Chapter 17: Analyzing Applications 17-1 Copyright © 1998, Cisco Systems, Inc.

Презентация:



Advertisements
Похожие презентации
Chapter 16: Analyzing Network Protocols 16-1 Copyright © 1998, Cisco Systems, Inc.
Advertisements

Chapter 15: Analyzing Network Traffic 15-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 19: Decoding Application-Layer Protocols 19-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 13: Monitoring Device Availability 13-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 6: Documenting the Network Topology 6-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 7: Planning Ethernet VLANs 7-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 2: Product Overview 2-1 Copyright © 1998, Cisco Systems, Inc.
Copyright 2003 By Your Name CCNA 3 Chapter 1 Review: The OSI Reference Model and Routing.
© 2004 Cisco Systems, Inc. All rights reserved. IPTT v AVVID Troubleshooting Tools Applying Cisco CallManager and Operating System Troubleshooting.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Understanding the OSI Model.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Ensuring the Reliability of Data Delivery Understanding How UDP and TCP Work.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Developing an Enterprise Network Management Strategy ARCH v
Chapter 11: Performing Device Configuration 11-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Completing ISDN Calls Configuring ISDN BRI and PRI.
Chapter 23: Managing Private Network-Network Interfaces 23-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v Manipulating Routing Updates Operating a Network Using Multiple IP Routing Protocols.
Chapter 1: Course Introduction 1-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Behavior Investigation.
Транксрипт:

Chapter 17: Analyzing Applications 17-1 Copyright © 1998, Cisco Systems, Inc.

17-2MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Identify why specific application- layer statistics should be monitored Identify which application-layer statistics to monitor for different situations Identify when to monitor application- layer statistics Objectives

17-3MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Customize and install SwitchProbe® domains Identify utilization by application protocol Display utilization over time Identify most active hosts and host conversations Objectives (cont.)

17-4MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Optimizing application behavior, network segmentation, and route prioritizing Troubleshooting complex communication failures Troubleshooting by identifying what works and eliminating it Planning moves and network maintenance Why Should Applications Be Monitored

17-5MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Most active applications Conversation pairs and top talkers Overall traffic patterns Traffic flow between devices Peak loads and error rates Security risks Which Applications Should Be Monitored?

17-6MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Establishing baselines before and after any change Continuously monitoring for fault identification, resource planning, and security risks Real-time monitoring for trouble location Real-time monitoring for repair verification When Should Applications Be Monitored?

17-7MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Identifying Utilization by Application

17-8MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Displaying Utilization over Time

17-9MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Identifying Most Active Hosts

17-10MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Identifying Host Conversations

17-11MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Identify why specific application- layer statistics should be monitored Identify which application-layer statistics to monitor for different situations Identify when to monitor application- layer statistics Summary

17-12MCSIAnalyzing Applications Copyright © 1998, Cisco Systems, Inc. Customize and install and SwitchProbe domains Identify utilization by application protocol Display utilization over time Identify most active hosts and host conversations Summary (cont.)