SlideShare une entreprise Scribd logo
1  sur  48
1
Upon completion you will be able to:
Network Management:
SNMP
• Understand the SNMP manager and the SNMP agent
• Understand the roles of SMI and MIB in network management
• Be familiar with SMI object attributes and encoding methods
• Know how an MIB variable is accessed
• Be familiar with the SNMP PDU and format
Objectives
2
CONCEPT
SNMP defines a manager, usually a host,
that controls and monitors a set of agents,
usually routers.
The topics discussed in this section include:
Managers and Agents
3
Figure SNMP concept
4
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols: Structure of
Management Information (SMI) and Management
Information Base (MIB). Network management on the
Internet is done through the cooperation of SNMP, SMI, and
MIB.
The topics discussed in this section include:
Role of SNMP
Role of SMI
Role of MIB
An Analogy
An Overview
5
Components of network management on the
Internet
6
SNMP defines the format of packets
exchanged between a manager and an
agent. It reads and changes the status
(values) of objects (variables) in
SNMP packets.
Note:
7
SMI defines the general rules for naming
objects, defining object types (including
range and length), and showing how to
encode objects and values. SMI defines
neither the number of objects an entity
should manage, nor names the objects to
be managed nor defines the association
between the objects and their values.
Note:
8
MIB creates a collection of named
objects, their types, and their
relationships to each other in an entity
to be managed.
Note:
9
We can compare the task of network
management to the task of writing a
program.
❏ Both tasks need rules. In network management
this is handled by SMI.
❏ Both tasks need variable declarations. In network
management this is handled by MIB.
❏ Both tasks have actions performed by statements.
In network management this is handled by SNMP.
Note:
10
Figure Management overview
11
SMI
SMI is a component used in network
management. It names objects, defines the
type of data that can be stored in an object,
and shows how data can be encoded for
transmission over the network
The topics discussed in this section include:
Name
Type
Encoding Method
12
Figure Object attributes
13
Figure Object identifier
14
All objects managed by SNMP are
given an object identifier.
The object identifier always starts with
1.3.6.1.2.1.
Note:
15
Figure Data type
16
Table Data types
17
Figure Conceptual data types
18
Figure Encoding format
19
Table 21.2 Codes for data types
20
Figure 21.9 Length format
21
Figure 21.10 shows how to define INTEGER 14.
Example 1
See Next Slide
22
Figure 21.10 Example 1, INTEGER 14
23
Example 2
See Next Slide
Figure 21.11 shows how to define the OCTET STRING
“HI.”
24
Figure 21.11 Example 2, OCTET STRING “HI”
25
Figure 21.12 shows how to define ObjectIdentifier
1.3.6.1 (iso.org.dod.internet).
Example 3
See Next Slide
26
Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
27
Figure 21.13 shows how to define IPAddress
131.21.14.8.
Example 4
See Next Slide
28
Figure 21.13 Example 4, IPAddress 131.21.14.8
29
21.4 MIB
MIB is a component used in network management. Each agent has its
own MIB, a collection of all the objects that the manager can manage.
The topics discussed in this section include:
Accessing MIB Variables
Lexicographic Ordering
30
Figure 21.14 mib-2
31
Figure 21.15 udp group
32
Figure 21.16 udp variables and tables
33
Figure 21.17 Indexes for udpTable
34
Figure 21.18 Lexicographic ordering
35
21.5 SNMP
SNMP is an application program that allows 1) a manager to retrieve the
value of an object defined in an agent; 2) a manager to store a value in
an object defined in an agent; and 3) an agent to send an alarm message
about an abnormal situation to the manager
The topics discussed in this section include:
PDUs
Format
36
Figure 21.19 SNMP PDUs
37
Figure 21.20 SNMP PDU format
38
Table 21.3 Types of errors
39
21.6 MESSAGES
A message in SNMP is made of four elements: version, header, security
parameters, and data (which includes the encoded PDU).
40
Figure 21.21 SNMP message
41
Table 21.4 Codes for SNMP messages
42
In this example, a manager station (SNMP client) uses the
GetRequest message to retrieve the number of UDP datagrams
that a router has received. There is only one VarBind entity.
The corresponding MIB variable related to this information is
udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0.
The manager wants to retrieve a value (not to store a value), so
the value defines a null entity. Figure 21.22 shows the
conceptual view of the packet showing the hierarchical nature
of sequences. We have used white and color boxes for the
sequence and a gray one for the PDU.
Example 5
See Next Slide
43
The VarBind list has only one VarBind. The variable is of type
06 and length 09. The value is of type 05 and length 00. The
whole is a sequence of length 0D (13). The VarBind list is also
a sequence of length 0F (15). The GetRequest PDU is of length
1D (29). Now we have three OCTET STRINGs related to
security parameter, security model, and flags. Then we have
two integers defining maximum size (1024) and message ID
(64). The header is a sequence of length 12, which we left
blank for simplicity. There is one integer, version (version 3).
The whole message is a sequence of 52 bytes. Figure 21.23
shows the actual message sent by the manager station (client)
to the agent (server).
Example 5
See Next Slide
44
Figure 21.22 Example 5
45
Figure 21.23 GetRequest message
46
21.7 UDP PORTS
SNMP uses the services of UDP on two well-known ports, 161 and 162.
The well-known port 161 is used by the server (agent), and the well-
known port 162 is used by the client (manager).
47
Figure 21.24 Port numbers for SNMP
48
21.8 SECURITY
The main difference between SNMPv3 and SNMPv2 is the enhanced
security. SNMPv3 provides two types of security: general and specific.
SNMPv3 provides message authentication, privacy, and manager
authorization.

Contenu connexe

Tendances (20)

Firewall
FirewallFirewall
Firewall
 
SNMP
SNMPSNMP
SNMP
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
Simple Network Management Protocole
Simple Network Management ProtocoleSimple Network Management Protocole
Simple Network Management Protocole
 
Firewall
FirewallFirewall
Firewall
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
The Elastic Stack as a SIEM
The Elastic Stack as a SIEMThe Elastic Stack as a SIEM
The Elastic Stack as a SIEM
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
 
Firewalls
FirewallsFirewalls
Firewalls
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 

En vedette

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Network Management
Network ManagementNetwork Management
Network ManagementVivek Garg
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMPAhmar Hashmi
 
Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cdjacko91
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker ProjectPraveen Mathews
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolNilantha Piyasiri
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by CiscoFebrian ‎
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileKenny (netman)
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 

En vedette (20)

Snmp
SnmpSnmp
Snmp
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Network Management
Network ManagementNetwork Management
Network Management
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
Protocolo SNMP
Protocolo SNMPProtocolo SNMP
Protocolo SNMP
 
Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cd
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Snmp protocol
Snmp protocolSnmp protocol
Snmp protocol
 
Inter as vpn option c
Inter as vpn option c Inter as vpn option c
Inter as vpn option c
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 file
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 
Snmp
SnmpSnmp
Snmp
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 

Similaire à Network Management: Understanding SNMP

CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptserne
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptuseonlyfortech140
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmpjorlugon
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCEassinha
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibilityHamdamboy (함담보이)
 
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardProgramming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardGaurav Verma
 

Similaire à Network Management: Understanding SNMP (20)

Ch28
Ch28Ch28
Ch28
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Ch23
Ch23Ch23
Ch23
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
 
Snmp
SnmpSnmp
Snmp
 
I010315760
I010315760I010315760
I010315760
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardProgramming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
 

Plus de bhavanatmithun

Plus de bhavanatmithun (13)

Code optimisation presnted
Code optimisation presntedCode optimisation presnted
Code optimisation presnted
 
computer networks
computer networkscomputer networks
computer networks
 
Deadlock
DeadlockDeadlock
Deadlock
 
krisibhavan site
krisibhavan sitekrisibhavan site
krisibhavan site
 
User server interaction
User server interactionUser server interaction
User server interaction
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
HTTP
HTTPHTTP
HTTP
 
FTP
FTPFTP
FTP
 
DNS
DNSDNS
DNS
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Group communication
Group communicationGroup communication
Group communication
 
Group communication
Group communicationGroup communication
Group communication
 

Dernier

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Dernier (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Network Management: Understanding SNMP

  • 1. 1 Upon completion you will be able to: Network Management: SNMP • Understand the SNMP manager and the SNMP agent • Understand the roles of SMI and MIB in network management • Be familiar with SMI object attributes and encoding methods • Know how an MIB variable is accessed • Be familiar with the SNMP PDU and format Objectives
  • 2. 2 CONCEPT SNMP defines a manager, usually a host, that controls and monitors a set of agents, usually routers. The topics discussed in this section include: Managers and Agents
  • 4. 4 MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: Structure of Management Information (SMI) and Management Information Base (MIB). Network management on the Internet is done through the cooperation of SNMP, SMI, and MIB. The topics discussed in this section include: Role of SNMP Role of SMI Role of MIB An Analogy An Overview
  • 5. 5 Components of network management on the Internet
  • 6. 6 SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. Note:
  • 7. 7 SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI defines neither the number of objects an entity should manage, nor names the objects to be managed nor defines the association between the objects and their values. Note:
  • 8. 8 MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note:
  • 9. 9 We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. Note:
  • 11. 11 SMI SMI is a component used in network management. It names objects, defines the type of data that can be stored in an object, and shows how data can be encoded for transmission over the network The topics discussed in this section include: Name Type Encoding Method
  • 14. 14 All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note:
  • 19. 19 Table 21.2 Codes for data types
  • 21. 21 Figure 21.10 shows how to define INTEGER 14. Example 1 See Next Slide
  • 22. 22 Figure 21.10 Example 1, INTEGER 14
  • 23. 23 Example 2 See Next Slide Figure 21.11 shows how to define the OCTET STRING “HI.”
  • 24. 24 Figure 21.11 Example 2, OCTET STRING “HI”
  • 25. 25 Figure 21.12 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). Example 3 See Next Slide
  • 26. 26 Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
  • 27. 27 Figure 21.13 shows how to define IPAddress 131.21.14.8. Example 4 See Next Slide
  • 28. 28 Figure 21.13 Example 4, IPAddress 131.21.14.8
  • 29. 29 21.4 MIB MIB is a component used in network management. Each agent has its own MIB, a collection of all the objects that the manager can manage. The topics discussed in this section include: Accessing MIB Variables Lexicographic Ordering
  • 32. 32 Figure 21.16 udp variables and tables
  • 33. 33 Figure 21.17 Indexes for udpTable
  • 35. 35 21.5 SNMP SNMP is an application program that allows 1) a manager to retrieve the value of an object defined in an agent; 2) a manager to store a value in an object defined in an agent; and 3) an agent to send an alarm message about an abnormal situation to the manager The topics discussed in this section include: PDUs Format
  • 37. 37 Figure 21.20 SNMP PDU format
  • 38. 38 Table 21.3 Types of errors
  • 39. 39 21.6 MESSAGES A message in SNMP is made of four elements: version, header, security parameters, and data (which includes the encoded PDU).
  • 41. 41 Table 21.4 Codes for SNMP messages
  • 42. 42 In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 21.22 shows the conceptual view of the packet showing the hierarchical nature of sequences. We have used white and color boxes for the sequence and a gray one for the PDU. Example 5 See Next Slide
  • 43. 43 The VarBind list has only one VarBind. The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length 1D (29). Now we have three OCTET STRINGs related to security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 21.23 shows the actual message sent by the manager station (client) to the agent (server). Example 5 See Next Slide
  • 46. 46 21.7 UDP PORTS SNMP uses the services of UDP on two well-known ports, 161 and 162. The well-known port 161 is used by the server (agent), and the well- known port 162 is used by the client (manager).
  • 47. 47 Figure 21.24 Port numbers for SNMP
  • 48. 48 21.8 SECURITY The main difference between SNMPv3 and SNMPv2 is the enhanced security. SNMPv3 provides two types of security: general and specific. SNMPv3 provides message authentication, privacy, and manager authorization.