Traffic monitoring systems in VoIP networks. Part One - Overview

3r3-31. In this article we will try to consider such an interesting and useful element of IT infrastructure as a monitoring system for VoIP-traffic.
Traffic monitoring systems in VoIP networks. Part One - Overview 3r388.
The development of modern telecommunication networks is striking: they have advanced far from signal fires, and what seemed unthinkable earlier is now simple and commonplace. And only professionals know what lies behind everyday life and the wide use of the achievements of the information technology industry. The variety of transmission media, switching methods, protocols of interaction between devices and coding algorithms affects the mind of the average person and can be a real nightmare for anyone who is concerned with their proper and stable operation: passing tonal signals or voice traffic, the inability to register on the softswitch, testing the new equipment, composing contact vendor support.
The above-mentioned concept of a protocol is the cornerstone of any communication network, on which its architecture will depend, the composition and complexity of its constituent devices, the list of services it provides and much more. At the same time, a pattern is obvious, but very important, which consists in the fact that the use of a more flexible signaling protocol improves the scalability of the communication network, which entails a fairly rapid increase in its various network devices.
At the same time, even the necessary and justifiable increase in the number of interconnected network elements within the framework of the noted pattern entails a number of difficulties associated with maintaining the network and its operation. Many experts have encountered a situation where a captured dump does not allow to unambiguously localize the problem that has arisen, since was obtained on that part of the network, which is not involved in its appearance.
This situation is especially characteristic of VoIP networks, which include more devices than one PBX and several IP phones. For example, when the solution uses several border session controllers, flexible switches or one softswitch, but the user’s location function is separate from the others and moved to a separate device. Then the engineer has to choose the following section for analysis, guided by his empirical experience or by chance.
This approach is extremely tedious and unproductive, since it forces us to spend time from time to time to fight the same questions: what will we use to collect packages, how to pick up the result and so on. On the one hand, as you know, a person gets used to everything. You can also get used to this, “get a hand” and train patience. However, on the other hand, there is still another difficulty with which one cannot but reckon - the correlation of the traces taken from different areas. All of the above, as well as many other tasks of the analysis of communication networks, are the subject of many specialists, and traffic monitoring systems are designed to help solve them.
About the systems of monitoring the traffic of communication networks 3r3334
[i] And together we are doing a common thing: you are in your own way, and I am in my own way.
Modern media traffic transmission networks are designed and built through the implementation of various concepts, the foundation of which is a set of telecommunication protocols: CAS, SS? INAP, H.32? SIP, etc. Traffic Monitoring System (SMT) is a tool that is designed to capture messages listed above (and not only) of the protocols, and has a set of convenient, intuitive and informative interfaces for its analysis. The main purpose of SMT is to make signal traces and dumps for any period of time accessible to specialists at any time (including in real time) without using specialized programs (for example, Wireshark). On the other hand, each qualified specialist pays close attention to issues related, for example, to the security of the IT infrastructure.
At the same time, an important aspect that is directly related to this issue is the ability of this specialist to “keep abreast”, which can be achieved, including through timely notification of a particular incident. If the alert issues are mentioned, then we are talking about monitoring the communications network. Returning to the above definition, the SMT allows monitoring of messages, responses and activities that may indicate any abnormal network behavior (for example, 403 or 408 4xx group responses in SIP or a sharp increase in the number of sessions on a trunk), while getting relevant infographics, which clearly illustrates what is happening.
However, it should be noted that the VoIP traffic monitoring system is not originally the classic Fault Monitoring System, which allows you to map networks, control the availability of their elements, resource utilization, peripherals and much more (for example, like Zabbix).
Having dealt with what constitutes a traffic monitoring system, and the tasks that it solves, let us turn to the question of how to apply it for business.
Obvious is the fact that the SMT itself is not able to collect Call Flow "by the command of a bee." To do this, you need to reduce the appropriate traffic from all the devices used in one point - Capture Server. Thus, the written determines the characteristic feature of the system, which is expressed in the need to ensure the centralization of the place where the signal traffic is collected and allows you to answer the above question: what does the use of the complex on the operated or implemented network give?
So, as a rule, rarely an engineer can, as they say, go straight ahead to answer the question of what particular location the specified traffic centralization point will or may be located. For a more or less unambiguous answer, specialists need to conduct a series of surveys related to the subject analysis of the VoIP network. For example, re-clarification of the composition of the equipment, a detailed definition of the points of its inclusion, as well as opportunities in the context of sending the appropriate traffic to the collection point. In addition, it is clear that the success of the solution of the issue under consideration directly depends on the organization of the IP transport network.
Consequently, the first thing that gives the introduction of SMT - this is the same, once planned, but not performed the audit of the network. Of course, the thoughtful reader will immediately ask the question - what is the CMT? There is no direct connection here and there cannot be, but The psychology of most people, including those who are connected with the IT world, is usually inclined to coincide with such events for an event. The next plus stems from the previous one and is that even before the SMT is deployed, Capture Agents are installed and configured, RTCP messages are enabled, any problems that require surgery can be detected. For example, somewhere a “bottleneck” was formed and this is clearly visible without statistics, which, among other things, the SMT can provide, using data provided by, for example, RTCP.
Now let's return to the previously described process of collecting the necessary traces and smile, remembering the words of the hero in the epigraph of this part. An important feature of it, which was not specified, is that, as a rule, the above-mentioned manipulations can be performed by personnel with sufficient qualifications, for example, Core Engineers. On the other hand, the range of issues that can be solved with the help of traces can include so-called routine tasks. For example, determining the reason why the terminal does not register with the installer or client. At the same time, it becomes obvious that the presence of an exceptional possibility of taking dumps from the noted specialists imposes on them the need to perform these production tasks. This is not productive due to the fact that it takes time away from solving other more important issues.
At the same time, in most companies where it is desirable to use a product such as SMT, there is a special unit, whose task list just includes performing routine operations, with the aim of unloading other specialists - service desk, helpdesk or technical support. Also, I will not make a discovery for the reader, if I note that the access of technical support engineers for security and network stability reasons to the most critical nodes is undesirable (although it is quite possible that it is not forbidden), and it is precisely these network elements that contain the most favorable view in terms of dumps. SMT, in view of the fact that it is the central place for gathering traffic and has an intuitive and transparent interface, is fully capable of solving a number of the problems indicated. The only condition is the organization of access to the interface from the workplaces of technical support specialists and, possibly, writing the knowledge base of an article on its use.
In conclusion, we note the most well-known and interesting products that in one way or another fulfill the functionality discussed above, including: Voipmonitor, HOMER SIP Capture, Oracle Communications Monitor, SPIDER. Despite the general approach to organization and deployment, each has its own nuances, subjective positive and negative sides, and all deserve their separate consideration. What will be the subject of further materials. Thank you for your attention! 3r388.
! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e. ): d ()}}} t ("//"""_mediator") () (); 3r3386.
+ 0 -

Comments 9

sohail khatri
sohail khatri 14 May 2019 13:43
Through this post, I know that your good knowledge in playing with all the pieces was very helpful. I notify that this is the first place where I find issues I've been searching for. You have a clever yet attractive way of
sohail khatri
sohail khatri 15 May 2019 14:28
Your blog provided us with valuable information to work with. Each & every tips of your post are awesome. Thanks a lot for sharing. Keep blogging,radon repair cost
sohail khatri
sohail khatri 16 May 2019 10:46
I just couldn't leave your website before telling you that I truly enjoyed the top quality info you present to your visitors? Will be back again frequently to check up on new posts.radon mitigation diy
sohail khatri
sohail khatri 16 May 2019 11:46
Really nice and interesting post. I was looking for this kind of information and enjoyed reading this one. Keep posting. Thanks for sharing.radon levels by zip code wisconsin
noman 18 May 2019 20:53
Writing with style and getting good compliments on the article is quite hard, to be honest.But you've done it so calmly and with so cool feeling and you've nailed the job. This article is possessed with style and I am giving good compliment. Best![url=Https://]profischnell[/url]
sohail khatri
sohail khatri 23 May 2019 11:36
A very awesome blog post. We are really grateful for your blog post. combat, law enforcement You will find a lot of approaches after visiting your post. I was exactly searching for. Thanks for such post and please keep it up. Great work.lasikeyesurgerywagokaki
DJ 24 May 2019 11:11
I am a new user of this site so here i saw multiple articles and posts posted by this site,I curious more interest in some of them hope you will give more information on this topics in your next articles.las  vegas marketing company

I am a new user of this site so here i saw multiple articles and posts posted by this site,I curious more interest in some of them hope you will give more information on this topics in your next articles.las  vegas marketing company
sohail khatri
sohail khatri 11 June 2019 14:15
Your website is really cool and this is a great inspiring article.big tits porn sites

sohail khatri
sohail khatri 21 July 2019 21:36
Thanks, that was a really cool read!Top Kettlebell Workouts

Add comment