Module 1.2: Introduction (cont.) • • Characterizing Network Traffic Server Placement K. Salah 1 Characterizing Network Traffic K. Salah 2 Characterizing Network Traffic • • • Sniffing Network Traffic and performing Traffic Characterization Application Profiles Application Monitoring K. Salah 3 Sniffing Network Traffic K. Salah 4 Sniffing Network Traffic • • • • By looking at what is going on inside the network wire - called “sniffing” By analyzing on how the network is being used - looking at application use We do this to better understand how the network resource, bandwidth, is being used and how its use impacts the network’s design By capturing traffic you can really see how your network is performing K. Salah 5 Sniffing Network Traffic • • • • There are several ways to collect data to determine our network traffic One way is to look inside the wire - otherwise known as “sniffing” the network traffic Lets look at how Windows NT does this as an example of how you do this Experiments with Etherreal Sniffer Tool K. Salah 6 Sniffing Network Traffic Analyze Optimize K. Salah Predict 7 Characterizing Services • • Traffic Characterization – What kind of traffic is generated? – How often is it generated? – What is the relative impact on the network? Method for Characterizing a Service – Use a network capturing and analysis tool – Capture the appropriate traffic – Identify each frame in the capture K. Salah 8 Frame Types Broadcast Deliver to all hosts Multicast Deliver to registered members Directed K. Salah 9 Deliver to specified address Using the NT Network Monitor Software Installation • • Network Monitor Application Network Monitor Agent Network Adapter Card • • Must Support Promiscuous Mode for Network-Wide Traffic Local-only Mode Will Capture Traffic to and from the Local Host K. Salah 10 The NT Network Monitor Interface Network Monitor - [\Ethernet\NET1 Capture Window (Station Stats)] File Capture Tools Options Window Time Elapsed: 00:01:44.659 % Network Utilization: 0 0 Graph Pane 0 Help Network Statistics 100 # Frames: 35 # Broadcasts: 4 # Multicasts: 0 # Bytes: 3450 # Frames Dropped: 0 Network Status: Normal Frames Per Second: 0 100 0 2180 Bytes Per Second: 0 Broadcasts Per Second : Captured Statistics # Frames: 35 # Frames in Buffer: 35 # Bytes: 3450 # Bytes in Buffer: 3730 % Buffer Utilized: 0 # Frames Dropped: 0 Network Address 1->2 1<-2 Network Address 2 BACKUP 9 11 WFW Client Session BACKUP INSTRUCTOR Statistics Pane INSTRUCTOR WFW Client 1 2 4 3 1 4 Total Statistics Pane *BROADCAST WFW Client BACKUP *BROADCAST Per Second Statistics % Network Utilization: 0 # Frames/second: 0 # Bytes /second : 0 Network Address Frames Sent Frames Rcvd Bytes Sent Bytes Rcvd Directed Frames Sent *BROADCAST 0 4 0 423 0 Multicasts Sent Broadcasts Sent 0 0 BACKUP INSTRUCTOR WFW Client 0 0 0 14 6 15 15 5 11 1336 432 1682 1513 402 112 13 6 12 Network Monitor V1.1 (built on Jun 23 1995 at 17:49:57) K. Salah 11 1 0 3 Station Statistics Pane Displaying Data with Network Monitor Network Monitor- [Capture:1 (Summary)] File Edit Display Tools Options Window Help Frame Time Src MAC Addr Dst MAC Addr Protocol Description 19 20 21 22 23 66.276 66.277 66.278 66.279 66.281 WFW Client WFW Client BACKUP WFW Client BACKUP BACKUP BACKUP WFW Client BACKUP WFW Client TCP NBT NBT SMB SMB .A..S., len: 0, seq: 282193079, ack:1312173 SS: Session Request, Dest: BACKUP , So SS: Positive Session Response, Len: 0 C negotiate, Dialect = Windows for Workgroups R negotiate, Dialect # = 3 Summary Pane + IP: ID = 0xE204; Proto = TCP; Len: 186 + TCP: .AP..., len: 146, seq: 282193151, ack: 1312173868, win: 8756, src: 1029 dst: 139 (NBT Session) + NBT: SS: Session Message, Len: 142 - SMB: C negotiate, Dialect = Windows for Workgroups 3.1a +SMB: SMB Status = Error Success +SMB: Header: PID = 0x36DB TID = 0x0000 MID = 0x4F81 UID = 0x0000 - SMB: Command = C negotiate SMB: Word count = 0 SMB: Byte count = 107 SMB: Byte parameters - SMB: Dialect Strings Understood SMB: Dialect String = PC NETWORK PROGRAM 1.0 00000050 00000060 00000070 00000080 00000090 000000A0 000000B0 00 20 20 4E 53 20 6F 00 4E 31 45 20 4C 77 00 45 2E 54 4C 41 73 00 54 30 57 4D 4E 20 DB 57 00 4F 31 4D 66 36 4F 02 52 2E 41 6F 00 52 4D 4B 32 4E 72 00 4B 49 53 58 32 20 81 20 43 20 30 2E 57 4F 50 52 33 30 31 6F 00 52 4F 2E 32 00 72 6B 4F 53 30 00 02 6B 00 47 4F 00 02 57 67 SMB dialects this node understands K. Salah 02 52 46 02 44 69 72 50 41 54 44 4F 6E 6F 43 4D 20 4F 53 64 75 . . . . | 6. . u0 . k . . PC NETWORK PROGRAM 1 . 0 . . MICROSOFT NETWORKS 3 . 0 . . DO S LM1 . 2X002 . . DOS LANMAN2 . 1 . . Wind ows for Workgroups F#: 22/35 12 Off: 93(x5D) Detail Pane Hex Pane L: 107 (x6B) Ethereal Demo K. Salah 13 Application Profiles K. Salah 14 Application Profiles • • The other way to characterize network traffic is by looking at the applications that users utilize on the network and figuring out their impact on the overall network Again, the goal is to figure out how the bandwidth is being used and the adequacy of the network design K. Salah 15 Application Usage Patterns • • • • Need to identify the number of users per application Need to identify the frequency of application sessions Length of an average application session Number of simultaneous users of an application K. Salah 16 Application Assumptions • If it is not practical to research the application details, some assumptions you can make: – number of application users = simultaneous users – all applications are used all the time – each user opens just one session and the session lasts all day K. Salah 17 Size of Data Objects – – – – – – – – – – K. Salah Terminal session - 4 Kbytes E-mail message - 10 Kbytes Web page with graphics - 50 Kbytes Spreadsheet - 100 Kbytes Word processing document - 200 Kbytes Graphical computer screen - 500 Kbytes Presentation document - 2 Mbytes High resolution image - 50 Mbytes Multimedia object - 100 Mbytes Database backup - 1 Gigabyte or more 18 Application Monitoring K. Salah 19 Application Monitoring • • • • Using software tools can be used to determine application performance statistics Uses “agents” to collect data and send information to a “management” station Agents run on the different OS where the applications are installed Usually very expensive – $10,000 to $25,000 K. Salah 20 Application Monitoring • • • The idea is to be able to predict what will be the effect on the network of rolling out a new software application For existing application, the profiling software transforms raw application data captured from the network into an application profile. This is used for scalability. Allows you to do what-if scenarios, to ensure the planned application can be run across your LAN or WAN. K. Salah 21 Application Monitoring • • CACI Products Company – Application Profiler – www.caci.com Ganymede Software – Pegasus 2.1 – www.ganymede.com K. Salah 22 K. Salah 23 K. Salah 24 K. Salah 25 K. Salah 26 K. Salah 27 K. Salah 28 Server Placement K. Salah 29 Server Placement • • • Can have a major effect on capacity planning, depending on the applications run on the servers and the way the workstations are connected. Network problems can be prevented when the designer understands the traffic patterns Since servers use the bandwidth, placement becomes critical K. Salah 30 Server Types • • Identified by Function and Users they support Common Servers – Enterprise Server – Distributed Server – Network Computer Server (Terminal Server) – WEB Application Server K. Salah 31 Enterprise Server • • • • Centralized Server Supports all or majority of network users – example is e-mail server for company Most often located in the Data Center near the network backbone All users’ traffic travels through the backbone devices (routers & switches) K. Salah 32 Enterprise Server Example K. Salah 33 Distributed Server • • • Local or Workgroup servers Supports a specific group of users – Payroll server that supports only the accounting group Placed on the same network subnet as the users that it supports – located usually in the wiring closet K. Salah 34 Distributed Server • • Can effectively reduce the amount of traffic traveling across the network core – Traffic does not need to be routed through the network Can be used to direct traffic on the network, e.g. NAT. K. Salah 35 Distributed Server Example K. Salah 36 Terminal Server • Fileserver to support “thin” Clients – Network PC or Low End PC’s – Applications run on the server, graphic information sent to the client, no applications “run” on the client machine – Use NT Server to provide windows applications to the Unix client machines • Like the “mainframe” model of old K. Salah 37 Terminal Server • • Can be either Distributed or Enterprise Needs to be a high powered server in order to service the user with applications – imagine all users running Word on the Terminal Server vice on their own client machine K. Salah 38 WEB Server • • Normally set up as an Enterprise level server as many users need access for common information May also be set outside the company’s internal network for outsiders (untrusted) to get information from. Usually protected by different network devices. K. Salah 39 Server Placement Summary • • As you can see, the location and purpose of a server can have a major impact on traffic Need to understand where traffic is going in order to place the servers in the right location in order to ensure network “bottlenecks” are not created K. Salah 40