- Open Access
- Total Downloads : 355
- Authors : Dangana Muhammad, S. M Sani, A. D Usman
- Paper ID : IJERTV4IS080415
- Volume & Issue : Volume 04, Issue 08 (August 2015)
- Published (First Online): 22-08-2015
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Network Users Behavioral Pattern in an Uncontrolled Bandwidth Utilization Environment of a Campus Area Network (IBB University, Lapai, as a Case Study)
Dangana Muhammad
PG Student
Department of Electrical and Computer Engineering Ahmadu Bello University
Zaria, Nigeria
-
D Usman
Senior Lecturer
S. M Sani
Senior Lecturer
Department of Electrical and Computer Engineering Ahmadu Bello University
Zaria, Nigeria
Department of Electrical and Computer Engineering Federal Polytechnic, Kaduna
Kaduna, Nigeria
Abstract – Universities with Campus Area Networks (CAN) are always faced with the challenges of bandwidth congestion. This is because of the volume of academic electronic files that are frequently being transferred coupled with lack of bandwidth management. This research therefore studied the behavioral pattern of the CAN users. The network data were collected over a period of 60 days and were analyzed. The analysis include: peer-to-peer activities, traffic analyses and the domain hit by the users. These were carried out per individual node and the time-of-day they occurred. The analyses confirm the congestion of the available bandwidth and gave an insight on how best to manage the available scarce bandwidth. Bandwidth management techniques were recommended for further work.
Keywords Campus Area Network, Bandwidth Management, Behavioral Pattern, Traffic Analysis
-
INTRODUCTION
Campus area network (CAN) interconnects networks in a limited geographical area such as university campus or organizational campuses. CAN is a computer network interconnecting a few to several local area networks (LANs) within a university campus or corporate campus. Campus area network may link a variety of campus buildings including colleges departments, the university library and student halls of residence [9]. CAN support the academic needs of the University and as such the University community are hungry for the services provided by CAN. However, the effectiveness of CAN mostly depend on the bandwidth size subscribed to by the Institution management as well as its management for judicious use by the community. Bandwidth can simply be thought of as a representation of the capacity of the communication media (especially network devices:
switches, routers, Ethernet cables, fiber optic cables, etc.) to transfer data from source to destination [2]. A CAN that do not control it bandwidth utilization rate is frequently faced with bandwidth congestion leading to poor browsing experience by users and not meeting its primary aim of supporting the academic needs of its users. Hence, it has become the responsibility of the network managers to effective manage the available bandwidth in order to meet the needs of the University community.
-
RELATED WORK
Abdullahi [1] developed a policy-based bandwidth scheme for ABU, Zaria, Nigeria. With the use of IP sniffer, the work collected and analyze traffic data over a period of 90- days. A policy-based bandwidth optimization was then developed and this was simulated on a segment of the network. The practical implementation of the developed policies indicated that about 1.0Mbps in bandwidth was saved. However, the thesis did not work on bandwidth optimization at the levels of Access Layer Switches and routers.
Devajit, et al [5] developed an application based bandwidth management tool. This development tool is used to combat the challenges that are facing the easy flow of data transmission in network designs. PHP, MySQL, Notepad++ and Apache where the application system design tools that where used to simulates a simple wireless based intranet network environment which calculates the size of any file that is to be sent over the network. When the file size exceeds the allotted bandwidth by the administrator, the transfer process is terminated. The system also enables an administrator to change the allowed network bandwidth based on preferences. Clients systems
are allowed to share and transfer files as long as they are within the allowed bandwidth range. This research work did not cover to large scale organizations such as Universities (which have both Intranet and Internet connectivities) in the management and control of their network bandwidth.
Lockias [7] investigated the issue of bandwidth maximization in some universities. The research surveyed a sample of five universities and catalogued their experiences. A mixed methods approach was used to gather relevant data. The first was information (data) gathering on ICT governance and policy issues. The targeted respondents were personnel from the Information Technology Services department, Computer Centers or other related departments. Principal authorities, including Vice Chancellors, Librarians and Registrars. The second was an administration of emailed questionnaire and phone interviews. The questionnaire incorporated a series of questions about campus infrastructure, including the number of computers that were networked or connected to the Internet, bandwidth management strategies used and the challenges faced. The results found showed that most of the Universities sampled do not have an official Acceptance Use Policy (AUP) to assist with bandwidth management. However, the research did not sample the universities that implement bandwidth management at Access Layer levels.
John. et al., [6] wrote a research paper that examined the management of a network with respect to congestion in both the Local Area Network (LAN) and on the Internet backhaul. In this research work, three approaches were used: (i) NetCracker Professional Software® was used to simulate a WAN scenario in which files of various sizes were copied across the WAN links from a serverto a remote desktop. The latency for the different file sizes was noted; (ii) an IBM Trivoli, whats-up-gold and PRTG® software were used to obtain readings of bandwidth, latency, throughput, and CPU utilization as well as user voice and video experience on a life, corporate network running on fiber links; (iii) the testing of users perception when copying big files, watching videos, playing interactive games and making concurrent calls across WAN links. From the analyzed results obtained, the research concluded that as the offered load in a network increases, the throughput decreases. It also recommended that since choice of protocol to be used in any file transfer depends on the type of packet to be routed, then protocol optimization can be used to improve the efficiency of traffic that uses CIFS, FTP, HTTP, MAPI and TCP protocols. However, this paper did not discuss how
bandwidth management and policy can be used to continually optimize this scarce resource.
III METHODOLOGY
The method used in the collection of data and monitoring is explained in this section. The CAN was monitored over a period of 60 days and user traffic were been collected and analysed as they traverse through the network.
-
Method of Data Collection
The Network monitoring was carried out by logging a selection of activities that where of interest to bandwidth utilization on the network. This was carried out over a period of 60 days (from 1st September, 2014 to 30th October, 2014) and between 8am to 11pm daily. The collection of these logs where done using a packet capturing software (Juniper Network Monitor) across some selected nodes in the main campus. Since these research nodes are setup on a Tier -2 standards, the challenge of stable electric power supply to these nodes where eliminated. At the end of the monitored period, the collected logs were the analyzed to see its relationship with bandwidth utilization.
The logging of selected network activities or events for this work includes those activities of the network users that are considered to consume a large part of the bandwidth. The following event logs were carried out and then further analyzed: Peer-to-Peer (p2p) events and analysis. This was carried out to simply know the amount of bandwidth utilized by p2p events. Webproxy events and analysis. This was used to understand the web resources that are of interest and frequently used by users. Finally, the hotspot events and analysis, which was used to discover patterns in network use within the University.
A packet capturing based log repository (Juniper Network Monitor) is capable of collecting log messages from distant devices on a network and cataloging them based on message type and source. A twelve (12) number access layer switch were being monitor. These Access Layer Switches (Node A, B L) have an in-built utility for packet based logging. This facility enables the forwarding of log messages from each node to a remote server. The type of messages been forwarded include: firewall logs generated when p2p traffic is detected; web-proxy logs (URLs visited by users); and user session statistics (hotspot messages).
-
Data Monitoring
Figure 1 is a simple illustration of the network monitoring setup.
Fig. 1. A schematic of the network monitoring setup
IV RESULTS AND DISCUSSION
his section analyzed the event groups with respect to bandwidth utilization. It explained the firewall rule that was used to indicate any p2p activity, the user traffic analysis and the web analysis.
-
Peer to Peer (p2p) Analysis
Since firewalls or packet filter exist both as a software solution and as a hardware appliance and is considered as a network security system that controls the incoming and outgoing network traffic based on an applied rule set [10],
a firewall rule was then set up to indicate a p2p traffic across each monitored node. In order to derive the intensity of p2p activity in each node at any given time of the day, these p2p events were analyzed. In the results obtained, nodes with prominent p2p activities were identified and the corresponding time of the day in which they were more pronounced.
Figure 2 shows the average number of p2p activities at the selected node in the network.
P2P Activities across Nodes
2000
1500
1000
500
0
Node Node Node Node Node Node Node Node Node Node Node Node A B C D E F G H I J K L
Fig. 2. The distribution of p2p activities across the selected nodes
usually consumes significant amount of bandwidth, it is
From Fig. 2, the p2p activities is most pronounce at node J and L. This is because node J provides hotspot services to the users while node L is the hostel hotspot. In other words, node J usually has significant number of users connected to it. Node I is located in the Mathematics department and records the lowest p2p activities. Since p2p activities
therefore paramount to understand the p2p activities of the network users. This analysis therefore gives an insight on how to manage the bandwidth with respect to p2p activities.
Figure 3 illustrates the trend in p2p activities of users on a time-of-day bases.
P2P Activities on Hourly Bases as Totalled Over the Period
2000
1800
1600
1400
1200
1000
800
600
400
200
0
12.00am
1.00am 2.00am 3.00am 4.00am 5.00am 6.00am 7.00am 8.00am 9.00am 10.00am
11.00am
12.00pm
1.00pm 2.00pm 3.00pm 4.00pm 5.00pm 6.00pm 7.00pm 8.00pm 9.00pm 10.00pm
11.00pm
Fig. 3. p2p activities on hourly bases of the day
The p2p activities is at the lowest from 7am -10am daily. The activities gradually pick up and reach the highest at about 10pm-11pm. P2P applications run 24 hours in the background, constantly downloading content and are left unattended for days at a time [4]. It is to this end that it has become important to understand the time-of-day p2p activities of the users in order to factor this constant bandwidth consumption rate into the bandwidth management policy.
-
Traffic Analysis
With the Junos Pulse Access Control monitoring software, the traffic utilization statistics of all user sessions were logged throughout the period been monitored. This statistics enabled the calculation of the amount of total bandwidth (upload and download) that was consumed. The total traffic usage at each monitored node was also calculated. More so, at various time-of-days the overall traffic distribution across the entire network was determined.
Figure 4 illustrate graphically the total traffic (in mega bytes) of users by time of day.
User Traffic by Time of Day
35000
30000
25000
20000
15000
10000
5000
0
12.00am
1.00am 2.00am 3.00am 4.00am 5.00am 6.00am 7.00am 8.00am 9.00am 10.00am
11.00am
12.00pm
1.00pm 2.00pm 3.00pm 4.00pm 5.00pm 6.00pm 7.00pm 8.00pm 9.00pm 10.00pm
11.00pm
Fig. 4. Total User Traffic (In Megabytes) by Time of Day.
The number of traffic on the vertical axis is plotted against the time of day (hourly) on the horizontal axis. The traffic was found to be at the lowest within the period of 11pm- 12am. While the traffic is at its peak between the period of 9pm-11pm daily. Knowing the rate at which traffics traverse the network at time-of-day gives an idea on how to properly manage the available bandwidth on daily bases.
More so, understanding the traffic rate in the network easily helped in the implementation of the required bandwidth management strategy and policies.
Figure 5 is a schematic representation of the number of traffic across individual node.
Traffic Across Nodes
35000
30000
25000
20000
15000
10000
5000
0
Node Node Node Node Node Node Node Node Node Node Node Node A B C D E F G H I J K L
Fig. 5. User traffic (In Megabytes) across individual node.
The Vertical axis shows the amount of traffic (in mega bytes) against the nodes at the horizontal axis. Nodes J and L (Biological Sciences switch and Hostel Switch) carry the most traffic. This can be associated with the fact that these switches provides hotspots to network users which in turn provides more connectivity and hence the volume of traffic. Node K and G (Physics and Deanage Faculty of Natural Sciences switches) have the lowest amount of traffic traversing them. This is because access to the network using these switches is basically through cable and limited number of these is available.
It is obvious that users connect to the network through the access layers (nodes), therefore, analyzing these nodes in
order to understand the traffic rate across them is important. This is because a view of the traffic per node enables the implementation of bandwidth regulation using the traffic shaping technique. This is also implies that a bandwidth regulation can be implemented on a per node bases.
-
User Behavioral Pattern
In order to justify the amount of traffic that traverse through the network at the various nodes, it became necessary to analyze the user sessions in the network (the behavioral pattern). Figure 6 is a simple representation of the number of active user session with respect to the nodes.
Active Users by Nodes
500
400
300
200
100
0
Node Node Node Node Node Node Node Node Node Node Node Node A B C D E F G H I J K L
Fig. 6. User Session by Node.
The vertical axis is the number of users and is plotted against the horizontal axis which represent the nodes. Node L (Hostel Switch) records the highest user session while node H (Faculty of Agriculture) records the lowest user session.
Figure 7 is a simple graphical representationof the average hourly peak load of users in the network. It shows the behavioral pattern of the users on a daily bases.
Hourly peak load of users
600
400
200
0
Fig. 7. Average Hourly peak load of users.
The vertical axis (number of users) is plotted against the horizontal axis (time of day).
The load is at its peak at about 9pm-11pm while at its lowest at about 6am-9am daily. Understanding the user behavioral pattern is important as this affects the amount of traffic in a network which also helps to shape the implementation of bandwidth regulation in the network.
-
Web Analysis
During the monitoring period, the Unified Resource Locator (URLs) visited by users on the network were also tracked. These URLs were analyzed and the popular online utilities on campus and domains were revealed.
Table 2 shows among the network users, a list of some of the most popular or visited utilities.
Table 1. MOST POPULAR SITES VISIT BY USERS ON THE NETWORK
S/N
Most Popular:
Utility
1
Mail servers
Yahoo Mail, and Gmail
2
News site
Naijapals,
3
Search engine
Google, Yahoo
4
Social Network Site
Facebook, Twitter
5
Educational
Wikipidia
6
Peer-to-peer sites
Bit Torrent, KazaA, iMesh, DirrectConnect
7
Streaming Site
YouTube
The understanding of the most frequently hit website is necessary in web analysis because it enable a proper web filtering. In other words, knowing the frequently visited websites enables the classification of these sites for web filtering which is an important tool for bandwidth management.
-
IMPLEMENTATION
In this section we discussed the traffic filtering. This explains the web filtering for bandwidth management.
A Traffic Filtering (Web Filtering)
Web filtering allows the management of bandwidth and Internet usage by preventing access to inappropriate Web content. However, from the user behavioral pattern and the number of sites been visited by these users, a classification of traffic was made. This include: Academic Sites and Non-academic Sites. These classifications were made based on the fact that IBBUL is an academic institution.
To enhance traffic filtering, the classification of traffic based on the most visited sites is presented in Table 2 below.
Table 2 CLASSIFICATION OF SITES
.
S/N
Academic sites
Non-academic sites
1
Yahoomail
Nude
2
Gmail
Exclusive
3
Institution mail
Windows update
4
Institution portal
Olufamous
5
Wikipidia
Twitter
6
MSN
Naijapals
7
News
Table 2 shows some of the web sites classification. Although, some sites cannot be easily classified as academic or non-academic because they can be use for both. Example of these web sites include Facebook and Youtube. While it is obvious that these sites consume much bandwidth, they cannot be filtered or blocked completely. In order to manage the available bandwidth without blocking these sites, certain policies can be attached to these sites such as allowing the traffic of these specific URL at certain time-of-day coupled with the regulated traffic shaping technique in place.
-
CONCLUSION
Bandwidth management can be approached in different forms; however, this cannot be implemented without placing restriction on some of the web contents being accessed by the users. Also, it is important to monitor and manage the amount of bandwidth being accessed by the
REFERENCE:
-
Abdullahi, M. (2014). The Study of The Policy Based Bandwidth Management in The Core Network: A Case Study of ABU Network. Zaria. . Zaria: Department of Electrical and Computer Engineering. Ahmadu Bello University, Zaria, Nigeria.
-
Ãgueda, S. T. (2011). Network Architecture for University Campus Network. Chongqing, China: College of Communication Engineering of Chongqing University.
-
Athicha, M., Benjie, C., & M, D. (2010). A Low – Bandwidth Network File System. San Diego: Defense Advance Research Project Agency.
-
Brat, N. (2010, August 21). Managing Peer-To-Peer Traffic With Cisco Service Control Technology. Retrieved September 11, 2014, from Cisco SCE 1000 Series Service Control Engine:
http://www.cisco.com/c/en/us/products/collateral/service- exchange/sce-1000-series-service-control- engine/prod_white_paper0900aecd8023500d.html
-
Devajit, M. M. ((2013).). A Study of Bandwidth Management in Computer Networks. . International Journal
users and understanding the network access behavioral pattern of the users usually provide information about the elements that can be regulated in order to provide a better bandwidth usage. It is in-line with this that this research studied the behavioral pattern of network users. This is aimed at having a look at the items that need to be restricted on the network for better bandwidth utilization among users.
-
-
RECOMMENDATION FOR FURTHER WORK
-
-
Having explored a campus area network with its peculiarity in users behavioral pattern, we recommend the implementation of one or more of the numerous bandwidth techniques on CAN for its effective management. Although depending on the need of the Institution, techniques such as congestion avoidance, Wide Area Network Optimization, Quality of Service and Traffic Shaping can be employed for bandwidth management.
of Innovative Technology and Exploring Engineering (IJITEE) , 70-73.
-
John, S. O. (2011). Managing and Improving Upon Bandwidth Challenges in Computer Network. Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) , 482-486.
-
Lockias, C. (2012). Bandwidth management in universities in Zimbabwe: Towards a responsible user base through effective policy implementation. International Journal of Education and Development using Information and Communication Technology , 62-76.
-
Pearson, K. (2014, March 13). Hierarchical Network Design
. Retrieved July 31, 2015, from Connecting Networks Companion Guide:
http://ptgmedia.pearsoncmg.com/images/9781587133329/do wnloads/ch01.pdf
-
R, S. H., & S., M. L. (2006). Computer Networking. Tsinghua: Pearson Education Asia and Tsinghua University Press.
-
Rouse, M. (2000, June 15). Enterprise Firewall Protection. Retrieved August 20, 2014, from TechTarget: http://searchsecurity.techtarget.com/definition/firewall
-
Sharpened, P. (2012, May 16). Bandwidth. Retrieved July 31, 2015, from Tech Terms: http://techterms.com/definition/bandwidth