By Sachin Kumar Korenga & Rochita Thakkallapally

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
Web Server Administration
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless Access Points (WAPs) or (APs)
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Basic Networking Components
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Fundamentals of Network Management
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Wireless Network Management Mohammad Rasol Saidat.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Introduction to Network Hardware
Wi-Fi Technology.
Wireless Networks Dave Abbott.
Local Area Network telecommunication 201
Outline What is Wireless LAN Wireless Transmission Types
TCP/IP (Original) Application Transport Internet Network Access TCP/IP
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Instructor Materials Chapter 6 Building a Home Network
Lec 5: SNMP Network Management
Part III. Data Link Layer
Chapter 4 Computer Networks – Part 2
Ad-hoc Networks.
Computer Networking Devices
RMON.
Network connectivity to the legacy wired LAN
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Administration CNET-443
Wireless LAN Security 4.3 Wireless LAN Security.
Ethernet LAN 1 1.
Chapter 8: Monitoring the Network
Network Models, Hardware, Protocols and number systems
Fundamentals of Network Management
Lec 5: SNMP Network Management
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Wireless LAN Technology
Instructor: Mort Anvari
Network connectivity to the legacy wired LAN
Chapter 4 Network Management Standards and Models
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Chapter 4 Network Management Standards and Models
Network Monitoring System
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Standards, Models and Language
Presentation transcript:

By Sachin Kumar Korenga & Rochita Thakkallapally Wireless Local Area Network Wireless LAN Management For Device Monitoring By Sachin Kumar Korenga & Rochita Thakkallapally

Introduction One of the fastest growing sectors in telecommunication and network industry is WLAN. According to a news the number of Americans using public WLANs in 2007 were 21,000,000+(millions). The advantages of WLAN over wired networks are (management of such wireless network are challenging.) Hierarchical topology of WLAN (Mobile Units associate with Access Point). MUs roaming from one AP to another. Many MUs don't have SNMP agent installed because of resource limitations. Security problems.

Wireless LAN Management : WLAN networks under IEEE 802.11a, b and g standards introduce new challenges in network management. Data quality maintenance, and signal strength assurance, authentication, network statistics data collection this are the challenges. 802.11: 802.11 works utilizing the Transmission Control Protocol/Internet Protocol (TCP/IP). 802.11 protocol is that it was intended to work in the 2.4 GHz Industrial-Scientific-Medical band. The 802.11 protocol characterizes a medium access control (MAC) layer, a MAC management and services layer, and 3 physical layers.

802.11b: 802.11b backings data transmission up to 11 Mbps, comparable to traditional Ethernet. 802.11b uses the same unregulated radio signalling frequency (2.4 GHz) as the first 802.11 standard. The 802.11b standard has more similitude's to the 802.11 standard by keeping up a similar MAC and interface utilizing a similar frequency band, 2.4 GHz ISM band. 802.11a: While 802.11b was in development, IEEE created a second extension to the original 802.11 standard called 802.11a. Because of its higher cost, 802.11a is generally found on business systems while 802.11b better serves the home market. 802.11a backings data transmission up to 54 Mbps and signals in a regulated frequency range around 5 GHz.

This higher frequency contrasted with 802. 11b shortens the range 802 This higher frequency contrasted with 802.11b shortens the range 802.11a systems. This standard was produced to offer higher data. 802.11g: The 802.11g standard was discharge in 2002 by the IEEE, characterizing new data rates up to 54 Mbps. Once more, there was no change to the MAC and interface layers of the 802.11 standard with the frequency band staying in the 2.4 GHz ISM band. 802.11g backings bandwidth up to 54 Mbps, and it utilizes the 2.4 GHz recurrence for more higher range.

Limitations : In today’s wireless networks, 802.11b and 802.11g are the two most common technologies used by enterprises and service providers for wireless user coverage. Radio interference is a serious issue that affects the performance of any wireless network. Radio interference can also cause transmission errors. In general WLAN management system will provide Configuration management. Performance management . Real-time monitoring. Fault management. Security management.

Simple Network Management Protocol All vendors of network-based components, computers, ridges, routers, switches. etc.. offer SNMP. There are three versions of SNMP current existing SNMP1, SNMP2 and SNMP3. Three key components of SNMP 1)Network management system (NMS) 2)Management agent 3)Management Information Base(MIB)

Existing NMSs Evaluation Some interesting management tools and software packages are introduced recently for WLAN applications i.e., Cisco Works by Cisco Systems, AMP by Airwave. The ideal candidate for the wireless NMS demands Open source Easy portable to multiple platforms especially linux Implemented in java and XML. OpenNMS Analysis Three main functional areas Determine the node and service availability provided by all the host of network Gather performance data from its monitored devices if these devices have a SNMP agent on it and store data in Round-Robin Database(RRD) Provide event management and notification system to monitor the changes happened in the network.

OpenNMS Architechture SNMP Data Collection System administrator configured XML files before the openNMS starts. Start OpenNMS and discover, daemon will retrieve IP information from configuration files. Discover checks node/interface table to see if the IP information already in it or not.

4. Discovery ping network to see if the non exiting IP address valid or not. 5. If the host exists generate a New Suspect event and send to both capsed and eventd. 6. Then capsd checks whether the device supports SNMP, and updates the information in database. 7. If the SNMP is supported, both eventd and collectd daemon will be notified. 8. If SNMP is supported, collector will retrieve MIBs information from host using SNMP get, set, etc. 9. Stores the event information in the event table. Lastly, user may review event information using web browser.

Association Data Storing: OpenNMS Limitations: It cant represent the tiered network structure of wireless local network such as how many mobile devices is associated with an access point and which device is associated with a specific access point. It cant monitor the performance of the devices because many mobile devices doesnt support SNMP. Association Data Storing: OpenNMS stores collected data into RRD repository. AP Information Collection: Collect data from monitored devices, calls SnmpCollector program to collect SNMP data from SNM supported devices.

Authentication: Authentication operation is achieved by set the AP's security MIB category.

Notification: Conclusion: If the performance of WLAN drops, an alert message will be sent to any devices which are aware of wireless devices performance. Conclusion: we have describe 802.11 protocol type, some wireless technology and there limitations, implementation of NMS based WLAN management technology which is based on openNMS framework.

Thank you.