Book description
Network Performance Baselining focuses on the real world implementation of network baselining principles and shows how to measure and rate a network's performance. It includes chapters that give a real "How To" approach for standard baseline methodologies along with actual steps and processes to perform network baseline measurements. It explains the proper way to document and build a baseline report. Incuded is an extensive chapter on case studies of actual Network Baselines that Mr. Nassar and LAN Scope has preformed and a "To the Point" brief review on techniques of baselining all major LAN and WAN topologies such as Ethernet, Token Ring, ATM, Frame Relay, WANs, FDDI. Also, a "Technique Reference" will be provided on the baseline and evaluation of all major network protocols such as Windows NT, Netware, TCP/IP, DecNet, Banyan, SNA and standard IBM suite protocols.
Table of contents
- Copyright
- About the Author
- About the Technical Reviewers
- Acknowledgments
- Tell Us What You Think
- 1. What Is Baselining
- 2. Baselining Goals
-
3. Network Baselining Tools
- 3.1. Network Baselining Tool Usage Methodology
-
3.2. Network Protocol Analyzer and Monitoring Tool Reviews
- 3.2.1. Network Associates Sniffer Analyzers
- 3.2.2. Shomiti Systems Inc. Analysis Tools
- 3.2.3. Wavetek Wandel and Goltermann's Domino Analyzers
- 3.2.4. Novell LANalyzer for Windows
- 3.2.5. Hewlett-Packard Network Advisor
- 3.2.6. Optimal Software Application Expert and Application Preview
- 3.2.7. Compuware's EcoSCOPE
- 3.2.8. Ganymede Software's Chariot and Pegasus Monitoring Tools
- 3.2.9. Antara Testing Products
- 3.2.10. Fluke LANMeter
- 3.3. Closing Statement on Network Analysis Tools
-
4. Quantitative Measurements in Network Baselining
- 4.1. Utilization Analysis
- 4.2. ULP Data Unit Measurements
- 4.3. Network Performance Reviews
-
4.4. Analyzing an Internetwork for Reliability
- 4.4.1. Network Connection Analysis
- 4.4.2. Logon Sequence Analysis
- 4.4.3. Network Keepalive Connection Analysis
- 4.4.4. File Search and File Access Sequencing and Analysis
- 4.4.5. Internetwork Addressing Analysis
- 4.4.6. Routing Protocol Updates
- 4.4.7. Unique Packet Identification Problem Analysis
- 4.4.8. Summary
- 4.5. Application Characterization Tuning and Modeling
- Case Study 1: Utilization and Capacity Analysis
- Case Study 2: Throughput Analysis Issue
- Case Study 3: Response Time Baseline Analysis
- Case Study 4: Packet Size Analysis
- Case Study 5: Application Characterization and Modeling Analysis
-
5. Network Analysis and Optimization Techniques
- 5.1. Physical Health Analysis
- 5.2. Broadcast Storm Analysis
- 5.3. Network Capacity Overload Analysis
- 5.4. Network Throughput Analysis
- 5.5. Network End-to End Interpacket Timing Analysis
- 5.6. Transport and File Retransmission Analysis
- 5.7. Path and Route Analysis
- 5.8. End-to-End File Transfer Analysis
- 5.9. Trace Decoding Techniques
- 5.10. Conclusion
- 6. Documenting the Network for Baselining
-
7. LAN and WAN Protocols
-
7.1. Analysis of the Novell Protocol Suite
- 7.1.1. IPX
- 7.1.2. SPX
- 7.1.3. Network Core Protocol
- 7.1.4. Other Key Layers in the Novell Protocol Suite
- 7.1.5. Tips on Analyzing the Novell Protocol Suite
- 7.1.6. NCP Analysis Techniques
- 7.1.7. SAP Analysis Techniques
- 7.1.8. Novell RIP and NLSP Analysis Techniques
- 7.1.9. Novell Communication Process Analysis Techniques
- 7.1.10. NetWare Bindery Error Analysis
- 7.1.11. Novell NetWare Login and Authentication Analysis
- 7.1.12. Closing Statement on NetWare Analysis
- 7.2. TCP/IP Analysis
- 7.3. TCP/IP Protocol Suite Analysis
- 7.4. IBM SNA And NetBIOS Protocol Suite Analysis
- 7.5. SNA Protocol Communications Analysis
- 7.6. Windows NT Protocol Suite Analysis
- 7.7. SMB Protocol Decoding
- 7.8. Windows NT Analysis
- 7.9. DEC Protocol Suite Analysis
- 7.10. AppleTalk Analysis
- 7.11. Banyan Protocol Suite Analysis
- 7.12. Routing Technology Protocol Analysis
- 7.13. Closing Statement on ULP Analysis
- Case Study 6: TCP/IP Baseline Analysis
- Case Study 7: NetWare Baseline Analysis
- Case Study 8: Windows NT Analysis
- Case Study 9: Routing Baseline Analysis
-
7.1. Analysis of the Novell Protocol Suite
-
8. Ethernet
- 8.1. Understanding Ethernet Architecture Design and Layout
- 8.2. Ethernet Access Methods
- 8.3. Frame Addressing
- 8.4. Physical Transmission Signal Code Processes
- 8.5. Higher-Layer Management
- 8.6. Ethernet Frame Types
- 8.7. Fast and Ethernet Switching Architecture
-
8.8. Examining Protocol Analysis and Troubleshooting Techniques for Ethernet
- 8.8.1. Ethernet Physical Analysis
- 8.8.2. Local Collisions
- 8.8.3. Remote Collision
- 8.8.4. Late Collisions
- 8.8.5. Cyclical Redundancy Check and Alignment Errors
- 8.8.6. Long and Short Packets
- 8.8.7. Jabber
- 8.8.8. Summary Statement on Physical Ethernet Analysis
- 8.8.9. Closing Statement on Analyzing Standard Ethernet
-
8.9. Fast Ethernet and Switching Review Analysis
- 8.9.1. Ethernet Product Specifications as Related to Site Cabling Structure
- 8.9.2. Utilizing Ethernet Management Systems as Combined with a Protocol Analyzer
- 8.9.3. Ethernet Collision Domain Analysis Techniques
- 8.9.4. Ethernet Port Mirroring Analysis Techniques
- 8.9.5. Ethernet Switch Configuration as Related to Network Baselining
- 8.9.6. Ethernet Switch Uplink Analysis as Related to Network Baselining
- 8.9.7. Ethernet Switch Latency and Operation as Related to Network Baselining
- 8.9.8. Protocol Analyzer Positioning in Ethernet Networks as Related to Network Baselining
- 8.10. Closing Statement on Ethernet Analysis Techniques
- Case Study 10: Standard and Fast Ethernet Network Baseline Analysis
- Case Study 11: Ethernet Switching Analysis Problem
-
9. Token Ring and Switched Environments
- 9.1. Token Ring Design and Layout
-
9.2. Understanding Token Ring Network Operation
- 9.2.1. Token Passing Theory
- 9.2.2. Dataflow Direction and NAUN Process
- 9.2.3. Token Ring Address Schemes
- 9.2.4. Token Ring Signaling Methods
- 9.2.5. Token Ring 4Mbps Technology Versus 16Mbps Technology
- 9.2.6. Token Ring DTR and Switching
- 9.2.7. Main Token Ring Frame-Type Structures
- 9.2.8. Devices That Can Manage the Physical Ring
-
9.3. Understanding Token Ring Physical Communications
- 9.3.1. Ring Insertion
- 9.3.2. Token Ring Claiming or Active Monitor Contention
- 9.3.3. Priority Access
- 9.3.4. Neighbor Notification
- 9.3.5. Ring Purge Process
- 9.3.6. Soft Error Counting and Fault Redundancy Operation
- 9.3.7. Beaconing
- 9.3.8. Token Ring Timers
- 9.3.9. Token Ring Frame Structure
- 9.3.10. Description of 25 MAC Frames
- 9.4. Troubleshooting Token Ring Physical Faults and Errors
-
9.5. Network Baselining in a Token Ring Environment
- 9.5.1. Step 1: Token Ring Workload Characterization Baselining Methodology
- 9.5.2. Step 2: Token Ring Workload Characterization Baselining Methodology
- 9.5.3. Step 3: Token Ring Workload Characterization Baselining Methodology
- 9.5.4. Step 4: Token Ring Workload Characterization Baselining Methodology
- 9.5.5. Step 5: Token Ring Workload Characterization Baselining Methodology
- 9.6. Closing Statement on Baselining Token Ring Environments
- Case Study 12: Token Ring Analysis Problem
-
10. Fiber Data Distributed Interface
- 10.1. FDDI Network Architecture and Topology Specifications
- 10.2. FDDI Ring State Technical Process
- 10.3. FDDI Physical Operation Technical Descriptions
- 10.4. FDDI MAC Network Access Methods
- 10.5. FDDI MAC Frame Format
-
10.6. FDDI Station Management Layer
-
10.6.1. Station Management Layer Processes
- 10.6.1.1. SMT Neighbor Notification Protocol Operations
- 10.6.1.2. SMT Status Reporting Protocol Operations
- 10.6.1.3. SMT Parameter Management Protocol Operations
- 10.6.1.4. SMT Echo Process
- 10.6.1.5. SMT Resource Allocation Process
- 10.6.1.6. SMT Extended Services Process
- 10.6.1.7. SMT Request Denied Process
- 10.6.1.8. SMT Status Information Process
- 10.6.2. FDDI Station Management Layer Frame Format
-
10.6.1. Station Management Layer Processes
- 10.7. Methods for Analyzing and Troubleshooting FDDI Networks
- 10.8. Closing Statement
- Case Study 13: FDDI Timing Analysis
-
11. Baselining and Analyzing ATM
- 11.1. Introduction to ATM
- 11.2. ATM Connection Schemes and ATM Cell Design
- 11.3. ATM Operational Function Layers
- 11.4. ATM Connection Assignment Sequencing
- 11.5. ATM Addressing Assignment and Convergence Operations
-
11.6. Analyzing ATM-Based Networks
- 11.6.1. Analyzing ATM Link Utilization
- 11.6.2. Analyzing ATM Endpoint-to-Endpoint Utilization
- 11.6.3. Analyzing ATM Protocol Percentages
- 11.6.4. Measuring ATM Physical Layer Error Levels
- 11.6.5. Analyzing the ATM Layer
- 11.6.6. Analyzing the ATM AAL
- 11.6.7. ATM Protocol Analyzer Positioning Within an ATM Network
- Case Study 14: ATM Performance Analysis
-
12. WAN Topologies
- 12.1. Dedicated Circuit and T1 Architecture Technical Overview
- 12.2. Troubleshooting and Analyzing T1 Circuits
- 12.3. ISDN Network Architecture Overview
- 12.4. Troubleshooting and Analyzing ISDN Circuits
- 12.5. Frame Relay Architecture Overview
- 12.6. Analyzing and Troubleshooting Frame Relay WANS
- 12.7. Synchronous Optical Network Architecture Overview
- 12.8. Closing Notes on WAN Network Baselining
- Case Study 15: WAN T1 Circuit Analysis
- Case Study 16: WAN Frame Relay Analysis
- 13. Network Baseline Planning, Data Acquisition, and Final Reporting
- A. Network Analysis Tool Vendor Contact Information
- B. Reference Material
Product information
- Title: Network Performance Baselining
- Author(s):
- Release date: May 2000
- Publisher(s): Sams
- ISBN: 9781578702404
You might also like
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
article
Splitting Strings on Any of Multiple Delimiters
Build your knowledge of Python with this Shortcuts collection. Focusing on common problems involving text manipulation, …