A Method on Multimedia Service Traffic Monitoring and Analysis

نویسندگان

  • Hun-Jeong Kang
  • Myung-Sup Kim
  • James Won-Ki Hong
چکیده

The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on network performance and planning. For various purposes, obtaining information on multimedia service traffic is important. However, traditional analysis methods based on well-known ports cannot be used to analyze such traffic. Because the majority of multimedia service applications use dynamically allocated port numbers, the traditional methods misidentify multimedia service traffic as unknown traffic. This paper presents a method for monitoring and analyzing multimedia service traffic. Our method detects transport protocol and port numbers for dynamically created sessions during a control session. We then use such information to analyze traffic generated by the most popular multimedia service applications, namely Windows Media, RealMedia, Quicktime, SIP and H.323. We also present a system architecture that uses our method to monitor and analyze multimedia service traffic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination

Hun-Jeong Kang et al. 203 This paper presents a method and architecture to analyze streaming media and multimedia conferencing traffic. Our method is based on detecting the transport protocol and port numbers that are dynamically assigned during the setup between communicating parties. We then apply such information to analyze traffic generated by the most popular streaming media and multimedia...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

Service Differentiation of IEEE 802.11e

The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...

متن کامل

Service Differentiation of IEEE 802.11e

The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003