A Practical Evaluation Method of Network Traffic Load for Capacity Planning

Similar documents
Tacked Link List - An Improved Linked List for Advance Resource Reservation

Fault-Tolerant Storage Servers for the Databases of Redundant Web Servers in a Computing Grid

Change Detection System for the Maintenance of Automated Testing

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

Representation of Finite Games as Network Congestion Games

How to simulate a volume-controlled flooding with mathematical morphology operators?

BoxPlot++ Zeina Azmeh, Fady Hamoui, Marianne Huchard. To cite this version: HAL Id: lirmm

The New Territory of Lightweight Security in a Cloud Computing Environment

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment

Hardware Acceleration for Measurements in 100 Gb/s Networks

Structuring the First Steps of Requirements Elicitation

An FCA Framework for Knowledge Discovery in SPARQL Query Answers

Quality of Service Enhancement by Using an Integer Bloom Filter Based Data Deduplication Mechanism in the Cloud Storage Environment

Setup of epiphytic assistance systems with SEPIA

Every 3-connected, essentially 11-connected line graph is hamiltonian

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme

Assisted Policy Management for SPARQL Endpoints Access Control

Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function

UsiXML Extension for Awareness Support

Comparator: A Tool for Quantifying Behavioural Compatibility

Multimedia CTI Services for Telecommunication Systems

DANCer: Dynamic Attributed Network with Community Structure Generator

Teaching Encapsulation and Modularity in Object-Oriented Languages with Access Graphs

A New Method for Mining High Average Utility Itemsets

Taking Benefit from the User Density in Large Cities for Delivering SMS

Blind Browsing on Hand-Held Devices: Touching the Web... to Understand it Better

Traffic Grooming in Bidirectional WDM Ring Networks

Robust IP and UDP-lite header recovery for packetized multimedia transmission

Service Reconfiguration in the DANAH Assistive System

Relabeling nodes according to the structure of the graph

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks

Prototype Selection Methods for On-line HWR

Scalewelis: a Scalable Query-based Faceted Search System on Top of SPARQL Endpoints

Reverse-engineering of UML 2.0 Sequence Diagrams from Execution Traces

Study on Feebly Open Set with Respect to an Ideal Topological Spaces

Kernel-Based Laplacian Smoothing Method for 3D Mesh Denoising

Application of RMAN Backup Technology in the Agricultural Products Wholesale Market System

Recommendation-Based Trust Model in P2P Network Environment

A 64-Kbytes ITTAGE indirect branch predictor

MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor

Open Digital Forms. Hiep Le, Thomas Rebele, Fabian Suchanek. HAL Id: hal

ASAP.V2 and ASAP.V3: Sequential optimization of an Algorithm Selector and a Scheduler

Linked data from your pocket: The Android RDFContentProvider

THE COVERING OF ANCHORED RECTANGLES UP TO FIVE POINTS

Lossless and Lossy Minimal Redundancy Pyramidal Decomposition for Scalable Image Compression Technique

FIT IoT-LAB: The Largest IoT Open Experimental Testbed

Malware models for network and service management

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal

Search-Based Testing for Embedded Telecom Software with Complex Input Structures

Very Tight Coupling between LTE and WiFi: a Practical Analysis

Multi-atlas labeling with population-specific template and non-local patch-based label fusion

Application of Artificial Neural Network to Predict Static Loads on an Aircraft Rib

Efficient implementation of interval matrix multiplication

Mokka, main guidelines and future

The optimal routing of augmented cubes.

A Voronoi-Based Hybrid Meshing Method

Modularity for Java and How OSGi Can Help

An Experimental Assessment of the 2D Visibility Complex

Natural Language Based User Interface for On-Demand Service Composition

The Connectivity Order of Links

Moveability and Collision Analysis for Fully-Parallel Manipulators

YANG-Based Configuration Modeling - The SecSIP IPS Case Study

Generic Design Space Exploration for Reconfigurable Architectures

Comparison of spatial indexes

Simulations of VANET Scenarios with OPNET and SUMO

Generative Programming from a Domain-Specific Language Viewpoint

Real-Time Collision Detection for Dynamic Virtual Environments

Sliding HyperLogLog: Estimating cardinality in a data stream

Kernel perfect and critical kernel imperfect digraphs structure

Computing and maximizing the exact reliability of wireless backhaul networks

Branch-and-price algorithms for the Bi-Objective Vehicle Routing Problem with Time Windows

Regularization parameter estimation for non-negative hyperspectral image deconvolution:supplementary material

KeyGlasses : Semi-transparent keys to optimize text input on virtual keyboard

Linux: Understanding Process-Level Power Consumption

Zigbee Wireless Sensor Network Nodes Deployment Strategy for Digital Agricultural Data Acquisition

Experimental Evaluation of an IEC Station Bus Communication Reliability

QAKiS: an Open Domain QA System based on Relational Patterns

Application-Aware Protection in DWDM Optical Networks

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

Efficient Gradient Method for Locally Optimizing the Periodic/Aperiodic Ambiguity Function

Acyclic Coloring of Graphs of Maximum Degree

Catalogue of architectural patterns characterized by constraint components, Version 1.0

X-Kaapi C programming interface

Database Scheme Configuration for a Product Line of MPC-TOOLS

HySCaS: Hybrid Stereoscopic Calibration Software

lambda-min Decoding Algorithm of Regular and Irregular LDPC Codes

A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP

QuickRanking: Fast Algorithm For Sorting And Ranking Data

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Fuzzy sensor for the perception of colour

Caching strategies based on popularity prediction in content delivery networks

Type Feedback for Bytecode Interpreters

Syrtis: New Perspectives for Semantic Web Adoption

Monitoring Air Quality in Korea s Metropolises on Ultra-High Resolution Wall-Sized Displays

The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging

YAM++ : A multi-strategy based approach for Ontology matching task

A case-based reasoning approach for unknown class invoice processing

From Object-Oriented Programming to Service-Oriented Computing: How to Improve Interoperability by Preserving Subtyping

Cloud My Task - A Peer-to-Peer Distributed Python Script Execution Service

From Microsoft Word 2003 to Microsoft Word 2007: Design Heuristics, Design Flaws and Lessons Learnt

Transcription:

A Practical Evaluation Method of Network Traffic Load for Capacity Planning Takeshi Kitahara, Shuichi Nawata, Masaki Suzuki, Norihiro Fukumoto, Shigehiro Ano To cite this version: Takeshi Kitahara, Shuichi Nawata, Masaki Suzuki, Norihiro Fukumoto, Shigehiro Ano. A Practical Evaluation Method of Network Traffic Load for Capacity Planning. Khaled El-Fakih; Gerassimos Barlas; Nina Yevtushenko. 27th IFIP International Conference on Testing Software and Systems (ICTSS), Nov 2015, Sharjah and Dubai, United Arab Emirates. Lecture Notes in Computer Science, LNCS-9447, pp.263-268, 2015, Testing Software and Systems. <10.1007/978-3-319-25945-1_18>. <hal-01470153> HAL Id: hal-01470153 https://hal.inria.fr/hal-01470153 Submitted on 17 Feb 2017 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Distributed under a Creative Commons Attribution 4.0 International License

A Practical Evaluation Method of Network Traffic Load for Capacity Planning Takeshi KITAHARA, Shuichi NAWATA, Masaki SUZUKI, Norihiro FUKUMOTO and Shigehiro ANO KDDI R&D Laboratories Inc. 2-1-15 Ohara, Fujimino-shi, Saitama, Japan kitahara@kddilabs.jp Abstract. Communications network operators are supposed to provide high quality network service at low cost. Operators always monitor the amount of traffic and decide equipment investment when the amount exceeds a certain threshold considering trade-offs between link capacity and its utilization. To find the proper threshold efficiently, this paper proposes a practical threshold definition method which consists of fine grained data collection and computer simulation. We evaluate the proposed method using commercial traffic data-set. The results show the proper timing for the equipment investment. Keywords: capacity planning, traffic monitoring, traffic load testing, queuing simulation 1 Introduction The largest mission for communications network operator is to provide highquality network service at low cost, but there always exists trade-off between quality and cost. To ensure quality of network service, it is crucial to keep traffic load of the link below a certain threshold level and to upgrade the link capacity immediately after the load exceeds the threshold. From the viewpoint of the capital expenditure, on the other hand, this threshold value should be set to high so that traffic can be accommodated into the link as much as possible. Thus finding the appropriate threshold value is the main effort for capacity planning. Traffic load is typically observed with a monitoring tool such as MRTG[1] (Multi Router Traffic Grapher) in terms of average volume during several minutes, because watching traffic load with finer granularity requires computing resources. Considering practical use, the threshold mentioned above should be represented as the ratio of average traffic volume in minutes to the original link capacity. For example, the threshold would be 80% if five-minute average of 800Mbit/s is the maximum load for a certain GbE (Gigabit Ethernet) link so as not to degrade quality. However, averaging through minutes masks information about burstiness of traffic on each link. In the case of bursty traffic where the difference between the instantaneous peak and severadfa, p. 1, 2011. Springer-Verlag Berlin Heidelberg 2011

al-minute average is large, probability of packet loss would be high compared to the case of traffic where such the difference is small even though average loads in minutes are equivalent. Thus capacity for links with bursty traffic should be upgraded earlier than links with not-bursty traffic. A lot of past work addressed characterizing traffic burstiness[2-6], but there are no generalized models which can be applied to individual network operating and/or planning task because network structure, network usage, and applications on network are quite diverse nowadays. For the purpose of obtaining an appropriate threshold of upgrading capacity for each link, we propose a practical method to evaluate traffic load considering its burstiness while satisfying the target level of packet loss ratio. Furthermore, we also evaluate this method using commercial traffic data-set in an operator's network. 2 Proposed method There are two challenges to be addressed in this study. One is to comprehend the burstiness about the traffic on the target link and the other is to calculate the threshold for upgrading capacity considering burstiness. Thus the proposed method consists of 1) collecting data about inter-packet arrival time and packet size for several minutes on the target link and 2) evaluating the burstiness of the collected data and to calculate the threshold value using computer simulation. 1) Data collection Burstiness of traffic cannot be estimated from five-minute average load where operators usually observe. To show that, we select four data-sets which were observed at two different points and on two different dates. Fig. 1 shows the data-sets. They are hereinafter referred to as Data 1, Data 2, Data 3 and Data 4. All data-sets describe traffic load on Link A or Link B in terms of bit/s for five minutes. Note that X-axes of all figures indicate 0 to 300 seconds. Each of Link A and Link B belongs to different commercial network. Traffic load during five minutes of Data 1 and Data 3 are nearly equal to that of Data 2 and Data 4, respectively. The normalized five-minute volumes of Data 1 through Data 4 are 1.003, 1.000, 1.210 and 1.223, respectively. Note that Y- axes of all figures are in the same scale. We also show three kinds of granularity of each data-set, which are one-millisecond, one-second and five-minutes. For evaluation of burstiness, the proposed method obtains packet-by-packet data. Note that this is only for deciding the threshold and observing fine grained data is not required for daily operation. 2) Computer simulation The simulation solves the least required link capacity under the given conditions regarding target packet loss ratio and buffer size when traffic pattern is provided as input. The input data in this study is time-series data describing a pair of inter-arrival time and length of each packet, which are extracted from Data 1 through Data 4. The size of each input data for the simulation ranges from around 70 Mbytes to 130 Mbytes. The least required capacity corresponds to the value of the threshold dis-

cussed so far. The notations of R, B, X, m and p are output rate from the queue, buffer size, input traffic to the queue, input mean rate to the queue and target packet loss ratio, respectively. In the simulation, an event will be processed each time the packet #n (n = 1,,N) arrives at the queue. Note that X consists of N packets. We define t n, l n and Q[n] as the time when the packet #n arrives, the length of the packet #n and the queue length at the time t n, respectively. Fig. 2 represents the relationship among the notations. Data 1 (Link A) Data 2 (Link B) Data 3 (Link A) Data 4 (Link B) Fig. 1. Traffic volume during five minutes Input process: X Input mean rate: m Queue length:q[n] Output rate: R Target loss ratio: p Buffer size: B Fig. 2. Notations of the simulation.

Queue length B Q[n-1] R.(t n -t n-1 ) Packet #(n+1) is dropped. l n R.(t n+1 -t n ) Q[n] l n+1 Q[n+1] t n-1 t n t n+1 Time Fig. 3. Example of simulation process. According to Eq. (1), Q[n] will be updated each time n is increased, which means a packet arrives at the queue. This process will continue until n reaches N. Q tmp = Q[n 1] R (t n t n 1 ) (n = 1,2,, N) Q[n] = Q tmp + l n (if Q tmp + l n < B) Q tmp (otherwise) N loss = N loss (if Q tmp + l n < B) N loss + 1 (otherwise) (1) where N loss describes the number of packet losses during the simulation. Fig. 3 shows an example of queuing process. In this example, packet #n enters into the queue but packet #(n+1) is dropped. To calculate the least required capacity meeting the packet loss ratio p, the following steps are performed. Such the capacity is denoted as C opt and we employ a bisection method to find the value of C opt for this study. Step 1 Determine p and B based on the operation policy. Calculate the value of m of a data-set X we focus on. Determine C low and C high for initial values of R. We used C low = m and C high = 10 m as the initial values, respectively. In addition, dc should be determined as the terminal condition. In this simulation, we employ 100 kbit/s as the value of dc. Step 2 Perform the queuing simulation based on Eq. (1) in the both cases of C low and C high. The values of N loss for both cases are obtained through the simulation. Note that the simulation will be terminated, if N loss exceeds p N during the simulation. Step 3 Update C low and C high by using a bisection method [6]. If N loss /N > p, C low is set to (C low + C high )/2. In the same manner, if N loss /N < p, C high is set to (C low + C high )/2. Fig. 4 shows the conceptual diagram of the bisection method for this simulation. Step 4 Repeat Step 3 until C high C low < dc. Then the value obtained is C opt.

Packet loss ratio p C low C opt C high Output rate C low C high C low C high Fig. 4. Bisection method for the simulation. We defineρas m/c opt, which is the key indicator for capacity planning. This is because the value ofρrepresents maximum allowable ratio of traffic load to meet the target quality for the link. 3 Simulation result and discussion Fig. 5 shows the result of the simulation using Data 1 through Data 4. In the simulation, buffer size B for each simulation is set to m multiplied by 1 and 10 milliseconds. This implies that maximum delay of the buffer is around 1 or 10 milliseconds. We observe the significant difference regardingρbetween Data 1 and Data 2 although the values m are nearly equivalent as mentioned before. This is also applied to between Data 3 and Data 4. Since each of Data 1 and Data 3 is bursty compared to each of Data 2 and Data 4 respectively as intuitively confirmed in Fig. 1, the difference ofρis found to depend on the burstiness of the traffic. Furthermoreρ of Data 1 is quite close to that of Data 3 and this relationship is applied to between Data 2 and Data 4. This suggests that the degree of the burstiness should be dependent on the link we observed. In other words, average volume do not have a large impact on the value ofρ. In addition, we confirm the target packet loss ratio has a considerable impact to the value of ρ. This targeting is left to a policy of the trade-off between quality and investment. To make a right decision for operators, the obtained values ofρare quite beneficial. Furthermore, computing time required to obtain the results is important from the practical viewpoint. In this simulation, it takes about 10 to 20 minutes to complete a simulation to obtain one value of ρcorresponding to one point in Fig. 5. There are not purely theoretical methods to calculate the value of ρ, becauseρis determined by quite many factors. The possible factors affectingρare the number of nodes where the traffic goes through, services and applications generating traffic, customers where the network is targeted for, and so on. This paper, however, does not focus on these factors because these factors themselves are not so important from the viewpoint of practical capacity planning. The largest interest for practitioners is when do I need to increase the capacity?. The answer is when the observed mean rate reaches original link capacity C multiplied byρ. Since the mean rate is able to be

predicted using conventional techniques of time-series analysis, the appropriate timing for enhancement of capacity can be easily estimated. If a practitioner collects some datasets on a certain link and calculates ρ corresponding to each dataset, the lowest value of ρ should be applied to the link against the unexpected excessive load while it depends on operator s policy. Note that we assume that the value ofρof the future, which is the time when total traffic volume increases, should not be significantly changed. Fig. 5 supports this assumption. 4 Conclusion While research related to burstiness of traffic have been studied in these twenty years, network operators might still rely on their experienced knowledge. Since real traffic is quite diverse, there are no generalized models which can apply to all kinds of traffic. Thus we were eager to fill the gap between research and practice. This paper proposed a practical evaluation method for network capacity planning. We applied the proposed method to commercial traffic data which were observed at two different points and on two different dates. Since the proposed method is quite specific and concrete, network operators can easily apply this method to their work. We believe the contribution of this paper helps them to improve quality of their work. rho ρ 1 0.8 0.6 Buffer: 10ms 0.4 Data 1 0.2 Data 2 Data 3 Data 4 0 10-6 10-5 10-4 10-3 10-2 Target Packet Loss Rate (a) Buffer size is 10ms 0 10-6 10-5 10-4 10-3 10-2 Target Packet Loss Rate (b) Buffer size is 1ms. Fig. 5. Simulation results regarding maximum allowable ratio of traffic load ρ. References 1. Shipway, S.: Using MRTG with RRDtool and Routers2, Cheshire Cat Computing (2010) 2. Leland, W.E., et al.: On the self-similar nature of Ethernet traffic (extended version). In: IEEE/ACM Trans. on Networking, Vol. 2, No. 1. (1994) 3. Taqqu, M.S., et al.: Proof of a fundamental result in self-similar traffic modeling. In: ACM SIGCOMM Computer Communication Review, Vol. 27, No. 2. (1997) 4. Erramilli, A., et al.: Experimental Queuing Analysis with Long-Range Dependent Packet Traffic. In: IEEE/ACM Trans. on Networking, Vol. 4, No. 2. (1996) 5. Kandula, S., et al.: The nature of data center traffic: measurements & analysis. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC'09). (2009) 6. Benson, T., et al.: Understanding data center traffic characteristic. In: ACM SIGCOMM Computer Communication Review, Vol. 40, No. 1. (2010) 7. Burden, R.L., Faires, J.D.: 2.1 The Bisection Algorithm. In: Numerical Analysis (3rd ed.), PWS Publishers (1985) rho ρ 1 0.8 0.6 0.4 0.2 Buffer: 1ms Data 1 Data 2 Data 3 Data 4