Allison, Curtis M.; Bottu, Srikanth; Heckadon, Monica I. Group Project 12A Client: LTC Avery Leider An Analysis of Student Internet Usage and its Impact.

Slides:



Advertisements
Similar presentations
Chapter 3 E-Strategy.
Advertisements

Chapter 1: Introduction to Scaling Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Chapter 9: Access Control Lists
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Interpret Application Specifications
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network security policy: best practices
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
A North West Retailer’s Journey To Mobile Ecommerce By Space 48.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
Semester 3, v Chapter 3: Virtual LANs
Internet Based Information Sources on Urbanism - Tutorial - Authors: D. Milovanovic, D. S. Furundzic, yubc.net.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
– Chapter 5 – Secure LAN Switching
An Evaluation of SLIS Student Satisfaction and its Global Impacts Christina Hoffman, MLS Dr. Samantha Hastings, Interim Dean The University of North Texas.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Access Control List ACL. Access Control List ACL.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Sakkaravarthi, K. Librarian, Sudharsan Engineering College, Pudukkottai – Tamilnadu. Mail : Cell : V.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
FirewallPK Security tool for centralized Access Control List Management th RoEduNet International Conference - Networking in Education and Research.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
The Futility of Common Firewall Policies James E. Ries, M.S. NLM Predoctoral Fellow March 7, 2000.
Role Of Network IDS in Network Perimeter Defense.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Many of us feel that once we bought a vps hosting service from a reputed company then everything is completed and we are ready to go live with our website,
How does social networking affect college student’s academic performance?
Answering the Value Question: Does Technology Impact Student Success
Better Informed Academic Planning Using Student Flow Models
Where We Are and Where We Want to Be
© 2002, Cisco Systems, Inc. All rights reserved.
Student’ Views About the Use of Facebook and WhatsApp on Education: A Survey Among the Undergraduate Students of Dr. Birinchi Kumar Barooah College Prepared.
DATA COLLECTION METHODS IN NURSING RESEARCH
THE ROLE OF THE INTERNET AND SOCIAL MEDIA AMONG YOUNG POPULATION IN CONTEMPORARY SOCIETIES Nevena Ristova, MSc MIT University - Skopje.
NET 536 Network Security Firewalls and VPN
By Abdul Wahhab Khalid UEL ID
Advertising Agencies and Interactive Media
100% Exam Passing Guarantee & Money Back Assurance
The use of technology in education
Author: Ragalatha P, Manoj Challa, Sundeep Kumar. K
EFFECTS OF SOCIAL MEDIA ON STUDENTS
An Overview of A Case Study of the Uses Supported by Higher Education Computer Networks and An Analysis of Application Traffic Mark Pisano dps2017.
– Chapter 5 – Secure LAN Switching
Continuous Improvement through Accreditation AdvancED ESA Accreditation MAISA Conference January 27, 2016.
Trends in my profession, Information Technology
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Tertiary Education Graduate Tracer Study
Chapter 7 Backbone Network
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 3: Dynamic Routing
Virtual Private Network (VPN) Market
Science Fair Projects.
Mathew George Library Assistant
Innovation and the online payment realm A market study
Northern New Mexico College Department of Engineering
Chapter 3 VLANs Chaffee County Academy
A Proposal for the Sierra Vista School District
McPherson College, Fall 2017
Perceptions concerning the character education of college students
USER’S PERCEPTION AND ATTITUDE ABOUT E- LEARNING
The Internet and Electronic mail
Latest Practice Test Dumps
Presentation transcript:

Allison, Curtis M.; Bottu, Srikanth; Heckadon, Monica I. Group Project 12A Client: LTC Avery Leider An Analysis of Student Internet Usage and its Impact on the Infrastructure

Introduction College students Internet use is on the rise in developed countries such as the United States. The use of the Internet in the educational environment has enabled easy access to many resources, and information sharing has, therefore, significantly increased. Moreover, the prevalence of this sharing has brought additional benefits in that these resources can be used in any location and any time. Internet is appealing to higher education for a number of reasons: it reduces the time lag between the production and utilization of knowledge; it stimulates international co-operation and exchange of opinions; it extends the sharing of information; and it promotes multidisciplinary research. To date, no tested, validated and confirmed result to understand the Student Internet usage among Undergraduate Students in Pace University. The purpose of this research and analysis is to “yield data that helps the school respond to the Internet usage in ways that optimize service in both areas: in how that service is perceived as well as in how it meets the actual demand. “ For this, we conducted a survey and following research on college students; our present analysis has examined the actual Internet usage among Internet users (aged 15–40) who are pursuing their Undergraduate at Pace University, USA.

Procedures Used a survey to examine the students from Pace University Internet habits. This survey provided the team with clean and straightforward data that was easy to chart and graph. Compared the survey data against previous studies to determine how the use of Internet is changing and how will this impact the School infrastructure. Created a Network Analysis that compares actual data with survey data.

Tool use to date: Survey Monkey Total Responses to date: 77 Date Created: Sunday, February 28, 2016

Q1.What is your gender? Q1. What is your Gender?

Q2. What is your background? Q1. What is your Gender?

Q3. What is your Major?

Q4. What is your Age Group?

Q5. How long do you use the Internet per day ?

Q6.Have the Internet enhanced your academic performance?

Q7. Has Internet services helped you, the student, in your academic pursuit?

Q8. What kind of device do you use most to connect to the Internet?

Q10.What is your primary purpose in using the Internet?

Q12. What Social Media site do you use the most?

Survey Data Analysis Results

Prominent Group 1

Prominent Group 2

Academic Enhancement

Internet Usage

Network Analysis In order to capture the traffic and application data of the students at Pace, we would need to access 2 main components of the network. (Outlined in red). The first, is the Edge Routers. The edge routers would be able to provide information such as port #’s, protocols, routing tables, forwarding tables, logs etc. The combination of all the router data would be able to give us a look at what type of traffic is being sent/received, what applications are using it, and which student is involved. (Firewall also needed to determine student identity) The second component is the Edge Firewall. The firewall will be able to provide information such as user-access/control lists (what specific users have access to certain areas of the network), user ID’s, blocked IP’s/Subnets, and traffic logs Both devices are usually configured for logging and would have all the traffic metrics per student.

Survey vs Network Analysis Data comparison

Network Data Analysis Overview Denied by Pace University ITS department to obtain network information Substituted data with findings from similar study done by University Utara Malaysia (UUM) Study focused on HTTP traffic analysis over 5 day period

Comparison of Data Pace Student Survey 90.67% of students indicated internet “enhances their academic performance” 41.89% of students state “they use the internet for education” 33.78% of students said they use the internet for entertainment and social media Average daily usage was found to be 5-6 hours Network Data UUM network analysis indicated the largest percentage of HTTP traffic was social networking and entertainment sites at 42% of the total weekly traffic Search engines made up 19% of total HTTP traffic E-Commerce sites represented 9% total HTTP traffic Educational and Information services sites were 3% and 2% of total HTTP traffic

Comparison of Data con’t Pace Student SurveyNetwork Data

From a light Evident disparity between perceived internet usage and actual network traffic Should educational institutions take it upon themselves and start implementing restrictive network policies to only allow internet usage for academic purposes? The comparison results could also raise the questions that perhaps technology has enabled us to be connected at all times, so much so that maybe it is now hindering productivity rather than promoting it? Better question is, how can the school use this information to expand further and incorporate this to expand their educational system?

From another perspective In a study made by Cisco in 2015 it foretold that by the end of 2016 the global internet traffic will surpass the zettabyte threshold. That is 1 billion terabytes of data. The same study, suggested that by the end of 2019 it will reach 2 zettabyte per year. If expanded further, this research can help schools determine: A.If they are ready for what is to come, as devices become cheaper and accessible to all B.Provide a better, faster and secure Internet.

Conclusion It is clear that students feel, or at least, project that they are managing their time effectively while using the internet on campus. The network traffic analysis suggests otherwise. The amount of information consumed over the internet is only increasing and the trend of a constant connection to the online world is only going to continue to grow. How will the school handle the Internet Resources, are they prepare for the next decade? Should better and stronger policies come into play? How will they take advantage of this situation and implemented for better Academic Success?