Management Functions and Reference Models W.lilakiatsakun.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 3: Planning a Network Upgrade
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
بسم اللّه الرّحمن الرّحیم. TCP/IP Protocol Suite لایه ‎ ها در پروتکل TCP/IP دقیقاً با مدل OSI تطابق ندارند. نسخه ‎ ی اصلی پروتکل TCP/IP با چهار لایه تعریف.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Network Management Functions
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lecture 11 Reliability and Security in IT infrastructure.
Understanding Network Failures in Data Centers: Measurement, Analysis and Implications Phillipa Gill University of Toronto Navendu Jain & Nachiappan Nagappan.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
Network security policy: best practices
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
OSS and BSS. Telecom Operation Map (TOM) Network and Systems Management Processes Service Development and Operations Processes Customer Care Processes.
Management Functions and Reference Models W.lilakiatsakun.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Network Management by Woraphon Lilakiatsakun. Course details Midterm 30 % Final 40 % LAB 20 % Assignment 10 %
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Basic Ingredients of Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Basic component of Network Management
Event Management & ITIL V3
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Management Functions and Reference Models W.lilakiatsakun.
Basic component of Network Management Woraphon Lilakiatsakun.
Basic component of Network Management Woraphon Lilakiatsakun.
IT Essentials: PC Hardware and Software v4.0. Chapter 4 Objectives 4.1 Explain the purpose of preventive maintenance 4.2 Identify the steps of the troubleshooting.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
Basic component of Network Management Woraphon Lilakiatsakun.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
NETWORK MANAGEMENT FCAPS.
Basic component of Network Management Woraphon Lilakiatsakun.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
CEG 2400 FALL 2012 Chapter 15 Network Management 1Network Management.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Monitoring Sukiswo
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
FCAPS The Seventh Meeting. TMN (Telecommunication Management Network) Reference Model & FCAPS.
SQL Database Management
Chapter 19: Network Management
Software Project Configuration Management
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing Multi-User Databases
Relation between information modeling and network operation
Network Management Functions
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec3: Network Management
Network management system
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec1: Introduction to Network Management
Presentation transcript:

Management Functions and Reference Models W.lilakiatsakun

TMN Layer Telecommunication Management Network Telecommunication Management Network A set of standards by ITU (International Telecommunication Union) A set of standards by ITU (International Telecommunication Union) It is a part of ITU Recommendation series M.3000 series It is a part of ITU Recommendation series M.3000 series

Management Layer (1) TMN-layer: a management hierarchy reference model

Management layer (2) TMN (Telecommunication Management Network) TMN (Telecommunication Management Network) –Network Element –Element Management –Network Management –Service Management –Business Management

Management layer (3) Network element Network element –It means “the management agent “ –It provides agent services, mapping the physical aspects of the equipment into the TMN framework.

Management layer (4) Element management Element management –Involves managing the individual devices and keep them running Ex. To view and change a network element’s configuration To view and change a network element’s configuration To monitor alarm messages emitted from elements To monitor alarm messages emitted from elements To instruct network elements to run self-test To instruct network elements to run self-test

Management layer (5) Network Management Network Management –Involves with keeping the network running as a whole (end-to-end) –Managing multiple devices in a concerted fashion Ex. Monitoring that involves ensuring that data flow to reach destination with acceptable throughput and delay Monitoring that involves ensuring that data flow to reach destination with acceptable throughput and delay

Management layer (6) Service management Service management –Managing the services that the network provides and ensuring those services are running smoothly –Ex. A customer orders a phone service, a number of operations required Number allocation Number allocation Company directory updating Company directory updating Testing and troubleshooting Testing and troubleshooting

Management layer (7) Business management Business management –Deals with managing the business associated with providing services and all the required support function Billing and invoicing Billing and invoicing Help desk management Help desk management Business forecasting Business forecasting Etc ? Etc ?

Reference Model (1) It makes it easier to check a management system or operations support infrastructure for completeness It makes it easier to check a management system or operations support infrastructure for completeness It helps categorize and group different functions and identify which ones are closely related It helps categorize and group different functions and identify which ones are closely related OAM&P – Operation, Administration, Maintenance and Provision OAM&P – Operation, Administration, Maintenance and Provision FCAPS – Fault, Configuration, Accounting, Performance, Security FCAPS – Fault, Configuration, Accounting, Performance, Security

FCAPS F – Fault management F – Fault management C – Configuration management C – Configuration management A – Accounting management A – Accounting management P – Performance management P – Performance management S – Security management S – Security management

Fault management (1) Dealt with faults that occur in the network Dealt with faults that occur in the network –Equipment or software failure –Communication services fails to work properly Functionality (not limited to) Functionality (not limited to) –Network monitoring/ alarm management –Fault diagnostic/ root cause analysis/ troubleshooting –Maintaining historical alarm logs –Trouble ticketing –Proactive fault management

Fault management (2) - Network monitoring Allow a network provider org. Allow a network provider org. –to see whether the network is operating as expected –To keep track of its current state –To visualize the current state The most important aspect of network monitoring is alarm management The most important aspect of network monitoring is alarm management Alarm is an unsolicited messages from the network indicate that some unexpected event has occurred Alarm is an unsolicited messages from the network indicate that some unexpected event has occurred

Fault management (3) - Basic Alarm Management Function (1) Alarm management with basic function Ex. Alarm management with basic function Ex. –Collecting alarms –maintaining accurate and current lists of alarms (historical alarm data) –Visualizing alarms and network state The most important task consists of collecting alarms and making sure that nothing important is missed The most important task consists of collecting alarms and making sure that nothing important is missed

Fault management (4) - Basic Alarm Management Function (2) Visualizing Alarm (a) Table list (b) Topology Map

Fault management (4) - Basic Alarm Management Function (3) Historical alarm data can be useful Historical alarm data can be useful –To resolve future problems faster by recognizing patterns and recalling their past resolution –To establish trends, to see how alarm rates and types of alarms reported have evolved over time

Fault management (5) - Advanced Alarm Management Function Alarm forwarding function – , SMS Alarm forwarding function – , SMS Acknowledging function – allow network operators to acknowledge alarms Acknowledging function – allow network operators to acknowledge alarms The clearing of alarm – a second alarm to indicate that the alarm condition no longer exists The clearing of alarm – a second alarm to indicate that the alarm condition no longer exists

Fault management (6) - Alarm and Event filtering (1) Filtering - To block out as many irrelevant or less important event as possible or redundant alarm Filtering - To block out as many irrelevant or less important event as possible or redundant alarm

Fault management (6) - Alarm and Event filtering (2)

Fault management (7) -Fault diagnostic and Troubleshooting (1) The analysis process that leads to a diagnosis is often referred to as a root cause analysis The analysis process that leads to a diagnosis is often referred to as a root cause analysis For example: Device Overheating For example: Device Overheating

Fault management (8) -Fault diagnostic and Troubleshooting (2)

Fault management (9) -Proactive Fault management Most fault management is reactive Most fault management is reactive –Deal with faults after they have occurred Proactive fault management Proactive fault management –Taking a step to avoid failure conditions before they occur –Test network to detect deterioration in the quality of service –Alarm analysis that recognizes pattern of alarms caused by minor faults that point to bigger problems

Fault management (10) -Trouble ticket The trouble ticket system helps keep track of which trouble tickets are still outstanding The trouble ticket system helps keep track of which trouble tickets are still outstanding Trouble tickets are assigned to operator who are responsible for resolving the trouble ticket Trouble tickets are assigned to operator who are responsible for resolving the trouble ticket Not every alarm results in trouble ticket, only when alarm conditions having impact to deliver services or need human intervention Not every alarm results in trouble ticket, only when alarm conditions having impact to deliver services or need human intervention

Configuration Management (1) Configuring Managed Resources Configuring Managed Resources Auditing and discovery Auditing and discovery Synchronization Synchronization Back up and restore Back up and restore Image management Image management

Configuration Management (2) -Configuring Managed Resources This involves sending commands to network equipment to change its configuration settings This involves sending commands to network equipment to change its configuration settings It might involve only one device or many devices. It might involve only one device or many devices.

Configuration Management (3) -Auditing and discovery Auditing - To find out what actually has been configured – read and check Auditing - To find out what actually has been configured – read and check Discovery Discovery –Inventory records might not be accurate –More efficient than to enter the information into management app.

Configuration Management (3) -Synchronization (1) Reconciliation Reconciliation

Configuration Management (4) -Synchronization (2) Reprovisioning Reprovisioning

Configuration Management (5) -backup and restore In case of some catastrophic event, it helps network operators brings the network back to operation in a short period of time In case of some catastrophic event, it helps network operators brings the network back to operation in a short period of time For example For example –Save in a file –Setup a TFTp server

Configuration Management (6) -Image Management Some revisions might be new feature releases and they might be patches that contain bug fixes Some revisions might be new feature releases and they might be patches that contain bug fixes How to upgrade the number of devices across network without disrupting service How to upgrade the number of devices across network without disrupting service

Accounting management (1) It is at the core of the economics of providing communication services It is at the core of the economics of providing communication services Accounting management needs to be highly robust, highest availability and reliability standard apply Accounting management needs to be highly robust, highest availability and reliability standard apply Account management is often associated simply with billing Account management is often associated simply with billing

Accounting management (2)

Performance management (1) -Performance metrics (1) Throughput – units of communication per unit of time Throughput – units of communication per unit of time –Network layer – packets/sec –Application layer – requests/sec Delay – unit of time Delay – unit of time –Network layer – time that packet take to rach the destination Quality – might different Quality – might different –Network layer – percentage of packet dropped –Application layer – percentage of request that could not be serviced

Performance management (2) -Monitoring and Tuning At basic level, to retrieve a snapshot of the current performance At basic level, to retrieve a snapshot of the current performance For a more sophisticated analysis, to observe over time For a more sophisticated analysis, to observe over time –Plot a histogram of some performance values with a new sample taken every 5 minutes

Performance management (2) -Collecting data Polling – a manager polls to agents Polling – a manager polls to agents –Not scale Intelligent agent – agents can be set up to do data collection Intelligent agent – agents can be set up to do data collection Use protocol supported Use protocol supported –Netflow or IPFIX

Security Management (1) Security of Management Security of Management Management of security Management of security

Security Management (1) -Security of management Security of management deals with ensuring that management operations themselves are secured Security of management deals with ensuring that management operations themselves are secured Tasks to defend against threat: Tasks to defend against threat: –Assign access privileges –Require secure passwords –Passwords need to be changed at regular interval –Establish audit trail –Set up proper facilities for backup and restore

Security Management (1) -Management of Security Common security threat – hacker attack, denial of service (DoS), malware, spam Common security threat – hacker attack, denial of service (DoS), malware, spam Components of security management Components of security management –Intrusion detection system (IDS) –Applying policy to limit or allow to only gradually increase amount of traffic –Capability to blacklist ports and network addresses at which suspicious traffic patterns –Honey pots to gather information about security vulnerability

OAM&P (1) Operation, Administration, Maintenance and Provisioning Operation, Administration, Maintenance and Provisioning Operation – day-to-day running of the network Operation – day-to-day running of the network –Cooridinating activities among administration, maintenance and provisioning –Monitoring the network to ensure it runs properly

OAM&P (2) Administration – cover the support functions that are required to manage the network and do not involve performing change Administration – cover the support functions that are required to manage the network and do not involve performing change –Designing the network –Tracking network usage –Assigning addresses –Keeping track of network inventory

OAM&P (3) Maintenance – include functionalities ensuring that the network and services operate as they are supposed to Maintenance – include functionalities ensuring that the network and services operate as they are supposed to –Diagnosing, troubleshooting, repairing Provisioning – concern with proper setting of configuration parameters on the network Provisioning – concern with proper setting of configuration parameters on the network

TOM (1) Telecommunication Operation Map Telecommunication Operation Map TOM distinguishes among three life cycle stages – FAB (Fulfillment, Assurance, Billing) TOM distinguishes among three life cycle stages – FAB (Fulfillment, Assurance, Billing) Fulfillment ensure that a service order that was received is carried out Fulfillment ensure that a service order that was received is carried out –Turning up any required equipment –Performing configuration –Reserving resources

TOM (2) Assurance – includes all activities ensuring that a service run smoothly after it has been fulfilled Assurance – includes all activities ensuring that a service run smoothly after it has been fulfilled –Monitoring service for QoS purposes –Diagnosing any faults and repairing Billing – making sure that services provided are accounted properly and can be billed to the user Billing – making sure that services provided are accounted properly and can be billed to the user