2nd SIG-PMV Meeting
Table of Contents |
---|
Date
17 May 2017, 09:00 - 17:00 CET.
...
The meeting will be held at the GÉANT Amsterdam Offices.
Registration and Remote Participation
Registration is open for remote participation. Remote participants should use the following information to dial in to the meeting:
...
- Connect over video
https://call.lifesizecloud.com/extension/1973578 - Connecting from a Lifesize conference room system? Just dial 1973578 with the keypad.
- Call in by phone
United Kingdom: +44 1223 750388 extension 1973578
Netherlands: +31 85 888 4440 extension 1973578
United States: +1 (844) 572-5683 extension 1973578 - Additional numbers:
https://call.lifesizecloud.com/numbers
Overview
The aim of the SIG-PMV Meeting is to discuss/share knowledge, expertise in form of scenarios from research, academic ICTs and industry. The motto of the workshop is "Performance Monitoring and Verification - RESEARCH meets OPERATIONS".
...
The meeting will begin with a range of presentations on the above topics. We will also include ample discussion time to allow attendees to review the various scenarios requiring deployment of PMV tools, and to discuss the most appropriate solutions for those scenarios. This discussion will help the SIG in determining the recommendations it wishes to make to the community. We will also discuss what gaps or features may be missing from such tools, with a view to engaging with toolkit developers to improve the state of the art where necessary.
Who should attend?
Researchers, academic ICTs, PERTs of the NRENs and members from industry, vendors who are working on the above scenarios, who are interested in PM&V or would be willing to contribute to the scope above.
Hotels
Many people visiting GÉANT choose to stay at the NH City Centre or the Albus Grand Hotel, as these are both close to the office.
...
**Please note - hotels in Amsterdam seem to be very full on these dates so booking as soon as possible is recommended**.
Agenda
Each presentation is approx 30 mins with 10 mins for discussion/questions.
...
09:30 Welcome and introductions around the table; agenda bashing - [PDF] [PPTX]
Morning Presentation Session
09:50 SIG-PMV Update - Tim Chown, SIG PMV SC - [PDF] [PPTX] (Slides updated with discussion notes post-session)
...
We have been testing the Juniper RPM probes/agents on our Juniper testbed, for L2, L3 or application (HTTP) layer performance measurements. We have some initial (python) code to extract MIB data towards visualising the measurements. We’re interested to see who else in the community is using a similar approach. A Phase 1 deployment may involve configuring measurements from edge routers to specific core routers (which would be presented to site admins as part of our general portal), and Phase 2 may involve dynamic/on-demand configuration of measurements along a specific path to investigate a specific performance issue (initially at least under NOC control). The talk will include an introduction to the RPM framework.
12:30 Lunch (1 hour)
Afternoon Presentation Session
13:30 “Flexible network monitoring at 100Gbps and beyond”, Lukas Kekely - CESNETCESNET [PDF]
As network anomalies, attacks and other incidents are no longer exceptions, monitoring of high-speed links is of utmost importance. CESNET meters are built on NFB-100G2Q card and a commodity server. Each meter is capable of monitoring 100 Gbps Ethernet traffic without packet loss. The functionality of the meter ranges from full packet capture, selective packet capture based on rules, to NetFlow v5, NetFlow v9 and IPFIX flow information export. Moreover, the meter can host any application and deliver packets to the hosted application in a Receive Side Scaling manner.
14:10 “Connectivity Fault Management (CFM)”, Robert Stoy - DFN [PDF]
Connectivity Fault Management (CFM) is a standardised framework that addresses performance monitoring and troubleshooting challenges on Layer-2 end-to-end services, which consist of Layer-2 segments provided by different Layer-2 service providers. The main challenge is the detection of performance degradation and circuit interrupts together with cause localisation using functions directly on Layer-2. Additionally there is the need for alarming, triggering of consequent actions and support for L2 path analysis from end systems. This talk presents first steps, basics on deployment scenarios, use case examples, concrete use cases, config examples and first results from from a small physical test, internal trial at DFN.
...