Internet Bandwidth Management for Tertiary Institutions

Total Page:16

File Type:pdf, Size:1020Kb

Internet Bandwidth Management for Tertiary Institutions International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 Faculty of Computing and Information Management INTERNET BANDWIDTH MANAGEMENT FOR TERTIARY INSTITUTIONS By KITHINJI JOSEPH 12/00769 A Project Report submitted in partial fulfillment of the requirements for the award of the Masters degree in data communication in the Faculty of Computing and Information Management of KCA University. www.ijcat.com 1 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 DECLARATION I Joseph Kithinji do hereby declare that this Project Report is my original work and has not been submitted for any other degree award to any other University before. Signed: ..................................................................... Date: ........................................... Joseph Kithinji Reg No.12/00769 www.ijcat.com 2 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 APPROVAL This Project Report has been submitted with the approval of the following supervisor. Signed: .......................................................... Date: ........................................... Dr. Alice Njuguna. Faculty of Computing and Information Management KCA University. www.ijcat.com 3 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 DEDICATION This research report is dedicated to all my loved ones. www.ijcat.com 4 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 ACKNOWLEDGEMENTS 1. To Dr.Alice Njuguna for her guidance and advice. 2. To Nyiri Gitari for the loan of his laptop. 3. To Kevin Opiyo for his valued consultations. www.ijcat.com 5 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 TABLE OF CONTENTS Declaration…………………………………………………………………………………...i Approval ……………………………………………………………………………………..ii Dedication …………………………………………………………………………………..iii Acknowledgement …………………………………………………………………………..iv Table of contents……………………………………………………………………………v CHAPTER ONE INTRODUCTION 1.0 Background to the study…………………………………………………………………1 1.1 Sources of problems in Bandwidth Management ……………..………………………6 1.2 Parameters for Bandwidth Management…………………………………………………6 1.3 Definition of terms……………………………………………………………………….7 1.4 Statement of the problem………………………………………………..………………7 1.5Aim of the study…………………………………………………………………………..8 1.6 Specific objectives……………………………………………………………………….8 1.7 Research questions……………………………………………………………………….8 1.8 Significance of the study…………………………………………………………………9 1.9 Scope of the study………………………………………………………………………..9 1.10 Organization of the thesis……………………………………………….……………..9 www.ijcat.com 6 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER TWO LITERATURE REVIEW 2.1 Introduction……………………………………………………………………….……..11 2.2 Network Management and Traffic control………….…………….………………….….12 2.2.1 The Transmission Control Protocol……………………………………………………12 2.2.1.1 TCP congestion control………………………………………………………………12 2.2.1.2TCP congestion avoidance Mechanisms…………………..…………………..….….12 2.2.1.3 TCP flow control……………………………………………………………………..14 2.2.2The User Datagram Protocol………………………………………..……………….....14 2.3Bandwidth Usage Optimization…………………………………...…………………...…14 2.3.1Traffic Management………………………………………….…….………………..….15 2.3.2Caching……………………………………………………...…..…………..………….15 2.3.3 Compression……………………………………………...…..………………….….…15 2.4 Bandwidth control and the hierarchical network model………………………………..17 2.5 Bandwidth management techniques…………………………...……………………….18 2.5.1 Queuing and scheduling techniques…………………………………………………..18 2.5.1.1 FIFO………………………………………………………………………………...18 2.5.1.2 Priority Queuing……………………………………………….……………………19 2.5.1.3 Fair Queuing…………………………………………………………….………….20 2.5.1.4 Weighted Fair Queuing……………………………………………….…………….21 2.5.1.5 Class Based Queuing………………………………………………………………..22 2.6 Admission control and traffic shaping techniques………………...........………………24 2.6.1Leaky Bucket………………………………………………………………………….25 www.ijcat.com 7 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 2.6.2Token Bucket………………………………………………………….………………27 2.7 Bandwidth Management Tools…………………………………………………………27 2.7.1 Cisco routers……………………………………………...………….…………….…27 2.7.1.1Cisco shaping methods…………………………………………………..……….…28 2.7.1.1.1Generic traffic shaping………………………………………….…..………….….28 2.7.1.1.2Class based shaping………………………………………………….……………28 2.7.2 Linux………………………………………………………...……………….……….28 2.7.2.1 Squid Linux………………………………………………………...……………….29 2.8 State of practice………………………………………………………….….…………..30 2.8.1 Bandwidth management and optimization in the U.K case of Blackburn College…..30 2.8.2 Malawi’s Mahatma Campus…………………………………………………….……32 2.8.3 Kenya national education network……………………………………………..……..32 2.9 State of art …………………….………………………………………………………..33 2.10 Bandwidth management and optimization trends……………………….….……..…35 2.11 Critique of the literature…………………………………………………….………....36 2.12Conclusions…………………………………………………………………..……..….38 www.ijcat.com 8 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER THREE RESEARCH METHODOLOGY 3.1 Current methods of bandwidth management…………………………….……………...39 3.1.1 Static bandwidth allocation…………………………………………….……………..39 3.1.2 Bandwidth reservation………………………………………………………………..39 3.1.3 Preventing bandwidth starvation………………………………..………………….…40 3.2 Evaluations of current methods………………………………….…………………..…40 3.3 Definition of the tool to be adopted…………………………...……………………..…41 3.3.1 Bandwidth borrowing using HTB………………………...…………………………..41 3.4 Proposed method…………………………………………...…………………………...42 3.5 Proposed system…………………………………………..………………………….…43 3.6 Tools employed…………………………………………..……………………………..45 3.6.1 Tele traffic tapper………………………………….………………………………….45 3.6.2 Traffic control…………………………………………………………………….…..45 3.6.3 Squid proxy………………………………………………………………………......45 3.6.4 Interview…..…………………………………………………………………….……..45 3.6.5 FileZilla…………………………………………………………...……………………46 3.7 Conclusions……………………………………………………………………….……47 www.ijcat.com 9 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER FOUR DESIGN AND IMPLEMENTATION 4.1 Prototype design………………………………………………………….……………..48 4.1.1Prototype design model…………………………………….………….……….……...48 4.1.2 System flow chart…………………………………….……….……….……….……...49 4.1.3 The classifier design…………………………………………..………………….……50 4.1.4 Bandwidth Provisioner design……………………………..…....……………………..51 4.1.5 Bandwidth borrower design………………………………..…….………………….…51 4.2 Implementation……………………………………………………………..……………52 4.2.1 Implementation model……………………………………………..…………………..53 4.2.2 Design and implementation issues……………………………...…...….………….…..54 4.3 Testing…………………………………………………….……………….………..……54 4.3.1 Test bed model………………………………………….………………..………….…55 www.ijcat.com 10 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER FIVE TESTING 5.0 Introduction…………………………………………..…………………………………56 5.1 The study of Meru Technical Training Institute……..…………………………………56 5.1.1 Status of internet access………………………………………………………………57 5.1.2 Bandwidth Management strategies…………………………………………………...58 5.1.3 Challenges to bandwidth management……………………………………………….58 5.2 Prototype testing…………………………………..……………………………………59 5.2.1 Testing for classification functionality……………………………………………….59 5.2.2 Testing for bandwidth allocation accuracy……………………………………….......60 5.2.3 Testing for inter class borrowing……………………………………………………..63 5.3 Conclusions……………………………………………………………………………..67 www.ijcat.com 11 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER SIX DISCUSSION OF FINDINGS AND CONCLUSIONS 6.0 Introduction…………………………………………..…………………………………68 6.1 Status of internet access …………………………………………………………………68 6.2 Bandwidth Management strategies ……………………………………………………...68 6.3 Challenges to bandwidth management …………………………………………...…......69 6.4 Traffic Classification ……………………..…………………………………….……….69 6.5 Bandwidth Allocation ……………………………..…………………….………………70 6.6 Inter Class Borrowing…………………..…………………………….………………….70 6.7 Conclusions…………………………………………………………….…………….......71 6.8 Critical Review and Reflection…...……………………………………………………..74 6.9 Recommendations for further studies….………………………………………………..74 www.ijcat.com 12 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 LIST OF TABLES Table 1 comparing bandwidth optimization techniques………………………………….…17 Table 2 internet connectivity status…………………………………………………………57 Table 3 bandwidth management strategies…………………………………………...……..58 LIST OF FIGURES Figure 1 First in first out queuing…………………………………………………………..19 Figure 2 Priority queuing…………………………………………………………………...20 Figure 3 Fair queuing……………………………………………………………………….21 Figure 4 Weighted fair queuing……………………………………………………………..22 Figure 5 Class based queuing……………………………………………...…….………….23 Figure 6 Leaky bucket algorithms………………………………………….…...…………..26 Figure 7 Token bucket algorithm…………………………………………………………...27 Figure 8 Linux packet processing……………………………………………………….….29 Figure 9 Differentiated service model………………………………………...…………….35 Figure 10 Prototype design……………………………………………………………….....48 Figure 11 Flow chart…………………………………………………………...…………….49 Figure 12 Implementation model……………………………………….....…………………53 Figure 13 prototype test bed network………………………………....………………..……55 Figure 14 bandwidth management challenges……………………………...………..………58 Figure 15 Evaluation for classification
Recommended publications
  • Quality of Service Regulation Manual Quality of Service Regulation
    REGULATORY & MARKET ENVIRONMENT International Telecommunication Union Telecommunication Development Bureau Place des Nations CH-1211 Geneva 20 Quality of Service Switzerland REGULATION MANUAL www.itu.int Manual ISBN 978-92-61-25781-1 9 789261 257811 Printed in Switzerland Geneva, 2017 Telecommunication Development Sector QUALITY OF SERVICE REGULATION MANUAL QUALITY OF SERVICE REGULATION Quality of service regulation manual 2017 Acknowledgements The International Telecommunication Union (ITU) manual on quality of service regulation was prepared by ITU expert Dr Toni Janevski and supported by work carried out by Dr Milan Jankovic, building on ef- forts undertaken by them and Mr Scott Markus when developing the ITU Academy Regulatory Module for the Quality of Service Training Programme (QoSTP), as well as the work of ITU-T Study Group 12 on performance QoS and QoE. ITU would also like to thank the Chairman of ITU-T Study Group 12, Mr Kwame Baah-Acheamfour, Mr Joachim Pomy, SG12 Rapporteur, Mr Al Morton, SG12 Vice-Chairman, and Mr Martin Adolph, ITU-T SG12 Advisor. This work was carried out under the direction of the Telecommunication Development Bureau (BDT) Regulatory and Market Environment Division. ISBN 978-92-61-25781-1 (paper version) 978-92-61-25791-0 (electronic version) 978-92-61-25801-6 (EPUB version) 978-92-61-25811-5 (Mobi version) Please consider the environment before printing this report. © ITU 2017 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Foreword I am pleased to present the Manual on Quality of Service (QoS) Regulation pub- lished to serve as a reference and guiding tool for regulators and policy makers in dealing with QoS and Quality of Experience (QoE) matters in the ICT sector.
    [Show full text]
  • Study of Traffic Control and Congestion Control in Broadband ISDN
    study of Traffic Control and Congestion Control in Broadband ISDN Yoon D. Chang David H. Su U.S. DEPARTMENT OF COMMERCE Technolo^ Administration National Institute of Standards and Technology Computer Systems Laboratory Advanced Systems Division Gaithersburg, MD 20899 100 . U56 5000 NIST 1992 NISTIR 5000 Study of Traffic Control and Congestion Control in Broadband ISDN Yoon D. Chang David H. Su U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Advanced Systems Division Gaithersburg, MD 20899 December 1992 U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director ' ' ' f * !?• ij *' i^r I. .f ’. : :j ' ' ‘ > I, 1 a ‘d^ H J4r:%':'-'A " •; '<; ‘'li " *r»^'.-VA^'^' •'.%> • - •, yir 4 , V/ 1 »|/? ,^,uJ* I:i;r ^ Vi \ ?# ' .*:.. ,r-«k •»n!i ><i> v'''i«( m*•gia 4-u •^-<* #• .j,-A vi^*«r!P ' ; , . WWSJiWV'. , ^ *if r!t<''f«i' ’t ^, •i» STUDY OF TRAFFIC CONTROL and CONGESTION CONTROL IN BROADBAND ISDN Yoon D. Chang David Su ABSTRACT In Broadband Integrated Services Digital Network (B-ISDN), the Asynchronous Transfer Mode (ATM) network architecture has been adopted as the switching and multiplexing scheme. One of the important ATM architectural issues is trafBc and congestion control. Many schemes, algorithms and theories have been studied for network flow control, congestion control, and trafBc control in order to find suitable techniques to manage network trafBc effectively to meet the quality of service requirement for network users. Among B-ISDN terminals in a Customer Premises Network (CPN) domain, a new flow control concept refered to as Generic Row Control (GFC), has been adopted and its protocol standardization is under study.
    [Show full text]
  • Network Congestion Control: Managing Internet Traffic
    Network Congestion Control Managing Internet Traffic Michael Welzl Leopold Franzens University of Innsbruck Network Congestion Control Network Congestion Control Managing Internet Traffic Michael Welzl Leopold Franzens University of Innsbruck Copyright 2005 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley Editorial Offices John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA Wiley-VCH Verlag GmbH, Boschstr.
    [Show full text]
  • How to Accelerate Your Internet. a Practical Guide to Bandwidth
    How To Accelerate Your Internet A practical guide to Bandwidth Management and Optimisation using Open Source Software Файл загружен с http://www.ifap.ru How To Accelerate Your Internet For more information about this project, visit us online at http://bwmo.net/ Editor: Flickenger R. Associate Editors: Belcher M., Canessa E., Zennaro M. Publishers: INASP/ICTP © 2006, BMO Book Sprint Team First edition: October 2006 ISBN: 0-9778093-1-5 Many designations used by manufacturers and vendors to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the authors were aware of a trademark claim, the designations have been printed in all caps or initial caps. All other trademarks are property of their respective owners. The authors and publisher have taken due care in preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibil- ity for errors or omissions. No liability is assumed for incidental or consequen- tial damages in connection with or arising out of the use of the information con- tained herein. This work is released under the Creative Commons Attribution-ShareAlike 2.5 license. For more details regarding your rights to use and redistribute this work, see http://creativecommons.org/licenses/by-sa/2.5/ Contents Preface ix About This Book xi Introduction 1 Bandwidth, throughput, latency, and speed.............................................................................. 2 Not enough to go around........................................................................................................
    [Show full text]
  • Traffic Shaping for Fortios 5.6.3 5 Fortinet Technologies Inc
    FortiOS™ Handbook - Traffic Shaping VERSION 5.6.3 FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET KNOWLEDGE BASE http://kb.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING AND CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com/ FORTIGUARD CENTER https://fortiguard.com FORTICAST http://forticast.fortinet.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FORTINET PRIVACY POLICY May 17, 2018 FortiOS™ Handbook - Traffic Shaping 01-563-120097-20180517 TABLE OF CONTENTS Change Log 5 Introduction 6 What's new in FortiOS 5.6 7 FortiOS 5.6.3 7 Support schedule on traffic shaping policy (450337) 7 The purpose of traffic shaping 8 Quality of Service 8 Traffic policing 9 Bandwidth guarantee, limit, and priority interactions 10 FortiGate traffic 10 Through traffic 11 Calculation and regulation of packet rates 13 Important considerations 15 Traffic shaping methods 18 Traffic shaping options 18 Shared policy shaping 19 Per policy 19 For all policies using a shaper 19 Maximum and guaranteed bandwidth 20 Traffic priority 20 Traffic shaping policy order 20 Traffic Shaping Policy Configuration Settings 21 VLAN, VDOM and virtual interfaces 22 Shared traffic shaper configuration settings 22 Shared Shaper Per Policy Example 23 Per-IP shaping 24 Per-IP traffic shaping configuration
    [Show full text]
  • Data Networking Guidelines
    Title page Succession Communication Server for Enterprise 1000 X21 Release 2.0 Data Networking Guidelines Document Number: 553-3023-103 Document Release: Standard 1.00 Date: November 2002 Year Publish FCC TM Copyright © 2002 Nortel Networks All Rights Reserved Printed in Canada Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC rules, and the radio interference regulations of Industry Canada. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiate radio frequency energy, and if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at their own expense. SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. 4 Page 3 of 190 Revision history November 2002 Standard 1.00. This document is issued to support Succession Communication Server for Enterprise 1000, Release 2.0. Data Networking Guidelines Page 4 of 190 553-3023-103 Standard 1.00 November 2002 8 Page 5 of 190 Contents Contents . 5 About this document . 9 Applicable systems . 9 Intended audience . 9 Overview . 11 Contents .. 11 Introduction . 11 The importance of QoS .
    [Show full text]
  • Network Traffic Control and Bandwidth Management in Internet: a Differentiated Services Case Study
    Network Traffic Control and Bandwidth Management in Internet: A Differentiated Services Case Study Suqiao Li School of Cornputer Science McGill University, Montreal Juiy, 1999 A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfhent of the requirements for the degree of Master of Science O Suqiao Li, 1999 Acquisitiaris and Acquisitions et Bibliographie Services senrices bibïiraphiques The author has granteci a non- L'auteur a accordé une licence non exciusive licence aliowing the exclusive permettant à la National Li'brary of Canada to Bibliothèque nationale du Canada de reproduce, loan, distri'bute or seii ceprodaire, prêter, distriiuer ou copies of this thesis in microform, vendre des copies de cette thèse sous paper or electronic formats. La fhne de microfiche/film, de reprodiiction sur papier ou sur format électronique. The author retains ownership of the L'auteur conserve fa propriété du copyright in this thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts fiom it Ni Ia thèse ni des extds substantiels may be printed or otherwise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation. Abstract This Mater's thesis deals with network tnffic conml and bandwidth management in Internet, and includes four parcs. In part 1. we introduce network uaffic, the basic principles of traffic conuol, conml methads and components, which are used to support the Quality of Service (QoS) in' different network envimnments. In part 2, we present network bandwidth management concepts and its methods, Bandwidth is fmite and valuable, so we need to manage it efficiently.
    [Show full text]
  • A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers
    Global Journal of Computer Science and Technology: E Network, Web & Security Volume 1 7 Issue 4 Version 1.0 Year 201 7 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers By Umeh Innocent Ikechukwu Nnamdi Azikiwe University Abstract- Nowadays, virtually all the basic aspects of human endeavor is computer and network dependent. Therefore bandwidth being one of the most valued resource and component of any network must be properly managed to yield a reliable performance. Over the years, different algorithms, models, techniques and applications have been developed for network and bandwidth management yet bandwidth problems has persistently remained on the increase. This work is an indepth survey on the causes of bandwidth problems, the basic models and techniques for bandwidth management and is followed by an analysis which is aimed at yielding meaningful suggestions on how a better technique or method for securing an efficient and improved bandwidth management solution using the application layer of the OSI network model can be achieved. Keywords: network, OSI models, techniques, bandwidth, bandwidth management, layer(s), internet, administrator. GJCST-E Classification: C.2.1, C.2.3 ASurveyonBandwidthManagementTechniquesViatheOSIModelNetworkandApplication Layers Strictly as per the compliance and regulations of: © 2017. Umeh Innocent Ikechukwu. This is a research/review paper, distributed under the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
    [Show full text]
  • The Rise and Fall of Invasive Isp Surveillance Paul
    VER. 1.1:: 8/27/2008 ISP SURVEILLANCE 1 THE RISE AND FALL OF INVASIVE ISP SURVEILLANCE * PAUL OHM ABSTRACT Nothing in society poses as grave a threat to privacy as the Internet Service Provider (ISP). ISPs carry their users’ conversations, secrets, relationships, acts, and omissions. Until the very recent past, they had left most of these alone because they had lacked the tools to spy invasively, but with recent advances in eavesdropping technology, they can now spy on people in unprecedented ways. Meanwhile, advertisers and copyright owners have been tempting them to put their users’ secrets up for sale, and judging from a recent flurry of reports, ISPs are giving in to the temptation and experimenting with new forms of spying. This is only the leading edge of a coming storm of unprecedented and invasive ISP surveillance. This Article proposes an innovative new theory of communications privacy to help policymakers strike the proper balance between user privacy and ISP need. We cannot simply ban aggressive monitoring, because ISPs have legitimate reasons for scrutinizing communications on an Internet teeming with threats. Using this new theory, policymakers will be able to distinguish between an ISP’s legitimate needs and mere desires. In addition, this Article injects privacy into the network neutrality debate—a debate about who gets to control innovation on the Internet. Despite the thousands of pages that have already been written about the topic, nobody has recognized that we already enjoy mandatory network neutrality in the form of expansive wiretapping laws. The recognition of this idea will flip the status quo and reinvigorate a stagnant debate by introducing privacy and personal autonomy into a discussion that has only ever been about economics and innovation.
    [Show full text]
  • Measurement-Based Management of Network Resources
    UCAM-CL-TR-528 Technical Report ISSN 1476-2986 Number 528 Computer Laboratory Measurement-based management of network resources Andrew William Moore April 2002 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2002 Andrew William Moore This technical report is based on a dissertation submitted by the author for the degree of Doctor of Philosophy to the University of Cambridge. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/TechReports/ Series editor: Markus Kuhn ISSN 1476-2986 Summary Measurement-Based Estimators are able to characterise data flows, enabling improvements to existing management techniques and access to previously impossible management techniques. It is the thesis of this dissertation that in addition to making practical adaptive management schemes, measurement-based estimators can be practical within current limitations of resource. Examples of network management include the characterisation of current utilisation for explicit admission control and the configuration of a scheduler to divide link-capacity among competing traffic classes. Without measurements, these management techniques have relied upon the ac- curate characterisation of traffic — without accurate traffic characterisation, network resources may be under or over utilised. Embracing Measurement-Based Estimation in admission control, Measurement-Based Admis- sion Control (MBAC) algorithms have allowed characterisation of new traffic flows while adapt- ing to changing flow requirements. However, there have been many MBAC algorithms proposed, often with no clear differentiation between them. This has motivated the need for a realistic, implementation-based comparison in order to identify an ideal MBAC algorithm.
    [Show full text]
  • Bandwidth Management and Quality of Service
    Edith Cowan University Research Online Theses: Doctorates and Masters Theses 2000 Bandwidth management and quality of service Adalbert Engel Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Digital Communications and Networking Commons Recommended Citation Engel, A. (2000). Bandwidth management and quality of service. https://ro.ecu.edu.au/theses/1540 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses/1540 EDITH COWAN UNIVERSITY LIBRARY Bandwidth Management and Quality of Service by Adalbert Engel BE, GradDipComp A Thesis Submitted in Partial Fulfilment of the Requirements for the Award of Master of Science (Computer Science). At the Faculty of Communications, Health and Science Edith Cowan University, Mount Lawley. ' Date of submission: 14 December 2000 ABSTRACT With the advent of bandwidth-hungry video and audio applications, demand for bandwidth is expected to exceed supply. Users will require more bandwidth and, as always, there are likely to be more users. As the Internet user base becomes more diverse, there is an increasing perception that Internet Service Providers (ISPs) should be able to differentiate between users, so that the specific needs of different types of users can be met. Differentiated services is seen as a possible solution to the bandwidth problem. Currently, however, the technology used on the Internet differentiates neither between users, nor between applications. The thesis focuses on current and anticipated bandwidth shortages on the Internet, and on the lack of a differentiated service. The aim is to identify methods of managing bandwidth and to investigate how these bandwidth management methods can be used to provide a differentiated service.
    [Show full text]
  • CRITICAL STUDY of BANDWIDTH MANAGEMENT STRATEGIES for INTERNET SERVICES [Case Study Midlands State University] by NORRENCE VUSHEMASIMBA (R145082H)
    CRITICAL STUDY OF BANDWIDTH MANAGEMENT STRATEGIES FOR INTERNET SERVICES [Case study Midlands State University] By NORRENCE VUSHEMASIMBA (R145082H) Submitted in partial fulfillment of the requirements for the degree of BSC TELECOMMUNICATIONS HONOURS DEGREE HTEL 438: Dissertation DEPARTMENT OF APPLIED PHYSICS AND TELECOMMUNICATIONS IN THE FACULTY OF SCIENCE AND TECHNOLOGY Midlands State University Gweru, Zimbabwe June 2018 Supervisor: Dr. A. Nechibvute i ABSTRACT The internet has become a key resource at Midlands State University for research and communication. The institution is also experiencing high students‟ population which in turn has led to more demand for bandwidth. The high students‟ population makes the overall available bandwidth shrink leading to slow internet connection making internet an ineffective academic resource. The institution has been responding to slow internet connection by buying more bandwidth which is so uneconomical with bandwidth being an expensive resource. This work is an in depth survey on the causes of bandwidth problems, the basic models and techniques for bandwidth management and its followed by an analysis which is aimed at yielding meaningful suggestions on h on internet usage, educating the users on bandwidth management and looking into how to manage and optimize the bandwidth efficiently. The strategies were evaluated on traffic management, bandwidth allocation and bandwidth restriction. The findings obtained full proof that that traffic management, bandwidth allocation and bandwidth restriction can be used for effective bandwidth management. Suggestion for further research were given such as coming up with policies at the university on internet usage, educating users on bandwidth management and looking into Deep Packet Inspection. ii Declaration I ………………………………………….…..hereby declare that I am the sole author of this report.
    [Show full text]