Popular Unix Performance- Monitoring Tools for Linux CHAPTER
|
|
|
- Reynard Lloyd
- 10 years ago
- Views:
Transcription
1 Popular Unix Performance- Monitoring Tools for Linux CHAPTER 3
2 46 Performance Tuning Tools PART II Before the Linux kernel, there was Unix. Well, okay, there were a lot of different flavors of Unix, but most Unix systems came from Hewlett Packard s Unix HP-UX to Sun Microsystem s SunOS and Solaris. In addition to the commercial variety, there were also other free Unix operating systems. The Berkeley Software Distribution (BSD) was the main free Unix; it later spawned three flavors of free Unix systems: OpenBSD, FreeBSD, and NetBSD. Without going into too much historical detail, it is safe to assume that the art of performance tuning has been around a long time. To better enable the system administrator in the task of performance tuning, many tools were created on these systems well before the Linux kernel became as popular as it is today. Almost all of those tools have been ported to or rewritten for use on Linux-based operating systems. The reverse also is true: Many of the newer tools initially developed on Linux-based systems have been ported on to other flavors of Unix. This chapter looks at some of the more popular Unix tools that have been ported or rewritten for use on Linux systems. NOTE For more information on the history of Unix, go online and search or Many Web sites chronicle Unix and Unix-like operating systems history. The Scope of These Tools and the Chapter Take my word for it: A plethora of other performance-monitoring tools are available for Linux and other Unix operating systems. This chapter takes a look at the most common of these tools. Indeed, an entire book could be written on every single performance tool ported to or written on Linux systems. The unfortunate truth, however, is that the book would never be upto-date because so many are added almost daily. This chapter is divided into four generic sections of tools: 1. All-purpose tools 2. Disk benchmark tools 3. Network monitoring tools 4. Other tools
3 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 47 It is important to note that we do not break down the tools by subsystem alone because there are very few subsystem-specific tools. Many performance-monitoring tools can monitor all the subsystems or, as was noted in Chapter 1, Overview of Performance Tuning, the big three: CPU, disk, and memory. Interpreting Results and Other Notes Before delving into how each tool works and what the returned information means, I have to throw out a disclaimer. Most performance-monitoring tools used in a somewhat random pattern can sometimes yield random results. It is quite common for documentation that comes with a tool to state that scripting with it might yield better long-term results. To better understand this, think about real performance and perceived performance. Even the system administrator can be tricked into freaking out over a quick loss of performance. A prime example is with quick compiling programs. If you happen to run a monitoring tool around the same time that a programmer is running a compile, it might appear that the system is being taxed when, in fact, it is not under a sustained load. Most likely you already realize that systems will occasionally face a quick burst load that really does not harm the overall performance of the system. However, do all users or staff members realize this? Most likely they do not remember, a little user education never hurts. All-Purpose Tools Unix provides many tools for the system administrator to monitor systems. However, it is worth noting at this point that what you read here about these utilities might be different, depending on your Linux distribution. 3 Unix Performance- Monitoring Tools The top Utility Arguably one of the most popular tools for performance monitoring on Unix systems in general is the top utility. As its name might suggest, this tool displays the top CPU-intensive processes in close to real time. The top display is refreshed every 5 seconds by default, but it can be modified with the -s option for longer or shorter intervals. The top utility also provides an interactive mode for modifying process behavior. The following is the syntax for starting top: $ top Figure 3.1 shows an example of top output to a standard terminal screen.
4 48 Performance Tuning Tools PART II FIGURE 3.1 An example of the top process monitor. Table 3.1 explains the monitor fields in top. TABLE 3.1 Field top Monitor Fields Description up processes CPU States Mem Swap How long the system has been running since the last time it was rebooted. The load averages are displayed as well. Total number of processes running since the last time the top monitor checked. This measurement includes all processes on the system. An average percent of CPU time. This field examines all aspects of CPU time, including user, idle, and niced tasks. Because niced tasks are included, the total can go over 100%, so do not be alarmed if this is the case (unless it is an outrageous value, such as 160%). All the memory statistics, such as total memory, available memory for nonkernel processes, memory in use, and memory that is shared and buffered. Swap statistics, including total allocated swap space, available swap space, and used swap space. Table 3.2 explains the process fields in top. TABLE 3.2 Field PID USER top Process Fields Description Process ID of each task. Username of each task.
5 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 49 TABLE 3.2 Field Continued Description PRI NI SIZE RSS SHARE STATE TIME %CPU %MEM COMMAND Priority of each task. Nice value of each task. Total size of a task, including code and data, plus the stack space in kilobytes. Amount of physical memory used by the task. Amount of shared memory used by a task. Current CPU state of a task. The states can be S for sleeping, D for uninterrupted, R for running, T for stopped/traced, and Z for zombied. The CPU time that a task has used since it started. The CPU time that a task has used since the last update. A task s share of physical memory. The task s command name. NOTE A task s command name is truncated if the tasks have only the program name in parentheses. In addition to just watching the top display, you can manipulate the top display in interactive mode and modify running processes. The interactive mode is invoked by pressing H while the display is running. 3 Unix Performance- Monitoring Tools What about understanding what top tells you and knowing how to filter? A good example is simple filtering. In this example, a process is intermittently jumping to the top of the monitor. It might help to stop the monitor and start it with a few filtering options to get rid of information that you do not want: $ top -i Still, you cannot catch the culprit in action. Next you can disable some of the information that you want by toggling on or off displays such as the memory summary. The great thing about top is that it provides a lot of different information quickly, and it updates periodically. For example, a process might be at the top, but why? Is it because it requires more processor time? Or is it eating memory? With the additional fields shown, more information is displayed in one location.
6 50 Performance Tuning Tools PART II vmstat The name vmstat comes from report virtual memory statistics. The vmstat utility does a bit more than this, though. In addition to reporting virtual memory, vmstat reports certain kernel statistics about processes, disk, trap, and CPU activity. The syntax for vmstat is as follows: $ vmstat interval [count] A sample syntax with an interval of 5 seconds and five counts would look like this: $ vmstat 5 5 procs memory swap io system cpu r b w swpd free buff cache si so bi bo in cs us sy id The very first line of output by vmstat is the average values for statistics since boot time, so do not be alarmed by high values. The vmstat output is actually broken up into five sections: procs, memory, swap, io, and cpu. Each section is outlined in the following table. TABLE 3.3 Field r b w The procs Section Description Number of processes that are in a wait state and basically not doing anything but waiting to run Number of processes that were in sleep mode and were interrupted since the last update Number of processes that have been swapped out by mm and vm subsystems and have yet to run TABLE 3.4 Field swpd free buff cache The Memory Section Description The total amount of physical virtual memory in use The amount of physical memory that is free or available Memory that was being buffered when the measurement was taken Cache that is in use
7 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 51 TABLE 3.5 Field si so The Swap Section Description Amount of memory transferred from swap space back into memory Amount of memory swapped to disk TABLE 3.6 Field bi The IO Section Description Disk blocks sent to disk devices in blocks per second TABLE 3.7 Field in cs TABLE 3.8 Field us sy id The System Section Description Interrupts per second, including the CPU clocks Context switches per second within the kernel The CPU Section Description Percentage of CPU cycles spent on user processes Percentage of CPU cycles spent on system processes Percentage of unused CPU cycles or idle time when the CPU is basically doing nothing 3 Unix Performance- Monitoring Tools Interpreting the output of these measurements tells you that there is some outbound disk activity (as shown by the bo field). Also note the increase in the in field of the system section once vmstat was started. This implies that vmstat increases the number of interrupts. Here you return to the idea of properly reading output. It is a good idea to look at the tools covered in this chapter when the system is idling so that you know what effect a performance-monitoring tool can have on the system. xload and xosview Along with many command-line driven tools for Unix systems are X11-based tools. This section covers two of them, xload and xosview. Both distinctly different graphical monitoring tools, they provide a very quick glance method of watching your systems run.
8 52 Performance Tuning Tools PART II xload The first of the two is xload. In a nutshell, xload displays the system load average. It also has an alarm bar that shows when the load average is high. Figure 3.2 shows what xload typically looks like. FIGURE 3.2 An example of xload. To start xload, simply open an xterminal on the system and type the following: $ xload & The system knows to which display to go, so it automatically pops up. If you are running xload from a remote system to your X Window System, you can do one of two things: 1. Set a permanent DISPLAY variable in your.profile by entering this: DISPLAY=<your_ip_address>:0 export DISPLAY 2. Simply direct it to your system with this syntax: $ xload -display <your_ip_address> & The xload utility displays a histogram (chart) of the system load average. It updates this information periodically. The default is every 10 seconds, but this can be changed with the update option. xosview The xosview utility can display a much more detailed collection of histograms about the system s performance in close to real time. Of course, you easily can filter what you want to see in xosview using command-line options by specifying the subsystem with + or - (true and false, respectively). For example, to not see the CPU histogram, the syntax would be this: $ xosview -cpu & The xosview utility can be started from remote systems to a local X server in the same manner as xload. The colors, font, and other properties can be controlled by Xresource settings.
9 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 53 FIGURE 3.3 xosview, with all subsystems being monitored. One interesting aspect of xosview is that it combines certain histograms into one horizontal bar. This requires some explanation. LOAD This field has two colors. The first color is the load average of processes, and the second color (the background color) is idle processes relative to the load average. When the load average goes above 1.0, the bar will change colors. CPU The CPU field has four colors related to process type usage: usr, nice, sys, and free. MEM In this field, the full amount of real memory in use is shown. There are four colors in this field: user-allocated memory, shared memory, buffers, and free memory. SWAP Swap has two colors; the first indicates the swap in use, and the second indicates what is free. PAGE This field has three colors: in, for paging in; out, for paging out; and idle. DISK This field has three colors: in, for transfers to disk; out for transfers from disk; and idle. INTS This field is a set of indicators that correspond to IRQ usage. They are numbered starting at 0 from the left. 3 Unix Performance- Monitoring Tools uptime The uptime command displays the current time, the length of time that the system has been up, the number of users, and the load average of the system over the last 1, 5, and 15 minutes. It looks something like this: 6:51PM up 2 days, 22:50, 6 users, load averages: 0.18, 0.30, 0.34 Benchmarking Your Disks with Bonnie Most disk performance-monitoring tools are built into other performance-monitoring tools (take vmstat, for example). However, there is another approach to take. Benchmarking tools can help ascertain a performance bottleneck, even though the one that will be discussed in this
10 54 Performance Tuning Tools PART II section actually can cause somewhat of a bottleneck itself. At the least, it is a good way to test systems before they are put into production. The particular tool that this section addresses is called bonnie. The bonnie utility runs a performance test of filesystem I/O; it uses standard C library calls. Bonnie writes 8KB blocks in an attempt to discover the maximum sustained rate of transfer. As an added bonus, it cycles through rereading and rewriting to accurately simulate filesystem usage. To use bonnie, the syntax is pretty simple: bonnie -d <scratch_directory> -s <size_in_mb_of_testfiles> -m <machine_label> If no directory is specified, bonnie writes to the current working directory. If no size is given, 10MB is used. The machine label generally does not matter. The following is some sample output of bonnie on a Sun SparcSTATION5: $ bonnie File./Bonnie.2831, size: Writing with putc()...done Rewriting...done Writing intelligently...done Reading with getc()...done Reading intelligently...done Seeker 1...Seeker 2...Seeker 3...start em...done...done...done Sequential Output Sequential Input-- --Random-- -Per Char- --Block--- -Rewrite-- -Per Char- --Block--- --Seeks--- Machine MB K/sec %CPU K/sec %CPU K/sec %CPU K/sec %CPU K/sec %CPU /sec %CPU $ As you can see, the fields of the final output are very self-explanatory. Now here are the results of bonnie on an x86 platform: $ bonnie File./Bonnie.22239, size: Writing with putc()...done Rewriting...done Writing intelligently...done Reading with getc()...done Reading intelligently...done Seeker 1...Seeker 2...Seeker 3...start em...done...done...done Sequential Output Sequential Input-- --Random-- -Per Char- --Block--- -Rewrite-- -Per Char- --Block--- --Seeks--- Machine MB K/sec %CPU K/sec %CPU K/sec %CPU K/sec %CPU K/sec %CPU /sec %CPU $ Just a little different?
11 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 55 Tools like bonnie really help illustrate the difference between an untuned system and a tuned one, or an older (in this case, the sparc system) and a new one (and x86 box). Other Tools In addition to the general tools and subsystem-specific ones, you have a variety of mixed and other performance-monitoring tools at your disposal. The next sections look at these in more detail. ps The ps command is another highly used tool where performance is concerned. Most often it is used to isolate a particular process. However, it also has numerous options that can help you get more out of ps and perhaps save some time while trying to isolate a particular process. The ps command basically reports process status. When invoked without any options, the output looks something like this: $ ps PID TTY TIME CMD 3220 pts/0 00:00:00 bash 3251 pts/0 00:00:00 ps This basically tells you everything that the current session of the user who invoked it is doing. Obviously, just seeing what you are doing in your current session is not always all that helpful unless, of course, you are doing something very detrimental in the background! To look at other users or the system as a whole, ps requires some further options. The ps command s options on Linux are actually grouped into sections based on selection criteria. Let s look at these sections and what they can do. 3 Unix Performance- Monitoring Tools Simple Process Selection Using simple process selection, you can be a little selective about what you see. For example, if you want to see only processes that are attached to your current terminal, you would use the -T option: [jfink@kerry jfink]$ ps -T PID TTY STAT TIME COMMAND 1668 pts/0 S 0:00 login -- jfink 1669 pts/0 S 0:00 -bash 1708 pts/0 R 0:00 ps T
12 56 Performance Tuning Tools PART II Process Selection by List Another way to control what you see with ps is to view by a list type. As an example, if you want to see all the identd processes running, you would use the -C option from this group that displays a given command: [jfink@kerry jfink]$ ps -C identd PID TTY TIME CMD 535? 00:00:00 identd 542? 00:00:00 identd 545? 00:00:00 identd 546? 00:00:00 identd 550? 00:00:00 identd Output Format Control Following process selection is output control. This is helpful when you want to see information in a particular format. A good example is using the jobs format with the -j option: [jfink@kerry jfink]$ ps -j PID PGID SID TTY TIME CMD pts/0 00:00:00 bash pts/0 00:00:00 ps Output Modifiers Output modifiers can apply high-level changes to the output. The following is the output using the -e option to show the environment after running ps: [jfink@kerry jfink]$ ps ae PID TTY STAT TIME COMMAND 1668 pts/0 S 0:00 login -- jfink 1669 pts/0 S 0:00 -bash TERM=ansi REMOTEHOST= HOME=/home/j 1754 pts/0 R 0:00 ps ae LESSOPEN= /usr/bin/lesspipe.sh %s The remaining sections are INFORMATION, which provides versioning information and help, and OBSOLETE options. The next three sections give some specific cases of using ps with certain options. Some Sample ps Output Of course, reading the man page helps, but a few practical applied examples always light the way a little better. The most commonly used ps switch on Linux and BSD systems is this: $ ps aux USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root ? S Jan27 0:01 init [3]
13 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 57 root ? SW Jan27 0:03 [kflushd] root ? SW Jan27 0:18 [kupdate] root ? SW Jan27 0:00 [kpiod] root ? SW Jan27 0:38 [kswapd] bin ? S Jan27 0:00 portmap root ? S Jan27 0:00 syslogd -m 0 root ? S Jan27 0:00 klogd daemon ? S Jan27 0:00 /usr/sbin/atd root ? S Jan27 0:00 crond root ? S Jan27 0:00 crond root ? S Jan27 0:00 inetd root ? S Jan27 0:00 rpc.rquotad root ? S Jan27 0:00 [rpc.mountd] root ? SW Jan27 2:15 [nfsd] root ? SW Jan27 2:13 [nfsd] root ? SW Jan27 2:13 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:11 [nfsd] root ? SW Jan27 2:14 [nfsd] root ? S Jan27 0:00 gpm -t ps/2 root tty1 S Jan27 0:00 /sbin/mingetty tt root tty2 S Jan27 0:00 /sbin/mingetty tt root tty3 S Jan27 0:00 /sbin/mingetty tt root tty4 S Jan27 0:00 /sbin/mingetty tt root tty5 S Jan27 0:00 /sbin/mingetty tt root tty6 S Jan27 0:00 /sbin/mingetty tt root ? R Jan30 0:00 in.telnetd root pts/0 S Jan30 0:00 login -- jfink jfink pts/0 S Jan30 0:00 -bash jfink pts/0 R Jan30 0:00 ps aux 3 Unix Performance- Monitoring Tools The output implies that this system s main job is to serve files via NFS, and indeed it is. It also doubles as an FTP server, but no connections were active when this output was captured. The output of ps can tell you a lot more sometimes just simple things that can improve performance. Looking at this NFS server again, you can see that it is not too busy; actually, it gets used only a few times a day. So what are some simple things that could be done to make it run even faster? Well, for starters, you could reduce the number of virtual consoles that are accessible via the system console. I like to have a minimum of three running (in case I lock one or
14 58 Performance Tuning Tools PART II two). A total of six are shown in the output (the mingetty processes). There are also nine available nfsd processes; if the system is not used very often and only by a few users, that number can be reduced to something a little more reasonable. Now you can see where tuning can be applied outside the kernel. Sometimes just entire processes do not need to be running, but those that require multiple instances (such as NFS, MySQL, or HTTP, for example) can be minimized to what is required for good operations. The Process Forest The process forest is a great way of seeing exactly how processes and their parents are related. The following output is a portion of the same system used in the previous section:... root ? S Jan27 0:00 inetd root ? S Jan30 0:00 \_ in.telnetd root pts/0 S Jan30 0:00 \_ login -- jfink pts/0 S Jan30 0:00 \_ - bash jfink pts/0 R Jan30 0:00 \_ p s... Based on that output, you easily can see how the system call fork got its name. The application here is great. Sometimes a process itself is not to blame and what if you kill an offending process only to find it respawned? The tree view can help track down the original process and kill it. Singling Out a User Last but definitely not least, you might need (or want) to look at a particular user s activities. On this particular system, my user account is the only userland account that does anything. I have chosen root to be the user to look at: $ ps u --User root USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root ? S Jan27 0:01 init [3] root ? SW Jan27 0:03 [kflushd] root ? SW Jan27 0:18 [kupdate] root ? SW Jan27 0:00 [kpiod] root ? SW Jan27 0:38 [kswapd] root ? S Jan27 0:00 syslogd -m 0 root ? S Jan27 0:00 klogd daemon ? S Jan27 0:00 /usr/sbin/atd root ? S Jan27 0:00 crond root ? S Jan27 0:00 inetd
15 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 59 root ? S Jan27 0:00 lpd root ? S Jan27 0:00 rpc.rquotad root ? S Jan27 0:00 [rpc.mountd] root ? SW Jan27 2:15 [nfsd] root ? SW Jan27 2:13 [nfsd] root ? SW Jan27 2:13 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:12 [nfsd] root ? SW Jan27 2:11 [nfsd] root ? SW Jan27 2:14 [nfsd] root ? S Jan27 0:00 gpm -t ps/2 root tty1 S Jan27 0:00 /sbin/mingetty tt y root tty2 S Jan27 0:00 /sbin/mingetty tt y root tty3 S Jan27 0:00 /sbin/mingetty tt y root tty4 S Jan27 0:00 /sbin/mingetty tt y root tty5 S Jan27 0:00 /sbin/mingetty tt y root tty6 S Jan27 0:00 /sbin/mingetty tt y root ? R Jan30 0:00 in.telnetd root pts/0 S Jan30 0:00 login jfink 3 Unix Performance- Monitoring Tools Applying only a single user s process is helpful when a user might have a runaway. Here s a quick example: A particular piece of software used by the company for which I work did not properly die when an attached terminal disappeared (it has been cleaned up since then). It collected error messages into memory until it was killed. To make matters worse, these error message went into shared memory queues. The only solution was for the system administrator to log in and kill the offending process. Of course, after a period of time, a script was written that would allow users to do this in a safe manner. On this particular system, there were thousands of concurrent processes. Only by filtering based on the user or doing a grep from the whole process table was it possible to figure out which process it was and any other processes that it might be affecting.
16 60 Performance Tuning Tools PART II free The free command rapidly snags information about the state of memory on your Linux system. The syntax for free is pretty straightforward: $ free The following is an example of free s output: $ free total used free shared buffers cached Mem: /+ buffers/cache: Swap: The first line of output shows the physical memory, and the last line shows similar information about swap. Table 3.9 explains the output of free. TABLE 3.9 Field total used free shared buffers cached free Command Output Fields Description Total amount of user available memory, excluding the kernel memory. (Don t be alarmed when this is lower than the memory on the machine.) Total amount of used memory. Total amount of memory that is free. Total amount of shared memory that is in use. Current size of the disk buffer cache. Amount of memory that has been cached off onto disk. An analysis of the sample output shows that this system seems to be pretty healthy. Of course, this is only one measurement. What if you want to watch the memory usage over time? The free command provides an option to do just that: the -s option. The -s option activates polling at a specified interval. The following is an example: [jfink@kerry jfink]$ free -s 60 total used free shared buffers cached Mem: /+ buffers/cache: Swap: total used free shared buffers cached Mem: /+ buffers/cache:
17 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 61 Swap: total used free shared buffers cached Mem: /+ buffers/cache: Swap: To stop free from polling, hit an interrupt key. These measurements show a pretty quiet system, but the free command can come in handy if you want to see the effect of one particular command on the system. Run the command when the system is idling, and poll memory with free. free is well suited for this because of the granularity that you get in the output. time One very simple tool for examining the system is the time command. The time command comes in handy for relatively quick checks of how the system performs when a certain command is invoked. The way this works is simple: time returns a string value with information about the process and is launched with process like this: $ time <command_name> [options] Here is an example: $ time cc hello.c -o hello The output from the time command looks like this: 3 Unix Performance- Monitoring Tools $ time cc hello.c -o hello 0.08user 0.04system 0:00.11elapsed 107%CPU (0avgtext+0avgdata 0maxresident)k 0inputs+0outputs (985major+522minor)pagefaults 0swaps Even though this output is quite low-level, the time command can return very enlightening information about a particular command or program. It becomes very helpful in large environments in which operations normally take a long time. An example of this is comparing kernel compile times between different machines. Some Network-Monitoring Tools Many times system performance can be relative to external factors such as the network. Unix has a vast array of tools to examine network performance, from single host-monitoring software to applications than can monitor and manage vast WANs. This section looks at four relatively low-key applications for monitoring network activity:
18 62 Performance Tuning Tools PART II ping traceroute tcpdump ntop ping The ping utility is a very simple program that is most often used to simply see if a host is alive on the network. However, the return information from ping can often tell you how well a particular host-to-host connection is performing. The following is a sample of a ping session: $ ping tesla PING tesla.dp.asi ( ): 56 data bytes 64 bytes from : icmp_seq=0 ttl=255 time=6.119 ms 64 bytes from : icmp_seq=1 ttl=255 time=0.620 ms 64 bytes from : icmp_seq=2 ttl=255 time=3.483 ms 64 bytes from : icmp_seq=3 ttl=255 time=1.340 ms 64 bytes from : icmp_seq=4 ttl=255 time=0.633 ms 64 bytes from : icmp_seq=5 ttl=255 time=7.803 ms 64 bytes from : icmp_seq=6 ttl=255 time=5.475 ms --- tesla.dp.asi ping statistics packets transmitted, 7 packets received, 0% packet loss round-trip min/avg/max/std-dev = 0.620/3.639/7.803/2.681 ms Not too bad at all. Now I have purposely saturated the interface on host tesla (with several other pings running with the f option to flood it at once, of course). Look at the results: $ ping tesla PING tesla.dp.asi ( ): 56 data bytes 64 bytes from : icmp_seq=0 ttl=255 time=3.805 ms 64 bytes from : icmp_seq=1 ttl=255 time=1.804 ms 64 bytes from : icmp_seq=2 ttl=255 time=8.672 ms 64 bytes from : icmp_seq=3 ttl=255 time=1.616 ms 64 bytes from : icmp_seq=4 ttl=255 time=6.793 ms 64 bytes from : icmp_seq=5 ttl=255 time=1.607 ms 64 bytes from : icmp_seq=6 ttl=255 time=2.393 ms 64 bytes from : icmp_seq=7 ttl=255 time=1.601 ms 64 bytes from : icmp_seq=8 ttl=255 time=6.073 ms 64 bytes from : icmp_seq=9 ttl=255 time=1.615 ms 64 bytes from : icmp_seq=10 ttl=255 time=9.402 ms 64 bytes from : icmp_seq=11 ttl=255 time=1.875 ms 64 bytes from : icmp_seq=12 ttl=255 time=1.815 ms --- tesla.dp.asi ping statistics packets transmitted, 13 packets received, 0% packet loss round-trip min/avg/max/std-dev = 0.601/2.774/8.402/2.802 ms
19 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 63 As you can see, there is a slightly higher time lapse, on average. ping has a number of useful options. Table 3.10 lists some of them with example usage ideas: TABLE 3.10 ping Options -c This option means that ping will ping a node only c times. This is especially useful for noninteractive scripts or if you are not interested in watching ping for more than a quick test to determine whether it is alive. -f The flood option sends requests as fast as the host you are pinging from can. This is a good way to measure just how well a host can send them. As mentioned in a previous example, it s also an easy way to load down a system for testing. -r This option bypasses routing tables and helps if a new node is on the network but the system you are pinging from either is not aware of it or is not in the same subnet. -s This option can modify the packet size and is useful for seeing whether the node that is being pinged is having issues with the size of packets being sent to it from other nodes. traceroute The traceroute utility is invaluable for discovering where a problem on a network might be located. It also is of great use in ensuring that your host is talking to the network just fine and that any problems might lie elsewhere. On this particular network, I show two traceroutes, one to a host that is local to the network and one to a remote host on a network in another city. The difference between these is astounding. 3 Unix Performance- Monitoring Tools Here s the local traceroute: $ traceroute andy traceroute to strider.diverge.org ( ), 64 hops max, 40 byte packets 1 strider.diverge.org ( ) ms ms ms $ And here s the remote traceroute: $ traceroute traceroute to ( ), 64 hops max, 40 byte packets 1 strider.diverge.org ( ) ms ms ms 2 gandalf.diverge.org ( ) ms ms ms 3 ( ) ms ms ms $
20 64 Performance Tuning Tools PART II In this output, you easily can see the routers between my localhost and the remote host they are strider.diverge.org and gandalf.diverge.org. The fields are hop-number hostname IPaddress times. Using the Sniffer tcpdump A sniffer is a network-monitoring system that captures a great deal of information about the real content of a given network. Sniffers are particularly powerful because they allow for the storage of several layers of TCP information, which, of course, can be used for performing malicious attacks as well as monitoring. On the upside, a sniffer can provide detailed information for troubleshooting efforts. Figure 3.4 is a snapshot of tcpdump. FIGURE 3.4 tcpdump output. The output when tcpdump is started with no options is dizzying. The tcpdump sniffer has an immense amount of command-line switches and options. Some Practical Applications for tcpdump Obviously, the output of tcpdump is rather intense. After reviewing some of the options, you have probably surmised that there are ways to focus the tcpdump utility to look for particular information. Table 3.11 describes some options and shows what particular problem they can be used to address.
21 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 65 TABLE 3.11 Command String tcpdump tcp host <ip_address> tcpdump dst host <ip_address> tcpdump icmp dst host <broadcast_address> tcpdump -e host <ip_address> tcpdump arp tcpdump icmp Application SYN floods Network stack overflows (a.k.a. Ping of Death) Smurf attacks Duplicate IP addresses ARP misconfiguration Routing issues As an example, let s say that you want to look at ICMP traffic on the local network: # [root@kerry /root]# tcpdump icmp Kernel filter, protocol ALL, datagram packet socket tcpdump: listening on all devices 11:48: eth1 M > : icmp: echo request 11:48: eth1 M > arouter.local.net: icmp: echo request 11:48: eth1 M > frame.local.net: icmp: echo request... This output tells you that there are a lot of echo requests from the node at In fact, this is a new router being installed, and the administrator is probing the network from the router. ntop 3 Unix Performance- Monitoring Tools One particularly interesting tool for constant network monitoring is the ntop utility. Basically, ntop displays the top network users. Figure 3.5 shows ntop running in an xterminal. FIGURE 3.5 ntop in action.
22 66 Performance Tuning Tools PART II The ntop utility has a vast array of command-line options and interactive commands. Table 3.12 gives a few examples of the more interesting ones. TABLE 3.12 ntop Options -r Changes the rate that ntop updates the screen display. This is very helpful for determining time ranges in which a problem may be occurring. -p Specifies the IP protocol to monitor. Because the default is all, this option can act as a filter. -l Logs information captured by ntop into ntop.log. An application here is post-analysis of ntop results. Interpreting ntop is pretty straightforward. The Host field contains either a hostname (if it can be resolved) or an IP address. TABLE 3.13 Field Host Act Rcvd Sent <protocol> ntop Output Fields Description Contains either a hostname (if it can be resolved) or an IP address Gives more information about the host: B indicates that a host has received and sent data. R indicates that a host has received data. S indicates that a host has sent data. I indicates that a host is idle. Shows the amount of traffic that a host received between updates. Shows the amount of traffic that a host sent between updates. Gives three columns (TCP, UDP, and ICMP) that show the changes of the protocol type. To make a little more sense of this, consider the following line as an example: cingwise.ipsosasi.net S 2.2 Kb 4.8 MB 1.8 Kb The hostname is cingwise.ipsosasi.net, and the last thing the host did was send traffic. During the last update, it received 2.2Kb and sent 4.8MB; there was a difference of 420 bytes between updates in traffic with the TCP protocol. The ntop utility is very useful for watching network activity in general.
23 Popular Unix Performance-Monitoring Tools for Linux CHAPTER 3 67 Summary This chapter examined popular Unix tools that have been ported to or rewritten for use on Linux. It also covered analyzing the output of these tools. The next chapter moves forward to tools that were specifically designed on Linux for performance monitoring. 3 Unix Performance- Monitoring Tools
24
Performance monitoring. in the GNU/Linux environment. Linux is like a wigwam - no Windows, no Gates, Apache inside!
1 Performance monitoring in the GNU/Linux environment Linux is like a wigwam - no Windows, no Gates, Apache inside! 2 1 Post-conditions To be familiar with some performance-tuning options To be able to
These sub-systems are all highly dependent on each other. Any one of them with high utilization can easily cause problems in the other.
Abstract: The purpose of this document is to describe how to monitor Linux operating systems for performance. This paper examines how to interpret common Linux performance tool output. After collecting
System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring
CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in
20 Command Line Tools to Monitor Linux Performance
20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System
System Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya. Administració de Sistemes Operatius. System monitoring
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya Administració de Sistemes Operatius System monitoring Topics 1. Introduction to OS administration 2. Installation of the OS 3. Users management
CIT 470: Advanced Network and System Administration. Topics. Performance Monitoring. Performance Monitoring
CIT 470: Advanced Network and System Administration Performance Monitoring CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Performance monitoring. 2. Performance tuning. 3. CPU 4.
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig
Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
TOP(1) Linux User s Manual TOP(1)
NAME top display top CPU processes SYNOPSIS top [ ] [ddelay] [ppid] [q][c][c][s][s][i][niter] [b] DESCRIPTION top provides an ongoing look at processor activity in real time. It displays a listing of the
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
Determining the Correct Usage of Swap in Linux * 2.6 Kernels
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com Determining the Correct Usage of Swap in Linux * 2.6 Kernels Determining the Correct Usage of Swap in Linux 2.6 Kernels Table of Contents: 2.....
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Hands On Activities: TCP/IP Network Monitoring and Management
Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring
SAS Application Performance Monitoring for UNIX
Abstract SAS Application Performance Monitoring for UNIX John Hall, Hewlett Packard In many SAS application environments, a strategy for measuring and monitoring system performance is key to maintaining
About Forum Howtos & FAQs Low graphics Shell Scripts RSS/Feed. nixcraft - insight into linux admin work Home > CentOS. by Vivek Gite 134 comments
1 von 14 15.06.2010 05:12 About Forum Howtos & FAQs Low graphics Shell Scripts RSS/Feed nixcraft - insight into linux admin work Home > CentOS by Vivek Gite 134 comments Need to monitor Linux server performance?
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Extreme Linux Performance Monitoring Part II
I. Introducing IO Monitoring Disk IO subsystems are the slowest part of any Linux system. This is due mainly to their distance from the CPU and the fact that disks require the physics to work (rotation
Red Hat Linux Networking
The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Network Management and Debugging. Jing Zhou
Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for
Setting up PostgreSQL
Setting up PostgreSQL 1 Introduction to PostgreSQL PostgreSQL is an object-relational database management system based on POSTGRES, which was developed at the University of California at Berkeley. PostgreSQL
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
Unverified Fields - A Problem with Firewalls & Firewall Technology Today
Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group [email protected] October 2000 1 Introduction The following problem (as discussed in
BASIC TCP/IP NETWORKING
ch01 11/19/99 4:20 PM Page 1 CHAPTER 1 BASIC TCP/IP NETWORKING When you communicate to someone or something else, you need to be able to speak a language that the listener understands. Networking requires
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Get quick control over your Linux server with server commands
Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with
Release 2.3.4 - February 2005
Release 2.3.4 - February 2005 Linux Performance Monitoring Darren Hoch Services Architect StrongMail Systems, Inc. PUBLISHED BY: Darren Hoch [email protected] http://www.ufsdump.org Copyright 2007
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference
IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Measure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
Network Security EDA491 2011/2012. Laboratory assignment 4. Revision A/576, 2012-05-04 06:13:02Z
Network Security EDA491 2011/2012 Laboratory assignment 4 Revision A/576, 2012-05-04 06:13:02Z Lab 4 - Network Intrusion Detection using Snort 1 Purpose In this assignment you will be introduced to network
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.
TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.2015 Hands-on session We ll explore practical aspects of TCP Checking the effect
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Linux Tools for Monitoring and Performance. Khalid Baheyeldin November 2009 KWLUG http://2bits.com
Linux Tools for Monitoring and Performance Khalid Baheyeldin November 2009 KWLUG http://2bits.com Agenda Introduction Definitions Tools, with demos Focus on command line, servers, web Exclude GUI tools
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Server Management Tools (ASMT)
1 Auspex Server Management Tools (ASMT) Introduction This module presents the Auspex Server Management Tools, or ASMT. This is a graphical interface which allows you to perform most NetServer system administration
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Delivering Quality in Software Performance and Scalability Testing
Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,
CIT 668: System Architecture. Performance Testing
CIT 668: System Architecture Performance Testing Topics 1. What is performance testing? 2. Performance-testing activities 3. UNIX monitoring tools What is performance testing? Performance testing is a
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Operating System and Process Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html 1 of 12 Operating System and Process Monitoring Tools Arik Brooks, [email protected] Abstract: Monitoring the performance of operating systems
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
TCP/IP Security Problems. History that still teaches
TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
White Paper Perceived Performance Tuning a system for what really matters
TMurgent Technologies White Paper Perceived Performance Tuning a system for what really matters September 18, 2003 White Paper: Perceived Performance 1/7 TMurgent Technologies Introduction The purpose
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Tech Tip: Understanding Server Memory Counters
Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your
Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
Monitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
Using New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
Unix::Statgrab - System Monitoring
Unix::Statgrab - System Monitoring Jens Rehsack 2013 Jens Rehsack () Unix::Statgrab - System Monitoring 2013 1 / 28 Overview Part I Introduction 1 Introduction Jens Rehsack () Unix::Statgrab - System Monitoring
pc resource monitoring and performance advisor
pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware
EVERYTHING A DBA SHOULD KNOW
EVERYTHING A DBA SHOULD KNOW ABOUT TCPIP NETWORKS Chen (Gwen),HP Software-as-a-Service 1. TCP/IP Problems that DBAs Can Face In this paper I ll discuss some of the network problems that I ve encountered
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
QUICK START LINUX AGENT INSTALLATION, CONFIGURATION AND TROUBLESHOOTING GUIDELINES
QUICK START LINUX AGENT INSTALLATION, CONFIGURATION AND TROUBLESHOOTING GUIDELINES Introduction: How the Client Agent works (Push Technology) The Common Agent Installation: Installing the agent from CD
XPrint UNIX System Printer Driver Installation SOLARIS 1.X (SUN OS) / SOLARIS 2.X
XPrint UNIX System Printer Driver Installation SOLARIS 1.X (SUN OS) / SOLARIS 2.X XPrint Color Series 701P91273 May 1996 Xerox Corporation Multinational Customer and Service Education 780 Salt Road Webster,
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
