Tutorial on Network Management and Measurements. Tasos Alexandridis analexan@csd.uoc.gr



Similar documents
ITEC310 Computer Networks II

TELE 301 Network Management

Simple Network Management Protocol

SNMP Simple Network Management Protocol

Network Management: - SNMP - Software Defined networking

Basic processes in IEEE networks

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

Computer Networks. Chapter 5 Transport Protocols

Active Management Services

Chapter 9. IP Secure

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Transport and Network Layer

A Guide to Understanding SNMP

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

SNMP Extensions for a Self Healing Network

The Wireless Network Road Trip

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Using Industrial Ethernet Networks for PROFInet

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Ethernet. Ethernet. Network Devices

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Simple Network Management Protocol

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

Introduction of Intrusion Detection Systems

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Top-Down Network Design

Simple Network Management Protocol (SNMP) Primer

VXLAN: Scaling Data Center Capacity. White Paper

Chapter 4 Managing Your Network

Chapter 9 Network Management

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Network Management, MIBs and MPLS

How To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc

SNMP and Network Management

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Simple Network Management Protocol

Internet Protocol: IP packet headers. vendredi 18 octobre 13

RF Monitor and its Uses

This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu

REMOTE MONITORING MATRIX

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Study of Network Performance Monitoring Tools-SNMP

How To Understand Network Performance Monitoring And Performance Monitoring Tools

Software version Feb 21, 2014

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Configuring Health Monitoring

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

FIREWALLS & CBAC. philip.heimer@hh.se

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

LOHU 4951L Outdoor Wireless Access Point / Bridge

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Internet Architecture and Philosophy

PROFESSIONAL SECURITY SYSTEMS

MITM Man in the Middle

SNMP Network Management Concepts

NQA Technology White Paper

Module 7 Internet And Internet Protocol Suite

Network Management - SNMP

Final for ECE374 05/06/13 Solution!!

Avaya WLAN Orchestration System

MANAGING NETWORK COMPONENTS USING SNMP

21.4 Network Address Translation (NAT) NAT concept

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

How To Design A Layered Network In A Computer Network

Chapter 8 Security Pt 2

BT Internet Connect Global - Annex to the General Service Schedule

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Simple Network Management Protocol

Chapter 9 Network Management

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

ehealth and VoIP Overview

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management

How To Understand The Internet Of S (Netware)

Avaya WLAN Orchestration System

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Ten top problems network techs encounter

NetFlow/IPFIX Various Thoughts

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

Chapter 9 Monitoring System Performance

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

New Products and New Features May, 2015

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)

Wireshark Hands-On Exercises

Network Monitoring and Traffic CSTNET, CNIC

LESSON Networking Fundamentals. Understand TCP/IP

Transcription:

Tutorial on Network Management and Measurements Tasos Alexandridis analexan@csd.uoc.gr

Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis IWCONFIG / IWLIST

Network management includes the deployment, integration and coordination of the hardware, software and human elements to monitor, test, poll, configure, analyze, evaluate and control the network and element resources to meet the real-time, operational performance and Quality of Service requirements at a reasonable cost. T. Saydam and T. Magedanz

Detect failure of an interface card at a host Monitor traffic to aid in resource deployment Detect rapid changes in routing tables Intrusion Detection

Performance management Fault Management Configuration Management Accounting Management Security Management

Managing entity: the central area of activity. Controls the collection, processing, analysis and display of network management information. Managed device: a piece of network equipment that resides on a managed network Network management protocol: The protocol that runs between the managing entity and the managed devices. In our case SNMP

Principal components of a network management architecture

Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis IWCONFIG / IWLIST

Management Information Base (MIB) Information database holding managed objects whose values collectively reflect the current state of the network A MIB Object might be: The number of IP datagrams discarded at the router The number of carrier sense errors in an Ethernet Interface Descriptive information such as the server software running on a DNS server Protocol- specific information Information whether a particular device is functioning correctly or not

7 types of SNMP Messages known as Protocol Data Units (PDU) GetRequest GetNextRequest GetBalkRequest Messages sent from the managing entity to an agent to request the value of one or more MIB objects at the agent s managed device. The three messages differ in the granularity of data requested Response: The agent responds with a Response PDU containing the data requested SetRequest: Set the value of one or more MIB objects in a managed device. The managed device replies with a Response PDU to confirm that the value has been set

InformRequest: Is used by the managing entity to notify another managing entity of MIB information. The receiving entity replies with a Response PDU to acknowledge receipt of the InformRequest PDU TrapMessage: Message that is generated asynchronously in response to an event for which the managing entity requires notification

Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis IWCONFIG / IWLIST

Configure APs to send SYSLOG messages Seven types of events can trigger an AP to transmit a SYSLOG message: AUTHENTICATED: A card must authenticate itself before using the network ASSOCIATED: After it authenticated itself, a card associates with an AP REASSOCIATED: A card may re-associate itself with a new or the current AP ROAMED: After a re-association occurs, the old and sometimes the new AP send a roamed message RESET: A card s connection is reset DISASSOCIATED : A card wished to disconnect from the AP DEAUTHENTICATED: A card is no longer part of the network

Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis IWCONFIG / IWLIST

General traffic statistics Traffic volume Burstiness Traffic volume by types End-to-end statistics Connection throughput Round trip delay Loss rate TCPDUMP: A packet tracing tool Works on various host platforms Captures packets going through a certain network interface Shows packet header information

Results 19:27:01.454488 00:00:0c:04:b2:33 > 00:03:e3:d9:26:c0, ethertype IPv4 (0x0800), [1] [2] [3] [4] length 1687: IP 138.97.18.88.63259 > 64.154.80.51.80: P 0: 1633(1633) ack 1634 win 33580 [5] [6] [7] [8] [9][10][11][12] [13] [14] [1] TimeStamp [2] SourceMac [3] DestinationMac [4] Network Protocol [5] IP Packet Length [6] Source IP [7] Source Port [8] Destination IP [9] Destination Port [10] TCP Flags [11] TCP Sequence Number [12] TCP Last Sequence Number [13] TCP Length [14] ACK flag More about tcpdump man tcpdump

The traffic load in both wireless infrastructures is light, although there are long tails

Traffic categorization

asymmetric packet sizes, i.e., APs with large sent and small receive packets, and APs with small sent and large receive packets

Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis IWCONFIG / IWLIST

iwconfig - Configure a wireless network interface iwconfig [interface] iwconfig interface [essid X] [nwid N] [mode M] [freq F] [channel C][sens S ][ap A ][nick NN ] [rate R] [rts RT] [frag FT] [txpower T] [enc E] [key K] [power P] [retry R] [commit] iwconfig --help iwconfig --version

iwlist - Get more detailed wireless information from a wireless interface iwlist interface scanning iwlist interface frequency iwlist interface rate iwlist interface key iwlist interface power iwlist interface txpower iwlist interface retry iwlist interface event iwlist help iwlist --version

Computer Networking: A Top Down Approach Featuring the Internet, J.F. Kurose and K.W. Ross, Publisher: M. Gkioyrdas, Year: 2003 Peer-to-peer Computing for Mobile Networks: Information Discovery and Dissemination Maria Papadopouli and Henning Schulzrinne, Springer.