Module 9: The Methodology of Performance Issue Investigation.

Slides:



Advertisements
Similar presentations
Using the Self Service BMC Helpdesk
Advertisements

Innovation through participation eduGAIN federation operator training Operations Team, OT, how to join eduGAIN /18 Valter Nordh, NORDUnet / GU.
Chapter 6: Static Routing
Ver 1,12/09/2012Kode :CIJ 340,Jaringan Komputer Lanjut FASILKOM Routing Protocols and Concepts – Chapter 2 Static Routing CCNA.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Network Layer and Transport Layer.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
Ch.6 - Switches CCNA 3 version 3.0.
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
CS-3013 & CS-502, Summer 2006 Network Input & Output1 CS-3013 & CS-502, Summer 2006.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Internet Basics.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Introduction to networking (Yarnfield) Introduction to routing.
Westminster City Council and Westminster Primary Care Trust Voluntary Sector Funding 2009/10 Voluntary Sector Funding Eligibility, Application Form Funding,
Introduction to networking (Yarnfield) Introduction to routing.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 Version 3.1 Module 4 Learning About Other Devices.
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
LBTO IssueTrak User’s Manual Norm Cushing version 1.3 August 8th, 2007.
TCOM 515 Lecture 6.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Protocols and the TCP/IP Suite
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
TCP/IP Yang Wang Professor: M.ANVARI.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
© 2002, Cisco Systems, Inc. All rights reserved..
Connect. Communicate. Collaborate PERT Performance Enhancement & Response Team Toby Rodwell, DANTE Joint Techs, New Mexico USA 7 February 2006.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
CCNA 2 Week 9 Router Troubleshooting. Copyright © 2005 University of Bolton Topics Routing Table Overview Network Testing Troubleshooting Router Issues.
Integrating and Troubleshooting Citrix Access Gateway.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Static Routing Routing Protocols and Concepts – Chapter 2.
Connect. Communicate. Collaborate Click to edit Master title style PERT OPERATIONS.
Network design Topic 6 Testing and documentation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Module 5: The Methodology of Performance Issue Investigation.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing Protocols.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Microsoft Customer 2 Partner Connector Quick Reference Guide
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Instructor Materials Chapter 7: Access Control Lists
Instructor Materials Chapter 9: Testing and Troubleshooting
Introduction to Networking
Chapter 2: Static Routing
Troubleshooting IP Addressing
Chapter 4: Access Control Lists (ACLs)
Module 5 - Switches CCNA 3 version 3.0.
Unit4 Customer Portal Submitting & Managing Cases.
Unit4 Partner Portal for Case Creator
Delivery, Forwarding, and Routing of IP Packets
Presentation transcript:

Module 9: The Methodology of Performance Issue Investigation

2 CASE MANAGEMENT METHODOLOGY - OVERVIEW 1. Check user’s eligibility 2. Check eligibility of case 3. Gather information 4. Open case 5. Troubleshoot case 6. Close the case

3 CHECK USER’S ELIGIBILITY Definitions: User: a person who requests the PERT’s assistance End-user: a person who operates or administers an end- system Eligible user: qualifies for PERT assistance because they use a network operated by a GÉANT2 participant Take priority Ineligible user: all other users May be given assistance if time and resource permit

4 CHECK ELIGIBILITY OF CASE You should only open a PERT case where: A networked system is not performing as expected And The problem is suspected to be caused directly or indirectly by the network And The problem is not obviously the result of specific hardware failure If it is, the NOC should be contacted

5 GATHER INFORMATION (1) The information you gather is categorised as follows: Must have Information the user must provide before the investigation begins Should have Information you should try to get from the user for a quick resolution May have In certain cases, information you should try to get from the user for a quick resolution Ideally have The user may not be able to easily provide this information, but it will help if they can

6 GATHER INFORMATION (2) May haveB end URL May haveA end URL Should haveB end IP address Must haveA end IP address Must haveRequestor’s addressCustomer (user) contact Should haveWhen was the problem discovered?Start of the problem Should haveHas the system ever behaved as expected? Previous behaviour Must haveUser’s expectations as to how the system should behave (preferably a quantitative expectation, but a qualitative description is acceptable)‏ User’s expectations Must haveDescription of the current system behaviour Problem description

7 GATHER INFORMATION (3) Ideally haveHardware, OS, applicationB-end host details Should haveHardware, OS, applicationA-end host details Ideally haveLocal network equipment and connections B end topology Should haveLocal network equipment and connections A end topology Must haveOnly required if no trace-routes providedRound Trip Time Ideally haveFrom B end to A endReverse trace route Should haveFrom A end to B endForward trace route Should haveB end user details Must haveDetails of the A-end technical POCA end user details Must haveIP Protocol, source port, destination portTraffic type

8 OPEN CASE 1. Create a PERT ticket 2. Add case summary 3. Inform PERT Community 4. Notify involved NRENs Copy user provided information into ticket. Add relevant keywords. Add summary of case as a note. Mark as important. Update note as case progresses. Send case summary to mailing list. Send describing the case to all NRENs in the problem path (PERTs or otherwise NOCs).

9 TROUBLESHOOT CASE – OVERVIEW 1. Gather additional Information 2. Draw the path 3. Determine available tests and statistics 4. Localise the problem 5. Search the PERT Knowledge Base 6. Request SME assistance

10 TROUBLESHOOT CASE (1) Gather additional information: Ask for missing information and error messages Gather traceroute information Tech tip: use ‘Layer 4 Traceroute’ to detect firewall filter issues Determine which networks the path traverses Add contact details for each technical POC along the path to the ticket Determine end-users’ security policies Will / how will PERT be granted end-system access? –Continued on next slide

11 TROUBLESHOOT CASE (2) Gather additional information (continued): Tech tip: if TCP is being used: Find the send and receive socket buffers Calculate path’s bandwidth-delay product (BDP)‏ Check that advertised TCP window is at least equal to the path’s BDP Use information gathered to make a clear problem statement: Describe symptoms Identify what would constitute a reasonable performance level

12 TROUBLESHOOT CASE (3) Draw the path: Contact network administrators along the path Start with the affected NRENs Draw diagram of the end-to-end path, showing: Equipment Connections Save diagram as an attachment to the ticket, mark as important Tech tip: identify any cross traffic E.g. LAN switch that has heavy local traffic Update your problem statement with any possible causes (e.g. capacity bottleneck)‏

13 TROUBLESHOOT CASE (4) Determine available tests and statistics: Statistics at or near the end-points netstat -s output, MRTG/Cricket graphs, etc. Packet traces (Wireshark/tcpdump/snoop) Preferably from both endpoints from the same transaction/transfer Make sure hosts are synchronised via NTP or similar!

14 TROUBLESHOOT CASE (5) Determine available tests and statistics (continued): If problem is low achievable data rate, then: Perform standard test to determine end-to-end transfer speeds –Use the actual end-system if possible –Use another end-system on the same subnet if not possible Use pre-configured Measurement Points (MP) along the path to study network performance at time of problem

15 TROUBLESHOOT CASE (6) Localise the problem: A typical end-to-end path may be as follows: Run two tests: One from end-system A to a ‘mid-point’ (point C)‏ Another from end-system B to the ‘mid-point’ If one of the tests fails, find a new mid-point in its path and repeat the process. –Continued on next slide LAN ALAN B End-system AEnd-system B National or International LAN Point C First TestSecond Test

16 TROUBLESHOOT CASE (7) Localise the problem (Continued): In reality, you may not be able to run a test to / from point C An alternative is to run a sequence of smaller tests, progressing along the path from one end-system to the other –Continued on next slide LAN ALAN B End-system AEnd-system B National or International LAN 1st Test2 nd test3 rd test4 th test5 th test6 th test7 th test

17 TROUBLESHOOT CASE (8) Localise the problem (continued): Testing should allow you to locate the bottleneck: End-system application End-system (non-application) LAN system WAN system If possible, the case manager should identify a particular network element as the dominating bottleneck.

18 TROUBLESHOOT CASE (9) Search the PERT Knowledge Base: Search against the category of problem or the particular network element that is suspected as the bottleneck PERT Knowledge Base should help to solve many cases

19 TROUBLESHOOT CASE (10) Request assistance from Subject Matter Experts: Check list of current Subject Matter Experts Consult their profiles Determine who to consult Their knowledge should help you to solve or progress the case Or: throw the case before Including a readable and sufficiently complete description

20 TROUBLESHOOT CASE (11) How to ask for remote login to PERT user's end host: PERT users will agree to this more often than people think! Build trust Provide good initial analysis and justify additional measurements Explain what you want to do on their machine Provide your (group's) SSH public key Specify (small) range of IP addresses you will log in from Tell them how long you might need this –and inform them when you're actually done (they might keep your account around) Offer access to one of your test machines in return

21 CLOSE THE CASE (1) Propose a resolution: Communicate with PERT user and intermediate contacts Test solution Ensure you minimise risk of impact on other network users Ensure that you avoid security lapses If proposal requires multiple changes, try to manipulate only one variable at a time Ensure that you can roll-back if necessary Implement and verify solution Re-run original tests Asks end-user to verify performance –Continued on next slide

22 CLOSE THE CASE (2) Finalising resolution: Once issue is solved and / or reason for problem is understood, case manager should: Contact end-user and pass on findings Create a resolution description Mark the case as ‘Resolution Proposed’ Grade the case in terms of: –Customer’s satisfaction –Problem Understanding »Continued on next slide

23 CLOSE THE CASE (3) Finalising resolution (continued): Customer’s satisfaction – possible categorisations: Not at all satisfied Not satisfied Neutral Satisfied Very satisfied –Continued on next slide

24 CLOSE THE CASE (4) Finalising resolution (continued): Problem understanding – possible categorisation: Fully understood (fix identified)‏ Well understood (no fix identified)‏ Somewhat understood Incomprehensible (but possible to estimate where the problem might be)‏ Completely incomprehensible (impossible to estimate where the problem might be)‏

25 CLOSE THE CASE (5) Add a Knowledge Base article for the issue: Or update an article if it already exists. Cross-reference the ticket Include details of any tools used and how successful / helpful these tools were

26 CLOSE THE CASE (6) Once the end-user is satisfied with the case result and the Knowledge Base article has been written, then you should change the ticket status to ‘closed’.