Mandla Lukubeni Project(WSU)

84
INVESTIGATING THE NETWORK PERFORMANCE AND RECURRENT DOWNTIME AT WALTER SISULU UNIVERSITY; A CASE STUDY IBIKA CAMPUS A thesis submitted in fulfillment of the requirements for the Baccalaureus Technologiae In Information TechnologyCommunication Networks (B-Tech: IT) BY MR M LUKUBENI STUDENT NO: 208100644 PROMOTER/ SUPERVISOR: MR A MWANZA NOVEMBER 2012

Transcript of Mandla Lukubeni Project(WSU)

Page 1: Mandla Lukubeni Project(WSU)

INVESTIGATING THE NETWORK PERFORMANCE AND

RECURRENT DOWNTIME AT WALTER SISULU

UNIVERSITY; A CASE STUDY IBIKA CAMPUS

A thesis submitted in fulfillment of the requirements for the

Baccalaureus Technologiae

In Information Technology–Communication Networks (B-Tech: IT)

BY

MR M LUKUBENI

STUDENT NO: 208100644

PROMOTER/ SUPERVISOR: MR A MWANZA

NOVEMBER 2012

Page 2: Mandla Lukubeni Project(WSU)

1

DECLARATION

I hereby declare that the dissertation: INVESTIGATING THE NETWORK PERFORMANCE AND RECURRENT

DOWNTIME AT WALTER SISULU UNIVERSITY (CASE STUDY OF IBIKA CAMPUS); is my own work and

declares that it has not been submitted for any degree at any University

Signature…………………..

Date………………………...

Page 3: Mandla Lukubeni Project(WSU)

2

ACKNOWLEDGEMENTS

First and for most I would have done myself no justice, I would have deprived myself of greater

things and shut the well of blessings altogether if I were not to acknowledge my Lord and Savior

Jesus Christ, God who is Alfa and Omega, who made it possible for me to be able to finish my

project, Amen!

Secondly I thank God for introducing Mr. Mwanza in my life, the most caring supervisor ever

who also played a parental role in my student life. Without Mr. Mwanza I would have not

attained what I have had he was not my lecturer, Thank you sir. I also thank Mr. B Ndovie and

Mr. G Mwansa who also played a big role in this project.

Thirdly, I thank the encouragements from my fellow student mates Mtshengu Thembinkosi,

Hlengiwe Thandazwa, Linda Fukula and Khanyisile Noah. We were falling together but what I

like most we never stopped encouraging each other.

Last but not least I give a word of thanks to my family for giving me a chance to further in my

studies. They supported me on each and every aspect of my life.

Words cannot express enough on how I want to give thanks to people who made all this project

possible, Thank you

A great brick layer is the one who lays firm foundation with the stones that others throw at him,

“African Proverbs”

God Bless you all !!!!!!!!!!!!!!!

Page 4: Mandla Lukubeni Project(WSU)

3

TABLE OF CONTENTS

PAGES

Declaration 1

Acknowladgement 2

Table of Contents 3

List Of Figures 4

Abstract 7

CHAPTER ONE

1.1 Background 8

1.2 Literature Review 12

1.3 Problem Statement 13

1.4 Purpose of the Study 14

1.5 Research Objectives 15

1.6 Research Questions 15

1.7 Study Area 15

1.8 Significance of the Study 16

1.9 Delimitation 16

1.10 Definition of Terms 16

1.11 Outline of the Thesis 22

1.12Conclusion 23

CHAPTER TWO

2.1 Introduction 24

2.2 WSU Campuses 24

2.3 Network Structure 24

2.4 Network Performance Impact on an Educational Organization 33

2.5 Causes of Low Network Performance 34

2.6 How to Measure Network Performance 35

2.7 Network Architecture 38

2.8 Security Threats 39

2.9 Firewalls 41

2.10 Conclusion 41

CHAPTER THREE

3.1 Introduction 42

3.2 Research Methodology 42

3.3 Research Design 42

3.4. Sampling 43

Page 5: Mandla Lukubeni Project(WSU)

4

3.5 Instrumentation 43

3.6 Data Collection 43

3.7 Data Analysis 44

3.8 Conclusion 45

CHAPTER FOUR

4.1 Introduction 46

4.2 Data Analysis 46

4.3 Data Representation 47

4.4 Conclusion 62

CHAPTER FIVE

5.1 Introduction 63

5.2 Research Discussion 63

5.3 Research Recommendations 64

5.4 Conclusion 68

APPENDIX

Questionnaire Cover Letter 70

Questionnaire 71

References 77

Page 6: Mandla Lukubeni Project(WSU)

5

LIST OF FIGURES

Figure 2.3.1 : Layout Design Structure For Network Topologies

Figure 2.3.2 : Bus Network Topology

Figure 2.3.3 : Star Topology

Figure 2.3.4 : Ring Topology

Figure 2.3.5 : Point to Point Topology

Figure 2.3.6 : Point to Multi-Point topology

Figure 2.3.7 : Point to Point WAN Topology

Figure 2.3.8 : WAN Ring Topology

Figure 2.3.9 : WAN Star Topology

Figure 2.3.10 : Multitiered WAN Topology

Figure 2.3.11 : MAN Topology

Figure 2.3.12 : WLAN Topology

Figure 2.6.1 : Digital Bandwidth Measures

Figure 2.6.2 : Bandwidth Limitations

Figure 2.6.3 : Bandwidth Associated with WAN Services

Figure 4.3.1 : The Percentage of Female and Male Respondents

Figure 4.3.2 : The Age Category

Figure 4.3.3 : The Faculty Category

Figure 4.3.4 : The Staff or Student category

Figure 4.3.5 : Statistics on courses that include computer as a subject

Figure 4.3.6 : Severity on internet usage

Figure 4.3.7 : Internet access technology one uses.

Page 7: Mandla Lukubeni Project(WSU)

6

Figure 4.3.8 : Difficulty to connect to the internet

Figure 4.3.9 : What is the internet mostly used for

Figure 4.3.10 : Overall ratings on the internet connection

Figure 4.3.11 : Application which is mostly used.

Figure 4.3.12 : Virus on the network

Figure 4.3.13 : How many upload data on the network

Figure 4.3.14 : How often data is uploaded on the network.

Figure 4.3.15 : Quality of service on the network performance

Figure 4.3.16 : Which system people use most

Figure 4.3.17 : How often the system is used

Figure 4.3.18 : The importance of internet access

Figure 4.3.19 : Our lives are changed because of the presence of the internet

Figure 4.3.20 : How quick the problem is solved about the network

Figure 4.3.21 : Satisfaction on the internet availability

Figure 4.3.22 : Does the network support my learning or teaching needs?

Figure 4.3.23 : The response/ interactivity of the system

Page 8: Mandla Lukubeni Project(WSU)

7

ABSTRACT

The network performance is a grate factor in an educational institution because we are living in

an informational world. Each and every organization depends in a way on the network

performance to run its services. Based on the experience I had in the university, the network is

unreliable based on the performance and recurrent downtime.

The purpose of this research is to investigate on the network performance and recurrent

downtimes at WSU-iBika campus. This research will also investigate about the causes of this

network failure. This study collected the information from students and staff using

questionnaires and then it was analysed and conclusion was made from the analysis.

Page 9: Mandla Lukubeni Project(WSU)

8

CHAPTER ONE

1.1 BACKGROUND

Walter Sisulu University (WSU) is one of the South African Universities located in one

of the least-developed parts of South Africa, the Eastern Cape. WSU is a comprehensive

university, the result of three historical disadvantaged higher level learning institutions.

These high level learning institutions used to operate independently of one another with

different organizational cultures.

This comprehensive institution was the result of a merger between the former University

of Transkei and two technikons, the Border Technikon at Potsdam and the Eastern Cape

Technikon in Butterworth. The new Walter Sisulu University, therefore, offers higher

education tuition on four campuses – in Mthatha (erstwhile capital of Transkei), in

Butterworth, as well as in East London in the Buffalo City Metropolitan area, and at

Queenstown. The campuses are situated in the densely populated and generally under-

developed far-eastern hinterland of South Africa’s Eastern Cape Province. (South African

Regional Universities Association, 2012)

The merger of historically disadvantaged two technikons and a university within rural

South African setting presents a complex historical heritage. In 2005, Border Technikon;

Eastern Cape Technikon; and University of Transkei were merged into a comprehensive

university: Walter Sisulu University (WSU). The birthed institution is faced with varied

existing challenges inherited from the defunct institutions and novel challenges

emanating from the merger exercise. The Eastern Cape Province occupies 14% of the

land areas of South Africa, and has 14.5% of the country's 45 million inhabitants. [BT0]

Walter Sisulu University is located in the Eastern Cape Province together with University

of Fort Hare, Rhodes University and Nelson Mandela Metropolitan University. Primarily,

WSU serves the people of Eastern Cape Province with strong aspirations for national and

international educational leadership standings. The University has four campuses:

Buffalo City; Ibika; Mthatha; and Queenstown with eleven knowledge dispensing sites.

With four Faculties: Business, Management Sciences and Law; Education; Health

Sciences; and Science, Engineering and Technology; of which two offer doctoral

programs. It is committed to advancing the frontiers of research in Eastern Cape in

particular, South Africa and the world at large.

Page 10: Mandla Lukubeni Project(WSU)

9

All these campuses operate as a single entity; every information can be processed, can be

accessed, and also can be stored on each and every campus and all that can be done

remotely or locally. This sharing of information can be done only if there is a connection

between these site and campuses. (Walter Sisulu University, 2012)

The WSU network support many business critical systems like:

Integrated Tertiary Software (ITS)

Established in 1987, from very humble beginnings the ITS User Group has grown to a

membership of some 34 Higher Education & Further Education & Training institutions

throughout Africa, Ireland and New Zealand. Membership of the ITS User Group is open

to all organizations and institutions utilizing the Integrated Tertiary Software (Pty) Ltd

administrative systems.

Integrated Tertiary Software (Pty) Ltd specializes in the provision of integrated software

to support the administrative functions within the higher education and further education

& training sectors. The company also offers a wide range of related training, support and

consultation services to facilitate the transfer of knowledge to staff members at client

institutions.

The ITS Enterprise Resource Planning (ERP) software solution can be implemented as a

fully integrated solution to support the Student, Financial, Human Resources, Payroll and

Library business processes of a University, Polytechnic or College. ITS operates

exclusively in the education sector. The expertise gained in this field contributes to the

success of system implementation and support. ITS is an ISO 9001:2000 certified

company which ensures a continuous focus on quality and client satisfaction and fully

supports the company values.

The ITS system is fully Web enabled and staff and students access the system on campus

through a standard Web browser. Students and staff can also access the system remotely

via the Internet using standard Web Browsers and specially designed self-service (the

enabler) applications.

Membership of the User Group is open to all organizations and institutions who utilize

the Integrated Tertiary Software Administrative System. The software package which

runs on an Oracle database is designed to meet the specific needs of the tertiary

environment. Continuing growth in the client base is a clear indication that the product is

widely accepted and must be regarded as one of the leading integrated computerized

educational administrative systems in the world.

Page 11: Mandla Lukubeni Project(WSU)

10

E-Learning

Promote the innovative and effective use of information and communication

technologies (ICTs) for teaching and learning in WSU courses and programs.Provide

guidance on learning materials development, including web-based instruction

methodology. Organize e-learning conferences for the University. Advise on CLTD

Learning and Teaching Resource Centers. Champion the Centre’s marketing tools:

website, handbooks, brochures, newsletters,

Etc.

E-learning is one of the methods currently used to improve the quality and standard of

education where the Internet is regarded as a driving force to enhance learning and

teaching. E-learning is the use of technology for educational purposes including the use

of computers by students both in and outside the classroom, and on or off campus. This

methodology (E-Learning) brings major/remarkable changes in education and enhances

the traditional face-to-face approach without re-placing it. E-learning at WSU has been

piloted in the Faculty of Science, Engineering and Technology (FSET) with the objective

of improving the learning and teaching methodologies in this Faculty and the ultimate

goal of improving the student pass rate. Since the second semester of 2009, other

faculties, e.g. Faculty of Business Management Sciences and Law (FBML), Faculty of

Health Sciences and Faculty of Education have been involved as well.

WiSeUp is the Virtual Learning Environment (VLE) used for E-learning at WSU. Two

hundred and eighteen (218) academic staff (26% of the academic staff compliment of

827) has been trained on the Basic e-Learning Level. Thirty four (34) of them have also

been trained at the Intermediate level. Two thousand three hundred and seventy eight (2

378) students have been trained on WiSeUp. All courses are on WiSeUp; 490 Academic

courses have been clicked by lecturers (put material) and 328 have been accessed by

students (active).

Through E-learning technology, the learning experience is no longer limited to the

classroom or to what the teacher presents in class, students are able to download relevant

learning materials from the Internet to further their self-knowledge. WiSeUp enables both

lecturers and students to access course and module information, lecture notes, and submit

assignments as well as to engage in discussion forums. This way, communication

between students and lecturers can be improved and learning opportunities expanded.

Lecturers will benefit most in that when they have to attend workshops, seminars, etc,

they will upload course materials to be used by students during their absence. CLTD is

working hard on training all staff and students of WSU to make use of WiSeUp. With the

team in place and support from all staff members and students, this initiative should

succeed and WSU will soon be regarded as one of the universities that are

Page 12: Mandla Lukubeni Project(WSU)

11

technologically developed in terms of E-learning. It is hoped that with this initiative the

student throughput rate will be improved.

Millennium

WSU library collections cater for a wide spectrum of scholarship ranging from the

Undergraduate, graduate and postgraduate information needs. In addition to our local

collections we expose our learners to resources held in other academic Libraries in the

Eastern Cape. These academic libraries are members of a consortium called the “South

East Academic Library System” (SEALS).Together with the libraries of Fort Hare,

NMMU & Rhodes; WSU Libraries is a member of SEALS, a consortium whose agenda

is to make holdings of these libraries accessible on a shared database library system

called “Millennium”. In addition to print and other resources that are currently available

to you from the 10 WSU Library sites we also provide access to electronic scholarly and

peer reviewed journals that add value to teaching, learning and research experience at

WSU.

Service desk

Service Desk Plus integrates your help desk requests and assets to help you manage your

IT effectively. It helps you implement ITIL best practices and troubleshoot IT service

requests faster. Service Desk Plus is highly customizable, easy-to-implement help desk

software. More than 10,000 IT managers worldwide use Service Desk Plus to manage

their IT help desk and assets. Service Desk Plus is available in 23 different languages.

Firewalls

Provides robust protection and network reliability for organizations networks. Firewalls

are also designed for corporate offices and mid-sized data centers that desire true gigabit

throughput and powerful features to secure their complex network environments and

multiple Internet security zones

GroupWise This system encourages communication amongst the members of the organization where

updates, awareness’s and information are shared quickly. It provides each and every

individual with an email account so that communication via email can be established

Page 13: Mandla Lukubeni Project(WSU)

12

Intrusion Detection System (IDS)

Is software that automates the intrusion detection process? The primary responsibility of

IDS is to detect unwanted and malicious activities. Is the process of identifying and

responding to intrusion activities

Intrusion Prevention System (IPS)

Is software that has all the capabilities of an intrusion detection system and can also

attempt to stop possible incidents. Extension of ID with exercises of access control to

protect computers from exploitation. Combines IDSs and improved firewall technologies,

they make access control decisions based on application content, rather than IP address or

ports as traditional firewalls had done.

1.2 LITERATURE REVIEW

Walter Sisulu University (WSU) is one of the South African Universities located in one

of the least-developed parts of South Africa, the Eastern Cape. WSU is a comprehensive

university, the result of three historical disadvantaged higher level learning

institutions.These high level learning institutions used to operate independently of one

another with different organizational cultures.

This comprehensive institution was the result of a merger between the former University

of Transkei and two technikons, the Border Technikon at Potsdam and the Eastern Cape

Technikon in Butterworth. The new Walter Sisulu University, therefore, offers higher

education tuition on four campuses – in Mthatha (erstwhile capital of Transkei), in

Butterworth, as well as in East London in the Buffalo City Metropolitan area, and at

Queenstown. The campuses are situated in the densely populated and generally under-

developed far-eastern hinterland of South Africa’s Eastern Cape Province.

The merger of historically disadvantaged two technikons and a university within rural

South African setting presents a complex historical heritage. In 2005, Border Technikon;

Eastern Cape Technikon; and University of Transkei were merged into a comprehensive

university: Walter Sisulu University (WSU). The birthed institution is faced with varied

existing challenges inherited from the defunct institutions and novel challenges

emanating from the merger exercise. The Eastern Cape Province occupies 14% of the

land areas of South Africa , and has 14.5% of the country's 45 million inhabitants.

Walter Sisulu University is located in the Eastern Cape Province together with University

of Fort Hare, Rhodes University and Nelson Mandela Metropolitan University. Primarily,

WSU serves the people of Eastern Cape Province with strong aspirations for national and

Page 14: Mandla Lukubeni Project(WSU)

13

international educational leadership standings. The University has four campuses:

Buffalo City; Ibika; Mthatha; and Queenstown with eleven knowledge dispensing sites.

With four Faculties: Business, Management Sciences and Law; Education; Health

Sciences; and Science, Engineering and Technology; of which two offer doctoral

programs. It is committed to advancing the frontiers of research in Eastern Cape in

particular, South Africa and the world at large.

All these campuses operate as a single entity, every information can be processed, can be

accessed, and also can be stored on each and every campus and all that can be done

remotely or locally. This sharing of information can be done only if there is a connection

between these campuses.

The network performance frustration research was conducted from April through to June

2008 to investigate the challenges that poor network performance present to

organizations, their employees and their IT departments. Whilst the IT users’ desire to

expand their Internet application usage is evident, the perceived performance levels of

external networks provide clear motivation. Both the IT users and the IT Decision

Makers (ITDMs) were asked how they would rate the network performance within their

organization and the external network performance outside of their organization

The network performance was rated in terms of speed and the likelihood of crash within

the organization and the network outside the organization.

1.3 PROBLEM STATEMENT

In the 21st Century we have noticed that information within and between organizations is

shared digitally, which means that the use of technology is becoming more and more a

demand for organizations. In our days most organizations if not all, require a network to

successfully provide services to its clients, such as E-Business, E-Learning, E-

Commerce, Online Banking, etc, all these services need the internet and therefore there is

no internet without a network.

Within the institution at WSU, the network provides many services and supports many

business critical systems therefore it is very crucial to have a high performance and a

very little downtime occurrence to meet the customer needs such as the students which

are high priority in any educational institution.

At WSU there is a problem which of cause has become a challenge for both students and

the organization at large on the network which becomes slow in performance and has a

Page 15: Mandla Lukubeni Project(WSU)

14

recurrent downtime and that also causes business critical systems to go down especially

in the iBika site (Butterworth).

If WSU could have such a high performance network, it would be very unlikely to see

students queuing in long queues for their financial statements and also when the

registration process takes place. The reason for such queues is that the school is using

business critical systems which become congested because of the load on the network

and eventual the systems go down as the network lowers in speed.

The network which performs at a high standard results in the high performance of stuff

because you would hardly see them (the stuff) not working because of the system which

is down. That would benefit the institution in a manner that there would be no loss

because people will be paid as they have done their work.

Communication across the institution would be very fast if the network could be fast

because when one posts something on the internet or on WiseUp, it would be very fast

accessing that particular information as the internet access would be 24/7. Emails, Instant

messaging and all other collaboration tools would be at the universities advantage.

The students are introduced on E-Learninig and that in a way shifted their focus from

books to study electronically. The performance in the network also has an impact on the

performance of students academically because the slower the network the lesser the

student accesses WiseUp.

1.4 PURPOSE OF THE STUDY

To examine the current situation or state of the WSU network performance

To understand the network used at WSU

To investigate and discover the causes of the Walter Sisulu University (WSU)

network to slow down.

To recommend strategies on how to increase the speed of the WSU network and

avoid its failures

To investigate the ways and tools to help maintain the high performance at high speed

on the WSU network

To recommend the possible solutions to the existing problem

Page 16: Mandla Lukubeni Project(WSU)

15

1.5 RESEARCH OBJECTIVES

The purpose of this study is:

To examine the current situation or state of the WSU network performance

To understand the network used at WSU

To investigate and discover the causes of the Walter Sisulu University (WSU) network to

slow down.

To recommend strategies on how to increase the speed of the WSU network and avoid

its failures

To investigate the ways and tools to help maintain the high performance at high speed on

the WSU network

To recommend the possible solutions to the existing problem

1.6 RESEARCH QUESTIONS

The main aim of this research is to investigate the network performance, recurrent

downtime at WSU and to recommend possible solutions on how to keep the network up

to standard and therefor the main question is:

What is the network performance and recurrent downtime at IBika campus of WSU?

In order to answer this question, the following sub-questions will be asked.

How often the maintenance is done on the WSU network?

What are the institutional policies in terms of the network performance?

What are the downtimes on the network?

What type of traffic is using the network?

How is the traffic classified in terms of priorities on the network?

What tools are used in maintaining the network?

1.7 STUDY AREA

Questionnaires will be distributed in one of the campuses of WSU, the iBika campus. The

questionnaires will be distributed to collect the information about the network situation

specifically in the Butterworth campus across the students and staff members. Various

departments like Department of Information Technology (IT) Department of Information

Communications Technology (ICT) will be visited by the researcher to familiarize with

the people whom the researcher will be working with.

Page 17: Mandla Lukubeni Project(WSU)

16

The secondary data that is going to be used in this research is going to be obtained from

various departments and a selected number of students at WSU specifically iBika campus

in various forms, journals and conference papers, articles, books, reports and manuals.

1.8 SIGNIFICANCE OF THE STUDY

The research is conducted to find the causes of the network at WSU to slowdown.

I. This researcher and also the reader will gain more information on how the

WSU network operates

II. It will also inform the people responsible for maintaining the WSU network

about the problem which exists

III. Provide ways on how to improve the transmission speed of the network

IV. Give an insight to both the researcher and the reader about the recommended

network devices and tools to have a reliable network

V. This research will also develop the researcher with skill and experience in

conducting researches

1.9 DELIMITATIONS

This research will not cover the whole network of the WSU institution and the systems it

supports but specifically will cover IBIKA CAMPUS network. Only those campuses that

act as a service provider in terms of the network to IBika campus will be consulted.

1.10 DIFINITION OF TERMS

I. Business Critical System

The meaning of a business-critical system is self-explaining, a system that is

critical for the operation of an organization’s core business. The consequences of

a possible stoppage of the business-critical system could be severe, even

devastating, for an organization. Even relatively short stoppages can be serious

with a possible result of high standstill costs, stop in productions and loss of trust

among customers.

The two most important qualities of the business-critical system is to be reliable

and have a high degree of availability. (Advania, 2012)

Page 18: Mandla Lukubeni Project(WSU)

17

II. Client

The client part of a client-server architecture. Typically, a client is an application

that runs on a personal computer or workstation and relies on a server to

perform some operations. For example, an e-mail client is an application that

enables you to send and receive e-mail. (Webopedia, 2012)

III. Computer

Technically, a computer is a programmable machine. This means it can execute a

programmed list of instructions and respond to new instructions that it is given.

Today, however, the term is most often used to refer to the desktop and laptop

computers that most people use. When referring to a desktop model, the term

"computer" technically only refers to the computer itself -- not the monitor,

keyboard, and mouse. Still, it is acceptable to refer to everything together as the

computer. (TechTerms, 2012)

IV. Database

A database is an application that manages data and allows fast storage and

retrieval of that data.There are different types of database, including a modern

NoSQL but the most popular meaning is a relational database. A relational

database stores data in tables where each row in the table holds the same sort of

information. In the early 1970s, Ted Codd, an IBM researcher devised 12 laws of

normalization. These apply to how the data is stored and relations between

different tables. (About, 2012)

V. Downtime

The period of time when something, such as a factory or a piece of machinery, is

not in operation, especially as the result of a malfunction. (The Free Dictionary,

2012)

Page 19: Mandla Lukubeni Project(WSU)

18

VI. E-Learning

E-learning (or ‘electronic’ learning) may be defined as ‘learning that is

delivered, enabled or mediated using electronic technology for the explicit

purpose of training, learning or development in organisations’. (CIPI, 2012)

VII. Firewall

A firewall is a set of related programs, located at a network gateway server, that

protects the resources of a private network from users from other networks. The

term also implies the security policy that is used with the programs. (CIPI, 2012)

VIII. Group Wise

GroupWise supports a wide variety of mail systems as well as Novell's NDS

directory. Text-to-speech and speech-to-wave files let mobile users hear and

create e-mail by telephone. Although entirely revamped, GroupWise stems back to

WordPerfect Office, acquired by Novell in 1994. (Encyclopedia, 2012)

IX. Information and Communication Technology

ICT (information and communications technology - or technologies) is an

umbrella term that includes any communication device or application,

encompassing: radio, television, cellular phones, computer and network

hardware and software, satellite systems and so on, as well as the various

services and applications associated with them, such as videoconferencing and

distance learning. (SearchCIO, 2012)

X. Integrated Tertiary System

Integrated Tertiary Software is a software that specializes in the provision of

integrated software to support the administrative functions within the higher

education and further education & training sectors. (ITS User Group, 2012)

Page 20: Mandla Lukubeni Project(WSU)

19

XI. Internet

An electronic communications network that connects computer networks and

organizational computer facilities around the world. (Mirriam Webster, 2012)

XII. Enterprise Resource Planning

A process by which a company (often a manufacturer) manages and integrates the

important parts of its business. An ERP management information system

integrates areas such as planning, purchasing, inventory, sales, marketing,

finance, human resources, etc. (Investopedia, 2012)

XIII. Intrusion Detection System

An intrusion detection system (IDS) is a type of security software designed to

automatically alert administrators when someone or something is trying to

compromise information system through malicious activities or through security

policy violations An IDS works by monitoring system activity through examining

vulnerabilities in the system, the integrity of files and conducting an analysis of

patterns based on already known attacks. It also automatically monitors the

Internet to search for any of the latest threats which could result in a future

attack. (Techopedia, 2012)

XIV. Intrusion Prevention Sistem

An IPS, or intrusion prevention system is used in computer security. It provides

policies and rules for network traffic along with an intrusion detection system for

alerting system or network administrators to suspicious traffic, but allows the

administrator to provide the action upon being alerted. Some compare an IPS to a

combination of IDS and an application layer firewall for protection. (Webopedia,

2012)

XV. Information Technology Infrastructure Library

The Information Technology Infrastructure Library (ITIL) is a globally

recognized collection of best practices for information technology (IT) service

management. The United Kingdom's Central Computer and Telecommunications

Agency (CCTA) created ITIL in response to growing dependence on information

Page 21: Mandla Lukubeni Project(WSU)

20

technology for meeting business needs and goals. ITIL provides businesses with a

customizable framework of best practices to achieve quality service and overcome

difficulties associated with the growth of IT systems. (Search Data Center, 2012)

XVI. Network

A group of interconnected (via cable and/or wireless) computers and peripherals

that is capable of sharing software and hardware resources between many users.

The Internet is a global network of networks. See also local area network and

wide area network. A system that enables users of telephones or data

communications lines to exchange information over long distances by connecting

with each other through a system of routers, servers, switches, and the like.

(Business Dictionary, 2012)

XVII. Program

A computer program is a set of instructions for a computer to perform a specific

task. Programs generally fall into these categories applications, utilities or

services. (About, 2012)

XVIII. Service Desk

A the single point of contact between users and IT Service Management. Tasks

include handling incidents and requests, and providing an interface for other ITIL

processes. The primary functions of the Service Desk are incident control, life

cycle management of all service requests, and communicating with the customer.

Another definition of Service Desk is a center that provides a Single Point of

Contact between a company’s customers, employees and business partners. The

Service Desk is designed to optimize services on behalf of the business and

oversee IT functions. Thus, a Service Desk does more than making sure IT

services are being delivered at that moment, it manages the various lifecycles of

software packages used to provide critical information flow by utilizing ITIL best

practices. (Arinc Management Service, 2012)

XIX. Software

Page 22: Mandla Lukubeni Project(WSU)

21

Software is a generic term for organized collections of computer data and

instructions, often broken into two major categories: system software that

provides the basic non-task-specific functions of the computer, and application

software which is used by users to accomplish specific tasks. System software is

responsible for controlling, integrating, and managing the individual hardware

components of a computer system so that other software and the users of the

system see it as a functional unit without having to be concerned with the low-

level details such as transferring data from memory to disk, or rendering text onto

a display. Generally, system software consists of an operating system and some

fundamental utilities such as disk formatters, file managers, display managers,

text editors, user authentication (login) and management tools, and networking

and device control software. (Open Project, 2012)

XX. System

A set of detailed methods, procedures and routines created to carry out a specific

activity, perform a duty, or solve a problem. An organized, purposeful structure

that consists of interrelated and interdependent elements (components, entities,

factors, members, parts etc.). These elements continually influence one another

(directly or indirectly) to maintain their activity and the existence of the system, in

order to achieve the goal of the system. (Business Dictionary, 2012)

Page 23: Mandla Lukubeni Project(WSU)

22

1.11 OUTLINE OF THE THESIS

CHAPTER 1

The background of the research is given.

CHAPTER 2

The brief outline and review of the literature about the setup and security of WSU

network.

CHAPTER 3

The outline of the methodology with which is going to be used in this research.

CHAPTER 4

The analysis of the information gathered from the questionnaires.

CHAPTER 5

The conclusion and recommendations of the study.

Page 24: Mandla Lukubeni Project(WSU)

23

1.12 CONCLUSION

This chapter explains the background of the problem, the purpose of the study and the

objectives of the study .It also explain the methodology of the study, how the data is

going to be collected including most importantly it tells us the objectives of the study.

This chapter basically is the introductory chapter.

Page 25: Mandla Lukubeni Project(WSU)

24

CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

In chapter one the background of the research was given. In addition to the information given in

chapter one, in this chapter the researcher is going to brief outline of the literature about the setup

of WSU network and its security. This literature is going to inform this research.

2.2 WSU CAMPUSES

In chapter one, the background about the campuses is outlined.

2.3 NETWORK STRUCTURE

A network is a collection of computers, printers, routers, switches, and other devices that can

communicate with each other over some transmission medium. A group of two or more

computer systems linked together to share, store, or process information.

Page 26: Mandla Lukubeni Project(WSU)

25

Local Area Networks (LANs) use one of the following physical layout designs. These designs

are referred to as 'topologies'.

(Inetdaemon, 2012)

Figure 2.3.1. Layout Design Structures

Bus Topology

Networks employing a bus topology use a common physical connection for communication.

That means the physical media is shared between stations. When one station transmits on the

bus, all devices hear the transmission. If more than one device transmits at the same time, the

two transmissions will collide with each other and both transmissions will destroy each other.

When two or more of these devices attempts to access the network bus at the same time, some

method must be used to prevent a collision (CSMA/CD). Historically, bus networks used coaxial

cable as their medium of transmission. Token Bus, Ethernet (Thinnet and Thicknet) are common

examples of bus topologies. Although some installations of Ethernet using coaxial cable still

exist, all modern installations now use a hub and spoke or star topology.

Topology Types

Bus (Logical Ethernet)

Hub and Spoke (Star)

(Physical

Ethernet)

Hybrid (Bus & Star) Ethernet

Point To Point / Daisy

Chaining Serial

Point to Multipoint Frame Relay

Ring

FDDI, Token

Ring

Page 27: Mandla Lukubeni Project(WSU)

26

(Inetdaemon, 2012)

Figure 2.3.2. Bus Network Topology

Hub and Spoke (Star)

Please note that this is not called a hub and spoke design because there is a network hub in the

drawing. This drawing is to show how a star or hub and spoke network resembles the hub and

spokes of a wheel. The Hub and Spoke topology refers to a network topology where there is a

central connection point to which multiple devices are connected.

A network hub device is not the only device usable in this configuration. A switch may also be

used and in some cases, a router. Ethernet utilizing twisted pair still considered a bus architecture

from a logical standpoint; however, physically, an Ethernet network can be physically wired as a

hub and spoke model.

(Inetdaemon, 2012)

Figure 2.3.3. Star Topology

Page 28: Mandla Lukubeni Project(WSU)

27

Ring

Ring topologies are similar to bus topologies, except they transmit in one direction only from

station to station. Typically, a ring architecture will use separate physical ports and wires for

transmit and receive.

Token Ring is one example of a network technology that uses a ring topology.

(Inetdaemon, 2012)

Figure 2.3.4. Ring Topology

Point-To-Ponit

Point to Point topologies are simplest and most straightforward. You must picture them as a

chain of devices and another name for this type of connectivity is called daisy chaining. Most

computers can 'daisy chain' a series of serial devices from one of its serial ports. Networks of

routers are often configured as point-to-point topologies.

(Inetdaemon, 2012)

Figure 2.3.5. Point to Point Topology

Page 29: Mandla Lukubeni Project(WSU)

28

Point to Multipoint

This is not quite the same as a hub and spoke configuration. In a hub and spoke topology, all

transmissions from all devices pass through the hub--the hub broadcasts all communication from

any single device to all other devices connected to it.

In a multipoint topology the hub can send to one or more systems based on an address. Frame

Relay is the most common technology to implement this scheme, and it is typically used as a

WAN technology. All the remote connection points are connected to a single Frame Relay

switch or router port, and communication between sites is managed by that central point. In hub

and spoke, all spokes or only one spoke hears a given transmission. In point to multipoint, any

number of remote stations can be accessed.

(Inetdaemon, 2012)

Figure 2.3.6. Point to multi-Point Topology

WAN TOPOLOGIES

The phrase WAN Topology refers to the arrangement or relative positioning of links and nodes. I

will present several major types of WAN topologies. These topologies can end up being

analogous, at greater levels of abstraction/hierarchy, to LAN topologies.

The Point To Point WAN : A Point-To-Point WAN has a remote access link for each major

node in the WAN. The link can be anything from a T-3 line to a 56 Kbps dial up line. The

following diagram represents a intercity WAN.

Page 30: Mandla Lukubeni Project(WSU)

29

( Ziaiel Academic, 2012)

Figure 2.3.7. Point to Point WAN Topology

Its major advantage is that

it is inexpensive relative to the other options

Its major disadvantages have to do with

vulnerability to failure in key components

limited scalability

number of hops and alternative routes are made worse

Thus the point-to-point WAN is best when there are only two or three major locations.

The Ring WAN: The Ring WAN is developed by having point to point connections that

connect the major nodes in a ring. This is illustrated in the next image.

Page 31: Mandla Lukubeni Project(WSU)

30

( Ziaiel Academic, 2012)

Figure 2.3.8. WAN Ring Topology

Its major advantages over other topologies are

This is an improvement over the point-to-point WAN in that it provides

alternative routes

It is less expensive than all but the point-to-point WAN

Its biggest disadvantages relative to other topologies are

it is slightly more expensive than the point-to-point

it has slightly worse scalability problems the point-to-point

The Ring WAN is best when used to connect only a few sites.

The Star WAN: A WAN star is laid out in a star configuration with one location as the "hub".

In this case this hub will make use of something called a concentrator router. In the following

figure the concentrator router is located in Chicago.

Page 32: Mandla Lukubeni Project(WSU)

31

( Ziaiel Academic, 2012)

Figure 2.3.9. WAN Star Topology

Its major advantages relative to other topologies are

it is more scalable

o relatively easy to add nodes

each node is at most two hops away from any other

Its major disadvantage is

it has a single point of failure at the concentrator router

To get by some of these problems, network administrators tend to add in some alternative links

between sites not at the hub. This increases costs slightly, but gives alternative routes in case of

failure or congestion. Providing direct links between all possible pairs of nodes, a full mesh

topology, requires a huge expense and is not at all scalable.

This leads to the most typical high volume implementation.

The Multitiered WAN: A Multitiered WAN makes use of

concentrator routers like the star WAN,

it also links these concentrators together

it is also likely to have each major node connected to more than one

concentrator router

it may also have direct links between other nodes

Page 33: Mandla Lukubeni Project(WSU)

32

It is scalable because at worst just one link needs to be added to some concentrator. Though

obviously, performance is improved if there are more links. In addition these links can be made

due to traffic demands.

The following diagram represents a multitiered

WAN. ( Ziaiel

Academic, 2012)

Figure 2.3.10. Multitiered WAN Topology

Metropolitan Area Network (MAN)

A network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A

MAN is typically owned an operated by a single entity such as a government body or large

corporation. These networks are designed to cover large municipal areas. Data protocols such as

WiMAX (802.16) and Cellular 3G networks are MAN networks. metropolitan area network

(MAN)

Page 34: Mandla Lukubeni Project(WSU)

33

(

Computer Networking, 2012)

Figure 2.3.11. MAN Topology

Wireless Local Area Networks (WLAN)

Wireless Local Area Network: a LAN based on WiFi wireless network technology

Page 35: Mandla Lukubeni Project(WSU)

34

Figure 2.3.12. WLAN Topology

Campus Area Network

A network spanning multiple LANs but smaller than a MAN, such as on a university or local

business campus. [MIN88]

Storage Area Network

Connects servers to data storage devices through a technology like Fibre Channel.[MIN88]

System Area Network

Links high-performance computers with high-speed connections in a cluster configuration. Also

known as Cluster Area Network.[MIN88]

WIRELESS NETWORKS

Wireless networks involve transmitting a signal in some manner (microwave, radio waves, laser,

infrared) from an access point, which is a transmitting and receiving device (transceiver).(

Thought, 2012)

Wireless topologies include:

Point-to-point

Line-of-sight

Scatter and reflective

Cellular

Radio broadcast

2.4 NETWORK PERFORMANCE IMPACT ON AN EDUCATIONAL ORGANISATION

Internet is the network that combines enterprise networks, individual users, and ISPs into a single

global IP network.

Internet is indeed a powerful tool for academic students and researchers. The internet has been

shown to influence the academic performance of students at tertiary level. According to Peter M

Ogedebe’s opinion on the research on how internet usage influences student’s academic

performance, he says “if internet services can be fully exploited, the performance of students in

educational institutions of higher learning can improve.” Internet plays a fundamental role in an

organization and society, says Ogedebe. Some organizations if not all, depend on the computer

network to successfully run they daily business activities, if the computer network could be

down, so as the organization. The internet influences the academic performance of student both

in local and international levels. NCAA (2007) came with this view “internet should be used to

improve academic performance.”

Page 36: Mandla Lukubeni Project(WSU)

35

Internet is a valuable source of information for students looking for ideas for projects and

assignments. With over 50 million web sites on the net, the chances are any information however

obscure can be found. The only tools required to find this information would be some patience

and decent search engines. Internet also serves as a useful tool for lecturers in helping them

prepare their lesson plans as there are a number of sites dedicated to provide educational

material. Without a good performance on the network of an organization, the access to the

internet is very difficult.

Internet provides a platform for group discussions which are time and distance independent.

Group discussions can be in may form for example video conferencing whereby the use of a

small video camera and microphone, members of the group can actually see and hear each other.

This is cost effective because there will be no use for group members to meet at a particular

place which could need traveling costs. Lecturers and deans could attend a meeting using video

classroom but displayed an overhead projector. Lectures could be uploaded on the network and

student can access and watch them repeatedly if they want because repetition is the rule of

emphases. The other form of group discussion which also is a benefit of a well performing

network is chat room where everyone comes together in a host area and communicates with each

other electronically.

Internet on first time users is unfriendly although it can be useful as an educational tool. The

information on the internet is owned by no one; therefore some of the information might be

wrong, which could lead the students and researchers to have incorrect information. The

characteristics of anyone-to-anyone connectivity, universal affordable access and high reliability

have given the industry the building blocks for designing an exciting new portfolio of Services

and individual tailored options. As vast amounts of information become available electronically

and instantly, gaining access to the information important to the individual at the time and in the

place where the information is valuable to that individual will be critical, and valuable (Brody,

200). To provide the value in this equation, a network must provide communication with quality,

reliability and ambiguity demanded by the servers and end users

2.5 CAUSES OF LOW NETWORK PERFORMANCE

As the technology innovation increases so upgrades to the devices on the network is required

because some application on the network might lowers the speed of the network as devises are

not upgraded. Parallel networks, optimized for typical applications - such as video, wideband

data, voice, etc. will emerge. End-user devices will continue to improve in processing power,

human machine interfaces, battery life and form factor (Brody, 2000).

2.6 HOW TO MESURE NETWORK PERFORMANCE

Page 37: Mandla Lukubeni Project(WSU)

36

2.6.1 BANDWIDTH

Firstly bandwidth is defines as the amount of information that can be flow through a network

connection in a given period of time and bandwidth in computer networks state that the greater

the available bandwidth the faster or the greater data transfer capability [MIN 25]. According to

the WSU, different business critical systems are competing for the same bandwidth. These

systems are ITS, OPAC, Millennium, WiseUp, Service Desk, etc. since these systems are

competing for the same bandwidth the organization’s network is therefore not fast.

2.6.1.1 THE IMPORTANCE OF BANDWIDTH

Bandwidth is defined as the amount of information that can flow through a network connection

in a given period of time.

It is important to understand bandwidth because

Bandwidth is finite – Regardless of the medium used to build the network, there are

limits on the network’s capacity to carry information. Bandwidth is limited both by law

of physics and by the technologies employed to place information on the medium. For

example, a conventional modem’s bandwidth is limited to about 56 kilobits per second

(kbps) by both the physical properties of twisted pair phone wires and by voice modem

technology. The technologies employed by DSL also use the same twisted pair phone

wires, yet DSL provides much greater bandwidth than is available with conventional

modems. The frequency range that DSL uses is much wider than the frequency range

used for voice. That is why you can send more bits per second over DSL. Optical fiber

has the physical potential to provide virtual limitless bandwidth.

Bandwidth is not free – It is possible to buy equipment for a LAN that will provide nearly

unlimited bandwidth over a long period of time. For WAN connection, it is almost

always necessary to buy bandwidth from a service provider. A network manager needs to

make the right decision about the kinds of equipment and services to buy

Bandwidth is a key factor in analyzing network performance, designing networks, and

understanding the internet – A networking professional must understand the tremendous

impact of bandwidth and throughput on network performance and design. Information

flows as a string of bits from computer to computer throughout the world.

The demand for bandwidth is ever increasing – As soon as new network technologies and

infrastructures are built to provide greater bandwidth, new applications are created to

take advantage of the greater capacity (Magalhas, 2004)

Page 38: Mandla Lukubeni Project(WSU)

37

2.6.1.2 TYPES OF BANDWIDTH

Analog Bandwidth

Analog bandwidth typically refers to the frequency range of an analog electronic system. Analog

bandwidth could be used to describe the range of frequencies transmitted by a radio station or an

electronic amplifier. The unit of measurement for analog bandwidth is hertz.

Digital Bandwidth

Digital bandwidth measures how much information can flow from one place to another in a

given amount of time. The fundamental unit of measurement for digital bandwidth is bps.

Analogies that Describe Digital Bandwidth

Bandwidth is like the width of a pipe – A network of pipes brings fresh water to homes

and businesses and carries wastewater away. This water network is made up of pipes with

different diameters. A city’s main water pipe might be 2 meters in diameter, whereas a

kitchen faucet might have a diameter of only 2 centimeters. The width of pipe determines

the pipe’s water-capacity. Thus, the water is analogous to data, and pipe width is

analogous to bandwidth. Many networking expects say the need to “put in bigger pipes”

when they want to add more information-carrying capacity.

Bandwidth is like the number of lanes on a highway – A network of roads serves every

city or town. Smaller roads with fewer traffic lanes join large highways with many traffic

lanes. These roads lead to even smaller, narrower roads, and eventually to the driveways

of homes and businesses. When very few automobiles use the highway system, each

vehicle can move freely. When more traffic is added, each vehicle moves more slowly,

especially on roads with fewer lanes for cars to occupy. Eventually as even more traffic

enters the highway system, even multilane highways become congested and slow. A data

network is much like the highway system, with data packets analogous to automobiles,

and bandwidth analogous to number of lanes on the highway. When a data network is

viewed as a system of highways, it is easy to see how bandwidth can cause traffic to

become congested all over the network [MAN90]

2.6.1.3 Digital Bandwidth Measurements

In digital systems, the basic unit of bandwidth is bits per second (bps). Although bandwidth

can be described in bits per second, usually some multiple of bits per second is used. In other

words, network bandwidth is typically described as thousands of bits per second, millions of

bits per second, and even billions of bits per second.

Table: The following table summarizes the various units of bandwidth.

Unit of Bandwidth Abbreviation Equivalent

Page 39: Mandla Lukubeni Project(WSU)

38

Bits per second Bps 1bps=fundamental unit of

bandwidth

Kilobits per second Kbps 1Kbps=1000 bps

Megabits per second Mbps 1Mbps=1,000,000 bps

Gigabits per second Gbps 1Gbps=1,000,000,000 bps

Figure 2.6.1. Digital Bandwidth Mesurements

2.6.1.4. Bandwidth Limitations

Bandwidth varies depending on the type of medium as well as the LAN and WAN

technologies used. The physics of medium account for some of the difference. Physical

differences in the way signals travel through twisted-pair copper wire, coaxial cable, optical

fiber, even air result in fundamental limitations on the information-carrying capacity of a

given medium. However, a network’s actual bandwidth is determined by a combination of

the physical medium and the technologies chosen for signaling and detecting network

signals. For example, current understanding of the physics of unshielded twisted- pair copper

cable puts the theoretical bandwidth limit at more than 1Gbps. But in actual practice, the

bandwidth is determined by the use of a particular technology, such as 10BASE-T,

1000BASE-TX, or 1000BASE-TX Ethernet. Bandwidth is also determined by other varying

factors, such as the number of users in the network, the equipment being used, applications,

the amount of broadcast, and so on. In other words, the actual bandwidth is determined not

by the medium’s limitations, but by the signaling method, NIC’s, and other items of network

equipment that are chosen.

Table; The following table lists some common networking media types, along with their

limits on distance and bandwidth

Medium Maximum Theoretical

Bandwidth

Maximum Physical Distance

50-ohm coaxial cable

(10BASE2 Ethernet,

Thinner)

10 Mbps 185 m

50-ohm coaxial cable

(10BASE5 Ethernet,

Thinner)

10 Mbps 500 m

Category 5 UTP (10BASE-T

Ethernet)

10 Mbps 100 m

Category 5 UTP (100BASE-

TX Ethernet)

100 Mbps 100 m

Category 5 UTP

(1000BASE-T Ethernet)

1000 Mbps 100 m

Multimode optical fiber

(62.5/125 pm)

(100BASE-FX Ethernet)

100 Mbps 2000m

Page 40: Mandla Lukubeni Project(WSU)

39

Multimode optical fiber

(62.5/125 pm)

(1000BASE-SX Ethernet)

1000 Mbps 220m

Multimode optical fiber

(50/125 pm)

(1000BASE-SX Ethernet)

1000 Mbps 550m

Multimode optical fiber

(9/125 pm)

(1000BASE-LX Ethernet)

1000 Mbps 5000m

( Ziaiel Academic, 2012)

Figure 2.6.2. Bandwidth Limitations

Table; The following table summarizes common WAN services and the bandwidth

associated with each.

WAN Services Typical User Bandwidth

Modem Individuals 56 kbps

DSL Individuals, telecommuters,

and small businesses

12 kbps

ISDN Telecommuters and small

businesses/small institutions

(school) and medium-sized

business

128 kbps

Frame Relay 56 kbps to 44.736 Mbps

T1 Larger entities 1.544 Mbps

T3 Larger entities 44.736 Mbps

STS-1 (OC-1) Phone companies, data

comm. Company backbone

51.840 Mbps

STS-3 (OC-3) Phone companies, data

comm. Company backbone

155.251 Mbps

STS-48 (OC-48) Phone companies, data

comm. Company backbone

2.488 Mbps

Figure 2.3. Bandwidth Associated with WAN Services

2.7 SECURITY ARCHITECTURE

Is a plan and set of principles for an administrative domain and its security domains that

describe the security services that a system is required to provide to meet the needs of its

users, the system elements required to implement the services, and the performance levels

required in elements to deal with the threat environment. Complete security architecture for a

system addresses administrative security, communication security, emanations security,

personal security, and physical security, and prescribed security policies for each.

Page 41: Mandla Lukubeni Project(WSU)

40

The term refers to a design that can be either hardware or software, or a combination of both.

Also called Architecture, Information Architectures, Information Systems Architectures,

Compute Platforms, Product Architectures, Computer Architectures, and IT Architectures.

2.8 SECURITY THREATS

Today’s internet security threats range from curious prowlers to well organized, technically-

knowledgeable intruders that could gain access to your site’s private information or interfere

with you own system or your client’s system.

The Security Threats that affect WSU include:

2.8.1 VIRUSES

A virus is a malicious piece of programming code usually disguised as something else that

causes some unexpected and, for the victim, usually undesirable event and which is often

designed so that it is automatically spread to other computer users. Firewalls can’t protect

very well against things like viruses. In general, a firewall can protect against a data-driven

attack, attacks in which something is mailed or copied to an internal host where it is then

executed. ( Ziaiel Academic, 2012)

2.8.1.1 CLASSES OF VIRUSES

There three main classes of viruses.

File infection

Some file infector viruses attacks themselves to program files, usually selected.com or .EXE

files. Some can infect any program for which execution is requested, including .SYS, .OVL,

.PRG, and .MNV files. When the program is loaded, the virus is loaded as well. Other file

infector viruses arrive as wholly contained programs or scripts sent as an attachment to an E-

mail note.

System or boot-record infectors

These viruses infect executable code found in certain system areas on a disk. They attach the

DOS boot sector on diskettes or the Master Boot Record on hard disk. A typical scenario is

to receive a diskette from an innocent source or any other storage device that contains a boot

disk virus. When your operating system is running, files on the diskette can be read without

triggering the boot disk virus. However if you leave the diskette on the drive, and then turn

the computer off or reload the operating system, the computer will first look a drive, find the

diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard

disk. (Allow several days for records). This is why you should make sure that you have a

bootable floppy (in our days we talk of a disc).

Page 42: Mandla Lukubeni Project(WSU)

41

Macro viruses

These are among the common viruses, and the too do the least damage. Macro viruses infect

your Microsoft word application by typically insert unwanted words or phrase. The best

protection against a virus is to know the origin of each program or the file you load into your

computer or open from your e-mail program ( Ziaiel Academic, 2012).

The following are the attacks that may be encountered by WSU

2.8.1.2 SNIFFING

One part of the network security is concerned with threats that are particular to the

transmission of messages. Some of these threats, like the unauthorized disclosure or

modification of data have been discussed above. A direct link between the sender and the

receiver is only an abstraction. In reality you can expect any number of intermediate nodes to

relay message between sender and receiver. Depending on their function, these intermediate

nodes are called Bridges, Gateways, and Routers etc. each of these devices reads incoming

traffics and decides on a next action.

Example:- Where to forward incoming packets to. Many of these devices include software

components and that definitely creates an opportunity to run sniffer software.

Sniffer Software:- Is a software that reads incoming traffic and forwards sensitive

information to the attacker. Sensitive information includes management data like network

addresses or indicators of the protocols of your network and use this information to launch

attacks, even if you have taken care to protect your application by encryption. (Helmig, 2004)

2.8.1.3 SPOOFING

Other threats in network security come from forged source addresses (spoofing), from

entities later denying their involvement in transaction they had participated in or from.

Spoofing attack is when an attacker, who may be legitimate runs a program that presents a

fake login screen on some terminal/workstation. An unsuspecting user comes to his terminal

and tries to login. The victim is led through the normal login menu and is asked for username

and password. The username and password will then be stored by the attacker. (Helmig,

2004)

2.8.1.4 MAC SPOOFING ATTACK

MAC spoofing attacks involve the use of a known MAC address of another host to make the

target switch forward frames destined for the remote host to the network attacker. By sending

a single frame with the other host’s source Ethernet address, the network attacker overwrites

the CAM table entry so that the switch forwards packets destined for the host to the network

attacker. Until the host sends it will not receive any traffic. When the host sends out traffic,

the CAM entry is rewritten once more so that it moves back to the original port. (Helmig,

2004)

Page 43: Mandla Lukubeni Project(WSU)

42

2.9 FIREWALLS

An internet firewall is a security mechanism that allows limited access to a site from the

internet, allowing approved traffic in and out according to a thought-out plan. Firewalls are a

very effective way to protect your system from most internet security threats and are a

critical component of today’s computer network. Without firewalls, network security

problems can range out of control, dragging more and more systems down. A firewall

provides not only real security; it often plays an important role as a security blanket for

management. Firewalls in a network keep damage on one part of the network (e.g.

eavesdropping, a worn program, file damage ) from spreading to the rest of the network.

Firewalls cannot protect attacks that don’t go through the firewall. Another thing a firewall

cannot really do is to protect you against traitors or idiots inside your network. Firewalls also

cannot protect against tunneling over most application protocols to tunneling over most

written clients. ( Ziaiel Academic, 2012)

2.10 CONCLUSION

This chapter is about other studies that have been done that are related to this research paper

that were previously published. Today, understanding the performance characteristics of

Internet services is critical to evolving and engineering Internet services to match changing

demand levels, client populations, and global network characteristics.

Page 44: Mandla Lukubeni Project(WSU)

43

CHAPTER 3

3.1 INTRODUCTION

The previous chapter outlines the literature and informs the research. This chapter outlines and

discusses methodology that is going to be used on this thesis and gives directions. It also

discusses the instruments used in the data collection, the procedure for data collection and the

method for data analysis.

3.2 RESEARCH METHODOLOGY

The methods which are going to be used in this study are methods which are descriptive in

nature. This research is going to be conducted using two methods, qualitative and also

quantitative.

Qualitative method is going to be used because it is a type of method whereby it is used when

a researcher is interested in understanding the meaning people have contracted. Qualitative

research assumes that meaning is mediated through investigator’s own perception, it is an

effort to understand situations in their uniqueness as part of a particular context and

interactions there (Patton, 1985). This qualitative type of research will try to answer the

general question “what is going on here?”

Quantitative method is going to be used because the will be a need to measure quantities. The

statistics on the network in terms of downtime and indicators of network performance such as

bandwidth, number of nodes and network design etc. will be needed.

3.3 RESEARCH DESIGN

This research is a quantitative research. Definition: It “…involves methods of data collection and

analysis that are no qualitative” (Lofland & Lofland 1984). Quantitative research is concerned

with finding the answers to questions which deals with numbers. It is then a case study design.

Page 45: Mandla Lukubeni Project(WSU)

44

3.4 SAMPLING

Simple random sampling

A shortcut method for investigating a whole population Data is gathered on a small part of

the whole parent population or sampling frame, and used to inform what the whole picture is

like. In this study the researcher selected a sample of students and stuff that are in the IBika

campus. The researcher sample was a very convenient sample because this is the campus that

he could easily reach as he is also in the campus. The researcher chose a sample out of a total

of hundred and ten (110) students and twenty 20 stuff members in the campus. The reason

the researcher chose this number it is because he found it manageable in terms of gathering

useful and valid data

3.5 INSTRUMENTATION

The case study was used on this research and therefor questionnaires are used. The

questionnaires were used to gather information in this study. To make sure that the

questionnaires will provide valid and reliable data the researcher made the questionnaires a

sample. The researcher included instructions for answering all questions in the questionnaire.

All questions were brief, graphically pleasing and easy to read so that the respondents cannot

get bored. The questions were mixed others were open-ended, rankings, and closed-ended

questions for different sections of the questionnaires.

3.6 DATA COLLECTION

The questionnaire were distributed by the researcher with the help of other students and the

respondents were given a week to answer the questionnaires. The researcher used structured

questionnaires. The questionnaires were distributed to collect information from the students

and stuff who are in Butterworth campus at WSU. The researcher gave the respondents

enough time to answer the questionnaires. The questions in the questionnaires were designed

in such a way that they should answer the research question.

Page 46: Mandla Lukubeni Project(WSU)

45

3.7 DATA ANALYSIS

Data analysis is an ongoing activity, which not only answers your question but also gives you

the directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help

you arrive at the data analysis. The uses of such procedures put your research project in

perspective and assist you in testing the hypothesis with which you have started your

research.

Data collected was analyzed both quantitative and quantitative. In the study the data collected

from students and stuff were captured into excel spreadsheet. The researcher used the graphs

in terms of data processing. The researcher expected to get quantitative data because the

questionnaire was considered of many closed-ended questions and few open-ended

questions.

The researcher used content analysis in analyzing the quantitative data because the researcher

used simple random sampling from the total number of students and stuff who were chosen

as a sample. The analysis was useful in getting reliable and valid information

Page 47: Mandla Lukubeni Project(WSU)

46

3.8 CONCLUSION

This chapter is about how data was collected in this study. It describes the tools and the

method as that the researcher used to collect information. It also includes how data was

analyzed.

Page 48: Mandla Lukubeni Project(WSU)

47

CHAPTER 4

4.1 INTRODUCTION

The previous chapter outlines and discusses methodology that is going to be used on this thesis

and gives directions.in this chapter the researcher will summarize all the results founded in the

study. All the information from the questionnaires is analyzes and the conclusion will be drawn

according to the results.

4.2 DATA ANALYSIS

Data analysis is an ongoing activity, which not only answers your question but also gives you the

directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help you

arrive at the data analysis. The uses of such procedures put your research project in perspective

and assist you in testing the hypothesis with which you have started your research. The

researcher expected to get quantitative data because the questionnaire was considered of many

closed-ended questions and few open-ended questions.

The researcher used content analysis in analyzing the quantitative data because the researcher

used simple random sampling from the total number of students and stuff who were chosen as a

sample. The analysis was useful in getting reliable and valid information

The questionnaires were distributed to collect information from the students and staff members

who are in the iBika campus at WSU in seven days, the data was then processed using Microsoft

excel and graphs were made to represent the data in a visual manner. The researcher gave the

respondents enough time to answer the questionnaires. The questionnaires were designed in such

a way that they be able to answer the research question which is:

What is the network performance and recurrent downtime at IBika campus of WSU? There were

so many questions that were asked in the questionnaire in order to find order to find answers to

the research question such as:

How often the maintenance is done on the WSU network?

What are the institutional policies in terms of the network performance?

What are the downtimes on the network?

What type of traffic is using the network?

How is the traffic classified in terms of priorities on the network?

What tools are used in maintaining the network?

The questions were mixed; others were open-ended, ratings, and close-ended

questions for different sections of the questionnaire. All questions were brief,

graphically pleasant and easy to read so that the respondents cannot get bored.

Page 49: Mandla Lukubeni Project(WSU)

48

4.3 DATA REPRESANTATION

The data is represented in graph so that it can be visual

4.3.1 Question: Gender?

Figure 4.3.1. This was a closed-ended question. The percentages of male and female

respondents who were taken for sampling at iBika campus of WSU

The graph above shows that 78(60%) out of hundred and thirty respondents are females where

52(40%) are males

Data analysis is an ongoing activity, which not only answers your question but also gives you

the directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help

you arrive at the data analysis. The uses of such procedures put your research project in

perspective and assist you in testing the hypothesis with which you have started your

research.

Data collected was analyzed both quantitative and quantitative. In the study the data collected

from students and stuff were captured into excel spreadsheet. The researcher used the charts

in terms of data processing. The researcher expected to get quantitative data because the

questionnaire was considered of many closed-ended questions and few open-ended

questions.

Page 50: Mandla Lukubeni Project(WSU)

49

The researcher used content analysis in analyzing the quantitative data because the researcher

used simple random sampling from the total number of students and stuff who were chosen as a

sample. The analysis was useful in getting reliable and valid information

4.3.2 Question:Which age group do you belong?

41

28

19 2116

5

0

10

20

30

40

50

15-20 21-25 26-30 31-35 36-40 41 andAbobe

Age group

Age group

Figure 4.3.2. The age category

The graph above shows which age group dominates at the campus. It is proven that youth

dominates the campus because according to the statistics of the respondents it is calculated that

for about 85% of the respondents are between the age 15 and 35 which means are still youth.

According to the statistics of South Africa the most internet users is youth.

4.3.3 Question: To which faculty do you belong?

Page 51: Mandla Lukubeni Project(WSU)

50

36

48

2521

0

10

20

30

40

50

60

Faculty ofEngineering

Faculty ofBusiness,

Management,Accounting and

Law

Faculty ofApplied

Other Faculty

Number of Respondents Per Faculty

Number of Respondents PerFaculty

Figure 4.3.3. The faculty category

The graph above shows that out of 130 respondents, 36(28%) of the respondents is from the

Faculty of Engineering, 48(37%) of the respondents is from the Faculty of Business,

Management, Accounting and Law, 25(19%) of the respondents is from the Faculty of Applied

and 21(16%) if from other Faculties such as Library, ICT etc. These statistics proves that each

and every department participated on this project.

4.3.4 Question: To which category do you belong?

Figure 4.3.4. The staff or Student category

The above graph shows that 85% of the respondents were students while 15% were staff. The

study proves that not only the students are affected by the performance of the network but also

the staff.

Page 52: Mandla Lukubeni Project(WSU)

51

4.3.5 Question: Is the computer literacy included as a subject in your course?

Figure 4.3.5. Statistics on courses that include computer as a subject

The above graph shows that 91(70%) of the respondents has computer literacy included as the

subject in their courses while 39(30%) does not have it, off which from the information gathered

from the questionnaires most of the respondents that answered NO in this question are staff

members. That proves the fact that more than 80% of the respondents which are students use

computer networks.

4.3.6 Question: How often do you use the internet?

Figure 4.3.6. Severity on internet usage

Page 53: Mandla Lukubeni Project(WSU)

52

According to the graph above, only 13(10%) of the respondents do not access the internet and

90% accesses the internet but are not on the same severity which proves that internet access in

the institution is at a high rate of demand.

4.3.7 Question: How do you connect to the internet?

18

98

212

0

20

40

60

80

100

120

Wireless LAN cable 3G/MobileService

CannotConnect

Technology for internet access

Technology for internet access

Figure 4.3.7. Internet access technology one uses.

According to the graph above, 98(75%) of the respondents connect to the internet using the LAN

Cable which therefore means students need to go physically in the labs and connect to the

network. This graph proves the fact that the respondents are really committed in having access to

the internet because they forfeit to stay in their respective places of stay (Residents) but go and

connect to the network physically as they user LAN cables to connect to the internet.

4.3.8 Question: How difficult to connect to the internet?

Figure 4.3.8. Difficulty to connect to the internet

Page 54: Mandla Lukubeni Project(WSU)

53

The graph shows how difficult it is to connect to the internet. According to the findings based on

the questionnaires, most of the respondents found it normal to connect to the internet.

4.3.9 Question: What do you use the internet mostly for?

Figure 4.3.9. What is the internet mostly used for

The above graph proves that for about 38% of the internet users use it for educational or work

purposes. That alone shows that the majority of the users use the internet for the best of the

universities progress. This graph also proves that for about 22% of the users misuse the internet

in a way that they use it for entertainment. We acknowledge that the voice and video

transmission demands a lot of traffic. 21.5% of the users use the network for their personal uses.

Page 55: Mandla Lukubeni Project(WSU)

54

4.3.10 Question: In overall how do you rate the internet connection in your campus?

Figure 4.3.10. Overall ratings on the internet connection

According to the above graph, for about 65% of the users found the network slow in speed off

which 30% of the users from that 65% found it very slow. Less than 25% of the users found the

network very fast which then can be concluded that most of the users find the network slow.

4.3.11 Question: Which computer application do you use mostly?

Figure 4.3.11. Application which is mostly used.

Page 56: Mandla Lukubeni Project(WSU)

55

The above graph shows that most of the users use internet more than anything the network

supports. For about 31% of the users use the internet.

4.3.12 Question: Is the WSU, iBika network secured from viruses?

Figure 4.3.12. Virus on the network

According to the graph above it is now concluded that the network at WSU-IBK is filled with

virus because for about 61% of the users found that the network has virus.

4.3.13 Question: Do you save or upload stuff on the network?

Page 57: Mandla Lukubeni Project(WSU)

56

Figure 4.3.13. How many upload data on the network

This graph above proves that not only the network is used to access the internet and some other

applications but is also used to save some stuff on the network. 71% of the users upload on the

network.

4.3.14 Question: If yes, how often do you save or upload stuff on the network?

Figure 4.3.14. How often data is uploaded on the network.

According to the graph above, users often upload data on the network almost everyday.

4.3.15 Question: How would you rate the overall quality of service provided by the

network?

Page 58: Mandla Lukubeni Project(WSU)

57

42

30 30 28

0

10

20

30

40

50

Poor Average Good Excellent

Quality of service on the network

Quality of service onthe network

Figure 4.3.15. Quality of service on the network performance

The above graph shows the quality of service provided by the network. It can be concluded that

the network at WSU-IBK provides poor quality as from the data gathered from the

questionnaires, for 32% of the user find it very poor.

4.3.16 Question: Which system do you use most?

Figure 4.3.16. Which system people use most

Page 59: Mandla Lukubeni Project(WSU)

58

The graph above shows how important the network performance is because WiseUp which is

access most demands high speed network for better access(60% access WiseUp).

4.3.17 Question: How often do you use the application noted in Question 16?

Figure 4.3.17. How often the system is used

The graph above shows how often these business critical systems are accessed. According to the

graph 76% of the users access the systems daily.

4.3.18 Question: Is it very important to have internet access during my studies/work

Page 60: Mandla Lukubeni Project(WSU)

59

Figure 4.3.18. The importance of internet access

This graph proves that internet access is very important in our studies and work because for

about 76% of the users agree on this statement.

4.3.19 Question: The presence of the internet changes our lives

Figure 4.3.19. Our lives are changed because of the presence of the internet

The above graph testifies that the availability of the internet access can change people’s lives

4.3.20 Question: If there is a problem to the network, for how long do you wait for the

problem to be solved?

Page 61: Mandla Lukubeni Project(WSU)

60

Figure 4.3.20. How quick the problem is solved about the network

The graph above proves that the people who are responsible for the maintenance of the network

are actually trying their best to make the network work according to the standard. It can be

concluded that the problem on the network does not stay long to be resolved. For about 97% of

the users found that the problem takes less than a week to be resolved.

4.3.21 Question: In general, I am satisfied with the way in which the internet is working on

my campus

Page 62: Mandla Lukubeni Project(WSU)

61

Figure 4.3.21. Satisfaction on the internet availability

According to the graph above, we can now conclude that users are not satisfied with the way

internet availability is.

4.3.22 Question: In general, I am satisfied with network support for my learning, research,

and/or teaching needs.

Figure 4.3.22. Does the network support my learning or teaching needs?

Page 63: Mandla Lukubeni Project(WSU)

62

This graph shows weather the network at iBika campus of WSU support learning and teaching

needs or not.

4.3.23 Question: Rate the performance/ response of the system you use

Figure 4.3.23. The response/ interactivity of the system

The graph above shows how the systems interact with the users. It can be concluded that the

systems used at WSU-IBK are very poor in response time.

Page 64: Mandla Lukubeni Project(WSU)

63

4.4 CONCLUSION

This chapter discussed the findings which are given in graphs and interpreted in a way that one

can understand. In this chapter the respondent’s responses were analyzed and the conclusion was

drawn based on what the respondents gave on their answers.

Page 65: Mandla Lukubeni Project(WSU)

64

CHAPTER 5

5.1 INTRODUCTION

In the previous chapter data from the questionnaires was analyzed and conclusion was made

based on that data given by the respondents. I n this chapter the researcher is going to answer the

research question and give recommendations on the current problem to be solved. This research

opens platform for other studies as some of the research sub questions are still not answered.

5.2 RESEARCH DISCUSION

The main aim of this research is to investigate the network performance, recurrent downtime at

WSU and to recommend possible solutions on how to keep the network up to standard and

therefor the main question is:

What is the network performance and recurrent downtime at IBika campus of WSU?

The following questions will help answer the research question.

5.2.1 What are the downtimes on the network?

According to question 20 on the questionnaires, this research sub-question is answered

and the analysis of the questionnaire on this question was made. Base on the analyses

we can then conclude that in terms of the downtimes of the network at WSU the

respondents proved that the network regularly goes down. Discussion is made on

chapter FOUR when analyzing question 10 on the internet connection in the campus,

based on that analysis we can now conclude and answer this research sub-question and

says the downtimes are very often because even the internet connection is very slow as

the network goes down more often.

5.2.2 What type of traffic is using the network?

According to the questionnaire, many questions were asked which enabled the

researcher to answer this research sub-question. The analysis discussed based on

question 9 on the questionnaire outlined that the network support Video/Voice traffic.

Question 16 outlined business critical systems which the network support such as

WiseUp, ITS, Opac and Millenium which are HTTP traffic.

Page 66: Mandla Lukubeni Project(WSU)

65

5.2.3 How is the traffic classified in terms of priorities on the network?

According to chapter one of the research, the researcher discovered that HTTP traffic

particularly ITS is at priority one in the organization as it support/contain the

information about each and every individual in the organization be it a student or staff

member, and financial information is also contained among the information in ITS.

5.3 RESEARCH RECOMMENDATIONS

The study has proven that the network at the iBika campus of the WSU is unreliable in terms of

performance and has recurrent downtime. The information gathered from the questionnaires

also proved that the services provided by the institution needs computer network therefor the

network performance should be at a high standard. 90% of the respondents from the

questionnaire are utilizing the network services.

This study has proven many factors that are the result of the network to be slow. According to

question 6 from the questionnaire which was asking the respondents severity on the internet

usage, it is proven that the network is congested according to the fact that many students are at

the institution accessing the internet at every day.

Without having an understanding of what's actually happening on your network, you are likely to

fail at any attempt to address performance issues. Peter Prichard, marketing director Asia-Pacific

at Compuware, says people tend to blame the network for poor performance, but the PCs and

serverscanalsobethecause.

"The first thing to do is make sure the network really is the problem," Prichard says. "Even if it's

not the network, IT spends a lot of time proving it's not." Tools such as Compuware's Vantage

suite can isolate problems such as a slow client, excessive latency on a WAN link, or poorly

written SQL on a back end server. An application might be developed on a LAN and then

deployed over a WAN with disappointing results due to an excessive number of database calls.

Collecting the right information also lets you take an active stance, identifying and dealing with

problems before they impact on users.

Many people will blindly add bandwidth in an attempt to solve a perceived problem -- this tends

to be one of the biggest mistakes people make, Prichard says. "You've got to have facts --

application-based facts," he says.

David Gibb, technical consultant with Vanco Australasia agrees. He says that what may

dramatically improve performance in one environment could hinder performance in another.

Page 67: Mandla Lukubeni Project(WSU)

66

Scott Atkinson, managed LAN services practice leader at Netforce, points out, there are a variety

of free, cheap, and expensive tools that singly or in combination can show what's happening and

why. MRTG (Multi Router Traffic Grapher), a free utility that can help you gain an

understanding of your network.

A network analyzer itself will only show the aggregate traffic, and won't deliver the information

you need. Prichard says to "start with the premise that the application is king", rather than

checking individual aspects of the infrastructure.

Lorenzo Modesto, general manager at Bulletproof Networks, says this monitoring should be

accompanied by alerting. Once the monitor is tuned to avoid false positives, an appropriate

person should be automatically alerted when an unusual event occurs. "SMS is absolutely perfect

for that," he says.

When it comes to things such as radio frequency, monitoring is important for good wireless LAN

performance, says Mark Hayes, manager of consulting and solutions at CSC. "The RF

environment is not static," he says. According to Hayes, a WLAN coming online on a close

neighbour's premises can affect the performance of your network.

Whether you wish to enhance the performance of a home network or a sophisticated network that

includes multiple locations in a corporate structure, there are a number of simple ways to

improve network performance. Even the wireless networks of today can be fine-tuned to increase

efficiency. There are actually many ways to go about this process; some being unique to a

specific network configuration, while others are applicable to just about any type of network

setup.

One common sense approach to network performance is to always have a backup strategy. This

helps to ensure your network can continue functioning even if some event negatively impacts the

overall network. For example, a small business may choose to set up its internal computer

network with the use of both a primary and secondary server. Throughout the day, the data

captured on the primary server is also copied to the secondary unit. In the event that the primary

server fails for any reason, the secondary server automatically kicks in, making it possible for the

network to remain active with nothing more than a few seconds' delay when the server switch

takes place.

Along with a backup server, it is also a good idea to make sure you have a backup power source.

Power failures can result in lost data that must be re-entered, and can also cause some problems

with various types of hardware. Instead of running the risk of harm to your data or your

equipment, invest in what is known as an Uninterruptible Power Supply, or UPS. Devices of this

type can provide anywhere from a few hours to an entire day of power for your system. Many

are configured so that manual activation is not necessary; instead, they activate as soon as a loss

of power from the main system is detected.

Another important strategy in improving network performance is to archive data that is no longer

in active use. Freeing up resources on the network will make it easier to execute commands from

Page 68: Mandla Lukubeni Project(WSU)

67

any station connected with the computer network, allowing users to do their jobs quicker.

Always make sure the archived data can be accessed and even reloaded with relative ease if

needed.

At the same time, your network performance may be impacted when the growth of your business

places additional stress on the Random Access Memory (RAM) inherent in the network. This

can happen when you add more workstations as nodes on the network. For this reason, it is a

good idea to always evaluate your current RAM before adding network computers, and make

sure you have enough memory for every station to be in active use simultaneously.

Regular maintenance of hardware is also key to keeping network performance at optimum levels.

Even something as simple as a worn cable can slow down the processing of commands. Check

all hardware on a consistent basis, and repair or replace any component that is no longer

providing the level of efficiency required to get the job done.

There are many other ways to improve network performance that have to do with the specifics of

the network. Make sure the temperature around key network components is kept within

manufacturer recommendations. Test various protocols, such as file transfer protocols, to make

sure they do not interfere with other functions, a situation that can create pauses in the execution

of commands. Above all, conduct maintenance on your network on a regular basis, as well as

troubleshoot often. Doing so will keep the network running smoothly, and make it possible to

correct localized issues before they have the chance to endanger the entire network.

The term network monitoring describes the use of a system that constantly monitors a computer

network for slow or failing components and that notifies the network administrator (via email,

SMS or other alarms) in case of outages. It is a subset of the functions involved in network

management.

The are many monitoring tools that can help improve the network. PRTG is a network

monitoring tool that helps you to ensure that your computer systems are running smoothly and

that no outages occur. Network monitoring is also important to increase the efficiency of your

network by knowing bandwidth and resource consumption. Your network infrastructure can be

optimized, Increase profits by avoiding losses caused by undetected system failures, Reduce

costs by buying bandwidth and hardware according to actual load, Eliminate server performance

problems and bandwidth bottlenecks, Improve quality of service through being proactive.

Requirements For a Network Monitoring Tool

A good network monitor should be easy to install and usage should be intuitive, so that there is

no need for external consultancy and training. Further necessary requirements are:

Page 69: Mandla Lukubeni Project(WSU)

68

Remote Management via web browser, PocketPC, or Windows client

Notifications of outages by email, ICQ, pager/SMS, and more.

Comprehensive sensor type selection

Multiple location monitoring

All common methods for network usage data acquisition (SNMP, Packet Sniffing,

Xflow) ought to be supported.

Knowing What to Monitor

The mere implementation of a network monitor is not enough. The key to effective network

monitoring is to ensure that the chosen tool has been configured to monitor what are essentially a

network's vital signs: availability, speed and usage.

Monitoring network availability allows both internal and external parties to access the

services, including websites and you can determine whether the mail servers and leased lines are

working.

Monitoring network speed with bandwidth monitoring prevents your websites and network

services from losing visitors or frustrate users due to slow-loading pages, files or images.

Finally, usage monitoring enables you to accurately assess CPU load and learn just what sort of

work the servers are doing at times of different the day

Proactive Network Management

Spot and fix pending performance problems before end-users start calling

Device icons on dynamic network maps are color-coded for instant status reporting

Alerts notify you that network performance thresholds have been exceeded

Network Services and Application Monitoring

Make sure that web, email, database and other business-critical services and applications

are available 24/7

Network Troubleshooting

Why is the server slow? Why isn't the videoconference running well?

Quickly access hard drive, memory, jitter, packet latency, connection speed and other

data to find and fix root causes of network service degradation

Page 70: Mandla Lukubeni Project(WSU)

69

Network Capacity Planning

Can traffic be rerouted to improve flow?

Is more server power needed to support new remote workers?

Real-time network performance views make you constantly aware of where your network

is working well, where improvements are needed, and how to cost-effectively expand

your infrastructure

5.4 CONCLUSION

ICT in an organization is there to improve the relations of business to technology for efficiency.

With the high performance of the network in an organization provides high performance in the

services therefor the throughput would be superb.

Page 71: Mandla Lukubeni Project(WSU)

70

APPENDIX

Page 72: Mandla Lukubeni Project(WSU)

71

Walter Sisulu University

Private Bag X 3182

Butterworth

4960

Dear Participant

I am a B-Tech student in the Department of Information Technology at Walter Sisulu

University (WSU) conducting research under the supervisor Mr B. Ndovie. I am trying to

investigate the performance of the network resources and the recurrent downtime at iBika

campus of WSU. My research topic says, “INVESTIGATING THE NETWORK

PERFORMANCE AND RECURRENT DOWNTIME (CASE STUDY IBIKA

CAMPUS).”

I am inviting you to participate in a research project to study the efficiency and

effectiveness of the WSU, iBika campus Network Performance. Along with this latter is a

short questionnaire that asks a variety of questions about the network. I am asking you to

look over the questionnaire, complete it and send [or give] it back to me. It should take

you about less than 15 minutes to complete. The results of this research will help me

attain a B-Tech in Information Technology: Communication Networks. I will also

forward the results to ICT to assist them in planning.

I do not know of any risks to you if you decide to participate in this survey and I

guarantee that your responses will not be identified with you. I promise not to share any

information that identifies with you. You should not put your name on the

questionnaire. If you have any questions or concerns about completing the questionnaire

or about being in this study, you may contact me at 078 300 5961. Your participation in

this study will be highly appreciated.

Regards.

Mandla Lukubeni

Email: [email protected]

Cell: 078 300 5961

Page 73: Mandla Lukubeni Project(WSU)

72

QUESTIONNAIRE

Please mark where appropriate

1. Gender

Male Female

2. Which age group do you belong?

15-20 21-25 26-30 31-35 36-40 41 & above

3. To which faculty do you belong?

Faculty of Engineering

Faculty of Business, Accounting and Law

Faculty of Applied

Other Faculty

4. To which category do you belong?

Academic Staff Student

Non-academic Staff Other

If other, Specify

5. Is the computer literacy included as a subject in your course?

Yes No

Page 74: Mandla Lukubeni Project(WSU)

73

6. How often do you use the internet?

Everyday Maybe 10 time a month

Once a week More than once a week

Never Less than 10 times a week

7. How do you connect to the internet

Wireless Local Network (cable)

3G/Mobile Service Cannot Connect

8. How difficult to connect to the internet?

Very Easy Easy

Normal Difficult

Very Difficult

9. What do you use the internet mostly for?

Work/School purposes Entertainment (Music/Movies/Chatting)

For personal purposes Voice and Video conferencing

Send and Receive emails

10. In overall, how do you rate internet connection in your campus?

Very Fast Adequate

Slow Very Slow

Page 75: Mandla Lukubeni Project(WSU)

74

11. Which computer application do you use mostly?

E-Mail Database

Internet Intranet/Extranet

Website Other, Specify

12. Is the WSU, iBika network secured from viruses?

Yes No

13. Do you save or upload stuff on the network ?

Yes No

14. If yes, how often do you save or upload stuff on the network?

Very low High

Low Very High

Medium

15. How would you rate the overall quality of service provided by the

network?

Poor Good

Average Excellent

Page 76: Mandla Lukubeni Project(WSU)

75

16. Which system do you use most?

WiseUp Opac

ITS Millennium

Other, Please specify

17. How often do you use the application noted in Question 16?

Daily Weekly

Monthly Quarterly

Never

18. It is very important to have the internet access during my studies/work

Agree Strongly Agree

Disagree Strongly Disagree

19. The presence of the internet changes our lives

Agree Strongly Agree

Disagree Strongly Disagree

20. If there is a problem to the network, for how long do you wait for the

problem to be solved?

Less than a day 1 – 2 days

3 – 7 days Other, Specify

Page 77: Mandla Lukubeni Project(WSU)

76

21. In general, I am satisfied with the way in which the internet is working on

my campus.

Agree Strongly Agree

Disagree Strongly Disagree

22. In general, I am satisfied with network support for my learning, research,

and/or teaching needs.

Agree Strongly Agree

Disagree Strongly Disagree

23. Rate the performance/ response of the system you use

Very High High

Normal Low

Very Slow

24. How the unavailability of the internet does affect your studies/work on

campus?

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………................................................

..........................................................................................................

25. What problems do the absence of the internet cause at your campus?

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………................................................

.........................................................................................................

Page 78: Mandla Lukubeni Project(WSU)

77

26. Please give any comments about the network services on campus.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………................................................

..........................................................................................................

Page 79: Mandla Lukubeni Project(WSU)

78

REFERENCES

South African Regional Universities Association [Online]

Available from: http://www.sarua.org/?q=uni_Walter%20Sisulu%20University

[Accessed: 04th

June 2012].

Advania [Online]

Available from: http://www.advania.se/en/Offers/Business--Function-

Solutions/Business-Critical-Systems/

[Accessed: 02nd

July 2012]

Webopedia [Online]

Available from: http://www.webopedia.com/TERM/C/client.html

[Accessed: 01st March 2012]

Walter Sisulu University [Online]

Available from: http://www.wsu.ac.za/research/research.php

[Accessed: 03rd

March 2012]

TechTerms [Online]

Available from: http://www.techterms.com/definition/computer

[Accessed: 01st February 2012]

About [Online]

Available from: http://cplus.about.com/od/glossar1/g/databasedefn.htm

[Accessed: 13th

July 2012]

The Free Dictionary [Online]

Available from: http://www.thefreedictionary.com/downtime

[Accessed: 17th

April 2012]

Page 80: Mandla Lukubeni Project(WSU)

79

CIPI [Online]

Available from: http://www.cipd.co.uk/hr-resources/factsheets/e-learning.aspx

[Accessed: 24th

July 2012]

Encyclopedia [Online]

Available from: http://www.pcmag.com/encyclopedia/term/43982/groupwise

[Accessed: 23rd

March 2012]

SearchCIO [Online]

Available from: http://searchcio-midmarket.techtarget.com/definition/ICT

[Accessed: 26th

August 2012]

ITS User Group [Online]

Available from:

http://www.itsug.org.za/index.php?option=com_content&task=view&id=24&Itemid

=32

[Accessed: 12th

April 2012]

Mirriam Webster [Online]

Available from: http://www.merriam-webster.com/dictionary/internet

[Accessed: 20th

September 2012]

Investopedia [Online]

Available from: http://www.investopedia.com/terms/e/erp.asp

[Accessed: 20th

April 2012]

Techopedia [Online]

Available from: http://www.techopedia.com/definition/3988/intrusion-detection-

system-ids

[Accessed: 20th

April 2012]

Page 81: Mandla Lukubeni Project(WSU)

80

Webopedia [Online]

Available from:

http://www.webopedia.com/TERM/I/intrusion_prevention_system.html

[Accessed: 23rd

April 2012]

Search Data Center [Online]

Available from: http://searchdatacenter.techtarget.com/definition/ITIL

[Accessed: 26th

June 2012]

Business Dictionary [Online]

Available from: http://www.businessdictionary.com/definition/network.html

[Accessed: 19th

July 2012]

About [Online]

Available from:

http://cplus.about.com/od/introductiontoprogramming/g/program.htm

[Accessed: 25th

August 2012]

Arinc Management Service [Online]

Available from: http://www.arincmanagedservices.com/blog/2010/11/service-desk-

or-help-desk/

[Accessed: 12th

July 2012]

Open Project [Online]

Available from: http://www.openprojects.org/software-definition.htm

[Accessed: 20th

April 2012]

Business Dictionary [Online]

Available from: http://www.businessdictionary.com/definition/system.html

[Accessed: 27th

June 2012]

Page 82: Mandla Lukubeni Project(WSU)

81

MyBroadband community,

Join date November 2010,

Post number 4,618

ITS USER GROUP CONFERENCE 2012

12 - 14 March 2012

Emperors Palace Convention Centre

Johannesburg, South Africa

Introduction to ETIU and E-Learning

WSU Brochure, 2011

Ogedebe, 2008

“INTERNET USAGE AND STUDENT’S ACADEMIC PERFORMANCE IN

NIGERIA TERTIARY INSTITUTION: A CASE STUDY OFUNIVERSITY OF

MAIDUGURI”, Thesis, Binham University

CISCO CCNA Exploration Companion Guide

Network Fundamentals

ISBN-10: 1-587 13-203-6

ISBN-13: 978-1-587 13-203-2

Ziaiel Academic [Online]

Available from: http://zaielacademic.net/networking/wan_topologies.htm

[Accessed: 02nd

August 2012]

Inetdaemon [Online]

Available from:

http://www.inetdaemon.com/tutorials/networking/lan/topology.shtml

[Accessed: 24th

September 2012]

Wiki Books [Online]

Available from:

http://en.wikibooks.org/wiki/Communication_Networks/Network_Topologies

[Accessed: 01st February 2012]

Page 83: Mandla Lukubeni Project(WSU)

82

Computer Networking [Online]

Available from:

http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.ht

m

[Accessed: 27th

May 2012]

Thought [Online]

Available from: http://thought1.org/nt100/module3/wireless.html

[Accessed: 24th

September 2012]

Computer Networking [Online]

Available from:

http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.ht

m

[Accessed: 29th

June 2012]

Tyson Greer

Book Tittle: Computer Network

ISBN: 1-57231-702-7

Published by: Microsoft Press Copyright-1998, Chapter 1

Johannes Helmig, 2004

Article: Authentication, Access Control and Encryption [Online]

Available from: http://www.windowsecurity.com

[Accessed: 20th

May 2012]

Magalhas, RM, 2004

Viruses, Trojan and Malware [Online]

Available from: http://www.windowsecurity.com

[Accessed: 26th

May 2012]

Atkinson, S , 2012

managed LAN services practice leader at Netforce [Online]

Available from: http://people.ee.ethz.ch/~oetiker/webtools/mrtg/,

[Accessed: 26th

August 2012]

Page 84: Mandla Lukubeni Project(WSU)

83

Madden, J

Networking Essentials

ISBN: 1-57231-905-4

Microsoft Press Copyright-1998

Magi, 2003

“PENSION MANAGEMENT SYSTEM FOR BISHO SOCIAL DEVELOPMENT

OF THE EASTERN CAPE”, Thesis, WSU

Dimension Data, 2008

Network Performance Frustration Research Report [Online]

Available from: http://www.dimensiondata.com/List/Downloadable%20Content/

DimensionDataNetworkPerformanceFrustrationResearchReport_129114049618000

00.pdf

[Accessed: 11th

August 2012]

Walter Sisulu University [Online]

Available from: http://www.wsu.ac.za/research/research.php

[Accessed: 08th

February 2012]

Webopedia [Online]

Available from:

http://www.webopedia.com/TERM/N/network.html [Accessed: 13

th June 2012]

Soho, 2010

“AN EXPLORATION OF THE ROLE OF THE STRATEGIC INTERNAL

COMMUNICATION SYSTEM IN THE MERGING WALTER SISULU

UNIVERSITY”, Thesis, WSU