SlideShare a Scribd company logo
1 of 8
Download to read offline
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8
White Paper
Building Accurate Traffic Matrices with Demand
Deduction
What a traffic matrix is and how Demand Deduction creates reliable traffic matrices.
Demand Deduction as a proven accurate, complete, and useful traffic simulation.
What You Will Learn
This paper outlines the need for traffic matrices and describes how Demand Deduction works. Traditional
approaches fall short of building accurate, complete traffic matrices.
A network’s traffic matrix is a description, measure, or estimation of the aggregated traffic flows that enter,
traverse, and leave a network. As such, a traffic matrix provides a solid understanding of the nature and levels of
end-to-end traffic demands on a network. Although the need for a traffic matrix is universally recognized,
producing one is often a challenge. Several tools and methods provide windows into network utilization data.
However, each comes with its own limitations, and the resulting network picture is incomplete and inaccurate.
Cisco Systems designed Demand Deduction, a system for traffic matrix estimations that combines network
topology data with a mathematical approach to the analysis of various types of traffic statistics.
Introduction
What Is a Traffic Matrix?
A traffic matrix is a tabulation of end-to-end traffic between ingress and egress points, which can be broken down
by service class when appropriate. Traffic matrices answer critical questions about the network. For instance, for
every ingress point on a network, how much traffic is going to each egress point on that network? For service
providers this could mean determining how much traffic is being exchanged between peering routers on the
network, or how much traffic is going from each autonomous system (AS) to each of the neighboring ASs.
Each traffic matrix has a scope that defines its network edge, and this inherent edge is identified and quantified
according to what is needed to analyze the network.
● Internal traffic matrix: This scope consists of devices that you control. You can narrow or zoom into any
portion of the network. For instance, you could look at the traffic matrix strictly from the point of view of the
network core or expand the analysis to include the provider edge (PE) routers. This internal traffic matrix
does not differentiate between discrete external sources and destinations of traffic if they are similarly
connected to the network. This scope greatly simplifies the analysis and is frequently all that is needed
when determining the impact of changes that occur within the network core.
● External traffic matrix: This scope generally represents an AS-to-AS mesh. When the focus is on
changes that occur nearer to the edges of the network, it may be necessary to expand the scope of the
analysis, and therefore to distinguish between external sources and destinations of traffic. The more
distinction between the external elements, the larger this matrix becomes, and the greater the complexity of
the analysis. External traffic matrices are necessary for certain types of analysis, such as when examining
the impact of traffic failing over or shifting between various Border Gateway Protocol (BGP) peering
locations or the impact of losing an entire border router.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 8
Why Are Traffic Matrices Important?
Traffic matrices indicate why a network’s traffic distribution looks the way it looks, and more importantly, they help
predict what would happen if the network were to change. The changes can be broadly categorized as changes in
topology and in traffic patterns.
Changes in topology include such events as failures, Interior Gateway Protocol (IGP) metric changes,
Multiprotocol Label Switching (MPLS) label switched path (LSP) shifts, and the arrival of new network elements or
the decommissioning of old elements. Changes in traffic patterns include modifications such as growth or
contraction in certain regions of the network, the addition of new customers, the relocation of BGP peering
connections, and event-based traffic bursts.
Without a proper understanding of the network’s traffic matrix, it is very difficult to predict how network traffic will
respond to such changes. Simply put, to know what will happen to the traffic on a given interface when changes
occur, you must know where that traffic is coming from and where it is going. If that interface goes down, for
example, some traffic might move to one interface and the rest to another or to several others, based on that
traffic’s points of ingress and egress.
How to Create a Traffic Matrix
Central to the idea of generating a traffic matrix is the concept of traffic demand, which represents potential traffic
flowing between any two edge points in the network for any given service class (if applicable). Each demand is a
single entry in a traffic matrix that identifies the amount of traffic that enters the network at point A and leaves the
network at point Z. For example, 140 Mbps from er1.datacenter.acme.com to bdr3.nyc.acme.com is a traffic
demand. This traffic enters the network at er1.datacenter.acme.com and traverses the network along a certain
path until it reaches bdr3.nyc.acme.com, whereupon it leaves the network (presumably on its way to an external
AS).
To construct a traffic matrix, you must collect information about all of the traffic and how it traverses the network.
There are several approaches to this, and they can be broadly categorized as direct measurement and estimation.
Direct Measurement
The direct measurement approach builds a traffic matrix by mapping traffic measurements to individual demands.
The theory is that tracking the total amount of traffic between any two routers on a network results in an accurate
representation of the network’s traffic matrix.
Several statistics are traditionally collected and stored, the most common ones being NetFlow, RSVP LSP, and
Label Distribution Protocol (LDP) LSP statistics. In many applications, the difficulty in gathering accurate,
consistent, timely, and complete measurement data has resulted in imprecise and erroneous traffic matrices.
Combining these statistics into a single traffic matrix can likewise be challenging because they do not necessarily
refer to the same sources and destinations or cover the same time period. Cisco offers a scalable alternative in
MATE Collector that solves these problems and provides full, accurate traffic matrices with NetFlow data.
1
The most accurate measurement of traffic statistics is interface statistics, which are easy to capture; there are
myriad ways to do so in a timely and consistent fashion. However, traffic statistics alone do not give the required
information about demand (end-to-end) traffic. They provide information only about interface (point-to-point) traffic.
1
Cisco MATE Collector’s Flow Collection Server offers an accurate, scalable solution to traffic measurement using NetFlow. For
more information, see the MATE Collector data sheet at
http://www.cisco.com/en/US/prod/collateral/wireless/ps11035/ps12971/data_sheet_c78-726637.html
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 8
Estimation
Estimation methods attempt to fit an estimation of the traffic matrix to a set of measurements taken from the
network. If the estimation fits well, it is a reasonable representation of the real network traffic. Although this makes
perfect sense, the obvious challenge is in producing a reasonable estimate.
A variety of traditional estimation techniques exist that produce network models of varying quality. Like direct
measurements, however, they have often proven insufficiently accurate for reasons such as the following.
● Reliance on a set of measurements that is often too limited
● Minimal or unsophisticated view of network topology
● Inability to scale sufficiently to encompass the complexity of real networks
Demand Deduction
To solve the industry problems of building traffic matrices, Cisco has developed a technique called Demand
Deduction. Demand Deduction has been proven in live, complex networks worldwide, producing accurate,
complete, and useful traffic simulations.
What Problem Does Demand Deduction Solve?
Before learning what Demand Deduction does, it is important to understand how demands work when the traffic
matrix and network topology are known. In this scenario, determining the resulting measurements on interfaces,
LSPs, and other paths is straightforward. The amount of traffic passing through an interface is the sum of all traffic
demands whose routes take them through that interface. The same is true for LSPs; the amount of traffic passing
through an LSP is the sum of all traffic demands that ride the LSP at some point in their journey from source to
destination.
If you know where and how much traffic enters and leaves the network (that is, if you know the traffic matrix),
estimating traffic measurements on each interface is simple. Figure 1 illustrates this point.
Figure 1. Traffic Measurements Based on Traffic Entering and Leaving the Network
Demand Demand Traffic Network
ER2 - ER5 4.5 Mbps
ER2 - ER6 3 Mbps
ER3 - ER6 10 Mbps
ER4 - ER1 7 Mbps
Interface Calculated Interface Traffic
CR5 - CR6 13 Mbps
(ER2-ER6 + ER3-ER6)
CR5 - CR4 4.5 Mbps
(ER2-ER5)
CR1 - CR2 3.5 Mbps
(ER4-ER1 ÷ 2)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 8
Conversely, Demand Deduction starts with measured interface traffic and estimates demand traffic. More
specifically, given some data regarding where traffic enters a network and where it exits, as well as various types
of traffic measurements, Demand Deduction estimates a set of demands that would, if combined on this network,
produce a set of measurements at or very near the observed levels. Figure 2 illustrates this point. Here the
measured traffic is available for three interfaces. Demand Deduction uses this information and the topology to
estimate the traffic on the edge routers. Thus, Demand Deduction determines how traffic enters, traverses, and
exits the network and uses this information to produce the observed traffic measurements.
Figure 2. Estimating Traffic on Edge Routers Based on Observed Network Traffic
Interface Measured Interface
Traffic
Network
CR5 - CR6 13 Mbps
CR5 - CR4 4.5 Mbps
CR1 - CR2 3.5 Mbps
Demand Estimated Demand Traffic
ER2 - ER5 To be calculated
ER2 - ER6 To be calculated
ER3 - ER6 To be calculated
ER4 - ER1 To be calculated
How Does Demand Deduction Work?
The calculations can become complex because measurements have varying levels of accuracy and
completeness, and because there is usually more than one possible solution. Cisco’s Demand Deduction uses
mathematical and statistical techniques to address this complexity.
The following examples represent very simple scenarios of how Demand Deduction works at the most basic level.
Even inexact estimates can provide extremely accurate predictions of how traffic ultimately shifts when the
network changes. However, as the amount of data and level of complexity increase, so does Demand Deduction’s
ability to home in on solutions. The same principles demonstrated here apply to large networks.
The simple example in Figure 3 shows the CR1 router connected to the CR2 router with a single circuit carrying
measured traffic of 10 Mbps. Traffic is flowing only left to right, from CR1 to CR2. To determine the demand traffic,
first identify the ingress and egress points of network traffic and pair these into individual demands. The set of all
of these pairings is called a demand mesh. This network contains only a single demand (CR1-CR2), and the
demand mesh contains a single entry. Demand Deduction uses all of this information to deduce that there is only
a single demand on the network, since there is a single demand on this circuit; therefore, the entirety of the traffic
represented by that measurement belongs to this one demand. Thus, the CR1-CR2 demand has 10-Mbps traffic.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 8
Figure 3. Example with Two Routers and a Single Circuit
Increasing the complexity, three edge routers and another core router are discovered (Figure 4). This network has
simple connectivity of a single circuit between routers, and includes the following known information.
● The cost or metric of each circuit is 1.
● The only known measured traffic is 10 Mbps from CR1 to CR2.
● Traffic originates and terminates at the edge routers (ERs), and the core routers (CRs) carry only traffic
originating from or destined for an edge router. Therefore, the demand mesh includes the following
demands.
ER1 - ER2 ER2 - ER3
ER1 - ER3 ER3 - ER1
ER2 - ER1 ER3 - ER2
Figure 4. Example with Three Edge Routers and Three Core Routers
Demand Deduction uses this information to determine all edge-to-edge traffic in the demands. Since the shortest
path between CR1 and CR2 is the direct circuit between them, all traffic from ER1 and ER2 destined for ER3 must
use this circuit. Therefore, the demand traffic from ER1 to ER3 plus the demand traffic from ER2 to ER3 must
equal 10 Mbps, and each of these demands could be anything from 0 to 10 Mbps, provided their sum is 10. Since
Demand Deduction does not have enough data to determine exactly how much traffic each demand has, it
balances the demands and estimates 5 Mbps for each. There is a 5-Mbps margin of error on each demand, but
statistically it is likely that the real error is less than 5 Mbps.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 8
Figure 5. Traffic Flow When a Circuit Failure Occurs
Based on these results, Demand Deduction shows one of its greatest strengths, which is a high level of accuracy
when predicting traffic shifts under failure. In the example shown in Figure 5, the circuit between CR1 and CR2
has failed. Although the demands are estimated at 5 Mbps each, there is 100 percent accuracy in predicting that
10 Mbps of traffic will shift to the alternate path via CR3 as a result of the failure. As you can see, an
understanding of the traffic matrix helps you anticipate the way traffic behaves under changing network conditions.
Even approximations of how the demands are divided along the network edges produce extremely accurate
projections of how traffic shifts when the core network changes. This is because similar traffic near the edges
tends to route similarly, shift similarly, and fail over similarly. Numerous studies have verified this behavior in
practice. For a more detailed look at such empirical studies, see the “Traffic Matrix Estimation on a Large IP
Backbone” white paper at http://www.cisco.com.
After adjustments are made to the traffic collection system, additional traffic measurements are available from the
network. Including this data makes Demand Deduction results even more useful. For example, knowing that the
ER1-CR1 interface traffic is 6 Mbps and the ER2-CR1 interface traffic is 7 Mbps produces a more accurate
estimation of demand traffic because the possible ranges have narrower boundaries. For instance, the ER1-ER3
demand can be no less than 3 Mbps because the maximum value for the ER2-ER3 demand is the full 7 Mbps that
was measured on that interface. However, the demand traffic for ER1-ER3 and ER2-ER3 must still add up to 10
Mbps. For similar reasons, the lowest value possible for the ER2-ER3 demand is 4 Mbps because the highest
possible value for the ER1-ER3 demand is the full 6 Mbps that was measured on that interface.
In this scenario, Demand Deduction again balances ambiguities, essentially splitting the difference and choosing
the value in the middle of the range. The resulting estimations are 4.5 Mbps for the ER1-ER3 demand and 5.5
Mbps for the ER2-ER3 demand (Figure 6). With the additional traffic measurements and narrowed range of
possible demand traffic, the previous 5-Mbps margin of error is now only 1.5 Mbps.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 8
Figure 6. Revised Estimate of Demand Traffic
Interface Measured Interface
Traffic
Network
ER1 - CR1 6.0 Mbps
ER2 - CR1 7.0 Mbps
CR1 - CR2 10.0 Mbps
Demand Estimated Demand Traffic
ER1 - ER3 Must be 3 - 6 Mbps
Estimate 4.5 Mbps
ER2 - ER3 Must be 4 - 7 Mbps
Estimate 5.5 Mbps
As the network increases in complexity and the possibilities multiply, the available data increases as well. In fact,
the entire exercise looks more like solving a system of equations. The larger and more complex the network, the
more expressions there are to solve, though the problem essentially remains the same. In effect, increasing the
complexity of the network often makes solving the problem simpler.
For example, consider Figure 7, in which ER1 is dual-homed to CR1 and CR3. The topology is more complex, but
solving the problem is now easier. ER2 has one shortest path to ER3. ER1 has two equal-cost paths to ER3: one
via CR1 and one via CR3. Therefore, the traffic measured on the CR3-CR2 circuit must come from ER1, and it
must be about 50 percent of the total traffic ER1 is sending to ER3, since the traffic is balanced evenly across both
paths. With this information, Demand Deduction knows exactly what portion of the traffic on the CR1-CR2 circuit
belongs to the ER1-ER3 demand, and that the remaining traffic must be coming from ER2. Also, since Demand
Deduction knows how much traffic ER1 and ER2 are sending ER3, it can calculate how much traffic they are
sending each other. This ability to fill in interface measurements that were not collected is critical, since
measurement sets are often incomplete.
Figure 7. Estimate When ER1 Is Homed to Both CR1 and CR3
Interface Measured Interface Traffic Network
ER1 - CR1 6.0 Mbps
ER2 - CR1 7.0 Mbps
CR1 - CR2 10.0 Mbps
CR3 - CR2 3.0 Mbps
Demand Estimated Demand Traffic
ER1 - ER3 3 Mbps x 2 = 6 Mbps
ER2 - ER3 10 Mbps - 3 Mbps = 7 Mbps
ER1 - ER2 6 Mbps - 3 Mbps = 3 Mbps
ER2 - ER1 7 Mbps - 7 Mbps = 0 Mbps
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 8
Regression Estimates
Once Demand Deduction has combined information about the demand mesh, the network topology, and the
primary source of traffic measurements (usually interface statistics) into a model that fits those measurements as
closely as possible, it then considers other measurement classes to fine-tune the results. This process of adjusting
the primary solution set based on additional measurement data is known as regression, and Demand Deduction
can continue to refine its results by applying successive regression analyses based on a variety of secondary
sources of measurement data. The more data that is available, the better the results are.
For example, assume that Demand Deduction has estimated a set of demands that results in a very close match
to all network interface statistics. Further assume that some tactically deployed traffic-engineering LSPs are
configured throughout the network. Demand Deduction would use the LSP traffic measurements to rebalance the
estimates it has already made such that the demand estimates also result in a close fit with the LSP
measurements. Once the LSP measurements have been matched as closely as possible, Demand Deduction
could continue to narrow down the estimates so that access interface statistics are as closely matched as
possible. Once that calculation is finished, Demand Deduction can then match NetFlow measurements as closely
as possible.
Thus, rolling in additional calculations can enhance an already accurate and useful model based solely on
interface statistics. While direct measurements might not be sufficient on their own, using them in combination
with Demand Deduction can significantly increase the accuracy of the traffic matrix and, even more importantly,
improve the accuracy of the model’s predictions near the edges of the network.
Conclusion
Cisco’s Demand Deduction solves the issues with traditional practices to create accurate, complete traffic
matrices. One of the capabilities that distinguish Demand Deduction is its ability to determine interface
measurements that were not collected. Another is its ability to include and prioritize different traffic sources, which
considerably improves the precision of the traffic matrix. Demand Deduction has been proven effective and has
given service providers the ability to efficiently and accurately plan, design, engineer, and operate large, complex
networks worldwide.
Printed in USA C11-728552-00 06/13

More Related Content

What's hot

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
Itcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorItcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorijcsit
 
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over SatelliteReza Gh
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
 
Stochastic Graph Transformation Systems
Stochastic Graph Transformation SystemsStochastic Graph Transformation Systems
Stochastic Graph Transformation SystemsNitesh Singh
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
 
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...Eswar Publications
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay NodesJPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodeschennaijp
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETIRJET Journal
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 

What's hot (19)

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
Itcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitorItcm a real time internet traffic classifier monitor
Itcm a real time internet traffic classifier monitor
 
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over Satellite
 
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksFlbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
 
Stochastic Graph Transformation Systems
Stochastic Graph Transformation SystemsStochastic Graph Transformation Systems
Stochastic Graph Transformation Systems
 
A340105
A340105A340105
A340105
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
1720 1724
1720 17241720 1724
1720 1724
 
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay NodesJPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANET
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 

Similar to Building Accurate Traffic Matrices with Demand Deduction

A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Cisco Service Provider Mobility
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemIOSR Journals
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Cisco Service Provider Mobility
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNIJARIIT
 

Similar to Building Accurate Traffic Matrices with Demand Deduction (20)

A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
 
1720 1724
1720 17241720 1724
1720 1724
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology System
 
A study on “link
A study on “linkA study on “link
A study on “link
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent Technology
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 

More from Cisco Service Provider Mobility

Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)Cisco Service Provider Mobility
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...Cisco Service Provider Mobility
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperCisco Service Provider Mobility
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Cisco Service Provider Mobility
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)Cisco Service Provider Mobility
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Cisco Service Provider Mobility
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica Cisco Service Provider Mobility
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Cisco Service Provider Mobility
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptCisco Service Provider Mobility
 
Small-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market OverviewSmall-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market OverviewCisco Service Provider Mobility
 
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...Cisco Service Provider Mobility
 

More from Cisco Service Provider Mobility (20)

Cisco quantum policy suite
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suite
 
Cisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based Advertising
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
 
SP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought LeadershipSP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought Leadership
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
 
Small-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market OverviewSmall-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market Overview
 
Evolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDNEvolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDN
 
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Building Accurate Traffic Matrices with Demand Deduction

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 White Paper Building Accurate Traffic Matrices with Demand Deduction What a traffic matrix is and how Demand Deduction creates reliable traffic matrices. Demand Deduction as a proven accurate, complete, and useful traffic simulation. What You Will Learn This paper outlines the need for traffic matrices and describes how Demand Deduction works. Traditional approaches fall short of building accurate, complete traffic matrices. A network’s traffic matrix is a description, measure, or estimation of the aggregated traffic flows that enter, traverse, and leave a network. As such, a traffic matrix provides a solid understanding of the nature and levels of end-to-end traffic demands on a network. Although the need for a traffic matrix is universally recognized, producing one is often a challenge. Several tools and methods provide windows into network utilization data. However, each comes with its own limitations, and the resulting network picture is incomplete and inaccurate. Cisco Systems designed Demand Deduction, a system for traffic matrix estimations that combines network topology data with a mathematical approach to the analysis of various types of traffic statistics. Introduction What Is a Traffic Matrix? A traffic matrix is a tabulation of end-to-end traffic between ingress and egress points, which can be broken down by service class when appropriate. Traffic matrices answer critical questions about the network. For instance, for every ingress point on a network, how much traffic is going to each egress point on that network? For service providers this could mean determining how much traffic is being exchanged between peering routers on the network, or how much traffic is going from each autonomous system (AS) to each of the neighboring ASs. Each traffic matrix has a scope that defines its network edge, and this inherent edge is identified and quantified according to what is needed to analyze the network. ● Internal traffic matrix: This scope consists of devices that you control. You can narrow or zoom into any portion of the network. For instance, you could look at the traffic matrix strictly from the point of view of the network core or expand the analysis to include the provider edge (PE) routers. This internal traffic matrix does not differentiate between discrete external sources and destinations of traffic if they are similarly connected to the network. This scope greatly simplifies the analysis and is frequently all that is needed when determining the impact of changes that occur within the network core. ● External traffic matrix: This scope generally represents an AS-to-AS mesh. When the focus is on changes that occur nearer to the edges of the network, it may be necessary to expand the scope of the analysis, and therefore to distinguish between external sources and destinations of traffic. The more distinction between the external elements, the larger this matrix becomes, and the greater the complexity of the analysis. External traffic matrices are necessary for certain types of analysis, such as when examining the impact of traffic failing over or shifting between various Border Gateway Protocol (BGP) peering locations or the impact of losing an entire border router.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 8 Why Are Traffic Matrices Important? Traffic matrices indicate why a network’s traffic distribution looks the way it looks, and more importantly, they help predict what would happen if the network were to change. The changes can be broadly categorized as changes in topology and in traffic patterns. Changes in topology include such events as failures, Interior Gateway Protocol (IGP) metric changes, Multiprotocol Label Switching (MPLS) label switched path (LSP) shifts, and the arrival of new network elements or the decommissioning of old elements. Changes in traffic patterns include modifications such as growth or contraction in certain regions of the network, the addition of new customers, the relocation of BGP peering connections, and event-based traffic bursts. Without a proper understanding of the network’s traffic matrix, it is very difficult to predict how network traffic will respond to such changes. Simply put, to know what will happen to the traffic on a given interface when changes occur, you must know where that traffic is coming from and where it is going. If that interface goes down, for example, some traffic might move to one interface and the rest to another or to several others, based on that traffic’s points of ingress and egress. How to Create a Traffic Matrix Central to the idea of generating a traffic matrix is the concept of traffic demand, which represents potential traffic flowing between any two edge points in the network for any given service class (if applicable). Each demand is a single entry in a traffic matrix that identifies the amount of traffic that enters the network at point A and leaves the network at point Z. For example, 140 Mbps from er1.datacenter.acme.com to bdr3.nyc.acme.com is a traffic demand. This traffic enters the network at er1.datacenter.acme.com and traverses the network along a certain path until it reaches bdr3.nyc.acme.com, whereupon it leaves the network (presumably on its way to an external AS). To construct a traffic matrix, you must collect information about all of the traffic and how it traverses the network. There are several approaches to this, and they can be broadly categorized as direct measurement and estimation. Direct Measurement The direct measurement approach builds a traffic matrix by mapping traffic measurements to individual demands. The theory is that tracking the total amount of traffic between any two routers on a network results in an accurate representation of the network’s traffic matrix. Several statistics are traditionally collected and stored, the most common ones being NetFlow, RSVP LSP, and Label Distribution Protocol (LDP) LSP statistics. In many applications, the difficulty in gathering accurate, consistent, timely, and complete measurement data has resulted in imprecise and erroneous traffic matrices. Combining these statistics into a single traffic matrix can likewise be challenging because they do not necessarily refer to the same sources and destinations or cover the same time period. Cisco offers a scalable alternative in MATE Collector that solves these problems and provides full, accurate traffic matrices with NetFlow data. 1 The most accurate measurement of traffic statistics is interface statistics, which are easy to capture; there are myriad ways to do so in a timely and consistent fashion. However, traffic statistics alone do not give the required information about demand (end-to-end) traffic. They provide information only about interface (point-to-point) traffic. 1 Cisco MATE Collector’s Flow Collection Server offers an accurate, scalable solution to traffic measurement using NetFlow. For more information, see the MATE Collector data sheet at http://www.cisco.com/en/US/prod/collateral/wireless/ps11035/ps12971/data_sheet_c78-726637.html
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 8 Estimation Estimation methods attempt to fit an estimation of the traffic matrix to a set of measurements taken from the network. If the estimation fits well, it is a reasonable representation of the real network traffic. Although this makes perfect sense, the obvious challenge is in producing a reasonable estimate. A variety of traditional estimation techniques exist that produce network models of varying quality. Like direct measurements, however, they have often proven insufficiently accurate for reasons such as the following. ● Reliance on a set of measurements that is often too limited ● Minimal or unsophisticated view of network topology ● Inability to scale sufficiently to encompass the complexity of real networks Demand Deduction To solve the industry problems of building traffic matrices, Cisco has developed a technique called Demand Deduction. Demand Deduction has been proven in live, complex networks worldwide, producing accurate, complete, and useful traffic simulations. What Problem Does Demand Deduction Solve? Before learning what Demand Deduction does, it is important to understand how demands work when the traffic matrix and network topology are known. In this scenario, determining the resulting measurements on interfaces, LSPs, and other paths is straightforward. The amount of traffic passing through an interface is the sum of all traffic demands whose routes take them through that interface. The same is true for LSPs; the amount of traffic passing through an LSP is the sum of all traffic demands that ride the LSP at some point in their journey from source to destination. If you know where and how much traffic enters and leaves the network (that is, if you know the traffic matrix), estimating traffic measurements on each interface is simple. Figure 1 illustrates this point. Figure 1. Traffic Measurements Based on Traffic Entering and Leaving the Network Demand Demand Traffic Network ER2 - ER5 4.5 Mbps ER2 - ER6 3 Mbps ER3 - ER6 10 Mbps ER4 - ER1 7 Mbps Interface Calculated Interface Traffic CR5 - CR6 13 Mbps (ER2-ER6 + ER3-ER6) CR5 - CR4 4.5 Mbps (ER2-ER5) CR1 - CR2 3.5 Mbps (ER4-ER1 ÷ 2)
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 8 Conversely, Demand Deduction starts with measured interface traffic and estimates demand traffic. More specifically, given some data regarding where traffic enters a network and where it exits, as well as various types of traffic measurements, Demand Deduction estimates a set of demands that would, if combined on this network, produce a set of measurements at or very near the observed levels. Figure 2 illustrates this point. Here the measured traffic is available for three interfaces. Demand Deduction uses this information and the topology to estimate the traffic on the edge routers. Thus, Demand Deduction determines how traffic enters, traverses, and exits the network and uses this information to produce the observed traffic measurements. Figure 2. Estimating Traffic on Edge Routers Based on Observed Network Traffic Interface Measured Interface Traffic Network CR5 - CR6 13 Mbps CR5 - CR4 4.5 Mbps CR1 - CR2 3.5 Mbps Demand Estimated Demand Traffic ER2 - ER5 To be calculated ER2 - ER6 To be calculated ER3 - ER6 To be calculated ER4 - ER1 To be calculated How Does Demand Deduction Work? The calculations can become complex because measurements have varying levels of accuracy and completeness, and because there is usually more than one possible solution. Cisco’s Demand Deduction uses mathematical and statistical techniques to address this complexity. The following examples represent very simple scenarios of how Demand Deduction works at the most basic level. Even inexact estimates can provide extremely accurate predictions of how traffic ultimately shifts when the network changes. However, as the amount of data and level of complexity increase, so does Demand Deduction’s ability to home in on solutions. The same principles demonstrated here apply to large networks. The simple example in Figure 3 shows the CR1 router connected to the CR2 router with a single circuit carrying measured traffic of 10 Mbps. Traffic is flowing only left to right, from CR1 to CR2. To determine the demand traffic, first identify the ingress and egress points of network traffic and pair these into individual demands. The set of all of these pairings is called a demand mesh. This network contains only a single demand (CR1-CR2), and the demand mesh contains a single entry. Demand Deduction uses all of this information to deduce that there is only a single demand on the network, since there is a single demand on this circuit; therefore, the entirety of the traffic represented by that measurement belongs to this one demand. Thus, the CR1-CR2 demand has 10-Mbps traffic.
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 8 Figure 3. Example with Two Routers and a Single Circuit Increasing the complexity, three edge routers and another core router are discovered (Figure 4). This network has simple connectivity of a single circuit between routers, and includes the following known information. ● The cost or metric of each circuit is 1. ● The only known measured traffic is 10 Mbps from CR1 to CR2. ● Traffic originates and terminates at the edge routers (ERs), and the core routers (CRs) carry only traffic originating from or destined for an edge router. Therefore, the demand mesh includes the following demands. ER1 - ER2 ER2 - ER3 ER1 - ER3 ER3 - ER1 ER2 - ER1 ER3 - ER2 Figure 4. Example with Three Edge Routers and Three Core Routers Demand Deduction uses this information to determine all edge-to-edge traffic in the demands. Since the shortest path between CR1 and CR2 is the direct circuit between them, all traffic from ER1 and ER2 destined for ER3 must use this circuit. Therefore, the demand traffic from ER1 to ER3 plus the demand traffic from ER2 to ER3 must equal 10 Mbps, and each of these demands could be anything from 0 to 10 Mbps, provided their sum is 10. Since Demand Deduction does not have enough data to determine exactly how much traffic each demand has, it balances the demands and estimates 5 Mbps for each. There is a 5-Mbps margin of error on each demand, but statistically it is likely that the real error is less than 5 Mbps.
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 8 Figure 5. Traffic Flow When a Circuit Failure Occurs Based on these results, Demand Deduction shows one of its greatest strengths, which is a high level of accuracy when predicting traffic shifts under failure. In the example shown in Figure 5, the circuit between CR1 and CR2 has failed. Although the demands are estimated at 5 Mbps each, there is 100 percent accuracy in predicting that 10 Mbps of traffic will shift to the alternate path via CR3 as a result of the failure. As you can see, an understanding of the traffic matrix helps you anticipate the way traffic behaves under changing network conditions. Even approximations of how the demands are divided along the network edges produce extremely accurate projections of how traffic shifts when the core network changes. This is because similar traffic near the edges tends to route similarly, shift similarly, and fail over similarly. Numerous studies have verified this behavior in practice. For a more detailed look at such empirical studies, see the “Traffic Matrix Estimation on a Large IP Backbone” white paper at http://www.cisco.com. After adjustments are made to the traffic collection system, additional traffic measurements are available from the network. Including this data makes Demand Deduction results even more useful. For example, knowing that the ER1-CR1 interface traffic is 6 Mbps and the ER2-CR1 interface traffic is 7 Mbps produces a more accurate estimation of demand traffic because the possible ranges have narrower boundaries. For instance, the ER1-ER3 demand can be no less than 3 Mbps because the maximum value for the ER2-ER3 demand is the full 7 Mbps that was measured on that interface. However, the demand traffic for ER1-ER3 and ER2-ER3 must still add up to 10 Mbps. For similar reasons, the lowest value possible for the ER2-ER3 demand is 4 Mbps because the highest possible value for the ER1-ER3 demand is the full 6 Mbps that was measured on that interface. In this scenario, Demand Deduction again balances ambiguities, essentially splitting the difference and choosing the value in the middle of the range. The resulting estimations are 4.5 Mbps for the ER1-ER3 demand and 5.5 Mbps for the ER2-ER3 demand (Figure 6). With the additional traffic measurements and narrowed range of possible demand traffic, the previous 5-Mbps margin of error is now only 1.5 Mbps.
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 8 Figure 6. Revised Estimate of Demand Traffic Interface Measured Interface Traffic Network ER1 - CR1 6.0 Mbps ER2 - CR1 7.0 Mbps CR1 - CR2 10.0 Mbps Demand Estimated Demand Traffic ER1 - ER3 Must be 3 - 6 Mbps Estimate 4.5 Mbps ER2 - ER3 Must be 4 - 7 Mbps Estimate 5.5 Mbps As the network increases in complexity and the possibilities multiply, the available data increases as well. In fact, the entire exercise looks more like solving a system of equations. The larger and more complex the network, the more expressions there are to solve, though the problem essentially remains the same. In effect, increasing the complexity of the network often makes solving the problem simpler. For example, consider Figure 7, in which ER1 is dual-homed to CR1 and CR3. The topology is more complex, but solving the problem is now easier. ER2 has one shortest path to ER3. ER1 has two equal-cost paths to ER3: one via CR1 and one via CR3. Therefore, the traffic measured on the CR3-CR2 circuit must come from ER1, and it must be about 50 percent of the total traffic ER1 is sending to ER3, since the traffic is balanced evenly across both paths. With this information, Demand Deduction knows exactly what portion of the traffic on the CR1-CR2 circuit belongs to the ER1-ER3 demand, and that the remaining traffic must be coming from ER2. Also, since Demand Deduction knows how much traffic ER1 and ER2 are sending ER3, it can calculate how much traffic they are sending each other. This ability to fill in interface measurements that were not collected is critical, since measurement sets are often incomplete. Figure 7. Estimate When ER1 Is Homed to Both CR1 and CR3 Interface Measured Interface Traffic Network ER1 - CR1 6.0 Mbps ER2 - CR1 7.0 Mbps CR1 - CR2 10.0 Mbps CR3 - CR2 3.0 Mbps Demand Estimated Demand Traffic ER1 - ER3 3 Mbps x 2 = 6 Mbps ER2 - ER3 10 Mbps - 3 Mbps = 7 Mbps ER1 - ER2 6 Mbps - 3 Mbps = 3 Mbps ER2 - ER1 7 Mbps - 7 Mbps = 0 Mbps
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 8 Regression Estimates Once Demand Deduction has combined information about the demand mesh, the network topology, and the primary source of traffic measurements (usually interface statistics) into a model that fits those measurements as closely as possible, it then considers other measurement classes to fine-tune the results. This process of adjusting the primary solution set based on additional measurement data is known as regression, and Demand Deduction can continue to refine its results by applying successive regression analyses based on a variety of secondary sources of measurement data. The more data that is available, the better the results are. For example, assume that Demand Deduction has estimated a set of demands that results in a very close match to all network interface statistics. Further assume that some tactically deployed traffic-engineering LSPs are configured throughout the network. Demand Deduction would use the LSP traffic measurements to rebalance the estimates it has already made such that the demand estimates also result in a close fit with the LSP measurements. Once the LSP measurements have been matched as closely as possible, Demand Deduction could continue to narrow down the estimates so that access interface statistics are as closely matched as possible. Once that calculation is finished, Demand Deduction can then match NetFlow measurements as closely as possible. Thus, rolling in additional calculations can enhance an already accurate and useful model based solely on interface statistics. While direct measurements might not be sufficient on their own, using them in combination with Demand Deduction can significantly increase the accuracy of the traffic matrix and, even more importantly, improve the accuracy of the model’s predictions near the edges of the network. Conclusion Cisco’s Demand Deduction solves the issues with traditional practices to create accurate, complete traffic matrices. One of the capabilities that distinguish Demand Deduction is its ability to determine interface measurements that were not collected. Another is its ability to include and prioritize different traffic sources, which considerably improves the precision of the traffic matrix. Demand Deduction has been proven effective and has given service providers the ability to efficiently and accurately plan, design, engineer, and operate large, complex networks worldwide. Printed in USA C11-728552-00 06/13