20
Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Embed Size (px)

Citation preview

Page 1: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Chapter 8

RMON

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-1

Page 2: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Notes

RMON Components

• RMON Probe• Data gatherer - a physical device

• Data analyzer• Processor that analyzes data

• RMON Remote Network Monitoring•Standards-based network management protocol•Allows network information to be gathered at a single workstation•Defines additional MIBs to provide a richer set of data about network usage

DataAnalyzer

RMONProbe

BACKBONENETWORK

SNMPTraffic

SNMPTraffic

LAN

RouterRouter

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-2

Page 3: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Network with RMONs

FDDIBackbone Network

Remote Token Ring LANNMS

Router Bridge

Token RingProbe

EthernetProbe

Local LAN

Figure 8.1 Network Configuration with RMONs

Router withRMON

Router

Remote FDDI LAN

FDDI Probe

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-3

NotsNotes• Note that RMON is embedded monitoring remote FDDI LAN• Analysis done in NMS

Page 4: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON Benefits

• Monitors and analyzes locally and relays data; Less load on the network

• Needs no direct visibility by NMS

• More reliable information

• Permits monitoring on a more frequent basis and hence faster fault diagnosis

• Increases productivity for administrators

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-4

Page 5: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON MIB

rmonConformance (20)

probeConfig (19)

usrHistory (18)

rmon (mib-2 16)

statistics (1)

history (2)

alarm (3)

host (4)

hostTopN (5)

matrix (6)

filter (7)

capture (8)

event (9)

Figure 8.2 RMON Group

a1Matrix (17)

a1Host (16)

n1Matrix (15)

n1Host (14)

addressMap (13)

protocolDist (12)

protocolDir (11)

Token Ring (10)

RMON1 Extension

RM

ON

1

RM

ON

2

Notes• RMON1: Ethernet RMON groups (rmon 1 - rmon 9)• RMON1: Extension: Token ring extension (rmon 10)• RMON2: Higher layers (3-7) groups (rmon 11 - rmon 20)

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-5

Page 6: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Row Creation & Deletion

State Enume-ration

Description

valid 1 Row exists and is active. It is fully configured and operationalcreateRequest 2 Create a new row by creating this objectunderCreation 3 Row is not fully activeinvalid 4 Delete the row by disassociating the mapping of this entry

• EntryStatus data type introduced in RMON

• EntryStatus (similar to RowStatus in SNMPv2)

used to create and delete conceptual row.

• Only 4 states in RMON compared to 6 in SNMPv2

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-6

Page 7: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON Groups and Functions

Host and Conversation Statistics

Token Ring Statistics

Ethernet Statistics

Filter Group

RemotelyMonitoredNetwork

DataGathering

PacketFiltering

ChannelFiltering

PacketCapture

NetworkManager

AlarmGeneration

EventGeneration

HostStatistics

HostTopNStatistics

EthernetStatistics

EthernetHistory

Token RingStatistics

Token RingHistory

MatrixStatistics

HistoryControl

HistoryControl

Figure 8.3 RMON1 Groups and Functions

Notes• Probe gathers data• Functions

• Statistics on Ethernet, token ring, and hosts / conversations• Filter group filters data prior to capture of data• Generation of alarms and events

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-7

Page 8: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON1 MIB Groups & TablesGroup OID Function TablesStatistics rmon 1 Link level statistics -etherStatsTable

-etherStats2TableHistory rmon 2 Periodic statistical data

collection and storage for laterretrieval

-historyControlTable-etherHistoryTable-historyControl2Table-etherHistory2Table

Alarm rmon 3 Generates events when the datasample gathered crosses pre-established thresholds

-alarmTable

Host rmon 4 Gathers statistical data on hosts -hostControlTable-hostTable-hostTimeTable-hostControl2Table

HostTopN rmon 5 Computes the top N hosts onthe respective categories ofstatistics gathered

-hostTopNcontrolTable

Matrix rmon 6 Statistics on traffic between pairof hosts

-matrixControlTable-matrixSDTable-matrixDSTable-matrixControl2Table

Filter rmon 7 Filter function that enablescapture of desired parameters

-filterTable-channelTable-filter2Table-channel2Table

PacketCapture

rmon 8 Packet capture capability togather packets after they flowthrough a channel

-buffercontrolTable-captureBufferTable

Event rmon 9 Controls the generation ofevents and notifications

-eventTable

TokenRing

rmon 10 See Table 8.3 See Table 8.3

Notes

Chapter 8

• Ten groups divided into three categories• Statistics groups (rmon 1, 2, 4, 5, 6, and 10))• Event reporting groups (rmon 3 and 9)• Filter and packet capture groups(romon 7 and 8)

• Groups with “2” in the name are enhancements with RMON2

Network Management: Principles and Practice© Mani Subramanian 2000

8-8

Page 9: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Textual Convention:LastCreateTime and TimeFilter

Chapter 8

fooCounts.0.1 5fooCounts.0.2 9fooCounts.1.1 5fooCounts.1.2 9fooCounts.2.1 5fooCounts.1.2 9fooCounts.3.1 5fooCounts.3.2 9fooCounts.4.2 9 -- (Note that row #1 does not exist for times 4 & 5

since the last update occurred at time-mark 3.)fooCounts.5.2 9

(Both rows #1 and #2 do not exist for time-mark greater than 5.)

• LastCreateTime tracks change of data with the changes in control in the control tables• Timefilter used to download only those rows that changed after a particular time

FooTable (bold indicating the indices):fooTimeMark fooIndex fooCounts

Network Management: Principles and Practice© Mani Subramanian 2000

8-9

Notes• Bold objects (fooTimeMark and fooIndex) are indices

Page 10: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Control and Data Tables

dataIndex

dataIndex

controlTableSize

controlTable

controlEntry

controlOwner

controlStatus

dataEntry

dataAddlIndex

Figure 8.4 Relationship between Control and Data Tables

Note on Indices: Indices marked in bold letter Value of dataIndex same as value of controlIndex

controlDataSource

controlOther

controlTableSize

controlOwner

controlStatus

controlDataSource

controlOther

dataOther

dataAddlIndex

dataOther

dataIndex

dataAddlIndex

dataOther

dataIndex

dataAddlIndex

dataOther

dataTable

controlIndex

controlIndex

Chapter 8

Notes• Control table used to set the instances of data rows in the data table • Values of data index and control index are the same

Network Management: Principles and Practice© Mani Subramanian 2000

8-10

Page 11: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Matrix Control and SD Tables

matrixSDDestinationAddress =193.5.8.20

matrixSDSource

Address =172.15.8.11

matrixSDSource

Address =172.15.8.11

matrixControl

TableSize =10

matrixControlTable

matrixControlEntry

matrixControl

Owner ="Bob"

matrixControl

Status = 1

matrixSDEntry

matrixSDDestinationAddress =192.7.8.11

Figure 8.4 Relationship between Control and Data Tables

Note on Indices: Indices marked in bold letter Value of dataIndex same as value of controlIndex

matrixControl

DataSource=ifIndiex.1

matrixControlLastDeleteTime

= 1000

matrixControl

TableSize =10

matrixControl

Owner ="Bob"

matrixControl

Status = 1

matrixControl

DataSource=ifIndiex.2

matrixControlLastDeleteTime

= 100050

matrixSD

Index =1

matrixSDDestinationAddress =199.5.8.20

matrixSD

Index =1

matrixSDSource

Address =172.16.8.16

matrixSD

Index =2

matrixSDSource

Address =172.16.8.20

matrixSDDestinationAddress =193.5.8.20

matrixSD

Index =2

matrixSDTable

matrixControl

Index = 1

matrixControl

Index = 2

matrixSD

Pkts =

matrixSD

Pkts =

matrixSD

Pkts =

matrixSD

Pkts =

Chapter 8

Notes• matrixSDTable is the source-destination table• controlDataSource identifies the source of the data• controlTableSize identifies entries associated with the data source• controlOwner is creator of the entry

Network Management: Principles and Practice© Mani Subramanian 2000

8-11

Page 12: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Host Top N Group ExampleHostTopN

0 100 200 300 400

Host 10

Host 9

Host 8

Host 7

Host 6

Host 5

Host 4

Host 3

Host 2

Host 1

Giga Octets

Figure 8.5 HostTop-10 Output Octets

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-12

Page 13: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Filter Group

filterChannelIndex

= 2

filterIndex= 2

filterIndex= 1

channelIndex =1

channelTable

channelEntry

channelIfIndex = 1

channelAcceptType

filterEntry

filterChannelIndex

= 1

Note on Indices: Indices marked in bold letter Value of filterChannelIndex same as value of channelIndex

channelDataControl

channelIndex = 2

channelIfIndex

channelAcceptType

channelDataControl

FilterParameters

filterChannelIndex

= 1

FilterParameters

filterIndex= 3

FilterParameters

filterIndex= 4

filterChannelIndex

= 2

FilterParameters

filterTable

OtherChannel

Parameters

OtherChannel

Parameters

Chapter 8

Notes• Filter group used to capture packets defined by logical expressions• Channel is a stream of data captured based on a logical expression • Filter table allows packets to be filtered with an arbitrary filter expression• A row in the channel table associated with multiple rows in the filter table

Network Management: Principles and Practice© Mani Subramanian 2000

8-13

Page 14: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Packet Capture Group

CaptureBufferTable(One entryper

Channel)

Chapter 8

Filter Table(many

for each

channel)

ChannelTable

Notes

• Packet capture group is a post-filter group• Buffer control table used to select channels• Captured data stored in the capture buffer table

Network Management: Principles and Practice© Mani Subramanian 2000

8-14

Page 15: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Notes

RMON TR Extension Groups

Chapter 8

Token Ring Group Function TablesStatistics Current utilization

and error statisticsof Mac Layer

tokenRingMLStatsTabletokenRingMLStats2Table

Promiscuous Statistics Current utilizationand error statisticsof promiscuousdata

tokenRingPStatsTabletokenRingPStats2Table

Mac-Layer History Historicalutilization anderror statistics ofMac Layer

tokenRingMLHistoryTable

Promiscuous History Historicalutilization anderror statistics ofpromiscuous data

tokenRingPHistoryTable

Ring Station Station statistics ringStationControlTableringStationTableringStationControl2Table

Ring Station Order Order of thestations

ringStationOrderTable

Ring StationConfiguration

Activeconfiguration ofring stations

ringStationConfigControlTableringStationConfigTable

Source Routing Utilization statisticsof source routinginformation

sourceRoutingStatsTablesourceRoutingStats2Table

• Two statistics groups and associated history groups• MAC layer (Statistics group) collects TR parameters • Promiscuous Statistics group collects packets promiscuously on sizes and types of packets

• Three groups associated with the stations• Routing group gathers on routing

Network Management: Principles and Practice© Mani Subramanian 2000

8-15

Page 16: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON2• Applicable to Layers 3 and above

• Functions similar to RMON1

• Enhancement to RMON1

• Defined conformance and compliance

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-16

Page 17: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

RMON2 MIB

Table 8.4 RMON2 MIB Groups and Tables

Group OID Function Tables Protocol Directory

rmon 11 Inventory of protocols protocolDirTable

Protocol Distribution

rmon 12 Relative statistics on octets and packets

protocolDistControlTable protocolDistStatsTable

Address Map rmon 13 Mac address to network address on the interfaces

addressMapControlTable addressMapTable

Network Layer Host

rmon 14 Traffic data from and to each host

n1HostControlTable n1HostTable

Network Layer Matrix

rmon 15 Traffic data from each pair of hosts

n1MatrixControlTable n1MatrixSDTable n1MatrixDSTable n1MatrixTopNControlTable n1MatrixTopNTable

Application Layer Host

rmon 16 Traffic data by protocol from and to each host

a1HostTable

Application Layer Matrix

rmon 17 Traffic data by protocol between pairs of hosts

a1MatrixSDTable a1MatrixDSTable a1MatrixTopNControlTable a1MatrixTopNTable

User History Collection

rmon 18 User-specified historical data on alarms and statistics

usrHistoryControlTable usrHistoryObjectTable usrHistoryTable

Probe Configuration

rmon 19 Configuration of probe parameters

serialConfigTable netConfigTable trapDestTable serialConnectionTable

RMON Conformance

rmon 20 RMON2 MIB Compliances and Compliance Groups

See Section 8.4.2

Chapter 8

Network Management: Principles and Practice© Mani Subramanian 2000

8-17

Page 18: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Notes

ATM RMON

Chapter 8

• ATM Forum extended RMON to ATM• Switch extensions and ATM RMON define objects at the base layer• ATM protocol IDs for RMON2 define additional objects at the higher levels• ATM devices require cell-based measurements and statistics• Probe should be able to handle high speed

Upper Layer ProtocolsRMON-2

(RFC 2021, 2074)

EthernetRMON

(RFC 1757)

Token RingRMON

(RFC 1513)

ATM Protocol IDs forRMON-2

(Additions to RFC 2074)

SwitchExtensionsfor RMON

ATMRMON

'Base' Layer

Network Layer

ApplicationLayer

IETF MIBs Additional MIBs

Figure 8.7 RMON MIB Framework (©1995 ATM Forum)

Network Management: Principles and Practice© Mani Subramanian 2000

8-18

Page 19: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

A Case StudyChapter 8

• A study at Georgia Tech on Internet traffic

• Objectives• Traffic growth and trend• Traffic patterns

• Network comprising Ethernet and FDDI LANs

• Tools used• HP Netmetrix protocol analyzer• Special high-speed TCP dump tool for FDDI LAN

• RMON groups utilized• Host top-n• Matrix group• Filter group• Packet capture group (for application level protocols)

Network Management: Principles and Practice© Mani Subramanian 2000

8-21

Page 20: Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian 2000 8-1

Case Study Results

Chapter 8

1. Growth Rate: Internet traffic grew at a significant rate from February toJune at a monthly rate of 9% to 18%. February to March 12% March to April 9% April to May 18%

Note: There is sudden drop in June due to end of spring quarter andsummer quarter starting.

2. Traffic Pattern:

Monthly / Weekly: Only discernible variation is lower traffic overweekends

Daily: 2/3 of the top 5% peaks occur in the afternoons

Users:Top six domain of users (96%) are Domain 1 20% Domain 2 30% Subdomain 1 (25%) Subdomain 2 (3%) Domain 3 34% Domain 4 7% Domain 5 3% Domain 6 2%

Top three hosts sending or receiving data Newsgroups Mbone Linux host

What we have learned :

1. The three top groups of users contributing to 84% of the Internet traffic arestudents (surprise!). Newsgroup services, and Domain 1.

2. Growth rate of Internet during the study period in spring quarter is 50%.

Network Management: Principles and Practice© Mani Subramanian 2000

8-22