Trends in Network and Service Monitoring

Slides:



Advertisements
Similar presentations
Connect communicate collaborate A Network Management Architecture proposal for the GEANT-NREN environment Pavle Vuletić, Afrodite Sevasti TNC 2010, ,
Advertisements

Tellabs Internal and Confidential Implementing Soak Testing for an Access Network Solution Presented by: Timo Karttunen Supervisor: Raimo Kantola.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Documenting the Existing Network - Starting Points IACT 418 IACT 918 Corporate Network Planning.
Ethernet Demarcation Devices
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
Jung SooSung Vice President KT ICOM September 27 th, 2001.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
AIMS’99 Workshop Heidelberg, May 1999 Ko / CP 4/99 Linkage between Internet Service Architectures and ATM
A Combat Support Agency Defense Information Systems Agency DISN NetOps Service Assurance 2011 Customer Conference August 2011.
Prof. N. P. Pathak - Dept. of I.T.1 Unit 4 Inventory Management Process OSS Essentials by Kornel Terplan.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 1 - Chapter 26/Cisco 2 - Module 12 Routing Protocols.
- 1 IPv6 Quality of Service Measurement Issues and Solutions Alessandro Bassi Hitachi Europe SAS RIPE 50 meeting Stockholm, 2 nd May 2005.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
1 MPLS: Progress in the IETF Yakov Rekhter
EGEE-II INFSO-RI Enabling Grids for E-sciencE End-to-End Service Level Agreement Provisioning and Monitoring for End-to-End QoS.
Congestion Notification Process for Real-Time Traffic draft-babiarz-tsvwg-rtecn-01.txt Jozef Babiarz Kwok Ho Chan Victor Firoiu 60 th IETF, Aug. 5 th,
IETF 62 NSIS WG1 Porgress Report: Metering NSLP (M-NSLP) Georg Carle, Falko Dressler, Changpeng Fan, Ali Fessi, Cornelia Kappler, Andreas Klenk, Juergen.
K. Salah1 Security Protocols in the Internet IPSec.
Automated provisioning of Ethernet OAM in CarrierEthernet networks: the case of GRNET Leonidas Poulopoulos Michalis Mamalis Stauros.
March 22, 2010IETF 77 – Anaheim, USA1 A method for IP multicast performance monitoring draft-cociglio-mboned-multicast-pm-00 Alessandro Capello Luca Castaldelli.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Monitoring network services
Monitoring network services
Enterprise vCPE September 27, 2017.
Network and Service Monitoring
Multi-layer software defined networking in GÉANT
Correlation of Service & Measurement Data
Lec 5: SNMP Network Management
Cisco Unified Communications Management
Tal Mizrahi Marvell IETF Meeting 78, July 2010
Cloud Adoption Framework
Wireless ATM & Congestion Control
Packet PWE3 – Efficient for IP/MPLS
Packet Capture Questions and considerations Henrik Wessing JRA2 Task 4
Living in a Network Centric World
Living in a Network Centric World
Enterprise vCPE use case requirement
Performance Testing Methodology for Cloud Based Applications
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Driving Agility with Automated Service Orchestration
Virtual LANs.
Network Monitoring System
ONAP Amsterdam Architecture
ONOS Drake Release September 2015.
IEEE 802.1Qca Path Control and Reservation
ONUG Open Networking Use Cases
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Authors Mach Chen Andrew G. Malis
Living in a Network Centric World
Exploring the impact of NFV
RKL Remote key loading.
Data collection methodology and NM paradigms
An Update on Multihoming in IPv6 Report on IETF Activity
Living in a Network Centric World
Good Morning 1/17/2019.
Living in a Network Centric World
Living in a Network Centric World
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Introduction to Network Security
Requirements Definition
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
QoS based pricing in IP Networks
Spencer Giacalone, Alia Atlas, John Drake, Dave Ward
ONAP Architecture Principle Review
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Living in a Network Centric World
Presentation transcript:

Trends in Network and Service Monitoring Performance Verification Monitoring Pavle Vuletić (UoB/AMRES) TNC 2018, Trondheim 13.06.2018.

Motivation for the work on the PVM Virtualized infrastructures – multiple user’s/tennant’s traffic is multiplexed over the same physical links: VPNs, but also virtual networks in data centres How to estimate the quality of service/experience of each user separately? Monitoring physical infrastructure is not sufficient and using separate tools for each virtual network is not scalable Various network technologies are used for multiplexing users traffic (different VPN flavours, L2, L3, e- circuits, etc.). Goal: create a single, scalable, vendor independent monitoring platform capable to monitor all these technologies 2

Motivation for the work on the PVM Monitor what matters for the user - emphasis on the role of network service monitoring in the overall network management architecture Automated monitoring upon network service installation integrated with the provisioning: one of the key prerequisites for the autonomic network management loop Fault localization – where is perfomance degradation on the end-to-end path? 3

PVM approach PVM provides: Key performance indicators: real-time feedback to network operations personnel or users, determines whether services are performing to spec (SLA verification), if not, it initiates an automated analysis to localise the fault, and notify the appropriate agent to take corrective action. Key performance indicators: MEF (10.3) and ITU defined metrics: delay, jitter, loss, availability, etc. Getting the metrics – hybrid approach (RFC 7799). Key components: Monitoring Controller Multihomed Monitoring Agents Monitoring Result Repository and portal (Capturers and Correlators for fault localization) 3 modes of operation: active – end-to-end, active+fault localization, full traffic analysis 4

Monitoring controller Workflow integrated with the rest of the OSS/BSS Architecture (Mode 1) Alarm/ticket NetMon Other OSS/BSS Test request Monitoring controller Result repository/ portal SPA Info request Service inventory Service info Service 1 Service 2

TMF Service inventory API TMF Trouble ticket API Monitoring @100G Compatibility and technology TMF Service Test API TMF Service inventory API TMF Trouble ticket API Monitoring @100G Integrate proven solutions: Active probing - modified Component configuration Inter-component communication Result database Result display

Monitoring controller

Network setup for the demo 8

Result repository

Fault localization (Mode 2 and 3) It is necessary to get the information from the intermediate points in the network Similar approaches: Single technology (CFM) or vendor/proprietary solutions Concept of the monitoring zone Flow Broker IETF RFC 8321 (Jan 2018) – Alternate marking (requires changes in the network elements) NetMon approach Specially crafted OWAMP packets (serviceID) Captured at various points in the network Matched based on the packet hash and service ID Packet digest sent to the Correlator and from there to the Result reposirory owping -s 30 -x 04000064AC100016 192.168.100.2:8765 Image taken from: Ericsson Diamond: https://pdfs.semanticscholar.org/0119/099638d68a0836d55d7de0dfc00891571876.pdf 10

Fault localization R1 R2 R3 MCorr PC1 PC2 PC3 CPE2 CPE4 MA2 MA4 Service ID Timestamp Hash (Pkt ID) MCorr PC1 PC2 PC3 CPE2 CPE4 R1 R2 R3 MA2 MA4 Owamp SID 11

The protocol stack Between MX routers (PODs): CCC L2VPN Between VMX: native IP, L2VPN, L3VPN Total on the wire: 12

Per-span monitoring

pavle.vuletic (at) amres.ac.rs pavle.vuletic (at) etf.bg.ac.rs