Distributed Network Monitoring using Mobile Agents Paradigm
|
|
|
- Alexander Matthews
- 10 years ago
- Views:
Transcription
1 Distributed Network Monitoring using Mobile Agents Paradigm Farhad Kamangar, David Levine, Gergely V. Záruba, and Navakiran Chitturi Department of Computer Science and Engineering The University of Texas at Arlington, Texas Abstract. Traditionally network monitoring and management has been done using predominantly centralized techniques. Mobile agents have been proposed as an alternative to this centralized approach. In this paper we propose a novel approach for distributed and dynamic network monitoring, using mobile agents. We use the IBM Aglets system and show how a Java-based distributed network monitoring application can use this paradigm for efficient data collection and analysis and adapt to variations in network characteristics. Keywords: Network Monitoring, Network Management, Mobile Agent, Java, Distributed, Dynamic, Network Modeling, Fault-tolerance and Delegation. 1. Introduction Network monitoring and management has become necessary due to the proliferation of computers and the immense growth of the Internet. Different paradigms have been proposed for network management using mobile agents [1]-[4]. Sahai and Morin [1] proposed an architecture comprising of managers, servers and management agents. The network management load is equally distributed between managers and servers. The servers have replicated databases. The framework uses MAGENTA environment to provide the capability of sending, receiving and storing mobile agents. Gavalas [4] suggests a framework for network monitoring applications using four components: Manager application, Mobile Agent Server (MAS), Mobile Agent Generator (MAG) and Mobile Agents (MA). The manager application co-ordinates monitoring of network elements and has a GUI. The MAS receives, instantiates, executes and dispatches mobile agents. The MAG constructs customized MAs in response to service requirements. Puliafito [2] uses MAP, a platform for development and management for mobile agents, for network management. MAP is MASIF (Mobile Agent System Interoperability Facility) standard compliant. By using MAP services a management application for basic operations
2 of various agents is developed. These agents perform simple tasks but their combination could be used to perform complex management actions. Kona [3] proposes the MAN (Mobile Agent Based Network Management) framework that supports a number of areas like code mobility infrastructure, network simulator and network management tools. The Mobile Code Daemon (MCD) is a process that runs inside a Java Virtual Machine (JVM) on every network element and listens on a UDP or TCP port for requests to receive Java code. In this paper, we propose a new network management framework, which enables us to develop a distributed, dynamic, scalable and fault-tolerant management tool. 2. Proposed Distributed Network Monitoring Architecture We propose an architecture that is highly modular, distributed and fault-tolerant in nature. It includes a GUI Module (GM), Web Access Module (WAM), Manager or Monitor Module (MM) and various Dedicated Mobile Agents (DMA) for different monitoring or management purposes. All these are built to work together in an agent execution environment. We use Aglets, the IBM mobile agent system, for the agent environment. The above modules are built in order to blend into the Tahiti server (Aglet Server AS), which is the Aglets execution environment. We use replicated databases and make the MM itself network-aware thereby increasing flexibility and fault-tolerance. The language used is Java [5] because it has some very useful features like platform independence, secure execution, dynamic class loading, multithread programming, and object serialization How the architecture works The user has access to the monitoring system through the web using the GUI Module (GM). All the queries and management tasks are in the form of HTTP requests [6] and go to the WAM of an agent server (Tahiti). This WAM has been designed to process the HTTP requests and give out appropriate html pages or java applets and also interpret the various monitoring and management requests. The MM has the primary responsibility of monitoring the network. The DMAs are either made to reside on the same server or move around to reside on another host with a Tahiti server according to user preference and proximity to the monitored nodes. The DMAs are mobile and can be retracted from or
3 dispatched to other hosts, deactivated or activated and disposed according to the MM s discretion. Special DMAs are used to move through different machines to collect summary information or do some local processing and take the results along to other hosts in their itinerary. The MM is provided on a few (or all depending on the trade-offs) of the host computers. At any particular instant of time only one MM is the Master MM and others are more dormant in the sense that they are used only to check on the availability of the Tahiti server hosts and do some local assessment of the network conditions. DMAs can be located optimally in order to minimize network traffic incurred by monitoring and the delay in obtaining monitoring data. The system is organized in a hierarchical or a nonhierarchical fashion depending on the type of networks being monitored or managed. In the case of networks consisting of sub-networks, monitoring tasks requiring first the collection and then the aggregation of raw data from each sub-network can be implemented by distributing agents at each intermediate level (co-operating with MMs). Each agent will be in charge of producing the required level of data aggregation for a specific sub-network and providing high-level information to the other agents in the hierarchy. Alternatively, a non-hierarchical MA organization can be used, which is particularly suited to non-hierarchical networks and non-hierarchical monitoring tasks. Using a variety of design patterns, we produce a robust and flexible network monitoring implementation. We have to remember that the life span of a monitoring agent is independent of the computing process that creates it. Figure 1 shows the overall framework for the new distributed network monitoring system.
4 GUI Module Web Browser SNMP Agent Device 1 Http Request/Response Web Access Module (WAM) Manager Module DMA1 DMAn Applications Server Device n Local DB (Replicated) Web Access Module (WAM) Manager Module Http Request/Response Aglet Server Host Computer 1 Web Access Module (WAM) Manager Module Migrating Manager Module during congestion DMA1 DMAn Aglet Server Mobile agents moved here from the active MM s server DMA1 DMAn Aglet Server Host Computer 1 Host Computer 1 SNMP Agent Device 1 SNMP Agent Device n Local DB (Replicated) SNMP Agent Device n Workstation Device n Local DB (Replicated) Figure 1. Framework for the distributed network monitoring system Functionality We provide a brief overview of the functionality of our monitor, which encompasses data collection, statistics, trend analysis, report generation and distribution control Data Collection If a network device has an SNMP daemon running on it then we use SNMP protocol to get specific network performance measures. If a device or host doesn't have SNMP then we make use of other methods (ping, trace route, etc.) to obtain performance measures. Data is
5 collected using Poisson sampling intervals with an upper bound on sampling interval of 3 minutes. This ensures better network state assessment than periodic sampling that is predictable. For each sample collection, the time taken to make a particular query is subtracted from the sample interval. Beyond the relatively raw data collection capability our system will be able to perform statistical computations regularly and on demand. The specific computations performed by any DMA will vary depending on the purpose for which the agent was made initially. In some cases, the agent will perform all the required computations using data collected locally (in its own sphere of control). In other cases an agent may perform some computations, but forward some collected or computed information to another component for additional computations. In yet other cases, the same mobile agent will move over different locations and collect the necessary information based on the user's querys Statistics Statistical summaries can be requested for nodes and/or ports of a node. Simple statistics include utilization, throughput, and error rate computations for SNMP enabled device. Measures such as availability, packet loss, and delay are used for non-snmp devices. The data collected is stored along with the date/time value of when it was collected. Counts or values per unit time and averages per set of unit times are computed. The user may query based on various time units - in seconds, minutes, hours or days. Measurement periods of basic time units, weeks or months are utilized. This aids in summary and report production. Statistical gathering has an optional start and stop time. Peak value of measure and time during measurement period is noted and based on the option a report is generated after each measurement period Trend Analysis It is critical to do long term trend analysis so that the need for costly or complex network upgrades can be predicted well in advance. To properly provide input for trend analysis, the data computed via the methods specified must be collected in a consistent manner over the specified period of time. It is possible to perform trend analysis on utilization, throughput, and error rate at a port or availability at a node. A periodic report is generated
6 which may be specified by the administrator (privileged). Also, thresholds can be specified to cause alarms, for example if utilization reaches a certain level or the rate of utilization increase changes dramatically. A marked increase in error rate or decrease in availability may also trigger an alarm Report Generation A report is generated at a specified rate or at specific times as specified by the user. The user may specify the location where the report will be delivered using a mobile agent for this purpose Configuration Change Control A peer aglet host is able to take over the responsibility of another aglet server if the primary component, or the system in which it resides, become unavailable. This will be facilitated by periodic handshake between the Aglet servers. Also at each server, we monitor utilization of the system s resources on which they reside. If the resource is overutilized, the MM will be notified so that alternate server may be assigned Alarm Management An alarm occurs when a processing node becomes irresponsive or resource used by a specific AS exceeds threshold values. This is done by programming a DMA in such a way that it sends an alarm (in the form of a message) whenever a particular threshold value is compromised. It is also possible to disable the alarm temporarily. The administrator will have control over setting up alarms. The DMA can be configured to listen for traps issued by SNMP agents Graphs Packets are sent periodically or as a Poisson stream. Lost packets are treated as having an infinite delay. Records consisting of <fromipaddress, toipaddress, performance_measure1, performance_measure2, performance_measuren, time> are constantly stored in the local database. Figure 2 shows the graph generated for the roundtrip time taken for a packet from one place to another against time units (a round trip time of 100 signifies that the host is unreachable). If the device is SNMP enabled then we can plot the utilization of a particular interface/port against time or errors against time as shown in Figure 3.
7 120 Roundtrip Time- milliseconds :00 4:48 9:36 14:24 19:12 0:00 Time Figure 2. Average roundtrip packet travel time between two machines. Input % Utilization - milliseconds :00 15:12 16:24 17:36 18:48 20:00 Time (14.00 to hrs) Figure 3. Percentage input utilization of a port Special Scenarios Special scenarios are: congestion, station down, and link down are analyzed in this section.
8 Congestion If a particular host is seen as a bottleneck then, the MM can dispatch a few or all of the DMAs which are running on that host to other hosts and the devices can be monitored from there. This would decrease the amount of traffic at that host thereby eliminating the bottleneck. We implemented one more feature to increase the distributed nature of the overall system, that is, to make the manager module mobile. During periods of extreme congestion at the MM s local machine, and when other MMs are not available to take up the responsibility, the Master MM would move to a new place and start its managing process from there after informing all the concerned hosts and agents Monitoring Station Down When a monitoring station (i.e., a host) goes down, the MM detects the loss through periodic handshake between the various MMs and inventory. The MMs communicate with each other every few minutes to check connectivity to the various hosts. If there is a problem it is reported and stored in the database. An (or paging) alert is sent to the administrator. If the host is not being able to be accessed from any other host then, the MM obtains the local information about the various devices that were being monitored by the down host and prepares appropriate mobile agents to monitor from its own location or from other nearby host and dispatches them accordingly. To check whether the host is up and it s the Tahiti sever that is not responding we use the ordinary Internet ping command Link Down If the host is accessible from a nearby host then the MM sends an alert indicating that the link between the MM and the host in discussion is down. It then sends a message to the nearby host s manager module to take over the handling of the host in question. 3. Monitoring using SNMP and some standard procedures 3.1. For SNMP enabled devices In network monitoring, polling is a frequent operation. In order to indicate a system state, most often an aggregation of multiple variables is required, known as a health function (HF). For example to define the input percentage utilization of an interface we use a
9 broadcast model, namely generate mobile agents with the specific goal and sending them to the AS from where they would monitor the device under discussion. We program the DMA in such way as to sample (all in one packet exchange) the values of ifinoctects, ifoutoctects, and sysuptime. Then, we sample all three again (after some interval) and use the three deltas (differences) to compute this HF for a T1 line [7]: Input % utilization = Delta( ifinoctects) *8 Delta( sysuptime) *154* 2 We compute likewise for the output percentage utilization. Also, in the traditional model, the 3 Object Identifiers (OIDs) are grouped into a single get request packet. This takes a lot of space and a lot of overhead to be passed over the network, while on the other hand we use DMAs, which would compute HFs and pass over only the necessary details, thereby acting as a semantic compressor of large amounts of data. Another major drawback with SNMP is involving bulk transfer of data, like transfer of large SNMP tables. Traditionally, get-next requests are used that adversely impact network resources. With the increase in management information that needs to be transferred, the get-bulk operation could be used, but this has the intricacy of selecting max-repetitions (i.e., the number of rows to be retrieved). Finally the OID scheme contributes to this high overhead of information exchange. Therefore acquiring SNMP table locally (through successive get-next requests) and then encapsulating it before moving to the next host or returning to the manager would be far more efficient [4]. This can be done by strategic placement of the DMAs. We could also apply a filtering function on the selected SNMP tables according to our needs. In addition we could use domain or global level filtering (using the DMAs multi-node itineraries). This is achieved by comparing/merging the results already collected with those that have been just obtained or processed. This way we can prevent processing bottlenecks at the manager and also control the DMA s size from growing rapidly. Regarding the DMA interaction with the SNMP agent, we have used the AdventNet SNMPv1 package freely available on the Internet [8].
10 For detecting a congestion problem, we simply calculate the discard rate. Similarly detecting interface errors gives us an idea of hardware, cable, or line problems. Using IpGroup and ICMPGroup variables we can detect routing problems. Similarly using TCP Group and UDP group we could find the corresponding applications or connections running on the system under consideration. If monitoring of percentage error rates for interfaces of multiple machines is needed an itinerary based DMA is dispatched, which sequentially visits all the machines, interacting with SNMP agents at each individual node. It does local calculations and returns after completing the tour. If conventional centralized SNMP application were used, calculation of the above health functions introduces processing burden at the monitoring station and network traffic overhead Application Monitoring DMAs are effectively used for system monitoring where large amount of system related data are to be collected for analysis later on. DMAs are equipped with the names of hosts to be visited, their pattern of migration through systems and the time frame in which they would be monitoring the visited hosts. We can also monitor the availability of various services such as like HTTP, FTP, SMTP, Telnet, SSH, and IMAP by using standard probes on well-known ports and also calculate transmission delay and other parameters using public domain software like ping and trace route [9] Data Design and Distribution We store information obtained while monitoring along with the time value. Information is stored in various places depending on its type in the agent itself, at a local storage pool, or at remote site to which agents may have access. We use database replication [9][11] for our framework along with information contained within agents in order to provide faulttolerance. In our approach, agents have access to all the data available, via each other. Each agent extracts information from other agents and the database as necessary.
11 Appropriate privileges are implemented to access and modify the required local databases in the agents itinerary and also to access other agents information. 4. Experiments and Results Our major concern is the viability of using mobile agents (i.e., aglets) for a network monitoring application. For this purpose, Aglet latency is measured in an itinerary pattern. Comparison of our approach with the client-server technique is made and the results are shown. We monitor a campus network with multiple LANs. Multiple manager (monitoring) hosts situated in various LANs are provided. The network administrator selects one or more devices and the agent server (i.e., agent host), from where he wishes to conduct the monitoring. The monitoring agent server selection for each particular device is done so that we could minimize the network traffic generated by periodic exchange of management information (requests by the monitoring agent and responses from the devices). Another consideration is the latency involved in moving agents around the network. This is very important when it comes to practical application of a distributed network monitor. Depending on the job, aglet size may vary from very small (lines of code in the order of 10^n where n <=2) to large (number of lines of code = 10^n, n > 2). Dedicated Mobile Agents (DMAs) used for monitoring specific devices over a sample (periodic or based on Poisson distribution) interval are rather small in size where as itinerary (or summary) agents that travel around for collecting requested information are comparatively larger. Therefore the size of an agent is an important factor to consider for efficient design of any application. Latency is influenced by the size of an aglet in two ways. First is the time taken for the movement of the aglet across the network over to other agent servers. The time taken is also influenced by other external factors like geographic location and network congestion. Second, serialization is influenced by the aglet size. Serialization converts a Java object to bytecodes and transmission occurs in the form of a byte stream. Because aglets use object serialization mechanism to prepare for transportation over the network, there is an obvious overhead with increasing size.
12 For these reasons we conducted the following experiments: We measure an agent s time to complete a round-trip around the various agent servers. This provides us a measure for estimating the time required for summary information collection. We also measure the effect of increasing agent size on aglet latency Experiment Setup We have chosen four servers. All servers run Windows 2000 and have the Aglets Software Development Kit (aglets1.1.0) and the Java Virtual Machine (in JDK1.1.8) installed. The first experiment obtained round-trip times of agents traveling around in the network over the various servers. We measure the hop time between various servers to obtain the relevant information over repeated trials. Tables 8.1 shows the results with maximum, minimum and mean hop times over the various trials between different servers in the itinerary. Table 1. Roundtrip time between servers Travel Between Maximum Hop Time (milliseconds) Minimum Hop Time (milliseconds) Mean Hop Time (milliseconds) Server A and Server B Server B and Server C Server C and Server D Server D and Server A The second experiment deals with increasing the aglet size proportionally (in steps of 100 lines of code) and each time measure its effect on the aglets travel time and thus the latency. We regard server A as the machine from which we dispatch the Mover agents using a TimeServer agent. As we stated, server B is in the same LAN that provides for onehop reference measurements. Servers C and D are each located on different networks. In the experiment the TimerServer aglet is created on server A. This aglet spawns a Mover agent and dispatches the mover to server B. The mover aglet moves from the source host to the destination host and back. The TimerServer aglet is responsible for maintaining communication with the mover agent. The Mover agent is disposed off upon its return. The
13 data collected involves two values of time (in milliseconds), one collected at the time of dispatching the mover agent and the other collected just after it returns. By obtaining both the timestamps on the same server (server A) we are able to eliminate any synchronization problems of the system clocks. Similar experiments are carried on for the other servers C and D separately with server A as the reference host. The round-trip time is calculated as an average of the values obtained over 10 trials (this constitutes one run). We now increase the size of the Mover agent in steps and perform the same experiment. We add additional code in such a way that it does not constitute to increase in processing time at the destination. This is done by having a conditional expression evaluated at run-time and placing the extra code inside the if loop of the condition. This condition is used in such a way that it always evaluates to false. Figure 4 shows the roundtrip time from server A to other servers plotted against the aglet size. Roundtrip Time -milli seconds Number of Lines of Code Server B Server C Server D Figure 4. Aglet size Vs roundtrip times from server A to servers B, C and D.
14 4.2. Comparison with Client-Server Techniques In order to show that mobile agents are applicable and also efficient for use in performing basic network management/monitoring functionality, we have compared our system with the basic client-server mechanism. The response times between C/S and mobile agent paradigms are compared as shown in Figure 5. From the machine where the manager is running a DMA is dispatched to retrieve a given number of samples (ranging from 1 to 700) from the router. This DMA resides on an agent server which is one hop away from the router. This way the DMA locally collects the required number of samples and comes back to the agent server where the manager is running. In the client-server technique, SNMP requests are sent continuously from the manager site to the router directly for the desired number of samples and the response packets are received at the manager site continuously. The time taken for both the DMA and the client-server technique to obtain the given number of samples is plotted in Figure 5. These times are calculated from the manager site. We find that the response time for retrieving smaller number of samples is almost similar. But as the number of samples increases, there is a clear advantage of the mobile agent technique. This corroborates that using mobile agents could minimize network latency by reducing the exchange of management information beyond various LANs.
15 Response Time-milliseconds C/S MA Number of samples Figure 5. Response times for various samples using C/S and mobile agents. 5. Conclusions A scalable, fault-tolerant and dynamic network-monitoring tool using the proposed framework was developed. Issues of distributed architectures were discussed and argument that mobile agents are a good way to achieve distributed network monitoring against client-server techniques was made. Experiments were conducted to verify the same. We find that mobile agents are an efficient method of reducing the effects of network latency on the network monitoring application. For collecting large number of network parameter samples, the mobile agent technique was found to outperform the client-server technique when the number of samples is large. We found that over a particular threshold size, the aglet class fails to be loaded. This factor was taken into consideration when devising itinerary agents that travel around the network collecting summary or statistics Future Work Work on making the mobile agents more network aware is in progress, namely, better algorithms for the DMA s to adapt to network variations like population variations
16 (number of nodes to be monitored), spatial variations (stable differences in the quality of different links) and temporal variations (changes in the quality of a link over a period of time). The mobile agents could possess dynamic decision making ability based on various parameters whether to remain stationary, move through a set of machines sequentially or spawn out child agents. Dynamic placement decisions for population and temporal variations can be made based on the mobility policy presented by Brewington, Gray and Moizmi. [12]. To make mobile agents more appealing for network monitoring/management purposes the mobile agent systems should be more scalable, namely, the overhead of agent migration and inter-agent communication could be reduced. In the long run, agent-tracking, debugging and visualization issues could be tackled for improving scalability. Also different services like network-sensing modules would be needed to collect and analyze the host, repository and network conditions and make effective plans for accomplishing a desired operation. More effective planning algorithms using artificial intelligence techniques can be implemented into mobile agent based systems. Finally varied analysis should be carried out in order to identify tradeoffs between scalability, fault-tolerance, implementation complexity and functionality. 6. References [1] A. Sahai, and C. Morin, Towards Distributed and Dynamic Network Management, Proceedings of the 1998 IEEE Network Operations and Management Symposium, vol. 2, pp , New Orleans, USA, February [2] A. Puliafito and O. Tomarchio, Using Mobile Agents to Implement Flexible Network Management Strategies, Computer Communication Journal, vol. 23(8), pp , April [3] M.K. Kona, and C-Z. Xu, A Framework for Network Management Using Mobile Agents, Proceedings of the First IEEE Int'l Workshop on Internet Computing and E-Commerce, San Francisco, USA, April, [4] D. Gavalas, D. Greenwood, M Ghanbari, M. O Mabony, Advanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology, Computer Communications
17 Journal, vol. 23, no. 8, pp , April [5] H.M. Deitel, P.J. Deitel, Java : How to Program, 4 th Edition, Prentice Hall Publishers, August [6] T. Berners-Lee, R. Fielding, and H. Frystyk, RFC 1945, Hypertext Transfer Protocol-- HTTP/1.0, May [7] FAQ-Simple Network Management Protocol Part 1, November [8] AdventNet, November [9] R. Siamwalla, R. Sharma, and S. Keshav, Discovering Internet Topology, Cornell University Report, November [10] M. Wiesman, F. Pedone, A. Schiper, B. Kemme, and G. Alonso, Understanding Replication in Databases and Distributed Systems, Proceedings of the International Conference on Distributed Computing Systems (ICDCS 2000), pp , Taipei, Taiwan, April [11] R. Vlach, Mobile Agents and Databases, Proceedings of DATASEM'99, Masarykova Univerzita, Brno, [12] B. Brewington, G. Gray, and K. Moizmi, Mobile Agents in Distributed Information Retrieval, Intelligent Information Agents, M. Klusch Editor, Springer Verlag, ch
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Secure Network Monitoring System using Mobile Agent
1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 [email protected]
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
SNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
A Study of the Behaviour of the Simple Network Management Protocol
A Study of the Behaviour of the Simple Network Management Protocol Colin Pattinson School of Computing, Leeds Metropolitan University, Beckett Park, Leeds LS6 3QS UK E-Mail : [email protected] The
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper
Nimsoft for Network Monitoring A Nimsoft Service Level Management Solution White Paper Nimsoft for Network Monitoring Table of Contents Nimsoft for Network Monitoring Solution Summary... 3 Solution Overview...
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University
Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
How to Keep Track of Your Network Configuration
The following paper was originally presented at the Seventh System Administration Conference (LISA 93) Monterey, California, November, 1993 How to Keep Track of Your Network Configuration J. Schonwalder
Introduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
Only a few years ago, most networks
By Timon C. Du, Eldon Y. Li, and An-Pin Chang s IN DISTRIBUTED NETWORK MANAGEMENT By helping to disperse centralized network management tasks to subnet hosts, mobile agent technology helps conserve network
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
SQL*Net PERFORMANCE TUNING UTILIZING UNDERLYING NETWORK PROTOCOL
SQL*Net PERFORMANCE TUNING UTILIZING UNDERLYING NETWORK PROTOCOL Gamini Bulumulle ORACLE CORPORATION 5955 T.G. Lee Blvd., Suite 100 Orlando, FL 32822 USA Summary Oracle client/server architecture is a
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
A Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
Lecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
EMS. Trap Collection Active Alarm Alarms sent by E-mail & SMS. Location, status and serial numbers of all assets can be managed and exported
EMS SmartView TM Superior Design with Real-Time Monitor and Control Trap Collection Active Alarm Alarms sent by E-mail & SMS Network Topology Network Element Discovery Network Element Configuration Location,
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS Marietta A. Gittens (Dr. Sadanand Srivastava, Dr. James Gil De Lamadrid) {mgittens, ssrivas, gildelam}@cs.bowiestate.edu
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV
Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
A Heterogeneous Internetworking Model with Enhanced Management and Security Functions
Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
WEB SERVER MONITORING SORIN POPA
WEB SERVER MONITORING SORIN POPA Keywords: monitoring systems, web server, monitoring process Sorin POPA, Associate Professor, PhD. University of Craiova Abstract. This paper introduces web-server monitoring,
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Simulation of an SNMP Agent: Operations, Analysis and Results
International Journal of Electronics and Computer Science Engineering 1919 Available Online at www.ijecse.org ISSN- 2277-1956 Simulation of an SNMP Agent: Operations, Analysis and Results Pradeep Kumar
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
Pre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Development of Monitoring Tools for Measuring Network Performances: A Passive Approach
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,
Multicast monitoring and visualization tools. A. Binczewski R. Krzywania R. apacz
Multicast monitoring and visualization tools A. Binczewski R. Krzywania R. apacz Multicast technology now - briefly Bright aspects: Well-known technology Reduces network traffic and conserves the bandwidth
Alteon Global Server Load Balancing
Alteon Global Server Load Balancing Whitepaper GSLB Operation Overview Major Components Distributed Site Monitoring Distributed Site State Protocol Internet Topology Awareness DNS Authoritative Name Server
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
Cisco WAAS for Isilon IQ
Cisco WAAS for Isilon IQ Integrating Cisco WAAS with Isilon IQ Clustered Storage to Enable the Next-Generation Data Center An Isilon Systems/Cisco Systems Whitepaper January 2008 1 Table of Contents 1.
Configuring SIP Trunk Failover in AOS
6AOSCG0023-29A October 2011 Configuration Guide Configuring SIP Trunk Failover in AOS This configuration guide describes the configuration and implementation of Session Initiation Protocol (SIP) trunk
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
