NetFlow-based bandwidth estimation in IP networks

Size: px
Start display at page:

Download "NetFlow-based bandwidth estimation in IP networks"

Transcription

1 NetFlow-based bandwidth estimation in IP networks Rodrigo Alarcón-Reyes Department of Electrical and Computer Engineering McGill University March 3, 22

2 Outline. Introduction to NetFlow 2. Definition of the bandwitdh estimation problem 3. Proposed Solution Notation Assumptions Solution 4. Study of the uplink/downlink ratio from real traces 5. Future work 2

3 Introduction NetFlow is an application protocol developed by Cisco for collecting and reporting IP traffic information in networks Information is exported on a per-flow basis A flow is defined by the following 7-tuple: Source IP address Destination IP address Source L4 port Destination L4 port IP protocol Input interface IP ToS 3

4 NetFlow operation Illustration from «Introduction to Cisco IOS Flexible NetFlow», Technology White Paper. Cisco Systems Inc., 28. 4

5 Scenario Subnet e Netflow measurement point... e en R R2 Subnet n IP network with tree topology Router R connected to n subnets through links e,, e n R also connected to router R 2 NetFlow agent configured in R 2 for reporting incoming and outgoing traffic from R 5

6 Bandwidth Estimation Problem Subnet e Netflow measurement point... e en R R2 Subnet n During a specific time interval (t, t 2 ) we want to estimate the average downlink bandwidth of traffic over links e to e n Based on the NetFlow measurements in R 2 Without any packet injection 6

7 Proposed Solution: Notation Subnet X (f) +X (nf) Netflow measurement point... U+X (nf) Xn (f) +Xn (nf) Un+Xn (nf) R X (f) + +Xn (f) U+ +Un R2 Subnet n X (f) i : Portion of downlink traffic over link e i that is forwarded from R 2 X (nf) i : Portion of downlink traffic over link e i not forwarded from R 2 U i : Portion of uplink traffic over link e i that is forwarded to R 2 X (nf) i : Portion of uplink traffic over link e i not forwarded to R 2 7

8 Proposed Solution: Assumptions. For each link e i the uplink traffic is directly proportional to the downlink traffic, with proportionality constant λ i e.g. U + X (nf) = λ (X (f) + X (nf) ) 2. The uplink traffic X i (nf) is distributed as downlink traffic in the remaining subnets, in a per-link proportion w k,i ϵ (,) e.g. X (nf) = w 2, X 2 (nf) + + w n, X n (nf) 8

9 Proposed Solution With the previous asumptions, we can derive the vectorial relation X (nf) = (W Λ) - Λ X (f) (W Λ) - U W ij = w j,i, W ii = X (nf) = A X (f) B U Λ ii = λ i Using linear regression it is possible to obtain estimates of the matrices A and B A combination of SNMP polling and NetFlow records can be using for the training period After the training period, only NetFlow records are required By knowing the traffic X (f) and X (nf), the downlink bandwidth can be finally estimated as the average over a desired interval 9

10 Study of the uplink/downlink ratio from real traces Anonymized dataset from real traces Nearly MM NetFlow records collected during a 3-hours window at an aggregation point No information was provided about the topology of the network Only the top 5 sender and top 5 receiver subnetworks were considered for the analysis For each considered subnetwork: Records were grouped in -minutes intervals Partial Uplink/Downlink ratio U i / X i (f) was computed for each interval, based on total bytes count per interval

11 Top 5 Sender Subnetworks # Anonymized Subnet (/6) Total Sent (MB) Total Received (MB)

12 Top 5 Receiver Subnetworks # Anonymized Subnet (/6) Total Sent (MB) Total Received (MB)

13 (Sent bytes)/(received bytes) Normalized (Sent bytes)/(received bytes) Partial ratio for top 5 senders (using time intervals of minutes) Top 5 Sender subnetworks Top 5 Sender subnetworks 3

14 (Sent bytes)/(received bytes) Normalized (Sent bytes)/(received bytes) Partial ratio for top 5 receivers (using time intervals of minutes) Top 5 Receiver subnetworks Top 5 Receiver subnetworks Is it possible to bound the expected mean partial ratio? Yes, at least if the values are normally distributed 4

15 Q-Q analysis: Top 5 senders 7 6 Subnet 5 Subnet Subnet Subnet Subnet Subnet Subnet 7.5 Subnet Subnet Subnet Subnet 5 Subnet 2 Subnet 3.4 Subnet 4 6 Subnet x-axes: Normal quantiles y-axes: Partial rate values 5

16 Q-Q analysis: Top 5 receivers Subnet Subnet 2.5 Subnet Subnet Subnet Subnet Subnet Subnet Subnet Subnet Subnet.2 Subnet 2.2 Subnet 3 3 Subnet 4 4 Subnet x-axes: Normal quantiles y-axes: Partial rate values 6

17 Hypothesis tests for normality: Top 5 sender subnetworks Subnet Lilliefors Anderson- Darling D Agostino- Pearson Yes Yes Yes 2 No No Yes 3 No No No 4 No No Yes 5 Yes Yes Yes 6 Yes Yes Yes 7 No No No 8 No No Yes 9 Yes Yes No No No No No No Yes 2 No No No 3 Yes Yes Yes 4 Yes Yes Yes 5 No No Yes 7

18 Hypothesis tests for normality: Top 5 receiver subnetworks Subnet Lilliefors Anderson- Darling D Agostino- Pearson No No No 2 No No Yes 3 No No Yes 4 Yes Yes Yes 5 Yes Yes Yes 6 Yes Yes Yes 7 No No No 8 No No Yes 9 Yes Yes Yes Yes Yes Yes No No No 2 Yes Yes Yes 3 No No Yes 4 Yes Yes Yes 5 Yes Yes Yes 8

19 Normalized C.I. Normalized C.I. Confidence interval for mean partial ratio (α =.5) Top 5 Sender subnetworks Top 5 Receiver subnetworks For most subnetworks, the expected mean partial ratio varies less than 2% around the sample average Hence, the first assumption seems reasonable if the total ratio behaves like the partial ratio.5 9

20 Future (pending) Work Experimental setup to validate the proposed technique Real topology v/s simulations Extension to Sampled NetFlow Effect of packet sampling in the accuracy of the estimates 2

21 NetFlow-based bandwidth estimation in IP networks Rodrigo Alarcón-Reyes Department of Electrical and Computer Engineering McGill University March 3, 22

Covert channel detection using flow-data

Covert channel detection using flow-data Covert channel detection using flow-data Guido Pineda Reyes MSc. Systems and Networking Engineering University of Amsterdam July 3, 2014 Guido Pineda Reyes (UvA) Covert channel detection using flow-data

More information

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore

Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore CCS '08: Proceedings of the 15th ACM conference on Computer and

More information

Network Element Configuration

Network Element Configuration The following describes how to configure Flexible NetFlow and NTP servers on your ISR. Configuring a Network Element, page 1 NTP Configuration, page 1 NetFlow Configuration, page 2 Configuring a Network

More information

Best Practices for Determining the Traffic Matrix in IP Networks

Best Practices for Determining the Traffic Matrix in IP Networks Best Practices for Determining the Traffic Matrix in IP Networks Apricot 2005 - Kyoto, Japan Thursday February 24, 2005 Internet Routing and Backbone Operations Session C5-4 Thomas Telkamp, Cariden Technologies,

More information

Computer Engineering II Exercise Sheet Chapter 2

Computer Engineering II Exercise Sheet Chapter 2 Distributed Computing FS 019 Prof. R. Wattenhofer Computer Engineering II Exercise Sheet Chapter We categorize questions into four different categories: Quiz Short questions which we will solve rather

More information

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network

More information

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?

More information

LAN design. Chapter 1

LAN design. Chapter 1 LAN design Chapter 1 1 Topics Networks and business needs The 3-level hierarchical network design model Including voice and video over IP in the design Devices at each layer of the hierarchy Cisco switches

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, on page 1 Uses for Host, Application, and User Discovery and Identity

More information

NetFlow Monitoring. NetFlow Monitoring

NetFlow Monitoring. NetFlow Monitoring , page 1 NetFlow Limitations, page 2 Creating a Flow Record Definition, page 3 Viewing Flow Record Definitions, page 4 Defining the Exporter Profile, page 4 Creating a Flow Collector, page 5 Creating a

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity

More information

Introduction to Routers and LAN Switches

Introduction to Routers and LAN Switches Introduction to Routers and LAN Switches Session 3048_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Prerequisites OSI Model Networking Fundamentals 3048_05_2001_c1 2001, Cisco Systems, Inc.

More information

Configuring IGRP. The Cisco IGRP Implementation

Configuring IGRP. The Cisco IGRP Implementation Configuring IGRP This chapter describes how to configure the Interior Gateway Routing Protocol (IGRP). For a complete description of the IGRP commands in this chapter, refer to the IGRP s chapter of the

More information

This chapter provides information to configure Cflowd.

This chapter provides information to configure Cflowd. Cflowd In This Chapter This chapter provides information to configure Cflowd. Topics in this chapter include: Cflowd Overview on page 564 Operation on page 565 Cflowd Filter Matching on page 569 Cflowd

More information

CS118 Discussion, Week 6. Taqi

CS118 Discussion, Week 6. Taqi CS118 Discussion, Week 6 Taqi 1 Outline Network Layer IP NAT DHCP Project 2 spec 2 Network layer: overview Basic functions for network layer Routing Forwarding Connection v.s. connection-less delivery

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

New Directions in Traffic Measurement and Accounting. Need for traffic measurement. Relation to stream databases. Internet backbone monitoring

New Directions in Traffic Measurement and Accounting. Need for traffic measurement. Relation to stream databases. Internet backbone monitoring New Directions in Traffic Measurement and Accounting C. Estan and G. Varghese Presented by Aaditeshwar Seth 1 Need for traffic measurement Internet backbone monitoring Short term Detect DoS attacks Long

More information

Characterization of accuracy problems in NetFlow data and approaches to handle them

Characterization of accuracy problems in NetFlow data and approaches to handle them Characterization of accuracy problems in NetFlow data and approaches to handle them IRTF NMRG / 3rd NetFlow/IPFIX Workshop Jochen Kögel jochen.koegel@ikr.uni-stuttgart.de IETF 78 Maastricht 30 July 2010

More information

CS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m.

CS118 Discussion 1A, Week 6. Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m. CS118 Discussion 1A, Week 6 Zengwen Yuan Dodd Hall 78, Friday 10:00 10:50 a.m. 1 Outline Network Layer Overview: data v.s. control plane IPv4/IPv6, DHCP, NAT Project 2 spec Midterm review 2 Network layer:

More information

Subnetting/Supernetting and Classless Addressing

Subnetting/Supernetting and Classless Addressing Subnetting/Supernetting and Classless Addressing CONTENTS SUBNETTING SUPERNETTING CLASSLESS ADDRSSING SUBNETTING IP addresses are designed with two levels of hierarchy. Figure 5-1 A network with two levels

More information

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections: This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,

More information

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation

More information

Allows IGRP or Enhanced IGRP exterior routes to be advertised in updates.

Allows IGRP or Enhanced IGRP exterior routes to be advertised in updates. IGRP Commands Use the commands in this chapter to configure and monitor Internet Gateway Routing Protocol (IGRP). For IGRP configuration information and examples, refer to the Configuring IGRP chapter

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

Information, Gravity, and Traffic Matrices

Information, Gravity, and Traffic Matrices Information, Gravity, and Traffic Matrices Yin Zhang, Matthew Roughan, Albert Greenberg, Nick Duffield, David Donoho 1 Problem Have link traffic measurements Want to know demands from source to destination

More information

Configuring Banyan VINES

Configuring Banyan VINES Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan

More information

Configuring Devices for Flow Collection

Configuring Devices for Flow Collection This PDF is no longer being maintained. See the SolarWinds Success Center for more information. SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes CS 4: Computer Networks SPRING 004 MIDTERM II May 5, 004 0 minutes Name: Student No: ) a) (8 pts) List the reasons why Internet has a hierarchical routing architecture. (Use at most four sentences) b)

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Configuring sflow. About sflow. sflow Agent

Configuring sflow. About sflow. sflow Agent About sflow This chapter describes how to configure sflow on Cisco NX-OS devices. This chapter includes the following sections: About sflow, on page 1 Licensing Requirements for sflow, on page 2 Prerequisites

More information

Configuring Policy-Based Routing

Configuring Policy-Based Routing 25 CHAPTER This chapter describes the tasks for configuring policy-based routing (PBR) on a router and includes these major sections: Overview of Policy-Based Routing, page 25-1 Policy-Based Routing Configuration

More information

Extracting Performance and Scalability Metrics from TCP. Baron Schwartz April 2012

Extracting Performance and Scalability Metrics from TCP. Baron Schwartz April 2012 Extracting Performance and Scalability Metrics from TCP Baron Schwartz April 2012 Agenda Fundamental Metrics of Performance Capturing TCP Data Part 1: Black-Box Performance Analysis Detecting Stalls and

More information

HD NVR NIC Teaming Overview. Avigilon HD NVR HD-NVR3-PRM

HD NVR NIC Teaming Overview. Avigilon HD NVR HD-NVR3-PRM HD NVR NIC Teaming Overview Avigilon HD NVR HD-NVR3-PRM 2016, Avigilon Corporation. All rights reserved. AVIGILON and the AVIGILON logo are trademarks of Avigilon Corporation. Other product names mentioned

More information

Advanced Application Reporting USER GUIDE

Advanced Application Reporting USER GUIDE Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Domain Based Approach for QoS Provisioning in Mobile IP

Domain Based Approach for QoS Provisioning in Mobile IP Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr

More information

Configuring Policy-Based Routing

Configuring Policy-Based Routing CHAPTER 28 This chapter describes the tasks for configuring policy-based routing (PBR) on a router and includes these major sections: Overview of Policy-Based Routing, page 28-1 Policy-Based Routing Configuration

More information

Traffic Flow Measurements within IP Networks: Requirements, Technologies and Standardization

Traffic Flow Measurements within IP Networks: Requirements, Technologies and Standardization Traffic Flow Measurements within IP Networks: Requirements, Technologies and Standardization Jürgen Quittek NEC Europe Ltd., Network Laboratories, Heidelberg, Germany Tanya Szeby, Georg Carle, Sebastian

More information

Accounting management system enhancement supporting automated monitoring and storing facilities

Accounting management system enhancement supporting automated monitoring and storing facilities Accounting management system enhancement supporting automated monitoring and storing facilities Abstract C. Bouras S. Kastaniotis 1 Computer Engineering and Informatics Department University of Patras,

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Analysys STEM case studies

Analysys STEM case studies Analysys STEM case studies Migrating separate voice and data services to an NGN platform Robin Bailey Head of Decision Systems Group 17 March 2007 Bangkok Convergence is inevitable Voice and data services

More information

Campus Networking Workshop CIS 399. Core Network Design

Campus Networking Workshop CIS 399. Core Network Design Campus Networking Workshop CIS 399 Core Network Design Routing Architectures Where do we route? At the point where we want to limit our layer-2 broadcast domain At your IP subnet boundary We can create

More information

Introduction to OSPF

Introduction to OSPF Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 OSPF Dynamic Routing Protocol Link State technology Runs over IP, protocol 89 Designed by IETF for TCP/IP Supports VLSM

More information

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description vines access-group vines access-group To apply an access list to an interface, use the vines access-group command in interface configuration mode. To remove the access list, use the no form of this command.

More information

CS 268: Lecture 7 (Beyond TCP Congestion Control)

CS 268: Lecture 7 (Beyond TCP Congestion Control) Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer

More information

Netflow v9 for IPv6. Finding Feature Information. Prerequisites for Netflow v9 for IPv6. Information About Netflow v9 for IPv6

Netflow v9 for IPv6. Finding Feature Information. Prerequisites for Netflow v9 for IPv6. Information About Netflow v9 for IPv6 Netflow v9 for IPv6 Last Updated: July 31, 2012 This module contains information about and instructions for configuring NetFlow and NetFlow Data Export (NDE) for capturing and exporting data from IP version

More information

RMON MIB. Presenter: Andreas Pitsillides. Based on presentation by Rouf Boutaba

RMON MIB. Presenter: Andreas Pitsillides. Based on presentation by Rouf Boutaba RMON MIB Presenter: Andreas Pitsillides Based on presentation by Rouf Boutaba 1 The RMON MIB Objectives Introduction Segment Statistics Statistics Other RMON MIB Groups Summary 2 RMON MIB - Objectives

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

IP Multicast Traffic Measurement Method with IPFIX/PSAMP. Atsushi Kobayashi Yutaka Hirokawa Haruhiko Nishida NTT

IP Multicast Traffic Measurement Method with IPFIX/PSAMP. Atsushi Kobayashi Yutaka Hirokawa Haruhiko Nishida NTT IP Multicast Traffic Measurement Method with /PSAMP Atsushi Kobayashi Yutaka Hirokawa Haruhiko Nishida NTT 1 Outline Introduction Motivation Requirements Main requirements for measurement system in largescale

More information

LB-MAP: LOAD-BALANCED MIDDLEBOX ASSIGNMENT IN POLICY-DRIVEN DATA CENTERS

LB-MAP: LOAD-BALANCED MIDDLEBOX ASSIGNMENT IN POLICY-DRIVEN DATA CENTERS LB-MAP: LOAD-BALANCED MIDDLEBOX ASSIGNMENT IN POLICY-DRIVEN DATA CENTERS MANAR ALQARNI DEPARTMENT OF COMPUTER SCIENCE CALIFORNIA STATE UNIVERSITY DOMINGUEZ HILLS 1 INTRODUCTION - Middleboxes network appliances

More information

Point-to-Point Network Switching. Computer Networks Term B10

Point-to-Point Network Switching. Computer Networks Term B10 Point-to-Point Network Switching Computer Networks Term B10 Network Switching Outline Circuit Switching, Message Switching, Packet Switching, Cell Switching Connection-Oriented versus Connectionless Protocols

More information

IP Enhanced IGRP Commands

IP Enhanced IGRP Commands IP Enhanced IGRP Commands Use the commands in this chapter to configure and monitor IP Enhanced IGRP. For configuration information and examples, refer to the Configuring IP Enhanced IGRP chapter of the

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Overview of the NetFlow FlowAnalyzer

Overview of the NetFlow FlowAnalyzer CHAPTER 1 Overview of the NetFlow FlowAnalyzer NetFlow FlowAnalyzer Version 2.0 is a network analysis tool that you can use to display and analyze network traffic information collected from Cisco NetFlow-enabled

More information

TCP Window Estimation for Burst Assembly in OBS Networks

TCP Window Estimation for Burst Assembly in OBS Networks TCP Window Estimation for Burst Assembly in OBS Networks Maurizio Casoni (maurizio.casoni@unimore.it) Department of Information Engineering University of Modena and Reggio Emilia Italy Outline Introduction:

More information

Overview of IPM. What is IPM? CHAPTER

Overview of IPM. What is IPM? CHAPTER CHAPTER 1 This chapter provides an overview of Cisco Internetwork Performance Monitor (IPM) application. It contains the following sections: What is IPM?, page 1-1 Key Terms and Concepts, page 1-3 How

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Why we need to divide network?

Why we need to divide network? Content Introduction Layer 3 IP Protocol IP-Header: www.ietf.org and RFC-760 Addressing Schemes Subnetting Routing Layer 3 Solution in Trains Communication Matrix (Information Based Communication) 53 Why

More information

Flexible NetFlow - Top N Talkers Support

Flexible NetFlow - Top N Talkers Support This document contains information about and instructions for using the Flexible NetFlow - Top N Talkers Support feature. The feature helps you analyze the large amount of data that Flexible NetFlow captures

More information

Measurement: Techniques, Strategies, and Pitfalls. David Andersen CMU

Measurement: Techniques, Strategies, and Pitfalls. David Andersen CMU Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

QoS for Real Time Applications over Next Generation Data Networks

QoS for Real Time Applications over Next Generation Data Networks QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed

More information

Using DNS Service for Amplification Attack

Using DNS Service for Amplification Attack Using DNS Service for Amplification Attack Outline Use DNS service to achieve load balancing for a server cluster Carry out an amplification attack by taking advantage of DNS service Enforce firewall rules

More information

Using Flexible NetFlow Flow Sampling

Using Flexible NetFlow Flow Sampling This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics

More information

Using Flexible NetFlow Flow Sampling

Using Flexible NetFlow Flow Sampling This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics

More information

Detecting and Analyzing Network Threats With NetFlow

Detecting and Analyzing Network Threats With NetFlow Detecting and Analyzing Network Threats With NetFlow This document contains information about and instructions for detecting and analyzing network threats such as denial of service attacks (DoS) through

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations Configuring IP SLAs TCP Connect Operations Finding Feature Information Configuring IP SLAs TCP Connect Operations Last Updated: March 22, 2011 This module describes how to configure an IP Service Level

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

NETWORK TRAFFIC CHARACTERISATION USING FLOW-BASED STATISTICS

NETWORK TRAFFIC CHARACTERISATION USING FLOW-BASED STATISTICS NETWORK TRAFFIC CHARACTERISATION USING FLOW-BASED STATISTICS Wednesday 27 th April, 2016 Petr Velan Jana Medková, Tomáš Jirsík, Pavel Čeleda Introduction We need to be able to describe the network traffic.

More information

Configuring NetFlow and NetFlow Data Export

Configuring NetFlow and NetFlow Data Export This module contains information about and instructions for configuring NetFlow to capture and export network traffic data. NetFlow capture and export are performed independently on each internetworking

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Lecture 10: Addressing

Lecture 10: Addressing Lecture 10: Addressing CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY Lecture 10 Overview ICMP The other network-layer protocol IP Addresses Class-based addressing Subnetting Classless addressing

More information

A Study of Cache-Based IP Flow Switching

A Study of Cache-Based IP Flow Switching University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania

More information

IP Accounting C H A P T E R

IP Accounting C H A P T E R C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Configuring AVC to Monitor MACE Metrics

Configuring AVC to Monitor MACE Metrics This feature is designed to analyze and measure network traffic for WAAS Express. Application Visibility and Control (AVC) provides visibility for various applications and the network to central network

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Packet Doppler: Network Monitoring using Packet Shift Detection

Packet Doppler: Network Monitoring using Packet Shift Detection Packet Doppler: Network Monitoring using Packet Shift Detection Tongqing Qiu, Nan Hua, Jun (Jim) Xu Georgia Tech Jian Ni, Hao Wang, Richard (Yang) Yang Yale University Presenter: Richard Ma December 10th,

More information

Using NetFlow Sampling to Select the Network Traffic to Track

Using NetFlow Sampling to Select the Network Traffic to Track Using NetFlow Sampling to Select the Network Traffic to Track This module contains information about and instructions for selecting the network traffic to track through the use of NetFlow sampling. The

More information

The Power of Slicing in Internet Flow Measurement

The Power of Slicing in Internet Flow Measurement The Power of Slicing in Internet Flow Measurement Ramana Rao Kompella University of California, San Diego ramana@cs.ucsd.edu Cristian Estan University of Wisconsin-Madison estan@cs.wisc.edu Abstract Network

More information

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models Models Motivation Timing Diagrams Metrics Evaluation Techniques TOC Models Motivation Understanding Network Behavior Improving Protocols Verifying Correctness of Implementation Detecting Faults Choosing

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Using NetFlow Sampling to Select the Network Traffic to Track

Using NetFlow Sampling to Select the Network Traffic to Track Using NetFlow Sampling to Select the Network Traffic to Track Last Updated: September 17, 2012 This module contains information about and instructions for selecting the network traffic to track through

More information

NetFlow Configuration Guide

NetFlow Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Domain Based Metering

Domain Based Metering Domain Based Metering Róbert Párhonyi 1 Bert-Jan van Beijnum 1 1 Faculty of Computer Science, University of Twente P.O. Box 217, 7500 AE Enschede, The Netherlands E-mail: {parhonyi, beijnum}@cs.utwente.nl

More information

Configuring NetFlow. Understanding NetFlow CHAPTER

Configuring NetFlow. Understanding NetFlow CHAPTER 50 CHAPTER This chapter describes how to configure NetFlow statistics collection on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter,

More information

ARDA Program: P2INGS (Proactive And Predictive Information Assurance For Next Generation Systems)

ARDA Program: P2INGS (Proactive And Predictive Information Assurance For Next Generation Systems) ARDA Program: P2INGS (Proactive And Predictive Information Assurance For Next Generation Systems) Abhrajit Ghosh Sudha Ramesh Scott Alexander, Giovanni DiCrescenzo PI: Rajesh Talpade CEWAS background DETER

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers

More information

You submitted this homework on Sun 23 Feb :12 PM PST. You got a score of 5.00 out of 5.00.

You submitted this homework on Sun 23 Feb :12 PM PST. You got a score of 5.00 out of 5.00. Feedback Homework 5 Help You submitted this homework on Sun 23 Feb 2014 9:12 PM PST. You got a score of 5.00 out of 5.00. Question 1 Consider the network given. Distance vector routing is used, and the

More information

Evaluation Procedure for MAC Protocols

Evaluation Procedure for MAC Protocols Evaluation Procedure for 802.16 Protocols IEEE 802.16 Presentation Submission Template (Rev. 8) Document Number: IEEE 802.16.1mp-00/16 Date Submitted: 2000-04-25 Source: Hoon Choi, Nader Moayeri Voice:301-975-{8429,

More information