392
C
HAPTER
9: P
ERFORMANCE
R
EPORTING
These database files are never automatically removed by 3Com Network
Director, though the file size is allocated on initial creation and will not
increase over time. For more on file sizes and managing the database
size, see
“Database management”
on
page 398
.
Examples
Determining the
cause of high errors
on a link
An event has just been logged due to a link having a high number of
errors. To determine the cause of high errors on the link:
1
Launch the event browser.
2
Select the event.
3
Launch the
More Detail
dialog box. This gives an explanation of the
event.
4
Navigate to the
Graph tab
to see the monitor history for immediately
before and after the time the event was generated.
5
To launch the historical report for this link, click the hotlink below the
graph.
6
Scroll down to the
Errors
graph at the daily resolution.
7
Click the hyperlink to view the breakdown of errors.
This report breaks down error types into under- and oversized packets,
fragments, CRC errors and jabbers. This will enable you to determine the
cause of the high number of errors. For example, a high volume of
fragments indicates a high utilization on the link. To verify this check the
utilization graph in the same report.
Predicting demand
for bandwidth
requirements
You have been asked to provide estimates for required network upgrades
over the coming months. To do this:
1
Select one of your core links.
2
Launch the historical report for the link by selecting the
Monitoring >
Historical Report
menu option.
3
Click the Yearly Graphs (1 day average) hot-link at the top of the report to
navigate to the yearly resolution graphs.
4
Scroll down to the Utilization graph and examine it to determine its trend.
Summary of Contents for 3C15500 - Network Director - PC
Page 4: ......
Page 34: ......
Page 38: ...34 ABOUT THIS GUIDE ...
Page 50: ...46 CHAPTER 1 GETTING STARTED ...
Page 64: ...60 CHAPTER 2 PRODUCT ACTIVATION ...
Page 213: ...Components 209 Figure 75 Export to Visio Dialog Box ...
Page 220: ...216 CHAPTER 5 WORKING WITH THE MAP Figure 84 Double Clicking on a Router in the Tree ...
Page 264: ...260 CHAPTER 6 VIEWING DEVICE DETAILS Figure 117 Security Tab for a Device ...
Page 276: ...272 CHAPTER 6 VIEWING DEVICE DETAILS ...
Page 322: ...318 CHAPTER 7 MONITORING THE NETWORK ...
Page 385: ...Examples 381 Figure 189 Attach Alerts Dialog Box ...
Page 406: ...402 CHAPTER 9 PERFORMANCE REPORTING ...
Page 431: ...Components 427 History View dialog box Figure 210 History View Dialog Box ...
Page 440: ...436 CHAPTER 10 RMON Host View dialog box Figure 219 Host View Dialog Box ...
Page 476: ...472 CHAPTER 11 CREATING REPORTS ...
Page 502: ...498 CHAPTER 12 CONFIGURING SINGLE DEVICES ...
Page 526: ...522 CHAPTER 13 VLAN MANAGEMENT Figure 272 Options Dialog Box VLANs Tab ...
Page 567: ...Components 563 Figure 305 Selecting the Link to the End Station on the Map ...
Page 626: ...622 CHAPTER 14 BULK CONFIGURATION ...
Page 684: ...680 CHAPTER 16 UPGRADING DEVICE SOFTWARE ...
Page 814: ...810 CHAPTER 19 BACKING UP DEVICE CONFIGURATIONS ...
Page 838: ...834 CHAPTER 20 LIVE UPDATE ...
Page 894: ...890 APPENDIX G ADDING MAC ADDRESS VENDOR TRANSLATIONS ...