
ITM Overview Integrated Traffic Monitoring
2 Copyright © 2008 ADTRAN, Inc. 61202880L1-29.1E
ITM Overview
ITM is a method of tracking traffic flow patterns across interfaces on a network. ITM can monitor traffic
flows over both ingress (incoming) and egress (outgoing) interfaces. The traffic flow data is collected and
sent via Netflow 9 (RFC 768) over User Datagram Protocol (UDP) to either an external data collector or
through the internal Top Traffic data collector, analyzing the traffic flow patterns and presenting the
information in an intuitive graphic form.
ITM facilitates network configurations based on previous traffic flow patterns. By monitoring traffic
flows, decisions can be made regarding traffic engineering, traffic profiling, security measures, and quality
of service (QoS) issues. By providing a standardized method of recording, analyzing, and viewing
network traffic flow data, ITM helps network administrators make smart decisions regarding optimal
network configurations.
Traffic Engineering
Traffic engineering involves manipulating routed traffic based on captured traffic flow patterns.
Engineered routes travel through paths that would not have been used if standard routing procedures were
employed, resulting in a routing network that is malleable. By presenting captured traffic flow data, ITM
allows for traffic engineering on a per network basis. The captured traffic flow data aids in the
understanding of beginning-to-end traffic trends, and can be used to route traffic for load distribution
across multiple paths or to re-route traffic to a preferred path.
Traffic Profiling
Traffic can be profiled using ITM’s captured traffic flow data. By recording and analyzing where traffic is
entering and leaving the network, it becomes possible to understand the network traffic trends. Traffic
flow data can be recorded and sorted by interface, ingress/egress, time, protocol, or source/destination.
The traffic flow records present an overall view of the network, revealing where heavy traffic is flowing,
and where network resources should be allocated, both presently and for future network growth.
Security
ITM provides an extra level of network security through captured traffic flow data. Monitoring traffic on
the network reveals anomalies or changes in network behavior that need to be corrected.
Quality of Service
By keeping a record of the heaviest traffic flows, ITM shows bandwidth usage and indicates what type of
traffic is most frequent for certain IP addresses or interfaces, allowing for clear decisions to be made
regarding QoS allocations.
ITM Process
ITM functions by capturing traffic flow data and sending it to an external data collector and/or analyzer or
through the internal Top Traffic data collector. First, ITM captures traffic flow information, which is then
sent to a flow cache. The flow cache stores the information until it expires, at which time it is exported to
the specified data collector/analyzer.
Comentarios a estos manuales