SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Introduction To
Network Management Protocols
SNMP & TR-069
William.L
wiliwe@gmail.com
2006-01-09
Index
1 SUMMARY ................................................................................................................................1
1.1 GENERAL DESCRIPTION ........................................................................................................1
2 WHAT IS NETWORK MANAGEMENT...............................................................................2
2.1 CONFIGURATION MANAGEMENT...........................................................................................2
2.2 PERFORMANCE MANAGEMENT .............................................................................................2
2.3 ACCOUNTING MANAGEMENT................................................................................................2
2.4 FAULT MANAGEMENT ...........................................................................................................3
2.5 SECURITY MANAGEMENT .....................................................................................................3
2.6 THE ARCHITECTURE OF NETWORK MANAGEMENT ...............................................................3
3 SIMPLE NETWORK MANAGEMENT PROTOCOL.........................................................6
4 CPE WAN MANAGEMENT PROTOCOL (TR-069)............................................................7
4.1 AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...........................................7
4.2 SOFTWARE/FIRMWARE IMAGE MANAGEMENT ......................................................................7
4.3 STATUS AND PERFORMANCE MONITORING............................................................................7
4.4 DIAGNOSTICS........................................................................................................................7
4.5 PROTOCOL COMPONENTS......................................................................................................8
5 TERMINOLOGY .................................................................................................................... 11
5.1 B-NT : BROADBAND NETWORK TERMINATION ...................................................................11
5.2 CPE : CUSTOMER PREMISE EQUIPMENT..............................................................................11
5.3 ACS : AUTO-CONFIGURATION SERVER ...............................................................................11
5.4 DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER ............................................11
5.5 BRAS : BROADBAND REMOTE ACCESS SERVER .................................................................11
5.6 PARAMETER ........................................................................................................................11
5.7 IETF : INTERNET ENGINEERING TASK FORCE .....................................................................11
5.8 RPC : REMOTE PROCEDURE CALL ......................................................................................11
5.9 SOAP : SIMPLE OBJECT ACCESS PROTOCOL .......................................................................11
5.10 BER : BASIC ENCODING RULE............................................................................................12
6 REFERENCE...........................................................................................................................13
APPENDIX A. COMPARISON BETWEEN SNMP&CWMP....................................................14
APPENDIX B. EXPLANATION OF SOAP MESSAGE..............................................................15
APPENDIX C. INFORM MESSAGE ETHEREAL PCAP .........................................................17
1
1 Summary
1.1 General Description
Network management function is one of the most important functions, because it let the manager could
monitor the remote device in the distance. Simple Network Management Protocol [9], SNMP, is one of popular
network management methods. SNMP is referred to as "simple" because the agent requires minimal software.
After the SNMP, the new generation network management protocol, CPE WAN Management Protocol, was
developed. Many telecom and service providers are making TR-069 support a requirement for all new CPE
purchases and proposals, so we will introduce this new management protocol.
2
2 What is Network Management
In general, network management is a service that employs a variety of tools, applications, and devices to assist
human network managers in monitoring and maintaining networks. The network management has five main
functions:
2.1 Configuration Management
To monitor network and system configuration information so that the effects on network operation of various
versions of hardware and software elements can be tracked and managed.
Each network device has a variety of version information associated with it.
Configuration management subsystems store this information in a database for easy access. When a problem
occurs, this database can be searched for clues that may help solve the problem.
2.2 Performance Management
To measure and make available various aspects of network performance so that internet work performance
can be maintained at an acceptable level. Examples of performance variables that might be provided include
network throughput, user response times, and line utilization.
Performance management involves three main steps. First, performance data is gathered on variables of
interest to network administrators. Second, the data is analyzed to determine normal (baseline)
levels. Finally, appropriate performance thresholds are determined for each important variable so
that exceeding these thresholds indicates a network problem worthy of attention.
Management entities continually monitor performance variables. When a performance threshold is exceeded,
an alert is generated and sent to the network management system.
Each of the steps just described is part of the process to set up a reactive system. When performance becomes
unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message.
Performance management also permits proactive methods: For example, network simulation can be used to
project how network growth will affect performance metrics. Such simulation can alert administrators to
impending problems so that counteractive measures can be taken.
2.3 Accounting Management
To measure network utilization parameters so that individual or group uses on the network can be regulated
appropriately. Such regulation minimizes network problems (because network resources can be apportioned
based on resource capacities) and maximizes the fairness of network access across all users.
As with performance management, the first step toward appropriate accounting management is to measure
utilization of all important network resources. Analysis of the results provides insight into current
usage patterns, and usage quotas can be set at this point. Some correction, of course, will be required to
reach optimal access practices. From this point, ongoing measurement of resource use can yield billing
information as well as information used to assess continued fair and optimal resource utilization.
3
2.4 Fault Management
To detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the
network running effectively. Because faults can cause downtime or unacceptable network degradation, fault
management is perhaps the most widely implemented of the ISO network management elements.
Fault management involves first determining symptoms and isolating the problem. Then the problem is fixed
and the solution is tested on all-important subsystems. Finally, the detection and resolution of the problem is
recorded.
2.5 Security Management
To control access to network resources according to local guidelines so that the network cannot be sabotaged
(intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate
authorization. A security management subsystem, for example, can monitor users logging on to a network
resource and can refuse access to those who enter inappropriate access codes.
Security management subsystems work by partitioning network resources into authorized and unauthorized
areas. For some users, access to any network resource is inappropriate, mostly because such users are usually
company outsiders. For other (internal) network users, access to information originating from a particular
department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users
outside the Human Resources department.
Security management subsystems perform several functions. They identify sensitive network resources
(including systems, files, and other entities) and determine mappings between sensitive network resources
and user sets. They also monitor access points to sensitive network resources and log inappropriate access to
sensitive network resources.
2.6 The Architecture of Network Management
Figure 1 is the architecture of the network management. The network management system manages device
by sending commands to or receiving reports from the agent (a program) in the devices.
The agent is responsible for executing the NMS’s commands and reporting the status of the device it locates in.
4
Figure 1
Figure 2 is an GUI network management system
Figure 2
Managing
Server
Managed
Devices
5
Table 1 is the summary of the functions of the network management :
Goal
Performance
Management
Measure and make available various aspects of network performance so that
internetwork performance can be maintained at an acceptable level
Configuration
Management
Monitor network and system configuration information so that the effects on
network operation of various versions of hardware and software elements can
be tracked and managed.
Accounting
Management
Measure network utilization parameters so that individual or group uses on the
network can be regulated appropriately.
Fault
Management
Detect, log, notify users of, and automatically fix network problems to keep the
network running effectively.
Security
Management
Control access to network resources according to local guidelines so that the
network cannot be sabotaged and so that sensitive information cannot be
accessed by those without appropriate authorization.
Table 1
6
3 Simple Network Management Protocol
SNMP is a protocol that allows for remote and local management of items on the network including servers,
workstations, routers, switches and other managed devices.
Unlike traditional network management methods having complicated commands, SNMP has only few simple
commands for get/set configuration and status.
Figure 3 shows the SNMP management architecture :
Figure 3
Request
Response
Trap
Agent Process
TCP/IP MIB-II
TCP/IP
SNMP Manager
NMS AgentCommand
Server Device
7
4 CPE WAN Management Protocol (TR-069)
The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a
CPE, and also incorporates other CPE management functions into a common framework. This protocol is
specified by DSL forum to be Technical Report - 069, TR-069 [8].
It provides the following main capabilities :
4.1 Auto-Configuration and Dynamic Service Provisioning
The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of criteria. The
provisioning mechanism includes specific provisioning parameters and a general mechanism for adding
vendor-specific provisioning capabilities as needed.
4.2 Software/Firmware Image Management
The CPE WAN Management Protocol provides tools to manage downloading of CPE software/firmware
image files. The protocol provides mechanisms for version identification, file download initiation (ACS
initiated downloads and optional CPE initiated downloads), and notification of the ACS of the success or
failure of a file download.
4.3 Status and Performance Monitoring
The protocol provides support for a CPE to make available information that the ACS may use to monitor
the CPE’s status and performance statistics. The protocol defines a common set of such parameters, and
provides a standard syntax for vendors to define additional non-standard
4.4 Diagnostics
The protocol provides support for a CPE to make available information that the ACS may use to diagnose
connectivity or service issues. The protocol defines a common set of such parameters and a general
mechanism for adding vendor-specific diagnostic capabilities.
8
Figure 4 shows the CPE WAN Management Protocol configuration architecture :
Figure 4
4.5 Protocol Components
The CPE WAN Management Protocol comprises several components that are unique to this
protocol and makes use of several standard protocols. Figure 5 shows the protocol stack defined by CPE WAN
Management Protocol.
Figure 5
CPE/ACS Management Application
RPC Methods
SOAP
HTTP
SSL/TLS
TCP/IP
(may haveDHCP)
Internet, ISP network,
Frame Relay…
(TR-069)
TR-104
LAN
WAN
9
Figure 6 shows the descriptions for the above, each protocol in the protocol stack :
Figur
e 6
Protocol
Layer
Description
CPE/ACS
Application
The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The
application is locally defined and not specified as part of the CPE WAN Management Protocol
RPC
Methods
The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69)
SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically
SOAP 1.1 [5]
HTTP HTTP 1.1 [3]
SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [6] (Secure Socket
Layer), or TLS 1.0 [7] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not required
TCP/IP Standard TCP/IP
10
Figure 7 shows the managing message of the CPE WAN Management Protocol .
Figure 7
POST /dps/TR069 HTTP/1.1
Host: demo.dimark.com:8888
User-Agent: TR69_CPE-1.0
Connection: keep-alive
SOAPAction:
Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF
Content-Type: text/xml
Content-Length: 1361
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:cwmp="urn:dslforum-org:cwmp-1-0"
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope">
<SOAP-ENV:Header>
<cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID>
</SOAP-ENV:Header>
<SOAP-ENV:Body>
<cwmp:GetParameterNamesResponse>
<ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]">
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
</ParameterList>
</cwmp:GetParameterNamesResponse>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
HTTP message
11
5 Terminology
In this section, it lists all abbreviations used in this document.
5.1 B-NT : Broadband Network Termination
5.2 CPE : Customer Premise Equipment
A DSL B-NT is one of form of broadband CPE. This could be ADSL modem.
5.3 ACS : Auto-Configuration Server
This is a device in the broadband network responsible for auto-configuration of the CPE for advanced
services.
5.4 DSLAM : Digital Subscriber Line Access Multiplexer
The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes
connections from many customers and aggregates them onto a single, high-capacity connection to the
Internet. It may provide additional functions including routing or dynamic IP address assignment
for the customers.
5.5 BRAS : Broadband Remote Access Server
This is the connection point to the network(Internet, WAN) and application service providers(ISP,
Corporate Network…etc)
5.6 Parameter
A name-value pair representing a manageable CPE parameter made accessible to an ACS for reading
and/or writing.
5.7 IETF : Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a large open international community of network designers,
operators, vendors, and researchers concerned with the evolution of the Internet architecture and the
smooth operation of the Internet. It is open to any interested individual.
5.8 RPC : Remote Procedure Call
An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling
arguments(parameters) are passed to the remote procedure and the caller waits for a response to be
returned from the remote procedure.
5.9 SOAP : Simple Object Access Protocol
SOAP provides a simple and lightweight mechanism for exchanging structured and typed information
between peers in a decentralized, distributed environment using XML.
12
5.10 BER : Basic Encoding Rule
This is ASN.1 encoding rules for producing self-identifying and self-delimiting transfer syntax for data
structures described in ASN.1 notations.
BER is a self-identifying and self-delimiting encoding scheme, which means that each data element can
be identified, extracted and decoded individually.
Each data element is encoded as a type identifier, a length description, the actual data elements, and
where necessary, an end-of-content marker. These types of encodings are commonly called
type-length-value or TLV encodings.
13
6 Reference
1. IETF, http://www.ietf.org/
2. DSL Forum, http://www.dslforum.org
3. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt
4. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication,
http://www.ietf.org/rfc/rfc2617.txt
5. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508
6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt
7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt
8. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May
2004.
9. Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1067.html
10. Abstract Syntax Notation (ASN.1), http://asn1.elibel.tm.fr/en/
14
Appendix A. Comparison between SNMP&CWMP
This section provides the different between SNMP and CWMP :
SNMP CWMP
Support
Organization
IETF (The Internet Engineering
Task Force) [1]
DSL Forum [2]
Protocol
Layer
Application Layer
Transport
Protocol
UDP TCP
Well-Known
Port
UDP Port 161 - SNMP Messages
UDP Port 162 - SNMP Trap
Messages
NON ( HTTPS : 443 )
Encoding
ASN.1 [10] / BER (Basic Encoding
Rule)
XML / SOAP
Security
SNMP V2 --- Community Name
SNNP V3 --- SNMP V2 and Security
for Messages, Access
Control
HTTP Authentication (Basic/Digest) [4]
SSL/TLS
Managed
Objects
MIB (Management Information Base) Parameters
Number of
protocol
defined
managed
objects
Few Many
Identifying
managed
object
object ID (OID) parameter’s name
How to know
managed
objects
pre-defined Dynamic
Active
Contacting
Network Management System (the
system knows the addresses of
managed CPEs)
CPE (CPE knows the address of the
management system)
Contacting
Persistency
Could be hold until the CPE
shutdown / reboot / exception
Having no other request in both end,
terminating the connection.
Table 2
15
Appendix B. Explanation of SOAP message
Figure 8
POST /dps/TR069 HTTP/1.1
Host: demo.dimark.com:8888
User-Agent: TR69_CPE-1.0
Connection: keep-alive
SOAPAction:
Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF
Content-Type: text/xml
Content-Length: 1361
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:cwmp="urn:dslforum-org:cwmp-1-0"
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope">
<SOAP-ENV:Header>
<cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID>
</SOAP-ENV:Header>
<SOAP-ENV:Body>
<cwmp:GetParameterNamesResponse>
<ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]">
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.LANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
<ParameterInfoStruct>
<Name>InternetGatewayDevice.WANDevice.</Name>
<Writable>0</Writable>
</ParameterInfoStruct>
</ParameterList>
</cwmp:GetParameterNamesResponse>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
HTTP
headers
SOAP
RPC
elements of the
arrary of structure
type
RPC’s
parameter
name
The arrary
of structure
type
16
The C language form of the above SOAP RPC message is as the following (the meanings of the colors of the
font are the same as the ones of the above SOAP message):
/* Extern function prototype declaration */
extern GetParameterNamesResponse ( ParameterInfoStruct ParameterList[] );
/* Declare the structure data type */
struct ParameterInfoStruct
{
char Name[256+1]; /* Maximum length of the string */
bool Writable;
};
struct ParameterInfoStruct ParameterList[4]; /* Declaring the variable of structure data type */
/* Filling the value of the fields */
strcpy( ParameterList[0].Name, “InternetGatewayDevice.LANDeviceNumberOfEntries” );
ParameterList[0].Writable = 0;
strcpy( ParameterList[1].Name, “InternetGatewayDevice.WANDeviceNumberOfEntries” );
ParameterList[1].Writable = 0;
strcpy( ParameterList[2].Name, “InternetGatewayDevice.LANDevice.” );
ParameterList[2].Writable = 0;
strcpy( ParameterList[3].Name, “InternetGatewayDevice.WANDevice.” );
ParameterList[3].Writable = 0;
/* Calling the RPC */
GetParameterNamesResponse ( ParameterList );
17
Appendix C. Inform message Ethereal PCAP
Captured on 2005-12-26
18
19
20

Contenu connexe

Tendances

Bsi iso27001-mapping-guide
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guidefloora_jj
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Stratos Lazaridis
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...iFour Consultancy
 
BSI Training Certificate
BSI Training CertificateBSI Training Certificate
BSI Training CertificateErik Milton L
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementSorath Asnani
 
Pertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery planPertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery plannewbie2019
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
List of movement types with descriptions
List of movement types with descriptionsList of movement types with descriptions
List of movement types with descriptionsSoumya De
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
ISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistIvan Piskunov
 
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013Bachir Benyammi
 

Tendances (20)

Bsi iso27001-mapping-guide
Bsi iso27001-mapping-guideBsi iso27001-mapping-guide
Bsi iso27001-mapping-guide
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
Material master data in sap mm
Material master data in sap mmMaterial master data in sap mm
Material master data in sap mm
 
Sap pm-tables
Sap pm-tablesSap pm-tables
Sap pm-tables
 
BSI Training Certificate
BSI Training CertificateBSI Training Certificate
BSI Training Certificate
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
SAP workflow events
SAP workflow eventsSAP workflow events
SAP workflow events
 
Pertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery planPertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery plan
 
Master data in mm
Master data in mm Master data in mm
Master data in mm
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
List of movement types with descriptions
List of movement types with descriptionsList of movement types with descriptions
List of movement types with descriptions
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Mm module sap
Mm module sapMm module sap
Mm module sap
 
ISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistISO 27001 (v2013) Checklist
ISO 27001 (v2013) Checklist
 
Internship report
Internship report Internship report
Internship report
 
BPD Design Template
BPD Design TemplateBPD Design Template
BPD Design Template
 
Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013Déclaration d'applicabilité (DdA) - ISO27002:2013
Déclaration d'applicabilité (DdA) - ISO27002:2013
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 

En vedette

Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Axiros
 
More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)William Lee
 
CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)William Lee
 
TDD in C - Recently Used List Kata
TDD in C - Recently Used List KataTDD in C - Recently Used List Kata
TDD in C - Recently Used List KataOlve Maudal
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 William Lee
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHPWilliam Lee
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Axiros
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUnidesk Corporation
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3William Lee
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxWilliam Lee
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)William Lee
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataAlket Cecaj
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcationNir Cohen
 
Hello world在那邊?背景說明
Hello world在那邊?背景說明Hello world在那邊?背景說明
Hello world在那邊?背景說明Wen Liao
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationWilliam Lee
 

En vedette (20)

Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
 
More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)
 
Tr 069
Tr 069Tr 069
Tr 069
 
CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)CWMP TR-069 Training (Chinese)
CWMP TR-069 Training (Chinese)
 
TDD in C - Recently Used List Kata
TDD in C - Recently Used List KataTDD in C - Recently Used List Kata
TDD in C - Recently Used List Kata
 
Deep C
Deep CDeep C
Deep C
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHP
 
Tr 069
Tr 069Tr 069
Tr 069
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on Linux
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)
 
Re-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk DataRe-identification of Anomized CDR datasets using Social networlk Data
Re-identification of Anomized CDR datasets using Social networlk Data
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
 
Hello world在那邊?背景說明
Hello world在那邊?背景說明Hello world在那邊?背景說明
Hello world在那邊?背景說明
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log Rotation
 

Similaire à Introdunction to Network Management Protocols - SNMP & TR-069

Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdfidrissaeed
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network managementFlightcase1
 
Network management
Network managementNetwork management
Network managementElena Benson
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 

Similaire à Introdunction to Network Management Protocols - SNMP & TR-069 (20)

Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
Network management
Network managementNetwork management
Network management
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 

Plus de William Lee

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesWilliam Lee
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)William Lee
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerWilliam Lee
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCapWilliam Lee
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding WindowWilliam Lee
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserWilliam Lee
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserWilliam Lee
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASPWilliam Lee
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginWilliam Lee
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5William Lee
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)William Lee
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web PageWilliam Lee
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 UsageWilliam Lee
 
Android Storage - StorageManager & OBB
Android Storage - StorageManager & OBBAndroid Storage - StorageManager & OBB
Android Storage - StorageManager & OBBWilliam Lee
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OSWilliam Lee
 
GNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeGNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeWilliam Lee
 
Qt Development Tools
Qt Development ToolsQt Development Tools
Qt Development ToolsWilliam Lee
 
Android Storage - Vold
Android Storage - VoldAndroid Storage - Vold
Android Storage - VoldWilliam Lee
 

Plus de William Lee (20)

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP Languages
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency Walker
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCap
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding Window
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App Chooser
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon Chooser
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASP
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) Plugin
 
MGCP Overview
MGCP OverviewMGCP Overview
MGCP Overview
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web Page
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 Usage
 
Android Storage - StorageManager & OBB
Android Storage - StorageManager & OBBAndroid Storage - StorageManager & OBB
Android Storage - StorageManager & OBB
 
Study of Chromium OS
Study of Chromium OSStudy of Chromium OS
Study of Chromium OS
 
GNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in GnomeGNOME GeoClue - The Geolocation Service in Gnome
GNOME GeoClue - The Geolocation Service in Gnome
 
Qt Development Tools
Qt Development ToolsQt Development Tools
Qt Development Tools
 
Qt Animation
Qt AnimationQt Animation
Qt Animation
 
Android Storage - Vold
Android Storage - VoldAndroid Storage - Vold
Android Storage - Vold
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Introdunction to Network Management Protocols - SNMP & TR-069

  • 1. Introduction To Network Management Protocols SNMP & TR-069 William.L wiliwe@gmail.com 2006-01-09
  • 2. Index 1 SUMMARY ................................................................................................................................1 1.1 GENERAL DESCRIPTION ........................................................................................................1 2 WHAT IS NETWORK MANAGEMENT...............................................................................2 2.1 CONFIGURATION MANAGEMENT...........................................................................................2 2.2 PERFORMANCE MANAGEMENT .............................................................................................2 2.3 ACCOUNTING MANAGEMENT................................................................................................2 2.4 FAULT MANAGEMENT ...........................................................................................................3 2.5 SECURITY MANAGEMENT .....................................................................................................3 2.6 THE ARCHITECTURE OF NETWORK MANAGEMENT ...............................................................3 3 SIMPLE NETWORK MANAGEMENT PROTOCOL.........................................................6 4 CPE WAN MANAGEMENT PROTOCOL (TR-069)............................................................7 4.1 AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...........................................7 4.2 SOFTWARE/FIRMWARE IMAGE MANAGEMENT ......................................................................7 4.3 STATUS AND PERFORMANCE MONITORING............................................................................7 4.4 DIAGNOSTICS........................................................................................................................7 4.5 PROTOCOL COMPONENTS......................................................................................................8 5 TERMINOLOGY .................................................................................................................... 11 5.1 B-NT : BROADBAND NETWORK TERMINATION ...................................................................11 5.2 CPE : CUSTOMER PREMISE EQUIPMENT..............................................................................11 5.3 ACS : AUTO-CONFIGURATION SERVER ...............................................................................11 5.4 DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER ............................................11 5.5 BRAS : BROADBAND REMOTE ACCESS SERVER .................................................................11 5.6 PARAMETER ........................................................................................................................11 5.7 IETF : INTERNET ENGINEERING TASK FORCE .....................................................................11 5.8 RPC : REMOTE PROCEDURE CALL ......................................................................................11 5.9 SOAP : SIMPLE OBJECT ACCESS PROTOCOL .......................................................................11 5.10 BER : BASIC ENCODING RULE............................................................................................12 6 REFERENCE...........................................................................................................................13 APPENDIX A. COMPARISON BETWEEN SNMP&CWMP....................................................14 APPENDIX B. EXPLANATION OF SOAP MESSAGE..............................................................15 APPENDIX C. INFORM MESSAGE ETHEREAL PCAP .........................................................17
  • 3. 1 1 Summary 1.1 General Description Network management function is one of the most important functions, because it let the manager could monitor the remote device in the distance. Simple Network Management Protocol [9], SNMP, is one of popular network management methods. SNMP is referred to as "simple" because the agent requires minimal software. After the SNMP, the new generation network management protocol, CPE WAN Management Protocol, was developed. Many telecom and service providers are making TR-069 support a requirement for all new CPE purchases and proposals, so we will introduce this new management protocol.
  • 4. 2 2 What is Network Management In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks. The network management has five main functions: 2.1 Configuration Management To monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. Each network device has a variety of version information associated with it. Configuration management subsystems store this information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem. 2.2 Performance Management To measure and make available various aspects of network performance so that internet work performance can be maintained at an acceptable level. Examples of performance variables that might be provided include network throughput, user response times, and line utilization. Performance management involves three main steps. First, performance data is gathered on variables of interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels. Finally, appropriate performance thresholds are determined for each important variable so that exceeding these thresholds indicates a network problem worthy of attention. Management entities continually monitor performance variables. When a performance threshold is exceeded, an alert is generated and sent to the network management system. Each of the steps just described is part of the process to set up a reactive system. When performance becomes unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message. Performance management also permits proactive methods: For example, network simulation can be used to project how network growth will affect performance metrics. Such simulation can alert administrators to impending problems so that counteractive measures can be taken. 2.3 Accounting Management To measure network utilization parameters so that individual or group uses on the network can be regulated appropriately. Such regulation minimizes network problems (because network resources can be apportioned based on resource capacities) and maximizes the fairness of network access across all users. As with performance management, the first step toward appropriate accounting management is to measure utilization of all important network resources. Analysis of the results provides insight into current usage patterns, and usage quotas can be set at this point. Some correction, of course, will be required to reach optimal access practices. From this point, ongoing measurement of resource use can yield billing information as well as information used to assess continued fair and optimal resource utilization.
  • 5. 3 2.4 Fault Management To detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively. Because faults can cause downtime or unacceptable network degradation, fault management is perhaps the most widely implemented of the ISO network management elements. Fault management involves first determining symptoms and isolating the problem. Then the problem is fixed and the solution is tested on all-important subsystems. Finally, the detection and resolution of the problem is recorded. 2.5 Security Management To control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate authorization. A security management subsystem, for example, can monitor users logging on to a network resource and can refuse access to those who enter inappropriate access codes. Security management subsystems work by partitioning network resources into authorized and unauthorized areas. For some users, access to any network resource is inappropriate, mostly because such users are usually company outsiders. For other (internal) network users, access to information originating from a particular department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users outside the Human Resources department. Security management subsystems perform several functions. They identify sensitive network resources (including systems, files, and other entities) and determine mappings between sensitive network resources and user sets. They also monitor access points to sensitive network resources and log inappropriate access to sensitive network resources. 2.6 The Architecture of Network Management Figure 1 is the architecture of the network management. The network management system manages device by sending commands to or receiving reports from the agent (a program) in the devices. The agent is responsible for executing the NMS’s commands and reporting the status of the device it locates in.
  • 6. 4 Figure 1 Figure 2 is an GUI network management system Figure 2 Managing Server Managed Devices
  • 7. 5 Table 1 is the summary of the functions of the network management : Goal Performance Management Measure and make available various aspects of network performance so that internetwork performance can be maintained at an acceptable level Configuration Management Monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. Accounting Management Measure network utilization parameters so that individual or group uses on the network can be regulated appropriately. Fault Management Detect, log, notify users of, and automatically fix network problems to keep the network running effectively. Security Management Control access to network resources according to local guidelines so that the network cannot be sabotaged and so that sensitive information cannot be accessed by those without appropriate authorization. Table 1
  • 8. 6 3 Simple Network Management Protocol SNMP is a protocol that allows for remote and local management of items on the network including servers, workstations, routers, switches and other managed devices. Unlike traditional network management methods having complicated commands, SNMP has only few simple commands for get/set configuration and status. Figure 3 shows the SNMP management architecture : Figure 3 Request Response Trap Agent Process TCP/IP MIB-II TCP/IP SNMP Manager NMS AgentCommand Server Device
  • 9. 7 4 CPE WAN Management Protocol (TR-069) The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a CPE, and also incorporates other CPE management functions into a common framework. This protocol is specified by DSL forum to be Technical Report - 069, TR-069 [8]. It provides the following main capabilities : 4.1 Auto-Configuration and Dynamic Service Provisioning The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of criteria. The provisioning mechanism includes specific provisioning parameters and a general mechanism for adding vendor-specific provisioning capabilities as needed. 4.2 Software/Firmware Image Management The CPE WAN Management Protocol provides tools to manage downloading of CPE software/firmware image files. The protocol provides mechanisms for version identification, file download initiation (ACS initiated downloads and optional CPE initiated downloads), and notification of the ACS of the success or failure of a file download. 4.3 Status and Performance Monitoring The protocol provides support for a CPE to make available information that the ACS may use to monitor the CPE’s status and performance statistics. The protocol defines a common set of such parameters, and provides a standard syntax for vendors to define additional non-standard 4.4 Diagnostics The protocol provides support for a CPE to make available information that the ACS may use to diagnose connectivity or service issues. The protocol defines a common set of such parameters and a general mechanism for adding vendor-specific diagnostic capabilities.
  • 10. 8 Figure 4 shows the CPE WAN Management Protocol configuration architecture : Figure 4 4.5 Protocol Components The CPE WAN Management Protocol comprises several components that are unique to this protocol and makes use of several standard protocols. Figure 5 shows the protocol stack defined by CPE WAN Management Protocol. Figure 5 CPE/ACS Management Application RPC Methods SOAP HTTP SSL/TLS TCP/IP (may haveDHCP) Internet, ISP network, Frame Relay… (TR-069) TR-104 LAN WAN
  • 11. 9 Figure 6 shows the descriptions for the above, each protocol in the protocol stack : Figur e 6 Protocol Layer Description CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The application is locally defined and not specified as part of the CPE WAN Management Protocol RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69) SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically SOAP 1.1 [5] HTTP HTTP 1.1 [3] SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [6] (Secure Socket Layer), or TLS 1.0 [7] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not required TCP/IP Standard TCP/IP
  • 12. 10 Figure 7 shows the managing message of the CPE WAN Management Protocol . Figure 7 POST /dps/TR069 HTTP/1.1 Host: demo.dimark.com:8888 User-Agent: TR69_CPE-1.0 Connection: keep-alive SOAPAction: Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF Content-Type: text/xml Content-Length: 1361 <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cwmp="urn:dslforum-org:cwmp-1-0" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope"> <SOAP-ENV:Header> <cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID> </SOAP-ENV:Header> <SOAP-ENV:Body> <cwmp:GetParameterNamesResponse> <ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]"> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> </ParameterList> </cwmp:GetParameterNamesResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope> HTTP message
  • 13. 11 5 Terminology In this section, it lists all abbreviations used in this document. 5.1 B-NT : Broadband Network Termination 5.2 CPE : Customer Premise Equipment A DSL B-NT is one of form of broadband CPE. This could be ADSL modem. 5.3 ACS : Auto-Configuration Server This is a device in the broadband network responsible for auto-configuration of the CPE for advanced services. 5.4 DSLAM : Digital Subscriber Line Access Multiplexer The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet. It may provide additional functions including routing or dynamic IP address assignment for the customers. 5.5 BRAS : Broadband Remote Access Server This is the connection point to the network(Internet, WAN) and application service providers(ISP, Corporate Network…etc) 5.6 Parameter A name-value pair representing a manageable CPE parameter made accessible to an ACS for reading and/or writing. 5.7 IETF : Internet Engineering Task Force The Internet Engineering Task Force (IETF) is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual. 5.8 RPC : Remote Procedure Call An RPC is analogous to a function call. Like a function call, when an RPC is made, the calling arguments(parameters) are passed to the remote procedure and the caller waits for a response to be returned from the remote procedure. 5.9 SOAP : Simple Object Access Protocol SOAP provides a simple and lightweight mechanism for exchanging structured and typed information between peers in a decentralized, distributed environment using XML.
  • 14. 12 5.10 BER : Basic Encoding Rule This is ASN.1 encoding rules for producing self-identifying and self-delimiting transfer syntax for data structures described in ASN.1 notations. BER is a self-identifying and self-delimiting encoding scheme, which means that each data element can be identified, extracted and decoded individually. Each data element is encoded as a type identifier, a length description, the actual data elements, and where necessary, an end-of-content marker. These types of encodings are commonly called type-length-value or TLV encodings.
  • 15. 13 6 Reference 1. IETF, http://www.ietf.org/ 2. DSL Forum, http://www.dslforum.org 3. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt 4. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication, http://www.ietf.org/rfc/rfc2617.txt 5. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508 6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt 7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt 8. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May 2004. 9. Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1067.html 10. Abstract Syntax Notation (ASN.1), http://asn1.elibel.tm.fr/en/
  • 16. 14 Appendix A. Comparison between SNMP&CWMP This section provides the different between SNMP and CWMP : SNMP CWMP Support Organization IETF (The Internet Engineering Task Force) [1] DSL Forum [2] Protocol Layer Application Layer Transport Protocol UDP TCP Well-Known Port UDP Port 161 - SNMP Messages UDP Port 162 - SNMP Trap Messages NON ( HTTPS : 443 ) Encoding ASN.1 [10] / BER (Basic Encoding Rule) XML / SOAP Security SNMP V2 --- Community Name SNNP V3 --- SNMP V2 and Security for Messages, Access Control HTTP Authentication (Basic/Digest) [4] SSL/TLS Managed Objects MIB (Management Information Base) Parameters Number of protocol defined managed objects Few Many Identifying managed object object ID (OID) parameter’s name How to know managed objects pre-defined Dynamic Active Contacting Network Management System (the system knows the addresses of managed CPEs) CPE (CPE knows the address of the management system) Contacting Persistency Could be hold until the CPE shutdown / reboot / exception Having no other request in both end, terminating the connection. Table 2
  • 17. 15 Appendix B. Explanation of SOAP message Figure 8 POST /dps/TR069 HTTP/1.1 Host: demo.dimark.com:8888 User-Agent: TR69_CPE-1.0 Connection: keep-alive SOAPAction: Cookie: JSESSIONID=9418E79390E6E98A036FE1A3A4F1EEEF Content-Type: text/xml Content-Length: 1361 <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cwmp="urn:dslforum-org:cwmp-1-0" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope"> <SOAP-ENV:Header> <cwmp:ID SOAP-ENV:mustUnderstand="1">263236</cwmp:ID> </SOAP-ENV:Header> <SOAP-ENV:Body> <cwmp:GetParameterNamesResponse> <ParameterList SOAP-ENC:arrayType="cwmp:ParameterInfoStruct[4]"> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDeviceNumberOfEntries</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.LANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> <ParameterInfoStruct> <Name>InternetGatewayDevice.WANDevice.</Name> <Writable>0</Writable> </ParameterInfoStruct> </ParameterList> </cwmp:GetParameterNamesResponse> </SOAP-ENV:Body> </SOAP-ENV:Envelope> HTTP headers SOAP RPC elements of the arrary of structure type RPC’s parameter name The arrary of structure type
  • 18. 16 The C language form of the above SOAP RPC message is as the following (the meanings of the colors of the font are the same as the ones of the above SOAP message): /* Extern function prototype declaration */ extern GetParameterNamesResponse ( ParameterInfoStruct ParameterList[] ); /* Declare the structure data type */ struct ParameterInfoStruct { char Name[256+1]; /* Maximum length of the string */ bool Writable; }; struct ParameterInfoStruct ParameterList[4]; /* Declaring the variable of structure data type */ /* Filling the value of the fields */ strcpy( ParameterList[0].Name, “InternetGatewayDevice.LANDeviceNumberOfEntries” ); ParameterList[0].Writable = 0; strcpy( ParameterList[1].Name, “InternetGatewayDevice.WANDeviceNumberOfEntries” ); ParameterList[1].Writable = 0; strcpy( ParameterList[2].Name, “InternetGatewayDevice.LANDevice.” ); ParameterList[2].Writable = 0; strcpy( ParameterList[3].Name, “InternetGatewayDevice.WANDevice.” ); ParameterList[3].Writable = 0; /* Calling the RPC */ GetParameterNamesResponse ( ParameterList );
  • 19. 17 Appendix C. Inform message Ethereal PCAP Captured on 2005-12-26
  • 20. 18
  • 21. 19
  • 22. 20