A Method on Multimedia Service Traffic Monitoring and Analysis
نویسندگان
چکیده
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on network performance and planning. For various purposes, obtaining information on multimedia service traffic is important. However, traditional analysis methods based on well-known ports cannot be used to analyze such traffic. Because the majority of multimedia service applications use dynamically allocated port numbers, the traditional methods misidentify multimedia service traffic as unknown traffic. This paper presents a method for monitoring and analyzing multimedia service traffic. Our method detects transport protocol and port numbers for dynamically created sessions during a control session. We then use such information to analyze traffic generated by the most popular multimedia service applications, namely Windows Media, RealMedia, Quicktime, SIP and H.323. We also present a system architecture that uses our method to monitor and analyze multimedia service traffic.
منابع مشابه
Streaming Media and Multimedia Conferencing Traffic Analysis Using Payload Examination
Hun-Jeong Kang et al. 203 This paper presents a method and architecture to analyze streaming media and multimedia conferencing traffic. Our method is based on detecting the transport protocol and port numbers that are dynamically assigned during the setup between communicating parties. We then apply such information to analyze traffic generated by the most popular streaming media and multimedia...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملBehavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کامل