5 research outputs found

    Traffic measurement and analysis of Wide Area Network (WAN) link usage: a case study of UiTM Perlis campus network / Abidah Mat Taib, Rafiza Ruslan and Abdul Hadi Kamel Abdullah

    Get PDF
    Network users normally will start complaining when the response time for the network access is intolerable or their network access is intermittently interrupted due to unclear reasons. Knowing how the network bandwidth is being utilized by the users will give the administrator some ideas of possible reasons for the network access problems and how to alleviate the problems. Some users may just use the network for running non bandwidth intensive applications like email and telnet and some users may use the network for running bandwidth intensive application such as video streaming and downloading big files using ftp application. Many users may visit popular web sites that are not related to their work during office hours. The above information about bandwidth utilization on a network link can be acquired through measurement and analysis of the network traffic that pass through the link. This paper discuss real time passive measurement of the network traffic on the WAN link that connects UiTM Perlis campus network to the main campus of UiTM in Shah Alam. The analysis of the traffic helped us to know some aspects of the WAN link utilization. This includes the average bandwidth utilization, popular application layer protocols and popular websites among different user segments and also some anomalies found in the captured trace

    Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P

    Get PDF
    This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network

    Performance evaluation of Wi-Fi and White-Fi: simulation approach

    Get PDF
    Wi-Fi is widely used to connect electronic devices wirelessly using ISM radio bands.Previous studies have reported traffic congestion in Wi-Fi due to several reasons.As an alternative, unused spectrum in TV band known as TV white space (TVWS) can be utilized for the same purpose. The use of Wi-Fi technology in TV band is also known as White-Fi. TVWS ranges in VHF and UHF that is not utilized by licensed user in a particular time and location. This paper presents a network performance comparison between Wi-Fi and White-Fi by evaluating the average throughput, end-to-end delay and packet delivery ratio (PDR). The simulation result shows White-Fi (IEEE 802.11af) has a significant percentage of average throughput and PDR with 25.94% and 24.06% compared to Wi-Fi (IEEE 802.11g) respectively.In addition, the percentage of average end-to-end delay in White-Fi is 60.79% lower than Wi-Fi

    Performance Analysis of Open-Source Network Monitoring Software in Wireless Network

    Get PDF
    Nowadays, computer networks are used in education, sports, business, transportation, manufacturing, and more. Thus, it makes the network more complex and harder to monitor, especially in terms of performance. The implementation of network monitoring software presents a viable solution for resolving this issue. It is because network monitoring software can monitor behaviours, provide alertness for any failing component of a computer network, and measure performance such as CPU usage, bandwidth, throughput, response time, and packet loss. However, network monitoring software has common problems, such as being hard to set up and making it hard to find the best network monitoring that fits the requirements. Thus, this study aims to identify network monitoring software that is easy to configure and analyse the performance of network monitoring software in terms of response time and packet loss. The study comprises the implementation of open-source network monitoring software, including PRTG, OpManager, Zabbix, and LibreNMS. The two experiments were conducted by launching TCP attacks for response time and UDP attacks for packet loss. Both attacks consisted of four scenarios: 15 threads, 30 threads, 45 threads, and 60 threads. As a result, PRTG offers a simpler installation procedure and easier configuration options, with a straightforward and attractive Graphical User Interface (GUI) that allows for all configurations to be conveniently performed directly through the interface. For monitoring websites, users need to add the device that was targeted by the website and choose an HTTP sensor for response time and PING for packet loss. The evaluation was based on the lowest average response time and consistency in the detection of packet loss. Consequently, Zabbix demonstrates the highest level of responsiveness about web services, which have the lowest average response time and consistently exhibit the lowest occurrence of packet loss

    The Performance Analysis of Malware Attack

    Get PDF
    People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack
    corecore