Module 11: Troubleshooting a Network Load Balancing Cluster

Download Report

Transcript Module 11: Troubleshooting a Network Load Balancing Cluster

Module 11:
Troubleshooting a
Network Load
Balancing Cluster
Overview

Using Status Tools and Utilities

Troubleshooting Problems

Using Network Tools and Utilities

When troubleshooting a Network Load Balancing cluster you will
find that configuration errors, automated responses to failures, and
changes to the network infrastructure can change the status of a
cluster. For example, if a single host within a cluster fails to come
online, the cluster will not converge. To troubleshoot a Network
Load Balancing cluster, you can use the various tools that are
available to analyze the problem without visiting the management
console on the failed cluster member.

Error handling in the Network Load Balancing cluster is designed to
minimize the possibility of disrupting the cluster’s service to client
requests, while allowing a cluster’s parameters and member hosts
to dynamically change as required. For example, you can add hosts
to the cluster, remove them for maintenance, add port rules, and
modify rule parameters, all without interrupting Cluster service.

The cluster administrator must decide how to monitor
changes in the cluster status and how to investigate
failures in both the configuration and operation of the
cluster.

After completing this module, you will be able to:



Describe the status tools that are available to monitor
and analyze a Network Load Balancing cluster.
Identify troubleshooting issues that occur within the
Network Load Balancing cluster.
Describe the networking tools that are used to detect
and troubleshoot network problems.
 Using Status Tools and Utilities

The Performance Tool

Network Monitor

Event Viewer

While the operation of a Network Load Balancing cluster
is automatic after you have properly configured it, you
can be required to investigate failures and set
performance baselines when troubleshooting. You use
these baselines to test against, and interactively
monitor, current cluster performance.

You can use various tools and utilities in Microsoft®
Windows® 2000 to provide status information on the
operation of a Network Load Balancing cluster. The
status tools and utilities provide information on the
cluster operation, individual hosts within the cluster,
and network conditions for client connections made to
the cluster. There are two types of status information
about cluster operation, direct or inferred.
Direct Status Information

There are tools and utilities that provide direct status
information on the operation of a Network Load
Balancing cluster; you can collect this data from the
following three sources:



The events written to the event log by the Network Load
Balancing driver.
Interactive information derived by running Wlbs.exe.
Interactive information derived from the Windows
Management Instrumentation (WMI) provider for
Network Load Balancing.
Inferred Status Information

There are tools that you can use to collect only inferred
status information on the operation of the Network Load
Balancing cluster. These tools and utilities provide
information, which you must then interpret to determine
the operational status of the cluster. The tools and
utilities that provide this data are:

The Performance tool, which includes the System
Monitor tool and Performance Logs and Alerts.

The Network Monitor tool.

The Ping.exe and Pathping.exe utilities.

The Arp.exe utility.

The Netstat.exe utility.
The Performance Tool
Computer Management
Action
View
Tree
Computer Management (Local)
System Tools
Event Viewer
System Information
Performance Logs and Alerts
Counter Logs
Trace Logs
Alerts
Shared Folders
Device Manager
Name
Comment
Log File Type Log File Name
test
Binary File
C:\PerfLogs\test_000001.blg
System O… This sample log provides an o… Binary File
C:\PerfLogs\System_Overview.blg
Performance
Console
Action
View
Window Help
Favorites
Tree Favorites
Console Root
System Monitor
Performance Logs and Alerts
Counter Logs
Trace Logs
Alerts
100
75
50
25
0
Color
Scale
1.000
10.000
0.10…
Counter
% Proc..
Discover..
Interrup…
Instance
_Total
--_Total
Parent
-------
Object
Proces…
DHCP…
Proces…

Microsoft Windows 2000 provides the Performance tool,
which contains the System Monitor and Performance Logs
and Alerts. You can use these tools or utilities to display and
collect performance information for the Network Load
Balancing cluster. Monitoring system performance is an
important part of maintaining and administering your cluster.

You can use performance data to:




Understand your workload and the corresponding
effect on your cluster or individual cluster hosts.
Observe changes and trends in workloads and
resource usage so that you can plan for future
upgrades to the cluster or decide whether you
should implement scale up or scale out strategies.
Test configuration changes or other tuning efforts by
monitoring the results.
Diagnose problems and target components or
processes for optimization.

System Monitor and Performance Logs and Alerts
provide detailed data about the resources that are used
by specific components of the operating system and by
server programs that have been designed to collect
performance data. The components of this tool are:



Graphs that provide a display for performancemonitoring data.
Logs that provide recording capabilities for the data.
Alerts that send notification to users by means of the
Messenger service when a counter value reaches, rises
above, or falls below a defined threshold.
Performance Objects and Counters

Performance objects and counters supply data from
system components in your computer. As a component
performs work on your system, it updates the
performance data. The data is described as a
performance object and is typically named for the
component generating the data. For example, the
Processor object is a collection of performance data
about processors on your system.

Note: There are no specific performance objects and
counters for the Network Load Balancing driver.
Because the driver is installed in the Transmission
Control Protocol/Internet Protocol (TCP/IP) stack you
can monitor the IP data below and above the driver.


In monitoring your system, you can use many performance objects,
for example, in a Network Load Balanced Web site you can monitor
the Internet Information Services (IIS) and Hypertext Transfer
Protocol (HTTP) performance objects to assess the performance of
the Web site. Because Network Load Balancing works only with IP
traffic, the objects you will use most frequently to monitor the
Network Load Balancing drivers are:

IP

TCP

User Datagram Protocol (UDP)
Note: To monitor TCP/IP statistics on computers running Windows
2000, install the Simple Network Management Protocol (SNMP)
service. Performance Logs and Alerts access these TCP/IP
statistics.
Performance Data Collection Strategies

The System Monitor tool allows you to capture real-time
monitoring and display of performance data. With the
Performance Logs and Alerts tool you can acquire
performance data to designated file and alerts on any
counter. The tools permit access to local and remote
computers.

You can generate performance monitor log files on
individual servers, or you can obtain the data from
multiple servers by a single instance of Performance
Monitor, writing the data to a centralized log. To ensure
the smallest file sizes, always record data by using the
binary format.
You can collect data in the following ways:

Centralized, when the number of counters is low, or the
collection interval is long, or both.

Distributed, when the number of counters is high, or the
collection interval is short, or both.

When collecting performance data you must decide
whether you will collect data locally or from a central
location. It is recommended that the collection of data
be centralized but not collected by using the Network
Load Balancing cluster IP address. If you collect data by
using the cluster IP address, the in-band collection
impacts throughput to the cluster.
Discussion: Acquiring Data with the Performance
MMC
Computer Management
Action
View
Tree
Computer Management (Local)
System Tools
Event Viewer
System Information
Performance Logs and Alerts
Counter Logs
Trace Logs
Alerts
Shared Folders
Device Manager
Name
Comment
Log File Type Log File Name
test
Binary File
C:\PerfLogs\test_000001.blg
System O… This sample log provides an o… Binary File
C:\PerfLogs\System_Overview.blg
Performance
Console
Action
View
Window Help
Favorites
Tree Favorites
Console Root
System Monitor
Performance Logs and Alerts
Counter Logs
Trace Logs
Alerts
100
75
50
25
0
Color
Scale
1.000
10.000
0.10…
Counter
% Proc..
Discover..
Interrup…
Instance
_Total
--_Total
Parent
-------
Object
Proces…
DHCP…
Proces…

To monitor servers, you must acquire status information
for analysis, or set alerts to give instant notification on
the monitored services. You can view data from
Performance Logs and Alerts in real-time, or save it to
disk files for later analysis.
Setting up a Monitoring Configuration

Configure Performance Logs and Alerts to report data
for the recommended counters at regular intervals, such
as every 10 to 15 minutes. Retain logs over extended
periods of time, store data in a database, and query the
data to report on and analyze the data as needed for
overall performance assessment, trend analysis, and
capacity planning.

The following table shows the counters for monitoring IP,
TCP, and UDP traffic.
IP Counters
TCP Counters
UDP Counters
Datagrams forwarded/sec
Connection Failures
Datagrams No Port/sec
Datagrams Outbound
Discarded
Connections Active
Datagrams Received
Errors
Datagrams Outbound No
Route
Connections Established
Datagrams Received/sec
Datagrams Received
Address Err
Connections Passive
Datagrams Sent/sec
Datagrams Received
Delivered/Sec
Connections Reset
Datagrams/sec
Datagrams Received
Discarded
Segments Received/sec

(continued)
IP Counters
TCP Counters
Datagrams Received Header Err
Segments Retransmitted/sec
Datagrams Received Unknown
Protocol
Segments sent/sec
Datagrams Received/Sec
Segments/Sec
Datagrams Sent/Sec
Datagrams/Sec
Fragment Re-assembly Failures
Fragmentation Failures
Fragmented Datagrams/Sec
Fragments Created/Sec
Fragments Re-assembled/Sec
Fragments Received/Sec
UDP Counters

To complete the discussion, read through the table and
then answer the first question. Be prepared to discuss
the object classes and counters that are available, and
their relevance as failure indicators.
Questions

Answer the following questions.
1.
When monitoring a Network Load Balancing solution
for an IIS-based Web site, which counters would
provide an indication of a service failure?
2.
When designing a monitoring solution for your
Network Load Balanced solution using unicast mode,
would you use a distributed data or centralized
performance data collection strategy?
Network Monitor

Network Monitor Components

Capturing Network Data

Network Monitor Security

You can use the Network Monitor tool to capture and
display the packets that a computer sends or receives
on a local area network (LAN). You can also use
Network Monitor to detect and troubleshoot networking
problems that the local host might experience. For
example, as a network administrator, you can use
Network Monitor to diagnose hardware and software
problems when a host cannot communicate with other
host members in the Network Load Balancing cluster.
Network Monitor Components

Network Monitor is composed of an administrative tool
called Network Monitor and a network protocol called the
Network Monitor driver. You must install both of these
components to capture, display, and analyze network
packets.

By default, Network Monitor does not provide a parser to
display heartbeat and remote control data between cluster
members. You must install the Windows Load Balancing
Service (WLBS) network monitor parsers (Wlbs_hb.dll and
Wlbs_rc.dll) in the Netmon\Parsers directory. The parsers
for WLBS traffic are available in the Windows 2000 Server
Resource Kit.

Note: To monitor all of the traffic on a network you must
use the version of Network Monitor provided with
Microsoft Systems Management Server.
Capturing Network Data

The process by which Network Monitor copies packets
is referred to as capturing. You can capture all of the
network traffic to and from the local network card, or
you can set a capture filter and capture a subset of
packets. You can also specify a set of conditions that
trigger an event in a Network Monitor capture filter. By
using triggers, Network Monitor can respond to events
on your network. For example, you can start an
executable file when Network Monitor has a trigger,
which detects a particular set of conditions on the
network, such as a large number of TCP connection
Resets on a cluster. After you have captured data, you
can view it. Network Monitor does much of the data
analysis for you by translating the raw capture data into
its logical frame structure.

To minimize the amount of data that is being captured,
you can use a capture filter to define the required
capture traffic.

Note: It is not recommended to run the Network Monitor
on a host within the cluster, as the Network Monitor
driver will place the network adapter into promiscuous
mode.
Network Monitor Security

When running the Network Monitor, you can help
protect your network from unauthorized use of Network
Monitor installations; Network Monitor provides the
capability to detect other installations of Network
Monitor that are running on the local segment of your
network.

Important: Running Network Monitor at high usage
times can decrease system performance. Plan on
running Network Monitor when the system is at low
usage or for short periods of time. To avoid capturing
too much information, capture only as many statistics
as you need for evaluation. Smaller amounts of data
allow you to make a reasonably quick diagnosis of the
problem.

When Network Monitor detects other installations that
are running on the
network, it displays the following information about
them:





The name of the computer that is running the Network
Monitor installation.
The name of the user logged on at the computer.
The state of Network Monitor on the remote computer
(running, capturing, or transmitting).
The adapter address of the remote computer.
The version number of Network Monitor running on the
remote computer.

Note: In some scenarios, your network architecture
might prevent one installation of the Network Monitor
tool from detecting another. For example, if a router that
does not forward multicast packets separates another
installation of Network Monitor from your installation of
the tool, Network Monitor will not detect the previous
installation.
Event Viewer

Event Viewer Overview


Event Viewer Events
Using Event Logs to Troubleshoot Problems

The Network Load Balancing driver writes events to the
event log recording status changes and errors for
cluster operations. For example, adding a host to the
cluster with inconsistent port rules results in an error
being written to the event log. The system components
and applications that are installed on a computer can
write information to the event log, which records status
changes, errors, or operating information.
Event Viewer Overview

You can use Event Viewer to view and manage the event
logs, gather information from the logs about hardware
and software problems, and monitor Windows 2000
security events. Events are recorded in three categories
of logs; the application log, system log, and security
log. The Network Load Balancing driver writes to the
system log.
Event Viewer Events

Event Viewer displays these five types of events:





Error. A significant problem, such as loss of data or loss
of functionality
Warning. Indicates a possible future problem
Information. Describes a successful operation of an
application, driver, or service
Success Audit. An audited security access attempt that
succeeds
Failure Audit. An audited security access attempt that
fails
Using Event Logs to Troubleshoot Problems

It is important to establish a baseline for your current
configuration by using the System Monitor and
Performance Logs and Alerts to understand the
accumulated events as your system operates. In this
way you can filter the accumulated events to show only
events that indicate some abnormality in operation. You
can save the event logs for your system in log format to
provide a reference or baseline for normal operation.
ID
Event Description
4
WLBS: Vx.y.z started
successfully.
WLBS: cluster mode started
with host ID 'N'.
5
6
18
23
24
Comment
Generated when a WLBS driver is loaded
successfully.
Generated on the local computer when the
cluster mode command wlbs start is
issued.
WLBS: cluster mode stopped. Generated on the local computer when
commands like wlbs stop or wlbs drain are
issued.
WLBS: Duplicate cluster
This event can be caused by pulling the net
subnets detected. The
tap on a server, which will cause the server
network may have been
to converge with itself and two clusters will
inadvertently partitioned.
form.
WLBS: enabled traffic
Generated when the command wlbs enable
handling for rule containing
or a computer is restarted and the WLBS
port 'N'.
agent starts.
WLBS: disabled ALL traffic
Generated when the cluster mode
handling for rule containing
command wlbs disable is issued either by
port 'N'.
an operator or monitoring tool like
HTTPMon.
ID
Event Description
Comment
28
WLBS: host 'N' converged
with host(s) 'N1, N2,..., Nn'
as part of the cluster.
WLBS: host 'N' converged
as DEFAULT host with
host(s) 'N1,N2,...,Nn' as part
of the cluster.
WLBS: registry parameters
successfully reloaded.
WLBS: adjusted traffic
handling for rule containing
port N.
WLBS: disabled NEW traffic
handling for rule containing
port N.
WLBS: disabled NEW traffic
handling for all port rules.
WLBS: enabled traffic
handling for all port rules.
Generated when a convergence has been
completed.
29
36
38
39
41
42
Generated only on the computer running as
the default WLBS agent when a convergence
has been completed.
This event is issued only when the convoy
reload command is issued manually.
This event is generated as a result of
executing an undocumented WLBS
command.
This event is generated when the wlbs drain
command is executed for a single port.
This event is generated when the wlbs drain
command is executed for all ports.
This event is generated when the wlbs
enable command is executed for all ports.
ID
Event Description
Comment
43
WLBS: disabled ALL traffic
handling for all port rules.
This event is generated when the wlbs
disable command is executed for all ports.
44
WLBS: connection draining
started.
This event is generated when the wlbs
drainstop command is executed for all ports.
45
WLBS: connection draining
interrupted.
This event is generated when a wlbs stop or
wlbs start command is executed after a wlbs
drainstop is issued but not completed.
Troubleshooting Problems

IP Address Conflicts

Non Reported Convergence

Multiple Default Hosts

Network Incompatible Hosts

You may encounter problems when installing and
initially using Network Load Balancing. Testing your
network and all network adapters for proper operation
before installing Network Load Balancing can help to
reduce common configuration problems.

Be sure to follow all of the installation steps and check
that the cluster parameters and port rules are identically
set for all of the cluster hosts. If problems occur,
always check the event log for messages from the
Network Load Balancing driver.

The following table lists a few examples of troubleshooting issues for
a Network Load Balancing cluster.
Symptom
Cause
Solution
“The system
has detected
an IP address
conflict with
another
system on
the
network...” is
displayed.
Two different cluster primary IP
addresses were entered in the TCP/IP
configuration in the Internet Protocol
(TCP/IP) Properties dialog box on
different hosts.
Be sure to use one primary
cluster IP address for all of
the cluster hosts.
Be sure to use one cluster
Two different cluster network
addresses were entered in the Network network address for all of
Load Balancing Properties dialog box the cluster hosts.
on different hosts.
The network adapter could not change
its network address. This problem
occurs only when using a unicast
network address (instead of a
multicast address).
Either switch to a different
type of network adapter or
use Network Load
Balancing multicast
support.
Symptom
Cause
Solution
After the cluster
hosts start, they
begin converging
but never report that
convergence has
completed.
Either a different number of
port rules or incompatible
port rules on different cluster
hosts were entered. This will
inhibit convergence.
Open the Network Load
Balancing Properties dialog
box on each cluster host and
verify that all of the hosts
have identical port rules.
Symptom
Cause
Solution
After the
cluster hosts
start, Network
Load Balancing
reports that
convergence
has finished,
but more than
one host is a
default host.
The cluster hosts have become
members of different subnets,
so that all hosts are not
accessible on the same
network.
Be sure that all of the cluster hosts can
communicate with each other.
Different media access control
(MAC) addresses are being
used across the cluster, and the
cluster’s primary IP address
was not assigned when setting
up TCP/IP for Network Load
Balancing. In this case, TCP/IP
will not detect an address
conflict, and multiple clusters
will exist.
Be sure to use one primary IP address for
the cluster and a corresponding MAC
address on all hosts within the same
cluster, specifying the cluster's primary IP
address in the TCP/IP configuration.
Different clusters are running
on the same subnet.
If you use different primary IP addresses,
each with unique corresponding MAC
addresses, on various cluster hosts, you
can create multiple clusters on the same
subnet. This is a not a problem unless
this behavior was not intended.
Symptom
Cause
Solution
The network does
not appear to work
for one or more of
the cluster hosts.
The Network Load Balancing
driver did not load
successfully when the
computer started. This
problem can arise because
another networking driver on
which Network Load
Balancing depends failed to
load, or because the file for
the Network Load Balancing
driver has been corrupted.
Run the wlbs query command
to verify that the driver was
loaded. If the command
reports an error, check the
Windows event log to see
why the driver failed to load.
 Using Network Tools and Utilities
WAN or
Internet Link
Status Information
Used for Diagnosis
Switch
Router
• Verify IP Connectivity
Diagnostic
Utilities
• Isolate Network Problems
• Diagnose Client Traffic

As the system administrator, it is important that you are
aware of the network tools that you use to confirm the status
of your Network Load Balancing cluster. You can use these
tools and utilities to verify IP-level connectivity, or isolate
problems with the network hardware and incompatible
network configurations.

Using network tools and utilities, you can send IP packets to
each router over a period of time and then compute results
that are based on the returned packets. By analyzing this
collected data of packets that are sent and returned to a
designated router or link, you can determine which routers
or links might be causing network problems.

You use some of these tools and utilities to diagnose client
traffic, display information on the Domain Name System
(DNS) servers, display protocol statistics, or modify the IP
physical address.
Network Tools and Utilities

Netdiag

Ping

Pathping

Tracert

Nslookup

Netstat

ARP

You can use command line network tools and utilities to
test the status of both the services and the network
infrastructure of your Network Load Balancing cluster.
You can use the information collected by these tools
and utilities to analyze service, network operation, and
variations in performance. You can use the tools and
utilities interactively, or you can store their output in
files for later analysis.

You can use the following tools and utilities interactively
to provide status information about the Network Load
Balancing cluster:

Netdiag. A utility that performs a series of tests to
isolate networking and connectivity problems; it is also
used to determine the functional state of your network
client. Netdiag performs extensive testing of the
computer on which it is run, including checking the
availability of WINS and DNS. You install Netdiag with
the support tools, which are available in the
\Support\Tools directory of your Windows 2000 compact
disc.

Ping. A utility used to troubleshoot IP-level connectivity.
Ping allows you to specify the size of packets to use
(the default is 32 bytes), how many to send, whether to
record the route used, what Time to Live (TTL) value to
use, and whether to set the don't fragment flag. Ping
provides a minimum average and maximum roundtrip
time (RTT), which is useful to analyze where routing
delays occur.

Pathping. A route-tracing tool that combines the
features of Ping and Tracert with additional unique
information. Over a period of time, Pathping sends
packets to each router on the path to a final destination,
and then computes results that are based on the
packets that are returned from each hop. Pathping
shows the degree of packet loss at any given router or
link, so that you can pinpoint which routers or links
might be causing network problems.

Tracert. A route-tracing utility that displays a list of
router interfaces from the routers along the path
between a source host and a destination. Tracert uses
the IP TTL field in Internet Control Message Protocol
(ICMP) Echo Requests and ICMP Time Exceeded
messages to determine the path from a source to a
destination through an IP internetwork.

Nslookup. A utility that is used for troubleshooting DNS
problems, such as host name resolution failure.
Nslookup displays a command prompt and shows the
host name and IP address of the local DNS server. You
can then perform interactive queries to test DNS name
resolution.

Netstat. A utility that is used to display protocol
statistics and current TCP/IP connections. You can
display the connection status and throughput statistics
for TCP/IP interfaces in the computer.

ARP. A utility that is used to display and modify the IPto-physical address translation tables in hosts and
routers that the address resolution protocol uses.
Demonstration: Examining Network Properties

You can examine the network properties by analyzing
the flow of traffic on the network. You will use Network
Monitor to examine data captured from a network.

The following demonstration shows a capture from a client
(10.10.10.100) where multiple instances of Internet Explorer are
started, configured to a default Web site (10.10.10.3) that is served
by a 2-host cluster in unicast mode.
1.
Start Network Monitor by clicking on Start – Programs –
Administrative Tools – Network Analysis Tools – Network Monitor.
2.
Click File, and then Open; in the Open dialog box select
NLB_2HOSTS_UNICAST.CAP and then click Open.
3.
The capture shows the traffic between a client (IP is 10.10.10.100)
and a 2-host Network Load Balancing cluster (cluster IP is
10.10.10.3, and the dedicated IP addresses are 10.10.10.4 and
10.10.10.5).
4.
Examine the first few frames, which are heartbeat communications
between the cluster hosts.

Note: Network Monitor requires additional configuration to display
the contents of the Network Load Balancing heartbeat packets.
The Windows 2000 Server Resource Kit supplies the required dlls
and installation information.
5.
For the heartbeat frames, show the following:
a. MAC address fields for the frames
b. Time interval between heartbeats from the same host
c. Heartbeat cluster frame size (show the Ether Type
registered for NLBS, 0x886F)
d. Filed for convergence state
e. Fields for Cluster and dedicated IP addresses
f.
Fields for Port Rules
6.
Show ARP request at frame 39, discuss the request, reply, and subsequent
TCP connection that is established. Show and discuss the following
frames:
a. 18, the ARP request
b. 19 and 21, the ARP reply from both cluster members
c. 20, 22 and 23, the Syn, AckSyn and Ack setting up the TCP connection
d. 24, the Get request from the client for a Web page
e. 25, the HTTP response (note the HTTP data shows Student1 as the
source)
f.
30, and 31, a Get request and reply (note that the data comes from
Student2)
g. Show other frames as required to show multiple instances of Internet
Explorer being opened with the default Web site 10.10.10.3
h. Show frames from 265 on that represent Internet Explorer closing and a
TCP reset occurring
Lab A: Network Load Balancing Cluster
Troubleshooting
Objectives

After completing this lab, you will be able to:


Install Network Monitor (NetMon).
Use NetMon to view cluster traffic between clients and
cluster hosts.
Exercise 1: Installing Network Monitor

You will work individually and together in pairs to
analyze cluster host operations.
To install a local copy of Network Monitor

Note: The local copy of Network Monitor will show
only traffic that is directed to or generated by the local
computer; it cannot capture all network traffic.
1.
Click Start, point to Settings, and then click Control
Panel to open Control Panel.
2.
In Control Panel, double-click Add/Remove Programs.
3.
In Add/Remove Programs, click Add/Remove Windows
Components.
4.
In the Windows Components Wizard, select
Management and Monitoring Tools, and then click
Details.
5.
Select Network Monitor Tools, and then click OK.
6.
In the Windows Components Wizard, click Next to
continue the installation process.
7.
If you are asked to insert the CD to copy files, browse
to \\London\Setup\Winsrc and click Retry.

Note: Your instructor may advise you to look in a
different location for the files.
8.
When installation is complete, click Finish to close the
Windows Components Wizard, and click Close to exit
the Add/Remove Programs window.
9.
Close Control Panel.
Exercise 2: Using Network Monitor

All students complete this procedure and will work with
a partner. You will collect information on Network Load
Balancing traffic by using the Network Monitor tool. The
following procedure records, examines, and analyzes
traffic on the 2-host cluster.

Note: It is important that you configure the student
cluster members to use Multicast at the beginning of
this exercise. If you do not configure the cluster to use
Multicast, alter the configuration before starting.
To install network monitor
1.
Click Start, click Run, type cmd in the Open dialog box,
and then click OK to open a command prompt window.
2.
Type wlbs query at the command prompt and press
ENTER.
3.
If the cluster is not CONVERGED with Host 1 as
DEFAULT, and Host 1, 2 as members, reconfigure the
cluster and restart this procedure.
4.
On the lowest number student ID computer, click Start,
point to Programs, point to Administrative Tools, and
then click Network Monitor to start Network Monitor.
5.
Configure Network Monitor to capture traffic from the
Network Load Balancing network adapter.
6.
Start a capture.
7.
On the highest number student ID computer, click
Start, click Run, type cmd in the Open dialog box, and
then click OK to open a command prompt window.
8.
Type Ping yourclusterIP at the command prompt and
press ENTER.
9.
Type Ping yourdedicatedIP at the command prompt
and press ENTER.
10.
Type Ping yourpartnerdedicatedIP at the command
prompt and press ENTER.
11.
Type Arp –a to show the contents of the ARP cache.
12.
Record the information provided:

Note: Notice that the cluster IP address and the local dedicated IP
address do not have entries in the ARP cache.
13.
On the lowest number student ID computer, stop the capture.
14.
With you partner, examine the trace, and for an ARP request from
the dedicated IP address for the higher number student ID
computer, record the sender’s hardware and IP address.
Sender Hardware Address
Sender Protocol Address
15.
Examine the ARP reply and record the sender’s hardware and IP
address. Sender Hardware Address
Sender Protocol Address
What MAC addresses are the cluster members using for the
dedicated IP address?
16.
Reconfigure the cluster hosts to use Unicast, by stopping both hosts and
clearing Multicast in the Cluster Parameters.
17.
Restart the cluster hosts and use Wlbs.exe to verify that the cluster
hosts are converged.
18.
On the highest number student ID computer, click Start, point to
Programs, point to Administrative Tools, and then click Network Monitor
to start Network Monitor.
19.
Configure Network Monitor to capture traffic from the Network Load
Balancing network adapter.
20.
Start a capture.
21.
On the lowest number student ID computer, click Start, click Run, type
cmd in the Open dialog box, and then click OK to open a command
prompt window.
22.
Type Ping yourclusterIP at the command prompt and press ENTER.
23.
Type Ping yourdedicatedIP at the command prompt and press ENTER.
24.
Type Ping yourpartnerdedicatedIP at the command prompt and
press ENTER.
25.
Type Arp –a to show the contents of the ARP cache.
26.
Record the information provided:

Note: Notice that there are no cluster entries in the ARP cache.
27.
On the highest number student ID computer, stop the capture.
28.
With you partner, examine the trace; and for an ARP request from
the dedicated IP address for the lowest number student ID
computer, record the sender’s hardware and IP address.
Sender Hardware Address
Sender Protocol Address
29.
Examine the ARP request in detail and find the source MAC
address that is used to send the packet; it is different than the
sender’s hardware address that is used in the ARP request. Why
is it different, and how can it be changed?
30.
Start a Network Monitor capture on both student computers and
use your instructor’s computer to Ping the virtual and dedicated
IP addresses of your cluster and members.
31.
Type Arp –a on the instructor computer to show the contents of
the ARP cache.
32.
Record the information provided.

Note Notice that the MAC address is the same for all of the cluster
related entries in the ARP cache.
33.
Stop the Network Monitor captures on both cluster hosts and
examine the captures.
Compare the results. What differences in response to the ARP
requests occur?
Why are there no heartbeat packets captured by the local copy of
Network Monitor?
34.
Close all of the applications.
Review

Using Status Tools and Utilities

Troubleshooting Problems

Using Network Tools and Utilities