CHAPTER 13

                       MONITORING AND OPTIMIZATION

 

 

Lesson 1:  Disk Monitoring and Optimization

 

Windows 2000 includes several tools that you can use to diagnose disk problems, improve

performance and compress data such as Check Disk, the Disk Defragmenter snap-in, data

compression, and disk quotas.

 

 

Check Disk

 

The Check Disk tool, also referred to as the Error-checking tool, allows you to check for file

system errors and bad sectors on your hard disk.  To use Check Disk, open the Properties

dialog box for the specific disk you want to check.

 

All running applications or open files on the disk being checked must be closed in order of the

Check Disk process to be able to automatically fix file system errors. 

 

If a volume is formatted with NT file system (NTFS), Windows 2000 logs all file transactions,

replaces bad clusters automatically, and stores copies of key information for all files on the

NTFS volume.

 

 

 

Disk Defragmenter Snap-in

 

Windows 2000 saves files and folders in the first available space on a hard disk and not necessarily

in an area of contiguous space.  This leads to file and folder fragmentation.  When your hard disk

contains a lot of fragmented files and folders, your computer takes longer to gain access to them

because it requires several additional reads to collect the various pieces.

 

 

Defragmenting disks

 

The process of finding and consolidating fragmented files and folders is called defragmenting.    

The Disk Defragmenter snap-in is used to locate fragmented files and folders and then

defragment them. 

 

The Disk Defragmenter defragments FAT16, FAT32, and NTFS volumes.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 2                                                          2002/02/01

 

 

 

Red = Fragmented files

Dark Blue = contiguous (nonfragmented files)

White = free space on the disk.

Green = system files, which Disk Defragmenter cannot move.

 

To analyze or defragment a volume, you can choose one of the options described in the following

table.

 

 

========================================================================

Option                                 Description

========================================================================

Analyze                       Click this to analyze the disk for defragmentation.

 

Defragment                Click this button to defragment the disk.  You will see the

                                    Visual difference once the disk has been defragmented.

 

========================================================================

 

Use Disk Defragmenter Effectively

 

The following list provides guidelines for using the Disk Defragmenter snap-in:

 

Run Disk Defragmenter when the computer will receive the least usage.  During defragmentation,

data is moved around on the hard disk.  The defragmentation process is CPU intensive and

will adversely affect access time to other disk-based resources.

 

Recommend users defragment their local hard disks at least once a month to prevent

accumulation of fragmented files.  Analyze the target volume before you install large

applications, and then defragment the volume if necessary.  Installations are completed more

quickly when the target medium has adequate contiguous free space.  Additionally, gaining

access to the application after it is installed is faster.

 

When you delete a large number of files or folders, your hard disk might become excessively

fragmented, so be sure to analyze it afterwards.  Consider using a disk defragmentation utility

that allows you to perform a regularly scheduled network-wide defragmentation from a central

location.

 

 

Data Compression

 

Data compression enables you to compress files and folders on NTFS volumes.  Compressed

files and folders occupy less space on a NTFS-formatted volume, which enables you to store

more data.  The compression state for each file and folder on a Ntfs volume is set to either

compressed or uncompressed.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 3                                                          2002/02/01

 

 

 

Compressing Files and Folders

 

You can set the compression state of folders and files in Windows Explorer or by using the

compact command-line utility.  For information on compact utility syntax, go to a command

prompt and type compact/?.

 

 

 Copying and Moving Compressed Files and Folders

 

There are rules that determine whether the compression state of files and folders is retained

when you copy or move them within and between NTFS and FAT volumes.

 

 

Copying a File Within an NTFS Volume

 

When you copy a file within an NTFS volume, the file inherits the compression state of the target

folder.

 

 

 

Moving a File or Folder Within an NTFS Volume

 

When you move, the file or folder retains its original compression state.

 

 

 

Copying a File or Folder between NTFS Volumes

 

The file or folder inherits the compression state of the target folder.

 

 

Moving a File or Folder between NTFS Volumes

 

The File or folder inherits the compression state of the target folder.  Because Windows

2000 treats a move or a copy and then a delete, the files inherit the compression state of

the target folder.

 

 

Moving or Copying a file or Folder to a FAT volume

 

Windows 2000 supports compression for NTFS files only.  Because of this, when you move or

copy a compressed NTFS file or folder to a FAT volume, Windows 2000 automatically

uncompresses the file or folder.

 

 

 

 

 

========================================================================

 

winser13.html                                                 PAGE 4                                                          2002/02/01

 

 

 

Moving or Copying a Compressed File or Folder to a Floppy Disk

 

When you move or copy a compressed NTFS file or folder to a floppy disk, Windows 2000

automatically uncompresses the file or folder.

 

NOTE:  When you copy a compressed NTFS file, Windows 2000 uncompresses the file,

copies the file, and then if the target folder is marked for compression, compresses the file

again as a new file.  This might cause performance degradation.

 

 

Using NTFS Compression

 

The following is a list of best practices for using compression on NTFS volumes:

 

anticipated resulting file size.

will attempt to compress the file, wasting system time and yielding no additional disk space.

folders and files.

files incurs some system overhead.

 

 

Disk Quotas

 

You can use disk quotas to manage storage growth in distributed environments.  Disk quotas

allow you to allocate space usage to users based on the files and folders that they own.  You

can set disk quotas, quota thresholds, and quota limits for all users and for individual users. 

You can also monitor the amount of hard disk space users have used and the amount they

have left against their quotas.

 

 

Managing Disk Quotas

 

Windows 2000 disk quotas track and control disk usage on a per-user, per-volume basis. 

Windows 2000 tracks disk quotas for each volume, even if the volumes are on the same hard

disk.  Because quotas are tracked on a per-user basis, every user’s disk space is tracked

regardless of the folder in which the user stores files.  Third-party disk quota management

ools provide granular quota management capabilities like tracking disk usage on per-user,

per-folder basis.

 

 

 

 

========================================================================

 

winser13.html                                                 PAGE 5                                                          2002/02/01

 

 

 

 

The following list describes several important characteristics of Windows 2000 disk quotas:

 

volume is the amount of space remaining within the user’s disk quota limit.  For example, a

user whose files occupy 50 MB of an assigned disk quota limit of 100 MB will show 50 MB

of free space even if the volume contains several gigabytes of free space.

 

NOTE:  Disk quotas can be applied only to Windows 2000 NTFS volumes

 

 

Determining the Status of Disk Quotas

 

You can determine the status of disk quotas in the Properties of a disk by checking the traffic

light icon and reading the status message to its right.  The traffic light colors and the status they

indicate are as follows:

 

A red traffic light indicates that disk quotas are disabled.

A yellow traffic light indicates that Windows 2000 is rebuilding disk quota information.

A green traffic light indicates that the disk quota system is active.

 

 

 

Enforcing Disk Quotas

 

To enforce different quota limits for one or more users, click the Quota Entries button to

open the Quota Entries.

 

 

By default, quota limits are not applied to the Administrators local group.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 6                                                          2002/02/01

 

 

 

Best Uses of Disk Quotas

 

If you enable disk quota settings on the volume where Windows 2000 is installed and your

user account has a disk quota limit, log on as Administrator and install additional Windows

2000 components and applications.  When you do so, Windows 2000 will not charge the

disk space you use to install applications against the disk quota allowance for your user account.

 

You can monitor hard disk usage and generate hard disk usage information without preventing

users from saving data.  To do so, clear the Deny Disk Space To Users Exceeding Quota

Limit check box when you enable disk quotas.  Set more restrictive default limits for all user

accounts, and then modify the limits from the Quota Entries.  Generally, you should set disk

quotas on shared volumes to limit storage for users.

 

Delete disk quota entries for users who no longer store their files on a volume.  You can delete

quota entries for a user account only after all files that the user owns have been removed from

the volume or another user has taken ownership of  the files.

Before you can delete a quota entry for a user account, all files that the user owns must be

removed from the volume or another user must take ownership of the files.

 

 

Lesson Summary:

 

system errors and bad sectors on a disk.

defragment them.

they own.

users. 

 

 

 

 

 

 

========================================================================

 

winser13.html                                                 PAGE 7                                                          2002/02/01

 

 

 

 

Lesson 2:  Simple Network Management Protocol Service

 

 To meet the challenges of designing an effective network management platform for

heterogeneous TCP/IP-based networks, the Simple Network Management Protocol

(SNMP) was defined in 1998 and approved as an Internet standard in 1990 by the

Internet Activities Board (IAB).

 

 

Overview of SNMP

 

SNMP is a network management standard widely used with TCP/IP networks and more

recently, with Internetwork Packet Exchange (IPX) networks.

 

To perform its management services, SNMP uses a distributed architecture of management

systems and agents.

 

Management network nodes are referred to as SNMP agents.

 

The agent reports hardware status and configuration information to a database called a

Management Information Base (MIB).  The MIB defines the hardware and software

information in the host that should be collected by the SNMP agent.

 

Network management is critical for resource management and auditing.  SNMP can be

used in several ways:

 

To configure remote devices.  You can configure information so that it can be sent to each

networked host from the NMS.

 

To monitor network performance. You can track the speed of processing and network

throughput and collect information about the success of data transmissions.

 

To detect network faults or inappropriate access.  You can configure trigger alarms on

network devices that alert you to the occurrence of specific events.  The shutdown or

restart of a device, the detection of a link failure on a router, the inappropriate access to

a network mode.

 

To audit network usage.  You can monitor overall network usage to identify user or group

access or types of usage for network devices or services.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 8                                                          2002/02/01

 

 

 

 

Management Systems and Agents

 

The NMS does not have to run on the same computer as the SNMP agents.  The NMS

can request the following information from SNMP agents:

 

 

 

In exception is an alarm message triggered by a specific event.  An alarm message is known

as a trap message.  A trap is an alarm-triggering event on an agent computer, such as a system

reboot or illegal access.

 

 

Management Information Base

 

A Management Information Base (MIB) is a container of objects, each of which represents

a particular type of information.

 

A MIB defines the following values for each object it contains:

 

 

Each object in a MIB has a unique identifier that contains the following information:

 

 

 

SNMP Messages

 

SNMP messages are sent via the User Datagram Protocol (UDP).  By default, UDP port

161 is used to listen for SNMP messages and port 162 is used to listen for SNMP traps.

The management system and agent programs use the following types of messages:

 

========================================================================

 

winser13.html                                                 PAGE 9                                                          2002/02/01

 

 

 

 

 

within the given restraints of message size.

 

 

The communication process is as follows:  (see page 784)

 

acceptable.  The SNMP service calls the appropriate subagent to retrieve the session information

requested from the MIB. 

a return SNMP message that contains the number of active sessions and the destination, the

management system’s IP address (131.107.7.29).

 

 

Installing and Configuring the SNMP Service

 

The SNMP agent is not installed by default on Windows 2000 Server.  It is installed from the

Control Panel Add/Remove Windows Programs applications. 

 

NOTE:  The SNMP Trap Service is also installed when SNMP is installed.  The trap service

passes traps from a local or remote computer to a trap destination, typically an NMS, running

on the local computer.

 

 

SNMP Service properties

 

By default, the SNMP service depends on Event Log.

 

 

Windows 2000 SNMP Agent Properties.

 

The SNMP agent provides the related management system with information on activities that occur

at the IP network layer.  The SNMP service sends agent information in response to an SNMP

request or in an SNMP trap message.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 10                                                        2002/02/01

 

 

 

=====================================================================

Agent Service             Conditions for selecting this service

=====================================================================

Physical                                  The computer manages physical devices, such as a

                                                Hard disk partition.

 

Applications                            The computers uses any applications that send data

                                                Via TCP/IP.  This service should always be enabled.

 

DataLink and                         The computer manages a bridge.

Subnetworking

 

Internet                                   The computer is an IP gateway (router).

 

End-to-end                              The computer is an IP host.  This service should always

                                                Be enabled.

 

======================================================================

 

Trap Properties

 

SNMP traps can be used for limited security checking.  When configured for an agent, the SNMP

service generates trap messages any time specific events occur.  These message are sent to a trap

destination, typically an NMS.  Trap messages can also be generated for events such as host system

startup or shutdown.

 

 

Security Properties

 

You can configure SNMP security on the Security tab o the SNMP Service Properties.

 

Send Authentication trap.  This is the default setting.

 

Accepted community names.  The name Public is generally used as the community name.  If no

community names are defined, the SNMP agent denies all incoming SNMP requests.

 

Community Rights.  You can select permission levels that determine how an agent processes

SNMP requests from the various communities.

 

Accept SNMP packets from any host.  This option is enabled by default.

Only accept SNMP packets from these hosts.  This option provides limited security.

 

 

========================================================================

 

winser13.html                                                 PAGE 11                                                        2002/02/01

 

 

 

 

Troubleshooting SNMP

 

This section contains methods for determining the cause of SNMP-related communication

problems.  Run normal workloads during your testing to gain realistic feedback.

 

SNMP time-out period on the SNMP management system.  If some WINS queries

work and others time out, increase the time-out period.

computer.

 

 

SNMP Service Files

 

For your convenience and assistance in troubleshooting, use this list.

 

======================================================================

File                                                                  Description

======================================================================

Wsnmp32.dll               Windows 200 based SNMP manager APIs.  These APIs listen

                                    For manager requests and send the request to SNMP agents and                                 

Receive responses from them.

 

*.dll                             Extension agent DLLs such as Inetmib1.dll for IIS,

 

Mib.bin                       Installed with the SNMP service.

 

Snmp.exe                    SNMP agent service; a master (proxy) agent.  This program

                                    Accepts manager program requests and forwards the requests

                                    to the appropriate extension-subagent DLL for processing.

 

Snmptrap.exe             A background process.  The program receives SNMP traps

                                    From the SNMP agent and forwards them to the SNMP

                                    Management API on the management console.

 

 

========================================================================

 

winser13.html                                                 PAGE 12                                                        2002/02/01

 

 

 

 

Lesson Summary:

 

 

such as servers, workstations, routers, bridges, and hubs from a centrally located host.

managed computers (SNMP agents).

information.

snap-in or through the Services snap-in in the Administrative Tools program group.

 

 

Lesson 3:  Performance Console

 

The Performance Logs and Alerts snap-in allows you to collect performance data from local or

remote computers.

 

With System Monitor, you can collect and view real-time data about memory, disk, processor,

network, and other activity in graph, histogram, or report form.  Through Performance Logs and

Alerts, you can configure logs to record performance data and set system alerts to notify you when

a specified counter’s value is above or below a defined threshold.

 

You can use performance data for the following:

 

upgrades.

 

 

The System Monitor snap-in and the Performance Logs and Alerts snap-in provide detailed data

about the resources used by specific components of the operating system and by server programs

that have been designed to collect performance data.

 

 

========================================================================

 

winser13.html                                                 PAGE 13                                                        2002/02/01

 

 

 

 

System Monitor Snap-in

 

In Windows 2000, Performance Monitor has been replaced by System Monitor.  With System

Monitor, you can measure the performance of your own computer or other computers on a

network.  System Monitor allows you to perform the following tasks:

 

 

 

With System Monitor, you can collect and view extensive data about the usage of hardware

resources and the activity of system services on computers you administer.  You can define

the data you want the graph to collect in the following ways:

 

Type of Data.  To select the data to be collected, you can specify one or more counter instances

of performance monitor objects.

 

Source of Data.  System Monitor can collect data from your local computer or from other

computers on the network where you have permission.  You must be the Administrator to have

the proper permissions.

 

Sampling parameters. System Monitor supports manual, on-demand sampling or automatic

sampling based on the time interval you specify.  When viewing logging data, you can also

choose starting and stopping times so that you can view data spanning a specific time range.

 

 

 

System Monitor Interface

 

When you open the Performance console, the graph view and toolbar appears by default and

the graph area is blank.

 

Graph Area

 

You can choose to have the updated automatically or on demand.  For updating on demand,

use the Update Data button to start and stop the collection intervals.

 

 

========================================================================

 

winser13.html                                                 PAGE 14                                                        2002/02/01

 

 

 

You can also define the following attributes of the graph:

 

 

 

To draw attention to a particular counter’s data, use the highlighting feature.  Press Ctrl + H

or click the Highlight button on the toolbar.

 

 

 

Monitoring System and Network Performance

 

Network activity can influence the performance not only of your network components but of

your system as a whole.  You should monitor other resources along with network activity, such

as disk, memory and processor activity.  System Monitor enables you to track network and

system activity by using a single tool.

 

You should use the following counters as part of your normal monitoring configuration:

 

 

 

 

 

========================================================================

 

winser13.html                                                 PAGE 15                                                        2002/02/01

 

 

 

 

In Classroom Exercises: 

 

710 Pro and 715Server Tests

ar500.exe (install the dolby for the troytech)

troytech study guides

BFQ – advanced Exam

Procert 2000, Server Cert.Tests folder

Binary List

 

1           1            1          1          1           1           1          1 

128      64          32        16          8          4           2           1

 

2 8th = 256

2 8th –2 = 254 (subnet 254 networks on one octect)

 

 

CLASSES:

 

A    = 1-127

B    = 128-191

C    = 192-223

 

 

Bit Chart:

 

128 1

192 2

224 3

240 4

248 5

252 6

254 7

255 8

 

 

 MODE:

 

1.  SAFE Mode.  Enable Boot Logging, use ntbtlog.txt.

 

Safe Mode with N/W – Forest03.  Has no VGZ driver loaded, long to boot up 10 minutes.  Ping

other users, works okay.  View the ntbtlog.txt E:\Winnt\ntbtlog.txt.

Recovery Console (at boot-up):

 

G:\I386\WINNT32 ^ cmdcons

 

Reboot, select Recovery console from the menu.

 

Choose C:\WIN2KSA Administrator and the password, type help

 

========================================================================

 

winser13.html                                                 PAGE 16                                                        2002/02/01

 

 

 

Performance:

 

CPU Processor if >75% worry about it.

RAM

Network

Page File (paging) 4K pages

 

 

To see the system press Ctrl/alt/del to get into Task Manager.

 

 

 The following table provides information about the network layers and their associated performance

objects.

 

======================================================================

OSI Layer                              Performance objects

======================================================================

 

Application                             Browser, Server, Redirector, and Server Work Queues

Presentation Session             NBT connection.

 

 

Transport                                Protocol objects:  TCP for the Transmission Control

                                                Protocol; UDP for the User Datagram Protocol,

                                                NetBEUI for NetBIOS, AppleTalk (installed by

                                                Protocol).

 

Network                                  Network Segment (installed when you install the

                                                Network Monitor driver, IP for Internet Protocol,

                                                NWLink (IPX/SPX.

 

Data Link, Physical               Network Interface.  These counters are maintained

                                                by the driver and can report inaccurate or zero

                                                values because of problems with implementation

                                                of counters by the driver.

 

 

====================================================================

 

When monitoring performance data for your network, you should begin with the lowest-level

components and work your way up.  Monitor then objects over periods ranging from days to

weeks to a month.  Using this data, determine a performance baseline, the level of performance

you expect under typical workloads and usage.

 

For this reason, the best approach to monitoring a server is to watch network counters in conjunction

with Processor\%Processor Time, Physical Disk\%Disk Time and Memory\Pages/sec.

 

 

========================================================================

 

winser13.html                                                 PAGE 17                                                        2002/02/01

 

 

 

Disk Objects and the Diskperf Utility

 

Two primary disk objects contain counters in System Monitor, the Physical Disk, and Logical disk

objects.  The physical disk performance counters are enabled and the logical disk performance

counters are disabled by default on Windows 2000 Server.

 

Use the diskperf^-yv command to enable Logical Disk performance counters.

 

After this command is run, the computer must be rebooted.  On reboot, the logical disk and physical

disk performance counters will start.  These counters are contained in the System Monitor-Physical

Disk and Logical Disk objects respectively.

 

There is a small performance cost for running these counters.  If you are not monitoring disk

performance, type diskper^-n to disable both disk objects and their counters.

 

You can selectively enable or disable both physical and logical disk performance counters using

Diskperf.

 

 

Performance Logs and Alerts Snap-ins

 

With Performance Logs and Alerts, you can collect performance data automatically from local

and remote computers.    Note that, because logging runs as a service, data collection can occur

regardless of whether any user is logged on to the computer being monitored.

 

The Performance Logs and Alerts snap-in allows you to perform the following tasks:

 

programs.

generation.

or a log be started when the selected counter’s value exceeds or falls below a specified setting.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 18                                                        2002/02/01

 

 

 

 

Performance Logs and Alerts also offers these other options related to recording

performance data:

 

defined schedule.

record data when certain activities such as disk I/O operations or page faults occur.

setting parameters for stopping and starting a log based o n the elapsed time or the file size.

 

 

NOTE:  You can work with data from a log file while the service is collecting data and has the

log file locked.  For example, Microsoft Excel can import an active log file, but it will open a

read-only version of the locked log.

 

 

 

Performance Logs and Alerts Interface

 

You can define settings for counter logs, trace logs, and alerts.

 

To see the parameters defined for each log, select the log name in the details pan and then

select properties, from the action menu.

 

If a log is currently running and collecting data (based on the schedule you defined for the log

or alert), a green data icon appears next to the log or alert.  If a red icon appears, the log or

alert has been defined but is not currently running.

 

NOTE:  You can configure more than one type of log to run at a time.  One log can generate

multiple log files if the restart option is selected or if you start and stop the log multiple times. 

However, you will not see these individual log files listed in the console window.  Use

Windows Explorer to view a listing of these files.

 

 

Lesson Summary:

 

monitoring resource usage on your computer:  The System Monitor snap-in and the

Performance

 

========================================================================

 

winser13.html                                                 PAGE 19                                                        2002/02/01

 

 

 

 

resources and the activity of system services on computers you administer.  There are three

main areas in the System Monitor interface:  the graph area, the legend, and the value bar.

presents a value corresponding to a particular aspect of the performance defined for the

performance object.

local or remote computers.

 

 

Lesson 4:  Network Monitor

 

Unlike System Monitor, which is used to monitor anything from hardware to software, Network

Monitor focuses exclusively on network activity.

 

Network application developers can use Network Monitor to monitor and debug network

applications as they are developed.

 

 

Overview of Network Monitor

 

Network Monitor tracks network throughput in terms of captured network traffic.  Network Monitor

monitors traffic only on the local network segment.  To monitor remote traffic, you must use the

version of Network Monitor that ships with Microsoft Systems Management Server (SMS)

version 1.2 or 2.0.

 

Network Monitor monitors the network data stream, which consists of all information transferred

over a network at any given time.  Prior to transmission, this information is divided by the network

software into smaller pieces, called frames or packets.  Each frame contains the following information:

 

 

 

The process by which Network Monitor copies frames is referred to as capturing.

 

After you have captured data, you can view it in the Network Monitor user interface.  Network

Monitor does much of the data analysis for you by translating the raw capture data into its logical

frame structure.

 

 

========================================================================

 

winser13.html                                                 PAGE 20                                                        2002/02/01

 

 

 

 

For security, Windows 2000 Network Monitor captures only those frames, including broadcast

and multicast frames, sent to or from the local computer.

 

When Network Monitor detects other Network Monitor installations running on the network, it

displays the following information:

 

 

Network Monitor uses a network driver interface specification (NDIS) feature to copy all frames it

detects to its capture buffer, a resizable storage area in memory.  The default size is 1 MB; however,

you can adjust the size manually as needed.  The buffer is a memory-mapped file and occupies disk

space.

 

 

NOTE:  Because Network Monitor uses the local-only mode of NDIS instead of promiscuous mode

(in which the network adapter passes on all frames sent on the network), you can use Network

Monitor even if your network adapter does not support promiscuous mode.  Networking performance

is not affected when you use an NDIS driver to capture frames.  (Putting the network adapter in

promiscuous mode can add 30% or more to the load on the CPU.)

 

 

Installing Network Monitor Tools

 

Network Monitor Tools include both the Network Monitor console and the Network Monitor driver. 

These tools are not installed by default on Windows 2000 Server.

 

You can install them from the Control Panel Add/Remove Windows Programs application.

 

 

Capturing Frame Data

 

To capture frame data, Network Monitor and the Network Monitor driver must be installed on your

Windows 2000 computer.

 

When the user of a computer running SMS Network Monitor connects remotely to a computer on

which the Network Monitor driver has been installed, and that user initiates a capture, network

statistics are captured locally on the computer running the network monitor driver and the data from

the capture is viewed from the managing computer.

 

 

========================================================================

 

winser13.html                                                 PAGE 21                                                        2002/02/01

 

 

 

 

NOTE:  Network Monitor drivers for other Windows operating systems other than Windows 2000

are provided with SMS.  When you install Network Monitor on a Windows 2000 computer, the

Network Monitor driver is automatically installed.

 

 

To capture data, open Network Monitor and select Start from the Capture menu. As frames

are captured from the network, statistics about the frames are displayed in the Network Monitor

Capture Window.

 

 

Network Monitor displays session statistics from the first 100 unique network sessions it detects. 

To reset statistics and see information on the next 100 network sessions detected, select Clear

Statistics from the capture menu.

 

 

Using Capture Filters

 

A capture filter functions like a database query.  You can use it to specify the types of networks

information you want to monitor.    By filtering frames, you save both buffer resources and time. 

Later, if necessary, you can load the capture filter file and use the filter again.

 

To open the Capture Filter, click the funnel toolbar icon, or press F8.

 

 

Filtering by Address:

 

To capture frames from specific computers on your network, specify one or more address pairs

in a capture filter.  You can monitor up to four specific address pairs simultaneously.

 

An address pair consists of the following:

 

respond to a frame that meets a filter’s specifications.

 

Regardless of the sequence in which statements appear in the Capture Filter, EXCLUDE statements

are evaluated first.

 

 

 

========================================================================

 

winser13.html                                                 PAGE 22                                                        2002/02/01

 

 

 

 

Filtering  by Data Pattern:

 

By specifying a pattern match in a capture filter, you can: 

 

 

When you filter based on a pattern match at a specific point in the data, you must specify where the

pattern occurs in the frame (how many bytes from the beginning or end).  If your network medium

uses variable-sized frames, specify to begin counting in for a pattern match from the end of the

topology header.

 

 

 

Displaying Captured Data

 

To simplify data analysis, Network Monitor interprets raw data collected during the capture and

displays it in the Capture window. 

 

 

Using Display Filters

 

You can use a display filter to determine which frames to display.  Like a capture filter, a display

filter functions like a database query, allowing you to single out specific types of information. 

 

You can filter a frame by the following information:

 

header. 

 

Although capture filters are limited to four address filter expressions, display filters are not.  With

display filters, you can also use AND, OR, and NOT logic.

 

Protocol properties are information that defines a protocol’s purpose.  Because the purpose of

protocols varies, properties differ from one protocol to another.  Suppose, for example, that you

 

 

 

========================================================================

 

winser13.html                                                 PAGE 23                                                        2002/02/01

 

 

 

 

have captured a large number of frames that use the SMB protocol, but you want to examine only

those frames in which the SMB protocol was used to create a directory on your computer.  In this

instance, you can single out frames where the SMB command property is equal to the Make

Directory command.

 

 

Network Monitor Performance Issues

 

Network Monitor creates a memory-mapped file for its capture buffer.  For best results, make sure

you create a capture buffer large enough to accommodate the traffic you need.

 

Running Network Monitor in the background is the way to reduce the amount of system resources

necessary to operate the program.  To run Network Monitor in the background, choose Dedicated

Capture Mode from the Capture Menu.  This is one strategy to reduce resource use if network

packets are being dropped rather than captured.

 

 

Lesson Summary:

 

throughput in terms of captured network traffic.

information transferred over the network segment at any given time.

displays it in the Frame Viewer Window.

specific types of information.

 

 

Lesson 5:  Task Manager

 

Windows Task Manager provides summary information about computer performance as well as

about programs and processes running on the computer.

 

 

Overview of Task Manager

 

Task Manager provides information about programs and processes running on your computer.  It also

displays the most commonly used performance measures for processes.

 

========================================================================

 

winser13.html                                                 PAGE 24                                                        2002/02/01

 

 

 

 

You can use Task Manager to monitor key indicators of your computer’s performance.  You can

quickly see the status of programs that are running and end programs that have stopped responding.

 

To open Task Manager, right click on an empty space on the taskbar and then click Task manager. 

You can also open Task Manager by pressing Ctrl+Alt+Delete and then clicking the Task Manager

button.

 

To  update Task Manager data, click Refresh Now on the View menu.  You can also change the

frequency at which the data is automatically updated.  On the View menu, click Update Speed and

then click the option that you want.

 

 

Applications Tab

 

The Applications tab shows the status of the programs running on your computer.

 

Using Task Manager to start a program is identical to using the Run command on the Start menu. 

Of a program stops responding, press Ctrl+Alt+Delete to start Task Manager, select the program

that is not responding, and then click End Task.  Any data entered or changes made that were not

saved will be lost.

 

 

Processes Tab

 

The Processes tab shows information about the processes running on your computer.  For example,

you can display information on CPU and memory usage, page faults, handle count, and a number of

other parameters.

 

On the processes tab, you can sort the list of processes and display other process counters.  For a

description of each type of counter that you can monitor, see Task Manager Help.  To see the available

process counters, click the Processes tab and then choose Select Columns from the View Menu.

 

NOTE:  Task Manager does not allow you to end a process that is critical to the operation of

Windows 2000.  Utilities on the Windows 2000 Resource Kit will allow you to end critical

processes.  However, this procedure is likely to cause operating system instability.

 

 

 

 

========================================================================

 

winser13.html                                                 PAGE 25                                                        2002/02/01

 

 

 

 

The Processes tab also allows you to assign a process to a processor by using the Set Affinity

command.  However, the command is available only on multiprocessor computers.

 

 

Performance Tab

 

The Performance tab displays a dynamic overview of your computer’s performance.  This view

includes graphs for CPU and memory usage; totals for the number of handles, threads and

processes running on the computer; and totals, in kilobytes, for physical, kernel, and commit

memory.

 

If you select the Show Kernel Times option from the View Menu, a red line is added to the

CPU Usage graph and to the CPU Usage History graph.  The red lines indicate the amount of

CPU resources consumed by kernel operations.

 

 

Lesson Summary: