SlideShare a Scribd company logo
TELKOMNIKA, Vol.15, No.1, March 2017, pp. 464~470
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v15i1.4183  464
Received November 3, 2016; Revised January 2, 2017; Accepted January 26, 2017
Netscan and Networx for Management Bandwidth and
Traffic with Simple Routing
Mufadhol Mufadhol*
1
, Guruh Aryotejo
2
, Agus Wibowo
3
1,3
Departement of Computer System and Information Systems, STEKOM Semarang, Indonesia
Jl. Majapahit 605, Semarang, Indonesia, telp +62246723456, +62246710144
2
Departement of Informatic Management, STEKOM Semarang, Indonesia
Jl. Siliwangi 359, Semarang, Indonesia, telp +62247600452, +6224600453
Corresponding author, e-mail: masyong29@gmail.com*
1
, guruh2000@yahoo.com
2
,
agus.wibowo@stekom.ac.id
3
Abstract
Currently, approximately 3.4 billion people are accessing the internet around the world and that
number is still growing. This phenomenon creates the Internet culture that has a great influence on
science, technology and even the world economy. Internet bandwidth is very expensive, which makes an
information technology based company have to map the internet accurately daily, monthly or yearly. That
data will be taken into consideration by the company to decide how to provide services that make an
internet surfing is a pleasant experience. If not regulated, most likely the traffic and bandwidth will be used
up even when it is only shared by a few users. To anticipate this, we need a bandwidth and management
traffic system using Netscan and Networx in order to monitoring the usage of Internet.
Keywords: Netscan, networx, bandwidth, traffic, simple routing
Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Network administrators have to map the Internet network to accurately match the needs
of each user [1]. Internet usage reports either daily, monthly or yearly will be analyzed and used
by the company to provide an equitably and equally internet network service usage activity for
employees, directors and staff of the company [2]. Monitoring Internet activity is one of the
functions of management that are useful to analyze whether the Internet is still quite feasible to
use or needs additional capacity. The results of monitoring can also be used to help the
administrator who wants to redesign the existing internet network [2, 3].
In computer network, we can monitor the internet bandwidth usage and the load of local
network traffic either through a router or computer interface [4]. Monitoring can be done with a
standard Simple Network Monitoring Protocol (SNMP) [5]. With the help of networking tools, the
upload or download status of network equipment can be routed easily with a simple routing
method [6], as can be seen in Figure 1. Netscan is able to perform network scanning to
determine the active device and its corresponding IP. Monitoring records can be a table, figure,
curve or animation. Networx is used for monitoring internet traffic, upload and download speeds
and bandwidth usage from time to time.
2. Traffic Model and Computer Network
2.1. Computer Network
Monitoring as well as network control can be done by using a router [7]. Routers can
have prebuilt lookup tables that tell them which kind of operation to do based on the topmost
label of the incoming packet so they can process the packet very quickly. In a swap operation
the label is swapped with a new label, and the packet is forwarded along the path associated
with the new label [8]. Performance Routing is monitoring delay on both links, but as they both
comply with the policy, it does not enforce any routing changes and OSPF is responsible for
routing now [9].
TELKOMNIKA ISSN: 1693-6930 
Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol)
465
Figure 1. Network Management
Multi Protocol Label Switching (MPLS) was introduced to address the drawbacks of the
conventional IP routing which forwards packets based on destination address only. To deal with
the scalability of routing and also to meet the requirements of newly developed services, there is
an increasing need for new routing functionality on routing protocols. By extending the IP routing
fonctionality, traffic engineering can be carried out and thus proves the network performance.
The most popular solutions to support QoS routing in the internet are Differentiated services
(Diferv) and MPLS [10].
2.2. Network of Topology
IP address, in the simple terms, is an identification code on a computer network/internet
which is a vital component in the Internet. Without an IP address, the internet will not be
known [11]. Every computer connected to the Internet at least must have an IP address on each
interface and must be unique as there should be no computer / server / network devices using
same IP address on the Internet [4, 5, 11]. Traffic modelling in the network connecting
into a cloud network could use one of the existing network traffic models either OSPF
model [9], or QoS model [8, 10, 12]. Selection is based on the needs of the company or office.
Both the OSPF and QoS models in the network cloud [3, 13], have a advantages and
disadvantages [8-10], [12].
All areas must be connected to Area O with ABR. All the routers within same area have
same topology table. ASBR is used to connect the one autonomous system to outer
autonomous system. The goal of design is to localize the updates within area. ABR is called
Area Border Router connects different areas with the backbone area. Area ASBR is
Autonomous System Border Router. It connects different autonomous systems. This is the area
design of OSPF routing protocol. The OSPF divides the network into areas to minimize the
routing update traffic [9]. A deeper visibility into data communication is needed, so that different
applications inside the data channels passing information between the source and destination
machines can be distinguished from each other. Once such a visibility is available, routing
protocols can leverage this information and different classes of applications, depending on their
usefulness, or priorities, can be treated differently in terms of Quality of Service leading to
different routing paths for different classes of communicating applications [8].
2.3. Netscan
Netscan is a software to perform network scanning to determine the active device and
its corresponding IP and can also monitor the local computer network (LAN). This software are
so complete that, depending on the person, can be used to disturb even cripple or take over the
network. Netscan features can be seen on Figure 2. For this reason, Netscan sometimes
categorized as a hacking tool [14].
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470
466
Figure 2. Netscan Application
2.4. Networx
Networx is used as a monitoring network traffic and internet activities. In addition, its
can also be used to monitor upload and download speeds and serve to monitor the bandwidth
usage from time to time. Its very useful to help evaluate bandwidth usage and measure the
speed of the Internet or other network connections (Dial Up, Ethernet, ISDN, DSL and
Wireless). Networx have a capability to make a statistic report for bandwidth usage based on
daily, weekly, monthly and online. Its can export reports to various formats: HTML, MS Word
and Excel to track and analyze. Networx features can be seen on Figure 3.
Figure 3. Networx Aplication
3. Results and Analysis
3.1. Network Scanning
In an office or enterprise, network monitoring is usually the task of the administrator or a
NOC (Network Operation Centre). Monitoring the network will be a difficult and complicated
task, if an administrator or a NOC (Network Operation Centre) do not know which ones work
well and which ones do not work. Sudden or long downtime can disturb work productivity [15],
as can be seen on Figure 4. Usually, when received a report from the user, NOC (Network
Operation Centre) or the new administrator will monitor the network connection. As soon as
user files a report that the connection is lost, the recommended first step is to scan the network.
The results of scanning can be analyzed to determine which nodes that disturb the network and
will be repaired as soon as possible [4], [6], [15].
TELKOMNIKA ISSN: 1693-6930 
Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol)
467
Figure 4. Network Scanning
3.2. Bandwidth Usage Analysis
Connections quality between two or more different `network is something that is
essential to analyze bandwidth usage [4]. Monitoring the bandwidth usage for the purpose to
anticipate overload capacity must be conducted. The reason is when the total resources has
been used up, then all kinds of applications that run over the network will be unusable [1, 2], [6],
[15]. This bandwidth usage monitoring can be done on a daily basis such as Figure 5, every
week to determine the number of bandwidth that has been used for a whole week like Figure 6
or bandwidth usage report for a month as Figure 7.
Figure 5. Daily Report
Figure 6. Weekly Report
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470
468
Figure 7. Monthly Report
From the bandwidth usage reports, we can make an initial formula for calculating monthly
usage:
Upload Formula:
n = Number of days
up = Upload
= Total uploaded during n days
= Total upload for the first day
= Total upload for day n.
To calculate the download, use the formula:
n = Number of days
do = download
= Total downloaded during n days
= Total download for the first day
= Total download for day n.
3.3. Bandwidth Allocation
The user needs for better network access is increasing. It means the user want to have
a network access that don’t have a problem such as a slow data transmission or unstable
connection. In an internet society, which is depends on the speed to get the information, it is
unexcuseable to have a network that have a lot of problems [4], [15]. To share the bandwidth
fairly and equitable, we must have the complete data about the total number of uploads and
downloads performed by each local network for a certain period. This can be done by
considering the following formula :
Upload Formula:
TELKOMNIKA ISSN: 1693-6930 
Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol)
469
m = number of months
= Average upload for m month
= Total upload for the first month
= Total uploads for the second month
= Total uploads for the third month
= Total uploads for n month
Download formula:
m = number of months
= Average download for m month
= Total download for the first month
= Total download for the second month
= Total download for the third month
= Total download for n month
For the distribution of the amount of upload and download bandwidth for each local
network, we can use the following formula:
Upload Formula:
= Upload results which will be shared
= Average upload
= Total upload resource from the ISP
= Total upload for local network
Download Formula:
= Download results which will be shared
= Average download
= Total download resource from the ISP
= Total download for a local network.
4. Conclusion
To increase the productivity, it is necessary to manage a computer network usage to
avoid problems such as slow data delivery and an unstable connection. Simple Routing in the
distribution of bandwidth whether for uploads, downloads or even both, can be done fairly and
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470
470
equitably. An accurate calculation of the analysis of usage during a certain period can determine
the total amount of bandwidth that should be given to any local area network.
References
[1] Monica CH, Bhavani KVL. A Bandwidth Degradation Technique to Reduce Call Dropping Probability
in Mobile Network Systems. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 16(2):
303-307.
[2] Tjahjanto, Sitohang B, Wiryono SK. Simulation and Implementation Model of Productivity
Measurement Internet Bandwidth Usage. TELKOMNIKA Indonesian Journal of Electrical
Engineering. 2015; 13(3): 1069-1078.
[3] Yiquan Kong. One Method of Cloud Computing Bandwidth Allocation Based on Fairness.
TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11(2): 954-959.
[4] Mansfield, Nial. Practical TCP/IP : Designing, Using, and Troubleshooting TCP/IP Network on Linux
and Windows. Addison Wesley. Pearson Education. UK. 2003.
[5] Shenify M. Trusted Node-Based Algorithm to Secure Home Agent NATed Ipv4 Network from IPv6
Routing Header Attacks. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2014; 12(4):
969-976.
[6] Ismail MN, Zin AM. Development of Emulation Network Analyzer Tool for Computer Network
Planning. Bulletin of Electrical Engineering and Informatics. 2016; 5(2): 219-229.
[7] Day K, Touzene A, Arafeh B, Alzeidi N. Parallel Routing in Mobile AD-HOC Networks. International
Journal of Computer Networks & Communications. 2011; 3(5): 77-94.
[8] Kriska M, Janitor J, Fecilak P. Dynamic Routing of IP Traffic Based On Qos Parameters. International
Journal of Computer Networks & Communications. 2014; 6(4): 11-22.
[9] Grang N, Gupta A. Compare OSPF Routing Protocol with other Interior Gateway Routing Protocols.
International Journal of Engineering, Business and Enterprise Applications. 2013; 2(4): 166-170.
[10] Kulkami S, Sharma R, Mishra I. New Bandwidth Guaranteed QoS Routing Algorithm for MPLS
Networks. International Journal of Emerging Trends in Computing and Information Sciences. 2012;
3(3): 389-384.
[11] Supiyanto, Hasbullah IH, Anbar M, Murugesan RK. Improvement of Address Resolution Security in
Ipv6 Local Network using Trust-ND. TELKOMNIKA Indonesian Journal of Electrical Engineering.
2015; 13(1): 195-202.
[12] Roy B, Banik S, Dey P, Sanyal S, Chaki N. Ant Colony based Routing for Mobile Ad-Hoc Networks
towards Improved Quality of Services. International Journal of Emerging Trends in Computing and
Information Sciences. 2012; 3(1): 10-14.
[13] Urayama Y, Tachibana T. Virtual Network Construction with K-Shortest Path Algorithm and Prim’s
MST Algorithm for Robust Physical Networks. Proceedings of the International MultiConference of
Engineers and Computer Scientists, Hong Kong. China. 2014.
[14] Yang TY, Dehghantanha A, Choo KR, Muda Z. Windows Instant Messaging App Forensics:
Facebook and Skype as Case Studies. International Journal of PLOS ONE. 2016; 11(3): 1-29.
[15] Galkwad, Patil P. Routing Mechanism for the Improvement of Network Throughput. International
Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(5): 423-426.

More Related Content

What's hot (20)

PDF
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
Brenden Hogan
 
PPT
Unit 1
APARNA P
 
PDF
CoryCookFinalProject535
Cory Cook
 
PDF
D021201024031
inventionjournals
 
PDF
Congestion control mechanism using network border protocol
International Journal of Science and Research (IJSR)
 
PDF
Computer network physical layer
Sweta Kumari Barnwal
 
PDF
Distributed gateway-based load balancing in software defined network
TELKOMNIKA JOURNAL
 
PPTX
Unit III
APARNA P
 
PPT
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
rameraja
 
PDF
Distributed process and scheduling
SHATHAN
 
PDF
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET Journal
 
PDF
Internet service provider mobile
IJCNCJournal
 
PDF
Alternatives to Redistribution Communities in Inter-domain traffic Engineering
cscpconf
 
PPTX
SOFTWARE DEFINED NETWORKING
Karthiga Santhanam
 
PDF
Big data and machine learning for network research problems
Sabidur Rahman
 
PPTX
Ip routing
Sourabh Badve
 
PDF
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
 
PPTX
Network Topology Symposium
Dennis Donoghue
 
PPTX
what is Network topology?
shire ali
 
PDF
Bn36386389
IJERA Editor
 
DesignOfAnExtensibleTelemetry&CommandArcitectureForSmallSatellites
Brenden Hogan
 
Unit 1
APARNA P
 
CoryCookFinalProject535
Cory Cook
 
D021201024031
inventionjournals
 
Congestion control mechanism using network border protocol
International Journal of Science and Research (IJSR)
 
Computer network physical layer
Sweta Kumari Barnwal
 
Distributed gateway-based load balancing in software defined network
TELKOMNIKA JOURNAL
 
Unit III
APARNA P
 
Prevention of Data Loss in physical implementation of FIFOs and Data Synchron...
rameraja
 
Distributed process and scheduling
SHATHAN
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET Journal
 
Internet service provider mobile
IJCNCJournal
 
Alternatives to Redistribution Communities in Inter-domain traffic Engineering
cscpconf
 
SOFTWARE DEFINED NETWORKING
Karthiga Santhanam
 
Big data and machine learning for network research problems
Sabidur Rahman
 
Ip routing
Sourabh Badve
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
 
Network Topology Symposium
Dennis Donoghue
 
what is Network topology?
shire ali
 
Bn36386389
IJERA Editor
 

Similar to Netscan and Networx for Management Bandwidth and Traffic with Simple Routing (20)

PDF
Fundamentals of internet_measurement_a_tutorial
Turisticae
 
PPT
1. Network monitoring and measurement-2.ppt
Farid Er
 
PPTX
Topic # 16 of outline Managing Network Services.pptx
AyeCS11
 
PPT
Chapter09
Muhammad Ahad
 
DOCX
Cisco network management
IT Tech
 
PPT
network-management Web base.ppt
AssadLeo1
 
PDF
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET Journal
 
PDF
Network monitoringapproaches anoverview
IrfaanKhanQasmi
 
PPT
Exploration lan switching_chapter1
nixon
 
PPTX
Network Bandwidth management - Mumbai Seminar
ManageEngine, Zoho Corporation
 
PDF
NETFLOW ANALYZER 9600 - AN OVERVIEW
NetFlow Analyzer
 
PDF
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
PPTX
Distributed Systems - Information Technology
Sagar Mehta
 
DOCX
Hari proposal
Rey Jefferson
 
PDF
Network Monitoring Tools
Prince JabaKumar
 
PPTX
Importance of Network Performance Monitoring
cPacket Networks
 
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
PPTX
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
ManageEngine, Zoho Corporation
 
DOCX
2015_01 - Networking Session - SPHMMC ICT workshop
Kathleen Ludewig Omollo
 
Fundamentals of internet_measurement_a_tutorial
Turisticae
 
1. Network monitoring and measurement-2.ppt
Farid Er
 
Topic # 16 of outline Managing Network Services.pptx
AyeCS11
 
Chapter09
Muhammad Ahad
 
Cisco network management
IT Tech
 
network-management Web base.ppt
AssadLeo1
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET Journal
 
Network monitoringapproaches anoverview
IrfaanKhanQasmi
 
Exploration lan switching_chapter1
nixon
 
Network Bandwidth management - Mumbai Seminar
ManageEngine, Zoho Corporation
 
NETFLOW ANALYZER 9600 - AN OVERVIEW
NetFlow Analyzer
 
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
Distributed Systems - Information Technology
Sagar Mehta
 
Hari proposal
Rey Jefferson
 
Network Monitoring Tools
Prince JabaKumar
 
Importance of Network Performance Monitoring
cPacket Networks
 
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
NetFlow Analyzer Training Part II : Diagnosing and troubleshooting traffic is...
ManageEngine, Zoho Corporation
 
2015_01 - Networking Session - SPHMMC ICT workshop
Kathleen Ludewig Omollo
 
Ad

More from TELKOMNIKA JOURNAL (20)

PDF
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
TELKOMNIKA JOURNAL
 
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
TELKOMNIKA JOURNAL
 
PDF
Indonesian continuous speech recognition optimization with convolution bidir...
TELKOMNIKA JOURNAL
 
PDF
Recognition and understanding of construction safety signs by final year engi...
TELKOMNIKA JOURNAL
 
PDF
The use of dolomite to overcome grounding resistance in acidic swamp land
TELKOMNIKA JOURNAL
 
PDF
Clustering of swamp land types against soil resistivity and grounding resistance
TELKOMNIKA JOURNAL
 
PDF
Hybrid methodology for parameter algebraic identification in spatial/time dom...
TELKOMNIKA JOURNAL
 
PDF
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
TELKOMNIKA JOURNAL
 
PDF
Deep learning approaches for accurate wood species recognition
TELKOMNIKA JOURNAL
 
PDF
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
TELKOMNIKA JOURNAL
 
PDF
Reversible data hiding with selective bits difference expansion and modulus f...
TELKOMNIKA JOURNAL
 
PDF
Website-based: smart goat farm monitoring cages
TELKOMNIKA JOURNAL
 
PDF
Novel internet of things-spectroscopy methods for targeted water pollutants i...
TELKOMNIKA JOURNAL
 
PDF
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
TELKOMNIKA JOURNAL
 
PDF
Convolutional neural network-based real-time drowsy driver detection for acci...
TELKOMNIKA JOURNAL
 
PDF
Addressing overfitting in comparative study for deep learningbased classifica...
TELKOMNIKA JOURNAL
 
PDF
Integrating artificial intelligence into accounting systems: a qualitative st...
TELKOMNIKA JOURNAL
 
PDF
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
TELKOMNIKA JOURNAL
 
PDF
Adulterated beef detection with redundant gas sensor using optimized convolut...
TELKOMNIKA JOURNAL
 
PDF
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
TELKOMNIKA JOURNAL
 
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
TELKOMNIKA JOURNAL
 
Implementation of ICMP flood detection and mitigation system based on softwar...
TELKOMNIKA JOURNAL
 
Indonesian continuous speech recognition optimization with convolution bidir...
TELKOMNIKA JOURNAL
 
Recognition and understanding of construction safety signs by final year engi...
TELKOMNIKA JOURNAL
 
The use of dolomite to overcome grounding resistance in acidic swamp land
TELKOMNIKA JOURNAL
 
Clustering of swamp land types against soil resistivity and grounding resistance
TELKOMNIKA JOURNAL
 
Hybrid methodology for parameter algebraic identification in spatial/time dom...
TELKOMNIKA JOURNAL
 
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
TELKOMNIKA JOURNAL
 
Deep learning approaches for accurate wood species recognition
TELKOMNIKA JOURNAL
 
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
TELKOMNIKA JOURNAL
 
Reversible data hiding with selective bits difference expansion and modulus f...
TELKOMNIKA JOURNAL
 
Website-based: smart goat farm monitoring cages
TELKOMNIKA JOURNAL
 
Novel internet of things-spectroscopy methods for targeted water pollutants i...
TELKOMNIKA JOURNAL
 
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
TELKOMNIKA JOURNAL
 
Convolutional neural network-based real-time drowsy driver detection for acci...
TELKOMNIKA JOURNAL
 
Addressing overfitting in comparative study for deep learningbased classifica...
TELKOMNIKA JOURNAL
 
Integrating artificial intelligence into accounting systems: a qualitative st...
TELKOMNIKA JOURNAL
 
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
TELKOMNIKA JOURNAL
 
Adulterated beef detection with redundant gas sensor using optimized convolut...
TELKOMNIKA JOURNAL
 
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
TELKOMNIKA JOURNAL
 
Ad

Recently uploaded (20)

PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PPTX
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
Day2 B2 Best.pptx
helenjenefa1
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Design Thinking basics for Engineers.pdf
CMR University
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Thermal runway and thermal stability.pptx
godow93766
 
GitOps_Repo_Structure for begeinner(Scaffolindg)
DanialHabibi2
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 

Netscan and Networx for Management Bandwidth and Traffic with Simple Routing

  • 1. TELKOMNIKA, Vol.15, No.1, March 2017, pp. 464~470 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i1.4183  464 Received November 3, 2016; Revised January 2, 2017; Accepted January 26, 2017 Netscan and Networx for Management Bandwidth and Traffic with Simple Routing Mufadhol Mufadhol* 1 , Guruh Aryotejo 2 , Agus Wibowo 3 1,3 Departement of Computer System and Information Systems, STEKOM Semarang, Indonesia Jl. Majapahit 605, Semarang, Indonesia, telp +62246723456, +62246710144 2 Departement of Informatic Management, STEKOM Semarang, Indonesia Jl. Siliwangi 359, Semarang, Indonesia, telp +62247600452, +6224600453 Corresponding author, e-mail: [email protected]* 1 , [email protected] 2 , [email protected] 3 Abstract Currently, approximately 3.4 billion people are accessing the internet around the world and that number is still growing. This phenomenon creates the Internet culture that has a great influence on science, technology and even the world economy. Internet bandwidth is very expensive, which makes an information technology based company have to map the internet accurately daily, monthly or yearly. That data will be taken into consideration by the company to decide how to provide services that make an internet surfing is a pleasant experience. If not regulated, most likely the traffic and bandwidth will be used up even when it is only shared by a few users. To anticipate this, we need a bandwidth and management traffic system using Netscan and Networx in order to monitoring the usage of Internet. Keywords: Netscan, networx, bandwidth, traffic, simple routing Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Network administrators have to map the Internet network to accurately match the needs of each user [1]. Internet usage reports either daily, monthly or yearly will be analyzed and used by the company to provide an equitably and equally internet network service usage activity for employees, directors and staff of the company [2]. Monitoring Internet activity is one of the functions of management that are useful to analyze whether the Internet is still quite feasible to use or needs additional capacity. The results of monitoring can also be used to help the administrator who wants to redesign the existing internet network [2, 3]. In computer network, we can monitor the internet bandwidth usage and the load of local network traffic either through a router or computer interface [4]. Monitoring can be done with a standard Simple Network Monitoring Protocol (SNMP) [5]. With the help of networking tools, the upload or download status of network equipment can be routed easily with a simple routing method [6], as can be seen in Figure 1. Netscan is able to perform network scanning to determine the active device and its corresponding IP. Monitoring records can be a table, figure, curve or animation. Networx is used for monitoring internet traffic, upload and download speeds and bandwidth usage from time to time. 2. Traffic Model and Computer Network 2.1. Computer Network Monitoring as well as network control can be done by using a router [7]. Routers can have prebuilt lookup tables that tell them which kind of operation to do based on the topmost label of the incoming packet so they can process the packet very quickly. In a swap operation the label is swapped with a new label, and the packet is forwarded along the path associated with the new label [8]. Performance Routing is monitoring delay on both links, but as they both comply with the policy, it does not enforce any routing changes and OSPF is responsible for routing now [9].
  • 2. TELKOMNIKA ISSN: 1693-6930  Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol) 465 Figure 1. Network Management Multi Protocol Label Switching (MPLS) was introduced to address the drawbacks of the conventional IP routing which forwards packets based on destination address only. To deal with the scalability of routing and also to meet the requirements of newly developed services, there is an increasing need for new routing functionality on routing protocols. By extending the IP routing fonctionality, traffic engineering can be carried out and thus proves the network performance. The most popular solutions to support QoS routing in the internet are Differentiated services (Diferv) and MPLS [10]. 2.2. Network of Topology IP address, in the simple terms, is an identification code on a computer network/internet which is a vital component in the Internet. Without an IP address, the internet will not be known [11]. Every computer connected to the Internet at least must have an IP address on each interface and must be unique as there should be no computer / server / network devices using same IP address on the Internet [4, 5, 11]. Traffic modelling in the network connecting into a cloud network could use one of the existing network traffic models either OSPF model [9], or QoS model [8, 10, 12]. Selection is based on the needs of the company or office. Both the OSPF and QoS models in the network cloud [3, 13], have a advantages and disadvantages [8-10], [12]. All areas must be connected to Area O with ABR. All the routers within same area have same topology table. ASBR is used to connect the one autonomous system to outer autonomous system. The goal of design is to localize the updates within area. ABR is called Area Border Router connects different areas with the backbone area. Area ASBR is Autonomous System Border Router. It connects different autonomous systems. This is the area design of OSPF routing protocol. The OSPF divides the network into areas to minimize the routing update traffic [9]. A deeper visibility into data communication is needed, so that different applications inside the data channels passing information between the source and destination machines can be distinguished from each other. Once such a visibility is available, routing protocols can leverage this information and different classes of applications, depending on their usefulness, or priorities, can be treated differently in terms of Quality of Service leading to different routing paths for different classes of communicating applications [8]. 2.3. Netscan Netscan is a software to perform network scanning to determine the active device and its corresponding IP and can also monitor the local computer network (LAN). This software are so complete that, depending on the person, can be used to disturb even cripple or take over the network. Netscan features can be seen on Figure 2. For this reason, Netscan sometimes categorized as a hacking tool [14].
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470 466 Figure 2. Netscan Application 2.4. Networx Networx is used as a monitoring network traffic and internet activities. In addition, its can also be used to monitor upload and download speeds and serve to monitor the bandwidth usage from time to time. Its very useful to help evaluate bandwidth usage and measure the speed of the Internet or other network connections (Dial Up, Ethernet, ISDN, DSL and Wireless). Networx have a capability to make a statistic report for bandwidth usage based on daily, weekly, monthly and online. Its can export reports to various formats: HTML, MS Word and Excel to track and analyze. Networx features can be seen on Figure 3. Figure 3. Networx Aplication 3. Results and Analysis 3.1. Network Scanning In an office or enterprise, network monitoring is usually the task of the administrator or a NOC (Network Operation Centre). Monitoring the network will be a difficult and complicated task, if an administrator or a NOC (Network Operation Centre) do not know which ones work well and which ones do not work. Sudden or long downtime can disturb work productivity [15], as can be seen on Figure 4. Usually, when received a report from the user, NOC (Network Operation Centre) or the new administrator will monitor the network connection. As soon as user files a report that the connection is lost, the recommended first step is to scan the network. The results of scanning can be analyzed to determine which nodes that disturb the network and will be repaired as soon as possible [4], [6], [15].
  • 4. TELKOMNIKA ISSN: 1693-6930  Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol) 467 Figure 4. Network Scanning 3.2. Bandwidth Usage Analysis Connections quality between two or more different `network is something that is essential to analyze bandwidth usage [4]. Monitoring the bandwidth usage for the purpose to anticipate overload capacity must be conducted. The reason is when the total resources has been used up, then all kinds of applications that run over the network will be unusable [1, 2], [6], [15]. This bandwidth usage monitoring can be done on a daily basis such as Figure 5, every week to determine the number of bandwidth that has been used for a whole week like Figure 6 or bandwidth usage report for a month as Figure 7. Figure 5. Daily Report Figure 6. Weekly Report
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470 468 Figure 7. Monthly Report From the bandwidth usage reports, we can make an initial formula for calculating monthly usage: Upload Formula: n = Number of days up = Upload = Total uploaded during n days = Total upload for the first day = Total upload for day n. To calculate the download, use the formula: n = Number of days do = download = Total downloaded during n days = Total download for the first day = Total download for day n. 3.3. Bandwidth Allocation The user needs for better network access is increasing. It means the user want to have a network access that don’t have a problem such as a slow data transmission or unstable connection. In an internet society, which is depends on the speed to get the information, it is unexcuseable to have a network that have a lot of problems [4], [15]. To share the bandwidth fairly and equitable, we must have the complete data about the total number of uploads and downloads performed by each local network for a certain period. This can be done by considering the following formula : Upload Formula:
  • 6. TELKOMNIKA ISSN: 1693-6930  Netscan and Networx for Management Bandwidth and Traffic with… (Mufadhol Mufadhol) 469 m = number of months = Average upload for m month = Total upload for the first month = Total uploads for the second month = Total uploads for the third month = Total uploads for n month Download formula: m = number of months = Average download for m month = Total download for the first month = Total download for the second month = Total download for the third month = Total download for n month For the distribution of the amount of upload and download bandwidth for each local network, we can use the following formula: Upload Formula: = Upload results which will be shared = Average upload = Total upload resource from the ISP = Total upload for local network Download Formula: = Download results which will be shared = Average download = Total download resource from the ISP = Total download for a local network. 4. Conclusion To increase the productivity, it is necessary to manage a computer network usage to avoid problems such as slow data delivery and an unstable connection. Simple Routing in the distribution of bandwidth whether for uploads, downloads or even both, can be done fairly and
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 1, March 2017 : 464 – 470 470 equitably. An accurate calculation of the analysis of usage during a certain period can determine the total amount of bandwidth that should be given to any local area network. References [1] Monica CH, Bhavani KVL. A Bandwidth Degradation Technique to Reduce Call Dropping Probability in Mobile Network Systems. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 16(2): 303-307. [2] Tjahjanto, Sitohang B, Wiryono SK. Simulation and Implementation Model of Productivity Measurement Internet Bandwidth Usage. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 13(3): 1069-1078. [3] Yiquan Kong. One Method of Cloud Computing Bandwidth Allocation Based on Fairness. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2013; 11(2): 954-959. [4] Mansfield, Nial. Practical TCP/IP : Designing, Using, and Troubleshooting TCP/IP Network on Linux and Windows. Addison Wesley. Pearson Education. UK. 2003. [5] Shenify M. Trusted Node-Based Algorithm to Secure Home Agent NATed Ipv4 Network from IPv6 Routing Header Attacks. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2014; 12(4): 969-976. [6] Ismail MN, Zin AM. Development of Emulation Network Analyzer Tool for Computer Network Planning. Bulletin of Electrical Engineering and Informatics. 2016; 5(2): 219-229. [7] Day K, Touzene A, Arafeh B, Alzeidi N. Parallel Routing in Mobile AD-HOC Networks. International Journal of Computer Networks & Communications. 2011; 3(5): 77-94. [8] Kriska M, Janitor J, Fecilak P. Dynamic Routing of IP Traffic Based On Qos Parameters. International Journal of Computer Networks & Communications. 2014; 6(4): 11-22. [9] Grang N, Gupta A. Compare OSPF Routing Protocol with other Interior Gateway Routing Protocols. International Journal of Engineering, Business and Enterprise Applications. 2013; 2(4): 166-170. [10] Kulkami S, Sharma R, Mishra I. New Bandwidth Guaranteed QoS Routing Algorithm for MPLS Networks. International Journal of Emerging Trends in Computing and Information Sciences. 2012; 3(3): 389-384. [11] Supiyanto, Hasbullah IH, Anbar M, Murugesan RK. Improvement of Address Resolution Security in Ipv6 Local Network using Trust-ND. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 13(1): 195-202. [12] Roy B, Banik S, Dey P, Sanyal S, Chaki N. Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services. International Journal of Emerging Trends in Computing and Information Sciences. 2012; 3(1): 10-14. [13] Urayama Y, Tachibana T. Virtual Network Construction with K-Shortest Path Algorithm and Prim’s MST Algorithm for Robust Physical Networks. Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong. China. 2014. [14] Yang TY, Dehghantanha A, Choo KR, Muda Z. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies. International Journal of PLOS ONE. 2016; 11(3): 1-29. [15] Galkwad, Patil P. Routing Mechanism for the Improvement of Network Throughput. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(5): 423-426.