Hard choices ahead
- Authors: Pithouse, Richard, 1970-
- Date: 2009
- Language: English
- Type: text , article
- Identifier: vital:6204 , http://hdl.handle.net/10962/d1008573 , http://sacsis.org.za/site/article/334.1
- Description: preprint , From Introduction: In recent weeks people have been willing to risk arrest, violence and in some cases death at the hands of our habitually brutal police force to assert a whole range of demands. These demands have included an insistence on the right to the cities, the right to an income, the right to a decent education and the right to a living wage.
- Full Text:
- Date Issued: 2009
- Authors: Pithouse, Richard, 1970-
- Date: 2009
- Language: English
- Type: text , article
- Identifier: vital:6204 , http://hdl.handle.net/10962/d1008573 , http://sacsis.org.za/site/article/334.1
- Description: preprint , From Introduction: In recent weeks people have been willing to risk arrest, violence and in some cases death at the hands of our habitually brutal police force to assert a whole range of demands. These demands have included an insistence on the right to the cities, the right to an income, the right to a decent education and the right to a living wage.
- Full Text:
- Date Issued: 2009
A change of the seaward boundary of Goukamma Marine Protected Area could increase conservation and fishery benefits
- Gotz, Albrecht, Kerwath, Sven E, Attwood, Colin G, Sauer, Warwick H H
- Authors: Gotz, Albrecht , Kerwath, Sven E , Attwood, Colin G , Sauer, Warwick H H
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123503 , vital:35449 , https://doi10.4102/sajs.v105i9/10.102
- Description: Goukamma Marine Protected Area (MPA) on the South African temperate South Coast has been shown to be effective in maintaining a spawning stock of roman, Chrysoblephus laticeps (Sparidae). The larval ecology and the oceanographic conditions in the area suggest a good potential for the enhancement of roman stocks outside the reserve through larval dispersal. A high rate of illegal fishing just inside the seaward boundary of the MPA could severely compromise its function. We suggest that a change of the seaward boundary of the reserve to coincide with a latitudinal line could increase its function as a harvest refuge for resident reef fishes such as roman, facilitate voluntary compliance and monitoring and prosecution of illegal fishing without a significant negative impact on the commercial linefishing fleet in the area. Simple adjustments such as the one proposed here could be attempted at a number of South African MPAs as they would be beneficial to achieve fishery and conservation goals alike.
- Full Text:
- Date Issued: 2009
- Authors: Gotz, Albrecht , Kerwath, Sven E , Attwood, Colin G , Sauer, Warwick H H
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123503 , vital:35449 , https://doi10.4102/sajs.v105i9/10.102
- Description: Goukamma Marine Protected Area (MPA) on the South African temperate South Coast has been shown to be effective in maintaining a spawning stock of roman, Chrysoblephus laticeps (Sparidae). The larval ecology and the oceanographic conditions in the area suggest a good potential for the enhancement of roman stocks outside the reserve through larval dispersal. A high rate of illegal fishing just inside the seaward boundary of the MPA could severely compromise its function. We suggest that a change of the seaward boundary of the reserve to coincide with a latitudinal line could increase its function as a harvest refuge for resident reef fishes such as roman, facilitate voluntary compliance and monitoring and prosecution of illegal fishing without a significant negative impact on the commercial linefishing fleet in the area. Simple adjustments such as the one proposed here could be attempted at a number of South African MPAs as they would be beneficial to achieve fishery and conservation goals alike.
- Full Text:
- Date Issued: 2009
Putting the ‘T’ into South African human rights: transsexuality in the post-apartheid order
- Vincent, Louise, Camminga, Bianca
- Authors: Vincent, Louise , Camminga, Bianca
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141606 , vital:37989 , DOI: 10.1177/1363460709346108
- Description: Informed by narratives provided by self-identified South African transsexuals, whose lives span different periods of South Africa’s political and social history, this article seeks to explore how South Africa’s medical, legal and military establishments have exerted power over the transsexual body. A variety of studies outline the extent to which the apartheid state was a highly gendered state characterized by inflexible patriarchal norms and the dominance of violent and authoritarian forms of masculine expression. Hyper masculinization and militarization were explicit goals of the apartheid state. Deviance from the state’s prescribed gender norms was not simply socially unacceptable, it was, in many cases, punishable. South Africa’s post-1994 democratic Constitution, in contrast, explicitly outlaws discrimination on the basis of sexual orientation. But the democratic legal framework, which provides significant protections for freedom of sexual expression and freedom from discrimination for homosexuals has arguably had less of an impact on the lives of South Africa’s transsexual community. The state, even the post-apartheid state, has been loathe to move beyond the idea of a necessary correlation between the physical make-up of the body and the gender identity of a person in the way in which it has treated the idea of transsexualism.
- Full Text:
- Date Issued: 2009
- Authors: Vincent, Louise , Camminga, Bianca
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/141606 , vital:37989 , DOI: 10.1177/1363460709346108
- Description: Informed by narratives provided by self-identified South African transsexuals, whose lives span different periods of South Africa’s political and social history, this article seeks to explore how South Africa’s medical, legal and military establishments have exerted power over the transsexual body. A variety of studies outline the extent to which the apartheid state was a highly gendered state characterized by inflexible patriarchal norms and the dominance of violent and authoritarian forms of masculine expression. Hyper masculinization and militarization were explicit goals of the apartheid state. Deviance from the state’s prescribed gender norms was not simply socially unacceptable, it was, in many cases, punishable. South Africa’s post-1994 democratic Constitution, in contrast, explicitly outlaws discrimination on the basis of sexual orientation. But the democratic legal framework, which provides significant protections for freedom of sexual expression and freedom from discrimination for homosexuals has arguably had less of an impact on the lives of South Africa’s transsexual community. The state, even the post-apartheid state, has been loathe to move beyond the idea of a necessary correlation between the physical make-up of the body and the gender identity of a person in the way in which it has treated the idea of transsexualism.
- Full Text:
- Date Issued: 2009
Vocational language learning and teaching at a South African university: preparing professionals for multilingual contexts
- Maseko, Pamela, Kaschula, Russell H
- Authors: Maseko, Pamela , Kaschula, Russell H
- Date: 2009
- Subjects: Intercultural communication in education -- South Africa , African languages , Cultural awareness , Communication and culture , Multilingualism -- South Africa
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59412 , vital:27597 , doi: 10.5842/38-0-60
- Description: This paper highlights the methodology that has been used at Rhodes University and other South African universities in implementing vocation-specific African language learning programmes. Essentially, the paper links the curriculum design to the theoretical paradigm of intercultural communication. Intercultural theory is used as a basis to develop vocation-specific courses where language and culture are taught, for example, to second language learners of isiXhosa at Rhodes University. These courses include courses for Pharmacy and Law students. This paper offers a new theoretical paradigm for intercultural language teaching. Furthermore, examples from specific courses are provided in order to illustrate how this theoretical paradigm can be implemented in a practical way. The impact of multilingualism and intercultural communication in the wider legal and healthcare work environment in South Africa is also discussed.
- Full Text:
- Date Issued: 2009
- Authors: Maseko, Pamela , Kaschula, Russell H
- Date: 2009
- Subjects: Intercultural communication in education -- South Africa , African languages , Cultural awareness , Communication and culture , Multilingualism -- South Africa
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59412 , vital:27597 , doi: 10.5842/38-0-60
- Description: This paper highlights the methodology that has been used at Rhodes University and other South African universities in implementing vocation-specific African language learning programmes. Essentially, the paper links the curriculum design to the theoretical paradigm of intercultural communication. Intercultural theory is used as a basis to develop vocation-specific courses where language and culture are taught, for example, to second language learners of isiXhosa at Rhodes University. These courses include courses for Pharmacy and Law students. This paper offers a new theoretical paradigm for intercultural language teaching. Furthermore, examples from specific courses are provided in order to illustrate how this theoretical paradigm can be implemented in a practical way. The impact of multilingualism and intercultural communication in the wider legal and healthcare work environment in South Africa is also discussed.
- Full Text:
- Date Issued: 2009
Characterization of manganese tetraarylthiosubstituted phthalocyanines self assembled monolayers
- Matemadombo, Fungisai, Durmus, Mahmut, Togo, Chamunorwa, Limson, Janice L, Nyokong, Tebello
- Authors: Matemadombo, Fungisai , Durmus, Mahmut , Togo, Chamunorwa , Limson, Janice L , Nyokong, Tebello
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/263364 , vital:53621 , xlink:href="https://doi.org/10.1016/j.electacta.2009.04.059"
- Description: Manganese tetraarylthiosubstituted phthalocyanines (complexes 1–5) have been deposited on Au electrode surfaces through the self assembled monolayer (SAM) technique. SAM characteristics reported in this work are: ion barrier factor (∼1); interfacial capacitance (303–539 μF cm−2) and surface coverage (1.06 × 10−10–2.80 × 10−10 mol cm−2). Atomic force microscopy was employed in characterizing a SAM. SAMs of complexes 1–5 were employed to detect L-cysteine (with limit of detection ranging from 2.83 × 10−7 to 3.14 × 10−7 M at potentials of 0.68–0.75 V vs. Ag|AgCl) and nitrite (limit of detection ranging from 1.78 × 10−7 to 3.02 × 10−7 M at potentials of 0.69–0.76 V vs. Ag|AgCl).
- Full Text:
- Date Issued: 2009
- Authors: Matemadombo, Fungisai , Durmus, Mahmut , Togo, Chamunorwa , Limson, Janice L , Nyokong, Tebello
- Date: 2009
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/263364 , vital:53621 , xlink:href="https://doi.org/10.1016/j.electacta.2009.04.059"
- Description: Manganese tetraarylthiosubstituted phthalocyanines (complexes 1–5) have been deposited on Au electrode surfaces through the self assembled monolayer (SAM) technique. SAM characteristics reported in this work are: ion barrier factor (∼1); interfacial capacitance (303–539 μF cm−2) and surface coverage (1.06 × 10−10–2.80 × 10−10 mol cm−2). Atomic force microscopy was employed in characterizing a SAM. SAMs of complexes 1–5 were employed to detect L-cysteine (with limit of detection ranging from 2.83 × 10−7 to 3.14 × 10−7 M at potentials of 0.68–0.75 V vs. Ag|AgCl) and nitrite (limit of detection ranging from 1.78 × 10−7 to 3.02 × 10−7 M at potentials of 0.69–0.76 V vs. Ag|AgCl).
- Full Text:
- Date Issued: 2009
An intercultural approach to implementing multilingualism at Rhodes University, South Africa
- Kaschula, Russell H, Maseko, Pamela, Dalvit, Lorenzo, Mapi, Thandeka, Nelani, Linda, Nosilela, Bulelwa, Sam, Msindisi S
- Authors: Kaschula, Russell H , Maseko, Pamela , Dalvit, Lorenzo , Mapi, Thandeka , Nelani, Linda , Nosilela, Bulelwa , Sam, Msindisi S
- Date: 2009
- Subjects: Multilingualism -- South Africa , Intercultural communication , Education, Higher -- South Africa , Language and culture -- South Africa , Language and education -- South Africa , Rhodes University
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59390 , vital:27579 , doi: 10.5842/39-0-74
- Description: The work of intercultural communication theorists such as Ting-Toomey (1999) and Gudykunst (2003) has informed curriculum design and teaching methodology of the courses developed for teaching isiXhosa for vocational purposes to second language (L2) learners. This seems to be an appropriate theoretical paradigm within multilingual South Africa, where intercultural communication is becoming a daily reality for a growing portion of the population. We make use of this theory to introduce and develop experiential understanding of multilingualism at Rhodes University in various departments and, more generally, on campus.
- Full Text:
- Date Issued: 2009
- Authors: Kaschula, Russell H , Maseko, Pamela , Dalvit, Lorenzo , Mapi, Thandeka , Nelani, Linda , Nosilela, Bulelwa , Sam, Msindisi S
- Date: 2009
- Subjects: Multilingualism -- South Africa , Intercultural communication , Education, Higher -- South Africa , Language and culture -- South Africa , Language and education -- South Africa , Rhodes University
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/59390 , vital:27579 , doi: 10.5842/39-0-74
- Description: The work of intercultural communication theorists such as Ting-Toomey (1999) and Gudykunst (2003) has informed curriculum design and teaching methodology of the courses developed for teaching isiXhosa for vocational purposes to second language (L2) learners. This seems to be an appropriate theoretical paradigm within multilingual South Africa, where intercultural communication is becoming a daily reality for a growing portion of the population. We make use of this theory to introduce and develop experiential understanding of multilingualism at Rhodes University in various departments and, more generally, on campus.
- Full Text:
- Date Issued: 2009
Grade-appropriate literacy and South African grade seven learners' classroom writing in English
- Authors: Hendricks, Monica
- Date: 2009
- Language: English
- Type: text , article
- Identifier: vital:7019 , http://hdl.handle.net/10962/d1007173 , https://doi.org/10.1080/03004430600989593
- Description: preprint , This paper reports on the writing of grade 7 learners in English as an additional language at four differently-resourced schools in the Eastern Cape Province, South Africa. Because grade 7 is the start of the senior phase of schooling, it is vital that learners achieve grade-level competence in the language used as medium of instruction. Learning outcome five which states that ‘the learner will be able to use language to think and reason, as well as access, process and use information for learning’ (Department of Education 2002) is particularly relevant. The primary research question asked what the writing practices in grade 7 additional languages were, and how these contribute to the development of learners’ writing. The findings were that literacy practices at all four schools privilege grammar exercises and personal, expressive writing. In terms of Cummins’s (1984) constructs of BICS (Basic Interpersonal Communicative Skill) and CALP (Cognitive Academic Language Proficiency), learners’ written competencies are mainly conversational (BICS). The personal expressive texts which predominate in learners’ writing have done little to develop a formal, impersonal academic register (CALP). Learners need to become familiar with the more abstract impersonal factual genres associated with disciplinary-based knowledge.
- Full Text:
- Date Issued: 2009
- Authors: Hendricks, Monica
- Date: 2009
- Language: English
- Type: text , article
- Identifier: vital:7019 , http://hdl.handle.net/10962/d1007173 , https://doi.org/10.1080/03004430600989593
- Description: preprint , This paper reports on the writing of grade 7 learners in English as an additional language at four differently-resourced schools in the Eastern Cape Province, South Africa. Because grade 7 is the start of the senior phase of schooling, it is vital that learners achieve grade-level competence in the language used as medium of instruction. Learning outcome five which states that ‘the learner will be able to use language to think and reason, as well as access, process and use information for learning’ (Department of Education 2002) is particularly relevant. The primary research question asked what the writing practices in grade 7 additional languages were, and how these contribute to the development of learners’ writing. The findings were that literacy practices at all four schools privilege grammar exercises and personal, expressive writing. In terms of Cummins’s (1984) constructs of BICS (Basic Interpersonal Communicative Skill) and CALP (Cognitive Academic Language Proficiency), learners’ written competencies are mainly conversational (BICS). The personal expressive texts which predominate in learners’ writing have done little to develop a formal, impersonal academic register (CALP). Learners need to become familiar with the more abstract impersonal factual genres associated with disciplinary-based knowledge.
- Full Text:
- Date Issued: 2009
Rich Representation and Visualisation of Time-Series Data
- Kerr, Simon, Foster, Greg, Irwin, Barry V W
- Authors: Kerr, Simon , Foster, Greg , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428130 , vital:72488 , https://www.researchgate.net/profile/Barry-Ir-win/publication/265821926_Rich_Representation_and_Visualisation_of_Time-Series_Data/links/5548a1350cf26a7bf4daefb1/Rich-Representation-and-Visualisation-of-Time-Series-Data.pdf
- Description: Currently the majority of data is visualized using static graphs and ta-bles. However, static graphs still leave much to be desired and provide only a small insight into trends and changes between values. We pro-pose a move away from purely static representations of data towards a more fluid and understandable environment for data representation. This is achieved through the use of an application which animates time based data. Animating time based data allows one to see nuances within a dataset from a more comprehensive perspective. This is espe-cially useful within the time based data rich telecommunications indus-try. The application comprises of two parts-the backend manages raw data which is then passed to the frontend for animation. A play function allows one to play through a time series. Which creates a fluid and dy-namic environment for exploring data. Both the advantages and disad-vantages of this approach are investigated and an application is intro-duced which can be used to animate and explore datasets.
- Full Text:
- Date Issued: 2009
- Authors: Kerr, Simon , Foster, Greg , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428130 , vital:72488 , https://www.researchgate.net/profile/Barry-Ir-win/publication/265821926_Rich_Representation_and_Visualisation_of_Time-Series_Data/links/5548a1350cf26a7bf4daefb1/Rich-Representation-and-Visualisation-of-Time-Series-Data.pdf
- Description: Currently the majority of data is visualized using static graphs and ta-bles. However, static graphs still leave much to be desired and provide only a small insight into trends and changes between values. We pro-pose a move away from purely static representations of data towards a more fluid and understandable environment for data representation. This is achieved through the use of an application which animates time based data. Animating time based data allows one to see nuances within a dataset from a more comprehensive perspective. This is espe-cially useful within the time based data rich telecommunications indus-try. The application comprises of two parts-the backend manages raw data which is then passed to the frontend for animation. A play function allows one to play through a time series. Which creates a fluid and dy-namic environment for exploring data. Both the advantages and disad-vantages of this approach are investigated and an application is intro-duced which can be used to animate and explore datasets.
- Full Text:
- Date Issued: 2009
gpf: A GPU accelerated packet classification tool
- Nottingham, Alastair, Irwin, Barry V W
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428103 , vital:72486 , https://d1wqtxts1xzle7.cloudfront.net/67098560/gPF_A_GPU_Accelerated_Packet_Classificat20210505-17707-zqqa4s.pdf?1620201469=andresponse-content-disposi-tion=inline%3B+filename%3DgPF_A_GPU_Accelerated_Packet_Classificat.pdfandExpires=1714733902andSignature=NQ~1DjH1XOuqF8u1Yq74XyG7kp~y0II81vu40SuWO2GQhSgToTHC7ynbAoP3MGv9do~bX1PCAp2Z2TCKUVHT7CmYNRxDmnpk5G4kefH--0VotMHVtFnHnf5Q9nhrp0MIgSxEhncOrlRx5K5sRhlLkyfDib3RS8Y8vu~FIPvm1DaZrfqCZSpXKmHh9r1etybRBRtUokzayPtgbhE41bQtW9wI8J4-JTQ9doyNC-JflFuEfUnhv5Phf45lr7TALm8G8nGZBp3z9-nSLZDxls2mvvVIANCdutyOMDnMDadGoqjIB2wYwUy~Fm424ZWj7fF89Ytj9xqIU63H4NFE2HodtQ__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: This paper outlines the design of gPF, a fast packet classifier optimised for parallel execution on current generation commodity graphics hard-ware. Specifically, gPF leverages the potential for both the parallel classi-fication of packets at runtime, and the use of evolutionary mechanisms, in the form of a GP-GPU genetic algorithm to produce contextually opti-mised filter permutations in order to reduce redundancy and improve the per-packet throughput rate of the resultant filter program. This paper demonstrates that these optimisations have significant potential for im-proving packet classification speeds, particularly with regard to bulk pack-et processing and saturated network environments.
- Full Text:
- Date Issued: 2009
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428103 , vital:72486 , https://d1wqtxts1xzle7.cloudfront.net/67098560/gPF_A_GPU_Accelerated_Packet_Classificat20210505-17707-zqqa4s.pdf?1620201469=andresponse-content-disposi-tion=inline%3B+filename%3DgPF_A_GPU_Accelerated_Packet_Classificat.pdfandExpires=1714733902andSignature=NQ~1DjH1XOuqF8u1Yq74XyG7kp~y0II81vu40SuWO2GQhSgToTHC7ynbAoP3MGv9do~bX1PCAp2Z2TCKUVHT7CmYNRxDmnpk5G4kefH--0VotMHVtFnHnf5Q9nhrp0MIgSxEhncOrlRx5K5sRhlLkyfDib3RS8Y8vu~FIPvm1DaZrfqCZSpXKmHh9r1etybRBRtUokzayPtgbhE41bQtW9wI8J4-JTQ9doyNC-JflFuEfUnhv5Phf45lr7TALm8G8nGZBp3z9-nSLZDxls2mvvVIANCdutyOMDnMDadGoqjIB2wYwUy~Fm424ZWj7fF89Ytj9xqIU63H4NFE2HodtQ__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: This paper outlines the design of gPF, a fast packet classifier optimised for parallel execution on current generation commodity graphics hard-ware. Specifically, gPF leverages the potential for both the parallel classi-fication of packets at runtime, and the use of evolutionary mechanisms, in the form of a GP-GPU genetic algorithm to produce contextually opti-mised filter permutations in order to reduce redundancy and improve the per-packet throughput rate of the resultant filter program. This paper demonstrates that these optimisations have significant potential for im-proving packet classification speeds, particularly with regard to bulk pack-et processing and saturated network environments.
- Full Text:
- Date Issued: 2009
An analysis of logical network distance on observed packet counts for network telescope data
- Irwin, Barry V W, Bartnett, Richard J
- Authors: Irwin, Barry V W , Bartnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428090 , vital:72485 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228765119_An_Analysis_of_Logical_Network_Distance_on_Observed_Packet_Counts_for_Network_Telescope_Data/links/53e9c5e80cf28f342f414988/An-Analysis-of-Logical-Network-Distance-on-Observed-Packet-Counts-for-Network-Telescope-Data.pdf
- Description: This paper investigates the relationship between the logical distance between two IP addresses on the Internet, and the number of packets captured by a network telescope listening on a network containing one of the addresses. The need for the computation of a manageable measure of quantification of this distance is presented, as an alterna-tive to the raw difference that can be computed between two addresses using their Integer representations. A number of graphical analysis tools and techniques are presented to aid in this analysis. Findings are pre-sented based on a long baseline data set collected at Rhodes Universi-ty over the last three years, using a dedicated Class C (256 IP address) sensor network, and comprising 19 million packets. Of this total, 27% by packet volume originate within the same natural class A network as the telescope, and as such can be seen to be logically close to the collector network.
- Full Text:
- Date Issued: 2009
- Authors: Irwin, Barry V W , Bartnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428090 , vital:72485 , https://www.researchgate.net/profile/Barry-Ir-win/publication/228765119_An_Analysis_of_Logical_Network_Distance_on_Observed_Packet_Counts_for_Network_Telescope_Data/links/53e9c5e80cf28f342f414988/An-Analysis-of-Logical-Network-Distance-on-Observed-Packet-Counts-for-Network-Telescope-Data.pdf
- Description: This paper investigates the relationship between the logical distance between two IP addresses on the Internet, and the number of packets captured by a network telescope listening on a network containing one of the addresses. The need for the computation of a manageable measure of quantification of this distance is presented, as an alterna-tive to the raw difference that can be computed between two addresses using their Integer representations. A number of graphical analysis tools and techniques are presented to aid in this analysis. Findings are pre-sented based on a long baseline data set collected at Rhodes Universi-ty over the last three years, using a dedicated Class C (256 IP address) sensor network, and comprising 19 million packets. Of this total, 27% by packet volume originate within the same natural class A network as the telescope, and as such can be seen to be logically close to the collector network.
- Full Text:
- Date Issued: 2009
Passive Traffic Inspection for Automated Firewall Rule Set Generation
- Pranschke, Georg-Christian, Irwin, Barry V W, Barnett, Richard J
- Authors: Pranschke, Georg-Christian , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428114 , vital:72487 , https://d1wqtxts1xzle7.cloudfront.net/49200001/Automated_Firewall_Rule_Set_Generation_T20160928-12076-1n830lx-libre.pdf?1475130103=andresponse-content-disposi-tion=inline%3B+filename%3DAutomated_Firewall_Rule_Set_Generation_T.pdfandExpires=1714733377andSignature=Q0miMvZNpP7c60n42m54TvFG4hIdujVJBilbpvDKquBk54RPwU22pH6-40mpmOxIFBllKUmOgZfS9SwzuiANn-AZ2bhAELyZmf2bJ5MgceaYH5wnPjX9VzP04C2BACzhO5YutUfwkysburUx-zNdiemSofx2p1DwOszXaJNauYdP8RcHQmFl8aOnkoc3kmU02eKz8WiQISntJtu5Gpo8txP-Z6f1BEzvlVGd432tndhRwpsEVWGW43~oXsdaWQu72S8pTakgKPREqaD7CUHKMXiiUBfuiSj1nFo2n4xZQlFHqbMT7TAYzBPM0GObe~kBe5s2nY6dnOMUKUsSaeTUtqA__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The introduction of network filters and chokes such as firewalls in exist-ing operational network is often problematic, due to considerations that need to be made to minimise the interruption of existent legitimate traf-fic. This often necessitates the time consuming manual analysis of net-work traffic over a period of time in order to generate and vet the rule bases to minimise disruption of legitimate flows. To improve upon this, a system facilitating network traffic analysis and firewall rule set genera-tion is proposed. The system shall be capable to deal with the ever in-creasing traffic volumes and help to provide and maintain high uptimes. A high level overview of the design of the components is presented. Additions to the system are scoring metrics which may assist the admin-istrator to optimise the rule sets for the most efficient matching of flows, based on traffic volume, frequency or packet count. A third party pack-age-Firewall Builder-is used to target the resultant rule sets to a number of different firewall and network Filtering platforms.
- Full Text:
- Date Issued: 2009
- Authors: Pranschke, Georg-Christian , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428114 , vital:72487 , https://d1wqtxts1xzle7.cloudfront.net/49200001/Automated_Firewall_Rule_Set_Generation_T20160928-12076-1n830lx-libre.pdf?1475130103=andresponse-content-disposi-tion=inline%3B+filename%3DAutomated_Firewall_Rule_Set_Generation_T.pdfandExpires=1714733377andSignature=Q0miMvZNpP7c60n42m54TvFG4hIdujVJBilbpvDKquBk54RPwU22pH6-40mpmOxIFBllKUmOgZfS9SwzuiANn-AZ2bhAELyZmf2bJ5MgceaYH5wnPjX9VzP04C2BACzhO5YutUfwkysburUx-zNdiemSofx2p1DwOszXaJNauYdP8RcHQmFl8aOnkoc3kmU02eKz8WiQISntJtu5Gpo8txP-Z6f1BEzvlVGd432tndhRwpsEVWGW43~oXsdaWQu72S8pTakgKPREqaD7CUHKMXiiUBfuiSj1nFo2n4xZQlFHqbMT7TAYzBPM0GObe~kBe5s2nY6dnOMUKUsSaeTUtqA__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: The introduction of network filters and chokes such as firewalls in exist-ing operational network is often problematic, due to considerations that need to be made to minimise the interruption of existent legitimate traf-fic. This often necessitates the time consuming manual analysis of net-work traffic over a period of time in order to generate and vet the rule bases to minimise disruption of legitimate flows. To improve upon this, a system facilitating network traffic analysis and firewall rule set genera-tion is proposed. The system shall be capable to deal with the ever in-creasing traffic volumes and help to provide and maintain high uptimes. A high level overview of the design of the components is presented. Additions to the system are scoring metrics which may assist the admin-istrator to optimise the rule sets for the most efficient matching of flows, based on traffic volume, frequency or packet count. A third party pack-age-Firewall Builder-is used to target the resultant rule sets to a number of different firewall and network Filtering platforms.
- Full Text:
- Date Issued: 2009
Peer-to-Peer Web Services for Distributed Rural ICTs
- Wertlen, Ronald, Terzoli, Alfredo
- Authors: Wertlen, Ronald , Terzoli, Alfredo
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428508 , vital:72516 , https://www.researchgate.net/profile/Alfredo-Terzoli/publication/265184410_Peer-to-Peer_Web_Services_for_Distributed_Rural_ICTs/links/5523cb9a0cf223eed37fe0b3/Peer-to-Peer-Web-Services-for-Distributed-Rural-ICTs.pdf
- Description: In this paper we look at the context and design of a distributed web ser-vices platform called P2PMW. P2PMW uses P2P principles to automat-ically build a robust network with flexible routing and practically no ad-ministrative overhead in order to share resources between nodes. P2PMW uses open source and widely adopted standards. Our argu-ment is that the context of rural ICTs is being shaped by high speed wireless networks with limited span that we call “islands” and that the architecture we introduce is a good fit for the context. We further argue that by employing widely adopted open standards and open source software, we can speed the development of effective custom made ap-plications for marginalised rural areas.
- Full Text:
- Date Issued: 2009
- Authors: Wertlen, Ronald , Terzoli, Alfredo
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428508 , vital:72516 , https://www.researchgate.net/profile/Alfredo-Terzoli/publication/265184410_Peer-to-Peer_Web_Services_for_Distributed_Rural_ICTs/links/5523cb9a0cf223eed37fe0b3/Peer-to-Peer-Web-Services-for-Distributed-Rural-ICTs.pdf
- Description: In this paper we look at the context and design of a distributed web ser-vices platform called P2PMW. P2PMW uses P2P principles to automat-ically build a robust network with flexible routing and practically no ad-ministrative overhead in order to share resources between nodes. P2PMW uses open source and widely adopted standards. Our argu-ment is that the context of rural ICTs is being shaped by high speed wireless networks with limited span that we call “islands” and that the architecture we introduce is a good fit for the context. We further argue that by employing widely adopted open standards and open source software, we can speed the development of effective custom made ap-plications for marginalised rural areas.
- Full Text:
- Date Issued: 2009
Augmenting an e-Commerce service for Marginalized Communities: A Rewards Based Marketing Approach
- Jere, Norbert R, Thinyane, Mamello, Terzoli, Alfredo
- Authors: Jere, Norbert R , Thinyane, Mamello , Terzoli, Alfredo
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428463 , vital:72513 , https://www.researchgate.net/profile/Alfredo-Terzoli/publication/228968666_Augmenting_an_e-Com-merce_service_for_Marginalized_Communities_A_Rewards_Based_Marketing_Approach/links/09e4151344c1f615f7000000/Augmenting-an-e-Commerce-service-for-Marginalized-Communities-A-Rewards-Based-Marketing-Approach.pdf
- Description: Information and Communication technologies (ICTs) have been widely deployed in developmental programmes and this has lead to the crea-tion of a new field–ICT for development (ICT4D). Many e-Commerce platforms now exist in many rural areas in developing countries. ICT4D allows Small, Medium and Micro Enterprises (SMMEs) in rural areas to increase sales and gain the market share on the global market. Howev-er, many of these ICT4D projects in marginalized areas fail as a result of lacking the required resources to support ICTs. SMMEs in rural areas face problems in marketing their products on the global market. There-fore, ensuring sustainability of such systems in marginalized areas is important. This paper explains an e-Marketing strategy through a re-ward based negotiation application, aimed at improving the existing e-Commerce platform. The e-Commerce platform has been deployed for the Dwesa community. Dwesa is a rural area in the Eastern Cape prov-ince of South Africa.
- Full Text:
- Date Issued: 2009
- Authors: Jere, Norbert R , Thinyane, Mamello , Terzoli, Alfredo
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428463 , vital:72513 , https://www.researchgate.net/profile/Alfredo-Terzoli/publication/228968666_Augmenting_an_e-Com-merce_service_for_Marginalized_Communities_A_Rewards_Based_Marketing_Approach/links/09e4151344c1f615f7000000/Augmenting-an-e-Commerce-service-for-Marginalized-Communities-A-Rewards-Based-Marketing-Approach.pdf
- Description: Information and Communication technologies (ICTs) have been widely deployed in developmental programmes and this has lead to the crea-tion of a new field–ICT for development (ICT4D). Many e-Commerce platforms now exist in many rural areas in developing countries. ICT4D allows Small, Medium and Micro Enterprises (SMMEs) in rural areas to increase sales and gain the market share on the global market. Howev-er, many of these ICT4D projects in marginalized areas fail as a result of lacking the required resources to support ICTs. SMMEs in rural areas face problems in marketing their products on the global market. There-fore, ensuring sustainability of such systems in marginalized areas is important. This paper explains an e-Marketing strategy through a re-ward based negotiation application, aimed at improving the existing e-Commerce platform. The e-Commerce platform has been deployed for the Dwesa community. Dwesa is a rural area in the Eastern Cape prov-ince of South Africa.
- Full Text:
- Date Issued: 2009
Deployment and Extension of a Converged WiMAX/WiFi Network for Dwesa Community Area South Africa
- Ndlovu, N, Terzoli, Alfredo, Thinyane, Mamello
- Authors: Ndlovu, N , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428479 , vital:72514 , https://citeseerx.ist.psu.edu/document?repid=rep1andtype=pdfanddoi=22468be0252776eabb9e015b51e8e5cf2855ca5f
- Description: As demand for new, reliable, flexible and relatively inexpensive internet access in marginalized rural areas in developing countries increases, there is a need to amalgamate broadband technologies such as WiMAX and WiFi so as to extend the coverage area. Consequently, this will en-able provision of high-speed mobile data and telecommunications ser-vices. This paper describes how WiMAX and WiFi can be merged to-gether, with VSAT technology offering backhaul internet connectivity to provide ever present broadband access. We also look at their respective network applications and how there are going to be used to help support ICT4D activities in these marginalized areas.
- Full Text:
- Date Issued: 2009
- Authors: Ndlovu, N , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428479 , vital:72514 , https://citeseerx.ist.psu.edu/document?repid=rep1andtype=pdfanddoi=22468be0252776eabb9e015b51e8e5cf2855ca5f
- Description: As demand for new, reliable, flexible and relatively inexpensive internet access in marginalized rural areas in developing countries increases, there is a need to amalgamate broadband technologies such as WiMAX and WiFi so as to extend the coverage area. Consequently, this will en-able provision of high-speed mobile data and telecommunications ser-vices. This paper describes how WiMAX and WiFi can be merged to-gether, with VSAT technology offering backhaul internet connectivity to provide ever present broadband access. We also look at their respective network applications and how there are going to be used to help support ICT4D activities in these marginalized areas.
- Full Text:
- Date Issued: 2009
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers
- Nottingham, Alastair, Irwin, Barry V W
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428674 , vital:72528 , https://www.researchgate.net/profile/Marijke-Coet-zee/publication/220803190_A_Framework_for_Web_Services_Security_Policy_Negotiation/links/0fcfd50f7d806aafc8000000/A-Framework-for-Web-Services-Security-Policy-Negotiation.pdf#page=119
- Description: Packet demultiplexing and analysis is a core concern for network secu-rity, and has hence inspired numerous optimisation attempts since their conception in early packet demultiplexing filters such as CSPF and BPF. These optimisations have generally, but not exclusively, focused on improving the speed of packet classification. Despite these im-provements however, packet filters require further optimisation in order to be effectively applied within next generation networks. One identified optimisation is that of reducing the average path length of the global filter by selecting an optimum filter permutation. Since redundant code generation does not change the order of computation, the initial filter order before filter optimisation affects the average path length of the resultant control-flow graph, thus selection of an optimum permutation of filters could provide significant performance improvements. Unfortu-nately, this problem is NP-Complete. In this paper, we consider using Genetic Algorithms to’breed’an optimum filter permutation prior to re-dundant code elimination. Specifically, we aim to evaluate the effec-tiveness of such an optimisation in reducing filter control flow graphs.
- Full Text:
- Date Issued: 2009
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428674 , vital:72528 , https://www.researchgate.net/profile/Marijke-Coet-zee/publication/220803190_A_Framework_for_Web_Services_Security_Policy_Negotiation/links/0fcfd50f7d806aafc8000000/A-Framework-for-Web-Services-Security-Policy-Negotiation.pdf#page=119
- Description: Packet demultiplexing and analysis is a core concern for network secu-rity, and has hence inspired numerous optimisation attempts since their conception in early packet demultiplexing filters such as CSPF and BPF. These optimisations have generally, but not exclusively, focused on improving the speed of packet classification. Despite these im-provements however, packet filters require further optimisation in order to be effectively applied within next generation networks. One identified optimisation is that of reducing the average path length of the global filter by selecting an optimum filter permutation. Since redundant code generation does not change the order of computation, the initial filter order before filter optimisation affects the average path length of the resultant control-flow graph, thus selection of an optimum permutation of filters could provide significant performance improvements. Unfortu-nately, this problem is NP-Complete. In this paper, we consider using Genetic Algorithms to’breed’an optimum filter permutation prior to re-dundant code elimination. Specifically, we aim to evaluate the effec-tiveness of such an optimisation in reducing filter control flow graphs.
- Full Text:
- Date Issued: 2009
Management, Processing and Analysis of Cryptographic Network Protocols
- Cowie, Bradley, Irwin, Barry V W, Barnett, Richard J
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
- Authors: Cowie, Bradley , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428687 , vital:72529 , https://d1wqtxts1xzle7.cloudfront.net/30968790/ISSA2009Proceedings-libre.pdf?1393060231=andresponse-content-disposi-tion=inline%3B+filename%3DAN_ANALYSIS_OF_AUTHENTICATION_FOR_PASSIV.pdfandExpires=1714732172andSignature=Ei8RhR2pCSUNGCNE40DugEyFamcyTxPuuRq9gslD~WGlNqPEgG3FL7VFRQCKXhZBWyAfGRjMtBmNDJ7Sjsgex12WxW9Fj8XdpB7Bfz23FuLc-t2YRM-2joKOHJQLxWJlfZiOzxDvVGZeM3zCHj~f3NUeY1~n6PtVtLzNdL8glIg5dzDTTIE6ms2YlxmnO6JvlzQwOWdHaUbHsZzMGOV19UPtBk-UJzHSq3NRyPe4-XNZQLNK-mEEcMGsLk6nkyXIsW2QJ7gtKW1nNkr6EMkAGSOnDai~pSqzb2imspMnlPRigAPPISrNHO79rP51H9bu1WvbRZv1KVkGvM~sRmfl28A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=499
- Description: The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both en-cryption and authentication to data transfer, has become increasingly popular. However, we note that it is rather difficult to perform legitimate analysis, intrusion detection and debugging on cryptographic protocols, as the data that passes through is encrypted. In this paper we assume that we have legitimate access to the data and that we have the private key used in transactions and thus we will be able decrypt the data. The objective is to produce a suitable application framework that allows for easy recovery and secure storage of cryptographic keys; including ap-propriate tools to decapsulate traffic and to decrypt live packet streams or precaptured traffic contained in PCAP files. The resultant processing will then be able to provide a clear-text stream which can be used for further analysis.
- Full Text:
- Date Issued: 2009
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems
- Barnett, Richard J, Irwin, Barry V W
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
- Authors: Barnett, Richard J , Irwin, Barry V W
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428644 , vital:72526 , https://www.researchgate.net/profile/Johan-Van-Niekerk-2/publication/220803295_E-mail_Security_awareness_at_Nelson_Mandela_Metropolitan_University_Registrar's_Division/links/0deec51909304b0ed8000000/E-mail-Security-awareness-at-Nelson-Mandela-Metropolitan-University-Registrars-Division.pdf#page=289
- Description: Most current Network Intrusion Detection Systems (NIDS) perform de-tection by matching traffic to a set of known signatures. These systems have well defined mechanisms for the rapid creation and deployment of new signatures. However, despite their support for anomaly detection, this is usually limited and often requires a full recompilation of the sys-tem to deploy new algorithms.
- Full Text:
- Date Issued: 2009
Automated Firewall Rule Set Generation Through Passive Traffic Inspection
- Pranschke, Georg-Christian, Irwin, Barry V W, Barnett, Richard J
- Authors: Pranschke, Georg-Christian , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428659 , vital:72527 , https://doi.org/10.1007/978-90-481-3660-5_56
- Description: Introducing rewalls and other choke point controls in existing networks is often problematic, because in the majority of cases there is already production tra c in place that cannot be interrupted. This often necessitates the time consuming manual analysis of network tra c in order to ensure that when a new system is installed, there is no disruption to legitimate ows. To improve upon this situation it is proposed that a system facilitating network tra c analysis and rewall rule set generation is developed.
- Full Text:
- Date Issued: 2009
- Authors: Pranschke, Georg-Christian , Irwin, Barry V W , Barnett, Richard J
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428659 , vital:72527 , https://doi.org/10.1007/978-90-481-3660-5_56
- Description: Introducing rewalls and other choke point controls in existing networks is often problematic, because in the majority of cases there is already production tra c in place that cannot be interrupted. This often necessitates the time consuming manual analysis of network tra c in order to ensure that when a new system is installed, there is no disruption to legitimate ows. To improve upon this situation it is proposed that a system facilitating network tra c analysis and rewall rule set generation is developed.
- Full Text:
- Date Issued: 2009
Aes white paper: Best practices in network audio
- Bouillot, Nicolas, Cohen, Elizabeth, Cooperstock, Jeremy R, Floros, Andreas, Fonseca, Nuno, Foss, Richard, Goodman, Michael, Grant, John, Gross, Kevin, Harris, Steven, Harshbarger, Brent, Heyraud, Joffrey, Jonsson, Lars, Narus, John, Page, Michael, Snook, Tom, Tanaka, Atau, Trieger, Justin, Zanghieri, Umberto
- Authors: Bouillot, Nicolas , Cohen, Elizabeth , Cooperstock, Jeremy R , Floros, Andreas , Fonseca, Nuno , Foss, Richard , Goodman, Michael , Grant, John , Gross, Kevin , Harris, Steven , Harshbarger, Brent , Heyraud, Joffrey , Jonsson, Lars , Narus, John , Page, Michael , Snook, Tom , Tanaka, Atau , Trieger, Justin , Zanghieri, Umberto
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427181 , vital:72420 , https://www.aes.org/e-lib/browse.cfm?elib=14839
- Description: Analog audio needs a separate physical circuit for each channel. Each microphone in a studio or on a stage, for example, must have its own circuit back to the mixer. Routing of the signals is inflexible. Digital audio is frequently wired in a similar way to analog. Although several channels can share a single physical circuit ( e. g., up to 64 with AES10 ), thus reducing the number of cores needed in a cable. Routing of signals is still inflexible and any change to the equipment in a location is liable to require new cabling. Networks allow much more flexibility. Any piece of equipment plugged into the network is able to communicate with any other. However, installers of audio networks need to be aware of a number of issues that affect audio signals but are not important for data networks and are not addressed by current IT networking technologies such as IP. This white paper examines these issues and provides guidance to installers and users that can help them build successful networked systems.
- Full Text:
- Date Issued: 2009
- Authors: Bouillot, Nicolas , Cohen, Elizabeth , Cooperstock, Jeremy R , Floros, Andreas , Fonseca, Nuno , Foss, Richard , Goodman, Michael , Grant, John , Gross, Kevin , Harris, Steven , Harshbarger, Brent , Heyraud, Joffrey , Jonsson, Lars , Narus, John , Page, Michael , Snook, Tom , Tanaka, Atau , Trieger, Justin , Zanghieri, Umberto
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427181 , vital:72420 , https://www.aes.org/e-lib/browse.cfm?elib=14839
- Description: Analog audio needs a separate physical circuit for each channel. Each microphone in a studio or on a stage, for example, must have its own circuit back to the mixer. Routing of the signals is inflexible. Digital audio is frequently wired in a similar way to analog. Although several channels can share a single physical circuit ( e. g., up to 64 with AES10 ), thus reducing the number of cores needed in a cable. Routing of signals is still inflexible and any change to the equipment in a location is liable to require new cabling. Networks allow much more flexibility. Any piece of equipment plugged into the network is able to communicate with any other. However, installers of audio networks need to be aware of a number of issues that affect audio signals but are not important for data networks and are not addressed by current IT networking technologies such as IP. This white paper examines these issues and provides guidance to installers and users that can help them build successful networked systems.
- Full Text:
- Date Issued: 2009
An Integrated Connection Management and Control Protocol for Audio Networks
- Foss, Richard, Gurdan, Robby, Klinkradt, Bradley, Chigwamba, Nyasha
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009
- Authors: Foss, Richard , Gurdan, Robby , Klinkradt, Bradley , Chigwamba, Nyasha
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427111 , vital:72415 , https://www.aes.org/e-lib/browse.cfm?elib=15135
- Description: With the advent of digital networks that link audio devices, there is a need for a protocol that integrates control and connection management, allows for streaming of all media content such as audio and video between devices from different manufacturers, and that provides a common approach to the control of these devices. This paper proposes such a protocol, named XFN, currently being standardized as part of the AES X170 project. XFN is an IP-based peer to peer network protocol, in which any device on the network may send or receive connection management, control, and monitoring messages. Essential to the XFN protocol is the fact that each parameter in a device can be addressed via a hierarchical structure that reflects the natural layout of the device.
- Full Text:
- Date Issued: 2009