Traffic Management in Rural Networks
The internet is increasingly present in people’s lives, being used in diverse tasks, such as checking e-mail up to online gaming and streaming. The so-called "killer applications" are applications that, when not properly identified and prevented, have more impact on the network, making it slow. When these applications are used on networks with limited resources, as happens in rural networks, they cause a large load on the network, making it difficult its use for work purposes. It is important then to recognize and characterize this traffic to take action so that it does not cause network problems. With that in mind, the work presented in this paper describes the research and identification of cost free traffic analysis solutions that can help to overcome such problems. For that, we perform preliminary testing and a performance comparison of those tools, focusing on testing particular types of network traffic. After that, we describe the analysis and subsequent modification of the source code for storing important traffic data for the tests, as well as the test scenarios in laboratory and real-life environments. These tasks are aimed on collecting information that assists in taking action to improve the allocation of network resources to priority traffic.
KeywordsInternet Network Traffic Rural Networks Traffic Analysis Deep Packet Inspection
Unable to display preview. Download preview PDF.
- 1.Internet World stats, “Usage and population statistics”, http://www.internetworldstats.com/stats.htm (date accessed, January 2014)
- 2.Liew, J.H., Yeo, A.W., Hamid, K.A., Othman, A.K.: Implementation of wireless networks in rural areas. Computer Science and Information Tech., Malaysia Univ., Sarawak (2004)Google Scholar
- 4.Mueller, M.L.: Convergence of control? Deep packet inspection and the future of the internet. Communications & Convergence Review 2(2), 92–103 (2010)Google Scholar
- 5.IANA, Protocol Numbers, http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml (date accessed, January 2014)
- 6.ntop, “ntop”, http://www.ntop.org/ (date accessed, January 2014)
- 7.Bujlow, T., Carela-Español, V., Barlet-Ros, P.: Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification. Technical Report, Universitat Politècnica de Catalunya (2013)Google Scholar
- 9.Wireshark, “Wireshark”, http://www.wireshark.org/ (date accessed, January 2014)
- 10.LinuxQuestions, “Tcpdump with cron”, http://www.linuxquestions.org/questions/linux-software-2/tcpdump-with-cron-121727/ (date accessed, January 2014)
- 11.Salvador, N., Filipe, V., Rabadão, C., Pereira, A.: Management Model for Wireless Broadband Networks. In: 3rd International Conference on Systems and Networks Communications, pp. 38–43. ICSNC (2008)Google Scholar
- 12.ntop, “ntopng”, http://www.ntop.org/ (date accessed, January 2014)