Network Monitoring Russell Schwager February 18, 1998

Slides:



Advertisements
Similar presentations
Network Performance Measurement
Advertisements

Introduction to Network Analysis and Sniffer Pro
Internet Control Message Protocol (ICMP)
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols.
Network Performance Management S. Keshav C/NRG (with Rosen Sharma, Andy Choi, Wilson Huang, Lili Qiu, Russell Schwager, Rachit Siamwalla, Jia Wang, and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
Transmitting and Tracking Packets of Data Through The TCP and UDP Network Protocols Todd Deshane Ashwin Venkatraman McNair Program Clarkson University.
Network Layer Functions Key Layer in Internet Architecture End-to-end Packets Adapt to lower layers
Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong.
Transport Layer Flow. Socket Connections UDP Segment Structure.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Simple Comparison By Akhyari Nasir. Intro  Network monitoring and measurement have become more and more important in a modern complicated network. 
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
COEN 252: Computer Forensics Router Investigation.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Chapter Overview TCP/IP Protocols IP Addressing.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Internet Vulnerabilities & Criminal Activities 1.2 – 9/12/2011 Structure of Internet Communications 1.2 – 9/12/2011 Structure of Internet Communications.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Hands-on Networking Fundamentals
Chapter 1 Overview Review Overview of demonstration network
13/09/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Transport layer and Application Layer Slide 1.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Kohei OHTA Monitoring vehicles The potential and the challenge.
Role and Mechanism of Queue Internet Engineering.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 19: Network Management Business Data Communications, 4e.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Exploring Office 2003 – Grauer and Barber HTML And Basic Web page.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Query – One of the objects in Microsoft Access – It can help users extract data, which meets the criteria defined by them, from a database file. – It must.
1 UDP : User Datagram Protocol Computer Network System Sirak Kaewjamnong.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
TCP/IP (Transmission Control Protocol / Internet Protocol)
SQL Report Writer.  The SQL Report Writer is included with every Appx runtime.  It is intended to be used by end users to create their own reports.
Service Level Monitoring. Measuring Network Delay, Jitter, and Packet-loss  Multi-media applications are sensitive to transmission characteristics of.
Net Flow Network Protocol Presented By : Arslan Qamar.
Network Management  introduction  Internet SNMP: Simple Network Management Protocol  required reading: section 7.3 in text.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
TCP/IP Protocol Suite 1 Chapter 11 Upon completion you will be able to: User Datagram Protocol Be able to explain process-to-process communication Know.
UDP: User Datagram Protocol Brian Jorgage CSC /24/2004.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Introduction to Networks
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Internet Control Message Protocol (ICMP)
06- Transport Layer Transport Layer.
Network Management Computer Networks.
Encapsulation/Decapsulation
Internet Control Message Protocol (ICMP)
Database Splitters.
Topic 5: Communication and the Internet
Challenges in Network Troubleshooting In big scale networks, when an issue like latency or packet drops occur its very hard sometimes to pinpoint.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Russell Schwager May 6, 1998 Network Monitoring Russell Schwager May 6, 1998
Presentation transcript:

Network Monitoring Russell Schwager February 18, 1998

The Big Picture

Present Work n Use simple tools to monitor various network statistics gathered from routers and other switches. n Present the data in such a way that it will help in future research of network management.

Future Use of Statistics n Develop a heuristic to define hot spots and congestion in a network. n Use the heuristic to find ways to isolate and remove hot spots, making networks more stable. n Use the statistics to develop realistic simulations of networks.

Approach Used n A PERL script uses SNMP and queries a router using various MIB entries. n The MIB entries are stored in an input file. n The values gathered from the router are stored in a file. n The script works on both UNIX and WinNT.

Approach Used (cont.) n Other PERL scripts parse the data and convert it to other formats. n Currently supported formats: –HTML - The data is presented in a table format in HTML. –GNUPlot graphs - The data can be graphed. Currently the graphs are saved in pbm format because GNUPlot 3.5 is being used. (3.6 supports gif).

A Case Study: CSGate2 Number of Bytes ReceivedNumber of Bytes Transmitted From 2/19/98 to 2/23/98, the router CSGate2 was probed every 5 minutes recording various statistics on the data coming into and going out of the router.

CSGate2 - More Graphs... Out UDP DatagramsIn UDP Datagrams Out TCP SegmentsIn TCP Segments

Case Study: Analysis n There is some activity that occurs nightly around midnight. This could be a backup or some other system process. n The number of bytes received is a lot more than transmitted. This could indicate problems with the router. The other graphs show fairly stable traffic. Typically the number of bytes going in and out should be about equal. n The number of UDP and TCP packets are almost consistent. This could mean that services like DNS are attached to this router and not many users.

Further Information n Project Information: n Cornell Network Research Group