Two-Tier Oracle Application

Size: px
Start display at page:

Download "Two-Tier Oracle Application"

Transcription

1 Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location of a large company access the Oracle server located in the company s headquarters. The connection is relatively fast they use a high-bandwidth, low-latency Metropolitan Area Network (MAN) with less than 4 ms latency. However, they complain that the access is slow and it takes more than 10 seconds to query the database. Your task is to determine the cause of the large application delay and suggest methods to improve the application performance. Typical reasons for a slow application performance include: A slow database server A slow network connection Bad application design 1

2 Network Model The following figure shows the network infrastructure: Oracle Client 100 Mbps LAN Metropolitan Area Network (MAN) 100 Mbps LAN Client Probe 10 Mbps 3.2 ms latency Oracle Server Data Center Probe Approach The following list summarizes a typical workflow for troubleshooting an application s performance. You will also follow this workflow in this tutorial. 1) Capture traffic 2) Filter irrelevant traffic and import the capture files into ACE 3) Visualize the application and network traffic 4) Analyze the application with AppDoctor 5) Analyze the data exchange 6) Suggest steps for improving the response time 2

3 The process starts with capturing the traffic and importing it into ACE. The traffic is then analyzed using AppDoctor, visualizing the data flow and looking into packet exchange. 3

4 Step 1: Capture Traffic Application capture files (also known as packet trace files ) form the raw data for an ACE file. The Application Capture utility enables you to capture traffic at multiple network locations simultaneously. You can install an unlimited number of capture agents throughout your network; then you can manage these agents and capture traffic directly from your local computer. To get a correct estimate of the network latency, you must capture traffic on both sides of the transaction in this case at both the company headquarters (data server location) and at the satellite office (database client location). ACE can then identify identical packets in the two captures and give you a correct breakdown of individual delay components such as network and server delay. Note In some cases, it may not be feasible to capture traffic at both endpoints of the network. Instead, you can capture on one side of the connection and provide network characteristics, such as bandwidth and latency. 4

5 The application traffic has already been captured for you. The traffic is stored in two files, each for one side of the connection. 5

6 Step 2: Import Capture Files into ACE After you have captured the traffic, you can import it into ACE. After you specify the capture files and related information, ACE detects that they contain the same traffic, merge the traces, visualize and analyze the application. To import the traffic into ACE, perform the following steps. Creating a New ACE File 1 Select File > New. Select ACE Files (*.atc.m) from the pull-down menu and click OK. The ACE Import: Choose Capture File(s) dialog box appears. This dialog box prompts you to specify the capture files, capture agent 6

7 locations, and any filters and preprocessing to be applied to the data before it is further processed. Specifying Capture Files Two capture files have been created. To import them into ACE, perform the following steps. 1 Click Add Capture File, navigate to the <reldir>\models\std\tutorial_req\module\ directory, and add the file Oracle_client_unfiltered.enc. <reldir> is the release directory where ACE Plus is installed. In the Windows environment this is often C:\Program Files\OPNET\<release number>. 7

8 2 Click Add Capture File, navigate to the <reldir>\models\std\tutorial_req\module\ directory, and add the file Oracle_server.enc. Specifying the Locations Where Captures were Taken It is often helpful to enter friendly names for capture agent locations, especially if you have multiple capture files. 1 Enter Client Probe in the Capture Agent Location field for the Oracle_client_unfiltered.enc trace. 2 Enter Data Center in the Capture Agent Location field for the Oracle_server.enc trace. Specifying Filters and Preprocessors The Filter column enables you to specify a filter to prevent irrelevant traffic in the capture file from being imported. The filter can be based on address, port, or protocol. The Default filter imports all TCP, UDP, and ICMP traffic and filters all broadcast traffic. To import other types of traffic, such as SNA, you must change the filter. Because the imported traffic was running over TCP, you do not need to set up a filter. 8

9 The Preprocessor column enables you to call an external application to translate the capture file type into one of the supported ACE formats. Again, this is not necessary now because ACE can read these capture files directly. Filtering Irrelevant Traffic You have specified the traces to be imported. The next step is to filter irrelevant traffic from the capture files. ACE is designed to analyze one user-level transaction. You must provide valid data; this means that the capture files should include only traffic that is relevant to the transaction of interest, with all other traffic excluded. You must filter out any extraneous packets during the import; otherwise, ACE considers these extraneous packets to be part of the application. Ideally, you should create one or more capture files that represent one and only one user-level transaction. In reality, however, you probably have other applications and traffic running in the same network. To obtain valid results, you must now filter irrelevant traffic from the ACE file. 9

10 You can identify and remove irrelevant traffic using the ACE Summary window. This window visualizes and sorts traffic based on different groupings such as protocol, tier pairs, and connections. You are interested in analyzing Oracle database traffic between the Oracle Server and Oracle client tiers; therefore, you can filter out all other traffic. 1 Click Next > in the Choose Capture Files dialog box. The ACE Summary window appears. The Tier Pair Circle (bottom) pane shows many tier pairs exchanging traffic. The Filter Irrelevant Traffic dialog box appears in front of the ACE Summary window. This dialog box enables you to filter out certain types of traffic if you know that they are irrelevant. 10

11 We know that the types of traffic shown are irrelevant to the application, so we will accept the default settings to filter out this traffic. 2 Click Filter. The ACE Summary window shows that there are now two tier pairs remaining after the filter operation. The Select Next Step dialog box appears. This dialog box enables you to bypass the ACE Summary window if you know that your capture data contains no irrelevant traffic. In this case, we know that the application of interest involves one tier pair only. However, the ACE Summary window shows two tier pairs. We conclude that additional filtering is necessary. 3 In the Select Next Step dialog box, select the ACE Summary: option. 11

12 4 Click Next >. The Tier Pair Circle (bottom center) pane shows that the tiers and are exchanging POP (Post Office Protocol) traffic a protocol used to transfer . This is not relevant to the Oracle application we want to examine in ACE. We can also see that the tiers and are exchanging SQLNET traffic, which is the protocol used by Oracle. We therefore decide to include the traffic for this tier pair and, by extension, exclude all other traffic 12

13 from the import. (Note: If you do not have a license for ACE Decode Module, the SQLNET traffic appears as TCP traffic.) 5 In the Traffic drilldown: (top left) pane, click on the < > tier pair so that it is the only tier pair that is selected. The Tier Pair Circle (bottom) pane updates to show information about the selected tier pair only. 13

14 6 In the Traffic drilldown: pane, click on the checkbox next to < > to include this tier pair. A checkbox appears next to the tier pair to show that all traffic for this tier pair is included. 7 Click the Analyze Included in ACE button (bottom right). The Rename Hosts window appears. Renaming Hosts At this point, ACE has imported the capture data, identified all tiers by their IP addresses, and filtered out extraneous traffic. The next step is to give each tier a friendly name. When a tier is renamed, subsequent references use the friendly name rather than the IP address. 1 Rename to Oracle Server. 14

15 2 Rename to Oracle Client. The table should look like this: 3 Click Next >. The Specify Tier Locations dialog box appears. Specifying Tier Locations This dialog box is used to enter information about the location of tiers with respect to a capture location. This is important to ensure that the network topology is represented correctly in ACE. In many cases especially when capture files are collected on both sides of a connection ACE detects the tier location. In this import, ACE detected that the Oracle Client tier is local to the Client Probe (as seen in the Network Model) and that the Oracle Server tier is local to the Data Center. These are the only two tiers of interest in this study, so you do not need to change anything in this dialog box. 15

16 1 Click Next>. The Specify Bandwidth Between Locations dialog box appears. ACE requires an accurate representation of the network where the application was captured. This means that you need to provide ACE with the relevant bandwidth and latency information in each segment and between each location in the transaction. Depending on your network configuration, you might need to specify both local bandwidths and remote bandwidths. In this import, you need to specify only the remote bandwidth between the Data Center and the Client Probe. Specifying Bandwidth between Locations This dialog box is used to characterize the network between capture locations that do not belong to the same LAN. 16

17 The bandwidth should represent the smallest link between the two locations. In most cases, this is the last mile bandwidth (T1, DSL, Frame Circuit etc.). ACE can use PathProbe to measure the bandwidth and latency refer to the documentation for more information about this utility. 1 Set the Bandwidth to 10,000 (10,000 kbps equals to 10Mbps). This is the bandwidth of the slowest link in the network (refer to the Example Topology picture in Network Model). 2 Click Next >. The Specify Latency between Locations dialog box appears. Specifying Latency between Locations When you import multiple capture files, ACE can calculate the latency between tiers automatically based on the bandwidth you specified. ACE can use PathProbe to measure the bandwidth and latency; refer to the documentation for more information about this utility. 1 Click Finish. 17

18 If the Getting Started Analyzing an Application Transaction window appears, click Close. The capture files have been imported and a new ACE window appears. 18

19 Step 3: Visualize the Application and Network Traffic You have imported the capture files into ACE and filtered out the irrelevant traffic. You are now ready to view the traffic and analyze the application in more detail. The first step is to view the Data Exchange Chart, which shows the application and network packets between tiers on a time line. 1 If the Data Exchange Chart is not already showing, click the Data Exchange Chart toolbar button. Data Exchange Chart 19

20 Each individual application message is represented by an arrow that starts at the source tier and ends at the destination tier. The arrow color represents the number of application bytes in the message. Each colored bar represents a group of messages; the amount of color represents the percentage of messages that fall into each application-payload size category. You can observe that about one-third of the messages are yellow ( application bytes per message) and about two-thirds are orange (1-100 application bytes per message). You can immediately conclude that the application is sending many small messages. 2 To differentiate the messages flowing in different directions, select View > Split Groups. Now the messages are split into two groups and you can detect more details. The upper group represents messages from the client to the server and the lower group represents messages from the server to the client. In the server-to-client message group, approximately 80 percent of the messages are orange. 20

21 In the client-to-server message group, approximately 70 percent of the messages are orange. 3 View message-group information by resting the mouse over the first group of messages. The tooltip shows that the message group represents 183 messages in each direction. 4 Notice that the data flow is about 12 seconds long: it starts at about 0 seconds and ends at about 12 seconds. This matches the response time reported by employees (more than 10 seconds). 21

22 After this initial investigation, you can perform more quantitative analysis using AppDoctor. 22

23 Step 4: Analyze with AppDoctor We will first look at AppDoctor s Summary of Delay to see how individual delays contribute to the total application response time. AppDoctor s Diagnosis will then identify the bottlenecks. Finally, more quantitative analysis will be performed looking at AppDoctor s Statistics. Examining the Summary of Delays AppDoctor s Summary of Delays provides insight into the root cause of the overall application delay. It divides the total application response time into five components: Tier Processing Delay This is the total time it takes to process the application at each tier. This time includes CPU processing time and user think time. Latency Delay due to latency in the network (latency is the time required for 1 bit to be transmitted across the network). Bandwidth delay Delay caused by the limited bandwidth of the network. Congestion delay This delay is a metric of network restriction to packet flow. It might be caused by packet queuing in the network. 23

24 Protocol delay Delay might be caused by flow-control mechanisms imposed by network protocols. TCP, for example, has several built-in flow-control mechanisms. Now you will examine individual delay components to determine which type of delay contributes most to the overall response time. 1 To see how individual delays contribute to the total application response time, select AppDoctor > Summary of Delays. Notice that the largest contributing factor to the application delay is the latency delay. It accounts for almost 60 percent of the total response time. 24

25 This is somewhat surprising because the measured latency between the client and the server is less than 4 ms. Diagnosing Bottlenecks AppDoctor Diagnosis provides a more detailed view of the potential bottlenecks affecting this transaction. Diagnosis tests the current transaction against issues that often cause performance problems in network-based applications, grouped by category. Values that exceed specific (user-configurable) thresholds are marked as bottlenecks or potential bottlenecks. 1 Click the Diagnosis tab to display the diagnosis. 25

26 The following categories are identified as bottlenecks: Protocol Overhead Chattiness Network Effect of Chattiness Effect of Latency 2 Click on one of the Bottleneck fields for Chattiness to see the definition of chattiness and bottleneck threshold in the lower window. 3 Repeat the previous step to learn more about Protocol Overhead, Network Effect of Chattiness, and Effect of Latency, which were also identified as bottlenecks. Note that the Chattiness, Network Effect of Chattiness, and Effect of Latency bottlenecks are related to sending many small application messages. 26

27 Performing Quantitative Analysis AppDoctor also provides summary statistics for the application transaction. 1 Click the Statistics tab to see the application statistics. Notice that the Response Time is seconds, which corresponds to the value that you saw previously in the Data Exchange Chart (step 4). Several statistics are relevant to this study. You will examine two in particular: the number of application turns and the maximum data exchanged in one turn. 27

28 Each change in direction is called an application turn because the application changes the direction of data flow. Applications with many application turns are generally considered chatty and are sensitive to network delay. The sensitivity occurs because each message must be received at a tier before the corresponding response is sent; as a result, each message is affected by network latency. Notice that the application used 2,157 turns to exchange 182,056 Bytes of data (see the Application Turns statistics). Notice also that the maximum amount of data sent in one application turn is 258 bytes in one direction (Oracle Client to Database Server) and 455 bytes in the other direction (see the Max Application Bytes per Turn statistics). This confirms the previous analysis in which chattiness and the network effect of chattiness was identified as the primary cause of the poor response time. Also note that the Effect of Latency is over 6 seconds. Here you see that the effect of latency alone, aggravated by the 2,157 turns, accounts for over 6 seconds of the total transaction response time. Because latency is largely a product of geographic distance and network hops, adding bandwidth will have a minimal effect on the response time. To minimize this component, 28

29 you can reduce the latency on the circuit or reduce the number of application turns. Latency is a physical constraint; therefore, changing the application behavior is more practical. The previous analysis suggested that the chattiness is the largest contributing factor to the application delay. Now you will go back to the Data Exchange Chart to examine packet exchange in more detail. 2 Click Close to close AppDoctor. 29

30 Step 5: Analyze the Data Exchange AppDoctor revealed issues with both the network and the data exchange between tiers. Now that you know more about the possible issues, the Data Exchange Chart might provide additional insight. You will now examine the capture data to see how packets are exchanged. First you will examine the beginning of the transaction (that is, the traffic between 0 and 0.15 seconds) more carefully. 1 Uncheck View > Split Groups to see the Data Exchange Chart for both directions. 2 Zoom to the area of chart that represents the second time period: Choose View > Set Visible Time Range, set Start time to 0 and End time to 0.15, and click OK. As you zoom into the Data Exchange Chart, the groups of messages resolve into the individual application messages. 30

31 3 Study the individual messages. Each arrowhead indicates the message direction. The data exchange exhibits a simple request-response pattern. Database Client sends a request, then Database Server receives the request and sends a response immediately. You conclude that the Data Exchange Chart confirms the analysis predicted by Summary of Delays and Diagnosis: The application is chatty, and the chattiness means that the network delay slows the application significantly. 31

32 At this point you suspect that the application was not written efficiently and that it should be rewritten. To improve the application response time, you might want to talk to the application developers to see whether there is a way to optimize the application design to send fewer requests. Examining ACE Decodes ACE Decode Module (ADM) adds information about the content of the packet. By understanding packet contents, you can better understand the particulars of the application itself. For example, you can examine the database query statements to determine whether records are being accessed efficiently. Skip this section if you do not have this module. In the following steps, you will view the contents of individual messages. 1 Right-click in the workspace (not on messages) in the Data Exchange Chart and select Full Zoom. The entire Data Exchange Chart reappears. 32

33 2 Right-click on the first (left-most) application message group and select Show Protocol Decodes for Selected Items from the pop-up menu. The Protocol Decodes Viewer appears. 33

34 3 Click on Frame 59 in the top pane. The decode for this frame appears in the bottom pane. The Protocol Decode Viewer shows decodes for all selected messages. The top pane shows Source, Destination, Size, Send Time, Receive Time, Decode and Decode Summary. The bottom pane shows the detailed decode for the selected frame. You can drill down further into the individual packets to see more details. The most detailed decodes appear by drilling into the individual protocol (TCP, IP, SQL, etc.). 34

35 4 Expand the SQLNET decode in the lower pane by clicking on the plus sign next to it. The decode shows the SQL Parse statement that is carried by this packet. You can also drill into the other protocols (TCP, IP, Ethernet) to see the content of the packet. You can use the decoder to examine the application design and to pinpoint the cause of the problem. Examining several request/response patterns typically does this. 35

36 Step 6: Suggest Steps for Improving the Response Time This tutorial showed how you can use ACE to visualize and diagnose application performance problems. Initially, you knew only that the application response time was more than 10 seconds. Now you know that the slow response was primarily due to application chattiness, aggravated by network latency. You could see that, although the latency between client and server was only 3.11 ms, that delay became significant because it was experienced for each of the many application turns. In this case, the best solution is to rewrite the application so that it transfers fewer, larger messages. Using the graphs, statistics, and protocol decodes provided in ACE, you can persuade the database developers to change the database transaction as required. 36

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while

More information

Impact of TCP Window Size on a File Transfer

Impact of TCP Window Size on a File Transfer Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience

More information

ACE Whiteboard Tutorial: Modeling an Application Using Logic Scripts (Advanced)

ACE Whiteboard Tutorial: Modeling an Application Using Logic Scripts (Advanced) ACE Whiteboard Tutorial: Modeling an Application Using Logic Scripts (Advanced) Overview When database applications execute a query, each row that is fetched costs a round trip to the database. Therefore,

More information

AppResponse Xpert RPM Integration Version 2 Getting Started Guide

AppResponse Xpert RPM Integration Version 2 Getting Started Guide AppResponse Xpert RPM Integration Version 2 Getting Started Guide RPM Integration provides additional functionality to the Riverbed OPNET AppResponse Xpert real-time application performance monitoring

More information

Lab 1: Improving performance by LAN Hardware Upgrade

Lab 1: Improving performance by LAN Hardware Upgrade Lab 1: Improving performance by LAN Hardware Upgrade Objective In this lab, OPNET s IT Guru Academic Edition advanced modeling software will be used to study performance improvements in LAN obtained by

More information

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

LAN Modeling. Overview

LAN Modeling. Overview LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile

More information

A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync

A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync Introduction Microsoft Lync connects people everywhere as part of their everyday productivity experience. When issues

More information

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS Project Overview IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS This project along with the Phase II IT Infrastructure Project will help you understand how a network administrator improves network performance

More information

Advanced Application Reporting USER GUIDE

Advanced Application Reporting USER GUIDE Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product

More information

vrealize Operations Management Pack for NSX for vsphere 3.5.0

vrealize Operations Management Pack for NSX for vsphere 3.5.0 vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

NetBrain POC Walk-Through

NetBrain POC Walk-Through NetBrain POC Walk-Through For OE 4.1 Dynamic Documentation Visual Troubleshooting NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com

More information

The Keys to Monitoring Internal Web Applications

The Keys to Monitoring Internal Web Applications WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required

More information

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9.

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9. Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide (Version 1.0.139 with Purity 4.9.x or higher) Sunday, November 27, 2016 16:13 Pure Storage FlashArray Management

More information

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring Timothy Burris, Cloud Adoption & Technical Enablement Copyright IBM Corporation 2017 IBM, the IBM logo and ibm.com

More information

Closing the Application Performance Visibility Gap Inherent to Citrix Environments

Closing the Application Performance Visibility Gap Inherent to Citrix Environments Closing the Application Performance Visibility Gap Inherent to Citrix Environments Table of contents Page Chapter 3 4 5 5 6 8 9 11 12 Executive summary Introduction What is a Citrix environment? The challenges

More information

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management Level 3 SM Enhanced Management - FAQs Frequently Asked Questions for Level 3 Enhanced Management 2015 Level 3 Communications, LLC. All rights reserved. 1 LAYER 3: CONVERGED SERVICES 5 Where can I find

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

Tutorial: Analyzing MPI Applications. Intel Trace Analyzer and Collector Intel VTune Amplifier XE

Tutorial: Analyzing MPI Applications. Intel Trace Analyzer and Collector Intel VTune Amplifier XE Tutorial: Analyzing MPI Applications Intel Trace Analyzer and Collector Intel VTune Amplifier XE Contents Legal Information... 3 1. Overview... 4 1.1. Prerequisites... 5 1.1.1. Required Software... 5 1.1.2.

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

PfR Voice Traffic Optimization Using Active Probes

PfR Voice Traffic Optimization Using Active Probes PfR Voice Traffic Optimization Using Active Probes This module documents a Performance Routing (PfR) solution that supports outbound optimization of voice traffic based on the voice metrics, jitter and

More information

Network Capacity Planning OPNET tools practice evaluation

Network Capacity Planning OPNET tools practice evaluation Network Capacity Planning OPNET tools practice evaluation Irene Merayo Pastor Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Catalonia, EUROPE Paseo Bonanova, 8, 08022 Barcelona E Mail: st11183@salleurl.edu

More information

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed

More information

sflowtrend-pro InMon Corp.

sflowtrend-pro InMon Corp. sflowtrend-pro InMon Corp. sflowtrend-pro InMon Corp. Version 2.0 Copyright 2007 InMon Corp. Table of Contents 1. Introduction... 1 1.1. Introducing sflowtrend-pro... 1 1.2. About sflow... 2 1.3. Getting

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.

More information

Flow Analyzer 1.0 Help Guide FLOW ANALYZER 1.0. By Nuviso

Flow Analyzer 1.0 Help Guide FLOW ANALYZER 1.0. By Nuviso FLOW ANALYZER 1.0 By Nuviso 1 CONTENTS Overview... 3 Flow Correlation... 3 Alternate/Optimal Path... 4 Optimal path based on least Hops... 4 Optimal path based on least Latency... 4 Optimal path based

More information

Network & Infrastructure Management (NIM) with Riverbed SteelCentral

Network & Infrastructure Management (NIM) with Riverbed SteelCentral Solution Brief Network & Infrastructure Management (NIM) with Riverbed SteelCentral Companies leverage far too many tools to manage the performance of their networks and infrastructure. The result of a

More information

Assurance Features and Navigation

Assurance Features and Navigation Assurance Features and Navigation Cisco DNA Center 1.1.2 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

NetBrain Quick Start Guide For End Users

NetBrain Quick Start Guide For End Users NetBrain Quick Start Guide For End Users Dynamic Documentation Network Analysis Visual Troubleshooting Automation Qapp Network Change Management Thin Client NetBrain Technologies, Inc. 2004-2016. All rights

More information

About Clients, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10. Monitor and Troubleshoot the Health of All Client Devices

About Clients, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10. Monitor and Troubleshoot the Health of All Client Devices About Clients, on page 1 Monitor and Troubleshoot the Health of All Client Devices, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10 Trace the Path of a Device, on page 13 About

More information

NetBrain Quick Start Guide For End Users

NetBrain Quick Start Guide For End Users NetBrain Quick Start Guide For End Users Dynamic Documentation Network Analysis Visual Troubleshooting Automation Qapp Network Change Management Thin Client NetBrain Technologies, Inc. 2004-2015. All rights

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Troubleshooting with Network Analysis Module

Troubleshooting with Network Analysis Module Troubleshooting with Network Analysis Module Introduction The Cisco Network Analysis Module (NAM) provides visibility into how the network is performing and how users experience the applications and services

More information

FRONTLINE TEST SYSTEM

FRONTLINE TEST SYSTEM FRONTLINE TEST SYSTEM SETUP AND QUICK START GUIDE ETHERTEST 04 Feb 09 300 DOC ET 000 Copyright 2000 2009 Frontline Test Equipment, Inc. All rights reserved. You may not reproduce, transmit, or store on

More information

Performance Management Reporting User Guide for EPMR

Performance Management Reporting User Guide for EPMR Performance Management Reporting User Guide for EPMR January, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means,

More information

Enabling Performance & Stress Test throughout the Application Lifecycle

Enabling Performance & Stress Test throughout the Application Lifecycle Enabling Performance & Stress Test throughout the Application Lifecycle March 2010 Poor application performance costs companies millions of dollars and their reputation every year. The simple challenge

More information

F. Configure a distribute-list on router RTA that allows it to advertise all routes to the spoke routers.

F. Configure a distribute-list on router RTA that allows it to advertise all routes to the spoke routers. Refer to the exhibit. Router RTA is the hub router for routers RTB and RTC. The Frame Relay network is configured with EIGRP, and the entire network is in autonomous system 1. However, router RTB and RTC

More information

vrealize Operations Manager User Guide

vrealize Operations Manager User Guide vrealize Operations Manager User Guide vrealize Operations Manager 6.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Lesson 3: Building a Market Basket Scenario (Intermediate Data Mining Tutorial)

Lesson 3: Building a Market Basket Scenario (Intermediate Data Mining Tutorial) From this diagram, you can see that the aggregated mining model preserves the overall range and trends in values while minimizing the fluctuations in the individual data series. Conclusion You have learned

More information

Response-Time Technology

Response-Time Technology Packeteer Technical White Paper Series Response-Time Technology May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product

More information

NetDecoder Software Analyzer Ethernet Network View and Ethernet Dashboard Overview of Features

NetDecoder Software Analyzer Ethernet Network View and Ethernet Dashboard Overview of Features NetDecoder Software Analyzer Ethernet Network View and Ethernet Dashboard Overview of Features Copyright 2000 2011 Frontline Test Equipment, Inc. All rights reserved. You may not reproduce, transmit, or

More information

WhatsUp Gold Wireless v16.4

WhatsUp Gold Wireless v16.4 WhatsUp Gold Wireless v16.4 Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices... 4 Modifying wireless

More information

ESVT (Experiment Specification and Visualization Tools) Version III MANUAL

ESVT (Experiment Specification and Visualization Tools) Version III MANUAL EMIST GUI MANUAL ESVT (Experiment Specification and Visualization Tools) Version III MANUAL Web: http://emist.ist.psu.edu Newsgroup: pubnews.cse.psu.edu/psu.cse.research.emist ESVT (GUI) MANUAL Page 1

More information

Understanding the Relationship with Domain Managers

Understanding the Relationship with Domain Managers 4 CHAPTER Understanding the Relationship with Domain Managers Prime Central for HCS reports the events generated by underlying domain managers. Domain managers may also discover topology and relationships

More information

How IBM Can Identify z/os Networking Issues without tracing

How IBM Can Identify z/os Networking Issues without tracing How IBM Can Identify z/os Networking Issues without tracing Wed, August 12, 1:45-2:45 Session 17536 Speakers: Ernie Gilman, IBM (egilman@us.ibm.com) Dean Butler, IBM (butlerde@us.ibm.com) Abstract Running

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

vrealize Operations Manager User Guide

vrealize Operations Manager User Guide vrealize Operations Manager User Guide vrealize Operations Manager 6.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Sherlock Tutorial Project Overview

Sherlock Tutorial Project Overview Sherlock Tutorial Project Overview Background Sherlock organizes design files, inputs and analysis results as project folders that can be managed inside of the Sherlock application and shared between Sherlock

More information

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Skittles Excel Project

Skittles Excel Project Skittles Excel Project Entering Your Data and Creating Data Displays 1. Open Microsoft Excel 2. Create a table for your Skittles colors: a. In cell A1 type in a title for your chart b. In cell A2 type

More information

ESVT (Experiment Specification and Visualization Tools) Version II MANUAL

ESVT (Experiment Specification and Visualization Tools) Version II MANUAL EMIST GUI MANUAL ESVT (Experiment Specification and Visualization Tools) Version II MANUAL Web: http://emist.ist.psu.edu Newsgroup: pubnews.cse.psu.edu/psu.cse.research.emist ESVT (GUI) MANUAL Page 1 of

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

The ehealth Traffic Accountant Reporting Application

The ehealth Traffic Accountant Reporting Application Focus on Value The ehealth Traffic Accountant Reporting Application Understanding data (or traffic ) flow is essential for capacity planning and enabling a consistent level of performance particularly

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

RITIS Training Module 9 Script

RITIS Training Module 9 Script RITIS Training Module 9 Script Welcome to the Regional Integrated Information System or RITIS Module 09 CBT. To begin, select the start button or press Shift+N on your keyboard. This training module will

More information

VMware vcenter Operations Manager Getting Started Guide

VMware vcenter Operations Manager Getting Started Guide VMware vcenter Operations Manager Getting Started Guide Custom User Interface vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions

More information

Zoom Windows User s Manual

Zoom  Windows User s Manual Zoom Email Windows User s Manual Welcome... 2 Configuring the Add-in... 3 Configuration Page... 3 Troubleshooting... 4 Zoom Email Windows Copyright 2017 Sperry Software Inc. P a g e 1 Welcome Thank you

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Manage and Generate Reports

Manage and Generate Reports Report Manager, page 1 Generate Reports, page 3 Trust Self-Signed Certificate for Live Data Reports, page 4 Report Viewer, page 4 Save an Existing Stock Report, page 7 Import Reports, page 7 Export Reports,

More information

NetBrain Workstation AE Quick Start

NetBrain Workstation AE Quick Start NetBrain Workstation AE Quick Start For Architect Edition Must-See Features Walk-through Ready-to-use Internet Lab for Test Run Link to Download Software and In-Depth Training Look for: Test Run over Intermet

More information

Overview of the NAM Traffic Analyzer

Overview of the NAM Traffic Analyzer CHAPTER 1 These topics provide information about using the various components of the NAM Traffic Analyzer: Introducing the NAM Traffic Analyzer, page 1-1 Using the NAM Graphical User Interface A Closer

More information

Introduction. Opening and Closing Databases. Access 2010 Managing Databases and Objects. Video: Working with Databases in Access 2010

Introduction. Opening and Closing Databases. Access 2010 Managing Databases and Objects. Video: Working with Databases in Access 2010 Access 2010 Managing Databases and Objects Introduction Page 1 Each Access database consists of multiple objects that let you interact with data. Databases can include forms for entering data, queries

More information

Monitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved.

Monitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved. Monitor Qlik Sense sites Qlik Sense 2.1.2 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense,

More information

Oracle Cloud Using Oracle Application Performance Monitoring

Oracle Cloud Using Oracle Application Performance Monitoring Oracle Cloud Using Oracle Application Performance Monitoring E60699-23 November 2017 Oracle Cloud Using Oracle Application Performance Monitoring, E60699-23 Copyright 2015, 2017, Oracle and/or its affiliates.

More information

Configuring Network Proximity

Configuring Network Proximity CHAPTER 9 This chapter describes how to configure a Global Site Selector to perform network proximity to determine the best (most proximate) resource for handling global load-balancing requests. This chapter

More information

Dealing with Event Viewer

Dealing with Event Viewer Dealing with Event Viewer Event Viewer is a troubleshooting tool in Microsoft Windows 2000.This how-to article will describe how to use Event Viewer. Event Viewer displays detailed information about system

More information

Monitoring and Troubleshooting

Monitoring and Troubleshooting CHAPTER 22 The Monitor tab on the Cisco Identity Services Engine (ISE) home page, also known as the dashboard, provides integrated monitoring, reporting, alerting, and troubleshooting, all from one centralized

More information

Replication. Some uses for replication:

Replication. Some uses for replication: Replication SQL Server 2000 Replication allows you to distribute copies of data from one database to another, on the same SQL Server instance or between different instances. Replication allows data to

More information

Monitor database health in a dashboard

Monitor database health in a dashboard Monitor database health in a dashboard Published: 2018-04-20 When someone reports that a database query failed or is too slow, several questions come to mind. Finding the answers can be a time-consuming

More information

A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007

A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007 A Network Engineer s Guide to Troubleshooting User Satisfaction Problems with SAP Applications April 2007 Is It the Application or the Network? If you re a network engineer in an organization that runs

More information

System Center 2012 R2 Lab 4: IT Service Management

System Center 2012 R2 Lab 4: IT Service Management System Center 2012 R2 Lab 4: IT Service Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:

More information

The following instructions cover how to edit an existing report in IBM Cognos Analytics.

The following instructions cover how to edit an existing report in IBM Cognos Analytics. IBM Cognos Analytics Edit a Report The following instructions cover how to edit an existing report in IBM Cognos Analytics. Navigate to Cognos Cognos Analytics supports all browsers with the exception

More information

Lesson 2: Using the Performance Console

Lesson 2: Using the Performance Console Lesson 2 Lesson 2: Using the Performance Console Using the Performance Console 19-13 Windows XP Professional provides two tools for monitoring resource usage: the System Monitor snap-in and the Performance

More information

vrealize Operations Management Pack for NSX for vsphere 3.0

vrealize Operations Management Pack for NSX for vsphere 3.0 vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

LinkReport V User Manual

LinkReport V User Manual LinkReport V7.0.1 User Manual LinkReport User Manual - V7.0.1 June 18, 2014 Reversion 1 Copyright 2014Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard are registered trademarks of

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Core Extensions Module: NetFlow Plugin Version 1.2 Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements...

More information

Using Diagnostic Tools

Using Diagnostic Tools Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support

More information

WhatsUp Gold v16.0 Wireless User Guide

WhatsUp Gold v16.0 Wireless User Guide WhatsUp Gold v16.0 Wireless User Guide Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless licensing and accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices...

More information

Concord OneClick for ehealth

Concord OneClick for ehealth Focus on Value Concord OneClick for ehealth The new administration console for ehealth provides a single user interface from which multiple administrators can quickly and easily manage ehealth systems

More information

Programming your radio

Programming your radio Programming your radio This guide will show you how to use the FRC Radio Configuration Utility software to configure your robot's wireless bridge for use outside of FRC events. Before you begin using the

More information

vcenter Operations Manager for Horizon View Administration

vcenter Operations Manager for Horizon View Administration vcenter Operations Manager for Horizon View Administration vcenter Operations Manager for Horizon View 1.5 vcenter Operations Manager for Horizon View 1.5.1 This document supports the version of each product

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.2 This document supports the version of each product listed and supports all subsequent versions until the document

More information

CHAPTER. The Role of PL/SQL in Contemporary Development

CHAPTER. The Role of PL/SQL in Contemporary Development CHAPTER 1 The Role of PL/SQL in Contemporary Development 4 Oracle PL/SQL Performance Tuning Tips & Techniques When building systems, it is critical to ensure that the systems will perform well. For example,

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

Application-Centric Analysis Helps Maximize the Value of Wireshark

Application-Centric Analysis Helps Maximize the Value of Wireshark Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and

More information

SteelCentral Packet Analyser Walkthrough

SteelCentral Packet Analyser Walkthrough SteelCentral Packet Analyser Walkthrough The aim of this demo is to show how to perform simple analysis of packets using the SteelCentral Packet Analyser in conjunction with NetShark. We will talk through

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

Performing Path Traces

Performing Path Traces About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network

More information

TamoSoft Throughput Test

TamoSoft Throughput Test TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2016 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...

More information

Wireshark 101 Essential Skills for Network Analysis 2 nd Edition

Wireshark 101 Essential Skills for Network Analysis 2 nd Edition Wireshark 101 Essential Skills for Network Analysis 2 nd Edition Always ensure you have proper authorization before you listen to and capture network traffic. Protocol Analysis Institute, Inc 59 Damonte

More information

Evaluation Guide for SNMPc v7.0

Evaluation Guide for SNMPc v7.0 Evaluation Guide for SNMPc v7.0 Introduction Thank you for downloading the SNMPc evaluation, in order to allow you to evaluate the product quickly and easily we have prepared this short guide. The purpose

More information

Closing The Application Performance Visibility Gap Inherent To Citrix Environments

Closing The Application Performance Visibility Gap Inherent To Citrix Environments WHITE PAPER: COMPUWARE APM FOR CITRIX XenApp/ XenDesktop Closing The Application Performance Visibility Gap Inherent To Citrix Environments Many companies have invested in Citrix XenApp and XenDesktop

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Vantage Ultimate 2.2 Quick Start Tutorial

Vantage Ultimate 2.2 Quick Start Tutorial Vantage Ultimate 2.2 Quick Start Tutorial This document is intended to help you to start using WebSpy Vantage Ultimate. For more detailed information, please see the Vantage Ultimate help guide. This can

More information