Networking Issues In Heavy Traffic Management Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

These days, network usage has been increased broadly due to its wide features where network is a common connection between the two systems for sharing and transferring the data from one place to another by using internet. Sometimes heavy usage of the internet may cause network traffic in the system. This causes major issues while transferring the data. In order to determine the network traffic for a website will be a big problem in network management. All these issues are mainly occurs in the network due to the security reasons and delay in transferring the data. Network traffic can be reduced by taking proper solutions or methods.

This report evaluates the network issues in heavy traffic management in website and also describes the various network issues and the solution methods for those problems. One of the proposed methods in this report is Graphical User Interface (GUI) based network monitoring tool for the heavy traffic issue. This format is a web load tester mechanism which is used for detecting the traffic in server.


1.1 Aim: Research on Networking Issues in heavy traffic management in a website in the context of networking and proposing an Effective traffic Management.

1.2 Objectives:

1) Critically evaluating the Heavy Traffic issues for a website.

2) Proposing a GUI Based Network Monitoring Tool for the Heavy Traffic issue.

3) Implementing Traffic Management Algorithm through clustering /Farming algorithm of the server.

4) Measuring the effectiveness of the proposed concept through clustering/Farming Algorithm for Traffic Management.

2.1 Introduction of Networking:

A group of interconnected systems represents a network; it has been classified depending on their features and functionalities of a system. Transferring data from one system to another is done by networking systems which plays important role for communication. As the number of users increase, the usage of systems increase which leads to network traffic, fading effects, data redundancy, and security issues etc. Network Management is a service, which is used for different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. 

2.2 Network Traffic Issue:

Network is represented as a group of interconnected devices. These are classified based on the variety of wide characteristics. The data is access between the two systems with help of the networks. Due to rapid growth of internet usage and Information technology (IT) among the public increased the introduction of new technologies. The main problems in the network traffics are overloading, unauthorized access, Denial of service attacks and Congestion problems. One of the main issues of the network traffic is overloading. Overloading mainly produced by the access of data between systems, then there arise redundancy and results in network traffic. Redundancy occurs in the network if different clients access the same information at a time. (Jarkko Niittylahti, 2009). The second issue that occur in the network traffic is Denial of Service (DoS) attack. These attacks have been launched against to the internet sites .It is one of the most significant problem as it can shut an organization off from the internet. DoS attack technology continue to evolve and more impact on the internet services. Internet route technology and windows end-users have become more frequent targets of intruder activity. Users are connected to the internet difficulty connecting to the website because all of the users trying to access the website at same time (Kevin J. Houle, 2001) and Some of the problems occur in the network traffic, these are unauthorized access and congestion problems.

2.3 Critical analysis on improvement of Networking Issues in heavy traffic management in website:

Network traffic will exhibit a large amount of redundancy when different internet access the similar content. Most of the systems have been developed to eliminate the redundant content from network links and improve network efficiency. In order to reduce the network traffic, web proxy approaches are used for store frequently accessed objects and serve the repeated requests from cache. A new class of protocol independent redundancy elimination algorithms has been developed for identifying and removing the strings that are repeated across network packets (Jim Cooper, Dennis Maione and Roberta Bagg 2001). The elimination of redundancy is widely deployed and increasing popularly. Even lot of problems have been occurred in wireless networks like, in an organization. when crucial data has been transfer it has to be well designed and properly maintained for better performances. Trouble shooting is also one of the major issues of concern for the areas where site verification is managed frequently. Moreover, many changes has been done for scanning and verification of sites, this can be done by Motorola's Wi-Fi and LANPlanner, which allows IT management to include network data to design live for entire organization. Sitescanner is the other special tool that will assess web sites according to their functionalities. From the above it can be said that heavy traffic in website results in low performance, Virus, loss of data packets in large networks, security, data redundancy are some of the network traffic issues, this can be overcome by providing secure and effective quality assurance, by providing security for web pages, alert with a beep sound when a tread is effected to the system and Time to time maintenance for network systems in large organization for effective transactions.

As the network speed increases as well as network congestion will also increases. This heavy traffic has been controlled by Asynchronous Transfer Mode (ATM) . There should be lot of bandwidth available for users whenever they need it while being affirmed that chance of losing their data is negligible (Pascal Lorenz, 2005).. High utilization of network must be assure at the same time Hewlett Packard enabled all the network administrators to gather the data through the entire network by embedding packet sampling technology into the network devices instead of affording to install a network probe every where. This also made to know the traffic is caused by whom while adding minimal overhead to network .At last, because of packet sampling a solution is developed to manage the network traffic due to which the speed of networks can be increased (Janice Reyno, 2004). From the above it can be analyzed that advanced controlling method have to be implemented to handle "burst" traffic arising from Asynchronous Transfer mode (ATM) networks. Occurring of congestion will be negligible by providing higher band width. Larger networks have to be provided better service and improved quality of service with guaranteed performance.

The three important reasons for the network traffic issues to arise are:

The Usage of Internet

A much growing Mobile work force

Junction of multiple data traffic running through same network

Because of these reasons the network traffic has increased and became more complicated. Due to this the enterprises had to switch to new applications and search for new connection managements. At present, data and video are in demand which make use of high bandwidths and high speed networks, hence if the speed increases in the networks automatically network congestion increases which is an another major problem for the end users The new traffic management is much effective and this effective management is from network core till the network edge. Now a day's networks are designed so as to meet all the business needs within less cost and effective manner. From the above it can be understood that Increase in usage of internet and Mobiles, Multiple users are trying access data from the same resources are main reasons for increasing in network traffic because of this most of the enterprises are finding new applications and even trying to add new features for present technologies inventing new management connection and even trying to design more advanced networking system for businesses in low cost.

Network Congestion problems arise whenever large data is carried out in a network, the most common problem is speed mismatch in between one node to another node in a network or a network having multiple ports. To overcome this problem all the nodes can be connected to ATM switch or a gateway such as router. Outcome of the conjunction is loss of data due to buffer overflow (James M. Kretchmar, 2004).  For data communication each and every bit has to be transmitted correctly, if any data is missing in between then it has to retransmit which results in delay for communicating end users which is a universal problem. To solve the problem a buffer overloading same speed has to be maintained for the all multiple input ports feed with a single output port. Remote Backup Servers can also be used for controlling the traffic. A remote backup server is just another server whish is managed by Server Iron. Server Iron will balance the traffic by using load balancing methods (H.T.Kung, 1997). From the above it can be stated the network traffic issues can be improved in heavy network management in websites by following the above steps:

By trouble shooting the network incidents quickly

To ensure application performance

To take up capacity planning decisions

To safeguard the networks against threats

To provide different mechanism that will alert the network administrator against threats

To efficiently validate the quality of services

At present, most of the companies are developing their own web sites to share data the data can be browsed graphically and outsider cannot share these web sites, so intranet browsing results in a higher percentage of network traffic that increases burden at the proxy server. It was observed that by frequently using the most popular websites which are attracted by the end users these hot spots are causing network traffic in the internet (Jim Cooper, Dennis Maione and Roberta Bagg 2001). In order to sole this issue the specialized web cashing is used to store resent accessed wed sites which acts as a proxy server by this only first request made at the sever and rest are handled by this web cashing without any network traffic but dynamic web sites cannot be retrieved (Osvald Gervasi 2005). 

Steps to improve network traffic:

Troubleshooting of network traffic is one of the important concerns it makes use of the technology called Retrospective Network Analysis (RNA) for improving the troubleshooting properties of complex networks. The first and major step to implement is the speed resolution. By employ this speed resolution technique network engineers can eliminate packet capturing delay, and thus the performance can be directly increased. That means the traffic problems are identified quickly and can be solved as soon as possible. The implementation of RNA technique allows the elimination of problem recreation and thus reduces the time for repairing. The next step that can be taken up is capturing data before and after snapshots of the network. By doing so, the networkadministrator can reduce the risks that may occur during the network transactions (NetQoS, 2008). From the above it can be understood that in the present situation network troubleshooting is a major aspect for network administrators because by troubleshooting networks, the network administrator can provide better outputs from the trouble free networks than with normal networks. In addition to this, it can also be said that speed resolution and capturing the data before and after snapshots of the network are the two basic steps to troubleshoot a network because speed resolution eliminates the packet capturing delay and thereby improves the network performance. Apart from this, the risks on network can also be reduced to improve its performance.

According to RNA technique, conducting packet analysis locally is the other step that improves the efficiency of the network. Packet capturing techniques performed by RNA technique are much different from traditional packet capturing. RNA performs transfer of packet data locally and thus there will not be any transfer of data from the internal disk array. Therefore, this technique improves the network efficiency (NetQoS, 2008). From the above it can concluded that conducting packet analysis is of advanced technique used in RNA which improves the efficiency of the network because it performs local packet transfer therefore it doesn't require any internal disk arrays.

3.1 Introduction to Java:

Java is a powerful programming language for critical applications and it is a full featured language. It is used for developing the web applications, desk top applications, mobile applications. To develop a distributed application (networking application) java provides a good platform. And it is easy to develop a program in java (Y. Daniel Liang, 2007). And it provides the security in networking. For this reason so many companies are referred this programming language to develop their applications.

3.2 Importance of Java:

Java is a general programming language with a number of features that make the language well suited for use on the World Wide Web. However there are so many languages are available to develop the applications but Java is different from those languages. Java has contained great features which are not present in other programming languages like C, C++, interpreted languages and script languages. Java is object oriented language it uses objects in programming development, it makes easier to developer.. And this language contains the built in classes which are used in application (Zbigniew M. Sikora, 2003). These classes reduce the code in applications. Java supports multithreading concept that means it executes the multiple processes at a time. This concept increases the performance of the language and scalability. Java is a distributed language it works for networking also, to work with networking it contains URLs and sockets.

4.1 Evaluation and Testing:

According to BHOLA, H.S. (1999), "evaluation is a process of judging the merit or worth of something". Hence, it can be understood that evaluation is not a single instance and it is a process of planning to appraise information regarding a functionality of a system. Based on that appraisal one can make adjustments or revisions that may be needed in a literacy program.

Testing is a systematic way with combination of activities to testing the working strategies. Software testing involves both validation of verification as one element. By the verification it can be possible to ensure system functionalities that a software implements and validation used to check different set of activities that the system implements (Rafael Osso, 2000). It is always necessary to test the individual units of the program to be tested ensuring that each performs the function for which it was designed. A successful test is one that find outs all the undiscovered error. The above objects imply a dramatic change in our view point. Our objective is to design tests that systematically uncover different classes of errors and do so with a minimum amount of time and error. During the process of development of software the systematic testing of the software has been carried out (Rafael Osso, 2000).

4.2 Types of Testing:

Here we are considering three types of testing's.

They are

1. White box testing

2. Condition Testing and

3. Black box testing.

4.2.1 White Box Testing:

White box testing is called as structural, glass, clear box or opens box testing. White box testing mainly deals with the structure of the code and its internal logic. Hence it can be stated that testing done based on white box testing includes coverage of the code branches, written, paths, internal logic and statements of the code and so on (Buzzle, 2009).

4.2.2 Condition testing:

Condition testing is essentially the way that a programming language decides the uprightness of a statement. The end result is derived into binary values - 0 or 1 which is referred for True or False. The statement may have many parts to it but the end result will be binary. In this implementation there are so many if and else statements are used with group of lines but give an end result of either true or false (Guy Lecky-Thompson, 2007). Hence, it can be understood that conditional testing is used to refer the conditional statements in the programming part of the system implementation.

4.2.3 Black Box testing:

Black box testing is also called as functional testing. The name itself is telling the usage of this black box testing (William E. Lewis, 2000). Hence, it can be understood that black box testing is used for testing the functionality of each activity presented in the system.

Test Case

Condition being checked

Expected Output

Invalid Username

Incorrect Username format

Print Error Message

"Invalid username "

Invalid Password

Incorrect Password

Print Error Message

"Invalid password. Sorry your transaction failed "

Push request to server

Overload for server

Print Message

"Server Busy (100%)"

Push request to server

Essential load for the server

Print Message

"Critical (90%)"

Push request to server

Server available condition

Print Message

"Available (0%)"

4.3 Finding Analysis:

Network Monitor is a network analytical tool that monitors local area networks and provides a graphical display of network statistics with signalling messages. This tool will help for network administrators and the administrators can use these statistics to perform routine trouble shooting tasks like locating a server that is down or that is receiving an uneven number of work requests. Network Monitor displays the following types of information, while collecting information from the network's data stream (Barford, P. Kline, J. Plonka, D. and Ron, A., 2002):

This network monitoring tool uses the source address of the computer that sent a frame onto the network. This address is a unique hexadecimal or base 16 number address that is used to identify the computer on the network.

Here, destination address of the computer also can be noted which is used to receive the frames from the source (Ashok Anand, Chitra Muthukrishnan, Aditya Akella and Ramachandran Ramjee, 2005).

Protocols have been used for sending and receiving frames in the network.

As a testing the frame sent with the portion of the message without sending full text of the message and based on some condition that portion will be sent to server (Barford, P. Kline, J. Plonka, D. and Ron, A., 2002).

This total process of collecting network monitoring information is called as network capturing. This is another functionality of the network monitoring tool where by default it gathers statistics on all the frames on the network into a capture buffer. A capture buffer is a reserved storage area in memory. A capture filter is used to capture statistics on only a specific subset of frames. After finishing the capturing of information the administrator needs to design a display filter to specify how much of the information that this process captured. This total information is displayed in Network Monitor's Frame Viewer window which is called as web load tester window (Vicka Corey, Charles Peterman, Sybil Shearin, Michael S.Greenberg and James Van Bokkelen, 2002).

These are some of the findings in analysing the network traffic monitoring tool:

To use Network Monitor, a computer must have a network card that supports licentious mode.

If the administrator is using this network monitor tool on a remote machine then there is no need to have a separate network adapter card that supports fixed mode. But the remote computer should have that network adapter card by differencing from current workstation (SupportMicrosoft, 2007).

The administrator can easily understand the signalling messages of the network load tester because of its rich graphical representation.

A network report manager is there in between the server and network administrator to control the transmission of requests from the users.

4.5 Conclusion:

Traffic issues are occurs due to the clients access same website at the same time. So it's very important for any organization to reducing the problems and increase their growth. There are several traffic monitoring tools are available for website but are unable to work effectively for measuring the network traffic and leads to network issues. Now here this research presented a network management tool for websites to overcome the problems raised in networks when more number of people tries to access at a time. Hence from above all it can be understood that, this research critically evaluates the Heavy Traffic issues for a website and also proposing a GUI based Network Monitoring Tool as a solution for the Heavy Traffic issues. The implementation of Traffic Management Algorithm is used by clustering and frame based algorithm. So, this proposed network traffic management tool can help in managing a website without network traffic and smooth access for the customers.

Project Plan:


TASK 1 - Preparing Literature Review.

TASK 2 - Detailed study about java.

TASK 3 - Algorithm for network management using java.

TASK 4 - Statement of results.

TASK 5 - Writing up the report.