Issues in the Passive Approach of Network Traffic Monitoring

Size: px
Start display at page:

Download "Issues in the Passive Approach of Network Traffic Monitoring"

Transcription

1 Issues in the Passive Approach of Network Traffic Monitoring Adrián Pekár, Eva Chovancová, Peter Fanfara and Jana Trelová Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics Technical University of Košice, Košice, Slovak Republic {adrian.pekar, eva.chovancova, peter.fanfara, Abstract This paper deals with the issues arising during network traffic monitoring performed by the passive approach of measurement. It describes the most important characteristics of network traffic, which are usually measured during their monitoring, as well as different approaches for the evaluation of network traffic properties. Current research and development in the field of network monitoring is focused on the abilities to measure various network traffic characteristics. The greatest effort is placed on the maximization of their efficiency and minimization of their impacts on the overall functionality of the network. Since there are many approaches for measuring network traffic properties, only the most commonly used ones will be discussed, i.e. active and passive measurement. The paper is concluded with some notes aimed at the future direction by which should research work proceed. I. INTRODUCTION Nowadays, vast majority of modern electronic devices is connected to a network. These devices, among others, include computers, supercomputers, mobile and wireless devices, satellites, tablets, and other systems. They are usually called by one common name end node or end system. Computer networks describe a set of interconnected devices for communication and information exchange. Data transfer between end systems is provided by network devices which serve the computer networks. Therefore, behind the full functionality of today s Internet is a wide range of network devices such as repeater, hub, switch, bridge, router, gateway, etc. Equally important network components are the links enabling physical transmission of data, whether between network devices, end systems or a combination thereof. Over the last decade, computer networks have become an integral part of everyday life. They are used for personal communication, data sharing, public dissemination of news, transfer of private data, collaboration, telephony, business, education, entertainment, socializing, etc. In the vast majority, the source of these activities are the users and applications they use. The result is a huge volume of data that form the traffic of computer networks. With such a wide and diverse characteristics, an important aspect during the design, management and optimization of today s complex and high-speed computer networks is to measure and monitor their various properties. Network measurements and monitoring provide important information to the users, Internet service providers (ISP), researchers or other members of the public and scientific community. On the basis of this information is possible to ensure the quality, performance and full functionality of computer networks, their services and applications. In the following sections an analytical background of network monitoring and their properties will be presented; starting with a brief description of the most important traffic characteristics, whose measurement is in terms of network monitoring useful; continuing with the definition of the identified open issues occurring during monitoring of traffic characteristics; up to the verification of these issues. The last section of this paper draws a conclusion and some future directions. II. MOTIVATION In the terminology of computer networks along with the term monitoring often appears measurement. In addition, in some cases is about measurement spoken as if it was an inseparable part of monitoring. The fact is, that measurement and monitoring represent a wide area of computer networks, besides both of them form an indispensable pillar of a mechanism, which stands behind today s high-speed computer networks. The relationship between monitoring and measurement is quite simple. Without measurement of network traffic and subsequent evaluation of the measured data would be impossible to perform network monitoring. Without monitoring would be then impossible to control, manage, secure and optimize networks. While in case of network monitoring and measurements the most important entities are traffic characteristics, in case of evaluation the most important role play the apparatus selected from the area of mathematical sciences. Therefore, an exceptional attention should be payed to them during network monitoring and other related tasks. Network traffic measurement is important for a wide range of different activities. For example, performance analysis to solve problems concerning bandwidth, packet loss or delay requires an accurate measurement of network traffic. Network traffic characteristics can be also useful for network-based applications to adapt their requirements to the properties and limits of the network. User experiences with network-based applications is given by the frequency, duration and severity of events (e.g. failures, changes in routing or miss-configuration), that affect the quality of the used network services. Tools for

2 the detection, isolation and determination of the root causes of these events are very important [20]. Not only to timely react and minimize the effects of these events, but also to maintain the competitiveness and reputation of ISPs. From the measured data providers can obtain important information, which are usually used for performance characteristics evaluation, anomaly detection and customer invoicing. Although computer networks belong to the ever-evolving fields of information technology, the number of new connections whether in form of devices or users and rapid increase in the volume and content of the traffic makes monitoring more and more difficult. Individual tasks related to monitoring and evaluation of measured values is surrounded by a couple of issues. Over the past decade adequate part of these issues had been successfully resolved. Various techniques [12], methods and tools were created for collecting and evaluating [1] the characteristics of converged networks. However, some problems still remain unresolved. III. PROPERTIES OF COMPUTER NETWORKS Computer Networks are characterized by many different properties, that from the perspective of network traffic monitoring is important to measure. Some of these properties are related to physical components, others to the traffic itself. An important group of properties is represented by those characteristics, which arise from the interaction of physical components and the traffic. Time is one of the basic entities, which also plays an important role in almost every operation associated with network monitoring. A. Properties of Physical Components Physical components constitute the basic elements of networks, which among others, include [7]: Links interesting parameters to measure is their propagation delay and capacity. Routers interesting features to measure is the IP address, type of supported protocols, time required to deliver the packet, etc. B. Traffic Properties Today s computer networks are capable of transmitting large amount of data. These data can be considered as a collection of packets or bytes, which define the traffic of networks. Traffic usually covers all types of data transmission (video, voice, data, control messages, etc.) in a given unit of time, but in some cases it can by limited to a specific session, messages, records or group of users. So an interesting property to measure in case of network monitoring are the packets, packet trains [7] or octets (bytes) of the traffic. Another important property of network traffic is the IP flow. According to the IPFIX standard [6], IP flow is defined as a set of IP packets passing an observation point during a certain period of time. All the packets belonging to the same flow have common features. More detailed information about IP flows and the IPFIX protocol is provided in [6], [16]. C. Characteristics Resulting from the Interaction of the Network Infrastructure and the Traffic There are many properties of traffic, that are affected by the state of the network. These properties can be thought as the result of the interaction between the traffic and network infrastructure [7]. Characteristics resulting from this interaction are often referred to as the parameters related to quality of services (QoS) [11]. The most important parameters are depicted in Tab. I. TABLE I MOST IMPORTANT PARAMETERS OF QUALITY OF SERVICES Parameter Bandwidth Packet loss One-way delay (OWD) Description Parameter defined as the effective amount of data transfered per a unit of time. Number of undelivered or corrupted packets. Time required to send a packet from a source to a destination. Jitter A parameter defined for two packets (P i, P i+1 ) as the difference between the value of one-way delay of packet P i and the value of one-way delay of packet P i+1. Round-trip time (RTT) Throughput D. Time Characteristics Time required to a packet to travel from a source to a destination and back. Number of packets transmitted per a unit of time. A frequent requirement during network traffic monitoring is capturing time characteristics. The accuracy of the measured properties like round-trip time (RTT) or one-way delay (OWD) are highly dependent on the measurement of time characteristics. Since the individual network devices are often distributed in a significant distance, obtaining accurate time information can be a demanding task. Many problems are related to the accuracy of clocks, by which time characteristics are determined [9]. IV. NETWORK TRAFFIC MONITORING Network monitoring describes the activity of a system, which continuously monitors the entire network and its traffic. The main feature of this system is, that in case of any anomaly, failure or unusual event, it immediately alerts the system administrator. Except continuous surveillance, monitoring is also used in case of the management of network traffic, various accesses, components, etc. These already complex tasks further complicates the topological (physical connection of all components) and computational (routing and management activities of network components) complexity of the networks. Network monitoring is highly conditioned by data collection. This activity is known as network properties measurement and among with the evaluation of the measured data, it forms the most important parts of the monitoring process. There are many approaches for network traffic parameters measurements. The most common are active and passive measurement approaches. Both provide different types of results, while they are typically used in various measuring setups and for different purposes.

3 A. Active Measurement Active measurement of network properties is based on the ability to insert probe packets into the monitored network. By monitoring and subsequent measurement of probe packets is possible to obtain the operational visibility of the network and other important properties. An example of active measurement is shown in Fig. 1. Fig. 2. The architecture of passive measurement. Fig. 1. The architecture of active measurement. In some cases, probe packets are directly sent to a server or applications. This way, it is possible to get an overview of the state of network services. The following two properties can be derived from active measurements: active measurement requires additional traffic generation, the traffic and its parameters are artificial. One unsolicited side effect of active measurements can be the increase of network load, which can lead to the affection or complete degradation of the measurement results. Another disadvantage of active measurement is, that it provides only limited information about the observation point. Instead, it provides various kind of characteristics about the connection between two nodes. Usually they are performance properties, such as round-trip time (RTT), average packet loss, bandwidth of the connection or packet throughput. In some cases, active measurements can provide information about asymmetric delay or routing changes between two nodes. Existing tools based on active measurement are for example Ping or Traceroute. B. Passive Measurement The process of passive measurement does not require additional generation or modification of the existing traffic. The measured traffic is generated only by the connected users and network applications. An example of passive measurement is depicted in Fig. 1. Passive measurement is usually performed by the means of: Network components (switches, routers, end devices, etc.) with built in traffic collection mechanism. These mechanisms,for example, are Netflow [5], SNMP [3], etc. Software tools (BEEM [10], Wireshark [24], etc.) designed for collecting and processing network data. Collecting measured data from these resources is performed periodically. The evaluation of the collected data determines the required network traffic characteristics (performance, state, etc.). The advantage of passive measurements is, that it is performed on real traffic. Unlike active measurement, passive measurement does not increase the load of the network traffic. Unfortunately, pulling and collecting the measured data can cause a certain increase of traffic (especially in case of capturing every single packet). So this advantage is only relative. A solution describes assigning an individual path for the measured traffic. This way, information related to passive measurement will not be interfered with the real traffic, which will consequently lead to unaffected results. Considering, that in some cases each packet is measured, passive measurement may face problems related to privacy or information security [21], [22]. In contrast to active measurements, passive measurements provide detailed set of information about the observation point. These information are for example types of data that make up the traffic mix (data, services, protocols, audio, video, etc.), packet intensity, packet timings or packet delay. V. ISSUES RELATED TO THE MEASUREMENT OF NETWORK TRAFFIC CHARACTERISTICS Network traffic monitoring and properties measurement describe a challenging task. Especially in large and complex computer networks. Measurements can be virtually realized at any point (location) of the network. Since all of these points has some specific features which are valuable to measure during network monitoring the location of observation points belongs to one of the most common issues [7]. Another common problem describes the notion of time. Time is one of the basic entities, which plays a key role in almost every operation related to network traffic monitoring and has a strong effect on the accuracy of the results. This section provides a brief description of the most critic open issues. A. Data volume A common problem of the infrastructural entities (router, links, etc.) is to determine the appropriate volume of the measured data. The main task of network entities is to ensure a smooth and fast data transfer. In case of today s converged networks it means a huge amount of data.

4 The deployment of traffic monitoring can in some cases instead of quality and manageability increase bring an opposite effect, i.e. bring load to the entities or traffic. If for instance the individual network devices are affected by control messages and measured data transfered between the monitoring system and observation points, it can easily lead to the decrease of traffic performance, delays or even data loss. Depending on higher level protocols [19], this data loss may or may not be handled. In such case, network monitoring loses its benefits and in certain cases it becomes undesirable. In order to cope with increasingly demanding requirements of high-speed links monitoring mechanisms have to be regularly optimized. B. Asymmetry of System Resources Another issue is the asymmetry between system resources of measuring (monitoring) system and the network, which is measured (monitored) [13]. Although only a small part of traffic is measured, the network has still a lot more devices than the monitoring system. This results in an incomparable difference between their computational capabilities. In addition, capturing and storing information about traffic for later analysis is further restricted by parameters such as bandwidth, speed and capacity of the memory or disk. Since traffic bursts can also arise, when ensuring the execution of the most common tasks such as filtering or routing, it is difficult to estimate the system requirements of the router. If a router has to allocate a fixed portion of system resources for measurements, most will do at the expense of other functionalities (like limiting the ability to cope with sudden traffic changes). Even if a hardware capable of monitoring the appropriate part of traffic flows exists, collecting simpler metrics such as counts (packet or octet counts) can consume a significant portion of available system resources. This asymmetry requires the development of efficient techniques and approaches for network traffic monitoring. C. Creation and Export of Flow Records Routers besides capturing packets are often involved in creating aggregated information about traffic flows. This kind of aggregation is ensured by a flow record, which consists of information about key characteristics of the network traffic. These records are periodically exported for various purposes, such as monitoring traffic properties, accounting or network management [5], [6]. Routers from Cisco Systems [4], by their proprietary Netflow protocol [5] are capable of creating such flow records, which contain important statistics about network traffic. The most used fields of these flow records are presented in Tab. II. Netflow records are created: after the expiration of an optionally adjustable time period, while the end points are inactive (passive timeout), if one party terminates the connection, after exceeding an optionally adjustable time period, while the end points are still active (active timeout), if the router needs to empty its buffer. Despite the fact that flow records represent an effective form of aggregated meta-information, simple monitoring of a large number of flows and subsequent generation of records may significantly load the router [7]. Limitations of the memory and computation functionalities in combination with the main task of the router which is routing have led to a variety of sophisticated methods for reducing the amount of processed data. Such techniques are packet sampling [2] and summarization [8]. Like routers, tools for collecting flow records which are often some external software of hardware components of the measurement may also have their own bandwidth, memory size or computational capacity. It follows, that without optimization of these tools or measurement techniques itself, packet dropping or data loss can occur [7], [23]. D. The Error Rate of Monitoring Tools Most of the existing monitoring mechanisms, during the analysis of the measured values take into account only one property (attribute) of the network traffic [18]. If the evaluated value of this property fluctuates around a predefined limit, the monitoring tool may incorrectly judge the situation and report false alarms. Such a situation can happen, if the permissible value of, e.g. bandwidth, fluctuates around a standard value, which may consequently cause, that the monitoring mechanism limit some functionalities of the system or report too many warnings even if threads or problems are not present [18]. In this case, the accuracy and quality of the monitoring mechanisms can be easily queried. E. Real-Time Data Evaluation The ability of processing adequate portion of measured data in real-time describes also a difficult task. Storing the data in a database is in terms of real-time data evaluation absolutely inapt [23]. Too frequent export of flow records can cause the reduction of network traffic performance, delays or data loss. Therefore, data exchange between the monitoring system and the observation point(s) is normally performed in larger time scales. Although by this approach is possible to reduce the unwanted traffic load, the evaluation of data in real-time becomes hardly performable. Therefore, it is necessary to determine the right balance between the time intervals of flow record exports and efficient use of available (system) resources. However, this task in today s networks with frequently changing characteristics is without automated processes almost impossible to achieve. VI. EXAMINING THE IDENTIFIED ISSUES To verify the identified issues occurring during network traffic monitoring, a group of experiments was performed. The experiments were focused: on the estimation of the average volume of data, that must be processed during monitoring; on the determination of the average usage of system resources, which network monitoring brings in itself.

5 TABLE II THE MOST USED NETFLOW V9 FIELD TYPE DEFINITIONS [5] Field Type Value Length (bytes) Description. SRC_TOS 5 1 Type of Service byte setting when entering incoming interface. L4_SRC_PORT 7 2 TCP/UDP source port number i.e.: FTP, Telnet, or equivalent. IPV4_SRC_ADDR 8 4 IPv4 source address. L4_DST_PORT 11 2 TCP/UDP destination port number i.e.: FTP, Telnet, or equivalent. IPV4_DST_ADDR 12 4 IPv4 destination address. SRC_AS 16 N (default is 2) Source BGP autonomous system number where N could be 2 or 4. DST_AS 17 N (default is 2) Destination BGP autonomous system number where N could be 2 or 4. DST_TOS 55 1 Type of Service byte setting when exiting outgoing interface. IP_PROTOCOL_VERSION 60 1 Internet Protocol Version Set to 4 for IPv4, set to 6 for IPv6. If not present in the template, then version 4 is assumed. flowstartmicroseconds 154 datetimemicroseconds The absolute timestamp of the first packet of this Flow. flowendmicroseconds 155 datetimemicroseconds The absolute timestamp of the last packet of this Flow. Fields flowstartmicroseconds and flowendmicroseconds are defined by IANA registry of IPFIX information elements. To determine the average volume of data which is necessary to process during network monitoring and the approximate load of system resources, some measurements in two existing networks were performed. Each of them had different number of connected devices and various speed of links. The experiments were realized repeatedly. From the obtained results the average values of the data volume collected within 1 hour were determined. During measurements, the average load of the router (Cisco 2811, IOS 12.4T) which except standard routing tasks also participated in the generation end export of Netflow [5] flow records was also recorded. The results are summarized in Tab. III. TABLE III SUMMARIZATION OF THE PERFORMED EXPERIMENTS Network I Network II Number of end devices Speed of interface/link 100 Mb/s Mb/s Volume of transferred data 210 MB MB Count of transferred packets Average usage of CPU without Netflow 3 % 31 % Average usage of CPU with Netflow 6 % 48 % The results indicate that although neither of network monitoring load the link or the system resources to their maximum limits, yet, it can be concluded, that a relatively large amount of data was transferred through the networks. Moreover, with the increase of the speed of lines the system requirements would proportionally increase too. For example, when monitoring traffic on links with speed 1 GB/s, it would be necessary to process and evaluate approximately 112 TB of data per a day. However, at present, there are much more faster approaches to transfer data [17]. It can be thus concluded, that the problems related to large volume of data, that have to be processed during monitoring and the resulting utilization of system resources are relevant and present in today s computer networks. In addition, the analysis in [15] confirms, that existing techniques and methods addressed to solve these problems are not quite sufficient. VII. DIRECTIONS OF NETWORK TRAFFIC MONITORING OPTIMIZATION By the notion optimization of network traffic monitoring is meant the design and implementation of such mechanisms and methods, which are addressed to solve the issues surrounding network monitoring. Due to the open problems mentioned in previous sections and the results of the performed experiments, the optimization of network traffic monitoring should mainly focus on: the minimization of the overall network congestion and load caused by monitoring, the increase of the efficiency of the use and minimization of the load of system resources by the monitoring mechanisms, the increase of the accuracy of the evaluation processes, the maximization of the ability of real-time data evaluation. These goals should be achieved by an adaptive export method of information about the network traffic flows. The load of system resources by the monitoring mechanisms is due to the changing nature of network traffic often ineffective. A significant lack of existing solutions is the absence of adaptive exporting methods, which take into account the actual state and properties of network traffic. A conceptual design of such an adaptive export method is the following: As problems mentioned in previous section mainly occur during passive measurement of network properties, future direction should be aimed at the adaption of some particular properties of flow records export to the actual state of network traffic. Such properties include, for example, the volume of the data, that is used for the generation of flow records or the time interval of their export. With this approach is possible to significantly contribute to the above mentioned objectives of optimization. In case of adaptive export, it is also necessary to determine the appropriate balance between the export intervals and the efficient utilization of the available network and system resources. Export intervals are important for realtime monitoring, which favor the smallest period of time intervals.

6 To achieve the efficient evaluation of data a multidimensional analysis of various traffic properties will be used. In such analysis, during the evaluation of the actual state of network traffic, instead of a single property, more parameters will be taken into account. Using this method is possible to significantly reduce the number of false judgments of the monitoring mechanism. Such an error is for example the one, when the monitoring system raise an alarm even in the case of absence of a threat or problem. A key factor is the definition of properties, that will be one of the input parameters of the adaptive export method. However, this task requires further experiments, which should clearly identify those properties, which by changing their values significantly affect the performance of the network and the efficiency of the utilization of system resources by the monitoring systems. VIII. CONCLUSION AND FUTURE WORK An important aspect of developing, managing and optimizing wide and complex computer networks is the measurement of their burden and behavior. An indispensable tool for the accomplishment of this task is network traffic monitoring. By network monitoring can be possible to detect internal or external attacks or ensure the smooth functionality of delay-sensitive application (VoIP, VoD). It also allows Internet Service Providers (ISP) to ensure the conditions specified in the Service Level Agreement (SLA). Individual tasks related to the network monitoring and the evaluation of the measured properties are surrounded with many problems. Reasonable portion of these problems has been for the last decade successfully solved. However, some problems remained unsolved. This paper gives a brief overview of those properties of networks, which are during their monitoring and measurement the most frequently followed, as well as different approaches for determining the characteristics of network traffic. It also lists some open issues, that occur during monitoring. The output of this paper is a conceptual design of an adaptive method for the export of records about IP flows. This method is addressed to optimize the monitoring of network traffic. Future work will be aimed at the preparation of a more detailed design of this method as well as its implementation in the SLAmeter [14] network traffic metering and monitoring tool s architecture. ACKNOWLEDGMENT This work was supported by the Slovak Research and Development Agency under the contract No. APVV (70%). This work is also the result of the project implementation Development of the Center of Information and Communication Technologies for Knowledge Systems (project number: ) supported by the Research & Development Operational Program funded by the ERDF (30%). REFERENCES [1] N. Ádám, Single input operators of the df kpi system, Acta Polytechnica Hungarica, vol. 7, no. 1, pp , [2] M. Canini, D. Fay, D. Miller, A. Moore, and R. Bolla, Per flow packet sampling for high-speed network monitoring, in Communication Systems and Networks and Workshops, COMSNETS First International, jan. 2009, pp [3] J. Case, M. Fedor, M. Schoffstall, and J. Davin, Simple Network Management Protocol (SNMP), RFC 1098, Internet Engineering Task Force, Apr [4] I. Cisco Systems, Understanding and designing sundials, [Online]. Available: [5] B. Claise, Cisco Systems NetFlow Services Export Version 9, RFC 3954 (Informational), Internet Engineering Task Force, [6] B. Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information, RFC 5101 (Proposed Standard), Internet Engineering Task Force, [7] M. Crovella and B. Krishnamurthy, Internet Measurement: Infrastructure, Traffic and Applications. John Wiley and Sons, Inc, [8] B. Donnet, T. Friedman, and M. Crovella, Improved algorithms for network topology discovery, Passive and Active Network Measurement, pp , [9] J. Giertl, L. Husivarga, M. Révés, A. Pekár, and P. Fecil ak, Measurement of network traffic time parameters, in In Proceedings of the Eleventh International Conference on Informatics, (Informatics 11), Rožňava, Slovakia, 2011, pp [10] F. Jakab, L. Koščo, M. Potocký, and J. Giertl, Contribution to qos parameters measurement: The basicmeter project, in Proc. International Conference on Emerging elearning Technologies and Applications (ICETA 05), Košice, Slovakia, 2005, pp [11] H. J. Lee, M. S. Kim, J. W. Hong, and G. H. Lee, QoS Parameters to Network Performance Metrics Mapping for SLA Monitoring, [12] M. Michalko, Video streaming in wireless networks using avismo concept, Journal of Information, Control and Management Systems, vol. 9, no. 2, pp , [13] R. Pang, Towards understanding application semantics of network traffic, Ph.D. dissertation, Princeton University, Princeton, NJ, USA, [14] A. Pekár, J. Giertl, M. Révés, P. Fecil ak, and M. Antl, The sla meter tool, in In Proceedings of Electrical Engineering and Informatics 3, (EEI III), 2012, pp [15] A. Pekár, Modelovanie a návrh systémov pre monitorovanie siet ovej prevádzky, [16] J. Quittek, T. Zseby, B. Claise, and S. Zander, Requirements for IP Flow Information Export (IPFIX), RFC 3917 (Informational), Internet Engineering Task Force, [17] N. Schlepple, M. Nishigaki, H. Uemura, K. Obara, H. Furuyama, Y. Sugizaki, H. Shibata, and Y. Koike, 40 gbps high-speed link over thin gi 50/125 plastic optical fibers and compact optical sub-assembly, [18] I. Shimokawa and T. Tarui, Network monitoring method based on self-learning and multi-dimensional analysis, in In Proceedings of The Second International Conference on Advances in Information Mining and Management, (IMMM 12), 2012, pp [19] A. Tanenbaum and D. Wetherall, Computer Networks: International Version. Prentice Hall, [20] L. Vokoroko, A. Baláž, and B. Madoš, Intrusion detection architecture utilizing graphics processors, Acta Informatica Pragensia, vol. 1, no. 1, pp , [21] L. Vokorokos, N. Ádám, and A. Baláž, Application of intrusion detection systems in distributed computer systems and dynamic networks, in In Proceedings of Computer Science and Technology Research Survey, (CST 08), 2008, pp [22] L. Vokorokos, A. Kleinová, and O. Látka, Network security on the intrusion detection system level, in In Proceedings of the 10th IEEE International Conference on Intelligent Engineering Systems, (INES 06), 2006, pp [23] L. Vokorokos, A. Pekár, and N. Ádám, Data preprocessing for efficient evaluation of network traffic parameters, in IEEE 16th International Conference on Intelligent Engineering Systems, (INES 12), 2012, pp [24] Wireshark, Network protocol analyzer, [Online]. Available:

Preparing Databases for Network Traffic Monitoring

Preparing Databases for Network Traffic Monitoring Preparing Databases for Network Traffic Monitoring Liberios Vokorokos Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Computers and Informatics Letná 9, 042 00

More information

A Review of the Measuring Platform

A Review of the Measuring Platform Measuring Platform Architecture Based on the IPFIX Standard Alžbeta Kleinová, Anton Baláž, Jana Trelová, Norbert Ádám Department of Computers and Informatics, Technical University of Košice Letná 9, 042

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

QOS IN NETWORK TRAFFIC MANAGEMENT

QOS IN NETWORK TRAFFIC MANAGEMENT 24 Acta Electrotechnica et Informatica, Vol. 10, No. 4, 2010, 24 28 QOS IN NETWORK TRAFFIC MANAGEMENT Peter FECIĽAK, Katarína KLEINOVÁ, Jozef JANITOR Department of Computers and Informatics, Faculty of

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Signature-aware Traffic Monitoring with IPFIX 1

Signature-aware Traffic Monitoring with IPFIX 1 Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Monitoring and analyzing audio, video, and multimedia traffic on the network

Monitoring and analyzing audio, video, and multimedia traffic on the network Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University

More information

How To Understand Network Performance Monitoring And Performance Monitoring Tools

How To Understand Network Performance Monitoring And Performance Monitoring Tools http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, paul.moceri@gmail.com Abstract The growing

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Network Performance Evaluation of Latest Windows Operating Systems

Network Performance Evaluation of Latest Windows Operating Systems Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Study of Network Performance Monitoring Tools-SNMP

Study of Network Performance Monitoring Tools-SNMP 310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

Cisco Bandwidth Quality Manager 3.1

Cisco Bandwidth Quality Manager 3.1 Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.

More information

Infrastructure for active and passive measurements at 10Gbps and beyond

Infrastructure for active and passive measurements at 10Gbps and beyond Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA

More information

Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette

Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and

More information

Getting Started with VoIP Reports

Getting Started with VoIP Reports With ehealth VoIP, you have a powerful system for monitoring and managing your Voice over IP (VoIP) configuration. ehealth reports provide the information you need to answer these questions: Is the VoIP

More information

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer

More information

Beyond Monitoring Root-Cause Analysis

Beyond Monitoring Root-Cause Analysis WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Getting Started with. Avaya TM VoIP Monitoring Manager

Getting Started with. Avaya TM VoIP Monitoring Manager Getting Started with Avaya TM VoIP Monitoring Manager Contents AvayaTM VoIP Monitoring Manager 5 About This Guide 5 What is VoIP Monitoring Manager 5 Query Endpoints 5 Customize Query to Filter Based

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Network Performance Monitoring at Minimal Capex

Network Performance Monitoring at Minimal Capex Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers

More information

Application Latency Monitoring using nprobe

Application Latency Monitoring using nprobe Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

The Impact of QoS Changes towards Network Performance

The Impact of QoS Changes towards Network Performance International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Elevating Data Center Performance Management

Elevating Data Center Performance Management Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Analyzing Full-Duplex Networks

Analyzing Full-Duplex Networks Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three

More information

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications

More information

Verifying Metro Ethernet Quality of Service

Verifying Metro Ethernet Quality of Service White Paper Verifying Metro Ethernet Quality of Service Introduction Metro Ethernet is widely accepted as a cost-effective, resilient, and scalable switching and transport technology. Used for delivery

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com NetFlow Tracker Overview Mike McGrath x ccie CTO mike@crannog-software.com 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

Network traffic monitoring and management. Sonia Panchen sonia.panchen@inmon.com 11 th November 2010

Network traffic monitoring and management. Sonia Panchen sonia.panchen@inmon.com 11 th November 2010 Network traffic monitoring and management Sonia Panchen sonia.panchen@inmon.com 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Best Practices for NetFlow/IPFIX Analysis and Reporting

Best Practices for NetFlow/IPFIX Analysis and Reporting WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Chapter 2. Literature Review

Chapter 2. Literature Review Chapter 2 Literature Review This chapter presents a literature review on Load balancing based Traffic Engineering, VoIP application, Hybrid Neuro-Fuzzy System, and Intra & Inter Domain Networks. 2.1 Load

More information

Beyond Monitoring Root-Cause Analysis

Beyond Monitoring Root-Cause Analysis WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based

More information

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar kosnar@cesnet.cz CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure

More information

NetFlow Tips and Tricks

NetFlow Tips and Tricks NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005 Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature

More information

Infosim Whitepaper VoIP quality monitoring in Cable-TV networks

Infosim Whitepaper VoIP quality monitoring in Cable-TV networks Infosim Whitepaper VoIP quality monitoring in Cable-TV networks The wise adapt themselves to circumstances, as water moulds itself to the pitcher. Chinese Proverb Infosim GmbH & Co KG http://www.infosim.net

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Application Note. Network Optimization with Exinda Optimizer

Application Note. Network Optimization with Exinda Optimizer Application Note Network Optimization with Exinda Optimizer Network traffic optimization reduces the reliance of business upon costly capacity bandwidth upgrades. Optimization is delivered either by prioritization

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

VoIP Monitor Professional

VoIP Monitor Professional Malden Electronics Speech Performance Assessment Product Brochure Brochure Issue 1 Malden Electronics Ltd. 2005 1 Product Overview is a software tool for non-intrusive assessment of speech quality and

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software

More information

Analyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems

Analyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems Visualization, Management, and Control for Cisco IWAN Data sheet Overview Intelligent WAN is a Cisco solution that enables enterprises to realize significant cost savings by moving to less expensive transport

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Measuring the Impact of Security Protocols for Bandwidth

Measuring the Impact of Security Protocols for Bandwidth International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 131-137 MEACSE Publications http://www.meacse.org/ijcar Measuring the Impact of Security

More information

Wireshark Developer and User Conference

Wireshark Developer and User Conference Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology cwhite@riverbed.com SHARKFEST

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information