, as well as (Fig. 8), shows the result of analysis
under the first scenario,
‘Table 1> Anaiysis of apoication services under the certain
host in @ normal network condition
MON Ales
[ Rites of he Fst aad REDS |
Pee Fe ee]
‘ees | aves | sex [a [ors |
Analysis sa)
Parameter
According to Table 1>, among the application services,
HTP accounts for the biggest part ofthe traffic, more than
(6086, followed by SNMP and FTP. It shows that the host
analyzed here acts as a Web server. In our experiments for
this paper, we monitored the traffic tobe rhanaged and, when
‘an unexpected problem occurred, figured out its cause and
2 solution to it, using the methodology, the algorithms, and
the system we presented in the first part of this paper
(Fig, 9) Analysis of the application trafic under a specific
host when the network works abnormally
‘
, as well as (Fig. 9), shows the result of analysis
under the second scenario.
, the SMTP traffic accounts for
‘more than 66% under the analyzed host of 2082525310,
Which allows us to assume that the mail protocol of the
208.252580 segment and the SMTP protocol of the FTP
PMON 2119) SB MIA Sats) AIS Fe WHE eI 419
server (208.252.53.10) are the cause of serious system errors
affecting all the LAN segments. After further scrutiny, we
realized that the sendmail of the server was not properly
set up, continuously generating ineffective packets.
RMON probe devices used to analyze the application ser
vice traffics in this paper allow us to collect and analyze
the trafics more accurately and quickly than other ways of
analyzing the traffes using a software, and thus to provide
the users with the application service trftics on the LAN
more accurately. The algorithm we suggest in this paper is
the only way of analyzing the application service traffics
when the 9 groups of RMON probe devices are used. Fur
thermore, the algorithm makes it possible to monitor the
application services in the troubled system, to determine
which service causes the system error, and to seek a quicker
and effective solution to it
5. Conclusion
Due to the rapid development of the Intemet and the surge
ofits users, Intemet application services have been increased
and diversified, so as to account for most of the network
resources, In order to ensure the supply of reliable and
effective Internet application services in this situation, their
traffies have to be monitored and managed. Unfortunately,
however, international standards for managing Intemet
application services are not mapped out yet, which forces
network managers to rely on the existent frameworks and
technologies for the overall network management. Taking
this reality into account, we decided to develop a new system
Which is designed to extract the Internet application traffic
‘among the whole bunch ofthe traffies created on a network.
In this paper, we used RMON devices working on the
network layers in order to determine the Internet application
service traffic, defined analysis parameters and suggested
analysis algorithms for the management of the services. We
also created and activated a system which extracts and
analyzes the Internet application traffic on a certain network,
‘and, based on the data, we developed an integrated manager
system designed to manage Internet application services,
‘The Integrated Internet Application Service Manager
System we developed in this paper uses Java workable on
all web interfaces and networks, allowing us to manage all
application services beyond the limitation of time and space.
In conclusion, the system has made it possible to manage
all the application services and furthermore, the application
traffic on each segment.eo Nee
2710 NACA MBE 2ee8
References
0] Ahn Sung Jin, “Algorithms to Calculate System Anaiysis
Parameters for TCP/IP Network Management’
‘kyunkwan University, Ph D thesis, 1908,
(2) Peter BDanzig. Katia Obraczka, Anant Kumar, “An Analy~
sis of Wide Area Name Server Traffic” August, 192.
[3] J.P. Thompson, “Web-Based Enterprise Management A-
rehtecture,” IEEE Communication Magazine, March 1998
(41 B. Reed, M. Peerey and E. Robinson, “Distributed Systems
‘Management on the Webs” in Proceedings ofthe 1997 IEEE
Integrated Management, San Diego, CA, 1997
(6] C. Kalbfeisch, C. Krupezak, R.Presuhn, J. Saperia Appi
cations Management MIB, Internet Draft, November, 1956.
(6) H Hazowinkel, Survey of Defined Managed Objects for
Applications Management. lternet Draft , January, 1997
(71 Thomas Johannsen, Glenn Mansfeld, “A Study of FTP
‘Trafic Bstimation of the NonOptimality,” December, 194
[6] C. Anthony Cooper, Robert J. Schmidt, "Performance Cha
acterization and Assessment for Internet Services,” Net~
‘world Interop98, May, 1988.
(9) Takayuki Kushids, “The Trafic Measurement and the
Empirical Studies for the Internet” GLOBECOMR, Vol2,
1988,
{10} Nathan J. Muller, "Web-accessible Network Management
Tools” Intemational Journal of Network Management Vol
7, Wiley, pp.288-297, 1997
[11] Jonas Andren, Magnus Hilding, Darryl Veitch, “Under
standing end-to-end Internet Trafic Dynamics,” GLOBE
COM98, Vol2, 1998,
02} RFC 1757, “Remote Network Monitoring Management
Information Base,” S, Waldbusser, February, 1995
U3] M. Tot, “A Prototype for World Wide Web Manage
iment,” M. Se. Thesis Enschede, April, 1997
(14] Nathan Kalowshi, “Applying the RMON Standard to Swit
‘hed Erwironments,” International Journal of Network Ma
agement VoL7, Wiley, 1997.
US] J. Hong et. EL, "Web-based Intranet Services and Network
Management,” IEEE Communications Magazine, October,
1997
[16] Wiliam Stallings, “SNMP, SNMPw and RMON,” Addi
sson-Wesley Publishing Company, 1996
(17) Jeong-Soo Han, SeongJin Ahn, Jin-Wook Chung, “Web-
‘based Performance Manager System for a Web Server
NOMS. 1298
Suna
18] J. Judge, H.W. P. Beadle, J Chicharo, “Sampling HTTP
Response Packets for Prodiction of Web Traffic Volume
Statistics,” GLOBECOM'88 VolS, 1998
[19] Kang Hong Cho, Sung Jin An, Jin Wook Jung, “Algori-
‘hms for Calculating LAN Performance Parameters using
RMON MIB," KICS99 Vol.24, 1998,
[20] Kang Hong Cho, Sung Jin Ahn, Jin Wook Jung, “Rule
based Fault Detection Agent System for Fault Detection
and Location on LAN,” KIPS2000 VolT, 2000,
Hat
mal: jhansnggargsbevackr
oars Fees Bajchoy Aw-Bepst
eee
iad ABA wae aE
aap ay aa
ea daadee aaa BEE
ae eee
BAM MEAS Wel, ST HA, AeA OOS, QS oF
#8
aga
e-mail : jan@oomedu sauac kr
BY AVIA BUSH Bel
ey
190d Feta sae geeesy
sae)
OO ~ 1S ATAEAGTA AF
sag mba ee
106d ALBA aah A eh
Ieee APUG AI aves} SAH)
IMod~ 84 APAIS Ye AFIBgs Zaye
ag eoh MEA Bel, SAY EA, Unix MEAT
aas
e-mail: wehung@songgar sku ac kr
1g ABAAGS ar1s et Aap
Igo BHA YY Bas esh
ae
ioe ASAT ose LEAL
er
1S ~ 18H PBS GTA aa
19814 ~ 1582 Racal Milgo Co. AVANT
soe ~ SA ABER araat F Yate
aver: 2H MENS, HENS al, EMS vee