78:, such as rogue machines on the network, or machines for which no compatible agent is available. In the latter case, inline appliances are preferred. These would generally 'sit' between the LAN and the LAN's exit point, generally the WAN or Internet router, and all packets leaving and entering the network would go through them. In most cases the appliance would operate as a bridge on the network so that it is undetectable by users.
52:
is one of the world's largest
Internet exchanges. It produces a constant supply of simple Internet statistics. There are also numerous academic studies that have produced a range of measurement studies on frame size distributions, TCP/UDP ratios and TCP/IP options.
73:
or other local agents to measure bandwidth use on individual machines and routers. However, the latter generally do not detect the type of traffic, nor do they work for machines which are not running the necessary
40:) are more intrusive but are arguably more accurate. Passive techniques have less network overhead and hence can run in the background to be used to trigger network management actions.
355:
269:
24:
is the process of measuring the amount and type of traffic on a particular network. This is especially important with regard to effective
70:
66:
239:
Zhang, Min; Maurizio Dusi; Wolfgang John; Changjia Chen (2009). "Analysis of udp traffic usage on internet backbone links".
174:
350:
294:
49:
165:
254:
Wolfgang, John; Sven
Tafvelin (2007). "Analysis of internet backbone traffic and header anomalies observed".
143:
204:
36:
Network performance could be measured using either active or passive techniques. Active techniques (e.g.
25:
194:
184:
179:
241:
In
Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
61:
Various software tools are available to measure network traffic. Some tools measure traffic by
189:
150:
17:
135:
114:
Network activity is often reported against pre-configured traffic matching rules to show:
90:
82:
224:
Murray, David; Terry
Koziniec (2012). "The State of Enterprise Network Traffic in 2012".
199:
75:
62:
344:
139:
319:
155:
Alarms to notify the administrator of excessive usage (by IP address or in total)
48:
A range of studies have been performed from various points on the
Internet. The
94:
258:. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement.
169:
37:
104:
Measurement tools generally have these functions and features:
86:
226:
18th Asia-Pacific
Conference on Communications (APCC 2012)
270:"Configuring IBM Tivoli Storage Manager SNMP"
8:
356:Internet Protocol based network software
108:User interface (web, graphical, console)
81:Some tools used for SNMP monitoring are
216:
7:
50:AMS-IX (Amsterdam Internet Exchange)
14:
295:"CA Performance Management - 2.8"
89:, CA Performance Management by
1:
149:Support website blocking and
175:Measuring network throughput
22:network traffic measurement
372:
166:IP Flow Information Export
111:Real-time traffic graphs
144:network traffic control
123:Port number or protocol
205:Performance management
142:(overlapping with the
100:Functions and features
83:Tivoli Netcool/Proviso
256:ACM Wireless Networks
26:bandwidth management
126:Logged in user name
44:Measurement studies
351:Network management
195:Network simulation
185:Network monitoring
180:Network management
320:"SNMP Monitoring"
190:Network scheduler
151:content filtering
120:Remote IP address
18:computer networks
363:
335:
334:
332:
330:
316:
310:
309:
307:
305:
291:
285:
284:
282:
280:
266:
260:
259:
251:
245:
244:
236:
230:
229:
221:
131:Bandwidth quotas
117:Local IP address
371:
370:
366:
365:
364:
362:
361:
360:
341:
340:
339:
338:
328:
326:
318:
317:
313:
303:
301:
293:
292:
288:
278:
276:
268:
267:
263:
253:
252:
248:
238:
237:
233:
223:
222:
218:
213:
162:
136:traffic shaping
102:
91:CA Technologies
65:and others use
59:
46:
34:
12:
11:
5:
369:
367:
359:
358:
353:
343:
342:
337:
336:
324:SolarWinds.com
311:
286:
261:
246:
231:
215:
214:
212:
209:
208:
207:
202:
200:Packet sniffer
197:
192:
187:
182:
177:
172:
161:
158:
157:
156:
153:
147:
132:
129:
128:
127:
124:
121:
118:
112:
109:
101:
98:
76:agent software
58:
55:
45:
42:
33:
30:
13:
10:
9:
6:
4:
3:
2:
368:
357:
354:
352:
349:
348:
346:
325:
321:
315:
312:
300:
299:docops.ca.com
296:
290:
287:
275:
271:
265:
262:
257:
250:
247:
242:
235:
232:
227:
220:
217:
210:
206:
203:
201:
198:
196:
193:
191:
188:
186:
183:
181:
178:
176:
173:
171:
167:
164:
163:
159:
154:
152:
148:
145:
141:
140:rate limiting
137:
133:
130:
125:
122:
119:
116:
115:
113:
110:
107:
106:
105:
99:
97:
96:
92:
88:
84:
79:
77:
72:
68:
64:
56:
54:
51:
43:
41:
39:
31:
29:
27:
23:
19:
329:27 September
327:. Retrieved
323:
314:
304:27 September
302:. Retrieved
298:
289:
279:27 September
277:. Retrieved
273:
264:
255:
249:
240:
234:
225:
219:
134:Support for
103:
80:
60:
47:
35:
21:
15:
345:Categories
211:References
95:SolarWinds
32:Techniques
160:See also
63:sniffing
274:ibm.com
170:NetFlow
93:., and
146:page)
57:Tools
38:Iperf
331:2018
306:2018
281:2018
168:and
67:SNMP
138:or
87:IBM
85:by
71:WMI
16:In
347::
322:.
297:.
272:.
69:,
28:.
20:,
333:.
308:.
283:.
243:.
228:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.