Identifying Internet Usage Patterns in UUM
UUM endless fight to accommodate users demand for internet bandwidth had been raging for years without ending. Bandwidth shaping tool had been implemented to enforce policies of internet usage but still user demand are endless. Preliminary study for user characteristic and pattern in internet usage...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2009
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/1873/1/Khairil_Adli_Abdul_Rahman.pdf https://etd.uum.edu.my/1873/2/1.Khairil_Adli_Abdul_Rahman.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.1873 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
TK5101-6720 Telecommunication |
spellingShingle |
TK5101-6720 Telecommunication Khairil Adli, Abdul Rahman Identifying Internet Usage Patterns in UUM |
description |
UUM endless fight to accommodate users demand for internet bandwidth had been raging for years without ending. Bandwidth shaping tool had been implemented to enforce policies of internet usage but still user demand are endless. Preliminary study for user characteristic and pattern in internet usage would offer UUM a better insight of it users characteristics and current trends and even predicted future usage. This research was done to identify patterns and trends regarding internet usage in UUM
environments. The data was obtained from NetEnforcer, a bandwidth management devices currently used in UUM. The data instances that were included are total bandwidth usage, ip addresses and protocols. The data that was recorded in twenty four hours a day for duration on nineteen weeks has been analyzed and finally a few suggestions were presented in order to improve UUM's internet bandwidth management policies. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Khairil Adli, Abdul Rahman |
author_facet |
Khairil Adli, Abdul Rahman |
author_sort |
Khairil Adli, Abdul Rahman |
title |
Identifying Internet Usage Patterns in UUM |
title_short |
Identifying Internet Usage Patterns in UUM |
title_full |
Identifying Internet Usage Patterns in UUM |
title_fullStr |
Identifying Internet Usage Patterns in UUM |
title_full_unstemmed |
Identifying Internet Usage Patterns in UUM |
title_sort |
identifying internet usage patterns in uum |
granting_institution |
Universiti Utara Malaysia |
granting_department |
College of Arts and Sciences (CAS) |
publishDate |
2009 |
url |
https://etd.uum.edu.my/1873/1/Khairil_Adli_Abdul_Rahman.pdf https://etd.uum.edu.my/1873/2/1.Khairil_Adli_Abdul_Rahman.pdf |
_version_ |
1747827223150198784 |
spelling |
my-uum-etd.18732013-07-24T12:13:31Z Identifying Internet Usage Patterns in UUM 2009 Khairil Adli, Abdul Rahman College of Arts and Sciences (CAS) College of Arts and Sciences TK5101-6720 Telecommunication UUM endless fight to accommodate users demand for internet bandwidth had been raging for years without ending. Bandwidth shaping tool had been implemented to enforce policies of internet usage but still user demand are endless. Preliminary study for user characteristic and pattern in internet usage would offer UUM a better insight of it users characteristics and current trends and even predicted future usage. This research was done to identify patterns and trends regarding internet usage in UUM environments. The data was obtained from NetEnforcer, a bandwidth management devices currently used in UUM. The data instances that were included are total bandwidth usage, ip addresses and protocols. The data that was recorded in twenty four hours a day for duration on nineteen weeks has been analyzed and finally a few suggestions were presented in order to improve UUM's internet bandwidth management policies. 2009 Thesis https://etd.uum.edu.my/1873/ https://etd.uum.edu.my/1873/1/Khairil_Adli_Abdul_Rahman.pdf application/pdf eng validuser https://etd.uum.edu.my/1873/2/1.Khairil_Adli_Abdul_Rahman.pdf application/pdf eng public masters masters Universiti Utara Malaysia Abbas, A., Osman, B., & Din, R. (2007). Network Respond Time : Case Study UUM ISLAN, Universiti Utara Malaysia. Balachandran, A., Voelker, G.M., Bahl, P., & Rangan, P.V. (2002).Characterizing user behavior and network performance in a public wireless LAN,_Joint International Conference on Measurement and Modeling of Computer System,-Proceedings of the 2002 ACM SlGMETRlCS international conference on Measurement and modeling of computer systems, SESSION: Networks II, Pg 195-205 . doi:10.1145/511334.511359 Chiu, D-M., & Sudama, R. (1998). Studying the use and application behavior of a large network, Workshop on the Future Trends of Distributed Computing Systems in the 1990's, 1998 Proceedings, Pg 14-22. doi: 10.1109/FTDCS.1988.26674 Claffy, K., Miller, G., & Thompson, K. (1998). The Nature of the Beast: Recent Traffic Measurements from an Internet Backbone, Proceedings of INET '98. Estan C., Savage, S.R., & Varghese, G.(2003). Automatically inferring patterns of resource consumption in network traffic, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany, Pg 137-148. doi:10.1145/863955.863972 Feldmann, A., Greenberg, A., Lund, C., Reingold, N., & Rexford, J. (2001). Deriving Traffic Demand s for Operational IP Networks : Methodology and Experience, IEEE/ACM Transactions on Networking, Volume 9, lssue 3, Pg 265-280. doi : 10.1109/90.929850 Fomenkov, M., Keys, K., Moore, D., & Claffy, K. (2004). Longitudinal study of lnternet traffic in 1998-2003, ACM International Conference Proceeding Series, Volume 58,Pg1-6. Fowler, H.J., & Leland, W.E. (1991). Local area network characteristics, with implications for broadband network congestion management, IEEE Journal on Selected Areas In Communications, Volume 9, lssue 7, Pg 1139-1149. doi: 10.1109/49.103559 Fred, S.B., Bonald, T., Proutiere, A., Regnie, G. & Roberts, J.W., (2001). Statistical bandwidth sharing : a study of congestion at flow level, ACM SIGCOMM Computer Communication Review, Volume 31, lssue 4, Pg 111-122. doi:l0.1145/964723.383068 Kim, Won, Y.J., & Hong, J.W. (2005). Characteristic analysis of internet traffic from the perspective of flows, Computer Communications Volume 29, lssue 10, pg 1639-1652. doi:l0.1016/j.comcom.2005.07.015 McCreary, S., & Claffy, K. (2000). Trends in wide area IP traffic pattern : a view from Ames lnternet eXchange, 13th ITC specialist seminar : IP Traffic measurement, modeling and management. Tang, D., & Baker, M. (2000). Analysis of a Local-Area Wireless Network,-International Conference on Mobile Computing and Networking,-Proceedings of the 6th annual international conference on Mobile computing and networking, Pg 1-10. doi: 10.1145/345910.345912 Thompson, K., Miller, G.J., & Wilder, R. (1997). Wide-area lnternet traffic patterns and characteristics, IEEE Network, Volume 11, lssue 6, Pg 10-23.doi: 10.1109/65.642356 Odlyzko, A.M (2003). lnternet traffic growth: Sources and implications, in Optical Transmission Systems and Equipment for WDM Networking 11, Volume 5247, Pg 1-15. Pise, K., Dethe, C.G., & Wakde D.G. (2003). Characterising WAN usage patterns in a local area network, SSGMCE -Telecommunications, ConTEL 2003, Proceedings of the 7th International Conference, Volume 2, Pg 649-652. doi: 10.1109/CONTEL.2003.1215885 Roberts, J.W. (2001). Traffic Theory and the Internet, IEEE Communications Magazine, Volume 39, lssue 1, Pg 94-99. doi: 10.1109/35.894382 |