Network Management (NETW-1001)



Similar documents
System and Network Management

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

SNMP....Simple Network Management Protocol...

TELE 301 Network Management

SNMP Basics BUPT/QMUL

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Lecture 18: Telecommunications Management Network (TMN)

Outline of the SNMP Framework

SNMP and Network Management

SNMP Simple Network Management Protocol

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Simple Network Management Protocol

Network Management & Monitoring Introduction to SNMP

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Lecture 5: Foundation of Network Management

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

Simple Network Management Protocol

SNMP. Simple Network Management Protocol

Simple Network Management Protocol SNMP

R07. IV B.Tech. II Semester Regular Examinations, April, NETWORK MANAGEMENT SYSTEMS (Information Technology)

Network Monitoring & Management Introduction to SNMP

Introduction to Simple Network Management Protocol (SNMP)

Using SNMP for Remote Measurement and Automation

Network Management & Monitoring Introduction to SNMP

ITEC310 Computer Networks II

Introduction Network Management Framework Structure of Management Information Names Instances Syntax...

Simple Network Management Protocol

INTERNET MANAGEMENT PROTOCOLS TUTORIAL STOCKHOLM, SWEDEN 29 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1

Simple Network Management Protocol

Chapter 18. Network Management Basics

Network Management Functions RMON1, RMON2. Network Management

Presented by Aurang Zeb 14CS-03. Network Management System

Tik-109/ Telecommunications architectures:

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Brocade Product Training

Top-Down Network Design

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

SNMP Extensions for a Self Healing Network

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Simple Network Management Protocol

White Paper Case Study:

INTERNATIONAL TELECOMMUNICATION UNION

(Refer Slide Time: 1:17-1:40 min)

Comparison of SNMP. Versions 1, 2 and 3

Simple Network Management Protocol (SNMP) Primer

Network Data Monitoring and Analysis. Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay ĠBRĠKÇĠ Prepared by Çağla TERLĠKCĠOĞULLARI

SNMP SMI Structure of Management Information

The best network information. COPA-DATA know-how: SNMP with zenon

Introduction to Network Management

SNMP. Overview. LabTech

INTRODUCTION TO SNMP AND MIB

SNMP Protocol for Easy Network Management

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Management Functional Areas

Link Layer Discovery Protocol and MIB

Chapter 9 Network Management

Dave Perkins. September, SNMP MIB User,

NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm)

SNMP Network Management Concepts

Network Management - SNMP

Configuring Simple Network Management Protocol (SNMP)

Operations System. Data Communication Network. Exchange. Telecommunication network

Network Management. What is network management?

Network Management & Security (CS 330) RMON

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach

TECHNICAL NOTES. Technical Notes P/N REV A01. EMC ITOI VoIP Management Suite 8.1. May, 2012

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati

Chapter 9 Network Management

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Understanding the SCSI MIB

Monitoring the Firewall Services Module

A Guide to Understanding SNMP

What is it? SNMP. Agenda. Four Basic Elements

Visio Enabled Solution: One-Click Switched Network Vision

This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu

DigiPoints Volume 2. Student Workbook. Module 10 Network Management

THE SNMP PROTOCOL THE SNMP REQUEST MIB SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET SMART RADIO

Network Monitoring with SNMP

Simple Network Management Protocol

DC70 NETWORK MANAGEMENT JUN 2015

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

MANAGING NETWORK COMPONENTS USING SNMP

PA160: Net-Centric Computing II. Network Management

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Network Monitoring with SNMP

SNMP Agent Plug-In Help Kepware Technologies

Tenor SNMP Implementation

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

Helsinki University of Technology Department of Electrical and Communications Engineering Networking Laboratory

Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges

Telecommunications Management Network (TMN)

Table of Contents. Table of Contents

Transcription:

Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016

TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB

Remote Management A Network Management System (NMS) should implement the FCAPS management functions, but how? What are the functional and physical components of a NMS? This is addressed by several standards. We will examine the management framework for the Open Systems Interconnection (OSI) concept and the one for the Telecommunications Management Network (TMN). Both frameworks require that management tasks for network devices can be performed remotely. In other words, management information, such as device configuration, can be transmitted to/from devices in order to collect data or perform operations.

OSI Network Management Concepts The OSI network management model differentiates between: 1. Management system. It is comprised of managers, which are processes that monitor and perform operations on managed network elements. 2. Managed objects. These are network elements, they represent networking components/resources to be managed, e.g., a switch or an interface on arouter. They are characterized by their: Attributes that distinguish them. Notifications they may send to managers. Operations they accept from managers. Communications with other managed objects. Management system operations Managers Agent notifcations Managed Objects Managed system

OSI Network Management and Layers A set of managed objects + their attributes is called the Management Information Base (MIB). Agents and managers communicate using protocols and can reside in different open systems or the same system. In the case of system management application layer protocols are used. Sometimes, N-layer protocols are used. In this case, this is called N-layer management, since any entity at layer N+1 or above will not be managed. A protocol should distinguish between management information and other data that it may transfer. Manager Agent Layer-7 Layer-7 Layer-6 Layer-6 MIB Layer-5 Layer-5 Layer-4 Layer-4 Layer-3 Layer-3 Layer-2 Layer-2 Layer-1 Layer-1 Physical communication

A Simple Example Routers used for small home networks can be configured using a Web interface. This means that the router runs a web server, i.e., implements an HTTP server. This situation is depicted in the figure below: HTTP client, e.g. FireFox HTTP protocol Router running HTTP server Usually you can access the router configuration page by going to 192.168.0.0. The manager in this case is you/your HTTP client, the agent is the HTTP server running in the router. Note that the router is a layer-3 device, however the HTTP server is implemented just for management purposes.

OSI Network Mangement General Principles The OSI network management model is characterized by: The managing system contain processes called managers, while the managed system has agents. Mangers and agents communicate via protocols, usually at the application layer. An agent executes received operations and sends notifications. The actual network resources to be managed are called managed objects. A set of managed objects and their attributes is called a Management Information Base (MIB). The management functions are the FCAPS functions.

Telecommunications Management Network The Telecommunication Management Network (TMN) comprises a set of principles for the management of telecommunication networks. One of the main features is the separation between the network to be managed, i.e., network of telecommunication equipment, and the network of management systems. The management is therefore not centralized but takes place in a cooperative manner between managing systems. The main motivation is to facilitate the remote and automatic management of telecommunications equipment using standard interfaces. TMN defines 3 architectures according to point of view: Functional architecture. Information architecure. Physical architecture.

TMN Overview Other TMNs TMN Operations systems Data Communication Network (DCN) Work station Network of telecom. equipment Notice the following: Managed telecom. equipment in the telecom. network are called Network Elements (NE). TMN contains the DCN, Operations Systems (OS), and defines interfaces to the Work Station (WS) and NEs, hence the boundaries of the dashed rectangle.

TMN Functional Architecure The functional architecture of TMN distinguishes between: Function blocks: These are the smallest building blocks of TMN functionalities, i.e., they are atomic units that perform a certain service or a certain collection of services. Management Application Functions (MAFs): These are the management services offered by a TMN system and they are implemented in function blocks. TMN Management Functions: They are used for interaction between different MAFs in different function blocks. A set of these functions may be implemented in a single block. Reference points: They describe a function block s interface, i.e., its TMN management functions that are exposed for interactions with other function blocks.

TMN Functional Architecure Functional Blocks The following function blocks are defined: Network Element Function NEF: Provides the ability to a managed netwrok entity to be monitored and controlled. Operation Systems Function OSF: Provides the management capabilites, i.e., these are the brain blocks of the system taking care of the management tasks. Transformation Function TF: Provides the capabiltiy to translate between entities using different protocols of different information models. Workstation Function WSF: It provides an interface to human users. Moreover, the following classes of reference points are defined: q Class between OSF, TF and NEF. f Class between OSF and a WSF. x Class between OSFs of two TMNs or between the OSF of a TMN and its equivalent functionality of another network.

TMN Information Architecure During the exchange of management information, the following roles can be identified (similar to the OSI model): The managing role. The managed role. Moroever, the exchanged information is structured according to information models which contain information elements. An information element contains the attributes of a certain managed network resource.

TMN Physical Architecure The physical architecture describes actual network devices: Operations System (OS): Performs the operations system function. Transformation devices: Perform transformation functions, they are: Adaptation device: Allows the connection of non-tmn equipment to a TMN. Mediation device: Allows the connection of two TMN-enabled devices that use different communication mechanisms. Transformation devices are also categorized according to the reference point (interface) of their connection (q, f, or x). Network Element (NE): This is a piece of telecommunication equipment that can be monitored and controlled. It implements network element functions. Workstation (WS): It provides an interface for human interaction and therefore implements work station functions.

TMN A Wrap Up x Operations system Transformation device OSF q q Operations system OSF f WSF WS TF q q q NEF NEF NEF NE NE NE Across the f,q, and x reference points, information elements are exchanged. Figure: Overview of TMN showing physical/functional architectures

SNMP The Simple Network Management Protocol (SNMP) implements the ideas in the OSI model. Two roles exist: The manager and the agent. They exchange five types of messages that are listed below. The first three are from manager to agent, and the last two are from agent to manager. GET: Manager asks for a variable. GET NEXT: Manager asks for a variable. SET: Manager changes the value of a variable. GET RESPONSE: Agent replies to a GET request. TRAP: Agent notifies manager with an event. Why is it called simple? Small number of types of messages. It is based on a connectionless network sevice.

An overview MIB query Obj1 Manager response/trap Agent Obj2 NMS Network device What does an agent do? Monitor and control objects. What s an object? Something we need to monitor/configure. It can be a physical network element or any useful information about a device. It can be the temperature of switch, the status of a port in a router, etc. A Management Information Base (MIB) is a collection of objects.

Objects and MIBs The database of objects monitored by an agent is called a Management Information Base (MIB). So, how to describe an MIB? Or, how do we define objects? An MIB is described in a text file, whose syntax follows rules defined by a standard: The Structure of Management Information (SMI), which is an adapted subset of ASN.1. The MIB file defines the objects that we can monitor or configure, i.e., it is a declaration of what the snmp agent can do. Knowing the MIB that an agent supports, the NMS can talk to the agent using a protocol like SNMP without worrying about how the agent does its job. All agents must implement a standard MIB called MIB-II.

RMON and SNMP Remote Monitoring Remote MONitoring (RMON) consists in having a remote probe that gathers network statistics at the packet level. It needs to send this information to a NMS. RMON is incorporated into SNMP by defining the RMON MIB. An agent implementing this MIB can communicate with the NMS using SNMP.

Issues Involved when implementing SNMP The following are general issues that apply to SNMP or, in general, to any NMS: Automation of system responses/services, how autonomous is the system? Reactive: System notifies you, you decide on your own. Interactive: System notifies you and helps you to decide. Proactive: System notifies you and may initiate some action on its own. How to know the real cause of problems; 10 alarms caused by one fault. Correlation of fault logs. Security: Who manages what?

SNMP Implementation SNMP is an application layer protocol. Relies on UDP. SNMP PDUs are bit-oriented, i.e., it is a binary protocol (not a character protocol). UDP is unreliable but has low overhead. Follows the system network management concept of OSI, since it is at the application layer.

SNMP messages Two main purposes: Monitoring and configuration. SNMP version 1 defines five types of messages: GET: From manager to agent to inquire about the value of a certain object. GETNEXT: From manager to agent to inquire about the value of object(s) SET: From manager to agent to set the value of an object GETRESPONSE: From agent to manager as response to a get request. TRAP: From agent to manager to notify it with some information.

SNMP GET Informal definition The NMS wants to get some information from the agent about a certain managed object So, which managed object and what information? The object has to be one that is listed in the MIB implemented by the agent. Informal Syntax GET(RequestID request-id, ErrorStatus error-status, ErrorIndex error-index, VarBindList variable-bindings)

GET Parameters Name Type Description request-id RequestID An integer identifying the request. error-status ErrorStatus An enumeration of error codes {0, 1, 2, 3, 4, 5}. error-index ErrorIndex A number giving information about the error, if any. variable-bindings VarBindList A variable is an instance of a managed object. A variable binding is a variable name along with its value. A variable binding list is a sequence of variable bindings.

Variable Bindings Variable name + variable value A variable is an instance of a managed object. The object is a concept (a type or a class), whereas the instance (variable) is the actual entity whose value is of interest. So, an object may have multiple instances Structure of Management Information (SMI) defines the syntax used to specify objects in MIB files. To define an object, we need three pieces of information: Name or Object ID (OID) To identify the object Type or syntax What sort of values can this object have? Is it an integer, a string, a structure, etc. Encoding How is the object represented at the byte level

OID An object is any network element, e.g., a routing table. An Object ID (OID) is a numeric name of an object. An OID is a sequence of integers separated by dots, i.e., It has the form X.Y.Z... A collection of OIDs always has a tree structure, an OID specifies a node in this tree. Given the tree of OIDs, an OID is obtained by following the path leading to the OID starting at the root. The OID of an instance is the OID of its object X, followed by another sequence of numbers, e.g., X.0. The hierarchical naming scheme is useful for providing a naming structure and avoiding name collisions. The Structure of Management Information (SMI) standard defines a tree for OIDs, shown on the next slide.

Tree Structure of Names (OIDs) root The figure is taken from the book Essential SNMP, 2nd Edition By Douglas Mauro, Kevin Schmidt. To get the OID of the object SysLocation we follow the path leading to the object from the root and note the numbers. The path is shown in blue. OID of SysLocation is.1.3.6.1.2.1.1.6, an instance of SysLocation will have OID =.1.3.6.1.2.1.1.6.0 ccitt 0 iso 1 joint 2 org 3 dod 6 internet 1 directory 1 mgmt 2 experimental 3 private 4 mib-ii 1 enterprises 1 system 1 interfaces 2 Cisco 9 SysLocation 6 The Object ID (OID) of SysLocation is.1.3.6.1.2.1.1.6

Types of Objects OIDs identify objects and follow the tree-like hierarchical naming convention explained in the previous slide. We need to know what sort of values can an object have. This is defined by the object type. Object types (as defined by SMI can be: INTEGER: An integer. OCTETSTRING: A string of bytes. SEQUENCE: A sequence of other types. IpADDRESS: An IP address. etc.

Defining Objects So, knowing the SMI syntax, how do we define objects? Objects are defined in an MIB. The most basic syntax for defining objects is the following: object name OBJECT-TYPE SYNTAX The type ACCESS Read-only, read-write, not-accessible,... STATUS To indicate if this definition is current, obsolete, etc. DESCRIPTION Text describing the object ::={parent node index} Words in all upper-case letters are fixed keywords in the definitions of all objects.

Example of an Object Definition An interface table: iftable OBJECT-TYPE SYNTAX SEQUENCE OF IfEntry ACCESS not-accessible STATUS mandatory DESCRIPTION An IfTable is a sequence of Ifentries ::={ interfaces 2} Here the parent node is interfaces whose ID is.1.3.6.1.2.1.2, the definition of iftable means that it is a child of the interfaces node and its index is 2. Therefore the OID for iftable is.1.3.6.1.2.1.2.2

Security SNMP defines communities, which are classes of users (of managers). Three communities are defined: read-only can only read values of objects. read-write Can read and write values objects. trap can only receive traps from agents. Community strings are passwords of communities. A community string provides access privileges corresponding to a community.

How Does it All Work Together? MIB Manager query Obj1 MIBs response/trap Agent Obj2 NMS Network device The NMS is aware of objects through the MIBs that are loaded in it It sends, a GET request, by the manager to the agent asking for a specific variable binding. The agent checks its MIBs for the OID. If there is no match an error is generated and an error code is sent. If there is a match a response is issued and sent to the manager.