Traffic Monitoring on CJK-Network

8
Traffic Monitoring on CJK-Network C JK Test-bed C JK Test-bed 16th CJK NGN-WG 2009.7.22-24 TTC Nobuyuki NAKAMURA (Oki Electric Industry Co., Ltd.) [email protected]

description

Traffic Monitoring on CJK-Network. 16th CJK NGN-WG 200 9 . 7.22-24 TTC Nobuyuki NAKAMURA ( Oki Electric Industry Co., Ltd.) [email protected]. Overview. - PowerPoint PPT Presentation

Transcript of Traffic Monitoring on CJK-Network

Page 1: Traffic Monitoring on CJK-Network

Traffic Monitoring on CJK-Network

CJKTest-bed

CJKTest-bed

16th CJK NGN-WG2009.7.22-24

TTCNobuyuki NAKAMURA (Oki Electric Industry Co., Ltd.)

[email protected]

Page 2: Traffic Monitoring on CJK-Network

2

Given the situation of interconnectivity among various NGN networks,MPM will become a very important node for traffic observation.We have been investigating the possibility of analyzing network quality by observing traffic at MPM.

  We will perform monitoring at MPM with the following traffic paths using our monitoring method(see appendix ):・ Traffic Path 1:China/Korea - Japan RTP traffic ・ Traffic Path 2:Japan – China/Korea - Japan RTP loopback traffic

Overview

KoreaMPM

Japan

MPM

MPM

China

Network TAP

Storage

RTCP-XR

Network load

RTCP-XR

Collect RTCP

Correlation Analysis

Page 3: Traffic Monitoring on CJK-Network

3SIP Server

SIP Phone

Traffic Path 1: RTP traffic between China/Korea and Japan

Japan

MPMMPM

Network TAP

Storage

Collect packets

Multi Media session Network 

load

・ We will set up one of terminals in China/Korea NW, and another terminal and SIP server in Japan NW.・ We will analyze the behavior between collected packets on MPM and network load, and feed back this analysis to the Traffic Path 2 experiment with loopback at China/Korea MPM.

Page 4: Traffic Monitoring on CJK-Network

4

Outline of experiments & researches

Detection of the network anomaly through traffic analysis at MPM with the following steps.

#1 Create Network anomaly by intentionally generating instability to wireless link#2 Collect packets capturing data at MPM (Japan)

These packets might contain not only our experiment traffic but also various traffic in CJK testbed.

#3 Extract the packets that relates to network anomaly through our analysis.#4 Detect network anomaly point i.e. instability of wireless link in Japan

- In #3 and #4, we will utilize our analysis method (see appendix) so that we can confirm whether our method is useful or not.

#1 create Instable wireless link

#3#4 detect Instability 

JapanMPMMPM

Network TAP

Storage

#2 Collect packets

Our session

Various CJK trafficChina

Page 5: Traffic Monitoring on CJK-Network

5SIP Server

SIP Phone

Traffic Path 2: Japan-China/Korea-Japan traffic monitoring

PurposeVerification of effective network load or anomaly for Traffic Path 1 experiment

- by testing various network load or anomaly Step#1-#4 will also be performed in this path.

Next planEvaluate on the Japan-China-Korea-Japan triangle path.

Japan

MPMMPM

Network TAP

Storage

Collect packets

Multi Media session

Return point of traffic routes

network load China/Korea

Page 6: Traffic Monitoring on CJK-Network

6

Current progress

Equipment of Japan NWSetup SIP-server and SIP-Phone terminal.Setup and check the VPN connection to Japan NW from experiment room.Traffic monitoring at Japan MPM is operating continuously.

Traffic Path1: China/Korea – Japan traffic pathCheck the connectivity from a terminal at China NW to another terminal and SIP server at Japan NW. (July 20)Step #1 and #2 (scheduled on July 20)

Traffic Path 2: Japan – China/Korea – Japan traffic pathSetup return point of traffic routes at Korea MPM.(Done)Collecting packets. (Done)Step #3 and #4 are executing now.

- We will use this experimental system to experiment about various network anomaly by the improvisation, according to the result of step #3 or #4.

Page 7: Traffic Monitoring on CJK-Network

7

Schedule

’09 3Q ’09 4Q ’10 1Q ’10 2Q

Traffic Monitoring

Research

Traffic Path1(China – Japan )

Traffic Path 2 (Japan – China/Korea – Japan )

Step #3

Step #4

Page 8: Traffic Monitoring on CJK-Network

8

Appendix

   References (for pp.4)- Ikada and Hamaguchi, “Improved Approximate Frequency Counts

Algorithm based on “Lossy Counting””, IEICE Technical Report Vol.107, No.524, pp.43-47, 2008.

- Ikada, Nakamura and Hamaguchi, “Network Traffic Prediction for Network Quality Anomaly Detection by RTP Communication Monitoring”, IEICE Technical Report Vol.109, No.79, pp.67-72, 2009.

- Nakamura, Ikada, “Detection Method for Network Quality Degradation by using Network Characteristics”, IEICE Technical Report Vol.108 No.458, pp.167-172, 2009.

This work is partly supported by the National institute of Information and Communications Technology (NICT).

Thank you for your attention.