SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
CIS 203
17 : Network Management
Introduction
• Network, associated resources and distributed
applications indispensable
• Complex systems
—More things can go wrong
• Requires automated network management tools
• Need comprehensive data gathering and control
tools
• SNMP
Elements of Network
Management
• Fault
• Accounting
• Configuration
• Performance
• Security
Fault Management Overview
• When fault occurs
—Determine where
—Isolate rest of network so it can continue to function
—Reconfigure or modify network to minimize impact of
operation without failed components
—Repair or replace failed components
• Fault is abnormal condition that requires action
to repair
—Errors (e.g. single bit error on line) occur and are not
faults
Fault Management User
Requirements
• Fast and reliable problem resolution
• Immediate notification
• Impact and duration minimized by redundant
components and routes
— Fault tolerance
• Fault management capability should be redundant
• After correction, fault management must ensure
problem is truly resolved and no new problems
introduced
— Problem tracking and control
• Minimal effect on network performance
Accounting Management
Overview
• Individual cost centers or projects charged for
use of network services
• Network manager needs to be able to track use
of network
—User or group may be abusing access
—Users may be making inefficient use of network
—Need to plan for network growth
Accounting Management
User Requirements
• Needs to specify sort of accounting information
recorded at various nodes
—Interval between successive sendings of information
—Algorithms used in calculating charges
—Accounting reports under network manager control
• Verify users' authorization to access and
manipulate accounting information
Configuration and Name
Management Overview
• Choose appropriate software and attributes and
values (e.g., a transport layer retransmission
timer) for device depending on function(s)
• Initializing network and gracefully shutting down
• Maintaining, adding, and updating relationships
among components
• Status of components during network operation
Configuration and Name
Management User Requirements
• Startup and shutdown
• Unattended
• Need to identify components of network and
connectivity
• Define and modify default attributes
• Load predefined attributes
• Change connectivity
• Reconfiguration
• Status information and notification of changes
• Routine or request driven reports
• Authorized users (operators) only to manage and control
operation (e.g., software distribution and updating)
Performance Management
Overview
• Monitoring
—Tracks activities
—What is the level of capacity utilization?
—Is there excessive traffic?
—Has throughput been reduced to unacceptable levels?
—Are there bottlenecks?
—Is response time increasing?
• Controlling
—Make adjustments to improve performance
• Identify resources to be monitored
—Metrics and values for resources
Performance Management
User Requirements
• Must be known in sufficient detail to assess user
queries
—Applications need consistently good response time
• Performance statistics help planning,
management and maintenance
—Recognize potential bottlenecks before they cause
problems
—Capacity planning based on performance information
Security Management
Overview
• Generating, distributing, and storing encryption
keys
• Passwords and access control information
maintained and distributed
• Monitoring and controlling access
• Logging
—Collection, storage, and examination of audit records
and security logs
Security Management
User Requirements
• Facilities available for authorized users only
• Users want to know proper security in force and
effective
• Management of security facilities is secure
Network Management Systems
• Collection of tools for network management
• Single operator interface
• Powerful, user friendly command set
• Performing most or all management tasks
• Minimal amount of separate equipment
—i.e. use existing equipment
• View entire network as unified architecture
• Active elements provide regular feedback
Key Elements
• Management station or manager
• Agent
• Management information base
• Network management protocol
Figure 17.1 Elements of a
Network Management System
Management Station
• Stand alone system or part of shared system
• Interface for human network manager
• Set of management applications
—Data analysis
—Fault recovery
• Interface to monitor and control network
• Translate manager’s requirements into
monitoring and control of remote elements
• Data base of network management information
extracted from managed entities
Management Agent
• Hosts, bridges, hubs, routers equipped with
agent software
• Allow them to be managed from management
station
• Respond to requests for information
• Respond to requests for action
• Asynchronously supply unsolicited information
Management Information Base
• MIB
• Representation of network resources as objects
• Each object a variable representing one aspect
of managed object
• MIB is collection of access points at agent for
management of station
• Objects standardized across class of system
—Bridge, router etc.
Network Management Protocol
• Link between management station and agent
• TCP/IP uses SNMP
• OSI uses Common Management Information
Protocol (CMIP)
• SNMPv2 (enhanced SNMP) for OSI and TCP/IP
Protocol Capabilities
• Get
• Set
• Notify
Management Layout
• May be centralized in simple network
• May be distributed in large, complex network
—Multiple management servers
—Each manages pool of agents
—Management may be delegated to intermediate
manager
Figure 17.2 Example Distributed
Network Management Configuration
Network Management Protocol
Architecture
• Application-level protocol
• Part of TCP/IP protocol suite
• Runs over UDP
• From management station, three types of SNMP
messages issued
— GetRequest, GetNextRequest, and SetRequest
— Port 161
• Agent replies with GetResponse
• Agent may issue trap message in response to event that
affects MIB and underlying managed
— Port 162
SNMP v1
• August 1988 SNMP specification issued
• Stand alone management stations and bridges,
routers workstations etc supplied with agents
• Defines limited, easily implemented MIB of
scalar variables and two dimensional tables
• Streamlined protocol
• Limited functionality
• Lack of security
• SNMP v2 1993, revised 1996
—RFC 1901-1908
Figure 17.3 SNMPv1
Configuration
Figure 17.4 The Role of
SNMPv1
SNMP v2 (1)
• Framework on which network management
applications can be built
—e.g fault management, performance monitoring,
accounting
• Protocol used to exchange management
information
• Each player maintains local MIB
—Structure defined in standard
• At least one system responsible for
management
—Houses management applications
SNPM v2 (2)
• Support central or distributed management
• In distributes system, some elements operate as
manager and agent
• Exchanges use SNMP v2 protocol
—Simple request/response protocol
—Typically uses UDP
• Ongoing reliable connection not required
• Reduces management overhead
Figure 17.5 SNMPv2 Managed
Configuration
Structure of
Management Information
• SMI
• Defines general framework with which MIB
defined and constructed
• Identifies data types
• How resources are represented and named
• Encourages simplicity and extensibility
• Scalars and two dimensional arrays of scalars
(tables) only
Protocol Operation
• Exchange of messages
• Outer message header deals with security
• Seven types of PDU
SNMP v3
• Addresses security issues of SNMP v1/2
• RFC 2570-2575
• Proposed standard January 1998
• Defines overall architecture and security
capability
• To be used with SNMP v2
SNMP v3 Services
• Authentication
— Part of User-Based Security (UBS)
— Assures that message:
• Came from identified source
• Has not been altered
• Has not been delayed or replayed
• Privacy
— Encrypted messages using DES
• Access control
— Can configure agents to provide a number of levels of access to
MIB
— Access to information
— Limit operations
Required Reading
• Stallings chapter 17
• Loads of web sites on SNMP

Contenu connexe

Similaire à 009694598.pdf

unit5NtwManagement.ppt
unit5NtwManagement.pptunit5NtwManagement.ppt
unit5NtwManagement.pptRevathiMohan14
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystemdevalnaik
 
1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.pptFarid Er
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfMeresa Hiluf`
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring toolsQaswarBosan
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentationGraeme Spice
 
Network Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptxNetwork Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptxMaryOyebanji
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Managementjeronimored
 
AggreGate Network Manager
AggreGate Network ManagerAggreGate Network Manager
AggreGate Network ManagerTibbo
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Networkzaisahil
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkDr Geetha Mohan
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Shahrukh Ali Khan
 
US based Educational Institution manages 1500 devices using opmanager
US based Educational Institution manages 1500 devices using opmanagerUS based Educational Institution manages 1500 devices using opmanager
US based Educational Institution manages 1500 devices using opmanagerManageEngine, Zoho Corporation
 
Presilient Worldwide at a Glance
Presilient Worldwide at a GlancePresilient Worldwide at a Glance
Presilient Worldwide at a GlanceKrystanne
 
Shared information systems
Shared information systemsShared information systems
Shared information systemsHimanshu
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Deborah Porchivina
 

Similaire à 009694598.pdf (20)

unit5NtwManagement.ppt
unit5NtwManagement.pptunit5NtwManagement.ppt
unit5NtwManagement.ppt
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystem
 
1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt1. Network monitoring and measurement-2.ppt
1. Network monitoring and measurement-2.ppt
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdf
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
unit1.pdf
unit1.pdfunit1.pdf
unit1.pdf
 
Mso noc presentation
Mso noc presentationMso noc presentation
Mso noc presentation
 
architeral design.pptx
architeral design.pptxarchiteral design.pptx
architeral design.pptx
 
Network Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptxNetwork Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptx
 
Functional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration ManagementFunctional Areas of Network Management Configuration Management
Functional Areas of Network Management Configuration Management
 
Network management
Network managementNetwork management
Network management
 
AggreGate Network Manager
AggreGate Network ManagerAggreGate Network Manager
AggreGate Network Manager
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 
Network Management
Network ManagementNetwork Management
Network Management
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
 
US based Educational Institution manages 1500 devices using opmanager
US based Educational Institution manages 1500 devices using opmanagerUS based Educational Institution manages 1500 devices using opmanager
US based Educational Institution manages 1500 devices using opmanager
 
Presilient Worldwide at a Glance
Presilient Worldwide at a GlancePresilient Worldwide at a Glance
Presilient Worldwide at a Glance
 
Shared information systems
Shared information systemsShared information systems
Shared information systems
 
Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015Light Reading BTE_SDNtoolbox_June_2015
Light Reading BTE_SDNtoolbox_June_2015
 

Plus de EidTahir

Servlets+JSP.ppt
Servlets+JSP.pptServlets+JSP.ppt
Servlets+JSP.pptEidTahir
 
servlets.ppt
servlets.pptservlets.ppt
servlets.pptEidTahir
 
005428058.pdf
005428058.pdf005428058.pdf
005428058.pdfEidTahir
 
005428055.pdf
005428055.pdf005428055.pdf
005428055.pdfEidTahir
 
2.J2EE_Overview.ppt
2.J2EE_Overview.ppt2.J2EE_Overview.ppt
2.J2EE_Overview.pptEidTahir
 
009458666.pdf
009458666.pdf009458666.pdf
009458666.pdfEidTahir
 
009921362.pdf
009921362.pdf009921362.pdf
009921362.pdfEidTahir
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdfEidTahir
 
009478419.pdf
009478419.pdf009478419.pdf
009478419.pdfEidTahir
 
009445185.pdf
009445185.pdf009445185.pdf
009445185.pdfEidTahir
 
009705432.pdf
009705432.pdf009705432.pdf
009705432.pdfEidTahir
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfEidTahir
 
010118565.pdf
010118565.pdf010118565.pdf
010118565.pdfEidTahir
 
005528214.pdf
005528214.pdf005528214.pdf
005528214.pdfEidTahir
 
005432796.pdf
005432796.pdf005432796.pdf
005432796.pdfEidTahir
 
009586150.pdf
009586150.pdf009586150.pdf
009586150.pdfEidTahir
 
009551323.pdf
009551323.pdf009551323.pdf
009551323.pdfEidTahir
 
009723779.pdf
009723779.pdf009723779.pdf
009723779.pdfEidTahir
 
005443266.pdf
005443266.pdf005443266.pdf
005443266.pdfEidTahir
 

Plus de EidTahir (20)

Servlets+JSP.ppt
Servlets+JSP.pptServlets+JSP.ppt
Servlets+JSP.ppt
 
servlets.ppt
servlets.pptservlets.ppt
servlets.ppt
 
005428058.pdf
005428058.pdf005428058.pdf
005428058.pdf
 
005428055.pdf
005428055.pdf005428055.pdf
005428055.pdf
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
2.J2EE_Overview.ppt
2.J2EE_Overview.ppt2.J2EE_Overview.ppt
2.J2EE_Overview.ppt
 
009458666.pdf
009458666.pdf009458666.pdf
009458666.pdf
 
009921362.pdf
009921362.pdf009921362.pdf
009921362.pdf
 
009577496.pdf
009577496.pdf009577496.pdf
009577496.pdf
 
009478419.pdf
009478419.pdf009478419.pdf
009478419.pdf
 
009445185.pdf
009445185.pdf009445185.pdf
009445185.pdf
 
009705432.pdf
009705432.pdf009705432.pdf
009705432.pdf
 
enterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdfenterprisejavaunit-1chapter-2-210914075956.pdf
enterprisejavaunit-1chapter-2-210914075956.pdf
 
010118565.pdf
010118565.pdf010118565.pdf
010118565.pdf
 
005528214.pdf
005528214.pdf005528214.pdf
005528214.pdf
 
005432796.pdf
005432796.pdf005432796.pdf
005432796.pdf
 
009586150.pdf
009586150.pdf009586150.pdf
009586150.pdf
 
009551323.pdf
009551323.pdf009551323.pdf
009551323.pdf
 
009723779.pdf
009723779.pdf009723779.pdf
009723779.pdf
 
005443266.pdf
005443266.pdf005443266.pdf
005443266.pdf
 

Dernier

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Dernier (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

009694598.pdf

  • 1. CIS 203 17 : Network Management
  • 2. Introduction • Network, associated resources and distributed applications indispensable • Complex systems —More things can go wrong • Requires automated network management tools • Need comprehensive data gathering and control tools • SNMP
  • 3. Elements of Network Management • Fault • Accounting • Configuration • Performance • Security
  • 4. Fault Management Overview • When fault occurs —Determine where —Isolate rest of network so it can continue to function —Reconfigure or modify network to minimize impact of operation without failed components —Repair or replace failed components • Fault is abnormal condition that requires action to repair —Errors (e.g. single bit error on line) occur and are not faults
  • 5. Fault Management User Requirements • Fast and reliable problem resolution • Immediate notification • Impact and duration minimized by redundant components and routes — Fault tolerance • Fault management capability should be redundant • After correction, fault management must ensure problem is truly resolved and no new problems introduced — Problem tracking and control • Minimal effect on network performance
  • 6. Accounting Management Overview • Individual cost centers or projects charged for use of network services • Network manager needs to be able to track use of network —User or group may be abusing access —Users may be making inefficient use of network —Need to plan for network growth
  • 7. Accounting Management User Requirements • Needs to specify sort of accounting information recorded at various nodes —Interval between successive sendings of information —Algorithms used in calculating charges —Accounting reports under network manager control • Verify users' authorization to access and manipulate accounting information
  • 8. Configuration and Name Management Overview • Choose appropriate software and attributes and values (e.g., a transport layer retransmission timer) for device depending on function(s) • Initializing network and gracefully shutting down • Maintaining, adding, and updating relationships among components • Status of components during network operation
  • 9. Configuration and Name Management User Requirements • Startup and shutdown • Unattended • Need to identify components of network and connectivity • Define and modify default attributes • Load predefined attributes • Change connectivity • Reconfiguration • Status information and notification of changes • Routine or request driven reports • Authorized users (operators) only to manage and control operation (e.g., software distribution and updating)
  • 10. Performance Management Overview • Monitoring —Tracks activities —What is the level of capacity utilization? —Is there excessive traffic? —Has throughput been reduced to unacceptable levels? —Are there bottlenecks? —Is response time increasing? • Controlling —Make adjustments to improve performance • Identify resources to be monitored —Metrics and values for resources
  • 11. Performance Management User Requirements • Must be known in sufficient detail to assess user queries —Applications need consistently good response time • Performance statistics help planning, management and maintenance —Recognize potential bottlenecks before they cause problems —Capacity planning based on performance information
  • 12. Security Management Overview • Generating, distributing, and storing encryption keys • Passwords and access control information maintained and distributed • Monitoring and controlling access • Logging —Collection, storage, and examination of audit records and security logs
  • 13. Security Management User Requirements • Facilities available for authorized users only • Users want to know proper security in force and effective • Management of security facilities is secure
  • 14. Network Management Systems • Collection of tools for network management • Single operator interface • Powerful, user friendly command set • Performing most or all management tasks • Minimal amount of separate equipment —i.e. use existing equipment • View entire network as unified architecture • Active elements provide regular feedback
  • 15. Key Elements • Management station or manager • Agent • Management information base • Network management protocol
  • 16. Figure 17.1 Elements of a Network Management System
  • 17. Management Station • Stand alone system or part of shared system • Interface for human network manager • Set of management applications —Data analysis —Fault recovery • Interface to monitor and control network • Translate manager’s requirements into monitoring and control of remote elements • Data base of network management information extracted from managed entities
  • 18. Management Agent • Hosts, bridges, hubs, routers equipped with agent software • Allow them to be managed from management station • Respond to requests for information • Respond to requests for action • Asynchronously supply unsolicited information
  • 19. Management Information Base • MIB • Representation of network resources as objects • Each object a variable representing one aspect of managed object • MIB is collection of access points at agent for management of station • Objects standardized across class of system —Bridge, router etc.
  • 20. Network Management Protocol • Link between management station and agent • TCP/IP uses SNMP • OSI uses Common Management Information Protocol (CMIP) • SNMPv2 (enhanced SNMP) for OSI and TCP/IP
  • 22. Management Layout • May be centralized in simple network • May be distributed in large, complex network —Multiple management servers —Each manages pool of agents —Management may be delegated to intermediate manager
  • 23. Figure 17.2 Example Distributed Network Management Configuration
  • 24. Network Management Protocol Architecture • Application-level protocol • Part of TCP/IP protocol suite • Runs over UDP • From management station, three types of SNMP messages issued — GetRequest, GetNextRequest, and SetRequest — Port 161 • Agent replies with GetResponse • Agent may issue trap message in response to event that affects MIB and underlying managed — Port 162
  • 25. SNMP v1 • August 1988 SNMP specification issued • Stand alone management stations and bridges, routers workstations etc supplied with agents • Defines limited, easily implemented MIB of scalar variables and two dimensional tables • Streamlined protocol • Limited functionality • Lack of security • SNMP v2 1993, revised 1996 —RFC 1901-1908
  • 27. Figure 17.4 The Role of SNMPv1
  • 28. SNMP v2 (1) • Framework on which network management applications can be built —e.g fault management, performance monitoring, accounting • Protocol used to exchange management information • Each player maintains local MIB —Structure defined in standard • At least one system responsible for management —Houses management applications
  • 29. SNPM v2 (2) • Support central or distributed management • In distributes system, some elements operate as manager and agent • Exchanges use SNMP v2 protocol —Simple request/response protocol —Typically uses UDP • Ongoing reliable connection not required • Reduces management overhead
  • 30. Figure 17.5 SNMPv2 Managed Configuration
  • 31. Structure of Management Information • SMI • Defines general framework with which MIB defined and constructed • Identifies data types • How resources are represented and named • Encourages simplicity and extensibility • Scalars and two dimensional arrays of scalars (tables) only
  • 32. Protocol Operation • Exchange of messages • Outer message header deals with security • Seven types of PDU
  • 33. SNMP v3 • Addresses security issues of SNMP v1/2 • RFC 2570-2575 • Proposed standard January 1998 • Defines overall architecture and security capability • To be used with SNMP v2
  • 34. SNMP v3 Services • Authentication — Part of User-Based Security (UBS) — Assures that message: • Came from identified source • Has not been altered • Has not been delayed or replayed • Privacy — Encrypted messages using DES • Access control — Can configure agents to provide a number of levels of access to MIB — Access to information — Limit operations
  • 35. Required Reading • Stallings chapter 17 • Loads of web sites on SNMP