Analysis of Web Protocols Evolution on Internet Traffic
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Survey of Network Performance Monitoring Tools
A Survey of Network Performance Monitoring Tools Travis Keshav -- [email protected] Abstract In today's world of networks, it is not enough simply to have a network; assuring its optimal performance is key. This paper analyzes several facets of Network Performance Monitoring, evaluating several motivations as well as examining many commercial and public domain products. Keywords: network performance monitoring, application monitoring, flow monitoring, packet capture, sniffing, wireless networks, path analysis, bandwidth analysis, network monitoring platforms, Ethereal, Netflow, tcpdump, Wireshark, Ciscoworks Table Of Contents 1. Introduction 2. Application & Host-Based Monitoring 2.1 Basis of Application & Host-Based Monitoring 2.2 Public Domain Application & Host-Based Monitoring Tools 2.3 Commercial Application & Host-Based Monitoring Tools 3. Flow Monitoring 3.1 Basis of Flow Monitoring 3.2 Public Domain Flow Monitoring Tools 3.3 Commercial Flow Monitoring Protocols 4. Packet Capture/Sniffing 4.1 Basis of Packet Capture/Sniffing 4.2 Public Domain Packet Capture/Sniffing Tools 4.3 Commercial Packet Capture/Sniffing Tools 5. Path/Bandwidth Analysis 5.1 Basis of Path/Bandwidth Analysis 5.2 Public Domain Path/Bandwidth Analysis Tools 6. Wireless Network Monitoring 6.1 Basis of Wireless Network Monitoring 6.2 Public Domain Wireless Network Monitoring Tools 6.3 Commercial Wireless Network Monitoring Tools 7. Network Monitoring Platforms 7.1 Basis of Network Monitoring Platforms 7.2 Commercial Network Monitoring Platforms 8. Conclusion 9. References and Acronyms 1.0 Introduction http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_perf_monitors/index.html 1 of 20 In today's world of networks, it is not enough simply to have a network; assuring its optimal performance is key. -
Growth of the Internet
Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] Preliminary version, July 6, 2001 Abstract The Internet is the main cause of the recent explosion of activity in optical fiber telecommunica- tions. The high growth rates observed on the Internet, and the popular perception that growth rates were even higher, led to an upsurge in research, development, and investment in telecommunications. The telecom crash of 2000 occurred when investors realized that transmission capacity in place and under construction greatly exceeded actual traffic demand. This chapter discusses the growth of the Internet and compares it with that of other communication services. Internet traffic is growing, approximately doubling each year. There are reasonable arguments that it will continue to grow at this rate for the rest of this decade. If this happens, then in a few years, we may have a rough balance between supply and demand. Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] 1. Introduction Optical fiber communications was initially developed for the voice phone system. The feverish level of activity that we have experienced since the late 1990s, though, was caused primarily by the rapidly rising demand for Internet connectivity. The Internet has been growing at unprecedented rates. Moreover, because it is versatile and penetrates deeply into the economy, it is affecting all of society, and therefore has attracted inordinate amounts of public attention. The aim of this chapter is to summarize the current state of knowledge about the growth rates of the Internet, with special attention paid to the implications for fiber optic transmission. -
Best Practices for Network Monitoring
White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 | Tel: 818.871.1800 | Fax: 818.871.1805 | www.ixiacom.com | 915-6509-01 Rev. B, June 2013 2 Table of Contents Monitoring Challenges in Today’s Business Environment .......................................... 4 Giving Monitoring Tools Full Visibility to the Network ............................................... 5 Easing the Path to Upgrade ........................................................................................ 6 Making Monitoring Tools Work Better ........................................................................ 7 Filtering ...................................................................................................................... 7 Load Balancing ........................................................................................................... 8 Packet De-duplication ................................................................................................ 8 Packet Trimming ........................................................................................................ 8 MPLS Stripping .......................................................................................................... 9 Keeping Network Data Secure ................................................................................... 9 Improving Productivity in IT ....................................................................................... 9 Filter Libraries -
Large Scale Monitoring of Home Routers
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 21-23 September 2009, Rende (Cosenza), Italy Large scale monitoring of home routers S. Costas-Rodr´ıguez+,R.Mart´ınez-Alvarez´ +,F.J.Gonz´alez-Casta˜no∗+, F. Gil-Casti˜neira∗,R.Duro× +Gradiant, ETSI Telecomunicaci´on, Campus, 36310 Vigo, Spain ∗Departamento de Ingenier´ıa Telem´atica, Universidad de Vigo, Spain ×Grupo Integrado de Ingenier´ıa, Universidad de La Coru˜na, Spain Tel: +34 986 813788, fax: +34 986 812116 E-mail: {scostas,rmartinez}@gradiant.org,{javier,xil}@det.uvigo.es,[email protected] Abstract – This paper describes our experience with reception power, memory usage or uptime are useful to concurrent asynchronous monitoring of large populations of detect and fix many potential problems. end-user broadband-access routers. In our real tests we focused on home/office ADSL Despite of the wealth of research in large-scale monitoring, which assumes that it is possible to inquiry individual nodes routers, although our results are valid for any other access efficiently, end-user access routers usually have manual legacy technology. We monitored the routers of the Spanish ISP interfaces, either HTTP- or telnet-oriented. They seldom and VoIP operator Comunitel (www.comunitel.es). With offer a direct interface to other programs. Moreover, the our approach, a full monitoring cycle of 22,300 such uptime of end-user routers is unpredictable. For all these routers took less than five minutes. reasons, commercial large-scale monitoring tools such as SNMP collectors are useless. The rest of this paper is organized as follows: In This research is motivated by the fact that some telecom- section II we review the background, comprising academic munications operators do not let end-users buy their routers research and existing industrial solutions. -
Network Monitoring Using Nagios and Autoconfiguration for Cyber Defense Competitions
NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS Jaipaul Vasireddy B.Tech, A.I.E.T, Jawaharlal Nehru Technological University, India, 2006 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE at CALIFORNIA STATE UNIVERSITY, SACRAMENTO FALL 2009 NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS A Project by Jaipaul Vasireddy Approved by: __________________________________, Committee Chair Dr. Isaac Ghansah __________________________________, Second Reader Prof. Richard Smith __________________________ Date ii Student: Jaipaul Vasireddy I certify that this student has met the requirements for format contained in the University format manual, and that this Project is suitable for shelving in the Library and credit is to be awarded for the Project. __________________________, Graduate Coordinator ________________ Dr. Cui Zhang Date Department of Computer Science iii Abstract of NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS by Jaipaul Vasireddy The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for each machine which is usually done to monitor small number of systems. The configuration of Nagios can also be automated by using shell scripting which is generally done in an industry, where the numbers of systems to be monitored are large. Both the above methods of configuration have been implemented in this project. The project has been successfully used to know the status of each service running on the defending team’s network. -
Introduction to RAW-Sockets Jens Heuschkel, Tobias Hofmann, Thorsten Hollstein, Joel Kuepper
Introduction to RAW-sockets Jens Heuschkel, Tobias Hofmann, Thorsten Hollstein, Joel Kuepper 16.05.2017 Technical Report No. TUD-CS-2017-0111 Technische Universität Darmstadt Telecooperation Report No. TR-19, The Technical Reports Series of the TK Research Division, TU Darmstadt ISSN 1864-0516 http://www.tk.informatik.tu-darmstadt.de/de/publications/ Introduction to RAW-sockets by Heuschkel, Jens Hofmann, Tobias Hollstein, Thorsten Kuepper, Joel May 17, 2017 Abstract This document is intended to give an introduction into the programming with RAW-sockets and the related PACKET-sockets. RAW-sockets are an additional type of Internet socket available in addition to the well known DATAGRAM- and STREAM-sockets. They do allow the user to see and manipulate the information used for transmitting the data instead of hiding these details, like it is the case with the usually used STREAM- or DATAGRAM sockets. To give the reader an introduction into the subject we will first give an overview about the different APIs provided by Windows, Linux and Unix (FreeBSD, Mac OS X) and additional libraries that can be used OS-independent. In the next section we show general problems that have to be addressed by the programmer when working with RAW-sockets. We will then provide an introduction into the steps necessary to use the APIs or libraries, which functionality the different concepts provide to the programmer and what they provide to simplify using RAW and PACKET-sockets. This section includes examples of how to use the different functions provided by the APIs. Finally in the additional material we will give some complete examples that show the concepts and can be used as a basis to write own programs. -
Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios Deployment Guide
DEPLOYMENT GUIDE Version 1.0 IMPORTANT: This guide has been archived. While the content in this guide is still valid for the products and version listed in the document, it is no longer being updated and may refer to F5 or 3rd party products or versions that have reached end-of-life or end-of-support. See https://support.f5.com/csp/article/K11163 for more information. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Archived Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment guide. This guide provides detailed procedures for configuring F5 devices with the Nagios Open Source Network Monitoring System. Network Management Systems (NMS) provide insight to device and application performance, system stability, network trouble spots and a host of other items that affect a company's ability to provide computer network services. Recent advances in automated event correlation, data storage and retrieval, as well as open source systems that allow greater integration, have greatly improved today's Network Management Systems. The Nagios system and network monitoring application is an open source project. Nagios maintains network status information by polling objects for specific service responses. Examples of monitored network services include SMTP, DNS, HTTP, and so on. For more information on the Nagios project, see http://www.nagios.org/ or http://sourceforge.net/projects/nagios/. For further Nagios resources and information, see http://community.nagios.org/. For more information on F5 devices described in this guide, see http://www.f5.com/products/big-ip/. To provide feedback on this deployment guide or other F5 solution documents, contact us at [email protected]. -
Network Management
Chapter 12: Network Management Jian Ren and Tongtong Li, Michigan State University Introduction 2 Network Scanners . 25 OSI Network Management Model . .3 Packet Filters . 26 Network Management Layers . .4 Wireless Network Management 26 ISO Network Management Functions 6 Cellular Networks . 27 Configuration Management . .6 Location Management for Cellular Fault Management . .6 Networks . 28 Security Management . .7 Accounting Management . .7 Policy-based Network Management 29 What Is a Policy? . 30 Performance Management . .7 Benefits of PBNM . 31 Network Management Protocols 7 Architecture of a PBNM System . 31 SNMP/SNMPv1 . .8 Conclusion 32 SNMPv2 . 13 SNMPv3 . 15 Glossary 33 Remote Network Monitoring (RMON) 23 Acknowledgements 34 Network Management Tools 24 Network Monitors . 25 Acronyms 37 Abstract: The continuous growth in scale and diversity of computer networks and network components has made network management one of the most challenging issues facing network administrators. It has become impossible to carry out network management functions without the support of automated tools and applications. In this chapter, the major network management issues, including network management requirements, functions, techniques, security, some well- known network management protocols and tools, will be discussed. Location management for the wireless cellular networks will also be briefly described. Finally, policy-based network management, which is a promising direction for the next generation of network management, will be briefly described. Keywords: -
Quality of Services for ISP Networks
Quality of Services for ISP Networks Qi Guan SIEMENSAG Austria Siemensstrasse 88-92 A-1210, Vienna, Austria Key words: Quality of Service, QoS, ISP Internet, Backbone, VoiP Abstract: Quality of Service (QoS) is a basic functionality that the Internet needs to be able to cope with when the applications increased in number and varied in use. Internet QoS issues concerning the Internet involves many different areas: end user QoS, ISP network QoS, backbone QoS. Backbone QoS is the problem concerning traffic engineering and bandwidth. ISP network QoS is one of the major problems in the Internet, In this paper, we would like to present an architecture model for QoS enabled ISP networks. This model is based on differentiated services and is connected to QoS or non-QoS enabled backbones for IP upstream and downstream QoS traffic. At the end of paper, an example of VoiP application is introduced. 1. INTRODUCTION Until now, two separate worlds have existed for telecommunication services and networks - one for voice and one for data. The voice world is that of switched PSTN I ISDN networks, which generally provide real-time services and features such as call diversions, conference and display services. Switched PSTN I ISDN networks guarantee quality and reliability in the form of constant availability of voice services for their customers. As a result thereof, this quality of service has made voice networks extremely profitable. The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35522-1_37 H. -
Read Next-Level Networking for Speed and Security
Next-Level Networking for Speed and Security Laurie Weber CONTENTS IN THIS PAPER IP Peering and IP Transit Open Up With general Transit networks, you “get what you get.” For the Traffic Lanes 2 business-critical workloads, a provider with strong public and private Peering is a more reliable, higher-performing, and more The 2 Types of Peering Connections: secure option. Private and Public 3 This paper covers the affiliations that enable networks to, directly What Are the Alternatives? and indirectly, connect on the Internet using IP peering and IP Dedicated Internet Access 3 transit relationships. The discussion centers around the differences, Partnering with US Signal for Faster, advantages, and disadvantages of both IP peering and IP transit. It Safer, More Reliable Transport 4 also looks at why private peering (direct) and peering over a (pub- lic) Internet exchange (IX) could be more viable options, and which situations warrant one approach over the other. NEXT-LEVEL NETWORKING FOR SPEED AND SECURITY 1 Today, an estimated 3.010 billion Internet users (42% of BENEFITS OF IP TRANSIT—EASE, the world’s population) access the Internet every day. FLEXIBILITY, SPEED, REDUNDANCY That’s a lot of traffic traversing the globe. So, how do IP transit offers several business advantages. First, enterprises keep information flowing without having it’s an easy service to implement. Users pay for the to endure incessant bottlenecks, tolerate poor perfor- service, and the ISP takes care of the provider’s traffic mance, or compromise security? They do it through one requirements. or more variations of IP transit and IP peering. -
The Global Internet Phenomena Report 2019
The Global Internet Phenomena Report September 2019 The Global Internet Welcome! Phenomena Report September 2019 A word from Lyn Cantor, CEO, Sandvine About the Global Internet Welcome to the 2019 Global Internet Phenomena Report Phenomena Data Sandvine is a global leader in the network intelligence market segment. Our customer base represents over 160 Tier 1 and Tier 2 global network operators (fixed, mobile, satellite, WiFi, and enterprise) and our The 2019 version of categories. This has the effect of smoothing out The data in this edition of the Global Internet solutions touch over 2.5 billion internet subscribers worldwide. the Global Internet the impact that a special event has on traffic Phenomena Report is drawn from Sandvine’s Phenomena Report across a six month period. installed base of over 160 Tier 1 and Tier 2 fixed, The foundation of our business is being the best network intelligence was truly a labor of love mobile, and WiFi operators worldwide. The report company with unmatched depth and breadth of pre-packaged use cases, for me. Last year, we Some of the events that occurred have clearly does not include significant data from either China or that help our customers understand, optimize, automate, and manage built a new foundation had an impact on the global share of specific India, but the data represents a portion of Sandvine’s subscriber quality of experience (QoE). Our objective is to provide for the report with more traffic types, but the data is speaking pretty 2.5B subscribers installed base, a statistically the best vendor-agnostic granularity, accuracy, and automated exploration of traffic clearly on the trends, and it is impossible to significant segment of the internet population. -
Identifying and Measuring Internet Traffic: Techniques and Considerations
Identifying and Measuring Internet Traffic: Techniques and Considerations An Industry Whitepaper Contents Executive Summary Accurate traffic identification and insightful measurements form Executive Summary ................................... 1 the foundation of network business intelligence and network Introduction to Internet Traffic Classification ... 2 policy control. Without identifying and measuring the traffic flowing on their networks, CSPs are unable to craft new Traffic Identification .............................. 2 subscriber services, optimize shared resource utilization, and Traffic Categories ............................... 3 ensure correct billing and charging. Data Extraction and Measurement .............. 4 First and foremost, CSPs must understand their use cases, as Techniques .......................................... 5 these determine tolerance for accuracy. It is likely less of a Considerations for Traffic Classification .......... 7 problem if reports show information that is wrong by a small margin, but it can be catastrophic if subscriber billing/charging Information Requirements ........................ 7 is incorrect or management policies are applied to the wrong Traffic Classification Capabilities ............... 7 traffic. Completeness .................................... 8 Many techniques exist to identify traffic and extract additional False Positives and False Negatives .......... 9 information or measure quantities, ranging from relatively Additional Data and Measurements ......... 10 simple to extremely