Top-Down Network Design



Similar documents
Introduction to Network Management

Chapter 18. Network Management Basics

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

SNMP Network Management Concepts

Network Management System (NMS) FAQ

Network Management Basics

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Cisco Performance Visibility Manager 1.0.1

Network Management & Security (CS 330) RMON

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Using RMON to Manage Remote Networks Gilbert Held

How To Understand and Configure Your Network for IntraVUE

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

SolarWinds Certified Professional. Exam Preparation Guide

Network Management and Monitoring Software

Introduction to Simple Network Management Protocol (SNMP)

Network Management Functions - Performance. Network Management

Zarządzanie sieciami telekomunikacyjnymi

VLANs. Application Note

NMS300 Network Management System

Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case.

Network Management Functions RMON1, RMON2. Network Management

Lecture 12: Network Management Architecture

A Summary of Network Traffic Monitoring and Analysis Techniques

Layer 3 Network + Dedicated Internet Connectivity

Network Monitoring. RMON-Based vs. Localized Analysis. White paper. w w w. n i k s u n. c o m

CiscoWorks Internetwork Performance Monitor 4.0

IP Telephony Management

SNMP Basics BUPT/QMUL

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

AdSec: A System for Adaptive Network Security

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

Network performance and capacity planning: Techniques for an e-business world

Top-Down Network Design

Lecture 18: Telecommunications Management Network (TMN)

Cisco Advanced Services Network Management Systems Architectural Leading Practice

SNMP Monitoring: One Critical Component to Network Management

Chapter 19: Network Management. Business Data Communications, 5e

Cisco Change Management: Best Practices White Paper

MANAGING NETWORK COMPONENTS USING SNMP

NNMi120 Network Node Manager i Software 9.x Essentials

Top-Down Network Design

Presented by Aurang Zeb 14CS-03. Network Management System

TELE 301 Network Management

Simple Network Management Protocol (SNMP) Primer

CCT vs. CCENT Skill Set Comparison

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Overview of Routing between Virtual LANs

Designing for Cisco Internetwork Solutions

RuggedCom Solutions for

PROACTIVE PERFORMANCE MANAGEMENT

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform

Network Management - SNMP

Management Tools, Systems and Applications. Network Management

Simple Network Management Protocol

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Traffic Monitoring in a Switched Environment

SNMP. Simple Network Management Protocol

OAM Operations Administration and Maintenance

State of Texas. TEX-AN Next Generation. NNI Plan

Carrier Ethernet: New Game Plan for Media Converters

Top-Down Network Design

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Frame Relay Service Customer Network Management Implementation Agreement FRF.6

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

VectaStar NMS A GUIDE TO VECTASTAR NETWORK MANAGEMENT

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Performance Management

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Network Security Policy: Best Practices White Paper

L2 / L3 Switches. Remote Network Monitoring (RMON) Configuration Guide

Network Troubleshooting with the LinkView Classic Network Analyzer

Cisco Networking Professional-6Months Project Based Training

A Framework for End-to-End Proactive Network Management

Avaya TM G700 Media Gateway Security. White Paper

A Guide to Understanding SNMP

Avaya G700 Media Gateway Security - Issue 1.0

Lesson 5-2: Network Maintenance and Management

Network Management (NETW-1001)

End-to-End Network Centric Performance Management

Seminar Seite 1 von 10

Chapter 1 Personal Computer Hardware hours

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

GPRS and 3G Services: Connectivity Options

Gaining Operational Efficiencies with the Enterasys S-Series

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

UPPER LAYER SWITCHING

Huawei esight Brief Product Brochure

Simple Network Management Protocol

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Study of Network Performance Monitoring Tools-SNMP

Lecture 5: Foundation of Network Management

Planeamento e Gestão de Redes. Análise de Requisitos

Simple Network Management Protocol

Transcription:

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve availability, performance and security goals Think about scalability, data formats, and cost/benefit tradeoffs Monitor resource usage to measure the performance of devices Plan the format to save data in carefully 30 Page 15

Proactive Network Management Means checking the health of the network during normal operations in order to recognize potential problems, optimize performance and plan upgrades Collect statistics and conduct tests on a routine basis Recognize potential problems as they develop Optimize performance Plan upgrades appropriately 31 Network Management Processes The ISO defines 5 types of network management processes - FCAPS : Fault management Configuration management Accounting management Performance management Security management 32 Page 16

Fault Management Refers to detecting, isolating, diagnosing, and correcting problems It includes processes for reporting problems to end users and managers and tracking trends related to problems Users expect quick resolution A variety of tools exist to meet fault management requirements, including monitoring tools 33 Configuration Management Helps a network manager keep track of network devices and maintain information on how devices are configured Can define and save a default configuration for similar devices, modify the default configuration for specific devices and load the configuration on devices Facilitates change management. Use dynamic configuration protocols and tools 34 Page 17

Accounting Management Keep track of network usage by departments or individuals Facilitates usage-based billing whereby individual departments or projects are charged for network services Can help control abuses of the network 35 Performance Management Two types should be monitored: End-to-end performance management measures performance across an internetwork. Availability, capacity, utilization, delay, delay variation, throughput, reachability, response time, errors, and the burstiness of traffic Component performance measure the performance of individual links or devices 36 Page 18

Performance Management (Cont d) Often involves polling remote parts of the network to test reachability and measure response time Large networks it may be impossible to do Use protocol analyzers or SNMP tools to record traffic loads Can include processes for recording changes in routes between stations 37 Security Management Lets a network manager maintain and distribute passwords and other authentication and authorizing information One important aspect is a process for collecting, storing, and examining security audit logs Collecting audit data can result in a large accumulation of data. Keep to a minimum by keeping data for a shorter period time and summarizing it 38 Page 19

Network Management Architecture A network management system (NMS) Agents Managed devices Management Information Bases (MIBs) 39 Network Management Architecture Consists of 3 major components A managed device, is a network node that collects and stores management information, can be routers, servers, switches, bridges, etc. An agent is network management software that resides in a managed device. Tracks local management information A network management system (NMS) runs applications to display management data, monitor and control managed devices and communicate with agents Managed devices, agents and NMSs arranged in a topology that fits into the internetwork topology 40 Page 20

In-Band Versus Out-of-Band Monitoring With in-band monitoring, network management data travels across an internetwork using the same paths as user traffic With out-of-band monitoring, network management data travels on different paths than user data Out-of-band monitoring make the network design more complex and expensive 41 Centralized Versus Distributed Monitoring Centralized monitoring all NMSs reside in one area of the network, often in a corporate Network Operations Center Distributed means that NMSs and agents are spread out across the internetwork A manager-of-managers (MoM) can be used to as a centralized NMS to received data send from distributed NMSs In a MoM architecture, distributed NMSs can filter data before sending it A disadvantage is distributed management is complex and hard to manage 42 Page 21

Selecting Tools and Protocols for Network Management You can meet most customer s needs by recommending Simple Network Management Protocol (SNMP) and Remote Monitoring (RMON) tools 43 Simple Network Management Protocol Supported in most commercial network management systems. SNMPv2 is growing in used. It increases vendor interoperability by more rigorously defining the specification Consists of 3 components RFC 1902 defines mechanisms for describing and naming parameters that are managed by SNMPv2 RFC 1905 defines protocol operations for SNMPv2 Management Information Bases (MIBs) define management parameters that are accessible via SNMP SNMPv3 should gradually supplant versions 1 and 2 because it offers better authentication 44 Page 22

Remote Network Monitoring (RMON) Was developed in the early 1990s to address shortcomings in the standard MIBs which lacked the ability to provide statistics on data-link and physical-layer parameters Gathers statistics on CRC errors, Ethernet collisions, packet-size distribution, number of packets in and out Lets a manager set thresholds for network parameters and configure agents to automatically deliver alerts to NMSs. Provides network managers with information about the health and performance of the network segment on which the RMON agent resides 45 Estimating Network Traffic Caused by Network Management After determining management protocols to use, you can estimated the amount of traffic caused by network management Determine which network and device characteristics will be managed Should included reachability information, response-time measurements, network layer address information, and data from the RMON MIB or other MIBs 46 Page 23

Summary Determine which resources to monitor, which data about these resources to collect, and how to interpret that data Develop processes that address fault, accounting, configuration, performance, and security management Develop a network management architecture Select management protocols and tools 47 Review Questions How does a security plan differ from a security policy? Why is it important to achieve buy-in from users, managers, and technical staff for the security policy? What are some methods for keeping hackers from viewing and changing router and switch configuration information? How can a network manager secure a wireless network? 48 Page 24

Review Questions Why is network management design important? Define the five types of network management processes according to the ISO. What are some advantages and disadvantages of using in-band network management versus out-of-band network management? What are some advantages and disadvantages of using centralized network management versus distributed network management? 49 Page 25