POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.

Slides:



Advertisements
Similar presentations
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advertisements

Module CSY3021 Network Planning and Programming RD-CSY /09 1.
CSE 190: Internet E-Commerce Lecture 16: Performance.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
Introduction To Networking
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
N ETWORK M ONITORING. D EFINITIONS Network monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
Module – 7 network-attached storage (NAS)
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Mobile commerce Yuri kang.
In The Name Of Allah Whose Blessings Are Uncountable.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
High performance video transmission technology SVFTP (Swift Video File Transmission Protocol) KDDI R&D Laboratories Inc.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
What is FORENSICS? Why do we need Network Forensics?
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Honeypot and Intrusion Detection System
Software Defined Networking: Traffic Monitoring and Analysis
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Network Computing Lab. ( 1 Network Programming: Syllabus Spring 2009, Prof. Kihyun Pyun.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
-1- Wise* TrafView Wise * TrafView ETRI’s Content-aware Internet Application Traffic Measurement and Analysis System APAN Network Technology WS January.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Introduction to Networking
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
Cable and the Internet Rick Cimerman NCTA June 7, 2010.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
NT1210 Introduction to Networking
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
Networking Mehdi Einali Advanced Programming in Java 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Accelerating Peer-to-Peer Networks for Video Streaming
Introduction.
Introduction to Technology Infrastructure
Lec 2: Protocols.
Introduction to Technology Infrastructure
Computing Over Distance
Lottery Meets Wireless
Network Architecture for Cyberspace
Chapter 8 – Data switching and routing
Presentation transcript:

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (2) 1. Introduction - Evolving IP Network Environment  WAN: SONET/SDH (OC3, OC12, OC48, OC192), ATM, WDM/DWDM  LAN: 10/100 Mbps to 1 Gbps to 10 Gbps Ethernet  Broadband Internet Access: Cable Modem, ADSL, VDSL  Wireless Access: WLAN (IEEE ), Wireless Internet  Wired/Wireless Convergence: Softswitch, Media Gateway, NGCN

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (3) 1. Introduction – Growth of Internet Use The number of Internet users is growing Source : Nua Inc. Internet traffic has increased dramatically Source: America’s Network  Internet usage is growing rapidly!

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (4) 1. Introduction – Reliance on Internet The Internet generated revenue has been increasing rapidly! Source : Active Media.  Internet’s importance and reliance are increasing!

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (5)  Stand-alone applications can now utilize networking  Cooperative editing: MS Word  Use of FTP: EditPlus, UltraEdit,…  Web page or HTML format  New network applications  Online games, shopping, banking, stock trading, network storage  VOD, EOD, VOIP 1. Introduction – Internet Applications Online gameVoIPVOD

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (6)  Peer-to-Peer (P2P)  New concept between file sharing and transferring  Generates high volume of traffic 1. Introduction – Structure of Applications  Structures of applications are changing!  Client-Server  Traditional structure client server peerdiscovery, content, transfer query peer

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (7)  Bursty data transfer vs. Streaming data transfer 1. Introduction – Types of Traffic  Static sessions vs. Dynamic sessions packet networkpacket  Types of traffic are various and increasing! Negotiate & allocate connect disconnect use dynamic protocol, port data connect disconnect control use static protocol, port network

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (8) 1.Introduction – Internet Protocol Distribution  Transport Protocol Distribution  The amount of UDP flows is increasing by P2P application  The amount of ICMP flows is increasing by Internet worm protocolFlowsPacketsBytes TCP 32, %1,797, %1,339,396, % UDP 54, %141,7696.8%27,812,5862.0% ICMP 138, %141,2476.7%15,720,4101.1% Others %4740.0%32,1600.0% – 19:36 POSTECH Internet Junction Traffic – 19:36 POSTECH Internet Junction Traffic

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (9) 1.Introduction – Port number usage in TCP/UDP  Port Number Distribution in bytes TCP Server Listening Port Number Distribution UDP Port Number Distribution  Proportion of Internet Applications – 19:36 POSTECH Internet Junction Traffic – 19:36 POSTECH Internet Junction Traffic ? ? ?  Which applications generate this large amount of traffic?

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (10) 1. Introduction – Motivation  Needs of Service Providers  Understand the behavior of their networks  Provide fast, high-quality, reliable service to satisfy customers and thus reduce churn rate  Plan for network deployment and expansion  SLA monitoring, Network security  Increase Revenue!  Usage-based billing for network users (like telephone calls)  Marketing using CRM data  Needs of Customers  Want to get their money’s worth  Fast, reliable, high-quality, secure, virus-free Internet access To Satisfy Service Providers’ Needs to Satisfy Their Customers!

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (11) 1. Introduction – Application Areas  Network Problem Determination and Analysis  Traffic Report Generation  Intrusion & Hacking Attack (e.g., DoS, DDoS) Detection  Service Level Monitoring (SLM)  Network Planning  Usage-based Billing  Customer Relationship Management (CRM)  Marketing

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (12) 1. Introduction – Issues in Traffic Monitoring  Choices  Single-point vs. Multi-point monitoring  Number of probing or test packet generation point  In-service vs. Out-of-service monitoring  Whether monitoring should be executed during service or not  Continuous vs. On-demand monitoring  Monitoring executes continuously or by on-demand.  Packet vs. Flow-based monitoring  Collect packets or flows from network devices.  One-way vs. Bi-directional monitoring  Monitor forward path only / forward and return path  Trade-offs  Network bandwidth  Processing overhead  Accuracy  Cost

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (13) 1. Introduction – Problems  Capturing Packets  High-speed networks (Mbps  Gbps  Tbps)  High-volume traffic  Streaming media (Windows Media, Real Media, Quicktime)  P2P traffic  Network Security Attacks  Flow Generation & Storage  What packet information to save to perform various analysis?  How to minimize storage requirements?  Analysis  How to analyze and generate data needed quickly?  What kinds of info needs to be generated?  Depends on applications

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (14) 1. Introduction – R&D Goals  Develop methods to  Capture all packets  Generate flows  Store flows efficiently  Analyze data efficiently  Generate various reports or information that are suitable for various application areas  Develop a flexible, scalable traffic monitoring and analysis system for high-speed, high-volume, rich media IP networks