Traffic Management in Rural Networks

  • Rodrigo Emiliano
  • Fernando Silva
  • Luís Frazão
  • João Barroso
  • António Pereira
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8519)


The internet is increasingly present in people’s lives, being used in diverse tasks, such as checking e-mail up to online gaming and streaming. The so-called "killer applications" are applications that, when not properly identified and prevented, have more impact on the network, making it slow. When these applications are used on networks with limited resources, as happens in rural networks, they cause a large load on the network, making it difficult its use for work purposes. It is important then to recognize and characterize this traffic to take action so that it does not cause network problems. With that in mind, the work presented in this paper describes the research and identification of cost free traffic analysis solutions that can help to overcome such problems. For that, we perform preliminary testing and a performance comparison of those tools, focusing on testing particular types of network traffic. After that, we describe the analysis and subsequent modification of the source code for storing important traffic data for the tests, as well as the test scenarios in laboratory and real-life environments. These tasks are aimed on collecting information that assists in taking action to improve the allocation of network resources to priority traffic.


Internet Network Traffic Rural Networks Traffic Analysis Deep Packet Inspection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Internet World stats, “Usage and population statistics”, (date accessed, January 2014)
  2. 2.
    Liew, J.H., Yeo, A.W., Hamid, K.A., Othman, A.K.: Implementation of wireless networks in rural areas. Computer Science and Information Tech., Malaysia Univ., Sarawak (2004)Google Scholar
  3. 3.
    Feitosa, E., Souto, E., Sadok, D.H.: An orchestration approach for unwanted Internet traffic identification. Computer Networks 56(12), 2805–2831 (2012)CrossRefGoogle Scholar
  4. 4.
    Mueller, M.L.: Convergence of control? Deep packet inspection and the future of the internet. Communications & Convergence Review 2(2), 92–103 (2010)Google Scholar
  5. 5.
    IANA, Protocol Numbers, (date accessed, January 2014)
  6. 6.
    ntop, “ntop”, (date accessed, January 2014)
  7. 7.
    Bujlow, T., Carela-Español, V., Barlet-Ros, P.: Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification. Technical Report, Universitat Politècnica de Catalunya (2013)Google Scholar
  8. 8.
    Gomes, J.V., Inácio, P.R.M., Pereira, M., Freire, M.M., Monteiro, P.P.: Detection and Classification of Peer-to-Peer Traffic: A Survey. ACM Computing Surveys 45(3), 1–40 (2013)CrossRefGoogle Scholar
  9. 9.
    Wireshark, “Wireshark”, (date accessed, January 2014)
  10. 10.
    LinuxQuestions, “Tcpdump with cron”, (date accessed, January 2014)
  11. 11.
    Salvador, N., Filipe, V., Rabadão, C., Pereira, A.: Management Model for Wireless Broadband Networks. In: 3rd International Conference on Systems and Networks Communications, pp. 38–43. ICSNC (2008)Google Scholar
  12. 12.
    ntop, “ntopng”, (date accessed, January 2014)

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Rodrigo Emiliano
    • 1
  • Fernando Silva
    • 1
  • Luís Frazão
    • 1
  • João Barroso
    • 2
  • António Pereira
    • 1
    • 3
  1. 1.School of Technology and Management, Computer Science, and Communication Research CentrePolytechnic Institute of LeiriaLeiriaPortugal
  2. 2.INESC TEC (formerly INESC Porto) and Universidade de Trás-os-Montes e Alto DouroVila RealPortugal
  3. 3.Information and Communications Technologies UnitINOV INESC Innovation-Delegation Office at LeiriaLeiriaPortugal

Personalised recommendations