RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Size: px
Start display at page:

Download "52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller"

Transcription

1 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities of the Simple Network Management Protocol (SNMP). RMON is not used to directly manage the devices on the network. Instead, probes equipped with RMON agents passively monitor data transmitted over LAN segments. The accumulated information is retrieved by the central management system using SNMP commands. Introduction RMON enhances the management and control capabilities ofsimple Network Management Protocol-compliant network management systems and LAN analyzers. Remote MONitoring equipped probes can view every packet and produce summary information on various types of packets, such as undersized packets, and events, such as packet collisions. The probes may also store information for further analysis by capturing packets according to predefined criteria set by the network manager or test technician. For example, the network manager might only be interested in examining NetWare packets to track down the source of an intermittent problem that occurs when opening files at a remote server. According to an established threshold, an alarm can be generated if there is more than one file-open error per 100 file opens. Packets that match the filter criteria are stored in the probe's memory, while those that do not match are discarded. At any time, the SNMP-based management console can query the RMON probe for this information so that detailed analysis can be performed. Once stored, a remote manager can play back the error history of any station to pinpoint where and why an error occurred. RMON agents are becoming available for a variety of products, including Network Interface Cards (NICs), the network modules of intelligent hubs, and the boards of bridges and routers. RMON has been so widely accepted by the vendor community that it will not be long before just about any device that is attached to the network regardless of media and is manageable with SNMP can be optionally equipped with RMON agent. Initially, RMON defined media-specific objects for Ethernet only. Media-specific objects for Token Ring have recently been added and those for the Fiber Distributed Data Interface (FDDI) are anticipated in the near future. The RMON Management Information Base is organized into optional object groups with the following associated variables: Statistics Group. Maintains low-level use and error statistics (e.g., number of packets sent, broadcasts, and collisions). History Group. Provides user-defined trend analysis based on information in the statistics group. Host Table Group. For each host, contains counters for broadcasts, multicasts, errored packets, bytes sent and received, and packets sent and received.

2 Host Top N Group. Contains sorted host statistics (e.g.,a complete table of activity for the busiest nodes communicating with each host. N indicates the number of nodes specified by the network manager. Alarms Group. Allows a sampling interval and alarm threshold to be set for any counter or integer recorded by the RMON agent. Filters Group. Provides a buffer for incoming packets and user-defined filters. Packet Capture Group. Allows buffers to be specified for packet capture, buffer sizing, and the conditions for starting and stopping packet capture. Events Group. Logs events (e.g., packet matches or values that rise or fall to userdefined thresholds). Traffic Matrix Group. Arranges use and error information in matrix form to permit the retrieval and comparison of information for any pair of network addresses. Compliance with the RMON MIB standard (Request for Comment 1213) requires that the vendor provide support for every object within a selected group. Each group is optional, so when selecting RMON MIBagents users should determine the features they require and verify that those features are included in actual products. What follows is a more detailed discussion of the features provided by each group. Statistics Group The Statistics Group provides segment-level statistics. For an Ethernet segment, for example, these statistics show packets, octets(or bytes), broadcasts, multicasts, and collisions on the local segment, as well as the number of occurrences of dropped packets by the agent. Each statistic is maintained in its own 32-bit cumulative counter. Real-time packet size distribution is also provided. The number of collisions detected by the agent depends on the capability of its internal or externally attached transceiver, or Media Access Unit. The Multistation Access Unit should be receiver-based, meaning that it can detect all collisions on the segment. The Remote MONitoring Management Information Base includes error counters for five different types of packets. For Ethernet, for example, the following types of errors are counted: Undersizes (runts). Ethernet packets of less than 64 bytes, which are usually caused by a collision on the network. A normal Ethernet packet is 1,518 bytes. Excessive runt packets may indicate that the transmitting station is not configured properly. Fragments. A packet whose total length is less than 64 bytes (excluding framing bits) and is not an integral number of octets in length or which has a bad frame check sequence. CRC and alignment errors. Cyclic redundancy check (CRC)is the last 32 bits of information contained in a packet or frame and is used for detecting transmission errors. When the Cyclic Redundancy Checking value of an incoming frame is not identical to the CRC value of an outgoing frame, a bit flop is said to occur, which generates a CRC error. This is usually caused by faulty cable, as when an impedance

3 mismatch occurs, causing a reflection on the cable, which in turn causes the bit flop. An alignment error is a packet that is not an integer number of bytes in length and is between 64 and 1,518 bytes in length (including the frame check sequence but excluding the framing bits) or which has a bad frame check sequence. An alignment error is most often caused by a frame collision on the network, although loose connections or noisy cable can also be the cause. Collisions. Data sent by a device on the network without regard for any other devices that may also be trying to transmit. When two or more devices try to transmit at the same time, a collision occurs, a situation that causes the signals to collide and the data to become garbled. Oversizes (giants). A packet that exceeds the maximum 1,518 bytes (excluding framing bits but including the frame check sequence), and which has a good frame check sequence. This type of packet can be caused by a node that is not configured properly. These counters provide useful network management information beyond that provided by typical network interface cards, for example. Industry-standard cards usually provide only two separate counts ofcrc and alignment errors, and will not count packets that are either too small or too large. These runt and giant packets are counted by the RMON MIB agent because they usually indicate configuration problems in the transmitting station. Such packets usually are not passed from the receiving card driver, resulting in failed transmissions. History Group With the exception of packet size distribution, which is provided only on a real-time basis, the History Group provides historical views of the statistics provided in the Statistics Group. The History Group responds to user-defined sampling intervals and bucket counters, allowing for the complete customization of trend analysis. The Remote MONitoring Management Information Base comes with two defaults for trend analysis. The first provides for 50 buckets (or samples) of 30-second sampling intervals over a period of 25 minutes. The second default provides for 50 buckets of 30- minute sampling intervals over a period of 25 hours. Users can modify either of these or add additional intervals to meet their specific historical analysis requirements. For example, the sampling interval can range from 1 second to 1 hour. Host Table Group A host table is a standard feature of most current monitoring devices. The Remote MONitoring Management Information Base specifies a host table that includes node traffic statistics: packets sent and received, octets sent and received, broadcasts, multicasts, and error packets sent. In the host table, the classification errors sent is the combination of undersizes, fragments, Cyclic Redundancy Checking and alignment errors, jabbers and oversizes sent by each node. The RMON MIB also includes a host timetable that shows the relative order in which each host was discovered by the agent. This data is not only useful for network management purposes, but also assists in uploading to the management station only those nodes of which it is not aware. This index entry improves performance and reduces unnecessary Simple Network Management Protocol traffic on the entwork.

4 Host Top N Group The Host Top N Group extends the host table by providing sorted host statistics (e.g., the top 10 nodes sending packets or an ordered list of all nodes according to the errors sent over the last 24hours). Both the data selected and the duration of the study are defined by the user at the network management station, and the number of studies is limited only by the resources of the monitoring device. When a set of statistics is selected for study, only the selected statistics are maintained in the Host Top N counters; other statistics over the same time intervals are not available for later study. This processing performed remotely in the Remote MONitoring Management Information Baseagent reduces Simple Network Management Protocol traffic on the network and the processing load on the management station. The station would otherwise need to use Simple Network Management Protocol to get the entire host table and sort it locally. Alarms Group The Alarms Group provides a general mechanism for setting thresholds and sampling intervals to generate events on any counter or integer maintained by the agent (e.g., segment statistics, node traffic statistics defined in the host table, or any user-defined packet match counter defined in the Filters Group). Both rising and falling thresholds may be set, because both can indicate network faults. For example, crossing a high threshold can indicate network performance problems; crossing a low threshold may signal the failure of a scheduled network backup. Thresholds can be established on both the absolute value of a statistic or its delta value, so the manager is notified of rapid spikes or drops in a monitored value. Rising and falling thresholds work together in an alternating fashion. After a rising threshold is crossed, another rising event is not generated until the matching falling threshold is crossed. Filters Group The Filters Group provides a generic filter engine that implements all packet capture functions and events. The filter engine fills the packet capture buffer with packets that match the user-specified filtering criteria. Any individual packet match filter can serve as a start or stop trace trigger. The conditions within a single filter can be combined using the boolean parameters and or not. Multiple filters are combined with the boolean or parameter. Users can choose to capture packets that are valid or invalid, or are one of the five error packet types (discussed previously). If the proper protocol decoding capability is in place at the management station, this filtering essentially provides distributed protocol analysis to supplement the use of technicians equipped with portable protocol analyzers. The monitor also maintains counters of each packet match for statistical analysis. Either an individual packet match, or a multiple number of packet matches through Alarms, can trigger an event to the log or the network management system using an Simple Network Management Protocol trap. Although these counters are not available to the History Group for trend analysis, a management station may request these counters through regular polling of the monitor so that trend analysis can be performed.

5 Packet Capture Group What packets are collected is dependent on the Filter Group. The Packet Capture Group allows users to create multiple capture buffers and to control whether the trace buffers will wrap (overwrite) when full or stop capturing. Depending on the agent, the user may expand or contract the size of the buffer to fit immediate needs for packet capturing without permanently committing memory that will not be needed later. The network manager can specify a packet match as a start trigger for a trace and depend on the monitor to collect the trace without further manager involvement. The Remote MONitoring Management Information Base includes configurable capture slice sizes to store either the first few bytes of a packet where the protocol header is located or to store the entire packet. The default slice setting specified by the RMON MIBis the first 100 octets. Events Group The Events Group is used to create entries in the monitor log or to create Simple Network Management Protocol traps, from the agent to the management station, on any specified event. An event can be a crossed threshold on any integer or counter or from any packet match count. Vendors may add other notification capabilities, including administrative events from the agent (e.g., a power failure or reset). The log includes the time of day for each event and a description of the event. The log wraps (overwrites) when full, so events may be lost if they are not uploaded to the management station periodically. The rate at which the log fills depends on the resources the monitor dedicates to the log and the number of notifications the user has sent to the log. Traps can be delivered by the agent to multiple management stations if each station matches the single community name destination specified for the trap. An Remote MONitoring Management Information Base agent will support each of the five traps required by SNMP: link up; link down; warm start; cold start; and authentication failure. Three additional traps are specified in the RMON MIB: rising threshold; falling threshold; and packet match. Traffic Matrix Group The Remote MONitoring Management Information Base includes a traffic matrix at the Media Access Control layer. A traffic matrix shows the amount of traffic and number of errors between pairs of nodes one source and one destination address per pair. For each pair, the RMON MIB maintains counters for the number of packets, number of octets, and error packets between the nodes. Users can sort this data either by source or destination address. Benefits of RMON RMON is typically offered as an optional expansion package to vendors' Simple Network Management Protocol-compliant network management systems, facilitating the gathering of information from network devices, which can be used for fault diagnosis, performance tuning, and network planning. Although the standard Management Information Base II is designed to provide real-time protocol management for devices that use the Exterior Gateway Protocol (EGP), Internet Protocol (IP), Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), and SNMP, the accumulation of historical performance data requires that

6 the network management station constantly poll every network device and store the data itself. In many cases, however, historical data is better gathered at the network device itself, and only retrieved occasionally by the network management station. This is exactly what the Remote MONitoring Management Information Baseis designed to do. It reduces network overhead caused by SNMP polling and reduces network management system processing overhead. RMON also can be used to provide proxy management, either intercepting SNMP requests for other agents, or acting as an agent for network devices that are not SNMP-compliant. In the case where multiple management stations are trying to manage a single agent, a proxy agent can shield the real agents from redundant requests, and can respond for them. Proxies also can send a single agent's trap to multiple management stations. Proxies can reduce the amount of SNMP traffic hitting the network, enhance Simple Network Management Protocol security and be used to manage proprietary network devices or devices such as MAC-level bridges, wiring hubs or modems that work below the network layer of the Open Systems Interconnection reference model. In-Band and Out-Of-Band Activities All monitoring and control interactions between agent modules and network management stations occur using Simple Network Management Protocol. The information collected by Remote MONitoring-compliant devices can be sent to the central management station in either of two ways: in-band through the data stream or out-of-band through an RS-232 serial link and modem. In-band transport protocol options include standard User Datagram Protocol/Internet Protocol (UDP/IP), and UDP/IP encapsulated within source-routed frames (which allows the SNMP traffic to pass through internetworks joined by sourcerouting bridges). In-band management can also be conducted over a Telnet session running over the LAN. Out-of-band management may be accomplished through modem connection to an RS-232 port, or by using the Serial Line Internet Protocol (SLIP) or the Point-to-Point Protocol (PPP) over router-based WAN c onnections when the network management system is remotely located. The modem connection can be used as a backup, allowing outof-band communications should in-band communications fail. Conclusion RMON provides the benefits of standardization, including multivendor support and potential commodity pricing. As the vendor community continues to offer Remote MONitoring-compliant products, users will be able to mix and match them and manage them from a single network management system. The RMON Management Information Base is a more flexible and economical solution to monitoring network performance than the proprietary systems currently on the market. Many of these vendors are expected to support Remote MONitoring, so products already purchased may only have to receive software upgrades to be of continued use. Author Biographies Nathan J. Muller Nathan J. Muller is an independent consultant in Huntsville, Alabama specializing in advanced technology marketing and education. With 22 years of industry experience, he

7 has written extensively on many aspects of computers and communications, having published seven books and over 500 articles. He has held numerous technical and marketing positions with such companies as Control Data Corporation, Planning Research Corporation, Cable & Wireless Communications, ITT Telecom, and General DataComm, Inc. He has an M.A. in Social and Organizational Behavior from George Washington University.

52-20-16 Using RMON to Manage Remote Networks Gilbert Held

52-20-16 Using RMON to Manage Remote Networks Gilbert Held 52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management

More information

Network Management & Security (CS 330) RMON

Network Management & Security (CS 330) RMON Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network

More information

Introduction to Simple Network Management Protocol (SNMP)

Introduction to Simple Network Management Protocol (SNMP) Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

How Much Broadcast and Multicast Traffic Should I Allow in My Network?

How Much Broadcast and Multicast Traffic Should I Allow in My Network? PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect

More information

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the

More information

L2 / L3 Switches. Remote Network Monitoring (RMON) Configuration Guide

L2 / L3 Switches. Remote Network Monitoring (RMON) Configuration Guide L2 / L3 Switches Remote Network Monitoring (RMON) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes no

More information

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Network performance and capacity planning: Techniques for an e-business world

Network performance and capacity planning: Techniques for an e-business world IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,

More information

Lecture 12: Network Management Architecture

Lecture 12: Network Management Architecture Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business

More information

Performance Management

Performance Management Performance Management Performance Management Overview Network Monitoring RMON RMON II 6-1 Performance Management Choosing the performance metrics to monitor is difficult Too many to choose from Difficult

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration Utility 1 Launching the Configuration

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide

ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide 10/100 Switches SF 300-08, SF 302-08, SF 302-08MP, SF 302-08P, SF 300-24, SF 300-24P, SF 300-48, SF 300-48P Gigabit

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Network Management Functions RMON1, RMON2. Network Management

Network Management Functions RMON1, RMON2. Network Management Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

The BANDIT Device in the Network

The BANDIT Device in the Network encor! enetworks TM Version A.1, March 2010 2013 Encore Networks, Inc. All rights reserved. The BANDIT Device in the Network The BANDIT II and the BANDIT III, ROHS-compliant routers in the family of BANDIT

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7

Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7 ADMINISTRATION GUIDE Cisco Small Business 300 Series Managed Switch Administration Guide Release 1.2.7 Contents Table of Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference

SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

A Research Study on Packet Sniffing Tool TCPDUMP

A Research Study on Packet Sniffing Tool TCPDUMP A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this

More information

Leased Line PPP Connections Between IOS and HP Routers

Leased Line PPP Connections Between IOS and HP Routers Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Introduction to the Catalyst 3900

Introduction to the Catalyst 3900 CHAPTER 1 Introduction to the Catalyst 3900 This chapter contains the following information about the Catalyst 3900: Product Overview on page 1-1 Physical Characteristics of the Catalyst 3900 on page 1-8

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

theguard! Service Management Center (Valid for Version 6.3 and higher)

theguard! Service Management Center (Valid for Version 6.3 and higher) theguard! Service Management Center (Valid for Version 6.3 and higher) Introduction Introduction about the minimal system requirements of theguard! Service Management Center. The theguard! Service Management

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3

Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3 ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Release 1.3 Contents Chapter 1: Getting Started 1 Starting the Web-based Configuration Utility 1 Launching the Configuration

More information

Lesson 5-2: Network Maintenance and Management

Lesson 5-2: Network Maintenance and Management Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software

More information

A Summary of Network Traffic Monitoring and Analysis Techniques

A Summary of Network Traffic Monitoring and Analysis Techniques http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, acecil19@yahoo.com Abstract As company intranets

More information

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files

More information

! encor en etworks TM

! encor en etworks TM ! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

DC70 NETWORK MANAGEMENT JUN 2015

DC70 NETWORK MANAGEMENT JUN 2015 Q.2 a. Most of the popular host operating systems come with the TCP/IP Suite and are amenable to SNMP management. The current networks management systems, however, suffer from several limitations. Describe

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

How To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip

How To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip Remote Network Monitoring and Alarm Troubleshooting This chapter describes remote network monitoring (RMON) and alarm troubleshooting. RMON Procedures, page 1 Understanding RMON, page 1 Alarm Troubleshooting,

More information

51-30-10 Selecting a Firewall Gilbert Held

51-30-10 Selecting a Firewall Gilbert Held 51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

Network Monitoring White Paper

Network Monitoring White Paper Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com info@imagestream.com Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488

More information

DSX Master Communications

DSX Master Communications DSX Access Systems, Inc. PC to Master Controller - Direct Connect Communications DSX Master Communications Communications between the Comm Server PC and the Master Controller can take several forms which

More information

Leased Line + Remote Dial-in connectivity

Leased Line + Remote Dial-in connectivity Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,

More information