Flightcase offers managed IT Support Services, Network Monitoring Center, remote monitoring management, Telecom Management services and 24 / 7 Outsourced noc Services that helps industries for their business growth.
2. 2 RMON is designed for “flow-based” monitoring,
while SNMP
is often used for “device-based” management.
RMON is similar to other flow-based monitoring
technologies such as NetFlow and SFlow because the
data collected deals mainly with traffic patterns
rather than the status of individual devices.
One disadvantage of this system is that remote
devices shoulder more of the management burden
and require more resources to do so. Some devices
balance this trade-off by implementing only a subset
of the RMON MIB groups (see below). A minimal
RMON agent implementation could support only
statistics, history, alarm, and event.
Remote Network Monitoring
3. Table of Contents
Basic Concepts
RMON Goals
RMON MIB Table Management
RMON MIB Groups
RMON2
3
4. RMON Basic Concepts
Extends the SNMP functionality without changing the
protocol
Allows the monitoring of remote networks
(internetwork management)
MAC-layer (layer 2 in OSI) monitoring
Defines a Remote Monitoring (RMON) MIB that
supplements MIB-II
with MIB-II, the manager can obtain information on individual devices only
with RMON MIB, the manager can obtain information on the LAN as a whole
called network monitors, analyzers or probes
4
5. RMON Goals
Monitoring subnetwork-wide behavior
Reducing the burden on agents and managers
Continuous off-line monitoring in the presence of
failures (in network or manager)
Proactive monitoring
perform some of the manager functions (e.g.,
diagnostics)
Problem detection and reporting
Provide value-added (analyzed) data
Support multiple managers
5
6. Example Configuration for Remote
Monitoring6
BridgeBridge
RouterRouter
RouterRouter
RouterRouter
RouterRouter
FDDI backbone
Token Ring LAN
Router with
RMON probe
Management console
with RMON probe
Central
Site
Local management
console with
RMON probe
PC with
RMON probe
PC with
RMON probe
Ethernet
Ethernet
Ethernet
7. Example of RMON probe with two
interfaces
7
agent
a
agent
b
RMON
probe
agent
c
agent
e
agent
d
Interface 1
Interface 2
Subnetwork
X
Subnetwork
Y
8. Control of Remote Monitors
RMON MIB contains features that support extensive control
from NMS
Configuration control
Action Invocation
RMON MIB is organized into a number of functional groups
Each group may contain one or more control tables and one or
more data tables
Control table (typically read-write) contains parameters that
describe the data in a data table (typically read-only)
8
9. Configuration Control
At configuration time, NMS sets the appropriate
control parameters to configure the remote monitor to
collect the desired data
the parameters are set by adding a new row to the control table or by modifying an
existing row
a control table may contain objects that specify the source of data to be collected, the
type of data, the collection timing, etc.
To modify or disable a particular data collection
function:
it is necessary first to invalidate the control row
this causes the deletion of that row and the deletion of all associated rows in data tables
NMS can create a new control row with the modified parameters
9
10. Transitions of EntryStatus State10
create
Request
non-
existent
under
Creation valid
invalidperformed by manager
performed by agent
12. RMON MIB2
RMON MIB monitors MAC-level subnet traffic
RMON MIB2 can monitor traffic of packets at layers 3 to
7 of the OSI Reference Model
Provides Network-layer Visibility
can distinguish between local LAN and remote LAN traffic
Provides Application-layer Visibility
can analyze traffic to and from hosts for particular
applications
can determine which applications are putting the load on the
net
RMON MIB2 is basically an extension of RMON MIB
12
14. Summary
RMON extends the SNMP functionality without
changing the protocol
RMON can monitor information on a whole
subnetwork
RMON is used extensively in analyzing network
traffic for problem detection and network planning
RMON2 can be used to analyze network traffic more
accurately even to the application level
14