Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26



Similar documents
Management of the Internet of Things

Internet of Things based approach to Agriculture Monitoring

Implementation and Evaluation of the Simple Network Management Protocol over IEEE Radios under the Contiki Operating System

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

6LoWPAN Technical Overview

Thingsquare Technology

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

Internet of Things 2015/2016

Resource Utilization of Middleware Components in Embedded Systems

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

SNMP Traffic Measurements

Smart Cities are the Internet of Things

Cisco CMTS Router MIB Overview

PANDORA FMS NETWORK DEVICE MONITORING

Using IPv6 and 6LoWPAN for Home Automation Networks

PANDORA FMS NETWORK DEVICES MONITORING

DNS SRV Usage June 22, 2011

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

SNMP OIDs. Content Inspection Director (CID) Recommended counters And thresholds to monitor. Version January, 2011

SNMP Network Management Concepts

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS

Annual review FLORENCE WP4 Network: prototypes

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

NCClient: A Python Library for NETCONF Client Applications

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

Secure, Efficient, and Open Standard Internet of Things

New Architectures for Ubiquitous Networks: Use and Adaptation of Internet Protocols over Wireless Sensor Networks

Using WhatsUp IP Address Manager 1.0

MIB Explorer Feature Matrix

Review: Lecture 1 - Internet History

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

Comparison of SNMP. Versions 1, 2 and 3

Making Sense of Internet of Things Protocols and Implementations

NMS300 Network Management System

Simple Network Management Protocol

Configuring SNMP CHAPTER7

RESILIENT NETWORK DESIGN

Charter Text Network Design and Configuration

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

Cisco Application Networking Manager Version 2.0

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

SNMP Simple Network Management Protocol

How To Understand Network Performance Monitoring And Performance Monitoring Tools

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

IPv6 Based Sensor Home Networking

Use Domain Name System and IP Version 6

Configuration Commands. SNMP System Commands. engineid XRS System Management Guide Page 303 SNMP. Syntax [no] engineid engine-id

CA Spectrum and CA Performance Center

SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3

Operations Manager: Network Monitoring

Using SNMP for Remote Measurement and Automation

6PANview: A Network Monitoring System for the Internet of Things

Transport and Network Layer

6LoWPAN: An Open IoT Networking Protocol

Connecting Low-Power and Lossy Networks to the Internet

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

MANAGING NETWORK COMPONENTS USING SNMP

WhatsUpGold. v3.0. WhatsConnected User Guide

Infoblox vnios Software for CISCO AXP

Top-Down Network Design

The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015

Configuration Notes 0215

IETF DPRIVE WG: Encrypting DNS

SMART IoT PROTOCOLS. Creating the Living Network. Chonggang Wang Innovation Lab, InterDigital Communications. December 8, 2014

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

GS752TP, GS728TP, and GS728TPP Gigabit Smart Switches

What is new in Zorp Professional 6

Configuring SNMP Monitoring

SolarWinds Certified Professional. Exam Preparation Guide

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

LifeSize Video Communications Systems Administrator Guide

Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings...

How To Understand The Concept Of Internet Of Things (Iot)

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services

TDM services over IP networks

Key requirements for Interoperable IoT systems

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

vcenter Server Appliance Configuration

IM and Presence Service Network Setup

IP Phone Presence Setup

Introduction to Simple Network Management Protocol (SNMP)

NEFSIS DEDICATED SERVER

XNMP - XML Network Management Protocol and Interface

Basic Administration for Citrix NetScaler 9.0

How To Manage Ipv6 Networks On A Network With Ipvv6 (Ipv6) On A Pc Or Ipv4 (Ip6) (Ip V6) Or Ip V6 ( Ipv5) ( Ip V5

What communication protocols are used to discover Tesira servers on a network?

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile

Fortinet Network Security NSE4 test questions and answers:

IPv6 R&D initiatives at ERNET India

ProSafe Managed Switch

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Using the X-Series Command Line Interface (CLI)

Secure data aggregation in mobile sink wireless sensor networks

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Transcription:

Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22

SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained Devices (NETCONF Light) 3 Discovery (mdns) and Infrastructure (NTP, SYSLOG) 4 Summary and References 2 / 22

SNMP and 6LoWPAN: End-to-End SNMPv3 end-to-end SNMP Manager SNMPv3 SNMP Agent Internet 6LowPAN Network + Straightforward direct access to individual 6LoWPAN nodes + Reuse of existing deployed SNMP-based tools o End-to-end security, end-to-end key management - Message size and potential fragmentation issues - 6LoWPAN nodes must run an SNMP engine - Trap-directed polling nature of SNMP has high (energy) costs 3 / 22

SNMP and 6LoWPAN: Proxies SNMPv3 proxies SNMP Manager SNMPv3 SNMP Proxy (6LowPAN Gateway) SNMPv3 SNMP Agent Internet 6LowPAN Network + Indirect access to individual 6LoWPAN nodes + Alternate transport encoding can reduce message sizes o Reuse of existing SNMP-based tools supporting proxies o Two security domains, different key management schemes - 6LoWPAN nodes must run an SNMP engine - Trap-directed polling nature of SNMP has high (energy) costs 4 / 22

SNMP and 6LoWPAN: Subagents SNMPv3 subagents SNMP Manager SNMPv3 SNMP Agent (6LowPAN Gateway) Subagent Protocol SNMP Subagent Internet 6LowPan Network + Indirect access to individual 6LoWPAN nodes + Alternate transport encoding can reduce message sizes o Reuse of existing SNMP-based tools supporting contexts o Two security domains, different key management schemes o 6LoWPAN nodes must run an SNMP subagent - Trap-directed polling nature of SNMP has high (energy) costs 5 / 22

SNMP and 6LoWPAN: Data Fusion Protocols SNMPv3 interfacing to data fusion protocols SNMP Manager SNMPv3 SNMP Agent (6LowPAN Gateway) data fusion protocol WSN Peer Internet 6LowPan Network + Indirect access to individual 6LoWPAN nodes + Leveraging data fusion protocols (in-network aggregation) + SNMP agent acting as a cache, no expensive polling o Reuse of existing SNMP-based tools supporting contexts o Two security domains, different key management schemes? No direct advantage of 6LoWPAN technology oops 6 / 22

Contiki-SNMP Overview General features / limitations SNMP messages up to 484-byte length Get, GetNext and Set operations SNMPv1 and SNMPv3 message processing models USM security model, no VACM access control model API to define and implement managed objects USM security algorithms HMAC-MD5-96 authentication protocol (RFC 3414) CFB128-AES-128 symmetric encryption protocol (RFC 3826) 7 / 22

Implemented MIB Modules and Static Memory Usage MIB modules SNMPv2-MIB SNMP entity information IF-MIB network interface information (no 802.14.5 iftype) ENTITY-SENSOR-MIB temperature sensor readings SNMPv1 and SNMPv3 enabled 31220 bytes of ROM (around 24% of the available ROM) 235 bytes of statically allocated RAM SNMPv1 enabled 8860 bytes of ROM (around 7% of the available ROM) 43 bytes of statically allocated RAM 8 / 22

Flash ROM and Static Memory Usage Memory usage by software module (bytes) Module Flash ROM RAM (static) snmpd.c 172 2 dispatch.c 1076 26 msg-proc-v1.c 634 6 msg-proc-v3.c 1184 30 cmd-responder.c 302 0 mib.c 1996 6 ber.c 4264 3 usm.c 1160 122 aes cfb.c 9752 40 md5.c 10264 0 utils.c 416 0 9 / 22

Stack and Heap Usage Maximum observed stack usage Version Security mode Max. stack size SNMPv1 688 bytes SNMPv3 noauthnopriv 708 bytes SNMPv3 authnopriv 1140 bytes SNMPv3 authpriv 1144 bytes Heap usage not more than 910 bytes for storing an SNMPv1 message approximately 16 bytes for every managed object in the MIB if a managed object is of a string-based type, then additional heap memory is used to store its value 10 / 22

SNMP Request/Response Latency (varying security) Time (ms) 130 120 110 100 90 80 70 60 50 40 30 20 10 0 SNMPv1 SNMPv3 noauthnopriv SNMPv3 AuthNoPriv transfer processing SNMPv3 AuthPriv 11 / 22

SNMPv1 Request/Response Latency (varying # varbinds) 160 140 request-response delay round-trip time processing time 120 Time (ms) 100 80 60 40 20 0 0 5 10 15 20 25 Number of variable bindings in a request 12 / 22

Related Work at Jacobs University SNMP applicability to constrained devices Guidelines how to fit SNMP into constrained devices Tricks like making VACM a simple read-only/read-write switch <draft-hamid-6lowpan-snmp-optimizations-02.txt> RPL MIB module specification and implementation Definition of a MIB module for the RPL routing protocol Implementation and evaluation on Econotags <draft-sehgal-roll-rpl-mib-01.txt> DTLS for constrained devices Contiki-SNMP over DTLS (RFC 5590, RFC 5591, RFC 5953) Pretty much future work at this point in time 13 / 22

NETCONF on Constrained Devices (NETCONF Light) 1 SNMP on Constrained Devices 2 NETCONF on Constrained Devices (NETCONF Light) 3 Discovery (mdns) and Infrastructure (NTP, SYSLOG) 4 Summary and References 14 / 22

Motivation and Approach Motivation Some applications (e.g., the Smart Grid) have a requirement to run a single management protocol on a set of devices with very different processing and storage capabilities. NETCONF (RFC 6241) provides a fairly feature complete solution for network devices such as routers and switches. Constrained devices may not be able to support NETCONF completely so how small can NETCONF be? Approach and Assumptions Define a proper subset of NETCONF that is appropriate for constrained devices. Assumption: On constrained devices, the amount of configuration data is small and the need to interact with multiple management systems concurrently is small. 15 / 22

NETCONF Light (NCL) Reduced Protocol Operations NCL implementations are not required to support filtering on <get-config> and <get> operations. NCL implementations are not required to implement the <edit-config> operation (simply use <copy-config>). NCL implementations only support the <running> datastore. NCL implementations may choose to only support one concurrent session (makes <lock> and <unlock> trivial). NCL uses a different XML namespace to identify itself. Things Kept Unchanged XML encoding of the configuration data (although XML format is less relevant since there is no <edit-config>). RFC 6241 framing (although this took effort to implement if memory is tight). 16 / 22

NETCONF Light Implementation Experience Characteristics Contiki NETCONF Light implemented on AVR Raven motes (Class 1 devices, 16 KiB RAM, 128 KiB Flash) Uses NETCONF over plain TCP instead of SSH or TLS Uses Contiki s Coffee File System to store the configuration (and we had lots of fun with its implementation) Supports all the NETCONF operations as described before Memory Consumption 13 KiB RAM (10 KiB Contiki, 0.5 KiB System Manager, 2.6 KiB NETCONF) 87 KiB Flash with 12 KiB reserved for the four files in the Coffee File System Further code optimizations are possible and file sizes in flash memory can be adapted 17 / 22

Discovery (mdns) and Infrastructure (NTP, SYSLOG) 1 SNMP on Constrained Devices 2 NETCONF on Constrained Devices (NETCONF Light) 3 Discovery (mdns) and Infrastructure (NTP, SYSLOG) 4 Summary and References 18 / 22

mdns and SYSLOG and NTP Multicast DNS for network management service discovery Managers use mdns to discover manageable devices Devices discover management services via mdns Contiki-mDNS implementation already running <draft-schoenw-opsawg-nm-srv-02.txt> SYSLOG for logging Minimal SYSLOG implementation Using mdns to discover a SYSLOG server Fallback assumes the default router can handle SYSLOG NTP for time synchronization Minimal NTP client to pickup a notion of time 19 / 22

Summary and References 1 SNMP on Constrained Devices 2 NETCONF on Constrained Devices (NETCONF Light) 3 Discovery (mdns) and Infrastructure (NTP, SYSLOG) 4 Summary and References 20 / 22

Implementations at Jacobs University &'3%)*%+,-% 3'(%)*%+0-% D5E8% /'2%)*%+,-% 3'&%)*%+0-% 8E-"%.% E9>:FGH% J'3%)*%+,-% 3'7%)*%+0-% KAA"%.% IF0"% L% 89:;<=>?%@5A18B%A18B%9>:'C% 6%)*%+,-%.%&'7%)*%+0-% 45"% &'6%)*%+,-%.%3'7%)*%+0-%!"#$% &&'(%)*%+,-%.%&'/%)*%+0-% AI"% J%)*%+,-%.%3'7%)*%+0-% +"1% 2'(%)*%+,-%.% 3'3&%)*%+0-% 21 / 22

References J. Ko, A. Terzis, S. Dawson-Haggerty, D. E. Culler, J. W. Hui, and P. Levis. Connecting Low-Power and Lossy Networks to the Internet. IEEE Communications Magazine, 49(4):96 101, April 2011. S. Kuryla and J. Schönwälder. Evaluation of the Resource Requirements of SNMP Agents on Constrained Devices. In Proc. of the 5th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2011), number 6734 in LNCS, pages 100 111. Springer, June 2011. J. Schönwälder, H. Mukhtar, S. Joo, and K. Kim. SNMP Optimizations for Constrained Devices. Internet Draft <draft-hamid-6lowpan-snmp-optimizations-03.txt>, ETRI, Jacobs University, Ajou University, October 2010. J. Schönwälder, T. Tsou, and C. Zhou. DNS SRV Resource Records for Network Management Protocols. Internet-Draft (work in progress) <draft-schoenw-opsawg-nm-srv-02>, Jacobs University, June 2011. V. Perelman, J. Schönwälder, and M. Ersue. Network Configuration Protocol for Constrained Devices (NETCONF Light). Internet-Draft (work in progress) <draft-schoenw-netconf-light-00>, Jacobs University, Nokia Siemens Networks, June 2011. K. Korte, A. Sehgal, and J. Schönwälder. Definition of Managed Objects for the IPv6 Routing Protocol for Low power and Lossy Networks (RPL). Internet Draft <draft-sehgal-roll-rpl-mib-01>, Jacobs University, March 2011. 22 / 22