Home > Store

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

Register your product to gain access to bonus material or receive a coupon.

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

  • By
  • Published Dec 30, 1999 by Pearson.

Book

  • This product currently is not for sale.
Not for Sale

Description

  • Copyright 2000
  • Dimensions: 7" x 9-1/4"
  • Pages: 384
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-026495-4
  • ISBN-13: 978-0-13-026495-4

Ever wonder what in the world is happening "under the hood" of your network? Why things suddenly slow down, print jobs fail? Network monitoring is the least understood aspect of network administration -- and one of the most important. In this book, a leading networking expert shows you exactly how to monitor and analyze your Windows-based network -- and how to use the information to maximize performance, reduce congestion, plan for growth -- even identify intrusions! Start by reviewing the TCP/IP, IPX/SPX, Ethernet, and Samba protocol basics you need in order to monitor and analyze networks effectively. Inspect network traffic from four different perspectives: client traffic, server traffic, application traffic, and service traffic. Next, learn how to use each version of Microsoft's Network Monitor (Netmon) -- and compare commercial network monitoring tools, discovering when to use each. Finally, review four of the most important networking troubleshooting scenarios, in-depth: connectivity problems, faulty applications, hardware problems, and compromised security -- walking through the process of identifying, analyzing, and solving the problem, step-by-step. For all network and Windows system administrators seeking to improve the performance of their networks.

Downloads

CD Contents

Untitled Document Download the CD-ROM for this title.

Sample Content

Downloadable Sample Chapter

Click here for a sample chapter for this book: 0130264954.pdf

Table of Contents

I. PROTOCOL ANALYSIS: A LOOK AT THE PLAYERS.

1. Basic Network Models.

The OSI Model.Application Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer. The IEEE 802 Project. Enhancements Made to the OSI Model. Logical Link Control Layer (LLC). Media Access Control Layer (MAC). A Look at How Data Makes it Onto the Wire. The Packet Creation Process. Ethernet Communication Specifics. What Is the Role of Protocols in All This? Protocol Stack. A Layered Approach. So How Do I Tie All This Together? Application Protocols. Transport Protocols. Network Protocols. Connection-Oriented Network Service. Connectionless Network Service. Data Link Layer Addresses. Network Layer Addresses. Data Encapsulation. IP over LAN Technologies. Flow Control. Internetworking Functions of the OSI Network Layer. WAN Services. Chapter Review. In the Next Chapter.

2. The TCP/IP Protocol Suite.

Transmission Control Protocol. A Look at the TCP Header. A Look at the Three-Way Handshake. The TCP Quiet Time Concept. Half-Open Connections and Other Anomalies. Reset Generation. Reset Processing. Scenario 1: Local User Initiates the Close. Scenario 2: TCP Receives a FIN from the Network. Scenario 3: Both Users Close Simultaneously. The Communication of Urgent Information. Managing the Window. User/TCP Interface. TCP User Commands. Send. Receive. Close. Status Abort. TCP/Lower-Level Interface. Events That Occur: User Calls. LISTEN STATE. SEND Call. Internet Protocol. The IP Header. Chapter Review. In the Next Chapter.

3. The SPX/IPX Protocol.

SPX Protocol. SPX Header. IPX Protocol. Connectionless Protocol. Operates at the OSI Network Layer. Packet Structure. IPX Addressing. Network Number. Reserved Network Numbers. Internal Network Number. Node Number. Socket Number. How IPX Routing Works. Session and Datagram Interfaces. Message Header Structures. Chapter Review. In the Next Chapter.

4. Server Message Blocks.

SMB Operation Overview. Server Name Determination. Server Name Resolution. Message Transport. Sample Message Flow. Dialect Negotiation. Connection Establishment. Backwards Compatibility. Session Setup. Connection Management. SMB Signing. Opportunistic Locks. Exclusive Oplocks. Batch Oplocks. Level II Oplocks. Security Model. Resource Share/Access Example. Authentication. Distributed File System (DFS) Support. SMB Header. TID Field. UID Field. PID Field. MID Field. Flags field. Flags2 Field. Status Field. Timeouts. Data Buffer (BUFFER) and String Formats. Access Mode Encoding. Open Function Encoding. Open Action Encoding. File Attribute Encoding. Extended File Attribute Encoding. Batching Requests ("AndX" Messages). Chapter Review. In the Next Chapter.

II. NETWORK TRAFFIC ANALYSIS AND OPTIMIZATION: A LOOK AT THE ISSUES

5. A LOOK AT CLIENT TRAFFIC.

CLIENT INITIALIZATION DHCP traffic. WINS Client Traffic. Name Registration and Renewal. Logon Traffic. Finding a Logon Server. Netlogon Optimization. Browsing. Browser Host Announcements. Where Are the Backup Browsers? Browser Traffic Optimization. Chapter Review. In the Next Chapter.

6. A Look at Server Traffic.

DNS Resolving an Address. Recursive Look-ups. Integration with WINS. DNS Optimization. BDC Initialization. Where Is the PDC? Updates to the Database. Optimizing Account Sync Traffic. NetLogon Service. Chapter Review. In the Next Chapter.

7. A Look at Application Traffic

File and Print WINS Request 194Broadcast. ARP. Three-Way Handshake. NetBIOS Session. SMB Dialect Negotiation. Internet Browsing. Web Pages. Secure Sockets. Optimizing Intranet Browser Traffic. Chapter Review. In the Next Chapter.

8. Exchange and Internet Mail.

Exchange Opening and Closing the Session. Exchange Server in Action. POP3 Protocol. Exchange Server to Server. Chapter Review. In the Next Chapter.

III. COMMON NETWORK MONITORS: A LOOK AT THE TOOLS.

9. Microsoft's Network Monitor Family.

Network Monitor Making the Capture. Manually Capturing Traffic. Viewing the Capture. Saving the Capture. Filtering the Capture. Analyzing the Capture. Network Monitor Security. Password Protection. Network Monitor Installations: Detecting Others. Systems Management Server. Network Monitor. Additional Features. Connecting to Remote Agents. The Wizards. Configuring Triggers. Network Monitor 2.0. The Cool New Features. Things That Don't Work. Additional Security Features. Chapter Review. In the Next Chapter.

IV. TROUBLESHOOTING SCENARIOS: A LOOK AT COMMON PROBLEMS.

10. Troubleshooting Issues Workstation Cannot Logon Can We Ping the Server?

Workstation Cannot Logon Can We Ping the Server? Now We Have a Case for a Laptop! Workstation Cannot Obtain DHCP Lease. Look at the Conversation. Analyze What Is Missing. Workstation Is Slow. Can You Define Slow? What Is the Source of Your Discontent? Logon Problems. I Am Trying to Authenticate, but Where? Strange Event Log Errors. A Method for Looking at Server Problems. Running Unattended. Excessive Broadcasts. Who Is Doing It? Why Are They Doing It? Chapter Review. In the Next Chapter.

11. Security Issues

Rogue DHCP Servers.Have I Got an Address for You? Well, Where Are You? Unauthorized Sniffing. First, You Have to Find Them. Then You Give Their Sniffer a Sinus Problem! Chapter Review.

Appendix A: A List of Well-Known TCP and UDP Port Numbers
Appendix B: Command Line Utilities
Appendix C: Common NCPs
Appendix D: Troubleshooting Common Network Errors.

Runt/Long Frames. CRC or FCS Errors. Collisions. Late Collisions.

Appendix E: NetBIOS Suffixes.
Appendix F: Domain Controller Startup.
Appendix G: Opening a Web Page.
Glossary.
Index.

Preface

Introduction

Did you ever wonder what in the world was happening under the hood of your network? Why things are running slowly, what causes print jobs to suddenly fail, or programs to unexpectedly terminate? Are you looking for something to do when users call up complaining that the server is slow? Do you want to get a better feel for how much traffic is actually getting through? If so, then this book is for you because it is about network monitoring and analysis—perhaps the least understood of all administrator activities.

For many, the question is not, why should I perform network monitoring; indeed, it seems a rather intuitive thing. The question is, when do I find time? Couple this with the fact that there is a learning curve, which must be met before the most useful information can be gleaned, and you have lots of resistance. In some respects it is like changing the oil in your car. You know it needs to be done; however, you do not want to get dirty.

The time to learn how to use the tool is not when the network is down, but when things are running well. Network monitoring throws open the door to your data communication stream allowing you to seize new vistas of understanding. We will share many insights with you and hint at possibilities for further exploration. In fact, you will find many ideas for setting up a regular monitoring and analysis program inside these covers. Some of the areas that will pay the greatest dividends are troubleshooting, optimization, and security concerns, each of which commands considerable attention.

In this book, we look at the protocols likely to be present on your network and describe many of the sources of traffic. Through this understanding, we arrive at a plan for fine-tuning our communication scenarios, and we offer solutions that work in real life settings. Once the traffic is characterized, we can reasonably predict the effect of adding additional services or computers onto the network. This gets us out of the reactive mode of chasing phantoms and goblins and allows us to take a proactive, balanced approach to network management. Through traffic prediction, we are able to determine infrastructure requirements and implement solutions before their need even becomes apparent to the users.

Why Use Network Monitoring?

Networks are noisy places. As you look at network traces, one thing that stands out is the sheer volume of data that passes along the wire every second. It is amazing that more data is not lost. We will see several areas to reduce some of the noise. However, in network optimization, the mantra "nothing is free" holds especially true. As we tweak the operating system, we need to see what we are giving up in order to reduce some of the traffic. In many instances, we can make changes without giving up anything significant. At other times, it must be a carefully weighed decision, rooted firmly in a thorough understanding of your particular network configuration and the functionality provided by the specific service or setting. We offer advice and guidance with this determination, and thereby empower you to make the decisions needed to draw order from the ethereal chaos. This analysis is our task as we optimize the network.

Network Optimization

Armed with a thorough understanding of the protocols, we can pick up ideas to reduce the traffic. One of the first things we learn is to eliminate superfluous services. As we will learn in this overview of the protocols, the traffic associated with additional protocols is not just the transport, but the services associated with the protocol. Each service talks to other services, advertises its presence, or in other ways makes itself known on the network. It is conceivable that by simply removing one or two services, a 5 to 10 percent reduction in network traffic can be achieved.

In order to use only the protocols needed on the network, we need to know what the protocols are and where they fit into the scheme of things. Therefore, in the first section of the book, we examine some of the common protocols in use, and look in depth at them to see how they work. With this insight, we can develop our optimization methodology. We see which ones we need, and which ones we do not. We will gain the confidence to run with only one protocol and avoid the temptation to "keep one for a backup." In addition to the flood of extraneous traffic, network communication slows to a crawl as programs make numerous attempts to find a shared protocol.

Although we cannot perform true baselining with the Microsoft Network Monitor tool (some of the other products currently available do this for us), we can get a good idea of our network utilization and thereby manually trend the pertinent statistics in a spreadsheet or database. As we turn off services, reduce protocols, and optimize all that remains, we can chart our progress. We will see the utilization percentages, broadcasts, and CRC errors all fall away like autumn leaves after the first rain. Armed with documentation collected in this step, we are in a good position to plan for expansion.

Expansion Planning

Whenever we add additional workstations, printers, servers, or services to our network we need to have a clear understanding of how the computing environment will be affected. As we plan for expansion, we need an idea of what and where the impact will be on the network itself. The traffic burden is likely to be far greater than a new machine simply talking to a server. If the new machine is performing file-sharing services, then it will be advertising its presence in some manner. When this computer hangs out an open-for-business shingle, how much traffic is going to be generated? What effect does it have on the rest of the segment? If this is a single segment, then what about the other machines sharing the wire? What will the impact be across the router, or at the switch? These are the things we need to look at and the kind of things we talk about in this section.

Security Concerns

Network monitoring can be tremendously helpful as we fight the battle against hacker insurgents. Although it may be possible for them to slip into the network undetected—either through stealing passwords, or bypassing security altogether—it is impossible for them to hide their activities once inside. From this vantage point, the low-level network monitor can see everything. So how do we detect the hackers in our network neighborhood?

A rogue DHCP server is particularly nasty. The DHCP server sits on your network, receives the client request for an IP address, and then proceeds to hand out addresses on its own. They may or may not be legitimate for your network, or they may even hand out duplicate addresses causing no end of grief and heartache. In reality, Network monitoring is the best way to find a rogue DHCP server. Microsoft Network Monitor version 2 makes this sabotage even easier to detect.

Many years ago, the U.S. Navy realized that the best way to catch a submarine was to use another submarine. These silent deadly devices were purposefully designed to avoid detection and thus was born the class of submarines called the fast attack. In the same way, the only way to detect unauthorized sniffing is to use a network monitor. Nearly all tools in this class will assist you in finding clandestine sniffing. Network Monitor version 2 can even shut down unauthorized sniffers.

IP spoofing is a favorite hacker trick in which one computer masquerades as another by using the IP address of another machine and then responding to queries addressed to someone else. We can detect spoofing by firing up our favorite Network Monitoring tool. IP spoofing can also happen if routers are improperly configured. In this situation, a machine answers requests directed to a different machine with the same IP address. This can absolutely drive you crazy until you detect the spoofing.

Troubleshooting

Obviously, a bad Ethernet card is easy to detect. It just lies there, doing nothing but collecting dust—or you look for smoke. However, a card that thinks it is good, and that actually transmits and receives information from time to time, can be far more difficult to find. This is called chattering. The Ethernet card floods the network with bogus information causing all communication to bog down worse than I-75 in Cincinnati during rush hour. This can be detected using Network monitoring tools.

The old song "One bad app don't spoil a whole bunch of good" is not necessarily true. One bad app can affect every other program running on the network. Bad applications can manifest themselves in many different ways. They can look for support files that are not there, cause excessive lookups on the server, or even generate unnecessary traffic. We will look at several somewhat typical scenarios and develop a template you can use to look for other problems in this area.

Network monitoring excels at helping to solve perplexing connectivity problems. Obviously, if you are running TCP/IP, then you use ping to test basic communication between machines. But that is only the first step. When ping works and you still cannot talk to the server is the subject of this section.

Intended Audience

The target audience is network administrators, system architects, technicians, and others who support Windows NT (although the book is useful to those not directly supporting a Windows NT network because the protocols are essentially the same no matter what platform they are running on). The book is also useful for those wishing to do supplemental reading while preparing for their MCSE, Cisco CCNA, or Comptia Network Plus certifications. It is therefore a moderately advanced book. We make no real assumptions either about knowledge of the protocols or experience with the products, as we will be discussing them. Exposure to the OSI model will help make the protocol sections go quicker, but we cover it as well. A basic knowledge of TCP/IP, DHCP, DNS, and WINS is helpful because they show up in some of the examples. If you want to perform network monitoring and analysis and/or wish to be able to troubleshoot and optimize your network communications, then this book is definitely for you.

Organization of the Book

In this book we approach Network Monitoring and Analysis from a protocol point of view. The tool we will use the most in our troubleshooting examples is Microsoft's Network Monitor (AKA Netmon). There are currently four different versions of this tool, and we compare each of them. Originally code-named bloodhound, Netmon has actually changed little since its initial release. To complicate matters, the interface is less than intuitive, and the online help files provide little about how to actually use the product.

We will close this gap and show you how to get the most out of this powerful tool. To this end, we illustrate typical usage scenarios, point out potential pitfalls, and then dive into real-world examples to drive home the utility of this program. Next, fresh from our review of the OSI model and the protocols themselves, we use our knowledge of protocol interlocking to release the full unbridled power of Network Monitor. Finally, we look at how the protocols talk to each other. With this information at our fingertips, we are able to understand what we are looking at in the frame fields. We become one with the network as we speak the language of our machines.

We show you how to use Network Monitor to analyze your network traffic, and how to troubleshoot utilizing this tool. We look at various optimization scenarios and give you lots of food for thought. After reading this book, you will look at your network in a new light. Of course, our end result is to be able to utilize existing tools to troubleshoot complex networks and shed light on these somewhat erstwhile entities.

Our approach is to an extent governed by our task, that is, we will move from the general to the specific. Our path will take us into some turbulent seas, but they are not uncharted waters. Indeed, with the foundation laid down in part one, we will have smooth sailing.

Part 1. Protocol Analysis: A Look at the Players

In order to properly perform network monitoring and analysis, we need to know what we are looking at. This is part of what keeps many of us from using these important tools. However, by looking at everyday protocols and examining the characteristics associated with them, we will be able to understand what it is we are looking at, and therefore be able to more effectively troubleshoot our networks. Chapters in this section include the following:

Chapter One: Basic Network Models begins with the Open Systems Interconnection Model and the modifications made by the IEEE 802 project. We also look at how packets are formed and the way in which protocols work with all this.

Chapter Two: The TCP/IP Protocol Suite provides an introduction to the senior protocol on the block. We will spend much of the book working with the transmission control protocol, the internet protocol, and all their relatives.

Chapter Three: The IPX/SPX Protocol Suite introduces both the Internet packet exchange protocol and the sequenced packet exchange protocol. We will look at how the packets are formed, as well as the role of the service advertising protocol and how it performs name resolution.

Chapter Four: The Server Message Block Protocol is central to network computer communications. We examine many of the commands as we prepare to interpret our traces. When we complete that task, we close out part one of our book.

Part 2. Network Traffic Analysis and Optimization: A Look at the Issues

In Part Two, we look at traffic from four different perspectives, and once this is done, we glean suggestions for reducing this traffic in each of the cases.

Chapter Five: Client Traffic looks at some of the sources of client traffic including that of browsing and attempting name resolution in order to communicate with other machines.

Chapter Six: Server Traffic discusses some of the sources of server traffic including that of directory replication, and responding to DNS queries.

Chapter Seven: Application Traffic discusses traffic related specifically to applications such as file and print, internet browsing, and even email programs.

Part 3. Common Network Monitors: A Look at the Tools

Now we get to the fun stuff—a look at the tools of the trade. Microsoft has some good ones that are obtained in various ways, and in many respects are quite powerful. We begin our look at the tools by focusing on the Microsoft entry into this arena.

Chapter Eight: Microsoft's Network Monitor Family points out at least three different Microsoft Network Monitor tools out there—all called Netmon, and all a little different. In this section, we look at the tool, and the issues surrounding the tools, as well as hints for making the most out of these raw tools.

Part 4. Troubleshooting Scenarios: A Look at Common Problems

Ok, let's roll up our sleeves and apply our fine-tuned knowledge of protocols, and network monitoring tools to some real world problems. Armed with powerful network monitoring tools, we can solve complex problems in a single bound. Let's go troubleshooting.

Chapter Nine: Connectivity Problems looks at the age-old scenario, "I can't get logged in!" There are, of course, many permutations to this and we may occasionally see a workstation that cannot find the domain controller, obtain a DHCP lease, or maybe it just simply cannot connect to the server. Perhaps it is a password problem or other login issue. These issues simply cannot go undetected from a well-tuned network monitor. Unfortunately, some applications are not perfect on their ship date, and therefore get released to manufacturing prematurely. In many instances, these undocumented features are solved in later revisions of the code. But how are they detected? What are some of the clues that get you looking for fixes in the first place? Excessive broadcasts, slow network performance, and unallocated pages are all candidates for the probing ears of Netmon.

Chapter Ten: Security Issues can be looked at with our favorite sniffer. Rogue DHCP servers, unauthorized sniffing, and the like are discussed in this chapter.

On the CD-ROM

On the CD-ROM we have copies of the capture files mentioned in the book to allow you to follow along with the examples and to delve more deeply into the ethereal abyss. We have created filters you can load into your Microsoft Network Monitor that you can use for different troubleshooting scenarios. In addition, there are sample batch files you can use to assist you in triggering unattended Netmon sessions using the Microsoft Windows NT scheduler service. These items are referred to in the text along with hints to allow you to obtain the full benefit from them.

About the Author

Ed Wilson, MCSE + I, MCT, Master ASE, CCNA is a Senior Networking Specialist with Full Service Networking, a Microsoft Solution Provider Partner in Cincinnati, Ohio. His previous publications include chapters on Performance Monitoring, and Network Monitor in the MCSE for Dummies book NT Server in the Enterprise, Osborne McGraw Hill MCSE study guide for the Windows NT Workstation book chapters on troubleshooting and the registry, Osborne McGraw Hill MCSE study guide for Windows 98 chapter on troubleshooting, and the New Riders MCSE Training guide chapters on Setup, Installation, Troubleshooting and Exam Tips.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020