Computer Science Project Topics

Bandwidth Management Using Ip Traffic Analysis: a Case Study of the Ahmadu Bello University Zaria.

Bandwidth Management Using Ip Traffic Analysis a Case Study of the Ahmadu Bello University Zaria.

Bandwidth Management Using Ip Traffic Analysis: a Case Study of the Ahmadu Bello University Zaria.

CHAPTER ONE

PREAMBLE

Towards the end of year 2005, the Ahmadu Bello University (henceforth referred to as the University) management entered into a bandwidth consortium agreement under the auspices of the Africa Virtual University (AVU) with five other universities in Nigeria ; such as Obafemi Awolowo University ( OAU) Ife, University of Jos, University of P ortharcourt, Bayero University Kano (BUK) and University of Ibadan ( UI) to acquire a 6.5mbps of bandwidth to improve on the 512kbps it had before the formation of the consortium . For more than 18 months after that, the bandwidth consumption of the University communi ty was less than 25% of the purchased capacity. However in the past 12 months, a pattern of traffic congestion was noted on the University network especially during work hours (10am-3:30pm) even though less than 50% of the University community have access to the internet and it was found that during th e periods of congestion, the University traffic i s between 99% and 103%(due to burst capacity) of her purchased capacity (3). This work is an attempt to solve the traffic congestion by devising a bandwidth man agement strategy based on the analysis of the IP traffic on the network.

CHAPTER TWO

THEORETICAL BACKGROUND

History of the Internet

Theย conceptualย foundationย forย creationย ofย theย iย nternetย wasย significantlyย developedย byย three individualsย andย aย researchย conference,ย eachย ofย whichย changedย theย wayย weย thoughtย about technologyย byย accuratelyย predictingย itsย future:

  • Vannevar Bush wrote the first visionary description of the potential uses for informationtechnology with his description of the “memex” automated library system .
  • NorbertWienerย invented the field of Cybernetics, inspiring future researchers to focus on the use of technology to extend human capabilities.
  • The1956ย Dartmouthย Artiย ficialย Intelligenceย conferenceย crystallized the concept that technology was improving at an exponential rate, and provided the first serious consideration of the consequences.
  • MarshallMcLuhanย made the idea of a global village interconnected by an ele ctronic nervous system part of our popular culture.

The first networking protocol used on the Advanced Research Projects Agency Network (ARPANET) was the Network Control Program . In 1983, it was replaced with the TCP/ IP protocol developed by Robert Kahn, Vinton Cerf , and others, which quickly became the most widely used network protocol in the world, the use of the Internet exploded after 1990, causing the US Government to transfer management to independent organizations starting in 1995

The Internet workings include a technical design and a management structure. The management structure consists of a generally democratic collection of loosely -coupled organizations and working groups with mostly non -overlapping responsibilities. The technical design is founded on a complex, interlocking set of hierarchical tree -like structures like Internet Protocol addresses and domain names, mixed with networked structures like packet switching and routing protocols, all tied together with millions of lines of sophisticated software that continues to get better all the time.

So far this combination of management and technical structures has worked well, providing the reliable, powerful communication platform on which the rest of the complexity of the Internet is b uilt [22]

Whatย isย anย Internetworkย ?

An internetwork is a collection of individual networks as in Figure 2.1, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and pr ocedures that meet the challenge of creating and administering internetworks.

 

CHAPTER THREE

METHODOLOGY

Proposed Modelย 

CHAPTER FOUR

RESULTS AND ANALYSIS

Sampleย ofย Resultsย andย Dataย collected.

Theย monitoringย systemย wasย initiallyย installedย onย aย smallย officeย network in order to test run it before installing it on the University network. The sample results are shown inย Figures

CHAPTER FIVE

ย RECOMMENDATIONS AND CONCLUSION

Introduction

ย 

The installation, configuration and analysis of IP traffic on the U niversity network is very crucial to help in making informed decisions and proper management of the university network, such that the expensive and limited bandwidth can be used maximally for the majorly academic purposes.

Limitations

Dueย toย costย ofย softwareย licenseย andย durability,ย openย sourceย softwareย wasย chosenย toย carry outย thisย research,ย thisย Hย owever,ย itย requiresย aย lotย ofย understandingย andย supportย toย beย ableย to installย andย configureย theย monitoringย server

Theย Softwareย (ntop)ย couldย notย storeย dataย forย aย longย periodย andย mostย oftenย dataย isย reset wheneverย theย systemย shutsย down.ย Thisย requiresย thatย dataย beย takenย andย storedย elsewhere on dailyย basis.

Theย serverย wasย configuredย onย aย universityย liveย networkย ,ย thisย limitsย theย period of timeย the experimentalย configurationย ofย DoSย couldย beย allowedย onย theย network.

Conclusion

Toย beย ableย toย achieveย theย desiredย goalย ofย payingย aย largeย sumย ofย moneyย forย bandwidthย byย the university management which is mainly for academic and research purposes some measuresย needย toย beย putย inย placeย toย checkย unwantedย trafficย onย theย network.ย Itย should

however be noted that while such denials are put in place some (though very few) activities may also be affected but can always be resolved when they are noticed.

Some sites that are not of high priority for academic activities are recommended to be allowed on the university network between 5pm and 9am. Access to such sites like yahoo, Microsoft, Avast, grisoft should be denied during the hours of 9am and 4pm.

The university mail should be the official e -mail for all university community members. This will reduce the use of free mail boxes like yahoo, hotmail, gmail etc.

Software download should be denied on the university site except on special request, alternativeย arrย angementย canย beย madeย toย haveย anย ftpย serverย whereย regularlyย downloaded softwareย canย beย keptย forย downloadย onย theย universityย network.

Aย Microsoftย updateย serverย mayย beย installedย onย theย universityย networkย whereย allย Microsoft update traffic will be redirected fo rย updates.

The university management may also need to adopt a good and light weight antivirus to be used on the university network; this will allow the university to make an arrangement for a network update of such antivirus.

Suggestion for Further Woย rk

Itย isย suggestedย thatย aย furtherย researchย mayย beย caย rriedย outย onย howย toย compressย ntopย data automaticallyย soย thatย theย dataย canย beย storedย forย aย longย period.

This will further help to make informed decision when trying to put in place measures to manage a campus network and reduce congestion.

References

  1. โ€œBandwidthManagementโ€ย http://ย wikipedia.org/ย wiki/ย Bandwidth_managementย 
  2. Greaves,(2008),ย โ€œMakingย Strategicย Decisionsย aboutย Bandwidthโ€, e/ย Merger 2008 Southย Africa
  3. โ€œInfo Vista(April 2008) Intelsat monitoring system Itsdvb.fus.idr.14 inbound2008
  4. โ€œntop Man pageโ€http://www.ntop.org
  5. โ€œHistory of theInternetโ€http://www.walthowe.com/ na vnet/history.html
  6. Hunt,ย (2002),ย TCP/ย IPย Networkย Administration,ย 3.ย ed,ย Oโ€™Reillyย Inc
  7. Ziwicky,Dย (2000),ย Buildingย Internetย Firewalls,ย 2ย . edย Oโ€™Reillyย Incย 2000
  8. E.Mohamed, H. Abdel-Wahab, I. Salama, “Multicast address management in the
  9. Internet: a st udy of the port blocking problem,”ย aiccsa,ย pp.ย 74-I,ย ACS/IEEEย 2005
  10. โ€œNtopNetwork Monitoring Guideโ€ Mukom Akong Tamon http://Techowto.wordpress.co,
  11. Luca D et.al(2000) ย โ€œ ย Improving ย Network ย Security ย using ย Ntopโ€, RAID 2000 Toulouse,ย France
  12. Report created on Mon Jul ย 7 12:07:562008[ntopย uptime:3:07:21] Generated by ntop v.3.2ย [i686-pc-linux-gnu]Report created on Tue Aug 26 13:06:06 2008 [ntopuptime:ย 21:05:16] Generated byย ntopย 3.3.7ย [i686ย -pc-linux-gnu]
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!