26,446 research outputs found

    Time Based Traffic Policing and Shaping Algorithms on Campus Network Internet Traffic

    Get PDF
    This paper presents the development of algorithm on Policing and Shaping Traffic for bandwidth management which serves as Quality of Services (QoS) in a Campus network. The Campus network is connected with a 16 Mbps Virtual Private Network line to the internet Wide Area Network. Both inbound and outbound real internet traffic were captured and analyzed. Goodness of Fit (GoF) test with Anderson-darling (AD) was fitted to real traffic to identify the best distribution. The Best-fitted Cumulative Distribution Function (CDF) model was used to analyze and characterized the data and the parameters. Based on the identified parameters, a new Time Based Policing and Shaping algorithm have been developed and simulated. The policing process drops the burst traffic, while the shaping process delays traffic to the next time transmissions. Mathematical model to formulate the controlled algorithm on burst traffic with selected time has been derived. Inbound traffic threshold control burst was policed at 1200 MByte (MB) while outbound traffic threshold was policed at 680 MB in the algorithms. The algorithms were varied in relation to the identified Weibull parameters to reduce the burst. The analysis shows that the higher shape parameter value that relates to the lower burst of network throughput can be controlled. This research presented a new method for time based bandwidth management and an enhanced network performance by identifying new traffic parameters for traffic modeling in Campus network

    Improving health and public safety through knowledge management

    Get PDF
    This paper reports on KM in public healthcare and public safety. It reflects the experiences of the author as a CIO (Chief Information Officer) in both industries in Australia and New Zealand. There are commonalities in goals and challenges in KM in both industries. In the case of public safety a goal of modern policing theory is to move more towards intelligence-driven practice. That means interventions based upon research and analysis of information. In healthcare the goals include investment in capacity based upon knowledge of healthcare needs, evidence-based service planning and care delivery, capture of information and provision of knowledge at the point-of-care and evaluation of outcomes. The issue of knowledge management is explored from the perspectives of the user of information and from the discipline of Information Technology and its application to healthcare and public safety. Case studies are discussed to illustrate knowledge management and limiting or enabling factors. These factors include strategy, architecture, standards, feed-back loops, training, quality processes, and social factors such as expectations, ownership of systems and politics

    Through a router darkly: how new American copyright enforcement initiatives may hinder economic development, net neutrality and creativity

    Get PDF
    On November 1, 2012, Russia enacted a law putatively aiming to protect Russian children from pedophiles. This law authorizes deep packet inspection (DPI), a method used for monitoring, filtering and shaping internet traffic, which has heightened concerns among many leading privacy groups. These groups are concerned with how the government will use such an intrusive method in prosecuting child predators. Central to this concern is DPI’s capability to allow the Russian government to peer into any citizens’ unencrypted internet traffic and monitor, copy, or even alter the traffic as it moves to its destination. The unresolved question is whether the government’s use of DPI will be restrained and utilized primarily to thwart child predators, or whether it will be expanded to lay the groundwork for a new era of national censorship. Although the United States has not yet adopted similar tactics in regulating its citizens’ internet use, Russia’s implementation of the new DPI monitoring and filtering system will provide an educational opportunity for both privacy advocates and policymakers

    Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers

    Get PDF
    The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new techniques have been developed to break the dark web’s use of encryption. As with all new technology, the law has been slow to catch up and police have historically needed to use legislation which was not designed with the available technology in mind. This paper discusses the tools and techniques police use to investigate and prosecute criminals operating on the dark web in the UK and the legal framework in which they are deployed. There are two specific areas which are examined in depth: the use of covert policing and hacking tools, known in the UK as equipment interference. The operation of these investigatory methods within the context of dark web investigations has not previously been considered in UK literature, although this has received greater analysis in the United States and Australia. The effectiveness of UK investigatory powers in the investigation of crimes committed on the dark web are analysed and recommendations are made in relation to both the law and the relevant Codes of Practice. The article concludes that whilst the UK has recently introduced legislation which adequately sets out the powers police can use during online covert operations and when hacking, the Codes of Practice need to specifically address the role these investigative tools play in dark web investigations. Highlighted as areas of particular concern are the risks of jurisdiction forum shopping and hacking overseas. Recommendations are made for reform of the Investigatory Powers Act 2016 to ensure clarity as to when equipment interference can be used to search equipment when the location of that equipment is unknown
    • …
    corecore