Network Instruments Troubleshooting Techniques
-
Upload
tiger-cunningham -
Category
Documents
-
view
39 -
download
1
description
Transcript of Network Instruments Troubleshooting Techniques
![Page 1: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/1.jpg)
Network Instruments Troubleshooting
Techniques
![Page 2: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/2.jpg)
What to look for in network monitoring solutions…What to look for in network monitoring solutions…
Key Elements
Real Time Statistics Visual Network Traffic Flow
Long Term Trending Capacity Planning, Baselining Networks
Triggers and Alarms Proactive Problem Notification
Distributed Network Analysis Single Point of Visibility Into Multiple Segments
SNMP Management Console Standards Based Management for Networks and Devices
Application Analysis Troubleshooting & Problem Identification
![Page 3: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/3.jpg)
Example #1 – Real-Time Troubleshooting
Situation: A large Law firm has been experiencing network slowdowns during peak usage times.
Solution: Determine who or what is causing heightened levels of network activity at peak times.
![Page 4: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/4.jpg)
Step 1: Check Bandwidth Utilization, which shows higher than expected utilization levels
Example #1 – Real-Time Troubleshooting
![Page 5: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/5.jpg)
Step 2: Review Top Talkers to determine active Backup Sessions during the afternoon are consuming network resources
Example #1 – Real-Time Troubleshooting
![Page 6: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/6.jpg)
Observer provides real-time identification of network issues for faster troubleshooting.
Example #1 – Recap
Situation: A large Law firm has been experiencing network slowdowns during peak usage times late in the afternoon.
Solution: Determine who or what is causing heightened levels of network activity at peak times.
Result: By reviewing Observer’s Real-Time Statistics, network administrators were able to quickly determined that backups were running during work hours and promptly reconfigured the backup schedule.
![Page 7: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/7.jpg)
Example #2 – Proactive Discovery
Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks.
Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms.
![Page 8: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/8.jpg)
Step 1: Configure Triggers & Alarms for multiple probes from a single display
Example #2 – Proactive Discovery
![Page 9: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/9.jpg)
Step 2: Define alarms on each probe, customizing Observer for each network segment
Example #2 – Proactive Discovery
![Page 10: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/10.jpg)
Step 3: Set Variable Alarm Thresholds to help eliminate false positives
Example #2 – Proactive Discovery
![Page 11: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/11.jpg)
Step 4: Define the appropriate action(s) for each alarm configured
Example #2 – Proactive Discovery
![Page 12: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/12.jpg)
Observer provides proactive discovery and notification of rogue elements.
Example #2 – Recap
Situation: Network Operations for a large Community College is concerned with Peer to Peer client usage and virus activity on their wired and wireless networks.
Solution: Monitor both the Wired and Wireless environment with Observer’s Triggers and Alarms.
Result: Using Observer’s Proactive Network Monitoring tools, the network operations team quickly identified a virus outbreak and prohibited illegal usage.
![Page 13: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/13.jpg)
Example #3 – Application Analysis Situation: An large accounting firm has the need to track and
identify application metrics, such as response time, as well as troubleshoot application connections.
Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows.
![Page 14: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/14.jpg)
Step 1: Monitor Application Level Response Time
Example #3 – Application Analysis
![Page 15: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/15.jpg)
Step 2: Examine Application Specific Statistics
Example #3 – Application Analysis
![Page 16: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/16.jpg)
Step 3: Review Graphical Application Flow Detail
Example #3 – Application Analysis
![Page 17: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/17.jpg)
Observer allows you the ability to quickly differentiate
between Network and Application Performance
Example #3 – Application Analysis
Situation: An large accounting firm has the need to track and identify application metrics, such as response time, as well as troubleshoot application connections.
Solution: Application Analysis, paired with Connection Dynamics, offers an in-depth view of application response time, statistics, and conversation flows.
Result: Isolate and identify application delay on the network, to put the responsibility on the proper group, and offer faster problem resolution for users.
![Page 18: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/18.jpg)
Example #4 – Forensic Analysis Situation: A major retail company has been tasked with
researching the violations of their acceptable use policies by a former employee.
Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabit line speed, to ensure all necessary data is captured and stored
![Page 19: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/19.jpg)
Step 1: Identify the timeframe of interest using the GigaStor Time Analysis Interface
Example #4 – Forensic Analysis
![Page 20: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/20.jpg)
Step 2: Determine the stations, conversations, or ports of interest from the specified timeframe
Example #4 – Forensic Analysis
![Page 21: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/21.jpg)
Step 3: Complex filters can be created automatically, and will be run against the specified timeframe
Example #4 – Forensic Analysis
![Page 22: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/22.jpg)
Step 4: Complete reconstruction capabilities allow an administrator to reassemble original documents such as emails, IM conversations, web pages, and even VoIP calls
Example #4 – Forensic Analysis
![Page 23: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/23.jpg)
Example #4 – Forensic Analysis
Situation: A major retail company has been tasked with researching the violations of their acceptable use policies by a former employee.
Solution: The GigaStor appliance, featuring a time-based navigation interface, allows for complete write-to-disk at Gigabitline speed, to ensure all necessary data is captured and stored.
Result: Proactive monitoring allows the organization to have relevant information available without the need to recreate an issue, or, in this case, not have the ability to verify a potential conflict with their acceptable use policy.
![Page 24: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/24.jpg)
From Hype to Adoption
By 2009, there will be over 155 million business IP end points in operationhttp://www.instat.com/r/nrep/2004/IN0401446NT.
htm
Market researchers expect the number of VoIP users worldwide to increase from around five million in 2004 to 200 million subscribers in 2010http://www.heise.de/english/newsticker/news/641
29
VoIP service is expected to grow 18-fold – from $1.25 billion in 2004 to $23.4 billion in 2009 – representing total revenues of $62 billion to be spent on the technology over the five-year period. http://www.techweb.com/wire/networking/172900
487
![Page 25: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/25.jpg)
Enterprise Pricing
![Page 26: Network Instruments Troubleshooting Techniques](https://reader035.fdocuments.net/reader035/viewer/2022062721/56813877550346895da025db/html5/thumbnails/26.jpg)
Enterprise Pricing
VoIP Analysis included at no additional charge Shipped with a 64-bit Core, with support for 32-bit systems Gigabit and WAN Appliances are all 64-bit systems
Expert Observer Includes VoIP $ 2,895
Observer Suite Includes VoIP $ 3,995
10/100/1000 Probe Appliance Includes VoIP $ 2,495
Gigabit Probe Appliance Includes VoIP $ 11,995
4 TB GigaStor Includes VoIP $ 35,000
8 TB GigaStor Includes VoIP $ 50,000
Network Instruments continues to lead the analysis industry in performance and value