Temporal network management model Concepts and implementation issues

Size: px
Start display at page:

Download "Temporal network management model Concepts and implementation issues"

Transcription

1 COMCOM 1237 Computer Communications 20 (1997) Temporal network management model Concepts and implementation issues Theodore K. Apostolopoulos*, Victoria C. Daskalou Department of Informatics, Athens University of Economics and Business, 76 Patission Street, Athens, Greece Received 15 March 1996; accepted 2 August 1996 Abstract Networks grow in scale and become more complex and heterogeneous as well. A lot of research effort is focused on the topic of network management. This is because nowadays a network management system is a vital component of any network installation. In this paper, we propose an extended network management information model that includes the time dimension. This view leads us to adopt a temporal data model as the underlying information model. Moreover, the services provided by this model, as well as the architecture supporting them, are presented. In addition to that, we have implemented a prototype incorporating the proposed network management view. The description of the prototype is also presented in this paper Elsevier Science B.V. Keywords: Networks; Time dimension; Temporal data model 1. Introduction Computer and telecommunication networks are becoming one of the driving forces for the progress of economic and social life. These networks are not only growing in scale but are becoming more complex and heterogeneous as they support multivendor applications on a variety of underlying transmission facilities. Such expansion and complexity have induced growing challenges to efficiently manage the network elements according to the network providers and users objectives and expectations. As a result, a lot of research effort has gone in to solving problems arising in this area and establishing standards that could be used across a broad spectrum of product types (e.g. hosts, routers, bridges, switches, telecommunication equipment) in a multivendor environment. In response to the need for standards two main efforts are underway: one from the International Organization for Standardization (ISO), named OSI Systems Management, and another from the Internet Engineering Task Force (IETF), named Simple Network Management Protocol s (SNMP) family. The huge size and the high complexity of such networks dictate also the use of automated network management systems that could help the network engineer to efficiently manage the network elements. The general architecture of a * Corresponding author. Tel.: ; fax: ; thodoros@aueb.gr network management system (Fig. 1) is based on a client server architecture, where the server is called the agent, while the client is the managing process. Each network component has an agent which maintains a local management information base (MIB), and can communicate with the management application residing in the network management station through a network management protocol such as the SNMP [1] or CMIP protocols [2]. The MIB is a conceptual representation of the network resources that provides the network manager with the means to observe and control the current behaviour of network elements. The interaction between the management application and the management agents admits the retrieval and/or update of the MIB information in a way that enables the implementation of various network management functions, from monitoring the state of the network to changing the network configuration. Time is an attribute of most real world phenomena, and in this paper we address the issue of time as an attribute of network management information. More precisely, we incorporate the temporal dimension in the management information model proposed by the IETF, as it is described by SMI [3]. This new temporal network management information model was built upon a temporally ungrouped historical data model TRDM, as it has been named in [4] which was proposed in [5]. The core of the proposed management information model is the Temporal Management Information Base (TMIB), a conceptual representation /97/$ Elsevier Science B.V. All rights reserved PII S (97)

2 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) of the diachronic behaviour of network resources. The concept of a temporal network management information model has already been applied to the areas of performance and configuration management, as is described in earlier works [6,7]. The temporal network management model and the TMIB design are presented in detail in Section 2. The architecture of the network management application that implements the proposed model and the network management services are described in Section 3. In Section 4 we present the architecture and the main operations of the prototype we have implemented, while in Section 5 we summarise the main points of our approach and we discuss possible applications of the proposed model. 2. The temporal network management information model 2.1. The concepts Fig. 1. Network management architecture. Two different information models were defined in order to represent the network management information: one from the ISO [8] and another one from the IETF [3]. Both models are centred around the so-called managed objects, which represent an abstraction of network resources and form the management information base (MIB). The informational model of the ISO is fully object-oriented, with managed objects being instances of managed object classes. The IETF s model is less complex where managed objects can be classified in two types: scalar objects and table objects. The table objects are two-dimensional arrays of scalar objects and at a given time they consist of multiple row entries. The scalar objects are simple MIB variables which can have at most one instance at a given time. Managed objects that are defined, based on either of these two models, have to provide resources for all functional areas of network management. The requirements of the functional areas are quite different to a large extent and not yet well understood [9]. In order to specify the type of management information that is necessary for each of the five functional areas we proposed a generic management informational model (Fig. 2). This model tries to classify the management information contained in the MIB according to the following three criteria: 1. the intended use of the network management information 2. the frequency that management information variables change their values 3. the temporal dimension of the management information. The first criterion introduces a concept closely related to the type of functions included in a network management application in relation to the types of data that they need. According to this criterion, the management data can be classified into three types [10]: Sensor data: these data represent the current network Fig. 2. The proposed network management perspective.

3 696 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) health, in terms of its operational state. More precisely, they are the raw information received by the network monitoring and retrieval process. Control data: these data capture the current setting of the networks tuning parameters (for example, the routing table) that are used mostly by control applications. Structural data: these data describe the physical and logical construction of the network. That is, information related to the network topology, the configuration of network resources, the user description records, etc. By taking into consideration the second criterion we define a higher level abstraction of the management information, which adopts two broad classes of objects: Quasistatic objects, which describe the current network configuration (e.g. the number of host interfaces, the routing table, etc.); their values do not change very often. Dynamic objects, which are related to network events (e.g. the transmission of packets); their values change very often during time. The third criterion we have adopted is related to the time dimension of the management information required by different applications. For example, a network management application concerning real-time performance monitoring has radically different requirements, as far as the required data are concerned, from a network management application concerning the collection and usage of long-term statistical data. The main difference lies in the time horizon required by both applications. So, we have to consider network management as a concept that incorporates temporal information in relation to the type of network management application. We can distinguish three regions for the time parameter related to network management operations. The real-time region which is related to real-time operations, the time non-critical region which is related to operations that are based on information in a given time window and finally the global time region which is related to operations that are based on long-term information. Usually, the different time regions reflect the difference in the point of view of various people involved in a system (for example a network engineer, people with financial responsibilities etc.). It should be clear that the time parameter has a meaning directly related to the type of application, and not an absolute meaning. According to this point of view any network management application has to be defined in a suitable area, described by specific values of the three parameters defined above. For example, taking into account the five OSI functional areas, we can have the following considerations as far as the used subspace is concerned: Configuration management: for example, a simple configuration management tool that provides only a central storage for generic network information, e.g. name of devices, system physical location, system administration, etc., network address assignments and other pertinent data for network elements, uses a subspace defined as global time quasistatic information structural data. A more complex configuration management tool, that automatically gathers and stores information from all managed devices, that compares the system current running configuration with control data stored in the tool and enables the user to change the running configuration of the device, uses a subspace defined as time non-critical quasistatic information control data. Performance management: for example, a performance management tool that measures the current network utilisation and compares its value with a user-defined threshold in order to generate an alarm uses a subspace defined as real-time dynamic information sensor data. Fault management: for example, a fault management tool that checks the number of packets received in error for every interface of managed routers in an enterprise network, so as to generate an alarm when the value increases up to a predefined level, uses a subspace defined as real-time dynamic information sensor data. A fault management tool that checks the operating and the administrative status of every interface of all managed objects in an enterprise network in order to detect an interface failure uses a subspace defined as real-time quasistatic information sensor data The model The temporal management information model proposed in this paper represents the past, current and future network state in a temporal management information base, TMIB. This new information model uses as a basis the IETF s model and it extends it in order to include the temporal nature of the management information. The incorporation of the temporal dimension in the network management informational model admits the adoption of a temporal database model. This model is augmented by the appropriate network monitor procedures in order to gather the historical network behaviour and store it in the TMIB, and by the appropriate network executors in order to change the current network state. Moreover, it is augmented by prediction and simulation procedures in order to provide information about the future behaviour of network resources. As a consequence, the TMIB is a temporal database whose design is tailor-made for network management. The TMIB is the core of a network management system, as it provides the interface between the network administrator and all the functions of network management. One important parameter of the TMIB design is to have the network administrator interact solely with the database, by using a temporal query language, so that from the user s point of view the TMIB embodies the network diachronically. As a result of this TMIB design, whenever the network administrator wishes to make changes in the network

4 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) objects, such as changing the routing scheme, the administrator updates the appropriate variables in the database by using a temporal replace statement. The adoption of a temporal database model is quite a difficult task because over the course of the past decade various relational data models have been proposed in order to include the temporal dimension. Generally, these data models extend the standard relational data model by including a temporal component. This incorporation of the time parameter has taken a number of different forms. Among these we can distinguish two main approaches: the incorporation of the temporal dimension at the tuple level (by timestamping each tuple) or at the attribute-value level (by including time as part of each value). For the first approach, the terms first-normal-form (1NF) relations or temporally ungrouped (TU) data models are also used. For the second approach, the terms non-first-normal-form relations or temporally grouped (TG) data models are also used [4]. Among the temporally ungrouped data models we can distinguish TRDM, a temporal database model presented in [5]. The main advantage of this model is its query language, TQuel (Temporal QUEry Language), which can be used for the manipulation of temporal databases. The TRDM provides for two types of historical relations. One, called an interval relation, is derived from a standard relation through the addition of two temporal attributes, validfrom and valid-to, both of whose domains are sets of times T. The values of the nontemporal attributes of a tuple in such a relation are considered to be valid during the beginning of the interval of time starting at the valid-from value and ending at, but not including, the valid-to value. This interval thus denotes the lifespan of the tuple. The second type of relation, an event relation, is defined by extending a standard relation by a single temporal attribute valid-at, indicating the time instant that a specific event took place. According to the new temporal management information model proposed in this paper, the TMIB is a collection of temporal table objects that represent a diachronic view of management information. There are two cases: according to the first case, a TMIB table consists of a set of explicit columnar management information objects and of two implicit time objects. These time columnar objects, valid- From and validto, represent the time interval [validfrom, validto) during which the state of the management information is valid. We call this type of object an interval table. According to the second case a TMIB table consists of a set of explicit columnar management information objects and of one implicit time object validat. This time object refers to the instant that an event described by the explicit columnar objects took place. We call this type of object an event table. The MIB table objects in every group are mapped onto temporal table objects, with their columnar objects representing the explicit non-temporal columnar objects of the derived TMIB table. Moreover, the scalar objects of each group are mapped onto the explicit nontemporal columnar objects of TMIB tables. The values of the implicit time columnar objects, e.g. validfrom, validto and validat, represent the time at the manager site. Moreover, values of explicit columnar objects that are derived from MIB objects related to time, for example in MIB-II [11] the sysuptime, iflastchange, etc. and in SNMPv2 M2M MIB [12] the snmpeventlasttimesent, etc., represent the time at the agent site in a highly centralized architecture and/or at the intermediate manager site in a distributed architecture. This mapping is designed in a way to permit the representation of all the SNMPv1 MIBs and new SNMPv2 MIBs, such as SNMPv2 M2M MIB, that include objects related to time at the agent or at the intermediate manager level, in TMIB tables and give an open character to our model. Taking into consideration the criterion that classifies the network management information into quasistatic and dynamic managed objects we define two types of TMIB tables, quasistatic and dynamic TMIB tables. The nontemporal columnar objects of a quasistatic TMIB table represent only the quasistatic part of the corresponding MIB table or quasistatic scalar objects of MIB groups. Dynamic TMIB tables represent only dynamic managed objects. The non-temporal columnar objects of a dynamic TMIB table represent only the dynamic columnar objects of the corresponding MIB table or only dynamic scalar objects of MIB groups. The explicit columnar objects of a dynamic TMIB table represent delta values of the corresponding MIB objects. An example of a quasistatic TMIB table representing the history of a quasistatic part of the iproutetable for router pegasus is depicted in Fig. 3. For example, the row with values {pegasus, , 1, 3,, ,, 100, 120} means that during the past time interval [100, 120) Fig. 3. Part of the quasistatic iproutetable TMIB table object.

5 698 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 4. Part of the dynamic scalar TMIB table object of the ip group. the routing entry for the destination had the values mentioned in this TMIB table row. In this table, the current management information, that is the routing entries that are still valid, has a value equal to for the validto columnar object. An example of a TMIB table representing the history of some scalar dynamic objects of the ip group of the host phaethon is depicted in Fig. 4. Each row of this table represents the delta values of the dynamic objects for a given managed node during the interval [validfrom, validto). An example of a part of the tcpconntable TMIB object of host dias is illustrated in Fig. 5. In this figure we can see the history of different states of the TCP connection in host dias between the tcpconnlocaladdress ¼ , tcpconnlocalport ¼ 21 and tcpconnremaddress ¼ , tcpconnremport ¼ According to the nature of the information included in the two categories of TMIB tables the operations that can be performed in each category are quite different. The information included in quasistatic TMIB tables can be the argument in a retrieve, append, delete or replace database operation, while the information included in dynamic TMIB tables can be an argument only in a retrieve operation. The TMIB model is illustrated in Fig. 6. In the lower layer we can see the network monitors, which use polling procedures in order to gather and store the historical network management information in the quasistatic and dynamic TMIB tables, and the network executors, which are used in order to implement the append, delete and replace database operations in the current network management information included in quasistatic TMIB tables. In the middle layer we can see the dynamic and quasistatic TMIB tables that provide the historical (past and current) management information. Finally, in the upper layer we consider a number of prediction and simulation algorithms that provide information about the future behaviour of network resources. Finally, we have to consider the issue of choosing the value of the polling interval used by network monitors in order to gather and store the historical management information in dynamic and quasistatic TMIB tables. This choice apparently depends on various factors such as the number of agents, the network delay, the processing time implementing the polling mechanism, etc. The values that are appropriate for a given configuration have to be determined in practice. In the sequel, we just give some indications and constraints that the choice of the polling interval has to satisfy. The polling takes place in a non-blocking way, that is the process first issues the whole number of requests and then it waits for the replies. In this way the network latency does not play a crucial role. Let T be the value of the polling interval in seconds and let d i be the time required to process the request/response for the ith agent. The last quantity depends on the processing power of the workstation on which the polling process is running, on the specific TMIB structure (how many MIB objects are required per request), and on the number of requests/responses processed at the same time. For a given number of agents n let d ¼ max{d i } i ¼ 1, 2, :::n Fig. 5. Part of the quasistatic tcpconntable TMIB table object.

6 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 6. The type of network management information contained in the TMIB. Thus by imposing an upper bound UB cpu of the CPU utilisation for the polling process we have that the following must hold: n d T UB cpu Let RQ and RS be the total size in bytes of a request and reply respectively in every poll, and let C be the capacity of a virtual line used by the network management station to communicate with each managed node separately. Obviously, C depends on the topology of the network and indirectly on the number of agents n. By imposing an upper bound UB net for the network utilisation dedicated to network management we have that it must hold: (RQ þ RS) 8 UB T C net Let NDB and RDB be the average number of rows inserted in the TMIB after a poll and the size of each row in bytes, respectively. Imposing an upper bound UB db in bytes on the daily added amount of data in the TMIB, we have that it must hold: n NDB RDB UB T db Note that the type of MIB, quasistatic or dynamic, determines that the value of NDB varies between 0 and 1. For a given implementation the polling interval must be chosen so as to satisfy all the above constraints. More precisely, the bounds must be set not as single values but as pairs of values, for quasistatic and dynamic objects for a given configuration and TMIB respectively. The fulfilment of the above constraints leads to the minimum value of the polling interval that can be selected. In practice, the polling interval may be any number greater than or equal to T depending on the nature of the application and the desired accuracy of network management information. 3. Architecture and services In this section we will present the architectural model that incorporates directly the proposed network management perspective. We define network management application object (NMAO) as an object consisting of data and procedures. Each NMAO is referred to a specific network element (simple object) or network (aggregate object), it is physically located in a specific host and it is totally independent of any other NMAO. It has the responsibility of collecting network management information for all the network components and/or the networks belonging to the area of responsibility of this particular object. Each NMAO maintains a TMIB describing the network state. More precisely, the network state is mapped to a generic temporal database schema through a preselected and user-adjustable use of filters. By using these filters the NMAO can choose the right resolution as far as the time (how often) and/or the space (what information) is concerned. As we have already seen, the TMIB structure is an extension of the MIB structure. It is implemented through a database approach that adds some new attributes, namely the time attributes, but maintains the MIB semantics. In this way each NMAO database can communicate with other

7 700 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 7. Distributed architecture of network management application objects. NMAO databases following the common TMIB semantics. The NMAO databases may cooperate among themselves by negotiating what information they should exchange and by deciding how they will exploit the results. In this way, the network management of a generic internetwork may take place through the cooperation among completely autonomous systems. This approach may be implemented by using a distributed database model. The use of a local database in every NMAO saves communication bandwidth in collecting network management data, at the expense of not having available a central global state of the system. The above described concept is depicted in Fig. 7. All the well-known techniques and protocols borrowed from the distributed databases era may be used in order to achieve a consistent global state of the overall network management application. For example, the two-phase commit protocol (2PC) may be used to modify routing tables in a way that ensures atomicity. Another example concerns the data replication concept found in the distributed database approach. Consider the case of problems arising from temporal network disconnections. They can be minimised by using appropriate network management tools for restoring network connectivity. In order to do so, it is necessary to be able to access the appropriate MIB information. This information can be available through data replication. By using the aforementioned temporal database model we can implement basic network management services as temporal database operations. In what follows TQuel has been adopted as the data manipulation language. In the sequel, we will consider the retrieve operation only. We will describe the incorporated extensions as far as the time component is concerned. The other TQuel operations behave similarly. A skeleton for the TQuel retrieve statement that we use with our model can be the following [5]: retrieve target_list valid clause where clause when clause The target list specifies the specific columnar objects of the retrieved rows and the where clause specifies constraints that apply on the values of the explicit columnar objects in order to restrict the underlying rows that participate in the query. The when clause is the time analogue of the where clause: it specifies a predicate on the implicit time columnar objects of the underlying rows that must be satisfied for those rows to participate in the remainder of the processing of the query. Finally, the valid clause serves the same purpose as the target list, specifying the value of an attribute in the derived table; but in this case, the values of the implicit time columnar objects of the derived row are being specified. Note how easily the network engineer can acquire and use network management information. In order to present the retrieve statement we give some examples of the queries that the network manager could issue. More precisely, with regard to the representation of the part of the quasistatic TMIB table object in Fig. 3, we present a number of queries in order to discuss the TQuel retrieve statement. First, the two examples of QUERY 1 retrieve the current state of the routing table of the host pegasus, as a whole or as a specific part. Then, the two examples of QUERY 2 retrieve the state of the routing table (as a whole or a specific part) of the host pegasus at a specific past time span. Moreover, the two examples of QUERY 3 retrieve the history of the routing table (as a whole or a specific part) of the host pegasus, during a past period of time. Finally, the example of QUERY 4 is used to retrieve the time when specific changes to the values of MIB objects were detected by the polling mechanism. QUERY 1 (a) Which is the current routing table of node pegasus? range of R is iproutetable retrieve (R.all) where R.hostID ¼ pegasus when R overlap present

8 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) (b) Which was the value iproutenexthop for the iproute- Dest for node pegasus during March 1995? retrieve (R.ipRouteDest, R.ipRouteNextHop) where R.hostID ¼ pegasus when R overlap [March 1995] QUERY 4 When was it detected by the management application that the iproutenexthop for iproutedest for node pegasus changed its value to ? (b) Which is the last value of the iproutenexthop for the iproutedest of node pegasus? retrieve (R.ipRouteDest, R.ipRoute-NextHop) where R.hostID ¼ pegasus and iproutedest ¼ when R overlap present QUERY 2 (a) Which was the routing table of node pegasus at noon on May 5, 1995? retrieve (R.all) where R.hostID ¼ pegasus when R overlap 12 PM May 5, 1995 (b) Which was the value of the iproutenexthop for the iproutedest of node pegasus at noon on May 5, 1995? retrieve (R.ipRouteDest, R.ipRoute- NextHop) where R.hostID ¼ pegasus and iproutedest ¼ when R overlap 12 PM May 5, 1995 QUERY 3 Fig. 8. The proposed layered architecture. (a) Which was the routing table of node pegasus during March 1995? retrieve (R.all) where R.hostID ¼ pegasus when R overlap [March 1995] retrieve (R.ipRouteNextHop) valid at begin of R where R.ipRouteDest ¼ and R.ipRouteNextHop ¼ The proposed view of the network management concept, already described above, can be implemented in a layered structure in a control plane as is depicted in Fig. 8. Each NMAO consists of the following layers and elements Layer 1 This includes the SNMP protocol. This layer provides the raw service of transmitting network management information based on the SNMPv1 primitive operations get-request, getnext-request, set-request, get-response and trap. The network management protocol that can be used is not limited to SNMPv1. The SNMPv2 [13,14] can also be use in this layer. The key enhancements of SNMPv2 are that we can support a distributed architecture and manage a set of intermediate managers, new protocol operations, as getbulk-request and inform-request, and specific security services as privacy, message authentication and access control. The CMIP or any other network management protocol can also be used for this type of service Layer 2 This provides three types of service. Type 1 provides the service of changing/updating the network management information and is based on the SNMP primitive service set-request. This service concerns the operations used for configuration changes in order to maintain the prescribed levels of performance and for activating restoring mechanisms in the event of host failure or malfunction. Type 2 provides a monitoring service. This service can be further subdivided into a real-time performance monitoring service and a real-time network status monitoring service. Type 3 provides the service of collecting and storing the MIB information.

9 702 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 9. The status table. On the basis of the services already defined we consider three generic service elements lying on the top of these services. We name them strategic applications service element, control applications service element and monitoring service element. These service elements do their job based on the layer 2 services and they may be distributed or not. 4. Description of the prototype In order to implement the above described network management concepts, we developed a prototype that includes some of the proposed characteristics. In the sequel, we will describe the main characteristics of the prototype as well as our experience from its usage. The prototype was implemented in a DEC 3100 workstation at the beginning, and has now been transferred to an Alpha workstation. The focus was on the MIB II, but generalisation (by adding other MIBs) can easily be derived. The network management protocol used was the SNMP protocol. In order to acquire network management information we used the polling approach with polling period dependent on the type of the requested information and on the number of managed nodes. Apart from the TMIB implementation which follows the rules already described, we had to define two other tables, namely the networks table and the status table, which have the following description: Networks: this table has one row for each network we want to manage. It mainly maintains information about the hosts included in each network by referring to a HostFile with structure described in RFC 952. Fig. 10. The elements of the network management application implementation. Fig. 11. The main network management frame. Status: this table has the structure depicted in Fig. 9. The table has at least one row for each host in the specified network. This table is updated (by inserting new rows) every time the status of the corresponding host changes. As far as the implementation architecture of the prototype is concerned, the general scheme of the architecture is depicted in Fig. 10. Each NMAO consists of two main processes: the polling process and the process that implements the graphical user interface (GUI). The polling mechanism is implemented as a background process that periodically polls the SNMP agents of the network and communicates with the GUI process with IPC methods. This allows the polling parameters to be received dynamically and user commands to be obeyed to initiate and terminate the polling procedure. Moreover, the polling process, in order to collect the values of the MIB variables contained in the MIB-like database tables, constructs the SNMP requests by issuing queries to the data dictionary. Some of the facilities provided by the GUI process are the following: Real-time monitoring of the following parameters: operational state of network resources, MIB control and configuration variables. Graphical presentation of the performance measures as functions of time, based on historical and current raw performance data. Dynamic definition of performance measures. Maintenance of raw network management information. In the sequel, we will present the part of the prototype related to the management of the quasistatic MIB variables. The operations included are rather primitive, while management applications may be built on the top of these operations. The quasistatic MIB management option of the frame depicted in Fig. 11 allows the user to choose a specific

10 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 12. The table list frame. combination of session and network in order to define table objects that contain the network management information. This choice leads to the frame illustrated in Fig. 12, where the tables that are included in this session and network combination are presented. The user can select the table he wants and do the following operations: View: table data presentation according to specific user constraints. Delete: deletion of the table contents. View Part: table data presentation in a way that enables the user to choose at the same time the fields to be displayed as well as the constraints that have to be fulfilled. The constraints concern two parameters. First, they concern the host (we can choose one or more hosts). Second, they concern the valid time constraints the user wants. In addition to that, there is a prespecified operation, we Fig. 13. The quasistatic constraints frame. call it the LAST operation, that enables us to locate the rows of the table that are still valid. The constraints can be set by using the quasistatic constraints frame depicted in Fig. 13. Next, we will present the part of the prototype related to the graphical presentation of the performance measures as functions of time. The operations included are rather primitive. More complex management applications may be built on the top of these primitive operations. The performance monitoring option of the frame illustrated in Fig. 11 leads to the frame depicted in Fig. 14, where the user can choose a specific combination of session identity and network name and a performance measure for presentation in a line graph as a function of time. The performance indicators included in the prototype are based on dynamic sensor data and they concern host performance indicators, related either to host interfaces or to the TCP/IP implementation. Thus, the input error rate is used in order to trace possible transmission medium failures, while the output error rate is used to monitor the performance of the interface. For example, in a thin Ethernet network the terminator may be disconnected. This will result in a great number of incoming packets received in error. A high value of the output error rate indicates a possible interface malfunction. In addition to that, the throughput and the utilization for an interface is defined. The rest of the described performance indicators are related to TCP/IP performance. We can use the reassembly failure probability, which indicates a possible problem with the values of various TCP/IP parameters or a problem in the network itself. By examining the TCP segments retransmission probability we can distinguish between those cases. In what follows, we will present some of the performance indicators we have used. Taking into consideration the fact that only the rate at which the dynamic sensor data change contributes an indicator of the network state, we adopted

11 704 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) the following notation: MIB-variable name(t): ¼ value of the MIB-variable at time t; (MIB-variable): ¼ MIB-variable name(t 1 ) ¹ MIB-variable name(t 0 ). TCP/IP implementation related performance indicators: Host interface related performance indicators (on specific host interface): Throughput : S ¼ D(ifInOctets) þ D(ifOutOctets) D(sysUpTime) D(ipInRecieves) þ D(ipOutRequests) þ D(ipForwDatagrams ) IP throughput ¼ D(sysUpTime) *for nodes acting as gateways; UDP throughput ¼ D(udpInDatagrams) þ D(udpNoPorts) þ D(udpInErrors) þ D(udpOutDatagrams) D(sysUpTime) Reassembly failure probability ¼ D(ipReasmFails) D(ipReasmReqds) Fragmentation failure probability D(ipFragFails) ¼ D(ipFragOKs) þ D(ipFragFails) Network services utilisation ¼ D(tcpCurrEstab) tcpmaxconn TCP segments retransmission probability ¼ D(tcpRetransSegs) D(tcpOutSegs) Link utilization ¼ S 8 ifspeed Input error rate ¼ D(ifInErrors) D(sysUpTime) Output error rate ¼ D(ifOutErrors) D(sysUpTime) These performance indicators can be chosen by the user directly from the performance monitoring frame depicted in Fig. 14. After selecting a specific performance measure, the user can set two types of constraints to its presentation. The first type of constraint concerns the network node and the interface number (wherever needed, as for the throughput Fig. 14. The performance monitoring frame.

12 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 15. The performance monitoring constraints frame. calculation). The second one concerns the valid time boundaries and the step parameter. The frame for setting constraints to performance measures related to TCP/IP implementation is depicted in Fig. 15. Except for the performance indicators presented in the performance monitoring frame the user can define dynamically a performance indicator of his own choice. By using string parsing the management application will start a polling procedure for the appropriate MIB variables in order to give a graphical presentation of the performance indicator. Finally, another part of the prototype concerns the existence of database management tools, accessible directly from the network management environment. Using this part, the user can perform database management operations on the raw performance data stored in the data tables (queries, table creation, etc.). Our prototype has been tested thoroughly as far as its functionality is concerned. So, we have done a number of experiments that show: how useful the temporal parameter is in building applications that are based either on quasistatic or dynamic objects. The whole history is directly accessible in a unified way. how easy the development of new applications is. New applications are developed by using either database queries or 4GL programming. Part of these experiments is described in the next section discussing paradigms of how the proposed model can be used in network management applications. As far as the size of the network being managed is concerned, the tests have been done for the university network. More precisely, the number of managed nodes varied from 5 to 10, in order to examine the influence of the network size in the performance of our model. Costs do not seem to vary significantly. Regarding the network utilisation used by the network management requests and replies we observed that it remains below 1% for all cases, while as far as the data volume is concerned, it varies linearly with the number of managed nodes. The last observation does not pose any problem in real applications, because we can define a number of NMAOs, each of which has a TMIB for specific applications, which is of manageable size relative to the computing power of the workstation where the NMAO resides. From our experience every typical midsize workstation can host a NMAO. As far as the choice of the polling period is concerned we have tested a number of pair values (polling period for quasistatic objects, polling period for dynamic objects). The choice influences first the percentage of network resources used for network management and second the size of TMIB. For the quasistatic objects, it seems that while the percentage of network resources used for network management grows proportionally with the decrease of the polling interval, the resulting information existing in the TMIB does not differ significantly. This means that as far as the choice of the quasistatic objects polling interval is concerned a rather large value is suitable. Typical values may be [30 sec, 3 min]. For the dynamic objects, it seems that small values for the polling interval increase both the percentage of network resources used for network management and the TMIB size because typically every query results in new TMIB information. But most of the applications that use this type of data, such as performance and fault management applications, are not based on instantaneous data but rather on averaged data over a given period. For most cases values in the region of [30 sec, 90 sec] are sufficient. The approximation of the values of various measures is good enough. Lower time resolution is required only for measurements of burstiness. As far as the database size is concerned we have observed

13 706 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 16. A dynamic TMIB table used to monitor the percentage of incoming packets discarded due to the format errors on a network interface. that this is not a serious problem. Considering the polling interval of 30 sec for both quasistatic and dynamic objects we have that per managed node the database size is on average as follows: for the dynamic objects almost every request resulted in new rows, thus giving at most 3000 rows per day, each row consisting of about 0.5 Kbytes. For quasistatic objects typically only one out of n requests contributes new rows where n takes values larger that 4 for most cases. Thus about at most 750 rows per day (worst case) are added, each row consisting of about 1.5 Kbytes. So, for the full MIB-II information we need about 6 Mbytes per day per managed node. Assuming that the lifetime of information which is useful for real-time or time non-critical applications is no more that two days, we find that we need storage space of about 12 Mbytes per managed node. As the network being managed by one NMAO consists of no more than 50 nodes, the required storage is less than the 1 GB which is typically available in any network management workstation. As far as global time applications are concerned, the necessary storage space depends heavily on the specific application. In those cases, off-line analysis takes place not necessary in the network management station and the data are provided from off-line storage. 5. Conclusions In this paper, we have proposed a new network management information model that directly includes the temporal dimension. In this framework the services provided by this model have been given, while the architecture supporting them has been presented as well. Our view has been supported by the implementation of a prototype related to the proposed model. The main aspects of our approach are: The direct incorporation of the time parameter as an attribute of the network management information, in a way that maintains the already existing semantics as far as the network management model is concerned. The adoption of the temporal database model for storing the historical network management information. The use of temporal database queries for doing network management related operations. The fact that we can easily incorporate in our model either future MIBs or private MIBs, that is our model is open as far as the creation of new MIBs is concerned. The layered architecture that we have proposed for the temporal network management information model. The proposed model can be used to facilitate the development of network management applications. Having as a base the evaluation of network management information in a given time window, we can easily apply various types of requests ranging from a user query to the database to an algorithm detecting event correlation either in time non-critical or global time regions. We conclude our discussion presenting a few cases for which the proposed model has been used. We consider that we have to manage an enterprise network that consists of several subnetworks connected to the enterprise backbone network. Suppose that a subnetwork A is connected to the backbone network with a serial leased line and two routers, one named sisyfos at the backbone network site and another one named aiolos at the subnetwork A site. In this environment users of subnetwork A complain that they have low service quality. In order to solve the problem, we try to check if the line is problematic, towards which direction and for which period of time, so as to inform the public PTT (Post, Telephone and Telegraph) organization that is the leased line provider. For this purpose, we need to specify for what interfaces of routers sisyfos and aiolos the number of incoming packets discarded due to format errors was greater than a small percentage of the incoming packets delivered to the layer Fig. 17. A quasistatic TMIB table used to report failures of network interfaces.

14 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) Fig. 18. A quasistatic TMIB table used to evaluate routing policies by monitoring the history of routes that datagrams followed for a given destination. above, and for which period of time this was true. So, we need an interval table with the following dynamic MIB-II objects of the iftable in interfaces group as the TMIB table columnar objects: ifindex, ifinucastpkts, ifnucastpkts and ifinerrors. Part of this table can be as shown in Fig. 16. We consider that, for a given interface, the line connected to that interface has a problem when the number of incoming packets discarded due to format errors is greater than the 5% of the incoming packets delivered to the layer above. So, we have to issue the following query in order to identify when the line had a problem and towards which direction: range of F is iftable retrieve F.nodeID, F.ifIndex valid during F where F.nodeID ¼ sisyfos or F.nodeID ¼ aiolos and F.ifInErrors 0.05*(F.ifInUcastPkts þ F.ifInNUcastPkts) when true In the same environment, suppose we want to make a report on the failures of interfaces of router aiolos during a specific day. This report will include also the time when each failure happened at the agent site and at the manager site. For this purpose, we need an interval table with the following quasistatic MIB-II objects of the iftable in interfaces group as the TMIB table columnar objects: ifindex, ifadminstatus, ifoperstatus and iflastchange. If ifadmin- Status is up and ifoperstatus is down, the related interface is in failure mode. IfLastChange gives us the time at the agent when the interface changed operational state. A part of this table can be as shown in Fig. 17. In order to construct such a report, we have to issue the following query: range of F is iftable retrieve F.nodeID, F.ifIndex, F.ifLastChange valid at begin of F where F.nodeID ¼ aiolos and F.ifAdminStatus ¼ 1 and F.ifOperStatus ¼ 2 when F overlap [June 6, 1996] In the same environment, the enterprise network is connected to two different network providers through serial lines with a router named pegasus which has two serial interfaces. Suppose we want to evaluate the results of a specific routing policy regarding the two service providers. In order to do so, we need to trace the changes of the routing table entries (next hop) for a given set of destinations. For this purpose, we need an interval table with the following quasistatic MIB-II objects of the iproutetable in ip group as the temporal table columnar objects: iproutedest, iprouteifindex and iproutenexthop. Part of this table can be as shown in Fig. 18. For example if we want to know the history of routes that the datagrams followed for the destination during last month (June 1996) in order to check the routing strategy related to the two different providers, we could issue the following query: range of R is iproutetable retrieve R.ipRouteIfIndex, iproutenexthop valid during R where R.nodeID ¼ pegasus and R.ipRouteDest ¼ when R overlap [June 1996] References [1] J. Case, M. Fedor, M. Schoffstall and J. Davin, A simple network management protocol, RFC 1157, DDN Network Information Center, SRI International, May [2] Information processing, open system interconnection, common management information protocol (CMIP), International Organization for Standardization and International Electrotechnical Committee, International Standard [3] M. Rose and K. McCloghrie, Structure of management information for TCP/IP based internets, RFC 1155, DDN Network Information Center, SRI International, May [4] J. Clifford, A. Croker and A. Tuzhilin, On completeness of historical relational query languages, ACM Trans. Databases, 19 (1994). [5] R. Snodgrass, The temporal query language TQuel, ACM Trans. Databases, 12 (1987). [6] T. Apostolopoulos and V. Daskalou, A model for SNMP based performance management services, Proc. IEEE SICON/ICIE 95, Singapore, July [7] T. Apostolopoulos and V. Daskalou, On the implementation of a prototype for performance management services, Proc. IEEE Int. Symp. on Computers and Communications, Alexandria, Egypt, June [8] Information processing, open system interconnection, structure of

15 708 T.K. Apostolopoulos, V.C. Daskalou/Computer Communications 20 (1997) management information, Part 1, International Organization for Standardization and International Electrotechnical Committee, International Standard [9] B. Neumair, Modelling resources for integrated performance management, in: Integrated Network Management III, (ed. H.-G. Hegering, and Y. Yemini) IFIP Working Group 6.6, Elsevier Science, San Francisco, [10] J. Haritsa, M. Ball, N. Roussoloulos, J. Baras and A. Data, Design of the MANDATE MIB, Proc. IFIP TC6/WG 6.6 Symp. on Integrated Network Management III (ed. H.-G. Hegering and Y. Yemini) IFIP Working Group 6.6, Elsevier Science, San Francisco, [11] K. McCloghrie and M. Rose, Management information base network management of TCP/IP based internets: MIB-II, RFC 1213, DDN Network Information Center, SRI International, March [12] J. Case, K. McCloghrie, M. Rose and S. Waldbusser, Management information base for version 2 of the simple network management protocol (SNMPv2), RFC 1450, SNMP Research, Hughes LAN Systems, Dover Beach Consulting, Carnegie Mellon University, April [13] J. Case, K. McCloghrie, M. Rose and S. Waldbusser, Introduction to version 2 of the Internet-standard network management framework, RFC 1441, SNMP Research, Hughes LAN Systems, Dover Beach Consulting, Carnegie Mellon University, April [14] W. Stallings, SNMP, SNMPv2, and CMIP: The Practical Guide to Network-Management Standards, Addison-Wesley, Massachussets, USA, Theodore K. Apostolopoulos is an Associate Professor at the Department of Informatics at Athens University of Economics and Business. He obtained his diploma in electrical engineering in 1979 and his Ph.D. in informatics in 1983 from the National Technical University of Athens. His research interests include telecommunications, computer networks, distributed systems and databases, performance evaluation of computer and communication systems, parallel algorithms for the solution of engineering problems. His current research activity focuses on network management, network services, distributed applications and telematics. The research activities in the above areas have been supported by various projects funded by industry and government agencies. He has authored more than 30 publications covering the above scientific areas. He is a member of the IEEE, the IEEE Computer Society and the IEEE Communications Society. Victoria C. Daskalou received her bachelor degree in Informatics from the Department of Informatics at Athens University of Economics and Business in 1992, where she has been a Ph.D. student since Her research interests include network management, databases and intelligent networks. Currently, she participates in three research projects related to the above scientific areas.

Temporal Network Management Information Model and Services

Temporal Network Management Information Model and Services Journal of Network and Systems Management, Vol. 6, No. 3, 1998 Temporal Network Management Information Model and Services Theodore K. Apostolopou los 1 and Victoria C. Daskalou 1 The paper addresses the

More information

Network Management - SNMP

Network Management - SNMP Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow

More information

An E-learning Service Management Architecture

An E-learning Service Management Architecture An E-learning Service Architecture Theodore K. Apostolopoulos Anna Kefala Department of Informatics Athens University of Economics and Business 76 Patission st., 10434 Athens, Greece Tel.: +30 210 8203234,

More information

SNMP Network Management Concepts

SNMP Network Management Concepts SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page

More information

Simple Network Management Protocol

Simple Network Management Protocol Simple Network Management Protocol Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outlines Basic Concepts Protocol Specification Transport-Level Support SNMP Group Practical

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do

More information

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Contents Network Management MIB naming

More information

SNMP Basics BUPT/QMUL 2015-05-12

SNMP Basics BUPT/QMUL 2015-05-12 SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016 Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between

More information

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright

More information

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP -overview. Based on: W.Stallings Data and Computer Communications SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use

More information

Simple Network Management Protocol (SNMP) Primer

Simple Network Management Protocol (SNMP) Primer Xerox Multifunction Devices July 22, 2003 for the user Simple Network Management Protocol (SNMP) Primer Purpose This document introduces the history, purpose, basic functionality and common uses of SNMP

More information

Outline of the SNMP Framework

Outline of the SNMP Framework 2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Outline of the SNMP Framework Management Program

More information

Development of Monitoring Tools for Measuring Network Performances: A Passive Approach

Development of Monitoring Tools for Measuring Network Performances: A Passive Approach IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun,

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

Simple Network Management Protocol SNMP

Simple Network Management Protocol SNMP Kommunikationssysteme (KSy) - Block 7 Simple Network Management Protocol SNMP Dr. Andreas Steffen 2000-2001 A. Steffen, 12.02.2001, KSy_SNMP.ppt 1 Definitions client/server network management application

More information

Simple Network Management Protocol

Simple Network Management Protocol A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org

More information

INTERNET MANAGEMENT PROTOCOLS TUTORIAL STOCKHOLM, SWEDEN 29 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS

INTERNET MANAGEMENT PROTOCOLS TUTORIAL STOCKHOLM, SWEDEN 29 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS INTERNET MANAGEMENT PROTOCOLS THE SIMPLE NETWORK MANAGEMENT PROTOCOL 1 TUTORIAL STOCKHOLM, SWEDEN 9 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS pras@ctit.utwente.nl http://wwwhome.ctit.utwente.nl/~pras

More information

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons: Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Introduction... 28-2 Network Management Framework... 28-2 Structure of Management Information... 28-3 Names... 28-4 Instances... 28-4 Syntax...

Introduction... 28-2 Network Management Framework... 28-2 Structure of Management Information... 28-3 Names... 28-4 Instances... 28-4 Syntax... Chapter 28 Simple Network Management Protocol (SNMP) Introduction... 28-2 Network Management Framework... 28-2 Structure of Management Information... 28-3 Names... 28-4 Instances... 28-4... 28-5 Access...

More information

Presented by Aurang Zeb 14CS-03. Network Management System

Presented by Aurang Zeb 14CS-03. Network Management System Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

How To Understand Network Performance Monitoring And Performance Monitoring Tools

How To Understand Network Performance Monitoring And Performance Monitoring Tools http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, paul.moceri@gmail.com Abstract The growing

More information

Using SNMP for Remote Measurement and Automation

Using SNMP for Remote Measurement and Automation Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,

More information

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

SNMP Extensions for a Self Healing Network

SNMP Extensions for a Self Healing Network SNMP Extensions for a Self Healing Network Background Patent 6,088,141: This is a self healing network depending on additional hardware. It requires a second ring of connection to handle recovery operations.

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

SNMP. Simple Network Management Protocol

SNMP. Simple Network Management Protocol SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Simple Network Management Protocol

Simple Network Management Protocol Simple Network Management Protocol This document describes how to configure the Simple Network Management Protocol (SNMP). This document consists of these sections: Understanding SNMP, page 1 Configuring

More information

A Guide to Understanding SNMP

A Guide to Understanding SNMP A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few

More information

(Refer Slide Time: 1:17-1:40 min)

(Refer Slide Time: 1:17-1:40 min) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 37 Network management Good day, so today we will talk about network management.

More information

A Study of the Behaviour of the Simple Network Management Protocol

A Study of the Behaviour of the Simple Network Management Protocol A Study of the Behaviour of the Simple Network Management Protocol Colin Pattinson School of Computing, Leeds Metropolitan University, Beckett Park, Leeds LS6 3QS UK E-Mail : c.pattinson@lmu.ac.uk The

More information

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1 Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

A Brief Introduction to Internet Network Management and SNMP. Geoff Huston NTW Track 4

A Brief Introduction to Internet Network Management and SNMP. Geoff Huston NTW Track 4 A Brief Introduction to Internet Network Management and SNMP Geoff Huston NTW Track 4 What are we talking about? Network Management Tasks fault management configuration management performance management

More information

A Protocol-independent Notation For The Specification of Operations and Management Applications

A Protocol-independent Notation For The Specification of Operations and Management Applications A Protocol-independent Notation For The Specification of Operations and Management Applications Alfredo C. S. C. Brites Paulo A. F. Simões Paulo M. C. Leitão Edmundo H. S. Monteiro Fernando P. L. Boavida

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Lecture 12: Network Management Architecture

Lecture 12: Network Management Architecture Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business

More information

SNMP....Simple Network Management Protocol...

SNMP....Simple Network Management Protocol... SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP

More information

Tik-109/110.300 Telecommunications architectures:

Tik-109/110.300 Telecommunications architectures: Tik-109/110.300 Telecommunications architectures: Network management Hannu H. KARI/Helsinki University of Technology (HUT) TML-laboratory/CS/HUT Tik-109/110.300 Fall 2000 Hannu H. Kari Page 1 Agenda Telecom

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Gestão de Redes e Serviços, Segurança - Networks and Services Management, Security 1 Outline

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

52-20-16 Using RMON to Manage Remote Networks Gilbert Held

52-20-16 Using RMON to Manage Remote Networks Gilbert Held 52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management

More information

Simple Network Management Protocol

Simple Network Management Protocol CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a

More information

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1 Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

AlliedWare Plus OS How To Use sflow in a Network

AlliedWare Plus OS How To Use sflow in a Network AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use

More information

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring 1 Aman Mahajan, 2 Haresh Joshi, 3 Sahil Khajuria, 4 Anil k Verma 1,3,4 CSE, Thapar University, Patiala, India 2 Manager-Technology,CGL Mumbai, India Email: 1 akverma@thapar.edu, 2 haresh.joshi@cgglobal.com,

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach , CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach Manvi Mishra Dept. of Information Technology, SRMSCET Bareilly (U.P.), India S.S. Bedi Dept of

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation

A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation 208 A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation O. Said Computer Science Department, Faculty of Computers and Information Systems, Taif University, KSA. Abstract One of the

More information

CERBERUS NETWORK MANAGEMENT SYSTEM (CNMS) An Expandable, Experimental Network Management Platform

CERBERUS NETWORK MANAGEMENT SYSTEM (CNMS) An Expandable, Experimental Network Management Platform CERBERUS NETWORK MANAGEMENT SYSTEM (CNMS) An Expandable, Experimental Network Management Platform National Technical University of Athens (NTUA) Division of Computer Science Department of Electrical &

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Introduction to Simple Network Management Protocol (SNMP)

Introduction to Simple Network Management Protocol (SNMP) Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part

More information

Network Management: - SNMP - Software Defined networking

Network Management: - SNMP - Software Defined networking Internet-Technologien (CS262) Network Management: - SNMP - Software Defined networking 23.4.2014 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 9-1 Chapter 9 Network Management

More information

THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS

THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS Alexandru BIKFALVI, Paul PĂTRAŞ, Cristian Mihai VANCEA, Virgil DOBROTĂ Technical University of Cluj-Napoca, Communications

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Active Management Services

Active Management Services Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.

More information

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Network Management Functions - Performance. Network Management

Network Management Functions - Performance. Network Management Network Management Functions - Performance Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Network traffic monitoring and management. Sonia Panchen sonia.panchen@inmon.com 11 th November 2010

Network traffic monitoring and management. Sonia Panchen sonia.panchen@inmon.com 11 th November 2010 Network traffic monitoring and management Sonia Panchen sonia.panchen@inmon.com 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring

More information

Tutorial on Network Management and Measurements. Tasos Alexandridis analexan@csd.uoc.gr

Tutorial on Network Management and Measurements. Tasos Alexandridis analexan@csd.uoc.gr Tutorial on Network Management and Measurements Tasos Alexandridis analexan@csd.uoc.gr Network management Simple Network Management Protocol (SNMP) AP s SYSLOG messages Network Measurements and Analysis

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu

This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu This Lecture Network management NWEN 403 Advanced Network Engineering Qiang Fu School of Engineering and Computer Science Victoria University of Wellington 22/04/2015 NWEN403: Advanced Network Engineering

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information