12
Wednesday Breakout Session (Group 7) • Members Terry Davis (University of Arkansas) Tim Husted (Albany State University) Laurie Burns (Internet 2) Ken Payne (University of Georgia) David Matthews-Morgan (University of Georgia) The GA Tech guys

Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

Embed Size (px)

Citation preview

Page 1: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

Wednesday Breakout Session (Group 7)

• Members

– Terry Davis (University of Arkansas)

– Tim Husted (Albany State University)

– Laurie Burns (Internet 2)

– Ken Payne (University of Georgia)

– David Matthews-Morgan (University of Georgia)

– The GA Tech guys

Page 2: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

Current practices - Describe the current state of end-to-end practices

Page 3: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

How do you know that the network is working correctly?

• No user complaints

• (User complaints = working as usual :)

• No monitoring system alarms

Page 4: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

How do you tell where the problem is for an application?

• HelpDesk collects problem details (know what to ask)

• Technician

– identifies network elements & pathways

– systematically narrows scope of problem (divide & conquer) until faulty component identified

Page 5: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What are the three most effective tools you use now?

• ICMP tools (ping/traceroute)

• Protocol analyzers (Sniffer/EtherPeek)

• Time-series graphs (Cricket/MRTG)

Page 6: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What existing resources (websites, databases, etc.) do you use and find helpful?

• Home-grown databases of network info (with Web front-ends)

• Vendor-specific technical sites

– Microsoft

– Cisco

– Novell

• Collaborative network analysis tool sites (e.g., www.caida.org)

• Technical e-mail lists (human experts)

Page 7: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

Looking Toward the Future - Describe what you need to make end-to-end work

Page 8: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What is your greatest need to provide end-to-end performance?

• Streaming media

• Multicast applications

• Bioinformatics

• Geographical information systems

• Peer-to-peer applications (whether we want them or not)

Page 9: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What should be the communications flow to resolve an end-to-end problem

• Consistent point of contact for problem reporting (HelpDesk)

• Collect sufficient info to characterize problem

• Notify relevant problem solvers until resolved

Page 10: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What information do you need from the various parts of the path?

• Can the end-to-end devices communicate through the path?

• Can parts of the path provide and guarantee network characteristics needed for satisfactory application performance?

• Do the end-to-end devices have sufficient internal resources to adequately exchange information (hardware, software, application design, etc.)?

Page 11: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What is the right balance between privacy (or security?) and providing information to operate the

network?

• Network information provided on a need-to-know basis

• Problem solvers need access to more specific info

• End users need easy-to-understand state of the network info

Page 12: Wednesday Breakout Session (Group 7) Members –Terry Davis (University of Arkansas) –Tim Husted (Albany State University) –Laurie Burns (Internet 2) –Ken

What features and functions would inspire you to use and contribute to the knowledgebase?

• Easy-to-use and consistent knowledge input mechanism

• Natural language queries that return high hit rates (tall order!)