Pipeline Publishing, Volume 4, Issue 4
This Month's Issue:
Maintaining Network Health
download article in pdf format
last page next page

An Apple A Day...

back to cover
By Tim Young

The coffee was particularly good that morning, and they had ordered just the right number of bagels. Good thing. No one likes a stale bagel. Everyone was assembled in the conference room. The prospectus packets were glossy and perfect. The morning meeting was going smashingly. All that’s left is to bring in the video conference feed from the Vienna office to press a few of the finer points and these potential clients would be sold.

“Coming to us from across the pond we have Klaus Schweitzer. Are you with us, Klaus?”

Problem. Klaus is not with them. The video is pixelated and shabby. The voice feed is filled with jerks, pops, and gaps. Then static. Then silence.

While any good office can laugh off and work around a few technical difficulties, there will no doubt be hell to pay when the phone rings in the service providers’ customer service office. A series of nasty scenes that may have been avoided with proper attention to the health of the network.

How can SPs avoid phone calls from frustrated subscribers (or possibly former subscribers?) like this? Through complete and forward-looking pre-deployment testing, proactive system monitoring, and real-time analysis and fault management.

Look before you leap.

One surefire way to end up in a lurch with your network is to improperly test the network prior to deployment. Basic testing to ensure that all the moving pieces are in order is clearly not enough. This must be done in conjunction with research and analysis that will show that the current network is able to handle not only today's traffic... but tomorrow's as well.

What's more, with the growth and proliferation of denial of service (DoS) attacks, the capacity of the network is an even more crucial component to avoiding downtime and maximizing customer satisfaction. While protection from DoS and DDoS (distributed DoS) attacks can be found in security software from companies like Narus, testing the effects of DoS attacks on the network in a lab environment can also be fantastically useful.

As Marc Robins of Robins Consulting said in a report appearing on the website of, and presumably commissioned by, network testing firm Spirent, prior to deployment:

“...your company has never had access to the volume of communications you are about to introduce to it. How will you ever simulate the load these demanding applications will place on your network? You need a solution

How can SPs avoid phone calls from frustrated subscribers (or possibly former subscribers?) like this?



that can replicate the countless scenarios you will be introducing to your network and help you to understand the process of prioritization and load balancing. You need a holistic testing approach, or your network runs the risk of becoming as fragmented as the voice packets in your CEO's important SIP phone call – just before it gets dropped from the network entirely.”

Through effective use of such testing technology, the likelihood of such scenarios can be minimized.

Keeping an eye on things.

Still, no matter how much planning you do, stuff, to clean up a common phrase, happens. Therefore, real-time network monitoring is essential. There has been a recent push among network monitoring types to sing the praises of NetFlow, and advertise their inclusion of the open (yet still proprietary) network protocol in their solutions. So why the recognition of the Cisco brainchild now? It isn't particularly new.

It's because companies are catching on to how crucial diagnosis really is. Zeus Kerravala of Yankee Group has been quoted as saying, "More intelligent management systems can cut the mean time to identification way down, so use of NetFlow can provide more intelligence." More intelligence is good intelligence.

According to Han Hee Song of the University of Texas and Praveen Yalagandula of HP Labs, “measuring real-time end-to-end network path performance metrics is important for several emerging distributed applications such as content distribution and file sharing systems (e.g., CoDeeN, BitTorrent, and KaZaA), interactive media streaming systems (e.g., Video conference systems such as HP’s Halo and Cisco’s Telepresence), traffic engineering (e.g., for supporting IP Telephony), and overlay networks (e.g., RON and OpenDHT ).” In their paper, “Real-time End-to-end Network Monitoring in Large

article page | 1 | 2 |
last page back to top of page next page
 

© 2006, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.