SlideShare a Scribd company logo
1 of 20
Internet Traffic Measurement&
Analysis
Based on App-type
1
 Prepared by :
Khatap
Mosab
Hassan
2
what is the internet traffic?
 Is the flow of data across the Internet.
 Because of the distributed nature of the Internet,
there is no single point of measurement for total
Internet traffic. Internet traffic data from public
peering points can give an indication of Internet
volume and growth, but these figures exclude
traffic that remains within a single service
provider's network as well as traffic that crosses
private peering points
3
4
5
Introduction to Internet
Traffic
 Accurate traffic identification and insightful
measurements, form the foundation of
network business intelligence and network
policy control. Without identifying and
measuring the traffic flowing on their
networks, CSPs (Communicating sequential
processes)are unable to craft new
subscriber services, optimize shared resource
utilization, and ensure correct billing and
charging.
6
Typical traffic classes
1) Sensitive traffic
Sensitive traffic is traffic the operator has an expectation
to deliver on time. This includes VoIP, online gaming,
video conferencing, and web browsing.
2) Best-effort traffic
Best effort traffic is all other kinds of non-deterimental
traffic. This is traffic that the ISP deems isn't sensitive to
Quality of Service metrics (jitter, packet loss, latency).
3) Undesired traffic
This category is generally limited to the delivery of spam
and traffic created by worms, botnets, and other
malicious attacks. In some networks, this definition can
include such traffic as non-local VoIP (for example,
Skype)
7
If we don’t Measure, we don’t
Know What’s Happening !
8
 The Internet is an un-natural system,
in widespread use. Its providers and
users need to understand it!
 ISPs need to manage traffic loads,
detect unusual behaviour
 Researchers need to observe how
traffic behaves, so as to understand
changes in traffic pattern
9
The Internet is always changing.
we need alots of data, to ensure
our measurement consistency.
we need to share our data, so
others can verify our work.
10
 There are many different measurement
techniques
 some of them are ‘direct,’ e.g: send a test
packet to measure transit time
 others are much less direct, e.g:
Packet dispersion to measure available
bandwidth
 Passive methods, e.g. observing links to
measure properties: (sizes, lifetimes) of traffic
flows
11
App. categories of the packet classifiation 12
How we measure internet
traffic application
 Various software tools are available to
measure network traffic.
 Software like :
 Argus
 Cacti
 cFosSpeed
 FlowMon
 LiveAction
 NetBeez
 NetLimiter
 Wireshark
 NetFlow
13
The data collection and
analysis
 We use software wireshark to do it.
 Wireshark is a free and open-
source packet analyzer. It is used
for network troubleshooting,
analysis, software and
communications protocol
development, and education.
14
15
16
17
Protocol Hirarchy Statistics 18
I/O Graph with a filter http 19
1. Measurement WG, APAN 26, Queenstown, 2008
- Nevil Brownlee.
2. http://en.wikipedia.org/wiki/Traffic_classification
3. Williamson, Carey (2001). "Internet Traffic
Measurement". IEEE Internet Computing 5 (6):
70–74.
20

More Related Content

What's hot

A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksSmartenIT
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet ConnectionCSaC
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsKaashivInfoTech Company
 
How network management systems work
How network management systems workHow network management systems work
How network management systems workRyo Yamato
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate SecurityFiroze Hussain
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountabilityLeo Mark Villar
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
GurgaonPoliceSummerCyberSecurityInternship
GurgaonPoliceSummerCyberSecurityInternshipGurgaonPoliceSummerCyberSecurityInternship
GurgaonPoliceSummerCyberSecurityInternshipMandeep Singh Kapoor
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
Comppt2
Comppt2Comppt2
Comppt2Dyern
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaperJuanRios179
 

What's hot (19)

Antony review
Antony reviewAntony review
Antony review
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community Networks
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet Connection
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance frauds
 
How network management systems work
How network management systems workHow network management systems work
How network management systems work
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
Rules of data transmission
Rules of data transmissionRules of data transmission
Rules of data transmission
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
 
Attacks Types
Attacks TypesAttacks Types
Attacks Types
 
Computing safety
Computing safetyComputing safety
Computing safety
 
GurgaonPoliceSummerCyberSecurityInternship
GurgaonPoliceSummerCyberSecurityInternshipGurgaonPoliceSummerCyberSecurityInternship
GurgaonPoliceSummerCyberSecurityInternship
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Ips and its types
Ips and its typesIps and its types
Ips and its types
 
Comppt2
Comppt2Comppt2
Comppt2
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaper
 

Similar to Measuring Internet Traffic by App-Type Using Wireshark

2010.080 1226
2010.080 12262010.080 1226
2010.080 1226swaipnew
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream ComputingIRJET Journal
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveManageEngine, Zoho Corporation
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
 
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine LearningIRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine LearningIRJET Journal
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of thingsMohanad Kaleia
 
Flow questions and answers
Flow questions and answersFlow questions and answers
Flow questions and answersProQSys
 
M-Lab Study of ISP Interconnection
M-Lab Study of ISP InterconnectionM-Lab Study of ISP Interconnection
M-Lab Study of ISP InterconnectionEd Dodds
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationIJERA Editor
 
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...James Crawshaw
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream Splunk
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringDevOps.com
 
TDWI checklist 2018 - IoT & Data Architecture
TDWI checklist 2018 - IoT & Data ArchitectureTDWI checklist 2018 - IoT & Data Architecture
TDWI checklist 2018 - IoT & Data ArchitectureJeannette Browning
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001Eric Rotich
 

Similar to Measuring Internet Traffic by App-Type Using Wireshark (20)

2010.080 1226
2010.080 12262010.080 1226
2010.080 1226
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
The Live: Stream Computing
The Live: Stream ComputingThe Live: Stream Computing
The Live: Stream Computing
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
 
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine LearningIRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
 
G03403041052
G03403041052G03403041052
G03403041052
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of things
 
Flow questions and answers
Flow questions and answersFlow questions and answers
Flow questions and answers
 
M-Lab Study of ISP Interconnection
M-Lab Study of ISP InterconnectionM-Lab Study of ISP Interconnection
M-Lab Study of ISP Interconnection
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classification
 
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
 
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
 
Why Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network MonitoringWhy Use Open Source to Gain More Visibility into Network Monitoring
Why Use Open Source to Gain More Visibility into Network Monitoring
 
TDWI checklist 2018 - IoT & Data Architecture
TDWI checklist 2018 - IoT & Data ArchitectureTDWI checklist 2018 - IoT & Data Architecture
TDWI checklist 2018 - IoT & Data Architecture
 
Network Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai SeminarNetwork Bandwidth management - Mumbai Seminar
Network Bandwidth management - Mumbai Seminar
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Measuring Internet Traffic by App-Type Using Wireshark

  • 2.  Prepared by : Khatap Mosab Hassan 2
  • 3. what is the internet traffic?  Is the flow of data across the Internet.  Because of the distributed nature of the Internet, there is no single point of measurement for total Internet traffic. Internet traffic data from public peering points can give an indication of Internet volume and growth, but these figures exclude traffic that remains within a single service provider's network as well as traffic that crosses private peering points 3
  • 4. 4
  • 5. 5
  • 6. Introduction to Internet Traffic  Accurate traffic identification and insightful measurements, form the foundation of network business intelligence and network policy control. Without identifying and measuring the traffic flowing on their networks, CSPs (Communicating sequential processes)are unable to craft new subscriber services, optimize shared resource utilization, and ensure correct billing and charging. 6
  • 7. Typical traffic classes 1) Sensitive traffic Sensitive traffic is traffic the operator has an expectation to deliver on time. This includes VoIP, online gaming, video conferencing, and web browsing. 2) Best-effort traffic Best effort traffic is all other kinds of non-deterimental traffic. This is traffic that the ISP deems isn't sensitive to Quality of Service metrics (jitter, packet loss, latency). 3) Undesired traffic This category is generally limited to the delivery of spam and traffic created by worms, botnets, and other malicious attacks. In some networks, this definition can include such traffic as non-local VoIP (for example, Skype) 7
  • 8. If we don’t Measure, we don’t Know What’s Happening ! 8
  • 9.  The Internet is an un-natural system, in widespread use. Its providers and users need to understand it!  ISPs need to manage traffic loads, detect unusual behaviour  Researchers need to observe how traffic behaves, so as to understand changes in traffic pattern 9
  • 10. The Internet is always changing. we need alots of data, to ensure our measurement consistency. we need to share our data, so others can verify our work. 10
  • 11.  There are many different measurement techniques  some of them are ‘direct,’ e.g: send a test packet to measure transit time  others are much less direct, e.g: Packet dispersion to measure available bandwidth  Passive methods, e.g. observing links to measure properties: (sizes, lifetimes) of traffic flows 11
  • 12. App. categories of the packet classifiation 12
  • 13. How we measure internet traffic application  Various software tools are available to measure network traffic.  Software like :  Argus  Cacti  cFosSpeed  FlowMon  LiveAction  NetBeez  NetLimiter  Wireshark  NetFlow 13
  • 14. The data collection and analysis  We use software wireshark to do it.  Wireshark is a free and open- source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 19. I/O Graph with a filter http 19
  • 20. 1. Measurement WG, APAN 26, Queenstown, 2008 - Nevil Brownlee. 2. http://en.wikipedia.org/wiki/Traffic_classification 3. Williamson, Carey (2001). "Internet Traffic Measurement". IEEE Internet Computing 5 (6): 70–74. 20