Performance Analysis of Open Source Solution "ntop" for Active and Passive Packet Analysis Relating to Application and Transport Layer

被引:0
|
作者
Qureshi, Sirajuddin [1 ]
Das, Gordhan [2 ]
Tunio, Saima [2 ]
Ullah, Faheem [1 ]
Nazir, Ahsan [1 ]
Wajahat, Ahsan [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sindh Agr Univ Tandojam, Informat Technol Ctr, Sindh, Pakistan
关键词
ntop; network monitoring; packet analysis; the application layer; transport layer;
D O I
10.14569/IJACSA.2019.0100304
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key issue facing operators around the globe is the most appropriate way to deal with spotting black in networks. For this purpose, the technique of passive network monitoring is very appropriate; this can be utilized to deal with incisive problems within individual network devices, problems relating to the whole LAN (Local Area Network) or core network. This technique, however, is not just relevant for troubleshooting, but it can also be castoff for crafting network statistics and analyzing network enactment. In real time network scenarios, a lot of applications and/or processes simultaneously download and upload data. Sometimes, it is very difficult to keep track of all the uploaded and downloaded data. Wireshark is a tool that is normally used to track packets for analysis between two particular hosts during two particular sessions on the same network However, Wireshark as some limitations such as it is not a good tool for keeping track of bulky network data transferred among various endpoints. On the other side, an open source solution "ntop" offers active as well as passive packet analysis which can be handy for system administrators, networkers and IT managers. Additionally, with ntop VoIP traffic can also be monitored. In this research work, the ntop solution has been deployed to a network facility and performance analysis of ntop solution for various application processes (on application layer) such as HTTP, SSDP (based on HTTPU) against their associated protocols such as TCP/IP, UDP, and VoIP have been analyzed. Additionally, above said processes and protocols have been comprehensively analyzed relating with their client/server breakdown, duration of the connection, actual throughput, total bytes (bytes received and sent) and total bandwidth consumed. This study has been helpful to see the weakest and strongest areas of a particular network in terms of analyzing and deploying network policies. This research work will help the research community to deploy ntop solution for real-time monitoring actively and passively.
引用
收藏
页码:20 / 27
页数:8
相关论文
共 50 条
  • [21] CardIAc: an open-source application for myocardial strain analysis
    Curiale, Ariel Hernan
    Bernardo, Agustin
    Cardenas, Rodrigo
    Mato, German
    INTERNATIONAL JOURNAL OF COMPUTER ASSISTED RADIOLOGY AND SURGERY, 2021, 16 (01) : 65 - 79
  • [22] CardIAc: an open-source application for myocardial strain analysis
    Ariel Hernán Curiale
    Agustín Bernardo
    Rodrigo Cárdenas
    German Mato
    International Journal of Computer Assisted Radiology and Surgery, 2021, 16 : 65 - 79
  • [23] Open Source Web Application Security: A Static Analysis Approach
    Alenezi, Mamdouh
    Javed, Yasir
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [24] Open source web application security: A static analysis approach
    College of Computer and Information Sciences, Prince Sultan University, Riyadh
    11586, Saudi Arabia
    Proc. - Int. Conf. Eng. MIS, ICEMIS,
  • [25] Performance Analysis of Distributed Source Coding and Packet Aggregation in Wireless Sensor Networks
    Di Paolo, L.
    Fischione, C.
    Graziosi, F.
    Santucci, F.
    Tennina, S.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [26] Performance analysis of WAP packet considering RLP layer in CDMA wireless system
    Moon, IY
    Cho, YB
    Roh, JS
    Cho, SJ
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : C44 - C47
  • [27] Analysis and Application of Passive Damping LLCL Filter in Active Power Filter
    Li, Lin
    Guo, Yuanbo
    Zhang, Xiaohua
    2015 IEEE INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2015, : 751 - 755
  • [28] PoN: Open Source solution for Real-time Data Analysis
    Venkatesan, Nikitha Johnsirani
    Kim, Earl
    Shin, Dong Ryeol
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 313 - 318
  • [29] Performance analysis of two open source intrusion detection systems
    Brumen, Bostjan
    Legvart, Jernej
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1387 - 1392
  • [30] Performance Analysis of Transport Control Protocol Flavours in the Existence of Packet Reordering Phenomena
    Yasin, Waheed
    Ibrahim, Hamidah
    Hamid, Nor Asilah Wati Abdul
    Udzir, Nur Izura
    DIGITAL ENTERPRISE AND INFORMATION SYSTEMS, 2011, 194 : 569 - 579