Adding a PIB to the MIB Configuration and integration of advanced monitoring
|
|
- Juliet Goodwin
- 8 years ago
- Views:
Transcription
1 Adding a PIB to the MIB Configuration and integration of advanced monitoring Steven Van den Berghe 1 st Scampi Workshop Amsterdam - 27 January 03
2 What I think I ll be talking about Demand for measurements is growing: complexity is growing diversity is growing Options: one device for every task one part of a device for every task flexible and powerful usage Requirements: unify measurement representation, configuration unify usage No religious war First Scampi Workshop -- Amsterdam
3 What to measure Functionality: observation => diagnostic monitoring Basic monitoring functionality available for ages: ping: calculate round-trip delay and loss by injecting packets in a network SNMP/MIBs/RMoN: add counters etc. to network elements to passively monitor what passes Snort, Ntop: Diagnostics/stats on streams Functionality: reaction => operational measurement One step beyond: automated reaction to monitoring results Policy based management: if <event> then <action> First Scampi Workshop -- Amsterdam
4 Unification? Fault & Anomaly Analysis Network planning TE Network diagnostics Demand Analysis Trajectory Sampling ~ QoS analysis Analyse Individual Flows Analyse Aggregated Flows Analyse Aggregate First Scampi Workshop -- Amsterdam
5 Integrating Monitoring In the Device Network Monitoring Device configuration reporting New type of measurements complete new top-down part in device Flow Exports SNMP like CLI based Web based Counters (conditional) flow capturing Signature Analysis Classification Concatenation to stream First Scampi Workshop -- Amsterdam
6 Requirements What I Have What I Want to Have Application Stats Intrusion Detection Packet Sampling A Single Way to configure report act upon reports First Scampi Workshop -- Amsterdam
7 Big job & Small Blocks From Device istcp? Count Discard Link Source Function isudp? Count From Device Sample 10% istcp? Count Discard else Count First Scampi Workshop -- Amsterdam
8 Unified Access: SCAMPI Applications MAPI Module Organiser Middleware Modified Click OKE Hardware Basic NICs NP External Source App DEV App HW SW First Scampi Workshop -- Amsterdam
9 Functionality Summary N x Input Functional Element N x Output App Flow exports Source DEV App Events HW First Scampi Workshop -- Amsterdam SW Build powerful monitoring constructs from simple elements classifier, sampling (incl. Hashing), flow export optimize intermediate graph object-oriented better suited than functional? Basic Statistics
10 Case: TE Multi-Service Traffic Engineering (TE): accommodate a maximum of multi-service traffic requests by optimally using the available network resources One new keyword : Service monitoring + Old functionality: e.g. driving GUIs for management (e.g. for failure detection and human network analysis etc.) Requires Demand analysis (passive, sampling) QoS-measurements (active, passive, sampling) Network status (passive) Observation + automated operation draft-ietf-tewg-measure First Scampi Workshop -- Amsterdam
11 ietf-rap-feedback Given provisioned objects part of configuration Check stats and report regularly on change on threshold crossing PDP Network Management System PEP Configure Regular Report Conditional Report First Scampi Workshop -- Amsterdam
12 Tunnel Management Set-up monitoring of subnet B demand > 20% On Alarm Re-map and re-configure Subnet A T1 Subnet B T2 20% 80% First Scampi Workshop -- Amsterdam
13 Thank You Any (remaining) questions? First Scampi Workshop -- Amsterdam
14 What I think I ll be talking about Demand for measurements is growing: complexity is growing diversity is growing Requirements: unify measurement representation, configuration unify usage Implemention using a basic-building-blocks method vs. a table-based method First Scampi Workshop -- Amsterdam
The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl
The SCAMPI Scaleable Monitoring Platform for the Internet Baiba Kaskina TERENA baiba@terena.nl Agenda Project overview Project objectives Project partners Work packages Technical information SCAMPI architecture
More informationViete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
More informationLecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
More informationData Analysis Load Balancer
Data Analysis Load Balancer Design Document: Version: 1.0 Last saved by Chris Small April 12, 2010 Abstract: The project is to design a mechanism to load balance network traffic over multiple different
More informationIDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
More informationRanch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
More informationWIALAN Technologies, Inc. Network Monitoring System Overview
WIALAN Technologies, Inc. Network Monitoring System Overview Table of Content I. Introduction... 3 II. Connectivity... 3 III. Monitoring Core Module... 3 Current Status... 3 Reports... 8 System... 11 IV.
More informationA FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
More informationISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
More informationAssignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
More informationPassively Monitoring Networks at Gigabit Speeds Using Commodity Hardware and Open Source Software. Luca Deri January 2003
Passively Monitoring Networks at Gigabit Speeds Using Commodity Hardware and Open Source Software Luca Deri January 2003 Current Situation: Applications Most modern applications are bandwidth hungry (P2P).
More informationSUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
More informationCisco IOS MPLS Management Technology Overview. Enabling Innovative Services. February 2004. 2004 Cisco Systems, Inc. All rights reserved.
Cisco IOS MPLS Management Technology Overview Enabling Innovative Services February 2004 1 Agenda Introduction Problems, challenges, requirements Technology Overview Summary 2 Service Provider Problems
More informationManaged Service For IP VPN Networks
LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks
More informationNet Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationA Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India Sharmasakshi1009@gmail.com,
More informationIPv6 Source Address Validation and Network Safety
OpenFlow+ for IPv6 Source Address Validation Jun Bi Tsinghua University, China Source Address Validation (SAV) Why SAV The current Internet architecture: packet forwarding is only based on destination
More informationSCAMPI Programmable hardware for network monitoring. Masaryk University
SCAMPI Programmable hardware for network monitoring Jiří Novotný Masaryk University Arne Øslebø Uninett Jun 8, 2004 Rhodos SCAMPI overview 2.5 year 5 th Framework
More informationImplementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
More informationNetwork Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
More informationLotWan Appliance User Guide USER GUIDE
LotWan Appliance User Guide USER GUIDE Copyright Information Copyright 2014, Beijing AppEx Networks Corporation The description, illustrations, pictures, methods and other information contain in this document
More informationExperiences Deploying and Operating a Large-Scale Monitoring Infrastructure
1 Experiences Deploying and Operating a Large-Scale Monitoring Infrastructure 25 th NORDUnet conference Arne Øslebø arne.oslebo@uninett.no Outline Background and motivation Typical setup Deployment map
More informationQoS in PAN-OS. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.
QoS in PAN-OS Tech Note PAN-OS 4.1 Revision A Contents Overview... 3 Why QoS... 3 Learn about Applications in your Network... 3 Terms and Concepts... 3 Classification... 3 Priority Queues... 4 Limiting
More informationRUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
More informationSolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
More information"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
More informationNetwork Monitoring and Diagnostics Connected Manufacturing usa.siemens.com/industry Page 1 What is Network Monitoring and Diagnostics? Network Monitoring A system that is constantly monitoring networks
More informationCustomer Network Assessment
--------- Customer Network Assessment Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests...
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationBest Practices on Campus Network Monitoring. Ljubljana, October 20 2011 Vidar Faltinsen, UNINETT
Best Practices on Campus Network Monitoring Ljubljana, October 20 2011 Vidar Faltinsen, UNINETT We are convinced that most campuses do not take the task of measuring and understanding their traffic flows
More informationExtensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
More informationTue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team
Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team This document specifically addresses a subset of interesting netflow export situations to an ntop netflow collector
More informationitvsense Probe M-301/M-304
implementing next generation IT and communications solutions Service Assurance for Digital Video and IP-based Multiplay Networks itvsense Probe M-301/M-304 telecommunication networks it networks research
More informationA guide to using the Policy Hit Accounting Tool to display a graphical representation of policy hits on the network
Policy Hit Accounting Tool Guide A guide to using the Policy Hit Accounting Tool to display a graphical representation of policy hits on the network Introduction Enterasys policy-enabled infrastructure
More informationIMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)
IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such
More information--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.
--------- Virtual Office Network Tests Version 2.0 Revision 1.0 8x8, Inc. 2125 O'Nel Drive San Jose, CA 95131 Phone: 408.727.1885 Fax: 408.980.0432 Contents Important Notes for all Tests... 3 Tests and
More information1 Data Center Infrastructure Remote Monitoring
Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to
More informationRAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
More informationCisco IPS 4200 Series Sensors
Data Sheet Cisco IPS 4200 Series Sensors Cisco IPS 4200 Series Sensors are a core component of the Cisco Self-Defending Network. In today s busy network environments, business continuity relies on efficient
More informationNetwork Performance Channel
Network Performance Channel Net Optics Products Overview MIHAJLO PRERAD, Network Performance Channel GmbH Who we are Network Performance Channel GmbH Leading global value added distributor specialized
More informationWHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
More informationIntroduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS markatos@ics.forth.gr
Introduction to Network Traffic Monitoring -ICS markatos@ics.forth.gr http://www.ics.forth.gr/~markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas () Roadmap Motivation
More informationViSION Status Update. Dan Savu Stefan Stancu. D. Savu - CERN openlab
ViSION Status Update Dan Savu Stefan Stancu D. Savu - CERN openlab 1 Overview Introduction Update on Software Defined Networking ViSION Software Stack HP SDN Controller ViSION Core Framework Load Balancer
More informationNetwork Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
More informationIntrusion Detection System
Intrusion Detection System Amir Hossein Payberah payberah@yahoo.com 1 Contents Intrusion Detection Systems Tripwire Snort 2 IDS (Definition) Intrusion Detection is the process of monitoring the events
More informationOverview of Network Measurement Tools
Overview of Network Measurement Tools Jon M. Dugan Energy Sciences Network Lawrence Berkeley National Laboratory NANOG 43, Brooklyn, NY June 1, 2008 Networking for the Future of Science
More informationNetwork Monitoring with SNMP
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
More informationName. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
More informationCARENET-SE. NOC Tools Review. Communication System Design Summer 2010. Project team. Champion Björn Pehrson Coach Hans Eriksson
NOC Tools Review CARENET-SE Communication System Design Summer 2010 Project team IK2207 Alin Pastrama pastrama@kth.se Champion Björn Pehrson Coach Hans Eriksson IK2207 Annika Holmgren annika.holmgren@gmail.com
More informationMonitoring Android Apps using the logcat and iperf tools. 22 May 2015
Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis katsarakis@csd.uoc.gr Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android
More informationMonitoring Your Network
CHAPTER 17 Date: 3/22/13 When naming ACE objects (such as a real server, virtual server, parameter map, class map, health probe, and so on), enter an alphanumeric string of 1 to 64 characters, which can
More informationNetwork- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
More informationVCS Monitoring and Troubleshooting Using Brocade Network Advisor
VCS Monitoring and Troubleshooting Using Brocade Network Advisor Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products.
More informationReal-Time Performance Monitoring on
APPLICATION NOTE Real-Time Performance Monitoring on Juniper Networks Devices Tips and Tools for Assessing and Analyzing Network Efficiency Copyright 2009, Juniper Networks, Inc. Table of Contents Table
More informationNetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
More informationCOUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
More informationBased on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
More informationISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationInternet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
More informationCisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
More informationCisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
More informationitanalyzer Data Protection Module
itanalyzer Data Protection Module Pablo Horenstein, itanalyzer VP Pre-Sales phorenstein@itanalyzer.net Jan 2015 For further information please contact: Info@iTAnalyzer.net Module Description The module
More informationWHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationMRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
More informationTMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA
For EAD and TDM products Value-Adding Software Licenses ABOUT OneAccess OneAccess designs and develops a range of world-class multiservice routers for over 125 global service provider customers including
More informationImproving Network Efficiency for SMB Through Intelligent Load Balancing
Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business
More informationA Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
More informationALL8894WMP. User s Manual. 8-Port 10/100/1000Mbps with 4-port PoE. Web Management Switch
ALL8894WMP 8-Port 10/100/1000Mbps with 4-port PoE Web Management Switch User s Manual Content Content I Introduction..3 Product Overview.3 Web Management Feature.3 Specification..4 Mechanical...4 Performance...5
More informationUCS Network Utilization Monitoring: Configuration and Best Practice
UCS Network Utilization Monitoring: Configuration and Best Practice Steve McQuerry Technical Marketing Engineer Unified Computing Systems Cisco Systems, Inc. Document Version 1.0 1 Copyright 2013 Cisco
More informationSoftware Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
More informationWiMAX PacketMAX Introducting
WiMAX PacketMAX Introducting Aperto s PacketMAX System PacketMAX 200 & 300 Series: Consumer & Business CPE PacketMAX 5000: Modular Base Station PacketMAX 3000: Stackable Base Station PacketMAX Family of
More informationPacket Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj milosz.marian.hulboj@cern.ch Ryszard Erazm Jurga ryszard.jurga@cern.ch What is Network
More informationHands-on Mac lab Advanced Wireless
Hands-on Mac lab Advanced Wireless Diving into the black art of wireless and making it work for you and your organization Dr. Bill Wiecking Hawai i Preparatory Academy Apple Distinguished Educator wiecking@mac.com
More informationCom.X IP PBX The complete communications solution in a box
IP PBX Utilising VPN security when extending PBX services to remote users Virtual Private Network It is not uncommon for a single company to occupy more than one set of premises. Individual users on geographically
More informationMonitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
More informationProduct description of the docuform Fleet & Service Management software
Product description of the docuform Fleet & Service Management software Contents 1 Introduction and product highlights...3 2 Possibilities for installing the FSM client and FSM server software...5 3 Logging
More informationmbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
More informationIPTV Traffic Monitoring System with IPFIX/PSAMP
IPTV Traffic Monitoring System with IPFIX/PSAMP Shingo Kashima NTT Information Sharing Platform Laboratories 3rd NMRG Workshop 2010 NTT Information Sharing Platform Laboratories Outline Introduction Motivation
More information8000 Intelligent Network Manager
SOLUTION BRIEF 8000 Intelligent Network Manager Improve Profitability and Competitiveness with Operational Efficiency The Coriant 8000 Intelligent Network Manager is a powerful network and service management
More informationMonitoring Log Management and Alerting
Monitoring Log Management and Alerting Services Description February 2009 1 / 24 Contents Monitoring Log Management and Alerting... 1 1. Centralized Management... 3 1.1. Centralized management :... 3 1.2.
More informationActive Network Support Services Demonstration Columbia University, University of California Berkeley, University of California Los Angeles,
Active Network Support Services Demonstration Columbia University, University of California Berkeley, University of California Los Angeles, University of Utah December 6, 2000 Outline Introduction Description
More informationDatabase Replication Error in Cisco Unified Communication Manager
Database Replication Error in Cisco Unified Communication Manager Document ID: 100781 Contents Introduction Prerequisites Requirements Components Used Conventions Use Unifed Reports to Debug Replication
More informationWhatsUp Gold vs. Orion
Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,
More informationLightpath Planning and Monitoring
Lightpath Planning and Monitoring Ronald van der Pol 1, Andree Toonk 2 1 SARA, Kruislaan 415, Amsterdam, 1098 SJ, The Netherlands Tel: +31205928000, Fax: +31206683167, Email: rvdp@sara.nl 2 SARA, Kruislaan
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationOWASP Logging Project - Roadmap
OWASP Logging Project - Roadmap SUMMARY Why log?... 2 What is commonly logged?... 2 What are security logs?... 2 What are the most common issues with logging?... 2 What are the common functions of a log
More informationDetails. Some details on the core concepts:
Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation
More informationIntroduction to Performance Measurements and Monitoring. Vinayak Hegde vinayakh@gmail.com @vinayakh
Introduction to Performance Measurements and Monitoring Vinayak Hegde vinayakh@gmail.com @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationIntroduction. Quick Configuration Guide (QCG) Configuring a VPN for Multiple Subnets in AOS
Quick Configuration Guide (QCG) Configuring a VPN for Multiple Subnets in AOS Introduction After creating a VPN, it is often necessary to have access to a new subnet across the VPN. To add a subnet, there
More informationNetwork Monitoring. RMON-Based vs. Localized Analysis. White paper. w w w. n i k s u n. c o m
Network Monitoring RMON-Based vs. Localized Analysis White paper w w w. n i k s u n. c o m Copyrights and Trademarks NetVCR and NIKSUN are registered trademarks of NIKSUN, Inc. NetReporter, NetDetector,
More informationTELE 301 Network Management
TELE 301 Network Management Lecture 22: Diagnostics & Ethics Haibo Zhang Computer Science, University of Otago TELE301 Lecture 22: Diagnostics & Ethics 1 Fault Management Fault management It means preventing,
More informationSimple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
More informationUsing WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
More informationHardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09
Testen von Embedded Systems Hardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09 Raimund dkirner Testing Embedded Software Testing the whole system including the physical environment is not possible
More informationRedundant Servers. APPolo Redundant Servers User Guide. User Guide. Revision: 1.2 Last Updated: May 2014 Service Contact: service@lynx-technik.
Redundant Servers Revision: 1.2 Last Updated: May 2014 Service Contact: service@lynx-technik.com 2014 LYNXTechnik AG Page 1/8 Contents APPolo Control and Signal Processing... 2 APPolo Server Redundancy...
More informationLOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE
LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE Mandis Beigi, Raymond Jennings, and Dinesh Verma IBM Thomas J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532 e-mail: {mandis,
More information