An Overview of A Case Study of the Uses Supported by Higher Education Computer Networks and An Analysis of Application Traffic Mark Pisano dps2017.

Slides:



Advertisements
Similar presentations
General Information Software Robot Benri. Characteristics 1. Connect up to 16 cameras. 2. Do six different type of detections. 3. Define sub-areas where.
Advertisements

Networks & Communications
Chapter 1:Introduction to the world of computers
Introduction to the World of Computers
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
1 YouTube Traffic Characterization: A View From the Edge Phillipa Gill¹, Martin Arlitt²¹, Zongpeng Li¹, Anirban Mahanti³ ¹ Dept. of Computer Science, University.
SOFTWARE.
Social Networking Vocabulary Cycle 2. Blog Vocabulary  blog – a personal or professional website which is updated on a regular basis with an individual’s.
Digital Library Operating Management System by North Bangkok University Suphot Phuangkamnerd 1 Prachyanun Nilsook 2 and Ravisada Thamrongviwanna3 1 North.
Networks QUME 185 Introduction to Computer Applications.
1 A Comparative Study of Handheld and Non-Handheld Traffic in Campus Wi-Fi Networks Aaron Gember, Ashok Anand, and Aditya Akella University of Wisconsin—Madison.
Protecting Students on the School Computer Network Enfield High School.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Learning Objective The students should be able to: a. state the definition of software b. state the usage of software c. list different types of software.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
 You will need to be able to Discuss the use of networks both in the workplace and at home.  Because of this, you will need to: › identify different.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Higher Computing Networking. Networking – Local Area Networks.
An Analysis of Internet Content Delivery Systems 19 rd November, 2007 Youngsub CSE, SNU.
Assignment # 3 Networking Components By: Jeff Long.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Allison, Curtis M.; Bottu, Srikanth; Heckadon, Monica I. Group Project 12A Client: LTC Avery Leider An Analysis of Student Internet Usage and its Impact.
Unit 1 Lesson 13. Basic understanding of what HTTP is HTTP like DNS is an ASCII-text based protocol - it’s just two computers sending text messages to.
1.4 wired and wireless networks lesson 1
Information Technology Acceptable Use An Overview
3.1 Types of Servers.
Get your Math Lessons Into The hands of Your Students!
Introduction to Technology Infrastructure
HTTP and Abstraction on the Internet
HTTP AND ABSTRACTION ON THE INTERNET
Instructor: Ahmed Jafer
Computer Networks Part 1
Edited by : Noor Al-Hareqi
Ways to protect yourself against hackers
HTTP and Abstraction on the Internet
Ad-hoc Networks.
IAB/PwC Internet Advertising Revenue Report Detailed Analysis
Chapter 3 Internet Applications and Network Programming
Understand the OSI Model Part 1
Computer Hardware-Meeting the machine
MONITORING MICROSOFT WINDOWS SERVER 2003
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Introduction to Computers
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Introduction to Technology Infrastructure
TASK 4 Guideline.
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Web Design.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
*.
Increased Efficiency and Effectiveness
Chapter 11-Business and Technology
Network Fundamentals – Chapter 4
Building a Database on S3
Who is the King of the Hill? Traffic Analysis over a 4G Network
11 Business and Technology 11-1 Computer Systems
Information Technology
Information Technology
HTTP and Abstraction on the Internet / The Need for DNS
Unit 11- Computer Networks
Tonga Institute of Higher Education IT 141: Information Systems
Smart Television.
Introduction to the World Wide Web and the Internet
The Internet and Electronic mail
Tonga Institute of Higher Education IT 141: Information Systems
Presentation transcript:

An Overview of A Case Study of the Uses Supported by Higher Education Computer Networks and An Analysis of Application Traffic Mark Pisano dps2017

Introduction A common thought is that these networks are built out to support all of the technology that is scattered across campuses that is used to conduct research. An additional view, which is equally as common, is that the students need to have access to these high end networks in order to study and prepare themselves for their academics. Is the reality that these expensive networks are being used very heavily as entertainment networks? Why are universities spending so much money on their networks? Is it a selling point to students or faculty? Could it be for planning? It could be to tie all the scattered technology together that is used to conduct research Or it could be used for students to prepare and support their academics Is the reality that these expensive networks are being used very heavily as entertainment networks? A better understanding of what is being supported needs to be done

Methodology Data is collected from a firewall appliance on a monthly basis. Total bytes, bytes sent, bytes received, application category, application technology, and number of sessions is collected for the top fifty applications. The list of applications is then organized by the application categories and the summarized data is analyzed. Applications are identified by their unique signature which comes from a detailed analysis of the data packet.

Literature Review ResNet Wireless BYOD or BYOE Higher Education institutions have become some of the larges ISP’s. Focus on overall bandwidth Wireless Focus is on bandwidth and density. BYOD or BYOE Concern mounting over the number of devices being supported. Clear trend of a growing number of devices with over half bringing three or more Area of higher education consists of colleges and universities ACUTA Association of Information Communications Technology Professionals Pearsons

Data and Data Analysis Data Analysis Process Collected in monthly cycles due the configuration of the device. Bytes, bytes sent, bytes received, and number of sessions was collected All based off of the unique application signature. Analysis Process The monthly data was exported to excel worksheets which where then consolidated into a single file Each month was limited to the top fifty applications which showed a total of 140 different applications Recommend best practice was to only store 30 days worth of logs For example, traffic being exchanged with YouTube is uniquely identified and cataloged based off of the signature. The volume of bytes sent and received along with sessions to YouTube is then able to be recorded. 140 means that there is a change in the monthly uses

Data and Data Analysis (cont.) Application Categories business-systems collaboration general-internet media networking unknown business-systems: This category is made up of applications that focus on cloud based business services, software or hardware update services, databases, and applications that provide overall support to business processes and operations. collaboration: Applications that make up the category are focused on communication and consist of social media, conferencing, messaging, and email. general-internet: These applications focus on http traffic, web browser based applications, and supportive applications. media: This category is made up of applications that are primarily used for entertainment. They include gamming, video streaming, and photo sharing or viewing. networking: These applications take on a supportive role to all of the other applications that process across the network while also maintaining and keeping the network communicating. unknown: There is not enough information available to help fully classify the traffic.

Data and Data Analysis (cont.) Media applications although making up about 29% of the traffic are using very few sessions at only about 5% Networking applications are utilizing 34.16% of the traffic Networking applications use the most sessions out of all the categories with a whopping 56.64%

Observations and Discussion PERCENTAGE of sessions The current major observation is that the largest use of the network involves supporting itself. This would consume more sessions easily since a single session would be generated every time a DNS request is made. Overall, media applications would only open a single session and then consume more bandwidth over the life of the session.

Observations and Discussion (cont.) SUMMARIZED percentage of Bytes media application category is a very close second to networking application category. Now when factoring in that a portion of the networking applications are used to directly support the media applications and even portions of the general internet applications and collaboration applications are functioning as entertainment, we can see how the overall usage is really just supporting users’ entertainment needs and demands.

Observations and Discussion (cont.) Overall usage of the network can be viewed as an entertainment network. Entertainment has been defined as applications that are used to view video, images, gaming, and any supporting applications that might be needed to help operate the entertainment applications. Applications in the media application category without the supportive applications use about 29% of the overall bandwidth. This is a staggering amount, with Netflix and YouTube being at the top of the list.

Conclusion The main focus has been to show what Higher Education Computing Networks are being used for. Based on analysis of the categories that higher education computing networks are being heavily used as entertainment networks. Limitations Size of demographic Length of the study Future Work Larger demographic Longer studies

Fin