Question

As a network manager, you are responsible for the operation of a network. You notice heavy...

As a network manager, you are responsible for the operation of a network. You notice heavy traffic in a host that is on a TCP/IP network and want to find out the details. Propose a solution by explaining how you apply necessary network monitoring tool(s) and the related results?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Network monitoring is a difficult and demanding task that is a vital part of a Network Administrators job. Network Administrators are constantly striving to maintain smooth operation of their networks. If a network were to be down even for a small period of time productivity within a company would decline, and in the case of public service departments the ability to provide essential services would be compromised. In order to be proactive rather than reactive, administrators need to monitor traffic movement and performance throughout the network and verify that security breeches do not occur within the network.

Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network." -Orebaugh, Angela. Two Monitoring Techniques are discussed in the following sections: Router Based and Non-Router Based. Monitoring functionalities that are built-into the routers themselves and do not require additional installation of hardware or software are referred to as Router Based techniques. Non-Router based techniques require additional hardware and software to be installed and provide greater flexibility. Both techniques are further discussed in the following paragraphs.

Router Based Monitoring Techniques

Router Based Monitoring Techniques are hard-coded into the routers and therefore offer little flexibility. A brief explanation of the most commonly used monitoring techniques is given below. Each technique has undergone years of development to become a standardized model.

Simple Network Monitoring Protocol (SNMP) RFC 1157

SNMP [Cisco5606] is an application layer protocol that is part of the TCP/IP protocol suite. It allows Administrators to manage network performance, find and solve network problems, and plan for network growth. It gathers traffic statistics through passive sensors that are implemented from router to end host. While two versions exist, SNMPv1 and SNMPv2, this section deals with SNMPv1. SNMPv2 builds upon SNMPv1 and offers enhancements, such as additional protocol operations. Standardization of yet another version of SNMP. SNMP Version 3 - (SNMPv3)is pending.

There are 3 key components to SNMP: Managed Devices, Agents, and Network Management Systems (NMSs).

Remote Monitoring (RMON) RFC 1757

RMON [Cisco5506] enables various network monitors and console systems to exchange network-monitoring data. It is an extension of the SNMP Management Information Database (MIB). Unlike SNMP that must send out a request for information, RMON is able to set alarms that will monitor the network based on certain criteria. RMON allows Administrators to manage local networks as well as remote sites from one central location. It monitors at the Network Layer and below. RMON has 2 versions RMON and RMON2 this paper only deals with RMON. RMON2 allows for monitoring of packets on all network layers. It focuses on IP traffic and application level traffic.

While there are 3 key components to the SNMP monitoring environment there are only 2 in the RMON environment.

Netflow RFC 3954

Netflow [Cisco06] is a feature that was introduced on Cisco routers that give the ability to collect IP network traffic as it enters an interface. By analyzing the data that is provided by Netflow a network administrator can determine things such as the source and destination of the traffic, class of service, and the cause of congestion. Netflow consists of three components: flow caching, FlowCollector, and Data Analyzer. Figure 3 shows the Netflow Infrastructure.

The following information can be obtained from Netflow packets: [NetflowAbout06]

  • Source and Destination addresses
  • Input and Output interface numbers
  • Source and Destination port numbers
  • Layer 4 protocol
  • Number of packets in the flow
  • Total Bytes in the flow
  • Time stamp in the flow
  • Source and Destination autonomous system (AS) number
  • TCP_Flag and Type of Service (ToS)

Non-Router Based Techniques

Active Monitoring

Active monitoring [Active06] transmits probes into the network to collect measurements between at least two endpoints in the network. Active measurement systems deal with metrics such as:

  • Availability
  • Routes
  • Packet Delay
  • Packet Reordering
  • Packet Loss
  • Packet Inter-arrival Jitter
  • Bandwidth Measurements (Capacity, Achievable Throughputs)

Commonly used tools such as ping, which measures delay and loss of packets, and traceroute which helps determine topology of the network, are examples of basic active measurement tools. They both send ICMP packets (probes) to a designated host and wait for the host to respond back to the sender. Figure 4 is an example of the ping command that uses active measurements by sending an Echo Request from the source host through the network to a specified destination. The destination then sends an Echo Response back to the source it received the request from.

Not only can a person collect the metrics above from active measurements, one can also determine the network topology. Another common example of an active measurement tool is iperf. Iperf is a tool that measures TCP and UDP bandwidth performance. It reports bandwidth, delay jitter, and loss.

The problem that exists with active monitoring is that introducing probes into the network can be an interference to the normal traffic on the network. [UnivPenn02] Often times the active probes are treated differently than normal traffic as well, which causes the validity of the information provided from these probes to be questioned.

As a result of the information detailed above, active monitoring is very rarely implemented as a stand-alone method of monitoring as a good deal of overhead is introduced. On the other hand passive monitoring does not introduce much if any overhead into the network.

Passive Monitoring

Passive monitoring [Curtis00] unlike active monitoring does not inject traffic into the network or modify the traffic that is already on the network. Also unlike active monitoring, passive monitoring collects information about only one point in the network that is being measured rather than between two endpoints as active monitoring measures. The setup of a passive monitoring system where the monitor is placed on a single link between two endpoints and monitors traffic as it passes along the link.

Passive measurements deal with information such as: Traffic and protocol mixes Accurate bit or packet rates Packet timing and inter-arrival timing

Passive monitoring can be achieved with the assistance of any packet sniffing program.

Although passive monitoring does not have the overhead that active monitoring has, it has its own set of downfalls. [UnivPenn02] With passive monitoring, measurements can only be analyzed off-line and not as they are collected. This creates another problem with processing the huge data sets that are collected.

As one can see passive monitoring my be better than active monitoring in that overhead data is not added into the network but post-processing time can take a large amount of time. This is why a combination of the two monitoring methods seems to be the route to go.

Add a comment
Know the answer?
Add Answer to:
As a network manager, you are responsible for the operation of a network. You notice heavy...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.)...

    Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...

  • Given a class C network address: 210.90.100.0 Your manager has asked you to build 5 subnets...

    Given a class C network address: 210.90.100.0 Your manager has asked you to build 5 subnets from 210.90.100.0. Each of the subnet would serve the four existing departments and the fifth one for the future plan next year. The number of bits to borrow from the host portion of the network: The number of resulting subnets: Present your network in a tabulated format with headers as shown below Subnet ID First address                  Last but one address Broadcast address Assume...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE...

    computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...

  • Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...

    Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of outbound traffic from 1:00am - 4:00am. Your company works a traditional 8:00am - 5:00pm and uses an in house backup solution. What could this be a sign of? Cloud backup Bad login information Aliens Data Exfiltration Which of the following can help protect against an insider threat? Select all that apply DLP Seperation of duties Aliens Job/Position rotation Social media can introduce considerable risk...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • How to solve Exercises 1? Project Goal The project will give you some hands-on experience with...

    How to solve Exercises 1? Project Goal The project will give you some hands-on experience with Nmap. Nmap is a network tool that allows you to scan live hosts and services (open ports), thus, creating a "map" of the network. You will be using Zenmap, a graphical user interface (GUID of Nmap, to investigate several basic types of networl scanning techniques. You can work in teams of two students or alone. Setup: Installing&Using Zenmap Visit nmap.org/download.html to download and install...

  • Problem Statement You are the manager of a workshop. You need to turn 1,500 shafts as...

    Problem Statement You are the manager of a workshop. You need to turn 1,500 shafts as an intermediate step in a larger manufacturing process. It takes your workshop technician 20 min to machine a single shaft at a cutting speed of 15 m/min and 10 min to set up the blank in the spindle. Since you are turning 1,500 shafts, the technician will certainly change the cutting tool to maintain quality - a tool change would require five minutes. The...

  • Imagine that you are the engineering manager for Ellery Manufacturing, Suite 110 - 19433 96th Avenue, Surrey, British C...

    Imagine that you are the engineering manager for Ellery Manufacturing, Suite 110 - 19433 96th Avenue, Surrey, British Columbia, Canada V4N 4C4. http://www.ellerymfg.com Your company has won a very large contract to manufacture parts for a gas pipeline company located in Alberta. In order to meet the deadline set by your client, you need to purchase a new manufacturing machine (a special purpose lathe). You convinced your employer to purchase the new machine from a company in China: Zhengzhou Timeway...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT