NETWORK MONITORING SESSION DESCRIPTION
|
|
|
- Augusta Ford
- 10 years ago
- Views:
Transcription
1 NETWORK MONITORING SESSION DESCRIPTION Augusto Ciuffoletti INFN-CNAF Via B. Pichat 6/2, Bologna, Italy Antonis Papadogiannakis, Michalis Polychronakis FORTH Heraklion, Crete, Greece Abstract Keywords: Network Monitoring is a complex distributed activity: we distinguish agents that issue requests and use of the results, other that operate the monitoring activity and produce observations, glued together by other agents that are in charge of routing requests and results. We illustrate a comprehensive view of a such architecture, taking into account scalability and security requirements, concentrating on the definition of the information exchanged between such agents. We address scalability by introducing monitoring sessions activated on demand, with a declared preference for passive monitoring tools, and security by enforcing authenticated communications at every step. A scalable protocol for public key diffusion is introduced in a companion paper. Network Monitoring, Workflow Management, XML Schema Description, Passive Netwrok Monitoring, On Demand Network Monitoring.
2 2 1. Introduction When we consider the information exchange related to Network Monitoring, we see that the main actors involved are the producers of monitoring data, and the consumers. We refine such view by considering consumers as parts of a complex activity that manages the tasks submitted by users: we call such distributed activity Workflow Management (here including also the monitoring activity successive to task allocation) and Workflow Management Agent (also WMA) the local agents that cooperate in its implementation. While allocating the resources for user tasks, the interest of such agents is for snapshots of recent performances as well as for static capabilities of resources; if a reservation oriented approach is used, resource allocation is carried out by scheduling resource capabilities, without any need of a monitoring activity. In contrast, while running a user task, the behavior of the resource must be permanently monitored, in order to guarantee an appropriate quality of service and for accounting purposes. Such considerations narrow our interest to a subset of what is often considered as Network Monitoring: we exclude the maintenance of pointwise historical traces, needed to respond to unanticipated requests, and instead we consider monitoring activity to be dynamically configured according with WMA requests. As a consequence we do not consider the design of a repository for network observations, while we are only marginally interested to the availability of generic aggregated statistics of dynamic behaviors and of static properties of network elements. Instead, we concentrate on the dynamic configuration of the monitoring activity, and to the transfer of streams of observations from producers to WMA. On the side of the distributed functionality in charge of managing the production of Network Monitoring data, we introduce specialized agents (the Network Monitoring Agents, NMA) in charge of controlling local capabilities. Such agents are located according with a partitioning of the whole Grid: each partition, a domain in our terminology, is a set of Grid components characterized by a uniform connectivity with the rest of the system. Such abstraction is often used in the Internet architecture, so we have opted for an overloaded term to indicate it. However, it is worth stating that a Network Monitoring domain does not necessarily correspond to a DNS domain, or to a routing AS or area. Equivalence with such existing entities can be stipulated whenever non contradicting the principle of uniform connectivity. The principle of uniform connectivity is used to justify the collection of aggregate statistics and of static capabilities for network elements between domains, thus limiting monitoring activity. As anticipated, such information is mainly directed to task allocation, which should be preferably addressed using
3 Ciuffoletti et al. Network Monitoring Session Description 3 anticipate reservation. In such case, the uniform connectivity requirement may become less stringent. The rationale behind the introduction of NMAs is the localization of the capabilities and of the workload related to network monitoring. NMAs act as proxies for addressing monitoring requests, and manage the streaming of monitoring data for the whole domain. Each domain may contain one or more NMAs, which may be responsible for the observation of distinct Network Elements, or related to distinct administrations living within the same domain. They are responsible of controlling Network Monitoring Elements located inside the domain. Network Monitoring Elements (NME) represent resources provided for monitoring the network using appropriate tools. Figure 1 summarizes the above architecture in a simple system consisting of three domains (large ovals labelled with the domain ID), each with a NMA (a small circle on the border of each oval). Two NMEs are included in domains FORTH and INFN-CNAF, while the other domain INFN-NA contains a WMA. In the design of a NME we remark a relevant distinction between passive and active techniques, that impacts the scalability of the whole architecture. Since passive techniques are notably less intrusive than active ones, we prefer the former, although the latter should be provided as a fallback solution. For instance, in case of a simple request of connectivity monitoring between two sites, the option of a slow ping should be provided in case passive monitoring is not available. Other scenarios should address passive techniques. To enforce security, NMEs should accept controls only from local NMAs. In their turn, NMAs should accept requests only from peer NMAs, as well as from local WMAs. In that sense domain partitioning improves the flexibility and expandibility of our network monitoring architecture. The next section analyzes the activity of the NMA, and describes step by step the life-cycle of a monitoring request. 2. The operation inside the Network Monitoring Agent The purpose of a NMA is to coordinate the monitoring of the networking resources used by the computation coordinated by the WMA. More precisely, we distinguish four distinct activities: to accept (proxying) network monitoring requests coming from WMAs providing the description of the monitoring activity. Such requests may come either from a WMA inside the same domain, or from another NMA. In either case the request must be authenticated. to route the request to another NMA which is able to control an appropriate NME;
4 4 to coordinate the monitoring activity carried out by NMEs; to support the streaming of Network Monitoring data to the requesting WMA, possibly through other NMAs. In the case of proxying, a WMA that coordinates a given computational activity will produce a number of Network Monitoring Session Descriptions. Such data item is exhaustively described in next section. Concerning the request routing activity, the WMA will forward session descriptions to the local NMA, which will authenticate the request, and forward it to the appropriate NMA. We do not detail how such request is routed, but consider that this operation is based on the accessibility of a database containing Network Monitoring Agents Descriptions. Such data items map NMAs to domains, define their monitoring capabilities, as well as their connectivity with other NMAs. The control of Network Elements requires knowledge of Network Monitoring capabilities available on NMEs within the local domain. In order to support the streaming of Network Monitoring results, a data channel is built between the NMA in charge of coordinating the monitoring session and the NMA proxying the WMA. In principle such path may traverse several NMAs, and should consider the possibility of optimizing the path in case the same information is requested by many different WMA tasks. In conclusion, we have identified 3 data structures supporting our Network Monitoring architecture: a local directory that supports authentication of requests from WMAs in the local domain, as well as the description of local NMEs; a global directory that supports mutual authentication of NMAs; a network monitoring session description which contains the description of a single session. While the design of the local directory does not address any challenging aspect, the other two have distinct reasons of interest from a research point of view. The implementation of a global directory implies the solution of a number of problems concerning distributed processing, while the description of a monitoring session should flexibly cope with the diversity of network monitoring requests. Here we focus on the latter problem, addressing the reader interested in the former to a specific article [2]: in the next section we introduce the data structure describing a monitoring session as an instance of an XML Schema Description document.
5 Ciuffoletti et al. Network Monitoring Session Description 5 3. The XML schema of a Network Monitoring Session The complex type NetworkMonitoringSessionType (its XSD is in the appendix) is the frame for a monitoring request, whose attributes are a sort of header for the Session Description: SessionId It is a way to identify and refer to a session. Its syntax can be constrained into a URI-like form using an appropriate pattern, which is not considered here; StartAt It is the requested time when to start the monitoring activity; Duration It is a timeout, in case the Session is not explicitly closed by the requesting WMA; BandwidthLimit It is used for negotiation of the multicast facilities, and corresponds to an upper bound of the traffic generated by the monitoring activity, in bytes/second; Priority Its usage is similar to the above. Elements are a more composite description of the monitoring activity, which consists of a sequence of elements with complex types: RequestFrom The agents (possibly more than one) that request the activity. This information is used to generate or extend the multicast tree, as well as to check privileges; Route The indication of the route the stream is going to follow, represented as a tree of NMAs. The case study at page 8 exemplifies its management; NetworkElement A session monitors a single domain-to-domain path (this is the meaning associated to a Network Element, more restrictive than in RFC2216); MeasurementStream The description of the low level network monitoring activity. Such data should be passed to the back-end supported tool, which results in the production of a stream of data of known content and syntax. We opt to indicate one single network element in accordance to the fact that a given session is implemented by a single Network Monitoring Agent. It is impossible to guarantee such fact if several Network Elements are monitored within the same session. Advanced passive network monitoring tools that are able to observe distinct characteristics of traffic flowing between given endpoints may incorporate such data into a single stream.
6 6 The flexibility of the scheme is based on the definition of the type used to describe the MeasurementStream, which is where the monitoring tools are indicated and configured. As a general rule, a single frame in the stream will contain several numerical values produced (quasi) synchronously by the same tool activation. A MeasurementStream element contains one or more elements of type CharacteristicStream, each containing the description of a tool activity. Such elements are passed untouched to the NME, each of them corresponding to a frame series in the stream. Each CharacteristicStream element includes a choice of elements containing the controls specific for a given network monitoring tool. Note that we do not consider abstract characteristics, for instance roundtrip time, but make explicit reference to the operational description of their computation. In other words, a ping is a ping, and not a roundtrip time. The WMA is free to use it as a roundtrip time, but it cannot confuse it with a roundtrip time measured during a TCP connect (which is not simply a protocol difference). The use of a trade mark (e.g. linux-ping) is OK, but in many cases a more abstract reference to the methodology used to measure it (e.g., ICMP ping) is preferable. The tool wrapper may accept both a tool specific name or a methodology to indicate the same operation. The WMA may indicate either a methodology or a tool specific name, and the NMA should not interfere with such indication. Descriptive statistics (historical average, stddev etc.) are indicated as tool dependent options. Generic elements are the following: SamplePeriod The granularity of the time axis, in seconds; SourceIP A specific monitored IP: this details the monitoring below the network element level. Several SourceIP s may be indicated, if the tool supports this, but all should be included in the same source domain: it is the responsibility of the WMA to ensure compliance. The role of the source in the measurement depends on the specific tool (see SourceDomain). DestinationIP same as above. Concerning the tool specific element, we outline the example of two external XSD documents describing a trivial ping, and a passive monitoring session. The trivial ping (see the XSD in table 1) is characterized by the endpoints and by a ping frequency, already indicated in the CharacteristicStream. Such data is complemented with the length of the packet. Two distinct characteristics can be requested: the roundtrip time, and the packet loss rate. A sophisticated passive network monitoring tool (we envision a prototype based on the MAPI monitoring library [12]) is shown in table 2. Based on the source and destination addresses, and optionally on the protocol name and the
7 Ciuffoletti et al. Network Monitoring Session Description 7 <schema xmlns=" xmlns:pt=" augusto/schema/pingtool.xsd" targetnamespace=" augusto/schema/pingtool.xsd"> <annotation> <documentation xml:lang="en"> Network Monitoring Tool Ping. Copyright CoreGRID. All rights reserved. Version 0.0 </documentation> </annotation> <complextype name="pingoptionstype"> <sequence> <element name="packetsize" type="integer" minoccurs="0"/> </sequence> <attribute name="characteristicid" type="pt:pingcharacteristicidtype" use="required"/> <simpletype name="pingcharacteristicidtype"> <restriction base="string"> <enumeration value="roundtrip"/> <enumeration value="packetloss"/> </restriction> </simpletype> </schema> Table 1. Trivial Ping Options
8 8 type of a specific application, we can filter and monitor the traffic we are interested in. The ProtocolName element can be any network protocol at the transport layer (such as TCP and UDP) while ApplicationName may correspond to any Grid-related application (such as HTTP, GridFTP, and Globus). The identification of a specific application in the Grid network traffic can be as simple as looking for a static port number, or more complex based on deep packet inspection, application-level protocol decoding, or other heuristics. The measurement frequency is defined using the SamplePeriod element, that is part of the CharacteristicStreamType. Other options for the passive monitoring tools include requests for anonymization of sensitive fields in the results (e.g., IP addresses) and use of a third host, whenever needed, for gathering and correlating the results. The interested reader finds in companion papers the description of the techniques used to measure round-trip time [8], packet loss rate [9], available bandwidth, and per-application bandwidth usage [1]. 3.1 A case study: monitoring Processor to Storage connectivity A simple example illustrates the request of an active monitoring session between a Storage and a Computing Element to monitor their connectivity through an ICMP ping (see table 3). The origin of the Network Monitoring Session descriptor is the WMA represented as a green circle inside the INFN-NA domain (see figure 1). The WMA has no hints about the Network Monitoring Architecture, so it delivers a bare MeasurementStream instance to the local NMA. At this point the Measurement Stream is encapsulated into a Network Monitoring Session description, and routes the request to the known NMA at one end of the Network Element. The identifier of the forwarding NMA is placed in the route stack. The NMA in the INFN-CNAF domain discovers that it cannot handle the request: there is no ping wrapper on the Computing element, and therefore the monitoring activity cannot be carried out. It forwards the NetworkMonitoringSession instance to the known NMA on the other Network Element endpoint, FORTH, pushing its own address on the stack. The next NMA discovers that the storage element is equipped with a ping wrapper: therefore it extracts the MeasurementStream description from the Session description, and delivers it to the NME co-located with the Storage Element. It also discovers that it is adjacent to the NMA in the INFN-NA domain, and eliminates the intermediate INFN-CNAF agent from the Route stack.
9 Ciuffoletti et al. Network Monitoring Session Description 9 <schema xmlns=" xmlns:am=" augusto/schema/mapimonitoringtools-0.1.xsd" targetnamespace= " augusto/schema/mapimonitoringtools-0.1.xsd"> <annotation> <documentation xml:lang="en"> Passive Network Monitoring Tools (FORTH). Copyright CoreGRID. All rights reserved. Version 0.0 </documentation> </annotation> <complextype name="mapimonitoringtoolsoptionstype"> <sequence> <element name="protocolname" minoccurs="0"/> <element name="applicationname" minoccurs="0"/> <element name="anonymize" minoccurs="0"/> <element name="thirdparty" minoccurs="0"/> </sequence> <attribute name="characteristicid" type="am:mapimonitoringtoolscharacteristicidtype" use="required"/> <simpletype name="mapimonitoringtoolscharacteristicidtype"> <restriction base="string"> <enumeration value="roundtriptime"/> <enumeration value="packetlossrate"/> <enumeration value="availablebandwidth"/> <enumeration value="usedbandwidth"/> </restriction> </simpletype> </schema> Table 2. MAPI options
10 10 SE+NME Forth INFN NA NMA WMA NMA NMA CE INFN CNAF Figure 1. Information flow related to a ping session: the green circle indicates a WMA, black arrows indicate the flow of a Network Monitoring Session description representing a request, red circles represent NMAs, black circles represent monitored sites, and red arrows represent the data stream from the NME to the WMA. The NME activates a ping process, formatting the data coming from such process according to its specifications, and forwarding successive frames to the local NMA, which in its turn encapsulates the frames by indicating the Session they belong to and passing them to the next NMA in the stack. In our case this is the NMA located at INFN-NA, which decapsulates the data and passes it to the WMA, which is able to unmarshall the data contained in the datagram according with tool specifications, and process the data. The WMA finally interrupts the monitoring session notifying the local NMA, which propagates the request according to the route stack known to it. When the request reaches FORTH NMA, it stops the monitoring activity on the computing element. Alternatively, FORTH NMA will perform the same activity when the Duration timeout expires. Intermediate NMA s will suspend and remove the registration of the session from their soft state. 4. Related works The coordination of a network monitoring infrastructure is a matter of active research. The first effort in this sense is probably the Network Weather Service [13], which still offers relevant suggestions. However, such prototype indicates but solves only partially the real challenges of a coordinated network monitoring architecture: scalability and security. Successive studies mainly focussed towards the publication of network monitoring results in view of retrospective analysis: this option limits the applica-
11 Ciuffoletti et al. Network Monitoring Session Description 11 <?xml version="1.0"?> <nmsd:networkmonitoringsession xmlns:nmsd=" augusto/schema/ NetworkMonitoringSessionDescription-0.5.xsd" <RequestFrom TaskId="WF245" <Schedule StartAt=" T12:00: :00" Duration="2H"/> <Route> <NextAgent Index="1"/> <NextAgent Index="2"/> </Route> <NetworkElement SourceDomain="FORTH" DestinationDomain="CNAF"/> <MeasurementStream> <CharacteristicStream CharacteristicStreamId="1"> <SamplePeriod>5</SamplePeriod> <Path> <SourceIP>processor_1.ics.forth.gr</SourceIP> <DestinationIP>ftp.cnaf.infn.it</DestinationIP> </Path> <PingOptions CharacteristicId="RoundTrip"> <PacketSize>2048</PacketSize> </PingOptions> </CharacteristicStream> </MeasurementStream> </nmsd:networkmonitoringsession> Table 3. XML instance for the example in figure 1 tion of such infrastructures to those scenarios where monitoring requests are planned and concentrate on a restricted subset of routes. Without such limit any solution is deemed to unscalability, since the number of routes grows with the square of the number of resource elements in the network. Such scenario is nonetheless of great practical relevance: administrative monitoring, as well as accounting or diagnosis fall into the category of a monitoring task that concentrates on few routes, known a priori. To cite some of the works on this trail, we cite the Globus MDS [11], and EGEE network performance monitoring architecture [5]. In this paper we explore another facet of the problem, which is relevant to cope with unplanned monitoring requests. The interest for such aspect of network monitoring is that monitoring requests from the agents responsible for the coordination of Grid jobs cannot be anticipated, they extend to a limited lifetime, they have a moderate (if any) need of historical data, mainly to improve measurement robustness. Such aspect of network monitoring is far less studied, but exhibits a number of challenges: flexibility, since new requests must be activated dynamically for scalability reasons, and security, since network monitoring is an expensive activity, and requests must be authenticated. Our approach to this aspect of network monitoring is marginally related to the past experience with planned network monitoring. The problems rais-
12 12 ing in the two cases are too different to justify a common solution: one for all, unplanned network monitoring in principle does not need a measurements database, while planned network monitoring relies on the availability of a powerful repository for measurements (think for instance to the R-GMA [4]architecture). Therefore we aimed at a different approach. The architecture we propose is an evolution of [3]and its design has been influenced by Internet streaming protocols: the basic requirements are those announced in [6], but our embrional solution for the request of a Network Monitoring Session is also inspired to the Internet SIP [7]protocol. We also take into account the RTP [10]protocol as for the components of a network monitoring request. In analogy to the application profiles introduced in RTP, that characterize the payload in a flexible and expandable way, we opted for a monitoring tool oriented description, instead of a characteristic oriented approach. Just like in the case of RTP, the neutrality of an approach that leaves to monitoring tool designers the freedom to introduce new measurements that do not exactly match existing characteristics, and to workflow managers designers the ability to use them, leaves space to research and new products in the rapidly evolving field of network monitoring tools. 5. Conclusions We introduce a distinction between planned and unplanned network monitoring activities: we claim that each of them exhibits challenging aspects, and requires distinct solutions, although the latter is receiving less attention than the former from the research community. The fact that unplanned activities are requested by Workflow Management Agents introduces the need of a scalable and flexible authentication scheme. Once they are activated their output should not be stored for future use, but directly delivered to the requester with a lightweight streaming protocol. The request and reply protocol should be flexible and allow the integration of new monitoring tools. In this paper we address a fundamental step in the design of a solution for the management of unplanned monitoring activity, which consists in the definition of the information needed to describe a single monitoring session, and the scope of such entity. In order to give an intuitive framework, we outline the architecture of the network monitoring infrastructure, identifying the actors and their inter-play. APPENDIX Network Monitoring Session Schema <schema xmlns=" xmlns:pt=" augusto/schema/pingtool.xsd" xmlns:am=" augusto/schema/appmontool.xsd" xmlns:nmsd=" augusto/schema/
13 Ciuffoletti et al. Network Monitoring Session Description 13 NetworkMonitoringSessionDescription-0.4.xsd" targetnamespace=" augusto/schema/ NetworkMonitoringSessionDescription-0.4.xsd" elementformdefault="unqualified" attributeformdefault="unqualified"> <import namespace=" augusto/schema/pingtool.xsd"/> <import namespace=" augusto/schema/appmontool.xsd"/> <annotation> <documentation xml:lang="en"> Network Monitoring Session Description. Copyright CoreGRID. All rights reserved. Version 0.1 </documentation> </annotation> <element name="networkmonitoringsession" type="nmsd:networkmonitoringsessiontype"/> <element name="comment" /> <complextype name="networkmonitoringsessiontype"> <sequence> <element name="requestfrom" type="nmsd:workflowmonitoringtasktype" maxoccurs="unbounded"/> <element name="route" type="nmsd:routestacktype" minoccurs="0"/> <element name="networkelement" type="nmsd:networkelementtype"/> <element name="measurementstream" type="nmsd:measurementstreamtype"/> </sequence> <attribute name="sessionid" use="required"/> <attribute name="startat" type="datetime" use="required"/> <attribute name="duration" type="duration" use="required"/> <attribute name="bandwidthlimit" type="nonnegativeinteger" default="0"/> <attribute name="priority" type="nonnegativeinteger" default="0"/> <complextype name="workflowmonitoringtasktype"> <attribute name="taskid" /> <attribute name="workflowmonitoringagentid" /> <complextype name="routestacktype"> <sequence> <element name="nextagent" minoccurs="0" maxoccurs="unbounded"> <complextype> <attribute name="agent" /> <attribute name="index" type="nonnegativeinteger"/>
14 14 </element> </sequence> <complextype name="networkelementtype"> <attribute name="sourcedomain" use="required"/> <attribute name="destinationdomain" use="required"/> <complextype name="measurementstreamtype"> <sequence> <element name="characteristicstream" minoccurs="1" maxoccurs="unbounded"> <complextype> <sequence> <element name="sampleperiod" type="float" minoccurs="0"/> <element name="sourceip" minoccurs="0" maxoccurs="unbounded"/> <element name="destinationip" minoccurs="0" maxoccurs="unbounded"/> <choice> <element name="pingoptions" type="pt:pingoptionstype"/> <element name="appmonoptions" type="am:appmonoptionstype"/> </choice> </sequence> <attribute name="characteristicstreamid" /> </element> </sequence> </schema> References [1] Demetres Antoniades, Michalis Polychronakis, Spiros Antonatos, Evangelos P. Markatos, Sven Ubik, and Arne Øslebø. Appmon: An application for accurate per application network traffic characterization. In In IST Broadband Europe 2006 Conference, [2] A. Ciuffoletti. The wandering token: Congestion avoidance of a shared resource. In Austrian-Hungarian Workshop on Distributed and Parallel Systems, page 10, Innsbruck (Austria), September [3] Augusto Ciuffoletti and Michalis Polychronakis. Architecture of a network monitoring element. In CoreGRID workshop at EURO-Par 2006, page 10, Dresden (Germany), August [4] A. Cooke, A. Gray, L. Ma, W. Nutt, J. Magowan, P. Taylor, R. Byrom, L. Field, S. Hicks, and J. et Al. Leak. R-GMA: An information integration system for grid monitoring.
15 Ciuffoletti et al. Network Monitoring Session Description 15 In Proceedings of the Eleventh International Conference on Cooperative Information Systems, [5] EGEE. Network Performance Monitoring Architecture, october [6] Sally Floyd, Van Jacobson, Ching-Gung Liu, Steven McCanne, and Lixia Zhang. A reliable multicast framenwork for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, November [7] H. Handley, H. Schultzrinne, Schooler E., and J. Rosenberg. SIP: Session initiation protocol. Request for Comment 2543, Network Working Group, March [8] Hao Jiang and Constantinos Dovrolis. Passive estimation of TCP round-trip times. SIG- COMM Comput. Commun. Rev., 32(3):75 88, [9] Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos, and Augusto Ciuffoletti. Passive end-to-end packet loss estimation for grid traffic monitoring. In Proceedings of the CoreGRID Integration Workshop, [10] H. Shultzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A transport protocol for real-time applications. Request for Comment 1889, Audio-Video Transport Working Group, January [11] The Globus Team. Globus Toolkit 2.2 MDS Technology Brief, Jan Draft. [12] Panos Trimintzios, Michalis Polychronakis, Antonis Papadogiannakis, Michalis Foukarakis, Evangelos P. Markatos, and Arne Øslebø. DiMAPI: An application programming interface for distributed network monitoring. In Proceedings of the 10 th IEEE/IFIP Network Operations and Management Symposium (NOMS), April [13] Rich Wolski. Dinamically forecasting network performance using the Network Weather Service. Technical Report TR-CS96-494, University of California at San Diego, January 1998.
Network Monitoring Session Description
Network Monitoring Session Description Augusto Ciuffoletti [email protected] INFN-CNAF Via B. Pichat - Bologna - ITALY Antonis Papadogiannakis, Michalis Polychronakis, {papadog,mikepo}@forth.ics.gr FORTH
End-to-end Network Monitoring Infrastructure
End-to-end Network Monitoring Infrastructure Augusto Ciuffoletti, Yari Marchetti {augusto}@di.unipi.it {Yari.Marchetti}@cnaf.infn.it INFN-CNAF Via B. Pichat 6a - Bologna - Italy Antonis Papadogiannakis,
PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE
PROTOTYPE IMPLEMENTATION OF A DEMAND DRIVEN NETWORK MONITORING ARCHITECTURE Augusto Ciuffoletti, Yari Marchetti INFN-CNAF (Italy) Antonis Papadogiannakis, Michalis Polychronakis FORTH (Greece) Summary
to-end Packet Loss Estimation for Grid Traffic Monitoring
Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)
Architecture of a Network Monitoring Element
Architecture of a Network Element Augusto Ciuffoletti [email protected] CNAF-INFN Bologna (Italy) Michalis Polychronakis [email protected] FORTH - Crete (Greece) CoreGRID Technical Report Number TR-0033
Issues about the Integration of Passive and Active Monitoring for Grid Networks
Issues about the Integration of Passive and Active Monitoring for Grid Networks S. Andreozzi 2, D. Antoniades 1, A. Ciuffoletti 2, A. Ghiselli 2, E.P. Markatos 1, M. Polychronakis 1, P. Trimintzios 1 1
PASSIVE END-TO-END PACKET LOSS ESTIMATION FOR GRID TRAFFIC MONITORING
PASSIVE END-TO-END PACKET LOSS ESTIMATION FOR GRID TRAFFIC MONITORING A. Papadogiannakis, A. Kapravelos, M. Polychronakis, E. P. Markatos Institute of Computer Science, Foundation for Research & Technology
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Appmon: An Application for Accurate per Application Network Traffic Characterization
Appmon: An Application for Accurate per Application Network Traffic Characterization Demetres Antoniades 1, Michalis Polychronakis 1, Spiros Antonatos 1, Evangelos P. Markatos 1, Sven Ubik 2, Arne Øslebø
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Alkit Reflex RTP reflector/mixer
Alkit Reflex RTP reflector/mixer Mathias Johanson, Ph.D. Alkit Communications Introduction Real time audio and video communication over IP networks is attracting a lot of interest for applications like
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Multi Stage Filtering
Multi Stage Filtering Technical Brief With the increasing traffic volume in modern data centers, largely driven by e-business and mobile devices, network and application performance monitoring has become
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
White Paper. Traversing Firewalls with Video over IP: Issues and Solutions
Traversing Firewalls with Video over IP: Issues and Solutions V Table of Contents Introduction Role of a Firewall Deployment Issues Relating to IP Video and Firewall Traversal The VCON SecureConnect Solution
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Architecture of a Network Monitoring Element
Architecture of a Network Monitoring Element Augusto Ciuffoletti 1 and Michalis Polychronakis 2 1 CNAF-INFN, Bologna, Italy 2 FORTH-ICS, Heraklio, Greece Abstract. A Network Monitoring system is a vital
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Realistic Passive Packet Loss Measurement for High-Speed Networks
Realistic Passive Packet Loss Measurement for High-Speed Networks Aleš Friedl 1, Sven Ubik 1, Alexandros Kapravelos 2, Michalis Polychronakis 2, and Evangelos P. Markatos 2 1 CESNET, Czech Republic {afriedl,ubik}@cesnet.cz
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Testing L7 Traffic Shaping Policies with IxChariot IxChariot
TEST PLAN Testing L7 Traffic Shaping Policies with IxChariot IxChariot www.ixiacom.com 915-6658-01, 2005 Contents 1. Introduction 1 2. Overview of L7 Layer Payload Definition Options in IxChariot 1 2.1
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Integrating Avaya Aura Presence Services with Microsoft OCS
Integrating Avaya Aura Presence Services with Microsoft OCS 6.1 Service Pack 5 December 2012 Contents Chapter 1: Introduction... 5 Overview - OCS/Lync integration... 5 The Presence Services server and
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Design of an Application Programming Interface for IP Network Monitoring
Design of an Application Programming Interface for IP Network Monitoring Evangelos P. Markatos Kostas G. Anagnostakis Arne Øslebø Michalis Polychronakis Institute of Computer Science (ICS), Foundation
ABW - Short-timescale passive bandwidth monitoring
ABW - Short-timescale passive bandwidth monitoring Sven Ubik (CESNET, Czech Republic), Demetres Antoniades (ICS-FORTH, Greece), Arne Oslebo (UNINETT, Norway) Abstract Bandwidth usage monitoring is important
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
IP-Telephony Real-Time & Multimedia Protocols
IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
IPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL
AN IPTEL ARCHITECTURE BASED ON THE SIP PROTOCOL João Paulo Sousa Instituto Politécnico de Bragança R. João Maria Sarmento Pimentel, 5370-326 Mirandela, Portugal + 35 27 820 3 40 [email protected] Eurico Carrapatoso
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
A Service Platform for Subscription-Based Live Video Streaming
A Service Platform for Subscription-Based Live Video Streaming Kelum Vithana 1, Shantha Fernando 2, Dileeka Dias 3 1 Dialog - University of Moratuwa Mobile Communications Research Laboratory 2 Department
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Global Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
Developing and Integrating Java Based SIP Client at Srce
Developing and Integrating Java Based SIP Client at Srce Davor Jovanovi and Danijel Matek University Computing Centre, Zagreb, Croatia [email protected], [email protected] Abstract. In order
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Need for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
