بسم اللّه الرّحمن الرّحیم. TCP/IP Protocol Suite لایه ‎ ها در پروتکل TCP/IP دقیقاً با مدل OSI تطابق ندارند. نسخه ‎ ی اصلی پروتکل TCP/IP با چهار لایه تعریف.

Slides:



Advertisements
Similar presentations
Steve Lewis J.D. Edwards & Company
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Chapter 19: Network Management Business Data Communications, 4e.
Keeping Tabs on Your Network First, a Horror Story Types of Management Tools What is SNMP? Dartmouth’s Net Management InterMapper demo Questions Rich Brown.
IS Network and Telecommunications Risks
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Modified by: Masud-Ul-Hasan and Ahmad Al-Yamani 1 Chapter 11 Network Management (Selected Topics)
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
SNMP and CMIP By, Vishwajit Singh Srigiri Laxman Srinivas ISQS 6341, Spring 2000.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Network security policy: best practices
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Network Problems and Solutions M. Sc. Juan Carlos Olivares Rojas
Management Functions and Reference Models W.lilakiatsakun.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Management Functions and Reference Models W.lilakiatsakun.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
1 Version 3.0 Module 11 TCP Application and Transport.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Event Management & ITIL V3
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Management Functions and Reference Models W.lilakiatsakun.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
NETWORK MANAGEMENT FCAPS.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
CEG 2400 FALL 2012 Chapter 15 Network Management 1Network Management.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Data Monitoring and Analysis Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay İBRİKÇİ Prepared by Çağla TERLİKCİOĞULLARI 1.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Monitoring Sukiswo
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
FCAPS The Seventh Meeting. TMN (Telecommunication Management Network) Reference Model & FCAPS.
CompTIA Security+ Study Guide (SY0-401)
Securing Network Servers
Chapter 19: Network Management
Lec 5: SNMP Network Management
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Lec 5: SNMP Network Management
Chapter 15: Network Monitoring and Tuning
Network Monitoring System
Presentation transcript:

بسم اللّه الرّحمن الرّحیم

TCP/IP Protocol Suite لایه ‎ ها در پروتکل TCP/IP دقیقاً با مدل OSI تطابق ندارند. نسخه ‎ ی اصلی پروتکل TCP/IP با چهار لایه تعریف شده است : دسترسی به شبکه، اینترنت، انتقال و کاربرد. اما وقتی TCP/IP با OSI مقایسه می شود می توان گفت که دارای 5 لایه است : فیزیکی، پیوند داده ‎ ها، شبکه، انتقال و کاربرد. 2

TCP/IP Protocol Suit vs. OSI Model 3

OSI Model and TCP/IP Protocol Suite 4

TCP/IP addressing چهار سطح آدرس ‎ دهی در پروتکل TCP/IP استفاده می شود : فیزیکی منطقی پورت آدرس خاصِ لایه ‎ ی کاربرد. 5

TCP/IP addressing 6

Relationship between addressing and layers 7

What is network management? Informal definition Formal definition 8

What is network management? Informal definition Network management refers to the activities associated with running a network, along with the technology required to support those activities. A significant part of running a network is simply monitoring it to understand what is going on. Analogy: Health Care (Intensive Care Unit) Throwing a party 9

What is network management? Formal definition Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. 10

What is network management? Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before a user is affected. Administration involves keeping track of resources in the network and how they are assigned. It deals with all the “housekeeping” that is necessary to keep things under control. Maintenance is concerned with performing repairs and upgrades. Provisioning is concerned with configuring resources in the network to support a given service. 11

ABC of network management (FCAPS) people often group management functions into a set of broad categories that are known as Fault, Configuration, Accounting, Performance, Security (FCAPS) Fault Configuration Accounting Performance Security 12

F is Fault Fault management deals with faults that occur in the network, such as equipment or software failures, as well as communication services that fail to work properly. Fault management is therefore concerned with monitoring the network to ensure that everything is running smoothly and reacting when this is not the case. 13

F is Fault The most important aspect of network monitoring concerns the management of alarms. Alarms are unsolicited messages from the network that indicate that some unexpected event has occurred, which in some cases requires operator intervention. Unexpected events such as:  router detects that one of its line cards is no longer working to a fire alarm  sudden drop in signal quality on a wireless link to a suspected intrusion into the network by an unauthorized user. 14

C is Configuration Configuration management includes functionality to perform operations that will deliver and modify configuration settings to equipment in the network. 15

A is Accounting Accounting management is all about the functions that allow organizations to collect revenue and get credit for the communication services they provide, and to keep track of their use. 16

P is Performance Performance management deals with monitoring and tuning your network for its performance. 17

S is Security management aspects that are related to securing your network from threats, such as hacker attacks, the spread of worms and viruses, and malicious intrusion attempts. 18

Network Management Protocol Simple Network Management Protocol (SNMP) SNMP v1 SNMP v2 SNMP v3 19

What is network monitoring? The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via , pager or other alarms. It is part of network management. 20

What is network monitoring? In network management terms, network monitoring is the phrase used to describe a system that continuously monitors a network and notifies a network administrator through messaging systems (usually ) when a device fails or an outage occurs. Network monitoring is usually performed through the use of software applications and tools. At the most basic level, ping is a type of network monitoring tool. 21

What is network monitoring? The process of obtaining the status and configuration information of the various elements of a computer system and consolidating that information. Information consolidation involves  Preparing reports  Cleaning of the raw-monitored information  Consolidation of the monitored information into more compact representations 22

Types of Monitored Information Status Information  Not be on  Turned on and functioning properly  Turned on but not functioning properly Configuration Information  All modifiable attributes of elements 23

Types of Monitored Information Usage Information  All attributes regarding Throughput of elements o Web server: Number of HTTP requests o Mail server: Number of messages processed o Router: Number of packets transmitted Number of active users an element supports Performance Statistics  Performance metrics such as Delay SNR 24

Types of Monitored Information Error Information Information about faults and incorrect operations at elements Topology Information Changes to the topology (Why just changes?) 25

Data Collection Techniques  Passive Observes the happenings in the system, via agents installed on devices.  Active Sends requests into the system in order to retrieve the desired information. 26

Passive Monitoring SNMP Traps: enable an agent to notify the management station of significant events by way of an unsolicited SNMP message 27

Active Monitoring Servers  Agent-based  Agent-less Networks  SNMP agents  Ping  Trace route 28

29 Question & Answer

Active Monitoring Applications –Each application is a manipulator of information –State of an application Set of information the application maintains –CRUD Transactions Read and some types of updates are safe for monitoring For other transactions –Use of dummy information »Dummy bank accounts »Dummy URLs –Two canceling transactions –N canceling transactions –Recovery mechanisms needed 30

Passive Monitoring Applications  Log files Locally processed Remotely processed Log rotation must be considered  Proxies Servers  Agents  Available commands and available standards  Server overloading must be considered 31