A method for assessing quality of service in broadband networks

Monitoring of Quality of Service (QoS) in high-speed Internet infrastructure is a challenging task. However, precise assessments must take into account the fact that the requirements for the given quality level are service-dependent. Backbone QoS monitoring and analysis requires processing of large amount of the data and knowledge of which kind of application the traffic belongs to. To overcome the drawbacks of existing methods for traffic classification we proposed and evaluated a centralized solution based on C5.0 Machine Learning Algorithm (MLA) and decision rules. The first task was to collect and provide C5.0 high-quality training data, divided into groups corresponding to different types of applications. It was found that currently existing means of collecting data (classification by ports, Deep Packet Inspection, statistical classification, public data sources) are not sufficient and they do not comply with the required standards. To collect training data a new system was developed, in which the major role is performed by volunteers. Client applications installed on their computers collect the detailed data about each flow passing through the network interface, together with the application name taken from the description of system sockets. This paper proposes a new method for measuring the Quality of Service (QoS) level in broadband networks, based on our Volunteer-Based System for collecting the training data, Machine Learning Algorithms for generating the classification rules and application-specific rules for assessing the QoS level. We combine both passive and active monitoring technologies. The paper evaluates different implementation possibilities, presents the current implementation of particular parts of the system, their initial runs and obtained results, highlighting parts relevant from the QoS point of view.

[1]  Zhi-Li Zhang,et al.  Adaptive random sampling for traffic load measurement , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[2]  Tung Le,et al.  Rapid Identification of BitTorrent traffic , 2010, IEEE Local Computer Network Conference.

[3]  Debmalya Panigrahi,et al.  Detecting Anomalies Using End-to-End Path Measurements , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Ying Zhang,et al.  A method for real-time peer-to-peer traffic classification based on C4.5 , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[5]  Samir Al-Khayatt,et al.  An adaptive statistical sampling technique for computer network traffic , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).

[6]  Guochu Shou,et al.  Study of Information Network Traffic Identification Based on C4.5 Algorithm , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Sven Ubik,et al.  Evaluating Application-Layer Classification Using a Machine Learning Technique over Different High Speed Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.

[10]  Jens Myrup Pedersen,et al.  A method for classification of network traffic based on C5.0 Machine Learning Algorithm , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[11]  Jin Li,et al.  Congestion location detection: Methodology, algorithm, and performance , 2009, 2009 17th International Workshop on Quality of Service.

[12]  Gerhard Haßlinger Implications of traffic characteristics on quality of service in broadband multi service networks , 2004, Proceedings. 30th Euromicro Conference, 2004..

[13]  Jens Myrup Pedersen,et al.  Volunteer-based system for classification of traffic in computer networks , 2011, 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers.

[14]  Li Jun,et al.  Internet Traffic Classification Using Machine Learning , 2007, 2007 Second International Conference on Communications and Networking in China.

[15]  Thomas M. Chen,et al.  Internet performance monitoring , 2002 .

[16]  Andrew W. Moore,et al.  A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[17]  Xinbo Song,et al.  An analysis of UDP traffic classification , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[18]  Shunyi Zhang,et al.  Real-Time P2P Traffic Identification , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[19]  Jens Myrup Pedersen,et al.  Volunteer-Based System for Research on the Internet Traffic , 2012 .

[20]  Riyad Alshammari,et al.  Unveiling Skype encrypted tunnels using GP , 2010, IEEE Congress on Evolutionary Computation.

[21]  J.M. Pedersen,et al.  Volunteer-based distributed traffic data collection system , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[22]  Riyad Alshammari,et al.  Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.