Free Essay

New Job Rmon Research

In: Computers and Technology

Submitted By jpishkar
Words 1242
Pages 5
New Job RMON Research Nearly every business depends on smooth-running communications networks. So the need for professionals that know how to design, implement, secure, and manage them is everywhere. After doing Network and Communications Management Degree Program. With new positions opening up and older NCM workers retiring, networking promises to be a growing career field in North America for years to come. After reading this report we will get that the features of it and how it will benefits to our organization to fulfill the corporate network solutions. Now I am going to tell you what are RMON and RMON probes and how they are utilized in enterprise network management systems and how they would benefit the company: RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site. It's specified as part of the Management Information Base (MIB) in Request for Comments 1757 as an extension of the Simple Network Management Protocol (SNMP). RMON can be supported by hardware monitoring devices (known as "probes") or through software or some combination. For example, Cisco's line of LAN switches includes software in each switch that can trap information as traffic flows through and record it in its MIB. RMON collects nine types of information, including packets sent, bytes sent, packets dropped, statistics by host, by conversations between two sets of addresses, and certain kinds of events that have occurred. A network administrator can find out how much bandwidth or traffic each user is imposing on the network and what Web sites are being accessed. Alarms can be set in order to be aware of impending problems. Software, on managed devices, that collects and stores management information, including SNMP agents and RMON agents. RMON is an extension of the MIB. The MIB typically provides only static information about the managed device; the RMON agent collects specific groups of statistics for long-term trend analysis. RMON agents can reside in routers, switches, hubs, servers, hosts, or dedicated RMON probes. Because RMON can collect a lot of data, dedicated RMON probes are often used on routers and switches instead of enabling RMON agents on these devices. Performance thresholds can be set and reported on if the threshold is breached; this helps reduce management traffic. RMON provides effective network fault diagnosis, performance tuning, and planning for network upgrades. RMON1 works on the data link layer (with MAC addresses) and provides aggregate LAN traffic statistics and analysis for remote LAN segments. Because RMON agents must look at every frame on the network, they might cause performance problems on a managed device. The agent's performance can be classified based on processing power and memory. The RMON MIB is 1.3.6.1.2.1.16. RMON agents gather nine groups of statistics, ten including Token Ring, which are forwarded to a manager on request, usually via SNMP. As summarized in Figure, RMON1 agents can implement some or all of the following groups: Statistics: Contains statistics such as packets sent, bytes sent, broadcast packets, multicast packets, CRC errors, runts, giants, fragments, jabbers, collisions, and so forth, for each monitored interface on the device. History: Used to store periodic statistical samples for later retrieval. Alarm: Used to set specific thresholds for managed objects and to trigger an event on crossing the threshold (this requires an Events group). Host: Contains statistics associated with each host discovered on the network. Host Top N: Contains statistics for hosts that top a list ordered by one of their observed variables. Matrix: Contains statistics for conversations between sets of two addresses, including the number of packets or bytes exchanged between two hosts. Filters: Contains rules for data packet filters; data packets matched by these rules generate events or are stored locally in a Packet Capture group. Packet Capture: Contains data packets that match rules set in the Filters group. Events: Controls the generation and notification of events from this device. Token Ring: Contains the following Token Ring Extensions: Ring Station: Detailed statistics on individual stations. Ring Station Order: Ordered list of stations currently on the ring. Ring Station Configuration: Configuration information and insertion/removal data on each station. Source Routing: Statistics on source routing, such as hop counts RMON1 only provides visibility into the data link and the physical layers; potential problems that occur at the higher layers still require other capture and decode tools. Because of RMON1's limitations, RMON2 was developed to extend functionality to upper-layer protocols. RMON2 provides full network visibility from the network layer through to the application layer. RMON2 is not a replacement for RMON1, but an extension of it. RMON2 extends RMON1 by adding nine more groups that provide visibility to the upper layers. With visibility into the upper-layer protocols, the network manager can monitor any upper-layer protocol traffic for any device or subnet in addition to the MAC layer traffic. RMON2 allows the collection of statistics beyond a specific segment's MAC layer and provides an end-to-end view of network conversations per protocol. The network manager can view conversations at the network and application layers. Therefore, traffic generated by a specific host or even a specific application (for example, a Telnet client or a web browser) on that host can be observed. RMON groups that were added when RMON2 was introduced. They include the following: Protocol Directory: Provides the list of protocols that the device supports. Protocol Distribution: Contains traffic statistics for each supported protocol. Address Mapping: Contains network layer-to-MAC layer address mappings. Network Layer Host: Contains statistics for the network layer traffic to or from each host. Network Layer Matrix: Contains network layer traffic statistics for conversations between pairs of hosts. Application Layer Host: Contains statistics for the application layer traffic to or from each host. Application Layer Matrix: Contains application layer traffic statistics for conversations between pairs of hosts. User History Collection: Contains periodic samples of user-specified variables. Probe Configuration: Provides a standard way of remotely configuring probe parameters, such as trap destination and out-of-band management. In short, RMON is designed for "flow-based" monitoring, while SNMP is often used for "device-based" management. RMON is similar to other flow-based monitoring technologies such as NetFlow and SFlow because the data collected deals mainly with traffic patterns rather than the status of individual devices. RMON enhances the management and control capabilities of Simple Network Management Protocol-compliant network management systems and LAN analyzers. Remote Monitoring equipped probes can view every packet and produce summary information on various types of packets, such as undersized packets, and events, such as packet collisions. The probes may also store information for further analysis by capturing packets according to predefined criteria set by the network manager or test technician. RMON is typically offered as an optional expansion package to vendors' Simple Network Management Protocol-compliant network management systems, facilitating the gathering of information from network devices, which can be used for fault diagnosis, performance tuning, and network planning One disadvantage of this system is that remote devices shoulder more of the management burden, and require more resources to do so. Some devices balance this trade-off by implementing only a subset of the RMON MIB groups (see below). A minimal RMON agent implementation could support only statistics, history, alarm, and event.

Similar Documents

Free Essay

Capstone

...with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design …………………………………………………………………………………………………………………………… 12 LAN Design ……………………………………………………………………………………………………………………………. 26 Structured Cabling …………………………………………………………………………………………………………………. 28 Hardware...

Words: 18593 - Pages: 75

Premium Essay

Sql Quiz

...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...

Words: 217433 - Pages: 870

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Top Down Cisco

...Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco...

Words: 79785 - Pages: 320

Free Essay

Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187

Premium Essay

Work, Culture and Identity in Mozambique and Southafrica 1860-1910

...Acknowledgments ix Acknowledgments This book owes a great deal to the mental energy of several generations of scholars. As an undergraduate at the University of Cape Town, Francis Wilson made me aware of the importance of migrant labour and Robin Hallett inspired me, and a generation of students, to study the African past. At the School of Oriental and African Studies in London I was fortunate enough to have David Birmingham as a thesis supervisor. I hope that some of his knowledge and understanding of Lusophone Africa has found its way into this book. I owe an equal debt to Shula Marks who, over the years, has provided me with criticism and inspiration. In the United States I learnt a great deal from ]eanne Penvenne, Marcia Wright and, especially, Leroy Vail. In Switzerland I benefitted from the friendship and assistance of Laurent Monier of the IUED in Geneva, Francois Iecquier of the University of Lausanne and Mariette Ouwerhand of the dépurtement évangélrlyue (the former Swiss Mission). In South Africa, Patricia Davison of the South African Museum introduced me to material culture and made me aware of the richness of difference; the late Monica Wilson taught me the fundamentals of anthropology and Andrew Spiegel and Robert Thornton struggled to keep me abreast of changes in the discipline; Sue Newton-King and Nigel Penn brought shafts of light from the eighteenthcentury to bear on early industrialism. Charles van Onselen laid a major part of the intellectual foundations on...

Words: 178350 - Pages: 714