26
Network In s t r u m e n t s Tr o u b le s h o o t in g Te c h n iq u e s

Teknikker for fejlsøgning i netværk

Embed Size (px)

Citation preview

Page 1: Teknikker for fejlsøgning i netværk

N e t w o r kIn s t r u m e n t s

Tr o u b le s h o o t in gTe c h n iq u e s

Page 2: Teknikker for fejlsøgning i netværk

What to look for in network monitoring solutions…What to look for in network monitoring solutions…

K e y E le m e n t s

Real Time Statistics Visual Network Traffic Flow

Long Term Trending Capacity Planning, Baselining Networks

Triggers and Alarms Proactive Problem Notification

Distributed Network Analysis Single Point of Visibility Into Multiple Segments

SNMP Management Console Standards Based Management for Networks and Devices

Application Analysis Troubleshooting & Problem Identification

Page 3: Teknikker for fejlsøgning i netværk

#1 – - E x a m p le R e a l T im eTr o u b le s h o o t in g

Situation: A large Law firm has been experiencing network slowdowns during peak usage times.

Solution: Determine who or what is causing heightened levels of network activity at peak times.

Page 4: Teknikker for fejlsøgning i netværk

Step 1: Check Bandwidth Utilization, which shows higher than expected utilization levels

#1 – - E x a m p le R e a l T im eTr o u b le s h o o t in g

Page 5: Teknikker for fejlsøgning i netværk

Step 2: Review Top Talkers to determine active Backup Sessions during the afternoon are consuming network resources

#1 – - E x a m p le R e a l T im eTr o u b le s h o o t in g

Page 6: Teknikker for fejlsøgning i netværk

Observer provides real-time identification of network issues for faster troub leshooting .

#1 – E x a m p le R e c a p

Situation: A large Law firm has been experiencing network slowdowns during peak usage times late in the afternoon.

Solution: Determine who or what is causing heightened levels of network activity at peak times.

Result: By reviewing Observer’s Real-Time Statistics, network administrators were able to quickly determined that backups were running during work hours and promptly reconfigured the backup schedule.

Page 7: Teknikker for fejlsøgning i netværk

#2 – E x a m p le P r o a c t iv eD is c o v e r y

Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks.

Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms.

Page 8: Teknikker for fejlsøgning i netværk

Step 1: Configure Triggers & Alarms for multiple probes from a single display

#2 – E x a m p le P r o a c t iv eD is c o v e r y

Page 9: Teknikker for fejlsøgning i netværk

Step 2: Define alarms on each probe, customizing Observer for each network segment

#2 – E x a m p le P r o a c t iv eD is c o v e r y

Page 10: Teknikker for fejlsøgning i netværk

Step 3: Set Variable Alarm Thresholds to help eliminate false positives

#2 – E x a m p le P r o a c t iv eD is c o v e r y

Page 11: Teknikker for fejlsøgning i netværk

Step 4: Define the appropriate action(s) for each alarm configured

#2 – E x a m p le P r o a c t iv eD is c o v e r y

Page 12: Teknikker for fejlsøgning i netværk

Observer provides proactive discovery and notification of rogue e lements .

#2 – E x a m p le R e c a p

Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks.

Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms.

Result: Using Observer’s Proactive Network Monitoring tools, the network operations team quickly identified a virus outbreak and prohibited illegal usage.

Page 13: Teknikker for fejlsøgning i netværk

#3 – E x a m p le Ap p lic a t io nAn a ly s is

Situation: An large accounting firm has the need to track and identify application metrics, such as response time, as well as troubleshoot application connections.

Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows.

Page 14: Teknikker for fejlsøgning i netværk

Step 1: Monitor Application Level Response Time

#3 – E x a m p le Ap p lic a t io nAn a ly s is

Page 15: Teknikker for fejlsøgning i netværk

Step 2: Examine Application Specific Statistics

#3 – E x a m p le Ap p lic a t io nAn a ly s is

Page 16: Teknikker for fejlsøgning i netværk

Step 3: Review Graphical Application Flow Detail

#3 – E x a m p le Ap p lic a t io nAn a ly s is

Page 17: Teknikker for fejlsøgning i netværk

Observer allows you the ability to quickly differentiate between Network and Application Performance

#3 – E x a m p le Ap p lic a t io nAn a ly s is

Situation: An large accounting firm has the need to track and identify application metrics, such as response time, as well as troubleshoot application connections.

Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows.

Result: Isolate and identify application delay on the network, to put the responsibility on the proper group, and offer faster problem resolution for users.

Page 18: Teknikker for fejlsøgning i netværk

#4 – E x a m p le F o r e n s icAn a ly s is

Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee.

Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored

Page 19: Teknikker for fejlsøgning i netværk

Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface

#4 – E x a m p le F o r e n s icAn a ly s is

Page 20: Teknikker for fejlsøgning i netværk

Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe

#4 – E x a m p le F o r e n s icAn a ly s is

Page 21: Teknikker for fejlsøgning i netværk

Step 3: Complex filters can be created automatically, and will be run against the specified timeframe

#4 – E x a m p le F o r e n s icAn a ly s is

Page 22: Teknikker for fejlsøgning i netværk

Step 4: Complete reconstruction capabilities allow an administrator to reassemble orig inal documents such as emails, IM conversations, web pages, and even VoIP calls

#4 – E x a m p le F o r e n s icAn a ly s is

Page 23: Teknikker for fejlsøgning i netværk

#4 – E x a m p le F o r e n s icAn a ly s is

Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee.

Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabitline speed, to ensure all necessary data is captured and stored.

Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy.

Page 24: Teknikker for fejlsøgning i netværk

F r o m H y p e t o Ad o p t io n

By 2009, there will be over 155 million business IP end points in operation http://www.instat.com/r/nrep/2004/IN0401446NT.htm

Market researchers expect the number of VoIP users worldwide to increase from around five million in 2004 to 200 million subscribers in 2010 http://www.heise.de/english/newsticker/news/64129

VoIP service is expected to grow 18-fold – from $1.25 billion in 2004 to $23.4 billion in 2009 – representing total revenues of $62 billion to be spent on the technology over the five-year period. http://www.techweb.com/wire/networking/172900487

Page 25: Teknikker for fejlsøgning i netværk

E n t e r p r is eP r ic in g

Page 26: Teknikker for fejlsøgning i netværk

E n t e r p r is e P r ic in g

VoIP Analysis included at no additional charge Shipped with a 64-bit Core, with support for 32-bit systems Gigabit and WAN Appliances are all 64-bit systems

$ 2,495 Includes VoIP10/100/1000 Probe Appliance

$ 35,000Includes VoIP4 TB GigaStor

$ 50,000Includes VoIP8 TB GigaStor

$ 11,995Includes VoIPGigabit Probe Appliance

$ 3,995Includes VoIPObserver Suite

$ 2,895Includes VoIPExpert Observer

Network Instruments continues to lead the analysis industry in performance and value