Characterization and Measurements of Enterprise Network Traffic with RMON 2

  • Authors:
  • Luciano Paschoal Gaspary;Liane M. Rockenbach Tarouco

  • Affiliations:
  • -;-

  • Venue:
  • DSOM '99 Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Active Technologies for Network and Service Management
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increasing growth of the amount and complexity of applications and protocols executed on computer networks has hindered the work of their administrators. They need to justify the ever-increasing investments accomplished on network equipment acquisition and on communication links leasing. For such, they must: identify who, and with which purpose, most consumes these resources, know if users and resources are located so that the presence of bottlenecks in the network is minimized and detect if some intruder, by means of a high-layer protocol is trying to invade it. An appropriate and current solution capable to answer these subjects is the use of RMON2, MIB that operates above the link layer, providing information needed to monitor client-server applications and end-to-end communications. This work presents the results of a study accomplished on this MIB, aiming at extracting from it means to control the users' activities, to monitor protocols and applications, to optimize the localization of users and resources and to accomplish security management.