COMPARATIVE EVALUATION OF AVAILABLE BANDWIDTH ESTIMATION TOOLS (PRTG AND OAUNETMON) IN A CAMPUS WIDE AREA NETWORK.
|
|
|
- Paula Lawson
- 10 years ago
- Views:
Transcription
1 COMPARATIVE EVALUATION OF AVAILABLE BANDWIDTH ESTIMATION TOOLS (PRTG AND OAUNETMON) IN A CAMPUS WIDE AREA NETWORK. Azeez Nureni Ayofe Department of Maths & Computer Science, College of Natural and Applied Sciences, Fountain University, Osogbo, Osun State, Nigeria. address: [email protected] O. Osunade Department of Computer Science, University of Ibadan, Nigeria. address: [email protected] [email protected] Azeez Raheem Ajetola Department of Maths & Computer Science, College of Natural and Applied Sciences, Fountain University, Osogbo, Osun State, Nigeria. ABSTRACT: In recent years, there has been a strong interest in measuring the available bandwidth of network paths. Several methods and techniques have been proposed and various measurement tools have been developed and evaluated. However, there have been few comparative studies with regard to the actual performance of these tools. This project presents a study of available bandwidth measurement techniques for both PRTG and oaunetmon and undertakes a comparative analysis in terms of accuracy, intrusiveness and response time of active probing tools. Finally, measurement errors and uncertainty of the tools are analyzed and overall conclusions were made. Keywords: Network paths, Comparative study, Available bandwidth, Intrusiveness, Response Time, Probing Tools 1.0 INTRODUCTION Active bandwidth estimation tools can not only provide network operators with useful information on network characteristics and performance, but also can enable end users (and user applications) to perform independent network auditing, load balancing, and server selection tasks, among many others, without requiring access to network elements or administrative resources. Application users on high-speed networks perceive the network as an end-to-end connection between resources of interest to them. Discovering the least congested end-toend path to distributed resources is important for optimizing network utilization. Therefore, users and application designers need tools and methodologies to monitor network conditions and to rationalize their performance expectations. Several network characteristics related to performance are measured in bits per second: capacity, available bandwidth, bulk transfer capacity, and achievable TCP throughput. Although, these metrics appear similar, they are not, and knowing one of them does not generally imply that one can say anything about others. 19
2 Bandwidth estimation tools face estimation time, and increasingly difficult measurement dependency of accuracy on challenges as link speeds increase and probe traffic volume. network functionality grows more complex. Consistency of estimates Consider the issue of time precision: on Efficiency: required network load faster links, interval between packets for a given accuracy, and decrease, rendering packet probe required network load for a given measurements more sensitive to timing estimation time. errors. The nominal 1µs resolution of UNIX Estimation time: required time timestamps is acceptable when measuring for a given accuracy. 120 µs gaps between 1500B packets on 100 Dependency of accuracy, Mb/s links but insufficient to quantify efficiency and estimation time on packet inter arrival time (IAT) variations of overall network load as well as 12 µs gaps on GigE links. overall machine (both sender and receiver) load. The research community is developing a set of metrics and techniques for active bandwidth measurement. Many of them are well understood and can provide accurate estimates under certain conditions. Also, some partial measurement and evaluation studies of bandwidth estimation tools have been published but my attention has been drawn to the lack of publicly available comprehensive and comparative experimental results. PRTG and OAUNETMON monitor network and bandwidth usage as well as various other network parameters like memory and CPU usages, providing system administrators with live readings and periodical usage trends to optimize the efficiency, layout, and setup of leased lines, routers, firewalls, servers, and other network components. As we performed test over prtg and oaunetmon, comparative analysis procedures were being developed. Among these, a number of generic criteria were highlighted. These criteria have been classified into two groups: a first set of criteria specified as simple numerical and scalar metrics that provide a partial comparison of tools performance, a second set of criteria that provide comparative evaluation of tools performance. The first set includes metrics that can be useful to quickly choose or discard some techniques and tools according to simple constraints such as required time or allowed probe bandwidth, some of these metrics are the following: Total probe traffic generated; Maximum attainable accuracy; Total estimation time; Traffic IN; Traffic OUT. The second set of criteria for comparative analysis between different techniques includes but is not limited to the following: Accuracy: maximum accuracy for a fixed time, maximum accuracy for a limited amount of probe traffic, dependency of accuracy on This project provides a comparative study of two Available Bandwidth (ABw) techniques (PRTG and OAUNETMON) taking into account the statistical conditions of the ABw, several improvement of OAUNETMON in terms of accuracy and efficiency, and a performance evaluation of OAUNETMON under a DiffServ environment. The same study was carried out for PRTG and the results obtained were compared with OAUNETMON and recommendations were made only to know which among the two to choose when a bandwidth is to be measured in order to obtain accurate, reliable and up-to-date results. 2.0 RESEARCH JUSTIFICATION The following are the contributions of this research work in particular: A well understood bandwidth analysis could be used to build multicast routing trees more efficiently and dynamically. Ideally, multicast routing trees would be built so that packets 20
3 travel along a tree that minimizes duplicate packets and latency while maximizing bandwidth; To provide proactive problem detection, efficient troubleshooting and rapid problem solution concerning bandwidth especially when there is the need to improve on the low bandwidth of a network; To determine which among the tools is good for bandwidth measurement with a mean of getting detail results in terms of accuracy, reliability, intrusiveness and good response time; To quickly and easily set up and run a monitoring station for networks. With just a few mouse clicks a person can log the amount of data flowing through routers and leased line, monitors CPU utilization, analyze the traffic by type, or check disk space utilization; To monitor the bandwidth usage of leased lines, routers, and firewalls via SNMP, packet sniffing, or NetFlow; To be able to obtain a graphical overview as well as detail statistics of network usage; To have opportunity of storing and analyzing traffic in a switched network such as Fast Ethernet and Gigabit Ethernet. 3.0 RESEARCH AIM AND OBJECTIVES The aim of this project work is to carry out a research work on the measurement of comparative evaluation of available bandwidth estimation tools in a campus Wide Area Network (Prtg and Oaunetmon). The objectives of this research work include the following: - To ease the deployment of platforms that takes the advantage of the huge amount of available experimental resources to provide a solid experimental basis for research on active bandwidth estimation. - Assess to what extend current bandwidth estimation tools can be used as basis for providing a bandwidth estimation service for applications as well as networks operation. - To give aggregate, detailed overview about the traffic patterns on the network of each tool and to recommend the one that is more acceptable in terms of intrusiveness, reliable and consistent. - To evaluate available bandwidth measurement tools (prtg and oaunetmon) and undertake a comparative analysis in terms of accuracy, intrusiveness and response time of active probing tools. - Know the challenges facing a low bandwidth network and to probably proffer suggestions on how best to manage such to give a better performance. 4.0 RESEARCH METHODOLOGY To compare the performance of the measurement tools studied; OAUNETMON and PRTG, a set of experiments were carried out on an isolated network that comprises three Cisco 1700 series routers that is SNMP enabled connected through FastEthernet links. The network built for tests, comprise sender and receiver hosts, belonging to different LANs on which several cross-traffic sources are active. The used hosts are equipped with Debian Linux and have the same hardware configuration. A couple of hosts are used as the sender and the receiver part of the measurement tool, while the other hosts are used as the source and the destination for the cross-traffic. The choice of an isolated network is motivated by the need to totally control the network under test. The methodology adopted so far include the following: An extensive review of relevant and related literatures on previous work done in projects comparing bandwidth measuring tools; Running of the two bandwidth measuring tools on the same network with equal number of system; 21
4 Implementation of these measuring network such as memory and CPU tools (OAUNETMON and PRTG) on utilization. the same operating system; Conducting two series of With PRTG Traffic Grapher the user reproducible laboratory test in a receives comprehensive bandwidth and fully controlled environment using network usage data that helps to two different sources of cross-traffic; optimize the efficiency of the network. Experimenting on high-speed paths Understanding bandwidth and resource in real networks where I had a consumption is the key to better complete knowledge of link network management: Avoid bandwidth capacities and had access to SNMP and server performance bottlenecks; counters for independent crosstraffic Find out what applications or what verification; servers use up your bandwidth; Deliver Obtaining the final results for both better quality of service to your users by the oaunetmon and prtg after a being proactive; Reduce costs by buying consistent and reliable period to bandwidth and hardware according to avoid doubt in the statistical value actual load. and graphical interpretation values obtained; Comparing the accuracy and other operational characteristics of the tools, and analyze factors impacting their performance; Then, based on the data collected from the above studies, recommendations and suggestion on improving the performance of the bandwidth networks will also be made. Our research takes one step further the testing and comparing publicly (prtg and oaunetmon) for available bandwidth estimation. First, I conducted two series of reproducible laboratory tests in a fully controlled environment using two different sources of cross-traffic. Second, I experimented on high-speed paths in real networks where there is a complete knowledge of link capacities and had access to SNMP counters for independent cross traffic verification. Finally, I compare the accuracy and other operational characteristics of the tools, and analyze factors impacting their performance. 5.0 Overview of PRTG - Paessler Router Traffic Grapher PRTG Traffic Grapher is an easy to use Windows application for monitoring and classifying bandwidth usage. It provides system administrators with live readings and long-term usage trends for their network devices. PRTG is mainly used for bandwidth usage monitoring, but may also be used to monitor many other aspects of a The Freeware Edition of PRTG Traffic Grapher is completely free for personal and commercial use and may be downloaded for free. PRTG Traffic Grapher is designed to run on a Windows machine in your network for 24 hours every day, and constantly records the network usage parameters. The recorded data is stored in an internal database for later reference. Using an easy to use Windows interface you can configure the monitored sensors as well as create usage reports. For remote access PRTG Traffic Grapher comes with a built-in web server to provide access to graphs and tables. All common methods for network usage data acquisition are supported: SNMP: Simple Network Management Protocol is the basic method of gathering bandwidth and network usage data. It can be used to monitor bandwidth usage of routers and switches port-byport as well as device readings like memory, CPU load etc. Packet Sniffing: With its built-in Packet Sniffer PRTG can inspect all network data packets passing the network card to calculate the bandwidth usage. NetFlow: The NetFlow protocol is supported by most Cisco routers to measure bandwidth usage. 5.1 How to Choose a Method of Data Acquisition There are four methods of Data Acquisition when using PRTG for measuring bandwidth. They are: SNMP Monitoring; 22
5 Packet Sniffing; Netflow Monitoring; Latency Monitoring. 5.2 PRTG Network Monitor System Architecture PRTG Network Monitor consists of three main parts: PRTG Core Server: The central part of a PRTG installation is the Core Server that includes data storage, web server, report engine and notification system. PRTG Probe: A Probe performs the actual monitoring. It receives its configuration from the Core Server, runs the monitoring processes and delivers monitoring results back to the Core Server. A Core Server can manage an unlimited number of Probes in order to achieve multi location monitoring. PRTG Web Interface: The user interface is completely web-based. The users access the configuration and monitoring results using a standard web browser. Core and probe are Windows services which are run by the Windows system without the requirement for a user to be logged in. The monitoring system runs on the Linux operating system. Monitoring was done using open source IPTraf software. A wrapper script was used to start the IPTrafprogram with suitable command line arguments to sort the output of IPTraf based on IP address and protocol and it creates suitable inputs for PRTG and Webaliser. After starting up IPTraf and initializing some variables, the wrapper script is responsible for processing the summary information from IPTraf into suitable log formats both for PRTG and Webaliser. The software aims at doing the processing very fast and as such it is not complicated. In order to maintain system stability and minimize memory leaks, the software restarts every 24 hours. Other script used are run_prtg, prtg_reader, run_webaliser and webaliser_caller. 6.0 OAUNETMON OVERVIEW The developed non intrusive traffic monitoring and analysis system (OAUNETMON) is different from similar tools because it is non intrusive. It uses open source software and has the capability to show traffic information on Global, host and protocol basis. It can keep historical information about network usage. It can also give a graphical overview as well as a detailed statistics. It has the ability to monitor and analyse traffic in a switched network such as Fast Ethernet and Gigabit Ethernet. Apart from monitoring and analysing network traffic, OAUNETMON can also carry out proxy log analysis using Webalizer. The Obafemi Awolowo University Network Monitoring (OAUNETMON) Experiment was conducted with the aim of monitoring live ntwork without adversely imparting on the performance and also to identify and monitor traffic patterns (both speed and volume) on the basis of host (IP address), protocol and time of the day. For this experiment, open source software was used for the reason of ease modification and cost. On a high-speed network, the system may not be able to handle all packets in time. If the processing speed or the system itself operates at speed insufficient to capture all packets, the analysis result is unreliable. The project was to set up a single monitoring station that will monitor all the traffic. The figure below shows the architecture of OAUNETMON as it was used to monitor the traffic on the University of Ibadan Network. 23
6 Figure 1: Design Architecture of Prtg PRTG _Reader Webalizer_Caller PRTG Webalizer Webalizer Log File PRTG Log File Web Server Web Pages Web Browser (User) Network of University of Ibadan 24
7 INTERNET CISCO 1600 ROUTER SNMP ENABLED 1 GIGABIT SWITCH 10/100/1000MBPS 1 GIGABIT INTERFACE MONITORING STATION PENTIUM IV CPU 100 Mbps Proxy 1 WEB /FTP 100 Mbps WEB SERVER INTERNET WEB SERVER 100 Mbps Firewall NON WEB/FTP University of Ibadan (UI) Network Oaunetmon Traffic Monitoring Setup at University of Ibadan Figure 2: Design Architecture of oaunetmon 25
8 iv. Speed required in 7.0 RESULTS AND DISCUSSION generating the output; v. Code size and 7.1 INTRODUCTION vi. Bandwidth requirement The results obtained for both the for the network the tools PRTG and OAUNETMON are analyzed. presented in the tables below. For The Network each of the tools there is a Coverage corresponding value for the The network coverage value tells following: whether the monitoring was on i. bandwidth Traffic IN (kbyte all the time and covered the and kbit/second); complete time period. ii. Bandwidth Traffic OUT (kbyte and kbit/second); iii. Sum of Bandwidth Traffic IN and Bandwidth Traffic OUT (kbyte and kbit/second); iv. Coverage (%); v. Total volume for parameters from i-iv above; vi. The Average for parameters from i-iv above. Each of the above parameters are properly observed and studied into detail for each of the tools and conclusions were drawn from their characteristics. It is important to note that all the hardware requirements for both tools were the same in order to obtain dependable and consistent results on the same network. For OAUNETMON the results were obtained at every five (5) minutes interval for a complete day. But for PRTG, the results obtained indicate a daily values for each of the parameters stated above. Hence, the Totals for 10-June-08 from 9:30 PM to 11-June-08 till 9:30 PM indicate a daily average as it was obtained for PRTG which is on daily basis. The values obtained for each of the tools were used to determine the bandwidth requirements for the network. From the table above, the result shows that OAUNETMON has nearly 100% network coverage unlike PRTG with poor network coverage characteristics. This feature undoubtedly shows efficiency and reliability in OAUNETMON which is a characteristic to rely on for any bandwidth measuring tool in order to obtain accurate result Daily Result Characteristics The daily results obtained shows that PRTG did not give any result for few days. In OAUNETMON, this did not arise. For each of the day, the results were fully and the required data were recorded. Daily Result Characteristics indicates that OAUNETMON is still far better in relying on the precision of the result unlike PRTG which omitted some results in most of its daily readings Speed Required for Implementing the Tools. 7.2 RESULTS OBTAINED The discussion on the results obtained from these experimental works was analyzed under the following criteria: i. The Network Coverage characteristics of each of the tools; ii. Daily results characteristics; iii. Speed required for implementing each of the tools; When both PRTG and OAUNETMON were both implemented on the network, it was clearly observed and noticed that OAUNETMON runs faster; two times the time required by PRTG to be implemented on the same network Speed required in generating the output 26
9 Of course, when the speed used by a ii. Total Volume for particular tool is faster than the Bandwidth Traffic other, what this mean invariably is OUT (Kbyte) = that the time when the output will 933, be generated shall definitely be Therefore, the amount of bandwidth different. OAUNETMON takes the required in this case is calculated as opportunity of having a better follow: running time to generate its result in a better time than PRTG. It was Bandwidth = (Total Volume for noticed that 3 minutes after Bandwidth Traffic IN (Kbyte)/8) Mbps OAUNETMON would have started = (2,202, /8) generating its results that PRGT will Mbps just begin displaying its result on = Mbps the same network. is the Bandwidth required using Oaunetmon Code Size PRTG has a better advantage over OAUNETMON in this regard. The size of code required for implementation on the network for PRTG is 7,302kb whereas OAUNETMON has 8,323kb Bandwidth requirement There are two approaches to getting bandwidth in this case: i. Comparing the average Total Volume Bandwidth obtained for both the prtg and oaunetmon; ii. Comparing the Random Selection of Bandwidth obtained for prtg and a daily bandwidth obtained for oaunetmon. 7.3 Comparing the average Total Volume Bandwidth b. FOR PRTG From 23-May-08 to 01-Mar-08, the following results were obtained from prtg: (i) Total volume for Bandwidth Traffic IN (Kbytes) = 484,585, (ii) Total volume for Bandwidth Traffic OUT (Kbytes) = 413,246, To calculate the equivalent bandwidth requirement as we have in oaunetmon for prtg, the following procedures are to be followed: Bandwidth/per day = Total volume for bandwidth Traffic IN (Kbyte)/Total number of days a. For OAUNETMON: This is an important parameter for determining the efficiency, dependability, accuracy and precision of any bandwidth measuring tool. From 10-June-08 9:30 pm to 11-June-08 9:25pm- 9:30pm as shown on the statistical table obtained for oaunetmon and which was obtained at 5 minutes interval the following values were obtained: i. Total Volume for Bandwidth Traffic IN (Kbyte) = 2, 202, =484,585, /74 = Hence, the bandwidth required by prtg = ( /8) Mbps = Mbps From the calculation shown above, it is clear that the bandwidth required when oaunetmon was used is better compare to bandwidth required by ptrg. The bandwidth required by the oaunetmon is Mbps while the bandwidth required by the prtg is Mbps which is almost four times bandwidth required by the oaunetmon. 27
10 7.4 Comparing the Random Bandwidth values For OAUNETMON, from the result shown above, it is noted that the Total Volume for the Bandwidth Traffic IN is 2,202, Kbyte and Total Volume for the Bandwidth Traffic OUT is 933, Kbyte. But for the PRTG, since there is more than a day value for Total Volume of Bandwidth Traffic IN and Bandwidth Traffic OUT, the analysis is therefore base on randomly selection of values. For example, on 23 rd May,2008 the Bandwidth Traffic IN is 2,106, Kbyte and the Bandwidth Traffic OUT is 1,185, Kbyte for prtg and this is better than oaunetmon. But on 30 th April,2008 and 29 th April,2008 the Bandwidth Traffic OUT for PRTG are 4,585, Kbyte and 2,887, Kbyte respectively. In this case, the Bandwidth requirement for PRTG is poor when compare to oaunetmon. This approach shows that neither OAUNETMON requires less/higher bandwidth nor PRTG requires such. There is no definite conclusion with this approach. Finally, with analysis of the two approaches to bandwidth requirement of the two bandwidth measuring tools, it is noted that oaunetmon is better in bandwidth requirement than prtg. The table below gives a better interpretation of the above parameters used in analyzing the differences between the prtg and oaunetmon. NETWORK SPEED OF RATE OF CODE DAILY RESULT BANDWIDTH SIZE FEATURES REQUIREMENT COVERAGE RUNNING GENERATING (KB) (%) SECONDS OUTPUT PRTG Slower 7,302 Omission of results were noticed Higher Oaunetmon Faster 8,323 Full results Lower Table 4.1: the network. Showing the characteristics features of prtg and oaunetmon as demonstrated on 8.0 Summary Some partial measurement and evaluation studies of bandwidth estimation tools have been published, nonetheless, my attention has been drawn to lack of publicly available comprehensive and comparative experimental results. Not only that, there is lack of common and consistent practices and procedures to test available active bandwidth measurement tools. With this new research carried out on comparative analysis of both prtg and oaunetmon, it is therefore a great advantage for both the network operators and user applications to make use of a better tool in order to get a better network auditing load balancing and a good server selection as well as the realization of other aims within which this research was carried out. 9.0 CONCLUSION I have presented the systematic comparative analysis of active bandwidth estimation tools (prtg and oaunetmon) performed over a broad range of tools, scenario (both emulated and real) as well as experimental conditions, 28
11 which results are publicly available. Techniques tools ton estimate capacity, available bandwidth and bulk transfer capacity have been studied jointly. Furthermore, I have tried to analyze and to explain errors and uncertainties observed on the tools I have studied. tools, what stands to be a challenging issue now is how to develop a tool that will compute available bandwidth at different time of the day. This, undoubtedly, will give overtime statistics of usage pattern (peak an off peak) and to try to investigate why the network is not utilizing the maximum capacity of all times and what could be consuming the unused bandwidth. The results obtained shown that oaunetmon is the least intrusive, reliable, consistence and dependable and in some cases can be very slow through with better accuracy and precision when compare to prtg Finally, oaunetmon offers the best performance with regard to the criteria studied: i. The Network Coverage characteristics of each of the tools; ii. Daily results characteristics; iii. Speed required for implementing each of the tools; iv. Speed required in generating the output; v. Code size and vi. Bandwidth requirement for the network and the tools analyzed. The study presented in this project was on the small number of criteria that seemed to be the most important. However, this study must be completed by considering other parameters and by evaluating the measurement tools on real networks settings. As a result from the tests carried out, a number of failure conditions for the analyzed tools have been identified, as well as the dependency of the estimates accuracy on factors such as system load and network properties FUTURE WORK I have seen a great challenge to this project; apart from making a comparative study to these bandwidth Carrying out this project will go a long way in explaining into detail the concept of bandwidth utilization and management. It will assist the network manager understand full how the available bandwidth can optimized. REFERENCES. 1. Hong J. Kwon S. and Kim. (1999) WebTrafMon: Web- BasedInternet Intranet network traffic monitoring and analysis system. Elsevier Computer Communications. Vol. 22 issue: 14. pp O.O. Abiona, C.E Onime, A.I Oluwaranti, E.R Adagunodo, L.O Kehinde, S.M Radicella: Development of a Non-Intrusive Network Traffic Monitoring and Analysis System. African Journal of Science and Technology (AJST) Science and Engineering Series Vol. 7, No, 2, pp. 3. Ahmed Ait Ali, Fabien Michaut, Francis Lepage: End-to-End Available Bandwidth Measurement Tools: A Comparative Evaluation of Performances. 4. Kevin Lai, Mary Baker: Measuring Bandwidth 29
12 5. Jacob Strauss, Dina Katabi, Frans Kaashoek: A Measurement Study of Available Bandwidth Estimation Tools. MIT Computer Science and Artificial Intelligence Laboratory. 30
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
How To Monitor Bandwidth On A Computer Network
Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I [email protected], II [email protected]
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
Managing Central Monitoring in Distributed Systems
Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle
Getting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Traffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
SNMP Test er Manual 2015 Paessler AG
SNMP Test er Manual 2015 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping,
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Network Probe. Figure 1.1 Cacti Utilization Graph
Network Probe Description The MCNC Client Network Engineering group will install several open source network performance management tools on a computer provided by the LEA or charter school to build a
Traffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Aerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Master Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Master Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current status
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current
Copyright www.agileload.com 1
Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Network Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
Quantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Distributed applications monitoring at system and network level
Distributed applications monitoring at system and network level Monarc Collaboration 1 Abstract Most of the distributed applications are presently based on architectural models that don t involve real-time
PRTG Traffic Grapher 6. User Manual
PRTG Traffic Grapher 6 User Manual Contents Monitoring Networks With PRTG Traffic Grapher 1 Why Monitoring Of Bandwidth and Network Usage Is Important...1 What PRTG Traffic Grapher can do for you...2
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
Analyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
Cisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
MRTG used for Basic Server Monitoring
MRTG used for Basic Server Monitoring SANS Institute Masters Presentation by T. Brian MRTG used for Basic Server Monitoring This presentation covers how-to instructions to establish basic server monitoring
Elevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Analyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems
Visualization, Management, and Control for Cisco IWAN Data sheet Overview Intelligent WAN is a Cisco solution that enables enterprises to realize significant cost savings by moving to less expensive transport
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Firewall Security: Policies, Testing and Performance Evaluation
Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK [email protected],
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
Using WebLOAD to Monitor Your Production Environment
Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money
Network performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
A FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
SOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
pc resource monitoring and performance advisor
pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware
A Scalable Architecture for Network Traffic Monitoring and Analysis Using Free Open Source Software
Int. J. Communications, Network and System Sciences, 2009, 6, 528-539 doi:10.4236/ijcns.2009.26058 Published Online September 2009 (http://www.scirp.org/journal/ijcns/). A Scalable Architecture for Network
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Sampled NetFlow. Feature Overview. Benefits
Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team
Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team This document specifically addresses a subset of interesting netflow export situations to an ntop netflow collector
Discovery and Usage data for Software License Management
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
AscenVision. Successful Story of F1. AscenVision Technology Inc. The Intelligent Network Provider
AscenVision Successful Story of F1 AscenVision Technology Inc. The Intelligent Network Provider Background Formula one racing is all about winning. Only the car first to cross the checker flag is the winner.
Internet Services. Amcom. Support & Troubleshooting Guide
Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further
