Usage Statistics & Information Behaviors: understanding User Behavior with Quantitative Indicators
INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE ...
Transcript of INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE ...
INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK
PERFORMANCE : CASE STUDY IN POLYTECHNIC
TUANKU SYED SIRAJUDDIN NETWORK
VIRAKWAN AD HA1 KELIAN
UNIVERSlTl UTARA MALAYSIA 201 1
brought to you by COREView metadata, citation and similar papers at core.ac.uk
provided by Universiti Utara Malaysia: UUM eTheses
KOLEJ SASTERA DAN SAINS (College of Arts and Sciences)
Universiti Utara Malaysia
PERAKUAN KERJA KERTAS PROJEK (Certificate of Project Paper)
Saya, yang bertandatangan, memperakukan bahawa (I, the undersigned, certijies that)
-AN A/P HAI KELIAN i800355)
calon untuk Ij azah (candidate for the degree on MSc. (Information Technologv)
telah mengemukakan kertas projek yang bertajuk (has presented his/herproject of the following title)
INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK PERFORMANCE : CASE STUDY IN POZYTECHNIC TUANKU SYED SIRAJUDDIN NETWORK
seperti yang tercatat di muka surat tajuk dan kulit kertas projek (as it appears on the title page and front cover of project)
I
bahalva kertas projek tersebut boleh diterima dari segi bentuk serta kandungan dan meliputi bidang ilmu dengan memuaskan. (that this project is in acceptable form and content, and that a satisfactory knowledge of the field is covered by the project).
Nama Penyelia (Name of Supervisor) : DR. MASSUDI MAHMUDDIN GT& , ,\ , .-I * I L
,
Tandatangan (Signature) Tarikh (Date) : z/%,,?a 1 1
Nama Penilai (Name of Evaluator) :
Tandatangan (Signature) arikh (Date) :
INTERNET USAGE BEHAVIOR TO DETERMINE NETWORK
PERFORMANCE : CASE STUDY IN POLYTECHNIC
TUANKU SYED SIRAJUDDIN NETWORK
A project submitted to Dean of Research and Postgraduate Studies Office in partial Fulfillment of the requirement for the degree Master of Science Information Technology
Universiti Utara Malaysia
BY Virakwan AIP Hai Kelian
PERMISSION TO USE
In presenting this project in partial fulfillment of the requirements for a postgraduate degree fiom Universiti Utara Malaysia, I agree that the University Library may make it freely available for inspection. I further agree that permission for copying of this project in any manner, in whole or in part, for scholarly purpose may be granted by my supervisor(s) or, in their absence by the Dean of Postgraduate and Research. It is understood that any copying or publication or use of this project or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to Universiti Utara Malaysia for any scholarly use which may be made of any material from my project.
Requests for permission to copy or to make other use of materials in this project, in whole or in part, should be addressed to
Dean of Research and Postgraduate Studies College of Arts and Sciences
Universiti Utara Malaysia 060 10 UUM Sintok Kedah Darul Arnan
Malaysia
ABSTRAK
Kebanyakkan institusi termasuk institusi pendidikan amat bergantung kepada
rangkaian untuk menyebarkan maklurnat serta menyiapkan kerja. Politeknik Tuanku
Syed Sirajuddin (PTSS) merupakan institusi pendidikan yang menggunakan
rangkaian untuk tujuan pendidikan serta operasi institusi dapat dilaksanakan dengan
efektif. Walaubagaimanapun, operasi yang efektif di PTSS terjejas disebabkan oleh
prestasi rangkaian yang semakin lemah. Untuk mengekalkan kadar yang efektif,
adalah penting untuk mengawasi bagaimana sistem rangkaian berfungsi dan
digunakan oleh pengguna. Tinjauan awal mendapati masalah yang mungkin memberi
impak kepada jalur lebar rangkaian ialah sikap buruk pengguna. Untuk menangani
masalah tersebut, alat pengawasan rangkaian Cymphonix telah digunakan dalam
kajian ini untuk mengawasi rangkaian. Kajian ini hanya fokus kepada rangkaian
VLAN 20. Pengawasan dilaksanakan sepanjang lima hari bekerja dalam tempoh
semester pembelajaran pada masa waktu bekerja. Data utama yang diambil dari alat
pengawasan dalam kajian ini ialah trafik Internet, jalur lebar aplikasi serta jenis-jenis
aplikasi yang wujud. Data-data tersebut dianalisis untuk mengenalpasti jenis-jenis
aplikasi Internet dan kaitkannya dengan tabiat pengguna rangkaian. Hasil daripada
kajian mendapati trafik aplikasi Internet di rangkaian VLAN 20 adalah sentiasa
berubah-ubah pada setiap hari. Kebanyakkan trafik adalah dari aplikasi HTTP.
Aktiviti utama pengguna dalam VLAN 20 ialah melayari web dan memuat turun fail.
Malah, trafik dari aplikasi yang boleh menyebabkan penggunaan rangkaian menjadi
lemah seperti P2P dan media streaming tidak menunjukkan kadar pengguaan jalur
lebar yang banyak. Ini menunjukkan bahawa tabiat pengguna dalam rangkaian
VLAN 20 bukan merupakan faktor utama yang menyebabkan penggunaan rangkaian
di PTSS menjadi lemah. Walaubagaimanapun, kajian lanjut perlu dilaksanakan untuk
mengenalpasti penyebab utama yang menyumbang kepada masalah rangkaian di
PTSS seperti menggunakan alat pengawasan yang boleh membaca semua jenis
traffik yang tidak dikenali serta melaksanakan kajian ke atas rangkaian VLAN yang
lain di PTSS untuk menilai samaada pengguna dalam rangkaian VLAN tersebut
memberi kesan negatif kepada penggunaan rangkaian di PTSS.
ABSTRACT
Most of the institutions included education institutions heavily rely on networks to
distribute information and to get job done. Polytechnic Tuanku Syed Sirajuddin
(PTSS) is one of the educational institution that used network for educational and for
effectiveness of institution operational. However, the effectiveness of PTSS
operational was disturbed due to the network performance become slowly. To
maintain the effectiveness, it is important to monitor how the network system
working and used by users. The early observation found that, one of the possible
problems impacts the network performance is users bad behavior. To overcome the
problems, Cymphonix network monitoring tool used in this study to monitor the
network. This study only focuses on network VLAN 20. Monitoring was done during
five working days in semester study within office working hours. The main data
capture from monitoring tool used in this study are total Internet traffic, application
bandwidth and types of application that appear in the network VLAN 20. The data
captured were analyzed to identify the Internet application types and relate it to the
behavior of the network users. Result from the study indicates that Internet
application traffic in network VLAN 20 is fluctuating for every day. Most of the
traffic is from HTTP application. Main activities of users in network VLAN 20 is
only web browsing and download files. Moreover, the traffic of application that can
causes of network performance become slow such as P2P and streaming media are
not much consume the range of bandwidth. This is shows that behavior of the users
in network VLAN 20 is not main factors that cause network performance in PTSS
slow. However, there are some further studies required to identify main causes that
contribute to the network problems in PTSS such as used other type of tool that
enable to capture all the uncategorized traffic and study on other VLAN network in
PTSS to evaluate whether users in that VLAN network causes negative impact to the
performance of network in PTSS.
ACKNOWLEDGEMENT
I am heartily thankhl to my project supervisor, Dr. Massudi Bin Mahmuddin for his
guidance, valuable suggestions, kindness and promptness in reviewing my final
project. His guidance helped me in all the time to study and writing of this report.
I would also like to thank and highly appreciate to Mr. Muhammad Hafiz Bin Razi,
Head of Unit of Information Technology & Communication (UITC) in PTSS for his
help, suggestion and guidance for me to complete this study. I thank to the
coordinators for the post-graduates studies at the Information Technology Faculty of
Universiti Utara Malaysia for their continuous help. My sincere thanks also go to my
colleagues in PTSS for their encouragement and help.
I am deeply and forever indebted to my family and my fiance for their love, support,
encouragement and understanding.
Lastly, I offer my regards and blessings to all of those who supported me in any
respect during the completion of this project.
TABLE OF CONTENTS
Pages
PERMISSION TO USE
ABSTRACT
ACKNOWLEDGMENTS
TABLE OF CONTENTS
LIST OF TABLE
LIST OF FIGURES
ABBREVIATION
CHAPTER ONE : INTRODUCTION
Introduction
Motivation of Study
Problem Statement
Research Questions
Research Objectives
Scope of Study
Significant Of Study
Organization of Report
Summary
CHAPTER TWO : LITERATURE REVIEW
2.0 Introduction
2.1 Network Performance
2.1.1 Network Performance Parameters
2.2 Network Performance Monitoring
2.3 Network Monitoring Tool
2.3.1 Cymphonix Network Composer
2.3.1.1 Cymphonix Network Composer Main Features
iv
v . . .
Vll l
ix
xi
2.4 Internet Application Traffic
2.5 Network Users Behavior
2.5.1 Relationship between Network User Behavior
And Network Performance
2.6 Summary
CHAPTER THREE : RESEARCH METHOD
3.0 Introduction
3.1 Problem Identification
3.2 Initial Assessment
3.2.1 Network VLAN 20
3.2.2 Network Monitoring Tool
3.2.3 Data from the Network Monitoring Tool
3.3 Perform Monitoring
3.3.1 Setup Monitoring Tool
3.4 Definition of an Event
3.4.1 Report of Network Users
3.4.2 Application Traffic
3.4.3 Threats on Network
3.4.4 Internet Usage
3.4.5 System Reports
3.4.6 Dashboard
3.5 Analysis of Data
3.6 Summary
CHAPTER FOUR : ANALYSIS OF DATA
4.0 Introduction
4.1 Total of Network Traffic
4.2 Total Amount of Bandwidth Consumed By Applications
4.3 Types of Application Most Used By Users
4.3.1 Hypertext Transfer Protocol (HTTP)
4.3.2 Uncategorized
4.3.3 Virtual Private Network (VPN) And Tunnel
4.3.4 Peer-To-Peer File Sharing
4.3.5 Streaming Media
4.3.6 Network Basic Input/Output System (NetBIOS)
4.3.7 File Transfer Protocol (FTP)
4.3.8 EmaiVCollaboration
4.3.9 Internet Control Message Protocol (ICMP)
4.3.10 Domain Name Service (DNS)
4.4 Behavior of Network Users
4.5 Summary
CHAPTER FIVE : CONCLUSION AND RECOMMENDATION
5.1 Conclusion
5.1.1 Types of Internet Application on Network VLAN 20
5.1.2 Users Behavior on Network VLAN20
5.2 Recommendation
REFERENCES
vii
LIST OF TABLES
Pages
Table 2.1 :
Table 2.2 :
Table 2.3 :
Table 3.1 :
Table 3.2 :
Table 3.3 :
Table 3.4 :
Table 3.5 :
Table 4.1 :
The famous tools used in United Kingdom
network project
Comparison between Cymphonix and Barracuda
Time spend by users on Internet activities
Types and description of data captured by Cymphonix
Types and description of data on network user
Application types and description
captured by Cymphonix
Types of threats and description
captured by Cymphonix
Types of reports and description
captured by Cymphonix
Total bandwidth of application sets
LIST OF FIGURES
Pages
Figure 2.1 :
Figure 3.1 :
Figure 3.2 :
Figure 3.3 :
Figure 3.4 :
Figure 3.5 :
Figure 4.1 :
Figure 4.2 :
Figure 4.3 :
Figure 4.4 :
Figure 4.5 :
Figure 4.6 :
Figure 4.7 :
Figure 4.8 :
Figure 4.9 :
Figure 4.10 :
Figure 4.1 1 :
Figure 4.12 :
Figure 4.13 :
Figure 4.14 :
Figure 4.15 :
Figure 4.16 :
Figure 4.17 :
Figure 4.18 :
Figure 4.19 :
Relationship between end user behaviors,
network performance and
General Research Method
Internet bandwidth in PTSS
Main VLAN network connection in PTSS
Network Composer Cymphonix set up
Analysis framework
Total of traffic in Day 1
Total of upload and download traffic in Day 1
Total of traffic in Day 2
Total of upload and download traffic in Day 2
Total of traffic in Day 3
Total of upload and download traffic in Day 3
Total of traffic in Day 4
Total of upload and download traffic in Day 4
Total of traffic in Day 5
Total of upload and download traffic in Day 5
Total of upload and download traffic in PTSS from
Day 1 to Day 5
Bandwidth consumed by Applications in Day 1 49
Bandwidth consumed by Applications in Day 2 50
Bandwidth consumed by Applications in Day 3 5 1
Bandwidth consumed by applications in day 4 5 1
Bandwidth consumed by applications in day 5 52
Summarization of bandwidth usage by application 53
sets from day 1 until day 5
Total of Bandwidth consumed by applications in PTSS from 55
Day 1 to Day 5
Summarization of Website category requested 56
by users from day 1 until day5
LIST OF FIGURES
Pages
Figure 4.20 :
Figure 4.21 :
Figure 4.22 :
Figure 4.23 :
Figure 4.24 :
Figure 4.25 :
Figure 4.26 :
Figure 4.27 :
Figure 4.28 :
Figure 4.29 :
Figure 4.30 :
HTTP traffic volume from day 1 until day 5
Uncategorized traffic volume from day 1 until day 5
VPN traffic volume from day 1 until day 5
Peer-to-Peer traffic volume from day 1 until day 5
Streaming media traffic volume from day 1 until day 5
NetBIOS traffic volume from day 1 until day 5
FTP traffic volume from day 1 until day 5
Email traffic volume from day 1 until day 5
ICMP traffic volume from day 1 until day 5
DNS traffic volume from day 1 until day 5
Web request by host
ABBREVIATION
DNS
FTP
HTML
HTTP
HTTPS
ICMP
LAN
NetBIOS
OSI
P2P
POP
PTSS
SMTP
TCP
TCPJIP
UDP
URL
VLAN
VoIP
VPN
WWW
- Domain Name Services
- File Transfer Protocol
- HyperText Markup Language
- Hypertext Transfer Protocol
- Hypertext Transfer Protocol Secure
- Internet Control Message Protocol
- Local Area Network
- Network Basic Input/Output System
- Open System Interconnection Model
- Peer-to-Peer
- Post Office Protocol
- Polytechnic Tuanku Syed Sirajuddin
- Simple Mail Transfer Protocol
- Transmission Control Protocol
- Transmission Control ProtocoVInternet Protocol
- User Datagram Protocol
- Uniform Resource Locator
- Virtual Local Area Network
- Voice over Internet Protocol
- Virtual Private Network
- World Wide Web
CHAPTER ONE
INTRODUCTION
1.0 Introduction
Polytechnic Tuanku Syed Sirajuddin (PTSS) is an education institution having about
4,5 13 students and 367 staffs. PTSS building construct into several buildings include
administrator buildings and eight main academic department buildings which every
department have provided with computer labs, classrooms and department main
office. Most of the students and staff live on campus and majority of them have at
least network devices such as personal computer or laptop. Students and staffs owned
computers, along with approximately 3,000 network devices in the form of office
and lab computers and servers. Due to the increased of numbers of users and network
devices, the campus network has experiences tremendous growth in the volume of
traffic and put heavy demand on bandwidth.
Altogether, PTSS has approximately 26 Mbps of Internet bandwidth which is
combination of three bandwidth packages include MyRen 10 Mbps, TMNet Direct 4
Mbps and Streamyx Line 12 Mbps. All of the Internet bandwidth packages are
purchased from one ISP. The bandwidth packages purchased from the provider is not
equal and used to combine altogether in one pipe link as a load balancer. The overall
network consists of nineteenth VLAN network segments connected by router and
switch. VLAN network are created for each separate department for better control of
resources and to minimize the broadcast domain for a certain network segment.
However, there are some numbers of VLAN network builded to covers two or more
departments or Units such as VLAN 20 is builded to covers two departments which
1
The contents of
the thesis is for
internal user
only
REFERENCES
Angrisani, L., Narduzzi, C. (Oktober, 2008). Testing communication and computer
networks: An overview. IEEE Instrumentation & Measurement magazine, 12-
23.
Anti., C., M., Maksi, C., N., Knezevi, C., P., Smiljani, C., A. (January, 2010). Two
phase load balanced routing using OSPF . IEEE Journal On Selected Areas In
Communications, 28(I). Retrieved 2 1 December 20 10,
from http://ieeexplore.ieee.org
Barracuda Networks. (2010). Barracuda web filter. Retrieved : 26 October 2010,
from http ://www.barracudanetworks.com
Bashir, O., Parish, D., Sanford, M., and Philips, I. (2005). Optimising data
processing in network performance monitoring systems. IEEE Proceedings
communication, 152(5). Retrieved 12 November 20 10,
from http://ieeexplore.ieee.org
Bowles, J., & Upadhyayula, S. (1991). Network management and performance
monitoring. Proceedings. The twenty-third Southeastern symposium on system
theory. Columbia : USA. Retrieved 12 November 2010,
from http:Nieeexplore.ieee.org
Burundi Spidernet, (201 1). Improved quality of service with tiered service internet
traflc management. Retrieved : 22 October 20 10, from http://www.ipoque.com
Business Solution Magazine, (2009). Cymphonix's network composer named best
channel product. USA : Jameson Publishing.
Cymphonix Corporation. (2010). Prioritize bandwidth, control content. Retrieved :
26 October 2010, from http://www.cymphonix.com
Donelan, H., Pattison, C., & Brown-Palmer, D. (2005). The analysis of user behavior
of a network management training tool using a neural network. Systematics,
Cybernetics and Informatics, 3(5), 66-72.
Demartini, G., Chirita, P., A., Brunkhorst, I., & Nejdl, W. (2008). Ranking
categories for web search. Lecture notes in computer science. University
Hannover. 4956 (2008). Retrieved 12 November 2010,
from http://www.springerlink.com/content/6120wn55347r4185/
Du, W. (2010). ICMP: Internet Control Message Protocol. Lecture Notes for Internet
Security. Syracuse University . Retrieved : 26 October 2010,
from http://www.cis.syr.edu/-weddTeaching/cis758/LectureNotes/ICMP.pdf
eSecurityTogo. (20 10). Benefits of Cymphon h Network Composter. Retrieved : 16
November 2010, from http://www.eSecurityTogo.com
Evans, T., D. (2003). NetBIOS, NetBEUI, NBF, NBT NBIPX SMB, CIFS
networking. Retrieved : 26 October 20 10,
from http://timothydevans.me.uk/nbf2cifs/nbf2cifs.pdf
Ferguseon, P., & Huston, G. (1998). What is VPN. Retrieved : 26 October 2010,
from http://www.potaroo.net/papers/l998-3-vpdvpn.pdf
Fielding, R., Mogul, J., C., Frystyk, H., Masinter, L., Leach, P., Lee, T., B. (1999).
Hypertext Transfer Protocol -- HTTP/I. I . Retrieved 12 November 2010, from
http://tools.ietf.org/pdWrfc26 16.pdf
Gaiser, V., A. (2003). Assessing unidentijied applications
In network traflc. Retrieved : 21 October 2010, from http://www.utwente.nl
Ghamry, W., K., Elsayed, K.,M.,F., Nassar, A., M. (2009). On the interplay of
network structure and routing strategies for performance in scale-free
networks. 2009 6Ih International Symposium on High-capacity Optical
Networks and Enabling Technologies (HONET). Alexandria : Egypt. Retrieved
20 December 2010, from http://ieeexplore.ieee.org
Gorod, A., Gove, R., Sauser, B., & Boardman, J. (2009). System of system
management : A network management approach. 2007 IEEE International
conference on system of system Engineering. San Antonio : USA. Retrieved 12
November 20 10, from http://ieeexplore.ieee.org
Guo, Z., S., & Zhuang, Y. (1997). Improving network performance by traffic
reduction. International conference on information, communication and signal
processing, ICICS ' 97, Singapore. Retrieved 2 1 December 20 10, from
http://ieeexplore.ieee.org
Gurumoorthy. (2010). Bandwidth explained. Technology updates : Electronics IT.
Retrieved 12 November 20 10,
from http://technologycrest.com/uncategorized/it~bandwidth-explained/
Hamilton, G. (2007). Adjust your behavior: network management incorporates
behavioral analysis to optimize performance. Enabling Technologies
Enterprise, IT Infrastructure Director. Boston : Yankee Group Research, Inc
Hope, T. (2010). Tools meant for network management and installation.
EnzineMark.com : Free content article directoty. Retrieved 12 November
2010, from http://technology .enzinemark.com/tools-meant-for-network
Huston, G. (2003). Measuring IP network performance. Internet Protocol Journal,
6(1). Retrieved 2 1 December 20 10,
from http://cisco.com/web/archived~issues/measuring~ip
Inoue, H., Jansens, D., Hijazi, A., & Somayaji, A. (2007). NetADHICT: A tool for
understanding network traffics. University of Minnesota : USA
Imeish, L. (201 1). Controlling streaming video traffic on a network. Networking
Channel tips. Retrieved : 26 October 2010,
from http:Nsearchnetworkingchannel.techtarget.com/tip/Con~olling-
streaming-video-traffic-on-a-network
Kang, H., J., Ju, H., T., Kim, M., S., & Hong, J., W. (2009). Towards streaming
media traffic monitoring and analysis. Postech : Korea.
Kaneda, S., Hiromori, A., Akinaga, Y., Shinagawa, N., Sugiyama, K., & Takai, M.
(2007). Performance evaluation of network systems accounting for user
behaviors. 2007 IEEE International Conference on Communication
proceedings, Glasgow : Scotland. Retrieved 20 December 20 10,
from http://ieeexplore.ieee.org
Keshav, T. (n.d). A survey of network performance monitoring tools. Retrieved : 26
October 2010, from http://www.cs.wustl.edu/-jaidcse567-06/ftp
Kirar, M., Naidu, R. (2010). Fact finding methods. Retrieved 12 November 2010,
from http://www.scribd.com/doc/6902732/fact-fi nding-tech
Lancieri, L. (2002). Description of internet user behavior. Neural Networks, 1999.
IJCNN '99 International Joint Conference. Washington D.C : USA. Retrieved
20 December 2010, from http://ieeexplore.ieee.org
Lancieri, L., & Durand, N. (2006). Internet user behavior : Compared study of the
access traces and application to the discovery of communities. Jottrnal of IEEE
Transactions on System, Man and Cybernetics, Part A : Systems and Humans,
36(1). Retrieved 12 November 2010, from http://ieeexplore.ieee.org
Liu, C., C., Day, W., W., Sun, S., W., & Wang., G. (2002). User behavior and the
"Globalness" of Internet : From a Taiwan user7 perspective. Journal of
Computer-Mediated Communication, 7 (2). Retrieved 20 December 2010, from
http://jcmc. indiana.edu/vol7/issue2/taiwan. html
Liu, V., Ragan, R. (2009). The challenges of automated application assessments in a
web 2.0 world. Stach & Liu. Retrieved : 26 October 2010, from
http://www.stachliu.com/docs/challengesautoappassess.pdf
Locale, MS. (2010). Article Alley. Content filtering solutions by
www.cyrnphonix.com for enterprise requiring web content. Retrieved 20
December 20 10, from http://www.articlealley.com/article~l748076~8 1 .html
Merwe, J., V., D., Sen, S., & Kalmanek, C. (n.d). Streaming video trafic :
Characterization and network impact. Retrieved : 26 October 2010, from
http://www.research.att.com
McEwan, N. (2006). Fact finding techniques. Retrieved 12 November 2010, from
http://ironbark.bendigo.latrobe.edu.au/subjects/IS/sem22008/lectures/l04 1Fact
Finding.shtm1
Mitchell, B. (2011). ICMP. About.com : Wireless/Networking. Retrieved : 16
October 20 10, from http://compnetworking.about.com/od/tcpip/g/bldef~icmp
Odlyzko, A., M. (2005). Internet trafic growth : Sources and implications.
University of Minnesota : USA
Paine, T. A., & Griggs, T., J. (2008). Directing traffic : Managing internet bandwidth
fairly. EDUCA USE Quartely (EQ), 3 1 (3), 1-6.
Pais, I, & Almeida, M. (2009). End user behavior and performance feedback for
service analysis. 131h International Conference on Intelligence in Next
Generation Networks, 2009. ICIN 2009. Bordeaux : France. Retrieved 20
December 20 10, from http://ieeexplore.ieee.org
79
Pang, R., Allman, M., Bennett, M., Lee, J., Paxzon, V., & Tiemey, B. (2005). Afirst
look at modern enterprise traffic. International Computer Science Institute :
Princeton University.
Parziale, L., Britt, D., T., Davis, C., Forrester, J., Liu, W., Matthews, C., & Rosselot,
N. (2006). TCP/IP Tutorial and Technical Overview. Retrieved 12 November
20 10, from http://www.redbooks.ibm.codredbooks/pdfs/gg243376.pdf
Polytechnic Tuanku Syed Sirajuddin. (2004). Network documentation for Politeknik
Perlis. PTSS : Perlis.
Roberts, J., W. (2001). Telecommunications networking at the start of the 2lSt
century : Traffic theory and the Internet. IEEE communications magazine, 94-
99.
Saito, H. & Chusho, T. (n.d). Design and implementation of a network performance
evaluation system through client observation. Japan : Meiji University.
Salahuddin Muhammad Salim Zabir, Ahmed Ashir & Shiratori, N. (2001).
Estimation of network performance : An approach based on network. Japan :
RIEC, Tohoku University.
Statcounter. (2010). Top five search engine from Oct to Dec 2010. Retrieved : 26
October 2010, from h t t p : / / g s . s t a t c o u n t e r . c o d # s e a r c h ~ e n g i n e y -
201010-201012
Ten, D.,W., H., Manickam, S., Ramadass, S. & Hussein A. A1 Bazar. (2009). Study
on advanced visualization tools in network monitoring platform. 2009 Third
UKSim European symposium on computer modelling and simulation, Athens :
Greece (pp. 445-449). Retrieved 20 December 2010, from :
http://ieeexplore.ieee.org
Tiwari, P. S. (2007). Predictive performance evaluation of interconnected power
system through telecommunication network management. IET-UK
International conference on information and communication technology in
electrical sciences (ICTES 2007), Tamil Nadu: India. Retrieved 12 November
20 10, fiom http://ieeexplore.ieee.org
Valenzuela, D., & Shrivastava, P. (n.d). Interview as a method for qualitative
research. Retrieved 12 November 20 10,
from http://www.public.asu.edd-kroeYww5OO/Inte~iew%2OFri.pdf
Wallin, S., & Leijon, V. (2006). Rethinking network management solutions. Jotirnal
of IT Professional, 8(6). Retrieved 12 November 20 10,
from http://ieeexplore.ieee.org
Wang, J. Chiu, D. M., Lui, J.,C., S. (2009). Credit-based network management.
Communication Systems and Networks and Workshops, 2009. COMSNETS
2009. First International, Bangalore : India (pp. 1-10). Retrieved from :
http://ieeexplore.ieee.org
Websense. (2011). URL Categories : Accurate, current and comprehensive.
Retrieved : 26 October 20 10, from http://www.websense.com/content
Wiersma, W. (1995). Research methods in edtication : An introdtiction (61h ed.).
Massachusetts : Allyn and Bacon.
Williamson, C. (2001). Internet Traffic Measurement. Jotirnal of IEEE Internet
Computing, 5(6). Retrieved 12 November 2010, from http://ieeexplore.ieee.org
Whitten, J., L., Betley, L., D. & Diltman, D., C. (2001). Syetem analysis and design
method (5Ih ed). Boston : Mc-Graw-Hill Education.