Internet Bandwidth Management for Tertiary Institutions
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 Faculty of Computing and Information Management INTERNET BANDWIDTH MANAGEMENT FOR TERTIARY INSTITUTIONS By KITHINJI JOSEPH 12/00769 A Project Report submitted in partial fulfillment of the requirements for the award of the Masters degree in data communication in the Faculty of Computing and Information Management of KCA University. www.ijcat.com 1 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 DECLARATION I Joseph Kithinji do hereby declare that this Project Report is my original work and has not been submitted for any other degree award to any other University before. Signed: ..................................................................... Date: ........................................... Joseph Kithinji Reg No.12/00769 www.ijcat.com 2 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 APPROVAL This Project Report has been submitted with the approval of the following supervisor. Signed: .......................................................... Date: ........................................... Dr. Alice Njuguna. Faculty of Computing and Information Management KCA University. www.ijcat.com 3 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 DEDICATION This research report is dedicated to all my loved ones. www.ijcat.com 4 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 ACKNOWLEDGEMENTS 1. To Dr.Alice Njuguna for her guidance and advice. 2. To Nyiri Gitari for the loan of his laptop. 3. To Kevin Opiyo for his valued consultations. www.ijcat.com 5 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 TABLE OF CONTENTS Declaration…………………………………………………………………………………...i Approval ……………………………………………………………………………………..ii Dedication …………………………………………………………………………………..iii Acknowledgement …………………………………………………………………………..iv Table of contents……………………………………………………………………………v CHAPTER ONE INTRODUCTION 1.0 Background to the study…………………………………………………………………1 1.1 Sources of problems in Bandwidth Management ……………..………………………6 1.2 Parameters for Bandwidth Management…………………………………………………6 1.3 Definition of terms……………………………………………………………………….7 1.4 Statement of the problem………………………………………………..………………7 1.5Aim of the study…………………………………………………………………………..8 1.6 Specific objectives……………………………………………………………………….8 1.7 Research questions……………………………………………………………………….8 1.8 Significance of the study…………………………………………………………………9 1.9 Scope of the study………………………………………………………………………..9 1.10 Organization of the thesis……………………………………………….……………..9 www.ijcat.com 6 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER TWO LITERATURE REVIEW 2.1 Introduction……………………………………………………………………….……..11 2.2 Network Management and Traffic control………….…………….………………….….12 2.2.1 The Transmission Control Protocol……………………………………………………12 2.2.1.1 TCP congestion control………………………………………………………………12 2.2.1.2TCP congestion avoidance Mechanisms…………………..…………………..….….12 2.2.1.3 TCP flow control……………………………………………………………………..14 2.2.2The User Datagram Protocol………………………………………..……………….....14 2.3Bandwidth Usage Optimization…………………………………...…………………...…14 2.3.1Traffic Management………………………………………….…….………………..….15 2.3.2Caching……………………………………………………...…..…………..………….15 2.3.3 Compression……………………………………………...…..………………….….…15 2.4 Bandwidth control and the hierarchical network model………………………………..17 2.5 Bandwidth management techniques…………………………...……………………….18 2.5.1 Queuing and scheduling techniques…………………………………………………..18 2.5.1.1 FIFO………………………………………………………………………………...18 2.5.1.2 Priority Queuing……………………………………………….……………………19 2.5.1.3 Fair Queuing…………………………………………………………….………….20 2.5.1.4 Weighted Fair Queuing……………………………………………….…………….21 2.5.1.5 Class Based Queuing………………………………………………………………..22 2.6 Admission control and traffic shaping techniques………………...........………………24 2.6.1Leaky Bucket………………………………………………………………………….25 www.ijcat.com 7 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 2.6.2Token Bucket………………………………………………………….………………27 2.7 Bandwidth Management Tools…………………………………………………………27 2.7.1 Cisco routers……………………………………………...………….…………….…27 2.7.1.1Cisco shaping methods…………………………………………………..……….…28 2.7.1.1.1Generic traffic shaping………………………………………….…..………….….28 2.7.1.1.2Class based shaping………………………………………………….……………28 2.7.2 Linux………………………………………………………...……………….……….28 2.7.2.1 Squid Linux………………………………………………………...……………….29 2.8 State of practice………………………………………………………….….…………..30 2.8.1 Bandwidth management and optimization in the U.K case of Blackburn College…..30 2.8.2 Malawi’s Mahatma Campus…………………………………………………….……32 2.8.3 Kenya national education network……………………………………………..……..32 2.9 State of art …………………….………………………………………………………..33 2.10 Bandwidth management and optimization trends……………………….….……..…35 2.11 Critique of the literature…………………………………………………….………....36 2.12Conclusions…………………………………………………………………..……..….38 www.ijcat.com 8 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER THREE RESEARCH METHODOLOGY 3.1 Current methods of bandwidth management…………………………….……………...39 3.1.1 Static bandwidth allocation…………………………………………….……………..39 3.1.2 Bandwidth reservation………………………………………………………………..39 3.1.3 Preventing bandwidth starvation………………………………..………………….…40 3.2 Evaluations of current methods………………………………….…………………..…40 3.3 Definition of the tool to be adopted…………………………...……………………..…41 3.3.1 Bandwidth borrowing using HTB………………………...…………………………..41 3.4 Proposed method…………………………………………...…………………………...42 3.5 Proposed system…………………………………………..………………………….…43 3.6 Tools employed…………………………………………..……………………………..45 3.6.1 Tele traffic tapper………………………………….………………………………….45 3.6.2 Traffic control…………………………………………………………………….…..45 3.6.3 Squid proxy………………………………………………………………………......45 3.6.4 Interview…..…………………………………………………………………….……..45 3.6.5 FileZilla…………………………………………………………...……………………46 3.7 Conclusions……………………………………………………………………….……47 www.ijcat.com 9 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER FOUR DESIGN AND IMPLEMENTATION 4.1 Prototype design………………………………………………………….……………..48 4.1.1Prototype design model…………………………………….………….……….……...48 4.1.2 System flow chart…………………………………….……….……….……….……...49 4.1.3 The classifier design…………………………………………..………………….……50 4.1.4 Bandwidth Provisioner design……………………………..…....……………………..51 4.1.5 Bandwidth borrower design………………………………..…….………………….…51 4.2 Implementation……………………………………………………………..……………52 4.2.1 Implementation model……………………………………………..…………………..53 4.2.2 Design and implementation issues……………………………...…...….………….…..54 4.3 Testing…………………………………………………….……………….………..……54 4.3.1 Test bed model………………………………………….………………..………….…55 www.ijcat.com 10 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER FIVE TESTING 5.0 Introduction…………………………………………..…………………………………56 5.1 The study of Meru Technical Training Institute……..…………………………………56 5.1.1 Status of internet access………………………………………………………………57 5.1.2 Bandwidth Management strategies…………………………………………………...58 5.1.3 Challenges to bandwidth management……………………………………………….58 5.2 Prototype testing…………………………………..……………………………………59 5.2.1 Testing for classification functionality……………………………………………….59 5.2.2 Testing for bandwidth allocation accuracy……………………………………….......60 5.2.3 Testing for inter class borrowing……………………………………………………..63 5.3 Conclusions……………………………………………………………………………..67 www.ijcat.com 11 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 CHAPTER SIX DISCUSSION OF FINDINGS AND CONCLUSIONS 6.0 Introduction…………………………………………..…………………………………68 6.1 Status of internet access …………………………………………………………………68 6.2 Bandwidth Management strategies ……………………………………………………...68 6.3 Challenges to bandwidth management …………………………………………...…......69 6.4 Traffic Classification ……………………..…………………………………….……….69 6.5 Bandwidth Allocation ……………………………..…………………….………………70 6.6 Inter Class Borrowing…………………..…………………………….………………….70 6.7 Conclusions…………………………………………………………….…………….......71 6.8 Critical Review and Reflection…...……………………………………………………..74 6.9 Recommendations for further studies….………………………………………………..74 www.ijcat.com 12 International Journal of Computer Applications Technology and Research ISSN:- 2319–8656 LIST OF TABLES Table 1 comparing bandwidth optimization techniques………………………………….…17 Table 2 internet connectivity status…………………………………………………………57 Table 3 bandwidth management strategies…………………………………………...……..58 LIST OF FIGURES Figure 1 First in first out queuing…………………………………………………………..19 Figure 2 Priority queuing…………………………………………………………………...20 Figure 3 Fair queuing……………………………………………………………………….21 Figure 4 Weighted fair queuing……………………………………………………………..22 Figure 5 Class based queuing……………………………………………...…….………….23 Figure 6 Leaky bucket algorithms………………………………………….…...…………..26 Figure 7 Token bucket algorithm…………………………………………………………...27 Figure 8 Linux packet processing……………………………………………………….….29 Figure 9 Differentiated service model………………………………………...…………….35 Figure 10 Prototype design……………………………………………………………….....48 Figure 11 Flow chart…………………………………………………………...…………….49 Figure 12 Implementation model……………………………………….....…………………53 Figure 13 prototype test bed network………………………………....………………..……55 Figure 14 bandwidth management challenges……………………………...………..………58 Figure 15 Evaluation for classification