Vous êtes sur la page 1sur 0

Project deliverable CELTIC TRAMMS

D4.2 - Broadband bottleneck analysis and capacity planning Public 1 (64)


T TR RA AM MM MS S T TR RA AF FF FI IC C M ME EA AS SU UR RE EM ME EN NT TS S A AN ND D M MO OD DE EL LS S I IN N M MU UL LT TI I- -S SE ER RV VI IC CE E
N NE ET TW WO OR RK KS S













D DE EL LI IV VE ER RA AB BL LE E 4 4. .2 2: : B BR RO OA AD DB BA AN ND D B BO OT TT TL LE EN NE EC CK K A AN NA AL LY YS SI IS S A AN ND D C CA AP PA AC CI IT TY Y
P PL LA AN NN NI IN NG G







Identifier: Deliverable D4.2
Class: Report
Version: V06
Version Date: 24/06/2009
Distribution: Public
Responsible Partner:















Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 2 (64)

T TA AB BL LE E O OF F C CO ON NT TE EN NT TS S
ACRONYMS .................................................................................................................................. 3
1. TESTBEDS FOR BOTTLENECK ANALYSIS DEVELOPMENT: STATE OF THE
ART 8
1.1. NETWORK INFRASTRUCTURE AND AVAILABLE TOOLS................................. 8
1.1.1. Core and transit network capacity planning............................................................................ 8
1.1.2. Access network capacity planning.......................................................................................... 8
1.1.3. Application-layer capacity planning ........................................................................................ 8
1.2. ANALYTICAL TOOLS ................................................................................................. 9
1.2.1. Simulation tools....................................................................................................................... 9
1.2.1.1. MATE (Cariden) ............................................................................................ 9
1.2.1.2. SP Guru Network Planner (OPNET) ....................................................... 13
1.2.1.3. Traffic Explorer (Packet Design) .............................................................. 17
1.2.1.4. Design Expert (Netformx).......................................................................... 21
1.2.1.5. IP/MPLSView (Wandl) ............................................................................... 23
1.2.1.6. NetScope (TurboSoft) ................................................................................ 25
1.2.2. Emulation tools ..................................................................................................................... 28
1.2.2.1. Network emulation...................................................................................... 28
1.2.2.1.1. GEM (Spirent)............................................................................................. 28
1.2.2.1.2. Shunra Virtual Enterprise (Shunra)......................................................... 32
1.2.2.2. Access Network emulation........................................................................ 37
1.2.2.2.1. DSL (Spirent) .............................................................................................. 37
1.2.2.3. Application-level traffic emulation ............................................................ 41
1.2.2.3.1. Avalanche (Spirent) .................................................................................. 41
1.2.2.3.2. Network Tester (Agilent) ........................................................................... 47
2. TRAMMMS Testbed for bottleneck analysis: Experimental set up................................. 52
2.1. Network setup and requirements for experimental work.............................................. 52
2.1.1. Testbeds for simulated traffic analysis ................................................................................. 52
2.1.2. Testbeds for field traffic analysis .......................................................................................... 54
2.2. Tools developed for TRAMMS .................................................................................... 56
2.2.1. Netauditor ............................................................................................................................. 56
2.2.2. BGP probe ............................................................................................................................ 58
2.2.3. One Way Delay measurements based on GPS synchronization......................................... 60
2.2.4. Bandwidth Available in Real Time (BART) ........................................................................... 61





Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 3 (64)
ACRONYMS

ADSL Asymmetric Digital Subscriber Line
API Application Programming Interface
AS Autonomous System
ATM Asynchronous Transfer Mode
BER Bit Error Rate
BGP Border Gateway Protocol
BPON Broadband Passive Optical Network
CCC Circuit Cross Connect
CIDR Classless Inter-Domain Routing
CIFS Common Internet File System
CoS Class of Service
CPD Customer Premises Equipment
CRC Cyclic Redundancy Check
CRM Customer Relationship Management
CSPF Constrained Shortest Path First
CSV Certified Server Validation
DDoS Distributed Denial of Service
DHCP Dynamic Host Configuration Protocol
Diffserv Differentiated Services
DSCP Differentiated Services Code Point
DSL Digital Subscriber Line
DUT Device Under Test
ECMP Equal-Cost Multi-Path
EIGRP Enhanced Interior Gateway Routing Protocol
EPON Ethernet Passive Optical Network
ERP Enterprise Resource Planning
FPGA Field Programmable Gate Array
FRR Fast ReRoute
FTP File Transfer Protocol
GbE Gigabit Ethernet
Gbps Gigabit per second
GFP Generic Framing Procedure
GPON Gigabit Passive Optical Network
GUI Graphical User Interface
HPC High Performance Computing
HSRP Hot Standby Router Protocol
HTML HyperText Markup Language
HTTP HyperText Transfer Protocol
HTTP HyperText Transfer Protocol
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 4 (64)
HTTPS HyperText Transfer Protocol Secure
ICMP Internet Control Message Protocol
IDS / IPS Intrusion Detection System / Intrusion Prevention System
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IGRP Interior Gateway Routing Protocol
ILM Interim Local Management
IM Instant Messaging
IP Internet Protocol
IPSec Internet Protocol Security
IPTV Internet Protocol Television
IPv4, IPv6 Internet Protocol version 4, and 6 respectively
IS-IS Intermediate System to Intermediate System
iWARP Internet Wide Arear RDMA Protocol
LAN Local Area Network
LCAS Link Capacity Adjustment Scheme
LDP Label Distribution Protocol
LLQ Low Latency Queuing
LSP Label Switched Path
MAC Media Access Control
Mbps Megabit per second
MDI Media Delivery Index
MGCP Media Gateway Control Protocol
MNS Microsoft Network System
MOS Mean Opinion Score
MPEG Moving Picture Experts Group
MPLS MultiProtocol Label Switching
NFS Network File System
NNTP Network News Transfer Protocol
OSI Open System Interconnection
OSPF Open Shortest Path First
OSPF-TE Open Shortest Path First Traffic Engineering
OTN Optical Transport Network
P2P Peer-to-Peer
PCAP Packet CAPture
PIM-DM Protocol Independent Multicast Dense Mode
PIM-SM Protocol Independent Multicast Sparce Mode
PIM-SSM Protocol Independent Multicast Source Specific Multicast
PNNI Private Network-to-Network Interface
PON Passive Optical Network
POP3 Post Office Protocol version 3
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 5 (64)
PVP Permanent Virtual Path
QoS Quality of Service
RIP Routing Information Protocol
RIPng Routing Information Protocol next generation
RSVP Resource ReSerVation Protocol
RTP Real-time Transport Protocol
RTSP Real-time Streaming Protocol
SDH Synchronous Digital Hierarchy
SFP Small Form Factor Pluggable
SHDSL Single-pair High-speed Digital Subscriber Line
SIP Session Initiation Protocol
SLA Service Level Agreement
SNMP Simple Network Management Protocol
SOA Service Oriented Application
SOAP Simple Object Access Protocol
SONET Synchronous Optical Network
SPF Shortest Path First
SPT Shortest Path Tree
SRLG Shared-Risk Link Group
SSH Secure SHell
SSL Secure Socket Layer
STP Spanning Tree Protocol
TCL Tool Command Language
TCP Transmission Control Protocol
TDM Time-Division Multiplexing
TLS Transparent LAN Services
ToS Type of Service
UDP User Datagram Protocol
URL Uniform Resource Locator
VDSL Very high bit-rate Digital Subscriber Line
VCAT Virtual conCATenation
VLAN Virtual Local Area Network
VNC Virtual Network Computing
VNE Virtual Network Environment
VNN Virtual Network Navigator
VoD Video on Demand
VoIP Voice on IP
VPL Virtual Private LAN
VPLS Virtual Private LAN Service
VPN Virtual Private Network
VRRP Virtual Router Redundancy Protocol
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 6 (64)
WAN Wide Area Network
WFQ Weighted Fair Queuing
XFP 10 Gigabit Small Form Factor Pluggable
XML Extensive Markup Language

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 7 (64)

E EX XE EC CU UT TI IV VE E S SU UM MM MA AR RY Y

Capacity planning is the science of estimating the resources of a network (space,
computer hardware, software and connection infrastructure resources) that will be needed over
some future period of time. A typical capacity concern is whether resources will be able to
handle an increasing number of requests as either the number of users or interactions increase
or if the infrastructure is able to cope with the requirements in terms of packet-loss, latency and
jitter of the services (VoIP, IPTV, etc.) traversing it. Capacity planning tools help users meet the
anticipated need for adding new capacity just-in-time to avoid having unused resources for long
periods of time and/or for QoS network policies redefinition in order to guarantee network SLAs
in parallel with traffic growth and new services deployment. Having a look at the importance of
the capacity planning tools, this documents analyses in depth the behavior of these tools
divided into different groups:
Simulation tools
Emulation tools
o Network emulation
o Access network emulation
o Application-level traffic emulation

Moreover, the document describes the testbeds for bottleneck analysis showing the
difference between testbeds for simulated traffic analysis and testbeds for field traffic analysis.

And finally, the document details the fundamental aspects of the tools developed for
TRAMMS:
Netauditor
BGP probe
One Way Delay measurements based on GPS synchronization
Bandwidth Available in Real Time (BART)













Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 8 (64)
1. TESTBEDS FOR BOTTLENECK ANALYSIS DEVELOPMENT:
STATE OF THE ART
1.1. NETWORK INFRASTRUCTURE AND AVAILABLE TOOLS

Capacity planning is the science of estimating the resources of a network (space,
computer hardware, software and connection infrastructure resources) that will be needed
over some future period of time. A typical capacity concern is whether resources will be able
to handle an increasing number of requests as either the number of users or interactions
increase or if the infrastructure is able to cope with the requirements in terms of packet-loss,
latency and jitter of the services (VoIP, IPTV, etc.) traversing it. Capacity planning tools help
users meet the anticipated need for adding new capacity just-in-time to avoid having unused
resources for long periods of time and/or for QoS network policies redefinition in order to
guarantee network SLAs in parallel with traffic growth and new services deployment.

The capacity planning can be separated into three main groups:
1.1.1. Core and transit network capacity planning

The core and transit capacity planning focuses on the lower layers (1-3) of the OSI
model applied to the core and transit networks. These tools allow the definition of scenarios
based on different topologies, routing protocols configurations, load level of the links, protection
strategies, etc.

In order to perform these analyses, two different types of tools can be considered. The
first ones, the simulation tools, allow the collection of the actual network information and
import of the data to the tool. This way, the collected information can be used as a starting point
to perform different simulations. Using these type of tools, users can come up with a plan for
handling different what if scenarios, changing the parameters of diverse protocols, QoS
policies configuration, simulating the failure of a link or node, etc. These applications contribute
to optimize core and transit network design to address per CoS SLA guarantee in terms of
availability, packet-loss, latency, jitter, etc., both under normal circumstances and after a
network failure.

On the other hand, network emulation tools also work on lower OSI layers, allowing
the emulation of diverse impairments (latency, jitter, packet loss) that can be present in a
network. This way, users are able to verify the behaviour of any service traversing the emulated
network, which could recreate a real-world network where the service will be deployed.

1.1.2. Access network capacity planning

Conversely to core and network capacity planning tools, there are no specific access
network simulation tools that recreate the behaviour of a GPON FTTH network or DOCSIS
based cable network, for instance. In the access network, the focus is on network emulation
tools that exclusively work on the physical layer (the first layer of the OSI model) of point to
point access network like xDSL networks (VDSL2, ADSL2+, etc.). These tools emulate
impairments related to copper lines, such as crosstalk or white noise. No network emulation
tools have been developed for multiaccess access networks like Wimax, DOCSIS, GPON, etc.

1.1.3. Application-layer capacity planning

Application-level capacity planning takes into account the higher layers (4-7) of the
OSI model, so traffic will be analyzed up to the application level. The tools that perform this type
of analysis allow the user to perform simulations recreating different application traffic such as
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 9 (64)
real-time voice, video, data, P2P traffic, DDoS atacks, etc., in order to asses how a network or
device is able to handle different applications under different load scenarios.

The deep packet inspection, as a technology that is able to inspect and take actions
based on the content of the packet (up to the application level) can be used to predict and solve
bottleneck issues. For example, it may be possible to predict the type and amount of traffic
within a small period of time and correlate the traffic conditions with the bottlenecks of the
network. The subscriber and aggregated traffic are been currently studied in the Work Package
3 of this project, monitoring the traffic with the Packet Logic system from Procera Networks.
PacketLogic is a state-of-the-art deep packet inspection (DPI) solution that offers an extensive
feature-richness in the software modules LiveView, Filtering, Traffic Shaping, Statistics and
WebStatistics. Procera, Narus, and Ellacoya are front-runners in development of this
technology, having placed equipment throughout the world.

On the other hand, the increasing threats such as viruses, worms and spyware that can
overload a network and cause bottlenecks can be detected using deep packet inspection.

1.2. ANALYTICAL TOOLS
1.2.1. Simulation tools
1.2.1.1. MATE (Cariden)
The MATE framework, inside Caridens capacity planning and traffic engineering
products, provides a process for gathering and accessing data, visualizing the network,
demand estimation, interacting with simulations and optimizations, and creating reports and
action plans.

Packages and modules:
MATE is packaged into network-specific packages with specialized modules:
The IGP Simulation Package
The IGP Metric Optimization Package
The MPLS Simulation Package
The Explicit Routing Optimization Package
The Demand Deduction Module
The BGP Simulation Module
The Capacity Analysis Module
The Network Interface

Features:
Data collection / exportation
MATE Network Interface enables to gather network topology information. Netflow
collectors (e.g. Arbor, Adlex) can be used to build the traffic matrices.

User Interface
MATE offers a graphical view of network topology and traffic. It allows an interactive
design work. Through the graphical view of the tool, the user can change the topology of the
network and the link properties.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 10 (64)
The tool provides topology views and near real-time traffic reports that can be
accessed via web browser.

Figure 1: MATEs user interface.

Analysis and simulation
Caridens MATE is a capacity planning tool useful to determine capacity bottlenecks,
explore what-if scenarios, evaluate additional links and nodes, analyze layer 1 vs. layer 3
protection, determine whether peering links are sufficient to withstand failures, examine effect
of IGP changes on peer and customer traffic, perform a single-provider multiple-AS analysis
and traffic engineering, determine IGP metrics to balance traffic (evaluating weekly, when
topology changes or after disastrous failures), diagnose severity of failures
Starting with the features of the different modules, the IGP Simulation Package lets the
user perform simulations under normal conditions or under failures (differentiating, if the user
wants, the classes of service). In these simulations, several changes can be made as, for
instance, the failure of single nodes, SRLGs or single circuits. It can also simulate multiple
bandwidth levels fixing, for example, multiple times of day. The IGP used can be either OSPF
or IS-IS. In addition, the tool can be configured to be Diffserv aware, and it also supports
ECMP.
Demands Deduction Module estimates the point-to-point demands between specific
nodes based on link utilization measurements, total node in/out traffic and measured
demands (e.g. Netflow or Juniper DCU).
MATEs Network Interface allows the SNMP access to the network (no router features
or configurations are required). For the network discovery, OSPF and IS-IS routing tables are
used. The process consists of querying routers for more information and taking a snapshot of
the actual traffic levels (including BGP session).
The MPLS Simulation Package simulates MPLS network under normal conditions or
adding different failures (failure sets, bandwidth levels and other parameters can be fixed).
This package supports two versions of MPLS tunnel routing:
Dynamic tunnel routing using CSPF
Explicit tunnel routing using primary, and optionally secondary, paths
Using this package, the user can perform real IP MPLS simulations.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 11 (64)
With the BGP Simulation Module, network nodes may be defined to belong to different
ASes and the IP Simulation tool will simulate BGP routing between these ASes. Collapsed
ASes allow simulation of traffic to and from them with unknown topology (for example, peers,
transit ASes and customers). This modules failover matrices specify explicitly the behaviour
of the traffic failing over between border circuits to or from collapsed ASes, when topology
information is not sufficient for a complete BGP simulation.

The Metric Optimization Package
is based on the traffic engineering for
pure IP networks. This package shows
latency policies and is used to optimize
the metrics for normal or failure
operations. It offers an automated
calculation of IGP metrics to meet
objectives (QoS, latency bounds, etc.).
The aim is to minimize the maximum
worst-case link utilization and/or
minimize the number of links with normal
or failure utilization above a certain
percentage. With a right usage of the
package, SPF metrics can be optimized
within 80-95% of the theoretical
efficiency.
It is also useful in MPLS network to
optimize routing in LDP network and
improve routing in Dynamic/CSPF MPLS
networks.


Figure 2: Metric optimization settings


Figure 3: Worst-case link utilization,
Before optimization (latency based metrics)


After optimization (15 out of 100 metrics changed)
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 12 (64)
The Explicit Routing Optimization Package allows the calculation of MPLS explicit
paths (primary, and optionally, secondary paths). As the previous module, the objective is to
minimize the maximum worst-case link utilization and/or minimize the number of links with
normal or failure utilization above a certain percentage, but unlike the Metric Optimization
Package, it has another objective that is to maximize disjointness with the corresponding
primary path. So, with this package, the explicit routing can be optimized within the 90-95%
of the theoretical efficiency. This application is useful for optimize explicit paths based on
actual IP traffic and routing, not just LSP bandwidths.

The Capacity Analysis Module is
used to calculate optimal, protocol-
independent routing in a network in
normal operations or failure conditions
(including multi-commodity-flow routing).
So the usage of this module turns
around the identification of bottlenecks.
The selection of the network whose
capacities must constrain the network
traffic provides guidance in capacity
planning. It also gives an indication of
how close any given real routing
simulation can approach the maximum
efficiency in the network.

Figure 4: Bottleneck analysis. As the image
shows, links of the net are coloured in a
different ways depending on the usage of
each link.

Reports and alerts
The reporting functionality of the tools collects the information about network general
information (topology, bandwidth and demands summary), usage (simulation summary, and
circuit and interface utilization results in normal and worst cases), demands (demand
statistics including QoS and routing) and tunnels (tunnel statistics of routing, traffic, failures,
etc.). These reports can also be accessed by the web browser showing a general view of
management, operations (monitoring traffic anomalies) and capacity planning (reporting
developing trends).


Figure 5: WAN latency metrics



Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 13 (64)
1.2.1.2. SP Guru Network Planner (OPNET)

OPNET's SP Guru Network Planner is a software product to model Layer 2/3
networks, including routers, switches, firewalls, protocols, and traffic demands. This tool
supports what if analysis such as survivability, capacity planning and traffic engineering.

Packages and modules:
SP Guru Network Planner is an OPNET solution for capacity planning. To
complement the tool, there are some other solutions (independent but with the possibility to
join each other) depending on user needs. Some of the mentioned solutions are listed below:

SP Sentinel SP Sentinel is a software appliance for ensuring network integrity,
security and policy-compliance. It performs systematic configuration audits, analyzing
an up-to-date model of the production network to diagnose device misconfigurations,
policy violations, inefficiencies and security gaps.
SP Guru Transport Planner This tool is a network planning solution that enables
service providers and network equipment manufacturers to design resilient optical and
SDH/SONET networks. It has a multi-layered network presentation, broad technology
support, and cutting edge optimization and design capabilities.
OPNET nCompass for Service Providers This tool provides a graphical
visualization of large, heterogeneous production networks, including devices, their
interconnectivity, traffic and status. nCompass for Service Providers unifies data from a
wide range of network management tools, providing views for navigation and analysis.
nCompass for Service Providerss geographical network dashboard is dynamically
updated with real-time operational information. Third-party tools and programmed
scripts can be launched from its console for deeper drill-down and assisted
troubleshooting.
Features:
Data collection / exportation
SP Guru Network Planner can create a virtual network environment in different ways:
Manual creation
Partial automation
Full automation
The manual creation is useful especially for small scale networks as well as for
incremental changes to topology.
The partial automation imports the data from multiple sources (using eXpress Data
Import, XDI). It constructs the virtual network using the configuration files.
And the last one, the full automation, means that the whole network information can be
collected by the network manager tools (VNE Server, for example, gathers data from a
variety of sources and communicates with SP Guru Network Planner across network) and the
collected information can be imported to the SP Guru Network to Planner.

User Interface
The tool provides a network virtual environment to study the networks behaviour by
means of a graphical view.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 14 (64)

Figure 6: User interface. Network links are
different coloured depending on the usage of the
link and the arrow width of the links are different
depending on the throughput.
The tool shows routes between
selected nodes (graphically represented
by a dotted line) or from one source to all
destination nodes interfaces (including
loopbacks).
It contains several options to
change the view of the virtual network.
The user can hide or show objects of
different types, add background maps
(filling in the information about the
location: latitude and longitude of each
node), visualize the protocol
configuration, visualize IGP metrics (new
in 14.5 version of the tool) or even show
a birds eye viewer.

In connection with the interface, it contains layouts for different working ways: circular,
hierarchical or schematic. It also allows the view of BPG peers, IP interface status, IP routing
domains, IP QoS configuration and IP tunnel configuration.
The tool provides drag and drop approach to build the virtual network.
Moreover, it contains a palette, which is a collection of OPNET objects like nodes,
links, paths or subnets and provides the user the possibility to create them with any
combination of objects (Cisco devices, Ethernet workstations, servers, hubs, switches, links
or a custom-made device).
The opened projects in SP Guru Network Planner can contain one or more scenarios
so the user can compare the results between them.

Analysis and simulation
The objects that are represented in the graphical view have their own attributes. This
attributes define the object and that way, the user can control their behaviour.

Figure 7: The picture contains a node and shows the changes that can be made in that node.
Several values can be manually changed: name, protocol information, security, QoS parameters

To analyse the traffic in the network, the tool identifies device or link load representing
the percentage of capacity being used, shows the flow visualized as a demand objects
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 15 (64)
providing detail performance statistics of delay, end-to-end response time and jitter, and
represents different types of application traffic in specific cases.
The tool allows the selection of the traffic, so that the user can view, organize and
select network objects that have traffic associated. To edit the traffic, the user can select
traffic flows to forecast, roll-up, delete, export traffic or add volume.
The information about the links in the network can be imported from some
management platforms, but the link loads can be set manually too. The tool represents the
utilization of individual links and the values can be represented as traffic levels for each time
period.
The flows in the network can be shown between any source and destination in the
network in bit/sec and packet/sec and it can also contain port, protocol, ToS and SLA
information. Not only unicast but also multicast flows are supported. This data, as the link
data, can be imported from management platforms, but the user can add as well new flows
manually. The traffic demand changes regularly so the tool makes possible to edit its
attributes.
SP Guru derives a traffic matrix based on routing tables, link loads and constrains.
Moreover, the tool allows converting load to flows, something that is useful when only link
loads and flow data is available.
In connection with the network behaviour, it is possible to capture the latency, queue
depth, convergence or protocol effects.
The flow analysis, as the image bellow shows, simulates the routing and forwarding
behaviour of the network. The tool supports IP/MPLS, ATM and Frame Relay networks. This
analysis is useful to study the routing and evaluate changes of routing protocols, perform
capacity planning and traffic trending studies, design resilient networks and analyze the
impact of failures, assess QoS configuration and VoIP readiness, and perform, in general,
traffic engineering studies.


Figure 8: Flow analysis. The colour of each link shows the usage level

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 16 (64)

Figure 9: The user can simulate link
failures and see the consequences in the
network

The user can see the
consequences of a link failure in
the traffic distribution. When
performing a general simulation,
there is a possibility to simulate a
failure of set of devices, links or
shared risk groups. That way, the
user can see how traffic is routed
around failures, the
consequences of failures in the
traffic distribution and which
failure cases cause the most
problems.
The SP Guru Network Planner contains specific actions for different protocols. It offers
the chance to modify and configure different layer protocols as for instance:
IP
o RIP, RIPng, OSPF, IGRP, EIGRP, ISIS, BGP
o Equal-Cost Multi-Path (ECMP)
o IP Multicast
o HSRP
o VRRP
o VLANs
o QoS/Diffserv
MPLS
o RSVP, LDP, OSPF-TE, ISIS-TE, CSPF
o Diffserv Aware Traffic Engineering
o Layer-2 and Layer-3 MPLS VPNs, VPLS
ATM
o Distance Vector, PNNI, VNN
o PVP
Frame Relay

Concerning quality of service, the tool provides a scalable solution for studying QoS. It
has a support for Diffserv traffic and multiple queuing algorithms such as WFQ or LLQ. It also
facilitates VoIP readiness assessment feature, offers the chance to configure packet sizes
and calculates information such as average queue depth and inter-packet delay (jitter).
The traffic load can be imported with a breakdown by traffic class, so the link usages
turn into CoS-based link utilizations and additionally, this load can be converted into class-
based flows.
In connection with the traffic engineering, the tool enables to automate offline MPLS
traffic engineering. It offers a possibility to fix the size of LSPs to optimize LSP routes as well
as change IGP metrics to optimize them. For this last case, the user can fix a maximum
utilization threshold, inspect the current network and that way, finally, find a solution that
satisfies utilization constrains.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 17 (64)
There is another possibility for MPLS traffic engineering called MPLS tactical TE. This
feature brings the chance to make a choice to reroute LSPs and flows from a given link. This
specific LSP route can be selected from a set of candidates (alternative paths) that meet
specific constrains. That way, the congestion on a specific link can be alleviated without the
need of reroute every LSPs.

Figure 10: The tool brings the chance to design layer 2 and layer 3 VPNs providing views for
studying logical VPN topologies. The traffic flows can be deployed per route target.

Another feature of this tool is that IPv6 is supported. This feature allows to evaluate
readiness of network OS on devices for IPv6 deployment and simulate traffic and network
configuration migration from IPv4 to IPv6.

Reports and alerts
SP Guru Network Planner counts on over 100 reports in which the user can be the results
of the analysis and simulations. That means that the tool provides the user with information
about the configuration, statistics of utilization, delay and packet-loss, network costs. The
information of the reports is divided into different categories including failure analysis,
configuration, traffic throughput and utilization, inventory, performance, validation and protocol
metrics, and it can be printed or exported in HTML, XML, CSV or spreadsheet format.


1.2.1.3. Traffic Explorer (Packet Design)

Traffic Explorer is a tool for making a network-wide traffic analysis, providing visibility into
the whole network showing per-application or CoS traffic flowing over the links. The tool enables
to perform a daily, weekly and monthly monitoring, troubleshooting, planning and maintenance
activities.
Packages and modules:
Traffic Explorer comprises the following components:
Distributed flow recorders that collect flow records from key traffic sources in the
network
A centralized flow analyzer and modeller engine that computes traffic flows across the
entire network topology using routing intelligence from Route Explorer
X-Windows, VNC and Web Browser client software
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 18 (64)

Figure 11: Traffic explorers components
Features:
User Interface
Traffic Explorer has a graphical interface. It visualizes animations showing how individual
routing changes impacted traffic flows across the entire network.
Analysis and simulation
Traffic Explorer shows the traffic flow per-application or CoS over every link in the network
and gives end-to-end visibility of all traffic network-wide.
Users are able to interact with an as-running model of the network, where actual traffic
flow information is dynamically overlaid on a real-time, layer-3 topology map. They can make
changes on the as-running network, using the actual routed topology and traffic loads, with
detailed information on application and Class of Service composition, either at the current time
or from historical data.
Traffic Explorer lets network engineers perform a daily, weekly and monthly monitoring,
troubleshooting, planning and maintenance activities. They can see utilization and bandwidth by
application or CoS for all links on the network (not just directly monitored via Netflow).
The tool allows performing a route cause analysis. It recognized the actual routed path
through the network for every flow and shows the impact of routing changes or failures, as they
happen, on network-wide traffic, highlighting traffic shifts that often result in network hot spots
and impact application performance.

Figure 12: Traffic and routing events are correlated for faster
root cause analysis
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 19 (64)
Traffic Explorer detects the increases in link usage and determines whether the increase
is due to new traffic loads on the network or if the impact of the routing change somewhere else
in the network. The tool also shows the impact of every routing change on network-wide traffic,
including total traffic volume and the number of flows and hops affected.
With Traffic Explorer, engineers can simulate network changes, such as adding or failing
routers, interfaces and peerings; adding or moving prefixes; and adjusting IGP metrics, BGP
policy configurations or link capacities, applications or services.
Traffic Explorer lets engineers perform failure impact analysis, showing how the network
would respond in various situations. The tool simulates link or router failures and shows the
impact on network-wide traffic across all links on the topology map.


Figure 13: Engineers can simulate diverse changes in the
network. For instance, they can model downing routers and
peering and analyzing the network's behaviour to determine if
sufficient fault tolerance and redundancy is provisioned,
particularly for critical application or CoS traffic

Using the tool, engineers can view historical traffic trends including overall network
volumes, per link volume or utilization anywhere in the network, even breakdowns by exit router
or next hop address.
Traffic Explorer lets engineers analyze and manipulate a network-wide traffic matrix,
showing traffic volumes between every source/destination pair in the network. Detailed capacity
projections can be accomplished by exporting the full traffic matrix to a spreadsheet, adjusting
any source/destination traffic volume based on internal initiatives or forecasted loads, and then
importing the updated matrix to see the impact on network-wide link utilizations.
New applications or CoS deployments can be tested on the as-running network, before
they are deployed, by adding the expected traffic loads between appropriate nodes to existing
traffic volumes, and viewing the combined traffic load on every link.
Traffic Explorer can monitor peering or transit traffic to ensure it is within contracted
ranges, as well as analyze, identify and justify new peering relationships. The tool also provides
the intelligence to optimize their peering traffic.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 20 (64)

Figure 14: Engineers can view the traffic by destination AS,
neighbour AS, transit AS, Exit Router or Community
Traffic Explorers BGP configurations let the user modify BGP configurations to move
traffic between various existing and potential neighbour providers, showing how actual traffic
loads will be affected. New peering relationships can be simulated, allowing operators to see
the impact on traffic across their entire network. Since the tool understands full end-to-end
routing (both IGP and BGP), it can show the impact of peering and transit traffic when making
unrelated changes to the core of their network.
The tool allows network managers to define traffic groups that represent users,
departments, locations or specific applications, and monitor network usage by each group.
Aggregate or per link traffic usage by group can be viewed directly, as well as exported to
external programs such as a spreadsheet or billing application.

Figure 15: Traffic Explorer enables usage tracking by user-
defined traffic groups

Reports and alerts
Traffic Explorer can send alerts whenever routing changes specific application or CoS
traffic is beyond user specified thresholds, letting know what happened, where it happened and
what kind of traffic was affected. It also allows replaying historical events.



Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 21 (64)
1.2.1.4. Design Expert (Netformx)

DesignXpert is a design and quoting software platform. It facilitates the design of different
networks, including converged voice-and-data networks, complex MPLS overlay and HPC
networks, Managed Services and Network Engineering Services by automating and validating
the entire opportunity-to-order process.

Packages and modules:
Besides DesignXpert, Netformx features extra modules:
MPLS Designer
KowledgeBase
Enterprise AutoDiscovery

Features:
User Interface
The tool provides a graphical interface which can be presented as a typical graphical
view or as a tabular view.

Figure 16: Design Experts user interface

Analysis and simulation
DesignXpert software handles the whole end-to-end process, streamlining every step and
linking automatically to each succeeding step. Every subsequent action or revision ripples
through and updates the design. The tool provides network designers the chance to convert
customer requirements into deployable solutions from simple to complex networks such as
VoIP, MPLS, MNS or HPC.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 22 (64)
Network design professionals access a vast library of smart components, and, using a
drag-an-drop action, can build network topology diagrams. Each component is an intelligent
object. That means that each object is not just a graphic representation. Every object has its
own properties such as linking protocols, actual physical size and datasheet properties that
represent how a real-world network element would behave in an actual network. Netformx
Smart Library components simulate actual network equipment, enabling full system-level
network design, validation and pricing.
DesignXpert automates the steps of the network design and quoting process:
Customer requirements gathering and documentation
Discover the existing network infrastructure (using Enterprise AutoDiscovery).
Definition (design) of the technical solution
Pricing and margin analysis
Customer technical and financial proposal (quote, statement-of-work, solutions
visualization)
Implementation (transfer to fulfillment or provisioning)
One of the extra modules mentioned on the previous section, MPLS Designer,
streamlines the entire cycle of proposing, designing and provisioning MPLS/IP VPN services. It
guides network designers through the process of turning customer requirements into a technical
plan, then following through with a detailed proposal. Once the proposal is accepted, the
software provides the pertinent documentation.
MPLS Designer allows to change design parameters given in a table format, including:
Routing and Switching (BGP, EIGRP, OSPF)
Partial and full mesh networks
Access and speed
Access options: IPSec, Frame Relay, DSL and Wireless
Connectivity matrix and VRFs
Quality of Service and Class of Service definitions
Routing protocols
Secure internet access
Remote access
Extranet connectivity
Diversity
Value added services
MPLS Designer requires DesignXpert to run.
At the heart of DesignXpert is the Netformx KnowledgeBase, a network device library,
including more than 147,000 components, and associated configuration rules and current
prices. Weekly updates to the Netformx KnowledgeBase keep the repository current with the
latest devices, physical configuration rules and best practices. In addition to network vendor-
supplied public content, Netformx can incorporate customer-specific content into the
Netformx KnowledgeBase to accommodate proprietary items such as service offerings,
corporate practices and promotional pricing.
Enterprise AutoDiscovery (EAD) is an SNMP/SSH/Telnet-based audit and multi-vendor
network discovery feature of DesignXpert that enables design professionals to capture an
accurate baseline of existing IP and SNMP-enabled devices in any network.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 23 (64)
1.2.1.5. IP/MPLSView (Wandl)

IP/MPLSView is WANDL's Traffic Engineering and Network Management solution for IP
and/or MPLS networks. This system addresses the mayor areas of network planning including
analysis, design, optimization and simulation.

Features:
Data collection / exportation
From a set of network configuration files and other optimal data, the Multi-Vendor
Parser constructs the network topology, aware of multi-protocols, layers, ASes, routing areas
and VPNs.

This network data can be imported
into the tool or collected directly by the
system itself in conjunction with
IP/MPLSViews Network Manager online
module. Tariff and pricing data can be
imported too.

Alternatively, the user can
manually construct any network topology
via IP/MPLSViews advanced graphical
interface.

So the network can be designed
from scratch or on top of an existing
network configuration.

Figure 17: IP/MPLS View models any
architecture designed by the user

User Interface
IP/MPLSView provides a graphical user interface. The tool shows routing, utilization,
protocol-specific and other reports from the client interface or from the web.

Analysis and simulation

To perform a traffic load analysis, the tool offers a view of current or historical charts.


The user can use the tool to pinpoint
bottlenecks or underutilized links from the
topology map in large networks, simulate
new demands before they are placed on
the real network (perform capacity
planning) and optimize routing parameters
(metrics).

Figure 18: Network analysis. Users can
identify bottlenecks observing colours.

IP/MPLSView automates network designs. It automatically determines where to purchase
links to satisfy traffic for resiliency against any failure scenario. The user can use it to identify
and prevent potential bottlenecks, performing a simulation to show traffic routes for many what-
if scenarios and identify which trunks will become congested under various failure conditions.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 24 (64)
Moreover, the user can analyze how traffic is rerouted and the effect on network links
(e.g. worst-case trunk utilization), performing simulations with single, double or even triple
failures.

Using this tool, the user can experiment with changing parameters, protocols, topology
and simulate network migration, network expansion or the merging of multiple networks as a
way for validate changes before deployment.

Some of the protocols supported by the tool are the ones which follow:
IGP: OSPF, IS-IS, IGRP, EIGRP, RIP
Static Routes, Policy-based Routing
BGP, LDP/TDP, RSVP-TE, VoIP (SIP, H.323)
Multicast: PIM-SM, -DM, -SSM
CoS, IPv4, IPv6


Figure 19: LSP Path calculation


Concerning MPLS-TE, the tool allows
different simulation and designs. The user
can simulate LSP tunnels (including backup
tunnels), automate Fast ReRoute (FRR)
design, automate the design of diverse paths
for primary and backup tunnels and optimize
LSP Paths that have become suboptimal over
time.


With the tool, VPNs can be modelled
and created. The user can perform VPN
simulation, use the system to generate VPN
traffic and perform card failure simulations. On
the configuration files, VPN-specific integrity
checks can be run. The tool supports different
VPN types as L3VPN, L2Martini, L2Kompella,
VPLS-LDP, VPLS-BGP, TLS and CCC.

Figure 20: VPN Wizard for creating and
editing VPNs

The tool lets the user model and analyze BGP so that Route Reflector design and
analysis can be performed, BGP routing tables can be imported, and BGP peering analysis and
iBGP policy evaluation can be performed.

In connection with the Class of Service, the tool permits the analysis of it allowing to
model CoS classes and policies, letting the user model different queueing schemes and define
application flow based on CoS (this enables the modelling of VoIP or VoD) and enabling the
analysis of packet-loss and delay statistics per CoS.

IP/MPLSView can simulate multicast flows based on user-defined multicast groups and
demands, the effect of RP selection on the distribution tree and on link utilization and SPT
switchover.

Reports and alerts

Once the user is satisfied with the MPLS-TE or VPN design, respective LSP and VPN
configlets (configuration file statements) can be generated in text or XML format and pushed to
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 25 (64)
the network using P/MPLSViews Service Activation Module and then, generated configlets can
be loaded back to the network.


Figure 21: Report manager


1.2.1.6. NetScope (TurboSoft)

The NetScope product range offers an enterprise-wide solution that provides instant and
historical per-second visibility and control of application performance.

Packages and modules:
NetScope is divided into different modules:
NetScope Reporter: reporting solution
NetScope Alerter: alerting solution
NetScope FastTrack: network management solution
NetScope Analyser: network monitoring solution
NetScope Services: QoS solution

Features:
User Interface
NetScope provides a graphical user interface. It visualizes the state of the whole
network showing the status and different parameters that characterize it.

Analysis and simulation
NetScope Analyser is a network monitoring solution that provides per-second visibility into
network traffic both in real time and historically. This module allows seeing how the network
traffic is made up offering per second resolution which can be retained for historical analysis.

NetScope Analyser gives the user the insight to regain control of the network and to keep
business critical applications such as VoIP, Citrix and ERP operating optimally. It offers a
detailed knowledge of network traffic content.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 26 (64)

Figure 22: The user can zoom in on individual data streams

NetScope FastTrack offers an extensive network management solution, combining the
benefits of instant control of application performance and dynamic allocation of network resources
with visualisation and analysis tools.

NetScope FastTrack features instant control of application performance and dynamic
allocation of network resources to ensure the control of the network. To maintain and enhance
performance, some applications bandwidth can be prioritized and lower priority or unwanted
traffic can be shaped, capped or blocked as desired.

Additionally, NetScope FastTrack uses many of the extensive monitoring and
visualisation tools also found in NetScope Analyser, including traffic visualisation down to a per
second resolution for both real time and historical analysis.

Netscape Services is Turbosoft Networks managed QoS solution, for maintaining and
achieving optimal performance from network infrastructure. NetScope Services are available as
a one off network health check, or as an ongoing service.

Reports and alerts
NetScope Reporter and Alerter is a web based network reporting and alerting tool that
delivers graphical reports on current and historical network activity and timely alerts on network
status. Real time monitoring and full visualisation of traffic delivers the detailed insight into the
status of the network for maintaining the performance of critical systems and coping with
changes in demand for network resources within an organisation.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 27 (64)

Figure 23: Network activity report. Tag usage.

Netscope offers network administrators the why, what, who and when of network activity
reporting based on predefined parameters or user generated parameters. The tool allows the
user to isolate traffic that's important, categorising by username, application, protocol and port.

The tool collects and aggregates network activity data on a per second basis spanning
some years. The user can access to immediate and historical data to perform a long term traffic
analysis and trending.

NetScope's advanced alerting features keep watch over the network, notifying of issues
and events that require attention when they occur. Additionally it provides network health
functionality, offering quick and simple indicators of overall network health.



Figure 24: Network activity report. Link activity.

NetScope Reporter analyses data stored within its database to generate graphical
reports either automatically or on demand. The user can choose from numerous predefined
reports or create user specified parameters such as devices and time periods.

Using the tool the user can select from a predefined list or create individual alerts
tailored to the users requirements. Alerts criteria covers issues such as the addition of new
users to the network, the appearance of new traffic, bandwidth oversubscription, bandwidth
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 28 (64)
availability above or bellow a critical point, traffic on specified ports or addresses and traffic
spikes.

Figure 25: Alert log
The tool enables to configure alerts to be sent based on traffic conditions. These alerts
can be set up to be sent via e-mail or sms.

1.2.2. Emulation tools
1.2.2.1. Network emulation
1.2.2.1.1. GEM (Spirent)

Spirents GEM enables to test applications, devices, protocols, solution and services
under dynamic delay and impairment conditions. Using GEM, the user can evaluate the
performance of emerging technologies, characterize breaking points of a new service, validate
new products or solutions before deployment and discover and define minimum required
Service Level Agreements.

The tool emulates the real world effects of Layer 1/2 delay and impairments on Layer 3
devices and applications.

Packages and modules:
Appearance:

Figure 26: Appearance of different models (MAUI left, HAWAII right):
Maui model Hawaii model
Supports speeds up to 2.66Gbps
Up to 4 interface blades
Hot swappable copper/optical SFP
modules (optional wavelengths available)
Support for Ethernet, SONET, SDH, OTN,
Fibre Channel
Fast Ethernet Interface for Remote Control
Supports speeds up to 11.3Gbps
Up to 2 interface blades
Hot swappable copper/optical SFP and XFP
modules
Optional wavelengths available
Supports Ethernet, SONET, SDH, OTN,
Fibre Channel
Fast Ethernet Interface for Remote Control
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 29 (64)
Features:
Data collection / exportation
Live network conditions can be recorded to be imported into a GEM emulator and that
way, recreate those delay and impairment conditions in the lab.

User Interface
Using a HTML Based GUI (no need client software to install), GEM enables to define the
network topology, devices and traffic flows directly from the GUI using drag and drop
configuration.

It supports Service Frame Colours such as:
Green conforms to Committed Rate
Yellow conforms to Excess Rate
Red does not conform to Committed or Excess Rate


Figure 27: HTML based GUI

Analysis and simulation

The tool has a flexible FPGA design and offers the possibility to upgrade with new
features. It performs a hardware based Layer 1 impairment emulation. These impairments can
be, for instance, that frames can be dropped based upon a user specified probability (selectively
MPEG-4 I, P or B packets can be dropped), the Ethernet CRC of frames can be corrupted
based on user-specified probability, Ethernet frames can be variably delayed around the line or
network flow delay can be fixed based on a user defined probability (parameters as maximum
or minimum value of delay, or maximum positive or negative change of delay can be fixed by
the user), Ethernet frames can be reordered or duplicated, any burst of bytes within the
Ethernet frame can be corrupted or modified based on a user specified offset from the start of
the frame and a user defined error rate (between 1E-12 and 1E-2) or bit rotation (comma
aligner) can be fixed.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 30 (64)

Figure 28: Example: the tool lets to use unmanaged switch to connect more than 2 devices to 2-port
Spirent GEM.

The tool can support full 1GbE/10GbE line-rate all the time (even at 64 byte frame size)
and chain multiple impairments at same time (corruption, jitter, duplication, reorder, drop,
modification, errors).


Figure 29: Network representation and impairment profile

GEM is able to dynamically change impairment profile without stopping test. The user can
perform an advanced filtering, selecting impairments based on values in Ethernet frames. It
emulates real-world effects of layer 1/2 delay and impairments on layer 3 devices and
applications, supporting auto configuration of test beds. Multi-protocol is also supported on the
same platform (Fibre Channel, SONET/SDH and Ethernet). The frames have unlimited size and
can be reordered and duplicated up to 12KB. It also supports a complete automation with TCL
library.

The tool supports random impairments as well as targeted ones. Random impairments
are based upon any of the following distributions: periodic, poisson, gaussian, uniform. Targeted
impairments, on the other hand, were defined by the stablishment of:
VLAN tag
MPLS label
MAC address
IP address
TCP port
Any other field in the Ethernet, IP, TCP, UDP or RTP header
Any other information up to 2,000 bytes deep within the Ethernet frame.

The tool is based on Metro Ethernet Forum Bandwidth Profiles and allows the
configuration of the following parameters:
Committed Information Rate (CIR)
Committed Burst Size (CBS)
Excess Information Rate (EIR)
Excess Burst Size (EBS)
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 31 (64)
The optional IPTV feature on GEM can be used to characterize video performance under
specific impairments. The tool allows to correlate mean quality scores with specific impairment
conditions and drop MPEG 2 (H.262) and MPEG 4 (H.264) I, P or B frames.

The user can select a MPEG 2/4 I, P, B packets for possible drop, choose the number of
times to trigger a selection (1-15, infinite), choose drop probability for selected packets (rate and
distribution) and choose selection offset.

The Dynamic Search Filter (DSF), an optional feature on GEM, searches for a user
defined pattern throughout an entire TCP/UDP payload and triggers an impairment event. When
a match is found, the packet is subjected to a specified impairment. Trigger event can be limited
to specified number of times (e.g.,1, 2, 3 or infinite). This optional DSF feature can be useful
for characterizing video performance under specific impairments. A specific MPEG I, B or P
frames can be targeted for impairment. This feature can also be used to characterize new TCP
implementations for acceleration performance. A specific TCP packet with specific FTP data
string can be targeted and the packet dropped. The user can specify the trigger to occur only
once to prevent TCP session from closing.

Its interesting for the user to record live network conditions and import them into a GEM
emulator. To do this, the user has to setup Stand-alone Profiler application on network client,
capture delay and packet loss between the Profiler application and multiply user defined target
machines using ICMPs, take the Profiler logs back to lab to be loaded into GEM emulator for
Playback and test applications or services under current network conditions. The tool allows to
record network delay and loss characteristics for over 30 days between Profiler application and
more than 50 user defined Targets, define Targets by IP address or URL, configure ICMP
packet length (64-1518), configure DSCP field (0-255), set ICMP interval down to 100ms, start
sessions manually or automatically by scheduling date/time and duration and view delay and
impairment graphs real time or for post analysis.

Profiler logs can be uploaded to GEM and played back the captured impairments (one log
per GEM Network Profile). The user relies on some options such as playback delay values as
measured by the Spirent Profiler or increase delay values during playback by a user defined
factor for performance testing, repeat log files for longer playback sessions, ignore packet drop
and assign to Network Profile in opposite direction for bi-directional support.

The GEM Router Mode allows users to connect devices to Spirent GEM of the same or
different subnets.

Capture Replay, available as an option on Hawaii Blades, allows to capture up to
1GByte/sec at full line rate using filters or triggers, replay this or other pre-captured traffic on the
GEM and apply impairments. Capture and/or replay can occur before or after impairments are
applied and troubleshoot network or application performance issues using trigger conditions.

This option can isolate top talkers/applications using network bandwidth, capture data
inline at up to true line rate in both directions, use extensive Filtering (layer 2 -layer 7) capability
for focused capture and capture traffic for multiple Network Profiles simultaneously and
download captured data for analysis (PCAP file format). It has a Capture Buffer which captures
up to 8Gbits or 1GByte of traffic. The captures can be made before and/or after emulator
introduces impairments. Captured packets include precise hardware based time-stamps with
16ns accuracy. Previously captured files can be uploaded to be replayed by GEM (PCAP) at up
to true line rate (PCAP files can be modified prior to upload). The traffic can be replayed at
captured rate or user defined rate, as background traffic along with through traffic, with or
without impairments (including modification). Multiple captured files can be replayed
simultaneously with multiple Network Profiles, single time or n times, or forever.

The playback profiler imports and playbacks custom network scenarios with user defined
impairment tables including control parameters such as delay, drop, reorder, CRC error or
corruption. The playback control is provided for each individual GEM Network Profile and works
with other features such as bandwidth control.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 32 (64)
The user can use the network playback profiler to test new technologies, protocols or
applications with virtually limitless control for any dynamic or bursty network scenario, high or
even very low frequency delay change and impairment events and custom statistical impairment
distributions.

The tool allows the user to choose the source for impairments: table or GEM GUI. The
impairment tables can be played and repeated once, 2 to 255 times or forever. Custom
impairment tables can be individually uploaded and controlled for each GEM Network Profile.

Supported applications:
o Real Time Applications
IPTV, VoIP, Interactive Gaming
o Storage
Disaster Recovery, Business Continuity, ILM Planning, Storage
Extension, Data Center/ Server Migration
o Networked Applications (Throughput / Performance / Error Recovery)
Database, Transaction Processing, Distributed Software Applications
o Satellite Communications
o Converged Networks
Next Generation SONET/SDH (VCAT, LCAS, GFP)
TDM over Packet, Timing over Packet (Circuit Emulation, Pseudo Wire)
MPLS, Metro Ethernet
o Service Level Agreement (SLA) Characterization
o Acceleration (WAN, TCP, Application)
o PON (GPON, (G)EPON, BPON)
o iWARP(10Gig Ethernet)

Reports and alerts
The GEM Reporter is able to produce reports based on statistics from GEM Emulator.
It shows bandwidth, delay and packet loss statistics for all Network Profiles. It also turns the
reports into pdf documents for a later analysis.


1.2.2.1.2. Shunra Virtual Enterprise (Shunra)

Shunra Virtual Enterprise is a network emulation solution that creates a virtual network
environment in a performance and pre-deployment network lab. It delivers a way to test the
performance of applications and network equipment under a wide variety of network
impairments.

Packages and modules:
HW platforms:
STJ: The STJ appliance limits bandwidth and impairs multiple traffic flows using
10/100Mbps Ethernet interfaces
STN: The STN appliance limits bandwidth and impairs multiple traffic flows
using 10/100Mbps and 1Gbps Ethernet interfaces
STA: The STA appliance limits bandwidth and impairs multiple traffic flows
using 1Gbps and 10Gbps Ethernet interfaces
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 33 (64)

Figure 30: Appearance of different models

Modules:
VE Modeller: model and simulate
VE Network Catcher: captures network conditions to import them into the VE
Modeller
VE Desktop User Interface
VE Reporter


Figure 31: The Shunra Virtual Enterprise solution architecture


Features:
Data collection / exportation
Shunra VEs network recording software captures and imports production network
conditions, such as latency, jitter and packet loss, directly into the users network model. When
Shunra VE replays these recordings it recreates the same conditions that exist on the
production network.

Analysis and simulation
Shunra VE delivers a network solution that creates a virtual network environment. It delivers
a way to test the performance of applications and network equipment under a wide variety of
network impairments (as if they were running in a real-life production environment).
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 34 (64)

Using Shunra VE the network manager will understand the impact that the network and
applications have on each others performance and on the remote end-users experiences, and
uncover and resolve production related problems.

In addition to the empirical experience, Shunra VE provides a range of graphically reports
and drill-down analysis capabilities. These help to isolate and resolve the root causes of
network and application problems, and determine whether any modifications to the application,
network or infrastructure are needed.

Shunra VE combines a hardware appliance with a software. This creates a network
simulation solution that includes detailed reports and root cause analysis.

At the heart of Shunra VE is a network appliance that functions as a bridge or router. It
changes the speed at which network traffic travels across the local area network, exposing data
packets to the same network impairments to which they would be subjected on the wide area
network.

The Shunra VE network appliance is controlled through a Microsoft Visio based
modeler. The modeler gives the possibility to create any network topology and run any scenario.


Figure 32: Users can simulate multiple branch offices

Once the network model is created, the user can activate the test scenario. At this point,
applications, network services or infrastructures connected to the appliance will behave as if it
were subjected to the conditions defined in the model. The user can edit network parameter at
any time, to create current, future, worst case or what-if scenarios and replay or reconfigure
these scenarios over and over again.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 35 (64)


















Figure 33: WAN settings

Figure 34: Gateway parameters


The tool delivers capabilities to emulate a wide range of network impairments including
latency, jitter, bandwidth, congestion, packet loss, BER, fragmentation, duplication,
disconnection, re-ordering, data corruption and modification. The user can also emulate any
network topology including client/server, multiple branch offices with distributed data centers,
full mesh networks, complex N-Tier network topologies, internet and eCommerce. And a wide
range of network technology simulations can be made including MPLS, Ethernet, QoS, Frame
Relay, wireless and cellular networks, satellite networks, IPv4 and IPv6.

Shunra VE is also useful for troubleshooting production problems that occurred in the
past. Since Shunra VE stores 30 days worth of production network conditions, the user can
rewind the recording to the time that the problem occurred and see what happened with the
network at that time.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 36 (64)
With every test, Shunra VE provides detailed drill-down analysis and reports on
application and network performance, which tell the user where and when will have
performance problems (in the network or the application).

The tool provides reports and analysis
on:
Application performance over the
network
Application availability over the
network
Application performance thresholds
against a range and combination of
network conditions Individual
transaction performance
measurements and drill down
information.
____________________________________

Figure 35: Impairments activity

The tool allows to analyze performance of business processes under a range of network
capacity, end user load and other production conditions.

Capacity planning delivers a set of expected performance metrics per network
bandwidth for various end-user. Performance is measured against service level objectives
defining network requirements in a graphical report.

The tool, over a emulated network, allows the testing of VoIP. That way, the user is able
to test, validate and tune VoIP hardware and architecture.

Shunra VE includes an XML-based open API which enables it to automatically manage
other third party lab resources, or be managed by them. These resources include PCs running
batch scripts, FTP clients, custom developed or off-the-shelf testing tools, traffic generators,
network sniffers, and network management systems.


Reports and alerts

Shunra VE provides a graphically diagnostic reporting capabilities on application and
network performance. All reports can be exported to Microsoft Office documents or published in
HTML. An executive summary report in Microsoft Word is also provided. Additionally, all Shunra
VE test results are stored in a central repository for easy version comparison, change control,
and future reference by the project team.


Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 37 (64)


Figure 36: Network activity reports. Service level data, transaction response time, etc.


1.2.2.2. Access Network emulation
1.2.2.2.1. DSL (Spirent)

Spirents DSL solutions allows the emulation and different impairment generation related
to the physical layer of the OSI model. Spirent has developed a series of noise and impairment
generators to permorm diverse tests. That way these tools allow users to perform the emulation
of impairments of copper lines such as crosstalk or noise.

Features:

Spirent provides DSL solutions for:
ADSL, ASDL2, ADSL2+
HDSL, HDSL2, HDSL4 and SHDSL
ISDN and SDSL
VDSL and VDSL2
Solutions to meet the requirements of standards bodies: ATIS, DSL Forum, ETSI and
ITU-T
Programmable solutions allow custom test cases for evaluation beyond conformance
requirements

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 38 (64)
Solutions:
Spirent provides diverse DSL solutions. Some of them are listed below:
DLS-5D10: DSL Service Modelling and Noise Tool
DLS-400S: G.SHDSL Wireline Simulator
DLS-A2PE Integrated System: European ADSL2+ and ADSL2++ Testing
DLS-V2A Integrated System: North American VDSL2 Wireline and Noise
Testing Solution
DLS-5D10
The DLS-5D10 provides two primary functions:
DLS Performance Predictor
DLS Noise File Development for Performance Testing

Using the Performance Predictor, the DLS-5D10 predicts xDSL rate vs. reach under a
range of operational conditions and allows the user to configure:
Cable Properties (standard and definable)
Crosstalk
Modem Models and Properties (including transmitter and receiver)
Technology Mix (number and type of disturbers)

The performance of the DUT can then be measured in several ways including max. bit
rate, noise (or signal) margin, as well as reach and Shannons Gap. Results are represented in
a graphical or tabular format.

Figure 37: DLS-5D10 GUI

The Noise File Development application of DLS-5D10 calculates the Power Spectral
Density (PSD) of crosstalk noise and creates a noise profile that can be quickly saved and
downloaded to the DLS-5500 Noise Generator.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 39 (64)
The DLS-5D10 allows users to build libraries of standards-based or customized noise files
for testing device performance. These libraries can include any combination of Alien, Self or
Mixed noises.

Figure 38: Performance and Noise Margin Prediction shows the rate vs. reach


DLS-400S

Spirent's DLS-400S Wireline Simulator is a pre-configured wireline simulator designed
to provide a test solution for the ITU-T G.991.2/G.shdsl standards.

The combination of DLS-400S and DLS-5500 Noise Impairment Series products
provide a complete simulation of ITU-T G.shdsl (Annex A) test loops. Using these tools, users
have the ability to custom program wireline lengths and add noise impairments.

Test loops provided by a single chassis DLS-400S system configuration will allow the
user to simulate the preconfigured G.shdsl (Annex A) loops: , S, BT1-C, BT1-R, BT2-C, BT2-R
& C4.


DLS-A2PE Integrated System

DLS-A2PE is an ADSL2++ lab test solution for the European market, consisting of the
DLS-410E wireline simulator and the DLS-5200EP noise generation system. This integrated
system provides a Layer-l test platform for ADSL, including ADSL, ADSL2, ADSL2+, and
ADSL2++.

The system enables repeatable test results, not only between different sets of test
equipment but also between different test labs.


Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 40 (64)

Figure 39: Following this diagram, the user is allowed to perform a physical layer test for ADSL2+
and ADSL2++ including wireline simulation, noise generation, traffic generation and analysis



DLS-V2A Integrated System

The DLSV2A Integrated System, which includes the DLS-8130 and DLS-5500 system,
allows performing test beds for VDSL2 applications on North American copper pair networks.

The system is designed for conformance/performance testing in accordance with ITU-T
North American VDSL2 Initiative ITU-T Recommendation G.993.2. It allows the testing of next-
generation multi-functional xDSL chipsets that provide rate-adaptive capabilities across
variations of ADSL and VDSL technologies, including ADSL1, ADSL2, ADSL2+, VDSL1 and
VDSL2.

The DLS-V2A product set features of loop configurations across various standards while
providing extensive capabilities for testing many other high bandwidth applications such as
Ethernet in the First Mile (EFM) Copper.


Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 41 (64)

Figure 40: The figure displays the DLS 410B ADSL2+ wireline simulator that, when connected to the
front panel input ports of the VDSL2 wireline solution, allows users the option of simulating ITU-T G.992.5,
TR067, and TR-100 North American test loops.



1.2.2.3. Application-level traffic emulation
1.2.2.3.1. Avalanche (Spirent)

Spirents Avalanche appliance solution provides capacity, security and performance
testing for network infrastructures, Web application infrastructure and Triple Play services
ensuring Quality of Service and Quality of Experience.

Packages and modules:
Besides Avalanche 2900, there are other solutions available:

Avalanche 220: The Avalanche 220, a portable version of Spirents Avalanche
2900 load testing appliance, allows to conduct high-performance, protocol-accurate
load testing wherever the user is, helping to ensure that devices, applications and
infrastructures will operate correctly under real-world conditions.
Avalanche Analyzer: Avalanche Analyzer is a reporting tool that allows
analyzing and displaying data generated by Spirents Avalanche testing appliances.
Reflector: The Avalanche and Reflector load testing appliances challenge even
the largest networks to perform under real-world conditions. Avalanche can simulate a
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 42 (64)
virtually unlimited number of users interacting with Web applications, receiving and
sending mail, viewing streaming media and can simultaneously generate DDoS attacks.
Reflector can accurately emulate large Web, mail and streaming server installations.
Combined with Avalanche, Reflector helps to test the capacity of any equipment
connected between the two systems.



Figure 41: Avalanche, combined with Reflector, is utilized to simulate both client behavior as well as
end infrastructure behavior.

Reflector 220: The Reflector 220 is a portable version of Spirents Reflector
application infrastructure emulation appliance. Combined with Spirents Avalanche 220
load appliance, the Reflector 220 allows the emulation of complex multi-tier Web sites,
as well as large application and data server environments, in the field. The Reflector
220 provides a solution for emulating application infrastructures in remote locations.


Appearance:

Figure 42: Appearance of different models:
Model 220 Model 2900


Features:
Analysis and simulation
The Spirent Avalanche 2900 is a 1Gbps and 10Gbps line rate Layer 4-7 stateful traffic
performance solution that is capable of high throughput security testing of over 3Gbps of bulk
encrypted traffic. Avalanche users have the ability to test devices to their limits at line rate
simulating daily traffic and understand the impact of worse case scenarios. It provides the
capability to generate traffic allowing trunk ports to be directly tested or determine the impact of
multiple GgE ports being aggregated over 10Gbps.
The user can test applications and network systems at multi-gigabit speeds and go
beyond expected peak volumes.

Using the tool, testers are able to specify variable loads such as user sessions, new user
sessions per second, transactions, transactions per second, connections or connections per
second. One load profile can be specified for an entire test, or a separate load profile can be
defined for each group of emulated users. This approach enables different actions, network
characteristics and loads to be specified for each group of simulated users. In addition, up to
eight simultaneous users can use the resources of Avalanche 2900 appliance.
Infrastructure under test
Avalanche

Reflector

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 43 (64)
Avalanche can be used in tandem with the Reflector test appliances to provide accurate
multi-protocol responses to the requests it generates. Together, the two systems test the
capacity of any device or network connected between them.


Figure 43: Complete end-to-end user and application emulation. Subscribers and servers can be
emulated using Avalanche and Reflector.


Avalanche supports the configuration of user behaviours. The system interacts with sites
using dynamic and interactive content, HTML links and fill-in online forms. Multiple types of
browsers can be emulated, providing detailed control over browser connection behaviour, SSL
versions, authentication and browser client headers. User behaviour such as think times and
clickaways (HTTP aborts) can be emulated, and the system also supports HTTP basic and
proxy authentication. Avalanche sends requests that include dynamically filled-in fields from a
list of provided values, or values captured from a previous response such as order numbers,
session IDs or transaction IDs. Avalanche supports high-performance testing of Web services to
ensure that mission-critical services will perform under heavy loads. The system can also verify
received content by searching for one or more strings in a response and it can identify potential
points of failure by stress-testing the infrastructure.

Avalanche supports all major protocols, including HTTP 1.0/1.1, HTTPS, FTP, streaming
media, IPv6, voice (SIP), mail (SMTP/POP3), DNS, SSL, Telnet, 802.1Q VLAN tagging, IPSec,
802.1x, and PPPoE. External traffic can also be imported, replayed and amplified to support
non-native protocols and traffic flows. Protocol support enables to test for performance-
sensitive network activities such as web applications, Triple Play, voice, mail, streaming media,
Video on Demand, file transfer and capacities of next generation content aware networks.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 44 (64)

Figure 44: The tool offers real-time statistics across all protocols, as well as information about
different features such as maximum bandwidth incoming/outgoing, maximum new opened TCP connections
per second or maximum opened concurrent TCP connections.


Applications

o Network Performance Testing

Provides performance and capacity testing on a variety of network devices including:
Firewall, Application Firewall, Load Balancer, Cache, Proxy, URL Filter, Content Filter, Anti-
Virus, Anti-Spyware, Reverse-Proxy, SSL Accelerator, HTTP/HTTPS Accelerator, SMTP Relay,
IDS/IPS, IPSec VPN Gateway and SSL VPN Gateway


Figure 45: Avalanche and Reflector testing the network performance


o Application Server Performance Testing

Validates the performance of several types of real servers including Web Server,
Application Server, Mail Server, DHCP Services, FTP Server, DNS Server, Telnet Server,
RTSP/RTP QuickTime Streaming Server, Multicast Server and more.

Reflector
Load
Balancer
Content
Switch
SSL
Accelerator
Avalanche
Firewall
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 45 (64)
o Web Application Testing

Performs Web application testing including Web services, SOA, ERP and CRM
applications with Avalanches application testing capability to support cookies, session ID,
dynamic link, automatic redirect, additional header, content validation, SOAP message, think
time, variable think time and variable assignment.

o Triple Play Testing

Performs Triple Play testing, validates Triple Play service from the users point of view
with realistic voice calling and unicast and multicast video streaming, and simulates Internet
data traffic using static IP address or IP address assigned by DHCP over PPPoE, VLAN and
Stacked VLANs.

o Security Testing

Provides extensive testing for secure network communication, vulnerability assessment
and user authentication including: IPSec, SSL, 802.1x, Network Access Control (NAC) and
RADIUS


Figure 46: Real-time statistics of HTTP



Figure 47: Real-time statistics of TCP

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 46 (64)

Figure 48: A summary of real-time statistics


Figure 49: Real-time statistics on Reflector

Reports and alerts
Avalanche Analyzer is an analysis tool that generates detailed reports and graphs (pdf
or html presentation reports) from Avalanche results files. It performs analysis of the data,
including min, max, average, protocol level details, TCP errors and trends info in graphical
and textual views.
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 47 (64)

Figure 50: Network activity report summary



1.2.2.3.2. Network Tester (Agilent)

Network Tester is a solution for testing the real-world performance of network security,
Triple Play and application-aware devices. It is a Layer 4-7 performance solution that creates a
mix of application traffic through the simultaneously emulation of real voice, video, data, P2P
traffic and multiple DDoS, spam and virus attacks on a single port.

Appearance:

Figure 51: The Agilent Network Tester Layer 4-7 Solution
Features:
User Interface
Network Testers graphical user interface allows users to create and execute real-world test
scenarios. The user can drag and stack configurable protocol bricks to create multi-protocol
traffic profiles combined with malicious attacks (without the need of scripting).

Analysis and simulation
Network equipment manufacturers, service providers and network operators can use
Network Tester to analyze application-aware devices to obtain real-world performance
characteristics under peak levels of load and stress the network, as expected in real network
environments.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 48 (64)
Network Tester uses real Internet Data, VoIP, VoD and IPTV traffic. Combined with DoS
attacks, malicious exploits and traffic impairments, the tool subjects the devices to complex
traffic conditions. In addition, Network Tester is able to simulate proprietary protocols such as
Peer-to-Peer, IM and On-line Gaming. That way, it can generate real-world mixes of Internet
Data, VoIP, Streaming Video, IPTV and P2P traffic on the same interface.

Network Tester can simultaneously emulate multiple Denial of Service, worm, virus and
spam attacks to measure its impact on legitimate traffic performance. The generation of the
traffic can be over integrated IPSec, IPSecv6, PPPoE, DHCP, 802.1x and VLANs. It can
emulate tens of thousands of real clients and servers to measure device capacity, scalability
and performance under load.

The tool reports real-time and granular QoE statistics, including MOS and MDI for Triple
Play services, providing accurate insight into the device application layer performance.

The tool supports different protocols such as :

Application protocols:
o HTTP, HTTPS, FTP, SMTP, POP3, DNS, Telnet, RTSP, RTP, IGMP,
Transport Stream, SIP, H.323, MGCP, SNMP, NFS, CIFS, ICMP, Traceroute,
NNTP, DHCP, Jabber

Integrated network access protocols:
o IPSec VPN, PPPoE, DHCP, 802.1x, VLANs


The String Editor of the tool permits the randomization of parameters such as URLs,
spam subject lines, and e-mail file attachments. Network Testers Transaction Variability feature
enables users to change parameters on the fly, without stopping the test.

Network Tester end-to-end (E2E) test capability allows to validate real-world performance
and scalability of distributed network infrastructures, ensure device interoperability and
guarantee network and service resilience to stress and malicious attacks. Real transactions can
be generated between remote locations to emulate real-world traffic over complete network
infrastructure.

Network performance and QoE statistics can be collected and analyzed in real time
providing a picture of distributed network system performance, robustness and scalability.

Network Tester provides integration of application data, voice and video protocols with
DoS attacks and other malicious exploits such as worm and virus infected traffic payload.
Protocol and transaction mixing capabilities allow the creation of multi-protocol weighted traffic
profiles that emulate real-world network environments. This provides a test solution that
stresses all application aware devices protocol specific processing features and options.

Network Testers supported protocols include Internet data, VoIP, VoD and IPTV
protocols and is complemented with Capture/Replay feature for emulating proprietary
applications such as Peer-to-Peer, File Sharing or On-line Gaming. VLAN support and access
protocols such as IPSec, PPPoE, DHCP and 802.1x are also available with IPv6 capability.

Network Tester combines real-world application traffic generation with passive analysis
features. It uses integrated Agilent Triple Play Analyzer, state of the art protocol and QoE
analysis tool to monitor test traffic and provide real-time insight into all aspects of protocols and
data services performance and quality (from the end user perspective). Triple Play Analyzer,
running on Network Tester controller, calculates and tracks voice and video MOS and MDI
scores in real-time on per call and per stream basis as well as performs packet and protocol
analysis. This also includes ability to decode, view and listen to any voice and video stream in
real-time for instant service quality assessment.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 49 (64)
With Network Tester, users can simulate thousands of clients and servers to stress a
device to its limits and generate and measure thousands of transactions per second or millions
of user sessions.

Network Tester allows the user to validate the real-world performance limits of
application-aware devices including firewalls, service-aware routers, session controllers and
content servers. It has the ability to surround devices with real voice, video and data traffic with
IPsec encryption and multiple DoS attacks.


Applications:

o Firewall testing
The NetPressure application covers network security and contents networking test needs.
A broad range of protocols covers applications such as web, email, news, file transfer/sharing,
instant messaging and streaming. Multiple protocols can be mixed on a single port to create
tests. Fully integrated access protocols and VLAN are supported and stateful traffic can be
generated over IPsec, PPPoE, DHCP and 802.1x without the need for scripts.
Firewalls use timers and keep state information. NetPressure's real-time control lets the
user dynamically change parameters while the test is running (there is no need to stop and
restart the test).
o VoIP testing
The NetPressure application covers network security emulating both H.323 and SIP calls
(including both signaling and data) on a single port for realistic system testing. It mixes stateful
VoIP and data application traffic on a single port to verify prioritization and ensure VoIP QoS
and introduces DoS attacks and measures the impact on VoIP performance. The application
scales VoIP traffic to emulate thousands of calls per second and simultaneous calls to
determine the performance limits of the system. It measures real performance using stateful
traffic, from a mix of applications, over both IPv6 and IPv4. The support for IPsec and IPsecv6 are
integrated into the test plan environment.

Figure 52: VoIP testing


o Session border controller testing
NetworkTester complements VoIP test tools. The NetPressure application extends the
test coverage, giving the confidence that the SBC (Session Border Controller) is ready to face
the real world. It emulates both H.323 and SIP calls (including both signaling and voice packets)
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 50 (64)
on a single port for realistic system testing, introduces DoS attacks and measure the impact on
VoIP performance. Mixes stateful VoIP and data application traffic over both IPv4 and IPv6
on each port to verify firewalling and intrusion prevention, and to ensure VoIP QoS. Moreover,
the application scales VoIP traffic to emulate several calls per second and simultaneous calls to
determine SBC performance limits. It is able to simulate proprietary protocols by capturing
bidirectional traffic, create custom "protocol bricks", replay the traffic in a stateful manner, and
multiply the traffic across multiple addresses to simulate many users and measure SBC
scalability. The support for IPsec (and IPsecv6) is integrated into the test plan environment.
SNMP traffic load can be added to verify SBC stability and indifference to Management Plane
stress.


Figure 53: Session Border Controller testing

o E-mail virus / spam filter
The NetPressure application covers network security with transaction variability
features, such as the emulation of large quantities of spam with dynamically varying content. It
tests the performance of the virus filter with Client Profiles, which let the emulation of both
legitimate email and email containing virus attachments. It scales the test up to reach the limits
of the email filter.

o Triple play
NetworkTester offers high-speed data, VoIP and video testing on a single port, within a
single test system. It emulates thousands of real users, changes the traffic application mix and
measures the impact of data applications on voice and video performance.
The tool allows the user to add other multi-play applications, such as Instant Messaging,
to complete the Multi-Play application mix. That way, mixes of application traffic can be
emulated to characterize system performance limits and Quality of Experience under expected
loads.
Proprietary protocols such as network games and P2P applications can be simulated and
scaled using NetworkTester's Capture/Replay capability. Multiple sessions can be emulated on
many different addresses to multiply application clients and servers. Many users can be
emulated playing games, sharing files and using common messaging services. This capability
enables to quantify the effectiveness of Application Traffic Management methods such as P2P
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 51 (64)
rate limiting, layer-7 packet classification and tagging, and application prioritization. For
example, the user can measure the real-time performance impact of application-aware firewalls
that can recognize and filter undesirable traffic.
With Network Tester, the user can add DoS attacks, spam and virus attachments to the
application traffic mix. The tool shows the Quality of Experience degradation, whether VoIP call
set-up time suffers or whether the system is able to maintain the priority of real-time traffic when
detects attacks.
NetworkTester integrates VLANs and access protocols such as IPsec, IPsecv6, DHCP,
PPPoE and 802.1x into a single NetPressure application, allowing to emulate voice, video and
data applications, including proprietary protocols and attacked traffic, over combinations of
access protocols, VPN tunnels, VLANs, and IPv4 and IPv6 address ranges.

Figure 54: Triple-Play testing





Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 52 (64)
2. TRAMMMS Testbed for bottleneck analysis: Experimental set
up
2.1. Network setup and requirements for experimental work
2.1.1. Testbeds for simulated traffic analysis

Initially bottleneck analysis can be checked by means of simulations. A good set of
simulating tools for network behaviour has been described in previous section. With the
objective of checking the usefulness of TRAMMS tools to detect bottlenecks, a combination of
routing and link capacity measurements was developed and showed in the recent CELTIC
event (Paris, 2009).

The main component of the this work is described in next section: A BGP probe that
supplies routing information from several border routers to feed a central repository; in fact,
more than one single BGP repository could be fed but, for the test, only one management
center was set up:

Scenario

Three adjacent autonomous systems were simulated (see figure) with three border
routers exchanging routing information one another. Within each AS (autonomous system), the
routes from every internal node to another external one may be dynamically modified. Such
modifications are announced to the border routers at fixed intervals. In fact this scenario is
simulated and can be changed to reproduce instabilities in the AS-AS links.

The purpose of this is accelerating the vision of what can be real situations that could take
several days, even months to happen.





Figure 55: Scheme of network simulated for BGP repository

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 53 (64)
Network

All routes announced by the border routers are in fact simulated. This is achieved by
means of BGPsim, an open source software that emulates AS behaviour and the production of
withdraws, new routes, etc. Such behaviour can be described by a local file that can, in turn, be
modified to analyse different situations. Once the BGPsim is started, an AS behaviour is
emulated as far as AS-AS routing concerns. Thus a failure of all routing form one AS to a
neigbour can be simulated either total or partial. This is useful to represent the very realistic
situation of an AS having two border routers, acting one as backup of the other to link that AS to
a neigbour one.

In order to represent the network behaviour, in fact, three different BGPsim are used so
that each AS can be emulated independently (by means of their particular configuration file). A
quagga instance is then required to emulate all the AS behaviour: A border router. Thus each
AS is simulated by

a. A configuration file to determine the BGP behaviour
b. BGPsim that runs that behaviour and announces withdraws or new routes
c. A Quagga (virtual machine) that is run like a real border router for the simulated
AS.

So, three routers are running independently, in three virtual machines. Each one is connected to
an AS also simulated by another virtual machine running a BGPsim following its configuration
file directives. Finally, all three routers are connected to reproduce the BGP behaviour. This
operation is achieved by means of a (virtual) bridge; thus a network composed of three AS is
obtained:




























Figure 56: Virtual networks connections for the BGP arrangement


Although the AS are simulated, the border routes are as real as any quagga device. Their
connection is also achieved by a virtual bridge but this is not relevant as far as routin
information exchange concerns: All announces issued from AS#1 reach AS#2 and AS#3 (the
BGPsim
Config
file

BGPsim
Config
file

BGPsim
Config
file
Bridge
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 54 (64)
same applies for any relashionship between other AS). Then a continous updating of routing
tables within every AS is obtained and so a coherent status maintained.


Management network and roting exploitation

Even though the three AS were simulated, real border routers interact like in real world.
Furthermore, for the purpose of generating a BGP repository, real probes are used to capture
routing announcements: A probe (described in next section) is connected to each (simulated)
border router, then all announcements are supplied to a central management system that
1. Checks for coherence
2. Produces a unified view of the AS-AS routing

This view is represented (GUI) so that an operator can realize whether the situation
needs a rearrangement, migth lead to traffic troubles or can be automatically managed by the
bordr routers. In fact, just by modifying the configuration BGPsim files, a wide range of
situations can be analysed.

A complete log file is recorded to be used as post mortem analysis tool allowing for a
time diagram that illustrates bottlenecks formation possibly dues to bad routing choices.


2.1.2. Testbeds for field traffic analysis

Measurements of QoE are not precise enough to conclude significant decisions. The
values one can reach with current techniques are too vague and certainly slow.

The integration of measurements and management of networks based on that values is
not covered yet.

It requires extra investment on expensive equipment. To make it feasible for the operator
to introduce QoE measurements, TELNET RI proposes to take profit of already deployed
equipment over working networks. As this equipment is remotely updateable the inconvenience
for the operator is minimal.


Scenario

Network

Netauditor is an evolution of the device CM100-IB by TELNET-RI (media converter with in
band management) that is actually installed in an ethernet network of Telefnica.



Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 55 (64)


Figure 57: Test-bed for netauditort


Over this network Telefnica allows medium and big companies to build up their on
private networks.

On the drawing two private networks are represented. The yellow company, established
in Barcelona, Valencia and Madrid, and the blue company settled down in Barcelona and
Valencia.

Every settlement counts on a CPE (EDC in Spanish) at the LAN of the customer
premises. This is connected to the CM100-IB slave over fast Ethernet.

This device acts as a demarcation point for the operator and defines its field of
responsibility.

The slave device reaches the CM100-IB master over a long fiber cable at the central
offices, where the master device is connected to a MPLS switch.


Management network

Every master device is installed at the central offices of the operator and is manageable
over an extra network. The slave devices are managed in band, over the fiber cable.


Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 56 (64)
There are good chances to get the product installed into a real network of a main
operator in Spain during 2009. Sharing the results collected there depends on the operator
itself.


2.2. Tools developed for TRAMMS
2.2.1. Netauditor

Telnet manufactures demarcation points that are naturally used for network deployment
by the operators. We aim to improve the existing equipment and to convert it into demarcation
point plus a QoE measuring probe for a similar price.

This way the operator increases significantly the visibility of the network, without having
to cope with additional investment.

Telnet demarcation points are integrated into the management systems of important
operators in Spain, so there is no need to invest into an extra network in order to gather the
QoE information and manage accordingly the traffic network.


Netauditor highlights are:
Measurement over the whole path
Constant monitoring in real time from the central offices
Collection of historical statistics
Provides the operator with visibility on the use of the network by the customer. It
allows the operator to detect bottlenecks, as well as underused paths. Thus he
can react commercially faster and offering his customers a better suited service.


Functional aspects

The aim is to characterize the quality of the customer traffic between one LAN and the
LAN on the other edge.
EDC
slave
master
EBA
EDC
slave
master
1 2


Figure 58: QoS measurement with netauditort

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 57 (64)
The operator needs to guarantee a minimum QoS up to the edge of his network
according to the contract signed with the customer.

Unfortunately not every edge of the network is delimited by a TELNET device, so there
will be paths of the network with less visibility.

The parameters measured to assure the IP performance are IP jitter, latency, packet
loss, packets out of order and quality throughput.

TELNET understands quality throughput as the maximum traffic rate that is able not
only to traverse the network but also respecting the QoS parameters accorded.


Management and data network impact

The operator allows TELNET to inject probe frames, but the throughput has to be as low
as the customer traffic is always preserved and prioritised.

All links have to be separately testable, in order to be able to isolate failure.

The configuration of the system is extremely easy and plug & play.

The amount of data travelling over the data network and management network is limited
so that the SNMP system runs smoothly on every condition.


WP4 Algorithm design

TELNET-RI has participated very close to the UAM within the design of algorithms, with
periodic meetings and collaborative work. During this part of the development the task of
TELNET-RI consisted of mainly specifying the design criteria for the UAM to think of algorithms
that can be implemented on the HW platform developed by TELNET RI. Thus, TELNET RI
would be able to keep the product at a reasonable price and the development on feasible
timing.

In similar way, and together with the operator Euskaltel, the quality parameters to be
measured and the precision required have been defined to satisfy the needs of the operator.

In fact two phases have been identified for measuring the quality of service of traffic
passing by. The first one involves classifying the traffic and the second selecting the parameters
that affect the experience of the user sending that flow.

That way the main classes of traffic and their more indicative parameters have been
searched, measured and tested.

An architecture of devices acting as satellites around one central equipment has been
also used. It allows keeping down the prices of satellites, passing the most complicated calculus
to the central node, keeping at the same time high measurement precision and wire speed.


WP4 HW development and algorithm implementation


TELNET provided the human and economical resources to count on a HW platform by
the end of 2008.

Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 58 (64)
The algorithms of the UAM have been integrated into the platform and field testing will
be possible during 2009.

2.2.2. BGP probe

The purpose of analysing bottlenecks and determine their possible origin in routing
errors requires that a device sends BGP information (routing tables and announcements) to a
central system. This is accomplished by a probe linked to the border router that does not
interact with the rest of routers but just litsents:






Figure 59: Software architecture of the BGP repository formation


The Design of the probes aimed at being simple, flexible and not expensive. Thus a
general purpose hardware platform was chosen:

Minimal hardware requirement of having two Ethernet ports.
Little memory requirement (2 Gbytes) to store the application.
Robust platform with tow versions: For rack installation and for table.


Figure 60 shows a view of the probe.

As for the software, the BGP probes are based on open software (quagga) with little
modifications to capture routing information (without propagating it to other routers) and send it
to a centralized management system whenever this one asks for updating announcements or
routing tables. This is illustrated in Figure 61.










Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 59 (64)

Figure 60: Hardware platform of the BGP probe





Figure 61: Software architecture of BGP capture by means of the BGP probes



BGP repository construction

As Figure 60 shows, the purpose of building anBGP repository up is achieved
connecting one or mor BGP probes to a central system that either periodically or
assynchronously asks for BGP information (announcements and routing tables) to the probe(s)

This way, operators can investigate if routing malfunction has happened. Besides, for
the demo shown in Figure 55, a prototype of such central system was developed to create
alarms whenever a critical number of AS-AS routes were announced for a given link.



AS#1
AS#2
AS#3
Border router
BGP probe
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 60 (64)
2.2.3. One Way Delay measurements based on GPS
synchronization

There is nowadays an increasing interest in the surveillance of IP networks, in order to
assess its appropriate performance. This interest arouses for the needing both from users and
operators to monitor the Quality of Service of the Internet connection. The aim of QoS
monitoring is to assure that the levels of quality agreed with the provider are fulfilled (Service
Level Agreement compliance). In a SLA, both parts of the agreement established certain levels
of quality that must be satisfied by the provider of the service. Those levels of quality are
commonly measured in terms of delay and capacity, among others. For this reasons, it is of
crucial interest to have accurate measurements of the One Way Delays in IP networks.
Measuring OWD is a very challenging task and reams and reams have been written on the
subject. Nowadays there is no way to measure OWD accurately without synchronizing both
ends of the measurement. There have been several approaches to perform this
synchronization, but the only one fulfilling the precision needed by SLA compliance must use a
Common Time Source based on GPS modules.


Developed solution

UAM has developed two approaches for a Common Time Source synchronization
based on GPS modules to monitor One Way Delay for SLA compliance purposes, with a
tradeoff between cost of the solution and its precision. On the one hand we have a software
solution based on a Linux Kernel module that timestamps with high precision (in the order of
s.) packets on their arrival. This software solution has less precision than the hardware
solution, but it has lower cost, as it would only need a conventional PC and a GPS module (see
Figure 62).


Figure 62: Software OWD monitoring solution

On the other hand there is a hardware based solution that makes use of a Field
Programmable Gate Array and a Linux driver (see Figure). It is able to timestamp packets both
on arrival and departure with an accuracy of nanoseconds, having also the advantage of being
upgradeable to 10 Gbps.


Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 61 (64)
GPS
Ethernet PCI Card
Memory
GPS Control
PPS
Ethernet Interface 1Gb
Ethernet Receiver
Ethernet Sender
PCI Bus PCI module
FPGA


Figure 63: Hardware OWD monitoring solution



Delay measurement

Figure 64 shows a sketch of the testbed used in the 4th Annual Celtic Event of 2009
that took place in Paris. There was a FPGA like that one shown in Figure 63 in Madrid sending
and timestamping user configurable burst of UDP packets. These packets were received in
Paris through a conventional Internet connection and timestamped on arrival both by the
hardware and software solutions, computing and graphing the elapsed time between
timestamping on departure and arrival.



Figure 64: Demo testbed used in the Celtic Event 2009



2.2.4. Bandwidth Available in Real Time (BART)

BART is a new method for estimating the end-to-end available bandwidth over a
network path. It estimates bandwidth quasi-continuously, in real-time. The method has also
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 62 (64)
been implemented as a tool. BART relies on self-induced congestion, and repeatedly samples
the available bandwidth of the network path with sequences of probe-packet trains, sent at
randomized rates. BART requires little computation for each sample which makes it lightweight
with respect to memory requirements, and adds only a small amount of probe traffic to the
network path.

With restricted access to traffic statistics recorded by intermediate network nodes the
estimation of available end-to-end bandwidth is only feasible by active probing of the network
path. This kind of active measurement only requires access to the sender and receiver hosts.
By injecting probe traffic into the network, and then analyzing the observed effects of cross
traffic on the probes, BART can estimate the available bandwidth. As a side effect it also
estimates the link capacity of the tight link.

Some of the features of BART are:
It produces an estimate quickly
Estimation stability can be traded for agility
Tuning is largely automatic, that is there are few parameters that need manual
adjustment. Nevertheless BART may be tuned according to the specific needs of the
measurement application, such as agility vs. stability of the estimate; or to
characteristics of the bottleneck link.
The memory requirements are minimal, as only the previous estimate and the new
measurement are needed to calculate the new estimate of the available bandwidth.

When passive monitoring of network traffic is not possible other methods for analyzing
network traffic and paths are needed. In the TRAMMS project, BART (Bandwidth Available in
Real Time) [2-8] is used for this purpose. BART is a method for estimation of end-to-end
available bandwidth and in principle BART utilizes active probing in order to determine the point
of congestion; this point defines the available bandwidth. If the probes are sent at such a high
rate that congestion occurs the probing rate is above the available bandwidth and wise versa if
the probes does not cause congestion the rate is below the available bandwidth. The concept of
active probing is visualized in Figure 65.



Figure 65: Illustration of how BART utilizes active probing.


BART uses the inter-packet strain , shown in Figure 65, as an indicator on whether the
probe packets sent with rate u caused congestion or not. The strain is zero for the uncongested
network and rises linearly with increasing input rate u during overload. For each measurement
sample BART updates the estimate of available bandwidth and bottleneck link capacity using
a Kalman filter.


The BART Kalman filter

In a Kalman filter-based approach [1] the system state X, in this case the available
bandwidth and link capacity, is estimated from repeated measurements of the inter-packet
strain . The system is influenced by a control input u, in this case the probe-packet rate. For
each new measurement sample above zero a new system state estimate
x
is calculated. The
process is illustrated in Figure 66. The update of the old system state using the new
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 63 (64)
measurement sample is done using weights which is based on the variance of the sample as
well as other tunable filter parameters.


Figure 66: The filtering process.

The estimator, depicted in Figure 66, requires a model describing how the system state
X relates to the inter-packet separation strain . The model used in BART is shown in Figure 67.
In principle, the inter-packet strain is zero if the probe-packet rate is below the available
bandwidth while it increases linearly when sending probe packets at increasing rates above the
available bandwidth. The system state X is actually a two field vector describing the sloping line
shown in Figure 67. The definition of the available bandwidth using BART terminology is the
probing rate u that corresponds to the point where deviates from zero.

An additional feature of the underlying model is that it can also be shown that the slope
of the line in the overload range is the inverse of the bottleneck capacity.




Figure 67: The BART measurement model.


Using the model shown in Figure 67, the estimator tries to predict the system state. The
prediction of the system state is then corrected using the measurement sample, if is above
zero. This process is repeated for each new measurement sample thus tracking the available
bandwidth and link capacity in real time.


Evaluation of BART

BART has been evaluated in several scenarios and settings such as in laboratory
networks, over Internet paths and in networks where the bottleneck has been an 802.11b or
HSPA link. Most of the results have been published in academic conferences such as in
references [2-8]. The results indicate that BART estimates the end-to-end available bandwidth
as well as the bottleneck link capacity with the desired accuracy. Further, BART outperforms
u

0
AB
x

x
new

estimator

X
u
system
Project deliverable CELTIC TRAMMS
D4.2 - Broadband bottleneck analysis and capacity planning Public 64 (64)
pathChirp [9] a similar tool that also produces estimates of bandwidth in real time in terms of
accuracy and response to rapid changes in available bandwidth.

Using the model shown in Figure 67, the estimator tries to predict the system state. The
prediction of the system state is then corrected using the measurement sample, if is above
zero. This process is repeated for each new measurement sample thus tracking the available
bandwidth and link capacity in real time.

BART has been evaluated in several scenarios and settings such as in laboratory
networks, over Internet paths and in networks where the bottleneck has been an 802.11b or
HSPA link. Most of the results have been published in academic conferences such as in
references [2-8]. The results indicate that BART estimates the end-to-end available bandwidth
as well as the bottleneck link capacity with the desired accuracy. Further, BART outperforms
pathChirp [9] a similar tool that also produces estimates of bandwidth in real time in terms of
accuracy and response to rapid changes in available bandwidth.




Figure 68: Setting for BART evaluation in operator networkl.



The proposed measurement setup is illustrated in Figure 68. BART measurement
nodes are linked to routers at different places in the operator access network. Traffic-log nodes
are attached to the links using taps (e.g. fiber taps or Ethernet taps depending on network).
Using the BART nodes it is possible to estimate the available bandwidth between the two, and
using log nodes along the network path with taps hooked to the link the true available bandwidth
can be estimated by subtracting the cross-traffic load from the known link capacity. This way,
BART can be evaluated in operational networks having real users.