ABSTRACT
The network traffic management is a key issue as many new emerging applications are flooding the network with their packets. Several time sensitive and low bandwidth applications run along with other time insensitive and bandwidth intensive applications. As a result, most of the time, channel capacity is exhausted by the bandwidth intensive applications like P2P file sharing, Bittorent etc. Hence, there is a limited space left for critical applications. As a result, the accurate identification of network applications through proper observation of associated packets is vital to the areas of network management and surveillance. The overall implication of the accurate traffic management provides space for critical application and also it helps in better management of available network resources like channel capacity etc.
In this paper an approach is propose for the network traffic classification and bandwidth consumption by each protocol. It optimizes the use of the available network capacity and day to day traffic management. The usage of the bandwidth in the network is managed by taking accurate decisions for various types of applications.
Also we propose the priority based bandwidth management approach for management of bandwidth in network. The approach is also able to maintain the QoS requirement of the real time connections by marking the time insensitive but bandwidth intensive traffic. These packets may be dropped for proper traffic management.
- Nguyen, T. T. T. and Armitage, G.2008. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 10, 4, (2008), 56--76. Google ScholarDigital Library
- Ferguson, D. 2006. P2P File Sharing - The Evolving Distribution Chain. CacheLogic, WDC, 2006.Google Scholar
- Kuai Xu, Z. Z., and Supratik Bhattacharyya. 2005. Profiling Internet Backbone Traffic: Bahavior Models and Applications. In Proceedings of the SIGCOMM on Applications, technologies, architectures, and protocols for computer communications 2005, Philadelphia, Pennsylvania, USA, 2005, 169--180,. Google ScholarDigital Library
- Gaogang Xie, Y. M. 2002. Dafang Zhang Router Performance Analysis Based on a Periodical Logarithmic Traffic Model. Chinese Journal of Computers, Vol.25, No.12 Dec.2002).Google Scholar
- A. Lakhina, M. C., C. Diot. 2004. Characterization of Network-Wide Traffic Anomalies in Traffic Flows. In Proceedings of the SIGCOMM conference on Internet measurement. Taormina, Sicily, Italy. 201--206, Google ScholarDigital Library
- G. V. Cristian Estan. 2002. New directions in traffic measurement and accounting. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, Pittsburgh, Pennsylvania, USA. 323--336 Google ScholarDigital Library
- Wikipedia - Quality of service. Available at http://en.wikipedia.org/wiki/Quality_of_service, Last accessed: June 25, 2012.Google Scholar
- Mohsin, M., Wong, W. and Bhatt, Y. 2002. Support for real-time traffic in the Internet, and QoS issues. Department of Computer Science, University of Texas at Dallas, March 30, 2002.Google Scholar
- Force, I. E. T. RFC 2475, An Architecture for Differentiated Services" section 2.3.3.3 - definition of "Shaper". Available at:http://tools.ietf.org/html/rfc2475\#section-2.3.3.3. Last updated: December, 1998. Last accessed: June 25, 2012.Google Scholar
- IANA The Internet Assigned Numbers Authority port-numbers. Available at: http://www.iana.org/assignments/port-numbers. Last accessed: June 25, 2012.Google Scholar
- Szabo, G., Szabo, I. and Orincsay, D. 2007. Accurate Traffic Classification in Proceedings of the. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. Espoo, Finland. 1--8Google Scholar
- Jeffrey, E., Anirban, M. and Martin, A. 2007. Byte me: a case for byte accuracy in traffic classification. In Proceedings of the Proceedings of the 3rd annual ACM workshop on Mining network data (San Diego, California, USA, 2007). ACM, New York, NY, 35--38. Google ScholarDigital Library
- Iliofotou, M., Hyun-chul, K., Faloutsos, M., Mitzenmacher, M., Pappu, P. and Varghese, G. 2009. Graph-Based P2P Traffic Classification at the Internet Backbone. In Proceedings of the INFOCOM Workshops 2009. Rio de Janeiro. 1--6 Google ScholarDigital Library
- Esoft. 2005. Modern Network Security: The Migration to Deep Packet Inspection. 2005Google Scholar
- Nigel, W., Sebastian, Z. and Grenville, A. 2006. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. SIGCOMM Comput. Commun. Rev., 36, 5 2006, 5--16. Google ScholarDigital Library
- Subhabrata, S., Oliver, S. and Dongmei, W. 2004. Accurate, scalable in-network identification of p2p traffic using application signatures. In Proceedings of the 13th international conference on World Wide Web (New York, NY, USA, 2004). ACM, New York, USA, 512--521. Google ScholarDigital Library
- Chaudhary, A. and Sardana, A. 2011. Software Based Implementation Methodologies for Deep Packet Inspection. In Proceedings of the 2011 IEEE International Conference on Information Science and Applications (ICISA). Jeju Island, South Korea. 769--779.Google Scholar
- AbuHmed, T., Mohaisen, A. and Nyang, D. H., 2007. Deep Packet Inspection for Intrusion Detection Systems: A Survey. Technical Report, Security Research Laboratory, Inha University, Information Incheon 402--751, Korea, 2007.Google Scholar
- Zadeh, L. A. 1965. Fuzzy sets*. Information and control, 8, 3 1965), 338--353Google Scholar
- Zadeh, L. A. 1975. The concept of a linguistic variable and its application to approximate reasoning--I* Information sciences, 8, 3 1975, 199--249.Google Scholar
- Zadeh, L. A. 1996. Fuzzy algorithms. World Scientific Publishing Co., Inc., 1996Google Scholar
- Jung-Sun, K., Dong-Geun, K. and Bong-Nam, N. 2004. A fuzzy logic based expert system as a network forensics. In Proceedings of the 2004 IEEE International Conference on Fuzzy Systems. Hungary. 879--884.Google Scholar
- El-Hajj, W., Aloul, F., Trabelsi, Z. and Zaki, N. 2008. On Detecting Port Scanning using Fuzzy Based Intrusion Detection System. In Proceedings of the International Wireless Communications and Mobile Computing Conference. Crete Island. 105--110.Google Scholar
- Raahemi, B., Kouznetsov, A., Hayajneh, A. 2008. and Rabinovitch, P. Classification of Peer-to-Peer traffic using incremental neural networks (Fuzzy ARTMAP). In Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2008. CCECE 2008. Canada. 719--724.Google Scholar
- Zhong, G., Guanming, L. and Daquan, G. 2009. A Novel P2P Traffic Identification Scheme Based on Support Vector Machine Fuzzy Network. In Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009, WKDD 2009. Mascow, Russia. 909--912. Google ScholarDigital Library
- Murgu, A. 1997. Fuzzy clustering of aggregated flows for traffic control in ATM networks. In Proceedings of the Sixth IEEE International Conference on Fuzzy Systems, 1997. Spain. 235--240.Google ScholarCross Ref
- OpenDPI, Homepage. http://www.opendpi.org/, 2010.Google Scholar
- Chaudhary, A. 2011. An Efficient Fuzzy Controller Based Technique for Network Traffic Classification to Improve QoS. M. Tech. Dissertation, Indian Institute of Technology, Roorkee, Roorkee, India, 2011.Google Scholar
- Mamdani, E. H. and Assilian, S. 1975. An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies, 7, 1 1975), 1--13.Google ScholarCross Ref
- Ross, T. J. 2004. Fuzzy logic with engineering applications. John Wiley & Sons Ltd, West Sussex, England, 2004.Google Scholar
- Wikipedia List of TCP and UDP port numbers. Available at http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers, Last accessed: June 25, 2012.Google Scholar
- Madhukar, A. and Williamson, C. 2006. A Longitudinal Study of P2P Traffic Classification. In Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2006. MASCOTS 2006. Monterey, California, USA. 179--188. Google ScholarDigital Library
- Carvalho, D. A., Pereira, M. and Freire, M. M.. 2009. Detection of Peer-to-Peer TV Traffic Through Deep Packet Inspection. In Proceedings of the Acta da 9a Conf. sobre Redes de Computadores (Oeiras, Portugal, Oct.). INESC-ID and Instituto Superior Tt'ecnico, 6.Google Scholar
Index Terms
- An efficient fuzzy controller based technique for network traffic classification to improve QoS
Recommendations
An end-to-end QoS framework with on-demand bandwidth reconfiguration
This paper proposes a new QoS framework, called the On-Demand QoS Path framework (ODP). It provides end-to-end QoS guarantees to individual flows with minimal overhead, while keeping the scalability characteristic of DiffServ. ODP exercises per-flow ...
QoS and bandwidth management in broadband cable access network
Special issue: Management of IT servicesA novel method is presented to switch from the current scheme of "best-effort" networks in which the provisioning of customer services may be unfair, to quality-of-service (QoS) based networks in which bandwidth allocation meets the subscriber's service ...
Comments