Improving the Performance of a Network by Managing the Bandwidth Utilisation with squidGuard: A Case Study
Abstract
The University of Mines and Technology (UMaT) has a Local Area Network (LAN) with a download and upload bandwidth capacity of 60 MB, which is connected to a Network Operating Center (NOC) by fiber optic cable and distributed to about 3000 users in the UMaT community via Cat 6 Ethernet cables and wireless access connections. The primary purpose of the internet facility is to support teaching and learning, research and sharing of information. Unfortunately, even though the capacity of the bandwidth is considered sufficient, the LAN had two main challenges: the network appeared to be slow; and sometimes it gave signals of insecurity from virus attacks. This paper sought to study the behaviour patterns and bandwidth utilisation trends of the network users using Squid Analysis Report Generator (SARG); identify the causes of the challenges and deploy effective bandwidth management control policies using squidGuard. The results of the study revealed that the challenges of the LAN are attributable to: misuse of the bandwidth mainly by some students on low-priority, bandwidth-hungry websites and applications such as pornographic and other useless websites and peer-to-peer applications; and lack of effective bandwidth management control policies. After the installation of a squidGuard on the firewall server and definition of access protocols and policies to effectively monitor and control the network traffic by giving priority access to legitimate users and restricting access to low-priority, bandwidth-hungry websites and applications, there was a significant increase in the speed and security of the LAN. It is recommended that the installed software packages must be upgraded periodically to sustain the performance of the LAN; the bandwidth capacity could also be increased to 100 MB as the students’ number increases.
Keywords
Full Text:
PDFReferences
Anon. (2010), “The Need for Bandwidth Management: Taking Control of your Internet Connection”. http://www.internetwk.com/links-/elron.html Accessed: August 5, 2016.
Kondakci, S. (2009), “A concise cost analysis of Internet malware”. Computers & Security, Volume 28, Issue 7, October 2009, pp. 648-659.
Gummadi, KP, Dunn, RJ, Saroiu S, Gribble, SD, Levy, HM and Zahorjan, J. (2003), Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In SOSP’03: Nineteenth ACM Symposium on Operating Systems Principles, 2003, pp. 314–329.
Sandvine (2002), Peer-to-Peer File Sharing: The
Impact of File Sharing on Service Provider Networks, Industry White Paper. Sandvine Inc., Ontario, 29 pp.
Sharma V, Kumar, V & Thakiu, BS (2011), Need of Bandwidth management and formulation of policy framework for Effective utilisation of Internet services within a University campus. International Journal of Computer Science and Communication 2(1), pp. 173-178.
Dualwan, (2009). “Bandwidth Management and Traffic Optimization”, http://dualwan.org/ bandwidth-management.html. Accessed: Oct 8, 2016.
Rosenberg, D. (2008), “Evaluating Electronic Resource Programmes and Provision: Case Studies from Africa and Asia, INASP Research and Education Case Studies, 3”, www.inasp.info/file/c85e1f2bd439dd5aa2c350814e81c4cf/evaluating-electronic-resource-programmes-and-provision-case-studies-from-africa-and-asia.html, Accessed: September 10, 2016.
Ravi, S. (2015), “Squid Analysis Report Generator and Internet Bandwidth Monitoring Tool”, http://www.tecmint.com/sarg-squid-analysis-report-generator-and-internet-bandwidth-monitoring-tool, Accessed November 7, 2016.
Haland, L. E. (1998), “pfSense - Squid + Squidguard / Traffic Shapping Tutorial”, https://www.howtoforge.com/pfsense-squid-squidguard-traffic-shaping-tutorial, Accessed: September 17, 2016.
Refbacks
- There are currently no refbacks.