NetSearch: Googling Large-scale Network Management Data GROUP 2 MEMBERS SAMUEL LAWER WENBO HAN HUAN YAN PEI YAN SHREY YADAV SHUAI YU SHINE PANDITA.

Slides:



Advertisements
Similar presentations
Nordic ID Monitor Self monitoring system. Nordic ID Monitor –self monitoring system BACKGROUND There is new legislation for controlling food quality and.
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Digital Library Service – An overview Introduction System Architecture Components and their functionalities Experimental Results.
G-RCA: A Generic Root Cause Analysis Platform for Service Quality Management in Large IP Networks He Yan, Lee Breslau, Zihui Ge, Dan Massey, Dan Pei, Jennifer.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Troubleshooting.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
WebMiningResearch ASurvey Web Mining Research: A Survey By Raymond Kosala & Hendrik Blockeel, Katholieke Universitat Leuven, July 2000 Presented 4/18/2002.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Physical design. Stage 6 - Physical Design Retrieve the target physical environment Create physical data design Create function component implementation.
David Lo Siau-Cheng Khoo Chao Liu DASFAA 2008 Efficient Mining of Recurrent Rules from a Sequence Database 1.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Understanding Network Failures in Data Centers: Measurement, Analysis and Implications Phillipa Gill University of Toronto Navendu Jain & Nachiappan Nagappan.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
HiVision SNMP Software.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Analysis of RIP, OSPF, and EIGRP Routing Protocols using OPNET Group 5: Kiavash Mirzahossein Michael Nguyen Sarah Elmasry
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
AutoDiscovery Device Attributes Discovery Ports Discovery CDP Neighbours Discovery Layer 3 Hosts Discovery.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
What is FORENSICS? Why do we need Network Forensics?
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
User Interface Elements of User Interface Group View.
Module 7: Fundamentals of Administering Windows Server 2008.
IP Forwarding.
Cisco Routers Objectives –How to log into a Cisco router and determine basic settings. Contents –Differences in available methods of access. –Different.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Cisco Discovery Protocol. CDP and Router Boot Up When a Cisco device boots up, CDP starts up automatically and allows the device to detect neighbor devices.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
National Chi Nan University Automatic Event-Driven System for Network Management Author: Ya-Ling Wang, Arak Sae Yuan, Quincy Wu Date : 2/21/2012.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Routing and Routing Protocols
Networks-on-Chip (NoC) Suleyman TOSUN Computer Engineering Deptartment Hacettepe University, Turkey.
National Institute Of Science & Technology CAN-based Higher Layer Protocols and Profiles Rajaaranjan Mishra 1 EI DECEMBER-2004 CAN-based Higher.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
LonWorks Introduction Hwayoung Chae.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Role of Metadata in dissemination of census data Regional Seminar on dissemination and spatial analysis of census data, Nairobi, September, 2010.
1 CMPT 471 Networking II Multicasting © Janice Regan,
Snort – IDS / IPS.
Multi Node Label Routing – A layer 2.5 routing protocol
Managing Your Network Environment
Pilot Watcher Product Overview V5.3
CCNA Routing and Switching Routing and Switching Essentials v6.0
Domain Name System (DNS)
Introduction to the Junos Operating System
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Log management AfNOG 2008 Rabat, Morocco.
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
Improving DevOps and QA efficiency using machine learning and NLP methods Omer Sagi May 2018.
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
LAN switching and Bridges
Ch 17 - Binding Protocol Addresses
Scrumium NetBrain Thursday, May 09, 2019.
Presentation transcript:

NetSearch: Googling Large-scale Network Management Data GROUP 2 MEMBERS SAMUEL LAWER WENBO HAN HUAN YAN PEI YAN SHREY YADAV SHUAI YU SHINE PANDITA

OUTLINE  Introduction  Overview and Syntax of Data Sets  Netsearch Methodology  Evaluation  Application  Relation to FCAPS  Conclusion

Introduction What is Netsearch?  It is a search and information retrieval tool design to work on network measurement and monitoring data sets.

Overview and Syntax of Data Sets  LOGS  An example is a router syslog which captures information about network conditions and the hardware component involved such as link and protocol state, high voltage or temperature etc.

Overview and Syntax of Data Sets  Device alarms  In many cases, layer-1 alarms indicate the root causes of upper layer issues. This is an example of layer 1 alarms.  Some network devices generate alarms when certain events occur. Data from here usually contains time and location information. An example is SONET alarms.

Overview and Syntax of Data Sets  Control Plane Monitoring.  Control plane refers to the learning of routes by routers. For better network performance we monitor the exchanges of information between routing protocols.

Netsearch Methodology  The goal of Netsearch is to sort through large amounts of network information and return the relevant ones to the network operator.  Configuration Learning  Location Extraction  Indexing and Searching  Query Interpretation

Netsearch Methodology

Config Learning  Based on configuration files of each router, Netsearch can form location dictionary and location hierarchy.  location dictionary: extract location information embedded in network messages. Netseach can also understand the syntax or format of locations.  location hierarchy contains two parts physical hierarchy and logical hierarchy.

Netsearch Methodology Netsearch uses the physical hierarchy to build the Indexing and searching algorithm. One to Many One router can have multiple slots One slot can have many ports

Location Extraction  Based on router configuration  Based on message context  Based on domain knowledge A hybrid method combination of the three Netsearch Methodology

Indexing and Searching  Contains 3 parts information: Time/location/other description(optional)  Involves Temporal indexing and Spatial indexing.  Relevant iff their positions in the location hierarchy tree are either the same or one is the other’s ancestor Example interfaces and messages.

Query Interpretation  There are two options provided for the flexibility of location query 1. Specify the type: interface XXX or ID XXX 2. If no specification; mapping from signature to location digits(D)/alphabetic characters(A)/others(O) Example: SERIAL2/0.7/11: AAAAAAADODODODDOD Netsearch Methodology

Evaluation  Evaluation of Netsearch was done using the 3 network data set ( Syslog, OSPF and SONET ) to evaluate the 3 main components of Netsearch, ie, location extraction, indexing and searching, and query interpretation.  Performed on a tier 1 ISP for a month.

Evaluation  Location Extraction

Evaluation  Indexing and Searching

Evaluation  Query Interpretation

Application  Important use of Netsearch is to assist network operators in analyzing the impact of a network event.  Network operator of the tier 1 ISP noticed that port 1/1/1 on router R1 was unstable.

Application

 Using grep (global regular expression print) to capture and analyze is a complicated task and is time consuming.  Netsearch provides the related set of messages within minutes

Relation to FCAPS  Increase the efficiency to obtain the relevant messages (P)

Conclusion  Netsearch tool has been developed to sort through a wide range of network data such as those for large tier 1 ISPs.  Acts as the “google” for network analysis.  Search and indexing involves spatial and temporal information.

THANK YOU