bandwidth management with traffic shaping for high availability enterprise networks
TRANSCRIPT
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
1/173
BANDWIDTH MANAGEMENT WITH TRAFFIC SHAPING FOR HIGH
AVAILABILITY
ENTERPRISE NETWORKS
By
VICTOR SIBANDA
TP027245
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
2/173
Acknowledgements
Any feat of accomplishment does not suddenly fall upon men but by continuous
encouragement and motivation do men achieve greater heights. First of all I would
have never put this project together without the quiet and peaceful whisperings
“Peace be still” from the Lord God. He gave me the strength to work on this project.
Putting it project together was not an easy task, there were a number of agonizing
setbacks and countless sleepless nights
I would also like to thank my supervisor and second marker for their unwavering
support and words of wisdom. Regardless of their busy schedules they always made
time for me and most of all their positive encouragement and feedback. Their push
for good quality research to work harder.
T f i d l t d l t I th k f ll id d
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
3/173
Bandwidth Management with Traffic Shaping for High
Availability Enterprise Networks
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
4/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
ABSTRACT
Our society is increasingly becoming a connected generation through the use of the internetand the internet of things. However the connections that brings together come at a huge cost.
In recent years it has become a network administrators nightmare having to watch their
networks become slower and slower by the day due to abuse of bandwidth abuse. Large
corporations buy a lot of bandwidth in-order to enable them to carry their business daily. Large
corporations require high bandwidth for instance to connect their data centres and branchnetworks. Large Organisations with Wide Area Networks that require a 99% availability have
had to suffer due to slow network traffic and bottle necking over their networks due to large
files moving across their networks in most cases non work related
Bandwidth required to carry information through is extremely scarce, there is not enough to go
around for each and every one. Because of this scarcity it becomes clear that bandwidth or
bandwidth usage has to be managed or critical systems and services have to be given higher
priority to ensure that economies and businesses do not suffer at the expense of people using
too much bandwidth to download or share non-core business files or communications which
them consume much of the bandwidth available
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
5/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Table of Contents
List of Figures ............................................................................................................................ 6
List of Tables ............................................................................................................................. 7
List of Appendices ..................................................................................................................... 8
ACRONYMS ............................................................................................................................. 9
Chapter 1: Introduction to the Study ....................................................................................... 11
1.1. Background to the project ......................................................................................... 12
1.2 Aims and Objectives ...................................................................................................... 16
1.2.2 Objectives ............................................................................................................... 16
1.2.3 Deliverables ............................................................................................................ 17
1.3 Target user ..................................................................................................................... 17
1.4 Functionality of the Proposed System ........................................................................... 17
1.5 Resources ....................................................................................................................... 18
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
6/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.1.1 Traffic to be Monitored and Shaped ........................................................................... 23
2.1.2 Traffic Shaping in Bandwidth Management ............................................................... 24
2.1.3 Comparison of Traffic Shaping to Traffic Policing .................................................... 24
2.1.3.1 Traffic Policing .................................................................................................... 24
2.1.3.2 Traffic Shaping ........................................................................................................ 24
2.1.4 Quality of Service ....................................................................................................... 25
2.1.5 Bandwidth Control Methods and Techniques......................................................... 26
2.1.5.1 Simple Network Management Protocol (SNMP) ................................................ 26
2.1.5.2 Packet Sniffing ..................................................................................................... 27
2.1.6 Similar Systems .......................................................................................................... 27
2.1.6.1 NetLimiter ............................................................................................................ 27
2.1.6.2 cFosSpeed ............................................................................................................ 28
2.1.6.3 Websense ............................................................................................................. 29
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
7/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.2.3.3 SQL Server........................................................................................................... 39
2.2.3.4 Comparison of DBM Systems ............................................................................. 39
2.2.3.5 Choice of Database Management System............................................................ 39
2.2.4: System development methodology ............................................................................ 40
2.2.4.1 Agile Methodology .............................................................................................. 40
2.2.4.2 Waterfall Methodology ........................................................................................ 42
2.2.4.3 Prototyping ........................................................................................................... 43
2.2.4.5 Methodology Decision ......................................................................................... 45
2.2.4.6 Project Development Plan.................................................................................... 45
2.2.5 Architecture................................................................................................................. 46
2.3 Conclusion ..................................................................................................................... 46
Chapter 3: Research methods................................................................................................... 48
3.1 Interview Questions and Justification ............................................................................ 48
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
8/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
5.2: Database design .......................................................................................................... 79
5.2.1 Database Tables ...................................................................................................... 80
5.2.1: Entity relationship diagram .................................................................................. 81
5.2.2: Data Dictionary ...................................................................................................... 82
5.3. Interface design ........................................................................................................... 84
Chapter 6: Implementation ................................................................................................... 87
Chapter 7: Testing .................................................................................................................. 106
7.1: Unit testing ................................................................................................................ 106
7.2: Integrated testing....................................................................................................... 108
7.3: System testing ........................................................................................................... 108
7.4: User acceptance testing .............................................................................................. 111
7.5 Overall Assessment ...................................................................................................... 112
Chapter 8: Critical Evaluation ............................................................................................. 113
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
9/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
List of Figures
Figure 1: Used International Bandwidth, 2002-2020 .............................................................. 13
Figure 2: Most Popular Protocols and Applications ................................................................ 14
Figure 3: Bandwidth management system when completed.................................................... 21
Figure 4: Protocols to be monitored......................................................................................... 23
Figure 5: Traffic Shaping and Traffic Policing ........................................................................ 25
Figure 6: SNMP Components .................................................................................................. 26
Figure 7: NetLimiter Screenshot .............................................................................................. 27
Figure 8: cFosSpeed Screenshot .............................................................................................. 28
Figure 9: Websense Screenshot ............................................................................................... 29
Figure 10: The Java Platform ................................................................................................... 32
Figure 11: Token Bucket Algorithm ........................................................................................ 35
Figure 12: Leakey Bucket Algorithm ...................................................................................... 36
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
10/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Figure 26: Bandwidth Monitor ................................................................................................ 86
Figure 27: Login Page .............................................................................................................. 87
Figure 28: Administrator Dashboard ....................................................................................... 88
Figure 29: User registration page ............................................................................................. 89
Figure 30: Bandwidth Monitor ................................................................................................ 89
Figure 31: Band Width, Traffic Flow Monitor Graph ............................................................. 90
Figure 32: Bandwidth Monitor, Logs ...................................................................................... 90
Figure 33: Network Latency .................................................................................................... 94
Figure 34: Protocol Analyser ................................................................................................... 95
Figure 35: Network Layer Protocol Ratio Graph .................................................................. 100
Figure 36: Network Layer Protocol Ratio Pie Chart ............................................................. 100
Figure 37: Transport Layer Protocol Ratio Pie Chart ............................................................ 102
Figure 38: Network Monitoring tool...................................................................................... 105
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
11/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
List of Appendices
Appendix Title Page
A Project Proposal Form 123
B Project Specification Form 128
C Ethical Form 138
D Gantt chart 144
E Log Sheets 146
F Interviews 150
G Questionnaire 154
H EC Forms 163
I Learning Contract 167
j Class Diagrams 169
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
12/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
ACRONYMS
API Application Programming Interface
ARP Address Resolution Protocol
CIR Committed Information Rate
DBMS Database Management System
DSCP Differential Services Code Point
FTP File Transfer Protocol
Gib/s Gigabits per Second
HTTP Hyper Text Transfer Protocol
HTTPS Hyper Text Transfer Protocol Secure
ICMP Internet Control Message Protocol
IMAP Internet Message Access Protocol
IoE Internet of Things
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
13/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
QoE Quality of Experience
QoS Quality of Service
RAM Random Access Memory
RARP Reverse Address Resolution Protocol
RMI Remote Method Invocation
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SQL Structured Query Language
TCP Transmission Control Protocol
UDP Universal Datagram Protocol
UML Unified Modelling Language
VOIP Voice over Internet Protocol
WAN Wide Area Networks
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
14/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Chapter 1: Introduction to the Study
Society increasingly relies on computing environments ranging from simple home networks,
commonly attached to high speed Internet connections, to the largest enterprise networks
spanning the entire globe. (Nicholas Pappas, 2008) To meet this increasing demand, Grid
computing has been proposed and has quickly become the de facto paradigm in bringing
distributed resources and services together into an integrated virtual environment, where the
heterogeneity of resources is masked using standardized access protocols (Sanjay Hegde et al.
2008).
Since the turn of the new century there has been a large shift into the use of high speed
networks. Subsequently with the growth of business and their need for a permanent presence
online there has been an explosion in the use of High Availability Enterprise Networks. High
speed networks are critical for High Availability Networks allowing business to access data in
real time and allow them to setup shop anywhere in the world. High speed networks are
necessary to accommodate the aggregate traffic generated when many pairs of data sources and
sinks communicate simultaneously. High speed hardware is needed to attain high
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
15/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
in to monitor the bandwidth being used in their network, the amount of traffic and type of
traffic that is traversing through their enterprise network, The Traffic Shaping portion of the
system will help administrators to ensure Quality of Service (QoS) by Prioritizing business
related traffic over the network to non-business related of network for example the system can
prioritize Database requests to their data centres over web streaming traffic that is not core
business of the Bank.
1.1. Background to the project
Available bandwidth is limited and insufficient to meet demand and over the years existing
capacity has been running at maximum volume (Sara Gwynn year). The internet has brought
with it new possibilities for companies and individuals. The term that has become the buzz
word of the twenty first century has been the Internet of Everything (IoE). With the emergenceof the Internet of Everything there is a huge projected increase in the number of devices, clouds,
and devices that will be connecting to the network (Lasser-Raab, 2013). Corporations and
organisations large and small now have a permanent presence on the internet. Business now
takes place more on the internet than in real world. Since the year 2000 there has been a large
i i hi h d k i f i h i d d f
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
16/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Figure 1: Used International Bandwidth, 2002-2020 (Telegeography, 2012)
The Network environment comprises of clients, servers, and data all come in different types,
handling all network connections as a single traffic flow does not give administrators the power
to ensure that business-critical applications perform as required (Blue Coat Systems, 2007).
Managing network bandwidth is a top-of-mind concern for many network engineers today.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
17/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
else trying to work. Clearly, this presents a need to manage bandwidth usage as well as
prioritize network traffic.
It should also be considered that lately a lot of organizations in their bid to cut down costs on
telephony are moving to using VOIP and Video Conferencing over their networks hence the
need to also prioritize such kind of traffic as it is sensitive to delays and jitter.
Other previous studies have shown that network traffic like online streaming and file sharing
are huge consumers of bandwidth. If a user were to stream a video from You Tube using
Hypertext transfer protocol (HTTP) it uses progressive download technique and the video is
played back whilst it is still downloading. The drawback is that if a user pauses the video the
server will continuously send packets even if they are not being used. The apparent drawback
is that if the user decides to terminate the session all stored and un-viewed video in the buffer
is discarded hence wastage of bandwidth that was used in transferring this data. (Domingo-
Pascual, 2011).
A recent study by broadband service company Sandvine estimates that YouTube and Netflix
pooled together account for almost fifty percent of peak-hour download data flow in the United
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
18/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
mirrored on corporate networks and it is imperative that bandwidth be efficiently managed and
all non-core business activities be limited to the minimal usage patterns while prioritising core
business applications traffic over the networks.
There is an ever-increasing need for bandwidth. Companies are growing, adding new offices
and remote sites, using technically advanced and powerful applications, and of course, Internet
usage has exploded in the last two decades. All this point to the undeniable fact that Local Area
Networks (LANs) are in need of bandwidth (IMC Networks, 2002). How much bandwidth is
required depends on each individual company and user, user requirements can change
unexpectedly. However with such use of the networks Bandwidth management has remained
a challenge and a nightmare for all organisations and infrastructure administrators.
New technologies have making inroads onto the global cyber scene pushing up the demand for
more bandwidth in organisations, learning institutions and homes. According to Emulex server
virtualisation, cloud computing, big data and the convergence of storage and data networks
were the key factors adding unprecedented demand for network bandwidth in their datacentres
space.(Venkatraman, 2012)
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
19/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
controlling how bandwidth is used within their networks. Because of the plight of network
engineers and administrators researcher intends to find out how best to resolve the issue of
bandwidth wasted on organizational networks without affecting the user experience as well as
application and network performance.
Real-time streaming and voice protocols frequently present a need for traffic shaping. Controls
are applied to network traffic in order to enhance network performance and to meet service
level guarantees, or increase usable bandwidth. Traffic shaping delays packets that are
classified as relatively unaffected by delays or that meet a specified classification criteria and
flags such traffic as low priority. Traffic shaping also provides users with acceptable voice and
video services at the same time enabling normal network service to proceed for other protocols
(Tittel, 2012).
1.2 Aims and Objectives
1.2.1 Aims
To build a bandwidth management system with the capability of Traffic Shaping throughout
an Enterprise Network.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
20/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
1.2.3 Deliverables
The Bandwidth Management and Traffic Shaping System will be adopted for the Bankingsector which requires high availability reliable networks. The bandwidth management system
will be designed to tackle the problem of bandwidth wastage and abuse in corporate
organizations. The application will be specifically designed for IPv4 Wide Area Networks. The
Bandwidth Management and Traffic Shaping System will feature the following functionality
Allow administrators to login and logout from the application. Allow administrators to view bandwidth usage in real time
Allow administrators to control the traffic, network port or network address
Allow administrator to log peak bandwidth usage
Allow administrators to implement Traffic Shaping and Management
Allow administrators to generate and view Reports
Allow administrators to prioritize traffic based on Traffic Shaping Rules
Allow administrators to manage the Network
1.3 Target user
h f h d id h ill i l b S Ad i i
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
21/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
a special class of embedded systems, where sensors, controllers and actuators are
interconnected using a common bus network architecture.”
The system that is going to be developed by the researcher will look to address some of the day
to day operational challenges that System and Network Administrators face.
1.5 Resources
1.5.1 HardwareMinimum Hardware Requirement for this application
Hard disk: 160 GB
RAM: 1Gb
Processor: Pentium 4
Monitor: 15” color monitor
Mouse: HCL
DVD Drive: LG 52X
Printer: Laser
1.5.2 Software
i i f i f d l f hi li i
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
22/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
1.5.4 Access to information / expertise
The development of the system will require consultation from IT experts who are experiencedin developing web applications and security field. Apart from that, information may be
gathered from interviews and surveys done from Systems and Network Administrators in
industry and the assignment department staffs and lecturers of APU.
1.5.5 User InvolvementDue to the technical nature and know how required to implement and use this system the only
user that will be able to use this system shall be Systems Administrators and Network
Administrators. Regular user shall only be questioned on whether they believe such a systems
will bring required network efficiencies and also their experience after the implementation of
the system.
1.6 Success Criteria
To be successful, the bandwidth monitoring and traffic shaping systems must maximize the
user experience of the maximum number of users for the maximum amount of time. It must do
i h f ili h f ll d l d h b d id h i i d ffi h i f
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
23/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
1.6.2 Integration Testing
The Bandwidth Monitor will then be deployed in a WAN environment and tested for Real-Time Bandwidth Monitoring polls the network interface as frequently as every half second and
reports real-time bandwidth usage and plots this on a graph. Set critical and warning thresholds
to instantly see when usage is out of bounds. When deployed the system should generate
notifications including a list of heavy users and are specially throttled using traffic shaping.
The system should be able to traffic shape and limit bandwidth for protocols such as Ethernet,
IP, TCP, UDP, passive FTP, HTTP, P2P and to Schedule filters for particular day or week
period
1.6.3 Usability Testing
In usability testing the developer will test how easy the user interfaces can be used and whetherthe application is user-friendly or not. In this phase we will use the black box testing technique.
Testing will reveal whether users feel comfortable with the application. In this test we the
researcher will conduct tests on the software of features such as:-
Whether it is easy to use the software.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
24/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
also giving some statistics on growth and projected use of bandwidth in the world today. This
information directly impacts on the business world all around the globe.
Having looked these issues in detail the developer will then move to the next chapter, Domain
and Technical Research. In Domain research the researcher will attempt to look at the findings
by other researchers in connection Bandwidth Management and Traffic Shaping. The
researcher will focus on what can be done to alleviate the problem of bandwidth wastage how
other researcher has tackled the problem in the past and what gaps are there to try and fill in
those gaps.
In Technical Research the researcher will investigate on a number of technical issues before
embarking on the project. The first issue to be looked into will be the Programming Languages.
The developer will compare a set of programming languages in order for him to come up with
the best programming language to develop the software. The researcher will then look at the
some Database Management Systems available for him to deploy with the Bandwidth
Management System, this will be used to store logged data from the systems
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
25/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Chapter 2: Literature review
2.1: Domain research
According to Livingstone (2006) file sharing protocol called bit-torrent now takes up a third of
internet traffic, even by the most conservative estimates. The true figure is probably higher
(Livingstone, 2006). Bit torrents have become a threat to global bandwidth usage. This menace
has become increasingly a cause for concern for administrators who manage large Wide Area
Networks operated by large corporations. Apart from Torrents Administrators have other
internet traffic to worry about which can tend to monopolise the organisations bandwidth there
by crippling their business operations. Administrators have had to turn to Bandwidth
management systems to monitor and track bandwidth usage within their networks. However
over time bandwidth management has become inadequate to manage the bandwidth in these
large networks.
This research aims to look into the issue of Bandwidth management with Traffic Shaping for
Wide Area Networks in large corporation’s setup. Bandwidth management is a complex and
evolving concern for a lot of network operators around the world. Surveys conducted on
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
26/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.1.1 Traffic to be Monitored and Shaped
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
27/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.1.2 Traffic Shaping in Bandwidth Management
Traffic shaping is used in Bandwidth management systems the method delays some or alldatagrams in the network to make them fit a desired traffic profile. It is a form of rate limiting.
That aims to decrease the load on the routers and switch buffers and additionally removes
latency and jitter caused by long queues in the shaper. Traffic shaping technique classifies
traffic flows, then attempts to cap their transmission rates based on preconfigured parameters
(Keneipp, 2001).
2.1.3 Comparison of Traffic Shaping to Traffic Policing
2.1.3.1 Traffic Policing
Traffic policing and traffic shaping are quite similar bandwidth management tools in that they
both examine traffic and then take an action centred on the characteristics of that traffic. The
characteristics may be based on whether the traffic is over or under a given rate, or based on
some bits in the headers The difference between these two techniques is that Traffic Policing
discards any packets on the network that do not conform to the required rules on that network.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
28/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
though it does not control the network core. This can be done in order to smoothen the flow of
datagrams along the network to its ISP, as well as to allocate and manage bandwidth among
applications or departments. In most Enterprise setups the core application of the business tend
to suffer sue to misuse of the available bandwidth accessing streaming sites social networks.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
29/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
physical mediums. Streaming applications transmit and they in most cases specify the
bandwidth they require for reliable successful transmission.
2.1.5 Bandwidth Control Methods and Techniques
2.1.5.1 Simple Network Management Protocol (SNMP)
Simple Network Management Protocol is mainly used for controlling and monitoring network
bandwidth usage on large networks. SNMP is mainly used for collecting information networkconfigured devices such as network switches, routers servers and other devices connected to
the network (Microsoft Corporation, 2003). SNMP makes it easier to manage large Enterprise
networks on which thousands of devices are connected and in most cases are located in
different places. In-order for SNMP to work devices on the network have to have SNMP
enabled on them. Network messages can be initiated by the SNMP Network Management
System (NMS) or by an SNMP enabled network element such as a server (Tech-Faq, 2013)
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
30/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.1.5.2 Packet Sniffing
Sometimes referred to as packet analysers, Packet Sniffers are used for bandwidth monitoring
and control on large Enterprise Networks. Network administrators can use Data gathered by
packet sniffers to see where there are bottle necks or bandwidth wastage on the network
(Bradley, 2012). A packet sniffer captures packets that pass through a given network interface.
Packet sniffers can capture all packets that traverse over a network in a given subnet.
2.1.6 Similar Systems
2.1.6.1 NetLimiter
NetLimiter is a bandwidth management tool that allows users to limit the amount of bandwidth
used by applications that use the network. The application is available Windows based
machines. The application is quite small that on can download it from the internet. The user
interface of the application is quite neat and clean a new user can quick understand it within a
few minutes of installation. However the application seems to be pretty weak in terms of actual
bandwidth management and traffic shaping role. The researcher tried NetLimitter and noted
that apart from being able to configure the rules the user cannot see a graphical representation
of traffic coming through the network. The user can only see which applications are active over
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
31/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Features of Netlimiter
Netlimiter can be integrated with other Bandwidth Monitoring Systems
The administrator can set their own rules for traffic Shaping
NetLimiter can Act as a firewall for a small network
2.1.6.2 cFosSpeed
cFosSpeed is a traffic shaping tool for the Windows based systems. It increases Internet latencyat the same time maintaining impressive transfer rates (cFos Software GmbH, 2014).
cFosSpeed installs itself as a virtual device driver on the Windows TCP/IPfrom this vantage
point it gets access to all traffic coming in and performs layer-7 protocol analysis. The software
is a web based program that ensures that it is as light weight as possible on the host machine.
The drawback with this application is that it is not user friendly and the graphical display forreal time monitoring is too small. Traffic summary is displayed in a list that is fairly easy to
understand
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
32/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.1.6.3 Websense
Websense is a bandwidth monitoring tool used by businesses and government departments to
protect their networks from, malware, and cybercrime and prevents users from inappropriate
content on the internet. It is also used to discourage employees from spending time browsing
non-work-related websites. Websense uses some classification engines, filtering categories,
data fingerprinting to filter out content that is not allowed by an organisations network policy.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
33/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
difficult to detect on the networks because most bandwidth management software available are
not able to detect this new kind of traffic.
The developer understands that it is every network administrators wish to have one solution
that can monitor his network on and off peak hours. They require a system that is able to
identify all kinds of network traffic and log it in a database for example they would want to
know when the application that caused the congestion was launched where it was launched
from. They would also want to prioritise traffic based on the traffics relevance to their
organisation but at the same time the system should be flexible enough to promote or demote
new traffic classes for bandwidth limiting or blocking
2.2: Technical research2.2.1: Programming language
There are a number of software programing languages on the market today. Each Language
has its own strength and weaknesses while some of these programming languages work best in
certain projects and scenarios and may not be the best software development platform for other
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
34/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Popular Software Written in C++
Microsoft Office
VLC Media Player
MySQL Database
Secure Shell
IBM Lotus Notes
Advantages of C++
C++ is a fast programming language and works well for Graphic User Interface
programming on a computer.
C++ is platform Independent
Is a good language for writing operating systems, drivers, and platform dependentapplications?
Is a good language to learn to program with C++ is a good language for both beginners
and engineers?
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
35/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
mechanism delivers a lot of functions to applications. Java developed applications can run in
multiprocessor systems without needing to be reengineered.
Syntax for java is simplified and easy to understand for new software developers. There are
currently virtual machines for UNIX, Windows and Macintosh platforms (TechMetrix
Research, 1999)
Figure 10: The Java Platform
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
36/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Popular Software Written in Java
Skype
Blu-Ray Disc Java
NASA World Wind
Nagios
Advantages of Java
One program can be run on other different platforms. A developer will not need to put
a lot effort developing a different version of software for each platform.
There are quite a lot of programmers who can understand and write code in Java, A lot
of programmers can participate in developing an open source software.
A Java virtual machine prevents an incorrectly written application program fromcausing problems to the rest of computing devices and software.
Disadvantages of Java
Programs written in Java language run in a virtual machine and they tend to run slower
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
37/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
C# type-safe, object-oriented programming language. It has many of the same features as Java,
but it also has language-level support for properties, events, attributes, and interoperability with
other languages. C# also has operator overloading, enumerations, value types, and language
constructs for iterating over collections
Popular Software Written in C#
ATI Display drivers
Internet Relay Code (IRC)
Business Applications
Advantages of C#
When compiled it is converted to an intermediate language (CIL) which is independent
of the language it was developed in or the target architecture and operating system
Automatic garbage collection
Pointers no longer needed (but optional)
C# Source code is more legible because of the Get Set Methods it implements
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
38/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.2.2.1 Token Bucket Algorithm
A Token Bucket is designed like a bucket that can hold up to tokens. These tokens are generated
at a continuous rate per second. These tokens are then added to the bucket if it is not filled
completely. Each packet transmitted on the network must first get a token attached to it from
the token bucket. If the bucket is empty the packet has to wait for a new token to be generated
else the packet is dropped or given a lower priority. A token bucket is able to shape a bursty
data stream.
Below is a diagram showing how Token Bucket Algorithm works
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
39/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Figure 12: Leakey Bucket Algorithm
.
Differences between the two Algorithms are that Leaky bucket only discards packets when its
buffer is full whereas Token bucket algorithm has no or little discard factor. Token Bucket
allows traffic burstiness and Leaky bucket tends to smoothen out the bursty traffic
2.2.2.3 Decision on Algorithm
For this research the developer will use Leaky bucket algorithm this algorithm has been
selected because it ensures a constant flow of packets as long as the bucket is not full to discard
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
40/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
There is a wide variety of database flavours for the developer to choose from and in this section
the developer will attempt to have a look at a handful of these database systems.
2.2.3.1. MariaDB
“MariaDB is a drop-in replacement for MySQL. “ (MariaDB Foundation, 2013). MariaDB is
a community developed database system with roots in MySQL relational database management
system, the motivation being the community preservation of its free status under the GNU GPL.
MariaDB being a side shoot of a well-established open source software system is outstanding
for being headed by the original developers. MariaDB was founded due to concerns over the
acquiring of MySQL by commercial company Oracle.
Limitations of MariaDB
In MariaDB replication executes only through the InnoDB storage engine. Any writes to tables
of other types, tables are not replicated and all tables should have a primary key (MariaDB
Foundation, 2013). Rows in tables without a primary key may appear in a different order on
different nodes.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
41/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.2.3.2 MySQL
MySQL database is primarily used web applications. MySQL database comes with a Graphical
User Interface called the Workbench which gives developers the power to visualise their
database while still developing and administering it. However it also provides a Command Line
Interface. MySQL has been tested and works on many platforms including Windows though it
was natively developed for Linux based systems
MySQL gives developers the flexibility to be built and installed entirely from its source code
this gives developers and administrators to install only the features that they need for their
system and ignore everything else they do not need
The MySQL is a client/server system made up of multi-threaded SQL server that supports
different back ends, several different client programs and libraries, administrative tools, and a
wide range of application programming interfaces (APIs) (MySQL, 2014)
Advantages of MySQL
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
42/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
2.2.3.3 SQL Server
SQL Server is a relational Database management system developed and maintained by
Microsoft Corporation. Unlike MySQL and MariaDB, SQL Server is not free. The user has to
pay for an annual license to have rights to use the software.
SQL Server comes with a Graphic User Interface and also has a command line user Interface.
SQL Server is a powerful DBMS that mostly runs on server platforms. The Syntax is readable
and easy to understand. SQL server can support multi-server transactions. The DBMS offers
greater security and stability (David Solomon, 1998)
2.2.3.4 Comparison of DBM Systems
MariaDB MySQL SQL Server
License Required No Yes and No Yes
Works on Windows
Platform
Yes Yes Yes
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
43/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
this would delay or derail the entire project. Since Using Waterfall Methodology for system
development it would be far more convenient for the developer to use a tried and tested system
without risking failure to deliver the project on schedule
.
2.2.4: System development methodology
A system development methodology is a framework used to design, plan, and control the
process of developing an information system (CMS, 2005). There is a lot of such frameworks
that have been developed and have changed over the years, each System Development
Methodology has its distinguished strengths and weaknesses below the researcher will attempt
to look at a few selected System Development Methodologies
2.2.4.1 Agile Methodology
Agile concentrates on flexibility and reaction time to changing requirements and promotes
development iterations, open collaboration, and process adaptability throughout the life-cycle
of the project (IT Unlock, n.d.) With Agile development is done in small incremental phases,
with little planning, unlike planning at length like in Waterfall Methodology
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
44/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Initiation of the Project: Initiation involves setting up the plan, specifying the business needs,
freezing the requirements from the users’ then team a team of developers is setup to work on
the project and preparing initial architecture modelling. Customer participation is the mainstay
of agile methodology, and constant updates and communication with less documentation are
the typical features of agile development environment. In Agile methodology development
teams work in closely together and are most often located in the same geographical location.
With an agile model, all aspects of development that is requirements, design, etc. are
continually revisited throughout the lifecycle of the project. When the development team stops
and re-evaluates the direction of their project every once in a while this ensures that they have
time to steer the project in another direction that the customer wants. This is a repetitive phase
which involves active client participation, demanding and concerted development by
professionals, and addition of new features upon requirement, and investigative testing, and
internal deployment of software. Agile methods are widely used in the software development
industry; however, this approach may not always be appropriate for all products.
Release of the product: This stage involves final system testing, final user acceptance testing,
and deployment of system into production and regular and updated delivery of software which
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
45/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
With Agile methodology it is difficult to assess the effort required for large software
developments at the beginning of the software development life cycle.
Agile lacks emphasis on designing and documentation.
The projects often go off track if the customer is not clear what final outcome they
want.
Agile is not ideal for newbie programmers, unless pooled with experienced
programmers and enough resources.
2.2.4.2 Waterfall Methodology
The waterfall methodology is one of the earliest approaches that was used for software
development. Software projects followed the waterfall approach because they did not focus on
changing requirements (Choudhury, 2011). However a further study on the methodology
reveals that the rate of change in world has increased dramatically over the last 30 years and
particularly over the past 10 years. Though old the methodology is still very usefully and
effective depending on the project.
Waterfall accepts that it is probable to have a good understanding of all the requirements from
the start of a software development project. However in software development, stakeholders
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
46/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Waterfall Methodology is simple and easy to understand and use
Easy to manage due to the rigidity of the model. All phases have specific deliverables
and a review process.
Phases are processed and completed one at a time.
Works well for smaller projects where requirements are very well understood.
Clearly defined stages.
Well understood milestones. Easy to arrange tasks.
Process and results are well documented.
Disadvantages of Waterfall Methodology
No working software is produced until late during the life cycle. High risk and uncertainty.
Not a good model for complex and object-oriented projects.
Poor model for long and ongoing projects.
Not ideal for projects whose requirements are at high risk of changing.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
47/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Figure 15: Prototyping Methodology
(Adi, 2008)
Prototyping is mainly used when the business process is expected to be changed as the project
proceeds or when the project sponsor has little idea of what system to be built. Analysis, Plan,
and Implementation stages are carried out concurrently and each series results in a system
prototype that is presented to the project owner. The cycle repeated frequently based on the
sponsor comments until the prototype successfully meets the requirements (Adi, 2008). The
final prototype to be developed and approved by the project owner is then referred to as the
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
48/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
specifications or the conversion of limited prototypes into poorly engineered final
projects that are hard to maintain.
Users may think that the prototype, intended to be thrown away, is the final system
that only is left to be finished or polished
Developers may assume that users share their objectives without understanding wider
commercial issues. Users might believe they can demand auditing on every field,
whereas developers might think this is feature creep because they have made
assumptions about the extent of user requirements.
Developers may become attached to prototypes they spent a great deal of effort
developing this can lead to problems like attempting to convert a limited prototype into
a final system when it does not have an appropriate underlying architecture
2.2.4.5 Methodology Decision
As an inexperienced developer the researcher will use the Waterfall methodology in the
development of the Bandwidth Management System with Traffic Shaping for High
Availability Enterprise Networks. The choice of the model is due to the fact that Waterfall
model although old would give the researcher clear and guided steps to fulfil the project at
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
49/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
customer requirements. At this stage an alternative solution is also considered for the customer
requirements and the cost benefit analysis of the system is drawn up.
2.2.5 Architecture
Figure 16: Architecture
2.3 Conclusion
From the research above it has become apparent to the developer that a lot of bandwidth in
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
50/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
expectations. One of the strengths of Waterfall methodology that the developer intends to take
advantage of is proper and detailed documentation from project initiation
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
51/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Chapter 3: Research methods
The researcher has chosen to use a two pronged approach for research methods and information
gathering. According to Kristie Siegel, in research there is need to get at least one interview
from a person who relates to the research topic. The researcher will first hold interviews with
Experts and Technical people in the area of network management and systems administration.
The researcher believes that these people have better understanding and knowledge with
regards to Bandwidth Management and Traffic Shaping. These technical people and engineers
have a better understanding of the network environment and how Bandwidth wastage affects
business applications. The researcher will also invite ordinary users from all walks of life to
participate in a questionnaire so as to gather a clear view of how users use their internet
connections what sites they visit the most and any other activities they get up to when they are
on the internet
3.1 Interview Questions and Justification
Q1. How many computers and users do you have in your LAN or WAN network?
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
52/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Q5. Does your organisation use Skype or any other VOIP service for official business? If
yes how much bandwidth does it consume on a scale of 1 to 10, ten being the highest
Objective: To ascertain whether the organisation uses VOIP or IP based video conferencing
as a means of communication this has an effect on bandwidth usage for the particular
organisations
Q6. How does bandwidth wastage impact your business operations?
Objective: To determine the actual effects of bandwidth wastage on the core business
applications and how other users are affected
Q7. How do you deter bandwidth wasting in your LAN or WAN network?
Objective: To find out if the organisation has implemented any form of bandwidth
management system to curb bandwidth wastage
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
53/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
3.2 Questionnaire
1. What is your Gender?
(i) Male
(ii) Female
Objective: To determine the gender of the participant
2. What is your age?
(i) 15 -20years
(ii) 21 -25years
(iii) 26 - 30years
(iv) 31 - 35years
(v) 35 - 40years
(vi) 41 years and above
Objective: To determine the age of the participant an draw up a demography map
3. If you are a student, how many students are enrolled at your learning institution?
(i) 100 and less
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
54/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Objective: To determine the whether the participant is employed and if yes how many people
work at his work place so as to try and draw up the possible size of the network
5. If you are neither employed nor a student how do you access the internet? Check all
that apply?
(i) At Home
(ii) Mobile Data plan (Smart Phones or Tablets)
(iii) Internet cafe or Public Access points
(iv) Friends or relatives home or office
(v) Other:
Objective: To determine how unemployed participants who are also not in school access the
internet
6. If you are neither employed nor a student how do you access the internet? Check all
that apply
(i) at Home
(ii) Mobile Data plan (Smart Phones or Tablets)
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
55/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
8. How would you rate the network speed at your school campus, work place or whichever
way you access the internet?
(i) Very slow
(ii) Slow
(iii) Neither fast nor slow
(iv) Fast
(v) Very fast
Objective: To determine how fast or slow the participants internet access is which will further
the researcher to gain more insights into the user behaviour
9. Which sites do you often visit on the internet? *Select all that apply
(i) Facebook
(ii) Twitter
(iii) You Tube
(iv) Google
(v) LinkedIn
(vi) Other:
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
56/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
(ii) 6 - 10 times per week
(iii) More than 11 times every week
Objective: To determine how often participants download content from the internet
13. How much data or content do you download from the internet per week? *
(i) 1 Gigabyte or less
(ii) 1 to 5 Gigabytes
(iii) 5.1 to 10 Gigabytes
(iv) Over 11 Gigabytes
Objective: To determine how much content participants down load from the internet. This will
help the researcher in the analysis phase to draw up conclusions how much downloading
content affects network performance
14. Where do you normally carry out you downloads? *
(i) At home
(iii) At work
(iii) At school
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
57/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
16. Do you use Skype or any other VOIP service for official business over your network?
(i) Yes
(ii) No
Objective: To determine whether participants use any VOIP or Video Conferencing services
on their network
17. Have you ever failed to carry out any important work due to a slow network or low
bandwidth? *
(i) Yes
(ii) No
Objective: To determine whether participants are affected by low bandwidth due to abuse and
heavy usage. This will help the researcher to get suggestions in next questions from ordinary
users on how bandwidth wastage can be avoided
18. If you answered yes to the previous question how was the issue resolved?
Objective: To find out from users how they normally resolve such kind of problems and to
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
58/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
(iv) Disagree
(v) Strongly Disagree
Objective: To determine whether ordinary users understand that streaming sites and file
sharing consumes a lot of bandwidth and that this also affects them as users
21. Bandwidth should be managed and important applications given priority over the
network?
(i) Strongly agree
(ii) Agree
(iii) I do not know
(iv) Disagree
(v) Strongly disagree
Objective: To determine whether ordinary users understand why bandwidth should be
managed. This will help the researcher to gain knowledge on what applications users
felt should be blocked on networks
22. Which applications do you think should be restricted and managed on corporate or
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
59/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
23. How would you rate your I.T. skills? *
1 2 3 4 5
Beginner Expert
Objective: To determine how proficient the user is in understanding Information Technology,
its functions and drawbacks. Some users may not know and need to be educated
24. Any suggestion on Bandwidth management in Enterprise networks?
Objective: To try and get some tips, guidance and suggestions on how the think a network
should perform and how to limit bandwidth wastage on the LAN.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
60/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Chapter 4: Analysis
In this chapter the researcher will? A detailed analysis of the responses received from theInterviewees. The researcher had to send the questions to the interviewees by email and
received back the responses. Because of the lack of face to face interview facility. The
researcher had to wait a couple of days for some of the responses thus some of the questions
received one word answers which the researcher could not further probe to get a more clear
and definite answer.
4.1 Interviews Analysis
Q1. How many computers and users do you have in your LAN or WAN network?
Interviewee
1
200 Computers and 500+ Users
Interviewee
2
1500 pcs and the same for users
Interviewee
3
600 computers and servers and around 480 users.
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
61/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
The interviewees high light that in their individual organisations they indeed face a lot of
problems when it comes to bandwidth management. Whether it’s a very large organization
or a small school bandwidth wastage indeed affects their operations negatively. In this regard
the interview confirms that bandwidth must be managed.
Q3. What are the most visited websites from you organisations LAN or WAN users?
Interviewee
1
Google, Wikipedia, herald.co.zw, newsday.co.zw, zimbabwesituation.com
Wikipedia,
Interviewee
2
Facebook, Yahoo, App store
Interviewee
3
Business, academic/educational and social sites especially Facebook
Interviewee
4
The most visited websites are www.google.com,
www.bernardmizeki.co.zw, www.facebook.com, www.zimsec.co.zw,
www.gmail.com
For most of the interviewees the most popular sites that are visited in their local area
networks or Wide Area Networks have absolutely nothing to do with their operations. This
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
62/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
have said that they also worry about how bandwidth wastage affects their clients which are
other departments within their organisations. One Interviewee went on to say that
information and data from their clients is slowed down by lack of bandwidth
Q5. Does your organisation use Skype or any other VOIP service for official
business? If yes how much bandwidth does it consume on a scale of 1 to 10, ten being
the highest
Interviewee
1
No
Interviewee
2
All meeting rooms have video conferencing facilities. This consumes about
2Gbps
Interviewee
3
No
Interviewee
4
No
As revealed by the interviewees most organisations have not yet embraced VOIP which
means that they do not have to worry about Quality of Service (QoS) at the moment but
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
63/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
interviewee also hinted that based on their industry which is financial services bandwidth
affects them so much that data and information flowing from other financial institutions is
delayed which should not be the case
Q7. How do you deter bandwidth wasting in your LAN or WAN network?
Interviewee
1
Setup of a Linux Gateway Proxy running Squid and Dan guardian Content
Filter, we cannot afford a turnkey bandwidth monitoring solution
Interviewee
2
We block sites which are causing bandwidth problems using Web sense.
Interviewee
3
At first we had restrictions on internet access by users and latter blocked
social sites but users circumvented that and so we started an educational
campaign to explain what we are facing and the results thereof.
Interviewee
4
As of now we limiting internet access but very soon we will be installing
some security software which will bar access to some sites
Some of the organisations represented by interviewees have expressed that they cannot
afford off the shelf solutions for bandwidth management systems. While some who have the
financial capacity have also indicated that they are looking for a solution to implement within
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
64/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
bandwidth as long as there is no other network traffic hogging the connection consuming all
the available bandwidth
Q9. Are you satisfied with your current bandwidth management or monitoring
system?
Interviewee
1
No
Interviewee
2
Yes
Interviewee
3
No. we are actually looking for an effective one.
Interviewee
4
No
The majority of interviewees pointed out that they are not satisfied with the performance of
the current bandwidth management systems. Only one interview expressed satisfaction at
their solution for bandwidth management. Some indicated earlier that they cannot afford an
off the shelf system. This means that there are not enough systems developed to cater for the
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
65/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
4.2 Questionnaire Analysis
1. What is your Gender?
The figure above shows that about 41 males responded to the questionnaire and 24females
participated too. The researcher would have wanted a scenario where both sexes where equal
to give a balanced and clear view of the respondents views
2. What is your age?
Male 41 63%
Female 24 37%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
66/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Question 3 mainly targeted students to determine how many pupils were enrolled at their
learning institution majority of the students responded that there is more than 5001 students
enrolled at their schools which would translate to huge IT infrastructure investments at their
campuses
If you are employed, how many people work at your organisation?
100 and less 14 22%
101 to 500 3 5%
501 to 1000 4 6%
1001 to 5000 8 12%
over 5001 17 26%
100 and less 22 34%
101 to 500 7 11%
501 to 1000 4 6%
1001 to 5000 6 9%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
67/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
4. If you are neither employed nor a student how do you access the internet?
People may select more than one checkbox, so percentages
may add up to more than 100%.
In question 5, 18 of the unemployed respondents said that they access the internet at
home and while 53% percent also have access to the internet through mobile data plan.
It must be noted that for this question respondents could pick more than one choice
hence the figures exceeded 100%
5. How would you rate the network speed at your school campus, work place or
whichever way you access the internet?
at Home 18 56%
Mobile Data plan (Smart Phones
or Tablets)
17 53%
Internet cafe or Public
Access points
6 19%
Friends or relatives home
or office
6 19%
Other 4 13%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
68/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
6. Which sites do you often visit on the internet?
As shown in the figure above the search engine Google followed by Facebook are the most
visited sites in all spheres whether by students, employees and the unemployed. YouTube
comes third.
7. How often do you visit streaming sites like You Tube, Spotify, and Sound Cloud
etc.?
Facebook 47 72%
Twitter 9 14%
You Tube 41 63%
Google 52 80%
LinkedIn 13 20%
Other 13 20%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
69/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
In the figure above we can see that a staggering 94% of the respondents reported that they
download content from the internet
9. If you answered yes to previous question, how often?
Question 10 continues from the previous question and the numbers are further broken
down to reveal that 43% download some content between one and five days per week.
We also note that the heavy users who download over eleven times a week slightly
outnumber the medium users by about 2%
1 - 5 times per week 28 43%
6 - 10 times per
Week
14 22%
More than 11 times
every week
16 25%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
70/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
11. Where do you normally carry out you downloads?
People may select more than one checkbox, so percentages may add up to more than 100%.
This question confirmed the researcher that quite a significant number of respondents do
carryout downloads in school networks and work LANs even though the most downloads
are done at home. Surprisingly fewer people reported to using public access point or
Internet cafes for downloads
12. What kind of content do you often download from the internet?
at home 41 63%
At work 28 43%
At school 13 20%
Public access points
or internet cafe
8 12%
Other 0 0%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
71/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
13. Do you use Skype or any other VOIP service for official business over your
network?
As shown in the diagram above 65% of the respondents use skype regularly this has an
effect on the network which the researcher is trying to address in this research
14. Have you ever failed to carry out any important work due to a slow network or
low bandwidth?
Yes 42 65%
No 23 35%
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
72/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
hours to send 1 email.
A few respondents reported how they resolved a network or low bandwidth problem. A
number of them said they would restart the router to try and kill download processes going
on.
16. Streaming sites like You Tube and Peer to Peer file sharing affects the network
speed and performance, they disadvantage other users
In question 17 a number of respondents 49% agreed while 25% strongly agreed with the
researcher that streaming and peer to peer file sharing slows down the internet and affects
other users.
Strongly agree 16 25%
Agree 32 49%
I do not know 13 20%
Disagree 4 6%
Strongly Disagree 0 0%
d id h i h ffi Sh i f i h A il bili
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
73/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
18. Bandwidth should be managed and important applications given priority over
the network?
41% of respondents strongly agreed that bandwidth is scarce and expensive that it should
be managed. 3% disagreed to this possibly because they have never been affected by
bandwidth wastage
19. Which applications do you think should be restricted and managed on corporate
or school Networks?
Strongly agree 27 42%
Agree 23 35%
I do not know 7 11%
Disagree 5 8%
Strongly disagree 2 3%
Peer to Peer traffic
(e.g. torrents file sharing)
37 57%
B d id h M i h T ffi Sh i f Hi h A il bili
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
74/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
20. How would you rate your I.T. skills?
In this question respondents highlighted
their IT skills and proficiency in the field or just general knowledge 37% reported that
their IT skills were just average and by looking at the diagram it shows a normal
distribution curve slightly skewed towards the right possibly because most respondents
have a bit more IT knowledge than the researcher anticipated.
21. Any suggestion on Bandwidth management in Enterprise networks?
i) identify bandwidth usage by IP address and port number
1
-
Beginner 3 5%
2 11 17%
3 24 37%
4 18 28%5
-
Expert 9 14%
B d idth M t ith T ffi Sh i f Hi h A il bilit
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
75/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
sometimes do not have some features which would help the systems administrators to
effectively manage bandwidth use in their organisations
4.3.2 Questionnaire
Respondents to the questionnaire were mostly students who majority of them alluded to the
fact that they do download or use some applications that use a lot of bandwidth on the networks
whether at home or at School. Some of the respondents were working class who also indicated
the same patterns of network usage. The questionnaire provided the researcher with
information on the most use social network sites and content that is downloaded from the
internet. Most of the downloads are done through peer to peer networks and this indicates that
the researcher has to also focus on limiting peer to peer file sharing as these are the most
common used platform which is well known and documented to waste bandwidth. A number
of the respondents expressed that they have some knowledge of how bandwidth wastage affects
the normal operation of critical systems especially in large organisations whose operations rely
on reliable exchange of data.
B d idth M t ith T ffi Sh i f Hi h A il bilit
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
76/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Chapter 5: Design
In system design the developer visualizes the complete system using some techniques and toolsdeveloped for systems development. The most used tool for system development is Unified
Modeling Language (UML).
UML was adopted as a standard by the object management group in 1997 and is ISO approved
5.1: System design5.1.1 Use Case Diagram
The use case diagram below shows the interaction between actors and the system, there are two
actors in the system. The administrator can login, register users, add and edit servers and client
machines, set bandwidth use limit, capture packets, view logs, initiate network monitoring and
view reports. The other actor which is the user can only login into the system. Ordinary users
do not have any other specific role in this systems as it is built to monitor their network usage
activities especially bandwidth usage
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
77/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
78/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
All TCP, ARP, UDP and ICMP, traffic will be captured and executed thus transformed into
understandable language which will be displayed on the capture window. If the number of
packets to a given destination exceeds the set value they will be dropped .this is done by
blocking the destination name from communicating with the local hosts this is done using
AnyWebLock.
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
79/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
80/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
5.1.3 Data Flow Diagram
Data flow diagram illustrates the different process and how data flows from one process to
another.
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
81/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
mode (a network device is able to intercept and read each network packet that arrives in its
entirety.).Now the host machine is able to capture all network traffic on that particular interface.
Than the administrator is able to determine the network traffic flow and the different protocols
used at that particular time since the host machine or device is able to capture all traffic from
and to the entire hosts on the network.
The Administrator now is able to determine the different irrelevant destinations by matching
the different Internet Protocols captured and those stored in the database after which all packets
to that given destination can be blocked hence improving the efficiency of the network. After
all the captures the administrator is able to save the captures for further analysis.
5.1.4 Sequence Diagrams
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
82/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
Figure 21: Bandwidth management sequence diagram
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
83/173
Bandwidth Management with Traffic Shaping for High AvailabilityEnterprise Networks
or modified in the future. To achieve a good database design the developer follows the stages
detailed below in coming up with a comprehensive database for the bandwidth management
system
5.2.1 Database Tables
The tables below shows the attributes of each table that will be in the database
Administrator Table
Primary Key
Foreign Key Foreign Key
administrator_iduser_namelast_namefirst_nameemailPasswordaddress
client_idserver_idtimestamp
User Table
Primary Key user_id
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
84/173
g p g g yEnterprise Networks
Foreign KeyForeign Key
client_nameclient_statususer_idadministrator_idtimestamp
Bandwidth Table
Primary Key
Foreign KeyForeign Key
event_idlog_id
mac_addressip_addressmachine_namestatustotal_uploadtotal_downloadtime_stamp
Reports Table
Primary KeyForeign KeyForeign Key
report_idevent_idmac_addressip_addressuser name
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
85/173
g p g g yEnterprise Networks
Figure 23: Entity Relationship Diagram for Bandwidth Manager Database
Bandwidth Management with Traffic Shaping for High Availability
-
8/17/2019 Bandwidth Management with Traffic Shaping for High Availability Enterprise Networks
86/173
g p g g yEnterprise Networks
User Table Data Dictionary