Chapter 12 NM Tools and Systems

Slides:



Advertisements
Similar presentations
Network Management Tools. ifConfig (UNIX) Used to assign/read an address to/of an interface Option -a is to display all interfaces Notice two interface.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Precept 3 Host Configuration 1 Peng Sun. What TCP conn. running? Commands netstat [-n] [-p] [-c] (Linux) lsof -i -P (Mac) ss (newer version of netstat)
April 5, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 6. The Transport Layer (Transmission Control Protocol) Paul I-Hai Lin, Professor.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Session 13 NM Tools Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used for Network Management course at.
Chapter 8 Administering TCP/IP.
Chapter 12 NM Tools and Systems 12-1 Chapter 12 Network Management: Principles and Practice © Mani Subramanian 2000.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Protocol (IP): Addressing and Forwarding Shivkumar Kalyanaraman Rensselaer Polytechnic.
NETWORK MANAGEMENT Semester 4, Chapter 7. The Administrative Side of Network Management.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
1 by Behzad Akbari Fall 2011 In the Name of the Most High Network Management Tools and Systems.
Linux Networking Commands
SNMP In Depth. SNMP u Simple Network Management Protocol –The most popular network management protocol –Hosts, firewalls, routers, switches…UPS, power.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Hands-on Networking Fundamentals
Arparp* Displays and modifies the IP-to-Physical address translation tables used by address resolution protocol (ARP) getmacgetmac Shows the mac address(es)
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Exploring the Packet Delivery Process Chapter
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Packets and Protocols Recognizing Attacks with the protocol analyzer.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 10 IP Addressing.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
Examining TCP/IP.
© 2002, Cisco Systems, Inc. All rights reserved..
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
CDPA 網管訓練 駭客任務 2 Ethernet Switching ARP, IP, LAN, Subnet IP Header, Routing ICMP
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010.
TCP/IP History 1970 – ARPANET started using Network Control Protocol
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Tools and Systems.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Applications.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 8 Traceroute Program. 2 8 Introduction - Problem Wich route do my packets follow towards my destination?
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Linux Operations and Administration Chapter Eight Network Communications.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
Semester 2v2 Chapter 8: IP Addressing. Describe how IP addressing is important in routing. IP addresses are specified in 32-bit dotted-decimal format.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
1 DETAILS OF PROTOCOLS The Zoo Protocol - TCP - IP.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
1 7 Ping Program. 2 7 Introduction - Problem How do I know if a host is reachable?
Ping and Traceroute by Aleisa A. Drivere Supervisor Graciela Perera.
Network Tools and Utilities
RMON.
Network Administration CNET-443
NETWORK MANAGEMENT Semester 4, Chapter 7.
Presentation transcript:

Chapter 12 NM Tools and Systems

NM Tools and Systems Network Management Tools Network Statistics Measurement Systems Network Management Systems System Management Enterprise Management Systems

1. Network Management Tools NOC Tools (RFC 1470) ftp://wuarchive.wustl.edu/doc/noctools/

Bit Error Rate Tester Physical layer monitoring tool Important for WAN and Broadband access Generates and detects bits Bit error rate (BER) is calculated by comparing the transmitted pattern with received pattern BER can be measured for a modem or two modems and the link in between

BERT in HFC / LAN Environment

Status Monitoring Tools

ifConfig Used to assign/read an address to/of an interface Option -a is to display all interfaces Notice two interface loop-back (lo0) and Ethernet (hme0) [/home/staff/ycchen]ifconfig -a lo0: flags=849<UP,LOOPBACK,RUNNING,MULTICAST> mtu 8232 inet 127.0.0.1 netmask ff000000 hme0: flags=863<UP,BROADCAST,NOTRAILERS,RUNNING,MULTICAST> mtu 1500 inet 163.22.20.16 netmask ffffff00 broadcast 163.22.20.255 ifconfig le0 down ifconfig le0 163.22.20.16 netmask 255.255.255.0 broadcast 163.22.20.255

Ping Most basic tool for internet management Based on ICMP ECHO_REQUEST message Available on all TCP/IP stacks Useful for measuring connectivity Useful for measuring packet loss Can do auto-discovery of TCP/IP equipped stations on single segment

nslookup An interactive program for querying Internet Domain Name System servers Converts a hostname into an IP address and vice versa querying DNS Useful to identify the subnet a host or node belongs to Lists contents of a domain, displaying DNS record

Traffic Monitoring Tools

Packet Loss Measurement

ping Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] | [-k host-list]] [-w timeout] destination-list Options: -t Ping the specified host until stopped. To see statistics and continue - type Control-Break; To stop - type Control-C. -a Resolve addresses to hostnames. -n count Number of echo requests to send. -l size Send buffer size. -f Set Don't Fragment flag in packet. -i TTL Time To Live. -v TOS Type Of Service. -r count Record route for count hops. -s count Timestamp for count hops. -j host-list Loose source route along host-list. -k host-list Strict source route along host-list. -w timeout Timeout in milliseconds to wait for each reply.

bing Used to determine throughput of a link Uses icmp_echo utility Knowing packet size and delay, calculates bandwidth bing L1 and L2 and the difference yields the bandwidth of link L1-L2 Bandwidth of link L1-L2 could be higher than the intermediate links. http://www.freenix.fr/freenix/logiciels/bing.html

snoop Puts a network interface in promiscuous mode Logs data on Protocol type Length Source address Destination address Reading of user data limited to superuser

Network Routing Tools

netstat C:\>netstat -n -a Active Connections Proto Local Address Foreign Address State TCP 0.0.0.0:21 0.0.0.0:0 LISTENING TCP 0.0.0.0:135 0.0.0.0:0 LISTENING TCP 0.0.0.0:445 0.0.0.0:0 LISTENING TCP 0.0.0.0:1234 0.0.0.0:0 LISTENING TCP 0.0.0.0:1235 0.0.0.0:0 LISTENING TCP 0.0.0.0:1236 0.0.0.0:0 LISTENING TCP 163.31.153.68:1234 163.22.3.4:80 ESTABLISHED TCP 163.31.153.68:1235 163.22.4.67:80 ESTABLISHED TCP 163.31.153.68:1236 163.22.4.67:80 SYN_SENT UDP 0.0.0.0:135 *:* UDP 0.0.0.0:445 *:* UDP 0.0.0.0:38037 *:* UDP 127.0.0.1:1230 *:* UDP 163.31.153.68:500 *:*

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval] -a Displays all connections and listening ports. -e Displays Ethernet statistics. This may be combined with the -s option. -n Displays addresses and port numbers in numerical form. -p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP. -r Displays the routing table. -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default. interval Redisplays selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If omitted, netstat will print the current configuration information once.

traceroute/tracert tracert www.hinet.net Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name Options: -d Do not resolve addresses to hostnames. -h maximum_hops Maximum number of hops to search for target. -j host-list Loose source route along host-list. -w timeout Wait timeout milliseconds for each reply.

Trace Route http://www.visualroute.com/

Network Management Tools SNMP command tools MIB Walk MIB Browser snmpsniff

SNMP Command Tools snmptest snmpget snmpgetnext snmpset snmptrap snmpwalk snmpnetstat

Network Status Command: snmpnetstat host community Useful for finding status of network connections % snmpnetstat noc5 public Active Internet Connections Proto Recv-Q Send-Q Local Address Foreign Address (state) tcp 0 0 *.* *.* CLOSED tcp 0 0 localhost.46626 localhost.3456 ESTABLISHED tcp 0 0 localhost.46626 localhost.3712 ESTABLISHED tcp 0 0 localhost.46626 localhost.3968 ESTABLISHED tcp 0 0 localhost.46626 localhost.4224 ESTABLISHED tcp 0 0 localhost.3456 localhost.46626 ESTABLISHED tcp 0 0 localhost.3712 localhost.46626 ESTABLISHED tcp 0 0 localhost.3968 localhost.46626 ESTABLISHED tcp 0 0 localhost.4224 localhost.46626 ESTABLISHED tcp 0 0 noc5.41472 noc5.4480 ESTABLISHED tcp 0 0 noc5.41472 noc5.4736 ESTABLISHED tcp 0 0 noc5.4480 noc5.41472 ESTABLISHED tcp 0 0 noc5.4736 noc5.41472 ESTABLISHED

SNMP Browser Command: snmpwalk host community [variable name] Uses Get Next Command Presents MIB Tree

SNMP Sniff snmpsniff -I interface A tool in Linux / FreeBSD environment Puts the interface in promiscuous mode and captures snmp PDUs. Similar to tcpdump

Protocol Analyzer Analyzes data packets on any transmission line including LAN Measurements made locally or remotely Probe (data capture device) captures data and transfers to the protocol analyzer (no storage) Data link between probe and protocol analyzer either dial-up or dedicated link or LAN Protocol analyzer analyzes data at all protocol levels

RMON Probe Communication between probe and analyzer is using SNMP Data gathered and stored for an extended period of time and analyzed later Used for gathering traffic statistics and used for configuration management for performance tuning

Network Monitoring with RMON Probe

Network Statistics Protocol Analyzers RMON Probe / Protocol analyzer MRTG (Multi router traffic grouper) Home-grown program using tcpdump

Traffic Load: Source

Traffic Load: Source/Destination

Protocol Distribution

Enterprise Management Management of data transport IBM Netview, Sun Solstice, HP OpenView, Cabletron Spectrum Systems management CA Unicenter and Tivoli TME Network and systems management Partnerships Telecommunications management TMN, Operations systems Service management and policy management

NMS Components

NMS Components

Multi-NMS Configuration

Network Configuration Configure agents Configure management systems Community administration parameters Community name MIB view Trap targets Auto-discovery : Scope

Network Monitoring By polling By traps (notifications) Failure indicated by pinging or traps Ping frequency optimized for network load vs. quickness of detection trap messages: linkdown, linkUp, coldStart, warmStart, etc. Network topology discovered by auto-discovery

Global View

Domain View

Segment View

Node Discovery In a Network Given an IP Address with its subnet mask, find the nodes in the same network. Two Major Approaches: Use ICMP ECHO to query all the possible IP addresses. Use SNMP to query the ARP Cache of a node known

Use ICMP ECHO Eg: IP address: 163.25.147.12 Subnet mask: 255.255.255.0 All possible addresses: 163.25.147.1 ~ 163.25.147.254 For each of the above addresses, use ICMP ECHO to inquire the address If a node replies (ICMP ECHO Reply), then it is found.

Use SNMP Find a node which supports SNMP The given node, default gateway, or router Or try a node arbitrarily Query the ipNetToMediaTable in MIB-II IP group ipNetToMediaPhysAddress ipNetToMediaType ipNetToMediaIfIndex ipNetToMediaNetAddress 1 00:80:43:5F:12:9A 163.25.147.10 dynamic(3) 2 00:80:51:F3:11:DE 163.25.147.11 dynamic(3)

Network Discovery Network Discovery Find the networks to be managed with their interconnections Given a network, find the networks which directly connect with it. Recall that networks are connected via routers. Major Approach Use SNMP

Discovering Networks 163.25.145.0 163.25.146.0 140.112.8.0 140.112.6.0 163.25.148.0 163.25.147.0 140.112.5.0 192.168.12.0 192.168.13.0

A Network Discovery Algorithm 1. First use a node discovery algorithm to find all the nodes in the network. 2. For each discovered node, use SNMP to query the ipAddrTable of MIB-II IP group 3. Query the corresponding entries in ipRouteTable to verify the above addresses ipAdEntNetMask 163.25.145.254 1 255.255.255.0 163.25.145.255 … 162.25.146.254 2 255.255.255.0 163.25.146.255 … 162.25.147.254 3 255.255.255.0 163.25.147.255 … ipAdEntAddr ipAdEntIfIndex ipAdEntBcastAddr

ipRouteTable

Commercial NMS & System Solutions Enterprise NMS Hewlett-Packard OpenView Sun SunNet Manager IBM Netview Cabletron Spectrum Enterprise Manager Low End NMS SNMPc System & Network Management Computer Associates Unicenter TNG Tivoli TME / Netview Big Brother Spong

HP OpenView Network Node Manager Auto-discovery and mapping Drill-down views Fault monitoring Event monitoring MIB Browser SNMP tools Traffic monitoring 3rd party integration

HP OpenView Platform Open, modular, and distributed architecture Object oriented design; TNM can be implemented Open API-based architecture Easy vendor-specific NMS integration by 3rd party

OpenView Distributed Platform

Distributed OpenView NNMs MoM