A number of organisations analyze the traffic in Kerry. Kerry County Council and the National roads Authority will analyze traffic and use the results to inform their road development strategy. Tourism development groups will also survey and analyze the traffic, to assess how long visitors are staying in an area.
In computers, the word traffic is also used, to describe data moving within a computer or moving from one computer to another. In fact, the communication channels through which data flows in a computer systems are called communication buses.
As you can imagine the amount of data flowing around the Internet rather large. With data from devices expected to reach to 11.2 extrabytes, that is 112,000,000,000,000,000,000 bytes, per month over the next four years. With over 4.2 billion users worldwide, and each one of them accessing Internet sites, posting on Facebook, tweeting, emailing to mention but a few things. Together all of these actions on the Internet are called Internet traffic.
It is a marvel, to sit and wonder, how all the traffic on the Internet is co-ordinated so that each user gets the correct results for their Google search and that each email sent arrives into the correct mailbox. The correct routing, i.e. making sure it arrives in the right place, is achieved by the Network Protocol TCP/IP. In the case of a person looking for a hotel in Dingle. They type in a search into Google. The networking software goes to work, the search is wrapped up in a network package before it is transmitted to another computer over the network. In its simplest form the package contains a header and the details of the package. The header will say where the package is going to, among other things. The speed with which this occurs is staggering to say the least.
Traffic Analysis is used by Internet Service Providers so as they can ensure a free flow of information from computer to computer. Traffic Analysis is also used by people who wish to gather information on what people are doing on the Internet. This information is valuable and people are willing to pay for it. In some cases the information is used for criminal purposes.
The simplest way to protect yourself in this area is to ensure that there is security on the network that you are using. WEP or WPA are the types of security used on wireless networks here, these will encrypt the information, so as it cannot be harvested by an outsider. Don’t make it easy for them, always use a safe network and if you have a router in your business or home ensure that there is encryption in place.