Automated Fault Management. Lecture 20: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG
|
|
- Warren Blake
- 6 years ago
- Views:
Transcription
1 Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG
2 Fault Management Fault Management consists of 5 steps: 1. Fault detection 2. Fault location 3. Service restoration 4. Identification of the problem s root 5. Problem resolution Service restoration has a higher priority than 4 and 5, but this is not always possible Steps 4 and 5 can be complex, and is the subject of this lecture After the successful completion of step 4, a trouble ticket will be generated. These steps can be made automatic for many cases, but not always. Prof. Shervin Shirmohammadi CEG
3 Correlation and Filtering Before a failure is registered by an agent, typically some correlation and filtering are done. Correlation: to ensure that if a fault is the result of one or more other faults, the former is not reported. Otherwise too many faults would be unnecessarily reported E.g., a Loss of Connection, would also generate a Loss of Signal, a Degradation in Signal, and perhaps an Excessive Loss fault Filtering: For most faults, they should only be reported if the persist. In other words, if something is very temporary, we do not need to bother the manager. Very temporary must of course be defined for the given context. Filtering is used to catch and suppress these temporary conditions Prof. Shervin Shirmohammadi CEG
4 Example (1/2) ITU-T G.784: Synchronous Digital Hierarchy (SDH) management Related to management of high-speed fiber optics systems The diagram shows the inside of the agent (not all of it though): G.783 G.784 Another document, G.783, specifies the correlation rules, in addition to specifying many other things. Prof. Shervin Shirmohammadi CEG
5 Example correlation rule from G.783: clof dlof and (not dlos) ctim dtim and MON etc Example (2/2) Filter rule from G.784: A transmission failure (fxxx) shall be declared if the fault cause persists continuously for 2.5 ± 0.5 s. The failure shall be cleared if the fault cause is absent continuously for 10 ± 0.5 s. timer expired Wait 2.5 sec fault no fault Fault No Fault no fault fault timer expired Wait 10 sec Prof. Shervin Shirmohammadi CEG
6 Management Correlation Techniques The correlations we saw in the previous slides happen within the agent and are simple. Management correlation, which happens at the manager, is used for steps 4 and 5 of Fault Management to identify a problem and take appropriate action can be more complicated. Typically, one of the following techniques are used for that purpose: Rule-Based Reasoning Model-Based Reasoning Case-Based Reasoning Codebook Correlation Model State Transition Graph Model Finite State Machine Model Prof. Shervin Shirmohammadi CEG
7 Rule Based Reasoning (1/2) The earliest correlation technique, a.k.a. expert system. Used in HP OpenView. Knowledge base consists of 1) problem definition and 2) action to be taken In the form of if-then or conditionaction Working memory contains the actual topology and state information of the network. When something happens, the Inference engine compares it against the knowledge base and picks the closest match and takes appropriate action on the working memory, as pre-defined for that rule. Prof. Shervin Shirmohammadi CEG
8 Rule Based Reasoning (2/2) Rules are established from the expertise of people in the field. If a rule does not exist, it can be added. But this increases the size of the knowledge base to an unscalable level, causing a knowledge acquisition bottleneck. Also, actions are too specific, causing unwanted behaviour. An adaptation of HP s OpenView is shown in Figure Similar to G.783 correlation Prof. Shervin Shirmohammadi CEG
9 Model Based Reasoning The event correlator is built on an object-oriented model associated with each managed object. Used by Cabletron s Spectrum The correlator in NMS has the model shown in b, which is an objectoriented model of the actual network in a. Each object in the model corresponds to its own managed object. For example, the hub 1 model periodically pings Hub 1 to see if it s alive. If not, it checks with the Router s model to see if the router is alive. If yes, it generates an alarm for Hub 1; otherwise, it doesn t do anything. Prof. Shervin Shirmohammadi CEG
10 Case-Based Reasoning (CBR) Unlike Rule Based Reasoning, where the until of Knowledge is a rule, CBR s unit of knowledge is a case. It is based on the intuition that situations repeat themselves, and that what was done in one case is applicable to another similar case, although not exactly identical. Hence, solutions are adapted to the case. Used in SpectroRx. Adaption techniques: Parameterized adaptation Abstraction/respecialization adaptation Critic-based adaptation Prof. Shervin Shirmohammadi CEG
11 Codebook Correlation Model (CCM) Previous methods are all based on algorithms, and hence do not expertly associate events with problems. In CCM, problems are messages generated by the system and are encoded in sets of alarms that they cause. The correlator than decodes those messages to identify the problems. This is done in two phases: 1. Produce a problem-symptom matrix 2. Compare the stream of alarms with the codebook to identify the problem Prof. Shervin Shirmohammadi CEG
12 CCM Example We can now generate a problem-symptom matrix codebook from the labeled causality graph from figure Usually the number of symptoms exceeds the number of problems, so the matrix is reduced to a correlation matrix which uniquely identifies a problem given specific symptoms. This matrix gives us the correlation graph. Used in System Management ARTS (SMARTS) InCharge. Prof. Shervin Shirmohammadi CEG
13 State Transition Graph Model Can be used instead of or as a complement to other techniques. A state transition graph, similar to a sequence diagram, is followed to detect problems and make decisions. Used in Seagate s NerveCenter Prof. Shervin Shirmohammadi CEG
14 Finite State Machine Models the behaviour of the system as s set of finite number of states, and makes decisions based on this model. Prof. Shervin Shirmohammadi CEG
15 Monitoring for Event Notification Event: something that occurs in the network that is noteworthy. Most of the time this is a problem or a failure in a network element. Threshold may be set on end-to-end or element characteristics for notification of events. This is know as real time analysis. Real time analysis usually involves short polling intervals: capacity, CPU, memory, storage needed. Traffic not insignificant! Rule of thumb: This should not be more than 10% of the capacity. For Ethernet keep this at 2-5%. Prof. Shervin Shirmohammadi CEG
16 Traffic Example A network has 100 routers, each with 4 interfaces, each with 8 characteristics. Polling is every 5 seconds. How much is the monitoring overhead traffic? 100 network elements x 4 interfaces / network device x 8 characteristics = 3200 characteristics. Assume Each characteristic = 8 bytes of data + 60 bytes of overhead. (why so much overhead?) Total traffic = 3200 x (8 + 60) = KB = 1.74 Mb If we poll every 5 seconds ~ 1.74Mb / 5s = 384 Kbps. (not likely!) More likely it is a bursty rush of 1.74 Mbps every 5 seconds. Over a period of a day we have: 1.74Mbps * 720 polls per hour* 24 hours per day =30 Gb of traffic and we have 3200 * 8 * 720 * 24 = 442 MB of data are stored per day. Prof. Shervin Shirmohammadi CEG
17 In-Band and Out-of-Band (1/2) In-band: having the NM data flow over the same network that the user network traffic uses Simple network management architecture In case of network problems monitoring and troubleshooting may be difficult Out-of-band monitoring: providing different paths for NM traffic and user network traffic ISDN D-channel Separate Frame Relay/ATM virtual circuit Telephone lines Prof. Shervin Shirmohammadi CEG
18 In-Band and Out-of-Band (2/2) In-band cons: troubleshooting is adversely affect if data flows are delayed or blocked, which can happen during trouble times. Event monitoring when the network is under stress, such as during congestion, can also be impacted negatively. Out-of-band cons: Extra equipment and networking resources are needed. Speed of monitoring might not be the same as the speed of the actual network (specially if costs were reduced in the installation of the management network) A separate method to check availability of the management network is needed Compromise: Hybrid approach. Prof. Shervin Shirmohammadi CEG
Lecture 20: Automated Fault Management
Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 20-1 Fault Management Fault Management consists of 5 steps: 1. Fault detection
More informationLecture 8: Flow Analysis
Lecture 8: Flow Analysis Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 8-1 Network Analysis Requirement Analysis Gather Requirements Develop Service Metrics
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG
Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationLecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end
More informationConfiguring POS interfaces
Contents Configuring POS interfaces 1 Overview 1 SONET 1 SDH 1 POS 1 Configuration procedure 1 Displaying and maintaining POS interfaces 3 POS interface configuration examples 4 Directly connecting switches
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationNetwork Management Functions - Fault. Network Management
Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures
More informationLecture 4: Basic Internet Operations
Lecture 4: Basic Internet Operations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 4-1 LAN View A LAN 2 B Hub 2 Gateway to Internet Hub 1 Z (Gateway) LAN 1
More informationLecture 14: Multimedia Communications
Lecture 14: Multimedia Communications Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 14-1 Multimedia Characteristics Bandwidth Media has natural bitrate, not very flexible. Packet
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG
Lecture 6: Network Analysis: Process Part 1 Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 6-1 Overview The principles, guidelines, and procedures for requirements
More informationLecture 4: Introduction to Computer Network Design
Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS SYNCHRONOUS OPTICAL NETWORK (SONET) Synchronous Optical Network (SONET) is a standard for optical telecommunications transport. SONET defines optical carrier (OC) levels
More informationFor internal circulation of BSNL only
E3-E4 E4 (CFA) Overview of SDH AGENDA SDH & PDH Hierarchy SDH Network Survivability Synchronous All elements are synchronized with one master clock. DIGITAL Information is in binary. SDH OVERVIEW HIERARCHY
More informationDistributed Video Systems Chapter 3 Storage Technologies
Distributed Video Systems Chapter 3 Storage Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 3.1 Introduction 3.2 Magnetic Disks 3.3 Video
More informationNetwork Topologies & Error Performance Monitoring in SDH Technology
Network Topologies & Error Performance Monitoring in SDH Technology Shiva Sharma Electronics and Communications Department Dronacharya College of Engineering Gurgaon, Haryana Shiva.92@hotmail.com Abstract
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationIntroduction to Capacity and Performance Management
1 Introduction to Capacity and Performance Management Session 2 Presentation_ID.scr 1 Agenda Introductions/Goals Capacity Planning Model Capacity Data Collection Tools and Reporting Best Practices for
More informationArchitectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG
Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure
More informationLecture 16: Architectural Considerations
Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Peer evaluations 2 Homework #5 Due Thursday, Nov 17 th Homework #6 Presentation on security/ privacy Project
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationEVENT CORRELATION IN SPECTRUM. AND OTHER COMMERCIAL PRODUCTS September 2000
EVENT CORRELATION IN SPECTRUM AND OTHER COMMERCIAL PRODUCTS September 2000 Introduction S P E C T R U M 6. 0 Event correlation over the enterprise has become an issue of paramount importance in enterprise
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture -23 X.25 and Frame Relay Hello and welcome to today s lecture on X.25 and
More informationFundamentals of Networking Types of Topologies
Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two
More information15: OS Scheduling and Buffering
15: OS Scheduling and ing Mark Handley Typical Audio Pipeline (sender) Sending Host Audio Device Application A->D Device Kernel App Compress Encode for net RTP ed pending DMA to host (~10ms according to
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. OSI Management. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: OSI Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 17-1 OSI Characteristics OSI: International Standards Organizations (ISO OSI) Deals
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationBasic Concepts. CS168, Fall 2014 Sylvia Ratnasamy h<p://inst.eecs.berkeley.edu/~cs168/fa14/
Basic Concepts CS168, Fall 2014 Sylvia Ratnasamy h
More informationTable of Contents 1 E-CPOS Interface Configuration 1-1
Table of Contents 1 E-CPOS Interface Configuration 1-1 Overview 1-1 SONET 1-1 SDH 1-1 E-CPOS 1-5 Configuring an E-CPOS Interface 1-6 Configuring an E-CPOS Interface 1-6 Configuring the Operating Mode of
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG
Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,
More informationLecture 6: Network Analysis: Process Part 1
Lecture 6: Network Analysis: Process Part 1 Instructor: Hussein Al Osman Based on Slides by: Profs Makrakis and Shirmohammadi Hussein Al Osman CEG4190 6-1 Overview The principles, guidelines, and procedures
More informationLecture 15: Multiplexing (2)
Lecture 15: Multiplexing (2) Last Lecture Multiplexing (1) Source: chapter 8 This Lecture Multiplexing (2) Source: chapter8 Next Lecture Circuit switching (1) Source: chapter9 Digital Carrier Systems Hierarchy
More informationEthernet interface configuration commands
Contents Ethernet interface configuration commands 1 General Ethernet interface and subinterface configuration commands 1 alarm-detect 1 bandwidth 2 combo enable 2 default 3 description 4 display counters
More informationData Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1
Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Layer 2 - LAN Switching Configuration Guide Part number: 5998-1807 Software version: Release 1513 Document version: 6W100-20130830 Legal and notice information Copyright 2013 Hewlett-Packard
More informationNerveCenter 3.6: An Overview
NerveCenter 3.6: An Overview NerveCenter is a suite of tools that help you monitor and manage a complex heterogeneous network. This document describes the components of NerveCenter and explains how these
More informationTable of Contents 1 MSTP Configuration 1-1
Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction
More informationXO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
More informationNET311 Computer Network Management Tools, Systems and Engineering
NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationSynchronous Ethernet (SyncE) ESMC and SSM
This module describes Synchronization Status Message (SSM), Ethernet Synchronization Message Channel (ESMC), and generating the Simple Network Management Protocol (SNMP) traps on the SyncE feature. With
More informationManagement Software. SmartView TM EMS (Element Management System) Management Software. Management Software SmartView TM EMS. Polled Network Elements
LAN PWR PWR 2 PoE Fault Fiber 00 LAN ON OFF Force Auto 0 00 Half Full LFP Flow Pass SW TX RX Ethernet Media Converter FIBER LAN PWR PWR 2 Fault Fiber 00 LAN ON OFF Force Auto 0 00 Half Full LFP Flow Pass
More informationSynchronous Optical Networks (SONET) Advanced Computer Networks
Synchronous Optical Networks (SONET) Advanced Computer Networks SONET Outline Brief History SONET Overview SONET Rates SONET Ring Architecture Add/Drop Multiplexor (ADM) Section, Line and Path Virtual
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work
More informationG.8032 and CFM Support for Microwave Adaptive Bandwidth
G.8032 and CFM Support for Microwave Adaptive Bandwidth The feature enables the G.8032 Ethernet Protection Ring (ERP) mechanism to be used as a trigger in response to bandwidth degradation occurrences
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationQoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology
QoS provisioning Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 6, 2012 Outline 1 Introduction 2 QoS support elements
More informationHP 6125G & 6125G/XG Blade Switches
HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Configuration Guide Part number:5998-3155a Software version: Release 2103 and later Document version: 6W102-20141218 Legal and notice information
More informationDevice Manager Software Release 3.x
Device Manager Software Release 3.x MICROSENS Introduction The Device Manager software is used for the comfortable configuration of MICROSENS components as well as for easy monitoring of the complete network.
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More information6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long
6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationEthernet Switch ZyNOS 4.0
RMON Ethernet Switch ZyNOS 4.0 Support Notes Version 4.00 July 2011 Overview Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to
More informationHP A6600 Routers Interface. Configuration Guide. Abstract
HP A6600 Routers Interface Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures. These configuration
More informationSynchronous Optical Networks SONET. Computer Networks: SONET
Synchronous Optical Networks SONET 1 Telephone Networks {Brief History} Digital carrier systems The hierarchy of digital signals that the telephone network uses. Trunks and access links organized in DS
More informationITSF 2011 Testing the PDV tolerance of PTPv2 slave clocks, an approach from an operator
ITSF 2011 Testing the PDV tolerance of PTPv2 slave clocks, an approach from an operator Sébastien JOBERT R&D expert France Télécom Orange Orange Labs sebastien.jobert@orange.com Baba TABOURE Yannick LAGADEC
More informationEthernet interface commands
Contents Ethernet interface commands 1 Common Ethernet interface commands 1 default 1 description 2 display counters 2 display counters rate 4 display interface 5 display interface brief 12 display packet-drop
More informationCommunication Networks
Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency
More informationNetwork Management. Network Management: Goals, Organization and Functions
Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits
More informationSONET. By Sadhish Prabhu. Unit II
SONET By Sadhish Prabhu History Digital carrier systems The hierarchy of digital signals that the telephone network uses. Trunks and access links organized in DS (digital signal) hierarchy Problem: rates
More informationSmartView EMS. Central EMS. SmartConfig. Fault, Configuration, Accounting, Performance & Security Management (FCAPS)
SmartView EMS TM Fault, Configuration, Accounting, Performance & Security Management (FCAPS) Central EMS Expand EMS platform up to 50 SmartViewTM and 25,000 devices management SmartConfig TM Tool for quick
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationIntroduction to Networks
Introduction to Networks Network Topology How we interconnect network users Network Hierarchy The connection between network topology and geographical size Telecommunication (Phone Networks) Circuit Switching
More information2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.
2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:
More informationShort answer (35 points)
CPSC 360 Fall 2017 Exam 1 Version 2 Solutions (last updated 10/19/2017) This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheet of paper with whatever you like
More informationHP 6600/HSR6600 Routers
HP 6600/HSR6600 Routers Interface Configuration Guide Part number: 5998-1499 Software version: A6602-CMW520-R3103 A6600-CMW520-R3102-RPE A6600-CMW520-R3102-RSE HSR6602_MCP-CMW520-R3102 Document version:
More informationSince enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time
Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationVERITAS NerveCenter: Downstream Alarm Suppression
VERITAS NerveCenter: Downstream Alarm Suppression The new NerveCenter downstream alarm suppression behavior model monitors nodes in a complex network. Using topology information either from HP OpenView
More informationPerformance Monitor Administrative Options
CHAPTER 12 Effective network management requires the fastest possible identification and resolution of events that occur on mission-critical systems. Performance Monitor administrative options enable you
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationLecture 4: The Transport Layer and UDP
Lecture 4: The Transport Layer and UDP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 4-1 The Transport Layer Provides efficient and robust end-to-end service
More informationLecture 4 Wide Area Networks - Congestion in Data Networks
DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number
More informationBackbone network technologies. T Jouni Karvo, Timo Kiravuo
Backbone network technologies T-110.300 Jouni Karvo, Timo Kiravuo Backbone network technologies This lecture tells about backbone networks After this lecture, you should know WDM, PDH, SDH and ATM understand
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationConfiguring ITU-T Y.1731 Fault Management Functions in IEEE CFM
Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM This document describes the implementation of the ITU-Y.1731 fault management functions Ethernet Alarm Indication Signal (ETH-AIS) and Ethernet
More informationSDH. Protected monitoring point or dedicated monitor access
CMA 3000 ATM Test Options SPECIFICATIONS Testing ATM connections has never been easier CMA 3000 is Anritsu s next-generation portable and futureproof field tester for the installation and maintenance of
More informationLecture 10: Protocol Design
Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationReference Access and Interconnection Offer
1. Commercial Proposal for Reference Access and Interconnection Offer Sub Annex E Technical Specification Table of Contents 1 General... 3 2 Physical and Electrical Interface... 4 3 Transmission... 7 4
More informationS5 Communications. Rev. 1
S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationTroubleshooting Physical Layer Alarms on SONET and SDH Links
Troubleshooting Physical Layer Alarms on SONET and SDH Links Document ID: 16154 Introduction Prerequisites Requirements Components Used Conventions Alarms at SONET's Layers Alarm Indicators Troubleshooting
More informationLecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee
Agenda Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee Packet switching technique Packet switching protocol layers (X.25) Frame Relay ١ Dr. Ahmed ElShafee, ACU Fall 2011,
More informationLecture (04 & 05) Packet switching & Frame Relay techniques
Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I Agenda Packet switching technique Packet switching protocol layers (X.25)
More informationStandard 1.2 September 2001
555-8421-103 Remote Office Network Engineering Guidelines Standard 1.2 September 2001 Copyright 2000 2001 Nortel Networks, All Rights Reserved. Printed in Canada. All information contained in this document
More informationAdaptive Data Burst Assembly in OBS Networks
Adaptive Data Burst Assembly in OBS Networks Mohamed A.Dawood 1, Mohamed Mahmoud 1, Moustafa H.Aly 1,2 1 Arab Academy for Science, Technology and Maritime Transport, Alexandria, Egypt 2 OSA Member muhamed.dawood@aast.edu,
More informationCapacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands
Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next
More informationCisco Cable Manager 1.0
Cisco Cable Manager 1.0 Product Overview 1 Agenda Solution Context Product Overview Features Configuration Management Fault Management Performance Management 2 Challenges Reduce maintenance and operations
More informationCOPYRIGHTED MATERIAL INTRODUCTION AND OVERVIEW
1 INTRODUCTION AND OVERVIEW The past few decades have seen the merging of computer and communication technologies Wide-area and local-area computer networks have been deployed to interconnect computers
More informationWAN Technologies (to interconnect IP routers) Mario Baldi
WAN Technologies (to interconnect IP routers) Mario Baldi www.baldi.info WAN_Technologies - 1 Copyright: see page 2 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected
More information