Documente Academic
Documente Profesional
Documente Cultură
modularity in IT system. And discussed its drawing tool. A “smart draw” tool may be for this
influence on IT alignments. purpose. The aim is actually getting the network map. It
3. Analysis: will show different connections between the server and
This phase is an initial phase. Analysis is a basic other points.
step of looking into the infrastructure of a network. 3.2 Information Gathering About Media:
It consists an analysis of: Inspecting the medium by interviewing the IT team
1- Network design to have a good idea about the channel used
2- Topology of the existing network between ISP and Server is important.
3- Applications used in existing Network Different types of mediums that are used in a
4- Network user desires. conventional system are:
1- Ethernet cable
Analysis phase could be performed by the means of: a. Straight through cable
1- Conducting interviews b. Crossover
2- Direct surveys 2- Optical fiber
3- Blueprint reading manuals or documentation The given below table shows and way to represent the
4- Problem identification details of all connecting mediums to connect all
3.1 Developing a Network Diagram: possible nodes in the network.
To obtain the idea about existing network one should
aim to draw network diagrams using a good network
Connectivity between Coaxial Fiber Category-3 Category-5 Category-6 others
ISP and Server
Server room and Computer
Lab
server room and A Block
server room and Main Block
Table 3.1 connecting mediums between different nodes
Observations prove that cat-3 cat-5 and cat-6 cables are generally used. A little detail of all three is given as under:
[2]
1- CAT3 can be relied on to handle data speeds of up to 10 Mbps, but no more. Its maximum frequency clocks in
at 16 MHz.it was four wire standard.
2- CAT5 is rated for a maximum frequency of 100 MHz and top speeds of 100 Mbps. at lengths of up to 100
meters.
3- CAT6 is rated for a maximum frequency of 250 MHz and top speeds of 10 Gbps. at lengths of up to 55 meters.
But it can support 1 Gbps at lengths up to 100 meters.
Types of conventional connections of LAN cables are listed below in table 3.2 that are used for connection between
similar types of nodes and different types of nodes.
Media
Nodes Host Switch Access point Server
convertor
Straight through
Straight through
Host Crossover cable cable/Console Air Interface Crossover cable
cable
cable
Straight through
Straight through Straight Straight through
Switch cable/ Console Crossover cable
cable through cable cable
cable
Access Straight through Straight through Crossover
Air Interface Air interface
point cable cable cable
Straight through Straight through Straight
Server Crossover cable Crossover cable
cable cable through cable
Media Straight through Straight through Fiber/ Straight Straight Straight through
convertor cable cable through cable through cable cable
New
Name of Type of App? Critic Cost of Acceptable
Application Application (Y/N) ality Downtime MTBF
All Bandwidth
Projected
Download Upload Peak Day Projected Upload
Download
44.25 GB 1.97 GB 8/30/2016 189.63 GB 8.46 GB
6
Business and Economy 6.41 GB 107.07 MB
7
Computer and Internet Info 2.98 GB 101.88 MB
8
CDNs 2.20 GB 62.90 MB
9
Web based Email 1.34 GB 712.36 MB
10
Collaboration 1.95 GB 3.98 MB
Table 3.8 Uploads and Downloads details during one-week category wise
A graphical presentation of Top Categories is shown below in bar graph given in figure below. As it is apparent by
viewing bar graph of bandwidth usage by top ten categories major part of bandwidth is utilized in downloading.
Figure 3.2 Bar Graph of Uploads and Downloads during one-week category wise
3.6.1.2 Bandwidth Analysis Based On Site / Applications:
Data shown below is aimed for analysis of bandwidth utilization by different online applications/ Sites.
Sr.
Site/Application Name Bandwidth (%) Download (%) Upload (%)
No.
1. Facebook 12.13 % 12.23 % 10.13 %
Figure 3.4 Bar Graph of Top Domains w.r.t U/L and D/L during one week
3.6.1.6 Bandwidth Analysis (Top Users):
In the table below most traffic generating users on individual level are shown.it is to show usage trends of individual
users on the network.
Total
Total Total Rankin
IP Addresses Domain Total Surf Time Avg Hits/ Day
Hits Apps g
s
Bar graph of top 10 user based on the basis of number of hits is given below in figure can be displayed in such a manner.
Figure 3.5 Bar Graph of Top 10 users Bandwidth Usage during one week
4. Analysis of Peer to Peer Communication:
In this phase focus is on the peer to peer connections that should not be allowed in academic environment.
Top Filtered
Breaches Warns Top AV Activity Top Blocked Website
Category
i-1006.b-
475 180 P2P N/A
0.ad.bench.utorrent.com
Avg: 67 / Avg: 25 / 475 hits, 67hits / 0 hits, 0 hits /
day day day day 245 hits, 35 hits / day
Table 4.1 total peer to peer Breaches.
List of p2p connections can be shown in the following manner.
Sr. Color
Domain Breached Warned And Continued/Warned
No. Filter
1. utorrent.com 359 0 / 131
2. bittorrent.com 90 0 / 48
3. kickasstorrents.eu 6 0/0
4. torrentz.eu 6 0/0
5. kat.al 4 0/0
Table 4.2 Top nine peer to peer breached domains.
Figure 4.1 PIE Graph of Top nine peer to peer breached domains.
5. Analysis of Network Utilization Based On Social Media:
Following section shows traffic and bandwidth usage trends of social media. On average there are 3066 hits per day also
there are 21464 hits in a week. As per record top warned website is Plus.google.com. Its total hit score per week is 7707
whereas the daily average hits are 1100. Follow table shows the actual facts in tabular format.
Top AV
Breaches Warns Top Filtered Category Top Warned Website
Activity
Users Peak Day Requests Avg: 108975 / day Projected Requests For the next 30 days
Node A B C D E F G H I J
A <1ms 1 ms 95ms 5ms 1ms 50 ms 20 ms 35 ms 10 ms 5 ms
B 1ms <1ms 15ms 10 ms 2ms 90ms 10ms 25ms 15 ms 5ms
C 85 ms 15 ms <1ms 60 ms 30 ms 140 ms 30 ms 45 ms 25 ms 10ms
D 5 ms 10 ms 60 ms <1ms 1 ms 70 ms 35 ms 65 ms 15 ms 15 ms
E 1 ms 2 ms 40 ms 1 ms <1ms 90 ms 1 ms 15 ms 5 ms 10 ms
Table 7.1 Analyzing Delay and Response Time between different communities
8. Analyzing the Existing Network Hosts:
The most important thing to keep in mind when creating a network infrastructure design is the way the customer will
actually use the infrastructure once it is in place [5]. The web activity logs do contain the URLs, but they do not contain
per user activity and the size of information used by them. It is therefore important to analyze the number of hosts using
the network. We managed to get most of the user data for the analysis purpose. As given below from 232 active users top
five are listed below:
Web
Sr. No. User Surf Time Filtered Filtered (%) Avg Time / Day
Requests
1. 131.73.10.241 35 hrs. 14 min 51503 4378 3.97 % 5 hrs. 2 min
2. 131.73.6.4 1 hrs. 40 min 47753 6601 5.98 % 14 min
3. 131.73.5.45 16 hrs. 21 min 25544 4621 4.19 % 2 hrs. 20 min
4. 131.73.22.25 32 hrs. 32 min 21702 371 0.34 % 4 hrs. 38 min
5. 131.73.9.101 12 hrs. 53 min 19818 7492 6.79 % 1 hrs. 50 min
Table 8.1 Most active network user with their surf time and requests
8.1 Analyzing the Existing Network Hosts per Day Record:
All the hosts which are part of the existing network are closely monitored and a complete day record is archived
appropriately shown in the Figure:
TOP FIVE USERS USAGE DETAILS:
Sr. Bandwidth Download Upload
User Bandwidth Download Upload
No. (%) (%) (%)
1. 131.73.10.241 6.15 GB 20.13 % 5.98 GB 20.74 % 173.59 MB 9.90 %
2. 131.73.8.10 1.62 GB 5.32 % 1.62 GB 5.63 % 2.29 MB 0.13 %
3. 131.73.22.25 879.58 MB 2.81 % 824.72 MB 2.79 % 54.86 MB 3.13 %
4. 131.73.10.70 803.72 MB 2.57 % 783.55 MB 2.65 % 20.16 MB 1.15 %
5. 131.73.19.136 671.48 MB 2.15 % 632.33 MB 2.14 % 39.15 MB 2.23 %
Table 8.2 Most active network user with their network activity summaries
9. Analyzing Random Host per Day Record:
Drilling down in to a particular user will further help in examining the use of web traffic. The access report helps to
highlight the user web activity in a day. A host is selected to get an insight on the complete day record shown in Figure.
IP address of host is 131.73.10.204.Out of 1168 records only 5 unique entries are given below in table to show random
user activities.
Sr.
URL Category Time
No.
1 gum.criteo.com Business and Economy 02/09/2016 14:51:27
Computer and Internet Info, Social
2 t.sharethis.com 02/09/2016 14:51:23
Network
3 www.rajnikantvscidjokes.in Unavailable 02/09/2016 14:50:50
4 cm.g.doubleclick.net Web Advertisements 02/09/2016 14:49:03
References:
[1] M. Rouse, "What is information technology
(IT)? - definition from WhatIs.com," Search
Datacenter, 2015. [Online]. Available:
http://searchdatacenter.techtarget.com/definition/IT.
Accessed: Jan. 08, 2017.