Aveneu Park, Starling, Australia

The that indicates us in to the problem’s root

The flow based Protocol

It is discussed the management protocol with the needs of
configuration management and troubleshooting capabilities with tools such as
ping and talent. Network requires few components advance analysis capabilities
that are not assailable with basic tools. When the network downs/slow then we
need additional functionality that indicates us in to the problem’s root cause.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Traditional tools attain this deep troubleshooting have
often attract on pocket analysis and inspection. These tools are not built up
to give view of network behavior. Their low level overview does not provide
kind of information that explain how the data moves around the network.

Required that high level of overview through which anyone
can look at high level flows to sharply isolate bandwidth utilization and
identify the traffic behaviors based on ports, protocols, endpoints and network
application.

That high level overview is achieved through protocols
commonly referred as Net Flow.

Net Flow, J-flow, sFlow and IPFIX

Generally uses the term of NetFlow, actually the Netflow
protocol is a developed by Cisco systems.

Four versions of Cisco’s NetFlow protocol are in use today.

1. NetFlow version 5: It was developed by Cisco but nowadays
is in the use of other vendors

2. NetFlow version 7: Not used nowadays specific to catalyst
switches Cisco.

3. NetFlow version 8: It is introduced by aggregation
technology but not in the used nowadays superseded by version 9.

4. NetFlow version 9: Most common version, includes aggregation
features and flexible NetFlow concepts.

Set Of operational Functionality

•       J-Flow:   Introduced by
Juniper networks for the use in their hardware.

•        sFlow:   A stander based implementation whose
development is shared by HP.

•       IPFIX:     It is
considered as the next version of NetFlow or NetFlow version 10. It includes
template based exporting of data.

Advantages of NetFlow

The power the flow based protocol is in their pervasiveness.
The necessary code and processing to enable and use flow based protocols is
already included in all network hardware components require to have enable to
begin enjoying its analysis capabilities.

Windows Management Instrumentation

›   
Microsoft for its windows
OS has developed the MWI protocols as the alternative of SNMP. This remote
monitoring and management protocols includes Microsoft’s implementation of the
web-based Enterprise management (WBEM) common information Model (CMI) standards
from the distributed management task force (DMTF). WMI is like SNMP, WMI can be
used for gathering metrics data and updating configuration.

›   
WMI is little different
from SNMP like WMI’s database can be interfaced.

›   
SNMP’s response activity is
defined directly in SNMP but WMI response can be protected into one or more
languages.

Remote Desk Protocol

›   
RDP became in use since its
inception with Windows NT 4.0 server, terminal edition.

›   
Basically RDP designed for
specification use in connecting remote users to applications on a centralized
set of server.

›   
RDP works over target port
3389/TCP.

›   
RDP’s stream is able to
pass updates across very low bandwidth connection.

Secure Shell (SSH)

›   
SSH or “Secure Shell ”
command has better environments superseded telnet. It is better for connecting
to remote secure and desktop.

›   
SSH was developed in 1995.
It uses public key cryptography to authenticate the remote compute create
connection. 

›   
Ensure both data integrity
and confidentiality.

Syslog

›   
Syslog is a tool where
event log information from one or more servers or devices can be aggregated
into a single database for storage and historical analysis.

IP Service Level Agreement

›   
The IP service level
agreement (IPSLA) produced another tool by which statistics, other performance
and utilization metrics can be measured across network wire.

›   
The information achieved
with IPSLA is often used for the same purpose of troubleshooting and analysis
activities as in NetFlow data.

›   
The data achieved by
enabling IPSLA metrics is different because it includes the result of series of
ongoing “test” that are preconfigured for network devices.

›   
These tests are used to
validate connectivity and to evaluate rapid performance metrics across
individual interfaces.

›   
The “SLA” in “IPSLA” refers
this protocol capability to automatically and repeatedly test wither a
particular network behavior is functioned or not to desired level.

 

x

Hi!
I'm Edward!

Would you like to get a custom essay? How about receiving a customized one?

Check it out