Dangana Muhammad PG Student Department of Electrical and Computer Engineering Ahmadu Bello University Zaria, Nigeria

Similar documents
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Policy Creation Model for Policy based Bandwidth Management in the Core Network (A Case Study of Abu Data Network)

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Region 10 Videoconference Network (R10VN)

BASIC ANALYSIS OF TCP/IP NETWORKS

Chapter 5. Data Communication And Internet Technology

Computer Networking Networks

Cisco Application Networking for Citrix Presentation Server

Final for ECE374 05/06/13 Solution!!

Voice Over IP Performance Assurance

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Jameson Mbale. Core Layer. Distribution - Layer. Access- Layer

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Bandwidth Management for Peer-to-Peer Applications

Managing and Improving Upon Bandwidth Challenges in Computer Network

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Networking Topology For Your System

Computer Networks CCNA Module 1

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

Network setup and troubleshooting

Quality of Service. PAN-OS Administrator s Guide. Version 6.0

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

Overview of Computer Networks

CISC 1600 Introduction to Multi-media Computing

Best Practices for Controlling Skype within the Enterprise > White Paper

Intelligent, Functional and Effective Gateways for Small Business Applications

Introduction to Computer Networks and Data Communications

Internet Safety for Kids and Adults

Computer Networks and the Internet

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

1.1. Abstract VPN Overview

Frequently Asked Questions

Lab Testing Summary Report

Selecting a Firewall Gilbert Held

Edge Configuration Series Reporting Overview

Network Configuration Settings

February Considerations When Choosing a Secure Web Gateway

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

ReadyNAS Remote White Paper. NETGEAR May 2010

Masters Project Proxy SG

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Chapter 4 Restricting Access From Your Network

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Broadband Bonding Network Appliance TRUFFLE BBNA6401

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

Skype network has three types of machines, all running the same software and treated equally:

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

Is Your Network Ready for VoIP? > White Paper

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Data Communication and Computer Network

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Jive Core: Platform, Infrastructure, and Installation

Broadband Bonding Network Appliance TRUFFLE BBNA6401

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Introduction to Computer Networks

Deploying in a Distributed Environment

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

Improving Quality of Service

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Unified Threat Management Throughput Performance

Sizing Guideline. Sophos UTM 9.1

CHAPTER 6 NETWORK DESIGN

Study of Network Performance Monitoring Tools-SNMP

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management

Truffle Broadband Bonding Network Appliance

Using a Cisco PIX Firewall to Limit Outbound Internet Access

Lesson 24 Network Fundamentals

Virtual Server in SP883

Networking Systems (10102)

AC : A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

Assuring Your Business Continuity

Recommended QoS Configuration Settings for ASUS RT-AC87U Wireless Router

Local-Area Network -LAN

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

VIA COLLAGE Deployment Guide

Cisco Application Networking for IBM WebSphere

Security Design.

Application Note. Network Optimization with Exinda Optimizer

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco Application Networking for BEA WebLogic

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Getting an Interim Basic Broadband Service Guide

White Paper Three Simple Ways to Optimize Your Bandwidth Management in Video Surveillance

CNE Network Assessment

PCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security Topologies. Chapter 11

Introduction Chapter 1. Uses of Computer Networks

The Ultimate Guide to Gaining Control of the WAN

Frequently Asked Questions about Integrated Access

Architecture de Réseaux et Dimensionnement du Trafic

EXPLORER. TFT Filter CONFIGURATION

Transport and Network Layer

Transcription:

Network Users ehavioral Pattern in an Uncontrolled andwidth Utilization Environment of a Campus Area Network (I University, Lapai, as a Case Study) Dangana Muhammad PG Student Department of Electrical and Computer Engineering Ahmadu ello University Zaria, Nigeria S. M Sani Senior Lecturer Department of Electrical and Computer Engineering Ahmadu ello University Zaria, Nigeria A. D Usman Senior Lecturer Department of Electrical and Computer Engineering Federal Polytechnic, Kaduna Kaduna, Nigeria Abstract - Universities with Campus Area Networks (CAN) are always faced with the challenges of bandwidth congestion. This is because of the volume of academic electronic files that are frequently being transferred coupled with lack of bandwidth management. This research therefore studied the behavioral pattern of the CAN users. The network data were collected over a period of 6 days and were analyzed. The analysis include: peer-to-peer activities, traffic analyses and the domain hit by the users. These were carried out per individual node and the time-of-day they occurred. The analyses confirm the congestion of the available bandwidth and gave an insight on how best to manage the available scarce bandwidth. andwidth management techniques were recommended for further work. Keywords Campus Area Network, andwidth Management, ehavioral Pattern, Traffic Analysis I. INTRODUCTION Campus area network (CAN) interconnects networks in a limited geographical area such as university campus or organizational campuses. CAN is a computer network interconnecting a few to several local area networks (LANs) within a university campus or corporate campus. Campus area network may link a variety of campus buildings including colleges departments, the university library and student halls of residence [9]. CAN support the academic needs of the University and as such the University community are hungry for the services provided by CAN. However, the effectiveness of CAN mostly depend on the bandwidth size subscribed to by the Institution management as well as its management for judicious use by the community. andwidth can simply be thought of as a representation of the capacity of the communication media (especially network devices: switches, routers, Ethernet cables, fiber optic cables, etc.) to transfer data from source to destination [2]. A CAN that do not control it bandwidth utilization rate is frequently faced with bandwidth congestion leading to poor browsing experience by users and not meeting its primary aim of supporting the academic needs of its users. Hence, it has become the responsibility of the network managers to effective manage the available bandwidth in order to meet the needs of the University community. II. RELATED WORK Abdullahi [1] developed a policy-based bandwidth scheme for AU, Zaria, Nigeria. With the use of IP sniffer, the work collected and analyze traffic data over a period of 9- days. A policy-based bandwidth optimization was then developed and this was simulated on a segment of the network. The practical implementation of the developed policies indicated that about 1.Mbps in bandwidth was saved. However, the thesis did not work on bandwidth optimization at the levels of Access Layer Switches and routers. Devajit, et al [5] developed an application based bandwidth management tool. This development tool is used to combat the challenges that are facing the easy flow of data transmission in network designs. PHP, MySQL, Notepad++ and Apache where the application system design tools that where used to simulates a simple wireless based intranet network environment which calculates the size of any file that is to be sent over the network. When the file size exceeds the allotted bandwidth by the administrator, the transfer process is terminated. The system also enables an administrator to change the allowed network bandwidth based on preferences. Clients systems 436

are allowed to share and transfer files as long as they are within the allowed bandwidth range. This research work did not cover to large scale organizations such as Universities (which have both Intranet and Internet connectivities) in the management and control of their network bandwidth. Lockias [7] investigated the issue of bandwidth maximization in some universities. The research surveyed a sample of five universities and catalogued their experiences. A mixed methods approach was used to gather relevant data. The first was information (data) gathering on ICT governance and policy issues. The targeted respondents were personnel from the Information Technology Services department, Computer Centers or other related departments. Principal authorities, including Vice Chancellors, Librarians and Registrars. The second was an administration of emailed questionnaire and phone interviews. The questionnaire incorporated a series of questions about campus infrastructure, including the number of computers that were networked or connected to the Internet, bandwidth management strategies used and the challenges faced. The results found showed that most of the Universities sampled do not have an official Acceptance Use Policy (AUP) to assist with bandwidth management. However, the research did not sample the universities that implement bandwidth management at Access Layer levels. John. et al., [6] wrote a research paper that examined the management of a network with respect to congestion in both the Local Area Network (LAN) and on the Internet backhaul. In this research work, three approaches were used: (i) NetCracker Professional Software was used to simulate a WAN scenario in which files of various sizes were copied across the WAN links from a serverto a remote desktop. The latency for the different file sizes was noted; (ii) an IM Trivoli, whats-up-gold and PRTG software were used to obtain readings of bandwidth, latency, throughput, and CPU utilization as well as user voice and video experience on a life, corporate network running on fiber links; (iii) the testing of user s perception when copying big files, watching videos, playing interactive games and making concurrent calls across WAN links. From the analyzed results obtained, the research concluded that as the offered load in a network increases, the throughput decreases. It also recommended that since choice of protocol to be used in any file transfer depends on the type of packet to be routed, then protocol optimization can be used to improve the efficiency of traffic that uses CIFS, FTP, HTTP, MAPI and TCP protocols. However, this paper did not discuss how bandwidth management and policy can be used to continually optimize this scarce resource. III METHODOLOGY The method used in the collection of data and monitoring is explained in this section. The CAN was monitored over a period of 6 days and user traffic were been collected and analysed as they traverse through the network. A Method of Data Collection The Network monitoring was carried out by logging a selection of activities that where of interest to bandwidth utilization on the network. This was carried out over a period of 6 days (from 1 st September, 214 to 3 th October, 214) and between 8am to 11pm daily. The collection of these logs where done using a packet capturing software (Juniper Network Monitor) across some selected nodes in the main campus. Since these research nodes are setup on a Tier -2 standards, the challenge of stable electric power supply to these nodes where eliminated. At the end of the monitored period, the collected logs were then analyzed to see its relationship with bandwidth utilization. The logging of selected network activities or events for this work includes those activities of the network users that are considered to consume a large part of the bandwidth. The following event logs were carried out and then further analyzed: Peer-to-Peer (p2p) events and analysis. This was carried out to simply know the amount of bandwidth utilized by p2p events. Web proxy events and analysis. This was used to understand the web resources that are of interest and frequently used by users. Finally, the hotspot events and analysis, which was used to discover patterns in network use within the University. A packet capturing based log repository (Juniper Network Monitor) is capable of collecting log messages from distant devices on a network and cataloging them based on message type and source. A twelve (12) number access layer switch were being monitor. These Access Layer Switches ( A, L) have an in-built utility for packet based logging. This facility enables the forwarding of log messages from each node to a remote server. The type of messages been forwarded include: firewall logs generated when p2p traffic is detected; web-proxy logs (URLs visited by users); and user session statistics (hotspot messages). Data Monitoring Figure 1 is a simple illustration of the network monitoring setup. Fig. 1. A schematic of the network monitoring setup 437

IV RESULTS AND DISCUSSION his section analyzed the event groups with respect to bandwidth utilization. It explained the firewall rule that was used to indicate any p2p activity, the user traffic analysis and the web analysis. A Peer to Peer (p2p) Analysis Since firewalls or packet filter exist both as a software solution and as a hardware appliance and is considered as a network security system that controls the incoming and outgoing network traffic based on an applied rule set [1], a firewall rule was then set up to indicate a p2p traffic across each monitored node. In order to derive the intensity of p2p activity in each node at any given time of the day, these p2p events were analyzed. In the results obtained, nodes with prominent p2p activities were identified and the corresponding time of the day in which they were more pronounced. Figure 2 shows the average number of p2p activities at the selected node in the network. P2P Activities across s 2 15 1 5 A C D E F G H I J K L Fig. 2. The distribution of p2p activities across the selected nodes From Fig. 2, the p2p activities is most pronounce at node J and L. This is because node J provides hotspot services to the users while node L is the hostel hotspot. In other words, node J usually has significant number of users connected to it. I is located in the Mathematics department and records the lowest p2p activities. Since p2p activities usually consumes significant amount of bandwidth, it is therefore paramount to understand the p2p activities of the network users. This analysis therefore gives an insight on how to manage the bandwidth with respect to p2p activities. Figure 3 illustrates the trend in p2p activities of users on a time-of-day bases. 438

P2P Activities on Hourly ases as Totalled Over the Period 2 18 16 14 12 1 8 6 4 2 12.am 1.am 2.am 3.am 4.am 5.am 6.am 7.am 8.am 9.am 1.am 11.am 12.pm 1.pm 2.pm 3.pm 4.pm 5.pm 6.pm 7.pm 8.pm 9.pm 1.pm 11.pm Fig. 3. p2p activities on hourly bases of the day The p2p activities is at the lowest from 7am -1am daily. The activities gradually pick up and reach the highest at about 1pm-11pm. P2P applications run 24 hours in the background, constantly downloading content and are left unattended for days at a time [4]. It is to this end that it has become important to understand the time-of-day p2p activities of the users in order to factor this constant bandwidth consumption rate into the bandwidth management policy. Traffic Analysis With the Junos Pulse Access Control monitoring software, the traffic utilization statistics of all user sessions were logged throughout the period been monitored. This statistics enabled the calculation of the amount of total bandwidth (upload and download) that was consumed. The total traffic usage at each monitored node was also calculated. More so, at various time-of-days the overall traffic distribution across the entire network was determined. Figure 4 illustrate graphically the total traffic (in mega bytes) of users by time of day. User Traffic by Time of Day 35 3 25 2 15 1 5 12.am 1.am 2.am 3.am 4.am 5.am 6.am 7.am 8.am 9.am 1.am 11.am 12.pm 1.pm 2.pm 3.pm 4.pm 5.pm 6.pm 7.pm 8.pm 9.pm 1.pm 11.pm Fig. 4. Total User Traffic (In Megabytes) by Time of Day. 439

The number of traffic on the vertical axis is plotted against the time of day (hourly) on the horizontal axis. The traffic was found to be at the lowest within the period of 11pm- 12am. While the traffic is at its peak between the period of 9pm-11pm daily. Knowing the rate at which traffics traverse the network at time-of-day gives an idea on how to properly manage the available bandwidth on daily bases. More so, understanding the traffic rate in the network easily helped in the implementation of the required bandwidth management strategy and policies. Figure 5 is a schematic representation of the number of traffic across individual node. Traffic Across s 35 3 25 2 15 1 5 A C D E F G H I J K L Fig. 5. User traffic (In Megabytes) across individual node. The Vertical axis shows the amount of traffic (in mega bytes) against the nodes at the horizontal axis. s J and L (iological Sciences switch and Hostel Switch) carry the most traffic. This can be associated with the fact that these switches provides hotspots to network users which in turn provides more connectivity and hence the volume of traffic. K and G (Physics and Deanage Faculty of Natural Sciences switches) have the lowest amount of traffic traversing them. This is because access to the network using these switches is basically through cable and limited number of these is available. It is obvious that users connect to the network through the access layers (nodes), therefore, analyzing these nodes in order to understand the traffic rate across them is important. This is because a view of the traffic per node enables the implementation of bandwidth regulation using the traffic shaping technique. This is also implies that a bandwidth regulation can be implemented on a per node bases. C User ehavioral Pattern In order to justify the amount of traffic that traverse through the network at the various nodes, it became necessary to analyze the user sessions in the network (the behavioral pattern). Figure 6 is a simple representation of the number of active user session with respect to the nodes. Active Users by s 5 4 3 2 1 A C D E F G H I J K L Fig. 6. User Session by. 44

The vertical axis is the number of users and is plotted against the horizontal axis which represent the nodes. L (Hostel Switch) records the highest user session while node H (Faculty of Agriculture) records the lowest user session. Figure 7 is a simple graphical representation of the average hourly peak load of users in the network. It shows the behavioral pattern of the users on a daily bases. Hourly peak load of users 6 4 2 Fig. 7. Average Hourly peak load of users. The vertical axis (number of users) is plotted against the horizontal axis (time of day). The load is at its peak at about 9pm-11pm while at its lowest at about 6am-9am daily. Understanding the user behavioral pattern is important as this affects the amount of traffic in a network which also helps to shape the implementation of bandwidth regulation in the network. D Web Analysis During the monitoring period, the Unified Resource Locator (URLs) visited by users on the network were also tracked. These URLs were analyzed and the popular online utilities on campus and domains were revealed. Table 2 shows among the network users, a list of some of the most popular or visited utilities. Table 1. MOST POPULAR SITES VISIT Y USERS ON THE NETWORK S/N Most Popular: Utility 1 Mail servers Yahoo Mail, and Gmail 2 News site Naijapals, 3 Search engine Google, Yahoo 4 Social Network Site Facebook, Twitter 5 Educational Wikipidia 6 Peer-to-peer sites it Torrent, KazaA, imesh, DirrectConnect 7 Streaming Site YouTube The understanding of the most frequently hit website is necessary in web analysis because it enable a proper web filtering. In other words, knowing the frequently visited websites enables the classification of these sites for web filtering which is an important tool for bandwidth management. V. IMPLEMENTATION In this section we discussed the traffic filtering. This explains the web filtering for bandwidth management. A Traffic Filtering (Web Filtering) Web filtering allows the management of bandwidth and Internet usage by preventing access to inappropriate Web content. However, from the user behavioral pattern and the number of sites been visited by these users, a classification of traffic was made. This include: Academic Sites and Non-academic Sites. These classifications were made based on the fact that IUL is an academic institution. To enhance traffic filtering, the classification of traffic based on the most visited sites is presented in Table 2 below. 441

Table 2. CLASSIFICATION OF SITES S/N Academic sites Non-academic sites 1 Yahoomail Nude 2 Gmail Exclusive 3 Institution mail Windows update 4 Institution portal Olufamous 5 Wikipidia Twitter 6 MSN Naijapals 7 News Table 2 shows some of the web sites classification. Although, some sites cannot be easily classified as academic or non-academic because they can be use for both. Example of these web sites include Facebook and Youtube. While it is obvious that these sites consume much bandwidth, they cannot be filtered or blocked completely. In order to manage the available bandwidth without blocking these sites, certain policies can be attached to these sites such as allowing the traffic of these specific URL at certain time-of-day coupled with the regulated traffic shaping technique in place. VI. CONCLUSION andwidth management can be approached in different forms; however, this cannot be implemented without placing restriction on some of the web contents being accessed by the users. Also, it is important to monitor and manage the amount of bandwidth being accessed by the REFERENCE: [1] Abdullahi, M. (214). The Study of The Policy ased andwidth Management in The Core Network: A Case Study of AU Network. Zaria.. Zaria: Department of Electrical and Computer Engineering. Ahmadu ello University, Zaria, Nigeria. [2] Águeda, S. T. (211). Network Architecture for University Campus Network. Chongqing, China: College of Communication Engineering of Chongqing University. [3] Athicha, M., enjie, C., & M, D. (21). A Low - andwidth Network File System. San Diego: Defense Advance Research Project Agency. [4] rat, N. (21, August 21). Managing Peer-To-Peer Traffic With Cisco Service Control Technology. Retrieved September 11, 214, from Cisco SCE 1 Series Service Control Engine: http://www.cisco.com/c/en/us/products/collateral/serviceexchange/sce-1-series-service-controlengine/prod_white_paper9aecd8235d.html [5] Devajit, M. M. ((213).). A Study of andwidth Management in Computer Networks.. International Journal users and understanding the network access behavioral pattern of the users usually provide information about the elements that can be regulated in order to provide a better bandwidth usage. It is in-line with this that this research studied the behavioral pattern of network users. This is aimed at having a look at the items that need to be restricted on the network for better bandwidth utilization among users. VII. RECOMMENDATION FOR FURTHER WORK Having explored a campus area network with its peculiarity in users behavioral pattern, we recommend the implementation of one or more of the numerous bandwidth techniques on CAN for its effective management. Although depending on the need of the Institution, techniques such as congestion avoidance, Wide Area Network Optimization, Quality of Service and Traffic Shaping can be employed for bandwidth management. of Innovative Technology and Exploring Engineering (IJITEE), 7-73. [6] John, S. O. (211). Managing and Improving Upon andwidth Challenges in Computer Network. Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS), 482-486. [7] Lockias, C. (212). andwidth management in universities in Zimbabwe: Towards a responsible user base through effective policy implementation. International Journal of Education and Development using Information and Communication Technology, 62-76. [8] Pearson, K. (214, March 13). Hierarchical Network Design. Retrieved July 31, 215, from Connecting Networks Companion Guide: http://ptgmedia.pearsoncmg.com/images/9781587133329/do wnloads/ch1.pdf [9] R, S. H., & S., M. L. (26). Computer Networking. Tsinghua: Pearson Education Asia and Tsinghua University Press. [1] Rouse, M. (2, June 15). Enterprise Firewall Protection. Retrieved August 2, 214, from TechTarget: http://searchsecurity.techtarget.com/definition/firewall [11] Sharpened, P. (212, May 16). andwidth. Retrieved July 31, 215, from Tech Terms: http://techterms.com/definition/bandwidth 442