SlideShare a Scribd company logo
Remote Network Monitoring
Speaker: Yousef Emami
December 22th,2013
Yousef.emami@ieee.org
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 1
Agenda
 RMON: Remote Network Monitoring
 RMON1
 RMON1 groups
 The RMON1 MIB
 Brief Notes
 Capabilities of RMON1
 How Does RMON2 Work?
 Mission
 Diagram of the RMON2 MIB
 The RMON2 MIB
 Capabilities of RMON2
 Salient Feature
 RMON Components
 RMON Probe
 RMON Support in Ethernet switches
 NAM Traffic Analyzer
 Case Study
 RMON 2 in catalyst 5000
 HC RMON
 ATM RMON
 Monitor Gigabit Communication from the Edge to the Core
 SMON
 LoriotPro
 Reference
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management
2
RMON: Remote Network Monitoring
 The most important addition to the basic set of SNMP standards is the
RMON (Remote Network MONitoring) standard, RFC 1271.
 RMON is a major step forward in internetwork management.
 It defines a remote-monitoring MIB that supplements MIB-II and provides
the network manager with vital information about the internetwork.
 RMON1 focused on OSI Layer 1 and Layer 2 information in Ethernet and
Token Ring networks. It has been extended by RMON2 which adds support
for Network-and Application-layer monitoring and by SMON (Oracle
System MONitor) which adds support for switched networks.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 3
RMON1
With the RMON1 MIB, network managers can collect information from re-mote
network segments for the purposes of troubleshooting and performance
Monitoring.
The RMON1 MIB provides:
 Current and historical traffic statistics for a network segment, for a
specific host on a segment, and between hosts (matrix).
 A versatile alarm and event mechanism for setting thresholds and noti-fying the
network manager of changes in network behavior.
 A powerful, flexible filter and packet capture facility that can be used
to deliver a complete, distributed protocol analyzer.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 4
RMON1 groups
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 5
The RMON1 MIB :
1.Statistics: real-time LAN statistics, e.g., utilization, collisions, CRC errors.
2. History: history of selected statistics.
3. Alarm: definitions for RMON SNMP traps to be sent when statistics exceed defined thresholds.
4. Hosts: host specific LAN statistics, e.g., bytes sent/received, frames sent/received.
5. Hosts top N: record of N most active connections over a given time period.
6. Matrix: the sent-received traffic matrix between systems.
7. Filter: defines packet data patterns of interest, e.g., MAC address or TCP port.
8. Capture: collect and forward packets matching the Filter.
9. Event: send alerts (SNMP traps) for the Alarm group.
10. Token Ring: extensions specific to Token Ring.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 6
Brief Notes
 An RMON implementation typically operates in a client/server model.
 Monitoring devices (commonly called “probes” in this context) contain RMON
software agents that collect information and analyze packets. These probes act as
servers and the Network Management applications that com-municate with them
act as clients.
 Probes have more responsibility for data collection and processing, which
reduces SNMP traffic and the processing load of the clients.
 Information is only transmitted to the management application when re-quired,
instead of continuous polling.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 7
Brief Notes
 RMON is designed for “flow-based” monitoring, while SNMP
is often used for “device-based” management.
 RMON is similar to other flow-based monitoring technologies such as
NetFlow and SFlow because the data collected deals mainly with traffic
patterns rather than the status of individual devices.
 One disadvantage of this system is that remote devices shoulder more of
the management burden and require more resources to do so. Some devices
balance this trade-off by implementing only a subset of the RMON MIB
groups (see below). A minimal RMON agent implementation could
support only statistics, history, alarm, and event.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 8
Capabilities of RMON1
 Without leaving the office, a network manager can watch the traffic on
a LAN segment, whether that segment is physically located around the
corner or around the world.
 Deploying network management staff resources more efficiently means
that one expert at a central site can be working on several problems by
getting information from several probes at remote sites.
 Network managers desperately need tools that can leverage their re-sources
and increase their scope of control. RMON1 does just that.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 9
How Does RMON2 Work?
 RMON2 follows client/server model
 Applications communicating to the "server" agents using the Simple
Network Management Protocol (SNMP).
 RMON2 agents will be found in dedicated devices and/or embedded in
network infrastructure devices.
 With the increased volume of traffic statistics being collected by RMON2,
the processor power and memory of the agent will be very important
considerations.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 10
Remote Monitoring in the ISO Model Going Up-the-stack With RMON2
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 11
Mission
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 12
Diagram of the RMON2 MIB
30 March 2016
Shiraz University of Technology,CE&IT Faculty,Network Management
13
The RMON2 MIB
1. Protocol Directory: list of protocols the probe can monitor.
2. Protocol Distribution: traffic statistics for each protocol.
3. Address Map: maps network-layer (IP) to MAC-layer addresses.
4. Network-Layer Host: layer 3 traffic statistics, per each host.
5. Network-Layer Matrix: layer 3 traffic statistics, per source/destination
pairs of hosts
6. Application-Layer Host: traffic statistics by application protocol, per host.
7. Application-Layer Matrix: traffic statistics by application protocol, per
source/destination pairs of hosts.
8. User History: periodic samples of user-specified variables.
9. Probe Configuration: remote config of probes.
10. RMON Conformance: requirements for RMON2 MIB conformance
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 14
LoriotPro Source Destination Matrix
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 15
Capabilities of RMON2
 Higher Layer Statistics
 Address Translation
 User-Defined History
 Improved Filtering
 Probe Configuration
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 16
Salient Feature
 The TimeFilter mechanism allows an NMS to reduce the number
transactions required for a 'table-update' operation, by retrieving only the
rows that have changed since a specified time (usually the last poll time).
 No direct way in SNMP, but RMON2 has a mechanism
 Value Added Data
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 17
RMON Components
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management
18
 RMON Probe
Data gatherer :A physical device
 RMON Probe are built into many high-end switches and routers.
 Data analyzer
Processor that analyzes data
Figure 4:RMON Components
RMON Probes
 The RMON probe also called RMON agent is a dedicated device
including hardware or software or it can be software embedded into
a network device like a router or a switch.
 RMON probe can also be software running on a standard operating
system like Windows or Linux. The application and the agent
communicate across the network using the Simple Network
Management Protocol (SNMP).
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 19
RMON support in the switch
The RMON probe functions may be present (embedded) in the network
switches (Ethernet) and provide partial or full support of some RMON
groups.
30 March 2016
Shiraz University of Technology,CE&IT Faculty,Network Management
20
Port Mirroing
Port mirroring is used on a network switch to send a copy of all
network packets seen on one switch port (or an entire VLAN) to
a network monitoring connection on another switch port.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 21
In-line taps
In-line taps are inserted directly into network link (copper wire or fiber).
They split or copy the signals from both channels (full duplex) and retransmit
the data streams hack out to the probe.
30 March 2016
Shiraz University of Technology,CE&IT
Faculty,Network Management
22
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 23
RMON Support in Ethernet switches
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 24
NAM Traffic Analyzer
 The Network Analysis Module (NAM) is an interface card installed in
the Catalyst 6000 and 6500 Series switches and Cisco 3660, 3700
Series, 2800 and 3800 Series routers, and select models of the 2600. The
NAM monitors and analyzes network traffic using remote monitoring
(RMON), RMON Extensions for Switched Networks (SMON), and
other management information bases (MIBs).
 The NAM Traffic Analyzer is software that is embedded in the NAM
that gives you browser-based access to the RMON1, RMON2, SMON,
and voice monitoring features of the NAM.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 25
Case Study
 Catalyst 5000 Family Network Analysis Module
 Fully Integrated RMON/RMON2
 The network analysis module is completely integrated into the Catalyst
5000 Family switch and shares the switch’s management IP address
and Simple Network Management Protocol (SNMP) community
strings for seamless access between mini-RMON and the extended
RMON/RMON2 groups on the network analysis module.
 No external data cables, power cords, or console connections are
required. The network analysis module consumes a single slot and can
be installed into any Catalyst 5000, 5500,5505, or 5509 chassis running
Supervisor Engine software release 4.3 or higher
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 26
RMON 2 in catalyst 5000
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 27
High-Capacity RMON
The HCRMON system provides:
 A direct, passive link into the data stream, offering an independent,
proven, and trusted view of network traffic.
 Full adherence to all 21 RMON groups, including HCRMON for complete
data collection.
 Compatibility to any RMON management console or collection facility
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 28
ATM RMON
 ATM Forum extended RMON to ATM
 ATM RMON provides cell-based (per-host and per-conversation) traffic information.
 ATM devices require cell-based measurements and statistics.
 Probe should be able to handle high speed
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 29
Monitor Gigabit Communication from the Edge to the Core
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 30
RMON Extensions for Switched Networks (SMON)
 SMON is a plug-in for hosts ,operating systems and hardware.
 The System Monitoring Plug-in for Hosts for Operating System and
Hardware delivers comprehensive monitoring, administration and
configuration management capabilities for Windows, Linux and Unix
servers, significantly reducing the complexity and cost associated with
managing operating system environments.
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 31
LoriotPro RMON
Group Description
Protocol Directory
Lists the inventory of protocols that the probe can
monitor
Protocol Distribution
Collects the number of octets and packets for
protocols detected on a network segment
Network Layer Host
Counts the amount of traffic sent from and to each
network address discovered by the probe
Network Layer Matrix
Counts the amount of traffic sent between each pair
of network addresses discovered by the probe
Application Layer Host
Counts the amount of traffic, by protocol, sent from
and to each network address discovered by the probe
Application Layer Matrix
Counts the amount of traffic, by protocol, sent
between each pair of network addresses discovered
by the probe
User History
Periodically samples user-specified variables and logs
the data based on user-defined parameters
Probe Configuration
Defines standard configuration parameters for RMON
probes
Address Map
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 32
Thank you for your kind attention
?
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 33
Reference
[1] Jianguo Ding ,”Advances in Network Management”, Auerbach
Publications,2013
[2] Remote Monitoring 2, http://tools.ietf.org/html/draft-ietf-rmonmib-rmon2-v2-
05,2013
[3] Catalyst 5000 Family Network Analysis Module
http://www.cisco.com/en/US/products/hw/switches/ps679/products_data_sheet09186a008072ad96.html,
2013
[4] User Guide for Cisco Network Analysis Module Traffic Analyzer,
http://www.cisco.com/en/US/docs/net_mgmt/network_analysis_module_software/3.6/user/guide/users.html,2013
[5] SMON ,http://docs.oracle.com/cd/B16240_01/doc/nav/plugins.html,2103
[6] Remote Monitoring MIB Extensions for ATM Networks, http://www.broadband-forum.org/,2013
[7] RMON GUI - Remote network MONitoring Administrator handbook http://www.loriotpro.com/Products/RMON_GUI/225-
RMON_Probes_EN.html,2013
[8] Gigabit Network Analysis , www.networkinstruments.co.uk,2013
30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management
34

More Related Content

PPT
TCP/IP Network ppt
PPT
Comprehensive survey on routing protocols for IoT
PPT
Formal Specification in Software Engineering SE9
PPTX
Artifacts
PPTX
Recognition-of-tokens
PDF
Configuration of mesh topology in cisco packet tracer by Tanjilur RAhman
PPTX
Transport layer protocol
PPTX
Software Project Management - Staffing
TCP/IP Network ppt
Comprehensive survey on routing protocols for IoT
Formal Specification in Software Engineering SE9
Artifacts
Recognition-of-tokens
Configuration of mesh topology in cisco packet tracer by Tanjilur RAhman
Transport layer protocol
Software Project Management - Staffing

What's hot (20)

PPTX
Data Designs (Software Engg.)
PPTX
M2M systems layers and designs standardizations
PDF
Software project management
PDF
IoT and m2m
PPTX
Metrics for project size estimation
PPTX
Fault tolerance in distributed systems
PPTX
User datagram protocol (udp)
PPTX
Network Layer design Issues.pptx
PDF
software engineering
PPT
OSI Model
DOC
IOT Reference Model.doc
PPTX
source code metrics and other maintenance tools and techniques
PPT
Symbol table management and error handling in compiler design
PPTX
SLA Agreement, types and Life Cycle
PDF
Token, Pattern and Lexeme
PPTX
Role-of-lexical-analysis
PPTX
Software Size Estimation
PPT
TCP/IP Protocols With All Layer Description
PPTX
Computer network switching
PPTX
Data Designs (Software Engg.)
M2M systems layers and designs standardizations
Software project management
IoT and m2m
Metrics for project size estimation
Fault tolerance in distributed systems
User datagram protocol (udp)
Network Layer design Issues.pptx
software engineering
OSI Model
IOT Reference Model.doc
source code metrics and other maintenance tools and techniques
Symbol table management and error handling in compiler design
SLA Agreement, types and Life Cycle
Token, Pattern and Lexeme
Role-of-lexical-analysis
Software Size Estimation
TCP/IP Protocols With All Layer Description
Computer network switching
Ad

Viewers also liked (20)

PPT
Remote Network Monitoring System
PDF
Introduction to SNMP
PPTX
Network management systems in large enterprise
PDF
eNeighbor® Remote Monitoring System
PPT
Network Physics
PPTX
Network Troubleshooting - Part 2
PPT
SNMP Network Management the Essentials
PPT
Hack In Paris 2011 - Practical Sandboxing
PDF
Secure and Simple Sandboxing in SELinux
PPTX
Sandboxing in .NET CLR
PDF
Network Monitoring Tools
PDF
Biz model for visible light comunication
DOC
Transmission Engineer_Telecom.Doc
PDF
Ceh v5 module 07 sniffers
PPT
File Transfer protocols
PPT
Nmap(network mapping)
DOCX
Communication models
PPTX
Content Analysis System and Advanced Threat Protection
PPTX
Advanced Threat Protection - Sandboxing 101
PPTX
File transfer protocol
Remote Network Monitoring System
Introduction to SNMP
Network management systems in large enterprise
eNeighbor® Remote Monitoring System
Network Physics
Network Troubleshooting - Part 2
SNMP Network Management the Essentials
Hack In Paris 2011 - Practical Sandboxing
Secure and Simple Sandboxing in SELinux
Sandboxing in .NET CLR
Network Monitoring Tools
Biz model for visible light comunication
Transmission Engineer_Telecom.Doc
Ceh v5 module 07 sniffers
File Transfer protocols
Nmap(network mapping)
Communication models
Content Analysis System and Advanced Threat Protection
Advanced Threat Protection - Sandboxing 101
File transfer protocol
Ad

Similar to Remote network monitoring (20)

PPT
Flightcase IT Services Pvt. Ltd.
PDF
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
PPT
Management Tools Desirable features Management Architectures Simple Network ...
PDF
4. Net Mgmt.pdf
PDF
SNMP Monitoring at scale - Icinga Camp Milan 2023
PPT
Functional Areas of Network Management Configuration Management
PDF
OSMC 2023 | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
PPT
Network management
PPTX
PPTX
network monitoring system ppt
PDF
Network Monitoring System ppt.pdf
PDF
A new perspective on Network Visibility - RISK 2015
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
PPTX
ppt on servicenow.pptx
PPTX
Network monitoring Project Proposal.pptx
PPT
Chapter09
PPT
(Snmp) simple network management protocol
PDF
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
DOCX
Computer Network Monitoring & Performance
PPTX
Centralized monitoring station for it computing and network infrastructure
Flightcase IT Services Pvt. Ltd.
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Management Tools Desirable features Management Architectures Simple Network ...
4. Net Mgmt.pdf
SNMP Monitoring at scale - Icinga Camp Milan 2023
Functional Areas of Network Management Configuration Management
OSMC 2023 | SNMP Monitoring at scale by Rocco Pezzani & Thomas Gelf
Network management
network monitoring system ppt
Network Monitoring System ppt.pdf
A new perspective on Network Visibility - RISK 2015
HOST AND NETWORK SECURITY by ThesisScientist.com
ppt on servicenow.pptx
Network monitoring Project Proposal.pptx
Chapter09
(Snmp) simple network management protocol
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
Computer Network Monitoring & Performance
Centralized monitoring station for it computing and network infrastructure

More from yousef emami (12)

PDF
A sonic-wave system that prevents from beetle entrance to building
PDF
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
PDF
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
PDF
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
PDF
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
PDF
Automatic Management of Wireless Sensor Networks through Cloud Computing
PDF
امواج الکترومغناطیس :استانداردها و چشم انداز ها
PPT
An improved network intrusion detection technique based on
PPTX
VM placement
PPTX
Data fusion
PPTX
Wi Fi Security
PPTX
802.11ac
A sonic-wave system that prevents from beetle entrance to building
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Automatic Management of Wireless Sensor Networks through Cloud Computing
امواج الکترومغناطیس :استانداردها و چشم انداز ها
An improved network intrusion detection technique based on
VM placement
Data fusion
Wi Fi Security
802.11ac

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf

Remote network monitoring

  • 1. Remote Network Monitoring Speaker: Yousef Emami December 22th,2013 Yousef.emami@ieee.org 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 1
  • 2. Agenda  RMON: Remote Network Monitoring  RMON1  RMON1 groups  The RMON1 MIB  Brief Notes  Capabilities of RMON1  How Does RMON2 Work?  Mission  Diagram of the RMON2 MIB  The RMON2 MIB  Capabilities of RMON2  Salient Feature  RMON Components  RMON Probe  RMON Support in Ethernet switches  NAM Traffic Analyzer  Case Study  RMON 2 in catalyst 5000  HC RMON  ATM RMON  Monitor Gigabit Communication from the Edge to the Core  SMON  LoriotPro  Reference 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 2
  • 3. RMON: Remote Network Monitoring  The most important addition to the basic set of SNMP standards is the RMON (Remote Network MONitoring) standard, RFC 1271.  RMON is a major step forward in internetwork management.  It defines a remote-monitoring MIB that supplements MIB-II and provides the network manager with vital information about the internetwork.  RMON1 focused on OSI Layer 1 and Layer 2 information in Ethernet and Token Ring networks. It has been extended by RMON2 which adds support for Network-and Application-layer monitoring and by SMON (Oracle System MONitor) which adds support for switched networks. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 3
  • 4. RMON1 With the RMON1 MIB, network managers can collect information from re-mote network segments for the purposes of troubleshooting and performance Monitoring. The RMON1 MIB provides:  Current and historical traffic statistics for a network segment, for a specific host on a segment, and between hosts (matrix).  A versatile alarm and event mechanism for setting thresholds and noti-fying the network manager of changes in network behavior.  A powerful, flexible filter and packet capture facility that can be used to deliver a complete, distributed protocol analyzer. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 4
  • 5. RMON1 groups 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 5
  • 6. The RMON1 MIB : 1.Statistics: real-time LAN statistics, e.g., utilization, collisions, CRC errors. 2. History: history of selected statistics. 3. Alarm: definitions for RMON SNMP traps to be sent when statistics exceed defined thresholds. 4. Hosts: host specific LAN statistics, e.g., bytes sent/received, frames sent/received. 5. Hosts top N: record of N most active connections over a given time period. 6. Matrix: the sent-received traffic matrix between systems. 7. Filter: defines packet data patterns of interest, e.g., MAC address or TCP port. 8. Capture: collect and forward packets matching the Filter. 9. Event: send alerts (SNMP traps) for the Alarm group. 10. Token Ring: extensions specific to Token Ring. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 6
  • 7. Brief Notes  An RMON implementation typically operates in a client/server model.  Monitoring devices (commonly called “probes” in this context) contain RMON software agents that collect information and analyze packets. These probes act as servers and the Network Management applications that com-municate with them act as clients.  Probes have more responsibility for data collection and processing, which reduces SNMP traffic and the processing load of the clients.  Information is only transmitted to the management application when re-quired, instead of continuous polling. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 7
  • 8. Brief Notes  RMON is designed for “flow-based” monitoring, while SNMP is often used for “device-based” management.  RMON is similar to other flow-based monitoring technologies such as NetFlow and SFlow because the data collected deals mainly with traffic patterns rather than the status of individual devices.  One disadvantage of this system is that remote devices shoulder more of the management burden and require more resources to do so. Some devices balance this trade-off by implementing only a subset of the RMON MIB groups (see below). A minimal RMON agent implementation could support only statistics, history, alarm, and event. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 8
  • 9. Capabilities of RMON1  Without leaving the office, a network manager can watch the traffic on a LAN segment, whether that segment is physically located around the corner or around the world.  Deploying network management staff resources more efficiently means that one expert at a central site can be working on several problems by getting information from several probes at remote sites.  Network managers desperately need tools that can leverage their re-sources and increase their scope of control. RMON1 does just that. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 9
  • 10. How Does RMON2 Work?  RMON2 follows client/server model  Applications communicating to the "server" agents using the Simple Network Management Protocol (SNMP).  RMON2 agents will be found in dedicated devices and/or embedded in network infrastructure devices.  With the increased volume of traffic statistics being collected by RMON2, the processor power and memory of the agent will be very important considerations. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 10
  • 11. Remote Monitoring in the ISO Model Going Up-the-stack With RMON2 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 11
  • 12. Mission 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 12
  • 13. Diagram of the RMON2 MIB 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 13
  • 14. The RMON2 MIB 1. Protocol Directory: list of protocols the probe can monitor. 2. Protocol Distribution: traffic statistics for each protocol. 3. Address Map: maps network-layer (IP) to MAC-layer addresses. 4. Network-Layer Host: layer 3 traffic statistics, per each host. 5. Network-Layer Matrix: layer 3 traffic statistics, per source/destination pairs of hosts 6. Application-Layer Host: traffic statistics by application protocol, per host. 7. Application-Layer Matrix: traffic statistics by application protocol, per source/destination pairs of hosts. 8. User History: periodic samples of user-specified variables. 9. Probe Configuration: remote config of probes. 10. RMON Conformance: requirements for RMON2 MIB conformance 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 14
  • 15. LoriotPro Source Destination Matrix 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 15
  • 16. Capabilities of RMON2  Higher Layer Statistics  Address Translation  User-Defined History  Improved Filtering  Probe Configuration 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 16
  • 17. Salient Feature  The TimeFilter mechanism allows an NMS to reduce the number transactions required for a 'table-update' operation, by retrieving only the rows that have changed since a specified time (usually the last poll time).  No direct way in SNMP, but RMON2 has a mechanism  Value Added Data 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 17
  • 18. RMON Components 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 18  RMON Probe Data gatherer :A physical device  RMON Probe are built into many high-end switches and routers.  Data analyzer Processor that analyzes data Figure 4:RMON Components
  • 19. RMON Probes  The RMON probe also called RMON agent is a dedicated device including hardware or software or it can be software embedded into a network device like a router or a switch.  RMON probe can also be software running on a standard operating system like Windows or Linux. The application and the agent communicate across the network using the Simple Network Management Protocol (SNMP). 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 19
  • 20. RMON support in the switch The RMON probe functions may be present (embedded) in the network switches (Ethernet) and provide partial or full support of some RMON groups. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 20
  • 21. Port Mirroing Port mirroring is used on a network switch to send a copy of all network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 21
  • 22. In-line taps In-line taps are inserted directly into network link (copper wire or fiber). They split or copy the signals from both channels (full duplex) and retransmit the data streams hack out to the probe. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 22
  • 23. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 23 RMON Support in Ethernet switches
  • 24. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 24
  • 25. NAM Traffic Analyzer  The Network Analysis Module (NAM) is an interface card installed in the Catalyst 6000 and 6500 Series switches and Cisco 3660, 3700 Series, 2800 and 3800 Series routers, and select models of the 2600. The NAM monitors and analyzes network traffic using remote monitoring (RMON), RMON Extensions for Switched Networks (SMON), and other management information bases (MIBs).  The NAM Traffic Analyzer is software that is embedded in the NAM that gives you browser-based access to the RMON1, RMON2, SMON, and voice monitoring features of the NAM. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 25
  • 26. Case Study  Catalyst 5000 Family Network Analysis Module  Fully Integrated RMON/RMON2  The network analysis module is completely integrated into the Catalyst 5000 Family switch and shares the switch’s management IP address and Simple Network Management Protocol (SNMP) community strings for seamless access between mini-RMON and the extended RMON/RMON2 groups on the network analysis module.  No external data cables, power cords, or console connections are required. The network analysis module consumes a single slot and can be installed into any Catalyst 5000, 5500,5505, or 5509 chassis running Supervisor Engine software release 4.3 or higher 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 26
  • 27. RMON 2 in catalyst 5000 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 27
  • 28. High-Capacity RMON The HCRMON system provides:  A direct, passive link into the data stream, offering an independent, proven, and trusted view of network traffic.  Full adherence to all 21 RMON groups, including HCRMON for complete data collection.  Compatibility to any RMON management console or collection facility 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 28
  • 29. ATM RMON  ATM Forum extended RMON to ATM  ATM RMON provides cell-based (per-host and per-conversation) traffic information.  ATM devices require cell-based measurements and statistics.  Probe should be able to handle high speed 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 29
  • 30. Monitor Gigabit Communication from the Edge to the Core 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 30
  • 31. RMON Extensions for Switched Networks (SMON)  SMON is a plug-in for hosts ,operating systems and hardware.  The System Monitoring Plug-in for Hosts for Operating System and Hardware delivers comprehensive monitoring, administration and configuration management capabilities for Windows, Linux and Unix servers, significantly reducing the complexity and cost associated with managing operating system environments. 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 31
  • 32. LoriotPro RMON Group Description Protocol Directory Lists the inventory of protocols that the probe can monitor Protocol Distribution Collects the number of octets and packets for protocols detected on a network segment Network Layer Host Counts the amount of traffic sent from and to each network address discovered by the probe Network Layer Matrix Counts the amount of traffic sent between each pair of network addresses discovered by the probe Application Layer Host Counts the amount of traffic, by protocol, sent from and to each network address discovered by the probe Application Layer Matrix Counts the amount of traffic, by protocol, sent between each pair of network addresses discovered by the probe User History Periodically samples user-specified variables and logs the data based on user-defined parameters Probe Configuration Defines standard configuration parameters for RMON probes Address Map 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 32
  • 33. Thank you for your kind attention ? 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 33
  • 34. Reference [1] Jianguo Ding ,”Advances in Network Management”, Auerbach Publications,2013 [2] Remote Monitoring 2, http://tools.ietf.org/html/draft-ietf-rmonmib-rmon2-v2- 05,2013 [3] Catalyst 5000 Family Network Analysis Module http://www.cisco.com/en/US/products/hw/switches/ps679/products_data_sheet09186a008072ad96.html, 2013 [4] User Guide for Cisco Network Analysis Module Traffic Analyzer, http://www.cisco.com/en/US/docs/net_mgmt/network_analysis_module_software/3.6/user/guide/users.html,2013 [5] SMON ,http://docs.oracle.com/cd/B16240_01/doc/nav/plugins.html,2103 [6] Remote Monitoring MIB Extensions for ATM Networks, http://www.broadband-forum.org/,2013 [7] RMON GUI - Remote network MONitoring Administrator handbook http://www.loriotpro.com/Products/RMON_GUI/225- RMON_Probes_EN.html,2013 [8] Gigabit Network Analysis , www.networkinstruments.co.uk,2013 30 March 2016 Shiraz University of Technology,CE&IT Faculty,Network Management 34