Network Performance Monitoring

Network Performance Monitoring

Network Performance Monitoring THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Shriram Raghavendra Ramamurthy Graduate Program in Computer Science and Engineering The Ohio State University 2012 Dissertation Committee: Dr. Rajiv Ramnath, Advisor Mark Fullmer, Advisor Dr.Prasad Calyam, Advisor Dr. Jay Ramnathan Copyright by Shriram Raghavendra Ramamurthy 2012 Abstract Network management is the use of tools that pertain to the operation, administration and provisioning of networked systems. Operation is the continuous monitoring of the network for problems, and once identified, the proper fixing of the problems before the they become widespread. Thus operation refers to keeping the network “up and running” smoothly. Maintaining the correct operation of every network component is of much importance to avoid domino effects that ultimately result in total network failure. Administration refers to observing all the resources of the network, to see how are they utilized and so on. The main goal of administration is to ensure appropriate usage of the network resources. Finally, provisioning means making the services of the network available to its users. When a user needs a particular service, there must an easy way to facilitate the request and that service upon deployment must also be monitored for maintaining the sanity of the network. This thesis concentrates upon providing various means to monitor a network, and various tools were created to enable the network administrators to prevent the nodes from not going down. The chapters covered are centric towards Wired Nodes on a local area network, to a wireless mobile device based monitoring. Experiments were also run on what is called the “Academic Cloud ” to analyze the capability of perfSONAR, which helps one to monitor the problem associated with wide area networks. iii Dedication This document is dedicated to my parents and sister iv Acknowledgments Firstly, I would like to express my sincere gratitude to my advisors Dr. Rajiv Ramnath, Mark Fullmer of OARnet and Dr. Prasad Calyam of Ohio Supercomputer Center for their continuous support of my Masters study and research. They have been a great motivation for me throughout and their guidance has helped with my Masters. Their constant encouragement and complete knowledge of the subject has made me learn and explore more about my research. My sincere thanks also goes to my thesis committee member Dr. Jay Ramnathan, for all the knowledge she imparted to my team and me during our CSE793. I would also like to thank Mathew Jaffee, of Indiana University for helping me out during my LAMP testing and my Mathematics teacher Mr.N.Srinivasan, for teaching basic application of education in life. I would also like to sincerely thank the administration of OARnet, for letting me learn, implement and experiment with many latest technologies. Finally, I would like to extend to my gratitude to my family and friends for all their help and motivation, without whom this Masters would not have been possible. v Vita 2006 - 2010 ....................................................B.E. Computer Science & Engineering, Coimbatore Institute if Technology, [Under Anna University Chennai], Coimbatore, Tamil Nadu, India. 2010 to 2012 .................................................Masters Student, Department of Computer Science and Engineering, The Ohio State University. Fields of Study Major Field: Computer Science and Engineering vi Table of Contents Abstract .............................................................................................................................. iii Dedication .......................................................................................................................... iv Acknowledgments ............................................................................................................... v Vita ..................................................................................................................................... vi Fields of Study ................................................................................................................... vi Table of Contents .............................................................................................................. vii List of figures ...................................................................................................................... x 1 Wired Networks ............................................................................................................ 1 1.1 Introduction ............................................................................................................ 1 1.2 SysUpTime Monitor ............................................................................................... 1 1.2.1 SNMP .............................................................................................................. 1 1.2.2 sysUpTime ....................................................................................................... 3 1.2.3 Implementation ................................................................................................ 3 1.3 Juniper Alarm Monitor ........................................................................................... 5 1.3.1 jnxAlarmRelayMode ....................................................................................... 5 1.3.2 jnxYellowAlarm .............................................................................................. 6 vii 1.3.3 jnxRedAlarm ................................................................................................... 6 1.3.4 Implementation ................................................................................................ 7 1.4 Google Maps Integration ........................................................................................ 7 2 Wireless Network ........................................................................................................ 11 2.1 Introduction .......................................................................................................... 11 2.2 NanoBSD based throughput analyzer .................................................................. 11 2.2.1 Introduction to NanoBSD .............................................................................. 11 2.2.2 Implementation .............................................................................................. 12 2.3 iPhone based throughput analyzer ........................................................................ 13 2.3.1 Web page response analyzer .......................................................................... 14 2.3.2 Download throughput analyzer ..................................................................... 15 3 Wide Area Networks ................................................................................................... 18 3.1 Introduction .......................................................................................................... 18 3.2 Global Environment for Networking Innovations ............................................... 18 3.3 perfSONAR .......................................................................................................... 19 3.3.1 perfSONAR architecture ............................................................................... 19 3.3.2 perfSONAR Problem Example ..................................................................... 20 3.3.3 perfSONAR-ized Measurement Tools .......................................................... 23 3.3.4 perfSONAR resource protection ................................................................... 26 viii 3.3.5 Investigating LAMP/perfSONAR to explore “infrastructure measurement slices” in GENI .......................................................................................................... 28 4 Conclusion and Future Work ...................................................................................... 42 Bibliography ..................................................................................................................... 44 ix List of figures Figure 1 Juniper alarm MIB ................................................................................................ 2 Figure 2 sysUpTime OID view ........................................................................................... 3 Figure 3 Google map view .................................................................................................. 9 Figure 4 Web page response time graph ........................................................................... 15 Figure 5 Throughput analyzer graph ................................................................................. 17 Figure 6 The user and resource location…………………………………………………22 Figure 7 Traceroute points ................................................................................................ 22 Figure 8 Locating the pain points………………………………………………………..23 Figure 9 Storing the measurement data ............................................................................ 23 Figure 10 Problem areas identified based on the data collected ....................................... 23 Figure 11 perfSONAR resource protection ...................................................................... 28 x 1 Wired Networks 1.1 Introduction This chapter contains the explanation and description of the tools, which

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    55 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us