Open Access Open Access  Restricted Access Subscription Access

Discovery and Diminution of Variance between Actual and Expected Outsourced Bandwidth Supply in Corporate Network Infrastructure


Affiliations
1 School of Informatics and Innovative Systems, Jaramogi Oginga Odinga University of Science and Technology, P. O. Box 210- 40601, Bondo, Kenya
 

How much money do you constantly pay to your internet service provider (ISP) for provision of internet services to your organization? How sure are you that you are always receiving the service as per the agreement? The two questions require deeper thought before giving the correct answer since the unfortunate reality is that there are many service contracts or service level agreements that organizations sign with ISPs that are never honored by the ISPs but the clients continue paying for sub-optimal services offered throughout the life of the contract most of which span one year and beyond. The researcher conducted a study, to investigate whether the ISPs of the University were actually constantly providing the quantity of bandwidth subscribed as per the service contract. The unsettling reality was that on various occasions, the ISPs reneged on the contracts by supplying less that subscribed bandwidth. However, when this was discovered by the client and reported to the ISPs, they owned up since there was overwhelming evidence. One ISP even committed to provision more than double the bandwidth for three months in lieu of the lost bandwidth in order to avoid litigation and to safeguard the business. Other factors that were discovered to affect the internet bandwidth availability were link stability and DoS attacks targeting DNS and gateway IP addresses. It was concluded that a client should always deploy tools to help monitor and report on bandwidth quantity supplied vis a vis subscribed bandwidth.

Keywords

Internet, Network, bandwidth, ISP, SLA, Contract.
User
Notifications
Font Size

  • Tanenbaum, A. S. (2011). Computer Networks; 4th ed. Prentice-Hall, Inc: New Jersey.
  • Kalra, P. (2013); Securing E-commerce; International Journal of IT & Knowledge Management (IJITKM); Volume 7, Number 1, December 2013 pp. 75-80 (ISSN 0973-4414)
  • Vaneeta& Rani, S. (2021). A Perspective for Intrusion Detection &Prevention in Cloud Environment; Int. J. Advanced Networking and Applications, Volume: 12 Issue: 06 Pages: 47704775(2021) ISSN: 0975-0290
  • Cocca, P. (2004). SANS Institute InfoSec Reading Room: Email Security Threats. Retrieved on 17th November, 2012 from: http://www.sans.org/reading_room/whitepapers/e mail/email-security-threats_1540
  • Nweke, L. O. (2017); Using the CIA and AAA Models to Explain Cyber security Activities; PM World Journal Vol. VI, Issue XII – December 2017, retrieved on 19th April, 2018, from: www.pmworldjournal.net
  • Mir, S. Q., Dar, M., Quadri, S. M. K. & Beig, B. M. (2011); Information Availability: Components, Threats and Protection Mechanisms: Journal of Global Research in Computer Science; Volume 2, No. 3
  • Harris, S. (2013), All in One CISSP. McGrowHill: New York
  • Sattarova, F. Y. & Kim, T. (2007); IT Security Review: Privacy, Protection, Access Control, Assurance and System Security; International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, April, 2007
  • Stallings, W. (2011). Network Security Essentials: Applications and Standards, 4th Ed; Pearson Education, Inc: Prentice Hall
  • Laudon, K. C. &Laudon, J. P. (2012). Management Information Systems: Managing the Digital Firm, 12th ed. Pearson Education Limited: Edinburgh Gate, Harlow.
  • Orzach, Y. (2013), Network Analysis using Wireshark Cookbook; PackT Publishing: Birmingham-Mumbai
  • Abuonji, P., Rodrigues A. J. &Raburu, O. G (2018); A Stratified Cyber Security Vigilance Model: An Augmentation of Risk-Based Information System Security; Transactions on Networks and Communications; Society for Science and Education, UK; Vol. 6, Issue 5, ISSN: 2054-7420
  • Mugenda, A.G. (2008), Social Science Research: Theory and Principles. Acts Press, Nairobi.
  • Kothari, C. R. &Garg, G. (2014): Research methodology: Methods and techniques. New Delhi: New Age International (P) Ltd, Publishers.
  • Nzioki, P.M., Kimeli, S. K., Abudho, M. R., Nthiwa, J. M. (2013): Management of working capital and its effects on profitability of manufacturing companies listed at NSE, Kenya: International Journal of Business and Financial Management Research, 1:35-42.
  • Farooq, U. (2013), Types of Research Design. Referred Academic Journal, 08:21
  • Kayalvizhi, E. & Gopalakrishnan, B., (2021), Adaptive Resource Optimization for Cognitive Radio Networks; Int. J. Advanced Networking and Applications Volume: 12 Issue: 06 Pages: 4793-4799(2021) ISSN: 0975-0290

Abstract Views: 200

PDF Views: 1




  • Discovery and Diminution of Variance between Actual and Expected Outsourced Bandwidth Supply in Corporate Network Infrastructure

Abstract Views: 200  |  PDF Views: 1

Authors

Abuonji Paul
School of Informatics and Innovative Systems, Jaramogi Oginga Odinga University of Science and Technology, P. O. Box 210- 40601, Bondo, Kenya

Abstract


How much money do you constantly pay to your internet service provider (ISP) for provision of internet services to your organization? How sure are you that you are always receiving the service as per the agreement? The two questions require deeper thought before giving the correct answer since the unfortunate reality is that there are many service contracts or service level agreements that organizations sign with ISPs that are never honored by the ISPs but the clients continue paying for sub-optimal services offered throughout the life of the contract most of which span one year and beyond. The researcher conducted a study, to investigate whether the ISPs of the University were actually constantly providing the quantity of bandwidth subscribed as per the service contract. The unsettling reality was that on various occasions, the ISPs reneged on the contracts by supplying less that subscribed bandwidth. However, when this was discovered by the client and reported to the ISPs, they owned up since there was overwhelming evidence. One ISP even committed to provision more than double the bandwidth for three months in lieu of the lost bandwidth in order to avoid litigation and to safeguard the business. Other factors that were discovered to affect the internet bandwidth availability were link stability and DoS attacks targeting DNS and gateway IP addresses. It was concluded that a client should always deploy tools to help monitor and report on bandwidth quantity supplied vis a vis subscribed bandwidth.

Keywords


Internet, Network, bandwidth, ISP, SLA, Contract.

References