The Broadband Service Optimization Handbook Chapter 3



Similar documents
Application Visibility and Monitoring >

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

The Broadband Service Optimization Handbook Chapter 7

The Traffic Management Handbook for Enterprises

Per-Flow Queuing Allot's Approach to Bandwidth Management

Cisco Network Analysis Module Software 4.0

Performance Management Best Practices for Broadband Service Providers

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

Managed Online Services: Responding to Emerging Content and Apps By Andrew McDonald and Jim Guillet

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

Business case for VoIP Readiness Network Assessment

Edge Configuration Series Reporting Overview

How To Create A Qos

Corporate Network Services of Tomorrow Business-Aware VPNs

Application Performance Management for Enterprise WANs

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

Driving Service Delivery with SLA Performance Management

How To Manage A Network With Ccomtechnique

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

Best Practices - Monitoring and Controlling Peer-to-Peer (P2P) Applications

GENERATING NEW REVENUE STREAMS AND INCREASING NETWORK SECURITY

Service Assurance Tools

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Nortel Technology Standards and Protocol for IP Telephony Solutions

Traffic Analysis With Netflow. The Key to Network Visibility

QOS over MPLS the Complete Story

Traffic Analysis with Netflow The Key to Network Visibility

Delivering Managed Services Using Next Generation Branch Architectures

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Why Is DPI Essential for Wireless Networks?

Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:

ethernet services for multi-site connectivity security, performance, ip transparency

Gaining Operational Efficiencies with the Enterasys S-Series

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

WAN OPTIMIZATION FOR TELCOS, MANAGED SERVICE AND CLOUD PROVIDERS

CiscoWorks Internetwork Performance Monitor 4.0

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

Avoid Three Common Pitfalls With VoIP Readiness Assessments

Simac ICT Netherlands ::

WHITE PAPER: Broadband Bonding for VoIP & UC Applications. In Brief. mushroomnetworks.com. Applications. Challenge. Solution. Benefits.

IVCi s IntelliNet SM Network

Cameron Communications Network Management Practices Policy November, Cameron Communications Network Management Practices Policy Disclosure

Peer-to-peer networking. Jupiter Research

Voice Over IP Performance Assurance

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

Cisco Performance Visibility Manager 1.0.1

Transport for Enterprise VoIP Services

Using LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks

MITEL. NetSolutions. Flat Rate MPLS VPN

The Cisco ASA 5500 as a Superior Firewall Solution

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Cisco IOS Flexible NetFlow Technology

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

Arbor s Solution for ISP

Amdocs Policy Controller

Intelligent Policy Enforcement Solutions for Higher Education Institutions

Analyzing MPLS from an ROI Perspective

IPDR vs. DPI: The Battle for Big Data

White Paper. Optimizing Video Performance Across the Distributed Enterprise >

Southwest Arkansas Telephone Cooperative Network Management Practices

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

EAGLE EYE IP TAP. 1. Introduction

Application Note. Network Optimization with Exinda Optimizer

Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite

Intelligent Routing Platform White Paper

Cisco Performance Agent Data Source Configuration in the Branch-Office Router

Network Management Practices Policy

Improving Quality of Service

Comments on Draft Reports

Network Management and Monitoring Software

PacketTrap One Resource for Managed Services

Deploying Firewalls Throughout Your Organization

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

UNIFIED PERFORMANCE MANAGEMENT

Application Service Testing Enabling scalable delivery of layer 4-7 services

MS Series: VolP Deployment Guide

QoS:What Is It? Why Do We Need It?

The changing face of global data network traffic

Connect & Go with WDM PON Ea 1100 WDM PON

VoIP / SIP Planning and Disclosure

Enterprise. Application Performance Optimization Services Boosting your application performance by optimizing network resources

Managing Network Bandwidth to Maximize Performance

Optimizing Performance for Voice over IP and UDP Traffic

How To Optimize Your Network With An Exinda Optimization Appliance

Network Performance Monitoring at Minimal Capex

Network Packet Monitoring Optimizations in Data Centre

Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience.

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

Infonet Nederland BV:

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Using & Offering Wholesale Ethernet Network and Operational Considerations

Remote Network Monitoring Software for Managed Services Providers

Transcription:

Gaining detailed information about the traffic on your network and the behavior of your subscribers is crucial to achieving success in the highly competitive service provider market. The latest breed of IP service optimization systems allows you to obtain the information about network application behavior that you need to control overall network performance and to ensure IP fairness among individual subscribers. To implement the proper network management policies at the subscriber and application levels, you must first determine what kind of traffic is currently on the network and how it is performing. In other words, the initial phase of implementing effective IP service optimization is establishing a baseline. Establishing your baseline involves gathering usage statistics, generated by the service optimization system in the form of graphical reports, and analyzing them from several perspectives. You may be surprised to find out what traffic shows up on your network! This baseline information will allow you to design a plan to optimize the operation of your network. Today s Baseline Is Tomorrow s Key Optimizing network use is key to most service providers transition to delivering IP triple play voice, data, and video services, a move intended to increase revenue. Triple-play deployment, however, involves considerable capital expenditure (capex) in the form of additional network equipment and capacity needed to support rich media services. Recent studies by global research firm Infonetics Research have Copyright 2006 Allot Communications Page 1 of 7

shown that in 2005, on average, 40 percent of capital expenditures by North American, European, and Asia-Pacific service providers went toward triple-play network equipment. Using intelligent IP service optimization is the smart way to avoid making unnecessary capex investments and also helps defray significant additional operational expenditures (opex) in troubleshooting and network management. The baseline information you need is whether there is congestion is on your network, at which times it occurs, and its cause. Generally, gathering usage statistics for one to two weeks gives you enough information to accurately analyze network activity. You may also consider monitoring the network through one complete billing cycle to study the needs of your subscribers. What you discover could assist you in designing new service packages. The monitor s graphical reports show when the network is used (see Figure 1), by whom, and by what applications and protocols. This information helps you determine how to manage network traffic effectively, thereby improving your average revenue per user (ARPU), the quality of your service delivery, and your long-range capital investment planning. Copyright 2006 Allot Communications Page 2 of 7

Figure 1. Analyzing Traffic Patterns Basic monitoring reveals time-of-day traffic patterns and what volumes of traffic fall in and out of subscribers profiles. Visibility and Correlation Legacy monitors have been around for a while. These devices monitor Layer 2 3 activity. They generate reports about performance levels of individual permanent virtual circuits (PVCs), measure whether or not traffic levels fall within a committed information rate (CIR) and, generally, determine whether basic customer servicelevel agreements (SLAs) for bandwidth, latency, jitter, and packet loss are being Copyright 2006 Allot Communications Page 3 of 7

met. These monitors can also identify top talkers the PCs, users, and servers generating the highest traffic volumes based on IP or MAC addresses. Today, more advanced monitoring products add visibility into Layers 4 7 through a capability called deep packet inspection (DPI). DPI allows the systems to identify applications not only by port number but also, more granularly, by applicationspecific information deep inside the packet header. This application-recognition capability enables monitors to calculate response times and traffic loads on a perapplication basis, while correlating this information per subscriber across all traffic classes. Armed with this network intelligence, service providers can understand how to tune the network and its policies on a per-subscriber, per-application basis for continued optimal performance. Today s DPI-enabled Layer 7 network monitors support deep analysis of static and dynamic protocols, application signatures, content patterns, and session behavior, such as number of connections per second (Figure 1). This visibility is the key to controlling and optimizing IP service delivery for both best-effort and new, premium services. DPI is especially useful for providers of triple-play voice, data, and video services, because DPI accurately identifies even those application types that use dynamic port numbers, such as voice over IP (VoIP), net conferencing, and peer-to-peer (P2P) applications. It also specifically differentiates between various Web applications that use HTTP s open port 80 and identifies suspicious code that tries to sneak onto the network via port 80. The reports generated by DPI-capable monitors help service providers gain a competitive advantage by enabling them to do the following: Fine-tune policies for specific subscriber segments Manage bandwidth for optimizing delivery of premium services Ensure that customers actually receive the service levels for which they are paying Prevent degradation of critical applications for business customers Copyright 2006 Allot Communications Page 4 of 7

Figure 2 shows how much of the network is being used at a particular point in time. Figure 2. Utilization of the Network This operator s network is reaching its capacity limit in the inbound direction. The orange band warns that the link has surpassed a given threshold of utilization (in this case, more than 90 percent). By also viewing information shown in Figure 3, a service provider can determine how best to rate-limit or otherwise control high-usage traffic flows to relieve the inbound congestion. Figure 3 shows the most active protocols on the network. The graphic report indicates specifically that TCP-based edonkey (a P2P file-sharing application) is consuming one-half of the bandwidth and is causing congestion on the network. Knowing this, the service provider might decide to rate-limit the amount of bandwidth edonkey can consume or, conversely, measure it on a per-subscriber basis and charge a premium for it. Copyright 2006 Allot Communications Page 5 of 7

Figure 3. Most Active Protocols TCP-based edonkey music and video sharing is consuming the most bandwidth (the purple wedge refers to UDP-based edonkey application traffic). By creating policies for controlling this application, service providers can alleviate bandwidth congestion and avoid additional network capacity investments. Establishing and Tuning Network Policy Establishing a baseline of your network activity is the key to understanding how to optimize the way your existing network resources are used. Your baseline data will tell you: The composition of your network traffic at all OSI layers Which applications are hogging bandwidth and which are bandwidthconstrained The times of peak congestion Copyright 2006 Allot Communications Page 6 of 7

Where the main sources of congestion originate (i.e., identifying subscribers generating large traffic volumes) Which SLAs are being violated Which network usage policies are being overridden or abused Where P2P is degrading the network What areas require the setting of new policies or limits You can fine-tune your network by using the results of baseline monitoring to determine and improve upon network policy. This involves first grouping all your traffic into classes based on what network policies should apply to them. Classes can be created on the basis of application, subscriber base, subscriber IP address, category of service, or a combination of these variables. Classification helps you to generally meet the demands of individual subscribers and subscriber groups. Chapter Summary Controlling today s converged networks depends on understanding what users, protocols, and applications are on the network and how they are behaving. Establishing a baseline using a Layer 7, DPI-capable network monitor enables you to discover what s actually on your network, traffic patterns, and overall network behavior the first step in controlling traffic and usage down to the subscriber level. Managing both aggregate and per-subscriber traffic behavior allows you to deploy new premium services and to enforce IP fairness among subscribers, all important capabilities for ARPU improvement. Copyright 2006 Allot Communications Page 7 of 7