Knowledge

Network traffic measurement

Source 📝

78:, such as rogue machines on the network, or machines for which no compatible agent is available. In the latter case, inline appliances are preferred. These would generally 'sit' between the LAN and the LAN's exit point, generally the WAN or Internet router, and all packets leaving and entering the network would go through them. In most cases the appliance would operate as a bridge on the network so that it is undetectable by users. 52:
is one of the world's largest Internet exchanges. It produces a constant supply of simple Internet statistics. There are also numerous academic studies that have produced a range of measurement studies on frame size distributions, TCP/UDP ratios and TCP/IP options.
73:
or other local agents to measure bandwidth use on individual machines and routers. However, the latter generally do not detect the type of traffic, nor do they work for machines which are not running the necessary
40:) are more intrusive but are arguably more accurate. Passive techniques have less network overhead and hence can run in the background to be used to trigger network management actions. 355: 269: 24:
is the process of measuring the amount and type of traffic on a particular network. This is especially important with regard to effective
70: 66: 239:
Zhang, Min; Maurizio Dusi; Wolfgang John; Changjia Chen (2009). "Analysis of udp traffic usage on internet backbone links".
174: 350: 294: 49: 165: 254:
Wolfgang, John; Sven Tafvelin (2007). "Analysis of internet backbone traffic and header anomalies observed".
143: 204: 36:
Network performance could be measured using either active or passive techniques. Active techniques (e.g.
25: 194: 184: 179: 241:
In Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
61:
Various software tools are available to measure network traffic. Some tools measure traffic by
189: 150: 17: 135: 114:
Network activity is often reported against pre-configured traffic matching rules to show:
90: 82: 224:
Murray, David; Terry Koziniec (2012). "The State of Enterprise Network Traffic in 2012".
199: 75: 62: 344: 139: 319: 155:
Alarms to notify the administrator of excessive usage (by IP address or in total)
48:
A range of studies have been performed from various points on the Internet. The
94: 258:. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. 169: 37: 104:
Measurement tools generally have these functions and features:
86: 226:
18th Asia-Pacific Conference on Communications (APCC 2012)
270:"Configuring IBM Tivoli Storage Manager SNMP" 8: 356:Internet Protocol based network software 108:User interface (web, graphical, console) 81:Some tools used for SNMP monitoring are 216: 7: 50:AMS-IX (Amsterdam Internet Exchange) 14: 295:"CA Performance Management - 2.8" 89:, CA Performance Management by 1: 149:Support website blocking and 175:Measuring network throughput 22:network traffic measurement 372: 166:IP Flow Information Export 111:Real-time traffic graphs 144:network traffic control 123:Port number or protocol 205:Performance management 142:(overlapping with the 100:Functions and features 83:Tivoli Netcool/Proviso 256:ACM Wireless Networks 26:bandwidth management 126:Logged in user name 44:Measurement studies 351:Network management 195:Network simulation 185:Network monitoring 180:Network management 320:"SNMP Monitoring" 190:Network scheduler 151:content filtering 120:Remote IP address 18:computer networks 363: 335: 334: 332: 330: 316: 310: 309: 307: 305: 291: 285: 284: 282: 280: 266: 260: 259: 251: 245: 244: 236: 230: 229: 221: 131:Bandwidth quotas 117:Local IP address 371: 370: 366: 365: 364: 362: 361: 360: 341: 340: 339: 338: 328: 326: 318: 317: 313: 303: 301: 293: 292: 288: 278: 276: 268: 267: 263: 253: 252: 248: 238: 237: 233: 223: 222: 218: 213: 162: 136:traffic shaping 102: 91:CA Technologies 65:and others use 59: 46: 34: 12: 11: 5: 369: 367: 359: 358: 353: 343: 342: 337: 336: 324:SolarWinds.com 311: 286: 261: 246: 231: 215: 214: 212: 209: 208: 207: 202: 200:Packet sniffer 197: 192: 187: 182: 177: 172: 161: 158: 157: 156: 153: 147: 132: 129: 128: 127: 124: 121: 118: 112: 109: 101: 98: 76:agent software 58: 55: 45: 42: 33: 30: 13: 10: 9: 6: 4: 3: 2: 368: 357: 354: 352: 349: 348: 346: 325: 321: 315: 312: 300: 299:docops.ca.com 296: 290: 287: 275: 271: 265: 262: 257: 250: 247: 242: 235: 232: 227: 220: 217: 210: 206: 203: 201: 198: 196: 193: 191: 188: 186: 183: 181: 178: 176: 173: 171: 167: 164: 163: 159: 154: 152: 148: 145: 141: 140:rate limiting 137: 133: 130: 125: 122: 119: 116: 115: 113: 110: 107: 106: 105: 99: 97: 96: 92: 88: 84: 79: 77: 72: 68: 64: 56: 54: 51: 43: 41: 39: 31: 29: 27: 23: 19: 329:27 September 327:. Retrieved 323: 314: 304:27 September 302:. Retrieved 298: 289: 279:27 September 277:. Retrieved 273: 264: 255: 249: 240: 234: 225: 219: 134:Support for 103: 80: 60: 47: 35: 21: 15: 345:Categories 211:References 95:SolarWinds 32:Techniques 160:See also 63:sniffing 274:ibm.com 170:NetFlow 93:., and 146:page) 57:Tools 38:Iperf 331:2018 306:2018 281:2018 168:and 67:SNMP 138:or 87:IBM 85:by 71:WMI 16:In 347:: 322:. 297:. 272:. 69:, 28:. 20:, 333:. 308:. 283:. 243:. 228:.

Index

computer networks
bandwidth management
Iperf
AMS-IX (Amsterdam Internet Exchange)
sniffing
SNMP
WMI
agent software
Tivoli Netcool/Proviso
IBM
CA Technologies
SolarWinds
traffic shaping
rate limiting
network traffic control
content filtering
IP Flow Information Export
NetFlow
Measuring network throughput
Network management
Network monitoring
Network scheduler
Network simulation
Packet sniffer
Performance management
"Configuring IBM Tivoli Storage Manager SNMP"
"CA Performance Management - 2.8"
"SNMP Monitoring"
Categories
Network management

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.