IBM Tivoli Agentless Monitoring for HP-UX Operating Systems User's Guide Tables

Total Page:16

File Type:pdf, Size:1020Kb

IBM Tivoli Agentless Monitoring for HP-UX Operating Systems User's Guide Tables IBM Tivoli Agentless Monitoring for HP-UX Operating Systems Version 6.2.1 (Revised) User's Guide SC23-9763-01 IBM Tivoli Agentless Monitoring for HP-UX Operating Systems Version 6.2.1 (Revised) User's Guide SC23-9763-01 Note Before using this information and the product it supports, read the information in “Notices” on page 115. This edition applies to version 6.2.1 of IBM Tivoli Agentless Monitoring for HP-UX Operating Systems (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2008, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables ...............v Managed Systems Navigator item ......63 SNMP HP-UX Systems subnode ......63 Chapter 1. Overview of the agent ....1 IBM Tivoli Monitoring ...........1 Chapter 6. Take Action commands Functions of the monitoring agent .......1 reference..............67 New in this release ............1 Predefined Take Action commands ......67 Components of the IBM Tivoli Monitoring environment ..............1 Chapter 7. Policies reference .....69 Agent Management Services .........2 Predefined policies ............69 User interface options ...........3 Chapter 8. Troubleshooting ......71 Chapter 2. Requirements and agent Trace logging ..............72 installation and configuration .....5 Overview of log file management ......72 Requirements for the monitoring agent .....5 Principal trace log files .........73 Agent-specific installation and configuration....6 Examples: Using trace logs ........76 Configuration values ..........6 RAS trace parameters ..........77 Remote installation and configuration .....9 Dynamic modification of trace settings ....79 Setting trace parameters for the Tivoli Enterprise Chapter 3. Workspaces reference . 11 Console server ............82 Predefined workspaces ..........12 Problems and workarounds .........82 Workspace descriptions ..........12 Installation and configuration troubleshooting . 82 Agentless HP-UX OS Navigator item .....12 Remote deployment troubleshooting .....87 Managed Systems Navigator item ......13 Agent troubleshooting ..........87 SNMP HP-UX Systems subnode ......13 Workspace troubleshooting ........90 Situation troubleshooting .........94 Chapter 4. Attributes reference ....15 Take Action commands troubleshooting ....97 Support information ...........97 Attribute groups for the monitoring agent ....15 Informational, warning, and error messages Attributes in each attribute group .......16 overview ...............98 Disk attribute group ..........16 Message format ............98 HP Performance Object Status attribute group . 20 Agent messages ............99 Managed Systems attribute group ......25 Memory attribute group .........26 Network attribute group .........33 Appendix A. Event mapping .....103 Performance Object Status attribute group . 43 Processes attribute group .........48 Appendix B. Documentation library 111 Processor attribute group .........50 Prerequisite publications..........111 System attribute group .........52 Related publications ...........112 Thread Pool Status attribute group .....55 Other sources of documentation .......112 Disk capacity planning for historical data ....58 Notices ..............115 Chapter 5. Situations reference ....61 Trademarks ..............117 Predefined situations ...........61 Situation descriptions ...........62 Index ...............119 Agentless HP-UX OS Navigator item .....63 © Copyright IBM Corp. 2008, 2013 iii iv IBM Tivoli Agentless Monitoring for HP-UX Operating Systems User's Guide Tables 1. Capacity planning for historical data logged by 6. Remote deployment problems and solutions 87 the Agentless Monitor for HP-UX .....59 7. Agent problems and solutions ......88 2. Information to gather before contacting IBM 8. Workspace problems and solutions.....91 Software Support ..........71 9. Situation problems and solutions .....94 3. Trace log files for troubleshooting agents 73 10. Take Action commands problems and 4. Problems and solutions for installation and solutions .............97 configuration ............83 5. General problems and solutions for uninstallation ............85 © Copyright IBM Corp. 2008, 2013 v vi IBM Tivoli Agentless Monitoring for HP-UX Operating Systems User's Guide Chapter 1. Overview of the agent The IBM Tivoli Agentless Monitoring for HP-UX Operating Systems provides you with the capability to monitor HP-UX Operating Systems. IBM® Tivoli® Monitoring is the base software for the Agentless Monitor for HP-UX. The Agentless Monitor for HP-UX can identify and notify you of common problems with the application that it monitors. IBM Tivoli Monitoring IBM Tivoli Monitoring provides a way to monitor the availability and performance of all the systems in your enterprise from one or several designated workstations. It also provides useful historical data that you can use to track trends and to troubleshoot system problems. You can use IBM Tivoli Monitoring to achieve the following tasks: v Monitor for alerts on the systems that you are managing by using predefined situations or custom situations. v Establish your own performance thresholds. v Trace the causes leading to an alert. v Gather comprehensive data about system conditions. v Use policies to take actions, schedule work, and automate manual tasks. The Tivoli Enterprise Portal is the interface for IBM Tivoli Monitoring products. You can use the consolidated view of your environment as seen in the Tivoli Enterprise Portal to monitor and resolve performance issues throughout the enterprise. See the IBM Tivoli Monitoring publications listed in “Prerequisite publications” on page 111 for complete information about IBM Tivoli Monitoring and the Tivoli Enterprise Portal. Functions of the monitoring agent The Agentless Monitor for HP-UX provides the following functions: Agentless Monitoring for HP-UX Operating Systems using SNMP New in this release For this revised version 6.2.1 of the Agentless Monitor for HP-UX documentation, the following changes have been made to the documentation since the original version 6.2.1. v Support for the self-describing agent capability has been noted. For more information, see “Requirements for the monitoring agent” on page 5 Components of the IBM Tivoli Monitoring environment After you install and set up the Agentless Monitor for HP-UX, you have an environment that contains the client, server, and monitoring agent implementation for Tivoli Monitoring. This Tivoli Monitoring environment contains the following components: Tivoli Enterprise Portal client The portal has a user interface based on Java™ for viewing and monitoring your enterprise. © Copyright IBM Corp. 2008, 2013 1 Tivoli Enterprise Portal Server The portal server is placed between the client and the Tivoli Enterprise Monitoring Server and enables retrieval, manipulation, and analysis of data from the monitoring agents. The Tivoli Enterprise Portal Server is the central repository for all user data. Tivoli Enterprise Monitoring Server The monitoring server acts as a collection and control point for alerts received from the monitoring agents, and collects their performance and availability data. The Tivoli Enterprise Monitoring Server is also a repository for historical data. Tivoli Enterprise Monitoring Agent, Agentless Monitor for HP-UX This monitoring agent collects data and distributes the data to the Tivoli Enterprise Monitoring Server, Tivoli Enterprise Portal Server, Tivoli Enterprise Portal, Tivoli Data Warehouse, and Tivoli Integrated Portal. This agent can run on a separate system from the system where the HP-UX Operating Systems is running. Multiple copies of this agent can run on the same system. IBM Tivoli Netcool/OMNIbus Tivoli Netcool/OMNIbus is an optional component and the recommended event management component. The Netcool/OMNIbus software is a service level management (SLM) system that delivers real-time, centralized monitoring of complex networks and IT domain events. Event information is tracked in a high-performance, in-memory database and presented to specific users through individually configurable filters and views. The software includes automation functions that you can use to perform intelligent processing on managed events. You can use this software to forward events for Tivoli Monitoring situations to Tivoli Netcool/OMNIbus. IBM Tivoli Enterprise Console® The Tivoli Enterprise Console is an optional component that acts as a central collection point for events from various sources, including events from other Tivoli software applications, Tivoli partner applications, custom applications, network management platforms, and relational database systems. You can view these events through the Tivoli Enterprise Portal (by using the event viewer), and you can forward events from Tivoli Monitoring situations to the Tivoli Enterprise Console component. If you do not already use Tivoli Enterprise Console and need an event management component, you can choose to use IBM Tivoli Netcool/OMNIbus. IBM Tivoli Business Service Manager The Tivoli Business Service Manager component delivers real-time information to help you respond to alerts effectively based on business requirements. Optionally, you can use this component to meet service-level agreements (SLAs). Use the Tivoli Business Service Manager tools to help build a service model that you can integrate with Tivoli Netcool/OMNIbus alerts or optionally integrate with data from
Recommended publications
  • 1) What Is the Name of an Ethernet Cable That Contains Two
    1) What is the name of an Ethernet cable that contains two electrical conductors ? A coaxial cable 2) What are the names of the two common conditions that degrade the signals on c opper-based cables? Crosstal and attenuation 3) Which topology requires the use of terminators? Bus 4) Which of the following topologies is implemented only logically, not physical ly? Ring 5) How many wire pairs are actually used on a typical UTP Ethernet network? Two 6) What is the name of the process of building a frame around network layer info rmation? Data encapsulation 7) Which of the connectors on a network interface adapter transmits data in para llel? The System bus connector 8) Which two of the following hardware resources do network interface adapters a lways require? I/O port address and IRQ 9) What is the name of the process by which a network interface adapter determin es when it should transmit its data over the network? Media Access Control 10) Which bus type is preferred for a NIC that will be connected to a Fast Ether net network? PCI 11) A passive hub does not do which of the following? Transmit management information using SNMP 12) To connect two Ethernet hubs together, you must do which of the following? Connect the uplink port in one hub to a standard port on the other 13) Which term describes a port in a Token Ring MAU that is not part of the ring ? Intelligent 14) A hub that functions as a repeater inhibits the effect of____________? Attenuation 15) You can use which of the following to connect two Ethernet computers togethe r using UTP
    [Show full text]
  • INTRODUCTION Client
    1 INTRODUCTION Client Server Network Fig. 1-1. A network with two clients and one server. Client machine Server machine Request Network Reply Client process Server process Fig. 1-2. The client-server model involves requests and replies. Fig. 1-3. In a peer-to-peer system there are no fixed clients and servers. 2222222222222222222222222222222222222222222222222222222222222222222222222222222 21 222222222222222222222222222222222222222222222222222222222222222222222222222222Tag1 Full name1 Example 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222B2C1 Business-to-consumer1 Ordering books on-line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222B2B1 Business-to-business1 Car manufacturer ordering tires from supplier 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222G2C1 Government-to-consumer1 Government distributing tax forms electronically 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222C2C1 Consumer-to-consumer1 Auctioning second-hand products on line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222P2P1 Peer-to-peer1 File sharing 1 Fig. 1-4. Some forms of e-commerce. 22222222222222222222222222222222222222222222222222222222222222 222222222222222222222222222222222222222222222222222222222222221 Wireless1 Mobile1 Applications 1 1 1 1 1 122222222222222222222222222222222222222222222222222222222222222No1 No1 Desktop computers in offices 1 222222222222222222222222222222222222222222222222222222222222221
    [Show full text]
  • Instituto Politécnico Nacional Escuela Superior De Ingeniería Mecánica Y Eléctrica Ingeniería En Comunicaciones Y Electrónica
    INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELECTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA Diseño de una RED FAST ETHERNET (IEEE 802.3) en el laboratorio 7 de la Academia de Computación de Ingeniería en Comunicaciones y Electrónica de la Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Zacatenco del IPN. TESIS QUE PARA OBTENER EL TITULO DE: INGENIERO EN COMUNICACIONES Y ELECTRONICA PRESENTAN: OSCAR ARTURO GARCIA PÉREZ AL AN NERI N AR ANJO SÁNCHEZ GLORIA RIVERA OJEDA ASESOR: M. EN C. GENARO ZAVALA MEJÍA MEXICO, D.F. 2008 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA MEXICO, D.F. 2008 1 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA INSTITUTO POLITECNICO NACIONAL ESCUELA SUPERIOR DE INGENIERIA MECANICA Y ELECTRICA INGENIERIA EN COMUNICACIONES Y ELECTRONICA TESIS COLECTIVA CON OPCIÓN A TITULACION TEMA: Diseño de una RED FAST ETHERNET (IEEE 802.3) en el laboratorio 7 de la Academia de Computación de Ingeniería en Comunicaciones y Electrónica de la Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Zacatenco del IPN. ASESORES: M. EN. C. GENARO ZAVALA MEJÍA INTEGRANTES: OSCAR ARTURO GARCIA PÉREZ. ALAN NERI NARANJO SÁNCHEZ. GLORIA RIVERA OJEDA. MEXICO, D.F. 2008 2 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA AGRADECIMIENTOS En testimonio de gratitud limitada para su apoyo, aliento y estímulo mismos que posibilitaron la conquista de esta meta, y sabiendo también que no existirá una forma de agradecer una vida de sacrificio y esfuerzo, quiero que sientan que el objetivo logrado también es de ustedes y que la fuerza que me ayudo a conseguirlo fue su apoyo.
    [Show full text]
  • Network Reliability and Fault Tolerance
    Network Reliability and Fault Tolerance Muriel Medard´ [email protected] Laboratory for Information and Decision Systems Room 35-212 Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139 Steven S. Lumetta [email protected] Coordinated Science Laboratory University of Illinois Urbana-Champaign 1308 W. Main Street, Urbana, IL 61801 1 Introduction The majority of communications applications, from cellular telephone conversations to credit card transactions, assume the availability of a reliable network. At this level, data are expected to tra- verse the network and to arrive intact at their destination. The physical systems that compose a network, on the other hand, are subjected to a wide range of problems, ranging from signal distor- tion to component failures. Similarly, the software that supports the high-level semantic interface 1 often contains unknown bugs and other latent reliability problems. Redundancy underlies all ap- proaches to fault tolerance. Definitive definitions for all concepts and terms related to reliability, and, more broadly, dependability, can be found in [AAC+92]. Designing any system to tolerate faults first requires the selection of a fault model, a set of possible failure scenarios along with an understanding of the frequency, duration, and impact of each scenario. A simple fault model merely lists the set of faults to be considered; inclusion in the set is decided based on a combination of expected frequency, impact on the system, and feasibility or cost of providing protection. Most reliable network designs address the failure of any single component, and some designs tolerate multiple failures. In contrast, few attempt to handle the adversarial conditions that might occur in a terrorist attack, and cataclysmic events are almost never addressed at any scale larger than a city.
    [Show full text]
  • Introducing the Econet® Acorn Computer Local Area Network Introducing the Econet® Acorn Computer Local Area Network
    ito4 4 • -a IMO Introducing the Econet® Acorn Computer local area network Introducing the Econet® Acorn Computer local area network Introducing the Acorn Econet contains the Network Filing System (NFS) and the low level primitives that are used for network Now there is a simple and cost-effective way to communications. Thus the user has a number of link up a series of microcomputers. It is the Econet commands available via the computer keyboard to system, created by Acorn Computers - the team control the storage of his file on the file server and who designed the BBC Microcomputer. the use of the printer server. It is these routines The Econet network system, which is only a fraction which constitute the NFS. of the cost of comparable networks, allows up to 254 As the file server is not necessary for the control of computers to communicate with each other and to Econet transfers it is possible to run a network share expensive resources such as printer or disc without a file or printer server. In this case most of drives. the keyboard level commands will not be available An Econet system consists of a number of units to the user. Network communication would then which are described in this leaflet. To set up a rely on calls to the network primitives from the user network system you will normally need the routines. The network primitives are available via a following items. number of operating system calls and may be Econet work stations called either from Basic or from user machine code Usually BBC computers fitted with Econet routines.
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]
  • The Role of Emerging Broadband Technologies on the Converged
    The Role of Emerging Broadband Technologies on the Converged Packet-Based Network Introduction The vision of network convergence toward a consolidated packet-based network has been discussed for years, though it is still not a reality. Currently, there are numerous overlay networks such as IP, ATM, FR, Ethernet, SONET, DWDM and wireless for different services. The evolution pace toward convergence has been slow due to economic, technical and regulatory issues. However, the fact is that data traffic volume is now surpassing voice traffic volume. Traditional TDM voice traffic is moving to IP packets and TDM private line is moving to Ethernet private line. The wave of broadband applications such as Internet access, VOD, and IPTV create high bandwidth requirements for the network. These applications are packet-based, but have a much lower margin of profit for the service providers when compared to traditional voice service. Today’s overlay and traditional circuit-based infrastructure will become less optimal for the new packet-based services as the profit margin decreases. Most of the wireless networks in North America today are still circuit-based because most of the current wireless service is still voice-based. However, with emerging wireless access technologies such as WiMAX and Wi-Fi, more broadband wireless data and video services can be deployed. As a result, the wireless core network evolves toward a packet-based network. Service offerings drive network evolution. As more packet-based broadband services are launched and bundled together in service offerings, service providers start to add more packet-aware features into their current network components.
    [Show full text]
  • Modern Ethernet
    Color profile: Generic CMYK printer profile Composite Default screen All-In-One / Network+ Certification All-in-One Exam Guide / Meyers / 225345-2 / Chapter 6 CHAPTER Modern Ethernet 6 The Network+ Certification exam expects you to know how to • 1.2 Specify the main features of 802.2 (Logical Link Control) [and] 802.3 (Ethernet): speed, access method, topology, media • 1.3 Specify the characteristics (for example: speed, length, topology, and cable type) of the following cable standards: 10BaseT and 10BaseFL; 100BaseTX and 100BaseFX; 1000BaseTX, 1000BaseCX, 1000BaseSX, and 1000BaseLX; 10GBaseSR, 10GBaseLR, and 10GBaseER • 1.4 Recognize the following media connectors and describe their uses: RJ-11, RJ-45, F-type, ST,SC, IEEE 1394, LC, MTRJ • 1.6 Identify the purposes, features, and functions of the following network components: hubs, switches • 2.3 Identify the OSI layers at which the following network components operate: hubs, switches To achieve these goals, you must be able to • Define the characteristics, cabling, and connectors used in 10BaseT and 10BaseFL • Explain how to connect multiple Ethernet segments • Define the characteristics, cabling, and connectors used with 100Base and Gigabit Ethernet Historical/Conceptual The first generation of Ethernet network technologies enjoyed substantial adoption in the networking world, but their bus topology continued to be their Achilles’ heel—a sin- gle break anywhere on the bus completely shut down an entire network. In the mid- 1980s, IBM unveiled a competing network technology called Token Ring. You’ll get the complete discussion of Token Ring in the next chapter, but it’s enough for now to say that Token Ring used a physical star topology.
    [Show full text]
  • Congestion Control in Resilient Packet Ring Networks
    New Jersey Institute of Technology Digital Commons @ NJIT Dissertations Electronic Theses and Dissertations Fall 1-31-2005 Congestion control in resilient packet ring networks Alharbi Fahd New Jersey Institute of Technology Follow this and additional works at: https://digitalcommons.njit.edu/dissertations Part of the Electrical and Electronics Commons Recommended Citation Fahd, Alharbi, "Congestion control in resilient packet ring networks" (2005). Dissertations. 670. https://digitalcommons.njit.edu/dissertations/670 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at Digital Commons @ NJIT. It has been accepted for inclusion in Dissertations by an authorized administrator of Digital Commons @ NJIT. For more information, please contact [email protected]. Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment
    [Show full text]
  • Medium Access Control (MAC)
    1 Medium Access Control 2 Medium Access Control (1) The Network H2 H4 H1 H3 Broadcast networks have possibility of multiple access (MA) to a channel medium access control describes how we resolve the conflict assume only one channel available for communication additional channels would also be the subject of MAC 3 Medium Access Control (2) The Network H2 H4 H1 H3 4 Medium Access Control (3) The Network H2 H4 H1 H3 5 Medium Access Control (4) The Network H2 H4 H1 H3 assume when two frames overlaps at the Rx then both are lost, and thus both must be retransmitted assumption always be true in LANs in broadcast WANs might not be true 6 ALOHA protocol You can do nothing for MAC . The Network The Network The Network The Network H2 H4 H2 H4 H2 H4 H2 H4 H1 H3 H1 H3 H1 H3 H1 H3 ALOHA is contention based: a host may broadcast whenever necessary higher layers spot errors caused by collisions, and do retransmission 7 Performance of ALOHA H n vulnerable period for -1 start (λt) −λt Pn(t)= e t1 + t2 n! H1 To find p from Poisson Equation - t set t = 2T, λ = µG, n = 0: t2 -1 0 (µ 2T ) − H2 p = G e µG2T t1 + t2 - 0! −µG2T vulnerable period for H2 start p = e µ − S = e µG2T Let t1 = t2 = T µG µS successfully sent per second −µG2T µS = µGe µG sent (including failures) per second p is probability frame has no collisions µST frames are delivered in T µ seconds p = S µG −µG2T ρ = µST = µGe T 8 Is ALOHA good? ρ 6 0.4 0.3 0.2 0.1 0.0 - 0.0 0.5 1.0 1.5 2.0 2.5 3.0 µGT load of 50% gives maximum efficiency of 18% not a very satisfactory performance no way of assuring that even this maximum efficiency is reached 9 Improving basic ALOHA 1.
    [Show full text]
  • Acorn Archimedes
    Copyright © Acorn Computers Limited 1988 Neither the whole nor any part of the information contained in, nor the product described in this Guide may be adapted or reproduced in any material form except with the prior written approval of Acorn Computers Limited. The products described in this manual are subject to continuous development and improvement. All information of a technical nature and particulars of the products and their use (including the information and particulars in this Guide) are given by Acorn Computers Limited in good faith. However, Acorn Computers Limited cannot accept any liability for any loss or damage arising from the use of any information or particulars in this manual, or any incorrect use of the products. All maintenance and service on the products must be carried out by Acorn Computers' authorised dealers. Acorn Computers Limited can accept no liability whatsoever for any loss or damage caused by service, maintenance or repair by unauthorised personnel. All correspondence should be addressed to: Customer Support and Service Acorn Computers Limited Fulbourn Road Cherry Hinton Cambridge CB1 4JN Information can also be obtained from the Acorn Support Information Database (SID). This is a direct dial viewdata system available to registered SID users. Initially, access SID on Cambridge (0223) 243642: this will allow you to inspect the system and use a response frame for registration. ACORN, ARCHIMEDES and ECONET are trademarks of Acorn Computers Limited. Within this publication, the term 'BBC' is used as an abbreviation for 'British Broadcasting Corporation'. Edition 2 First published 1988 Published by Acorn Computers Limited ISBN 1 85250 055 7 Part number 0483,000 Issue 1 1 2 Welcome to the Archimedes personal workstation This guide introduces your new Archimedes personal workstation.
    [Show full text]
  • Getting Physical with Ethernet
    ETHERNET GETTING PHYSICAL STANDARDS • The Importance of Standards • Standards are necessary in almost every business and public service entity. For example, before 1904, fire hose couplings in the United States were not standard, which meant a fire department in one community could not help in another community. The transmission of electric current was not standardized until the end of the nineteenth century, so customers had to choose between Thomas Edison’s direct current (DC) and George Westinghouse’s alternating current (AC). IEEE 802 STANDARD • IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. • More specifically, the IEEE 802 standards are restricted to networks carrying variable-size packets. By contrast, in cell relay networks data is transmitted in short, uniformly sized units called cells. Isochronous , where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also out of the scope of this standard. The number 802 was simply the next free number IEEE could assign,[1] though “802” is sometimes associated with the date the first meeting was held — February 1980. • The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). The most widely used standards are for the Ethernet family, Token Ring, Wireless LAN, Bridging and Virtual Bridged LANs. An individual working group provides the focus for each area. Name Description Note IEEE 802.1 Higher Layer LAN Protocols (Bridging) active IEEE 802.2
    [Show full text]