Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.

Slides:



Advertisements
Similar presentations
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Advertisements

1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Protocols and the TCP/IP Suite
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
OIS Model TCP/IP Model.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Page 1 - © Richard L. Goldman Networking The OSI Model ©Richard L. Goldman March 29, 2001.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 1 Overview Review Overview of demonstration network
Chapter 2 Network Models
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocols and the TCP/IP Suite
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
The OSI Model.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Spring 2006Computer Networks1 Chapter 2 Network Models.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
Data Communication Network Models
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks.
Networking Devices.
ISO/OSI Model and Collision Domain
Layered Architectures
Protocols and the TCP/IP Suite
Chapter 3: Open Systems Interconnection (OSI) Model
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols and the TCP/IP Suite
Presentation transcript:

Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin

Outline Network Components Overview of Network Management

Communication Architecture A communication architecture integrates many protocols and the software that implements them. These parts can be developed independently of one another as long as the developers adhere to the standard interfaces between them.

OSI Reference Model

The model does not specify how to implement the function in each layer. The functions in each layer are defined by protocol, which are implemented in software. The software in each layer provides services to the layer above it. Layering concept simplifies the development process and allows improvements of software in one layer without affecting other layers.

Physical Layer This layer defines the electrical, mechanical, functional specifications for hardware that connects a device to the network. Physical layer standards would specify  Connector’s size and shape  Exact number of pins  The signals that can be used to those pins

Data Link Layer This layer specifies the procedures in order to achieve reliable point-to-point transfer of information between two devices. Data link layer can be divided into two sublayers.  Logical Link Control  Medium Access Control

Data Link Layer (cont’d) CSMA/CD is implemented in Ethernet. CSMA means that a computer waits until there is no signal from any other computer on LAN before transmitting a message. CD reduces the probability that a collision will occur by backoff its transmission. Bridge is a typical device working on data link layer.

Network Layer This layer provides the mechanisms for transporting a packet from the source networks to the destination network. Packets are messages constructed by the network layer and higher layers. A router is called a network layer device because it is controlled by protocols up to and including the network layer.

Transport Layer Transport layer provides reliable and unreliable transport protocols. The reliable protocol, which is called the Transport Control Protocol (TCP), provides the mechanisms that enable end-to-end reliability. TCP accomplishes this by the use of automated acknowledgement and automated retransmissions.

Transport Layer (cont’d) The unreliable transport protocol, which is called the User Datagram Protocol (UDP), places no constrains on the network. Best-effort delivery from the source device to the destination device is all that is required. UDP is used when speed is of the essence and the effort spent on ensuring reliability is not cost-effective.

Session Layer The Session layer provides the mechanisms necessary to open and close multiple logical connections between processes on different PCs. These logical connections are called session. Many logical connections can use the same physical connection.

Presentation Layer This layer provides a common representation of data transferred between peer application layer entities on different stations. Abstract syntax notation.one (ASN.1) format is useful for application layer. However, the layers below the presentation layer use a formant call transfer syntax. The presentation layer translates between ASN.1 and transfer syntax.

Application Layer Common Application Service Elements provide service generally useful to a variety of application programs provided by vendors. Specific Application Service Elements service the additional needs of particular application programs.

Frames Frame construction  Application program makes a request.  The request is passed to the appropriate application-layer-entity.  The application-layer-entity constructs an Application layer protocol data unit (PDU).  The Application layer PDU is then passed to the appropriate presentation-layer- entity. This entity constructs a Presentation layer PDU.

Frames (cont’d)  PDUs continue to be constructed and passed to the layers below. This process continues until the Network layer PDU is received by the Data Link layer.  The frame is construct in the Data Link layer. The Network Layer PDU is encapsulated in a Data Link layer header and trailer.

Frames (cont’d)

TCP/IP Protocol Stack

Network Device Workstations Servers Repeaters Hubs Bridges Switches Routers Probes

Workstations Workstations typical make use of the services of all layers of a protocol stack because they process the requests of application programs for information on servers. Server is like workstation making use of all layers of the protocol stack.

Repeater Repeater amplifies the signal between segments and extends the length of a LAN. Repeaters are used on 10BASE2 and 10BASE5 LANs.

Hubs A hub is a repeater with many input and output ports. Every transmission received by the hub on one port is amplified and retransmitted out of all other ports. Hub do not examine information in any field of the frame. Repeaters and hubs are consider a Physical layer device.

Bridges Transparent bridge  divides a LAN into segments that use the same media access control specification and it controls what traffic is passed between segments.  uses bridge table to learn which devices are on which segments. Translating bridges connects networks using different MAC layer specifications.

Bridges (cont’d) Errors and collisions that take place on one segment are not propagated to devices on the other segment. The use of switches rather than bridges is commonplace today.

Switches A switch is a multiport bridge. Switches are typically configured to forward incoming frames to outgoing ports based on destination MAC addresses associated with those ports in the switch table. Switches also can be configured to drop frames based on MAC destination or to redirect frames to other MAC address.

Switches (cont’d) Higher layers of the protocol stack are now being implemented in switches. Layer 3 switch also can function like router.

Routers Router reads the Network layer header in packet to find the destination network address and then looks up the address in routing table. The routing table is a list of mappings of network addresses to ports that will get the packet to the destination networks by the best means.

Routers (cont’d) Routing table

Probes Probes are tools for learning about the details of the communication between devices. Probes can be placed on a network and the information they gather transferred to the Management Station fro analysis of the traffic.

Outline Network Components Overview of Network Management

Network Management Jobs of network management in early day  Attaching PCs and server to a LAN using Network Interface Cards (NICs)  Installing protocol stacks  Configuring NIC I/O addresses and interrupts so as not to conflict with other NIC selections.  Using Ping application to ensure that all devices on the network could communicate with one another

Network Management (cont’d) Access control  The manager might write a script for the server to control access to information on it.  The script would provide access to drives, folders or files that use or group of users needed.  Install a print server to manage the print jobs from each of the PCs.

Network Management (cont’d) Network configuration  If the networks were to be divided into subnets, then a bridge would be used to connect them.  The manager would configure a routing table to enable connectivity according to network address, subnet address and subnet mask.  Finally, installing user applications on PCs is necessary for interfacing correctly with OS.

Maintenance After configuring primary network ingredients, here comes the maintenance. Network performance is not optimized, there will be software and hardware failures and network resources will change. The manager is required to make estimates of the network capacity. There was a need for minimal security.

Maintenance (cont’d) New work management has divided into specialties nowadays. Administration  Backing up servers  Maintaining security  Installing OS and applications Network engineer  Be responsible for the health of the network and its availability to user.

Network-Based Management As network has grown larger and more complicated, network manager needed to find more efficient way to determine and control the state of network. Some protocols could be used by network manager to remotely control devices.  Simple Network Management Protocol (SNMP)  Management Information Base (MIBs)  Network Management Systems (NMS)

Network Management Protocol Stack Management Station and Management Agent.

Network Management Example Step 1  NMS calls for the service of the management process Step 2  the management process call the program the implements network management protocol. Step 3  NMP constructs a request packet to the program on the management agent. Step 4  NMP on the management agent cause the request packet to be passed to the agent process.

Network Management Example (cont’d) Step 5  The agent process accesses the value of the requested variable and passes it to NMP. Step 6  NMP constructs the response packet which is sent back to the management station. Step 7  At the management station the program that implements the NMP receives the response packet. Step 8  The management process passes the requested value to the application program.