e-Learning for policing, intelligence and counter-terrorism: performance constraints for confidentiality

Paul A. Watters

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)
34 Downloads (Pure)

Abstract

Online education for professionals in the policing, intelligence and counter-terrorism fields is problematic for several reasons: personnel are deployed in frequently changing locations; the confidentiality of the material being presented is critical; and the identity of and interactions between students may need to be restricted in various ways. In this paper, I examine whether ever-increasing wireless bandwidths (rather than CPU speed) can assist in the deployment of secure, mobile e-learning solutions for these students, by examining the effective bandwidth utilisation of a 1Gbps wireless network. Using Java and .NET prototypes, I determined that the mean effective bandwidth utilisation for simulated streamed media was 3.10 Mbps for Java, some 330 times smaller than the physical bandwidth available. The mean effective bandwidth utilisation was 12.39 Mbps for Visual C++ .NET, some 82.64 times smaller than the physical bandwidth available. I conclude that network bandwidth is not a limiting factor in deploying these solutions - even existing wireless networks of lesser bandwidth could be used effectively.
Original languageEnglish
Title of host publicationProceedings of the 5th IEEE international conference on networking (ICN 2006)
EditorsPascal Lorenz, Petre Dini, Damien Magoni, Abdelhamid Mellouk
Place of PublicationUnited States
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages5
ISBN (Print)0769525520
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event5th IEEE international conference on networking (ICN 2006) - Mauritius
Duration: 23 Apr 200628 Apr 2006

Conference

Conference5th IEEE international conference on networking (ICN 2006)
CityMauritius
Period23/04/0628/04/06

Bibliographical note

Copyright 2006 IEEE. Reprinted from Proceedings of the 5th IEEE international conference on networking (ICN 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'e-Learning for policing, intelligence and counter-terrorism: performance constraints for confidentiality'. Together they form a unique fingerprint.

Cite this