Teknikker for fejlsøgning i netværk

456 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
456
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Teknikker for fejlsøgning i netværk

  1. 1. Network Instruments Troubleshooting Techniques
  2. 2. Key Elements <ul><li>Real Time Statistics </li></ul><ul><ul><li>Visual Network Traffic Flow </li></ul></ul><ul><li>Long Term Trending </li></ul><ul><ul><li>Capacity Planning, Baselining Networks </li></ul></ul><ul><li>Triggers and Alarms </li></ul><ul><ul><li>Proactive Problem Notification </li></ul></ul><ul><li>Distributed Network Analysis </li></ul><ul><ul><li>Single Point of Visibility Into Multiple Segments </li></ul></ul><ul><li>SNMP Management Console </li></ul><ul><ul><li>Standards Based Management for Networks and Devices </li></ul></ul><ul><li>Application Analysis </li></ul><ul><ul><li>Troubleshooting & Problem Identification </li></ul></ul>What to look for in network monitoring solutions…
  3. 3. Example #1 – Real-Time Troubleshooting <ul><li>Situation: A large Law firm has been experiencing network slowdowns during peak usage times. </li></ul><ul><li>Solution: Determine who or what is causing heightened levels of network activity at peak times. </li></ul>
  4. 4. Example #1 – Real-Time Troubleshooting Step 1: Check Bandwidth Utilization, which shows higher than expected utilization levels
  5. 5. Example #1 – Real-Time Troubleshooting Step 2: Review Top Talkers to determine active Backup Sessions during the afternoon are consuming network resources
  6. 6. Example #1 – Recap <ul><li>Situation: A large Law firm has been experiencing network slowdowns during peak usage times late in the afternoon. </li></ul><ul><li>Solution: Determine who or what is causing heightened levels of network activity at peak times. </li></ul><ul><li>Result: By reviewing Observer’s Real-Time Statistics, network administrators were able to quickly determined that backups were running during work hours and promptly reconfigured the backup schedule. </li></ul>Observer provides real-time identification of network issues for faster troubleshooting .
  7. 7. Example #2 – Proactive Discovery <ul><li>Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks. </li></ul><ul><li>Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms. </li></ul>
  8. 8. Example #2 – Proactive Discovery Step 1: Configure Triggers & Alarms for multiple probes from a single display
  9. 9. Example #2 – Proactive Discovery Step 2: Define alarms on each probe, customizing Observer for each network segment
  10. 10. Example #2 – Proactive Discovery Step 3: Set Variable Alarm Thresholds to help eliminate false positives
  11. 11. Example #2 – Proactive Discovery Step 4: Define the appropriate action(s) for each alarm configured
  12. 12. Example #2 – Recap <ul><li>Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks. </li></ul><ul><li>Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms. </li></ul><ul><li>Result: Using Observer’s Proactive Network Monitoring tools, the network operations team quickly identified a virus outbreak and prohibited illegal usage. </li></ul>Observer provides proactive discovery and notification of rogue elements .
  13. 13. Example #3 – Application Analysis <ul><li>Situation: An large accounting firm has the need to track and identify application metrics, such as response time, as well as troubleshoot application connections. </li></ul><ul><li>Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows. </li></ul>
  14. 14. Example #3 – Application Analysis Step 1: Monitor Application Level Response Time
  15. 15. Example #3 – Application Analysis Step 2: Examine Application Specific Statistics
  16. 16. Example #3 – Application Analysis Step 3: Review Graphical Application Flow Detail
  17. 17. Example #3 – Application Analysis <ul><li>Situation: An large accounting firm has the need to track and identify application metrics, such as response time, as well as troubleshoot application connections. </li></ul><ul><li>Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows. </li></ul><ul><li>Result: Isolate and identify application delay on the network, to put the responsibility on the proper group, and offer faster problem resolution for users. </li></ul>Observer allows you the ability to quickly differentiate between Network and Application Performance
  18. 18. Example #4 – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored </li></ul>
  19. 19. Example #4 – Forensic Analysis Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
  20. 20. Example #4 – Forensic Analysis Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
  21. 21. Example #4 – Forensic Analysis Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
  22. 22. Example #4 – Forensic Analysis Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
  23. 23. Example #4 – Forensic Analysis <ul><li>Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee. </li></ul><ul><li>Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored. </li></ul><ul><li>Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy. </li></ul>
  24. 24. From Hype to Adoption <ul><li>By 2009, there will be over 155 million business IP end points in operation </li></ul><ul><ul><li>http://www.instat.com/r/nrep/2004/IN0401446NT.htm </li></ul></ul><ul><li>Market researchers expect the number of VoIP users worldwide to increase from around five million in 2004 to 200 million subscribers in 2010 </li></ul><ul><ul><li>http://www.heise.de/english/newsticker/news/64129 </li></ul></ul><ul><li>VoIP service is expected to grow 18-fold – from $1.25 billion in 2004 to $23.4 billion in 2009 – representing total revenues of $62 billion to be spent on the technology over the five-year period. </li></ul><ul><ul><li>http://www.techweb.com/wire/networking/172900487 </li></ul></ul>
  25. 25. Enterprise Pricing
  26. 26. Enterprise Pricing <ul><li>VoIP Analysis included at no additional charge </li></ul><ul><li>Shipped with a 64-bit Core, with support for 32-bit systems </li></ul><ul><li>Gigabit and WAN Appliances are all 64-bit systems </li></ul>Network Instruments continues to lead the analysis industry in performance and value $ 2,495 Includes VoIP 10/100/1000 Probe Appliance $ 35,000 Includes VoIP 4 TB GigaStor $ 50,000 Includes VoIP 8 TB GigaStor $ 11,995 Includes VoIP Gigabit Probe Appliance $ 3,995 Includes VoIP Observer Suite $ 2,895 Includes VoIP Expert Observer

×