1 Remote Monitoring (RMON) These slides are based in parts upon slides of Prof. Dssouli (Concordia university )

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian
Chapter 19: Network Management Business Data Communications, 5e.
Introduction to Network Analysis and Sniffer Pro
Chapter 19: Network Management Business Data Communications, 4e.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
REMOTE MONITORING RMON1 (RFC DRAFT) TOKEN RING EXTENSIONS TO RMON (RFC PROPOSED) RMON2 (RFC PROPOSED) SMON (RFC PROPOSED) Copyright.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
1 Pertemuan 08 Remote Monitoring Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
1 Jim Binkley Remote Monitoring (RMON) Network Manglement.
Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian
MJ07/07041 Session 07 RMON Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used for Network Management course.
Chapter 8  Remote Monitoring (RMON1) 1 Chapter 8 Overview  RMON1 is a MIB o Also known as RMON  Recall that mib-2 gives info on devices  RMONs provide.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
COMP4690, by Dr Xiaowen Chu, HKBU
NETWORK MANAGEMENT Semester 4, Chapter 7. The Administrative Side of Network Management.
Remote Network Monitoring (RMON)
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Nov 9, 2006 IT 4333, Fall IT 4333 – Network Admin & Management RMON From: Byte Magazine, Javvin.com, Cisco.com, Wikipedia, and IETF.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Chapter 8 RMON - Remote Monitoring Yen-Cheng Chen IM, NCNU June, 2006.
1 Network Management Computer Networks. 2 OSI Network Management Model Performance Management e.g. utilization Fault Management e.g. SNMP traps Configuration.
Chapter 6 Overview Simple Network Management Protocol
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
SNMP ( Simple Network Management Protocol ) based Network Management.
(Remote Network Monitoring)
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Chapter 4: Managing LAN Traffic
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Remote Network Monitoring (RMON) * * Mani Subramanian “Network Management: Principles and practice”, Addison-Wesley, 2000.
Chapter 8 SNMP Management: RMON Network Management: Principles and Practice © Mani Subramanian Chapter 8 SNMP Management: RMON.
1 Kyung Hee University Prof. Choong Seon HONG Remote Network Monitoring statistics Collection.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
POSTECH DP&NM Lab 1 Remote Network Monitoring (RMON)
Chapter 6 – Connectivity Devices
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Chapter 19: Network Management Business Data Communications, 4e.
Remote Monitoring (RMON)
Standards for Network Administration Week-5. Standards for Network Administration 1. Management Information Base A structured database about a network.
Cisco – Semester 4 – Chapter 7
1 Kyung Hee University Prof. Choong Seon HONG Remote Network Monitoring Remote Network Monitoring Alarms and Filters.
SNMP 1. SNMP is an Internet protocol developed by the IETF. It is designed to facilitate the exchange of management information between network elements.
Syslog The purpose of syslog is to write system messages to a log Syslog messages can include everything from critical alarm conditions to ordinary debugging.
Remote Monitoring (RMON) RMON specification is primarily a definition of a MIB RMON specification is primarily a definition of a MIB RFC 1757/2819 Remote.
Remote Monitoring (RMON) RMON specification is primarily a definition of a MIB RFC 1757/2819 Remote network monitoring management information base (RMON)
RMON (alarms and filtering). Alarm group It is used to define a set of threshold for network performance. If a threshold is crossed in the appropriate.
1 Kyung Hee University RMON Overview  RMON MIB specification to include monitoring of protocol traffic above the MAC level  An RMON probe can.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
Remote Monitoring (RMON) RFC 2819 Remote network monitoring management information base (RMONI) RFC 2819 Remote network monitoring management information.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Presented by: Ambily Asha Rashmi Shruthi RMON Remote Monitoring.
Company LOGO RMON By Dr. Shadi Masadeh. Notes RMON Components RMON Probe Data gatherer - a physical device Data analyzer Processor that analyzes data.
Manajemen Jaringan, Sukiswo ST, MT 1 Remote Network Monitoring (RMON) Sukiswo
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
SNMP.
Lec 5: SNMP Network Management
RMON.
Network Management Computer Networks.
Network Administration CNET-443
NETWORK MANAGEMENT Semester 4, Chapter 7.
Remote Monitoring (RMON)
Lec 5: SNMP Network Management
Presentation transcript:

1 Remote Monitoring (RMON) These slides are based in parts upon slides of Prof. Dssouli (Concordia university )

Outline  Basic Concepts o RMON Goals o Control of Remote Monitors o Multiple Managers o Table Management  Statistics group  History group  Host and hostTopN groups  Matrix group  Alarm group  Filter and packet Capture group  RMON2 2

3 Basic Concepts  Remote Network Monitoring (RMON): monitoring the state of a network and its nodes through a remote probe.  Why?  Significantly reduces SNMP traffic due to local polling.  No need for agent to be visible to managers all the time.  Reduces Ping messages.  Continuous monitoring of individual segments  Has been shown to increase productivity for network administrators.  Extends the SNMP functionality without changing the protocol  Defines a Remote MONitoring (RMON) MIB that supplements MIB-II o with MIB-II, the manager can obtain information on individual devices only o with RMON MIB, the manager can obtain information on the LAN as a whole  Components:  Data gatherer (monitor): a physical device  Data analyzer: processor that analyzes data  RMON does both and reports to a manager

Basic Concepts  A monitor generally can produce summary information on o error statistics, e.g., counts # of collisions on a LAN o Performance statistics: #packets delivered per second, packet size distribution, etc.  A monitor also can store packets for later analysis  A Monitor may also filter data to limit the # packets counted or captured o filter based on packet type or characteristics (e.g., packets with certain source address, erroneous packets) 4

Basic Concepts  A Monitor is required per subnetwork o A monitor could either be a standalone device whose only job is monitoring and traffic analysis o or it could also be a device with other functionalities (e.g., router, server)  A monitor usually communicates with one (or more) central MS (Management Station)  RMON essentially is a definition of a MIB o Standard monitoring functions and interfaces for communication between SNMP consoles and remote monitors 5

RMON Goals  Monitoring subnetwork-wide behavior while reducing the burden on agents and managers o Monitors and analyzes locally and relays data o An object may not afford to run SNMP agent  Continuous off-line monitoring in the presence of failures o RMON should collect fault, performance, and configuration information continuously even when it is not being polled  save communication cost o This information may be retrieved later by a manager  Proactive monitoring o Continuously runs diagnostics and log network performance even in the absence of failures o Upon a failure, notify the manager and provide him with useful info to be able to diagnose the fault 6

RMON Goals  Provide value-added data o Perform analysis on collected data, thus relieving the MS from this responsibility o For example, a monitor can analyze subnetwork traffic to determine which hosts generate the most traffic or errors on the subnetwork.  Support multiple managers o Multiple managers improves reliability, provides diversity in network management, etc. o A monitor should be configured to deal with more than a manager simultaneously 7

Network with RMONs Bridge Router FDDI backbone Token Ring LAN Router with RMON probe Management console with RMON probe Central Site Local management console with RMON probe PC with RMON probe PC with RMON probe Ethernet 8

Control of RMON- Configuration  RMON is configured for data collection: o RMON MIB contains a number of functional groups  Each group may contain one or more “control tables” and one or more “data tables” o Control tables (read-write) contain parameters describing data in data tables (read-only)  A NMS sets appropriate control parameters to configure RMON to collect the desired data: m The parameters are set by adding a new row to the “control table” or by modifying an existing row m As information is collected, data is stored in rows of the corresponding “data table” 9

Control of RMON- Configuration  Functions performed by a monitor are defined and implemented in terms of table rows o Control table may contain objects that specify the “source of data” to be collected, the “type of data”, the “collection timing”, etc. o Associated with a single control row are one or more rows in one or more data tables  To modify a particular data collection function: o it is necessary first to invalidate the control row o this causes the deletion of that row and the deletion of all associated rows in data tables o NMS can create a new control row with the modified parameters  NOTE: when a row of a control table is deleted, associated rows in data tables are also deleted. 10

Multiple Managers  RMON probe may be subject to management from multiple MSs  Potential conflict and unwanted results o Simultaneous requests for resources could exceed the capability of the monitor o Monitor resources could be captured by a MS for a long time, preventing other MSs from accessing desired information o Resources could be assigned to a MS that crashes without releasing resources  Avoidance and resolution features are required o Ownership label: identifies the owner of a particular row of the control table and associated function 11

Indicates the status of the row Indicates the owner of a row in control table Table Management  The RMON specification includes a set of textual conventions and procedural rules for row addition and deletion  Textual conventions: 2 new data types OwnerString ::= DisplayString EntryStatus ::= INTEGER { valid (1), createRequest (2), underCreation (3), invalid (4) } 12

Control Table 13

Data Table 14

Control and Data Table- Example 15

Row Addition and deletion  A MS uses SNMP messages to add a row into an RMON table o SetRequest -PDU message will contain a list of object identifiers for all columns in the table  When a monitor receives a request o it must check whether there are any restrictions defined in the RMON MIB (object is not currently supported by the MIB) o or any implementation specific restrictions (e.g., lack of resources)  If row addition is not possible o GetResponse -PDU with badValue error is returned  Multiple managers attempt for row addition o multiple requests to create a row with same parameters, including index parameters  conflict o Conflict arbitration is required oOnly the first request is awarded  Row Deletion o is achieved by (the owner) setting the status object for that row to “invalid”  Row Modification o is achieved by first invalidating the row and then adding the row with new object instance values 16

RMON MIB rmon (mib-2 16) statistics (1) history (2) alarm (3) host (4) hostTopN (5) matrix (6) filter (7) capture (8) event (9) tokenRing (10) Each group is used to store data and statistics derived from data collected by the monitor A monitor may have more than one physical interface and hence may be connected to more than one sub-network 10 groups agent a agent b RMON probe agent c agent e agent d Interface 1 Interface 2 Subnetwork X Subnetwork Y 17

18 RMON MIB Ethernet RMON: (rmon 1 - 9) Token ring extension: (rmon 10) RMON 2: Higher layers (rmon 3 – 7 and rmon ) RFC 1757 (2819) Layer: 2 (Ethernet) RFC 1513 RFC 2021 Layers: 3-7

19 RMON Groups and Functions RMON Probe

20 RMON1 MIB Groups & Tables Ten groups divided into three categories Statistics groups (rmon 1, 2, 4, 5, 6, and 10)) Event reporting groups (rmon 3 and 9) Filter and packet capture groups(romon 7 and 8) Groups with “2” in the name are enhancements with RMON2

21 RMON1 MIB Groups & Tables

22 Control and Data Tables Control table used to set the instances of data rows in the data table. Can be set to gather and store different instances of data. Values of data index and control index are the same. Figure 8.4 Relationship between Control and Data Tables

23 Control Table Values controlIndex – Integer uniquely identifying the row in the control table. controlDataSource – identifies the source of the data being collected. controlTableSize – identifies the entries associated with the data source. controlOwner – entity or person that created the entry. – Can be a management station name, phone number, contact info controlStatus – entry status of textual conversion (valid, createRequest, underCreation, invalid). controlOther – Could be another object

24 Example: Matrix Control and SD Tables Figure 8.4 Relationship between Control and Data Tables

25 The Statistics Group The simplest of the RMON groups. Counters to store number of packets. The etherStatsTable in this group has an entry for each interface. Counts packets with characteristics defined by objects in the etherStatsTable. There are 21 columns in the table, such as: – etherStatsOversizePackets - >1518 octets – etherStatsUndersizePackets - < 64 octets – etherStatsCRCAlignErrors – etherStatsCollision – etherStatsPkts65to127Octests – etherStatsPkts128to255Octests – etherStatsPkts256to511Octests – … Good example of monitoring!

26 etherStatsTable etherStatsEntryetherStatsIndex etherStatsDataSource etherStatsDropEvents etherStatsOctets etherStatsPkts etherStatsBroadcastPkts etherStatsMulticastPkts etherStatsCRCAlignErrors etherStatsUndersizePkts etherStatsOversizePkts etherStatsFragments etherStatsJabbers etherStatsCollisions etherStatsPkts64Octets etherStatsPkts65to127Octets etherStatsPkts128to255Octets etherStatsPkts256to511Octets etherStatsPkts512to1023Octets etherStatsPkts1024to1518Octets etherStatsOwner etherStatsStatus statistics rmon 1 ifIndex.1.

27 History Group Enables the network manager to build a record of what is happening in the network over time. Two tables: historyControltable (7 columns) allows for the settings: – Data source historyControlDataSource – sampling intervals historyControlInterval – Number of sampling intervals historyContolBuckets etherHistoryTable (15 columns) allows for Ethernetspecificsettings – how many Ethernet packets were sampled in the interval time.

28 etherHistoryTable etherHistoryEntryetherHistoryIndexetherHistorySampleIndex etherHistoryIntervalStart etherHistoryDropEvents etherHistoryOctets etherHistoryPkts etherHistoryBroadcastPkts etherHistoryMulticastPkts etherHistoryCRCAlignErrors etherHistoryUndersizePkts etherHistoryOversizePkts etherHistoryFragments etherHistoryJabbers etherHistoryCollisions etherHistoryUtilization historyControlTable historyControlEntryhistoryControlIndex historyControlDataSource historyControlBucketsRequested historyControlBucketsGranted historyControlInterval historyControlOwner historyControlStatus history  rmon 2

29 historyControlTable historyControlEntryhistoryControlIndex historyControlDataSource historyControlBucketsRequested historyControlBucketsGranted historyControlInterval historyControlOwner historyControlStatus

30

31 Host Group Identifies traffic statistics with the host that is detected on the subnet. –This group makes a connection between the host and the traffic. – We can ask a question like “Why is host A transmitting more packets than host B?” Three tables: hostControlTable (6 columns), records the number of hosts that have transmitted or received frames in the subnet. hostTable (10 columns), the actual data – For each interface specified in hostControlTable, hostTable contains one row for each MAC address on that interface. – instance identifier for the hostAddress object: hostTimeTable (10 columns) information stored based on time, not MAC – Has the exact same information as hostTable, except it is index by creation order, not MAC address

32 hosts hostControlTable hostControlEntryhostControlIndex hostControlDataSource hostControlTableSize hostControlLastDeleteTime hostControlOwner hostControlStatus hostTable hostEntryhostAddress hostCreationOrderhostIndex hostInPkts hostOutPkts hostInOctets hostOutOctets hostOutErrors hostOutBroadcastPkts hostOutMulticastPkts hostTimeTable hostTimeEntry hostTimeAddresshostTimeCreationOrderhostTimeIndex hostTimeInPkts hostTimeOutPkts hostTimeInOctets hostTimeOutOctets hostTimeOutErrors hostTimeOutBroadcastPkts hostTimeOutMulticastPkts   rmon 4

33 hostTopN hostTopNControlTable hostTopNControlEntryhostTopNControlIndex hostTopNHostIndex hostTopNRateBase hostTopNTimeRemaining hostTopNDuration hostTopNRequestedSize hostTopNGrantedSize hostTopNStartTime hostTopNOwner hostTopNStatus hostTopNTable hostTopNEntryhostTopNReporthostTopNIndex hostTopNAddress hostTopNRate  rmon 5 hostTopNInPkts(1), hostTopNOutPkts(2), hostTopNInOctets(3), hostTopNOutOctets(4), hostTopNOutErrors(5), hostTopNOutBroadcastPkts(6), hostTopNOutMulticastPkts(7) *

34 Host Top N Group Example

35 Matrix Group This allows us to determine the source and destination of a communication. Adds another dimension to network management in that we will know which communications are causing the most traffic, not just which hosts. This is done using 3 tables: – matrixControlTable – matrixSDTable Indexed by matricSDIndex, then by source address, then by destination address – matricDSTable Indexed by matricDSIndex, then by destination address, then by source address

36 matrix matrixControlTable matrixControlEntrymatrixControlIndex matrixControlDataSource matrixControlTableSize matrixControlLastDeleteTime matrixControlOwner matrixControlStatus matrixSDTable matrixSDEntrymatrixSDSourceAddressmatrixSDDestAddressmatrixSDIndex matrixSDPkts matrixSDOctets matrixSDErrors matrixDSTable matrixDSEntrymatrixDSSourceAddressmatrixDSDestAddressmatrixDSIndex matrixDSPkts matrixDSOctets matrixDSErrors   rmon 6

37 matrixSDTable Example

alarm Group  Measuring network performance consists of identifying abnormal conditions by the monitor and issuing alarms accordingly: o e.g., if there are more than 200 CRC errors (the threshold) in any 5- minute period (the sampling interval), an alarm is generated and sent to the central console.  Alarm group contains a single table alarmTable, each entry: oa variable to be monitored ( alarmVariable ) oINTEGER, counter, gauge, TimeTicks oA sampling interval ( alarmInterval ) omost recent sampled value ( alarmValue ) oThreshold parameters oalarmRisingThreshold, and alarmFallingThreshold o alarmStartupAlarm o1 (risingAlarm), 2 (fallingAlarm), 3 (risingOrFallingAlarm) oalarm is generated when a row becomes active and 1 st sampled value  risingThreshold, or  fallingThreshold or both 38

alarm Group Mode of operation:  Rising threshold (RT) and Falling threshold (FT) are defined  RT is crossed when current sampled value is greater than RT and value of last sampling interval was less than threshold  FT is crossed when current sampled value is less than FT and value of last sampling interval was greater than threshold  absoluteValue and deltaValue (difference of 2 successive intervals). Counter  use deltaValue Fluctuations not counted! Avoid generating excessive alarms Time Sampled Object value Rising threshold Falling threshold 39

40 Filter Group Filter group used to capture packets defined by logical expressions Channel is a stream of data captured based on a logical expression Filter table allows packets to be filtered with an arbitrary filter expression A row in the channel table associated with multiple rows in the filter table rmon 7

Filter Group  Observing only “selected packets” on a particular interface  Data filter oScreen observed packets based on a bit pattern that a portion of the packet matches (or fails to match)  Status filter oScreen observed packets based on their status (e.g., valid, CRC errors, etc.)  Example: screen those packets on some interface with certain source MAC address  Both filters can be combined (e.g., using logical AND and OR) to form a complex test to be applied to incoming packets  The stream of packets that pass the test is referred ot as the channel  The channel can be configured to generate some events when a packet passes through the channel 41

Filter Group  Filter Logic: Define the following variables input = the incoming portion of the a packet to be filtered filterPktData = the bit pattern to be tested for filterPktDataMask = the relevant bits to be tested for filterPktDataNotMask = indication of whether to test for a match or mismatch To test the input against a bit pattern for a match (e.g., screen packets with a specific source address) If ((input XOR filterPktData) = = 0) filterResult = match 42

Bitwise XOR filterPktData filterPktDataMask Bitwise AND filterPktDataNotMask Bitwise NOT Bitwise AND Input Packet filterPktDataOffset Pass if all bits are 0 (pass if match) Pass if any bits are 1 (pass if mismatch)

Filter Example filterPktDataOffset=0 filterPktData=0x A BB filterPktDataMask=0xFFFFFFFFFFFFFFFFFFFFFFF filterPktDataNotMask=0x FFFFFFFFFFF Accept all Ethernet packets that have a destination address of 0xA5 and that do not have a source address of 0xBB.

Filter Group  A channel is defined by a set of filters  A channel is associated with an object “ channelAcceptType ” which determines when a packet is accepted to the channel (when there is a match or mismatch)  When a packet goes through a channel, a counter is incremented; an event may be generated in some circumstances, given that this channel has registered to generate events (event group)  The filter group has two tables: Filter Table and Channel Table 45

46 Filter Group

47 filter filterTable filterEntryfilterIndex filterChannelIndex filterPktDataOffset filterPktData filterPktDataMask filterPktDataNotMask filterPktStatus filterPktStatusMask filterPktStatusNotMask filterOwner filterStatus channelTable channelEntrychannelIndex channelIfIndex channelAcceptType channelDataControl channelTurnOnEventIndex channelTurnOffEventIndex channelEventIndex channelEventStatus channelMatches channelDescription channelOwner channelStatus acceptMatched(1), acceptFailed(2) On(1) Off(2) eventReady(1), eventFired(2), eventAlwaysReady(3)

Capture Groups  The monitor may capture packets that pass through the filter or simply record statistics based on such packets  Two tables: bufferControlTable and captureBufferTable capture Group 48

Capture Group Capture Buffer Table (One entry per Channel) Filter Table (many for each channel) Channel Table

event Group  Supports definition of events (problems, symptoms of problems) oAn event is triggered by a condition located elsewhere in the MIB oE.g., monitoring a variable that crossed a rising threshold would cause an event to be generated  Controls the generation and notification of events  An event may cause (1) an SNMP trap message to be issued by the monitor, (2) info. to be logged  eventTable :  eventDescritpion: textual description of the event  eventType: none(1), log(2), snmp-trap (3) log-and-trap(4)  log: an entry is added to the logTable for this event  snmp-trap: an SNMP trap is sent to a MS  eventCommunity: identifies the communities of MSs to receive the SNMP trap, etc.  logTable :  logTime: value of sysUpTime when this log entry was created  logDescription: description of the event that activated this entry (implementation-dependent)  logEventIndex: identifies the event that generated this log entry 50

51 RMON2 RMON1 dealt primarily with the OSI data link layer. RMON2 is applicable to layers 3 and above: network to application layer. – Good for determining bandwidth use by applications. Functions are similar to RMON1. Nine more groups are added to RMON1. Enhancement to RMON1 Defined conformance and compliance.

52 RMON2 MIB Table 8.4 RMON2 MIB Groups and Tables

53 A Case Study A study at Georgia Tech on Internet traffic Objectives – Traffic growth and trend – Traffic patterns Network comprising Ethernet and FDDI LANs Tools used – HP Netmetrix protocol analyzer – Special high-speed TCP dump tool for FDDI LAN RMON groups utilized – Host top-n – Matrix group – Filter group – Packet capture group (for application level protocols)

54 Case Study Results

55 Case Study Results Traffic Pattern