Chapter 19: Network Management Business Data Communications, 4e.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

1 1/15/ :37 Chapter 14Network Management1 Rivier College CS575: Advanced LANs Chapter 14: Network Management.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Introduction to Network Management
Chapter 19: Network Management Business Data Communications, 4e.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Protocols and the TCP/IP Suite
Network Management Definition "...deploying and coordinating resources in order to plan, operate, administer, analyze, evaluate, design and expand communication.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2001 by Prentice Hall1-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 12 LAN Administration: Reactive.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Characterizing the Existing Internetwork PART 1
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
ECE Prof. John A. Copeland Office: Klaus or call.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Fundamentals of Network Management
Lec4: TCP/IP, Network management model, Agent architectures
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
Network Management Presentation HP Openview Christopher Scott December 10, 2004.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Introduction to Network Management.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Chapter 3 Network Management
or call for office visit, or call Kathy Cheek,
Chapter 19: Network Management
Lec 5: SNMP Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Protocols and the TCP/IP Suite
Fundamentals of Network Management
Protocols and the TCP/IP Suite
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Chapter 19: Network Management Business Data Communications, 4e

2 Network Management Requirements  Fault Management  Accounting Management  Configuration and Name Management  Performance Management  Security Management

Business Data Communications, 4e3 Fault Management  A fault is an abnormal condition that requires management attention (or action) to repair  Fault is usually indicated by failure to operate correctly or by excessive errors  Users expect quick and reliable resolution

Business Data Communications, 4e4 Accounting Management  Reasons for accounting management: Internal chargebacks on network use User(s) may be abusing access privileges and burdening the network at the expense of other users Users may be making inefficient use of the network The network manager is in a better position to plan for network growth if user activity is known in sufficient detail.

Business Data Communications, 4e5 Configuration Management  Concerned with: initializing a network and grace-fully shutting down part or all of the network maintaining, adding, and updating the relationships among components and the status of components themselves during network operation

Business Data Communications, 4e6 Performance Management  Issues of concern to the network manager include: What is the level of capacity utilization? Is there excessive traffic? Has throughput been reduced to unacceptable levels? Are there bottlenecks? Is response time increasing?  Network managers need performance statistics to help them plan, manage, and maintain large networks

Business Data Communications, 4e7 Security Management  Concerned with generating, distributing, and storing encryption keys monitoring and controlling access to networks access to all or part of the network management information collection, storage, and examination of audit records and security logs

Business Data Communications, 4e8 Network Management Systems  Collection of tools for network monitoring and control, integrated in these ways: A single user-friendly operator interface for performing most or all network management tasks A minimal amount of separate equipment  consists of incremental hardware and software additions implemented among existing network components

Business Data Communications, 4e9 Network Management System Architecture

Business Data Communications, 4e10 Components of the NMS  All nodes run the Network Management Entity (NME) software  Network control host or manager runs the Network Management Application (NMA)  Other nodes are considered agents

Business Data Communications, 4e11 Network Monitoring Systems

Business Data Communications, 4e12 Simple Network Management Protocol (SNMP)  Designed in the mid-1980's as an answer to the communication problems between different types of networks.  Consists of a simply composed set of network communication specifications that cover all the basics of network management in a method that poses little stress on an existing network.  Each SNMP device (router, gateway, server) has an agent that collects information about itself and the message it processes, and stores that information in a database called the management information base (MIB).

Business Data Communications, 4e13 Role of SNMP  Transmission of a message  Receipt of a message  Variable bindings

Business Data Communications, 4e14 SNMP  The network management software has access to these MIBs. A network manager can use this software to send control messages to individual devices or groups of devices asking them to report the information stored in their MIB.  Network information is exchanged through the messages called protocol data units (PDU's). The PDU can be looked at as an object that contains variables that have both titles and values.

Business Data Communications, 4e15 SNMP  Five types of PDU's employed to monitor a network: two deal with reading terminal data, two deal with setting terminal data, and one, the trap, is used for monitoring network events such as terminal start-ups or shut-downs.  To see if a terminal is attached to the network, a user uses SNMP to send out a read PDU to that terminal. If the terminal was attached to the network, the user would receive back the PDU, it's value being "yes, the terminal is attached". If the terminal was shut off, the user would receive a packet informing them of the shutdown.

Business Data Communications, 4e16 SNMPv2  Released in 1992, revised in 1996  Addressed functional deficiencies in SNMP  Accommodates decentralized network management  Improves efficiency of data transfer

Business Data Communications, 4e17 SNMPv3  Released in 1998, addressed security deficiencies in SNMP and SNMPv2  Does not provide a complete SNMP capability; defines an overall SNMP architecture and a set of security capabilities for use with SNMPv2  Provides three important services: authentication, privacy, and access control

Business Data Communications, 4e18 Common Management Interface Protocol (CMIP)  CMIP was designed to build on SNMP by making up for SNMP's shortcomings and becoming a bigger, more detailed network manager. Its basic design is similar to SNMP, whereby PDU's are employed as variables to monitor a network. CMIP however contains 11 types of PDU's.  The biggest feature of the CMIP protocol is that its variables not only relay information to and from the terminal (as in SNMP), but they can also be used to perform tasks that would be impossible under SNMP.  Problem: Too wonderful to be implemented.

Business Data Communications, 4e19 Remote Monitoring (RMON)RMON  A standard that provides managers with real-time network and application data for LANs.  The major benefits of RMON: Powerful Monitoring and Analysis Historical Trending of the Local Segment Traditional Protocol Decode Functions Centralized Monitoring of Remote Sites Multi-vendor Interoperability Event Creation on Reaching Predefined Thresholds  RMON is supported by SNMP  Newer version is RMON2

Business Data Communications, 4e20 How RMON Works  Enables MIB information to be stored on the device itself or on distributed RMON probes that store MIB information closer to the devices that generate it.  No transmission from MIB to the central server until requesting the data.  RMON reduces network traffic.

Business Data Communications, 4e21 *RMON and RMON2

Business Data Communications, 4e22 *Multi-Router Traffic Grapher (MRTG)MRTG  MRTG is a tool to monitor the traffic load on network-links.  MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic.LIVE visual  MRTG is based on Perl and C and works under UNIX and Windows NT.  MRTG is being successfully used on many sites around the net. (MRTG-Site-Map).MRTG-Site-Map

Business Data Communications, 4e23 *LANWatch32  Precision Guesswork's LANWatch32 Network Analyzer for Windows 95/NT is a software solution targeting the complex task of network analysis. Precision Guesswork's  Decodes over 60 network protocols, including: TCP, UDP, IP, IPv6, NFS, NFS (version 3), NetWare, SNA, AppleTalk, VINES, ARP, and NetBIOS.  Media Supported Ethernet (802.3) 10 Mb/100 Mb Token Ring (802.5) Serial Line

Business Data Communications, 4e24 *Demonstration  mp/snmp.html mp/snmp.html