Packet Sampling and Network Monitoring
|
|
|
- Ashlyn Stephens
- 10 years ago
- Views:
Transcription
1 Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj Ryszard Erazm Jurga
2 What is Network Monitoring? Network Health Inspection Observation and analysis of following objects: Network devices End systems Network links Network traffic Network applications CERN openlab presentation
3 Why Network Monitoring (1) Networks are getting more complex and harder to comprehend Networks are a business-critical element Occurrence of problems in any network is inevitable: Increasing configuration and topology complexity Increasing number and complexity of threats, attacks, viruses, etc. Conclusion: It is just a matter of time Detect the problems as early as possible Reduce the unavailability time CERN openlab presentation
4 Network Statistics: Why Network Monitoring (2) Identification of performance characteristics: For traffic engineering (pkt/s, bytes/s, connections/s, flows, traffic matrix) QoS metrics, latency, bandwidth (SLA, billing) Planning (busiest services, traffic distribution, throughput) Network Inventory: Identification of equipment on the network Troubleshooting: Failures of interface cards, power supplies Connectivity problems Service availability CERN openlab presentation
5 Why Network Monitoring (3) Accounting User activity Security Policy violations: Unauthorised services, machines Unauthorised access Unauthorised applications (e.g. p2p) Intrusion detection Compromised hosts detection Protection against cyberattacks, worms, etc. CERN openlab presentation
6 Performance Problem CERN openlab presentation
7 Packet Analysis - old methods (1) Sniffing in the old times ( old shared Ethernet ) Slow network speed Captures everything (all packets+payload) Old shared Ethernet is a history CERN openlab presentation
8 Packet Analysis modern methods (2) Port mirroring: Captures all the traffic (per port, group, VLAN, etc) Requires HW support Requires fast network interface Problematic determination of originating port Network device-based data: Captures (partial) data from selected ports Sampled packet data Sampled flow data Requires HW support Port mirroring CERN openlab presentation
9 Other Common Sources of Data (1) SNMP Operations via simple variable manipulation Standard mean for retrieving generic statistics, network status, etc: Packet arrival and departure rates, packet top rates, error rates, system load, etc. Used also for network configuration Cannot customise monitored variables within agent Different vendors use different proprietary MIBs for detailed information CERN openlab presentation
10 Other Common Sources of Data (2) RMON and RMON2 Extension of the basic set of SNMP Remote data collection and processing RMON2 decodes packets at layers 3 7 and handles certain protocols Collects aggregate statistics (volume, rate, Top Talkers, etc) about network and application traffic Implementation of RMON agents is complex Probes might be expensive and require administration Cannot add new features to the existing MIB CERN openlab presentation
11 Packet Sampling A mean of passive network monitoring Simple to implement Low CPU and memory overhead Sample only the packet header (~128 bytes) Traffic patterns estimated from the samples with certain error CERN openlab presentation
12 Error Estimation Decreasing error = increasing the sampling rate CERN openlab presentation
13 sflow Packet Sampling RFC 3176 Multi-vendor standard Complete packet header and switching/routing information Some SNMP counters information Low CPU/memory requirements scalable CERN openlab presentation
14 Usage of sflow Profiling network traffic Building flow statistics Accounting and billing Route profiling (forwarding information) Security analysis / intrusion detection: Packet headers analysis Traffic pattern analysis CERN openlab presentation
15 Current Research Influence of sampling on flow estimates Influence of sampling on anomaly detection: Access only to packet headers Unable to reconstruct the sessions from samples Traffic prediction: Packet count prediction Traffic volume prediction Adjusting of sampling rate: Attempt to maintain the constant error Attempt to fully utilise the hardware capabilities CERN openlab presentation
16 Bibliography N.Duffield, Sampling for Passive Internet Measurement: A Review, Statistical Science 2004, Vol. 19, No. 3 J.Jedwab, P.Phaal, B.Pinna, Traffic Estimation for the Largest Sources on a Network, Using Packet Sampling with Limited Storage, HP Laboratories Bristol, HPL-92-35, 1992 B.Choi, J.Park, Z.Zhang, Adaptive Random Sampling for Load Change Detection, University of Minnesota Technical Report , 2001 B.Choi, J.Park, Z.Zhang, Adaptive Random Sampling for Flow Volume Measurement, University of Minnesota Technical Report , 2002 K.Ishibashi, R.Kawahara, M.Tatsuya, T.Kondoh, S.Asano, Effect of Sampling Rate and Monitoring Granularity on Anomaly Detectability, IEEE Global Internet Symposium, 2007 R.Kawahara, T.Mori, N.Kamiyama, S.Harada, S.Asano, A Study on Detecting Network Anomalies Using Sampled Flow Statistics, IEEE International Symposium on Applications and the Internet Workshops 2007 Y.Gao, G.He, J.Hou, On Exploiting Traffic Predictability in Active Queue Management, in Proceedings of IEEE INFOCOM, 2002 N.Duffield, C.Lund, M.Thorup, Estimating Flow Distributions from Sampled Flow Statistics, Proceedings the ACM SIGCOMM Conference on Applications, Technologies, Architectures, 2003 K.Xu, Z.Zhang, S.Bhattacharyya, Profiling Internet Backbone Traffic: Behavior Models and Applications, SIGCOMM Comput. Commun. Rev., Vol. 35, No. 4. (October 2005), pp And many more CERN openlab presentation
Traffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Traffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
Scalable High Resolution Network Monitoring
Scalable High Resolution Network Monitoring Open Cloud Day Wintherthur, 16 th of June, 2016 Georgios Kathareios, Ákos Máté, Mitch Gusat IBM Research GmbH Zürich Laboratory {ios, kos, mig}@zurich.ibm.com
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
SNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
The ntop Project: Open Source Network Monitoring
The ntop Project: Open Source Network Monitoring Luca Deri 1 Agenda 1. What can ntop do for me? 2. ntop and network security 3. Integration with commercial protocols 4. Embedding ntop 5. Work in
Brocade sflow for Network Traffic Monitoring
WHITE PAPER Service provider Brocade sflow for Network Traffic Monitoring Although both sflow and NetFlow enjoy widespread industry adoption, sflow is the better technology for traffic monitoring. Business
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
The next IP SLA generation Solution. Advisor SLA. Network Performance Monitoring Solution. www.hlog-qostelecom.com
The next IP SLA generation Solution Advisor SLA Network Performance Monitoring Solution 2 Advisor SLA Network Performance Monitoring Solution. Executive Summary The Advisor SLA Solution has been chosen
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
Network Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Network Management Functions RMON1, RMON2. Network Management
Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Business case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Maintaining Non-Stop Services with Multi Layer Monitoring
Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems [email protected] www.emindsys.com The approach Non-stop applications can t leave on their
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Dell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Network Assessment Services
Network ment Services Information networks are arguably your most important IT assets, their speed and reliability are the foundations upon which your critical business systems and applications run. Ensuring
WhatsUp Gold vs. Orion
Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,
Network Visibility Guide
Network Visibility Guide Even Superman could only see through walls, not networks! We understand your lack of Network visibility. So we give you ManageEngine NetFlow Analyzer! Network visibility is the
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Best Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case.
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case. Shadrack Stephen Madila, George Sizya Germinous, Sarah Nyanjara Magoti ICT department, Moshi University College
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks
Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for SHIMONISHI Hideyuki, YAMASAKI Yasuhiro, MURASE Tsutomu, KIRIHA Yoshiaki Abstract This paper discusses the
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Challenges in High Performance Network Monitoring
Outline Challenges in High Performance Network Monitoring How to monitor networks that become faster and faster Fulvio Risso ([email protected]) http://staff.polito.it/fulvio.risso/ Introduction What
Perspective on secure network for control systems in SPring-8
Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan Contents Network architecture Requirement and design
TELCO challenge: Learning and managing the network behavior
TELCO challenge: Learning and managing the network behavior M.Sc. Ljupco Vangelski CEO, Scope Innovations Kiril Oncevski NOC, ISP Neotel Skopje Presentation overview Challenges for the modern network monitoring
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
Latency Analyzer (LANZ)
Latency Analyzer (LANZ) Technical Bulletin LANZ - A New Dimension in Network Visibility Arista Networks Latency Analyzer (LANZ) represents a revolution in integrated network performance monitoring. For
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Network Analysis Modules
CHAPTER 6 This chapter describes the (NAMs) and contains the following sections: Network Analysis Module (WS-SVC-NAM-1), page 6-2 Network Analysis Module (WS-SVC-NAM-2), page 6-4 NAMs monitor and analyze
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Traffic Management for the Enterprise
ProCurve Networking by HP Traffic Management for the Enterprise Introduction... 2 The Importance of Traffic Management... 2 Types of Network Traffic... 3 Bursty traffic... 3 Interactive traffic... 3 Latency
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
Data Center Load Balancing. 11.11.2015 Kristian Hartikainen
Data Center Load Balancing 11.11.2015 Kristian Hartikainen Load Balancing in Computing Efficient distribution of the workload across the available computing resources Distributing computation over multiple
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Where IT perceptions are reality. Test Report. OCe14000 Performance. Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine
Where IT perceptions are reality Test Report OCe14000 Performance Featuring Emulex OCe14102 Network Adapters Emulex XE100 Offload Engine Document # TEST2014001 v9, October 2014 Copyright 2014 IT Brand
Network Management Functions - Performance. Network Management
Network Management Functions - Performance Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
RoCE vs. iwarp Competitive Analysis
WHITE PAPER August 21 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...4 Summary...
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
NetFlow The De Facto Standard for Traffic Analytics
NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine
52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
