Vitina, 13-14 March, 2008 1RURAL WINGS IP Network usage analysis WP7.3 Results of the usability tests and recommendations Patricia INIGO (Astrium)

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Chapter 19: Network Management Business Data Communications, 5e.
Web Visualization Technology Horner APG Ver 1.0.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Chapter 19: Network Management Business Data Communications, 4e.
Performance Analysis of Orb Rabin Karki and Thangam V. Seenivasan 1.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
1 Enabling Secure Internet Access with ISA Server.
Net Optics Confidential and Proprietary Net Optics Launches Spyke Intelligent Access and Monitoring Architecture Solutions.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
1. 2 How do I verify that my plant network is OK? Manually: Watch link lights and traffic indicators… Electronically: Purchase a SNMP management software.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Data Communications and Networks
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Firewall Typical Networking and Troubleshooting Common Faults.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Jamel Callands Austin Chaet Carson Gallimore.  Downloading  Recommended Specifications  Features  Reporting and Monitoring  Questions.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Protocols and the TCP/IP Suite
Vantage Report 3.0 Product Sales Guide
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Brussels, 18 th March, RURAL WINGS IP Network traffic and reliability evaluation for the Rural Wings project Final Test Runs results - D7.6 - Patricia.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
MOME MOME: An advanced measurement meta-repository IPS-MoMe Workshop, Warsaw, Poland March 14, 2005 Felix Strohmeier Authors:
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
Toward Generic Systems Shifra Haar - Central Bureau of Statistics-Israel.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Broadband Access Solutions via Satellite Sergey Eleferov Russian Satellite Communications Company Satellite Communications Centre “DUBNA”
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
- EADS Astrium Proprietary & Confidential EADS Astrium Proprietary & Confidential - 05/07/2006, Rhodes Rural Wings Ariane Muller & Laurent Thomasson.
HP Openview NNM: Scalability and Distribution. Reference  “HP Openview NNM: A Guide to Scalability and Distribution”,
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
Ch 2. Application Layer Myungchul Kim
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
© Airspan Networks Inc. Automatic QoS Testing over IEEE Standard.
Chapter 19: Network Management
CONNECTING TO THE INTERNET
The Development Process of Web Applications
Overview – SOE PatchTT November 2015.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
PRESENTATION ON Sky X TECH. SUBMETTED TO:- SUBMETTED BY:-
Client-Server Computing
Chapter 3: Windows7 Part 4.
ECE 4450:427/527 - Computer Networks Spring 2017
Nettest An implementation of BEREC’s recommendations
An Introduction to Computer Networking
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Vitina, March, RURAL WINGS IP Network usage analysis WP7.3 Results of the usability tests and recommendations Patricia INIGO (Astrium)

Vitina, March, RURAL WINGS IP Network usage & reliability monitoring system  Network activity monitored at hub level using SSPs monitoring tools.  Key achievement of RP2: implementation and validation (through the First Test Run periods) of a homogeneous Network Usage monitoring system and procedures for the 3 RW SSPs (Avanti, Hellas Sat and TTSA) coordinated by Astrium.  Steps:  Metrics identification  Graphs definition  Procedures and deadlines  Platform implementation / adaptation  First Analysis of results  Recommendations for next periods

Vitina, March, RURAL WINGS IP Metrics identification  Network usage metrics: In & Out (typical Internet traffic asymmetry)  Traffic volume: total consumed bandwidth  Applications & Protocols: volume distribution between different applications  Data rate: instant measure of the throughput  System reliability indicators:  Time evolution of anomalies  Mechanism of incidents notification  Concerned network segment and equipment  Type of incident  Solution applied  Intervention  Resolution time

Vitina, March, RURAL WINGS IP Graphs definition (1/2)  Raw data collected continuously  Simple treatment to obtain synthesis graphs and charts  Network usage graphs (Monthly basis)  1A Traffic volume per site  2A Global traffic volume per month  3A Detailed IN traffic volume per month  4A Detailed OUT traffic volume per month  5A Inbound Protocols distribution per site  6A Outbound Protocols distribution per site  7A Inbound protocol distribution per month  8A Outbound protocol distribution per month  9A Average IN Data rate per site and per month  10A Average OUT Data rate per site and per month  11A Histogram of sites average data rate

Vitina, March, RURAL WINGS IP Network usage graphs (1/2) Pilot Site

Vitina, March, RURAL WINGS IP Network usage graphs (2/2) Pilot Site

Vitina, March, RURAL WINGS IP Graphs definition (2/2)  Reliability graphs (three-monthly basis)  1B Evolution of anomalies  2B Distribution of incidents per current status  3B Distribution of incidents per type of notification  4B Anomaly reports per involved segment  5B Distribution of incidents per equipment  6B Distribution of anomalies per type of failure  7B Distribution of incidents per downtime  8B Distribution of anomalies per type of intervention  9B Distribution of incidents per participant  10B Distribution of incidents per type of solution applied  Based on agreed Anomaly Reports Ticket

Vitina, March, RURAL WINGS IP Reliability graphs

Vitina, March, RURAL WINGS IP Avanti Traffic Monitoring Platform  Main tool: Allot NetEnforcer/NetXplorer  Bandwidth management: rules  Network performance statistics: dedicated software, export to statistical package  Most common statistics: BW, hosts, pipes, protocols  Raw data: .csv  Macros  Pivot tables  Agreed format

Vitina, March, RURAL WINGS IP TTSA Traffic Monitoring Platform  Main tool: Allot NetEnforcer(Turin Hub)/NetXplorer(Secure Hosting Platform in Paris)  Architecture  Traffic curves made available to users (NCs) via MedSky client application.

Vitina, March, RURAL WINGS IP Hellas Sat Traffic Monitoring Platform  Main tool: Packeteer Packet Shaper 1700  Max BW: 45 Mbps  Configuration:  In & Out traffic detection  1 group per RW Pilot site based on IP addressing detection  Raw data: .csv files directly stored to database connected to Packeteer device

Vitina, March, RURAL WINGS IP First Test Run results – Traffic volume  Monitored period: Dec 07–Jan 08  Increase in the RW Pilot sites activity  RW usages evolving and Internet access usage increasing  Download (In) >> Upload (Out)  Top sites per SSPs: Dezna (TTSA) – 80.3 GB/362.5 GB Cilcennin (Avanti) – 25.9 GB/3.2 GB Parakentro (Hellas Sat) – 13.3 GB / 0.4 GB (Janv08)

Vitina, March, RURAL WINGS IP First Test Run results – Protocols  « All other » category: protocols not included in previous categories. Usually corresponds to P2P  Important presence of « All other » category in RW pilot sites.  P2P control policy implemented?  TTSA included QoS rule for this type of protocols in Dec, decrease in P2P volume detected in Jan.  Important volume of http:  Intensive web browsing  http downloads  P2P using port 80  To be followed closely

Vitina, March, RURAL WINGS IP First Test Run results - Anomalies  Registered Anomalies:  Avanti (Dec 07- Jan08): 7  Hellas Sat (Dec06-Jan 08): 9  TTSA: 0 (?)  Notified through SSPs Help Desk  Avanti: hub platform migration  Sat modem distant reconfiguration required (< 1 day)  Hellas Sat:  ODU on site intervention (5-10 days)  Sat modem remote reconfiguration (< 1 day)

Vitina, March, RURAL WINGS IP Recommendations and Next Steps  RW Monitoring platform: validated!  Improvement on throughput statistics to come  P2P activity to be supervised closely by all SSPs  RW Pilot Sites Maintenance procedures crucial for successful site operation  R oles to be clarified for SSPs, NCs & end-users  Anomaly report to be used also by NCs?  For next periods:  Correlation with the number of end-users per site required (1 user = 1 PC)  Further correlation with NCs and end-user system experience

Vitina, March, RURAL WINGS IP Thank you for your attention.