Data collection methodology and NM paradigms

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
Evolution Series Edge Release R3A00 Bridging Societies.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—4-1 Implementing Inter-VLAN Routing Deploying Multilayer Switching with Cisco Express Forwarding.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Operating and Configuring Cisco IOS Devices © 2004 Cisco Systems, Inc. All rights reserved. Operating Cisco IOS Software INTRO v2.0—8-1.
CPSC Topics in Multimedia Networking A Mechanism for Equitable Bandwidth Allocation under QoS and Budget Constraints D. Sivakumar IBM Almaden Research.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Open Innovation via Java-enabled Network Devices Tal Lavian
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Chapter 1: Hierarchical Network Design
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
WANS & Routers By Scott Burden & Linnea Wong Cisco Network Academy Semester 2.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Chapter 8 Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Chapter 6 – Connectivity Devices
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
PART3 Data collection methodology and NM paradigms 1.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Basic Edge Core switch Training for Summit Communication.
PART1 Data collection methodology and NM paradigms 1.
MPLS Virtual Private Networks (VPNs)
Network Concepts.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Cisco CNS NetFlow Collection Engine Version 5.0
Voice Performance Measurement and related technologies
Instructor Materials Chapter 6: Quality of Service
15-744: Computer Networking
Integration of and Third-Generation Wireless Data Networks
RMON.
Distribution and components
Network and Services Management
100% Exam Passing Guarantee & Money Back Assurance
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 5: Inter-VLAN Routing
Instructor: Mr. Malik Zaib
Network Administration CNET-443
Data collection methodology and NM paradigms
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 7 Backbone Network
Chapter 9 Internetworking
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
인터넷 구조 2002년 2학기 장주욱.
Software Defined Networking (SDN)
Dynamic Routing Protocols
Chapter 2: Static Routing
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Dynamic Routing Protocols
Network Architecture By Dr. Shadi Masadeh 1.
IP Control Gateway (IPCG)
Computer Networking A Top-Down Approach Featuring the Internet
Chapter-6 Access Network Design.
STATEL an easy way to transfer data
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Data collection methodology and NM paradigms part2

Outline Metering Positions: Where to Collect Data Records Network Element Versus End Device Collection Edge Versus Core Collection Embedded Versus External Device Collection Ingress Versus Egress Collection

Network Element Versus End Device Collection Network Element Collection End Device Collection Advantages Identifies network performance issues. Measures network-specific parameters, such as per traffic class (DSCP) or path-specific. Can be deployed without modifying end devices. Accurately measures the end user experience. Most realistic for application-specific monitoring. Disadvantages Indirectly measures the user experience. Performance impact at the network element. End-to-end results are provided without networkspecific measurements. Introduces end-device challenges, such as dealing with different operating systems, inconsistent configurations, and scalability. Intrusive on the desktop

Edge Versus Core Collection If you have a choice between edge and core collection, a good starting point is the business requirements, because they provide solid justification for selecting the appropriate technology afterwards

Edge Versus Core Collection Edge collection usage: If you want to deploy a usage-based billing system for a large, distributed network, chances are high that a collection only at the core devices might not be sufficient. If adjacent remote locations can communicate directly without passing through the core, edge collection is required.

Edge Versus Core Collection Core collection usage: in case of a traffic engineering application for the core network, the core is the only place to meter.

Edge Versus Core Collection Example from protocols: RMON information can be collected both at the core and at the edge. ART MIB separately measures the "flight time" of datagrams through the network and the server processing time and reports both values. This mandates the meter to be as close to the end devices as possible; therefore, place one ART MIB meter close to the server and the other one close to the users.

Embedded Versus External Device Collection Embedded Devices usage: A network operator needs to collect usage information for performance trend analysis, troubleshooting, and long-term planning. By leveraging integrated meters at network elements, the operator can deploy the metering quickly, without a massive rollout of dedicated metering devices and making use of existing NMS applications for configuration, software image management, and inventory management. If the application requires "BGP next hop" as a data type, this can be metered only by an internal agent at the network element.

Embedded Versus External Device Collection Another scenario is the metering of details, such as application response time, volume of traffic per application, and capturing packets for troubleshooting. In this case, the operator could use integrated RMON groups at network elements.

Embedded Versus External Device Collection Pros and cons of Embedded Devices: Advantages: fast and easy deployment Disadvantages: Additional resource consumption A network elements are not designed to collect a large number of accounting and performance records.

Embedded Versus External Device Collection Embedded Devices example: To balance resource consumption, Cisco routers implement only the RMON alarm and event groups (a group in this sense can be considered a subset of a MIB), whereas Cisco switches support the statistics and history groups in addition to the alarm and event groups

Embedded Versus External Device Collection External Devices usage: Due to the performance requirements of RMON and the ART MIB, a full deployment of both technologies is exclusive to dedicated RMON probes.

Embedded Versus External Device Collection External devices advantages: Dedicated devices are designed solely for network monitoring and can do so very efficiently, without other simultaneous processes interrupting the metering, such as routing, packet forwarding, and others. External devices offer troubleshooting flexibility of being connected to different devices at different locations, which is a cost-efficient way of troubleshooting.

Embedded Versus External Device Collection External devices can be connected directly to the network by using a splitter or TAP to insert the device into the active link.

Embedded Versus External Device Collection External device disadvantages: Limitations on external devices are the deployment overhead, if ubiquitous monitoring is required and the price of a large number of high-speed interfaces is metered, such as in a WAN environment where all links should be monitored directly

Embedded Versus External Device Collection Embedded Collection External Device Collection Advantages Leverages the existing infrastructure, including the management. Measures network element-specific parameters, such as BGP next hop. Includes the routing state in the metering, such as ACLs. Measures encrypted traffic if it terminates at the meter. Network element-independent deployment. Efficient collection, because the device was designed specifically for metering. Offloads management functionality from the network element. Disadvantages Performance impact at the network element. The architecture of the network element was not designed for metering purposes. Deployment and management costs and effort. Cannot monitor encrypted traffic.

Ingress Versus Egress Collection Ingress metering Ingress metering accounts for all incoming traffic before any packet operations are performed by the network element, such as ACLs ‘access control list’ , QoS marking, and policing

Ingress Versus Egress Collection Ingress metering usage: In a service provider environment, ingress traffic at the provider edge (PE) router is metered to identify the traffic volume a customer sends toward the carrier. These data records can be taken into account to check the allowed traffic peak and sustain rate toward the SP as well as for usage-based billing

Ingress Versus Egress Collection Egress metering Egress metering collects traffic that a device forwards after performing operations such as queuing, policing, and dropping; this can be used for traffic analysis and usage-based billing.

Ingress Versus Egress Collection From an end-to-end network perspective, the choice between ingress and egress collection is not too relevant, because the egress interface of one router is connected via a WAN or LAN link to the ingress interface of the next router.

Ingress Versus Egress Collection If you want to collect details at the egress interface of one router, and if a specific accounting feature is implemented as ingress only, you can usually collect it at the subsequent router's ingress interface.

Ingress Versus Egress Collection For the returning traffic, egress becomes ingress and ingress becomes egress

Ingress Versus Egress Collection

Ingress Versus Egress Collection Egress metering usage: If you only need to measure the traffic that is exchanged externally but do not want any local traffic collected, you would meter at the egress interface only. Note: you can also collect traffic from all nine ingress interfaces, but it is very likely that they also carry local traffic, which needs to be filtered afterwards.

abbreviations Abb. Meaning ACLs access control list PE provider edge DSCP Differentiated Services Code Point BGP Border Gateway Protocol