Testing Network Performance with Real Traffic



Similar documents
Hosted Voice. Best Practice Recommendations for VoIP Deployments

Network Simulation Traffic, Paths and Impairment

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

5 IPTV MONITORING BEST PRACTICES

Resilient Voice Architecture

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

HOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide

Region 10 Videoconference Network (R10VN)

Is Your Network Ready for VoIP? > White Paper

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Lucent VPN Firewall Security in x Wireless Networks

Virtual Office. Network Tests. Revision x8, Inc O'Nel Drive San Jose, CA Phone: Fax:

7 Questions to Ask Video Conferencing Providers

5Get rid of hackers and viruses for

CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE

A SENSIBLE GUIDE TO LATENCY MANAGEMENT

Voice over IP Networks: Ensuring quality through proactive link management

Customer Network Assessment

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Simplify VoIP Network Setup and Troubleshooting with NetTool VoIP

Access the Test Here

How To Create An Intelligent Infrastructure Solution

Frequently Asked Questions about Integrated Access

How Network Transparency Affects Application Acceleration Deployment

Observer Analysis Advantages

July, Figure 1. Intuitive, user-friendly web-based (HTML) interface.

Voice Over IP and Firewalls

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Five Hosted VoIP Features

Creating Business-Class VoIP: Ensuring End-to-End Service Quality and Performance in a Multi-Vendor Environment. A Stratecast Whitepaper

Voice Quality: The Ultimate Differentiator in VoIP Providers

Network Instruments white paper

Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc O'Nel Drive San Jose, CA Phone: Fax:

On the Edge: A Hybrid Approach to Cloud Communications for SMBs

Toll-bypass Long Distance Calling What Is VOIP? Immediate Cost Savings Applications Business Quality Voice...

Wireless Network Quality of Service WHITE PAPER

IVCi s IntelliNet SM Network

Knowledge Is Power: Do what s best for the client.

Strata CTX IP Telephone Programming Guidelines

MICROSOFT LYNC 101: ENSURE UC EVERYTHING

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

VoIP / SIP Planning and Disclosure

Requirements of Voice in an IP Internetwork

VOICE OVER IP AND NETWORK CONVERGENCE

The Financial Benefits of Using LiveAction Software for Network QoS

MULTIPOINT VIDEO CALLING

Whitepaper. A Guide to Ensuring Perfect VoIP Calls. blog.sevone.com info@sevone.com

DEPLOYING VoIP SECURELY

Clearing the Way for VoIP

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot

Monitoring Service Delivery in an MPLS Environment

An Introduction to VoIP Protocols

Traffic Monitoring in a Switched Environment

Lab Testing Summary Report

Managing Data, Voice, and Converged IP Networks

Using the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video

Multi-layered Security Solutions for VoIP Protection

Voice Over IP Performance Assurance

Voice over IP: RTP/RTCP The transport layer

Reasons to Choose the Juniper ON Enterprise Network

CIR (down/up) 256k/64k 320k/96k 384k/128k. Throughput allowance 2 GB 4 GB 6 GB. (down/up) in unexpectedly high fees.

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Business Telephone Systems What Options are Right for My Business?

VoIP Solutions Guide Everything You Need to Know

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

YOUR QUESTIONS ANSWERED. A Practical Guide to VoIP for Small Businesses

Quality of Service Testing in the VoIP Environment

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

AT&T Connect Video conferencing functional and architectural overview

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

IP Office: Simple, Powerful Communications for Small and Medium Size Businesses

VoIP 101: An introduction to the basics of Voice over Internet Protocol. How to guide

Secure VoIP for optimal business communication

12 Quality of Service (QoS)

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Troubleshooting VoIP and Streaming Video Problems

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Deploying Probes and Analyzers in an Enterprise Environment

WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY?

Business case for VoIP Readiness Network Assessment

Safeguards Against Denial of Service Attacks for IP Phones

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

White Paper. A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

Ethernet Switch Evaluation For Streaming Media Multicast Applications

How To: Diagnose Poor VoIP Calls through diagnostics.

Network Instruments white paper

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Indepth Voice over IP and SIP Networking Course

Business Phone Security. Threats to VoIP and What to do about Them

Security and the Mitel Teleworker Solution

Getting Started with. Avaya TM VoIP Monitoring Manager

10 QUESTIONS TO ASK BEFORE YOU BUY PHONE SERVICE FOR YOUR BUSINESS SHARE THIS DOCUMENT 1

Transcription:

Testing Network Performance with Real Traffic Mike Danseglio 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T

2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic Corporation in the United States of America and other countries. All other trademarks and registered trademarks are property of their respective owners. 2 Testing Network Performance with Real Traffic

Is your network utilization different from year to year? How about day to day or even minute to minute? There are virtually no network caretakers that believe their network remains consistent over time. Network traffic is unpredictable. A number of factors enter in to causing this unpredictability. But the net impact is that an effective network administrator needs to understand the impact of changing network traffic. This article shows you the common pitfalls that network administrators encounter as the analyze existing and new network capacity. You ll also see what the impact of the changing traffic patterns can be, and the tools that you can use to both understand and plan your network effectively. In particular you will learn how network impact is not just measured in traffic volume. This common misconception leads to far too many network utilization issues. Often network latency and dropped packets are more likely caused by the types of traffic and how they are handled. But there are straightforward methods to identify this situation and enable you to choose a resolution that fits your requirements. All Traffic is Not Created Equal You ve watched video over the Internet. But have you ever wondered how the video renders seamlessly in your browser? We take it for granted that once the video starts it plays smoothly and without major interruptions. Delays and rebuffering errors have decreased exponentially over the last few years as a direct result of three factors: increased bandwidth, lower latency, and better codecs. Under the covers, Internet-based video can consume a ton of bandwidth. It is easy for a network administrator to blame video content for poor network performance and block it from her infrastructure. But video isn t really to blame. Most codecs and applications treat video transfer as low-priority traffic. Now consider the use of PC-based video and audio conferencing systems like Go To Meeting or Microsoft Live Meeting. How is it that the performance for these applications remains acceptable even when the network is very busy? It is a result of the previously mentioned factors and also that network traffic with a higher business value or less tolerant to network interruption is prioritized higher than other traffic. This type of behavior is usually referred to broadly as Quality of Service (QoS) and is implemented in most network components and hosts. For example, a network switch that encounters both Microsoft Live Meeting and YouTube traffic at the same time typically gives preference to the Live Meeting traffic because this traffic carries time-sensitive information such as interactive audio and video conversations. The switch may delay or drop the YouTube traffic if necessary to preserve the QoS of the Live Meeting stream. While this is probably a good thing, failing to account for this behavior during planning and operations causes confusion in capacity management and network performance analysis. A network manager might believe that a highly utilized network is impacting critical business functions when it actually is not. The best way to find out, as you ll see, is to test it out. 3 Testing Network Performance with Real Traffic

Understanding Traffic Impact on Infrastructure Most networks have a variety of traffic including video, audio, large data transfers, small data transfers, etc. Each of these uses, and indeed each application, may have a different expectation of network performance. Voice over IP (VoIP) applications expect very low network latency, and streaming video applications account for higher latency and dropped packets. While this statement seems obvious, it is different for each network, and does not actually apply to some implementations. Your business places an importance on different traffic types that is unique to your business model, users, management, etc. The use of different traffic types and the requirements for the performance of each type are the two components that should guide your network analysis and planning. Notice that I didn t mention traffic capacity. Actually, raw network traffic capacity is becoming less of a concern in today s infrastructure. Surplus capacity is prevalent. But that doesn t mean everything works perfectly. Testing Networks with Accurate Traffic Simulations To actually find out whether networks are handing your unique requirements as expected, you need to test them with the kind of traffic that is in use on your network today. Throwing random packets onto the wire is fun, sure, but the test results are valid only when all users throw random packets onto the wire. As you can guess, very few networks are like that. For example, a common network traffic analysis might break down to look something like this: Figure 1: Network Traffic Utilization Your network testing needs to account for this pattern. Luckily there are two ways you can make this happen: replaying recorded network traffic and simulating the traffic types. This is the only way to accurately determine how far you can push your infrastructure before it fails to meet expectations. Accurate testing is also the only way to really determine whether a vendor s product will meet your needs, regardless of stated product specifications. 4 Testing Network Performance with Real Traffic

Before we get into the specifics of network testing procedures we need to define the network you will test on. The test network must accurately represent the production infrastructure. A common misconception is that the test network must be a 1:1 representation. The same components must exist if the test requires them, for example a switch, a bridge, a stateful inspection firewall, and so on. But a test network is nearly always a smaller scale. In my experience I ve only seen two test networks that were 1:1 mirrors of their production counterpart, and these were created for very specific reasons. Network Replay Testing This option is the most widely used because it has been available for years and is largely unchanged. To test, the network administrator records a sample of network traffic using a network monitoring device or software package such as Wireshark or Network Monitor. The sample needs to be large enough to accurately represent use of the network over time so it should be at least a day s worth and recorded from more than one point in the network. 5 Testing Network Performance with Real Traffic Figure 2: Wireshark Traffic info The recorded traffic sample is then taken to an isolated test network and replayed onto the wire. Performance is measured at the appropriate points such as the client, the switch, the Internet connection point, and so on. This test validates the network performance under as accurate a load as possible it is really what happened on the network. Most network administrators find value in further testing the network by performing a stress test. This test is actually very simple to implement with the recorded traffic: 1. Use the same infrastructure and recorded traffic as the performance test 2. Replay the recorded traffic from multiple systems simultaneously 3. Continue increasing the systems replaying traffic until something breaks 4. Analyze the break to learn the maximum capacity threshold, point of failure, and then predict possible future breaks The chief drawback to using recorded traffic to test network performance is that some traffic is time-bound and dynamic. As a result it will not accurately represent the network. One example of this is a momentary network condition that corrupts some traffic and causes applications to receive out of sequence packets. The error recovery

is very difficult to create using replay. Another challenge is time-stamped data. Many applications ensure that data is not compromised by an attacker by time-stamping it, and that traffic will likely not be valid during a replay attack. This could cause applications to both drop the suspect traffic and decrease network load, or go into a retry state and increase network load. Network Traffic Simulation Testing Simulating network traffic using a hardware or software traffic generator is both an old and new approach. Applications have been around for some time that randomly create valid network packets and put them on the wire. The packets can be somewhat customized to carry specific payload sizes; require routing, and other basic choices. Figure 3: Traffic Generators Previous network traffic generators were limited in what traffic they could generate and transmit. This was often due to limited computer or device computing power or network interface restrictions. As a result the older traffic generators were unable to truly flood a network segment or link. While this could still be useful for testing normal load, it could fall short of truly stress-testing a network or infrastructure. Another limit was the interface and usability of the actual appliance, which frequently required in-depth training to deploy correctly. Modern network traffic generators are far more useful than their predecessors. They are streamlined to take advantage of more computing and network interface resources and are more efficient than ever before. Commonplace operating systems like Windows have also opened up resources to applications that require this level of performance while maintaining a common look and feel. The result of these advancements is applicationstyle software that runs on Windows and is simple to use, yet can generate any style and volume of traffic, from small quantities of pseudo-random data to enough QoS-specific data to make even the most robust network break down and expose the weak points. The network traffic generator is particularly useful when you need to conduct realistic testing of unique network applications. It is often used in conjunction with functional testing. For example, to validate that VoIP performance is not impacted by other network traffic, you can perform this test: 6 Testing Network Performance with Real Traffic

1. Setup a test network with two VoIP clients, a VoIP server, and the intermediate network infrastructure and configuration that represents your environment 2. Establish a VoIP conversation using the same software or devices that are used in the production environment 3. Introduce a random traffic generator that creates common traffic on the same segment at the same volume as your typical network load 4. Turn up the traffic volume and packet size until the network is nearly saturated In this test the VoIP traffic is typically prioritized higher than the traffic coming from the generator. The expected result is that the VoIP conversation remains clear while the network infrastructure avoids jitter or packet loss for the VoIP packets. Other packets will likely drop or become delayed, but that s fine. It is the higher priority traffic that we are testing. A Word of Caution You surely already understand that a test network must be completely isolated from the production environment. This is not unique to network bandwidth testing pretty much any kind of stress test must be isolated to ensure it doesn t impact the rest of the IT infrastructure. But network playback and traffic generation testing evoke a somewhat unique response. Almost any firewall will slam shut and set off every alert it has when you begin these tests. It doesn t really matter whether the firewall runs on Windows, a router, a switch, a dedicated filter, or anything else. Firewalls are designed to detect and prevent exactly what you re intentionally doing during these tests. From a security view these tests often look identical to a denial of service (DoS) attack, many of which have profoundly impacted businesses. For that reason you will probably need to disable all firewalls in the test environment. And if, somehow, the test network is connected to the production network, you can expect a rapid and wholly unpleasant response to your test. 7 Testing Network Performance with Real Traffic