Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Traffic Monitoring on CJK-Network CJK Test-bed 17th CJK NGN-WG 2009.11.16-17 TTC Nobuyuki NAKAMURA and Kei KATO [email protected], [email protected] outline Research overview experiments - between China and Japan Peer to peer connections analysis - Utilization of FFT and Data Mining Further Study & Schedule - Quality Evaluation using Stream mining method Observation of quality degradation to detect degraded points in the network. Appendix. - CEATEC demo CEATEC Japan 2009 10/6-10, at Makuhari-Messe, Japan 2 Research overview Given the situation of interconnectivity among various NGN networks, MPM will become a very important node for traffic observation. We have been investigating the possibility of analyzing network quality by observing traffic at MPM. We will perform monitoring at MPM with the following traffic paths using our monitoring method( Stream Mining ), which is suitable for real-time analysis. Detection of the network anomaly through traffic analysis at MPM with the following steps. <Previous result shown at 16h CJK Meeting> #1 Create Network anomaly by intentionally generating instability to wireless link #2 Collect packets capturing data at MPM (Japan) These packets might contain not only our experiment traffic but also various traffic in CJK test-bed. <Current Status> #3 Extract the packets that relates to network anomaly through our analysis. #4 Detect network anomaly point i.e. instability of wireless link in Japan 3 experiments Main Objectives - To analyze QoS/QoE characteristics by capturing RTP/RTCP traffic To Detect the network quality degradation and the points that such degradation occurred. We mean network degradation by Degradation that occurs with high probability to the flow, which traverses specific network nodes and links Not accidental one Excludes jitter that occurs depending on the characteristics of network itself e.g. Wired or wireless etc. Experiments overview - Created wired and wireless network over CJK testbed, - Case1: Wired-Wired Case2: Wireless-Wired Case3: Wireless-Wireless(local test) Test environment consists of Video Meeting software and network Simulator Software: Com@WILL:Video Meeting Voice(G.711) Bidirectional communications The CLOUD: Network Simulator. packet loss: 3~20% jitter:10~!00ms 4 analysis Objectives of Evaluation - To determine set of parameters that is useful for detecting quality degradation. Phase1: By applying FFT to quality parameters e.g. packet loss, jitter etc., we investigate whether remarkable characteristics can be obtained. Phase2: Investigate set of parameters that is suitable for detecting degradation. Link Failure Router Failure Reference: NAKAMURA and IKADA, “Network Quality Degradation Detection Method by using Network Specification”, IEEE 2009 First International Conference on Emerging Network Intelligence pp.97-102. 5 analysis (cont’d) : FFT - Prepared 3 patterns of traffic data with or without degradation. By applying FFT to these patterns, frequency portion can be obtained. However, it is difficult to determine set of parameters by just looking at frequency. Learning method is needed. . Wireless-Wired (normal) Wireless-Wired (bad) Data Mining - - The map shows result of machine learning by SOM by applying above network characteristics(FFT data) We are now investigating if there’s any status change by mapping characteristics on this map. Mean jitter (After FFT) 6 Further Study & Schedule We apply Stream Mining as real-time analysis method - Approximate Frequency Counts Algorithm One of the Stream mining method Allows extraction of frequently captured characteristics from the stream data Can be applied as quality analysis method by utilizing parameters such as RTCP. Reference: IKADA and HAMAGUCHI, “Approximate Frequency Counts Algorithm for Network Monitoring and Analysis: Improvement of “Lossy Counting””, IEEE 2009 First International Conference on Emerging Network Intelligence pp.9-14. Absolute value of є N 7 Further Study & Schedule (cont’d) ’09 4Q ’10 1Q ’10 2Q ’10 3Q Traffic Monitoring experiments for implementation CJK 18th NGN CEATEC Demo Research manufacturing for experiments evaluation on CJK NW Thank you for your attention. This work is partly supported by the National institute of Information and Communications Technology (NICT). 8 Appendix. CEATEC demo( CEATEC Japan 2009 Oct. 6-10) - Resulted in appealing our CJK activity to IT-related users/vendors/network providers. We showed Video Scene and Voice from China site thorough CJK Network. Thanks to CATR and KDDI lab 9 Collaboration with China and Korea side Objectives - - To generate suitable network for this evaluation by increasing traffic To utilize as much traffic path as possible so as to perform degradation and degraded point detection のtraffic path We would like to prepare test environment to perform evaluation remotely Remote Desktop Need to install 2 PCs(WindowsXP) Web camera for each PCWeb We would like to attach PC to MPM in ETRI to provide Remote Desktop This collaboration will provide remote environment for China and Korea side to utilize CJK testbed!! done Japan Korea Remote Desktop To be done China Remote Desktop Example: Intentionaly generate DDoS-like traffic from Korea to JapanMPM to analyze traffic variation. 10