NETWORK MANAGEMENT Semester 4, Chapter 7.

Slides:



Advertisements
Similar presentations
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
Advertisements

CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Chapter 13: Troubleshooting network connectivity Unit objectives Identify TCP/IP troubleshooting tools Discuss the Telnet utility and its functions Discuss.
Introduction to Network Analysis and Sniffer Pro
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Chapter 8 Administering TCP/IP.
NETWORK MANAGEMENT Semester 4, Chapter 7. The Administrative Side of Network Management.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 Version 3.1 Module 4 Learning About Other Devices.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Hands-on Networking Fundamentals
Arparp* Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP) getmacgetmac Shows the mac address(es)
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 8 The Dynamic Host Configuration Protocol (DHCP)
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Exploring the Packet Delivery Process Chapter
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Examining TCP/IP.
1 Kyung Hee University Prof. Choong Seon HONG Remote Network Monitoring statistics Collection.
1 Chapter Overview Routing Principles. Understanding Routing--important Routing refers to the process of taking a packet from one device and sending it.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
POSTECH DP&NM Lab 1 Remote Network Monitoring (RMON)
Cisco – Semester 4 – Chapter 7
Remote Monitoring (RMON) RMON specification is primarily a definition of a MIB RMON specification is primarily a definition of a MIB RFC 1757/2819 Remote.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
SNMP.
Click to edit Master subtitle style
Instructor Materials Chapter 5: Network Security and Monitoring
Instructor Materials Chapter 8: Network Troubleshooting
CompTIA Network+ N Authorized Cert Guide
Lec 5: SNMP Network Management
TCP/IP Utilities Richard Goldman May 29, 2003.
Instructor Materials Chapter 6: VLANs
Ping and traceroute.
Network Tools and Utilities
Instructor Materials Chapter 9: Testing and Troubleshooting
Planning and Troubleshooting Routing and Switching
RMON.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Part1: Ipconfig ping command Tracert command Getmac command
Troubleshooting IP Communications
© 2002, Cisco Systems, Inc. All rights reserved.
Network Administration CNET-443
Troubleshooting IP Addressing
Chapter 9 Objectives Understand TCP/IP Protocol.
Net 431 D: ADVANCED COMPUTER NETWORKS
Routing and Switching Essentials v6.0
Lec 5: SNMP Network Management
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Chapter 15: Network Monitoring and Tuning
Ch 17 - Binding Protocol Addresses
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

NETWORK MANAGEMENT Semester 4, Chapter 7

The Administrative Side of Network  Management

A network is a collection of devices that interact with one another to provide communication. When a network administrator looks at a network, it should be as a whole instead of individual parts.

The important thing to remember when dealing with a network is to view it as a single unit opposed to a group of individual connected devices. This also applies to the wide area connections that are used when connecting to the Internet

It is important to know the responsibilities of the network staff.

Network costs Maintaining, upgrading, and monitoring the network Network growth over time Technical and user training, repairs, and software deployment The cost of redundant equipment for mission critical operations

When problems arise, some form of error document should be generated

PING - AN IMPORTANT NETWORK TEST! The two primary reasons for network monitoring are: 1) predicting changes for future growth 2) detecting unexpected changes in network status PING - AN IMPORTANT NETWORK TEST! FOR LARGE NETWORKS Ping a few of the important hosts, servers, routers, and switches to verify their connectivity

Network monitoring looks at the actual packet traffic on the network and generates reports based upon the network traffic. Monitor examples Microsoft Windows NT network monitor Fluke's Network Analyzer :

Management Station: The management station is the network manager's interface into the network system. It has the programs to manipulate data from and control the network. The management station also maintains a database of management information (MIB) extracted from the devices under its management.

Management Agent: Component that is contained in the devices that are to be managed. Bridges, routers, hubs, and switches may contain SNMP agents . The management agent responds to the management station in two ways. Polling - the management station requests data from the agent and the agent responds with the requested data. 2) Trapping is a data gathering method designed to reduce traffic on the network and processing on the devices being monitored. Thresholds (top or bottom limits) are set on the managed device. If this threshold on the device is exceeded, the managed device will send an alert message to the management station.                   

Management Information Base(MIB): The management information base has a database structure and is resident on each device that is managed. The database contains a series of objects, which are resource data gathered on the managed device. Some of the categories in the MIB include Port interface data, TCP data, and ICMP data.

Network Management Protocol: The network management protocol used is SNMP. SNMP is an application layer protocol SNMP is designed to communicate data between the management console and the management agent. It has three key capabilities. The ability to GET, the management console retrieving data from the agent, PUT, the management console setting object values on the agent, and TRAP, the agent notifying the management console of significant events

One of the greatest enhancements to SNMP is called Remote Monitoring (RMON). RMON extensions to SNMP give the ability to look at the network as a whole as opposed to looking at individual devices.

RMON PROBES Probes gather remote data in RMON. A probe has the same function as a SNMP agent. A probe has RMON capabilities; an agent does not. When working with RMON, as with SNMP, a central management console is the point of data collection An RMON probe is located on each segment of the network monitored. These probes can be dedicated hosts, resident on a server, or included in a standard networking device such as a router or switch. probes gather the specified data from each segment and relay it to the management console.

Redundant management consoles Two major benefits to network management processes: ability to have more than one network administrator in different physical locations monitor and manage the same network Having two or more management consoles means that if one of the consoles fails, the other console still can be used to monitor and control the network until the first console is repaired. (ie. Redundancy)

The Ethernet Statistics Group Contains statistics gathered for each monitored subnetwork. These statistics include counters (incremental that start from zero) for bytes, packets, errors, and frame size. The other type of data reference is an index table. The table identifies each monitored Ethernet device, allowing counters to be kept for each individual Ethernet device. The Ethernet Statistics Group provides a view of the overall load and health of a subnetwork by measuring different types of errors including CRC, collisions, over and under-sized packets.

The History Control Group Contains a data table that will record samples of the counters in the Ethernet Statistics Group over a specified period of time. The default time: every thirty minutes table size is fifty entries total of twenty-five hours of continuous monitoring These samples provide a baseline of the network and can be used to compare against the original baseline to resolve problems or to update the baseline as the network changes.

The Alarm Group Thresholds set, and when met, a message or alarm will be sent to the specified people This process, known as an error trap, can automate many functions OR

The Host Group Contains counters maintained about each host discovered on the subnetwork segment. Counter categories maintained are: Packets, Octets, Errors, and Broadcasts. Example: Total packets, Packets received, Packets sent, along with many counters specific to the type of item. The Host TOPN Group Prepares reports about a group of hosts that top a statistical list based on a measured parameter. Ex: A report could be generated for the top ten hosts generating broadcasts for a day or most packets transmitted during the day. Easy way to determine who and what type of data traffic most occupies the selected subnetwork

The Matrix Group Records the data communication between two hosts on a subnetwork data is stored in the form of a matrix (a multi- dimensional table). Examples: one report might show all users of a particular server, while another report shows all the servers used by a particular host.  

The Filter Group Provides a way that a management console can instruct an RMON probe to gather selected packets from a specific interface on a particular subnetwork. Based on the use of two filters, the DATA and the STATUS filter. The data filter is designed to match or not match particular data patterns The status filter is based on the type of packet looked at

The Packet Capture Group Allows the administrator to specify a method to use to capture packets that have been selected by the Filter Group Administrator can look at the exact detail for packets that meet the basic filter The Event Group Contains events generated by other groups in the MIB database The Token-Ring Group Contains counters specific to token-ring networks

Remember that RMON is an extension to the SNMP protocol . SNMP is still required for RMON to operate on a network. Later revisions of both SNMP and RMON. They are labeled as SNMPv2 and RMON2.

Know all points – if “this” then “that” scenario. The first step in network troubleshooting is the definition of the problem Know all points – if “this” then “that” scenario.

The first and most important thing is to use your engineering journal and take notes. Another essential element of preemptive troubleshooting is labeling The Process of Elimination and Divide and Conquer techniques are the most successful methods for networking troubleshooting The following slides will show various tools of the network administrator.

Ping Sends ICMP echo packets to verify Ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-r count] destination -t ping until interrupted -a resolves host name and ping address -n counts the number of pings -l length - send specified size echo packets -f DO NOT FRAGMENT command sent to gateways -I ttl sets the TTL field -r count records the route of the outgoing and returning packets Destination specifies the remote host to ping, by domain name or by IP address

Tracert (Traceroute) This utility shows the route a packet took to reach its destination (Based on TTL – time to live). Tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name -d specifies IP addresses shouldn't be resolved to host names -h max_hops Maximum number of hops searched -j host-list specifies the loose source route -w timeout waits the number of milliseconds specified for each reply Telnet This is a terminal emulation program that will allow you to run interactive commands on the telnet server.

Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [interval] Netstat Displays protocol statistics and current TCP/IP network connections. Netstat [-a] [-e] [-n] [-s] [-p proto] [-r] [interval] -a Displays all connections and listening ports. (Server-side connections are normally not shown) eDisplays Ethernet statistics. This may be combined with the -s option -n Displays addresses and port numbers in numerical form -p proto Shows connections for the protocol specified by proto; proto may be tcp or udp-r Displays the contents of the routing table -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP -p option may be used to specify a subset of the default interval Redisplays selected statistics, pausing interval seconds between each display

ARP Used to gather hardware addresses of local hosts and the default gateway, you can view the ARP cache and check for invalid or duplicate entries arp -a [inet_addr] [-N [if_addr]] arp -d inet_addr [if_addr] arp -s inet_addr ether_addr [if_addr] -a or –g Displays the current contents of the arp cache -d Deletes the entry specified by inet_addr -s Adds a static entry to the cache -N Displays the arp entries for the specified physical address inet_addr IP address, in dotted decimal formatif_addr IP address whose cache should be modified ether_addr The MAC address in hex separated by hyphens

/allall information about adapter(s) IPconfig (Windows NT)/WinIPcfg (Windows 95-98) IPconfig [/all | /renew [adapter] | /release [adapter]] /allall information about adapter(s)  /renew renew DHCP lease information for all local adapters if none is named /release release DHCP lease information disabling TCP/IP on this adapter

Network Monitoring ensures a happy network! THE END