Experiment: Step by Step Author: Anna Bekkerman

Slides:



Advertisements
Similar presentations
T-Mon SERVER CONNECTOR
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Troubleshooting TCP/IP COSC513 FALL By :Ming Wei.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
RAPIDS Server Author: Anna Bekkerman
Local Monitoring Module (LMM) Author: Anna Bekkerman
CS526 Dr.Chow1 HIGH AVAILABILITY LINUX VIRTUAL SERVER By P. Jaya Sunderam and Ankur Deshmukh.
Events Hierarchy Author: Anna Bekkerman
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
TCP/IP suit 4th Edition by Behrouz A Forouzan. 2 Internet Computing (CS-413)
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
7-Layers of the OSI Model High-Tech Talk - Open Systems Interconnection Heather Boros Net Baker College, 2013.
Basic Concepts of Computer Networks
Process-to-Process Delivery:
Basic Router Configuration Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Sales Kickoff - ARCserve
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
How the Internet Works. The Internet and the Web The Web is actually just one of many computer applications that run on the Internet Among others are.
CCNA – Cisco Certified Network Associates Routing and Static Routes By Roshan Chaudhary Lecturer Islington College.
Oracle10g RAC Service Architecture Overview of Real Application Cluster Ready Services, Nodeapps, and User Defined Services.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Computer Emergency Notification System (CENS)
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
A Brief Documentation.  Provides basic information about connection, server, and client.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Developing TCP/IP-based Server Applications using Indy Components  Christian Wilkerson.
© 2004 EMC Corporation. All rights reserved. 111 nsr_shutdown Changes in NetWorker 7.3 nsr_shutdown’s Redesign for Scalability Bryce Tompkins
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
On the Robustness of Soft- State Protocols John Lui, CUHK Vishal Misra, Columbia U. Dan Rubenstein, Columbia U.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Chapter 3: Network Protocols and Communications
RTD Basic Training. Agenda Control PC Network Connection Setup Configure RTD –RTD License Installation –RTD Environment Configuration –Archives Basic.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
© 2002, Cisco Systems, Inc. All rights reserved..
Serial Server Configuration Peter Szyszko. Hardware Configuration  Unit has to be connected to network and powered.  Computer has to be connected to.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
GL TRADE Internal Use Only GL Stream Server Module Notification Sequence Diagram December 12th, 2007.
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
Introduction to networking (Yarnfield) Configure a router.
What does LinkConnect do?
Automated ADT Interface Version .02
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Wlbs.exe Commands The Wlbs.exe program operates on Network Load Balanced hosts or on any remote computer running Windows 2000 that accesses the cluster.
Troubleshooting Network Communications
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
Cluster Communications
Lec 5 Layers Computer Networks Al-Mustansiryah University
© 2002, Cisco Systems, Inc. All rights reserved.
Setting Up Firewall using Netfilter and Iptables
Time Gathering Systems Secure Data Collection for IBM System i Server
Presentation transcript:

Experiment: Step by Step Author: Anna Bekkerman

Setup Server LMM Control signals Data Client Data Node Target system

Configuration File Describes an experiment – Nodes IP addresses, types (SOCC node/radar node), etc. – Commands to start/stop involved processes – Collected metrics (CPU/memory utilization, etc.) – Monitored processes – Net control parameters Delays, drop rates – Refresh rates

Start LMMs When started, RAPIDS server: – Grabs two ports: to communicate with LMMs to communicate with RAPIDS clients – Reads a configuration file – Starts LMMs on all nodes through SSH connections – Waits for ack signals from all LMMs – Starts setting LMMs up according to the configuration file FIXME: Server will wait indefinitely for the ack s from all LMMs. A time-out mechanism should be introduced.

Set LMMs Up Home-made protocol is used to set up LMM parameters Examples of commands sent from the server to LMMs: – STM set metric – STP set monitored process – STE set start-up command – STT start – SPP stop When a parameter is set, LMM sends an ack signal back to the server At the end of each step, server waits for ack s from all LMMs

Start Monitoring When LMM receives the start command: – If needed, network control application is started Network control application runs only if iptables are turned on. iptables select IP packets (as specified in iptables rules) and queue them for processing by the application. The application introduces delays and/or drops packets according to the settings in the configuration file.

Start Monitoring When LMM receives the start command: – If needed, network control application is started – RAPIDS Message Queues (RMQ) are initialized A mechanism used for communication between RAPIDS and monitored applications. See more in the “RMQ” section.

Start Monitoring When LMM receives the start command: – If needed, network control application is started – RAPIDS Message Queues (RMQ) are initialized – Heartbeat applications are started Send “I’m alive” signals from radar nodes to SOCC nodes. If a signal has not been received, RAPIDS reports link failure. FIXME: Timeout mechanism should be added to minimize false alarms.

Start Monitoring When LMM receives the start command: – If needed, network control application is started – RAPIDS Message Queues (RMQ) are initialized – Heartbeat applications are started – Processes are started Commands are specified by user in the configuration file

Start Monitoring When LMM receives the start command: – If needed, network control application is started – RAPIDS Message Queues (RMQ) are initialized – Heartbeat applications are started – Processes are started Commands are specified by user in the configuration file – “Collection sessions” are started every t seconds According to the refresh rates provided by user in the configuration file

Collection Session During each collection session LMM: – Collects metrics – Reads events accumulated in RMQ – Sends the metrics and events to the RAPIDS server More details in the “LMM” section

Stop Monitoring When the server is stopped, it sends stop commands to all LMMs Upon receiving the stop signal, LMM: – Stops launching collection sessions – Stops processes Using the commands specified by user in the configuration file – Heartbeat applications are stopped – RMQ is deleted – Network control applications are stopped

What Might Go Wrong? When the server is stopped, it sends stop commands to all LMMs Upon receiving the stop signal, LMM: – Stops launching collection sessions – Stops processes Using the commands specified by user in the configuration file – Heartbeat applications are stopped – RMQ is deleted – Network control applications are stopped If “untrappable” signals ( SIGKILL and SIGSTOP ) are used to kill the server, the shut-down procedures will not be executed!

What Might Go Wrong? When the server is stopped, it sends stop commands to all LMMs Upon receiving the stop signal, LMM: – Stops launching collection sessions – Stops processes Using the commands specified by user in the configuration file – Heartbeat applications are stopped – RMQ is deleted – Network control applications are stopped If commands provided by user do not stop all processes, LMM will hang waiting for their termination. While an LMM is hanging the port used for communication with the server remains unreleased, which means that the new experiment cannot be started until LMMs are stopped and all necessary clean-up procedures have been completed.

What Might Go Wrong? When the server is stopped, it sends stop commands to all LMMs Upon receiving the stop signal, LMM: – Stops launching collection sessions – Stops processes Using the commands specified by user in the configuration file – Heartbeat applications are stopped – RMQ is deleted – Network control applications are stopped FIXME: These applications do not always react to the termination signal properly. Symptom: sometimes a number of zombie processes appear