CIS 460 – Network Analysis and Design Chapter 3 – Characterizing the Existing Internetwork.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Chapter 3: Planning a Network Upgrade
Antonio González Torres
Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 7: Intranet LAN Design
Chapter 13 Network Design and Management
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Six 1 Business Data Communications Chapter Six Backbone and Metropolitan.
Cisco 3 - Switches Perrine - Brierley Page 15/10/2015 Module 5 Switches LAN Design LAN Switches.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Ch.6 - Switches CCNA 3 version 3.0.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
1 CCNA 3 v3.1 Module 5. 2 CCNA 3 Module 5 Switches/LAN Design.
1 K. Salah Module 1.1: Introduction (cont.) Business Goals and Constraints Analyzing Technical Goals.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Business Data Communications Chapter Six Backbone and Metropolitan Area Network Fundamentals.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
Performance Management (Best Practices) REF: Document ID
Nov 9, 2006 IT 4333, Fall IT 4333 – Network Admin & Management RMON From: Byte Magazine, Javvin.com, Cisco.com, Wikipedia, and IETF.
Networking Components Chad Benedict – LTEC
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies.
Existing Network Study CPIT 375 Data Network Designing and Evaluation.
Connecting LANs, (network devices) Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Chapter 4: Managing LAN Traffic
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Characterizing the Existing Internetwork PART 1
Performance Management (Best Practices) REF: Document ID
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Configuring DNS and DHCP Chapter 20 powered by DJ 1.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
LAN DESIGN – first step 5 ISB – school year 2006/07.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Cisco 3 - Switches Perrine - Brierley Page 112/1/2015 Module 5 Switches.
Chapter 8 1 Chap 8 – Network Troubleshooting Learning Objectives Establish a network baseline Describe troubleshooting methodologies and troubleshooting.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network design Topic 2 Existing network infrastructure.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Performance Management (Best Practices) REF: Document ID
Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Oppenheimer.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Top-Down Network Design Chapter Three Characterizing the Existing Internetwork Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Instructor Materials Chapter 9: Testing and Troubleshooting
Networking Devices.
Part III Datalink Layer 10.
Semester 4 - Chapter 3 – WAN Design
Connecting LANs, Backbone Networks
RMON.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Administration CNET-443
IS3120 Network Communications Infrastructure
Module 5 - Switches CCNA 3 version 3.0.
Chapter 3 VLANs Chaffee County Academy
Part III Datalink Layer 10.
Requirements Definition
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

CIS 460 – Network Analysis and Design Chapter 3 – Characterizing the Existing Internetwork

Characterizing the Existing Network Examine the customers existing network to better judge how to meet expectations for network scalability, performance and availability Understanding the existing network’s structure, uses, and behavior you get a better feel if the design goals are realistic Most designers design network enhancements to existing networks

Characterizing the Network Infrastructure Develop a network map Learning location of major internetworking devices and network segments Documenting the names and addresses of major devices and segments Documenting the types and lengths of physical cabling Investigating architectural and environmental constraints

Developing a Network Map Location of major hosts, interconnection devices and network segments Help understand traffic flow Data on performance characteristics of network segments coupled with location information gives insight to where users are concentrated and the level of traffic to be supported Goal is to obtain a map of the already- implemented network

Tools for Developing Network Maps Invest in a good network-diagramming tool Visio is one example Some companies offer diagramming and network documentation tools that automatically discover existing networks.

What Should a Network Map Include? Geographical – countries, states, provinces, cities and campuses Wan connections between countries, states, and cities Buildings and floors and rooms or cubicles if possible WAN and LAN connections between buildings and campuses

What should a network map include? (Cont’d) Indication of the data-link technology for WANs and LANs Service provider for WANs Location of routers and switches Virtual Private Networks Major servers or server farms Location of major network-management stations Location and reach of any virtual LANs

What should a network map include? (Cont’d) Topology of any firewall security system Location of any dial-in and dial out systems Indication of where workstations reside Depiction of the logical topology or architecture of the network

Characterizing Network Addressing and Naming Documenting any strategies customer has for networking addressing and naming On detailed network maps include the names of major sites, routers, network segments and servers Investigate the network-layer addresses your customer uses A customer goal might be to use route summarization Existing addressing scheme might affect the routing protocols you can select

Characterizing Wiring and Media Document existing cabling design to help plan for enhancements and identify any potential problems Assess who well equipment and cables are labeled Document connections between buildings (number of pairs of wire and type) Locate telecommunications wiring closets, cross- connect rooms and any lab or computer rooms Use the chart in Table 3-1 on page 61.

Checking Architectural and Environmental Constraints Pay attention to environmental during cabling investigation Flooding, right of way issues, heavy equipment usage Building issues

Checking the Health of the Existing Internetwork Knowing baseline of existing system give a standard to measure new system against Existing segments will effect overall network performance Segments that will interoperate with new segments, backbone networks and networks that connect old and new areas Legacy systems may have to be included

The Challenges of Developing a Baseline of Network Performance Not an easy task –Time selection –Time allocation –Typical time period –Periods of normal traffic laod –Customer may not recognize need Need good understanding of customers technical and business goals

Analyzing Network Availability Gather statistics on MTBF and MTTR Learn about causes of the most recent and most disruptive periods of downtime Document availability in a Table such as Table 3-2 on page 65

Analyzing Network Utilization A measure of how much bandwidth is in use during a specific time interval Usually a percentage of capacity Different tools use different averaging windows Use appropriate division of time Averaged over too short or long a period can be misleading It is always better to error on the side of gathering too much data

Bandwidth Utilization by Protocol Measure by broadcast versus unicast traffic By each major protocol Some protocols send excessive broadcast traffic Use a protocol analyzer on each major network segment Relative usage specifies how much bandwidth is used by the protocol in comparison to total bandwidth currently in use by the segment. Absolute usage specifies how much bandwidth is used by the protocol in comparison to the total capacity of the segment Document using a Table such as 3-3 on page 69

Analyzing Network Efficiency Use a bit error rate tester on serial lines to test number of damaged bits compared to total bits On packet-switched networks measure frame errors because a whole frame is bad if a single bit is changed or dropped. Utilizes cyclic redundancy check (CRC) based on bits in a frame A protocol analyzer can check the CRC on received frames

Analyzing Network Efficiency (Cont’d) Errors increase as utilization increases so document errors as function of the number of bytes seen by the monitoring tool Some monitors allow you to print the top 10 stations sending frames Baseline analysis should also include upper-layer problems Accuracy should also include a measurement of lost packets

Analyzing ATM Errors Accuracy is measure in terms of cell error ration (CER), cell loss ration (CLR), cell misinsertion rate (CMR) and severely errored cell block ration (SECBR) CER is number of errored cells divided by total number of successfully transferred cells plus errored cells CMR is caused by an undetected error in the header of a cell If no tool, check the performance by analyzing the level of frame errors and upper-level problems

Analyzing Network Efficiency Bandwidth utilization is optimized when applications and protocols are configured to send large amounts of data per frame. The goal is to maximize the number of data bytes compared to the number of bytes in headers and in acknowledgment packets Use a protocol analyzer to examine the current frame sizes on the network Analyzing frame sizes can help understand health of a network, not just the efficiency

Analyzing Delay and Response Time Measure response time between significant network devices before and after a new network design is implemented Send ping packets and measure time to send and respond Document using a Table such as 3-4 on page 75 Measure response time from a user point of view Test user applications and system protocols Do some testing when the system is experiencing problems or change

Checking the Status of Major Routers Includes determining how busy the router is, how many packets the router has processed, how many packets the router has dropped and the status of buffers and queues. You can use the Simple Network Management Protocol (SNMP) to check the health of a router To check the health of a router you need to check the router variable on a regular basis over a few days

Tools for Characterizing the Existing Internetwork Protocol Analyzers Remote Monitoring Tools Cisco Tools for characterizing an Existing Internetwork Cisco Discovery Protocol Enterprise Accounting for NetFlow Netsys Service-Level Management Suite Cisco Works Other Tools

Protocol Analyzers A fault-and-performance-management tool that captures network traffic, decodes the protocols in the captured packets and provides statistics to characterize load, errors, and response time. –Sniffer Network Analyzer –EtherPeek

Remote Monitoring Tools Remote Monitoring (RMON) MIB developed to overcome shortcomings in the standard SNMP MIB for gathering statistics on data-link and physical-layer parameters Gathers statistics on CRC errors, Ethernet collisions, Token-ring soft errors, frame sizes, number of packets in and out of a device, and the rate of broadcast packets The RMON MIB alarm group allows a network manager to set thresholds for network parameters and automatically delivers alerts to management

Cisco Tools for Characterizing an Existing Internetwork Cisco has a complete range of tools for characterizing an existing internetwork, ranging from the Cisco Discovery Protocol to sophisticated Netsys tools

Cisco Discovery Protocol Specifies a method for Cisco routers and switches to send configuration information to each other on a regular basis Look at information about neighboring routers: –Protocols enabled –Network address for enabled protocols –Number and types of interfaces –Type of platform and its capabilities –Version of Cisco IOS software

Enterprise Accounting for NetFlow Can help understand bandwidth usage and allocation, quality of service levels, ro8uter usage, and router port usage Recognizes network flows and characterizes network and router usage by user (IP address), application, and department

Netsys Service-Level Management Suite Enables defining, monitoring, and assessing network connectivity, security, and performance. Particularly useful for characterizing an existing network as part of a network design proposal

Cisco Works A series of SNMP-based internetworking management software application for device monitoring, configuration maintenance, and troubleshooting of Cisco devices

Other Tools for Characterizing an Existing Internetwork Many other tools out there. Visit various web sites identified in the book to look at some of the tools.

Conclusion Use a network health checklist like the one on page 81 to assist in verifying the health of an existing network.