Monitoring Network QoS in a Dynamic Real-Time System 1
|
|
|
- Catherine Harvey
- 10 years ago
- Views:
Transcription
1 Monitoring Network QoS in a Dynamic Real-Time System Hong Chen, Brett Tjaden, Lonnie Welch, Carl Bruggeman, Lu Tong, Barbara Pfarr School of Electrical Engineering and Computer Science Ohio University, Athens, OH 457 {hc52787 tjaden welch bruggema [email protected] Real-Time Software Engineering Branch NASA GSFC/Code 584, Greenbelt, MD 277 [email protected] Abstract This paper presents our design and tests of a realtime network monitoring program for DeSiDeRaTa, an existing resource management system. This monitor will assist DeSiDeRaTa in maintaining an acceptable Quality of Service (QoS) for groups of real-time applications by reporting the communication delays caused by inadequate network bandwidth. The network monitoring application we developed uses SNMP and network topology information gleaned from the DeSiDeRaTa application specification files. Network bandwidth utilization of each real-time communication path is computed, and experiments have been run to demonstrate the accuracy of these measurements.. Introduction Significant work has been done on resource management (RM) of distributed real-time computer systems. Such systems usually contain a large number of computers connected by one or more computer networks. Maintaining adequate quality of service (QoS) for realtime applications requires the resource management middleware to manage not only computing resources but also network resources. In many cases, proper management of network resources is vital for delivering adequate QoS to a dynamic real-time system. A large amount of data communication between the computers and improper use of network resources can lead to congestion and delay, and ultimately a QoS violation. To properly manage network resources, the resource management middleware must monitor their performance. This paper focuses on a technique for monitoring network resources. It extends the work of DeSiDeRaTa, Funded by NASA Office of Earth Science, NASA Research Announcement 99-OES-8. an existing resource management middleware solution for dynamic, scalable, dependable, real-time systems []. DeSiDeRaTa assumed that network resources were never a bottleneck. Our network monitoring program provides real-time network performance information to the resource management middleware and helps the middleware to detect and diagnose potential QoS violations due to a sub-optimal allocation of network resources. To obtain network performance information, the network resource monitoring program must know the topology of the computer network. DeSiDeRaTa includes a specification language with which to specify the components of a real-time system. For our work, we have extended the specification language to include networkrelated information of the real-time system, such as computer hosts, network devices, network interfaces, and network connections. Our network monitoring program obtains the topology and connectivity of the real-time system from this specification file. The monitor implements an algorithm that traverses the communication path between hosts based on the topology information in the specification file, and calculates the bandwidth (both available and used) between pairs of hosts. This real-time network performance is obtained by querying network components periodically using the Simple Network Management Protocol (SNMP) to gather performance information from hosts and network devices. Combining the SNMP query results and network topology information, bandwidth statistics are then calculated. The outline of the remainder of this paper is as follows. Section 2 presents some background on SNMP and the DeSiDeRaTa resource manager. Section 3 discusses the algorithms and implementation details of our approach. Section 4 provides some preliminary test results for our network monitor. Section 5 presents our conclusions and gives some thoughts on future work /2/$7. (C) 22 IEEE
2 2. Background 2.. Network Monitoring We considered many different network monitoring techniques as the basis for our work. SNMP is a traditional technology and it has been widely used for network monitoring [2-4]. Other techniques, such as Java [5,6], agent technology [7], switch monitoring [8], were also considered. We chose SNMP for its simplicity and comprehensiveness SNMP The Simple Network Management Protocol (SNMP) [9] provides a basic network-management tool for TCP/IP-based environments. SNMP defines the structure of a hierarchically organized database, which is stored in a series of network components. Each network component contains information such as services offered, the device s routing table, and a wide variety of statistics. Such information can be accessed through a local Management Information Base (MIB) [] that specifies the structure of the database. More information about SNMP and MIB can be found in []. Our network monitor uses the SNMP protocol and the interface table of the MIB to obtain data communication statistics from each SNMP-enabled network component. The interface table provides a static data transmission rate as well as counters for data and packets being sent and received through each network interface. Real-time network information is obtained by polling SNMP servers on each device (e.g. hosts, switches, routers) periodically. This data can then be used to determine the amount of bandwidth used and available for the network component. By combining these metrics (see section 3.3), we compute the available and used bandwidth of a real-time path Resource Management and Network Topology The work in this paper is part of the effort to build DeSiDeRaTa, adaptive resource management middleware for dynamic, scalable, dependable real-time systems []. The middleware performs QoS monitoring and failure detection, QoS diagnosis, and reallocation of resources to adapt the system to achieve acceptable levels of QoS. The current version of DeSiDeRaTa middleware manages only computational resources and assumes no QoS violation is caused by network delays. Our work extends DeSiDeRaTa to allow the management of network resources. We developed an application that does network QoS monitoring and provides the middleware with network metrics regarding data communication information, which enables the middleware to manage the resources based on the network metrics and network QoS specification. To obtain the network metrics, the network monitoring software has to be able to discover the network topologies and combine them with SNMP data from each network component. Network topology discovery usually is difficult due to the complexity of computer networks. In the DeSiDeRaTa environment, this problem can be solved easily using some of RM infrastructure already in place. The resource management middleware must know details about hardware systems and all the software applications under its control. A specification language was developed to describe such information of hardware and software systems, including network connections and interfaces. The network monitoring software can obtain this network information from the specification files and construct the network topology graph for the system. 3. Methodology 3.. SNMP Polling The goal of the network-monitoring program is to obtain real-time network bandwidth usage information. SNMP information can be polled from an SNMP-enabled host or network device (i.e., the host/device has an SNMP demon running). Table shows some of the MIB-II (second version of MIB) objects being accessed during our periodic SNMP polling. The data transmitted through an interface in both directions, as well as the static bandwidth, can be obtained using these MIB-II objects. Because the polling results are cumulative numbers, this data has to be polled periodically. The old value is subtracted from the new one to determine statistics for the polling interval. The time interval between two polling processes can be found using the system uptime data. The data transmission rate, including packets and bytes per unit time can then be calculated Network Topology and Specification Language The network-monitoring program was built using a local area network (LAN) model. The topology of such networks is modeled using hosts (or network devices), network interfaces, and network connections. Figure shows the LAN topology model. Each host or network device has one or more network interfaces. For example, in the figure, hosts A, C, and E each have a single connection (interface) to the network, while B and D have multiple interfaces. B and D can be hosts with multiple network connections, or network devices such as /2/$7. (C) 22 IEEE
3 MIB-II Object (Numbers) Description [] system.sysuptime The time (in hundredths of a second) since the network ( ) management portion of the system was last re-initialized. interfaces.iftable.ifentry.ifspeed An estimate of the interface's current bandwidth in bits per ( ) second (static bandwidth). interfaces.iftable.ifentry.ifinoctets Accumulated number of octets received on the interface. ( ) interfaces.iftable.ifentry.ifinucastpkts Accumulated number of subnetwork-unicast packets delivered to ( ) a higher-layer protocol. interfaces.iftable.ifentry.ifoutoctets Accumulated number of octets transmitted out of the interface. ( ) interfaces.iftable.ifentry.ifoutnucastpkts The total number of packets that higher-level protocols ( ) requested to be transmitted to a subnetwork-unicast address. Table. MIB-II Objects Used in Network Monitoring. A Host/Device 3 B D 2 2 Network Interface C E Network Connection Figure 2 shows the pseudo code for data structures that specify the network topology. A host/device is specified by its name, a list of all network interfaces on the host, and other host information. The interfaces are distinguished by their unique local names. A network connection is specified as two host-interface pairs, which give the two ends of the connection. Finally, the network topology can be described as a list of all the hosts/devices and all the network connections among them. The specification file is parsed, and related network topology information is then passed to the networkmonitoring program Path Traversal and Bandwidth Calculation Figure. Schematic Diagram of Network Connections. switches or hubs. A network connection is specified as a pair of interfaces that are physically connected to each other. In this model, the connection must be -to-, i.e., one interface may only be connected to one interface on another host/device. Utilizing the DeSiDeRaTa specification language is a straightforward approach to obtain network topology. Pure network discovery is not feasible in the DeSiDeRaTa environment because the resource management middleware has to know exactly what resources are under its control, and this requires at least some level of specification of resources. A hybrid approach may be a better solution in the future, however, due to its complexity, we chose the simpler solution using the specification language for this stage of the research. A new extension to the DeSiDeRaTa specification language [2] was developed to describe the topology of the network resources of the real-time system under control of the resource management middleware. The network topology is defined using the model described above. Based on the information from the specification language, the communication path between two hosts can be traversed. A simple recursive algorithm is designed to traverse the path, with a necessary infinite-loop detecting function implemented. The result of the path is described as a series of network connections defined in the previous section. To calculate the available bandwidth between two hosts, one has to know the bandwidth of each connection in the path. The available bandwidth of the whole path is simply the minimum of all the individual available bandwidths. Assume a communication path consists of n network connections, and the available bandwidth for connection i is a i (i =, 2, n). Then the available bandwidth of the path, A = minimum(a, a 2, a n ). For each individual connection, the available bandwidth a i is just the difference between maximum bandwidth m i and used bandwidth u i : a i = m i - u i. A measure of m i can be obtained directly through SNMP polling, while the u i must be computed by the network monitoring program. It is relatively easy to calculate used bandwidth of a host connected to switches because a switch does not forward packets for one host to other hosts connected to the same switch. Hence, the amount of bandwidth used on /2/$7. (C) 22 IEEE
4 Host { //data structure of a host or network device host_name; //name of the host LinkedList interfaces; //list of interfaces of the host //other host information Interface { //data structure of a network interface localname; //local name of the interface //other interface information HostPairConnection { Host host; Interface interface; Host host2; Interface interface2; //data structure of a network connection NetworkTopology { //data structure of network topology LinkedList hosts; //list of all hosts LinkedList hostpairconnections; //list of all connections Figure 2. Specification of Network Topology. a host connected to a switch is simply the amount of data transmitted as reported by SNMP polling from either the host or the switch. If the traffic reported is t i, then we simple have u i = t i. The traffic of another connection t j (j i) will not affect u i. However, for hosts connected to hubs, all packets that go through the hub will be sent to every host connected to the hub. Therefore, the amount of bandwidth used for a host connected to a hub is the sum of all the data sent to the hub, instead of just the one to this host. Assume there are n hosts connected to the hub and the traffic reported by SNMP polling for each host is t i (i =, 2, n). Then u i = t + t t n. Notice that u i cannot exceed the maximum speed of the hub. An algorithm was implemented in our network monitoring program to distinguish these two cases and calculate available bandwidth accordingly. The available bandwidth between two hosts is calculated by traversing the communication path between the two and computing the minimum value. 4. Experiments and Results 4.. Experimental Setups The experiments described below were performed in the Laboratory for Intelligent Real-time Secure Systems (LIRTSS) at Ohio University. The network is a LAN D M SNMP Demon Network Monitor N D Win NT N2 D Win NT Hub ( Mbps) Switch ( Mbps) D M L D Linux S D Solaris 7 S2 D Solaris 7 S3 S4 S5 S6 Figure 3. Layout of LAN Test Bed /2/$7. (C) 22 IEEE
5 system with one Mbps switch and one Mbps hub. As shown in Figure 3, one Linux machine (L), two Solaris 7 machines (S, S2), and four machines (S3-S6) are connected to the switch. Two other Windows NT machines (N and N2) are connected to the hub, which is connected to the switch. Our network monitoring program was running on the Linux machine L. SNMP demons were available on L, N, N2, S, S2, and the switch at the time of experiment. Such a network arrangement is sufficient for monitoring the bandwidth between any pair of hosts in the system. For example, even though there is no SNMP demon on either S4 or S5, the bandwidth between S4 and S5 can still be monitored by polling the interfaces on the switch that are connected to S4 and S Network Load Generator To test our network monitoring program, a simple network load generator program was developed. It sends data streams to a designated host at a given speed. The data are sent as UDP packets to the DISCARD port (UDP port number 9) on the host. The real speed of traffic generated by the program is slightly larger than the specified value due to the extra bytes of UDP and IP headers and acknowledgements. The size of these extra bytes may vary depending on the speed of data traffic, but is small compared to the amount of data being sent in our experiments Experiment Results Preliminary experiment results are presented in this section. Communication paths through both the hub and switch were tested, and end-to-end bandwidth was observed using our network monitoring program, and compared to expected values Dynamically varying network load. A set of experiments was performed to observe the network traffic between a Windows NT machine, N, and the Solaris 7 machine, S. The communication path between these two hosts was computed by our program using network topology information from the specification file. The path that data followed was: S switch hub N (Figure 3). To check the correctness of the network bandwidth usage reported by our network monitoring program, network traffic was generated from L to N using the network load generator. Starting at Kbytes/second for 2 seconds, we increased the amount of data sent by the load generator by Kbytes/second each 6 seconds. After 36 seconds, the load generator was sending 5 Kbytes/second from L to N. The entire load was eliminated at 42 seconds (Figure 4a). Generated Load Measured Bandwidth Usage (a) (b) L ==> N S <==> N Time (seconds) Figure 4. Experiment results for our network monitoring program. (a) Pattern of traffic load generated by the load generator. (b) Measured traffic between hosts according to our network monitoring program. The output of our network monitor exhibits a similar pattern to the actual amount of data being transmitted (Figure 4b). The reported value of used bandwidth is slightly larger than the generated traffic load due to the background traffic over the network and the extra data in the packet headers. The fluctuation and spikes seen in Figure 4b is caused by the fluctuation of data transmission over the network and a slight delay in SNMP polling Table 2 gives some statistics of the measured results. The background traffic was calculated as the average of measured values at generated load. The average traffic was obtained for different generated load by subtracting the background from the average of measured traffic. The average measured load less background was about 4% larger than the values of generated load. Part of the Generated Load Average Measured Load.824 Average Load Less Background % Error Maximum % Error % 6.4% % 8.4% % 6.6% % 5.% % 5.7% Table 2. Statistics of Measured Traffic Load (Kbytes/second) /2/$7. (C) 22 IEEE
6 difference is due to the packet headers of generated traffic. The IP and UDP headers in a system with,5- byte MTU size can contribute about 2%. The other 2% may come from the traffic caused by SNMP queries and acknowledgements. Table 2 also shows maximum percentage error of individual value of measured traffic. The large error (6%) was caused by delays in SNMP polling. Occasionally, some data bytes are counted in a later SNMP message instead of an earlier one, resulting in an abnormally small value followed by and abnormally large one Hosts connected by a hub. A hub forwards data packets to all the connected hosts, not just the one for which a packet is destined. This affects the bandwidth of all hosts connected to a hub if data is sent to any host connected to the same hub. Our monitoring program considers this by summing the traffic through a hub when computing the amount of bandwidth used on any communication path through the hub. An experiment was run to monitor the amount of Generated Load Measured Bandwidth Usage (a) (b) (c) (d) L ==> N L ==> N2 S <==> N S <==> N Time (seconds) Figure 5. Experiment results for hub-connected hosts. (a-b) Patterns of traffic loads generated by the load generator. (c-d) Measured traffic between hosts according to our network monitoring program. bandwidth used by the two Windows NT machines connected to the hub. Data was sent from the Linux machine to the two NT machines as shown in Figure 5a-b. We started with no data being sent to either NT machines. After 2 seconds, we began to send 2 Kbytes/second from L to N. 2 seconds later, we began to send 2 Kbytes/second from L to N2. After another 2 seconds, the traffic from L to N was reduced to. 2 seconds later the traffic from L to N2 was also eliminated. The observed traffic load for the two paths (S N, S N2) is as we expected. The statistical analysis, the same as the one in previous section, shows 3.7% error on average values of measured traffic (less background), with maximum individual error of 7.8% Hosts connected by a switch. A switch only forwards packets to the host for which they are destined, not all the hosts connected to the switch. Therefore, our monitoring program treats switches differently than hubs. The traffic through a switch is not summed up. Instead, Generated Load Measured Bandwidth Usage (a) (b) (c) (d) (e) L ==> S2 L ==> S3 L ==> S S <==> S2 S <==> S Time (seconds) Figure 6. Experiment results for switchconnected hosts. (a-c) Patterns of traffic loads generated by the load generator. (d-e) Measured traffic between hosts according to our network monitoring program /2/$7. (C) 22 IEEE
7 only traffic going to and from a particular host is considered when computing the amount of bandwidth being used. An experiment was performed on two hosts connected by the switch. Traffic between S and S2, and between S and S3 was measured by our program. All three machines are Solaris machines and are connected to the switch. 2, Kbytes/second of traffic was generated at time 2-6, 4-8, and -2 seconds from L to S2, S3, and S respectively (Figure 6a-c). As shown in Figure 6d-e, the load sent to S2 can only be seen between S and S2, and the load to S3 appears only between S and S3, while the load to S is present in both paths because S has only one connection to the switch. The statistical analysis shows 2.2% error on average values of measured traffic (less background), with maximum individual error of 7.8%. The smaller percentage error on average values is due to the much larger volume of traffic generated compared to the previous experiment. 5. Conclusions and Future Work This paper has presented our approach to monitoring the network QoS in a dynamic real-time system. Our network monitoring program uses SNMP and network topology information, and computes network bandwidth usage information of a communication path in real-time. Different algorithms are used for host pairs connected by different network devices (hub and switch). The results of experiments on a LAN environment show the effectiveness and correctness of our program. Future work includes measurement of network latency, network QoS violation detection, dynamic network topology discovery, and distributed network monitoring. 6. References [] B. Ravindran, L. Welch, and B. Shirazi, Resource management middleware for dynamic, dependable realtime systems, Real-Time Systems, 2(2), March 2, [2] G. Mansfeild, M. Murata, K. Higuchi, K. Jayanthi, B. Chakraborty, Y. Nemoto, and S. Noguchi, An SNMPbased expert network management-system, IEICE Transactions on Communications, E75B(8), August 992, [3] M.R. Siegl, and G. Trausmuth, Hierarchical network management: A concept and its prototype in SNMPv2, Computer Networks and ISDN Systems, 28(4), February 996, [4] M. Hegde, M.K. Narana, and A. Kumar, netmon: An SNMP based network performance monitoring tool for packet data networks, IETE Journal of Research, 46(-2), January-April 2, [5] M. Leppinen, P. Pulkkinen, and A. Rautiainen, Java- and CORBA-based network management, Computer, 3(6), June 997, 83. [6] J.O. Lee, Enabling network management using Java technologies, IEEE Communications Magazine, 38(), January 2, [7] D. Gavalas, D. Greenwood, M. Ghanbari, and M. O Mahony, Advanced network monitoring applications based on mobile/intelligent agent, Computer Communications, 23(8), April 2, [8] D. Romascanu, and I.E. Zilbershtein, Switch monitoring The new generation of monitoring for local area networks, Bell Labs Technical Journal, 4(4), October-December 999, [9] J. Case, M. Fedor, M. Schoffstall, and J. Davin, A simple network management protocol (SNMP), RFC 57, May 99. [] K. McCloghrie, and M. Rose, Management information base for network management of TCP/IP-based internets: MIB-II, RFC 23, March 99. [] W. Stallings, SNMP, SNMPv2, and CMIP: The Practical Guide to Network-Management Standards, Addison- Wesley, 993. [2] L. Tong, C. Bruggeman, B. Tjaden, H. Chen, and L.R. Welch, Specification and Modeling of Network Resources in Dynamic, Distributed Real-time System, 4th International Conference on Parallel and Distributed Computing Systems (PDCS 2), Dallas, Texas, August 8-, /2/$7. (C) 22 IEEE
MONITORING NETWORK QUALITY OF SERVICE IN A DYNAMIC REAL-TIME SYSTEM
MONITORING NETWORK QUALITY OF SERVICE IN A DYNAMIC REAL-TIME SYSTEM A thesis presented to the faculty of the Fritz J. and Dolores H. Russ College of Engineering and Technology of Ohio University In partial
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
Dynamic Resource Management Architecture Patterns
Dynamic Resource Architecture Patterns Lonnie R. Welch Toni Marinucci School of EECS Ohio University Athens, OH [email protected] [email protected] Michael W. Masters Paul V. Werme Naval Surface Warfare
LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE
LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE Mandis Beigi, Raymond Jennings, and Dinesh Verma IBM Thomas J. Watson Research Center 30 Saw Mill River Road, Hawthorne, NY 10532 e-mail: {mandis,
Using SNMP for Remote Measurement and Automation
Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
A Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP
Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer
A Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
QoSpy an approach for QoS monitoring in DiffServ Networks.
QoSpy an approach for QoS monitoring in DiffServ Networks. Ulrich Hofmann Alessandro Anzaloni Ricardo de Farias Santos. [email protected] Instituto Tecnológico de Aeronaútica São José dos Campos-SP-Brazil
Development of Monitoring Tools for Measuring Network Performances: A Passive Approach
IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
A Design and Implementation of Network Traffic Monitoring System for PC-room Management
A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Study of Network Performance Monitoring Tools-SNMP
310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
Lecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
With the rapid development of
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt. 9, 309 321 (1999) Design and Implementation of a Web-based Internet Performance Management System Using SNMP MIB-II By Seong Jin Ahn, Ł
Traffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com [email protected]
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
CLOUD MONITORING BASED ON SNMP
CLOUD MONITORING BASED ON SNMP 1 J. SWARNA, 2 C. SENTHIL RAJA, 3 DR.K.S.RAVICHANDRAN 1,3 SASTRA University, Thanjavur, Tamil Nadu, India 2 Alcatel-Lucent India Limited, Chennai, India Email: 1 [email protected]
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Measurement of IP Transport Parameters for IP Telephony
Measurement of IP Transport Parameters for IP Telephony B.V.Ghita, S.M.Furnell, B.M.Lines, E.C.Ifeachor Centre for Communications, Networks and Information Systems, Department of Communication and Electronic
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Simulation of an SNMP Agent: Operations, Analysis and Results
International Journal of Electronics and Computer Science Engineering 1919 Available Online at www.ijecse.org ISSN- 2277-1956 Simulation of an SNMP Agent: Operations, Analysis and Results Pradeep Kumar
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Iperf Tutorial. Jon Dugan <[email protected]> Summer JointTechs 2010, Columbus, OH
Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?
ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose
Lab 5 - Performance Measurements and SNMP Monitoring 1 Purpose Before the Lab Measure the performance (throughput) of TCP connections Measure the performance of UDP connections; observe an RTP flow Examine
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Index terms Management, Measurement, Performance Monitoring, Middleware. Keywords Wi-Fi Networks, Service Level Agreement, Visualization
A Highly Scalable Monitoring Tool for Wi-Fi Networks Machaka, P. 1, Bagula, A. 1 and De Wet, N. 2 1 Intelligent Systems and Advanced Telecommunication Laboratory(ISAT) Department of Computer Science, Room
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Network Considerations for IP Video
Network Considerations for IP Video H.323 is an ITU standard for transmitting voice and video using Internet Protocol (IP). It differs from many other typical IP based applications in that it is a real-time
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras [email protected]
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras [email protected] http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
How To Manage A Network Management System (Hitachi)
Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore
SNMP Extensions for a Self Healing Network
SNMP Extensions for a Self Healing Network Background Patent 6,088,141: This is a self healing network depending on additional hardware. It requires a second ring of connection to handle recovery operations.
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
SNMP and Network Management
SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 [email protected] http://www.nixu.fi Contents Network Management MIB naming
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Troubleshooting VoIP and Streaming Video Problems
Using the ClearSight Analyzer to troubleshoot the top five VoIP problems and troubleshoot Streaming Video With the prevalence of Voice over IP and Streaming Video applications within the enterprise, it
Network performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Enterprise Network Control and Management: Traffic Flow Models
Enterprise Network Control and Management: Traffic Flow Models William Maruyama, Mark George, Eileen Hernandez, Keith LoPresto and Yea Uang Interactive Technology Center Lockheed Martin Mission Systems
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
MS MS - Management Station MNE - Managed Network Element. Link l LAN MNE MNE...
Analyzing Mobile Agent Scalability in Network Management Marcelo Gon alves Rubinstein and Otto Carlos Muniz Bandeira Duarte {rubi, otto}@gta.ufrj.br Grupo de Teleinform tica e Automa o - GTA Universidade
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
On real-time delay monitoring in software-defined networks
On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia [email protected] Eugene V. Chemeritskiy Applied Research Center for
