Network Data Monitoring and Analysis Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay İBRİKÇİ Prepared by Çağla TERLİKCİOĞULLARI 1.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Introduction to Network Analysis and Sniffer Pro
Monitoring network traffic of Cisco 2950 switch and Cisco 1600 router Group 4 Ishan Shah (CIN: ) Jyotsna Mishra (CIN: ) Parth Chavda (CIN: )
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
Remote Network Monitoring (RMON)
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
SNMP In Depth. SNMP u Simple Network Management Protocol –The most popular network management protocol –Hosts, firewalls, routers, switches…UPS, power.
SNMP ( Simple Network Management Protocol ) based Network Management.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
Hands-on Networking Fundamentals
Chapter 4: Managing LAN Traffic
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
SNMP (Simple Network Management Protocol)
Protocols and the TCP/IP Suite
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Wireless Network Management Mohammad Rasol Saidat.
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
POSTECH DP&NM Lab 1 Remote Network Monitoring (RMON)
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Cisco – Semester 4 – Chapter 7
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
SNMP 1. SNMP is an Internet protocol developed by the IETF. It is designed to facilitate the exchange of management information between network elements.
Open-Eye Georgios Androulidakis National Technical University of Athens.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Kyung Hee University Prof. Choong Seon HONG SNMP Network Management Concepts.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Linux Operations and Administration Chapter Eight Network Communications.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Net 221D:Computer Networks Fundamentals
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
CompTIA Security+ Study Guide (SY0-401)
SNMP.
Lec 5: SNMP Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lecture 6: TCP/IP Networking By: Adal Alashban
Network Administration CNET-443
Network Monitoring System
CompTIA Security+ Study Guide (SY0-401)
Chapter 8: Monitoring the Network
Lec 5: SNMP Network Management
SNMP (Simple Network Management Protocol) based Network Management
SNMP (Simple Network Management Protocol) based Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Network Data Monitoring and Analysis Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay İBRİKÇİ Prepared by Çağla TERLİKCİOĞULLARI 1

2

Presentation Contents  What Is Network Monitoring?  Importance of Network Monitoring and Analysis  Monitoring and Analysis Techniques  Router Based Monitoring Techniques I.Simple Network Monitoring Protocol (SNMP) RFC 1157 II. Remote Monitoring (RMON) RFC 1757 III. Netflow RFC

Continues on Presentation Contents  Non-Router Based MonitoringTechniques I. Active Monitoring II. Passive Monitoring  Windows Management Protocols  Passive Tool Network Monitoring Application 4

What Is Network Monitoring Monitoring an active communications network in order to diagnose problems and gather statistics for administration and fine tuning The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via , pager or other alarms. It is a subset of the functions involved in network management. 5

Network Management  Network Management System allow Network Administrators to automate configuration tasks and monitor network health,giving Network Administrators the visibility need to proactively manage network  The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas: –Fault Management –Configuration Management –Security Management –Performance Management –Accounting Management 6

Network Management Platform Basic features for any platform to include are:  Graphical User Interface (GUI)  Network Map  Database Management System (DBMS)  Standard Method to Query Devices  Customizable Menu System  Event Log 7

8

Three basic goals of network monitoring is:  Performance Monitoring  Fault Monitoring  Account Monitoring 9

Network Management System Functional Areas 10

Network Ticketing System 11

Importance of Network Monitoring and Analysis Network management systems allow us to research: i.Traffic Measurements and Analysis ii.Network Anomaly Detection iii.Performance Evaluation of Networked Systems iv.Security,Reliability and Resiliciency v.QoS in Heterogeneous Network vi.Analysis and Detection of Network Outages 12

Architectural Overview 13

Monitoring and Analysis Techniques Two Monitoring Techniques are discussed in the my presentation: i.Router Based Monitoring Techniques ii.Non-Router Based Monitoring Techniques Some key terms you shuld know through over presentaion is: Fault:when something is down or unavailable Avaliability:percentage of time stuff is not down and is working NMS:Network Management System Baseline:A measurement of current performance MIB:A virtual database of management information avaliable on a network device that can be queried using SNMP to retrive device 14

Router Based Monitoring Techniques I-Simple Network Monitoring Protocol (SNMP) SNMP is an application layer protocol that is part of the TCP/IP protocol suite. It allows Network Administrators to manage;  network performance,  detecting and solving network problems,  plan for network growth. It gathers traffic statistics through passive sensors that are implemented from router to end host. 15

What Is SNMP  SNMP is a tool (protocol) that allows for remote and local management of items on the network including servers, workstations, routers, switches and other managed devices.  Comprised of agents and managers Agent Agent :process running on each managed node collecting information about the device it is running on. Manager Manager :process running on a management workstation that requests information about devices on the network 16

SNMP Architectural View System Components Of SNMP Simple Network Management Protocol-polls the Management Information Base(MIB) of network devices An SNMP trap allows a network device to notify a NMS system of an event through an SNMP message 17

Three Parts Of SNMP  SNMP protocol Defines format of messages exchanged by management systems and agents. Specifies the Get, GetNext, Set, and Trap operations  Structure of Management Information(SMI) Defines format of messages exchanged by management systems and agents. Specifies the Get, GetNext, Set, and Trap operations  Management Information Base (MIB) A map of the hierarchical order of all managed objects and how they are accessed 18

SNMP Message SNMP uses User Datagram Protocol (UDP) as the transport mechanism for SNMP messages. Four Basic Operation made by SNMP protocol: GET:Retrieves the value of a MIB variable stored on the agent machine(integer, string, or address of another MIB variable) GETNEXT:Retrieves the next value of the next lexical MIB variable SET:Changes the value of a MIB variable TRAP:An unsolicited notification sent by an agent to a management a notiapplication (typically fication of something unexpected, like an error) 19

SNMP Configuration 20 Distrubuted Network Management Configuration

Object Identifier 21

Management Overview of SNMP 22

II- Remote Monitoring (RMON) Basic Concepts RMON enables various network monitors and console systems to exchange network-monitoring data. Extends the SNMP functionality without changing the protocol Allows the monitoring of remote networks (internetwork management) MAC-layer (layer 2 in OSI) monitoring Defines a Remote MONitoring (RMON) MIB that supplements MIB-II with MIB-II, the manager can obtain information on individual devices only with RMON MIB, the manager can obtain information on the LAN as a whole 23

RMON Components Networks with RMON 24

RMON MIB 25

RMON Groups and Tables 26

III-Netflow Netflow is a feature that was introduced on Cisco routers that give the ability to collect IP network traffic as it enters an interface. Netflow consists of three components: a.Flow caching, b.FlowCollector, c.Data Analyze r. Seven unique fields define a flow 27

How Does NETFLOW Works?  Traffic passes through routing/switching device interface  Flow created (remember the 7 fields) and stored in NetFlow cache  Flows grouped and exported in UDP packets to collector based on active and inactive flow timeout 28

NETFLOW Cache Example 29

NETFLOW Processing Order 30

Non-Router Based Monitoring Techniques Traffic Monitoring Network Monitoring Metrics 31

I-Active Monitoring Internet Control Message Protocol (ICMP) message used for diagnostic or control purposes or generated in response to errors in IP operations. I. TTL field: ping & traceroute use it in attempt to reach a given host computer or to trace a route to that host. II.Traceroute intentionally sends a packet with a low TTL value so that it will be discarded by each successive router in the destination path. III. The time between sending the packet and receiving back the ICMP message that it was discarded is used to calculate each successive hop travel time 32

TCP-UDP Based Active Monitoring UDP based Active Monitoring TCP based Active Monitoring 33

II-Passive Monitoring Passive monitoring unlike active monitoring does not inject traffic into the network or modify the traffic that is already on the network. Also unlike active monitoring, passive monitoring collects information about only one point in the network that is being measured rather than between two endpoints as active monitoring measures Passive monitoring can be achieved with the assistance of any packet sniffing program. 34

How Does Passive Monitoring Works Packets can be captured using Port Mirroring or Network Splitter (Tap) 35

Passive Monitoring tools I.Microsoft Network Monitor II.Wireshark III.Tshark IV.ssldump V.Tcpflow VI. dSniff 36

Windows Management Protocols  The Microsoft Windows Operating System(OS) leverages its own suite of protocols for communications between Windows servers and workstations  These protocols layer a top core TCP and UDP to enable server and service communication across an IP network  Windows Management Protocols: i.Remote Desktop Protocol(RDP) ii.Windows Management Instrumentation(VMI) iii.WS-Management 37

Network Data Analysis 38 TCP Server Listening Port Number Distribution Proportion Of The Internet Applications

THANK YOU FOR ATTENDING 39

REFERENCES:  A Summary of Network Traffic Monitoring and Analysis Techniques,Alisha Cecil 06/ftp/net_monitoring.pdf  Introduction to Passive Network Traffic Monitoring  The African Network Operator Groups(AfNOG) Workshops  SolarWinds Network Management Guide  Cisco Nettflow For Accounting Analysis and Attack  Simple Network Management Protocol, Chris Francois  TCP/IP Protocol Suite Behrouz A.Forouzan 40