-
Reference Models
What belongs together and its an abstract thought process.
-
Fault
- Fault management is concerned with monitoring the network to ensure that everything is running smoothly and reacting when this is not the case.
- A large amout of time
-
Management of alarms
is the most important aspect of network monitoring.
- know if switch goes down not all pc
- Send alarms to a pager or send text message
-
Filtering
- Event –By device or by severity level or both
- duplicate alarms- maintain history
-
Proactive Fault Management
recognizes patterns of alarms caused by minor faults that point to impending bigger problems
-
Trouble Tickets
helps track problems
-
Configuration
Perform operations that will deliver and modify configuration settings to equipment in the network
-
Configuration Management Functions
Configuring managed resources, whether they are network equipment or services running over the network
-
Auditing
Retrieving information from a device already known to exist
-
Discovery
Using software to see what is in the network
-
Synchronization
- The network itself
- Management system’s view of the network
- Views should be the same
-
Backup and Restore
your user data is the configuration data of your network
-
Image Management
- New feature releases or patches
- (bug fixes)
- You need to be able to keep track of which software images are installed
-
Accounting
Collect usage data is based on volume, duration, and/or quality
-
Fraud detection
with tracking down and preventing theft of communication services
-
Performance
Throughput, measured by a number of units of communication performed per unit of time.
-
Quality Measurement
- At the application layer for a web service, the number or
- percentage of web requests that could not be serviced. Will be low
-
Security of management
- Set up proper processes and procedures to ensure orderly operations
- Intrusion detection and prevention
-
Operations
the day-to-day running of the network
-
Administration
- required to manage the network and that do not involve performing changes (configuring, tuning) to the
- running network itself.
-
Maintenance
the network andcommunication services operate as they are supposed to. This involves diagnosing, troubleshooting, and repairing
-
Provisioning
proper setting of configuration parameters on the network so that the network functions as expected
-
Telecoms Operations Map (TOM)
- has the concept of a management lifecycle at its center
- lifecycle stages
- –Fulfillment—Assurance—Billing
- (FAB).
-
Fulfillment
a service order that was received from a customer is carried out properly
-
Assurance
all activities required to ensure that a service runs smoothly after it has been fulfilled.
-
Billing
sure that the services provided and resources consumed are accounted for properly and can be billed to the user.
-
WAN issues
- Congestion
- TCP/IP protocol weakness
-
Bandwidth upgrades increase costs but fail to
permanently increase performance.
-
Compress Everything Issues
- Can enhance the wrong applications
- Can actually reduce throughput
-
Router Queuing Weaknesses
- Cannot detect congestion until after it has occurred
- Bydefinition, packets wait in line, which can result in retransmissions
-
Acceleration
- Appropriate compression
- Best algorithm is different for different types of traffic
-
TCP treats all traffic equally
- Best effort
- Packet retransmission can contribute to WAN congestion
- UDP doesn’t manage an End-to-End connection
-
Compression
- 4:1 compression ratio for
- some measurable amount of traffic
-
Traffic Policing
- Traffic policing propagates bursts.
- Throw away slower traffic first
-
Traffic Shaping
retains excess packets in a queue and then schedules the excess for later transmission over increments of time
-
Packeteer
a packet/traffic shaper
-
Critical Partition Setup
- Partition size = 250kbps; burstable;
- limit=none
-
Test Environment
- Off-line configuration
- (sometimes called a sandbox)
-
Window size
Theoretical value for TCP window size is the bandwidth delay product
-
Traffic Generators
- Nearly all traffic generators follow a client/server model
- client generates data
- D-ITG (Distributed Internet Traffic Generator)
-
Iperf
Can be used to determine UDP characteristics
-
D-ITG
Distributed Internet Traffic Generator
- A More Sophisticated Traffic Generator
- Available for Windows and Linux
- Can generate traffic having different shapes
- and different packet size options
|
|