Chapter 16: Analyzing Network Protocols 16-1 Copyright © 1998, Cisco Systems, Inc.

Презентация:



Advertisements
Похожие презентации
Chapter 17: Analyzing Applications 17-1 Copyright © 1998, Cisco Systems, Inc.
Advertisements

Chapter 15: Analyzing Network Traffic 15-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 13: Monitoring Device Availability 13-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 19: Decoding Application-Layer Protocols 19-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 11: Performing Device Configuration 11-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 23: Managing Private Network-Network Interfaces 23-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 2: Product Overview 2-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 8: Creating Ethernet VLANs 8-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 7: Planning Ethernet VLANs 7-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 5: Configuring Devices for Management 5-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 21: Managing ATM VLANs 21-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports.
© 2004 Cisco Systems, Inc. All rights reserved. IPTT v AVVID Troubleshooting Tools Applying Cisco CallManager and Operating System Troubleshooting.
Chapter 6: Documenting the Network Topology 6-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 1: Course Introduction 1-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 22: Managing Virtual Channels 22-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 9: Creating Dynamic VLANs 9-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 20: Documenting the ATM Network Topology 20-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 3: Installing CRM and CWSI on Windows NT 3-1 Copyright © 1998, Cisco Systems, Inc.
Транксрипт:

Chapter 16: Analyzing Network Protocols 16-1 Copyright © 1998, Cisco Systems, Inc.

16-2MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identify why specific network-layer statistics should be monitored Identify which network-layer statistics to monitor for different situations Identify when to monitor specific network- layer statistics Configure SwitchProbe® agents Upon completion of this chapter, you will be able to: Objectives

16-3MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Customize and install SwitchProbe domains Identify utilization by network protocol Identify utilization by application protocol Identify the most active hosts Identify conversation pairs Objectives (cont.)

16-4MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Plan moves and network maintenance Optimize routes Optimize network backups Troubleshoot communication failures for a specific protocol Identifying the use of illegal protocols or unauthorized servers Why Should Network Protocols Be Monitored?

16-5MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Conversations for troubleshooting and resource planning Traffic flow between devices Overall traffic patterns Peak loads, top talkers, and error rates Which Network Protocols Should Be Monitored?

16-6MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Establish baselines before and after any change Continuously monitor for fault identification and capacity planning Verify trouble location and protocol level Verify repair When Should Network Protocols Be Monitored?

16-7MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identifying Utilization by Network Protocol

16-8MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identifying Utilization by Application Protocol

16-9MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identifying Protocol Utilization over Time

16-10MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identify the Most Active Hosts

16-11MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identifying Protocol Conversations

16-12MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Identify why specific network-layer statistics should be monitored Identify which network-layer statistics to monitor for different situations Identify when to monitor specific network-layer statistics Configure SwitchProbe agents Summary

16-13MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Customize and install SwitchProbe domains Identify utilization by network protocol Identify utilization by application protocol Identify the most active hosts Identify conversation pairs Summary (cont.)

16-14MCSIAnalyzing Network Protocols Copyright © 1998, Cisco Systems, Inc. Blank for IG Pagination