Research on Errors of Utilized Bandwidth Measured by NetFlow
|
|
|
- Christina Robbins
- 10 years ago
- Views:
Transcription
1 Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing , China 2 Electronic Information Engineering School, Henan University of Science and Technology, Luoyang , China {htzhu, xgzhang, wding}@njnet.edu.cn Abstract NetFlow is a popular technology in network management nowadays. It supports administrators to get various performance metrics. But metric values estimated from NetFlow records may inaccurate in some circumstance. This paper aims at studying the errors of utilized bandwidth measured by NetFlow. At first, packet streams with a specific format were collected from the backbone by passive measurement and these packet streams are called IP Traces that are used as our experimental data. Then, by using IP Traces, NetFlow records were produced according to NetFlow principles using different sampling ratios and the utilized bandwidths are calculated by NetFlow records at different time granularities. These utilized bandwidths called measured values will be compared to the true values that are directly calculated using IP Traces. At last, the relative errors of utilized bandwidth are presented based on measured values and true values. The experimental results show that bigger time granularity results in smaller error of utilized bandwidth measured by NetFlow, and smaller sampling ratio produces smaller errors. However, if the two factors are considered separately, the error is still large. Only when time granularity is big enough and the sampling ratio is small enough the error could be acceptable. If we want to acquire the satisfying precision, time granularity and sampling ratio need to be set properly. The study results of this paper can provide some guidance and reference for estimating utilized bandwidth with NetFlow. Keywords-measurement error; utilized bandwidth; NetFlow; IP Trace I. INTRODUCTION With the development of the network techniques, the network scale becomes enormous and the structure is more complex. In order to ensure that network runs well, it is necessary to manage network efficiently. The network utilized bandwidth reflects the running status of network; it is the key data to judge whether network was running normally or not. It also can be used to monitor the network traffic and to analyze network usage and performance by network administrator, so as to find the network bottleneck as early as possible, then to adjust network routing and to achieve the ultimate purpose that network runs efficiently, steadily and reliably[1]. At present, we usually use three methods to analyze the network traffic: (1) Making use of the generic network monitoring software for link utilization rate, such as Multi Router Traffic Grapher (MRTG). Simple Network Management Protocol (SNMP) can be used to monitor traffic on routers and usually make statistic analysis in the key links and interconnected points. However, SNMP can only collect the packets and bytes that pass in and out the network ports and cannot provide fine-grained traffic statistic analysis such as traffic volumes of different application types. (2) Deploying probes on the important network nodes, monitoring the ports, collecting the network traffic and upper layer traffic. This method works at packet level and can provide high precision traffic volumes of network application types. However, this method collects extremely large data volume and relies on high-performance hardware, so it hardly uses in the network backbone. (3) Using NetFlow technology to measure and analyze the detailed behavior pattern of IP network traffic and to provide detailed statistics data [2]. This method works at flow level and can provide high precision traffic volumes of network application types. Moreover, this method just need collect less data volume than deploying the probes. Thus it can be seen, measuring and analyzing network traffic using NetFlow technology is a more eclectic and effective method. At present, FlowScan is used widely at home and abroad, it is a tool to measure information of flows based on NetFlow. It increments traffic counters at the time when the flows are exported. More precisely, it records the values of these counters with the time-stamp corresponding to the five-minute interval in which cflowd wrote the flow to the raw flow file [3]. This method is efficient and cost-effective. When a flow reaches to the collector, what needs to be done is only to update the traffic value of one time granularity. However, this traffic measurement method has an important weakness [4]. The statistic data by NetFlow, such as traffic bytes and packets, is very rough relative to SNMP. Because there are two situations that may cause errors while using NetFlow records: (1) Flow duration time might be longer than measurement time granularity. For example, there are long flows in flow records. (2) Even if flow duration time is shorter than measurement time granularity, such a situation still exists some flow records begin in one time granularity and end in another time granularity. It is obvious that this is an eclectic between precision and simplicity. In some cases, long flow will cause the traffic to
2 increase sharply in some time granularity and the precision is affected enormously. NetFlow might consume a large quantity of resource of equipment especially at backbone routers. It supports exporting NetFlow record under certain sampling ratio. However, sampling ratio is worth studying. If sampling ratio is big, the pressure of the equipment is big and might affect the functions of the equipment. Little sample ratio could ease the pressure but the credibility of traffic analysis upon these records might be low [5] [6]. This paper researches on measurement errors of utilized bandwidth at different time granularities and sampling ratios by a large number of experiments. The introduction points out influencing factors of utilized bandwidth measurement using NetFlow mechanism. Section 2 analyzes the working principle of NetFlow. Section 3 introduces the source and structure of our experimental data. Section 4 shows the errors of utilized bandwidth measured using NetFlow based on these data at different time granularities and sampling ratios. II. NETFLOW NetFlow is an important network protocol developed by Cisco Systems for collecting IP traffic information. NetFlow has become an industry standard for traffic monitoring. At present, there are two important versions 5 and 9. Although version 9 was accepted by IETF in 2004 and became the IP Flow Information Export standard in RFC3917, version 5 is also applied popularly now. In NetFlow mechanism, a flow is identified as a unidirectional stream of packets between a given source and destination that are both defined by a network layer IP address and transport layer source and destination port numbers. A network flow has been defined in many ways. The traditional Cisco definition is to use a 7-tuple key, where a flow is defined as a unidirectional sequence of packets all sharing all of the following 7 values [2]: (1) Source IP address (2) Destination IP address (3) Source port number (4) Destination port number (5) Layer 3 protocol type (6) ToS byte (7) Input logical interface (ifindex) These seven key fields define a unique flow. If a flow has one different field than another flow, then it is considered a new flow. A flow contains other accounting fields (such as the AS number in the NetFlow export Version 5 flow format) that depend on the version record format that you configure for export. Flows are processed in a NetFlow cache. The NetFlow cache is built by processing the first packet of a flow through the standard switching path. A Flow record is maintained within the NetFlow cache for all active flows. The routing device checks the NetFlow cache once per second and expires the flow in the following instances: (1) The flow cache has become full. (2) Transport is completed (TCP FIN or RST). (3) The inactive timer has expired after 15 seconds of traffic inactivity. (4) The active timer has expired after 30 minutes of traffic activity. As the cache becomes full a number of heuristics are applied to aggressively age groups of flows simultaneously. TCP connections which have reached the end of byte stream (FIN) or which have been reset (RST) will be expired. Expired flows are grouped together into NetFlow export datagrams for export from the NetFlow-enabled device. On a Cisco routing device, the inactive timer exports a packet with a default setting of 15 seconds of traffic inactivity. You can configure your own time interval for the inactive timer between 10 and 600 seconds. The active timer exports a packet after a default setting of 30 minutes of traffic activity. You can configure your own time interval for the active timer between 1 and 60 minutes [2]. Figure 1 illustrates how flow AT1 expires because the active timer for the flow exceeds the default value of 30 minutes. AT2 is the second flow which expires because the inactive timer exceeds the default value of 15 seconds. Figure 1. Active and inactive timers NetFlow export datagrams may consist of up to 30 flow records for version 5 or 9 flow export. NetFlow functionality is configured on a per-interface basis. To configure NetFlow export capabilities, the user simply needs to specify the IP address and application port number of the Cisco NetFlow or third-party Flow-Collector. III. EXPERIMENTAL DATA IP packet is the basic unit of data transmission for IP layer. It is also the basic unit of passive measurement. So, data collected by passive measurement is packet streams and these packet streams are usually called IP Trace. Based on IP Trace from China Education and Research Network (CERNET) backbone, this paper aimed at finding out the potential errors between estimation values of utilized bandwidth from NetFlow records and real network utilized bandwidth values from IP Trace. IP Trace was passively collected at the border router of the CERNET Jiangsu Province backbone, in which more than 100 colleges and universities are included. The link channel used to be OC48, and it updated to OC192 in Jan Each IP Trace is consisted of many Trace files. Trace files are published after anonymization, and about 140 Mb each. Each trace file is consisted of IP packet records. The structure of each IP packet record shows in figure 2, and these records are stored in time order.
3 stamp (8 octets) IP Header (20 octets) IP Options (if any) TCP Header + TCP Options (if any) or UDP Header or ICMP Header Data Figure 2. IP trace packet structure 68 octets One IP record unit contains 68 bytes with timestamp using 8 bytes and IP headers of each packet using the left 60 bytes. stamps use struct timeval in C language to present. If the packet is less than 60 bytes, the left place will be filled with random values. IP Trace used in this thesis is from 14:00 to 16:00 on Nov.19, 2009, and the size is about 129 GB. This trace is used to calculate the true network utilized bandwidths first. In order to get NetFlow records of this trace, a program was written according to Cisco s NetFlow rules above then NetFlow records of this IP Trace could be produced by the program. ratios would be configured in this program to generate NetFlow records at different sampling ratios. These are the preparation steps of our study. IV. EXPERIMENTAL METHODS AND RESULTS A. Experimental Methods There are mainly two factors which could cause the estimation of utilized bandwidths by NetFlow records inaccurate. In this paper, we use flow s end-time to decide which time granularity it belongs to. If one flow s end-time belongs to a time granularity, the traffic of flow would be added into traffic of this time granularity. 1) Different time granularities used to calculate the network utilized bandwidths Analyses are done with the 12 different time granularities values from 1 second to 2048 seconds. The average relative errors and max relative errors are calculated separately. 2) Different sampling ratio used in NetFlow record generation ratio is a configurable parameter in NetFlow support equipments, so different sampling ratios are also used in our analyses. ratio ranges from 1 to 1/262144; each is half of the former ratio. There are a total of 18 different sampling ratio levels. All the calculations are all based on the same IP Trace records, the details are: First, generating NetFlow records from the original IP Traces at different sampling ratios (no sampling means sampling ratio is 1). Then estimating the utilized bandwidths based on each time granularity. At last, compare the estimation values to the true values of utilized bandwidths calculated from IP Traces, and give the maximum relative errors and average relative errors to the real utilized bandwidth values. If the sampling ratio is 1/r, then the estimation values should multiple r first, and then do the comparisons. TABLE I. ERRORS ON BYTES AT DIFFERENT TIME GRANULARITIES Out In Maximum Average Maximum Average B. Experimental Results 1) Estimation errors at different time granularities without sampling We get the estimation errors (both maximum estimation errors and average estimation errors) at different time granularities in Table I. The first column is the time granularities in second. The second and third columns are the relative errors in link direction out. The fourth and fifth columns are the relative error in link direction in. TABLE II. MAXIMUM ERRORS AT DIFFERENT SAMPLING RATIOS Maximum on Bytes
4 TABLE III. AVERAGE ERRORS AT DIFFERENT SAMPLING RATIOS Average on Bytes Figure 3. Trend of maximum errors and sampling ratios Figure 4. Trend of the average errors and sampling ratios TABLE IV. SAMPLING RATIOS OF MINIMAL ERRORS Maximum Average (Minimum, (Minimum, ) ) 1 (5.1400, 1/32768) (0.2404, 1/2048) 2 ( , 1/256) (0.1832, 1/2048) 4 (8.0755, 1/256) (0.1396, 1/2048) 8 (4.0439, 1/256) (0.1035, 1/4096) 16 (0.4007, 1/8192) (0.0742, 1/8192) 32 (0.9439, 1/512) (0.0501, 1/4096) 64 (0.4655, 1/256) (0.0355, 1/8192) 128 (0.2049, 1/256) (0.0241, 1/4096) 256 (0.0478, 1/8192) (0.0164, 1/8192) 512 (0.0421, 1/2048) (0.0088, 1/4096) 1024 (0.0339, 1/16384) (0.0056, 1/4096) 2048 (0.0111, 1/1024) (0.0066, 1/1024) From Table I, it is obvious that the bigger the time granularity to estimate utilized bandwidth becomes, the less the errors becomes. Even though the errors become smaller as the time granularities increase, the average error at max time granularity 2048s (more than half an hour) is also more than 10%. So, using NetFlow records to estimate utilized bandwidth at time granularities less than half an hour could cause large errors according to our experiment results. 2) Estimation errors at different sampling ratios To quantify the impact of sampling ratio, we use 18 different sampling ratios to generate the NetFlow records, and then calculate the utilized bandwidth from those records. Only first 11 kinds of sampling ratios error results are shown in Table 2 and Table 3 for the limitation of the table size. Table 2 and Table 3 show the maximum errors and average errors of each sampling ratio and time granularity separately. The first columns of these tables are all different time granularities (seconds), the next 11 columns show the results of the first 11 kinds of sampling ratios used in our experiments. It is clear in Table II and Table III that under the same time granularities, both maximum errors and average errors decrease when the sampling ratio decreases and can reach to a minimal value. Throughout this process, the error has trivial fluctuation occasionally, but the trend still exists. Also, under the same sampling ratio, the maximum and average errors decrease when time granularities increases. In order to see the error trends clearly, we choose a time granularity that is 256 seconds and plot the error trends based on this time granularity in Figure 3 and Figure 4. Figure 3 plots the maximum errors under different sampling ratios; we can see that the minimal value of maximum errors is about where sampling ratio is 1/8192. Figure 4 plots the average errors under different sampling ratios; we can also find that the minimal value of average errors is about where sampling ratio is 1/8192. Table IV lists minimal value of errors at all sampling ratios under certain time granularity, which means that once the time granularity to calculate the utilized bandwidth is chosen for different applications, the best sampling ratio is recommended here to archive the least estimation errors.
5 V. CONCLUSIONS This paper analyzes the two factors that could cause errors in estimating utilized bandwidth measurement from NetFlow records, one is time granularity, and the other is sampling ratio. Our experiments were based on IP Trace collected at CERNET Jiangsu backbone. The results of our experiments show that if sample ratio is fixed, the error of utilized bandwidth measured by NetFlow decreases gradually as the increase of time granularities. However, even if the time granularity is quite big, the error is still large. If time granularity is fixed, as sampling ratio decrease the error will decrease and has a minimal value. But most of these minimal errors are still large. Only when time granularity is big enough and the sampling ratio is small enough, the error can be acceptable. Thus it can be seen, large error will occur when utilized bandwidth is measured by NetFlow without sampling, but we can satisfy the required precision if we adjust the time granularities and sampling ratios properly. Our research has limitations for lack of data of long-term IP Trace from different networks. In the experiments we only use 2 hours data from CERNET s backbone which is 10 gigabits/second. Links with lower bandwidth might have different errors under the same sampling ratio and time granularity. Larger time granularity could be set if we have sufficient long-term data. More experiments need to be done at data from various networks. These will be researched in our future work. ACKNOWLEDGMENT We thank the anonymous reviewers for their valuable comments. This work is supported by the National Basic Research Program of China under Grant No. 2009CB and the National Key Technology R&D Program of China under Grant No.2008BAH37B04. REFERENCES [1] Carey Williamson, Internet Traffic Measurement, IEEE Internet Computing, Volume 5 Issue 6, November 2001, pp [2] Cisco Systems Inc. NetFlow Services Solutions Guide. cisco.com/en/us/docs/ios/solutions_docs/ netflow/nfwhite.html [3] Dave Plonka. FlowScan:A network traffic flow reporting and visualization Tool. In Proceedings of the Fourteenth Systems Administration Conference(LISA-00), 2000, pp [4] Robin Sommer and Anja feldmann, NetFlow: Information loss or win?, IWW 02, Nov.6-8, 2002, Marseille, France. [5] Baek-Young Choi, supratik Bhattacharyya. Observations on Cisco Sampled NetFlow. ACM SIGMETRICS Performance Evaluation Review, [6] Nick Duffield, Carsten Lund, Mikkel Thorup, Properties and Prediction of Flow Statistics from Sampled Packet Streams, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, 2002.
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
Traffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Lab 4.1.2 Characterizing Network Applications
Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
The use of SNMP and other network management tools in UNINETT. Arne Øslebø [email protected] March 4, 2014
The use of SNMP and other network management tools in UNINETT Arne Øslebø [email protected] March 4, 2014 1 UNINETTs network GEANT 3 4 What is monitored? Link status Are all connections up? General
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
NetFlow-Lite offers network administrators and engineers the following capabilities:
Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik and Yifan Li National Center for Supercomputing Applications (NCSA) University
Revisiting the Issues On Netflow Sample and Export Performance
Revisiting the Issues On Netflow Sample and Export Performance Hamed Haddadi, Raul Landa, Andrew W. Moore, Saleem Bhatti, Miguel Rio and Xianhui Che University College London University of Cambridge University
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
An overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT [email protected] 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Details. Some details on the core concepts:
Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
Chapter 4 Rate Limiting
Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Networking Fundamentals Part of the SolarWinds IT Management Educational Series
Networking Fundamentals Part of the SolarWinds IT Management Educational Series V o l u m e 3 NetFlow Basics and Deployment Strategies This paper examines NetFlow technology and implementation considerations.
Traffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
AlliedWare Plus OS How To Use sflow in a Network
AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
How to configure an Advanced Expert Probe as NetFlow Collector
created by: Rainer Bemsel Version 1.0 Dated: Jan/31/2012 There are two types of NetFlow collectors in Observer. In most cases, it will likely be the NetFlow Trending collector being configured. The Trending
Configuring NetFlow Data Export (NDE)
49 CHAPTER Prerequisites for NDE, page 49-1 Restrictions for NDE, page 49-1 Information about NDE, page 49-2 Default Settings for NDE, page 49-11 How to Configure NDE, page 49-11 Note For complete syntax
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications
Outline EEC 274 Internet Measurements & Analysis Spring Quarter, 2006 Traffic Measurements Traffic measurements What metrics are we interested in? Measurement and analysis methodologies Traffic characterization
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
QOS IN NETWORK TRAFFIC MANAGEMENT
24 Acta Electrotechnica et Informatica, Vol. 10, No. 4, 2010, 24 28 QOS IN NETWORK TRAFFIC MANAGEMENT Peter FECIĽAK, Katarína KLEINOVÁ, Jozef JANITOR Department of Computers and Informatics, Faculty of
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
