RMON:Remote Monitoring presentation
Active In SP
Joined: Mar 2010
23-04-2010, 02:22 PM
RMON .ppt (Size: 2.33 MB / Downloads: 232)
5 resources per location-24X7 monitoring
No continuous monitoring of the network
No proactive alerting mechanism
What is RMON?
RMON is the common abbreviation for Remote Monitoring, a system defined by the IETF that allows you to monitor the traffic of LANs or VLANs remotely.
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of local area networks (LANs) from central location.
Remote Monitoring (RMON) is an extension to the SNMP MIB, and includes two versions â€œ RMON and RMON 2.
MIB - A Management Information Base (MIB) is a collection of information that is organized hierarchically. MIBs are accessed using a network-management protocol such as SNMP. They are comprised of managed objects and are identified by object identifiers.
Goals of RMON
RMONâ„¢s primary goal is to provide information relating to network errors and utilization. RMON data is gathered as part of ten different monitoring groups.
There are sometimes conditions when a management station will not be in constant contact with its remote monitoring devices. Probes will perform diagnostics and to collect statistics continuously, even when communication with the management station may not be possible or efficient
Proactive Monitoring :
Continuously run diagnostics and log network performance and notify the management station of the failure and store historical statistical information about the failure.
Problem Detection and Reporting :
The monitor can be configured to recognize conditions, most notably error conditions, and to continuously check for them. When one of these conditions occurs, the event may be logged, and management stations may be notified in a number of ways.
Value Added Data :
Highlighting those hosts on the network that generate the most traffic or errors, the probe can give the management station precisely the information it needs to solve a class of problems.
Versions of RMON
RMON was originally developed to address the problem of managing LAN segments and remote sites from a Central Location
There are two versions of RMON, RMON 1 & RMON 2:
It defines 10 MIB groups for basic monitoring.
It allows network monitoring at MAC layer or below
RMON1 was only capable of providing information up to the MAC level,
This is an extension of RMON 1 that focustes on higher layesrs of traffic above the MAC layer
It has an emphasis on IP traffic and application level traffic
It allows network management applications to monitor packets on all network layers.
RMON 2 is capable of monitoring traffic up to the application level.
Components of RMON
A typical RMON setup consists of two components:
The RMON probe â€œ An intelligent, remotely-controlled device or software agent that continually collects statistics about a LAN segment or VLAN, and transfers the information to a management workstation on request or when a pre-defined threshold is crossed.
It collects information according to the traffic that passes through it, providing information about the health of the network itself, rather than a particular device.
The management workstation - Communicates with the RMON probe and collects the statistics from it. The workstation does not have to be on the same network as the probe and can manage the probe by in-band or out-of-band connections.
RMON1 Groups & Functions
RMON delivers information in nine RMON groups of monitoring elements, each providing specific sets of data to meet common network-monitoring requirements.
The Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts and errors on a LAN segment or VLAN. Information from the Statistics group is used to detect changes in traffic and error patterns in critical areas of your network.
The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group. The group is useful for analyzing the traffic patterns and trends on a LAN segment or VLAN, and for establishing the normal operating parameters of your network.
The Alarms group provides a mechanism for setting thresholds and sampling intervals to generate events on any RMON variable. Alarms are used to inform you of network performance problems and they can trigger automated responses through the Events group.
The Hosts group specifies a table of traffic and error statistics for each host (endstation) on a LAN segment or VLAN. Statistics include packets sent and received, octets sent and received, as well as broadcasts, multicasts, and error packets sent. The group supplies a list of all hosts that have transmitted across the network.
Hosts Top N
The Hosts Top N group extends the Hosts table by providing sorted host statistics, such as the top 20 hosts sending packets or an ordered list of all hosts according to the errors they sent over the last 24 hours.
The Matrix group shows the amount of traffic and number of errors between pairs of devices on a LAN segment or VLAN. For each pair, the Matrix group maintains counters of the number of packets, number of octets, and error packets between the hosts. The conversation matrix helps you to examine network statistics in more detail to discover, for example, who is talking to whom or if a particular PC is producing more errors when communicating with its file server.
The Events group provides you with the ability to create entries in an event log and send SNMP traps to the management workstation. Events can originate from a crossed threshold on any RMON variable. In addition to the standard five traps required by SNMP (link up, link down, warm start, cold start, and authentication failure), RMON adds two more: rising threshold and falling threshold.
Enables packets to be matched by a filter equation. These matched packets form a data stream that might be captured or that might generate events.
Enables packets data such as the size of buffer, no of packets captured after they flow through the channel.
This is optional for Token Ring Networks.
Working of the RMON
FDDI Backbone network with a local Ethernet LAN, two remote LANS, one is a token ring LAN and the other an FDDI Lan.
NMS is on the the local Ethernet LAN
Ethernet Local LAN is monitored by the Ethernet probe on the LAN.
The FDDI backbone is monitored by an FDDI probe via the bridge and Ethernet LAN.
Token Rink is monitored by the token ring probe
The FDDI LAN is monitored by the built in probe on the router.
Both the remote LANs communicate with the NMS via the routers, the WAN and the backbone network,
RMON devices monitors the local network segment & does the necessary analyses and informs the NMS only when there are exceptions or NMS requests for some info.
This reduces the traffic especially on the segment in which the NMS resides, as all the monitoring traffic would otherwise converge there.
Set thresholds on a variety of items affecting network performance
When the thresholds are crossed, events are reported.
In general, the values of thresholds are determined according to past experience.
Centralized monitoring of the entire network
Few skilled resources requirement
Proactive alert mechanism is available
Better trouble shooting & reduced time for troubleshooting
Historical trend analysis
Decision making-performance tuning
Advantages of RMON
It improves your efficiency -Using RMON probes allows you to remain at one workstation and collect information from widely dispersed LAN segments or VLANs. This means that the time taken to reach a problem site, set up equipment, and begin collecting information is largely eliminated.
It allows you to manage your network in a more proactive manner- If they are configured correctly, RMON probes deliver information before problems occur. This means that you can take action before they affect users.
It reduces the load on the network and the management workstation Traditional network management involves a management workstation polling network devices at regular intervals to gather statistics and identify problems or trends. As network sizes and traffic levels grow, this approach places a strain on the management workstation and also generates large amounts of traffic. An RMON probe, however, autonomously looks at the network on behalf of the management workstation without affecting the characteristics and performance of the network. The probe reports by exception, which means that it only informs the management workstation when the network has entered an abnormal state.
Increases Productivity for administrators.
Permits monitoring on a more frequent basis and hence faster fault diagnosis.
Needs no direct visibility by NMS; more reliable information.
Disadvantages of RMON
The amount of information it provides is insufficient for network managers and administrators who need to solve complex problems, often at a distance.
The mechanism employed for data retrieval to a central management console are slow and very bandwidth inefficient.
RMON values are stored in 32 bit registers which limit the count value to 4,294,967,295. Although a seemingly large value, this is actually quite small. In a 100 Mbps fast Ethernet network running at just 10% loading, the counters will be reset to zero after just one hour of acitivity.
Full RMON support in hardware typically requires dedicated RISC processor technology and this is achievable in sub -$1,000 routers, hubs etc.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Joined: Apr 2012
18-04-2012, 10:59 AM
rmon.ppt (Size: 1.79 MB / Downloads: 131)
Remote NM Goals
Perform diagnostics and to collect statistics continuously, even when communication with the management station may not be possible or efficient.
Continuously run diagnostics and log network performance.
Problem Detection and Reporting
Given conditions, the probe continuously to check for them.
If there any condition occurs, notify the manager.
Value Added Data
Who generate the most traffic or errors, …
Monitors and analyzes locally and relays data;Less load on the network
Needs no direct visibility by NMS;More reliable information
Permits monitoring on a more frequent basisand hence faster fault diagnosis
Increases productivity for administrators
Joined: Apr 2012
01-08-2012, 12:17 PM
remote monitoring project report.doc (Size: 341 KB / Downloads: 21)
To provide a customer(Server) with a software which can retrieve the process which are running on the other computers(Clients) as well as the screen shot connected in LAN without the information to person sitting on the client system.
The Server side module:- This module contains the frame for UI(user interface). Here user can select the computer no. for which he wants the information.
The user have the choice - to retrieve the processes running on the client system or the screen print.
First the sever grant the connection requested by different clients and save the information about the client like the computer no and the corresponding socket object.
PROGRAMMNG LANGUAGE: JAVA an Overview
Computer programming is not as hard as people think. Java is the most exciting programming language that has been released in a decade because of the things it make possible.You can add animation to World Wide Web page, write games and useful utilities, create programes that sport a graphical user interface,and design software that makes the most of the internet.
Java is an object oriented language. This means that a language is based on the concept of an object. Although knowledge of object oriented programming is necessary to put java to practical use, it isn’t r equired to understand the fundamentals of the java language. For example, because Java borrows much of it’s syntax and many of it’s concepts from c and c++, there is a preexisting pool of programmers who could quickly learn Java . How ever , Java goes far beyond being a mere derivative of C++. It adds to C++ in the areas of automatic memory management and language level support for multithreaded applications.
Because of Java’s streangth as an internet language many of these same strength apply when Java is used as a language for client server development. It is very likely that as corporation do more and more Internet development in Java ,they will begin to apply these same java developers to their client-server project and implimentations .Java’strengths in terms of network awareness ,security,portability.
And performance make it ideally suited for corporate client-server development,as well as Internet development
Feature of the Java Language
If you have experience with any object-oriented language,especially C++ ,you probably will find Java to be than your high school prom data.BecauseJava statrted out as C++but has certain features removed, it is certaintly a simpler language than C++.The simplicity of Java is enhanced by its similarties to C& C++. Bcause many of today’s current programmers, especially those likely to consider using Java,are experienced in at least Cand probablyC++,Java is instantly familiar to those programmers.
Of course ,java is object-oriented .In fact ,in the mid -1990, it’s hard to0 imagine someone developing a ne language and declaring it’s the greatest new thing without its being object-orineted.Java classes are comprised of methods and variable .Class methods are the function that a objectof the class can respond to.Class variables are the data that define the state of an onject.In Java,methods and variables can be declared as private,protected,or public .private methods and variables are not accessible outside of the class protected member are accessible to subclass of the class,but not to other classes .Finally,public methods and variables are accessible to any class
The designers of Java anticipated that it would be used to solve some very complex programming problems.Writing a distributed ,multithreaded program that can run on a variety operating systems with a variety of processors is not a simple task.With this in mind ,Java was created as astrongly typedlanguage .Data type issues and problems ars resolved at compile –time ,and implicit casts of avariable from one type to another are not allowed.Memory management has been simplified in Java in two ways.First ,Java does not support direct pointer manipulation or arithmetic .this makes it impossible for a Java Program to override memory or corrupt data. Second ,Java uses runtime garbage collection instead of explicit freeing of memory .
It was anticipated that Java application would run on the Internet and that they could dynamically incorporate or execute code found at remote location on the Internet .Because of this ,the developers of Java hypothesized the existence of hostile Java compiler that would generate java byte codes with the intent of bypassing Java’sruntime security .This led to the concept of a byte-code verifier.The byte-code verifier examines all incoming code to ensure that the code plays by the rules and is safe to execute.In addition to other properties thebyte code verifier ensures the following :
. No pointer are forged.
.No illegal object casts are performed.
.There will be no operand stack overflow or underflow.
. All parameters passed to function are of the proper are of the proper types.rules regarding private protected and public class membership are followed.ed
Java Is Interpreted and Portable
While it is true that compiled code will almost always run more quickly than interpreted code ,it is also true that interpreted code can usually be developed and fielded more inexpensively ,more quickly,and in a moremore flexible manner.Its is also usually much more portable.Java ,in order to be truly platform-independent .It does not run as fast as compiled native code ,but it doesn’t run much slower ,either .Because of Java’s interpreted nature ,linking is also more powerful and flexble.Java’s runtime system supports dyanamic linking between local class files and those that are downloaded from across the Internet .This feature provides the basis foe web programming.