internet usage behavior to determine network performance

23
INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE : CASE STUDY IN POLYTECHNIC TUANKU SYED SIRAJUDDIN NETWORK VIRAKWAN AD HA1 KELIAN UNIVERSlTl UTARA MALAYSIA 201 1 brought to you by CORE View metadata, citation and similar papers at core.ac.uk provided by Universiti Utara Malaysia: UUM eTheses

Upload: others

Post on 05-Dec-2021

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK

PERFORMANCE : CASE STUDY IN POLYTECHNIC

TUANKU SYED SIRAJUDDIN NETWORK

VIRAKWAN AD HA1 KELIAN

UNIVERSlTl UTARA MALAYSIA 201 1

brought to you by COREView metadata, citation and similar papers at core.ac.uk

provided by Universiti Utara Malaysia: UUM eTheses

Page 2: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

KOLEJ SASTERA DAN SAINS (College of Arts and Sciences)

Universiti Utara Malaysia

PERAKUAN KERJA KERTAS PROJEK (Certificate of Project Paper)

Saya, yang bertandatangan, memperakukan bahawa (I, the undersigned, certijies that)

-AN A/P HAI KELIAN i800355)

calon untuk Ij azah (candidate for the degree on MSc. (Information Technologv)

telah mengemukakan kertas projek yang bertajuk (has presented his/herproject of the following title)

INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE : CASE STUDY IN POZYTECHNIC TUANKU SYED SIRAJUDDIN NETWORK

seperti yang tercatat di muka surat tajuk dan kulit kertas projek (as it appears on the title page and front cover of project)

I

bahalva kertas projek tersebut boleh diterima dari segi bentuk serta kandungan dan meliputi bidang ilmu dengan memuaskan. (that this project is in acceptable form and content, and that a satisfactory knowledge of the field is covered by the project).

Nama Penyelia (Name of Supervisor) : DR. MASSUDI MAHMUDDIN GT& , ,\ , .-I * I L

,

Tandatangan (Signature) Tarikh (Date) : z/%,,?a 1 1

Nama Penilai (Name of Evaluator) :

Tandatangan (Signature) arikh (Date) :

Page 3: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK

PERFORMANCE : CASE STUDY IN POLYTECHNIC

TUANKU SYED SIRAJUDDIN NETWORK

A project submitted to Dean of Research and Postgraduate Studies Office in partial Fulfillment of the requirement for the degree Master of Science Information Technology

Universiti Utara Malaysia

BY Virakwan AIP Hai Kelian

Page 4: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

PERMISSION TO USE

In presenting this project in partial fulfillment of the requirements for a postgraduate degree fiom Universiti Utara Malaysia, I agree that the University Library may make it freely available for inspection. I further agree that permission for copying of this project in any manner, in whole or in part, for scholarly purpose may be granted by my supervisor(s) or, in their absence by the Dean of Postgraduate and Research. It is understood that any copying or publication or use of this project or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to Universiti Utara Malaysia for any scholarly use which may be made of any material from my project.

Requests for permission to copy or to make other use of materials in this project, in whole or in part, should be addressed to

Dean of Research and Postgraduate Studies College of Arts and Sciences

Universiti Utara Malaysia 060 10 UUM Sintok Kedah Darul Arnan

Malaysia

Page 5: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

ABSTRAK

Kebanyakkan institusi termasuk institusi pendidikan amat bergantung kepada

rangkaian untuk menyebarkan maklurnat serta menyiapkan kerja. Politeknik Tuanku

Syed Sirajuddin (PTSS) merupakan institusi pendidikan yang menggunakan

rangkaian untuk tujuan pendidikan serta operasi institusi dapat dilaksanakan dengan

efektif. Walaubagaimanapun, operasi yang efektif di PTSS terjejas disebabkan oleh

prestasi rangkaian yang semakin lemah. Untuk mengekalkan kadar yang efektif,

adalah penting untuk mengawasi bagaimana sistem rangkaian berfungsi dan

digunakan oleh pengguna. Tinjauan awal mendapati masalah yang mungkin memberi

impak kepada jalur lebar rangkaian ialah sikap buruk pengguna. Untuk menangani

masalah tersebut, alat pengawasan rangkaian Cymphonix telah digunakan dalam

kajian ini untuk mengawasi rangkaian. Kajian ini hanya fokus kepada rangkaian

VLAN 20. Pengawasan dilaksanakan sepanjang lima hari bekerja dalam tempoh

semester pembelajaran pada masa waktu bekerja. Data utama yang diambil dari alat

pengawasan dalam kajian ini ialah trafik Internet, jalur lebar aplikasi serta jenis-jenis

aplikasi yang wujud. Data-data tersebut dianalisis untuk mengenalpasti jenis-jenis

aplikasi Internet dan kaitkannya dengan tabiat pengguna rangkaian. Hasil daripada

kajian mendapati trafik aplikasi Internet di rangkaian VLAN 20 adalah sentiasa

berubah-ubah pada setiap hari. Kebanyakkan trafik adalah dari aplikasi HTTP.

Aktiviti utama pengguna dalam VLAN 20 ialah melayari web dan memuat turun fail.

Malah, trafik dari aplikasi yang boleh menyebabkan penggunaan rangkaian menjadi

lemah seperti P2P dan media streaming tidak menunjukkan kadar pengguaan jalur

lebar yang banyak. Ini menunjukkan bahawa tabiat pengguna dalam rangkaian

VLAN 20 bukan merupakan faktor utama yang menyebabkan penggunaan rangkaian

di PTSS menjadi lemah. Walaubagaimanapun, kajian lanjut perlu dilaksanakan untuk

mengenalpasti penyebab utama yang menyumbang kepada masalah rangkaian di

PTSS seperti menggunakan alat pengawasan yang boleh membaca semua jenis

traffik yang tidak dikenali serta melaksanakan kajian ke atas rangkaian VLAN yang

lain di PTSS untuk menilai samaada pengguna dalam rangkaian VLAN tersebut

memberi kesan negatif kepada penggunaan rangkaian di PTSS.

Page 6: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

ABSTRACT

Most of the institutions included education institutions heavily rely on networks to

distribute information and to get job done. Polytechnic Tuanku Syed Sirajuddin

(PTSS) is one of the educational institution that used network for educational and for

effectiveness of institution operational. However, the effectiveness of PTSS

operational was disturbed due to the network performance become slowly. To

maintain the effectiveness, it is important to monitor how the network system

working and used by users. The early observation found that, one of the possible

problems impacts the network performance is users bad behavior. To overcome the

problems, Cymphonix network monitoring tool used in this study to monitor the

network. This study only focuses on network VLAN 20. Monitoring was done during

five working days in semester study within office working hours. The main data

capture from monitoring tool used in this study are total Internet traffic, application

bandwidth and types of application that appear in the network VLAN 20. The data

captured were analyzed to identify the Internet application types and relate it to the

behavior of the network users. Result from the study indicates that Internet

application traffic in network VLAN 20 is fluctuating for every day. Most of the

traffic is from HTTP application. Main activities of users in network VLAN 20 is

only web browsing and download files. Moreover, the traffic of application that can

causes of network performance become slow such as P2P and streaming media are

not much consume the range of bandwidth. This is shows that behavior of the users

in network VLAN 20 is not main factors that cause network performance in PTSS

slow. However, there are some further studies required to identify main causes that

contribute to the network problems in PTSS such as used other type of tool that

enable to capture all the uncategorized traffic and study on other VLAN network in

PTSS to evaluate whether users in that VLAN network causes negative impact to the

performance of network in PTSS.

Page 7: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

ACKNOWLEDGEMENT

I am heartily thankhl to my project supervisor, Dr. Massudi Bin Mahmuddin for his

guidance, valuable suggestions, kindness and promptness in reviewing my final

project. His guidance helped me in all the time to study and writing of this report.

I would also like to thank and highly appreciate to Mr. Muhammad Hafiz Bin Razi,

Head of Unit of Information Technology & Communication (UITC) in PTSS for his

help, suggestion and guidance for me to complete this study. I thank to the

coordinators for the post-graduates studies at the Information Technology Faculty of

Universiti Utara Malaysia for their continuous help. My sincere thanks also go to my

colleagues in PTSS for their encouragement and help.

I am deeply and forever indebted to my family and my fiance for their love, support,

encouragement and understanding.

Lastly, I offer my regards and blessings to all of those who supported me in any

respect during the completion of this project.

Page 8: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

TABLE OF CONTENTS

Pages

PERMISSION TO USE

ABSTRACT

ACKNOWLEDGMENTS

TABLE OF CONTENTS

LIST OF TABLE

LIST OF FIGURES

ABBREVIATION

CHAPTER ONE : INTRODUCTION

Introduction

Motivation of Study

Problem Statement

Research Questions

Research Objectives

Scope of Study

Significant Of Study

Organization of Report

Summary

CHAPTER TWO : LITERATURE REVIEW

2.0 Introduction

2.1 Network Performance

2.1.1 Network Performance Parameters

2.2 Network Performance Monitoring

2.3 Network Monitoring Tool

2.3.1 Cymphonix Network Composer

2.3.1.1 Cymphonix Network Composer Main Features

iv

v . . .

Vll l

ix

xi

Page 9: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

2.4 Internet Application Traffic

2.5 Network Users Behavior

2.5.1 Relationship between Network User Behavior

And Network Performance

2.6 Summary

CHAPTER THREE : RESEARCH METHOD

3.0 Introduction

3.1 Problem Identification

3.2 Initial Assessment

3.2.1 Network VLAN 20

3.2.2 Network Monitoring Tool

3.2.3 Data from the Network Monitoring Tool

3.3 Perform Monitoring

3.3.1 Setup Monitoring Tool

3.4 Definition of an Event

3.4.1 Report of Network Users

3.4.2 Application Traffic

3.4.3 Threats on Network

3.4.4 Internet Usage

3.4.5 System Reports

3.4.6 Dashboard

3.5 Analysis of Data

3.6 Summary

CHAPTER FOUR : ANALYSIS OF DATA

4.0 Introduction

4.1 Total of Network Traffic

4.2 Total Amount of Bandwidth Consumed By Applications

4.3 Types of Application Most Used By Users

4.3.1 Hypertext Transfer Protocol (HTTP)

4.3.2 Uncategorized

Page 10: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

4.3.3 Virtual Private Network (VPN) And Tunnel

4.3.4 Peer-To-Peer File Sharing

4.3.5 Streaming Media

4.3.6 Network Basic Input/Output System (NetBIOS)

4.3.7 File Transfer Protocol (FTP)

4.3.8 EmaiVCollaboration

4.3.9 Internet Control Message Protocol (ICMP)

4.3.10 Domain Name Service (DNS)

4.4 Behavior of Network Users

4.5 Summary

CHAPTER FIVE : CONCLUSION AND RECOMMENDATION

5.1 Conclusion

5.1.1 Types of Internet Application on Network VLAN 20

5.1.2 Users Behavior on Network VLAN20

5.2 Recommendation

REFERENCES

vii

Page 11: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

LIST OF TABLES

Pages

Table 2.1 :

Table 2.2 :

Table 2.3 :

Table 3.1 :

Table 3.2 :

Table 3.3 :

Table 3.4 :

Table 3.5 :

Table 4.1 :

The famous tools used in United Kingdom

network project

Comparison between Cymphonix and Barracuda

Time spend by users on Internet activities

Types and description of data captured by Cymphonix

Types and description of data on network user

Application types and description

captured by Cymphonix

Types of threats and description

captured by Cymphonix

Types of reports and description

captured by Cymphonix

Total bandwidth of application sets

Page 12: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

LIST OF FIGURES

Pages

Figure 2.1 :

Figure 3.1 :

Figure 3.2 :

Figure 3.3 :

Figure 3.4 :

Figure 3.5 :

Figure 4.1 :

Figure 4.2 :

Figure 4.3 :

Figure 4.4 :

Figure 4.5 :

Figure 4.6 :

Figure 4.7 :

Figure 4.8 :

Figure 4.9 :

Figure 4.10 :

Figure 4.1 1 :

Figure 4.12 :

Figure 4.13 :

Figure 4.14 :

Figure 4.15 :

Figure 4.16 :

Figure 4.17 :

Figure 4.18 :

Figure 4.19 :

Relationship between end user behaviors,

network performance and

General Research Method

Internet bandwidth in PTSS

Main VLAN network connection in PTSS

Network Composer Cymphonix set up

Analysis framework

Total of traffic in Day 1

Total of upload and download traffic in Day 1

Total of traffic in Day 2

Total of upload and download traffic in Day 2

Total of traffic in Day 3

Total of upload and download traffic in Day 3

Total of traffic in Day 4

Total of upload and download traffic in Day 4

Total of traffic in Day 5

Total of upload and download traffic in Day 5

Total of upload and download traffic in PTSS from

Day 1 to Day 5

Bandwidth consumed by Applications in Day 1 49

Bandwidth consumed by Applications in Day 2 50

Bandwidth consumed by Applications in Day 3 5 1

Bandwidth consumed by applications in day 4 5 1

Bandwidth consumed by applications in day 5 52

Summarization of bandwidth usage by application 53

sets from day 1 until day 5

Total of Bandwidth consumed by applications in PTSS from 55

Day 1 to Day 5

Summarization of Website category requested 56

by users from day 1 until day5

Page 13: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

LIST OF FIGURES

Pages

Figure 4.20 :

Figure 4.21 :

Figure 4.22 :

Figure 4.23 :

Figure 4.24 :

Figure 4.25 :

Figure 4.26 :

Figure 4.27 :

Figure 4.28 :

Figure 4.29 :

Figure 4.30 :

HTTP traffic volume from day 1 until day 5

Uncategorized traffic volume from day 1 until day 5

VPN traffic volume from day 1 until day 5

Peer-to-Peer traffic volume from day 1 until day 5

Streaming media traffic volume from day 1 until day 5

NetBIOS traffic volume from day 1 until day 5

FTP traffic volume from day 1 until day 5

Email traffic volume from day 1 until day 5

ICMP traffic volume from day 1 until day 5

DNS traffic volume from day 1 until day 5

Web request by host

Page 14: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

ABBREVIATION

DNS

FTP

HTML

HTTP

HTTPS

ICMP

LAN

NetBIOS

OSI

P2P

POP

PTSS

SMTP

TCP

TCPJIP

UDP

URL

VLAN

VoIP

VPN

WWW

- Domain Name Services

- File Transfer Protocol

- HyperText Markup Language

- Hypertext Transfer Protocol

- Hypertext Transfer Protocol Secure

- Internet Control Message Protocol

- Local Area Network

- Network Basic Input/Output System

- Open System Interconnection Model

- Peer-to-Peer

- Post Office Protocol

- Polytechnic Tuanku Syed Sirajuddin

- Simple Mail Transfer Protocol

- Transmission Control Protocol

- Transmission Control ProtocoVInternet Protocol

- User Datagram Protocol

- Uniform Resource Locator

- Virtual Local Area Network

- Voice over Internet Protocol

- Virtual Private Network

- World Wide Web

Page 15: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

CHAPTER ONE

INTRODUCTION

1.0 Introduction

Polytechnic Tuanku Syed Sirajuddin (PTSS) is an education institution having about

4,5 13 students and 367 staffs. PTSS building construct into several buildings include

administrator buildings and eight main academic department buildings which every

department have provided with computer labs, classrooms and department main

office. Most of the students and staff live on campus and majority of them have at

least network devices such as personal computer or laptop. Students and staffs owned

computers, along with approximately 3,000 network devices in the form of office

and lab computers and servers. Due to the increased of numbers of users and network

devices, the campus network has experiences tremendous growth in the volume of

traffic and put heavy demand on bandwidth.

Altogether, PTSS has approximately 26 Mbps of Internet bandwidth which is

combination of three bandwidth packages include MyRen 10 Mbps, TMNet Direct 4

Mbps and Streamyx Line 12 Mbps. All of the Internet bandwidth packages are

purchased from one ISP. The bandwidth packages purchased from the provider is not

equal and used to combine altogether in one pipe link as a load balancer. The overall

network consists of nineteenth VLAN network segments connected by router and

switch. VLAN network are created for each separate department for better control of

resources and to minimize the broadcast domain for a certain network segment.

However, there are some numbers of VLAN network builded to covers two or more

departments or Units such as VLAN 20 is builded to covers two departments which

1

Page 16: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

The contents of

the thesis is for

internal user

only

Page 17: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

REFERENCES

Angrisani, L., Narduzzi, C. (Oktober, 2008). Testing communication and computer

networks: An overview. IEEE Instrumentation & Measurement magazine, 12-

23.

Anti., C., M., Maksi, C., N., Knezevi, C., P., Smiljani, C., A. (January, 2010). Two

phase load balanced routing using OSPF . IEEE Journal On Selected Areas In

Communications, 28(I). Retrieved 2 1 December 20 10,

from http://ieeexplore.ieee.org

Barracuda Networks. (2010). Barracuda web filter. Retrieved : 26 October 2010,

from http ://www.barracudanetworks.com

Bashir, O., Parish, D., Sanford, M., and Philips, I. (2005). Optimising data

processing in network performance monitoring systems. IEEE Proceedings

communication, 152(5). Retrieved 12 November 20 10,

from http://ieeexplore.ieee.org

Bowles, J., & Upadhyayula, S. (1991). Network management and performance

monitoring. Proceedings. The twenty-third Southeastern symposium on system

theory. Columbia : USA. Retrieved 12 November 2010,

from http:Nieeexplore.ieee.org

Burundi Spidernet, (201 1). Improved quality of service with tiered service internet

traflc management. Retrieved : 22 October 20 10, from http://www.ipoque.com

Business Solution Magazine, (2009). Cymphonix's network composer named best

channel product. USA : Jameson Publishing.

Cymphonix Corporation. (2010). Prioritize bandwidth, control content. Retrieved :

26 October 2010, from http://www.cymphonix.com

Page 18: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Donelan, H., Pattison, C., & Brown-Palmer, D. (2005). The analysis of user behavior

of a network management training tool using a neural network. Systematics,

Cybernetics and Informatics, 3(5), 66-72.

Demartini, G., Chirita, P., A., Brunkhorst, I., & Nejdl, W. (2008). Ranking

categories for web search. Lecture notes in computer science. University

Hannover. 4956 (2008). Retrieved 12 November 2010,

from http://www.springerlink.com/content/6120wn55347r4185/

Du, W. (2010). ICMP: Internet Control Message Protocol. Lecture Notes for Internet

Security. Syracuse University . Retrieved : 26 October 2010,

from http://www.cis.syr.edu/-weddTeaching/cis758/LectureNotes/ICMP.pdf

eSecurityTogo. (20 10). Benefits of Cymphon h Network Composter. Retrieved : 16

November 2010, from http://www.eSecurityTogo.com

Evans, T., D. (2003). NetBIOS, NetBEUI, NBF, NBT NBIPX SMB, CIFS

networking. Retrieved : 26 October 20 10,

from http://timothydevans.me.uk/nbf2cifs/nbf2cifs.pdf

Ferguseon, P., & Huston, G. (1998). What is VPN. Retrieved : 26 October 2010,

from http://www.potaroo.net/papers/l998-3-vpdvpn.pdf

Fielding, R., Mogul, J., C., Frystyk, H., Masinter, L., Leach, P., Lee, T., B. (1999).

Hypertext Transfer Protocol -- HTTP/I. I . Retrieved 12 November 2010, from

http://tools.ietf.org/pdWrfc26 16.pdf

Gaiser, V., A. (2003). Assessing unidentijied applications

In network traflc. Retrieved : 21 October 2010, from http://www.utwente.nl

Page 19: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Ghamry, W., K., Elsayed, K.,M.,F., Nassar, A., M. (2009). On the interplay of

network structure and routing strategies for performance in scale-free

networks. 2009 6Ih International Symposium on High-capacity Optical

Networks and Enabling Technologies (HONET). Alexandria : Egypt. Retrieved

20 December 2010, from http://ieeexplore.ieee.org

Gorod, A., Gove, R., Sauser, B., & Boardman, J. (2009). System of system

management : A network management approach. 2007 IEEE International

conference on system of system Engineering. San Antonio : USA. Retrieved 12

November 20 10, from http://ieeexplore.ieee.org

Guo, Z., S., & Zhuang, Y. (1997). Improving network performance by traffic

reduction. International conference on information, communication and signal

processing, ICICS ' 97, Singapore. Retrieved 2 1 December 20 10, from

http://ieeexplore.ieee.org

Gurumoorthy. (2010). Bandwidth explained. Technology updates : Electronics IT.

Retrieved 12 November 20 10,

from http://technologycrest.com/uncategorized/it~bandwidth-explained/

Hamilton, G. (2007). Adjust your behavior: network management incorporates

behavioral analysis to optimize performance. Enabling Technologies

Enterprise, IT Infrastructure Director. Boston : Yankee Group Research, Inc

Hope, T. (2010). Tools meant for network management and installation.

EnzineMark.com : Free content article directoty. Retrieved 12 November

2010, from http://technology .enzinemark.com/tools-meant-for-network

Huston, G. (2003). Measuring IP network performance. Internet Protocol Journal,

6(1). Retrieved 2 1 December 20 10,

from http://cisco.com/web/archived~issues/measuring~ip

Page 20: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Inoue, H., Jansens, D., Hijazi, A., & Somayaji, A. (2007). NetADHICT: A tool for

understanding network traffics. University of Minnesota : USA

Imeish, L. (201 1). Controlling streaming video traffic on a network. Networking

Channel tips. Retrieved : 26 October 2010,

from http:Nsearchnetworkingchannel.techtarget.com/tip/Con~olling-

streaming-video-traffic-on-a-network

Kang, H., J., Ju, H., T., Kim, M., S., & Hong, J., W. (2009). Towards streaming

media traffic monitoring and analysis. Postech : Korea.

Kaneda, S., Hiromori, A., Akinaga, Y., Shinagawa, N., Sugiyama, K., & Takai, M.

(2007). Performance evaluation of network systems accounting for user

behaviors. 2007 IEEE International Conference on Communication

proceedings, Glasgow : Scotland. Retrieved 20 December 20 10,

from http://ieeexplore.ieee.org

Keshav, T. (n.d). A survey of network performance monitoring tools. Retrieved : 26

October 2010, from http://www.cs.wustl.edu/-jaidcse567-06/ftp

Kirar, M., Naidu, R. (2010). Fact finding methods. Retrieved 12 November 2010,

from http://www.scribd.com/doc/6902732/fact-fi nding-tech

Lancieri, L. (2002). Description of internet user behavior. Neural Networks, 1999.

IJCNN '99 International Joint Conference. Washington D.C : USA. Retrieved

20 December 2010, from http://ieeexplore.ieee.org

Lancieri, L., & Durand, N. (2006). Internet user behavior : Compared study of the

access traces and application to the discovery of communities. Jottrnal of IEEE

Transactions on System, Man and Cybernetics, Part A : Systems and Humans,

36(1). Retrieved 12 November 2010, from http://ieeexplore.ieee.org

Page 21: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Liu, C., C., Day, W., W., Sun, S., W., & Wang., G. (2002). User behavior and the

"Globalness" of Internet : From a Taiwan user7 perspective. Journal of

Computer-Mediated Communication, 7 (2). Retrieved 20 December 2010, from

http://jcmc. indiana.edu/vol7/issue2/taiwan. html

Liu, V., Ragan, R. (2009). The challenges of automated application assessments in a

web 2.0 world. Stach & Liu. Retrieved : 26 October 2010, from

http://www.stachliu.com/docs/challengesautoappassess.pdf

Locale, MS. (2010). Article Alley. Content filtering solutions by

www.cyrnphonix.com for enterprise requiring web content. Retrieved 20

December 20 10, from http://www.articlealley.com/article~l748076~8 1 .html

Merwe, J., V., D., Sen, S., & Kalmanek, C. (n.d). Streaming video trafic :

Characterization and network impact. Retrieved : 26 October 2010, from

http://www.research.att.com

McEwan, N. (2006). Fact finding techniques. Retrieved 12 November 2010, from

http://ironbark.bendigo.latrobe.edu.au/subjects/IS/sem22008/lectures/l04 1Fact

Finding.shtm1

Mitchell, B. (2011). ICMP. About.com : Wireless/Networking. Retrieved : 16

October 20 10, from http://compnetworking.about.com/od/tcpip/g/bldef~icmp

Odlyzko, A., M. (2005). Internet trafic growth : Sources and implications.

University of Minnesota : USA

Paine, T. A., & Griggs, T., J. (2008). Directing traffic : Managing internet bandwidth

fairly. EDUCA USE Quartely (EQ), 3 1 (3), 1-6.

Pais, I, & Almeida, M. (2009). End user behavior and performance feedback for

service analysis. 131h International Conference on Intelligence in Next

Generation Networks, 2009. ICIN 2009. Bordeaux : France. Retrieved 20

December 20 10, from http://ieeexplore.ieee.org

79

Page 22: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Pang, R., Allman, M., Bennett, M., Lee, J., Paxzon, V., & Tiemey, B. (2005). Afirst

look at modern enterprise traffic. International Computer Science Institute :

Princeton University.

Parziale, L., Britt, D., T., Davis, C., Forrester, J., Liu, W., Matthews, C., & Rosselot,

N. (2006). TCP/IP Tutorial and Technical Overview. Retrieved 12 November

20 10, from http://www.redbooks.ibm.codredbooks/pdfs/gg243376.pdf

Polytechnic Tuanku Syed Sirajuddin. (2004). Network documentation for Politeknik

Perlis. PTSS : Perlis.

Roberts, J., W. (2001). Telecommunications networking at the start of the 2lSt

century : Traffic theory and the Internet. IEEE communications magazine, 94-

99.

Saito, H. & Chusho, T. (n.d). Design and implementation of a network performance

evaluation system through client observation. Japan : Meiji University.

Salahuddin Muhammad Salim Zabir, Ahmed Ashir & Shiratori, N. (2001).

Estimation of network performance : An approach based on network. Japan :

RIEC, Tohoku University.

Statcounter. (2010). Top five search engine from Oct to Dec 2010. Retrieved : 26

October 2010, from h t t p : / / g s . s t a t c o u n t e r . c o d # s e a r c h ~ e n g i n e y -

201010-201012

Ten, D.,W., H., Manickam, S., Ramadass, S. & Hussein A. A1 Bazar. (2009). Study

on advanced visualization tools in network monitoring platform. 2009 Third

UKSim European symposium on computer modelling and simulation, Athens :

Greece (pp. 445-449). Retrieved 20 December 2010, from :

http://ieeexplore.ieee.org

Page 23: INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE

Tiwari, P. S. (2007). Predictive performance evaluation of interconnected power

system through telecommunication network management. IET-UK

International conference on information and communication technology in

electrical sciences (ICTES 2007), Tamil Nadu: India. Retrieved 12 November

20 10, fiom http://ieeexplore.ieee.org

Valenzuela, D., & Shrivastava, P. (n.d). Interview as a method for qualitative

research. Retrieved 12 November 20 10,

from http://www.public.asu.edd-kroeYww5OO/Inte~iew%2OFri.pdf

Wallin, S., & Leijon, V. (2006). Rethinking network management solutions. Jotirnal

of IT Professional, 8(6). Retrieved 12 November 20 10,

from http://ieeexplore.ieee.org

Wang, J. Chiu, D. M., Lui, J.,C., S. (2009). Credit-based network management.

Communication Systems and Networks and Workshops, 2009. COMSNETS

2009. First International, Bangalore : India (pp. 1-10). Retrieved from :

http://ieeexplore.ieee.org

Websense. (2011). URL Categories : Accurate, current and comprehensive.

Retrieved : 26 October 20 10, from http://www.websense.com/content

Wiersma, W. (1995). Research methods in edtication : An introdtiction (61h ed.).

Massachusetts : Allyn and Bacon.

Williamson, C. (2001). Internet Traffic Measurement. Jotirnal of IEEE Internet

Computing, 5(6). Retrieved 12 November 2010, from http://ieeexplore.ieee.org

Whitten, J., L., Betley, L., D. & Diltman, D., C. (2001). Syetem analysis and design

method (5Ih ed). Boston : Mc-Graw-Hill Education.