SlideShare a Scribd company logo
TWAMP Explained
Measuring Performance in IP
Networks
September 2014
TWAMP Explained 2
What is TWAMP
• Two-Way Active Measurement Protocol (IETF RFC 5357)
• Uses active probe packets to measure two-way delay
between two end-points in IP networks
– Timestamps are applied for high accuracy
• Typically does not requires that both end-points
are time-synchronized
– One-way delay measurements require sync.
• Additional capabilities: packet loss ratio,
continuity check, one-way and two-way
packet delay variation
TWAMP Explained 3
TWAMP Test Flow
TWAMP-Control:
1. Connection setup
2. Integrity protection (optional)
3. TWAMP-Control commands
TWAMP-Test:
Sender: sending/receiving probe
packets
Reflector: reflecting probe packets
TWAMP-Control:
1. Stop-Sessions
Server
Session-reflector
Control-client
Session-sender
TWAMP-Control
TWAMP-Test
Controller Responder
TWAMP-Light: TWAMP-Control can be replaced by
management plane, per RFC 5357 Appendix IT-Control
TWAMP Explained 4
TWAMP is mostly suitable for premium
L3 business services (with SLA
guarantees) and for LTE backhaul
service assurance!
• ICMP Echo (“Ping”): Internet Control Message Protocol (IETF RFC 792).
Used for connectivity check and rough roundtrip delay estimations
between any IP devices
• IP SLA: Proprietary Cisco method for measuring performance across
router networks
Other L3 PM Methods
TWAMP Explained 5
Capability TWAMP ICMP echo (Ping)
Original purpose Performance monitoring across
IP networks
Connectivity check,
Basic round-trip delay capability
Monitoring existing
infrastructure
Available in certain routers, NIDs
or probes
Yes
(Widely supported in every NE
and Operating systems)
Transparency through network
elements allowing generic,
robust, predictable test
methodology
Yes
(test based on UDP traffic which
passes through network)
In some cases routers block or
rate limit ICMP
Round trip Delay KPI Yes Insufficient accuracy due to slow
ICMP processing in network
elements
1-way Loss KPI Yes No
1-way delay KPI Yes No
1-way delay variation (PDV) KPI Yes No
TWAMP vs. ICMP Echo (“Ping”)
RAD’s TWAMP
Solution
TWAMP Explained 7
• RAD’s Service Assured Access solution enables end-to end performance
monitoring for IP VPNs (TWAMP) AND L2 PM (Y.1731) for MEF CE 2.0
services
– Unified performance management results across L2 and IP networks
• On-demand or always-on monitoring
• Results displayed in RADview PM Portal
RAD’s TWAMP Solution
for Business Services
IP
Network
L2
Access
L3 Monitoring with TWAMP
RADview
PM Portal
ETX-2
MiNID
HQ
ETX-2
TWAMP RespondersTWAMP Controller
TWAMP Explained 8
• Tight control of mobile backhaul transport networks for SLA assurance to
meet stringent performance requirements in a dynamic LTE environment
• On-demand or always-on monitoring, with presentation in RADview PM
Portal
RAD’s TWAMP Solution for
LTE Backhaul
IP
Network/
Backhaul
L2
Access
L3 Monitoring with TWAMP
RADview
PM Portal
Controller Site
GbE/
10 GbE
ETX-2
MiNID
ETX-2
TWAMP Responders
TWAMP Controllers
TWAMP Explained 9
• Collects KPIs from RAD devices: packet delay (latency), packet delay
variation (jitter), packet loss ratio, throughput
• Enables network behavior analysis with intuitive presentation of
performance results, drill-down to SLA status per KPI
TWAMP PM with RADview Portal
TWAMP Explained 10
• TWAMP is an effective standard-based method for monitoring performance in
IP networks
• Performance guarantees in L3 are now expected for premium business
services and LTE backhaul
• TWAMP support is therefore a critical element in the PM toolbox of service
assurance NIDs
• RAD’s Service Assured Access solution provides full L2 and L3 support for
service delivery and performance monitoring in all form-factors:
TWAMP Takeaways
ETX-2
IP and Carrier
Ethernet Demarcation
MiNID
Miniature
Programmable NID
RADview Performance
Monitoring Portal
V i s i t w w w . r a d . c o m f o r m o r e i n f o r m a t i o n
w w w . r a d . c o m
Ad

More Related Content

What's hot (20)

Volte troubleshooting
Volte troubleshootingVolte troubleshooting
Volte troubleshooting
Jamil Awan
 
LTE Interference troubleshooting guide
LTE Interference troubleshooting guideLTE Interference troubleshooting guide
LTE Interference troubleshooting guide
Klajdi Husi
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
Justin MA (馬嘉昌)
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and Handover
Sitha Sok
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
Aalekh Jain
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
SumanPramanik7
 
LTE and EPC Specifications
LTE and EPC SpecificationsLTE and EPC Specifications
LTE and EPC Specifications
aliirfan04
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
3G4G
 
Ericsson RBS 6000
Ericsson RBS 6000Ericsson RBS 6000
Ericsson RBS 6000
ibrahimnabil17
 
Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
Linh Phạm
 
Lte signaling
Lte signalingLte signaling
Lte signaling
Mansour Naslcheraghi
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
Schwannden Kuo
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
Sofian .
 
Tti bundling in fdd and tdd
Tti bundling in fdd and tddTti bundling in fdd and tdd
Tti bundling in fdd and tdd
Laxman Mewari
 
LTE optimization
LTE optimizationLTE optimization
LTE optimization
جامعة تعز كلية الهندسة وتقنية المعلومات Taiz University Engineering
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
manish_sapra
 
How to dimension user traffic in LTE
How to dimension user traffic in LTEHow to dimension user traffic in LTE
How to dimension user traffic in LTE
Althaf Hussain
 
Anr feature in lte
Anr feature in lteAnr feature in lte
Anr feature in lte
Lokendra Rathore
 
LTE KPI
LTE KPILTE KPI
LTE KPI
Sitha Sok
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements
3G4G
 
Volte troubleshooting
Volte troubleshootingVolte troubleshooting
Volte troubleshooting
Jamil Awan
 
LTE Interference troubleshooting guide
LTE Interference troubleshooting guideLTE Interference troubleshooting guide
LTE Interference troubleshooting guide
Klajdi Husi
 
LTE Call Processing and Handover
LTE Call Processing and HandoverLTE Call Processing and Handover
LTE Call Processing and Handover
Sitha Sok
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
Aalekh Jain
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
SumanPramanik7
 
LTE and EPC Specifications
LTE and EPC SpecificationsLTE and EPC Specifications
LTE and EPC Specifications
aliirfan04
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
3G4G
 
Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
Linh Phạm
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
Sofian .
 
Tti bundling in fdd and tdd
Tti bundling in fdd and tddTti bundling in fdd and tdd
Tti bundling in fdd and tdd
Laxman Mewari
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
manish_sapra
 
How to dimension user traffic in LTE
How to dimension user traffic in LTEHow to dimension user traffic in LTE
How to dimension user traffic in LTE
Althaf Hussain
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements
3G4G
 

Viewers also liked (20)

Ethernet OAM evolution
Ethernet OAM evolutionEthernet OAM evolution
Ethernet OAM evolution
Nir Cohen
 
Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)
Puran Pangeni
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
Nir Cohen
 
[Tripo] 輕鬆架站使用 twamp
[Tripo]   輕鬆架站使用 twamp[Tripo]   輕鬆架站使用 twamp
[Tripo] 輕鬆架站使用 twamp
tripocom
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges
Nir Cohen
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
Nir Cohen
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
Sam Van Loon
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
ADVA
 
harjeet singh 2nd
harjeet singh 2ndharjeet singh 2nd
harjeet singh 2nd
harjeet singh
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016
ADVA
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
Sitha Sok
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task Force
John Loughney
 
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big VideoZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
Sitha Sok
 
Fso free space optic
Fso free space optic Fso free space optic
Fso free space optic
Abel Ngetich
 
Microwave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multibandMicrowave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multiband
Sitha Sok
 
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and TransmissionEmerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Sitha Sok
 
Broadband Cellular Communication (Vol 2 Issue 2)
Broadband Cellular Communication (Vol 2 Issue 2)Broadband Cellular Communication (Vol 2 Issue 2)
Broadband Cellular Communication (Vol 2 Issue 2)
JournalsPub www.journalspub.com
 
Fso
FsoFso
Fso
Shiva Krishna Chandra Shekar
 
Ethernet OAM evolution
Ethernet OAM evolutionEthernet OAM evolution
Ethernet OAM evolution
Nir Cohen
 
Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)Ethernet OAM (fujitsu)
Ethernet OAM (fujitsu)
Puran Pangeni
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
Nir Cohen
 
[Tripo] 輕鬆架站使用 twamp
[Tripo]   輕鬆架站使用 twamp[Tripo]   輕鬆架站使用 twamp
[Tripo] 輕鬆架站使用 twamp
tripocom
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges
Nir Cohen
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
Nir Cohen
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
Sam Van Loon
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
ADVA
 
SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016SD-WAN 2.0: Building a Better SD-WAN, October 2016
SD-WAN 2.0: Building a Better SD-WAN, October 2016
ADVA
 
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
Sitha Sok
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task Force
John Loughney
 
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big VideoZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
Sitha Sok
 
Fso free space optic
Fso free space optic Fso free space optic
Fso free space optic
Abel Ngetich
 
Microwave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multibandMicrowave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multiband
Sitha Sok
 
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and TransmissionEmerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Sitha Sok
 
Ad

Similar to What is-twamp (20)

Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdfDeploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
nimaw11254
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
ethersteve
 
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networksPLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PROIDEA
 
Veryx Product Catalog - ATTEST
Veryx Product Catalog - ATTESTVeryx Product Catalog - ATTEST
Veryx Product Catalog - ATTEST
Veryx Technologies
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
Nir Cohen
 
PLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXPPLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXP
PROIDEA
 
SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2
Dr. Mohieddin Moradi
 
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Tal Lavian Ph.D.
 
S5850 datasheet
S5850 datasheetS5850 datasheet
S5850 datasheet
Teresa Huang
 
S5850 datasheet
S5850 datasheetS5850 datasheet
S5850 datasheet
Teresa Huang
 
S5850 3-datasheet
S5850 3-datasheetS5850 3-datasheet
S5850 3-datasheet
Teresa Huang
 
S5850 3-datasheet
S5850 3-datasheetS5850 3-datasheet
S5850 3-datasheet
Teresa Huang
 
S5850 datasheet
S5850 datasheetS5850 datasheet
S5850 datasheet
Teresa Huang
 
S5850 3-datasheet
S5850 3-datasheetS5850 3-datasheet
S5850 3-datasheet
Teresa Huang
 
WGS-5225-8T2SV Industrial Wall-mount Managed Switch with LCD Touch Screen
WGS-5225-8T2SV  Industrial Wall-mount Managed Switch with LCD Touch ScreenWGS-5225-8T2SV  Industrial Wall-mount Managed Switch with LCD Touch Screen
WGS-5225-8T2SV Industrial Wall-mount Managed Switch with LCD Touch Screen
BluBoxx Communication Pvt. ltd
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptx
Jean Carlos Cruz
 
Enterprise network design multi layer network and security.pptx
Enterprise network design multi layer network and security.pptxEnterprise network design multi layer network and security.pptx
Enterprise network design multi layer network and security.pptx
bipinbhattarai12
 
IGS-5225-4T2S Industrial Managed Ethernet Switch
IGS-5225-4T2S Industrial Managed Ethernet SwitchIGS-5225-4T2S Industrial Managed Ethernet Switch
IGS-5225-4T2S Industrial Managed Ethernet Switch
BluBoxx Communication Pvt. ltd
 
Enhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network ApplianceEnhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network Appliance
Open Networking Summit
 
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless TranslationPerformance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Chunghan Lee
 
Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdfDeploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
Deploying Carrier Ethernet 2.0 services based on Raisecom technology.pdf
nimaw11254
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
ethersteve
 
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networksPLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PROIDEA
 
Veryx Product Catalog - ATTEST
Veryx Product Catalog - ATTESTVeryx Product Catalog - ATTEST
Veryx Product Catalog - ATTEST
Veryx Technologies
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
Nir Cohen
 
PLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXPPLNOG 17 - Marek Janik - Sieć dla IXP
PLNOG 17 - Marek Janik - Sieć dla IXP
PROIDEA
 
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Enabling Active Flow Manipulation (AFM) in Silicon-based Network Forwarding E...
Tal Lavian Ph.D.
 
WGS-5225-8T2SV Industrial Wall-mount Managed Switch with LCD Touch Screen
WGS-5225-8T2SV  Industrial Wall-mount Managed Switch with LCD Touch ScreenWGS-5225-8T2SV  Industrial Wall-mount Managed Switch with LCD Touch Screen
WGS-5225-8T2SV Industrial Wall-mount Managed Switch with LCD Touch Screen
BluBoxx Communication Pvt. ltd
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptx
Jean Carlos Cruz
 
Enterprise network design multi layer network and security.pptx
Enterprise network design multi layer network and security.pptxEnterprise network design multi layer network and security.pptx
Enterprise network design multi layer network and security.pptx
bipinbhattarai12
 
Enhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network ApplianceEnhancing Network Visibility Based On Open Converged Network Appliance
Enhancing Network Visibility Based On Open Converged Network Appliance
Open Networking Summit
 
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless TranslationPerformance Evaluation of GTP-U and SRv6 Stateless Translation
Performance Evaluation of GTP-U and SRv6 Stateless Translation
Chunghan Lee
 
Ad

More from Nir Cohen (14)

Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentation
Nir Cohen
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Nir Cohen
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
Nir Cohen
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networks
Nir Cohen
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guide
Nir Cohen
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Nir Cohen
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
Nir Cohen
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
Nir Cohen
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
Nir Cohen
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
Nir Cohen
 
Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11
Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
Nir Cohen
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentation
Nir Cohen
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Nir Cohen
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
Nir Cohen
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networks
Nir Cohen
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guide
Nir Cohen
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Nir Cohen
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
Nir Cohen
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
Nir Cohen
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
Nir Cohen
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
Nir Cohen
 
Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11
Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
Nir Cohen
 

Recently uploaded (20)

Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT StrategyRisk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
john823664
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Building Connected Agents:  An Overview of Google's ADK and A2A ProtocolBuilding Connected Agents:  An Overview of Google's ADK and A2A Protocol
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Suresh Peiris
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UXPA Boston
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
AI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological ImpactAI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological Impact
SaikatBasu37
 
AI needs Hybrid Cloud - TEC conference 2025.pptx
AI needs Hybrid Cloud - TEC conference 2025.pptxAI needs Hybrid Cloud - TEC conference 2025.pptx
AI needs Hybrid Cloud - TEC conference 2025.pptx
Shikha Srivastava
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT StrategyRisk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
Risk Analysis 101: Using a Risk Analyst to Fortify Your IT Strategy
john823664
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Building Connected Agents:  An Overview of Google's ADK and A2A ProtocolBuilding Connected Agents:  An Overview of Google's ADK and A2A Protocol
Building Connected Agents: An Overview of Google's ADK and A2A Protocol
Suresh Peiris
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdfComputer Systems Quiz Presentation in Purple Bold Style (4).pdf
Computer Systems Quiz Presentation in Purple Bold Style (4).pdf
fizarcse
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Building a research repository that works by Clare Cady
Building a research repository that works by Clare CadyBuilding a research repository that works by Clare Cady
Building a research repository that works by Clare Cady
UXPA Boston
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UX for Data Engineers and Analysts-Designing User-Friendly Dashboards for Non...
UXPA Boston
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
AI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological ImpactAI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological Impact
SaikatBasu37
 
AI needs Hybrid Cloud - TEC conference 2025.pptx
AI needs Hybrid Cloud - TEC conference 2025.pptxAI needs Hybrid Cloud - TEC conference 2025.pptx
AI needs Hybrid Cloud - TEC conference 2025.pptx
Shikha Srivastava
 

What is-twamp

  • 1. TWAMP Explained Measuring Performance in IP Networks September 2014
  • 2. TWAMP Explained 2 What is TWAMP • Two-Way Active Measurement Protocol (IETF RFC 5357) • Uses active probe packets to measure two-way delay between two end-points in IP networks – Timestamps are applied for high accuracy • Typically does not requires that both end-points are time-synchronized – One-way delay measurements require sync. • Additional capabilities: packet loss ratio, continuity check, one-way and two-way packet delay variation
  • 3. TWAMP Explained 3 TWAMP Test Flow TWAMP-Control: 1. Connection setup 2. Integrity protection (optional) 3. TWAMP-Control commands TWAMP-Test: Sender: sending/receiving probe packets Reflector: reflecting probe packets TWAMP-Control: 1. Stop-Sessions Server Session-reflector Control-client Session-sender TWAMP-Control TWAMP-Test Controller Responder TWAMP-Light: TWAMP-Control can be replaced by management plane, per RFC 5357 Appendix IT-Control
  • 4. TWAMP Explained 4 TWAMP is mostly suitable for premium L3 business services (with SLA guarantees) and for LTE backhaul service assurance! • ICMP Echo (“Ping”): Internet Control Message Protocol (IETF RFC 792). Used for connectivity check and rough roundtrip delay estimations between any IP devices • IP SLA: Proprietary Cisco method for measuring performance across router networks Other L3 PM Methods
  • 5. TWAMP Explained 5 Capability TWAMP ICMP echo (Ping) Original purpose Performance monitoring across IP networks Connectivity check, Basic round-trip delay capability Monitoring existing infrastructure Available in certain routers, NIDs or probes Yes (Widely supported in every NE and Operating systems) Transparency through network elements allowing generic, robust, predictable test methodology Yes (test based on UDP traffic which passes through network) In some cases routers block or rate limit ICMP Round trip Delay KPI Yes Insufficient accuracy due to slow ICMP processing in network elements 1-way Loss KPI Yes No 1-way delay KPI Yes No 1-way delay variation (PDV) KPI Yes No TWAMP vs. ICMP Echo (“Ping”)
  • 7. TWAMP Explained 7 • RAD’s Service Assured Access solution enables end-to end performance monitoring for IP VPNs (TWAMP) AND L2 PM (Y.1731) for MEF CE 2.0 services – Unified performance management results across L2 and IP networks • On-demand or always-on monitoring • Results displayed in RADview PM Portal RAD’s TWAMP Solution for Business Services IP Network L2 Access L3 Monitoring with TWAMP RADview PM Portal ETX-2 MiNID HQ ETX-2 TWAMP RespondersTWAMP Controller
  • 8. TWAMP Explained 8 • Tight control of mobile backhaul transport networks for SLA assurance to meet stringent performance requirements in a dynamic LTE environment • On-demand or always-on monitoring, with presentation in RADview PM Portal RAD’s TWAMP Solution for LTE Backhaul IP Network/ Backhaul L2 Access L3 Monitoring with TWAMP RADview PM Portal Controller Site GbE/ 10 GbE ETX-2 MiNID ETX-2 TWAMP Responders TWAMP Controllers
  • 9. TWAMP Explained 9 • Collects KPIs from RAD devices: packet delay (latency), packet delay variation (jitter), packet loss ratio, throughput • Enables network behavior analysis with intuitive presentation of performance results, drill-down to SLA status per KPI TWAMP PM with RADview Portal
  • 10. TWAMP Explained 10 • TWAMP is an effective standard-based method for monitoring performance in IP networks • Performance guarantees in L3 are now expected for premium business services and LTE backhaul • TWAMP support is therefore a critical element in the PM toolbox of service assurance NIDs • RAD’s Service Assured Access solution provides full L2 and L3 support for service delivery and performance monitoring in all form-factors: TWAMP Takeaways ETX-2 IP and Carrier Ethernet Demarcation MiNID Miniature Programmable NID RADview Performance Monitoring Portal V i s i t w w w . r a d . c o m f o r m o r e i n f o r m a t i o n
  • 11. w w w . r a d . c o m