Chapter 19: Network Management Business Data Communications, 5e.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

1 1/15/ :37 Chapter 14Network Management1 Rivier College CS575: Advanced LANs Chapter 14: Network Management.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Introduction to Network Management
Implementing a Highly Available Network
Chapter 19: Network Management Business Data Communications, 4e.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Network Management: SNMP
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 16 Network Management.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
ECE Prof. John A. Copeland Office: Klaus or call.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Fundamentals of Network Management
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
CS 453 Computer Networks Lecture 22 Network Management.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
Chapter 19: Network Management Business Data Communications, 4e.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
1 Overview of Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management Security
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Introduction to Network Management.
Ch 9. Network Management Myungchul Kim
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
or call for office visit, or call Kathy Cheek,
Computer and Information Security
Chapter 19: Network Management
Network Management: SNMP
Lec 5: SNMP Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
An Introduction to Computer Networking
Fundamentals of Network Management
Chapter 4 Network Management Standards and Models
Chapter 4 Network Management Standards and Models
Network Management Security
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Chapter 19: Network Management Business Data Communications, 5e

2 Fault Management A fault is an abnormal condition that requires management attention (or action) to repair Fault is usually indicated by failure to operate correctly or by excessive errors Users expect quick and reliable resolution

Business Data Communications, 5e3 Responding to Faults When faults occur, it is critical to quickly: –Determine exactly where the fault is –Isolate the rest of the network from the failure so that it can continue to function without interference –Reconfigure or modify the network to minimize the effect of removing the failed component(s) –Repair or replace the failed components to restore the network to its initial state

Business Data Communications, 5e4 User Requirements for Fault Management Tolerant of occasional outages, but expect speedy resolution Requires rapid and reliable fault detection and diagnostic management functions Impact and duration of faults can be minimized with redundancy Good communication with users about outages and faults is critical

Business Data Communications, 5e5 Accounting Management Reasons for accounting management: –Internal chargebacks on network use –User(s) may be abusing access privileges and burdening the network at the expense of other users –Users may be making inefficient use of the network –Network manager can plan better for network growth if user activity is known in sufficient detail. Accounting reports should be generated under network manager control. Facility must provide verification of users' authorization to access and manipulate accounting information

Business Data Communications, 5e6 Configuration Management Concerned with: –initializing a network and gracefully shutting down part or all of the network –maintaining, adding, and updating the relationships among components and the status of components themselves during network operation Operations on certain components should be able to be performed unattended Network manager needs the capability to change the connectivity of network components Users should be notified of configuration changes

Business Data Communications, 5e7 Performance Management Issues of concern to the network manager include: –What is the level of capacity utilization? –Is there excessive traffic? –Has throughput been reduced to unacceptable levels? –Are there bottlenecks? –Is response time increasing? Network managers need performance statistics to help them plan, manage, and maintain large networks

Business Data Communications, 5e8 Security Management Concerned with –generating, distributing, and storing encryption keys –monitoring and controlling access to networks –access to all or part of the network management information –collection, storage, and examination of audit records and security logs Provides facilities for protection of network resources and user information Network security facilities should be available for authorized users only

Business Data Communications, 5e9 Network Management Systems Collection of tools for network monitoring and control, integrated in these ways: –A single user-friendly operator interface for performing most or all network management tasks –A minimal amount of separate equipment Consists of incremental hardware and software additions implemented among existing network components Designed to view the entire network as a unified architecture, and provide regular feedback of status information to the network control center

Business Data Communications, 5e10 Network Management System Architecture

Business Data Communications, 5e11 Components of the NMS All nodes run the Network Management Entity (NME) software Network control host or manager runs the Network Management Application (NMA) Other nodes are considered agents

Business Data Communications, 5e12 Network Management Entity Collection of software contained in each network node, devoted to the network management task Performs the following tasks: –Collect statistics on communications and network-related activities. –Store statistics locally –Respond to commands from the network control center –Send messages to NCC when local conditions undergo a significant change

Business Data Communications, 5e13 Simple Network Management Protocol (SNMP) Originally developed for use as a network management tool for networks and internetworks operating TCP/IP. A collection of specifications that include the protocol itself, the definition of a database, and associated concepts. Network Management Model –Management station –Agent –Management information base –Network management protocolP

Business Data Communications, 5e14 SNMPv1 Configuration

Business Data Communications, 5e15 Role of SNMPv1

Business Data Communications, 5e16 SNMPv2 Released in 1992, revised in 1996 Addressed functional deficiencies in SNMP Accommodates decentralized network management Improves efficiency of data transfer

Business Data Communications, 5e17 Elements of SNMPv2 Each "player" in the network management system maintains local database of network management information (MIB) Standard defines information structure and allowable data types (SMI) At least one system must be responsible for network management; others act as agents Information exchanged using simple request/respond protocol, usually running over UDP

Business Data Communications, 5e18 Structure of Management Information (SMI) Defines framework within which a MIB can be defined and constructed –data types that can be stored –formal technique for defining objects and tables of objects –scheme for associating a unique identifier with each actual object in a system Emphasis on simplicity and extensibility

Business Data Communications, 5e19 SNMPv2 Protocol Operation Basic unit of exchange is the message –Outer message wrapper –Inner protocol data unit (PDU) Common fields in PDUs –Request-id field is an integer assigned such that each outstanding request can be uniquely identified. –Variable-bindings field contains a list of object identifiers; depending on the PDU, the list may also include a value for each object.

Business Data Communications, 5e20 SNMPv2 PDU Format

Business Data Communications, 5e21 SNMPv3 Released in 1998, addressed security deficiencies in SNMP and SNMPv2 Does not provide a complete SNMP capability; defines an overall SNMP architecture and a set of security capabilities for use with SNMPv2

Business Data Communications, 5e22 SNMPv3 Services User-Based Security (USM) model –Authentication –Privacy View-Based Access Control Model (VACM) –Access Control