{"id":9665,"date":"2018-09-19T10:19:43","date_gmt":"2018-09-19T08:19:43","guid":{"rendered":"https:\/\/web.computaex.es\/?page_id=9665"},"modified":"2025-08-27T10:20:25","modified_gmt":"2025-08-27T08:20:25","slug":"mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion","status":"publish","type":"page","link":"https:\/\/computaex.es\/en\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/","title":{"rendered":"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n"},"content":{"rendered":"<div class=\"field field-name-field-pub-descripcion field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>Currently, communication networks are formed by a heterogeneous set of technologies and protocols in constant evolution, characterized by a great complexity. The current network protocols provide a great performance and reliability, increase the connectivity and the security but each protocol solves a specific problem without a global abstraction.<\/p>\n<p>To solve this problem and to simplify the network management, a new trend called Software Defined Networking (SDN) has emerged. It\u2019s a new network architecture based on the separation between the data plane functions and control plane functions of the network infrastructure, making the management, evolution and operation simplified by adding centralized software approaches.<\/p>\n<p>Due to the expected evolution of networks towards the SDN architecture and the importance of monitoring systems in the management and maintenance of networks, it is necessary to review the classic mechanisms for monitoring network traffic and end devices computing to adapt them to this new scenario.<\/p>\n<p>This project analyzes the new monitoring mechanisms that are currently being proposed for this type of networks, as well as the development of an application for granular monitoring of network data flows and graphical representation of metrics integrated within of the SDN paradigm.<\/p>\n<p>With the development of this prototype, computing and network traffic will be analyzed by means of the data acquired in the network and the performance of the set of data metrics will be represented in real time graphs, which will be the entry requirements to subsequently establish quality of service (QoS) and security policies in the next generation networks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field field-name-field-pub-fuente field-type-text-long field-label-above\">\n<div class=\"field-label\"><strong>Fuente de la publicaci\u00f3n:\u00a0<\/strong><\/div>\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<ul>\n<li>Daniel Gonz\u00e1lez S\u00e1nchez, Javier Carmona Murillo y David Cort\u00e9s Polo.\u00a0<em>Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n<\/em>.\u00a0Trabajo de Fin de Grado en Ingenier\u00eda en Telem\u00e1tica de la Universidad de Extremadura. Septiembre de 2018.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Currently, communication networks are formed by a heterogeneous set of technologies and protocols in constant evolution, characterized by a great complexity. The current network protocols provide a great performance and &#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":1583,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[110,91],"tags":[],"class_list":["post-9665","page","type-page","status-publish","hentry","category-anteriores","category-publicaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computaex.es\/en\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"og:description\" content=\"Currently, communication networks are formed by a heterogeneous set of technologies and protocols in constant evolution, characterized by a great complexity. The current network protocols provide a great performance and ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computaex.es\/en\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/computaex\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T08:20:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@computaex\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/\",\"url\":\"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/\",\"name\":\"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/#website\"},\"datePublished\":\"2018-09-19T08:19:43+00:00\",\"dateModified\":\"2025-08-27T08:20:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/computaex.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publicaciones\",\"item\":\"https:\/\/computaex.es\/publicaciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computaex.es\/#website\",\"url\":\"https:\/\/computaex.es\/\",\"name\":\"Fundaci\u00f3n COMPUTAEX\",\"description\":\"COMPUTAEX\",\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computaex.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computaex.es\/#organization\",\"name\":\"COMPUTAEX\",\"url\":\"https:\/\/computaex.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"width\":2560,\"height\":970,\"caption\":\"COMPUTAEX\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/computaex\/\",\"https:\/\/x.com\/computaex\",\"https:\/\/es.linkedin.com\/company\/cenits\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computaex.es\/en\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/","og_locale":"en_US","og_type":"article","og_title":"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX","og_description":"Currently, communication networks are formed by a heterogeneous set of technologies and protocols in constant evolution, characterized by a great complexity. The current network protocols provide a great performance and ...","og_url":"https:\/\/computaex.es\/en\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/","og_site_name":"Fundaci\u00f3n COMPUTAEX","article_publisher":"https:\/\/m.facebook.com\/computaex\/","article_modified_time":"2025-08-27T08:20:25+00:00","og_image":[{"width":1024,"height":403,"url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@computaex","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/","url":"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/","name":"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n - Fundaci\u00f3n COMPUTAEX","isPartOf":{"@id":"https:\/\/computaex.es\/#website"},"datePublished":"2018-09-19T08:19:43+00:00","dateModified":"2025-08-27T08:20:25+00:00","breadcrumb":{"@id":"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/computaex.es\/publicaciones\/mecanismos-de-monitorizacion-y-analisis-de-trafico-en-redes-de-proxima-generacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/computaex.es\/"},{"@type":"ListItem","position":2,"name":"Publicaciones","item":"https:\/\/computaex.es\/publicaciones\/"},{"@type":"ListItem","position":3,"name":"Mecanismos de Monitorizaci\u00f3n y An\u00e1lisis de Tr\u00e1fico en Redes de Pr\u00f3xima Generaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/computaex.es\/#website","url":"https:\/\/computaex.es\/","name":"COMPUTAEX Foundation","description":"COMPUTAEX","publisher":{"@id":"https:\/\/computaex.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computaex.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computaex.es\/#organization","name":"COMPUTAEX","url":"https:\/\/computaex.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","width":2560,"height":970,"caption":"COMPUTAEX"},"image":{"@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/computaex\/","https:\/\/x.com\/computaex","https:\/\/es.linkedin.com\/company\/cenits"]}]}},"_links":{"self":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/comments?post=9665"}],"version-history":[{"count":1,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9665\/revisions"}],"predecessor-version":[{"id":9667,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9665\/revisions\/9667"}],"up":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/1583"}],"wp:attachment":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media?parent=9665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/categories?post=9665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/tags?post=9665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}