Development Of An Acceptable Use Policy Framework For Ibbul Network : Current School News

Development Of An Acceptable Use Policy Framework For Ibbul Communication Network

Development Of An Acceptable Use Policy Framework For Ibbul Communication Network.

ABSTRACT

Bandwidth utilization in a campus network if not properly managed, may lead to the congestion of the network bandwidth. This research work presents a bandwidth control system implemented at the access layer of a campus network which is aimed at reducing the processing time at the core of the network. Ibrahim Badamasi Babangida University Lapai (IBBUL) campus network was monitored and data were collected on a daily basis between 12 am to 11 pm over a period of 60 days (from 1st September 2014 to 30th October 2014).

Analyses of these data were carried out which include:

(i) peer-to-peer (p2p) activities,

(ii) user traffic analysis and,

(iii) web analysis.

The analyses revealed the highest and lowest p2p activities of the users across the monitored nodes, as well as the time of day they occurred. It also revealed the nodes with the highest traffic and the time of day it usually occurred. Based on these results, the IBBUL network scenario was modeled and simulated using Graphical Network Simulator 3 (GNS3).

A star network topology with a Juniper EX4200 core was modeled. Juniper EX2200 series switches were modeled as the access layers. A number of host computers with various specifications were also attached to these switches and all the devices were configured appropriately.

TABLE OF CONTENTS

TITLE PAGE ——————————————————————-ii

DECLARATION ——————————————————————-iii

CERTIFICATION ——————————————————————-iv

DEDICATION ——————————————————————-v

ACKNOWLEDGEMENT  ——————————————————————-vi

ABSTRACT ——————————————————————-vii

CHAPTER ONE: INTRODUCTION

1.1 Background ——————————————————————-1

1.1.1 IBBUL Network Structure ——————————————————————-1

1.2 Aim and Objectives ——————————————————————-4

1.3 Statement of Problem ——————————————————————-5

1.4 Methodology ——————————————————————-5

1.5 Significant Contributions ——————————————————————-6

1.6 Dissertation Organization ——————————————————————-6

CHAPTER TWO: LITERATURE REVIEW

2.1 Introduction ——————————————————————-7

2.2 Review of Fundamental Concepts ——————————————————————-7

2.2.1 Bandwidth and its Management ——————————————————————-7

2.2.2 Bandwidth Management Categorization ——————————————————————-8

2.2.3 Types of Bandwidth Management Techniques and Policies ———————————————-10

2.2.4 Comparative analysis of Network Simulators ——————————————————————-12

2.2.5 Hierarchical Network Structure ——————————————————————-13

2.3 Review of Similar Works ——————————————————————-14

CHAPTER THREE: MATERIALS AND METHODS

3.1 Introduction ——————————————————————-21

3.2 Method of Data Collection ——————————————————————-22

3.3 Data Monitoring ——————————————————————-23

3.4 Installations and Configurations ——————————————————————-23

3.5 Simulation ——————————————————————-23

3.5.1 Simulation Parameters ——————————————————————-24

3.5.2 Traffic Filtering (Web Filtering) ——————————————————————-25

3.5.3 Steps for Traffic Filtering ——————————————————————-26

3.6 Traffic Shaping Technique ——————————————————————-32

3.6.1 Application of Traffic Shaping Technique on Access Layer Switches ————————32

CHAPTER FOUR: RESULTS AND DISCUSSIONS

4.1 Introduction ——————————————————————-36

4.2 Results ——————————————————————-36

4.2.1 Peer-to-peer (p2p) Analysis ——————————————————————-36

4.2.2 Traffic Analysis ——————————————————————-39

4.2.3 User Behavioral Pattern ——————————————————————-41

4.2.4 Web Analysis ——————————————————————-44

4.2.5 Bandwidth Utilization Rate across Nodes ——————————————————————-45

4.2.6 Relationship between Number of User, P2P Intensity and Overall Traffic ——————————48

4.2.7 Bandwidth Management ——————————————————————-48

4.3 Evaluation of the Processing Time of the Core ——————————————————————-49

4.4 Evaluation of Bandwidth Utilization Rate with Increase in Network Users ————————–52

4.5 Evaluation of Downloading and Uploading Speed among Users —————————————53

4.6 Evaluation of the Network Traffic per Node ——————————————————————-54

4.7 Validation ——————————————————————-54

4.8 Life Network Scenario of Bandwidth Management Implementation ———————————-57

4.9 Network Scenario Setup ——————————————————————-57

4.10 Evaluation of the Processing Time of the Life Network Scenario —————————-58

4.11 Proposing an Acceptable Use Policy (AUP) on Bandwidth Utilization for IBBUL Network ——————59

CHAPTER FIVE: CONCLUSION AND RECOMMENDATIONS

5.1 Conclusions ——————————————————————-60

5.3 Recommendations for Further Works ——————————————————————-60

REFERENCES ——————————————————————-61

INTRODUCTION

This chapter discusses the network structure of IBBUL, the type of devices used in the network, as well as the challenges facing the network with respect to bandwidth management. With the use of wired or wireless connectivity, instant access to email, the Internet, and other IT services have dramatically changed the way people live, work, and study.

To this end, students, staff, and visitors always expect easy access to most information and services of an institution. While academic institutions are characterized by the high rate of electronic file sharing and Internet surfing, Ibrahim BadamasiBabangida University, Lapai (IBBUL) as a fast-growing institution is not exempted from such demand. These demands can only be met effectively with a robust bandwidth management policy.

REFERENCES

Abdullahi, M. B. (2014).The Study of The Policy Based Bandwidth Management in The Core Network: A Case Study of ABU Network. Zaria. Zaria: Department of Electrical and Computer Engineering. Ahmadu Bello University, Zaria, Nigeria.
Andrew, P. (2013). Badnwidth Management for University Campus Network. Internation Journal for Sciences , 2-32.
Athicha, M., Benjie, C., & David, M. (2010).A Low-bandwidth Network File System. San Diego: Defense Advanced Research Projects Agency (DARPA).
Barry, V. W. (2011).Bandwidth Management and Monitoring for IP Network Traffic: An Investigation. Retrieved September 14, 2014, from Academia: http://www.academia.edu/502587/Bandwidth_Management_and_Monitoring_for_IP_Network_Traffic_An_Investigation
Bill, M. (2012).Bandwidth Management Techniques — Tips and Actions. Retrieved September 15, 2014, from Techsoup for Libraries: https://www.techsoupforlibraries.org/cookbook-3/networking-and-security/tools/bandwidth-management-techniques-tips-and-actions.

CSN Team.

Tags: , , ,

Comments are closed.