Newgen
Newgen
New Generation
of Network
Monitoring
Systems
This book is the property of The Applied Technologies Group and is made
available upon these terms and conditions. The Applied Technologies
Group reserves all rights herein. Reproduction in whole or in part of this
book is only permitted with the written consent of The Applied Tech-
nologies Group. This report shall be treated at all times as a proprietary
document for internal use only. This book may not be duplicated in any way,
except in the form of brief excerpts or quotations for the purpose of review.
In addition, the information contained herein may not be duplicated in
other books, databases or any other medium. Making copies of this book, or
any portion for any purpose other than your own, is a violation of United
States Copyright Laws. The information contained in this report is believed
to be reliable but cannot be guaranteed to be complete or correct.
Copyright © 1997 by The Applied Technologies Group, One Apple Hill,
Suite 216, Natick, MA 01760, Tel: (508) 651-1155, Fax: (508) 651-1171
E-mail: [email protected] Web Site: http://www.techguide.com
It is clear that the speed of network change is accelerating.
Networks have become more complex, more interactive, signifi-
Introduction
cantly more costly and certainly more mission-critical. There is
much more at stake than ever before for network managers, and Corporate networks are core assets for almost any
almost everyone is experiencing an increased level of tension and company in the fast-paced, globally-oriented world we
uncertainty as new systems, applications, and services are live in today. Data network technologies have evolved
deployed. Vendors proposing complex solutions are equally very rapidly; the low-speed circuits of a SNA network
concerned that their solutions meet the needs of all their are transforming into multiservice distributed informa-
customers. The need to deliver analyses and monitor the functions tion systems. There is even a move towards the conver-
of new technologies such as Frame Relay, ATM, Fast Ethernet, gence of traditionally distinct facilities such as
and the Internet has never been greater. There is also a need to telephony and data networks. Instant access to high-
justify deployment costs and to validate assumptions before quality voice, data, image, and video transport services
systems become operational. Maintaining the value of all is available almost anywhere and yet the ability to
resources throughout the network’s life cycle has also become an analyze and monitor network operations has not kept
objective. This Technology Guide looks at the changing network pace with its importance. The desire to keep track of
environment in terms of today's greater need to provide precise, what is happening on the network and understand how
highly-accurate analysis and monitoring of both test-bed and well it is performing has never been greater.
operational network components and services. The deployment of The components of a modern network are often
fully functional, integrated network analysis and monitoring provided by more than one supplier and may need to
systems is shown to be the best solution for examining contempo- be installed and maintained anywhere in the world.
rary networks. Testing the quality and compatibility of these compo-
nents, both before and after purchase, is an important
part of the overall network planning, design, and
deployment life cycle. Providing the tools for analysis
and monitoring of these networks has become critical
to the success of network-dependent businesses.
Furthermore, as new protocols are deployed with
complex interactions with other protocol sets, there is a
need to simulate and test these environments, with load
generation stress testing and real-time monitoring.
This Technical Guide examines the requirements
for network analysis and monitoring that justifies the
overhead of implementing analysis and monitoring
systems, especially for high-speed multi-protocol
networks. We take a fresh look at the growing need for
comprehensive network analysis and monitoring and
how it can be used effectively. We discuss the benefits
of deploying analysis tools and monitoring capabilities
and suggest an architecture for describing what must
2 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 3
be provided. With the help of this Guide, the network levels of complexity and interactivity are involved,
planner can assess the impact of network analysis and much greater speeds are achieved, and immature
monitoring systems, define the overall benefits and protocols are being deployed, such as the various stan-
make the case for an up-front investment in the tools. dards for integrating ATM with legacy protocols (e.g.
Multiple Protocols Over ATM MPOA) all of which
make functional outages and quality degradation much
more likely. Various network technologies are also
Networks are Critical Assets being combined in new ways - frame relay overlaid
onto ATM, IP tunneling over the Internet, video over
Most companies know intuitively that their tele- ATM, and voice and video over an Ethernet LAN are
phone networks are mission-critical. Many do not yet examples – and these are often incompatible across
realize the significant business cost of data network vendors. Recently, quality of service has been the
outages. Banks, for example, would be severely subject of hot debate in the industry, especially as the
restricted if their teller networks were unreliable. business use of the Internet and Intranets expand.
Virtually everyone depends on “the network” in one Frame Relay, ATM, very high speed routers and
form or another, and this dependency means that switches, 100Mbps and pending gigabit LANs,
networks have become critical corporate assets. They SONET, and TCP/IP-based intranets are examples of
are expected to be available anytime, to be accessible advanced technologies that all share a common trait –
anywhere, and to operate flawlessly, and their high speeds with lots of traffic flowing. These, when
managers are expected to know when these expecta- combined with legacy networks that range from plain
tions aren’t going to be met. old telephone service to SNA display terminal
It is becoming more and more difficult to keep networks, lead to complex integration, interoperability
track of what network elements are installed, what between applications, and management challenges.
protocols are operating , how they are interacting with Many of the traditional network providers no longer
multiple technologies, and what changes are occurring. provide end-to-end service and support, leaving users
It has been claimed that more than 30% of network to develop their own monitoring, analysis, diagnostic,
users move every year in a typical corporation – a good and maintenance capabilities.
reason alone for continuous analysis and monitoring of A variety of network middleware solutions have
network assets and configuration. The rate of change is also been developed. Virtual LANs, on-line transaction
accelerating as the technologies improve and more processing, message handling, World Wide Web
users demand both internal and external network serving, and client/server computing are a few exam-
bandwidth and reliable access (e.g., Internet). ples. These are overlaid onto the physical network,
Information system technologies are being devel- thereby creating a logical networking environment that
oped faster than ever before, resulting in high rates of also needs to be monitored and controlled.
change both within the network and around it. Greater
4 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 5
A highly simplified modern networking environ-
ment is illustrated below.
Operational Analysis and
Monitoring Management
The A network analysis and monitoring system is
Internet
successful when it provides the owners and managers
with the information they need to plan, organize,
Wide Area Legacy implement, operate, administer, and control the
Networks Networks
Intranet
(Frame Relay, (SNA, IPX, network. Today’s networks are challenging to monitor
ATM) XNS, etc.)
effectively and even harder to manage, and the degree
of difficulty increases with size and capacity (i.e., the
shear volume of data involved is daunting).
Mission-critical applications are routinely using Effective and appropriately placed monitoring of
these networks, often with little confidence that the an operational network can contribute to the solution
“state of the net” is well known or trustworthy. Since of a wide range of network-related problems. The
the network has a direct impact on the achievement of overall goal is to detect service-threatening conditions
business goals and contributes to maintaining corpo- before they become visible to the end user (thereby
rate profitability, network analysis and monitoring is a avoiding the loss of business productivity). Some
necessity. typical uses for an on-line network analysis and moni-
toring system include:
The Need for Network Analysis and Monitoring • detecting changes in user accesses, node activities,
Network analysis and monitoring can be defined topology, status and performance ratings, and
as the capture, filtering, decoding, and organization of debugging network problems;
observations about the functioning of a network • tracking who is using the most bandwidth on the
service, the facilities that provide the network services network and whether they are authorized;
or any of the components that make up a communica-
tions facility. Monitoring and analysis provides • identifying and alerting management of service
feedback concerning the “health” of the network and outages, degrading performance and component
allows corrective actions to be initiated when and faults;
where necessary. • monitoring of network interfaces for communica-
In a laboratory testing environment, it assumes tion problems;
new dimensions in which it provides the ability to build
• maintaining event histories, trends, and loading
various protocol models and to simulate protocol inter-
statistics; and
actions, while providing real-time monitoring capture
and analysis of data streams. • on-line simulation and capture of live traffic
analysis.
6 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 7
Analysis and monitoring can also be used in a relevant network analyses and to do it in a timely
laboratory environment for simulation and load gener- manner.
ation testing and in an inoperative network to perform If a network analysis and monitoring capability
diagnostics, analysis, and load tests. Some typical off- were not embedded into the system, it would be
line uses for an analysis and monitoring system are: impractical to do many important network evaluation
• providing industry standards, benchmark data tasks. In general, moreover, without monitoring and
testing for product specifications and service level analysis, the role of the network manager would at best
agreements; be a labor-intensive, reactive process that would seldom
meet user requirements. Traffic capacity planning
• developing conformance tests for the multiple would be almost impossible, quality of service could
technologies being used; not be regulated, security breaches might go
• simulating traffic profiles and performance tests; undetected, and unplanned service disruptions would
and occur.
• integration and compatibility testing.
8 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 9
but is also the most beneficial from a user’s viewpoint. to the added difficulties of problem determination.
A very large number of access points may be required, This approach could be completely acceptable for
and they would usually be dedicated to the monitoring medium to large networks, priority networks, and
system. The amount of data that needs to be collected would scale up to larger, or shared networks.
and possibly transported to a remote database can also
be very high. The benefit, however, is that proactive Data Collection (Capture and Analysis)
management and dynamic recovery can be a reality. The data collected by the network monitoring
The key cost-benefit trade-off is completeness: the system can be capture directly to hard disk, floppy disk,
number of points of observation, the frequency of or transferred to a central database management
polling, and the degree of summarization performed at system immediately. It can be filtered, edited, and
the source. chained together for subsequent uploading, or it can be
Scheduled monitoring and filtering reduces the analyzed at the point of capture and only the results
cost by executing the monitoring functions only at forwarded to the control center. If the monitoring
certain times (e.g., only monitor during peak times) or function directly controls a dynamic, adaptive network,
at a specific subset of locations at set times. This much of the data need not be transferred at all since it
reduces the volume of data collected and the is used proactively at the control point. All data
processing required. A variety of scheduling strategies collected must, as a minimum, be uniformly defined
is possible: random testing, regular polling, and and understood so that correlation of data across
responding to user requests are three examples. There multiple protocols, events or locations, can be achieved.
is a greater chance of missing an important event,
however, and some uncertainty occurs when the test
points are not event driven. By engaging filtering prior
to monitoring the network, you can selectively trap Users of a Monitoring System
events and errors. The filtering technique can be
utilized during test bed stages, implementation turn-up, Users of network analysis and monitoring systems
and operational maintenance. can be divided into four major categories:
Reactive monitoring is performed in reaction to
an outage or performance failure, in which monitoring a) Original Equipment Manufacturers and
is turned on only when a trouble ticket is opened. The Laboratories: The development of any
end user most often provides the initial alarm mecha- network device - a bridge, a router, or a gateway,
nism. The number of simultaneous test points would for example - involves complex hardware and
be relatively low, but geographic coordination and software, using network protocols that are existing
correlation of the tests would be more difficult. By or relatively new and untried. A network analysis
implementing a remote diagnostic monitoring system and monitoring system serves as a verification tool
such as a protocol analyzer, reactive monitoring can be by providing a traffic generator, simulating a desti-
activated prior to performance failures . This would nation node or multiple nodes, or detecting and
minimize system cost, reduce the expense of people reporting upon protocol violations. This can
costs, and would likely decrease the outage times due considerably reduce the time it would take to “get
10 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 11
it right” in the rush to bring products to market. goals with efficiency and precision. Isolating
Compliance verification also provides a level of points of congestion, locating sources of transient
confidence for the buyer. faults, and generally proving out a design are
Monitoring is also essential for performance important for long term stability.
testing and benchmarking of network components. c) Carriers and Internet Service Providers:
This is helpful both to the supplier who wishes to Carriers, ,network providers, and Internet Service
sell a product based on superior performance and Providers have very large, complex networks to
also to the purchaser who needs to know what to implement, operate, and manage. Carrier-based
expect from the product. Test tools that do not networks may be shared among thousands of
impose a processing overhead on the node being corporate users whose needs can vary widely.
tested are most suitable for this type of application. These same carrier networks usually span wide
Monitoring and analysis systems would also be geographic areas where reliability and maintain-
needed for stress testing under fault conditions ability become a more important issue and are
(i.e., create faulty traffic and invalid protocol almost always interconnected with other carrier
sequences) and for life cycle testing to determine networks. Internal monitoring and analysis
the MTBF ratings of the device. systems are essential if a carrier is to provide high
b) Suppliers and system integrators: A new quality services, and these must work with the
network design or a new equipment proposal is user’s own systems if end-to-end service testing is
much more credible when the existing network is to be achieved.
clearly understood and when bottlenecks, conges- In a large carrier’s network, the cost of
tion, or other performance problems are identi- OAM&P (operations, administration, maintenance
fied. A portable monitoring and analysis system and provisioning) can escalate very rapidly, making
would be an important tool for anyone trying to manual methods of monitoring and control
document an existing network or audit its actual impractical. The network monitoring and analysis
performance. The ability to see what is system must be standardized, scalable, and reliable
happening in a live environment is essential both if it is to be combined across multiple administra-
for gathering design data and also for discovering tions and interconnected with customer network
integration issues. It is also critical when perfor- management performance tools.
mance benchmarks are part of the acceptance Monitoring of network usage is also a critical
cycle. This is usually done through a process of requirement for carrier billing systems. Unless a
monitoring the operation in conjunction with the facility is dedicated to a single user, the costs of
customer and capturing protocol errors . Good the resources must be allocated according to their
monitoring and analysis systems allow both the use. Monitoring must be done at wire-line speeds
customer and supplier to measure acceptance when QoS limits are involved or when usage has
12 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 13
to be recorded for billing. Automation of the
monitoring function in high-speed networks such
Monitoring Systems
as Frame Relay and ATM is especially important. Architecture
d) End Users: Any corporate network has two
types of user: the organization’s typical employee A network monitoring and analysis system can be
who simply uses the network as a transparent structured in a number of ways, depending on the
utility and who reacts to problems or intended use, with many variations and combinations
performance impairments with complaints, and also being possible. However, a number of basic func-
the network operator who is responsible for main- tions must be included in any monitoring and analysis
taining the end-to-end service. For the network systems architecture, as is illustrated below:
operator, network monitoring and analysis
provides the means to become proactive (i.e., to Network Analysis &
Monitoring System
detect faults prior to receiving a user’s complaint).
It also allows them to manage service level Network Test Points
14 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 15
• Data repository Histograms and statistical reports • Monitoring of user versus test traffic in live or test
(and consolidation), bed situations, and
• Operator interface (Intuitive user interface for • Standards-based versus product-specific
quick response), and monitoring.
• Traffic generator (wire-line speed for load
generation). Hardware vs. Software
Hardware test tools tend to be reactive. When a
The architecture of the monitoring and analysis problem occurs, the tool is plugged into a node or a
system can vary considerably, most often depending on circuit and monitoring is turned on. This provides
what needs to be monitored, filtered, and captured. limited access to the network and works best in shared
The specific needs of the network operators and of the networks where the basic problems relate to the inter-
associated network management system will dictate the ference among users (such as congestion or protocol
type of instrumentation that is necessary. One of the errors). Software-based monitoring tools, on the other
most critical areas for network monitoring and analysis hand, can observe a large number of points in the
today is the quality of service (QoS) provided to the network either continuously or on command, without
user. This includes testing for utilization, error rates, the need for manual intervention. As networks move
delays, etc. towards switched approaches and dedicated LAN
Major architectural decisions to be made during segments, a combination of both hardware and soft-
network planning include: ware monitoring may be the most effective, allowing
proactive monitoring to be combined with in-depth
• Centralized versus distributed processing (network
diagnosis and testing.
test points are, by definition, distributed),
• Portable versus embedded applications for
performing monitoring and analysis tasks,
• Continuous versus “connect and look” modes of Development Systems for
data collection, Analysis and Monitoring
• Wire-line speed versus “store and process” modes
of operation,
Networks
• Larger buffer capacity for report generation, The use of integrated development systems as part
• Proactive versus reactive management techniques, of a monitoring and analysis software suite is crucial to
validating the operation of new network arrangements.
• Protocol (wireline) versus component (node hard-
Often, developers are confronted with the need to work
ware and software) monitoring,
with and perhaps integrate legacy and new, immature,
• Functional versus performance monitoring, protocols.
16 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 17
For example, TEKELEC uses integrated develop-
ment capabilities to customize applications; to create
What needs to be monitored?
and test proprietary protocols; and to validate the oper-
ational parameters of various immature protocols. In any layered network architecture the services of
These capabilities are also used to customize user one layer support the needs of the layer above (see the
definable interfaces for multiple applications. The illustration of the OSI seven-layer model below). Each
TEKELEC system includes the Protocol Monitoring layer represents one or more functions and protocols
Development System (PMDS), and Tool Command that are logically, if not also physically, separated from
Language/Tool Kit (tcl/tk). With these flexible devel- the others. A network monitoring and analysis system
opment tools, the network manager can predict traffic must have access to and understand the protocol
patterns, node failures, potential congestion points, and messages at each level. In a multiprotocol environment
bandwidth characteristics throughout the network. this can be an onerous task, especially if proprietary
protocols are included. With PMDS and PASM simu-
lation , monitoring and analysis can be used to validate
Multi-Protocol Support and confirm application connectivity, protocol interac-
One of the fundamental architectural tions, addressing, priorities setting mechanisms,
requirements of analysis and monitoring systems is the throughput, end-to-end delay, network overhead,
ability, at wire-line speeds, to capture and decode routing table exchanges, etc. – literally anything that is
multiple types of protocols at multiple levels of the needed to establish, initiate, operate, and regulate the
network, as is illustrated to the right using the OSI network and its connections.
Reference Model. A system should allow protocols to
be individually designed and implemented for a partic- User Applications Gateways
Application Support Application
ular test sequence, or to support a general implementa- Analysis &
Presentation Distributed Systems Protocols
tion that models the interaction of multiple protocols. Middleware
Monitoring
Systems
Session
TEKELEC’s Protocol Monitoring Development Code Converters
Transport Security and Control
System (PMDS) provides the capability of creating new
Routers Switches
protocols and testing them with capture and analysis Network
Routing Protocols
Bridges Switches
tools. The Protocol Adaptable State Machine (PASM) Data Link
LANs VLANs
18 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 19
• Monitoring and analysis of the hardware changes to the quality of service); about the users
platforms and operating systems that support the and applications; and about the environment.
operation and management of the network and its Without at least basic monitoring and analysis,
users. there can be no feedback to a Network Operation
Center (NOC) and no control by managers.
This translates into different sets of monitoring c) Trend monitoring: Network monitoring and
and analysis tasks. analysis systems can provide more than simply
a) Protocol testing: Manufacturers of new silicon collection of raw data. Alarms for exception
with new or proprietary protocols need to test conditions and faults are also a natural function of
their products against some known system and the system. In more advanced systems, thresholds
determine performance benchmarks. Compliance and limits can be set for trends as well instanta-
to standards, adherence to functional specifica- neous events.
tions , and operating conditions and limits are
other reasons for a priority testing. This implies a
Hubs as Monitoring Centers
laboratory environment with load generation,
production simulation , monitoring and analysis The intelligent wiring hub is a key element from a
to effectively produce quality results. monitoring perspective. Hubs provide the “first point of
Analysis and Monitoring is an essential part of contact” for an end system attached to a network, and
any test environment but the requirements may serve as an observation point at which data flowing to
be quite different from a “live’ operation where and from the end user can be examined. Virtually all
protecting user data may be paramount. In a hubs can allow monitoring and analysis of both the
laboratory environment, much of the surrounding functioning of the hub itself and the traffic flowing
network can be simulated, many more points of through the hub. In a TCP/IP environment, the SNMP
attachment for test points may be available, and and RMON protocols are used for this purpose.
much more powerful testing applications may be The current state and port configuration of a hub
available through flexible test tools such as PASM provides much information concerning topology and
or PMDS. physical configuration schemes, an indication of the
Of particular importance is the assurance that health of the network and, more importantly, it allows
the protocols can meet speed and quality of the capture of traffic arriving from an end user’s node.
service requirements even when stressed. Bridges and switches that operate at Layer 2 are
also important network elements. The protocols of
b) Operational network monitoring: A moni- Layer 2 (the Ethernet MAC, the TCP/IP PPP protocol
toring and analysis system for an operational and so on) are designed for moving frames within a
network must collect information about the single network domain. It is this layer that most
network itself (e.g., changes in the network’s network monitors would examine to determine the
protocols); about the state of the network services quality of operation of a network.
being offered (including both protocol errors and
20 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 21
Routers as Monitoring Points The True Cost of a Network
Another network element of critical importance is
the router, which operates at Layer 3 of the OSI Monitoring System
Model. Routers are used to interconnect logically sepa-
rate networks (forming an internetwork). Monitoring While network monitoring increases the overall
and analysis of the operation of routers and the cost of the hardware and software facilities, it signifi-
routing process provides considerable information cantly reduces the total cost of ownership for a distrib-
about the network. By detecting trends and events as uted network-based system. Cost of ownership drops
seen by the routers, it is possible to take preventive dramatically with remote access on network points that
actions, to isolate problem components, and to gener- handle the majority of the traffic. With today’s
ally minimize the impact of faults. The Internet IP networks supporting increasingly mission critical busi-
protocol, which is the key to internetworking, operates ness applications, it is imperative that they keep
at this level. New IP switching on Layer 3 will require running with efficiency and resiliency. Justifying up-
protocol analysis to capture performance and quality of front costs in order to get downstream benefits in this
service parameters. environment is not difficult, since technology is
advancing quickly and more of the corporate asset is
on the network. It is, therefore, important to justify the
Monitoring at Other Points
initial integration of a network monitoring and analysis
Monitoring the operation of applications and plat- system as new technologies and applications are
forms is also highly desirable. Gateways provide for the deployed, rather than simply adding it after-the-fact in
interconnection of applications that are not directly response to serious network problems or failures.
compatible and for the conversion between different Every business manager believes a key part of his
protocol suites. Middleware and platform applications or her job is to monitor and control the assets for
provide services for distribution, for security, and for which they are responsible. The network
identification. operator/manager is no exception, given that the
In any of these components there will be a trade- ability to monitor the network is a prerequisite to
off between the processing load of the monitoring controlling it. The cost of a monitoring and analysis
functions, the memory required for buffering the obser- system can be balanced against the cost of decreased
vations, and the amount of data collected. Spot availability and increased operator involvement. A
checking, continuous monitoring, and targeted analysis necessary, ideal model in this network milieu is
change the amount of data collected and therefore the dynamic operations, high reliability design, and contin-
cost of performing the monitoring. The higher the uous analysis of all parts of the network at all times,
speeds involved the more data that will need handling thereby allowing detection and correction of events
and the more important it is to operate at least at the prior to an outage occurring.
wire-line speeds. The relative cost of the monitoring system, the
cost and number of personnel, and the business impact
of the networked applications will determine the actual
22 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 23
“return on investment” of any investment in • less timely work, greater difficulties in global
monitoring systems. These costs are highly dependent operation,
on the specific circumstances of each network with the • slower products to market
lack of a mission critical network service sometimes
being very costly indeed. • lower quality performance, and
The following chart highlights key costs and bene- • network stability with multiple protocols.
fits related to the deployment of a network monitoring
system. Using a monitoring and analysis system in a devel-
opment environment is almost essential, since few
Costs and Benefits of a Monitoring System customers would buy products whose specifications are
not available.
Costs Benefits
In an operational environment the goal is to estab-
• More hardware and software • Lower people costs due to automation
required lish a balance between investing in monitoring and
• Uses network capacity • Reduces downtime (mean time to analysis systems versus the cost of people and the relia-
repair)
• Development and deployment • Allows proactive management bility needed for the applications served.
required
• Potential compatibility problems • Permits trend analysis
Without some level of monitoring and analysis,
there would be virtually no reasonable way to detect
• Standardization required for • Reduces cost of product
information development
and correct faults, and certainly no way to identify
• Lower testing costs and shorten test trends and directions that could be impacting service.
cycles
• Proactive analysis and monitoring with
multiple test tools
Remote access to multiple technolo-
gies and applications
New products get to market quicker Monitoring System
• Reliability and quality of new products Requirements
• More rigorous data collection
24 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 25
• presentation tools for viewing the consolidated • Monitoring of longer term trends and changes in
data; modeling tools to validate protocols and configuration that is usually accomplished in an
network performance; and off-line mode.
• a traffic generation facility for testing under simu-
lated loads. What are the Elements of a Superior Network
Monitoring System
Any monitoring and analysis system may be The various operational elements of a good moni-
portable or rack-mounted. It should be capable of toring and analysis system are illustrated in the
interfacing with a wide variety of networks and be previous diagram. They include:
scaleable from small to large networks. It must be able • an intuitive graphical user interface,
to generate and receive a variety of protocols and be
able to deliver simulation and real-time decodes on all • automated processes, detection and
layers of the protocol suite. The monitoring should be measurements,
capable of full-rate data capture to support accurate • comprehensive operations and management
performance but must also be able to poll the test analyses,
points to allow either sampling or continuous
• a common and consistent operational command
monitoring on a per access basis.
language,
Ideally, monitoring and analysis systems can
operate with both software and hardware interfaces. A • simultaneous support for multiple technologies on
software interface copies and forwards the data passing a single platform,
a certain point of observation, which allows observa- • remote access to test points via network connec-
tions at locations that would not normally be accessible tions,
to a test system. Software monitoring, however,
requires suitable features to be built into the device • customizable user interfaces incorporating
(filtering) and also consumes resources that might powerful GUI features,
distort the real situation. Hardware interfaces can be • extensibility to accommodate new technologies
less intrusive but are limited to physically accessible and scalability to large networks,
points, and typically operate on a per segment basis.
• open system platform, and
Network monitoring and analysis system require-
ments differ according to the intended purpose of the • real-time (wire-line speed) operation for multiple
system. The three major categories of the system are: points of attachment and a wide range of network
speeds.
• Network component capability and performance
monitoring that is used during development;
• Event and usage monitoring that is performed
during normal operation of the network; and,
26 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 27
Summary and Conclusions Acronyms
The ability to communicate digitally as well as
ATM Asynchronous Transfer Mode
using voice has become critical to business success,
(network)
resulting in greater dependency on complex global
networks and their component suppliers. Management IP Internet Protocol
of the internal corporate network and of the intercon- LAN Local Area Network
nection of multiple corporation’s networks has become
a very visible task, one that would be impossible SONET Synchronous Optical Network
without the tools for monitoring of activities, events, SNA Systems Network Architecture
performance, and usage. There is a highly magnified
need for testing and monitoring systems to support TCP Transport Control Protocol
contemporary applications and technologies. PASM Protocol Adaptable State Machine
Every network involves multiple stages in its devel-
PMDS Protocol Monitoring Development
opment life cycle: component development, carrier
System
service production, integration testing, operational
monitoring, and application usage control. The ability MAN Metropolitan Area Network
to monitor the network is fundamental to success at all
GAN Global Area Network
times from the product test labs to application load
control.
The need for, and benefits of, accurate monitoring
of all the different technologies currently being used is
clear. In the past, the up-front costs needed for imple-
menting and integrating a comprehensive monitoring
and analysis system had occasionally been difficult to
justify. However, with the dramatic increase in business
costs of network failures and the increasing complexi-
ties of the technologies, it has become evident that
automation of the monitoring and management func-
tions has considerable payback for everyone involved:
producers, carriers, integrators, and end users.
Since it is the monitoring capability that provides
the basis for most forms of network management, any
investment in monitoring and analysis tools and tech-
niques is bound to be re-paid many times over.
28 • The New Generation of Network Analysis and Monitoring Systems Technology Guide • 29
Glossary Asynchronous Transfer Mode (ATM)—(1) The
CCITT standard for cell relay wherein information for
multiple types of services (voice, video, data) is conveyed
10BaseT—The IEEE 802.3 specification for ethernet in small, fixed-size cells. ATM is a connection oriented
over unshielded twisted pair (UTP). technology used in both LAN and WAN environments.
(2) A fast-packet switching technology allowing free allo-
100BaseFX—100 (Mbps) Ethernet implementation cation of capacity to each channel. The-SONET
over fiber. synchronous payload envelope is a variation of ATM.
100Base-T Fast Ethernet—A 100 Mbps technology (3) ATM is an international ISDN high speed, high-
based on the Ethernet/CD network access method. volume, packet switching transmission protocol
standard. ATM currently accommodates transmission
802.3—CSMA/CD (Ethernet) standards, which apply
speeds from 64 Kbps to 622 Mbps.
at the physical layer and the media access control
(MAC) sublayer. ATM Adaptation Layer (AAL)—Each AAL consists
of two sublayers: the segmentation and reassembly
802.5—Token ring standards.
(SAR) sublayer and the convergence sublayer. AAL is a
802.6—MAN standards. IEEE 802 standards become set of four standard protocols that translate user traffic
ANSI standards and are usually accepted as interna- from higher layers of the protocol stack into a standard
tional standards. A MAU is referred to as a transceiver size and format contained in the payload of an ATM
in the Ethernet specification. cell and return it to its original form at the destination
node.
Access Rate—The transmission speed, in bits per
second, of the physical access circuit between the end AAL 2 is used with time-sensitive, variable bit rate
user and the network. traffic such as packetized voice.
Add/Drop Multiplexer (ADM)—A multiplexer ATM Data/Channel Service Unit (ATM
capable of extracting or inserting lower-rate signals DSU/CSU)—Segments ATM-compatible information
from a higher-rate multiplexed signal without into ATM cells and then reassembles them at their
completely demultiplexing the signal. destination.
Advanced Intelligent Network (AIN)—Carrier Available Bit Rate (ABR)—A class of service in
offering more than ‘pipes’ to users. which the ATM network makes its “best effort” to meet
traffic bit rate requirements.
Application Layer—Layer 7 of the OSI Reference
Model; implemented by various network applications Bandwidth on Demand (BoD)—Dynamic alloca-
including file transfer, electronic mail, and terminal tion of line capacity to active users, inherent in
emulation. FastComm FRADs.
Asymmetrical Digital Subscriber Line Bit Stuffing—The insertion of extra bits into a data
(ASDL)—A new standard for transmitting at speeds up stream to avoid the appearance of unintended control
to 7 Mbps over a single copper pair. sequences.
http://www.techguide.com
Albert Einstein
This Technology Guide is one
of a series of guides, published
by ATG, designed to put complex
communications and networking
technology concepts into practical
and understandable terms.
Each guide provides objective,
non-biased information to assist in
the internal education, evaluation
and decision making process.
This Technology Guide, as well
as the other communications and
networking technology guides
in the series, are available
on ATG‘s Web Site.
http://www.techguide.com