Mandla Lukubeni Project(WSU)
-
Upload
mandla-lukubeni -
Category
Documents
-
view
57 -
download
1
Transcript of Mandla Lukubeni Project(WSU)
INVESTIGATING THE NETWORK PERFORMANCE AND
RECURRENT DOWNTIME AT WALTER SISULU
UNIVERSITY; A CASE STUDY IBIKA CAMPUS
A thesis submitted in fulfillment of the requirements for the
Baccalaureus Technologiae
In Information Technology–Communication Networks (B-Tech: IT)
BY
MR M LUKUBENI
STUDENT NO: 208100644
PROMOTER/ SUPERVISOR: MR A MWANZA
NOVEMBER 2012
1
DECLARATION
I hereby declare that the dissertation: INVESTIGATING THE NETWORK PERFORMANCE AND RECURRENT
DOWNTIME AT WALTER SISULU UNIVERSITY (CASE STUDY OF IBIKA CAMPUS); is my own work and
declares that it has not been submitted for any degree at any University
Signature…………………..
Date………………………...
2
ACKNOWLEDGEMENTS
First and for most I would have done myself no justice, I would have deprived myself of greater
things and shut the well of blessings altogether if I were not to acknowledge my Lord and Savior
Jesus Christ, God who is Alfa and Omega, who made it possible for me to be able to finish my
project, Amen!
Secondly I thank God for introducing Mr. Mwanza in my life, the most caring supervisor ever
who also played a parental role in my student life. Without Mr. Mwanza I would have not
attained what I have had he was not my lecturer, Thank you sir. I also thank Mr. B Ndovie and
Mr. G Mwansa who also played a big role in this project.
Thirdly, I thank the encouragements from my fellow student mates Mtshengu Thembinkosi,
Hlengiwe Thandazwa, Linda Fukula and Khanyisile Noah. We were falling together but what I
like most we never stopped encouraging each other.
Last but not least I give a word of thanks to my family for giving me a chance to further in my
studies. They supported me on each and every aspect of my life.
Words cannot express enough on how I want to give thanks to people who made all this project
possible, Thank you
A great brick layer is the one who lays firm foundation with the stones that others throw at him,
“African Proverbs”
God Bless you all !!!!!!!!!!!!!!!
3
TABLE OF CONTENTS
PAGES
Declaration 1
Acknowladgement 2
Table of Contents 3
List Of Figures 4
Abstract 7
CHAPTER ONE
1.1 Background 8
1.2 Literature Review 12
1.3 Problem Statement 13
1.4 Purpose of the Study 14
1.5 Research Objectives 15
1.6 Research Questions 15
1.7 Study Area 15
1.8 Significance of the Study 16
1.9 Delimitation 16
1.10 Definition of Terms 16
1.11 Outline of the Thesis 22
1.12Conclusion 23
CHAPTER TWO
2.1 Introduction 24
2.2 WSU Campuses 24
2.3 Network Structure 24
2.4 Network Performance Impact on an Educational Organization 33
2.5 Causes of Low Network Performance 34
2.6 How to Measure Network Performance 35
2.7 Network Architecture 38
2.8 Security Threats 39
2.9 Firewalls 41
2.10 Conclusion 41
CHAPTER THREE
3.1 Introduction 42
3.2 Research Methodology 42
3.3 Research Design 42
3.4. Sampling 43
4
3.5 Instrumentation 43
3.6 Data Collection 43
3.7 Data Analysis 44
3.8 Conclusion 45
CHAPTER FOUR
4.1 Introduction 46
4.2 Data Analysis 46
4.3 Data Representation 47
4.4 Conclusion 62
CHAPTER FIVE
5.1 Introduction 63
5.2 Research Discussion 63
5.3 Research Recommendations 64
5.4 Conclusion 68
APPENDIX
Questionnaire Cover Letter 70
Questionnaire 71
References 77
5
LIST OF FIGURES
Figure 2.3.1 : Layout Design Structure For Network Topologies
Figure 2.3.2 : Bus Network Topology
Figure 2.3.3 : Star Topology
Figure 2.3.4 : Ring Topology
Figure 2.3.5 : Point to Point Topology
Figure 2.3.6 : Point to Multi-Point topology
Figure 2.3.7 : Point to Point WAN Topology
Figure 2.3.8 : WAN Ring Topology
Figure 2.3.9 : WAN Star Topology
Figure 2.3.10 : Multitiered WAN Topology
Figure 2.3.11 : MAN Topology
Figure 2.3.12 : WLAN Topology
Figure 2.6.1 : Digital Bandwidth Measures
Figure 2.6.2 : Bandwidth Limitations
Figure 2.6.3 : Bandwidth Associated with WAN Services
Figure 4.3.1 : The Percentage of Female and Male Respondents
Figure 4.3.2 : The Age Category
Figure 4.3.3 : The Faculty Category
Figure 4.3.4 : The Staff or Student category
Figure 4.3.5 : Statistics on courses that include computer as a subject
Figure 4.3.6 : Severity on internet usage
Figure 4.3.7 : Internet access technology one uses.
6
Figure 4.3.8 : Difficulty to connect to the internet
Figure 4.3.9 : What is the internet mostly used for
Figure 4.3.10 : Overall ratings on the internet connection
Figure 4.3.11 : Application which is mostly used.
Figure 4.3.12 : Virus on the network
Figure 4.3.13 : How many upload data on the network
Figure 4.3.14 : How often data is uploaded on the network.
Figure 4.3.15 : Quality of service on the network performance
Figure 4.3.16 : Which system people use most
Figure 4.3.17 : How often the system is used
Figure 4.3.18 : The importance of internet access
Figure 4.3.19 : Our lives are changed because of the presence of the internet
Figure 4.3.20 : How quick the problem is solved about the network
Figure 4.3.21 : Satisfaction on the internet availability
Figure 4.3.22 : Does the network support my learning or teaching needs?
Figure 4.3.23 : The response/ interactivity of the system
7
ABSTRACT
The network performance is a grate factor in an educational institution because we are living in
an informational world. Each and every organization depends in a way on the network
performance to run its services. Based on the experience I had in the university, the network is
unreliable based on the performance and recurrent downtime.
The purpose of this research is to investigate on the network performance and recurrent
downtimes at WSU-iBika campus. This research will also investigate about the causes of this
network failure. This study collected the information from students and staff using
questionnaires and then it was analysed and conclusion was made from the analysis.
8
CHAPTER ONE
1.1 BACKGROUND
Walter Sisulu University (WSU) is one of the South African Universities located in one
of the least-developed parts of South Africa, the Eastern Cape. WSU is a comprehensive
university, the result of three historical disadvantaged higher level learning institutions.
These high level learning institutions used to operate independently of one another with
different organizational cultures.
This comprehensive institution was the result of a merger between the former University
of Transkei and two technikons, the Border Technikon at Potsdam and the Eastern Cape
Technikon in Butterworth. The new Walter Sisulu University, therefore, offers higher
education tuition on four campuses – in Mthatha (erstwhile capital of Transkei), in
Butterworth, as well as in East London in the Buffalo City Metropolitan area, and at
Queenstown. The campuses are situated in the densely populated and generally under-
developed far-eastern hinterland of South Africa’s Eastern Cape Province. (South African
Regional Universities Association, 2012)
The merger of historically disadvantaged two technikons and a university within rural
South African setting presents a complex historical heritage. In 2005, Border Technikon;
Eastern Cape Technikon; and University of Transkei were merged into a comprehensive
university: Walter Sisulu University (WSU). The birthed institution is faced with varied
existing challenges inherited from the defunct institutions and novel challenges
emanating from the merger exercise. The Eastern Cape Province occupies 14% of the
land areas of South Africa, and has 14.5% of the country's 45 million inhabitants. [BT0]
Walter Sisulu University is located in the Eastern Cape Province together with University
of Fort Hare, Rhodes University and Nelson Mandela Metropolitan University. Primarily,
WSU serves the people of Eastern Cape Province with strong aspirations for national and
international educational leadership standings. The University has four campuses:
Buffalo City; Ibika; Mthatha; and Queenstown with eleven knowledge dispensing sites.
With four Faculties: Business, Management Sciences and Law; Education; Health
Sciences; and Science, Engineering and Technology; of which two offer doctoral
programs. It is committed to advancing the frontiers of research in Eastern Cape in
particular, South Africa and the world at large.
9
All these campuses operate as a single entity; every information can be processed, can be
accessed, and also can be stored on each and every campus and all that can be done
remotely or locally. This sharing of information can be done only if there is a connection
between these site and campuses. (Walter Sisulu University, 2012)
The WSU network support many business critical systems like:
Integrated Tertiary Software (ITS)
Established in 1987, from very humble beginnings the ITS User Group has grown to a
membership of some 34 Higher Education & Further Education & Training institutions
throughout Africa, Ireland and New Zealand. Membership of the ITS User Group is open
to all organizations and institutions utilizing the Integrated Tertiary Software (Pty) Ltd
administrative systems.
Integrated Tertiary Software (Pty) Ltd specializes in the provision of integrated software
to support the administrative functions within the higher education and further education
& training sectors. The company also offers a wide range of related training, support and
consultation services to facilitate the transfer of knowledge to staff members at client
institutions.
The ITS Enterprise Resource Planning (ERP) software solution can be implemented as a
fully integrated solution to support the Student, Financial, Human Resources, Payroll and
Library business processes of a University, Polytechnic or College. ITS operates
exclusively in the education sector. The expertise gained in this field contributes to the
success of system implementation and support. ITS is an ISO 9001:2000 certified
company which ensures a continuous focus on quality and client satisfaction and fully
supports the company values.
The ITS system is fully Web enabled and staff and students access the system on campus
through a standard Web browser. Students and staff can also access the system remotely
via the Internet using standard Web Browsers and specially designed self-service (the
enabler) applications.
Membership of the User Group is open to all organizations and institutions who utilize
the Integrated Tertiary Software Administrative System. The software package which
runs on an Oracle database is designed to meet the specific needs of the tertiary
environment. Continuing growth in the client base is a clear indication that the product is
widely accepted and must be regarded as one of the leading integrated computerized
educational administrative systems in the world.
10
E-Learning
Promote the innovative and effective use of information and communication
technologies (ICTs) for teaching and learning in WSU courses and programs.Provide
guidance on learning materials development, including web-based instruction
methodology. Organize e-learning conferences for the University. Advise on CLTD
Learning and Teaching Resource Centers. Champion the Centre’s marketing tools:
website, handbooks, brochures, newsletters,
Etc.
E-learning is one of the methods currently used to improve the quality and standard of
education where the Internet is regarded as a driving force to enhance learning and
teaching. E-learning is the use of technology for educational purposes including the use
of computers by students both in and outside the classroom, and on or off campus. This
methodology (E-Learning) brings major/remarkable changes in education and enhances
the traditional face-to-face approach without re-placing it. E-learning at WSU has been
piloted in the Faculty of Science, Engineering and Technology (FSET) with the objective
of improving the learning and teaching methodologies in this Faculty and the ultimate
goal of improving the student pass rate. Since the second semester of 2009, other
faculties, e.g. Faculty of Business Management Sciences and Law (FBML), Faculty of
Health Sciences and Faculty of Education have been involved as well.
WiSeUp is the Virtual Learning Environment (VLE) used for E-learning at WSU. Two
hundred and eighteen (218) academic staff (26% of the academic staff compliment of
827) has been trained on the Basic e-Learning Level. Thirty four (34) of them have also
been trained at the Intermediate level. Two thousand three hundred and seventy eight (2
378) students have been trained on WiSeUp. All courses are on WiSeUp; 490 Academic
courses have been clicked by lecturers (put material) and 328 have been accessed by
students (active).
Through E-learning technology, the learning experience is no longer limited to the
classroom or to what the teacher presents in class, students are able to download relevant
learning materials from the Internet to further their self-knowledge. WiSeUp enables both
lecturers and students to access course and module information, lecture notes, and submit
assignments as well as to engage in discussion forums. This way, communication
between students and lecturers can be improved and learning opportunities expanded.
Lecturers will benefit most in that when they have to attend workshops, seminars, etc,
they will upload course materials to be used by students during their absence. CLTD is
working hard on training all staff and students of WSU to make use of WiSeUp. With the
team in place and support from all staff members and students, this initiative should
succeed and WSU will soon be regarded as one of the universities that are
11
technologically developed in terms of E-learning. It is hoped that with this initiative the
student throughput rate will be improved.
Millennium
WSU library collections cater for a wide spectrum of scholarship ranging from the
Undergraduate, graduate and postgraduate information needs. In addition to our local
collections we expose our learners to resources held in other academic Libraries in the
Eastern Cape. These academic libraries are members of a consortium called the “South
East Academic Library System” (SEALS).Together with the libraries of Fort Hare,
NMMU & Rhodes; WSU Libraries is a member of SEALS, a consortium whose agenda
is to make holdings of these libraries accessible on a shared database library system
called “Millennium”. In addition to print and other resources that are currently available
to you from the 10 WSU Library sites we also provide access to electronic scholarly and
peer reviewed journals that add value to teaching, learning and research experience at
WSU.
Service desk
Service Desk Plus integrates your help desk requests and assets to help you manage your
IT effectively. It helps you implement ITIL best practices and troubleshoot IT service
requests faster. Service Desk Plus is highly customizable, easy-to-implement help desk
software. More than 10,000 IT managers worldwide use Service Desk Plus to manage
their IT help desk and assets. Service Desk Plus is available in 23 different languages.
Firewalls
Provides robust protection and network reliability for organizations networks. Firewalls
are also designed for corporate offices and mid-sized data centers that desire true gigabit
throughput and powerful features to secure their complex network environments and
multiple Internet security zones
GroupWise This system encourages communication amongst the members of the organization where
updates, awareness’s and information are shared quickly. It provides each and every
individual with an email account so that communication via email can be established
12
Intrusion Detection System (IDS)
Is software that automates the intrusion detection process? The primary responsibility of
IDS is to detect unwanted and malicious activities. Is the process of identifying and
responding to intrusion activities
Intrusion Prevention System (IPS)
Is software that has all the capabilities of an intrusion detection system and can also
attempt to stop possible incidents. Extension of ID with exercises of access control to
protect computers from exploitation. Combines IDSs and improved firewall technologies,
they make access control decisions based on application content, rather than IP address or
ports as traditional firewalls had done.
1.2 LITERATURE REVIEW
Walter Sisulu University (WSU) is one of the South African Universities located in one
of the least-developed parts of South Africa, the Eastern Cape. WSU is a comprehensive
university, the result of three historical disadvantaged higher level learning
institutions.These high level learning institutions used to operate independently of one
another with different organizational cultures.
This comprehensive institution was the result of a merger between the former University
of Transkei and two technikons, the Border Technikon at Potsdam and the Eastern Cape
Technikon in Butterworth. The new Walter Sisulu University, therefore, offers higher
education tuition on four campuses – in Mthatha (erstwhile capital of Transkei), in
Butterworth, as well as in East London in the Buffalo City Metropolitan area, and at
Queenstown. The campuses are situated in the densely populated and generally under-
developed far-eastern hinterland of South Africa’s Eastern Cape Province.
The merger of historically disadvantaged two technikons and a university within rural
South African setting presents a complex historical heritage. In 2005, Border Technikon;
Eastern Cape Technikon; and University of Transkei were merged into a comprehensive
university: Walter Sisulu University (WSU). The birthed institution is faced with varied
existing challenges inherited from the defunct institutions and novel challenges
emanating from the merger exercise. The Eastern Cape Province occupies 14% of the
land areas of South Africa , and has 14.5% of the country's 45 million inhabitants.
Walter Sisulu University is located in the Eastern Cape Province together with University
of Fort Hare, Rhodes University and Nelson Mandela Metropolitan University. Primarily,
WSU serves the people of Eastern Cape Province with strong aspirations for national and
13
international educational leadership standings. The University has four campuses:
Buffalo City; Ibika; Mthatha; and Queenstown with eleven knowledge dispensing sites.
With four Faculties: Business, Management Sciences and Law; Education; Health
Sciences; and Science, Engineering and Technology; of which two offer doctoral
programs. It is committed to advancing the frontiers of research in Eastern Cape in
particular, South Africa and the world at large.
All these campuses operate as a single entity, every information can be processed, can be
accessed, and also can be stored on each and every campus and all that can be done
remotely or locally. This sharing of information can be done only if there is a connection
between these campuses.
The network performance frustration research was conducted from April through to June
2008 to investigate the challenges that poor network performance present to
organizations, their employees and their IT departments. Whilst the IT users’ desire to
expand their Internet application usage is evident, the perceived performance levels of
external networks provide clear motivation. Both the IT users and the IT Decision
Makers (ITDMs) were asked how they would rate the network performance within their
organization and the external network performance outside of their organization
The network performance was rated in terms of speed and the likelihood of crash within
the organization and the network outside the organization.
1.3 PROBLEM STATEMENT
In the 21st Century we have noticed that information within and between organizations is
shared digitally, which means that the use of technology is becoming more and more a
demand for organizations. In our days most organizations if not all, require a network to
successfully provide services to its clients, such as E-Business, E-Learning, E-
Commerce, Online Banking, etc, all these services need the internet and therefore there is
no internet without a network.
Within the institution at WSU, the network provides many services and supports many
business critical systems therefore it is very crucial to have a high performance and a
very little downtime occurrence to meet the customer needs such as the students which
are high priority in any educational institution.
At WSU there is a problem which of cause has become a challenge for both students and
the organization at large on the network which becomes slow in performance and has a
14
recurrent downtime and that also causes business critical systems to go down especially
in the iBika site (Butterworth).
If WSU could have such a high performance network, it would be very unlikely to see
students queuing in long queues for their financial statements and also when the
registration process takes place. The reason for such queues is that the school is using
business critical systems which become congested because of the load on the network
and eventual the systems go down as the network lowers in speed.
The network which performs at a high standard results in the high performance of stuff
because you would hardly see them (the stuff) not working because of the system which
is down. That would benefit the institution in a manner that there would be no loss
because people will be paid as they have done their work.
Communication across the institution would be very fast if the network could be fast
because when one posts something on the internet or on WiseUp, it would be very fast
accessing that particular information as the internet access would be 24/7. Emails, Instant
messaging and all other collaboration tools would be at the universities advantage.
The students are introduced on E-Learninig and that in a way shifted their focus from
books to study electronically. The performance in the network also has an impact on the
performance of students academically because the slower the network the lesser the
student accesses WiseUp.
1.4 PURPOSE OF THE STUDY
To examine the current situation or state of the WSU network performance
To understand the network used at WSU
To investigate and discover the causes of the Walter Sisulu University (WSU)
network to slow down.
To recommend strategies on how to increase the speed of the WSU network and
avoid its failures
To investigate the ways and tools to help maintain the high performance at high speed
on the WSU network
To recommend the possible solutions to the existing problem
15
1.5 RESEARCH OBJECTIVES
The purpose of this study is:
To examine the current situation or state of the WSU network performance
To understand the network used at WSU
To investigate and discover the causes of the Walter Sisulu University (WSU) network to
slow down.
To recommend strategies on how to increase the speed of the WSU network and avoid
its failures
To investigate the ways and tools to help maintain the high performance at high speed on
the WSU network
To recommend the possible solutions to the existing problem
1.6 RESEARCH QUESTIONS
The main aim of this research is to investigate the network performance, recurrent
downtime at WSU and to recommend possible solutions on how to keep the network up
to standard and therefor the main question is:
What is the network performance and recurrent downtime at IBika campus of WSU?
In order to answer this question, the following sub-questions will be asked.
How often the maintenance is done on the WSU network?
What are the institutional policies in terms of the network performance?
What are the downtimes on the network?
What type of traffic is using the network?
How is the traffic classified in terms of priorities on the network?
What tools are used in maintaining the network?
1.7 STUDY AREA
Questionnaires will be distributed in one of the campuses of WSU, the iBika campus. The
questionnaires will be distributed to collect the information about the network situation
specifically in the Butterworth campus across the students and staff members. Various
departments like Department of Information Technology (IT) Department of Information
Communications Technology (ICT) will be visited by the researcher to familiarize with
the people whom the researcher will be working with.
16
The secondary data that is going to be used in this research is going to be obtained from
various departments and a selected number of students at WSU specifically iBika campus
in various forms, journals and conference papers, articles, books, reports and manuals.
1.8 SIGNIFICANCE OF THE STUDY
The research is conducted to find the causes of the network at WSU to slowdown.
I. This researcher and also the reader will gain more information on how the
WSU network operates
II. It will also inform the people responsible for maintaining the WSU network
about the problem which exists
III. Provide ways on how to improve the transmission speed of the network
IV. Give an insight to both the researcher and the reader about the recommended
network devices and tools to have a reliable network
V. This research will also develop the researcher with skill and experience in
conducting researches
1.9 DELIMITATIONS
This research will not cover the whole network of the WSU institution and the systems it
supports but specifically will cover IBIKA CAMPUS network. Only those campuses that
act as a service provider in terms of the network to IBika campus will be consulted.
1.10 DIFINITION OF TERMS
I. Business Critical System
The meaning of a business-critical system is self-explaining, a system that is
critical for the operation of an organization’s core business. The consequences of
a possible stoppage of the business-critical system could be severe, even
devastating, for an organization. Even relatively short stoppages can be serious
with a possible result of high standstill costs, stop in productions and loss of trust
among customers.
The two most important qualities of the business-critical system is to be reliable
and have a high degree of availability. (Advania, 2012)
17
II. Client
The client part of a client-server architecture. Typically, a client is an application
that runs on a personal computer or workstation and relies on a server to
perform some operations. For example, an e-mail client is an application that
enables you to send and receive e-mail. (Webopedia, 2012)
III. Computer
Technically, a computer is a programmable machine. This means it can execute a
programmed list of instructions and respond to new instructions that it is given.
Today, however, the term is most often used to refer to the desktop and laptop
computers that most people use. When referring to a desktop model, the term
"computer" technically only refers to the computer itself -- not the monitor,
keyboard, and mouse. Still, it is acceptable to refer to everything together as the
computer. (TechTerms, 2012)
IV. Database
A database is an application that manages data and allows fast storage and
retrieval of that data.There are different types of database, including a modern
NoSQL but the most popular meaning is a relational database. A relational
database stores data in tables where each row in the table holds the same sort of
information. In the early 1970s, Ted Codd, an IBM researcher devised 12 laws of
normalization. These apply to how the data is stored and relations between
different tables. (About, 2012)
V. Downtime
The period of time when something, such as a factory or a piece of machinery, is
not in operation, especially as the result of a malfunction. (The Free Dictionary,
2012)
18
VI. E-Learning
E-learning (or ‘electronic’ learning) may be defined as ‘learning that is
delivered, enabled or mediated using electronic technology for the explicit
purpose of training, learning or development in organisations’. (CIPI, 2012)
VII. Firewall
A firewall is a set of related programs, located at a network gateway server, that
protects the resources of a private network from users from other networks. The
term also implies the security policy that is used with the programs. (CIPI, 2012)
VIII. Group Wise
GroupWise supports a wide variety of mail systems as well as Novell's NDS
directory. Text-to-speech and speech-to-wave files let mobile users hear and
create e-mail by telephone. Although entirely revamped, GroupWise stems back to
WordPerfect Office, acquired by Novell in 1994. (Encyclopedia, 2012)
IX. Information and Communication Technology
ICT (information and communications technology - or technologies) is an
umbrella term that includes any communication device or application,
encompassing: radio, television, cellular phones, computer and network
hardware and software, satellite systems and so on, as well as the various
services and applications associated with them, such as videoconferencing and
distance learning. (SearchCIO, 2012)
X. Integrated Tertiary System
Integrated Tertiary Software is a software that specializes in the provision of
integrated software to support the administrative functions within the higher
education and further education & training sectors. (ITS User Group, 2012)
19
XI. Internet
An electronic communications network that connects computer networks and
organizational computer facilities around the world. (Mirriam Webster, 2012)
XII. Enterprise Resource Planning
A process by which a company (often a manufacturer) manages and integrates the
important parts of its business. An ERP management information system
integrates areas such as planning, purchasing, inventory, sales, marketing,
finance, human resources, etc. (Investopedia, 2012)
XIII. Intrusion Detection System
An intrusion detection system (IDS) is a type of security software designed to
automatically alert administrators when someone or something is trying to
compromise information system through malicious activities or through security
policy violations An IDS works by monitoring system activity through examining
vulnerabilities in the system, the integrity of files and conducting an analysis of
patterns based on already known attacks. It also automatically monitors the
Internet to search for any of the latest threats which could result in a future
attack. (Techopedia, 2012)
XIV. Intrusion Prevention Sistem
An IPS, or intrusion prevention system is used in computer security. It provides
policies and rules for network traffic along with an intrusion detection system for
alerting system or network administrators to suspicious traffic, but allows the
administrator to provide the action upon being alerted. Some compare an IPS to a
combination of IDS and an application layer firewall for protection. (Webopedia,
2012)
XV. Information Technology Infrastructure Library
The Information Technology Infrastructure Library (ITIL) is a globally
recognized collection of best practices for information technology (IT) service
management. The United Kingdom's Central Computer and Telecommunications
Agency (CCTA) created ITIL in response to growing dependence on information
20
technology for meeting business needs and goals. ITIL provides businesses with a
customizable framework of best practices to achieve quality service and overcome
difficulties associated with the growth of IT systems. (Search Data Center, 2012)
XVI. Network
A group of interconnected (via cable and/or wireless) computers and peripherals
that is capable of sharing software and hardware resources between many users.
The Internet is a global network of networks. See also local area network and
wide area network. A system that enables users of telephones or data
communications lines to exchange information over long distances by connecting
with each other through a system of routers, servers, switches, and the like.
(Business Dictionary, 2012)
XVII. Program
A computer program is a set of instructions for a computer to perform a specific
task. Programs generally fall into these categories applications, utilities or
services. (About, 2012)
XVIII. Service Desk
A the single point of contact between users and IT Service Management. Tasks
include handling incidents and requests, and providing an interface for other ITIL
processes. The primary functions of the Service Desk are incident control, life
cycle management of all service requests, and communicating with the customer.
Another definition of Service Desk is a center that provides a Single Point of
Contact between a company’s customers, employees and business partners. The
Service Desk is designed to optimize services on behalf of the business and
oversee IT functions. Thus, a Service Desk does more than making sure IT
services are being delivered at that moment, it manages the various lifecycles of
software packages used to provide critical information flow by utilizing ITIL best
practices. (Arinc Management Service, 2012)
XIX. Software
21
Software is a generic term for organized collections of computer data and
instructions, often broken into two major categories: system software that
provides the basic non-task-specific functions of the computer, and application
software which is used by users to accomplish specific tasks. System software is
responsible for controlling, integrating, and managing the individual hardware
components of a computer system so that other software and the users of the
system see it as a functional unit without having to be concerned with the low-
level details such as transferring data from memory to disk, or rendering text onto
a display. Generally, system software consists of an operating system and some
fundamental utilities such as disk formatters, file managers, display managers,
text editors, user authentication (login) and management tools, and networking
and device control software. (Open Project, 2012)
XX. System
A set of detailed methods, procedures and routines created to carry out a specific
activity, perform a duty, or solve a problem. An organized, purposeful structure
that consists of interrelated and interdependent elements (components, entities,
factors, members, parts etc.). These elements continually influence one another
(directly or indirectly) to maintain their activity and the existence of the system, in
order to achieve the goal of the system. (Business Dictionary, 2012)
22
1.11 OUTLINE OF THE THESIS
CHAPTER 1
The background of the research is given.
CHAPTER 2
The brief outline and review of the literature about the setup and security of WSU
network.
CHAPTER 3
The outline of the methodology with which is going to be used in this research.
CHAPTER 4
The analysis of the information gathered from the questionnaires.
CHAPTER 5
The conclusion and recommendations of the study.
23
1.12 CONCLUSION
This chapter explains the background of the problem, the purpose of the study and the
objectives of the study .It also explain the methodology of the study, how the data is
going to be collected including most importantly it tells us the objectives of the study.
This chapter basically is the introductory chapter.
24
CHAPTER TWO
LITERATURE REVIEW
2.1 INTRODUCTION
In chapter one the background of the research was given. In addition to the information given in
chapter one, in this chapter the researcher is going to brief outline of the literature about the setup
of WSU network and its security. This literature is going to inform this research.
2.2 WSU CAMPUSES
In chapter one, the background about the campuses is outlined.
2.3 NETWORK STRUCTURE
A network is a collection of computers, printers, routers, switches, and other devices that can
communicate with each other over some transmission medium. A group of two or more
computer systems linked together to share, store, or process information.
25
Local Area Networks (LANs) use one of the following physical layout designs. These designs
are referred to as 'topologies'.
(Inetdaemon, 2012)
Figure 2.3.1. Layout Design Structures
Bus Topology
Networks employing a bus topology use a common physical connection for communication.
That means the physical media is shared between stations. When one station transmits on the
bus, all devices hear the transmission. If more than one device transmits at the same time, the
two transmissions will collide with each other and both transmissions will destroy each other.
When two or more of these devices attempts to access the network bus at the same time, some
method must be used to prevent a collision (CSMA/CD). Historically, bus networks used coaxial
cable as their medium of transmission. Token Bus, Ethernet (Thinnet and Thicknet) are common
examples of bus topologies. Although some installations of Ethernet using coaxial cable still
exist, all modern installations now use a hub and spoke or star topology.
Topology Types
Bus (Logical Ethernet)
Hub and Spoke (Star)
(Physical
Ethernet)
Hybrid (Bus & Star) Ethernet
Point To Point / Daisy
Chaining Serial
Point to Multipoint Frame Relay
Ring
FDDI, Token
Ring
26
(Inetdaemon, 2012)
Figure 2.3.2. Bus Network Topology
Hub and Spoke (Star)
Please note that this is not called a hub and spoke design because there is a network hub in the
drawing. This drawing is to show how a star or hub and spoke network resembles the hub and
spokes of a wheel. The Hub and Spoke topology refers to a network topology where there is a
central connection point to which multiple devices are connected.
A network hub device is not the only device usable in this configuration. A switch may also be
used and in some cases, a router. Ethernet utilizing twisted pair still considered a bus architecture
from a logical standpoint; however, physically, an Ethernet network can be physically wired as a
hub and spoke model.
(Inetdaemon, 2012)
Figure 2.3.3. Star Topology
27
Ring
Ring topologies are similar to bus topologies, except they transmit in one direction only from
station to station. Typically, a ring architecture will use separate physical ports and wires for
transmit and receive.
Token Ring is one example of a network technology that uses a ring topology.
(Inetdaemon, 2012)
Figure 2.3.4. Ring Topology
Point-To-Ponit
Point to Point topologies are simplest and most straightforward. You must picture them as a
chain of devices and another name for this type of connectivity is called daisy chaining. Most
computers can 'daisy chain' a series of serial devices from one of its serial ports. Networks of
routers are often configured as point-to-point topologies.
(Inetdaemon, 2012)
Figure 2.3.5. Point to Point Topology
28
Point to Multipoint
This is not quite the same as a hub and spoke configuration. In a hub and spoke topology, all
transmissions from all devices pass through the hub--the hub broadcasts all communication from
any single device to all other devices connected to it.
In a multipoint topology the hub can send to one or more systems based on an address. Frame
Relay is the most common technology to implement this scheme, and it is typically used as a
WAN technology. All the remote connection points are connected to a single Frame Relay
switch or router port, and communication between sites is managed by that central point. In hub
and spoke, all spokes or only one spoke hears a given transmission. In point to multipoint, any
number of remote stations can be accessed.
(Inetdaemon, 2012)
Figure 2.3.6. Point to multi-Point Topology
WAN TOPOLOGIES
The phrase WAN Topology refers to the arrangement or relative positioning of links and nodes. I
will present several major types of WAN topologies. These topologies can end up being
analogous, at greater levels of abstraction/hierarchy, to LAN topologies.
The Point To Point WAN : A Point-To-Point WAN has a remote access link for each major
node in the WAN. The link can be anything from a T-3 line to a 56 Kbps dial up line. The
following diagram represents a intercity WAN.
29
( Ziaiel Academic, 2012)
Figure 2.3.7. Point to Point WAN Topology
Its major advantage is that
it is inexpensive relative to the other options
Its major disadvantages have to do with
vulnerability to failure in key components
limited scalability
number of hops and alternative routes are made worse
Thus the point-to-point WAN is best when there are only two or three major locations.
The Ring WAN: The Ring WAN is developed by having point to point connections that
connect the major nodes in a ring. This is illustrated in the next image.
30
( Ziaiel Academic, 2012)
Figure 2.3.8. WAN Ring Topology
Its major advantages over other topologies are
This is an improvement over the point-to-point WAN in that it provides
alternative routes
It is less expensive than all but the point-to-point WAN
Its biggest disadvantages relative to other topologies are
it is slightly more expensive than the point-to-point
it has slightly worse scalability problems the point-to-point
The Ring WAN is best when used to connect only a few sites.
The Star WAN: A WAN star is laid out in a star configuration with one location as the "hub".
In this case this hub will make use of something called a concentrator router. In the following
figure the concentrator router is located in Chicago.
31
( Ziaiel Academic, 2012)
Figure 2.3.9. WAN Star Topology
Its major advantages relative to other topologies are
it is more scalable
o relatively easy to add nodes
each node is at most two hops away from any other
Its major disadvantage is
it has a single point of failure at the concentrator router
To get by some of these problems, network administrators tend to add in some alternative links
between sites not at the hub. This increases costs slightly, but gives alternative routes in case of
failure or congestion. Providing direct links between all possible pairs of nodes, a full mesh
topology, requires a huge expense and is not at all scalable.
This leads to the most typical high volume implementation.
The Multitiered WAN: A Multitiered WAN makes use of
concentrator routers like the star WAN,
it also links these concentrators together
it is also likely to have each major node connected to more than one
concentrator router
it may also have direct links between other nodes
32
It is scalable because at worst just one link needs to be added to some concentrator. Though
obviously, performance is improved if there are more links. In addition these links can be made
due to traffic demands.
The following diagram represents a multitiered
WAN. ( Ziaiel
Academic, 2012)
Figure 2.3.10. Multitiered WAN Topology
Metropolitan Area Network (MAN)
A network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A
MAN is typically owned an operated by a single entity such as a government body or large
corporation. These networks are designed to cover large municipal areas. Data protocols such as
WiMAX (802.16) and Cellular 3G networks are MAN networks. metropolitan area network
(MAN)
33
(
Computer Networking, 2012)
Figure 2.3.11. MAN Topology
Wireless Local Area Networks (WLAN)
Wireless Local Area Network: a LAN based on WiFi wireless network technology
34
Figure 2.3.12. WLAN Topology
Campus Area Network
A network spanning multiple LANs but smaller than a MAN, such as on a university or local
business campus. [MIN88]
Storage Area Network
Connects servers to data storage devices through a technology like Fibre Channel.[MIN88]
System Area Network
Links high-performance computers with high-speed connections in a cluster configuration. Also
known as Cluster Area Network.[MIN88]
WIRELESS NETWORKS
Wireless networks involve transmitting a signal in some manner (microwave, radio waves, laser,
infrared) from an access point, which is a transmitting and receiving device (transceiver).(
Thought, 2012)
Wireless topologies include:
Point-to-point
Line-of-sight
Scatter and reflective
Cellular
Radio broadcast
2.4 NETWORK PERFORMANCE IMPACT ON AN EDUCATIONAL ORGANISATION
Internet is the network that combines enterprise networks, individual users, and ISPs into a single
global IP network.
Internet is indeed a powerful tool for academic students and researchers. The internet has been
shown to influence the academic performance of students at tertiary level. According to Peter M
Ogedebe’s opinion on the research on how internet usage influences student’s academic
performance, he says “if internet services can be fully exploited, the performance of students in
educational institutions of higher learning can improve.” Internet plays a fundamental role in an
organization and society, says Ogedebe. Some organizations if not all, depend on the computer
network to successfully run they daily business activities, if the computer network could be
down, so as the organization. The internet influences the academic performance of student both
in local and international levels. NCAA (2007) came with this view “internet should be used to
improve academic performance.”
35
Internet is a valuable source of information for students looking for ideas for projects and
assignments. With over 50 million web sites on the net, the chances are any information however
obscure can be found. The only tools required to find this information would be some patience
and decent search engines. Internet also serves as a useful tool for lecturers in helping them
prepare their lesson plans as there are a number of sites dedicated to provide educational
material. Without a good performance on the network of an organization, the access to the
internet is very difficult.
Internet provides a platform for group discussions which are time and distance independent.
Group discussions can be in may form for example video conferencing whereby the use of a
small video camera and microphone, members of the group can actually see and hear each other.
This is cost effective because there will be no use for group members to meet at a particular
place which could need traveling costs. Lecturers and deans could attend a meeting using video
classroom but displayed an overhead projector. Lectures could be uploaded on the network and
student can access and watch them repeatedly if they want because repetition is the rule of
emphases. The other form of group discussion which also is a benefit of a well performing
network is chat room where everyone comes together in a host area and communicates with each
other electronically.
Internet on first time users is unfriendly although it can be useful as an educational tool. The
information on the internet is owned by no one; therefore some of the information might be
wrong, which could lead the students and researchers to have incorrect information. The
characteristics of anyone-to-anyone connectivity, universal affordable access and high reliability
have given the industry the building blocks for designing an exciting new portfolio of Services
and individual tailored options. As vast amounts of information become available electronically
and instantly, gaining access to the information important to the individual at the time and in the
place where the information is valuable to that individual will be critical, and valuable (Brody,
200). To provide the value in this equation, a network must provide communication with quality,
reliability and ambiguity demanded by the servers and end users
2.5 CAUSES OF LOW NETWORK PERFORMANCE
As the technology innovation increases so upgrades to the devices on the network is required
because some application on the network might lowers the speed of the network as devises are
not upgraded. Parallel networks, optimized for typical applications - such as video, wideband
data, voice, etc. will emerge. End-user devices will continue to improve in processing power,
human machine interfaces, battery life and form factor (Brody, 2000).
2.6 HOW TO MESURE NETWORK PERFORMANCE
36
2.6.1 BANDWIDTH
Firstly bandwidth is defines as the amount of information that can be flow through a network
connection in a given period of time and bandwidth in computer networks state that the greater
the available bandwidth the faster or the greater data transfer capability [MIN 25]. According to
the WSU, different business critical systems are competing for the same bandwidth. These
systems are ITS, OPAC, Millennium, WiseUp, Service Desk, etc. since these systems are
competing for the same bandwidth the organization’s network is therefore not fast.
2.6.1.1 THE IMPORTANCE OF BANDWIDTH
Bandwidth is defined as the amount of information that can flow through a network connection
in a given period of time.
It is important to understand bandwidth because
Bandwidth is finite – Regardless of the medium used to build the network, there are
limits on the network’s capacity to carry information. Bandwidth is limited both by law
of physics and by the technologies employed to place information on the medium. For
example, a conventional modem’s bandwidth is limited to about 56 kilobits per second
(kbps) by both the physical properties of twisted pair phone wires and by voice modem
technology. The technologies employed by DSL also use the same twisted pair phone
wires, yet DSL provides much greater bandwidth than is available with conventional
modems. The frequency range that DSL uses is much wider than the frequency range
used for voice. That is why you can send more bits per second over DSL. Optical fiber
has the physical potential to provide virtual limitless bandwidth.
Bandwidth is not free – It is possible to buy equipment for a LAN that will provide nearly
unlimited bandwidth over a long period of time. For WAN connection, it is almost
always necessary to buy bandwidth from a service provider. A network manager needs to
make the right decision about the kinds of equipment and services to buy
Bandwidth is a key factor in analyzing network performance, designing networks, and
understanding the internet – A networking professional must understand the tremendous
impact of bandwidth and throughput on network performance and design. Information
flows as a string of bits from computer to computer throughout the world.
The demand for bandwidth is ever increasing – As soon as new network technologies and
infrastructures are built to provide greater bandwidth, new applications are created to
take advantage of the greater capacity (Magalhas, 2004)
37
2.6.1.2 TYPES OF BANDWIDTH
Analog Bandwidth
Analog bandwidth typically refers to the frequency range of an analog electronic system. Analog
bandwidth could be used to describe the range of frequencies transmitted by a radio station or an
electronic amplifier. The unit of measurement for analog bandwidth is hertz.
Digital Bandwidth
Digital bandwidth measures how much information can flow from one place to another in a
given amount of time. The fundamental unit of measurement for digital bandwidth is bps.
Analogies that Describe Digital Bandwidth
Bandwidth is like the width of a pipe – A network of pipes brings fresh water to homes
and businesses and carries wastewater away. This water network is made up of pipes with
different diameters. A city’s main water pipe might be 2 meters in diameter, whereas a
kitchen faucet might have a diameter of only 2 centimeters. The width of pipe determines
the pipe’s water-capacity. Thus, the water is analogous to data, and pipe width is
analogous to bandwidth. Many networking expects say the need to “put in bigger pipes”
when they want to add more information-carrying capacity.
Bandwidth is like the number of lanes on a highway – A network of roads serves every
city or town. Smaller roads with fewer traffic lanes join large highways with many traffic
lanes. These roads lead to even smaller, narrower roads, and eventually to the driveways
of homes and businesses. When very few automobiles use the highway system, each
vehicle can move freely. When more traffic is added, each vehicle moves more slowly,
especially on roads with fewer lanes for cars to occupy. Eventually as even more traffic
enters the highway system, even multilane highways become congested and slow. A data
network is much like the highway system, with data packets analogous to automobiles,
and bandwidth analogous to number of lanes on the highway. When a data network is
viewed as a system of highways, it is easy to see how bandwidth can cause traffic to
become congested all over the network [MAN90]
2.6.1.3 Digital Bandwidth Measurements
In digital systems, the basic unit of bandwidth is bits per second (bps). Although bandwidth
can be described in bits per second, usually some multiple of bits per second is used. In other
words, network bandwidth is typically described as thousands of bits per second, millions of
bits per second, and even billions of bits per second.
Table: The following table summarizes the various units of bandwidth.
Unit of Bandwidth Abbreviation Equivalent
38
Bits per second Bps 1bps=fundamental unit of
bandwidth
Kilobits per second Kbps 1Kbps=1000 bps
Megabits per second Mbps 1Mbps=1,000,000 bps
Gigabits per second Gbps 1Gbps=1,000,000,000 bps
Figure 2.6.1. Digital Bandwidth Mesurements
2.6.1.4. Bandwidth Limitations
Bandwidth varies depending on the type of medium as well as the LAN and WAN
technologies used. The physics of medium account for some of the difference. Physical
differences in the way signals travel through twisted-pair copper wire, coaxial cable, optical
fiber, even air result in fundamental limitations on the information-carrying capacity of a
given medium. However, a network’s actual bandwidth is determined by a combination of
the physical medium and the technologies chosen for signaling and detecting network
signals. For example, current understanding of the physics of unshielded twisted- pair copper
cable puts the theoretical bandwidth limit at more than 1Gbps. But in actual practice, the
bandwidth is determined by the use of a particular technology, such as 10BASE-T,
1000BASE-TX, or 1000BASE-TX Ethernet. Bandwidth is also determined by other varying
factors, such as the number of users in the network, the equipment being used, applications,
the amount of broadcast, and so on. In other words, the actual bandwidth is determined not
by the medium’s limitations, but by the signaling method, NIC’s, and other items of network
equipment that are chosen.
Table; The following table lists some common networking media types, along with their
limits on distance and bandwidth
Medium Maximum Theoretical
Bandwidth
Maximum Physical Distance
50-ohm coaxial cable
(10BASE2 Ethernet,
Thinner)
10 Mbps 185 m
50-ohm coaxial cable
(10BASE5 Ethernet,
Thinner)
10 Mbps 500 m
Category 5 UTP (10BASE-T
Ethernet)
10 Mbps 100 m
Category 5 UTP (100BASE-
TX Ethernet)
100 Mbps 100 m
Category 5 UTP
(1000BASE-T Ethernet)
1000 Mbps 100 m
Multimode optical fiber
(62.5/125 pm)
(100BASE-FX Ethernet)
100 Mbps 2000m
39
Multimode optical fiber
(62.5/125 pm)
(1000BASE-SX Ethernet)
1000 Mbps 220m
Multimode optical fiber
(50/125 pm)
(1000BASE-SX Ethernet)
1000 Mbps 550m
Multimode optical fiber
(9/125 pm)
(1000BASE-LX Ethernet)
1000 Mbps 5000m
( Ziaiel Academic, 2012)
Figure 2.6.2. Bandwidth Limitations
Table; The following table summarizes common WAN services and the bandwidth
associated with each.
WAN Services Typical User Bandwidth
Modem Individuals 56 kbps
DSL Individuals, telecommuters,
and small businesses
12 kbps
ISDN Telecommuters and small
businesses/small institutions
(school) and medium-sized
business
128 kbps
Frame Relay 56 kbps to 44.736 Mbps
T1 Larger entities 1.544 Mbps
T3 Larger entities 44.736 Mbps
STS-1 (OC-1) Phone companies, data
comm. Company backbone
51.840 Mbps
STS-3 (OC-3) Phone companies, data
comm. Company backbone
155.251 Mbps
STS-48 (OC-48) Phone companies, data
comm. Company backbone
2.488 Mbps
Figure 2.3. Bandwidth Associated with WAN Services
2.7 SECURITY ARCHITECTURE
Is a plan and set of principles for an administrative domain and its security domains that
describe the security services that a system is required to provide to meet the needs of its
users, the system elements required to implement the services, and the performance levels
required in elements to deal with the threat environment. Complete security architecture for a
system addresses administrative security, communication security, emanations security,
personal security, and physical security, and prescribed security policies for each.
40
The term refers to a design that can be either hardware or software, or a combination of both.
Also called Architecture, Information Architectures, Information Systems Architectures,
Compute Platforms, Product Architectures, Computer Architectures, and IT Architectures.
2.8 SECURITY THREATS
Today’s internet security threats range from curious prowlers to well organized, technically-
knowledgeable intruders that could gain access to your site’s private information or interfere
with you own system or your client’s system.
The Security Threats that affect WSU include:
2.8.1 VIRUSES
A virus is a malicious piece of programming code usually disguised as something else that
causes some unexpected and, for the victim, usually undesirable event and which is often
designed so that it is automatically spread to other computer users. Firewalls can’t protect
very well against things like viruses. In general, a firewall can protect against a data-driven
attack, attacks in which something is mailed or copied to an internal host where it is then
executed. ( Ziaiel Academic, 2012)
2.8.1.1 CLASSES OF VIRUSES
There three main classes of viruses.
File infection
Some file infector viruses attacks themselves to program files, usually selected.com or .EXE
files. Some can infect any program for which execution is requested, including .SYS, .OVL,
.PRG, and .MNV files. When the program is loaded, the virus is loaded as well. Other file
infector viruses arrive as wholly contained programs or scripts sent as an attachment to an E-
mail note.
System or boot-record infectors
These viruses infect executable code found in certain system areas on a disk. They attach the
DOS boot sector on diskettes or the Master Boot Record on hard disk. A typical scenario is
to receive a diskette from an innocent source or any other storage device that contains a boot
disk virus. When your operating system is running, files on the diskette can be read without
triggering the boot disk virus. However if you leave the diskette on the drive, and then turn
the computer off or reload the operating system, the computer will first look a drive, find the
diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard
disk. (Allow several days for records). This is why you should make sure that you have a
bootable floppy (in our days we talk of a disc).
41
Macro viruses
These are among the common viruses, and the too do the least damage. Macro viruses infect
your Microsoft word application by typically insert unwanted words or phrase. The best
protection against a virus is to know the origin of each program or the file you load into your
computer or open from your e-mail program ( Ziaiel Academic, 2012).
The following are the attacks that may be encountered by WSU
2.8.1.2 SNIFFING
One part of the network security is concerned with threats that are particular to the
transmission of messages. Some of these threats, like the unauthorized disclosure or
modification of data have been discussed above. A direct link between the sender and the
receiver is only an abstraction. In reality you can expect any number of intermediate nodes to
relay message between sender and receiver. Depending on their function, these intermediate
nodes are called Bridges, Gateways, and Routers etc. each of these devices reads incoming
traffics and decides on a next action.
Example:- Where to forward incoming packets to. Many of these devices include software
components and that definitely creates an opportunity to run sniffer software.
Sniffer Software:- Is a software that reads incoming traffic and forwards sensitive
information to the attacker. Sensitive information includes management data like network
addresses or indicators of the protocols of your network and use this information to launch
attacks, even if you have taken care to protect your application by encryption. (Helmig, 2004)
2.8.1.3 SPOOFING
Other threats in network security come from forged source addresses (spoofing), from
entities later denying their involvement in transaction they had participated in or from.
Spoofing attack is when an attacker, who may be legitimate runs a program that presents a
fake login screen on some terminal/workstation. An unsuspecting user comes to his terminal
and tries to login. The victim is led through the normal login menu and is asked for username
and password. The username and password will then be stored by the attacker. (Helmig,
2004)
2.8.1.4 MAC SPOOFING ATTACK
MAC spoofing attacks involve the use of a known MAC address of another host to make the
target switch forward frames destined for the remote host to the network attacker. By sending
a single frame with the other host’s source Ethernet address, the network attacker overwrites
the CAM table entry so that the switch forwards packets destined for the host to the network
attacker. Until the host sends it will not receive any traffic. When the host sends out traffic,
the CAM entry is rewritten once more so that it moves back to the original port. (Helmig,
2004)
42
2.9 FIREWALLS
An internet firewall is a security mechanism that allows limited access to a site from the
internet, allowing approved traffic in and out according to a thought-out plan. Firewalls are a
very effective way to protect your system from most internet security threats and are a
critical component of today’s computer network. Without firewalls, network security
problems can range out of control, dragging more and more systems down. A firewall
provides not only real security; it often plays an important role as a security blanket for
management. Firewalls in a network keep damage on one part of the network (e.g.
eavesdropping, a worn program, file damage ) from spreading to the rest of the network.
Firewalls cannot protect attacks that don’t go through the firewall. Another thing a firewall
cannot really do is to protect you against traitors or idiots inside your network. Firewalls also
cannot protect against tunneling over most application protocols to tunneling over most
written clients. ( Ziaiel Academic, 2012)
2.10 CONCLUSION
This chapter is about other studies that have been done that are related to this research paper
that were previously published. Today, understanding the performance characteristics of
Internet services is critical to evolving and engineering Internet services to match changing
demand levels, client populations, and global network characteristics.
43
CHAPTER 3
3.1 INTRODUCTION
The previous chapter outlines the literature and informs the research. This chapter outlines and
discusses methodology that is going to be used on this thesis and gives directions. It also
discusses the instruments used in the data collection, the procedure for data collection and the
method for data analysis.
3.2 RESEARCH METHODOLOGY
The methods which are going to be used in this study are methods which are descriptive in
nature. This research is going to be conducted using two methods, qualitative and also
quantitative.
Qualitative method is going to be used because it is a type of method whereby it is used when
a researcher is interested in understanding the meaning people have contracted. Qualitative
research assumes that meaning is mediated through investigator’s own perception, it is an
effort to understand situations in their uniqueness as part of a particular context and
interactions there (Patton, 1985). This qualitative type of research will try to answer the
general question “what is going on here?”
Quantitative method is going to be used because the will be a need to measure quantities. The
statistics on the network in terms of downtime and indicators of network performance such as
bandwidth, number of nodes and network design etc. will be needed.
3.3 RESEARCH DESIGN
This research is a quantitative research. Definition: It “…involves methods of data collection and
analysis that are no qualitative” (Lofland & Lofland 1984). Quantitative research is concerned
with finding the answers to questions which deals with numbers. It is then a case study design.
44
3.4 SAMPLING
Simple random sampling
A shortcut method for investigating a whole population Data is gathered on a small part of
the whole parent population or sampling frame, and used to inform what the whole picture is
like. In this study the researcher selected a sample of students and stuff that are in the IBika
campus. The researcher sample was a very convenient sample because this is the campus that
he could easily reach as he is also in the campus. The researcher chose a sample out of a total
of hundred and ten (110) students and twenty 20 stuff members in the campus. The reason
the researcher chose this number it is because he found it manageable in terms of gathering
useful and valid data
3.5 INSTRUMENTATION
The case study was used on this research and therefor questionnaires are used. The
questionnaires were used to gather information in this study. To make sure that the
questionnaires will provide valid and reliable data the researcher made the questionnaires a
sample. The researcher included instructions for answering all questions in the questionnaire.
All questions were brief, graphically pleasing and easy to read so that the respondents cannot
get bored. The questions were mixed others were open-ended, rankings, and closed-ended
questions for different sections of the questionnaires.
3.6 DATA COLLECTION
The questionnaire were distributed by the researcher with the help of other students and the
respondents were given a week to answer the questionnaires. The researcher used structured
questionnaires. The questionnaires were distributed to collect information from the students
and stuff who are in Butterworth campus at WSU. The researcher gave the respondents
enough time to answer the questionnaires. The questions in the questionnaires were designed
in such a way that they should answer the research question.
45
3.7 DATA ANALYSIS
Data analysis is an ongoing activity, which not only answers your question but also gives you
the directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help
you arrive at the data analysis. The uses of such procedures put your research project in
perspective and assist you in testing the hypothesis with which you have started your
research.
Data collected was analyzed both quantitative and quantitative. In the study the data collected
from students and stuff were captured into excel spreadsheet. The researcher used the graphs
in terms of data processing. The researcher expected to get quantitative data because the
questionnaire was considered of many closed-ended questions and few open-ended
questions.
The researcher used content analysis in analyzing the quantitative data because the researcher
used simple random sampling from the total number of students and stuff who were chosen
as a sample. The analysis was useful in getting reliable and valid information
46
3.8 CONCLUSION
This chapter is about how data was collected in this study. It describes the tools and the
method as that the researcher used to collect information. It also includes how data was
analyzed.
47
CHAPTER 4
4.1 INTRODUCTION
The previous chapter outlines and discusses methodology that is going to be used on this thesis
and gives directions.in this chapter the researcher will summarize all the results founded in the
study. All the information from the questionnaires is analyzes and the conclusion will be drawn
according to the results.
4.2 DATA ANALYSIS
Data analysis is an ongoing activity, which not only answers your question but also gives you the
directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help you
arrive at the data analysis. The uses of such procedures put your research project in perspective
and assist you in testing the hypothesis with which you have started your research. The
researcher expected to get quantitative data because the questionnaire was considered of many
closed-ended questions and few open-ended questions.
The researcher used content analysis in analyzing the quantitative data because the researcher
used simple random sampling from the total number of students and stuff who were chosen as a
sample. The analysis was useful in getting reliable and valid information
The questionnaires were distributed to collect information from the students and staff members
who are in the iBika campus at WSU in seven days, the data was then processed using Microsoft
excel and graphs were made to represent the data in a visual manner. The researcher gave the
respondents enough time to answer the questionnaires. The questionnaires were designed in such
a way that they be able to answer the research question which is:
What is the network performance and recurrent downtime at IBika campus of WSU? There were
so many questions that were asked in the questionnaire in order to find order to find answers to
the research question such as:
How often the maintenance is done on the WSU network?
What are the institutional policies in terms of the network performance?
What are the downtimes on the network?
What type of traffic is using the network?
How is the traffic classified in terms of priorities on the network?
What tools are used in maintaining the network?
The questions were mixed; others were open-ended, ratings, and close-ended
questions for different sections of the questionnaire. All questions were brief,
graphically pleasant and easy to read so that the respondents cannot get bored.
48
4.3 DATA REPRESANTATION
The data is represented in graph so that it can be visual
4.3.1 Question: Gender?
Figure 4.3.1. This was a closed-ended question. The percentages of male and female
respondents who were taken for sampling at iBika campus of WSU
The graph above shows that 78(60%) out of hundred and thirty respondents are females where
52(40%) are males
Data analysis is an ongoing activity, which not only answers your question but also gives you
the directions to future data collection, says Dr. Madhu Bala. Data analysis procedures help
you arrive at the data analysis. The uses of such procedures put your research project in
perspective and assist you in testing the hypothesis with which you have started your
research.
Data collected was analyzed both quantitative and quantitative. In the study the data collected
from students and stuff were captured into excel spreadsheet. The researcher used the charts
in terms of data processing. The researcher expected to get quantitative data because the
questionnaire was considered of many closed-ended questions and few open-ended
questions.
49
The researcher used content analysis in analyzing the quantitative data because the researcher
used simple random sampling from the total number of students and stuff who were chosen as a
sample. The analysis was useful in getting reliable and valid information
4.3.2 Question:Which age group do you belong?
41
28
19 2116
5
0
10
20
30
40
50
15-20 21-25 26-30 31-35 36-40 41 andAbobe
Age group
Age group
Figure 4.3.2. The age category
The graph above shows which age group dominates at the campus. It is proven that youth
dominates the campus because according to the statistics of the respondents it is calculated that
for about 85% of the respondents are between the age 15 and 35 which means are still youth.
According to the statistics of South Africa the most internet users is youth.
4.3.3 Question: To which faculty do you belong?
50
36
48
2521
0
10
20
30
40
50
60
Faculty ofEngineering
Faculty ofBusiness,
Management,Accounting and
Law
Faculty ofApplied
Other Faculty
Number of Respondents Per Faculty
Number of Respondents PerFaculty
Figure 4.3.3. The faculty category
The graph above shows that out of 130 respondents, 36(28%) of the respondents is from the
Faculty of Engineering, 48(37%) of the respondents is from the Faculty of Business,
Management, Accounting and Law, 25(19%) of the respondents is from the Faculty of Applied
and 21(16%) if from other Faculties such as Library, ICT etc. These statistics proves that each
and every department participated on this project.
4.3.4 Question: To which category do you belong?
Figure 4.3.4. The staff or Student category
The above graph shows that 85% of the respondents were students while 15% were staff. The
study proves that not only the students are affected by the performance of the network but also
the staff.
51
4.3.5 Question: Is the computer literacy included as a subject in your course?
Figure 4.3.5. Statistics on courses that include computer as a subject
The above graph shows that 91(70%) of the respondents has computer literacy included as the
subject in their courses while 39(30%) does not have it, off which from the information gathered
from the questionnaires most of the respondents that answered NO in this question are staff
members. That proves the fact that more than 80% of the respondents which are students use
computer networks.
4.3.6 Question: How often do you use the internet?
Figure 4.3.6. Severity on internet usage
52
According to the graph above, only 13(10%) of the respondents do not access the internet and
90% accesses the internet but are not on the same severity which proves that internet access in
the institution is at a high rate of demand.
4.3.7 Question: How do you connect to the internet?
18
98
212
0
20
40
60
80
100
120
Wireless LAN cable 3G/MobileService
CannotConnect
Technology for internet access
Technology for internet access
Figure 4.3.7. Internet access technology one uses.
According to the graph above, 98(75%) of the respondents connect to the internet using the LAN
Cable which therefore means students need to go physically in the labs and connect to the
network. This graph proves the fact that the respondents are really committed in having access to
the internet because they forfeit to stay in their respective places of stay (Residents) but go and
connect to the network physically as they user LAN cables to connect to the internet.
4.3.8 Question: How difficult to connect to the internet?
Figure 4.3.8. Difficulty to connect to the internet
53
The graph shows how difficult it is to connect to the internet. According to the findings based on
the questionnaires, most of the respondents found it normal to connect to the internet.
4.3.9 Question: What do you use the internet mostly for?
Figure 4.3.9. What is the internet mostly used for
The above graph proves that for about 38% of the internet users use it for educational or work
purposes. That alone shows that the majority of the users use the internet for the best of the
universities progress. This graph also proves that for about 22% of the users misuse the internet
in a way that they use it for entertainment. We acknowledge that the voice and video
transmission demands a lot of traffic. 21.5% of the users use the network for their personal uses.
54
4.3.10 Question: In overall how do you rate the internet connection in your campus?
Figure 4.3.10. Overall ratings on the internet connection
According to the above graph, for about 65% of the users found the network slow in speed off
which 30% of the users from that 65% found it very slow. Less than 25% of the users found the
network very fast which then can be concluded that most of the users find the network slow.
4.3.11 Question: Which computer application do you use mostly?
Figure 4.3.11. Application which is mostly used.
55
The above graph shows that most of the users use internet more than anything the network
supports. For about 31% of the users use the internet.
4.3.12 Question: Is the WSU, iBika network secured from viruses?
Figure 4.3.12. Virus on the network
According to the graph above it is now concluded that the network at WSU-IBK is filled with
virus because for about 61% of the users found that the network has virus.
4.3.13 Question: Do you save or upload stuff on the network?
56
Figure 4.3.13. How many upload data on the network
This graph above proves that not only the network is used to access the internet and some other
applications but is also used to save some stuff on the network. 71% of the users upload on the
network.
4.3.14 Question: If yes, how often do you save or upload stuff on the network?
Figure 4.3.14. How often data is uploaded on the network.
According to the graph above, users often upload data on the network almost everyday.
4.3.15 Question: How would you rate the overall quality of service provided by the
network?
57
42
30 30 28
0
10
20
30
40
50
Poor Average Good Excellent
Quality of service on the network
Quality of service onthe network
Figure 4.3.15. Quality of service on the network performance
The above graph shows the quality of service provided by the network. It can be concluded that
the network at WSU-IBK provides poor quality as from the data gathered from the
questionnaires, for 32% of the user find it very poor.
4.3.16 Question: Which system do you use most?
Figure 4.3.16. Which system people use most
58
The graph above shows how important the network performance is because WiseUp which is
access most demands high speed network for better access(60% access WiseUp).
4.3.17 Question: How often do you use the application noted in Question 16?
Figure 4.3.17. How often the system is used
The graph above shows how often these business critical systems are accessed. According to the
graph 76% of the users access the systems daily.
4.3.18 Question: Is it very important to have internet access during my studies/work
59
Figure 4.3.18. The importance of internet access
This graph proves that internet access is very important in our studies and work because for
about 76% of the users agree on this statement.
4.3.19 Question: The presence of the internet changes our lives
Figure 4.3.19. Our lives are changed because of the presence of the internet
The above graph testifies that the availability of the internet access can change people’s lives
4.3.20 Question: If there is a problem to the network, for how long do you wait for the
problem to be solved?
60
Figure 4.3.20. How quick the problem is solved about the network
The graph above proves that the people who are responsible for the maintenance of the network
are actually trying their best to make the network work according to the standard. It can be
concluded that the problem on the network does not stay long to be resolved. For about 97% of
the users found that the problem takes less than a week to be resolved.
4.3.21 Question: In general, I am satisfied with the way in which the internet is working on
my campus
61
Figure 4.3.21. Satisfaction on the internet availability
According to the graph above, we can now conclude that users are not satisfied with the way
internet availability is.
4.3.22 Question: In general, I am satisfied with network support for my learning, research,
and/or teaching needs.
Figure 4.3.22. Does the network support my learning or teaching needs?
62
This graph shows weather the network at iBika campus of WSU support learning and teaching
needs or not.
4.3.23 Question: Rate the performance/ response of the system you use
Figure 4.3.23. The response/ interactivity of the system
The graph above shows how the systems interact with the users. It can be concluded that the
systems used at WSU-IBK are very poor in response time.
63
4.4 CONCLUSION
This chapter discussed the findings which are given in graphs and interpreted in a way that one
can understand. In this chapter the respondent’s responses were analyzed and the conclusion was
drawn based on what the respondents gave on their answers.
64
CHAPTER 5
5.1 INTRODUCTION
In the previous chapter data from the questionnaires was analyzed and conclusion was made
based on that data given by the respondents. I n this chapter the researcher is going to answer the
research question and give recommendations on the current problem to be solved. This research
opens platform for other studies as some of the research sub questions are still not answered.
5.2 RESEARCH DISCUSION
The main aim of this research is to investigate the network performance, recurrent downtime at
WSU and to recommend possible solutions on how to keep the network up to standard and
therefor the main question is:
What is the network performance and recurrent downtime at IBika campus of WSU?
The following questions will help answer the research question.
5.2.1 What are the downtimes on the network?
According to question 20 on the questionnaires, this research sub-question is answered
and the analysis of the questionnaire on this question was made. Base on the analyses
we can then conclude that in terms of the downtimes of the network at WSU the
respondents proved that the network regularly goes down. Discussion is made on
chapter FOUR when analyzing question 10 on the internet connection in the campus,
based on that analysis we can now conclude and answer this research sub-question and
says the downtimes are very often because even the internet connection is very slow as
the network goes down more often.
5.2.2 What type of traffic is using the network?
According to the questionnaire, many questions were asked which enabled the
researcher to answer this research sub-question. The analysis discussed based on
question 9 on the questionnaire outlined that the network support Video/Voice traffic.
Question 16 outlined business critical systems which the network support such as
WiseUp, ITS, Opac and Millenium which are HTTP traffic.
65
5.2.3 How is the traffic classified in terms of priorities on the network?
According to chapter one of the research, the researcher discovered that HTTP traffic
particularly ITS is at priority one in the organization as it support/contain the
information about each and every individual in the organization be it a student or staff
member, and financial information is also contained among the information in ITS.
5.3 RESEARCH RECOMMENDATIONS
The study has proven that the network at the iBika campus of the WSU is unreliable in terms of
performance and has recurrent downtime. The information gathered from the questionnaires
also proved that the services provided by the institution needs computer network therefor the
network performance should be at a high standard. 90% of the respondents from the
questionnaire are utilizing the network services.
This study has proven many factors that are the result of the network to be slow. According to
question 6 from the questionnaire which was asking the respondents severity on the internet
usage, it is proven that the network is congested according to the fact that many students are at
the institution accessing the internet at every day.
Without having an understanding of what's actually happening on your network, you are likely to
fail at any attempt to address performance issues. Peter Prichard, marketing director Asia-Pacific
at Compuware, says people tend to blame the network for poor performance, but the PCs and
serverscanalsobethecause.
"The first thing to do is make sure the network really is the problem," Prichard says. "Even if it's
not the network, IT spends a lot of time proving it's not." Tools such as Compuware's Vantage
suite can isolate problems such as a slow client, excessive latency on a WAN link, or poorly
written SQL on a back end server. An application might be developed on a LAN and then
deployed over a WAN with disappointing results due to an excessive number of database calls.
Collecting the right information also lets you take an active stance, identifying and dealing with
problems before they impact on users.
Many people will blindly add bandwidth in an attempt to solve a perceived problem -- this tends
to be one of the biggest mistakes people make, Prichard says. "You've got to have facts --
application-based facts," he says.
David Gibb, technical consultant with Vanco Australasia agrees. He says that what may
dramatically improve performance in one environment could hinder performance in another.
66
Scott Atkinson, managed LAN services practice leader at Netforce, points out, there are a variety
of free, cheap, and expensive tools that singly or in combination can show what's happening and
why. MRTG (Multi Router Traffic Grapher), a free utility that can help you gain an
understanding of your network.
A network analyzer itself will only show the aggregate traffic, and won't deliver the information
you need. Prichard says to "start with the premise that the application is king", rather than
checking individual aspects of the infrastructure.
Lorenzo Modesto, general manager at Bulletproof Networks, says this monitoring should be
accompanied by alerting. Once the monitor is tuned to avoid false positives, an appropriate
person should be automatically alerted when an unusual event occurs. "SMS is absolutely perfect
for that," he says.
When it comes to things such as radio frequency, monitoring is important for good wireless LAN
performance, says Mark Hayes, manager of consulting and solutions at CSC. "The RF
environment is not static," he says. According to Hayes, a WLAN coming online on a close
neighbour's premises can affect the performance of your network.
Whether you wish to enhance the performance of a home network or a sophisticated network that
includes multiple locations in a corporate structure, there are a number of simple ways to
improve network performance. Even the wireless networks of today can be fine-tuned to increase
efficiency. There are actually many ways to go about this process; some being unique to a
specific network configuration, while others are applicable to just about any type of network
setup.
One common sense approach to network performance is to always have a backup strategy. This
helps to ensure your network can continue functioning even if some event negatively impacts the
overall network. For example, a small business may choose to set up its internal computer
network with the use of both a primary and secondary server. Throughout the day, the data
captured on the primary server is also copied to the secondary unit. In the event that the primary
server fails for any reason, the secondary server automatically kicks in, making it possible for the
network to remain active with nothing more than a few seconds' delay when the server switch
takes place.
Along with a backup server, it is also a good idea to make sure you have a backup power source.
Power failures can result in lost data that must be re-entered, and can also cause some problems
with various types of hardware. Instead of running the risk of harm to your data or your
equipment, invest in what is known as an Uninterruptible Power Supply, or UPS. Devices of this
type can provide anywhere from a few hours to an entire day of power for your system. Many
are configured so that manual activation is not necessary; instead, they activate as soon as a loss
of power from the main system is detected.
Another important strategy in improving network performance is to archive data that is no longer
in active use. Freeing up resources on the network will make it easier to execute commands from
67
any station connected with the computer network, allowing users to do their jobs quicker.
Always make sure the archived data can be accessed and even reloaded with relative ease if
needed.
At the same time, your network performance may be impacted when the growth of your business
places additional stress on the Random Access Memory (RAM) inherent in the network. This
can happen when you add more workstations as nodes on the network. For this reason, it is a
good idea to always evaluate your current RAM before adding network computers, and make
sure you have enough memory for every station to be in active use simultaneously.
Regular maintenance of hardware is also key to keeping network performance at optimum levels.
Even something as simple as a worn cable can slow down the processing of commands. Check
all hardware on a consistent basis, and repair or replace any component that is no longer
providing the level of efficiency required to get the job done.
There are many other ways to improve network performance that have to do with the specifics of
the network. Make sure the temperature around key network components is kept within
manufacturer recommendations. Test various protocols, such as file transfer protocols, to make
sure they do not interfere with other functions, a situation that can create pauses in the execution
of commands. Above all, conduct maintenance on your network on a regular basis, as well as
troubleshoot often. Doing so will keep the network running smoothly, and make it possible to
correct localized issues before they have the chance to endanger the entire network.
The term network monitoring describes the use of a system that constantly monitors a computer
network for slow or failing components and that notifies the network administrator (via email,
SMS or other alarms) in case of outages. It is a subset of the functions involved in network
management.
The are many monitoring tools that can help improve the network. PRTG is a network
monitoring tool that helps you to ensure that your computer systems are running smoothly and
that no outages occur. Network monitoring is also important to increase the efficiency of your
network by knowing bandwidth and resource consumption. Your network infrastructure can be
optimized, Increase profits by avoiding losses caused by undetected system failures, Reduce
costs by buying bandwidth and hardware according to actual load, Eliminate server performance
problems and bandwidth bottlenecks, Improve quality of service through being proactive.
Requirements For a Network Monitoring Tool
A good network monitor should be easy to install and usage should be intuitive, so that there is
no need for external consultancy and training. Further necessary requirements are:
68
Remote Management via web browser, PocketPC, or Windows client
Notifications of outages by email, ICQ, pager/SMS, and more.
Comprehensive sensor type selection
Multiple location monitoring
All common methods for network usage data acquisition (SNMP, Packet Sniffing,
Xflow) ought to be supported.
Knowing What to Monitor
The mere implementation of a network monitor is not enough. The key to effective network
monitoring is to ensure that the chosen tool has been configured to monitor what are essentially a
network's vital signs: availability, speed and usage.
Monitoring network availability allows both internal and external parties to access the
services, including websites and you can determine whether the mail servers and leased lines are
working.
Monitoring network speed with bandwidth monitoring prevents your websites and network
services from losing visitors or frustrate users due to slow-loading pages, files or images.
Finally, usage monitoring enables you to accurately assess CPU load and learn just what sort of
work the servers are doing at times of different the day
Proactive Network Management
Spot and fix pending performance problems before end-users start calling
Device icons on dynamic network maps are color-coded for instant status reporting
Alerts notify you that network performance thresholds have been exceeded
Network Services and Application Monitoring
Make sure that web, email, database and other business-critical services and applications
are available 24/7
Network Troubleshooting
Why is the server slow? Why isn't the videoconference running well?
Quickly access hard drive, memory, jitter, packet latency, connection speed and other
data to find and fix root causes of network service degradation
69
Network Capacity Planning
Can traffic be rerouted to improve flow?
Is more server power needed to support new remote workers?
Real-time network performance views make you constantly aware of where your network
is working well, where improvements are needed, and how to cost-effectively expand
your infrastructure
5.4 CONCLUSION
ICT in an organization is there to improve the relations of business to technology for efficiency.
With the high performance of the network in an organization provides high performance in the
services therefor the throughput would be superb.
70
APPENDIX
71
Walter Sisulu University
Private Bag X 3182
Butterworth
4960
Dear Participant
I am a B-Tech student in the Department of Information Technology at Walter Sisulu
University (WSU) conducting research under the supervisor Mr B. Ndovie. I am trying to
investigate the performance of the network resources and the recurrent downtime at iBika
campus of WSU. My research topic says, “INVESTIGATING THE NETWORK
PERFORMANCE AND RECURRENT DOWNTIME (CASE STUDY IBIKA
CAMPUS).”
I am inviting you to participate in a research project to study the efficiency and
effectiveness of the WSU, iBika campus Network Performance. Along with this latter is a
short questionnaire that asks a variety of questions about the network. I am asking you to
look over the questionnaire, complete it and send [or give] it back to me. It should take
you about less than 15 minutes to complete. The results of this research will help me
attain a B-Tech in Information Technology: Communication Networks. I will also
forward the results to ICT to assist them in planning.
I do not know of any risks to you if you decide to participate in this survey and I
guarantee that your responses will not be identified with you. I promise not to share any
information that identifies with you. You should not put your name on the
questionnaire. If you have any questions or concerns about completing the questionnaire
or about being in this study, you may contact me at 078 300 5961. Your participation in
this study will be highly appreciated.
Regards.
Mandla Lukubeni
Email: [email protected]
Cell: 078 300 5961
72
QUESTIONNAIRE
Please mark where appropriate
1. Gender
Male Female
2. Which age group do you belong?
15-20 21-25 26-30 31-35 36-40 41 & above
3. To which faculty do you belong?
Faculty of Engineering
Faculty of Business, Accounting and Law
Faculty of Applied
Other Faculty
4. To which category do you belong?
Academic Staff Student
Non-academic Staff Other
If other, Specify
5. Is the computer literacy included as a subject in your course?
Yes No
73
6. How often do you use the internet?
Everyday Maybe 10 time a month
Once a week More than once a week
Never Less than 10 times a week
7. How do you connect to the internet
Wireless Local Network (cable)
3G/Mobile Service Cannot Connect
8. How difficult to connect to the internet?
Very Easy Easy
Normal Difficult
Very Difficult
9. What do you use the internet mostly for?
Work/School purposes Entertainment (Music/Movies/Chatting)
For personal purposes Voice and Video conferencing
Send and Receive emails
10. In overall, how do you rate internet connection in your campus?
Very Fast Adequate
Slow Very Slow
74
11. Which computer application do you use mostly?
E-Mail Database
Internet Intranet/Extranet
Website Other, Specify
12. Is the WSU, iBika network secured from viruses?
Yes No
13. Do you save or upload stuff on the network ?
Yes No
14. If yes, how often do you save or upload stuff on the network?
Very low High
Low Very High
Medium
15. How would you rate the overall quality of service provided by the
network?
Poor Good
Average Excellent
75
16. Which system do you use most?
WiseUp Opac
ITS Millennium
Other, Please specify
17. How often do you use the application noted in Question 16?
Daily Weekly
Monthly Quarterly
Never
18. It is very important to have the internet access during my studies/work
Agree Strongly Agree
Disagree Strongly Disagree
19. The presence of the internet changes our lives
Agree Strongly Agree
Disagree Strongly Disagree
20. If there is a problem to the network, for how long do you wait for the
problem to be solved?
Less than a day 1 – 2 days
3 – 7 days Other, Specify
76
21. In general, I am satisfied with the way in which the internet is working on
my campus.
Agree Strongly Agree
Disagree Strongly Disagree
22. In general, I am satisfied with network support for my learning, research,
and/or teaching needs.
Agree Strongly Agree
Disagree Strongly Disagree
23. Rate the performance/ response of the system you use
Very High High
Normal Low
Very Slow
24. How the unavailability of the internet does affect your studies/work on
campus?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………................................................
..........................................................................................................
25. What problems do the absence of the internet cause at your campus?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………................................................
.........................................................................................................
77
26. Please give any comments about the network services on campus.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………................................................
..........................................................................................................
78
REFERENCES
South African Regional Universities Association [Online]
Available from: http://www.sarua.org/?q=uni_Walter%20Sisulu%20University
[Accessed: 04th
June 2012].
Advania [Online]
Available from: http://www.advania.se/en/Offers/Business--Function-
Solutions/Business-Critical-Systems/
[Accessed: 02nd
July 2012]
Webopedia [Online]
Available from: http://www.webopedia.com/TERM/C/client.html
[Accessed: 01st March 2012]
Walter Sisulu University [Online]
Available from: http://www.wsu.ac.za/research/research.php
[Accessed: 03rd
March 2012]
TechTerms [Online]
Available from: http://www.techterms.com/definition/computer
[Accessed: 01st February 2012]
About [Online]
Available from: http://cplus.about.com/od/glossar1/g/databasedefn.htm
[Accessed: 13th
July 2012]
The Free Dictionary [Online]
Available from: http://www.thefreedictionary.com/downtime
[Accessed: 17th
April 2012]
79
CIPI [Online]
Available from: http://www.cipd.co.uk/hr-resources/factsheets/e-learning.aspx
[Accessed: 24th
July 2012]
Encyclopedia [Online]
Available from: http://www.pcmag.com/encyclopedia/term/43982/groupwise
[Accessed: 23rd
March 2012]
SearchCIO [Online]
Available from: http://searchcio-midmarket.techtarget.com/definition/ICT
[Accessed: 26th
August 2012]
ITS User Group [Online]
Available from:
http://www.itsug.org.za/index.php?option=com_content&task=view&id=24&Itemid
=32
[Accessed: 12th
April 2012]
Mirriam Webster [Online]
Available from: http://www.merriam-webster.com/dictionary/internet
[Accessed: 20th
September 2012]
Investopedia [Online]
Available from: http://www.investopedia.com/terms/e/erp.asp
[Accessed: 20th
April 2012]
Techopedia [Online]
Available from: http://www.techopedia.com/definition/3988/intrusion-detection-
system-ids
[Accessed: 20th
April 2012]
80
Webopedia [Online]
Available from:
http://www.webopedia.com/TERM/I/intrusion_prevention_system.html
[Accessed: 23rd
April 2012]
Search Data Center [Online]
Available from: http://searchdatacenter.techtarget.com/definition/ITIL
[Accessed: 26th
June 2012]
Business Dictionary [Online]
Available from: http://www.businessdictionary.com/definition/network.html
[Accessed: 19th
July 2012]
About [Online]
Available from:
http://cplus.about.com/od/introductiontoprogramming/g/program.htm
[Accessed: 25th
August 2012]
Arinc Management Service [Online]
Available from: http://www.arincmanagedservices.com/blog/2010/11/service-desk-
or-help-desk/
[Accessed: 12th
July 2012]
Open Project [Online]
Available from: http://www.openprojects.org/software-definition.htm
[Accessed: 20th
April 2012]
Business Dictionary [Online]
Available from: http://www.businessdictionary.com/definition/system.html
[Accessed: 27th
June 2012]
81
MyBroadband community,
Join date November 2010,
Post number 4,618
ITS USER GROUP CONFERENCE 2012
12 - 14 March 2012
Emperors Palace Convention Centre
Johannesburg, South Africa
Introduction to ETIU and E-Learning
WSU Brochure, 2011
Ogedebe, 2008
“INTERNET USAGE AND STUDENT’S ACADEMIC PERFORMANCE IN
NIGERIA TERTIARY INSTITUTION: A CASE STUDY OFUNIVERSITY OF
MAIDUGURI”, Thesis, Binham University
CISCO CCNA Exploration Companion Guide
Network Fundamentals
ISBN-10: 1-587 13-203-6
ISBN-13: 978-1-587 13-203-2
Ziaiel Academic [Online]
Available from: http://zaielacademic.net/networking/wan_topologies.htm
[Accessed: 02nd
August 2012]
Inetdaemon [Online]
Available from:
http://www.inetdaemon.com/tutorials/networking/lan/topology.shtml
[Accessed: 24th
September 2012]
Wiki Books [Online]
Available from:
http://en.wikibooks.org/wiki/Communication_Networks/Network_Topologies
[Accessed: 01st February 2012]
82
Computer Networking [Online]
Available from:
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.ht
m
[Accessed: 27th
May 2012]
Thought [Online]
Available from: http://thought1.org/nt100/module3/wireless.html
[Accessed: 24th
September 2012]
Computer Networking [Online]
Available from:
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.ht
m
[Accessed: 29th
June 2012]
Tyson Greer
Book Tittle: Computer Network
ISBN: 1-57231-702-7
Published by: Microsoft Press Copyright-1998, Chapter 1
Johannes Helmig, 2004
Article: Authentication, Access Control and Encryption [Online]
Available from: http://www.windowsecurity.com
[Accessed: 20th
May 2012]
Magalhas, RM, 2004
Viruses, Trojan and Malware [Online]
Available from: http://www.windowsecurity.com
[Accessed: 26th
May 2012]
Atkinson, S , 2012
managed LAN services practice leader at Netforce [Online]
Available from: http://people.ee.ethz.ch/~oetiker/webtools/mrtg/,
[Accessed: 26th
August 2012]
83
Madden, J
Networking Essentials
ISBN: 1-57231-905-4
Microsoft Press Copyright-1998
Magi, 2003
“PENSION MANAGEMENT SYSTEM FOR BISHO SOCIAL DEVELOPMENT
OF THE EASTERN CAPE”, Thesis, WSU
Dimension Data, 2008
Network Performance Frustration Research Report [Online]
Available from: http://www.dimensiondata.com/List/Downloadable%20Content/
DimensionDataNetworkPerformanceFrustrationResearchReport_129114049618000
00.pdf
[Accessed: 11th
August 2012]
Walter Sisulu University [Online]
Available from: http://www.wsu.ac.za/research/research.php
[Accessed: 08th
February 2012]
Webopedia [Online]
Available from:
http://www.webopedia.com/TERM/N/network.html [Accessed: 13
th June 2012]
Soho, 2010
“AN EXPLORATION OF THE ROLE OF THE STRATEGIC INTERNAL
COMMUNICATION SYSTEM IN THE MERGING WALTER SISULU
UNIVERSITY”, Thesis, WSU