Bandwidth Management

Published on February 2017 | Categories: Documents | Downloads: 29 | Comments: 0 | Views: 259
of 15
Download PDF   Embed   Report

Comments

Content

 

International Journal of Education and Development using Information and Communication Technology (IJEDICT), 2012, (IJEDICT),  2012, Vol. 8, Issue 2, pp. 62-76.

Bandwidth management in universities in Zimbabwe: Towards a responsible user base through effective policy implementation Lockias Chitanana Midlands State University, Zimbabwe ABSTRACT This research was undertaken to investigate the issue of how to maximise or make efficient use of bandwidth. In particular, the research sought to find out about what universities in Zimbabwe are doing to manage their bandwidth. It was, therefore, appropriate to survey a sample of five universities and to catalogue their experiences. Results show that most universities in our sample did not have an official Acceptance Use Policy (AUP) to assist with bandwidth management. Successful provision of managed network bandwidth within a university is likely to involve the application of many tools encompassing a number of different techniques. These products are often expensive and are rarely available for loan. Fortunately, a cost-effective solution exists for all universities that can be deployed regardless of the campus' existing network configuration or installed devices. The authors recommend that using Quality of Service (QoS) and Bandwidth management will enable network administrators to control network traffic flow so that appropriate users and applications get priority during the allocation of network resources. Also, universities must contain in their IT policies a meaningful AUP which will help universities to develop and refine usage and access as well as plan for network resource allocation. Keywords: Bandwidth Management, Acceptable Use Policy, Policy implementation

BACKGROUND TO THE PROBLEM Universities in Zimbabwe are under pressure to provide their students and lecturers with reliable Internet access. As Internet connectivity is increasingly becoming a strategic resource for university education, a robust campus network with good connectivity to the Internet is no longer a luxury to a university, in actual fact, it is now a basic necessity. Internet connectivity is critical for any university to participate effectively in the global knowledge society. The use of the Internet can enhance the efficiency and capacity of universities in Zimbabwe to provide quality education and the conduct of high calibre research work. Internet connectivity provides a gateway to vast amounts of information the information highway and thus provides support andset enhances research efforts by both from students and lecturers. Many universities in Zimbabwe have aside a significant fraction of their budgets towards increasing their bandwidth and upgrading their networks.(Chitanana, Makaza and Madzima 2008). Despite considerable investment in bandwidth, many of these universities are still finding themselves not having reliable, usable Internet access for their students and staff. The demand for bandwidth within universities is constantly rising and the overall bandwidth usage continues its upward trend. This demand is caused by, among other things, increased student enrolment, the increased use of electronic resources for teaching and learning, and the spread of desktop applications that can use practically any amount of bandwidth given to them. A definite trend is continuing towards multimedia websites, which contain bandwidth-hungry images, video, animations, and interactive content. Students use the Internet in many different ways, some of which are inappropriate or do not make the best use of the available bandwidth. Not all of these activities could be described as having much academic worth and indeed some may be viewed as undesirable by any standards. Bandwidth is often consumed by low priority, bandwidth hungry

 

Bandwidth management in universities in Zimbabwe

63 

uses for non-educational purposes. However, restricting this altogether may not be the solution since this leads to frustration on the part of the user.  As the popularity and usage of heavy bandwidth consuming applications grows and the number of network users multiplies, the need for a concerted and co-ordinated effort to monitor bandwidth utilisation and implementation of effective bandwidth management strategies becomes increasingly important to ensure excellent service provision. The absence of a bandwidthmanagement strategy will leave a university’s network at risk of being hopelessly bogged down, to the point where users are denied access to this valuable resource. Even in situations where high amounts of bandwidth are available, controls, monitoring and optimization are necessary because users will always find ways to fill the available amount of bandwidth. Since bandwidth is a strategic resource, the efficient usage and management of such a resource should always be a priority. Without bandwidth management, mission critical applications would be starved of bandwidth, disrupting services that impact the operational activities of a university.  As such, this study sought to illuminate the bandwidth management strategies that were being employed by universities in Zimbabwe. The research concentrated on policy based bandwidth management strategies.

THE PROBLEM The demand for bandwidth within Universities in Zimbabwe is on a constant rise. The available bandwidth is generally not enough to meet demands and to support optimal usage. If universities are to participate in high-end quality research, they must invest in substantially more bandwidth. However, the TERENA compendium (2007) notes that the current level of planned bandwidth increase reported for the next five years is not enough for universities in Africa. Universities are faced with a major challenge in their use of the Internet. The major challenges experienced by universities are: • Students' overuse of undesired applications. • Copyright violations due to peer–to-peer (P2P) file sharing. • Poor application performance and Quality of Experience (QoE) during congestion. Increased student enrolments and shifting patterns of Internet access and usage continue to generate resource and administrative challenges for many universities in developing countries.  Apart from the limited bandwidth, the improper use of existing connectivity is a major challenge. Inappropriate use of existing bandwidth, due to absence of bandwidth management strategies promotes bandwidth wastage unwanted such asaccess viruses,exposes music and download by some users  users   (Oyewole, 2009).onThe largely traffic unrestricted themovie university Internet connectivity to bandwidth-hogging applications such as peer-to-peer (P2P) file sharing and media streaming. Audio and video streaming applications embedded in Web sites like YouTube have grown in popularity among students. Although universities may increase their Internet capacity by purchasing additional bandwidth from one or more Internet Service Providers(ISPs), it is very expensive to do so because the price of bandwidth in Zimbabwe is still exorbitantly high. No matter how much more bandwidth is bought, a point will be reached when one can no longer buy more bandwidth and therefore the need to look to bandwidth management is necessary. Furthermore, increasing Internet capacity cannot be done affordably considering the rate at which unmanaged applications consume it. It is therefore the duty of the Information Technology Services (ITS) department to make sure that the available Internet facility is effectively and optimally used to support the core business of a university, that is, teaching and research. It is now recognised that one of the tasks that University ITS directors need to tackle is the management of bandwidth. Effective management of

 

64 IJEDICT bandwidth is widely recognized as being the easiest way in which universities can improve their access to networked information resources. The challenge of this problem is how to make more bandwidth available and how to manage the limited bandwidth in the best and most efficient way.  Although there are technical issues relating to bandwidth management, the biggest challenge is to raise awareness of the importance of conserving and using bandwidth responsibly by the users.

RESEARCH QUESTIONS This research sought to answer the following research questions: 1. What is the current state of Internet connectivity in universities in Zimbabwe? 2. What bandwidth management techniques are employed in universities in Zimbabwe? 3. What challenges do universities face in employing bandwidth management strategies?

SIGNIFICANCE OF THE STUDY This study was designed to access the bandwidth management strategies employed by universities in Zimbabwe and the challenges faced in the process. The results of the study should help universities to recognise that bandwidth is a valuable institutional resource that needs to be managed, conserved, and shared effectively via innovative management approaches. It is hoped that the results of the study will make university authorities realise that this effort will be greatly facilitated by the formulation and implementation of an institutional bandwidth management strategy. Managing bandwidth improves the performance of Internet connectivity by removing unnecessary traffic, making Internet much more accessible, especially for those with a very slow connection.

WHAT IS BANDWIDTH MANAGEMENT? Bandwidth management is a generic term that describes the various techniques, technologies, tools and policies employed by an organisation to enable the most efficient use of its bandwidth resources. According to Kassim, et al (2012) bandwidth management is a process of allocating bandwidth resources to critical applications on a network. Bandwidth management aims to improve performance of an Internet connection by removing unnecessary traffic. The goal of managing network capacity is to have the right amount of bandwidth in the right place at the right time for the right setthe of minimisation users and applications (Sharma, Kumarconsumption and Thakiu, and 2011). efficient use, we mean both of unnecessary bandwidth theBy delivery of the best possible levels of service to users. It may be asked what bandwidth size is adequate for a university? The answer is that, no bandwidth size can ever be enough to meet the ever increasing user demands in the absence of an effective bandwidth management strategy. In practice, even a bandwidth size of just 4 mbps, for example, can be a viable connection for an average university in Zimbabwe and a lot is possible with such connectivity. However, it requires simultaneously good content in appropriate formats, good local network management and design, good bandwidth management policy (in particular an Acceptable Use Policy), and user education to understand their responsibilities to use the scarce and expensive resource effectively (Habler  & Jackson, 2009. Bandwidth management involves the creation and enforcement of network policies to ensure fair and satisfactory network performance. It becomes the tool used to ensure enough bandwidth is available to meet the traffic needs of those mission-critical and time-sensitive applications and prevents competition between these applications and lower priority traffic for the limited network

 

Bandwidth management in universities in Zimbabwe

65 

resources. Bandwidth management has the goal to ensure the availability of Internet bandwidth to everyone.

POLICY BASED BANDWIDTH MANAGEMENT This study explored how universities in Zimbabwe manage their bandwidth with the view to see how universities might take advantage of the cost effective policy based bandwidth management strategies as a major strategy in managing this scarce resource. A network policy is a statement of opinions, intentions, actions and procedures that guide the overall use of the network to meet the organisation’s goals and objectives. Policy-based bandwidth management involves the allocation of network-based resources and services in accordance with the mission and management policies of an organisation. It is tempting to think of bandwidth management and optimisation as a technical issue requiring a technical solution. This is not always the case.  According to Gakio (2006) bandwidth management is being viewed as a set a set of tools that need to be installed, rather than a fundamental change in attitude that needs to be imparted to all stakeholders in the network. Greaves (2007) has emphasized the point that isolating bandwidth management as a purely technical IT issue will mean that any bandwidth man agent can only ever be defensive fire fighting. In actual fact components of bandwidth management may conveniently be classified into three broad categories, namely:   Techniques and technologies – these are a number of tools and techniques that help network administrators ensure that bandwidth is managed and that policy is enforced; •





   

Organisational access and management policies – known as policy-based bandwidth management; Monitoring- which employs both technical and physical physical chec check k means to help in the definition and enforcement of policy, faults diagnosis and accurate troubleshooting on the network

!"#$%& ( )**+,-./0+ 12+ !304*5 6 $7-+00+*-8.0 !93,+9-5 !304*5:

K">$;"L$>B (03G M374-3947G6 -9.E*6 M374-3947G 82+9 .8-F+7I*.I376 ,304*5 N+H74I37 +7O39*+M+7:

;<%=>$?1<@ )>A ;<%=>"#"B& (C49+D.0026 -9.E* 2F.,47G6 H0-+947G6 *.*F47G6 .7IJ4982+2:

Figure 1: The Critical interdependent components of bandwidth management

 

66 IJEDICT It should be noted that policy is an essential component of any bandwidth management strategy. Without it, technical solutions will be difficult to implement and much less effective. Policies are essential in that they provide the framework for defining how a network is to be used and detail how technical solutions should be implemented. Without a policy, users will not understand what we are doing or why, and will complain or subvert our actions instead of helping us to achieve our goal. Policy-based management allows a University to control which network services and resources are available to its users in accordance with its IT strategy. From a policy, an AUP should be developed. The AUP should be a written document that defines acceptable forms of network access, as well as guidelines for how network problems are dealt with, definitions of abuse, and other operational details. The AUP should also include definitions of legal constraints for network users, for example, the exchange of copyrighted material, requesting inappropriate materials, etc. Having a policy makes it much easier to enforce certain types of network behaviour as it will be possible to hold people to a set of agreed rules. These policy rules should then be configured into the various network resources, that is, the actual devices that then implement and enforce the rules. To sum up the discussion, bandwidth management requires three activities, namely policy, monitoring and implementation of technical solutions. If anyone of these is missing, then, the management of bandwidth is significantly compromised. These activities inform and enforce each other (Rosenberg 2008). Improving the performance of the information delivery chain is urgent if faculty and students are to benefit from the Internet and take part in the international academic community (Rosenberg 2005). No amount of bandwidth is enough to satisfy the demands of an unrestricted user community (Sharma, Kumar & Thakiu 2011). It is therefore critical that bandwidth usage policy stipulates a number of rules that define how bandwidth is to be allocated and prioritised in view of the critical areas of the university’s core business. A university wide network access and management policy is needed to help the ITS staff monitor and control the level   of traffic that passes down a communications link. Ensuring that bandwidth is available for level students and faculty requires policy and commitment from all stakeholders. This study point to the need for universities to recognise the fact that bandwidth is a valuable institutional resource that needs to be managed, conserved and shared as effectively as possible. Instead of simply extending computers and network infrastructure or finding cheaper Internet Service Providers (ISPs), this study proposes an approach to bandwidth management that put emphasis on ways to control and manage the many noncritical bandwidth hungry Internet applications, uses and practices that consume bandwidth. Although such an approach recognises the technical requirements regarding network configurations, its emphasis is on suitable policies and guidelines which encourage proper bandwidth saving behaviour among the users. The strategies should be employed to ensure that high priority applications are carried out as efficiently as possible for the institution to achieve its set targets. METHODOLOGY In order to meet the study’s objectives, a mixed methods approach was used to gather relevant data. The targeted respondents were personnel from the Information Technology Services department, Computer Centers or other related departments. Principal authorities, including Vice Chancellors, Librarians and Registrars, were also targeted to provide data on ICT governance and policy issues. The targeted universities were selected based on their size and importance.  A two-pronged approach of self-administration of emailed questionnaire and phone interviews were used to gather the relevant data. The questionnaire was sent to the respondents via e-mail. To maximize response rates, several follow-ups on phone calls were made to remind and encourage respondents to complete and return the questionnaire. The questionnaire incorporated a series of questions about campus infrastructure, including the number of computers that were

 

Bandwidth management in universities in Zimbabwe

67 

networked or connected to the Internet, bandwidth management strategies used and the challenges faced. In some institutions the process of completing the questionnaire required a number of formal processes to be carried out, thus hampering the response rate and increasing the turnaround time. Telephone interviews were conducted with four ITS directors, one Vice Chancellor, two Registrars and three Librarians from the four sampled state universities in Zimbabwe.with permission from the interviewees the interviews were recorded to ensure accurate transcription.

RESULTS The status of Internet access in Universities in Zimbabwe The state of Internet connectivity at the selected universities can be summarized by three characteristics: too little, too expensive and poorly managed. Access to the Internet was provided to all students and staff via laboratories in various locations in the universities, which included computer laboratories, computer centres and libraries. In addition 3 0ut of the 4 universities had a campus wide wireless network. Network services offered included, Internet surfing, accessing electronic databases and journals, e-learning, personal e-mail and file sharing. Students were not charged for Internet access to services such as e-mail, library services and e-learning. It was also noted that students at all the universities would logon to the networks using a generic username and password to accesses network resources. On some computers, users were not required to logon in order to access network resources. In such a situation it is not possible to identify a user who has a habit of abusing Internet resources. There were large differences in levels of computer access among the institutions. The highest number of users per computer was 10. The average across the sample was 6.8 users per computer, with 3.5 users per networked computer as the university that had the best ICT resources. However, this is still a high ratio compared to the average students per networked computer ratio of USA institutions, which is thought to be about 3 per computer ( Education Education Week’s  2010), and with plans to reach 1:1 by 2012. Week’s

Table 1: Current Internet connectivity status

Network Service

University A

B

C

D

1450

1000

400

450

12 000

3 500

2 560

Size of Bandwidth

28 Mbps

22 Mbps

1 Mbps (256 kbps)

5 Mbps

Type of Internet Link

Fibre Optics

Fibre Optics

VSat Leased Line

Radio/Fibre Optic

No. of Networked PCs No. of Users

4 500

 

68 IJEDICT The highest bandwidth reported for the sample was 28 Mbps (both upstream and downstream), roughly equivalent to a low-end broadband residential connection in North America or Europe. However, this was above the minimum 10 Mbps by year 2008 as recommended to all African Vice Chancellors in 2007 (SARUA 2006). The 3 out of the 4 universities used fibre optics for their Internet connectivity. It was disheartening to note that one of the universities was still using a dailup connection for Internet connectivity. Institutions with fibre connection tended to have the highest connectivity, while those with a dial up connections have the lowest capacity. Table 1 summarises the Internet connectivity situation at the four universities.

Bandwidth Utilisation Pattern Bandwidth utilisation pattern for one of the universities (A) indicated that the university working hours start from 8:00 am to 10:00pm. Bandwidth utilisation during this period was almost 100% as indicated in figure 2 and 3 below. It was also noted that bandwidth availability was fairly good at all the universities, for example as indicated in figure 2 and 3 there were only very short spaces of time when connectivity was disrupted. This was observed to be the short time during the change over from normal electrical power to generator. At all the universities standby generators were in place to curb the electricity power cuts which were experienced in the country. Figures 2 and 3 show the bandwidth utilisation pattern at one of the universities.

Traffic IN Traffic OUT Figure 2: Bandwith utilisation graph

 

Bandwidth management in universities in Zimbabwe

69 

Traffic IN Traffic OUT Figure 3: Bandwith utilisation graph

Bandwidth Management Strategies Employed The data collected show that there was a limited range of bandwidth management techniques employed by universities in Zimbabwe. The ITS directors (2 out of 4) who indicated that they practiced bandwidth management reported that they used the following techniques to manage their bandwidth:   Web caching   Web access controls   Port and application blocking   Use of monitoring and reporting tools  tools    Use of antivirus   Use of spam filters •











One of the ITS directors indicated that they used the following the following strategies to control and monitor the levels of unwanted traffic on their network:   limiting access to certain users   limiting access to certain Web sites   limiting access to certain file types or materials !

!

!

The data collected show that universities were not taking bandwidth management seriously. This was evidenced by the lack of a bandwidth management policy at all the universities. Only two ITS directors pointed out that they were still at the planning stage of bandwidth management policy and draft copies of the policy were in place but implementation had not taken off the ground. Three out of the four ITS directors reported that they did not have staff with knowledge and skills to practice bandwidth management, in addition to the lack of relevant technologies to implement effective bandwidth management strategies. All the ITS directors indicated that technical solutions to bandwidth management were fur beyond the reach of their cash stricken institutions. These were reported to be very expensive and unavailable on the local market. With regards to  AUP, all the four f our universities uni versities had no written down poli policy cy document to govern tthe he use of network resources. There was not any type of agreement signed between the users and university that they had to follow any policy guidelines, rules and restrictions. It was therefore difficult to institute any restrictions and legal action against network abusers. Only one university reported the existence of a policy on Free and Open Source Software (FOSS) which they said had helped to eliminate unwanted traffic introduced through viruses for example. The results are summarised in table 2.

 

70 IJEDICT

Table 2 : ICT Policies and Plans breakdown

Type of Policy/ Plan ICT Committee ICT strategic plan  ICT policy  AUP Bandwidth Management Policy Policy on Use of FOSS 

A Present  Present  Not Present  Not Present 

B Present  Present  Not Present  Not Present 

C Present  Present  Not Present  Not Present 

D Present  Present  Not Present  Not Present 

Present 

Not Present  Not Present  Not Present 

Not Present  Not Present  Not Present  Not Present 

 Although two IT directors indicated that they monitored their bandwidth, none of them could provide basic usage figures, indicating that monitoring was sporadic. Observations were that current bandwidth use reached saturation levels during normal working hours, but traffic was reduced at night and during weekends (see figure 2 and 3).

Challenges of Bandwidth Management Universities in Zimbabwe were faced with major obstacles in their use of networked information resources. reported by high all the respondents, fromwhich both questionnaires and interviews, The was major that ofchallenge a disproportionately cost of bandwidth, made it practically difficult for universities to significantly expand their Internet bandwidth.  All the respondents to the questionnaire concurred that the following were their day to day challenges in the utilisation of bandwidth;   Too many users on the network   Viruses   Uncontrolled downloads   Unreliable Internet service provider   Higher demand compared to available bandwidth   Different user bandwidth requirements   Technical breakdowns breakdowns     Lack of administrative support  support  •

• •











 At university A, where there was a deliberate policy to use open source solutions, the ITS director pointed out that there was a general user resistance in using open source software and other low bandwidth utilising technologies. The director also pointed out that another challenge at university level is presented by IT savvy students especially those who specialise in computer related areas who always find some solutions to bypass any restrictions that may be imposed by technical solutions. All the ITS directors concurred that use of bandwidth hungry applications such as streaming audio/video application, social media, etc. was high among the student population.

DISCUSSION  A university Internet connection is intended to provide a technology resource for the university community of scholarship for use in the pursuit of the mission of the university. It is an expensive resource and its utilization must be managed in such a way that it is appropriately used to support the academic activities of the university community. The main challenge relating to bandwidth management in universities in Zimbabwe is lack of awareness of the need to mange bandwidth.

 

Bandwidth management in universities in Zimbabwe

71 

There is relatively little appreciation and understanding about the importance of managing bandwidth for the health of the institution. With a congested network, access to Internet resources for which the university pays is rendered ineffective, with the result that the investment in the university is not used as efficiently as it should. INASP(2003) notes that to optimise Internet bandwidth universities must recognize that bandwidth is a valuable institutional resource or asset that needs to be managed, conserved, and shared as effectively as possible and that the institutions’ management must make bandwidth management a priority. The growing demands for Internet resources over a limited and expensive bandwidth demand that universities in Zimbabwe develop strategic controls to build a manageable network. However, the results of this study show that there is limited bandwidth management activities carried out at the selected universities in Zimbabwe. Lack of bandwidth management and monitoring usually allows a minority to consume the majority of an institution's bandwidth. A minority group of knowledgeable users who usually ignore voluntary guidelines will use a disproportionate share of the university’s Internet connection if they are not controlled. Although some universities were employing spam filters together with antivirus software and vulnerability scanning for incoming files as bandwidth management solutions, results of the study show that these strategies are not effectively solving the problem of slow Internet connectivity in universities.  As reported by ITS directors, technical solutions to bandwidth management are beyond the reach of universities in Zimbabwe, making the establishment of a responsible user base through education and enforcement of Acceptable Use Policies (AUP) the focus of universities in Zimbabwe. In fact, this is more practical considering the fact that much of what is called bandwidth management has to do with managing people and changing their netiquette. Literature has shown that although policy may ban or discourage a certain type of Internet usage, in practice it can be difficult to completely enforce that policy purely by Quality of Service means (ATICS 2006, Moll 2005, Greaves 2005). For example, an institution may have a policy of limiting the use of file sharing, but determined users can channel file sharing over other protocols such as HTTP, which is difficult to detect. Technical solutions will not be effective on their own. Greaves (2005) emphasises the point that isolating bandwidth management as a purely technical exercise will mean that bandwidth management will become a defensive firefighting strategy. Effective bandwidth management can only happen by applying a combination of technical computer skills, effective network monitoring, and a sensible policy that is understood by all users (Flickenger, Belcher, Canessa & Zennaro 2006). This study argues that the fundamental step towards effective bandwidth management is achieved by managing user’s net behavior. For example, this study has established that Internet is not used during the night and weekends, users may take advantage of such times to download large files. Downloads which been identified as a major minimized if users are educated that turning offhave the automatic downloading of challenge images inmay theirbebrowser makes the pages load much faster, that opening two browser windows and reading one page while the next downloads makes them more productive. In this situation, user education is far more productive than technical solutions. According to Flickenger, Belcher, Canessa and Zennaro (2006) user education is critical to every stage of implementing a plan to manage bandwidth. They observe that while users can be forced to adhere to certain behaviour patterns, it is always far easier to implement a plan with their voluntary compliance. The challenge is how to bring such a plan into being. Nevertheless, the big lesson learned from Carnegie Mellon University was that users were willing to change their behaviour, and that without their cooperation, technical solutions alone could not solve the problem. However, it is noted that if we simply order people to change their behaviour, little is likely to change and that when we install technical hurdles to try to force them to change; they will simply find a way around the obstacles. It can therefore be concluded that it is worth the effort to work with users to manage the bandwidth at an institution like a university.

 

72 IJEDICT The biggest challenge is to raise awareness of the importance of managing bandwidth. The lack of awareness is reflected in the relatively low adoption of AUP in universities. What makes the situation at the four universities worse is the fact that there was no written down policy to govern the use of the Internet at each of them. Without policy it is impossible to manage key aspects of bandwidth use. Policy is an enabling element of higher education management, some things are denied in order to make other things possible. Nevertheless, there is no out-the-box one-size-fitsall solution. Each institution will have to develop policy, enforcement and communication strategies that fit its unique circumstances. It must therefore be recognised that without an agreed AUP, for example, no amount of bandwidth will ever be enough to satisfy the demands of an unrestricted user community. The first step towards creating a responsible user base is by having a sensible AUP to which users can subscribe. All stakeholders, especially the users, need to understand and appreciate the need to conserve and bandwidth in order to improve on the speed of Internet access at their institution. Effective bandwidth management is only possible with support from all stakeholders, especially the users, network administrators and university principal management. Furthermore, senior management has to provide leadership and strategic direction that create a supportive environment for the enforcement of policy requirements. The challenge to bandwidth management is further worsened by the fact that lack of monitoring was shown to be a consistent problem during the research into bandwidth management. Monitoring is important for defining and enforcing policy. Network managers should continuously monitor network traffic and users’ behavior both technically and physically as well as analyzing web applications that eat valuable bandwidth. Before an institution can decide how to address the problem of reducing bandwidth demands, it is important to be aware of how bandwidth is being consumed at the moment. Without monitoring, IT staff will not have a good understanding of the traffic on their networks and will not be able to identify the root cause of many Internet connectivity problems. Network monitoring informs the process of creating an enforceable policy that reflects the actual needs of the user group. At all the 4 universities it is only possible to get the bandwidth usage history per IP address since users did not logon to the network using a unique user identity and password in order to access network resources. Authentication and user identification is not possible. This scenario results in a situation where it is difficult to identify users who abuse bandwidth and other network resources. Furthermore, it i t was also noted that ITS staff at the four universities had no mandate from their institutions that would allow them to employ bandwidth management strategies that would prioritise academic usage of the Internet. Challenges: The universities’ dilemma While network monitoring for bandwidth management is appropriate, monitoring of individuals' activities does not comport with higher education values. In a university setting, we are expected to provide a lot of freedom in what we allow on the network, permitting the broadest possibility of network traffic without opening the network to compromise. This is a slippery slope! While network monitoring is appropriate for certain purposes such as security and bandwidth management, the surveillance of individuals' Internet communications implicates important rights, and raises questions about the appropriate role of higher education institutions in policing private behaviour. As noted in the Sweezy v. New Hampshire, Hampshire, case in O’Nei (2008) teachers and students must always remain free to inquire, to study and to evaluate, to gain new maturity and understanding; otherwise our civilization will stagnate and die. Monitoring the content of communications is fundamentally incompatible with the mission of educational institutions to foster critical thinking and exploration (The Electronic Privacy Information Center (EPIC), 2002). EPIC (2002) argues that monitoring will stifle the creative spirit which is very critical on student learning. Furthermore, EPIC (2002) observes that monitoring irritates the learners and can stifle creativity that must thrive in educational settings. Because individuals at institutions of higher

 

Bandwidth management in universities in Zimbabwe

73 

learning must always remain free to inquire, colleges and universities are not the place for technological restrictions on communication. Institutions of higher education should not practice content monitoring, an approach that the controlled environments of corporate workplaces and kindergartens have adopted.  All stakeholders of any university, including students, must be involved in a process that recognizes the legitimate concerns of the need to use bandwidth wisely without unduly hindering academic freedom, privacy, and fair use rights. As Rezmierski and Soules (2000) have noted, for a policy to be effective in guiding university community behaviours, it needs to reflect the full range of the community's values. The policy must be understood and embraced by all the community members, and must reinforce the most important values and the mission of the institution as a whole. An effective policy requires campus-wide discussion and the involvement of each of the major constituencies of the community.

CONCLUSIONS AND RECOMMENDATIONS Lack of appropriate bandwidth management is preventing the productive use of the Internet at the universities, which in turn yields to low quality academic and research work. Managing bandwidth to provide quality of services for university mission critical applications is important since it is not practical to meet the increased demand for bandwidth by simply buying more. In the ideal world with informed and technically competent users who are motivated by enlightened self-interest, we would be able to leave users to manage their own traffic, in the spirit of the free and open philosophy upon which the Internet was founded. Nevertheless, the problem is that when we do not manage traffic, the result is that a considerable amount of bandwidth will be used for things that are not related to the mission of the university. However, It is sad to note that although it is common knowledge that an effective strategy for bandwidth management is a key feature to increasing bandwidth availability for research and education purposes, the majority of universities in Zimbabwe take very little or no actions to manage their bandwidth usage. The results of this study have demonstrated that more awareness education on bandwidth management is needed for uuniversities to make it a priority. Increasing bandwidth without adequate network management is wasteful and reduces its value. The absence of effective bandwidth management strategies poses serious challenges for almost all universities in Zimbabwe. It should be noted that increasing the size of bandwidth and the provision of technical tools alone is not sufficient for effective bandwidth management. There is now an increased need for IT directors and university administrators to balance increased bandwidth access demands with investment in bandwidth management Therebandwidth is therefore urgent need solutions. for Universities in Zimbabwe to proactively implementstrategies. policy based management Most importantly, the university’s policy needs to be understood and enforced. The policy must be enforced, and violations must have real consequences. This should be done via existing channels for staff and student discipline, so that it is given the same weight as other infringements of rules. The idea however is not to set rules and regulation that will inhibit the productive use of the Internet . These bandwidth management strategies should be designed to ensure that university campuses have adequate bandwidth to meet their educational and research requirements. The motive of any university’s bandwidth management strategy should be to optimize use of shared resources amicably between users rather than impose restrictions. Network managers should also note that although policy is a key tool in the effort to keep the Internet free and fast, even the best policy has no value unless it is communicated and enforced. There is need to have a well coordinated system among all stakeholders, university management, IT staff, researchers and students to ensure that there is a common understanding of the need to adhere to best practices of Internet usage. The policy development process must be consultative

 

74 IJEDICT supported and led from the top. Stakeholders must agree on which services will receive high priority and which will receive low priority or be discarded. This should be done using university committee systems and governance groups comprising of students, faculty members, ITS staff and university administrators, to discuss bandwidth management alternatives and set policy.  As such the study recommends the following: follow ing: •

 



The formulation of a university wide IT policy, which will provide guidance on user access and usage policy. The policy should be used to determine and govern issues such as: 1. monitoring Internet use and and enforcing the appropriate use of the Internet 2. use of the Internet by those employees that do not require it for their work 3. downloading and installation of “Internet enhancing” software 4. keeping all campus computers free of virus and spam   Awareness education programmes should be used to address issues such as; 1. encouraging positive behaviour from users, 2. encouraging appropriate use, the importance of using antivirus software, software, 3. establishing rules and securing agreements as to what constitutes appropriate use use of the Internet bandwidth, 4. informing us users ers about appropriate use policies and 5. providing training to users as to how to effectively use the Internet and conserve bandwidth

 A policy must be continually communicated to stakeholders in a meaningful way, especially as many stakeholders will not be familiar with the technical jargon that such a policy will inevitably contain. Communication will also require ongoing attention, since each year brings a new cohort of students. The education programme should focus on talking with users about fairness, why all users need adequate bandwidth to do their research, the impact of bandwidth consumption on the cost of tuition and the need for accountability in the use of the Internet . The overall aim of the user education program should focus on the net gains for the campus community of using bandwidth responsibly, the importance of adherence to best practices and good behaviour when using the Internet .

REFERENCES  ATICS 2006 report, viewed 20 May M ay 2011 < http://aau.org/renu/ http://aau.org/renu/docs/ATICS2006.pdf> docs/ATICS2006.pdf>  Adam, L. 2007, Campus, National Nati onal and Regional Research and Education Networks: Net works: Policy, Regulatory, Infrastructure Process Issues, presentation made at AAU Vice Chancellors Conference, 24 October 2007 in Tripoli, Libya Bandwidth Management Position Paper, 2007, Aptivate, viewed 12 December 2010 <http://www.aptivate.org/attach/Projects.BMOPositionPaper/AptivateBMOPositionPaper. pdf > Chitanana L, Makaza D, Madzima K 2008, The current state of e-learning at universities in Zimbabwe: Opportunities and challenges, International Journal of Education and Development Using ICT , 4(2) pp 1-12. Electronic Privacy Information Center, 2002, A letter to the University President Online, viewed 24 June 2011 <http://epic.org/privacy/student/p2pletter.html>

 

Bandwidth management in universities in Zimbabwe

75 

Flickenger R, Belcher M, Canessa E, & Zennaro M 2006, How To Accelerate Your Internet: A practical guide to Bandwidth Management and Optimisation using Open Source Software. Oxford Haßler B & Jackson A M 2010, Bridging the Bandwidth Gap: Open Educational Resources and the Digital Divide, IEEE Transactions on Learning Technologies viewed , <http://doi.ieeecomputersociety.org/10.1109/TLT.2010> INASP/ICTP BMO Book Sprint Team, viewed on 24 June 2012 <http://bwmo.net/pdf/bwmoebook.pdf > INASP 2003, Optimising Internet Bandwidth in Developing Country Higher Education, infobrief, viewed 1 July 2003, <http://www.inasp.info/file/106/infobrief-1-optimising-Internet bandwidth-in-developing-country-higher-education.html > Letter from David Ward, President, American Council on Education, to College and University Presidents viewed 9 October 2011 < http://www.riaa.com/pdf/Copyrightletter.pdf>. Moll, P 2005, A response to “A pedagogical and economic critique of student charges for Internet access”. International Journal of Education and Development using Information and Communication Technology , (1) 2, 125-129. O’Neil, R 2008, Academic Freedom in the Wired World, World , Cambridge, MA: Harvard University Press Oyewole, O 2009, Research and Information Technology Connectivity - Opportunities for Innovation and Issues for Africa, , UNESCO Forum on Higher Education, Research and Knowledge Workshop on Research in Diverse Social Contexts: Tensions, Dynamics and Challenges, UNESCO, Paris. Rezmierski, V & Soules, A 2000, "Security vs. Anonymity: The Debate over User Authentication and Information Access." EDUCAUSE Review  35  35 (March/April 2000): 22-30, viewed 8 June 2012, < http://www.educause.edu/ir/library/pdf/ERM0022.pdf >. Robert A, Fleck, J & McQueen, T 1999, Internet Access, Usage, and Policies in Colleges and Universities by First Monday, Vol. Monday, Vol. 4, (11) viewed on 8 June 2012, <http://firstmonday.org/issues/issue4_11/fleck/index.html > Rosen, H 2002, A Letter to College and University Presidents, viewed 3 October, 2011t <http://www.riaa.com/pdf/Universityletter.pdf >. Rosenberg, D 2008, Evaluating Electronic Resource Programmes and Provision: Case Studies from Africa and Asia, INASP Research and Education Case Studies, 3 (Oxford: INASP), viewed on 8 June 2011 www.inasp.info/file/c85e1f2bd439dd5aa2c350814e81c4cf/evaluating-electronic-resourceprogrammes-and-provision-case-studies-from-africa-and-asia.html Rosenberg, D. (2005) Towards the Digital Library: Findings of an investigation to establish the current status of university libraries in Africa (Oxford: INASP) www.inasp.info/uploaded/documents/digital-libr-final-format-web.pdf SARUA 2008, ICT: A Status Review of ICT in Universities in the SADC Region (Johannesburg: SARUA) , viewed 24 June 2012

 

76 IJEDICT <www.sarua.org/files/publications/OpeningAccess/Opening_Access_Knowledge_2008.p df >  >  Sharma V, Kumar, V & Thakiu, BS 2011, Need of Bandwidth management and formulation of policy framework for Effective utilisation of Internet services within a University campus. International Journal of Computer Science and Communication 2(1) Communication  2(1) 173-178 Steiner, R, Nyasha T, Mike J, & Gakio, K 2005 African 2005 African Tertiary Institutions Institut ions Connectivity Survey .  African Virtual University, Universit y, Nairobi, Kenya. Viewed 27 October O ctober 2011, <www.atics.info/ATICS2004Report.pdf > TERENA Compendium 2007, All European country capacities, viewed 21 February 2010 <http://www.terena.org/activities/compendium/index.php?showyear=2007 >

Copyright for articles published in this journal is retained by the authors, with first publication rights granted to the journal. By virtue of their appearance in this open access journal, articles are free to use, with proper attribution, in educational and other non-commercial settings. Original article at: http://ijedict.dec.uwi.edu//viewarticle.php?id=1432

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close