPN customers are as follows: ? Continued service availability even as IPv4 addresses run out ? Smooth transition to IPv6 at own pace N ative IPv6 connectivity which provides better performance than IPv6 t unnels ? Essentially unlimited Internet addressing ? Leverages the Telstra Next IP ® network. 14 WHAT IS TELSTRA’S APPROACH TO THE TRANSITION? BigPond Broadband Most consumer broadband customers will be more interested in the content and applications they use, rather than which IP addressing protocol is being used. Nevertheless: ? For many, the trans ition to IPv6 will occur smoothly and transparently as e ach of the components of the end-to-end service moves to dual-stack ( e. g. odems, PCs, content) ? T he industry is expecting that Internet content and applications will be d ual-stack or IPv4-only for a long time to come ? I t is unlikely that any significant content on the Internet will be available t hrough IPv6-only for many years yet. Mobiles including Telstra Mobile Broadband ? I nitial availability of IPv6-capable mobile devices is not expected u ntil 2011/12 ? I n the future there may be developments in self-contained mobile solutions, w hich will also drive IPv6 use (e. g. Telemetry and machine-to-machine s olutions).Applications and Content Telstra applications and content will transition to be offered over IPv6 (to achieve end-to-end IPv6) as well as IPv4. Telstra’s Global Networks Telstra’s global networks operated by Telstra International Group adopted the same business approach as Telstra’s g uideline for the IPv4 to IPv6 transition. Key features include: ? D ual-stack approach to seamlessly support the co-existence of IPv4 and I Pv6 IP routing on global IP networks, including the MPLS-VPN platform and G lobal Internet / IP Transit platform N o hard cut-over for customers and continuing support for customer IPv4 a ddress-based IP routing on Telstra global networks in the coming years ? C ontinue IPv4 and IPv6 support for IP network’s auxiliary services such as D NS services on global Internet platform, looking glass on online port etc ? F rom FY 2011/12, Telstra International Group will start leasing IPv6 addresses to customers needing to connect to Telstra’s global IP networks, with limited I Pv4 Address also available ? Native IPv6 Address IP routing on core network is on the road map ?Telstra is committed to work with global network partners for native I Pv6 traffic peering and/or interconnection for both private and public I P networks. 15 WHAT SHOULD B USINESSES DO NOW? Businesses can begin to prepare for their own IP addressing transition through the following steps: 1. Conduct an IPv6 readiness assessment ? Network hardware ? Servers, PCs (e. g. operating systems) ? Network management and security ? Applications ? IT systems ? Organisational capability (IPv6 skills) ? Understand coexistence implications (performance, resources). 2. Prepare an IP addressing strategy Develop a high-level view of transition approach for the business. 3. Develop an end-to-end program view ? Network, IT, devices, applications, etc ? Processes to minimise impacts ? Communication of the IPv6 strategy within the business ? Maintain network security through the transition to IPv6 ? Work with vendors, system integrators and service providers to define d etail and align timings (e. g. link hardware upgrades to lifecycle p rocesses to minimise costs) ? Analyse transition costs and develop a transition budget. 4. Formulate an Implementation Plan ? Identify d ependencies and major milestones Use phased approach based on priorities and timings. 5. Progress Implementation ? Work in close coordination and consultation with network provider ? Telstra commits to providing timely information and updates on its program o f work to assist customers, suppliers and others in the industry to manage t heir transition. 16 WHAT SHOULD BUSINESSES DO NOW? Leverage our Experience and Best Practice Telstra can assist and support customers in their transition to IPv6 through our Professional Services and Consulting Services. The services we provide include: ? Consulting: Planning consultation, including business level investigation and analysis – Conduct a Communications Strategy plan update – Readiness assessments and check lists – Total ecosystem roadmap development (Not necessarily Telstra specific) – Vendor management and CPE – VoIP / other providers / web sites, etc ? Design and Architecture: – Network design – CPE programming remote or onsite (future) ? Project Management: – Transition planning – Seamless transition – Staged transition planning process, achieved via: – Workshops – Customised design – Implementation planning Telstra can provide overall project management to guide a customer t hrough the transition process. 17 CONCLUSION The transition from IPv4 to IPv6 is a known issue which the industry will have to manage over the coming years. The transition will take time as it will require IPv6 to be supported by an end-to-end industry ecosystem including CPE, modems/home gateways, networks, systems (OSS/BSS, tools), content and applications. Telstra has been planning for this transition for a number of years. We have a defined transition strategy and a well-advanced IPv6 implementation program.Our strategy for IPv6 introduction is based on the dual-stack approach, allowing both IPv4 and IPv6 addresses to co-exist until the transition to IPv6 is complete. This approach will make sure that the transition occurs with minimal impact on customers – customers are not forced to move to IPv6 overnight and can deploy and migrate to IPv6 as they become ready. Telstra is already testing a number of key networks and products to seamlessly introduce IPv6. Businesses face a similar challenge to service providers in undertaking a complex transition of their IP ecosystem without impacting services.It is advisable that businesses start preparing their IPv4 to IPv6 transition strategies. Telstra will provide timely information and updates on our program of work to assist customers, suppliers and others in the industry to manage their transition. 18 APPENDIX 1 – IP ADDRESSING IP Address Header Formats Table1 0 16 Ver HL TOS Total Length Identification TTL 32 Flag Protocol Fragmet Offset Header Checksum Source Address Destination Address Options Padding IPv4 Header 0 16 Ver 32 Traf. Class Flow Label Payload Length Nx t Hdr Hop Limit Source Address Destination AddressIPv6 Header Address Ranges Both IPv6 and IPv4 address ranges are often referred to in CIDR (Classless InterDomain Routing) notation, indicating how many of the bits in the range are used to identify the network prefix while the remaining bits identify subnets and hosts. For example, in 62. 0. 0. 0/8 or (62/8), the ‘/8’ indicates that the first 8 bits in the range are used for the common prefix and the remaining 24 bits are used for the host address within that network. 19 APPENDIX 1 – IP ADDRESSING Individual Addresses and Notation Table2 Address FamilyWritten as Example IPv4 Dotted Decimal Notation 144. 135. 19. 10 (four decimal ranges written to represent each byte of address space) IPv6 Hexadecimal notation (eight hexadecimal ranges written to represent two bytes, separated by colons) IPv6 (short-hand) Hexadecimal notation 2001:0db8:85a3:0000:0000: 8a2e:0370:7334 2001:0db8:85a3::8a2e:0370:7334 (eight hexadecima l ranges with zeros removed) Private Addressing In IPv4, four specific address ranges were allocated for use in private networks (e. g. within an enterprise or home). The ranges are: ? 10. 0. 0. /8 — quite often used by large enterprise networks or internally by ISPs ? 172. 16. 0. 0/12 — often used to number enterprise or ISP backbone networks ? 192. 168. 0. 0/16 — often used in small office/home office (SOHO) applications ? 169. 254. 0. 0/24 — used for link-local applications. These private addresses have no meaning on the public Internet. If external connectivity is required by nodes addressed privately, Network Address Translation (NAT) is used to translate the first three of these address ranges into public addresses when accessing the broader Internet.IPv6 also has a range of addresses identified for local use known as the Unique Local Address range FC00::/7 (defined by RFC4193). In IPv4, when an interface is assigned a link-local address, we assume that the device is only connected to a local network. However, the practice of assigning multiple identifiers to interfaces is expected in IPv6 and therefore, all interfaces maintain a link-local address and additional IPv6 addresses. Table 3: Unique Local Address Range 0 78 FC00::/7 1 48 Global ID 64 Site Subnets Interface Identifier With regard to NAT, industry IPv6 addressing practices are still developing.Although there is a hope that significant use of IPv6 to IPv6 network address translation will be avoided, it is not yet clear as to whether enterprises will use public IPv6 space (derived from a registry), provider IPv6 space (granted from an ISP), or a local addressing scheme together with IPv6 NAT. 20 REFERENCES I The remaining allocations by the Asia-Pacific Network Information Centre are now rationed to a maximum of 1024 addresses per member under their latest policies – see â€Å"Policies for IPv4 address space management in the Asia Pacific region†, http:// www. apnic. et/policy/add-manage-policy. II â€Å"IPv4 Address Report† http://ipv4. potaroo. net has the latest exhaustion estimates of the other regional registries 1 Global IPv6 Strategies – From Business Analysis to Operational Planning by Patrick Grossetete, Ciprian Popoviclu, Fred Wettling, Cisco Press, June 2008 2 Deploying IPv6 Networks by Ciprian Popoviclu, Patrick Grossetete, Eric LeviAbegnoli, Cisco Press, February 2006 21 Why Telstra? Telstra provides network services and solutions to more than 200 of the world’s top 500 companies. They rely on us to do business across 240 countries nd territories and to enable greater productivity, efficiency and growth. Telstra solutions offer the best of all worlds – skilled people and a rich portfolio of services delivered on our world-class Telstra Next IP ® network and Next G ® network. To ensure reliable performance, they’re monitored and maintained from our dedicated centres using advanced ma nagement and operational systems. And they’re backed by Telstra Enterprise-grade Customer Service ® and one of Australia’s largest and most qualified field and technical workforce. IF YOU HAVE ANY QUESTIONS P LEASE CONTACT YOURT ELSTRA ACCOUNT EXECUTIVE V ISIT T ELSTRA. COM/ENTERPRISE/IPV6 C ALL 1 300 TELSTRA  © 2011 Telstra Corporation Limited. All rights reserved. This work is copyright. The Copyright Act 1968 permits fair dealing for study, research, news reporting, criticism or review. Selected passages, tables or diagrams may be reproduced for such purposes provided acknowledgement of the source is included. Permission for more extensive reproduction must be obtained from Telstra. â„ ¢ Trade mark of Telstra Corporation Limited.  ® Registered trademark of Telstra Corporation Limited ABN 33 051 775 556.