Characterizing the Existing Network Traffic
Background.
Now we will narrow our focus somewhat to focus on the existing network
traffic and reliability. This will include much of what was suggested in the
previous web page. The steps recommended in Teare are largely the
following. I have modified them very slightly because I do not
feel the Cisco book truly accurately characterizes bottlenecks. I
have changed the name of Step 4 and put in a Step 11 to identify
bottlenecks and their source traffic.
Now we will go into much more detail about each of these steps. Step 1 - Customer Applications. Use the table that follows the bulleted list to characterize the customer's applications, filling in the fields as indicated:
The following table has been referred to above. |
Step 1 - Characterize Customer's Applications | ||||
Name of Application | Type of Application | Number of Users | Number of Hosts/Servers | Comments |
Step 2 - Network Protocols. Use the table that follows the bulleted list to characterize the customer's network protocols, filling in the fields as indicated:
The following table has been referred to above. |
Step 2 - Characterize Customer's Network Protocols | ||||
Name of Protocol | Type of Protocol | Number of Users | Number of Hosts/Servers | Comments |
Step 3 - Document Current Network. You need to develop documentation on the customer's existing network. Use their own documentation if reasonable. While there are a lot of things that need to examined, the following list emphasizes some essentials:
Step 4 - Characterize Local and Non-Local Traffic. It is very important to identify potential bottlenecks associated with all sources. It is usually best to use a protocol analyzer and determine how much traffic on each major network segment is local, not local and how much just passes through this segment. When doing this it is important to identify source and destination addresses. The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Step 4 - Characterize Localness of Sources and Destinations | ||||
Network Segment Identification | Both Source and Destination Are Local | Source Is Local, Destination Is Not Local | Source Is Not Local, Destination Is Local | Source Is Not Local, Destination Is Not Local |
Step 5 - Identify Business Constraints and Inputs. After you have interacted with your customer, input teams and future champions, check off as many of the following as you can.
You also want to make sure you document any concerns you have about the customer's business constraints. Step 6 - Characterize Network Availability. You need to make sure to gather statistics on network downtimes and MTBF - mean times between failures. If some aspects or segments of the network are known to be fragile, gather statistics on those. You also need to make sure to get the customer to express the cost of downtimes and their impacts on the overall business.
The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Step 6 - Characterize Network Availability | ||||
Network Segment/Component Identification | MTBF | Date of Last Downtime | Duration of Last Downtime | Cause of Last Downtime |
Internetwork | ||||
AppleTalk Segment | ||||
FDDI Backbone | ||||
. . . |
||||
E-Mail Server | ||||
Firewall | ||||
. . . |
Step 7 - Characterize Network Performance. You need to make sure to gather statistics on network segments and devices to evaluate their performance. This data should lead into later calculating utilizations. The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Step 7 - Characterize Network Performance | ||||
Network Segment/Component Identification | Theoretical Capacity | Typical Traffic Intensity | Peak Traffic Intensity | Inward/Outward |
Internetwork | ||||
AppleTalk Segment | ||||
FDDI Backbone | ||||
. . . |
||||
E-Mail Server | ||||
Firewall | ||||
. . . |
Step 8 - Characterize Network Reliability. You need to make sure to gather statistics on network segments to evaluate their reliability. The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Step 8 - Characterize Network Reliability | ||||
Network Segment | Average Frame Size | CRC Error Rate | MAC Layer Error Rate | Broadcast/Multicast Rate |
Internetwork | ||||
AppleTalk Segment | ||||
FDDI Backbone | ||||
. . . |
Step 9 - Characterize Network Utilization. You need to make sure to gather statistics on network segments to evaluate their utilizations. Much of these computations will be slightly redundant to what has been done previously, but there is more focus on the protocols in this step. To fill in these boxes you need to configure a monitoring tool to output an average utilization statistic once each hour. If a segment is saturated then you need to look at these statistics one each minute. The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Step 9 - Characterize Network Utilizations | ||||
Network Segment/Protocol | Relative Network Utilization | Absolute Network Utilization | MAC Layer Error Rate | Broadcast/Multicast Rate |
Internetwork | ||||
AppleTalk Segment | ||||
FDDI Backbone | ||||
. . . |
Step 10 - Characterize Status of Major Routers. You need to make sure to gather statistics on major routers to evaluate their utilizations and throughput rates. To fill in these boxes you need to configure a monitor the processes, buffers and interfaces. CISCO's IOS has these sorts of capabilities already built in. The following list describes some more about how you should use the table that follows after it.
The following table is referred to above. |
Router Name | Five Minute CPU Utilization | Output Queue Drops per Hour | Input Queue Drops per Hour | Missed Packets per Hour | Ignored Packets per Hour | Comments |
Step 11 - Identify Major Bottlenecks and Vulnerabilities. Now that you have all of the utilizations and performance measures for the routers, servers, and network segments/protocols you can look these over to determine where your network performance is most vulnerable and where your traffic flows relative to capacity are the above what you can tolerate in the system. Step 12 - Characterize the Existing Network Management System and Tools. Document the platforms and network management tools in use. If available, gather examples of recent reports. Step 13 - Summarize the Health of the Existing Network. Check off any items on the following checklist that are true. If the network is healthy you should be able to check everything. Notice that the guidelines are quite vague and depend on many things like the type of traffic, applications, devices, topology, protocols, and criteria for acceptable performance. |