Documente Academic
Documente Profesional
Documente Cultură
This is part three of Wandel & Goltermanns series on baselining LANs. The preceding article in
this series focused on baselining the overall network. This final article explores some of the
specific elements of baselining the network node. Parts one and two are available on the WorldWide Web at www.wg.com/resource.html.
Top Users
Top Errored Nodes
Interconnect Equipment
Network Peripherals
Figure 1 In most networks, a small percentage of network nodes account for most of the
bandwidth utilized.
predefined by the network topology
implemented and provide a standard level
Network Peripherals
of commonality and efficiency throughout
The server is slow again! If this is a
the network.
frequently heard complaint, baselining is
likely to provide the reasons why problems
like this occur. Network peripherals fall into
Another subtle and perhaps unknown factor
the following two categories: top listeners
can affect frame size. Plug-and-play
and top talkers. Devices such as servers,
hardware and software often limit data
printers, and facsimile machines are utilized
communications by presetting a maximum
by a multitude of different users. We should
frame size to be used. Although plug-andensure that network peripherals have their
play networking allows the network manager
workload properly distributed among
to quickly implement changes, the price
network users. Network efficiency can be
paid for quick implementation is usually a
improved by simply identifying and
decrease in network efficiency. Plug-andcorrecting load sharing and traffic flow
play communication techniques are
between users and peripherals.
designed to operate under worst-case
conditions, not to provide network efficiency.
Implementing a plug-and-play solution
What Is Going On?
usually guarantees that the hardware or
software will select an intermediate frame
The next portion of our node focus
size as the default packet size.
investigates what each of our node types is
doing on the network. Improving network
To illustrate this point, take the example of a
throughput and efficiency is the eventual
plug-and-play application operating on an
goal of baselining our network. With this
Ethernet network and assume that the
point in mind, you should examine a
application is preset to select a maximum
common component of all data networks
data packet that is 512 bytes. On an
that can provide an immediate boost to your
Ethernet network, the maximum packet size
network efficiency. This common component
is 1518 bytes. This means that if the default
is the data packet, which is also referred to
packet size is set to a higher value, the
as the data frame. The packet is among the
applications efficiency could immediately
lowest common denominators in network
improve. The bottom line is to determine the
communications. The upper and lower
maximum data packet size for all network
boundaries of the data packet are
nodes. Improving the maximum packet size
Top Users
In characterizing the top users, we will focus
on recording the following three elements:
Protocols
In baselining the top user, we should
establish which protocols and
applications are being used. We are
interested in recording all Networklayer, Transport-layer, and
Application-layer information we
can obtain.
Addressing
If a node utilizes numerous
protocols, different addresses can
be attributed to each protocol. It is
important to record all hardware,
MAC, network, and symbolic
addresses for each station.
Recording and mapping addresses
and stations will provide valuable
reference material in
troubleshooting situations.
Traffic Mix
Any given network can be expected
to operate with a number of
protocols. In order to evaluate the
traffic flow within the network, we
must pay attention to the protocols
utilized by the top users. When it
comes to evaluating network
efficiency, youll find that the more
operating protocols used, the higher
the communication noise level will
be. The communication noise level
refers to the background information
shared between stations using a
given protocol. This background
noise is used by protocols to identify
services, negotiate communication
procedures between stations, and
locate other stations. Two common
examples of this type of background
traffic would be DARPAs Internet
Control Message Protocol (ICMP)
and Novells Service Advertising
Protocol (SAP).
Note that todays networks are evolving into
switched virtual networks. The direct impact
on the network and network users is an
increase in multicast and broadcast traffic.
Since this type of traffic may be repeated
throughout the LAN/WAN network, this
traffic should be monitored.
Where Is This?
Most network managers inherit an existing
network when they accept the position.
Why Baseline?