Sunteți pe pagina 1din 14

Copyright, International Journal of Advance Computing Technique and 2017

Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

A Simplistic Sequential approach to statistically analyze an existing


Network Infrastructure
Sheikh Babar Hameed*1 ,Dr. Ali Hammad Akbar2
1
MS-TN Research Scholar University of Engineering and Technology Lahore
2
Professor Department of CS&IT University of Engineering and Technology Lahore

Abstract Private IT university infrastructure. The primary focus


will be on utility and serviceability through VPN on
Networks are expanded with the increase in IT internet or by using telecom and networking.
requirements. Over the time overall IT operations 2. Methodology & Organization of Report:
become duplicated, sometimes conflicting. This 2.1. Literature Reviews:
proposed approach is a way to dig study of Information A thorough study of various research papers is needed
Technology and Information System. This is an to get the path of succession. One need to find research
empirical study and the focus remained on bench papers related to the existing network. It will help them
marking and base lining the analysis of an existing understand the basic terminologies of networks.For
system. We aimed to perform data gathering of IT quick referencing few of them are discussed below.
system and analyzing it. This study produced a 1- First research paper discussed here is titled as “An
sequential manner to dig into an analysis phase of the information technology trilogy: business strategy,
existing network system and highlight the short technological deployment and organizational
comings. performance”. In this research paper Anne-Marie
et-al identified technological deployments in
1. Introduction different types of businesses. For this purpose, they
Campus area network is aimed to connect different met with managers from 223 companies and
departments that are spreading over different buildings. gathered data and then they analyzed this data
For instance, in university campus under study, statistically to identify the impact of information
different departments are divided by blocks. The main system department and technological architecture.
purpose of campus area network is to provide They concluded with identifying link between
integration among different devices and protocols to strategic activities, specific profiles of
share and retrieve information among them. Like any technological deployment and organizational
enterprise network, campus area network must have performance.
optimum availability, scalability, reliability, security 2- 2nd research paper is titled as “Information systems
and easy to manage. strategy: Past, present, future?” by Yasmin Merali,
This study is aimed to show the methods of how to Thanos Papadopoulos, TanveeNadkarni. In this
investigate an academic environment. A solution to an research paper, researchers focused on Strategic
academic institution where multiple campuses exists. Information Systems (SIS) domain, its identity and
These all campuses have some requirements of future. They identified four priorities including its
information and communication Technology (ICT) that conceptualization, network paradigm, access and
include computing resource (computers, storage, its adoption. They concluded with advancement
networking and other physical devices, infrastructure recommendations in SIS along width challenges
and processes to create, process, store, secure and for the field with the complexity of political,
exchange all forms of electronic data) and connecting economic, social, dynamic and technical factors.
resource [1]. Requirements of Information Services (IS) 3- 3rd research paper titled as “Complementarities
also exist like Servers (File, Name, Web, Telnet, Between Organizational IT
DHCP, Remote Login, Authentication Server), Architecture and Governance Structure” authored
Intrusion detection and prevention system including by “AmritTiwana, Benn Konsynski”. In this
Firewalls. In this study, I want to determine the research they discussed interplay between
redundancy or existence of functional overlap, also organizational information technology architecture
identifying loopholes and weaknesses to improve and IT governance structure. They proposed

www.ijacta.com * Corresponding Author Page 35


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

modularity in IT system. And discussed its drawing tool. A “smart draw” tool may be for this
influence on IT alignments. purpose. The aim is actually getting the network map. It
3. Analysis: will show different connections between the server and
This phase is an initial phase. Analysis is a basic other points.
step of looking into the infrastructure of a network. 3.2 Information Gathering About Media:
It consists an analysis of: Inspecting the medium by interviewing the IT team
1- Network design to have a good idea about the channel used
2- Topology of the existing network between ISP and Server is important.
3- Applications used in existing Network Different types of mediums that are used in a
4- Network user desires. conventional system are:
1- Ethernet cable
Analysis phase could be performed by the means of: a. Straight through cable
1- Conducting interviews b. Crossover
2- Direct surveys 2- Optical fiber
3- Blueprint reading manuals or documentation The given below table shows and way to represent the
4- Problem identification details of all connecting mediums to connect all
3.1 Developing a Network Diagram: possible nodes in the network.
To obtain the idea about existing network one should
aim to draw network diagrams using a good network
Connectivity between Coaxial Fiber Category-3 Category-5 Category-6 others
ISP and Server      
Server room and Computer      
Lab
server room and A Block      
server room and Main Block      
Table 3.1 connecting mediums between different nodes
Observations prove that cat-3 cat-5 and cat-6 cables are generally used. A little detail of all three is given as under:
[2]
1- CAT3 can be relied on to handle data speeds of up to 10 Mbps, but no more. Its maximum frequency clocks in
at 16 MHz.it was four wire standard.
2- CAT5 is rated for a maximum frequency of 100 MHz and top speeds of 100 Mbps. at lengths of up to 100
meters.
3- CAT6 is rated for a maximum frequency of 250 MHz and top speeds of 10 Gbps. at lengths of up to 55 meters.
But it can support 1 Gbps at lengths up to 100 meters.
Types of conventional connections of LAN cables are listed below in table 3.2 that are used for connection between
similar types of nodes and different types of nodes.
Media
Nodes Host Switch Access point Server
convertor
Straight through
Straight through
Host Crossover cable cable/Console Air Interface Crossover cable
cable
cable
Straight through
Straight through Straight Straight through
Switch cable/ Console Crossover cable
cable through cable cable
cable
Access Straight through Straight through Crossover
Air Interface Air interface
point cable cable cable
Straight through Straight through Straight
Server Crossover cable Crossover cable
cable cable through cable

www.ijacta.com * Corresponding Author Page 36


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Media Straight through Straight through Fiber/ Straight Straight Straight through
convertor cable cable through cable through cable cable

Table 3.2 Types of connection of Ethernet LAN between different nodes


3.3 IP Addressing of Current Network:
Addressing have two types logical addressing and physical addressing. Logical addressing is the function of Network
Layer and Physical addressing is the function of Data Link Layer in OSI Model. Two most common protocols
Internetwork packet exchange (IPX) and Internet protocol (IP) are used in logical addressing. Nowadays IP is mostly
used and their two version of IP in the market. These are as follow
1- IPV4(32 bits)
2- IPV6(128 bits)
Physical address is also card Media access control or Hardware address. A physical address of a computer is a unique
identifier assigned to network interfaces for communications. It consists of the 48 bits.
Complete list of Internet protocol address schemes used in Campus area network may be showcased in the following
manner.
Location Name Useable Host IP addresses Gateway

Server Block 131.73.0.1/24 – 131.73.0.12/24 131.73.0.1

New/ Uncategorized User 131.73.5.1/24 – 131.73.5.254/24 131.73.0.1

A Block 131.73.8.1/24 – 131.73.8.12/24 131.73.0.1

Computer Lab Seg 1 131.73.9.1/24 – 131.73.9.25/24 131.73.0.1

Computer Lab Seg 2 131.73.9.26/24 – 131.73.9.50/24 131.73.0.1

Faculty 131.73.10.1/24 – 131.73.10.254/24 131.73.0.1

Cell phones 131.73.11.1/24 – 131.73.11.254/24 131.73.0.1


Table 3.3 IP Address schemes used in complete network
3.4 Analyzing Network Availability:
Analyzing network availability means to investigate the statistics about mean time between failure (MTBF) and mean
time to repair for the existing network infrastructure. Try to investigate all faults that occurred in previous few years
covering major as well as minor network segments. For this purpose, you can conduct and interview of the IT staff. All
generally inquired faults are given below in table 3.4

Date and duration of last Causes of last major


Affected Area MTBF MTTR
major downtime downtime
Campus (as a 25 January 2016 10:00am to
12 months 4 hours Server Up gradation
whole) 27 January 2016 01:00pm
Chairman office 6 months 30 min 17 May 12:20pm to 01:20pm Cable cut tree overhead
11 July 2016 02:25pm to
Faculty 1 year 30 min Media converter issue
04:25pm
30 08 September 10:30am to
A Block 3.5 year New construction
minutes 11:00am
Table 3.4 Availability Characteristics of the Current Network
3.5 Identifying a Customer’s Network Applications:
It’s now time to focus on the real reason networks exist: applications. The identification of applications that are being
used including both current applications and new applications. The Network Applications chart to include the technical
application goals shown in Table 3.5.

www.ijacta.com * Corresponding Author Page 37


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

New
Name of Type of App? Critic Cost of Acceptable
Application Application (Y/N) ality Downtime MTBF

Gmail Email No High Will not be able to One


communicate with USA year(during
Family & Students summer
holidays)
Google Chrome Web browsing No High Not much as we can use One year
EDGE & Firefox for
backup
MS SQL Database access No High University Management Two year
and updating System & LMS will go
down.
FileZilla File transfer, No med Will not be able to upload 7
sharing, and files on server days(weekend
access s)
Gaming Server Network game No Low Network gaming will not Normally
(for different be possible. down
games)
Remote Desktop Remote terminal No Mediu Will not be able to work Weekends
Connection m on server
Table 3.5 Network Applications with technical application goals
3.6 CHARACTERIZING THE TRAFFIC FLOW
Characterizing the traffic flow involves identifying the sources and destinations of network traffic and analyzing the
direction and symmetry of data traveling between sources and destinations [3]. In this Section, complete analysis is done
of all traffic generated. In traffic analysis phase one must analyze the following data sets:
1- Complete bandwidth utilization of the network
2- Usage trends of bandwidth
3- Top domain/ Applications analysis
4- Peer to peer communication
5- Network utilization based on social media
6- Surf time analysis
7- Delay and Response time
8- Existing Network top Hosts
9- Existing Network top applications
10- Identifying Data Stores
3.6.1 Analyzing Complete Bandwidth Utilization of the Network:
I started my analysis by having a bird eye view of the traffic. I examined all bandwidth used for uploading as well as for
downloading. Following table is showing stats of one week.as shown below total download in this week was 44.25 GB
and total uploads data size was 1.97 GB.

All Bandwidth

Projected
Download Upload Peak Day Projected Upload
Download
44.25 GB 1.97 GB 8/30/2016 189.63 GB 8.46 GB

www.ijacta.com * Corresponding Author Page 38


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Avg: 6.32 GB / Avg: 288.62 MB / For the next 30


day day days For the next 30 days
Table 3.6 Bandwidth usage during one week as a whole

Figure 3.1 Line graph showing bandwidth utilization.


3.6.1.1 Category Wise Bandwidth Analysis:
After Showing bigger picture of the bandwidth utilization, below is the analysis of usage of Bandwidth by different
categories of applications. We have focused on top ten categories in spite of showing all that used very less amount of
bandwidth to avoid unnecessary details. As shown in table.
Sr. Download
Category Bandwidth (%) Upload (%)
No. (%)
1. Web Services 33.76 % 33.74 % 34.39 %
2. Search Engines 21.03 % 21.32 % 14.65 %
3. Social Networking 20.17 % 20.23 % 18.71 %
4. Social Network 17.40 % 17.44 % 16.59 %
5. Educational Institutions 16.21 % 16.80 % 3.12 %
6. Business and Economy 14.18 % 14.58 % 5.31 %
7. Computer and Internet Info 6.67 % 6.74 % 5.05 %
8. CDNs 5.11 % 5.20 % 3.13 %
9. Web based Email 4.44 % 3.03 % 36.03 %
10. Collaboration 4.23 % 4.41 % 0.20 %
Table 3.7 Bandwidth usage during one-week category wise
Detail of Bandwidth Usage is given below in table. Purpose of this detail is to show that in an academic institution the
research and referencing category do not lie in top twenty positions. Rather it lies in 21th position with very low
bandwidth consumption
Sr. No.
Category Download Upload

1 Web Services 14.84 GB 694.12 MB


2 Search Engines 9.43 GB 295.85 MB
3
Social Networking 8.92 GB 376.57 MB
4
Social Network 7.70 GB 333.91 MB
5
Educational Institutions 7.43 GB 63.09 MB

www.ijacta.com * Corresponding Author Page 39


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

6
Business and Economy 6.41 GB 107.07 MB
7
Computer and Internet Info 2.98 GB 101.88 MB
8
CDNs 2.20 GB 62.90 MB
9
Web based Email 1.34 GB 712.36 MB
10
Collaboration 1.95 GB 3.98 MB
Table 3.8 Uploads and Downloads details during one-week category wise
A graphical presentation of Top Categories is shown below in bar graph given in figure below. As it is apparent by
viewing bar graph of bandwidth usage by top ten categories major part of bandwidth is utilized in downloading.
Figure 3.2 Bar Graph of Uploads and Downloads during one-week category wise
3.6.1.2 Bandwidth Analysis Based On Site / Applications:
Data shown below is aimed for analysis of bandwidth utilization by different online applications/ Sites.

Sr.
Site/Application Name Bandwidth (%) Download (%) Upload (%)
No.
1. Facebook 12.13 % 12.23 % 10.13 %

2. safebrowsing-cache.google.com 7.18 % 7.45 % 1.64 %

3. Google Safe 7.18 % 7.45 % 1.64 %

4. Google 7.14 % 7.11 % 7.72 %


5. portal.usa.edu.pk 6.12 % 6.38 % 0.88 %
Table 3.9 Bandwidth usage during one-week Site wise
3.6.1.3 Bandwidth Usage Analysis Used by User Communities:
Bandwidth Usage Percentage for downloading and uploading is depicted below in table:
Sr. Bandwidth
User Download (%) Upload (%)
No. (%)
1 server series 2.45 % 2.43 % 3.02 %
2 new user dynamic 0.18 % 0.18 % 0.28 %
3 a/c/ d block 7.77 % 8.05 % 1.52 %

www.ijacta.com * Corresponding Author Page 40


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

4 computer lab 43.80 % 44.20 % 34.89 %


5 Faculty 23.00 % 23.03 % 22,33%
6 cell phone 1.00 % 0.78 % 5.98 %
Table 3.10 Percentage Bandwidth usage during one-week User Community wise
3.6.1.4 Bandwidth Analysis Based On Applications:
Data shown below is aimed for analysis of bandwidth utilization by different online applications. Bandwidth Usage
Percentage for downloading and uploading for each application is shown below in table. It is to be noted that only top 5
online applications are given in the list to avoid unnecessary data.
Sr. No. Application Name Bandwidth (%) Download (%) Upload (%)
1. Facebook 29.79 % 30.33 % 20.81 %
2. Google Safe 17.64 % 18.48 % 3.38 %
3. Google 17.53 % 17.63 % 15.87 %
4. Sharepoint 6.39 % 6.76 % 0.23 %
5. Gmail 5.75 % 3.93 % 36.44 %
Table 3.11 Percentage Bandwidth usage during one-week Application wise
Detailed view of bandwidth utilization is given below in table:
Sr. No. Application Name Download Upload
1 Facebook 8.71 GB 363.26 MB
2 Google Safe 5.33 GB 59.19 MB
3 Google 5.08 GB 278.02 MB
4 Sharepoint 1.95 GB 3.97 MB
5 Gmail 1.13 GB 623.27 MB
Table 3.12 Actual Bandwidth usage during one-week Application wise
Graphical presentations of Top Applications is shown in bar graph given in figure below. As it is apparent by viewing
bar graph of bandwidth usage by top ten Applications major part of bandwidth is utilized in downloading.
Figure 3.3 Bar Graph of Uploads and Downloads of one-week Application wise
3.6.1.5 Analysis On the Basis of Domains:
In this section you may show internetwork bandwidth utilization by user communities of different domains. It is to be
noted that academic related domains are fewer in number:

Sr. No. Domain Download Upload


1 google.com 8.11 GB 883.35 MB
2 fbcdn.net 6.77 GB 29.56 MB
3 google.com.pk 1.29 GB 51.59 MB
4 dailymotion.com 1.04 GB 8.11 MB

www.ijacta.com * Corresponding Author Page 41


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

5 facebook.com 752.84 MB 289.50 MB


Table 3.13 Top domains w.r.t Bandwidth usage during one week
A Graphical presentation of Top Domains is shown below in bar graph given in figure below. As it is apparent by
viewing bar graph of bandwidth usage in top ten domains, major part of bandwidth is utilized in downloading.

Figure 3.4 Bar Graph of Top Domains w.r.t U/L and D/L during one week
3.6.1.6 Bandwidth Analysis (Top Users):
In the table below most traffic generating users on individual level are shown.it is to show usage trends of individual
users on the network.

Total
Total Total Rankin
IP Addresses Domain Total Surf Time Avg Hits/ Day
Hits Apps g
s

51503 131.73.10.241 1245 151 1/234 35 hrs. 14 min


Avg: 7357 / day
47753 131.73.6.4 1816 132 2/234 11 hrs. 40 min
Avg: 6821 / day

25544 131.73.5.45 605 128 3/234 16 hrs. 21 min


Avg: 3649 / day

19818 131.73.9.101 375 90 5/234 12 hrs. 53 min


Avg: 2831 / day

19789 131.73.10.204 478 115 6/234 9 hrs. 26 min


Avg: 2827 / day
Table 3.14 Top ten users with their ranking, Avg Surf time and Avg request/ day

www.ijacta.com * Corresponding Author Page 42


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Bar graph of top 10 user based on the basis of number of hits is given below in figure can be displayed in such a manner.

Figure 3.5 Bar Graph of Top 10 users Bandwidth Usage during one week
4. Analysis of Peer to Peer Communication:
In this phase focus is on the peer to peer connections that should not be allowed in academic environment.

Top Filtered
Breaches Warns Top AV Activity Top Blocked Website
Category
i-1006.b-
475 180 P2P N/A
0.ad.bench.utorrent.com
Avg: 67 / Avg: 25 / 475 hits, 67hits / 0 hits, 0 hits /
day day day day 245 hits, 35 hits / day
Table 4.1 total peer to peer Breaches.
List of p2p connections can be shown in the following manner.
Sr. Color
Domain Breached Warned And Continued/Warned
No. Filter
1. utorrent.com 359 0 / 131
2. bittorrent.com 90 0 / 48
3. kickasstorrents.eu 6 0/0
4. torrentz.eu 6 0/0
5. kat.al 4 0/0
Table 4.2 Top nine peer to peer breached domains.

www.ijacta.com * Corresponding Author Page 43


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Figure 4.1 PIE Graph of Top nine peer to peer breached domains.
5. Analysis of Network Utilization Based On Social Media:
Following section shows traffic and bandwidth usage trends of social media. On average there are 3066 hits per day also
there are 21464 hits in a week. As per record top warned website is Plus.google.com. Its total hit score per week is 7707
whereas the daily average hits are 1100. Follow table shows the actual facts in tabular format.
Top AV
Breaches Warns Top Filtered Category Top Warned Website
Activity

21464 15 Social Network N/A plus.google.com

21464 hits, 3066hits / 0 hits, 0 hits /


Avg: 3066 / day Avg: 2 / day day day 7705 hits, 1100 hits / day
Table 5.1 Total social media site Breaches.

5.1 Top Ten Social Media Domains:


In this section top 10 social media domains are discussed. The top most social media domain is google.com. Whereas
flicker is not the last one but in top ten social media domains it is positioned at 10th number.
S. No. Color Filter Domain Breached Warned
1. google.com 7713 7713
2. facebook.com 5859 5859
3. facebook.net 4722 4722
4. twitter.com 1115 1115
5. linkedin.com 506 506
6. twimg.com 309 309
7. sharethis.com 304 304
8. pinterest.com 241 241
9. fbcdn.net 212 212
10. flickr.com 160 160
Table 5.2 Top ten social media breached and warned domains.
Pie chart on the basis of stats is given below in figure

Figure 5.1 PIE Graph of Top ten social media


breached and warned domains percentage

6. Analysis of Network Surf Time:


This section gives details of total surf time of one week
with average surf time per day. As per records total
762826 requests are generated in one week. With 108975
average requests per day.

www.ijacta.com * Corresponding Author Page 44


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Users Peak Day Requests Avg: 108975 / day Projected Requests For the next 30 days

234 8/30/2016 762826 3269254

Table 6.1 Total requests by all users in one week


Following graph shows per day requests by all users

Figure 6.1-line Graph of total requests by all users in one week


6.1 Surf Time Details of Different User Community:
Following record shows Average Surf time for each user community in one week.as per record most busy community on
network is faculty.
Sr. Web Filtered
User community AVG Surf Time Filtered Avg Time / Day
No. Requests (%)
1 server series 18 hrs. 35 mins 24092 1240 0.59 % 2 hrs. 39 mins
2 new user dynamic 3 35 mins 523 291 0.03 % 5 mins
3 a/c/ d block 5 hrs. 25 mins 21471 3727 0.55 % 46 mins
4 computer lab 12 hrs. 53 mins 302994 56968 6.79 % 1 hrs. 50 mins
5 Faculty 35 hrs. 14 mins 153262 12674 3.97 % 5 hrs. 2 mins
6 cell phone 11 hrs. 16 mins 6027 340 0.31 % 1 hrs. 36 mins
Table 6.2 Total requests by different user’s communities in one week
7. Analyzing Delay and Response Time:
Network response time is a measure of the amount of time required for a packet to travel across a network path from a
sender to a receiver [4]. To verify the performance of the network we need to measurement the response time between
networking devices. Measurement of response time between different network devices have various techniques. The
most common technique is Ping packet and measurement the round trip time (RTT) to send the request and receive a
response.
Node A= A Block, Node B= Lab Segments, Node C= C block, Node D= D block, Node E= server room terminal, Node
F= Faculty Room, Node G= Main Block, Node H= Heritage franchise, Node I = Admission Block, Node J= Architecture
Department
Then average delay among all nodes is shown below in table.

www.ijacta.com * Corresponding Author Page 45


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Node A B C D E F G H I J
A <1ms 1 ms 95ms 5ms 1ms 50 ms 20 ms 35 ms 10 ms 5 ms
B 1ms <1ms 15ms 10 ms 2ms 90ms 10ms 25ms 15 ms 5ms
C 85 ms 15 ms <1ms 60 ms 30 ms 140 ms 30 ms 45 ms 25 ms 10ms
D 5 ms 10 ms 60 ms <1ms 1 ms 70 ms 35 ms 65 ms 15 ms 15 ms
E 1 ms 2 ms 40 ms 1 ms <1ms 90 ms 1 ms 15 ms 5 ms 10 ms
Table 7.1 Analyzing Delay and Response Time between different communities
8. Analyzing the Existing Network Hosts:
The most important thing to keep in mind when creating a network infrastructure design is the way the customer will
actually use the infrastructure once it is in place [5]. The web activity logs do contain the URLs, but they do not contain
per user activity and the size of information used by them. It is therefore important to analyze the number of hosts using
the network. We managed to get most of the user data for the analysis purpose. As given below from 232 active users top
five are listed below:

Web
Sr. No. User Surf Time Filtered Filtered (%) Avg Time / Day
Requests
1. 131.73.10.241 35 hrs. 14 min 51503 4378 3.97 % 5 hrs. 2 min
2. 131.73.6.4 1 hrs. 40 min 47753 6601 5.98 % 14 min
3. 131.73.5.45 16 hrs. 21 min 25544 4621 4.19 % 2 hrs. 20 min
4. 131.73.22.25 32 hrs. 32 min 21702 371 0.34 % 4 hrs. 38 min
5. 131.73.9.101 12 hrs. 53 min 19818 7492 6.79 % 1 hrs. 50 min
Table 8.1 Most active network user with their surf time and requests
8.1 Analyzing the Existing Network Hosts per Day Record:
All the hosts which are part of the existing network are closely monitored and a complete day record is archived
appropriately shown in the Figure:
TOP FIVE USERS USAGE DETAILS:
Sr. Bandwidth Download Upload
User Bandwidth Download Upload
No. (%) (%) (%)
1. 131.73.10.241 6.15 GB 20.13 % 5.98 GB 20.74 % 173.59 MB 9.90 %
2. 131.73.8.10 1.62 GB 5.32 % 1.62 GB 5.63 % 2.29 MB 0.13 %
3. 131.73.22.25 879.58 MB 2.81 % 824.72 MB 2.79 % 54.86 MB 3.13 %
4. 131.73.10.70 803.72 MB 2.57 % 783.55 MB 2.65 % 20.16 MB 1.15 %
5. 131.73.19.136 671.48 MB 2.15 % 632.33 MB 2.14 % 39.15 MB 2.23 %
Table 8.2 Most active network user with their network activity summaries
9. Analyzing Random Host per Day Record:
Drilling down in to a particular user will further help in examining the use of web traffic. The access report helps to
highlight the user web activity in a day. A host is selected to get an insight on the complete day record shown in Figure.
IP address of host is 131.73.10.204.Out of 1168 records only 5 unique entries are given below in table to show random
user activities.
Sr.
URL Category Time
No.
1 gum.criteo.com Business and Economy 02/09/2016 14:51:27
Computer and Internet Info, Social
2 t.sharethis.com 02/09/2016 14:51:23
Network
3 www.rajnikantvscidjokes.in Unavailable 02/09/2016 14:50:50
4 cm.g.doubleclick.net Web Advertisements 02/09/2016 14:49:03

www.ijacta.com * Corresponding Author Page 46


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

5 bodyecology.com Shopping, Society, Health & Medicine 02/09/2016 14:40:10


Table 9.1 A random user activity records (without duplicates)
10 Analyzing the Existing Network Top Applications:
This section shows compiled list of all the applications currently in use by the network, we haveprioritized these
applications on the basis of usage. This will help you determine which applications are critical to the existing network
goals and mission. Critical applications will need to be addressed first when designing the network infrastructure to
support application requirements, and then address the needs of less-critical applications [5]. Top five network
applications are given in table as under:
Sr.
Application Name Bandwidth (%) Download (%) Upload (%)
No.
1. Facebook 29.79 % 30.33 % 20.81 %
2. Google Safe 17.64 % 18.48 % 3.38 %
3. Google 17.53 % 17.63 % 15.87 %
4. Sharepoint 6.39 % 6.76 % 0.23 %
5. Gmail 5.75 % 3.93 % 36.44 %
Table 10.1Top Five Network Applications list
11. Identifying Network User Desires:
If you want to perform data gathering of an IT system and analyzing. For this purpose, you need toaskthe IT staff to help
you by filling into this form. So that you may be able to understand network user desires.

Sr. Questions your current network?


No. 10 Do you prefer a wireless network over
conventional wired network?
11 Is the current system reliable to cope with
1 Are You satisfied with available equipment in downtime up till long?
comparison to the number of daily users? 12 Is Your network being upgraded regularly and
2 Is Your network flexible enough to entertain high budgets are available for this purpose?
anticipated users in the next 12 months? 14 Are You are managing networks supporting
both Linux and Windows-based networking?
15 Do You find it easy to configure the existing
system?
3 Are you satisfied with the current business 16 Do You keep on trying some tactics to improve
policy of your organ-ization as per number of network performance?
users in ratio to equipment are concerned? 17 Have you been using traditional
troubleshooting methods successfully in the
past?
18 Are software-defined networks (SDNs) a good
replacement to the one you are using?
4 Does the internet bandwidth provided to you 20 Have You used different technologies involved
meets the current requirements? in establishing WAN links?
5 Are You are using genuine applications and 22 Do You use different monitoring tools to
software to enhance the quality of service? monitor and enhance network performance?
6 Are you using conventional wired network
infrastructure and do not need state of the art
facility?
7 Do you need a remote VPN service connection?
8 Is VoIP currently being used by the network
you are opting?
9 Is there a stand-alone fire wall being used in
Table 11.1 Network user desires questionnaire

www.ijacta.com * Corresponding Author Page 47


Copyright, International Journal of Advance Computing Technique and 2017
Applications (IJACTA), ISSN : 2321-4546, Vol 5, Issue 1, Jan- June

Conclusion- This study is aimed to show the methods


of how to investigate an academic environment. A
solution to an academic institution where multiple
campuses exists. These all campuses have some
requirements of information and communication
Technology (ICT) that include computing resource
(computers, storage, networking and other physical
devices, infrastructure and processes to create, process,
store, secure and exchange all forms of electronic data)
and connecting resource . In this study, I want to
determine the redundancy or existence of functional
overlap, also identifying loopholes and weaknesses to
improve Private IT university infrastructure. The
primary focus will be on utility and serviceability
through VPN on internet or by using telecom and
networking.

References:
[1] M. Rouse, "What is information technology
(IT)? - definition from WhatIs.com," Search
Datacenter, 2015. [Online]. Available:
http://searchdatacenter.techtarget.com/definition/IT.
Accessed: Jan. 08, 2017.

[2] "CAT3 vs. CAT5 vs. CAT6," in Network


Cables, Custom Cable, 2011. [Online]. Available:
http://customcable.ca/cat5-vs-cat6/. Accessed: Jan. 11,
2017.
[3] "Excerpt: Top-Down Network Design--Part I |
EE Times", EETimes, 2017. [Online]. Available:
http://www.eetimes.com/document.asp?doc_id=127826
7. [Accessed: 16- Jan- 2017].

[4] "Network Latency Testing - Response Time |


Solar Winds", Solarwinds.com, 2017. [Online].
Available: http://www.solarwinds.com/topics/network-
latency. [Accessed: 21- Jan- 2017].

[5] D. Bixler, "Analyzing the Impact of


Infrastructure Design | MCSE Windows 2000 Network
Infrastructure Design: Analyzing Technical
Requirements | Pearson IT Certification",
Pearsonitcertification.com, 2017. [Online]. Available:
http://www.pearsonitcertification.com/articles/article.as
px?p=30481&seqNum=5. [Accessed: 06- Feb- 2017].

www.ijacta.com * Corresponding Author Page 48

S-ar putea să vă placă și