1 Pieter Meulenhoff KPN Research ROOT2002 I-Mode Performance Monitoring Use of ROOT in telecommunications at KPN Pieter Meulenhoff.

Slides:



Advertisements
Similar presentations
1 The ns-2 Network Simulator H Plan: –Discuss discrete-event network simulation –Discuss ns-2 simulator in particular –Demonstration and examples: u Download,
Advertisements

ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Implementing a Highly Available Network
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
Network Monitoring: A Practical Approach Philip Smith/IT Services University of Windsor March 21, 2003.
I-mode Revolutionary Wireless Internet Technology Marc Lisevich Bryan Kwan Jay Hoang.
CM2502 E-Business Mobile Services. Desktop restrictions Mobile technologies Bluetooth WAP Summary.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Introduction An introduction to the equipment and organization of the Internet Lab.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
IT 210 The Internet & World Wide Web introduction.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Ch 13. Wireless Management and Support Myungchul Kim
IOS110 Introduction to Operating Systems using Windows Session 9 1.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Enabling Embedded Systems to access Internet Resources.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
COMT 429 The Internet Protocols COMT 429. History 1969First version of a 4 node store and forward network, the ARPAnet 1972Formal demonstration of ARPAnet.
General Packet Radio Service
Honeypot and Intrusion Detection System
K. Liu, Q. Huang, J. Xia, Z. Li, P. Lostritto, Chapter 4 How to use cloud computing?, In Spatial Cloud Computing: a practical approach, edited by.
Chapter 5 Transport layer With special emphasis on Transmission Control Protocol (TCP)
1 Version 3.0 Module 11 TCP Application and Transport.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Linux Networking and Security
Wireless Application Protocol. WAP- Wireless Application Protocol Gateway WAP WEB Server Content Browser HTTP IPWAP Deck WML.
1 Seminar Presentation On I-mode – The Wireless Revolution Seminar Presentation On I-mode – The Wireless Revolution Under the guidance of Mr B.S. Chordia.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Management of the LHCb DAQ Network Guoming Liu * †, Niko Neufeld * * CERN, Switzerland † University of Ferrara, Italy.
The Intranet.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Introduction An introduction to the equipment and organization of the Internet Lab.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 1 Essential TCP/IP Network Protocols and.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
COMPUTER NETWORKS Hwajung Lee. Image Source:
1 Building Web-base SIP Analyzer with Ajax Approach Yan-Hsiang Wang & Dr. Quincy Wu National Chi Nan University Graduate Institute of CSIE
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Graciela Perera Introduction Graciela Perera
Lab 2: Packet Capture & Traffic Analysis with Wireshark
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
Revolutionary Wireless Internet Technology
Protocol Application TCP/IP Layer Model
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

1 Pieter Meulenhoff KPN Research ROOT2002 I-Mode Performance Monitoring Use of ROOT in telecommunications at KPN Pieter Meulenhoff and Rob Meijer KPN Research, The Netherlands

2 Pieter Meulenhoff KPN Research ROOT2002 Contents KPN/KPN Research Context I-Mode performance Monitoring ROOT Usage Future developments

3 Pieter Meulenhoff KPN Research ROOT2002 What is KPN (Research) ? Royal Dutch Telecommunications Company KPN Research –R&D organisation of KPN –350 People (average age 29 years) –To become part of TNO, the Netherlands organisation for applied scientific research.

4 Pieter Meulenhoff KPN Research ROOT2002 Standard Telecommuincations Network switch

5 Pieter Meulenhoff KPN Research ROOT2002 Event/Rules: Pick up the phone  … Away from computer  … Slam the door  … No answer  … Internet

6 Pieter Meulenhoff KPN Research ROOT2002 Understanding Large Telco Infrastructures Systems grow complex –Measure what is going on Systems are in a hostile environment –Measure who is doing what from where –Correlation between different layers Data network IP, ICMP Data network IP, ICMP Data network IP, ICMP TCP, UDP HTTP Data network IP Data network IP Data network IP TCP, UDP HTTP Data network IP

7 Pieter Meulenhoff KPN Research ROOT2002 Measuring: Key Performance Indicators (KPI) Webserver Environment Windows Management Instrumentation Agent Extracts KPI’s from server CPU, HTTP Requests, Disk, Memory Storage in tree object Offline analysis Analysis Mediation Web servers Hits / second CPU time

8 Pieter Meulenhoff KPN Research ROOT2002 What is i-mode ? Wireless Internet via Mobile Phone –Web Browsing – Introduced in Japan by NTT DoCoMo in 1999 (now 30 million subscribers) Introduced in Germany, Netherlands, Belgium in 2002 I-mode performance monitoring

9 Pieter Meulenhoff KPN Research ROOT2002 COMMERCIAL BRAKE

10 Pieter Meulenhoff KPN Research ROOT2002 I-Mode Applications Ringtones Images Weather News Stocks Games Maps/Route/Travel Full Internet Access X-Rated Content

11 Pieter Meulenhoff KPN Research ROOT2002 I-Mode Platform Overview I-mode terminal GPRS Network Internet Content Website i-mode Gateway Service Platform What is the enduser experience ?

12 Pieter Meulenhoff KPN Research ROOT2002 I-Mode Management Issues When do we have to upgrade the capacity of our i-mode gateway ? Is a change in quality caused by i-mode service platform, Internet, GPRS network ? What is the quality of our service compared to one day, week, month or year ago ?

13 Pieter Meulenhoff KPN Research ROOT2002 GPRS Network I-Mode is based on the GPRS Network Faster data transfer Packet Switched Network –Mobile phone ‘has’ IP-Number –Always on –‘You only pay for data transferred’

14 Pieter Meulenhoff KPN Research ROOT2002 ROOT MLPA I-mode terminal GPRS Network Internet Content Website i-mode Gateway Service Platform Network Analyzer

15 Pieter Meulenhoff KPN Research ROOT2002 MLPA Multi Layer Packet Analysis Capturing and Storage of: –timestamped TCP/IP Headers –timestamped HTTP Headers Correlating TCP/IP and HTTP –HTTP ‘transactions’ Calculation of –‘End-to-End’ response times Responsetime as experienced by user –HTTP arrival rates –tcp/ip quality –...

16 Pieter Meulenhoff KPN Research ROOT2002 Time Network Analyzer User initiated URL request Received URL i-mode Gateway SP orCP Request response time ~Server side RTT ~GPRS RTT ~Set-up TCP set-up delay Time Network Analyzer User initiated URL request Received URL i-mode Gateway SP orCP Request response time ~Server side RTT ~GPRS RTT ~Set-up TCP set-up delay Correlating TCP/IP and HTTP Traffic

17 Pieter Meulenhoff KPN Research ROOT2002 Technical MLPA details: Software 1. Packet Analyzer –Save time-stamped TCP/IP and HTTP Header information 2. Packet Correlator –Calculate TCP/IP to HTTP Correlation TCP Connections HTTP Transactions 3. Analysis modules HTTP request arrival rates HTTP response throughput End-to-end HTTP response time (time-plots, distributions, statistics) TCP statistics –Retransmissions, fragmentation, connection setup time 4. Presentation Module –Convert analysis results to html format –… (presentation to other output formats/databases/…)

18 Pieter Meulenhoff KPN Research ROOT2002 Standard MLPA monitoring & analysis process TCPPacket Object stored in TTreeTCPConnection and HTTPTransaction object stored in TTree Standard ROOT Histograms and Profiles SLA monitoring ROOT Scripts

19 Pieter Meulenhoff KPN Research ROOT2002 Real-time MLPA analysis process Packet Analyzer Packet Correlator Analysis Module Alarm / Event! (Network Management System) Realtime Event Based Operation Network Management

20 Pieter Meulenhoff KPN Research ROOT2002 Implementation Installation –Attached to ‘monitoring port’ of incoming/outgoing router (G i interface between GGSN and i-mode gateway). Software –Database, Object I/O: ROOT ( –Network Analyzer: Libpcap (ethereal, tcpdump) –Graphics conversion: Imagemagick –Administration: ssh Supported operating systems –Unix based (Linux, Solaris) –W2K Security options –TCP/IP anonimisation –HTTP header cleanup (XID,Cookies,Content,Form Variables)

21 Pieter Meulenhoff KPN Research ROOT2002 Demonstration

22 Pieter Meulenhoff KPN Research ROOT2002 ROOT Rapid Development through scripts Trees, Histograms, Profiles No modelling/simulation (outside root)

23 Pieter Meulenhoff KPN Research ROOT2002 Results & Future Work Performance Improvements –Detection of bugs in TCP stack software –Comparison between different terminals (speed) –Network optimisation –Future versions of platform/terminals –Many more Introduction in operational environment –Realtime alarm generation –Connection to network management software SNMP, SOAP,... –Stabillity

24 Pieter Meulenhoff KPN Research ROOT2002

25 Pieter Meulenhoff KPN Research ROOT2002

26 Pieter Meulenhoff KPN Research ROOT2002

27 Pieter Meulenhoff KPN Research ROOT2002