The Pathneck technique uses a
carefully constructed packet train to locate bottleneck links, making
it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those
properties make it attractive for both regular network users and ISP
network operators.
The BRoute system uses a novel concept source and
sinks trees to capture end-user routing structures and network-edge
bandwidth information. Equipped with path- edge inference algorithms,
BRoute can infer the available bandwidth of all N2 paths in an N-node
system with only O (N) measurement overhead. That is, BRoute solves the
system-level available-bandwidth monitoring problem. The TAMI
measurement infrastructure introduces measurement scheduling and
topology-aware capabilities to systematically support all the monitoring
and diagnostic techniques that are proposed in this work. TAMI not only
can support network monitoring and diagnosis, it also can effectively
improve the performance of network applications like peer-to-peer
systems.
At the end of this work the author was able to put forth
that monitoring end-to-end available bandwidth and bandwidth bottlenecks
on individual network paths can be efficiently and effectively
estimated using packet-train probing techniques. Large- scale available
bandwidth can be estimated efficiently by using the source and sink tree
data structures to capture network edge information. Also with the
support of a properly designed measurement infrastructure,
bandwidth-related measurement techniques can be convenient enough to be
used routinely by both ISPs and regular end users.
2.8 Activity Log
The Activity Log reveals all changes that are made on networked computers. This is useful to show how active different forms are on a network and for tracking down the account history in case something seems off (Chapple, 2011). An activity log (also known as an Activity Diary or a Job Activity Log) is a written record of how a user spends his or her time (Chapple, 2011).
By keeping an activity log for a few days, one can build up an accurate picture of what he or she does during the day, and how he or she invests time. This will tell one whether the memory is quite a poor guide, and that keeping the log is an eye- opening experience. 1Activity Logs helps one identify non-core activities that doesn’t help him or her meet important objectives. For example, one might spend far more time than he thinks surfing the Internet, or getting coffee each afternoon. When he sees how much time wasted on such activities, the author can then change the way that he works to eliminate them.
2.8.1 What Actions are Logged?
When an action is logged, the user who performed the action is stored along with the date, time, and IP address where necessary. Internal data about the type of action is also stored. For example, if a form is deleted, it will keep track of the form name. Below is a list of the types of actions that can be logged.
Form: Almost everything on the Form Manager is a Form related activity. Creating, deleting and editing a form are common occurrences. In addition to these, it will let you know when a theme has been changed or a form has become inactive.
Entry: It would serve little purpose to show a log of every entry created, but it is important to keep track of any edits or deletions made.
Report: Similar to forms, the Report Manager controls the main activities here. In addition to creating, editing and deleting a report it can also keep track of toggle password protection and privacy.
Theme Activity: Logging themes is fairly straightforward. In the Theme Designer you can create, edit, duplicate, change the name of, and delete themes. These are the things you can keep track of.
User Activity: Stores a record every time a user log in or out of his or her account. It takes down the activity of every activity done by a user depending on the time-set of the software. It can store it with .jpg file extension by taking the screenshot of the activities performed on the users system, or as a file which can still be able to run and save some underground files. There are still many other ways of taking records of user’s activity but these depends on the technology used and the organization involve. The activity log of a user looks like this “Wed mar 28 10.16.04 WAT 2012.jpgâ€, with the captured picture on top of it.
2.9 File Activity Monitoring
File Activity Monitoring (FAM) products are designed to plug a hole in existing Data Loss Prevention (DLP) products by monitoring access to the thousands of files enterprises have in their repositories (Chapple, 2011). There’s a wealth of information stored on file servers, document management systems and other repositories up for grabs to the malicious insider with authorized access that is seeking to steal intellectual property. FAM products provide organizations with the ability to monitor the way insiders use sensitive information.