Network Management: Theory and Practice



Similar documents
Presented by Aurang Zeb 14CS-03. Network Management System

Network Management - SNMP

Introduction to Network Management

Top-Down Network Design

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Simple Network Management Protocol

UPPER LAYER SWITCHING

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Network Management Functions RMON1, RMON2. Network Management

Lecture 5: Foundation of Network Management

SNMP. Simple Network Management Protocol

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1

SNMP and Network Management

Network Management & Security (CS 330) RMON

Introduction to Simple Network Management Protocol (SNMP)

Chapter 18. Network Management Basics

Network System Design Lesson Objectives

SNMP Network Management Concepts

Simple Network Management Protocol (SNMP) Primer

MANAGING NETWORK COMPONENTS USING SNMP

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University

Network Management Basics

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Network Management Functions - Performance. Network Management

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

PROACTIVE PERFORMANCE MANAGEMENT

Tik-109/ Telecommunications architectures:

ITEC310 Computer Networks II

Local-Area Network -LAN

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

A network monitoring tool for student training

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

MANAGEMENT INFORMATION SYSTEMS 8/E

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

System Development and Life-Cycle Management (SDLCM) Methodology

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Comparison of SNMP. Versions 1, 2 and 3

Lesson 5-2: Network Maintenance and Management

BEA WebLogic Server. and BEA WebLogic Express. SNMP Management Guide

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Simple Network Management Protocol (SNMP)

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

R07. IV B.Tech. II Semester Regular Examinations, April, NETWORK MANAGEMENT SYSTEMS (Information Technology)

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

The OSI Model: Understanding the Seven Layers of Computer Networks

Outline of the SNMP Framework

SNMP Informant. SNMP Informant, the default Microsoft SNMP extension agents and WMI January 2009

Using RMON to Manage Remote Networks Gilbert Held

DC70 NETWORK MANAGEMENT JUN 2015

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Network Management Slide Set 3

INTERNET MANAGEMENT PROTOCOLS TUTORIAL STOCKHOLM, SWEDEN 29 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS

SNMP Basics BUPT/QMUL

A Guide to Understanding SNMP

Performance Management

Communications and Computer Networks

What is TCP/IP. Introduction to TCP/IP &216</ &216</ z Transmission Control Protocol/Internet Protocol

Local Area Networks (LANs) Blueprint (May 2012 Release)

Overview of Routing between Virtual LANs

NOS for Network Support (903)

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

Network Technology CMP-354-TE. TECEP Test Description

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking and IP Address

Using SNMP for Remote Measurement and Automation

SNMP Management in BS2000/OSD

A Summary of Network Traffic Monitoring and Analysis Techniques

OAM Operations Administration and Maintenance

Network Data Monitoring and Analysis. Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay ĠBRĠKÇĠ Prepared by Çağla TERLĠKCĠOĞULLARI

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Simple Network Management Protocol

An Overview of SNMP on the IMG

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

(Refer Slide Time: 1:17-1:40 min)

Network Troubleshooting with the LinkView Classic Network Analyzer

Chapter 2 - The TCP/IP and OSI Networking Models

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Cisco Change Management: Best Practices White Paper

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Simulation of an SNMP Agent: Operations, Analysis and Results

IT LABOR CATEGORY REQUIREMENTS AND DESCRIPTIONS

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Network Management System (NMS) FAQ

SNMP Diagnostics. Albert Kagarmanov, Matthias Clausen (DESY)

Transcription:

Network Management: Theory and Practice Fátima de Lima Procópio Duarte E-mail: fatima@pbh.gov.br Enterprise: Prodabel Phone:00-55-31-277-8356 Address:Av.Carlos Luz, 1275 Caiçara B.H. M.G. CEP 31230-000 BRAZIL Abstract The vertiginous growth of networks utilization, associated with their heterogeneous characteristics, are asking for mechanisms to management them. This work gives concepts about network management and presents considerations based on a practical case. 1) Introdution During the twenthieth century, the key technology has been information gathering, processing and distribution [5]. For the last ten years many organizations have implemented computer networks. Technological evolution is permiting the distributed systems implementation based on client/server architecture associated with effiency and low costs [2]. PC s and workstations interconnected are substituting mainframes. Networks and distributed processing systems are growing importance and, indeed, have become critical in the business world. Within a given organization, the trend is toward larger, more complex networks supporting more applications and more users. As these networks grow in scale, two facts become painfully evident [7]: The network and its associated resources and distributed applications become indispensable to the organization. More things can go wrong, disabling the network, a portion of the network, or degrading performance to an unacceptable level. A need of efficient operation, free of faults, has appeared with the importance of networks for the organizations [3]. The computer networks are compounded of diferent plataforms of hardware and software: several protocols, resources and services. A large network cannot be put together and managed by human effort alone. The complexity of such system requires automated network management tools to monitore and manage the resources utilization. 2) Network Management There are many definitions of network management [1]. The ISO s (International Organization For Standardization) one says that Network Management has mechanisms to monitore, control and coordinate OSI (Open System Interconnection)

environment s resources for the information exchange between these resources. It involves the areas of: fault: The facilities that enable the detection, isolation, and correction of abnormal operation. configuration: The facilities that exercise control over, identify, collect data from, and provide data. account: The facilities that enable charges to the established for the use of managed objects and costs to be identified for the use of those managed objects. performance: The facilities needed to evaluate the behavior of managed objects and the effectiveness of communication activities. security: The facilities that address those aspects of OSI security essencial to operate OSI network management correctly and to protect managed objects. In function of the distributed nature of the managed resources, network management is a distributed application based on concepts like objects, agents, managers, management information base (MIB) and protocols. Network devices, called objects,contain information about themselves. For example, every device has been configured with some selection of parameters. A device has a current status that indicates whether it is in healthy runing condition. Devices often keep internal statistics that count incoming and outgoing traffic and various observed errors [8]. It is convenient to think of the configuration, status, and statistical information in a device as forming a database. In reality, information may be stored at a device as a combination of switch settings, hardware counters, in-memory variables, in-memory tables, or files. This logical database of network management information is called a Management Information Base (MIB). We don t realy care about the internal, physical form of this data. But we are very interested in being able to access this data. Agent software is installed in each device. An agent receives incoming messages from a manager. These messages request reads or writes of the device s data. The agent carries out the request and sends back responses. An agent does not always have to wait to be asked for information. When a serious problem arises or a significant event occurs, the agent sends a notification message called a trap to one or more managers. Manager software at a management station sends request messages (polling) to agents and receives responses and spontaneous trap messages from agents. What protocol carries this messages? UDP is the preferred choice, but any transport protocol is acceptable. To a network management system, we need one or more applications that enable an end user to control the manager software and view network information. To complete the Network Management, the ISO s and ITU-T s (International Telecommunication Union- Telecommunication Standardization Sector) standards are based on the CMIP (Common Management Information Protocol) protocol and the IAB s (Internet Activity Board) are based on SNMP(Simple Network Management Protocol) protocol [6]. Because of the complexity of OSI systems, CMIP is not very easy to be implemented and will not be treated at this paper. Support for SNMP actually is a shorthand for the fact that hubs, bridges, routers, multiplexors, switchs, or whatever can

be managed, conform to the Internet-Standard Management Framework. This framework is easy to implement, is powerful, and opens up like a big umbrella to take more and more technologies under its protection. SNMP is described by the RFC1157 (May, 1990): Defines the messages that can be exchanged between a management station and a sytem to read or update variable values. Defines trap (alarm) messages that are sent by a system whose status is changing in a serious way. Deals with the nitty-gritty details of message formats and communications protocol specification. SNMP specifies for managing: All sorts of equipment - bridges, repeaters, ASCII terminals. Many types of interface technology - Point-to-Point, DS1, DS3, X.25, Frame Relay, Ethernet, Token -Ring, FDDI, and others. Popular proprietary protocols such as DECnet, Phase IV, and Appletalk. The simplicity of version 1 of SNMP contributed to its rapid implementation and acceptance. However, version 1 had some serious shortcomings. There was no reliable method of authenticating the source of network management messages. There was no way to secure the contents of network messages from network eavesdroppers. In April of 1993, SNMP version 2 was put onto the standards track. Version 2 addressed the authentication and security of management messages. It also contained useful protocol enhancements and improved the administrative framework for the maturing protocol suite. But version 2 has been criticized because of its complexity: it uses far greater system resources than version 1. The SNMP comunity has used an evolutionary approach to standardize what information should be kept in a device s MIB: Define groups of clearly useful parameters. After several months of field experience, fine-tune these groups. Throw away parameters that are not useful. Add new ones that are needed. Set up commitees of industry experts to define MIB variables for special technologies, such as bridges or Token-Ring interfaces. Add vendor-specific extensions that cover special features of a vendor s products. To get this level of flexibility, management information is structered as a tree, so that new banches can sprout whereever they are needed. SNMP was originaly developed to satisfy an immediate requirement to manage TCP/IP communications on the Internet. The first MIB, now called MIB-I, concentrated on information specific to TCP/IP. Sample variables from the originals MIB included: A system description The number of networking interfaces The IP address associated with each network interface Counts of the numbers of incoming and outgoing datagrams

A table of information about active TCP connections After deployment in the field, the basic definitions were clarified and many new definitions were added. The results were published in RFC1213: MIB-II. MIB-II has proved to be a robust basis for TCP/IP Management. At the time of writing, there were still network devices deployed that had not been upgraded from MIB-I to MIB-II. Life being what is, this probably will persist for some time. However, the good news is that, since MIB-II is compatible with MIB-I, management stations can work with agents that support either MIB. 3) Practical Recomendations Based on the Example of Network Management at Prodabel To customize a network management tool, this work based on the example of Prodabel s network management [4] suggests the division between areas, looking at: topology - faults, servers and links - performance utilization of resources - account control of distributed resources - configuration control of access - security The fault-monitoring system should assist in isolating and diagnosing the fault. Examples of tests that a fault-monitoring system should have at its command include a connectivity test data integrity test protocol integrity test data saturation test connection saturation test response-time test loopback test function test diagnostic test The most important Network Performance Indicators should be present in performance reports: Availability Response Time Accuracy Throughput Utilization Examples of resources that may be subject to accounting include the following: communications facilities computer hardware software and systems

services Configuration information describes: the nature and status of devices specification of the resources attributes of the resources Computer network security address three requirements: secrecy:information accessible only for reading by authorized parties integrity: assets can be modified only by authorized parties availability: assets are available to authorized parties 4) Conclusions The arrival of Pcs, worksations, LANs, and servers changed the shape of networks forever. Customers began to buy systems from different vendors. Network Management tools appeared to solve the chaotic situation of different plataforms talking with each other at the same time. There is a widely implemented protocol, SNMP, for network equipments of all types. To monitore a computer network by a manager station, it is necessary to buy a management software and customize it taking care on each parameter of the devices, depending on the information needed: of fault, of configuration, of performance, of security, of account. Bibliography [1] Brisa, Gerenciamento de Redes - Uma Abordagem de Sistemas Abertos, Makron Books, Brasil, 1993. [2] Duarte, Fátima de Lima Procópio Duarte, Simulação e Análise do Benchmark TPC-C, Dissertação de Mestrado apresentada ao Departamento de Ciência da Computação da Universidade Federal de Minas Gerais, Brasil, Janeiro de 1996. [3] Teixeira, Suzana de Queiroz Ramos e Oliveira, Mauro, Disponibilização do Conhecimento no Gerenciamento de Redes de Computadores, artigo, Brasil, XXIII Seminário Integrado de Hardware e Software, Agosto 1996. [4] GRC, Gerenciamento da Rede Municipal de Informática através do ISM, Prodabel, Brasil, Fevereiro de 1997. [5] Tanembaum, Andrew S., Computer Netwoks, Prentice Hall International Inc., USA, 1989. [6] Case, J., Fedor, M. Schoffstall, M. Davin, J., Network Management Protocol-SNMP, May 1990.

[7] Stallings, Willian, SNMP SNMPv2 and RMON, Addison-Wesley Publishing Company, 1996 [8] Feit, Dr. Sidnie, SNMP - A Guide to Network Management, McGrawHill, 1995