Traffic Trace Artifacts due to Monitoring Via Port Mirroring
|
|
|
- Stephen Potter
- 10 years ago
- Views:
Transcription
1 Traffic Trace Artifacts due to Monitoring Via Port Mirroring Jian Zhang and Andrew Moore Deptartment of Computer Science, Queen Mary, University of London Abstract Port-mirroring techniques are supported by many of today s medium and high-end Ethernet switches. The ubiquity and low-cost of port mirroring has made it a popular method for collecting packet traces. Despite its wide-spread use little work has been reported on the impacts of this monitoring method upon the measured network traffic. In particular, we focus upon each of delay and jitter (timing difference), packet-reordering, and packet-loss statistics. We compare the port-mirroring method with inserting a passive TAP (Test Access Point), such as a fibre splitter, into a monitored link. Despite a passive TAP being transparent to monitored traffic, port-mirroring popularity arises from its limited set-up disruption, and (potentially) easier management. This paper documents experimental comparison of traffic using the passive TAP and port-mirroring functionality, and shows that port-mirroring will introduce significant changes to the inter-packet timing, packet-reordering, and packet-loss even at very low levels of utilisation. I. INTRODUCTION Traffic monitoring is crucial to operating all IP networks for many reasons. Whether you want to monitor for security threats, for troubleshooting problems, or for analysis purposes, you need a reliable way to see all of the traffic. Regardless of what analyser or intrusion detection solution you choose, you must decide on a method to give your monitoring equipment physical access to the network traffic. There are three common ways to fulfill this: Attach an analysis or monitoring device to a passive TAP (Test Access Port) inserted into the target link(s). Redirect traffic from the target link to analysis or monitoring equipment attached via a network switch. The network switch duplicates the required traffic from the monitored data-stream, sending the replicas out a dedicated interface/port (in Cisco terminology, a Switch Port ANalyser, or SPAN, and described as port mirroring hereafter in this paper). A hybrid technique approach using a dedicated monitor inserted into target link(s). The port aggregator replicates traffic from one or more of these links and transmits the replicated traffic through a separate interface to the monitoring and analysis equipment. We do not analyse the port-aggregator approach specifically in this paper but we consider it would share some of the disadvantages of the port-mirroring approach with some limited protection This work has been supported by the EPSRC projects GR/S93714/2 and GR/T151/2. Corresponding author: [email protected] /7/$25. c 27 IEEE against packet loss provided by the port aggregator s built-in memory buffer. The advantage of the port-mirroring solution is its cost as this feature is included for free with most managed switches available on the market, it is relatively easy-to-use and may be configured remotely. These advantages indicate why the portmirroring technique has been a popular method for collecting packet traces for various purposes ([1], [2], [3]). However, the traffic trace artifacts incurred due to monitoring via port mirroring has not been well studied, which renders the risk that analysis results based on the traffic trace collected via port mirroring method could be biased or simply incorrect. In this paper, our focus is to answer three fundamental questions about the impact of port-mirroring in terms of timing, reordering and loss: 1) The port-mirroring method needs to buffer packets from the monitored link until they can be sent over the mirroring link. What, then, are the exact differences between the timing of the original packet streams on the monitored link and the timing of their counterparts on the mirroring link? This is particularly important for any analysis which requires the packet inter-arrival times(iats). 2) Are the original packet sequences on the monitored link maintained when the streams are put onto the mirroring link by port mirroring method? In other words, does the reordering occur on the mirroring link, and, if it does, what are the reordering statistics? This question is important to any analysis of packet orders and the the reordering issue also affects the above timingalso impacts IATs. 3) Since the buffer at the mirrored port can be overflowed, the port-mirroring method might lose packets. In this paper, we quantify the properties of packet loss arising due to monitoring via port mirroring. On the other hand, the passive TAP technique has been regarded as most effective and accurate measurement method due to its transparency and robustness (TAPs never drop packets regardless of network conditions). We carried out a number of experiments to try to answer the above questions by comparing the original packet traces collected via the passive TAP and the mirrored traces collected via the port mirroring. Firstly, we constructed the experiment network by using two Cisco Catalyst switches (295) and a number of workstations.
2 Three types of packet traces were generated and fed into the network to investigate the timing, reordering and loss statistics under different traffic patterns and traffic loads. Then we repeated our experiments in a second test network constructed using one Cisco Catalyst switch 295 and one HP switch 2824 to investigate whether the observed statistics are also valid for other switches. Our main findings about the traffic trace artifacts in terms of timing difference, packet-reordering and packet-loss 1 due to monitoring via port mirroring are as follows: The traffic trace artifact in terms of timing difference exists under different traffic load level using different traffic patterns on different switches when the traces are collected via port-mirroring method. Under a certain traffic load level, the statistics of timing difference exhibit quite-similar characteristics for the aggregated traffics in either direction of a monitored link. The mean value of timing-difference statistics increases with an increase in the traffic load on the monitored link and, although a certain timing difference value could be dominant to some extent under a traffic load level, the values of timing difference will span a range of microseconds even under lower traffic loads; When the traces are collected via port mirroring method, a significant percentage of packets get reordered for the aggregated traffic in both directions of a monitored link even under low levels of utilisation. Packet reordering is observed for the aggregated traffic in a single direction of a monitored link especially under higher traffic loads on the link. The reordering time and reordering number statistics exhibit different characteristics for the traffic streams with different packet sizes. And the characteristics of reordering-time and reordering-number for the aggregated traffic in both directions of a monitored link are consistent under different traffic loads. Both the statistics of reordering time and reordering number span a range of values although a certain value can be dominant to some extent. Using the port-mirroring method, M. Arlitt et al.[1] reported their estimated number of lost packets by watching for the gaps in the TCP sequence numbers where they collected the packet traces via the port-mirroring method. As the paper s main purpose was the analysis of TCP reset behavior in the Internet, it did not provide more insights of the losses incurred using port-mirroring technique. Although some white papers [4], [5] predict the possible impacts on traces collected via port mirroring, none of them has given the experiment data to support their predictions. To the best of our knowledge, our paper is the first effort to make a comprehensive study on traffic-trace artifacts incurred due to monitoring via port mirroring. Paper orgainization follows this, in Section 2, the methods 1 Section 2 provides the definitions of timing difference, packet reordering and packet loss used in this paper. NormalPC hosts Fig. 1. Lab Switch1 Fa/1 Gi/1 Fa/2 Fa/x Gi/2 monitored link Fibre Splitter mirroring link DellPowerEdge Server2 with DAG card Lab Switch2 Fa/1 Gi/1 Fa/2 Fa/x DellPowerEdge Server1 with DAG card 1 Gbit/Sec 1 Mbit/Sec NormalPC hosts The network and measurement topology used in our experiments. used in the network experiments to investigate the impacts of port-mirroring on collected traces are discussed. The experiment details and the results are presented in Section 3. Section 4 discusses some implications of our findings on the usage of the port mirroring technique for the future network measurement and monitoring. Section 5 provides concluding remarks and directions for future work. II. METHODS TO INVESTIGATE THE TRAFFIC TRACE ARTIFACTS INCURRED VIA PORT-MIRRORING This section discusses the measurement methods we used in our experiments to investigate the traffic-trace artifacts incurred due to monitoring via port mirroring. We focus on examining whether any traffic-trace artifact: timing difference, packet-reordering and packet-loss, will occur when traffic traces are collected using port-mirroring method and then documentg the artifact characteristic. The passive TAP technique has been regarded as the most effective and accurate method to collect traffic traces due to its robustness and transparency to the measurement data. Therefore, we study the traffic trace artifacts by comparing the port-mirroring method with inserting a passive TAP (Test Access Point), such as a fiber splitter, into a monitored link. The network and measurement topology used in our experiments is shown in Fig 1. Two ethernet switches (lab-switch1 and lab-switch2) are linked via a 1Gbps port (Gi/1, Fig 1) and each of them connects a number of PC hosts, which act as the traffic generators, its 1/1Mbit ports. Moreover, labswitch1 is configured to mirror the traffics traversing its port Gi/1 in both directions to another 1Gbps port ( Gi/2, Fig 1), i.e., the port mirroring feature is enabled. Thus, the monitored link is the 1 Gbps point-to-point link between lab-switch1 and lab-switch2. Two Dell PowerEdge 285 servers are deployed as the capture engine and each of them is equipped with a DAG 4.5G2 card. The clocks of the two DAG cards are locked together and synchronised to the clock of one PowerEdge server. A fiber splitter is inserted into the monitored link to enable a DAG card to capture the original traffic streams on the link and another DAG card to capture the traffic streams on the mirroring link.
3 packet stream on the monitored link capture begins T 1 capture ends Time 5 mins Fig. 2. (a) packet stream on the mirroring link 8 mins T ' 1 Time capture begins backward search forward search capture ends packet stream on the monitored link packet1 packet2 packet3 packet4 Time (b) packet stream on the mirroring link Time The measurement methods in our experiments. packet1 ' packet4 ' packet3 ' packet2 ' To further investigate whether the statistics of timing difference, packet-reordering and packet-loss will be affected by packet sizes, we used three different traffic patterns which are used to generate traffics by those PC hosts. The first traffic pattern is an 8-minute synthetic packet trace consisting of packets which are distinguishable from each other and have the same packet size of 15 octets (maximum ethernet packet size). The second traffic pattern is an 8-minute synthetic packet trace consisting of packets which are distinguishable from each other and have the same packet size of 46 octets (minimum ethernet packet size). The third traffic pattern is a 15-minute real ethernet trace 2 with variable packet sizes (called the real ethernet trace in this paper) and we replaced only IP IDs of the packets in the trace to make distinguishable from each other. Then, during every experiment, a number of PC hosts connected to the switches will replay one of the three packet patterns using the tool tcpfire [6] to generate the network traffics. Note that, when a traffic pattern is copied to a PC host for replaying, the source MAC addresses of the packets in the traffic pattern are changed to the PC NIC s MAC address so that the traffic stream generated by different hosts is distinguishable. Moreover, we (hard-)configure one of the spare ports on lab-switch1 to be the sink of all the packets received from lab-switch2 and one of lab-switch2 s spare ports to be the sink of all the packets received from lab-switch1. Thus, the PC hosts connected to the switches do not need to take careful of receiving packets. The way we measure the terms timing difference, packetreordering and packet-loss in our experiments is explained below. The exact meanings of these terms in this paper are given by examples. As illustrated in Fig. 2(a), we begin capturing the traffic stream on the mirroring link first and finish it later to guarantee that the traffic stream captured on the monitored link will be found on the mirroring link. After the above capture processes, two traffic trace files will be obtained: one trace file contains the traffic data on the monitored link (called the original traffic trace file 3 hereafter) 2 This real ethernet trace was taken from a day-time trace of a 1-user University CS-department. 3 the packets which are not generated by PC hosts using one traffic pattern (e.g., packets originating from the switches) will first be filtered out by comparing the source and destination MAC addresses. and another contains the traffic data on the mirroring link (called the mirroring traffic trace file hereafter). Then, we will try to find every single packet of the original traffic trace file in the mirroring trace file by comparing the packets of the two trace files. For a packet with a timestamp T 1 of the original trace file, we try to find it by searching around T 1 for a certain period 4 backwards and forwards in the mirroring trace file (see Fig. 2(a)) and for the case that the packet is not found after the above searching, it will be counted as the packetloss incurred due to monitoring via port-mirroring, otherwise, its counterpart with a timestamp like T 1 will be found in the mirroring trace file. The timing difference of a packet and its counterpart incurred due to monitoring via port mirroring is defined as follows: Time Difference = T 1 T 1. In addition, we define a packet (e.g., packet A) to get reordered if the packet, which appears earlier than another packet (e.g., packet B) on the monitored link, appears later than that packet (packet B) on the mirroring link. Obviously, a number of packets which appear later than packet A on the monitored link can cause packet A to get reordered. Below we call the packet, which not only causes packet A to get reordered but also the timestamp of which counterpart found on the mirroring link is the smallest among the counterparts of those packets that cause packet A to be reordered, as the causingreordering-packet of packet A. Then, the reordering time of packet A is defined as the subtraction of the timestamp of the counterpart of packet A and the timestamp of the counterpart of the causing-reordering-packet of packet A, and the reordering number of packet A is defined as the number of packets which cause packet A to get reordered. For instance, we assume that packet1, packet2, packet3 and packet4 of the original traffic trace file are found to match the packets packet1, packet2, packet3 and packet4 of the mirroring traffic trace file respectively (see Fig. 2(b)). The timestamps of packet1, packet2, packet3 and packet4 are denoted as T packet1, T packet2, T packet3 and T packet4 and it is assumed that T packet1 T packet2 T packet3 T packet4. Moreover, the timestamps of packet1, packet2, packet3 and packet4 are denoted as T packet1, T packet2, T packet3 and T packet4 and it is assumed that T packet1 T packet4 T packet3 T packet2 ). Based on the above definitions, packet4 and packet3 cause packet2 get reordered and packet4 also causes packet3 gets reordered. Furthermore, if we assume that packet4 is the causing-reordering-packet of both packet2 and packet3, then the reordering time of packet2 is T packet2 T packet4 and the reorder number of packet2 is 2, and the reordering time of packet3 is T packet3 T packet4 and the reordering number of packet3 is 1. III. EXPERIMENTS AND RESULTS This section presents the results of network experiments we conducted to investigate the traffic-trace artifacts incurred due to monitoring via port-mirroring method. Due to the 4 This search time period has been tested and validated in our experiments and it is different for different traffic patterns.
4 Packets/s on the Target Link Packets/s on the Target Link 5 x For the aggregated traffic in both directions on the monitoring port of HP ProCurve Generated using the traffic pattern of real ethernet trace by 6, 11 PC hosts Generated using the traffic pattern of the maximum packet size by 8, 16 PC hosts Time (s) 5 x For the aggregated traffic in both directions on the monitoring port of Cisco Catalyst Generated using the traffic pattern of the minimum packet size by 6, 1 PC hosts Generated using the traffic pattern of real ethernet trace by 6, 11 PC hosts Generated using the traffic pattern of the minimum packet size by 6, 1 PC hosts Generated using the traffic pattern of the maximum packet size by 8, 16 PC hosts Time (s) Fig. 3. The packet distributions of the traffic captured on the monitored link. page limitation, we report only a subset of our experimental results here, where two typical traffic load levels (moderately loaded: around 6%-7% utilisation of the monitored link and moderately overloaded: around 13%-14%) utilisation of the monitored link) were generated using each of the three traffic patterns 5 respectively. In addition, as mentioned in Section 2, the PC hosts connected to the lab-switch1 and lab-switch2 (see Fig. 1) are responsible for generating traffics into the network. In our experiments, the traffic loads generated on the monitored link were altered by changing the number of PC hosts connected to the switches. Furthermore, the traffictrace artifacts arising due to port mirroring were studied on two ethernet switches: Cisco Catalyst Switch 295 and HP ProCurve 2824, to illustrate our findings are valid across different switches. Mbps on the Target Link Mbps on the Target Link Bit distribution of the aggregated traffics in both directions on the monitoring port of HP ProCurve Time (s) Bit distribution of the aggregated traffics in both directions on the monitoring port of Cisco Catalyst Generated using the traffic pattern of real ethernet trace by 6, 11 PC hosts Generated using the traffic pattern of the minimum packet size by 6, 1 PC hosts Generated using the traffic pattern of the maximum packet size by 8, 16 PC hosts Generated using the traffic pattern of real ethernet trace by 6, 11 PC hosts Generated using the traffic pattern of the minimum packet size by 6, 1 PC hosts Generated using the traffic pattern of the maximum packet size by 8, 16 PC hosts Time (s) Fig. 4. The bit distributions of the traffics captured on the monitored link. First of all, two Cisco Catalyst switches (295G-48-EI), each of which has 48 1/1 Ethernet ports and 2 GBIC module slots, were equipped as the lab-switch1 and labswitch2 shown in the network and measurement topology (see Fig. 1), respectively. Secondly, a HP ProCurve switch 2824, which has 24 1/1/1Base-T RJ-45 ports and 4 mini-gbic Gigabit ports, was deployed as lab-switch1 and a Cisco Catalyst switch 295G-48-EI as lab-switch2 and the experiments were repeated on them. Moreover, we will call the direction from lab-switch1 to lab-switch2 on the monitored link the TX direction and the opposite one from lab-switch2 to lab-switch1 the RV direction hereafter throughout this paper. The packet and bit distributions of the traffics captured on the monitored link in our experiments are shown in Figs It can be seen from the figures that the traffics are almost static when generated using the traffic patterns with the maximum and minimum ethernet packet sizes, whereas the traffics are much more bursty when generated using the traffic pattern of real ethernet trace. This is what we expected. Note that, for the traffic patterns with the maximum and minimum ethernet packet sizes, a 5-mins traffic trace was captured on the monitored link and a 8-mins traffic trace was captured on the mirroring link, respectively; for the traffic pattern using the real ethernet trace, a 1-mins traffic trace was captured on the monitored link and a 12-mins traffic trace was captured on the mirroring link. After capturing the traffic traces on the monitored and mirroring links, we compare them using the methods introduced in Section 2. Then, the set of packets which appear on the monitored link and are also found in the mirroring link can be obtained, so is the set of packets which appear on the monitored link but are not found in the mirroring link. For each found packet, its timing difference, reordering time and reordering number will be calculated based on their definitions in Section 2. Next, the statistics of timing difference will be calculated as follows: the time interval between the minimal and maximal values of timing difference of all found packets is divided into a number of 1-microsecond bins and then the number of packets of each timing value is counted. Importantly, the normalised count is used in this paper: the normalised count equals the count of packets for which the timing-difference values fall into a specific 1-microsecond bin divided by the total number of packets observed on the mirroring link. The statistics for reordering time and reordering number are calculated using this method. A. Maximum-size ethernet packet size This subsection reports the experiments where the traffic pattern with the maximum ethernet packet size was replayed by PC hosts to generate traffics into the switches. Figs. 5-6 show the statistics of timing difference of the aggregated traffics in either TX or RV direction 6 incurred due to monitoring via port mirroring for this traffic pattern. It can be seen clearly from Figs. 5-6 that the traffic trace artifact in terms of timing difference exists under different 5 See Section 2 for the descriptions of the traffic patterns used in our experiments 6 This means that the traffics traversing the monitored link are filtered and only the traffics in either TX or RV direction are considered
5 .45.4 For the aggregated traffic in the TX direction on Cisco Catalyst 295 For the aggregated traffic in the RV direction on Cisco Catalyst 295 For the traffic pattern with the maximum ethernet packet size under the traffic load generated by 16 PC hosts.14 For the aggregated traffic in the TX direction on Cisco Catalyst For the aggregated traffic in the RV direction on Cisco Catalyst Fig Packet reordering time maximum-size ethernet trace (8 hosts.) TABLE I THE PERCENTAGE OF REORDERED PACKETS FOR THE AGGREGATED TRAFFICS IN EITHER TX OR RV OR BOTH DIRECTIONS Cisco Catalyst 295 HP ProCurve 2824 The percentage of Under traffic Under traffic Under traffic Under traffic packets which load of load of load of load of get reordered 8 PC hosts 16 PC hosts 8 PC hosts 16 PC hosts Both directions 21.8% 39.71% 17.99% % For TX only.55%.13% %.39% For RV only %.123% %.96% traffic load level on different switches for this traffic pattern. Moreover, under a certain traffic load on a switch, the statistics of timing difference exhibit very similar characteristics for the aggregated traffics in either TX or RV direction. Furthermore, the mean value of timing difference increases with the increase of the traffic load on the monitored link and the values of timing difference will span a range of microseconds even under lower traffic loads. For the Catalyst Switch 295, the mean value of timing difference can reach around 24 microseconds when the traffic load is around 136Mbps on the target link. In addition, Figs. 5-6 show that the mean value of timing difference for the TX direction is a little smaller (around 2 microseconds) than the one for RV direction. We believe it is due to the fact that the traffic stream in the TX direction can be put onto the mirroring link by lab-switch1 immediately while the traffic stream in the RV direction needs to travel to lab-switch1 on the monitored link first. We conjecture that the delay is the cumulation of both marshalling delays and the propogation delays as this grade of switch would implement a store- Figs. 7-8 and Table 1 show the statistics of reordering time and reordering number incurred due to monitoring via port mirroring for this traffic pattern. For the aggregated traffic in both directions 7, it can be noticed that a significant percentage of packets get reordered. Moreover, Figs. 7-8 indicate that there is a step of around 12 microseconds between consecutive reordering time values. We believe it might be due to the fact that this traffic pattern with the maximum ethernet packet size (15 octets) needs around 12 microseconds to get transmitted 7 This means that the traffics traversing the monitored link in both directions are considered Fig Packet reordering time maximum-size ethernet trace (16 hosts.) For the aggregated traffic in both directions using the traffic pattern with the maximum ethernet packet size.5 Under the traffic load generated by 8 PC hosts on Cisco Catalyst 295 Under the traffic load generated by 16 PC hosts on Cisco Catalyst Under the traffic load generated by 8 PC hosts on HP ProCurve 2824 Under the traffic load generated by 16 PC hosts on HP ProCurve Fig. 7. Packet reordering time maximum-size ethernet trace. For the aggregated traffic in both directions using the traffic pattern with the maximum ethernet packet size.7 Under the traffic load generated by 8 PC hosts on Cisco Catalyst Under the traffic load generated by 16 PC hosts on Cisco Catalyst Under the traffic load generated by 8 PC hosts on HP ProCurve 2824 Under the traffic load generated by 16 PC hosts on HP ProCurve Fig. 8. Packet reordering number maximum-size ethernet trace. through the 1 Gigabit link. Furthermore, the characteristics of reordering time and reordering number of the aggregated traffics in both directions are consistent under different traffic loads on different switches for this traffic pattern. Fig. 7-8 also show that the reordering time and reordering number span a range of values although a certain value might be dominant to some extent. Surprisingly, we also observe that packetreordering exists for the aggregated traffic in either TX or RV direction especially under higher traffic loads (see Table 1). Due to the limited page space, the statistics of the reordering
6 time and reordering number of the aggregated traffic in a single direction (either TX or RV direction) are not included in this paper. However, the above observations for reordering time and reordering number are also valid for them. The statistics of packet loss incurred due to monitoring via port mirroring is as follows: there is no packet loss under the traffic load generated by 8 PC hosts; there are % and % packets on the monitored link lost on the mirroring link under the traffic load generated by 16 PC hosts when port mirroring is made on Cisco Catalyst Switch 295 and HP ProCurve 2824, respectively. B. Minimum-size ethernet packet size This subsection reports the experiments where the traffic pattern with the minimum ethernet packet size was replayed by PC hosts to generate traffics into the switches. The statistics of timing difference of the aggregated traffics in either TX or RV direction are presented in Fig It is also clearly indicated in the two figures that the traffictrace artifact in term of timing difference exists under different traffic load level on different switches for this traffic pattern. Under a certain traffic load on a switch, the statistics of timing difference also exhibit very similar characteristics for the aggregated traffics in either TX or RV direction. Furthermore, the mean value of timing difference also increases with the increase of the traffic load on the monitored link and the values of timing difference will span a range of microseconds even under lower traffic loads although the mean values of timing difference are much smaller for this traffic pattern than the ones for the traffic pattern with the maximum ethernet packet size. The phenomenon that the mean value of timing difference for the TX direction is a little smaller than the one for RV direction is also maintained for this traffic pattern. Figs and Table 2 show the statistics of reordering time and reordering number incurred due to monitoring via port mirroring for this traffic pattern. It is also noticed that a significant percentage of packets get reordered for the aggregated traffics in both directions. We also observe that packet-reordering exists for the aggregated traffic in either TX or RV direction under higher traffic loads. Moreover, the characteristics of reordering time and reordering number are consistent under different traffic loads on the same switch for this traffic pattern and the reordering time and reordering number also span a range of values although a certain value might be dominant to some extent. We observed no packetreordering existing for the aggregated traffic in a single direction on HP ProCurve However, packet-reordering exists for the aggregated traffic in the TX direction on Cisco Catalyst Switch 295 for this traffic pattern (see Table 2). When comparing the characteristics of the timing difference and reordering for this traffic pattern with the one for the traffic pattern with the maximum ethernet packet size, we can conclude that the traffic trace artifacts in terms of timing difference and packet reordering exhibit different characteristics for the traffic patterns with different packet sizes and the mean values of their statistics will normally increase with the increase of TABLE II THE PERCENTAGE OF REORDERED PACKETS FOR THE AGGREGATED TRAFFICS IN EITHER TX OR RV OR BOTH DIRECTIONS Cisco Catalyst 295 HP ProCurve 2824 Percentage of Under traffic Under traffic Under traffic Under traffic packets which load of load of load of load of get reordered 6 PC hosts 1 PC hosts 6 PC hosts 1 PC hosts Both directions 8.842% 45.72% % % For TX only % % % % For RV only % % % % mean packet size in the observed traffics. Surprisingly, we observed that there is no loss for this traffic pattern under the two traffic load levels when port mirroring is made either on Cisco Catalyst Switch 295 or HP ProCurve We believe it might be due to the advantages of short packet size: the internal buffer of the port-mirroring port (e.g., Gi/2, see Fig. 1) might not easily get overflowed for this minimum ethernet packet size even if the average traffic load exceeded the bandwidth of the monitored link Fig For the aggregated traffic in the TX direction on Cisco Catalyst 295 For the aggregated traffic in the RV direction on Cisco Catalyst Packet reordering time minimum-size ethernet trace (6 hosts.) For the traffic pattern with the minimum ethernet packet size under the traffic load generated by 1 PC hosts For the aggregated traffic in the RV direction on HP ProCurve 2824 For the aggregated traffic in the RV direction on Cisco Catalyst 295 For the aggregated traffic in the TX direction on Cisco Catalyst Fig. 1. Packet reordering time minimum-size ethernet trace (1 hosts.) C. Real ethenet packet trace This subsection reports the experiments where the traffic pattern of real ethernet trace was replayed by PC hosts to generate traffics into the switches. The statistics of timing difference of the aggregated traffics in either TX or RV direction are presented in Fig When combining the results in the above two subsections, we can concluded the following findings about the traffic trace artifact
7 For the aggregated traffic in both directions using the traffic pattern with the minimum ethernet packet size.2 Under the traffic load generated by 1 PC hosts on Cisco Catalyst For the traffic pattern using the real ethernet trace under the traffic load generated by 6 PC hosts Under the traffic load generated by 6 PC hosts on HP ProCurve 2824 Under the traffic load generated by 1 PC hosts on HP ProCurve 2824 Under the traffic load generated by 6 PC hosts on Cisco Catalyst Fig. 11. Packet reordering time minimum-size ethernet trace. For the aggregated traffic in both directions using the traffic pattern with the minimum ethernet packet size.2 Under the traffic load generated by 1 PC hosts on Cisco Catalyst Under the traffic load generated by 6 PC hosts on HP ProCurve 2824 Under the traffic load generated by 1 PC hosts on HP ProCurve 2824 Under the traffic load generated by 6 PC hosts on Cisco Catalyst Fig. 12. Packet reordering number minimum-size ethernet trace. in terms of timing difference incurred due to monitoring via port mirroring: The traffic trace artifact in terms of timing difference exists under different traffic load level using different traffic patterns on different switches when the traces are collected via port mirroring method. Under a certain traffic load generated using a traffic pattern, the statistics of timing difference exhibit very similar characteristics for the aggregated traffics in either TX or RV direction. The mean value of timing difference statistics increases with the increase of the traffic load on the monitored link and it also increases with the increase of the mean packet size in the observed traffic trace. Moreover, the mean value of timing difference for the TX direction is a little smaller than the one for RV direction. The values of timing difference will span a range of microseconds even under lower traffic loads. Figs and Table 3 show the statistics of reordering time and reordering number incurred due to monitoring via port mirroring for this traffic pattern. When combining the results in the above two subsections, the findings about the traffic trace artifact in terms of packet reordering incurred due to monitoring via port mirroring can be concluded as follows: For the aggregated traffic in the TX direction on Cisco Catalyst 295 For the aggregated traffic in the RV direction on Cisco Catalyst Fig. 13. Packet reordering time real ethernet trace (6 hosts.) For the traffic pattern using the real ethernet trace under the traffic load generated by 11 PC hosts For the aggregated traffic in the TX direction on Cisco Catalyst 295 For the aggregated traffic in the RV direction on Cisco Catalyst Fig. 14. Packet reordering time real ethernet trace (11 hosts.) For the aggregated traffic in both directions using the traffic pattern of real ethernet trace Under the traffic load generated by 6 PC hosts on Cisco Catalyst 295 Under the traffic load generated by 11 PC hosts on Cisco Catalyst Under the traffic load generated by 6 PC hosts on HP ProCurve 2824 Under the traffic load generated by 11 PC hosts on HP ProCurve Fig. 15. Packet reordering time real ethernet trace. TABLE III THE PERCENTAGE OF REORDERED PACKETS FOR THE AGGREGATED TRAFFICS IN EITHER TX OR RV OR BOTH DIRECTIONS Cisco Catalyst 295 HP ProCurve 2824 Percentage of Under traffic Under traffic Under traffic Under traffic packets which load of load of load of load of get reordered 6 PC hosts 11 PC hosts 6 PC hosts 11 PC hosts Both directions 3.739% % 12.78% % For TX only 7.777%.573%.12%.12% For RV only.36% % %.8%
8 For the aggregated traffic in both directions using the traffic pattern of real ethernet trace Under the traffic load generated by 6 PC hosts on Cisco Catalyst 295 Under the traffic load generated by 11 PC hosts on Cisco Catalyst Under the traffic load generated by 6 PC hosts on HP ProCurve 2824 Under the traffic load generated by 11 PC hosts on HP ProCurve Fig. 16. Packet reordering number real ethernet trace. When the traces are collected via port mirroring method, a significant percentage of packets gets reordered for the aggregated traffics in both directions even under low levels of utilisation. Packet-reordering might exist for the aggregated traffic in a single direction of the monitored link especially under higher traffic loads. The characteristics of reordering time and reordering number for the aggregated traffics in both directions of the monitored link are consistent under different traffic loads. Both the reordering time and reordering number span a range of values although one of them is dominant. For this traffic pattern, there is no packet loss under the traffic load generated by 6 PC hosts; there are.31% and.77% packets on the monitored link get lost on the mirroring link under the traffic load generated by 11 PC hosts when port mirroring is made on Cisco Catalyst Switch 295 and HP ProCurve 2824, respectively. When combining the packet-loss results in the above two subsections, we believe that the statistics of packet loss incurred due to monitoring via port mirroring is consistent under a certain traffic load no matter on which switch the port mirroring is made. IV. DISCUSSIONS Based on the findings on the traffic trace artifacts in terms of timing difference, packet reordering and packet loss incurred by port mirroring, we discuss some potential implications of using the port-mirroring method for the future network measurement and monitoring. Firstly, as the timing difference between the original packet streams and the mirrored packet streams does exist and it could span a range of values under all traffic load levels, the inter-arrival time statistics of a packet trace would get biased if the trace is collected via the port mirroring method. Moreover, further analysis results could get biased if they depend on the accuracy of the inter-arrival time statistics. Thus, for network monitoring or analysis which needs highly accurate inter-arrival time statistics inferred from the collected trace data, more accurate methods, for example, the passive TAP technique, should be used. Secondly, since quite a number of packet reorderings do happen in the packet traces collected via the port mirroring method, it will not only affect the inter-arrival time statistics, but also bias all the analysis results which are based on the packet arrival sequences, e.g., the analysis of TCP reset behavior based on TCP sequence number. Therefore, for this kind of analysis, we also recommend using the more accurate method to collect their data traces. V. CONCLUSION The port-mirroring technique is supported by most of today s switches and is a popular method for collecting packet traces for various purposes due to its wide availability and low cost. However, its side effects or impact on the collected traffic traces in terms of timing difference, packet reordering and packet losses, have been little known by the networking community. In this paper, we carried out the well-designed experiments to try to make a comprehensive study on the traffic trace artifacts incurred due to monitoring via port mirroring. The experiment results show that, when the traces are collected via port mirroring method, the traffic trace artifact in term of timing difference does exist and under different traffic load level using different traffic patterns on different switches, Furthermore, a significant percentage of packets get reordered for the aggregated traffic in both directions of a monitored link even under low levels of utilisation. We also document the statistics of the timing difference, packet reordering and packet losses observed in our experiments, which suggests that more-accurate methods should be used to collect the packet traces if the network monitoring and/or analysis needs to infer highly accurate inter-arrival time statistics or to rely on accurate packet arrival sequences. Future work We see this investigation as only the beginning of such an enquiry into the impact of port-mirroring. While not detailed here, we found inconsistent results for LACP link channels and consider this very imporant for a future investigation. Future presentations of this topic would include a complete presentation on port-mirroring when the overall mechanism is applied to only part of the data stream: selections of host, protocol, and port, or single directions of flow. Thanks: We thank the anonymous reviewers for their feedback. We also thank Matt Burnstein and Tavinda Jandu for their technical assistance and Ralphe Neill, Awais Awan and Wei Li for their assistance in reading early versions of this paper. REFERENCES [1] M. Arlitt and C. Williamson, An Analysis of TCP Reset Behaviour on the Internet, ACM Computer Communication Review, Vol.35, No.1 pp.37-44, Jan. 25. [2] M. Arlitt, B. Krishnamurthy and J. C. Mogul, Predicting short-transfer latency from TCP arcana: Atrace-based validation, ACM/USENIX IMC 5, pp , Oct , 25, Berkeley, CA, USA. [3] K.T. Chen, C.Y. Huang, P. Huang and C.L. Lei, Quantifying Skype User Satisfaction, ACM Sigcomm 26, pp , Sept , Pisa, Italy. [4] Analyzing Full-Duplex Networks Through SPANs, Port Aggregators, and TAPs, White paper, Network Instruments ( [5] J. Spooner and S. Donnelly, Monitoring and Transport without compromise, White paper, Endace Technology Ltd. [6] Tcpfire,
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
Best Practices in Gigabit Capture
Network Instruments White Paper Best Practices in Gigabit Capture How to obtain accurate, line-rate captures with your gigabit investment Analysis is a necessary component of network management. Understanding
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Net Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
How To Use A Network Instrument Ntap
ntap Product Family Provides monitoring and security devices with complete visibility into full-duplex networks Network Instruments ntaps let you monitor and analyze full-duplex links. ntaps are critical
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
How To Monitor A Network With A Network Probe
Network Monitoring and Analysis Techniques Using Taps and SPAN Switches Networks have evolved into complex structures supporting critical business processes and communications. As this complexity has increased,
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
Deploying Network Taps for improved security
DATACOM SYSTEMS INC Deploying Network Taps for improved security A guide to improving security visibility A DATACOM SYSTEMS WHITE PAPER Improve Visibility A network security detection and prevention scheme
WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis
Application Note Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
Detection and Analysis of Packet Loss on Underutilized Enterprise Network Links
Detection and Analysis of Packet Loss on Underutilized Enterprise Network Links Seung-Hwa Chung, Young J. Won, Deepali Agrawal, Seong-Cheol Hong, and James Won-Ki Hong Dept. of Computer Science and Engineering
Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
Configuring EtherChannels
25 CHAPTER This chapter describes how to configure EtherChannel interfaces. For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 2950 Desktop Switch Command
Secure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Product Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
Configuring IPS High Bandwidth Using EtherChannel Load Balancing
Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Monitoring Network Traffic Using SPAN
CHAPTER 60 This chapter describes the Switched Port Analyzer (SPAN) features provided in switches in the Cisco MDS 9000 Family. It includes the following sections: About SPAN, page 60-1 SPAN Sources, page
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Deploying Probes and Analyzers in an Enterprise Environment
Network Instruments White Paper Deploying Probes and Analyzers in an Enterprise Environment As an IT manager, you need visibility into every corner of the network, from the edge to the core. A distributed
Ethernet Link SGI-2424
Ethernet Link SGI-2424 24 Combo Ports (10/100/1000Mbps Copper and Dual-Speed SFP) + 2G TP/SFP Combo Layer 2+ Managed Gigabit Ethernet Switch Overview LinkPro SGI-2424 is a layer-2+ gigabit access switch
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia
LINK AGGREGATION INTEROPERABILITY OF THE DELL POWERCONNECT 6200 SERIES
LINK AGGREGATION INTEROPERABILITY OF THE DELL POWERCONNECT 6200 SERIES WITH CISCO IOS OR CISCO CATOS BASED SWITCHES By Bruce Holmes CONTENTS INTRODUCTION 3 LINK AGGREGATION WITH GIGABIT ETHERNET CISCO
FST-2802 TestPad Gigabit Ethernet Services Module Test Ethernet, Fibre Channel, and IP services using one test instrument!
ACTERNA TEST & MEASUREMENT SOLUTIONS TestPad Gigabit Ethernet Services Module Test Ethernet, Fibre Channel, and IP services using one test instrument! Key Features Full line rate traffic generation to
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Enhanced Visibility, Improved ROI
Abstract Enhanced Visibility, Improved ROI The IT Security/Network Infrastructure Management departments within an organization have access to some of the richest and most useful enterprise data. Because
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Technical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband
EXINDA NETWORKS. Deployment Topologies
EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: [email protected] :: 2005 Exinda Networks Pty Ltd.
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable StarTech ID: IES101002SFP The IES101002SFP 10-port Ethernet switch delivers flexibility and control of your network by
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Ethernet Link SGI-4844F
Ethernet Link SGI-4844F 44 ports 100/1000Mbps SFP + 4 Combo port RJ-45 + 100/1000Mbps SFP slot Layer 2+ Managed Ethernet Switch Overview LinkPro SGI-4844F is a layer-2+ gigabit access switch equipped with
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro Instituto Superior Técnico, Universidade Técnica de Lisboa, Lisboa,
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
Technical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Port Trunking. Contents
12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link
FST-2802 TestPad Gigabit Ethernet Services Module Now able to test Ethernet, Fibre Channel, and IP services in a single test instrument!
ACTERNA TEST & MEASUREMENT SOLUTIONS TestPad Gigabit Ethernet Services Module Now able to test Ethernet, Fibre Channel, and IP services in a single test instrument! Key Features Full line rate traffic
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
A Dell Technical White Paper Dell PowerConnect Team
Flow Control and Network Performance A Dell Technical White Paper Dell PowerConnect Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
RFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Study of Network Performance Monitoring Tools-SNMP
310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
N5 NETWORKING BEST PRACTICES
N5 NETWORKING BEST PRACTICES Table of Contents Nexgen N5 Networking... 2 Overview of Storage Networking Best Practices... 2 Recommended Switch features for an iscsi Network... 2 Setting up the iscsi Network
Auspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected]
H.323 Traffic Characterization Test Plan Draft Paul Schopis, [email protected] I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited
WHAT S ON MY NETWORK? A NETWORK MONITORING AND ANALYSIS TUTORIAL
52-20-17 DATA COMMUNICATIONS MANAGEMENT WHAT S ON MY NETWORK? A NETWORK MONITORING AND ANALYSIS TUTORIAL Betty DuBois, SCE, CNI, CNE, CNX INSIDE Step 1: Network Monitoring: What types of traffic are on
ADTRAN NetVanta 5660
ADTRAN NetVanta 5660 Lab Testing Detailed Report 08January2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Product Tested... 4 3.0 Test Bed How We Did It... 6 4.0 Performance Testing...
How To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
Any-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
Port Trunking. Contents
13 Port Trunking Contents Overview.................................................... 13-2 Port Trunk Features and Operation........................... 13-4 Trunk Configuration Methods................................
