SlideShare a Scribd company logo
1 of 2
Download to read offline
Handling Microbursts
                                                                                                                    Whitepaper


Microbursts
Various data types, flows, and applications often exhibit
behavior with rather high amounts of bursts and jitter when
transported across IP networks. These can be due to the
packetization and packet handling processes within network
switches and routers, or can also be an “as designed” function
of the application and traffic. Some network switches and
routers may also buffer data when sending out mirror or SPAN
ports (used for monitoring and analysis purposes), thereby
introducing severe jitter and bursty behavior. Since the bursts
themselves occur over rather short periods, they are often
referred to as microbursts.




                                                                     Figure 2. Consistently Bursty Traffic

                                                                     Although microbursts may seem counter intuitive, their existence
                                                                     means that, while the apparent utilization of a network or port
                                                                     may appear to be low over a period of 1 second, which is
                                                                     a typical coarse utilization monitor sampling time, there may
                                                                     still be significantly high utilization spikes for short sub-second
                                                                     durations that will not be noticeable when averaged over a 1
                                                                     second period.


                                                                     Effect on Monitoring
                                                                     This places stress on traffic capture devices when used to
                                                                     aggregate, speed convert, or load balance traffic. In the
Figure 1. Intermittently Bursty Traffic applied independently or     case of aggregation from more than one network port into
together as needed by the user depending on the monitoring           fewer monitor ports microbursts the utilized links will become
application.
                                                                     more significant when aggregated to form a higher utilized
                                                                     link – in many cases microbursts on different links may occur,
An example of an application with “as designed” microbursts
                                                                     simultaneously, resulting in much higher microbursts on the
is IPTV, where the video TV channel is being streamed from
                                                                     aggregated monitor port. In the cases of speed conversion and
a central office, and, to enable an “instant channel change”
                                                                     load balancing, from one or more higher-bandwidth network
experience for the end user, video streams for all channels are
                                                                     ports across several lower-bandwidth monitor ports.
buffered somewhere more locally to the premises. Then, when
the user selects a different channel to the one that is being        Normal buffering that exists in traffic capture devices is
watched, the locally buffered channel is blasted to the user         generally unable to cope with such extremely high (although
in a rapid dense burst until the centrally located video source      brief) bursts of oversubscription on the monitor ports, resulting
is able to catch up and switch the stream over for the new           in buffer overflow and loss of monitored packets. The standard
channel. In fact, compressed/encoded video traffic is already        buffering was designed for network traffic profiles that have
bursty by nature, due to the vastly different I, P, and B frame      minimal microbursts and/or have relatively low average
sizes. Another example is the deliberate generation of data          utilization.
bursts to help manage and control congestion through an IP
network, known as burst congestion control, where a network
controlling device allocates bursts of data for specific intervals
over specific routes.
Figure 3. Speed Conversion; Long Inter-Frame/Packet Gap                                         Figure 4 - Speed Conversion; Short Inter-Frame/Packet Gap Bursts


     Solution
     The only way to prevent packet loss in these circumstances is to                                 Besides additional buffering, other methods of addressing bursty
     have ample buffering to smooth out bursty traffic and regulate it                                traffic in the monitoring network include:
     according to the speed of the destination link, i.e. monitor port.
                                                                                                      - Filtering the traffic to reduce the traffic towards the monitor ports
     To address this problem of microbursts, VSS Monitoring’s High                                    that are being oversubscribed
     Data Burst Buffer feature provides a much larger than normal                                     - Balancing the traffic across more monitor ports/tools
     buffer behind network ports, which enhances the ability to handle
     the forwarding of bursty data that grossly exceeds the maximum                                   Measurement
     bandwidth of output ports, without losing any of the packets. This                               If there is uncertainty or doubt at all about the existence of
     applies to when aggregating traffic, load balancing traffic, or                                  microbursts in a network, then measurements may need to be
     speed conversion.                                                                                conducted to confirm this.

     This is achieved by providing between 1000 to 4000 times more                                    VSS Monitoring’s vCapacity™ feature provides the ability
     buffering behind each port than is available, in total, on a normal                              to measure at a sub-millisecond level and record the network
     tap. Although, when smoothing out the bursts and fitting the                                     utilization with a millisecond granularity. This capability will
     packets into each aggregated or load balanced monitor port, the                                  provide evidence of the occurrence of microbursts, and can be
     buffering may introduce some unavoidable additional latency, it                                  used on a continual basis to monitor the ongoing microbursts
     will not introduce any latency during normal traffic patterns without                            activity with your network.
     microbursts.
                                                                                                      The vCapacity feature is available on the Expert editions of VSS’
     The High Data Burst Buffer feature is available on the Expert editions                           Distributed Traffic Capture System range of products.
     of VSS’ Distributed Traffic Capture Systems™ range of products.



                                                         USA                                               Japan                                            China
                                                         (Corporate HQ)                                    + 81 422 26-8831 phone                           + 86 10 6563- 7771 phone
                                                         + 1 650 697 8770 phone                            + 81 422 26-8832 fax                             + 86 10 6563- 7775 fax
                                                         + 1 650 697 8779 fax                              T’s Loft 3F, 1-1-9,                              C519, 5 Floor,
                                                         1850 Gateway Drive, Suite 500                     Nishikubo, Musashino,                            CBD International Tower
                                                         San Mateo, CA 94404                               Tokyo, 180-0013                                  16 Yong’An Dong Li,
                                                         USA                                               Japan                                            Beijing, China 100022
                                                         www.vssmonitoring.com                             www.vssmonitoring.co.jp                          www.vssmonitoring.com.cn


VSS Monitoring, Inc. is the world’s leading innovator of Distributed Traffic Capture Systems™ and network taps, focused on meeting the rapidly evolving requirements of security and performance
conscious network professionals. Distributed Traffic Capture Systems herald a new architecture of network monitoring, one which fundamentally improves its capability and price-performance.

VSS, Distributed Traffic Capture System, vAssure, LinkSafe, 12x4 Distributed Tap and 8x8 Distributed Tap, vCapacity are trademarks or registered trademarks of VSS Monitoring, Inc. in the United
States and other countries. Any other trademarks contained herein are the property of their respective owners.


© Copyright 2003 – 2011. VSS Monitoring Inc. All rights reserved.                                                                                                       1200-20110127.1717r-001

More Related Content

What's hot

Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Ari Zoldan
 

What's hot (18)

White Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI PerspectiveWhite Paper: Analyzing MPLS from an ROI Perspective
White Paper: Analyzing MPLS from an ROI Perspective
 
Mobile data networks
Mobile data networksMobile data networks
Mobile data networks
 
Philippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elementsPhilippe Langlois - Hacking HLR HSS and MME core network elements
Philippe Langlois - Hacking HLR HSS and MME core network elements
 
Overview of Telecommunication networks
Overview of Telecommunication networksOverview of Telecommunication networks
Overview of Telecommunication networks
 
Lte advanced - evolving and expanding into new frontiers
Lte advanced - evolving and expanding into new frontiersLte advanced - evolving and expanding into new frontiers
Lte advanced - evolving and expanding into new frontiers
 
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile CandidateWiMAX II (IEEE 802.16m) as 4G Mobile Candidate
WiMAX II (IEEE 802.16m) as 4G Mobile Candidate
 
VoIP Over Cable Networks
VoIP Over Cable NetworksVoIP Over Cable Networks
VoIP Over Cable Networks
 
New Convergence
New ConvergenceNew Convergence
New Convergence
 
MeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product OverviewMeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product Overview
 
Gsm
GsmGsm
Gsm
 
Gsm training
Gsm trainingGsm training
Gsm training
 
Best Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksBest Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave Networks
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
Mobility is more than BYOD
Mobility is more than BYODMobility is more than BYOD
Mobility is more than BYOD
 
Mobile[1]
Mobile[1]Mobile[1]
Mobile[1]
 
Gprs Tutorial
Gprs TutorialGprs Tutorial
Gprs Tutorial
 
Edge evolution
Edge evolutionEdge evolution
Edge evolution
 
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
 

Similar to Microburst Whitepaper 2011

Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Anand Raj
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
Videoguy
 
SIP Overload Control Problem Statement
SIP Overload Control Problem StatementSIP Overload Control Problem Statement
SIP Overload Control Problem Statement
Victor Pascual Ávila
 

Similar to Microburst Whitepaper 2011 (20)

Deploying Distributed Traffic Capture Systems
Deploying Distributed Traffic Capture SystemsDeploying Distributed Traffic Capture Systems
Deploying Distributed Traffic Capture Systems
 
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
 
Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...Supporting Real-time Traffic: Preparing Your IP Network for ...
Supporting Real-time Traffic: Preparing Your IP Network for ...
 
GoS presentation MBW 2012
GoS presentation MBW 2012GoS presentation MBW 2012
GoS presentation MBW 2012
 
SIP Overload Control Problem Statement
SIP Overload Control Problem StatementSIP Overload Control Problem Statement
SIP Overload Control Problem Statement
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
Noticias Teleco feb2011
Noticias Teleco feb2011Noticias Teleco feb2011
Noticias Teleco feb2011
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Vpls
VplsVpls
Vpls
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
 
Making Sense Of Bandwidth The NetSense Way by Face To Face Live
Making Sense Of Bandwidth The NetSense Way by Face To Face LiveMaking Sense Of Bandwidth The NetSense Way by Face To Face Live
Making Sense Of Bandwidth The NetSense Way by Face To Face Live
 
Review on Data Traffic in Real Time for MANETS
Review on Data Traffic in Real Time for MANETSReview on Data Traffic in Real Time for MANETS
Review on Data Traffic in Real Time for MANETS
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
IRJET - Implementation of VPN, AWS Cloud Enabled Real Time Water Pollution Sy...
IRJET - Implementation of VPN, AWS Cloud Enabled Real Time Water Pollution Sy...IRJET - Implementation of VPN, AWS Cloud Enabled Real Time Water Pollution Sy...
IRJET - Implementation of VPN, AWS Cloud Enabled Real Time Water Pollution Sy...
 
Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
 
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
 
J017246677
J017246677J017246677
J017246677
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
I018135565
I018135565I018135565
I018135565
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 

Microburst Whitepaper 2011

  • 1. Handling Microbursts Whitepaper Microbursts Various data types, flows, and applications often exhibit behavior with rather high amounts of bursts and jitter when transported across IP networks. These can be due to the packetization and packet handling processes within network switches and routers, or can also be an “as designed” function of the application and traffic. Some network switches and routers may also buffer data when sending out mirror or SPAN ports (used for monitoring and analysis purposes), thereby introducing severe jitter and bursty behavior. Since the bursts themselves occur over rather short periods, they are often referred to as microbursts. Figure 2. Consistently Bursty Traffic Although microbursts may seem counter intuitive, their existence means that, while the apparent utilization of a network or port may appear to be low over a period of 1 second, which is a typical coarse utilization monitor sampling time, there may still be significantly high utilization spikes for short sub-second durations that will not be noticeable when averaged over a 1 second period. Effect on Monitoring This places stress on traffic capture devices when used to aggregate, speed convert, or load balance traffic. In the Figure 1. Intermittently Bursty Traffic applied independently or case of aggregation from more than one network port into together as needed by the user depending on the monitoring fewer monitor ports microbursts the utilized links will become application. more significant when aggregated to form a higher utilized link – in many cases microbursts on different links may occur, An example of an application with “as designed” microbursts simultaneously, resulting in much higher microbursts on the is IPTV, where the video TV channel is being streamed from aggregated monitor port. In the cases of speed conversion and a central office, and, to enable an “instant channel change” load balancing, from one or more higher-bandwidth network experience for the end user, video streams for all channels are ports across several lower-bandwidth monitor ports. buffered somewhere more locally to the premises. Then, when the user selects a different channel to the one that is being Normal buffering that exists in traffic capture devices is watched, the locally buffered channel is blasted to the user generally unable to cope with such extremely high (although in a rapid dense burst until the centrally located video source brief) bursts of oversubscription on the monitor ports, resulting is able to catch up and switch the stream over for the new in buffer overflow and loss of monitored packets. The standard channel. In fact, compressed/encoded video traffic is already buffering was designed for network traffic profiles that have bursty by nature, due to the vastly different I, P, and B frame minimal microbursts and/or have relatively low average sizes. Another example is the deliberate generation of data utilization. bursts to help manage and control congestion through an IP network, known as burst congestion control, where a network controlling device allocates bursts of data for specific intervals over specific routes.
  • 2. Figure 3. Speed Conversion; Long Inter-Frame/Packet Gap Figure 4 - Speed Conversion; Short Inter-Frame/Packet Gap Bursts Solution The only way to prevent packet loss in these circumstances is to Besides additional buffering, other methods of addressing bursty have ample buffering to smooth out bursty traffic and regulate it traffic in the monitoring network include: according to the speed of the destination link, i.e. monitor port. - Filtering the traffic to reduce the traffic towards the monitor ports To address this problem of microbursts, VSS Monitoring’s High that are being oversubscribed Data Burst Buffer feature provides a much larger than normal - Balancing the traffic across more monitor ports/tools buffer behind network ports, which enhances the ability to handle the forwarding of bursty data that grossly exceeds the maximum Measurement bandwidth of output ports, without losing any of the packets. This If there is uncertainty or doubt at all about the existence of applies to when aggregating traffic, load balancing traffic, or microbursts in a network, then measurements may need to be speed conversion. conducted to confirm this. This is achieved by providing between 1000 to 4000 times more VSS Monitoring’s vCapacity™ feature provides the ability buffering behind each port than is available, in total, on a normal to measure at a sub-millisecond level and record the network tap. Although, when smoothing out the bursts and fitting the utilization with a millisecond granularity. This capability will packets into each aggregated or load balanced monitor port, the provide evidence of the occurrence of microbursts, and can be buffering may introduce some unavoidable additional latency, it used on a continual basis to monitor the ongoing microbursts will not introduce any latency during normal traffic patterns without activity with your network. microbursts. The vCapacity feature is available on the Expert editions of VSS’ The High Data Burst Buffer feature is available on the Expert editions Distributed Traffic Capture System range of products. of VSS’ Distributed Traffic Capture Systems™ range of products. USA Japan China (Corporate HQ) + 81 422 26-8831 phone + 86 10 6563- 7771 phone + 1 650 697 8770 phone + 81 422 26-8832 fax + 86 10 6563- 7775 fax + 1 650 697 8779 fax T’s Loft 3F, 1-1-9, C519, 5 Floor, 1850 Gateway Drive, Suite 500 Nishikubo, Musashino, CBD International Tower San Mateo, CA 94404 Tokyo, 180-0013 16 Yong’An Dong Li, USA Japan Beijing, China 100022 www.vssmonitoring.com www.vssmonitoring.co.jp www.vssmonitoring.com.cn VSS Monitoring, Inc. is the world’s leading innovator of Distributed Traffic Capture Systems™ and network taps, focused on meeting the rapidly evolving requirements of security and performance conscious network professionals. Distributed Traffic Capture Systems herald a new architecture of network monitoring, one which fundamentally improves its capability and price-performance. VSS, Distributed Traffic Capture System, vAssure, LinkSafe, 12x4 Distributed Tap and 8x8 Distributed Tap, vCapacity are trademarks or registered trademarks of VSS Monitoring, Inc. in the United States and other countries. Any other trademarks contained herein are the property of their respective owners. © Copyright 2003 – 2011. VSS Monitoring Inc. All rights reserved. 1200-20110127.1717r-001