RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
|
|
- Kenneth Harrington
- 8 years ago
- Views:
Transcription
1 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities of the Simple Network Management Protocol (SNMP). RMON is not used to directly manage the devices on the network. Instead, probes equipped with RMON agents passively monitor data transmitted over LAN segments. The accumulated information is retrieved by the central management system using SNMP commands. Introduction RMON enhances the management and control capabilities ofsimple Network Management Protocol-compliant network management systems and LAN analyzers. Remote MONitoring equipped probes can view every packet and produce summary information on various types of packets, such as undersized packets, and events, such as packet collisions. The probes may also store information for further analysis by capturing packets according to predefined criteria set by the network manager or test technician. For example, the network manager might only be interested in examining NetWare packets to track down the source of an intermittent problem that occurs when opening files at a remote server. According to an established threshold, an alarm can be generated if there is more than one file-open error per 100 file opens. Packets that match the filter criteria are stored in the probe's memory, while those that do not match are discarded. At any time, the SNMP-based management console can query the RMON probe for this information so that detailed analysis can be performed. Once stored, a remote manager can play back the error history of any station to pinpoint where and why an error occurred. RMON agents are becoming available for a variety of products, including Network Interface Cards (NICs), the network modules of intelligent hubs, and the boards of bridges and routers. RMON has been so widely accepted by the vendor community that it will not be long before just about any device that is attached to the network regardless of media and is manageable with SNMP can be optionally equipped with RMON agent. Initially, RMON defined media-specific objects for Ethernet only. Media-specific objects for Token Ring have recently been added and those for the Fiber Distributed Data Interface (FDDI) are anticipated in the near future. The RMON Management Information Base is organized into optional object groups with the following associated variables: Statistics Group. Maintains low-level use and error statistics (e.g., number of packets sent, broadcasts, and collisions). History Group. Provides user-defined trend analysis based on information in the statistics group. Host Table Group. For each host, contains counters for broadcasts, multicasts, errored packets, bytes sent and received, and packets sent and received.
2 Host Top N Group. Contains sorted host statistics (e.g.,a complete table of activity for the busiest nodes communicating with each host. N indicates the number of nodes specified by the network manager. Alarms Group. Allows a sampling interval and alarm threshold to be set for any counter or integer recorded by the RMON agent. Filters Group. Provides a buffer for incoming packets and user-defined filters. Packet Capture Group. Allows buffers to be specified for packet capture, buffer sizing, and the conditions for starting and stopping packet capture. Events Group. Logs events (e.g., packet matches or values that rise or fall to userdefined thresholds). Traffic Matrix Group. Arranges use and error information in matrix form to permit the retrieval and comparison of information for any pair of network addresses. Compliance with the RMON MIB standard (Request for Comment 1213) requires that the vendor provide support for every object within a selected group. Each group is optional, so when selecting RMON MIBagents users should determine the features they require and verify that those features are included in actual products. What follows is a more detailed discussion of the features provided by each group. Statistics Group The Statistics Group provides segment-level statistics. For an Ethernet segment, for example, these statistics show packets, octets(or bytes), broadcasts, multicasts, and collisions on the local segment, as well as the number of occurrences of dropped packets by the agent. Each statistic is maintained in its own 32-bit cumulative counter. Real-time packet size distribution is also provided. The number of collisions detected by the agent depends on the capability of its internal or externally attached transceiver, or Media Access Unit. The Multistation Access Unit should be receiver-based, meaning that it can detect all collisions on the segment. The Remote MONitoring Management Information Base includes error counters for five different types of packets. For Ethernet, for example, the following types of errors are counted: Undersizes (runts). Ethernet packets of less than 64 bytes, which are usually caused by a collision on the network. A normal Ethernet packet is 1,518 bytes. Excessive runt packets may indicate that the transmitting station is not configured properly. Fragments. A packet whose total length is less than 64 bytes (excluding framing bits) and is not an integral number of octets in length or which has a bad frame check sequence. CRC and alignment errors. Cyclic redundancy check (CRC)is the last 32 bits of information contained in a packet or frame and is used for detecting transmission errors. When the Cyclic Redundancy Checking value of an incoming frame is not identical to the CRC value of an outgoing frame, a bit flop is said to occur, which generates a CRC error. This is usually caused by faulty cable, as when an impedance
3 mismatch occurs, causing a reflection on the cable, which in turn causes the bit flop. An alignment error is a packet that is not an integer number of bytes in length and is between 64 and 1,518 bytes in length (including the frame check sequence but excluding the framing bits) or which has a bad frame check sequence. An alignment error is most often caused by a frame collision on the network, although loose connections or noisy cable can also be the cause. Collisions. Data sent by a device on the network without regard for any other devices that may also be trying to transmit. When two or more devices try to transmit at the same time, a collision occurs, a situation that causes the signals to collide and the data to become garbled. Oversizes (giants). A packet that exceeds the maximum 1,518 bytes (excluding framing bits but including the frame check sequence), and which has a good frame check sequence. This type of packet can be caused by a node that is not configured properly. These counters provide useful network management information beyond that provided by typical network interface cards, for example. Industry-standard cards usually provide only two separate counts ofcrc and alignment errors, and will not count packets that are either too small or too large. These runt and giant packets are counted by the RMON MIB agent because they usually indicate configuration problems in the transmitting station. Such packets usually are not passed from the receiving card driver, resulting in failed transmissions. History Group With the exception of packet size distribution, which is provided only on a real-time basis, the History Group provides historical views of the statistics provided in the Statistics Group. The History Group responds to user-defined sampling intervals and bucket counters, allowing for the complete customization of trend analysis. The Remote MONitoring Management Information Base comes with two defaults for trend analysis. The first provides for 50 buckets (or samples) of 30-second sampling intervals over a period of 25 minutes. The second default provides for 50 buckets of 30- minute sampling intervals over a period of 25 hours. Users can modify either of these or add additional intervals to meet their specific historical analysis requirements. For example, the sampling interval can range from 1 second to 1 hour. Host Table Group A host table is a standard feature of most current monitoring devices. The Remote MONitoring Management Information Base specifies a host table that includes node traffic statistics: packets sent and received, octets sent and received, broadcasts, multicasts, and error packets sent. In the host table, the classification errors sent is the combination of undersizes, fragments, Cyclic Redundancy Checking and alignment errors, jabbers and oversizes sent by each node. The RMON MIB also includes a host timetable that shows the relative order in which each host was discovered by the agent. This data is not only useful for network management purposes, but also assists in uploading to the management station only those nodes of which it is not aware. This index entry improves performance and reduces unnecessary Simple Network Management Protocol traffic on the entwork.
4 Host Top N Group The Host Top N Group extends the host table by providing sorted host statistics (e.g., the top 10 nodes sending packets or an ordered list of all nodes according to the errors sent over the last 24hours). Both the data selected and the duration of the study are defined by the user at the network management station, and the number of studies is limited only by the resources of the monitoring device. When a set of statistics is selected for study, only the selected statistics are maintained in the Host Top N counters; other statistics over the same time intervals are not available for later study. This processing performed remotely in the Remote MONitoring Management Information Baseagent reduces Simple Network Management Protocol traffic on the network and the processing load on the management station. The station would otherwise need to use Simple Network Management Protocol to get the entire host table and sort it locally. Alarms Group The Alarms Group provides a general mechanism for setting thresholds and sampling intervals to generate events on any counter or integer maintained by the agent (e.g., segment statistics, node traffic statistics defined in the host table, or any user-defined packet match counter defined in the Filters Group). Both rising and falling thresholds may be set, because both can indicate network faults. For example, crossing a high threshold can indicate network performance problems; crossing a low threshold may signal the failure of a scheduled network backup. Thresholds can be established on both the absolute value of a statistic or its delta value, so the manager is notified of rapid spikes or drops in a monitored value. Rising and falling thresholds work together in an alternating fashion. After a rising threshold is crossed, another rising event is not generated until the matching falling threshold is crossed. Filters Group The Filters Group provides a generic filter engine that implements all packet capture functions and events. The filter engine fills the packet capture buffer with packets that match the user-specified filtering criteria. Any individual packet match filter can serve as a start or stop trace trigger. The conditions within a single filter can be combined using the boolean parameters and or not. Multiple filters are combined with the boolean or parameter. Users can choose to capture packets that are valid or invalid, or are one of the five error packet types (discussed previously). If the proper protocol decoding capability is in place at the management station, this filtering essentially provides distributed protocol analysis to supplement the use of technicians equipped with portable protocol analyzers. The monitor also maintains counters of each packet match for statistical analysis. Either an individual packet match, or a multiple number of packet matches through Alarms, can trigger an event to the log or the network management system using an Simple Network Management Protocol trap. Although these counters are not available to the History Group for trend analysis, a management station may request these counters through regular polling of the monitor so that trend analysis can be performed.
5 Packet Capture Group What packets are collected is dependent on the Filter Group. The Packet Capture Group allows users to create multiple capture buffers and to control whether the trace buffers will wrap (overwrite) when full or stop capturing. Depending on the agent, the user may expand or contract the size of the buffer to fit immediate needs for packet capturing without permanently committing memory that will not be needed later. The network manager can specify a packet match as a start trigger for a trace and depend on the monitor to collect the trace without further manager involvement. The Remote MONitoring Management Information Base includes configurable capture slice sizes to store either the first few bytes of a packet where the protocol header is located or to store the entire packet. The default slice setting specified by the RMON MIBis the first 100 octets. Events Group The Events Group is used to create entries in the monitor log or to create Simple Network Management Protocol traps, from the agent to the management station, on any specified event. An event can be a crossed threshold on any integer or counter or from any packet match count. Vendors may add other notification capabilities, including administrative events from the agent (e.g., a power failure or reset). The log includes the time of day for each event and a description of the event. The log wraps (overwrites) when full, so events may be lost if they are not uploaded to the management station periodically. The rate at which the log fills depends on the resources the monitor dedicates to the log and the number of notifications the user has sent to the log. Traps can be delivered by the agent to multiple management stations if each station matches the single community name destination specified for the trap. An Remote MONitoring Management Information Base agent will support each of the five traps required by SNMP: link up; link down; warm start; cold start; and authentication failure. Three additional traps are specified in the RMON MIB: rising threshold; falling threshold; and packet match. Traffic Matrix Group The Remote MONitoring Management Information Base includes a traffic matrix at the Media Access Control layer. A traffic matrix shows the amount of traffic and number of errors between pairs of nodes one source and one destination address per pair. For each pair, the RMON MIB maintains counters for the number of packets, number of octets, and error packets between the nodes. Users can sort this data either by source or destination address. Benefits of RMON RMON is typically offered as an optional expansion package to vendors' Simple Network Management Protocol-compliant network management systems, facilitating the gathering of information from network devices, which can be used for fault diagnosis, performance tuning, and network planning. Although the standard Management Information Base II is designed to provide real-time protocol management for devices that use the Exterior Gateway Protocol (EGP), Internet Protocol (IP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and SNMP, the accumulation of historical performance data requires that
6 the network management station constantly poll every network device and store the data itself. In many cases, however, historical data is better gathered at the network device itself, and only retrieved occasionally by the network management station. This is exactly what the Remote MONitoring Management Information Baseis designed to do. It reduces network overhead caused by SNMP polling and reduces network management system processing overhead. RMON also can be used to provide proxy management, either intercepting SNMP requests for other agents, or acting as an agent for network devices that are not SNMP-compliant. In the case where multiple management stations are trying to manage a single agent, a proxy agent can shield the real agents from redundant requests, and can respond for them. Proxies also can send a single agent's trap to multiple management stations. Proxies can reduce the amount of SNMP traffic hitting the network, enhance Simple Network Management Protocol security and be used to manage proprietary network devices or devices such as MAC-level bridges, wiring hubs or modems that work below the network layer of the Open Systems Interconnection reference model. In-Band and Out-Of-Band Activities All monitoring and control interactions between agent modules and network management stations occur using Simple Network Management Protocol. The information collected by Remote MONitoring-compliant devices can be sent to the central management station in either of two ways: in-band through the data stream or out-of-band through an RS-232 serial link and modem. In-band transport protocol options include standard User Datagram Protocol/Internet Protocol (UDP/IP), and UDP/IP encapsulated within source-routed frames (which allows the SNMP traffic to pass through internetworks joined by sourcerouting bridges). In-band management can also be conducted over a Telnet session running over the LAN. Out-of-band management may be accomplished through modem connection to an RS-232 port, or by using the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP) over router-based WAN c onnections when the network management system is remotely located. The modem connection can be used as a backup, allowing outof-band communications should in-band communications fail. Conclusion RMON provides the benefits of standardization, including multivendor support and potential commodity pricing. As the vendor community continues to offer Remote MONitoring-compliant products, users will be able to mix and match them and manage them from a single network management system. The RMON Management Information Base is a more flexible and economical solution to monitoring network performance than the proprietary systems currently on the market. Many of these vendors are expected to support Remote MONitoring, so products already purchased may only have to receive software upgrades to be of continued use. Author Biographies Nathan J. Muller Nathan J. Muller is an independent consultant in Huntsville, Alabama specializing in advanced technology marketing and education. With 22 years of industry experience, he
7 has written extensively on many aspects of computers and communications, having published seven books and over 500 articles. He has held numerous technical and marketing positions with such companies as Control Data Corporation, Planning Research Corporation, Cable & Wireless Communications, ITT Telecom, and General DataComm, Inc. He has an M.A. in Social and Organizational Behavior from George Washington University.
52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
More informationNetwork Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
More informationIntroduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
More informationSNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
More information51-10-50 Circuit-Switched Router Connections Nathan J. Muller
Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible
More informationHow Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
More informationTUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright
More informationAppendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
More informationL2 / L3 Switches. Remote Network Monitoring (RMON) Configuration Guide
L2 / L3 Switches Remote Network Monitoring (RMON) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes no
More informationSection 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture
Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationTop-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationNetwork performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
More informationLecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
More informationPerformance Management
Performance Management Performance Management Overview Network Monitoring RMON RMON II 6-1 Performance Management Choosing the performance metrics to monitor is difficult Too many to choose from Difficult
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationADMINISTRATION GUIDE Cisco Small Business
ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration Utility 1 Launching the Configuration
More informationToken-ring local area network management
Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationHow To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide
ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide 10/100 Switches SF 300-08, SF 302-08, SF 302-08MP, SF 302-08P, SF 300-24, SF 300-24P, SF 300-48, SF 300-48P Gigabit
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationNetwork Management Functions RMON1, RMON2. Network Management
Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationSolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationThe BANDIT Device in the Network
encor! enetworks TM Version A.1, March 2010 2013 Encore Networks, Inc. All rights reserved. The BANDIT Device in the Network The BANDIT II and the BANDIT III, ROHS-compliant routers in the family of BANDIT
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationConfiguring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationCisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationCisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7
ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7 Contents Table of Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationThe ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere
Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management
More informationExhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
More informationIntroduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationPost-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
More informationSimple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationRUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationCandidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
More informationGigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF
Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationSolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
More information11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
More informationA Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
More informationLeased Line PPP Connections Between IOS and HP Routers
Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationIntroduction to the Catalyst 3900
CHAPTER 1 Introduction to the Catalyst 3900 This chapter contains the following information about the Catalyst 3900: Product Overview on page 1-1 Physical Characteristics of the Catalyst 3900 on page 1-8
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
More informationIntroduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationtheguard! Service Management Center (Valid for Version 6.3 and higher)
theguard! Service Management Center (Valid for Version 6.3 and higher) Introduction Introduction about the minimal system requirements of theguard! Service Management Center. The theguard! Service Management
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More informationCisco Small Business 200 Series Smart Switch Administration Guide Release 1.3
ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3 Contents Chapter 1: Getting Started 1 Starting the Web-based Configuration Utility 1 Launching the Configuration
More informationLesson 5-2: Network Maintenance and Management
Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software
More informationA Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, acecil19@yahoo.com Abstract As company intranets
More informationPrestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
More information! encor en etworks TM
! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationFrom Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
More informationInternetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationDC70 NETWORK MANAGEMENT JUN 2015
Q.2 a. Most of the popular host operating systems come with the TCP/IP Suite and are amenable to SNMP management. The current networks management systems, however, suffer from several limitations. Describe
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationHow To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip
Remote Network Monitoring and Alarm Troubleshooting This chapter describes remote network monitoring (RMON) and alarm troubleshooting. RMON Procedures, page 1 Understanding RMON, page 1 Alarm Troubleshooting,
More information51-30-10 Selecting a Firewall Gilbert Held
51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationNetwork Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University
Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting
More informationNetwork Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com info@imagestream.com Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
More informationDSX Master Communications
DSX Access Systems, Inc. PC to Master Controller - Direct Connect Communications DSX Master Communications Communications between the Comm Server PC and the Master Controller can take several forms which
More informationLeased Line + Remote Dial-in connectivity
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
More information