Abstract

Nowadays, the traffic over the networks is changing because of new protocols, devices and applications. Therefore, it is necessary to analyze the impact over services and resources. Traffic Classification of network is a very important prerequisite for tasks such as traffic engineering and provisioning quality of service. In this paper, we analyze the variable packet size of the traffic in an university campus network through the collected data using a novel sniffer that ensures the user data privacy. We separate the collected data by type of traffic, protocols and applications. Finally, we estimate the traffic model that represents this traffic by means of a Poisson process and compute its associated numerical parameters.

Highlights

  • IntroductionUnderstanding the behavior of the network traffic is crucial and an important prerequisite for planning the traffic engineering and apply quality of service; for traffic modeling and prediction

  • Understanding the behavior of the network traffic is crucial and an important prerequisite for planning the traffic engineering and apply quality of service; for traffic modeling and prediction.the network traffic is changing because of the convergence

  • New protocols like the IPv6 are present in the internet, and technologies such as Internet of Things (IoT) will allow the connection of millions of new devices

Read more

Summary

Introduction

Understanding the behavior of the network traffic is crucial and an important prerequisite for planning the traffic engineering and apply quality of service; for traffic modeling and prediction. When we need analyze and modelling the network traffic, we can to considerate two stochastically variables: the packet size and the inter-arrival time [3]. The active method generates new traffic, inject it into the network, while passive method consists on monitor, and capture the network traffic. In this case, we use the passive form for capture traffic, analyze the packet headers and produce statistics. The rest of the paper is organized as follows: section 2 provides information about related works; in section 3 we present the novel sniffer; in section 4 we show the data collection, classified by type of traffic, by protocols, and by application, according to the variable packet size.

Related works
Proposed sniffer
Data collection and analysis
Traffic modelling
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.