10/10/14 INASP: Effective Network Management Workshops Unit 6: Solving Network Problems.

Slides:



Advertisements
Similar presentations
CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
Advertisements

Introduction 2 1: Introduction.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Performance analysis and Capacity planning of Home LAN Mobile Networks Lab 4
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
1 Chapter 9 The Internet in Business: Corporations, Businesses, and Entrepreneurs.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Performance Comparison of Congested HTTP/2 Links Brian Card, CS /7/
Hands-On Microsoft Windows Server 2003 Networking Chapter 5 Dynamic Host Configuration Protocol.
Maintaining and Updating Windows Server 2008
10/10/14 INASP: Effective Network Management Workshops Unit 8: Hands-on Practical Experience.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
10/10/14 INASP: Effective Network Management Workshops Unit 2: Why Network Management.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Networking Feb. 6, 2008 by Larry Finger. Networking Hardware Glossary RJ45 – Official name for 8-pin connector Cat 5, 5E or 6 - Cable suitable for “high”-speed.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
9: Troubleshooting Your Network
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
1 Part VII Component-level Performance Models for the Web © 1998 Menascé & Almeida. All Rights Reserved.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Internet Connectivity and Performance for the HEP Community. Presented at HEPNT-HEPiX, October 6, 1999 by Warren Matthews Funded by DOE/MICS Internet End-to-end.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Role Of Network IDS in Network Perimeter Defense.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
Web Proxy Caching: The Devil is in the Details Ramon Caceres, Fred Douglis, Anja Feldmann Young-Ho Suh Network Computing Lab. KAIST Proceedings of the.
Chapter 6.  Internet and characteristics of Internet.  Various Internet protocols  Static IP addressing and Dynamic IP addressing Prepared by Saher.
Wyoming Technology Readiness February Agenda Wyoming Training - Feb Technology Readiness  Schedule of events  Components and System Requirements.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Maintaining and Updating Windows Server 2008 Lesson 8.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Help Desk Working at a Small-to-Medium Business or ISP – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
25/09/2016 INASP: Effective Network Management Workshops Unit 6: Solving Network Problems.
CONNECTING TO THE INTERNET
Instructor Materials Chapter 9: Testing and Troubleshooting
Securing the Network Perimeter with ISA 2004
Web Caching? Web Caching:.
Chapter 15: Network Monitoring and Tuning
Office 365 Performance Management
Presentation transcript:

10/10/14 INASP: Effective Network Management Workshops Unit 6: Solving Network Problems

10/10/14 About these workshops Authors: Dick Elleray, AfriConnect Chris Wilson, Aptivate Date: Portions of this chapter reused from the e-book How to Accelerate your Internet under the Creative Commons Attribution-ShareAlike 2.5 license.How to Accelerate your Internet

10/10/14 Objectives On completion of this session, we hope you will know about: Importance of troubleshooting in network management Troubleshooting vs. monitoring Good troubleshooting technique Troubleshooting a rogue DHCP server Troubleshooting a slow Internet connection

10/10/14 What is troubleshooting? Identify the problem By manual, logical deduction To help us fix it

10/10/14 Troubleshooting is not monitoring Once the network is working well, we set up monitoring to: warn us if it stops working well help us troubleshoot more quickly The next unit is about monitoring.

10/10/14 Troubleshooting is not management Emergency quick fixes (fire-fighting) will not keep the network running well! But it's a necessary part: unexpected things will happen need to understand to fix them quickly and to prevent them happening again or detect and resolve more quickly next time

10/10/14 Proper troubleshooting technique Prepare for problems (see Unit 4/Disaster Response) Responding to a problem Identify possible causes Eliminate causes

10/10/14 Responding to a problem You might want to print this out and display on your wall! Don't panic Find a quick test Understand the problem Is it plugged in? What was the last thing changed? What is "known good"? Make a backup Change one variable at a time Do no harm

10/10/14 Example: Internet access not working How would you troubleshoot it?

10/10/14 Example: Rogue DHCP server One of the most common network problems: an unexpected DHCP server causes havoc by assigning users the wrong IP addresses.

10/10/14 Example: Slow Internet connection What do you need to check? DNS speed proxy server ping times/latency available bandwidth free bandwidth

10/10/14 How slow is it? What are response times (latency) for loading external sites? Measure the speed loading a specific web page, for example using the ab utility: ab -n This is ApacheBench, Version Requests per second: [#/sec] (mean) Time per request: [ms] (mean) Transfer rate: [Kbytes/sec] received

10/10/14 What influences page loading speed? DNS resolution, the available bandwidth and the latency are lower bounds: if a DNS lookup takes 1 second, the page cannot load in less than 1 second. a link with 1 Mbps free cannot load a 1 MB page in less than 8 seconds. a link with 3 second latency cannot load any page in less than 9 seconds.

10/10/14 Check the DNS server

10/10/14 Check the proxy server

10/10/14 Check ping times (latency) Ping a server on the Internet, for example or : $ ping -n PING ( ) 56(84) bytes of data. 64 bytes from : icmp_req=1 ttl=56 time=19.6 ms 64 bytes from : icmp_req=2 ttl=56 time=19.4 ms 64 bytes from : icmp_req=3 ttl=56 time=19.2 ms 64 bytes from : icmp_req=4 ttl=56 time=19.4 ms

10/10/14 Interactive applications Latency sensitive Usually less bandwidth intensive May require bandwidth reservation

10/10/14 Available and Total Bandwidth What do you know? What can you measure?

10/10/14 Available bandwidth testing There are various sites which offer speed tests: Or just download a large file.large file

10/10/14 How much free bandwidth do I need? Average web page was 1.4 MB in April 2013Average web page was 1.4 MB in April 2013 (~11 Mbit). HTTP Archive page size trends, May To load in 0.1 second, you need 110 Mbps (instantaneous - unrealistic?) To load in 1 second, you need 11 Mbps (~UK average broadband, fast) To load in 10 seconds, you need 1 Mbps (acceptable) Less than 1 Mbps available: really bad!

10/10/14 Available bandwidth and contention Example speed test on an African network with 512 kbps bandwidth and a 10:1 contention ratio.

10/10/14 Contended bandwidth Ask yourself: When are we likely to use our connection heavily? When are other ISP customers likely to use their connections heavily? Do we really get what we paid for, or only 10% of it? Who benefits from the "fast" connection at off-peak times?

10/10/14 What is congestion Congestion = full connection + long queue = unmanaged contention.

10/10/14 Effect of congestion What happens when a link becomes full?

10/10/14 Is my network congested? Probably yes if: It's much faster when nobody is using it, or Available bandwidth is less than 1 Mbps, or Latency is over 300 ms, or You see non-trivial levels of packet loss.

10/10/14 What causes congestion TCP protocol backoff only on packet loss ability to saturate connection excessive queue length

10/10/14 Solving the problem If available bandwidth is the main problem: slow page loading slow downloads high latency or packet loss connection is full (congestion) Then you need to increase supply of bandwidth and/or reduce demand. See Unit 9, Making a Difference.

10/10/14 Example: Denial of Service Attack Graphical tools can spot unusual changes in traffic levels, which may indicate an attack, and pinpoint start and stop times.

10/10/14 Summary Hopefully you now feel more confident with: Importance of troubleshooting in network management Troubleshooting vs. monitoring Good troubleshooting technique Troubleshooting a rogue DHCP server Troubleshooting a slow Internet connection