THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS
|
|
|
- Gyles Dawson
- 10 years ago
- Views:
Transcription
1 THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS Alexandru BIKFALVI, Paul PĂTRAŞ, Cristian Mihai VANCEA, Virgil DOBROTĂ Technical University of Cluj-Napoca, Communications Department, 6-8 George Bariţiu Street, 7 Cluj-Napoca, Romania, Tel/Fax: , [email protected] Abstract: The paper presents the designing principles of a management infrastructure for monitoring the capabilities of different network interface cards (Gigabit Ethernet, Endace), both for traffic generation and capturing at reception. This evaluation is useful to asses the goodness of captured traffic analysis and QoS performance measurements, using PC based platforms. The idea was to implement the communication of the management information between an administration console and a set of distributed SNMP-based software measurement agents for GNU/Linux platforms that enable to perform QoS measurement sessions. Key words: QoS, SNMP, management console, measurement agents I. INTRODUCTION A measurement system capable of monitoring the capabilities of different network interface cards, both for traffic generation and capturing is useful in assessing the goodness of captured traffic analysis and QoS performance measurements. The paper presents the communication of the management information between an administration console and a set of distributed SNMP-based software measurement agents for GNU/Linux platforms. The software features a graphical user interface and a group of services that handle the management information. The services are used to communicate with the operating system s socket interface, to perform SNMP encapsulation and decoding, a measurement session manager that has the intelligence of interpreting the measurement results. A queuing service solves the issue of asynchronous communication, by implementing a set of eight messagewaiting queues. Four priority levels exist complemented by a Round-Robin servicing policy to ensure that management messages are handled in the following order: notifications, control messages, results requests and results replies. The advantages of the proposed measurement solution versus the existing tools are the possibility of managing many test scenarios through the control of a large set of agents, no user attendance required during the experiments, customizable sessions and availability of results (numeric or plotted) both during and after the measurement is completed. II. SCENARIOS BASED ON EXISTING TOOLS The main goal of the Network Measurement System (NMS) software was to overcome some of the limitations of regular measurement applications available today. These limitations refer to the fact that some of the well-known and most used tools do not cope well with complex, repetitive task, especially from the results processing point-of-view. For example, MGEN is one of the most used free traffic generating applications. However, in a real test scenario the final data usually needs additional, time-consuming postprocessing, in order to make it usable. Traffic Station Software Network under test Figure. MGEN-based scenario Traffic Analysis Station Analysis Software In order to perform a measurement task using MGEN the following steps need to be followed (see figure ) []:. Install MGEN on the machine that generates the traffic.. Install a proper analysis tool on the machine analyzing the traffic.. Create a script to instruct MGEN what traffic pattern to generate.. Running the test and awaiting for results at the analyzing station.. Collecting the results data and processing it according to needs. Suppose the objective was to measure the link behavior having the throughput as a parameter. The simplest way to do this using MGEN is to define a script that successively tells the program to start generating traffic with an increasing number of packets per second and after this step is completed, the traffic is generated automatically. At the receiving end a software analysis tool, such as MGEN or tcpdump, records the information about the incoming traffic. QoS parameters evaluation can be performed either by creating a dump of the incoming traffic and process it after the capturing session is completed, or by computing the required parameters in real time. The first approach has the advantage of having enough data after the dump to compute off-line a large number of parameters but it does not cope well with traffic analysis of high bit-rate flows, since the dump speed is usually limited by hard drive performance. The alternative is to compute the parameters of interest in real time and to discard all non-essential information. It takes more processing time but it can be
2 used for high-rates experiments, where the dump solution is not a viable choice. MGEN perform logging of incoming traffic allowing both online and offline analysis. It is flow oriented, meaning that you can specify several different flows running simultaneously, and the program is able to make the difference between the packets belonging to different flows. Tcpdump however, does not have almost any measurement capabilities at all. It simply dumps incoming traffic on a given network interface (some filtering options are though available) and later one uses a third party software to extract the necessary information. Nevertheless, the overall scenario has some main disadvantages that cannot be overcome by changing the generating software, the analyzer software or tuning their parameters: The lack of centralized control: one cannot sit at single machine and perform all the needed measurements. It is difficult to combine the data from different successive flows. The next paragraph will discuss some of the scenarios where the use of the existing tools is becoming either impossible or additional tricks are needed in order to achieve the imposed goal. III. OVERVIEW OF A NETWORK MANAGEMENT SYSTEM The management architecture is the collection of managing and managed devices and of the communication of management information between them as in figure. Managed Devices Their key functions are to receive notification data for the managed devices, also known as traps, to request information from these devices or to send parameters. A manager must also allow a configuration to be set up or specify the number of retries, timeout duration or polling intervals that will be used as thresholds in order to determine that a device is not responding. The messages transmitted between a managed device or network element, on one side, and a manager on the other side, is related to any aspect regarding fault, configuration, accounting, performance and security. B. Agents Agents are pieces of software or hardware implementing functions that run on the managed devices. The first task (of the hardware or software routines within the managed device) is to respond to the managers inquiries. They allow inspection and changing of the managed device parameters. They also detect any abnormal condition and report it to the manager. Examples of agents include a specific service of a Windows based computer, a daemon running on a Linux machine or routing software from the Cisco s IOS operating system used on Cisco devices []. C. -Agent Communication This process is used by the agent to inform about the status of the managed device or by the manager to request some information. The communication is usually based on the transport provided by a management protocol specific to both the platform and managing technologies. Regardless of the implementation, two mechanisms are possible: polling-based and event-driven []. C. Polling-Based Mechanism In this case, managers request information periodically from the network elements. The advantage of this approach is that the complexity of the agents is very low. Station Management Protocol Figure. General architecture of a management system When talking about the management architecture it is important to understand that, it should be related to a specific management technology. The so-called Directory Enabled Network (DEN) that keeps track of their resources by using a central repository called directory. The management applications running in such environment must identify each resource based on its information from the directory. However, in what follows it will be presented the simple, classical management architecture, which can be found in some of the most used management technologies such as the Simple Network Management Protocol (developed for IP networks) and Telecommunications Management Network (designed to comprehend a wide spectrum of telecommunication technologies) []. A. s The managers are the nerve center of a management infrastructure that collect information about the state of the network and send configuration messages to the network elements. Agent on Managed Device The manager sends a message to the agent from the managed device The agent processes the request, generates and returns a reply Figure. Polling-based communication mechanism A debate is made on what should be an appropriate polling interval. A too small value results on having the most up-to-date information regarding the network, but wasting valuable bandwidth. With a high value, the bandwidth is saved and performance improved but the probability of missing key events or being aware of them too late increases. The communication between the manager and agent of the managed device in the example above proceeds in the following fashion (see figure ):. The manager forms a query message that contains an information request.. The manager sends the information request to the managed device.. The managed device receives the message, checks the authenticity of the message and evaluates the request.. If the authentication data or access permission is
3 incorrect, the agent could send a notification.. The agent calls the appropriate local service to retrieve and reply the requested information. Note that from the list of operations performed by the managed device and the agent at the third step, the actual activity depends on the management technology involved. C. Event-Driven Mechanism For this mechanism, the network elements have the managing intelligence of informing the manager that something has happened. This overcomes the problem of bandwidth but requires the network element to be still operational in order to report a problem, increasing the processing and resource usage at the managed device in order to evaluate each operation parameter and to determine if a message should be sent to the manager. Agent on Managed Device The agent sends a notification to the manager, informing about an asynchronous event Event The manger confirms the receiving of the notification, by replying with an acknowledgement Figure. Event-driven communication mechanism The communication between the manager and agent of the managed device in the example above proceeds in the following fashion (see figure ):. An event occurs on the managed device.. The agent from the managed device creates a notification message to be sent to the manager containing the event data.. The manager receives the notification message and takes the appropriate action, such as a visual or audio alarm or by performing a predefined or determined operation.. The manager station can return an acknowledgment message. The most used option is however the mixed one, when the event-driven messages could be sent for extraordinary events, while polling can be used at larger intervals, during normal operation. D. Management Information The management information is about the managed nodes and devices. In most of the implementations it is considered as a collection of physical/logical resources that can be managed, named managed objects. This abstraction is useful in hiding from the management system the specific details of that resource, others than the ones that have management importance, such as implementation, vendor or device specific extensions and access methods []. Management Information Base contains managed objects and their relationships provides a base of identifying objects is build using widely accepted rules Figure. MIB characteristics On the other hand, due to the wide variety of manufacturers, equipments, applications and parameters that could be managed a repository of the possible manageable information is needed, such that both agents and managers understand each other. IV. DESIGN AND EXPERIMENTAL RESULTS The goal of the management infrastructure is to provide an interpretation of the user s commands and then to assure the reliable transport of it to the processing agent. The first objective is done by the management console only. The user-interactive part of the software is designed to allow the setup of a measurement test within a session or session group, to schedule it, and care nothing more about it. Special services within the management infrastructure will perform the task, collect the results and make them available for display when the test is over. The functionality of the management infrastructure is divided into several operational units called services. All components (except and Control ) are found on the manager and the agent platforms, the overall structure being symmetrical (see figure 6). Therefore, it does not matter what functionality (management/ measurement) the application has. Hardware Queuing Configuration Control SNMP Management Figure 6. The architecture of management infrastructure Queuing SNMP Management Socket Interface NIC Driver Physical Link Messages SNMP UDP IPv Data-link Physical QoS Engine Queuing SNMP Management Socket Interface NIC Driver Physical Link Figure 7. Communication between the management console and the measurement agent The same architecture, but from a layered perspective, is presented in figure 7. Observe that the console features the, whilst the agent has instead a QoS Measurement Engine. A. Management The Management handles networking functions i.e. transmission and reception of management packets for any selected local interface. Outbound, the destination address and port are given by the that knows which agents are used within the test. The Management performs bi-directional multiplexing and de-multiplexing of the messages to be added or retrieved from the message queue. It also implements security functions by filtering the IP addresses of inbound messages, according to a user-defined list. B. SNMP The management service relies on the SNMP service in performing message encapsulation. Its two main functions
4 are the following: a) to create a new SNMP message, given the parameters; b) to identify, verify and extract the SNMP parameters from an incoming message. C. Queuing The task of the Queuing is to ensure that multiple simultaneous incoming or outgoing management messages can be processed. In addition, this service establishes priorities on the messages placed in the queue and handles retransmissions. It also ensures that duplicate messages arriving within the duplicate discarding interval are eliminated. Queuing performs the recycling, i.e. the messages waiting more than the permitted time are removed from the queue. D. The is the highest-level software routine of the infrastructure, implemented at the management console only and performing functions related to measurement. The user interaction means setting up a test by creating sessions (see table I), session groups (see table II) and scheduled tasks. From the management s point of view the measurement tasks scheduled by the user are translated into appropriate SNMP messages, to be sent to the agents. When the first reply is received, a session is created. The replies could be redirected to the task that waits for them. The results for each task are stored in order to make them available for later inspection. Type Agents Used TABLE I. SESSIONS Description It uses one agent to generate the network traffic. Analysis It uses one agent to analyze the network traffic. and Analysis Group Type Group of Independent s Group of Parameter Dependent It uses two agents, one for the generation and one for the analysis. The session is flow-based, meaning that only the traffic generated by the first agent will be analyzed by the second one. TABLE II. SESSION GROUPS s Used Multiple Single Based on time Relationship Based on a user-selected parameter From the management s point of view, the measurement tasks scheduled by the user are translated into appropriate SNMP messages, to be sent to the agents. When the first reply is received, a session is created. The results for each task are stored in order to make them available for later inspection. E. Configuration The role of this service is to store (onto magnetic media) the configuration data for all other service components of the management infrastructure. The information, available after the console restarts, is related to user-configured data but also to machine-specific data, such as the networking devices. F. Control Implemented only at the management console, the Control handles all services operation. For each service it maintains the status (started or stopped) and for some of them allows the user to change the status. The SCM also handles service recovery in the situation of a service failure, several recovery actions being possible to define. V. EXPERIMENTAL RESULTS This paragraph describes the experiments of testing the gigabit network interface cards, to see how NMS can be used to accomplish the task instead of using the classical approach. In the scenario from figure 8, Chenin workstation has a NMS management console installed, and NMS agents run on both Enologa and Macabeu. On Enologa there is a SysKonnect SK98 NIC connected via a BaseSX link to the Endace DAG card installed on Macabeu. The network traffic was generated with Enologa agent while the analysis is done with the Endace card on Macabeu. SysKonnect IP:.98.. Mask:...8 Color Key Enologa LAN Point-to-point fiber optic link Management connection Chenin IP: IP:.98.. Macabeu Endace DAG IP: Mask:...8 Figure 8. Testing NICs with NMS scenario The network traffic was generated with Enologa agent while the analysis is done, of course, with the Endace card on Macabeu. Prior to testing, the configuration of the management console, measurement agents and agents registration was completed. The flow-based session used Ethernet encapsulation for data-link test. 8 6 Throughput for 6-byte packets Figure 9. Average throughput for 6-byte packets Three types of scenarios were involved: periodic, Poisson and link flooding traffic, with packet size as a parameter (6,, 768, and MTU bytes). For each packet size, a session group was created to run a series of tests with packet rates going up to Gbps for the
5 selected packet size. Let us discuss the results obtained for 6 and byte frames in the case of the periodic distribution. The interesting parameters were the average throughput and number of packets transmitted and received. [ 6 packets] 6 Throughput for -byte packets 6 8 Figure. Average throughput for -byte packets Transmitted Received Figure. Number of packets transmitted and received for 6-byte frame [ 6 packets] Figure. Number of packets transmitted and received for -byte frame Throughput 8 6 Transmitted Received Time [s] Figure. Average throughput for 6-byte packets and a packet rate of 6 pps The average throughput obtained depends largely on the packet size (figures 9 and ), whilst the software limitation is rather related to packet rate (about kpps, as in figure and figure). All four figures contain the data from the session group with the packet rate as a parameter. In addition to the group data, session data is also available. Figures and show similar parameters as in the previous ones, i.e. the throughput and the number of packets transmitted, for 6-byte packets, versus time (i.e. during one session of seconds). [ 6 packets] 6 8 Time [s] Figure. Number of packets transmitted for 6-byte packets and a packet rate of 6 pps VI. CONCLUSIONS AND FUTURE WORK The Network Measurement System realized has several advantages compared to the existing measurement solutions. First, we can implement very quickly a wide range of measurements scenarios. Once the machines and the software are properly installed, all operations can be performed from the management console only. Since the start of a session takes just few steps in a wizard, it greatly saves a lot of time, when doing complex measurements. NMS does not require user attendance during the execution of the tests. The management infrastructure of the Network Measurement System offers better performance for traffic generation. The user can focus on the objectives of the test, rather on how to implement them. It offers a high level of functionality. In most situations, there is no need to use third party software. However the system is not perfect, because is not completely portable across all GNU/Linux platforms. Nevertheless, since the source code is available with slight changes it can be ported to almost all major distributions. For the moment, it is not optimized for local resource usage. In addition, it does not implement a finedgrained analysis system in order to save the limited bandwidth of the management link. Further work is obviously needed to eliminate all these drawbacks and to add new features. REFERENCES [] ***: MGEN User s and Reference Guide, U.S. Naval Research Laboratory, 6 [] ***: ISP Network Management, Ericsson, 999 [] ***: Internetworking Technologies Handbook, Cisco Systems, [] Douglas Mauro, Kevin Schmidt: Essential SNMP, O'Reilly & Associates, [] M. Rose, K. McCloghrie: RFC - Structure and Identification of Management Information for TCP/IP based internets, IETF, 988
SNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Network Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV
Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative
Network Monitoring By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative Overview of network Logical network view Goals of Network Monitoring Determine overall health
White Paper. Intrusion Detection Deploying the Shomiti Century Tap
White Paper Intrusion Detection Deploying the Shomiti Century Tap . Shomiti Tap Deployment Purpose of this Paper The scalability of Intrusion Detection Systems (IDS) is often an issue when deploying an
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Active Management Services
Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
SystemWatch SM. Remote Network Monitoring
SystemWatch SM Remote Network Monitoring SystemWatch Network Monitoring Service: Real World Experience Sony s SystemWatch network monitoring service uses device and networking monitoring software in conjunction
Simple Network Management Protocol (SNMP) Primer
Xerox Multifunction Devices July 22, 2003 for the user Simple Network Management Protocol (SNMP) Primer Purpose This document introduces the history, purpose, basic functionality and common uses of SNMP
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Auditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Building a Highly Available and Scalable Web Farm
Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer
Network Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Networking Security IP packet security
Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights
Implementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0
[1]Oracle Communications Offline Mediation Controller NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0 E39478-01 June 2015 Oracle Communications Offline Mediation Controller NetFlow
Windows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Chapter 46 Link Layer Discovery Protocol (LLDP)
Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9
Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide
BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Quality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Elfiq Link Load Balancer Frequently Asked Questions (FAQ)
lin Elfiq Link Load Balancer Frequently Asked Questions (FAQ) For Elfiq Operating System (EOS) version 3.1.x Document Revision 1.8 May 2006 Elfiq Solutions www.elfiq.com Page 2 / 14 Table of contents 1
8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz
8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (
Craig Pelkie Bits & Bytes Programming, Inc. [email protected]
Craig Pelkie Bits & Bytes Programming, Inc. [email protected] The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 [email protected]
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.
Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP
