SlideShare a Scribd company logo
1 of 9
1© Copyright Comviva Technologies Limited. 2015 1
HOW TO MONITOR
NETWORK TRAFFIC
2© Copyright Comviva Technologies Limited. 2015
In today’s business environment, network traffic is at an all time high due to increased use of data
by social media sites and now cloud services. This has created a bandwidth challenge for
organizations as they struggle to ensure that there is enough bandwidth available to allow
uninterrupted flow of data across offices, data centers and backup sites. It is not economically
feasible to keep adding bandwidth to ensure a good transfer rate for network traffic. It makes far
more economic sense to monitor network traffic for optimal bandwidth usage.
Network traffic usage tends to fluctuate depending on business need, making it important to
monitor network traffic to avoid unexpected performance breakdowns. A network breakdown in the
middle of an important business activity can prove to be very costly for the organization which is
why most organizations chose to take preemptive action by monitoring network traffic to identify
problems before they can actually occur.
3© Copyright Comviva Technologies Limited. 2015
A network traffic monitoring tool helps identify applications that are consuming more
bandwidth as well as applications which are running slower than usual signaling a possible
problem area. Monitoring network traffic also helps organizations optimize bandwidth usage
according to business need by prioritizing the flow of network traffic according to business
priorities. It enables organizations to validate smooth working of QoS policies.
There are many benefits that organizations can enjoy by monitoring network traffic. These
benefits are:
• Deliver higher quality service to users by optimizing bandwidth usage
• Reduce performance and server breakdowns
• Make it easy to identify and troubleshoot network problems
• Reduce cost associated with purchasing additional bandwidth for smooth network
performance
• Identify and optimize applications using high bandwidth
4© Copyright Comviva Technologies Limited. 2015
It is not only big organizations that need to monitor network traffic. Even small businesses and
homes with multiple devices consuming bandwidth need to be monitored for network traffic to
ensure that bandwidth is not being consumed uselessly. It is very easy to setup your system
for monitoring network traffic; all you require is a basic understanding of protocols and
network.
5© Copyright Comviva Technologies Limited. 2015
The first step is to install a network-monitoring tool on to your system. There are plenty of
network monitoring tools available online and downloading one is extremely easy and simple.
Next, begin recording traffic data by clicking on the Start button.
You can then begin viewing data captured while the application is still recording or you can
stop the recording to view all the captured data.
It is then possible to analyze the data that is already recorded while the program is still
recording.
Monitoring network traffic
6© Copyright Comviva Technologies Limited. 2015
Network traffic data can be analyzed to determine:
• Any unwanted data being received or sent from your system.
• Any unwanted systems participating in your network
• Any programs using up bandwidth more than expected
• Usage pattern across programs, how often do programs run updates etc
• Programs consuming maximum bandwidth
As network traffic continues to grow with the explosion of the internet and social media,
monitoring network traffic has become a business and personal imperative to ensure your
network is able to perform at optimal capacity.
Monitoring network traffic
7© Copyright Comviva Technologies Limited. 2015
However, the merchant network of current mobile money services is limited. Customers can
pay only via mobile money to merchants who are registered with the mobile money service
provider. We have to move beyond the closed loop systems and embrace an open-loop
merchant payment approach. To enable open-loop payments mobile money providers are
integrating with global card networks like MasterCard and Visa to issue companion cards
(linked to mobile money account) which can be used for payment at any MasterCard and Visa
powered POS machine both nationally and internationally.
The open-loop approach exponentially increases the merchant acceptance network for
mobile money. Even virtual cards linked to mobile money account can be issued for making
online transactions.
8© Copyright Comviva Technologies Limited. 2015
Disclaimer
Copyright © 2015: Comviva Technologies Ltd, Registered Office at A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India.
All rights about this document are reserved and shall not be , in whole or in part, copied, photocopied, reproduced, translated, or reduced to any manner
including but not limited to electronic, mechanical, machine readable ,photographic, optic recording or otherwise without prior consent, in writing, of Comviva
Technologies Ltd (the Company).
The information in this document is subject to changes without notice. This describes only the product defined in the introduction of this documentation. This
document is intended for the use of prospective customers of the Company Products Solutions and or Services for the sole purpose of the transaction for which
the document is submitted. No part of it may be reproduced or transmitted in any form or manner whatsoever without the prior written permission of the
company. The Customer, who/which assumes full responsibility for using the document appropriately. The Company welcomes customer comments as part of the
process of continuous development and improvement.
The Company, has made all reasonable efforts to ensure that the information contained in the document are adequate, sufficient and free of material errors and
omissions. The Company will, if necessary, explain issues, which may not be covered by the document. However, the Company does not assume any liability of
whatsoever nature , for any errors in the document except the responsibility to provide correct information when any such error is brought to company’s
knowledge. The Company will not be responsible, in any event, for errors in this document or for any damages, incidental or consequential, including monetary
losses that might arise from the use of this document or of the information contained in it.
This document and the Products, Solutions and Services it describes are intellectual property of the Company and/or of the respective owners thereof, whether
such IPR is registered, registrable, pending for registration, applied for registration or not.
The only warranties for the Company Products, Solutions and Services are set forth in the express warranty statements accompanying its products and services.
Nothing herein should be construed as constituting an additional warranty. The Company shall not be liable for technical or editorial errors or omissions
contained herein.
The Company logo is a trademark of the Company. Other products, names, logos mentioned in this document , if any , may be trademarks of their respective
owners.
Thank you
Visit us at www.mahindracomviva.com
9© Copyright Comviva Technologies Limited. 2015

More Related Content

Similar to How to monitor Network Traffic

Similar to How to monitor Network Traffic (20)

What is an Sms Hub
What is an Sms HubWhat is an Sms Hub
What is an Sms Hub
 
Key Features of Direct Operator Billing
Key Features of Direct Operator BillingKey Features of Direct Operator Billing
Key Features of Direct Operator Billing
 
What is M-commerce
What is M-commerceWhat is M-commerce
What is M-commerce
 
Banks can Implement NFC Payment Choosing between two Options - HCE platform &...
Banks can Implement NFC Payment Choosing between two Options - HCE platform &...Banks can Implement NFC Payment Choosing between two Options - HCE platform &...
Banks can Implement NFC Payment Choosing between two Options - HCE platform &...
 
What is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioningWhat is PCRF? – Detailed PCRF architecture and functioning
What is PCRF? – Detailed PCRF architecture and functioning
 
Mobile banking - not just a niche service-a norm!
Mobile banking - not just a niche service-a norm!Mobile banking - not just a niche service-a norm!
Mobile banking - not just a niche service-a norm!
 
What is mobile money interoperability
What is mobile money interoperabilityWhat is mobile money interoperability
What is mobile money interoperability
 
What is mobile recharge platform
What is mobile recharge platformWhat is mobile recharge platform
What is mobile recharge platform
 
All You Need To Know About Network Interoperability
All You Need To Know About Network InteroperabilityAll You Need To Know About Network Interoperability
All You Need To Know About Network Interoperability
 
QR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentQR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless payment
 
The Scope of Enterprise Messaging Solution
The Scope of Enterprise Messaging SolutionThe Scope of Enterprise Messaging Solution
The Scope of Enterprise Messaging Solution
 
What is MMSC platform
What is MMSC platformWhat is MMSC platform
What is MMSC platform
 
Advantages of Mobile POS
Advantages of Mobile POSAdvantages of Mobile POS
Advantages of Mobile POS
 
Rise and Rise of Companion Cards
Rise and Rise of Companion CardsRise and Rise of Companion Cards
Rise and Rise of Companion Cards
 
Importance of Big Data in the Telecom Industry
Importance of Big Data in the Telecom IndustryImportance of Big Data in the Telecom Industry
Importance of Big Data in the Telecom Industry
 
What is churn rate?
What is churn rate?What is churn rate?
What is churn rate?
 
The Importance & Benefits of IT Managed Services
The Importance & Benefits of IT Managed ServicesThe Importance & Benefits of IT Managed Services
The Importance & Benefits of IT Managed Services
 
Know about Fuelling Carrier Billing Market
Know about Fuelling Carrier Billing MarketKnow about Fuelling Carrier Billing Market
Know about Fuelling Carrier Billing Market
 
What is NFV and Why is it Significant to the Networking Industry?
 What is NFV and Why is it Significant to the Networking Industry? What is NFV and Why is it Significant to the Networking Industry?
What is NFV and Why is it Significant to the Networking Industry?
 
mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout mobiquity®Wallet checkout - Quick, seamless and secure checkout
mobiquity®Wallet checkout - Quick, seamless and secure checkout
 

More from Mahindra Comviva

More from Mahindra Comviva (15)

Scope of mobile payment in 2017
Scope of mobile payment in 2017Scope of mobile payment in 2017
Scope of mobile payment in 2017
 
How to analyze churn rate and its effect on business
How to analyze churn rate and its effect on businessHow to analyze churn rate and its effect on business
How to analyze churn rate and its effect on business
 
Growth of mobile money in india
Growth of mobile money in indiaGrowth of mobile money in india
Growth of mobile money in india
 
The role of mobile payment technologies in era of demonitization
The role of mobile payment technologies in era of demonitizationThe role of mobile payment technologies in era of demonitization
The role of mobile payment technologies in era of demonitization
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
 
10 Things You Need to Know about Mobile Money Services
10 Things You Need to Know about Mobile Money Services 10 Things You Need to Know about Mobile Money Services
10 Things You Need to Know about Mobile Money Services
 
Differentiate Between Omni Channel & Multi Channel Customer Experience
Differentiate Between Omni Channel & Multi Channel Customer ExperienceDifferentiate Between Omni Channel & Multi Channel Customer Experience
Differentiate Between Omni Channel & Multi Channel Customer Experience
 
What is SMS Grey Route in Telecom?
What is SMS Grey Route in Telecom?What is SMS Grey Route in Telecom?
What is SMS Grey Route in Telecom?
 
Growth of Mobile POS in India
Growth of Mobile POS in IndiaGrowth of Mobile POS in India
Growth of Mobile POS in India
 
10 Most Effective Big Data Technologies
10 Most Effective Big Data Technologies10 Most Effective Big Data Technologies
10 Most Effective Big Data Technologies
 
Loyalty Programs- Reward Telecom Customer & Increase ARPU 
Loyalty Programs- Reward Telecom Customer & Increase ARPU Loyalty Programs- Reward Telecom Customer & Increase ARPU 
Loyalty Programs- Reward Telecom Customer & Increase ARPU 
 
Changing Telecom trends with VAS- Value Added Services
Changing Telecom trends with VAS- Value Added ServicesChanging Telecom trends with VAS- Value Added Services
Changing Telecom trends with VAS- Value Added Services
 
Data Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behaviorData Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behavior
 
What is Blockchain?
What is Blockchain?What is Blockchain?
What is Blockchain?
 
What Are Sound Based Payments
What Are Sound Based PaymentsWhat Are Sound Based Payments
What Are Sound Based Payments
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

How to monitor Network Traffic

  • 1. 1© Copyright Comviva Technologies Limited. 2015 1 HOW TO MONITOR NETWORK TRAFFIC
  • 2. 2© Copyright Comviva Technologies Limited. 2015 In today’s business environment, network traffic is at an all time high due to increased use of data by social media sites and now cloud services. This has created a bandwidth challenge for organizations as they struggle to ensure that there is enough bandwidth available to allow uninterrupted flow of data across offices, data centers and backup sites. It is not economically feasible to keep adding bandwidth to ensure a good transfer rate for network traffic. It makes far more economic sense to monitor network traffic for optimal bandwidth usage. Network traffic usage tends to fluctuate depending on business need, making it important to monitor network traffic to avoid unexpected performance breakdowns. A network breakdown in the middle of an important business activity can prove to be very costly for the organization which is why most organizations chose to take preemptive action by monitoring network traffic to identify problems before they can actually occur.
  • 3. 3© Copyright Comviva Technologies Limited. 2015 A network traffic monitoring tool helps identify applications that are consuming more bandwidth as well as applications which are running slower than usual signaling a possible problem area. Monitoring network traffic also helps organizations optimize bandwidth usage according to business need by prioritizing the flow of network traffic according to business priorities. It enables organizations to validate smooth working of QoS policies. There are many benefits that organizations can enjoy by monitoring network traffic. These benefits are: • Deliver higher quality service to users by optimizing bandwidth usage • Reduce performance and server breakdowns • Make it easy to identify and troubleshoot network problems • Reduce cost associated with purchasing additional bandwidth for smooth network performance • Identify and optimize applications using high bandwidth
  • 4. 4© Copyright Comviva Technologies Limited. 2015 It is not only big organizations that need to monitor network traffic. Even small businesses and homes with multiple devices consuming bandwidth need to be monitored for network traffic to ensure that bandwidth is not being consumed uselessly. It is very easy to setup your system for monitoring network traffic; all you require is a basic understanding of protocols and network.
  • 5. 5© Copyright Comviva Technologies Limited. 2015 The first step is to install a network-monitoring tool on to your system. There are plenty of network monitoring tools available online and downloading one is extremely easy and simple. Next, begin recording traffic data by clicking on the Start button. You can then begin viewing data captured while the application is still recording or you can stop the recording to view all the captured data. It is then possible to analyze the data that is already recorded while the program is still recording. Monitoring network traffic
  • 6. 6© Copyright Comviva Technologies Limited. 2015 Network traffic data can be analyzed to determine: • Any unwanted data being received or sent from your system. • Any unwanted systems participating in your network • Any programs using up bandwidth more than expected • Usage pattern across programs, how often do programs run updates etc • Programs consuming maximum bandwidth As network traffic continues to grow with the explosion of the internet and social media, monitoring network traffic has become a business and personal imperative to ensure your network is able to perform at optimal capacity. Monitoring network traffic
  • 7. 7© Copyright Comviva Technologies Limited. 2015 However, the merchant network of current mobile money services is limited. Customers can pay only via mobile money to merchants who are registered with the mobile money service provider. We have to move beyond the closed loop systems and embrace an open-loop merchant payment approach. To enable open-loop payments mobile money providers are integrating with global card networks like MasterCard and Visa to issue companion cards (linked to mobile money account) which can be used for payment at any MasterCard and Visa powered POS machine both nationally and internationally. The open-loop approach exponentially increases the merchant acceptance network for mobile money. Even virtual cards linked to mobile money account can be issued for making online transactions.
  • 8. 8© Copyright Comviva Technologies Limited. 2015 Disclaimer Copyright © 2015: Comviva Technologies Ltd, Registered Office at A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India. All rights about this document are reserved and shall not be , in whole or in part, copied, photocopied, reproduced, translated, or reduced to any manner including but not limited to electronic, mechanical, machine readable ,photographic, optic recording or otherwise without prior consent, in writing, of Comviva Technologies Ltd (the Company). The information in this document is subject to changes without notice. This describes only the product defined in the introduction of this documentation. This document is intended for the use of prospective customers of the Company Products Solutions and or Services for the sole purpose of the transaction for which the document is submitted. No part of it may be reproduced or transmitted in any form or manner whatsoever without the prior written permission of the company. The Customer, who/which assumes full responsibility for using the document appropriately. The Company welcomes customer comments as part of the process of continuous development and improvement. The Company, has made all reasonable efforts to ensure that the information contained in the document are adequate, sufficient and free of material errors and omissions. The Company will, if necessary, explain issues, which may not be covered by the document. However, the Company does not assume any liability of whatsoever nature , for any errors in the document except the responsibility to provide correct information when any such error is brought to company’s knowledge. The Company will not be responsible, in any event, for errors in this document or for any damages, incidental or consequential, including monetary losses that might arise from the use of this document or of the information contained in it. This document and the Products, Solutions and Services it describes are intellectual property of the Company and/or of the respective owners thereof, whether such IPR is registered, registrable, pending for registration, applied for registration or not. The only warranties for the Company Products, Solutions and Services are set forth in the express warranty statements accompanying its products and services. Nothing herein should be construed as constituting an additional warranty. The Company shall not be liable for technical or editorial errors or omissions contained herein. The Company logo is a trademark of the Company. Other products, names, logos mentioned in this document , if any , may be trademarks of their respective owners. Thank you Visit us at www.mahindracomviva.com
  • 9. 9© Copyright Comviva Technologies Limited. 2015