Quantifying the shift in network usage upon bandwidth upgrade
- Okuthe, J A, Terzoli, Alfredo
- Authors: Okuthe, J A , Terzoli, Alfredo
- Date: 2021
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431003 , vital:72735 , https://doi.org/10.1007/978-3-031-06374-9_22
- Description: Traffic flow classification is an important enabler in network design, ca-pacity planning, identification of user requirements and possible track-ing of user population growth based on network usage. In this paper, results from the Internet traffic flow characterization in 1 Mbps commu-nity network for a three-week snapshot representing three months of study show that during peak traffic, the network is overwhelmed and service degradation occurs. When the network is upgraded to 10 Mbps the network bandwidth utilization immediately increases dramatically to close in on the new capacity with 20% left unused during peak traffic. The situation gets worse one month later where the network utilization is only 3% away from the maximum capacity. Traffic categorization show that the applications crossing the network are legitimate and accepta-ble. Since 10 Mbps bandwidth is the capacity that is sustainable for the community and supported by existing technology, bandwidth manage-ment is essential to ensure the network remains usable and continues to provide acceptable user experience.
- Full Text:
- Authors: Okuthe, J A , Terzoli, Alfredo
- Date: 2021
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431003 , vital:72735 , https://doi.org/10.1007/978-3-031-06374-9_22
- Description: Traffic flow classification is an important enabler in network design, ca-pacity planning, identification of user requirements and possible track-ing of user population growth based on network usage. In this paper, results from the Internet traffic flow characterization in 1 Mbps commu-nity network for a three-week snapshot representing three months of study show that during peak traffic, the network is overwhelmed and service degradation occurs. When the network is upgraded to 10 Mbps the network bandwidth utilization immediately increases dramatically to close in on the new capacity with 20% left unused during peak traffic. The situation gets worse one month later where the network utilization is only 3% away from the maximum capacity. Traffic categorization show that the applications crossing the network are legitimate and accepta-ble. Since 10 Mbps bandwidth is the capacity that is sustainable for the community and supported by existing technology, bandwidth manage-ment is essential to ensure the network remains usable and continues to provide acceptable user experience.
- Full Text:
Evolving an Efficient and Effective Off-the-Shelf Computing Infrastructure for Rural Communities of South Africa
- Siebörger, Ingrid, Terzoli, Alfredo, Hodgkinson-Williams, Cheryl
- Authors: Siebörger, Ingrid , Terzoli, Alfredo , Hodgkinson-Williams, Cheryl
- Date: 2020
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430990 , vital:72734 , https://doi.org/10.1007/978-3-030-52014-4_5
- Description: Information Communication Technologies (ICTs) have diffused into al-most every area of life for citizens living in the Global North. Data is seen as a key element in the fourth industrial revolution and is the foundation of Information, Knowledge and Wisdom. Knowledge has become the new “make or break” asset and an inability to access the world’s data and technologies that facilitate access, synthesis and inter-rogation of data places one at a disadvantage. In 2013, the Department of Communications in South Africa announced a new national broad-band policy to promote the reduction of a digital divide and sup-port citi-zens and the economy in digital interactions. Implementation has thus far not been successful. Furthermore, the Broadband policy does not address how South Africans are to access the Internet once available. The Siyakhula Living Lab (SLL) provides an example of a computing infrastructure model for the introduction of ICTs into rural communities. Through the deployment of “broadband islands” and low-cost compu-ting infrastructure to promote both knowledge creation and consump-tion, access to the proposed ubiquitous Internet connectivity can be un-locked. However, the initial computing infrastructure deployed to the SLL suffers from a single point of failure. In this paper, we discuss al-ternative computing infrastructure configurations that were tested and deployed within the SLL in order to determine a more appropriate com-puting infrastructure model for the SLL and potentially other rural South African communities; such that learners, teachers and community members can be active contributors and consumers of data, infor-mation, knowledge and wisdom.
- Full Text:
- Authors: Siebörger, Ingrid , Terzoli, Alfredo , Hodgkinson-Williams, Cheryl
- Date: 2020
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430990 , vital:72734 , https://doi.org/10.1007/978-3-030-52014-4_5
- Description: Information Communication Technologies (ICTs) have diffused into al-most every area of life for citizens living in the Global North. Data is seen as a key element in the fourth industrial revolution and is the foundation of Information, Knowledge and Wisdom. Knowledge has become the new “make or break” asset and an inability to access the world’s data and technologies that facilitate access, synthesis and inter-rogation of data places one at a disadvantage. In 2013, the Department of Communications in South Africa announced a new national broad-band policy to promote the reduction of a digital divide and sup-port citi-zens and the economy in digital interactions. Implementation has thus far not been successful. Furthermore, the Broadband policy does not address how South Africans are to access the Internet once available. The Siyakhula Living Lab (SLL) provides an example of a computing infrastructure model for the introduction of ICTs into rural communities. Through the deployment of “broadband islands” and low-cost compu-ting infrastructure to promote both knowledge creation and consump-tion, access to the proposed ubiquitous Internet connectivity can be un-locked. However, the initial computing infrastructure deployed to the SLL suffers from a single point of failure. In this paper, we discuss al-ternative computing infrastructure configurations that were tested and deployed within the SLL in order to determine a more appropriate com-puting infrastructure model for the SLL and potentially other rural South African communities; such that learners, teachers and community members can be active contributors and consumers of data, infor-mation, knowledge and wisdom.
- Full Text:
Green skills supply: Research from providers’ vantage point(s)
- Authors: Lotz-Sisitka, Heila
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/392895 , vital:68810 , ISBN 9780429279362 , https://doi.org/10.4324/9780429279362
- Description: This chapter emerges from a need to consider the dynamics of supply side research for green skills from a providers’ vantage point. The chapter starts with the argument that environment and sustainability skills are cross institutional, cross sectoral and also inter- and transdisciplinary. The chapter notes that there are a wide variety and diversity of supply side studies that can offer perspective on the many dynamics of green skills supply and provisioning. Four cases have been selected and brought into view to illuminate the influence of context and history on designing curricula and the importance of reflexive curriculum review studies, whole institution approaches and transformative, transgressive forms of learning that move beyond the boundaries of single institutions. These studies are also brought into view to indicate the scope and depth of contextual, systemic and engaged research that is required to develop transformative orientations and perspectives on green skills supply, taking skills system supply beyond the traditional training needs analysis. The chapter argues that this is an important dimension of green skills research, if conceptualised within just transitions and transformations to sustainability.
- Full Text:
- Authors: Lotz-Sisitka, Heila
- Date: 2019
- Subjects: To be catalogued
- Language: English
- Type: text , book
- Identifier: http://hdl.handle.net/10962/392895 , vital:68810 , ISBN 9780429279362 , https://doi.org/10.4324/9780429279362
- Description: This chapter emerges from a need to consider the dynamics of supply side research for green skills from a providers’ vantage point. The chapter starts with the argument that environment and sustainability skills are cross institutional, cross sectoral and also inter- and transdisciplinary. The chapter notes that there are a wide variety and diversity of supply side studies that can offer perspective on the many dynamics of green skills supply and provisioning. Four cases have been selected and brought into view to illuminate the influence of context and history on designing curricula and the importance of reflexive curriculum review studies, whole institution approaches and transformative, transgressive forms of learning that move beyond the boundaries of single institutions. These studies are also brought into view to indicate the scope and depth of contextual, systemic and engaged research that is required to develop transformative orientations and perspectives on green skills supply, taking skills system supply beyond the traditional training needs analysis. The chapter argues that this is an important dimension of green skills research, if conceptualised within just transitions and transformations to sustainability.
- Full Text:
A computer network attack taxonomy and ontology
- Van Heerden, Renier P, Irwin, Barry V W, Burke, Ivan D, Leenen, Louise
- Authors: Van Heerden, Renier P , Irwin, Barry V W , Burke, Ivan D , Leenen, Louise
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430064 , vital:72663 , DOI: 10.4018/ijcwt.2012070102
- Description: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification ex-ists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this pa-per. The objective of this ontology is to automate the classifica-tion of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defend-er's point of view. The authors' taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the "Attack Scenario", which can be used to characterize and classify computer network attacks.
- Full Text:
- Authors: Van Heerden, Renier P , Irwin, Barry V W , Burke, Ivan D , Leenen, Louise
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430064 , vital:72663 , DOI: 10.4018/ijcwt.2012070102
- Description: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification ex-ists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this pa-per. The objective of this ontology is to automate the classifica-tion of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defend-er's point of view. The authors' taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the "Attack Scenario", which can be used to characterize and classify computer network attacks.
- Full Text:
- «
- ‹
- 1
- ›
- »