Lecture 4
Lecture 4
Analysis
Lecture 4
Characterizing the Existing Network
1-2
Characterizing the Existing Network
2. Application Profiles
3. Application Monitoring
1- Sniffing Network Traffic
Analyze
Analyze
Optimize
Optimize Predict
Predict
Characterizing Services
Traffic Characterization
What kind of traffic is generated?
How often is it generated?
What is the relative impact on the network?
Method for Characterizing a Service
Use a network capturing and analysis tool
Capture the appropriate traffic
Identify each frame in the capture
Frame Types
Network Address Frames Sent Frames Rcvd Bytes Sent Bytes Rcvd Directed Frames Sent Multicasts Sent Broadcasts Sent
*BROADCAST 0 4 0 423 0 0 0
BACKUP 14 15 1336 1513 13 0 1 Station
Station
INSTRUCTOR 6
WFW Client 15
5
11
432
1682
402
112
6
12
0
0
0
3
Statistics
StatisticsPane
Pane
SMB dialects this node understands F#: 22/35 Off: 93(x5D) L: 107 (x6B)
Characterizing Network Traffic
Application Profiles
Application Profiles
The other way to characterize network traffic
is by looking at the applications that users
utilize on the network and figuring out their
impact on the overall network
Terminal/Host
Asymmetrical
Terminal sends a few characters
Host sends back many characters
Client/Server
Similar to above
Client sends more data as does the server
36
Types of Traffic
Browser/Server
Similar to a terminal/server
Uses a web browser instead of a dedicated
program
The server response will be quite large possibly
Peer-to-Peer
This flow is bi-directional and symmetric
Unix-to-Unix workstations often use this
37
Types of Traffic
Server-to-Server
The flow depends on the relationship between
the servers
If mirrored, then one way and high level
Other relationships may be more bi-directional
Distributed Computing
Several computers join together to solve a single
problem
Normally the exchange is quite high
It is bi-directional and symmetrical
38
Type of Traffic List
39