Basic component of Network Management Woraphon Lilakiatsakun.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
Guide to Network Defense and Countermeasures Second Edition
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Hands-On Microsoft Windows Server 2008 Chapter 11 Server and Network Monitoring.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Windows Server 2008 Chapter 11 Last Update
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
Network Topologies.
November 2009 Network Disaster Recovery October 2014.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Network Design Essentials
Comparing modem and other technologies
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Management Functions and Reference Models W.lilakiatsakun.
Basic Ingredients of Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Basic component of Network Management
Module 7: Fundamentals of Administering Windows Server 2008.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
CS 453 Computer Networks Lecture 22 Network Management.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Basic component of Network Management Woraphon Lilakiatsakun.
Intro to Network Design
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Basic component of Network Management Woraphon Lilakiatsakun.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Basic component of Network Management Woraphon Lilakiatsakun.
NETWORK CONTROL The Fourth Meeting. 2 Table of Contents  Introduction  Configuration Control  Security Control.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART1 Data collection methodology and NM paradigms 1.
Chapter 19: Network Management
This presentation is based on the slides listed in references.
Server Upgrade HA/DR Integration
Phare EIONET Centralised Training Session
Hands-On Microsoft Windows Server 2008
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
An Introduction to Computer Networking
Design pattern for cloud Application
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Basic component of Network Management Woraphon Lilakiatsakun

Basic components Fig 3-1 Fig 3-1

The Network devices It is also called “Network Element” It is also called “Network Element” NE must offer a management interface to allow managing system to communicate with NE must offer a management interface to allow managing system to communicate with So, NEs. have to run a process as “Management Agent” So, NEs. have to run a process as “Management Agent” Management communication Management communication –Manager - a managing application who in charge of the management –(Management) Agent – support the manager by responding to its requests and notifying unexpected events

Manager-agent communication Fig 3-2 Fig 3-2

Management Agent A management interface – handle management communication A management interface – handle management communication A Management Information Base (MIB)- conceptual data store (management information) that contain management view of the device being managed A Management Information Base (MIB)- conceptual data store (management information) that contain management view of the device being managed The core agent logic – translates between the operation of the management interface, the MIB and the actual device The core agent logic – translates between the operation of the management interface, the MIB and the actual device

Management Interface (Logical) Process to interact with the agent Process to interact with the agent –Support a management protocol that defines the rules of conversation for communication between the managed network element For example For example –Allow an application to open (and tear down) management session with the agent –Allow an application to make management requests to the NE (requests to retrieve statistical data) –Allow NE to send unsolicited event messages to an application

Management Information Base (MIB) (1) Management operations are directed against the conceptual view Management operations are directed against the conceptual view –The network ports of a NE could be represented as a table in an imaginary database with each port having a corresponding entry in the table MIB is not a real database,it works as a proxy of the NE that affects to the actual device MIB is not a real database,it works as a proxy of the NE that affects to the actual device –When MA modifies entry in the conceptual table, the actual configuration of device is also changed

Management Information Base (MIB) (2)

Management Information Base (MIB) (3) MIB related standard MIB related standard RFC 1155 RFC 1155 –Structure and Identification of Management Information for TCP/IP based internets RFC 1157 RFC 1157 –Simple Network Management Protocol RFC 1213 RFC 1213 –Management Information Base for Network Management of TCP/IP-based internets

Management Information Base (MIB) (4) OID = (internet) OID = (dpsAlarmControl) MIB – OID Tree

Core agent logic Translates between the operation of the management interface, MIB, and actual device Translates between the operation of the management interface, MIB, and actual device –Translate the request to “retrieve a counter” into an internal operation that reads out a device hardware register. Additionally, it can include more management functions (embedded management intelligence) that offload the processing required by management app. Additionally, it can include more management functions (embedded management intelligence) that offload the processing required by management app. –Pre-correlated raw events before sent out –Schedule a periodic test function instead of sending new test request each time.

An anatomy of management agent Fig 3-4 Fig 3-4

Management Information Management information provides an abstraction of the real-world aspects for management purposes Management information provides an abstraction of the real-world aspects for management purposes –The version of installed software - to decide which devices need to have new software –Utilization of port - whether capacity upgrades are necessary –Packet counter for different interfaces – indicate that a network is under attack (DoS)

Managed Object (1) We refer a chunk of management information that expose of these real- world aspects as a managed object (MO) We refer a chunk of management information that expose of these real- world aspects as a managed object (MO) –A device fan along with its operational state –A port on a line card along with a set of statistical data

Managed Object (2)

Managed Object (3) Not all aspects in the real world are modeled Not all aspects in the real world are modeled –Color of devices Real world object that MO represents is referred to as the “real resource” Real world object that MO represents is referred to as the “real resource” Since management information in MIB represents real resource Since management information in MIB represents real resource –When querying the MIB for MO representing a packet counter 3 times, the value returned will be different –When modifying information in the MIB to perform certain updates, it will affect the real world.

Basic parts of network management - refined Fig 3-6 Fig 3-6

The Management System (1) Tools to manage the network Tools to manage the network –Monitor the network –Service provisioning system –Craft terminal A management system can run one or more hosts A management system can run one or more hosts –Distributed across several hosts –Scalability –More robust

The Management System (2) Roles in Network Management System Roles in Network Management System –Manager / Agent Sometimes, one network element can play two roles as figure Sometimes, one network element can play two roles as figure

The Management System (3) Fig 3-8 Fig 3-8 Manager/agent reference diagram

The Management System (4) Fig 3-9 Fig 3-9 Caching MIB

The Management System (5) Pros for caching MIB Pros for caching MIB –avoid having to go back to the NE repeatedly for the same information Cons for caching MIB Cons for caching MIB –The cache is stale

The Management Network (1) Networks for carrying traffic of subscriber or end user are referred as “production network” Networks for carrying traffic of subscriber or end user are referred as “production network” Networks for carrying management traffic are referred as “management network” Networks for carrying management traffic are referred as “management network” Both can be physically separate networks or they can share the same physical network Both can be physically separate networks or they can share the same physical network

The Management Network (2) Connecting a craft terminal to a managed device and use CLI to configure and troubleshoot the network device

The Management Network (3) Fig 3-11 Fig 3-11 Connecting to multiple devices through a terminal server

The Management Network (4) Fig 3-12 Fig 3-12 Dedicated Vs Shared Management and Production networks

The Management network (5) Pros of a dedicated management network Pros of a dedicated management network Reliability Reliability –Congestion or network failure occurs somewhere in the network, it makes the devices hard to reach Management traffic will be impacted Management traffic will be impacted Hard to find out what it is happening Hard to find out what it is happening

The Management network (6) Pros of a dedicated management network (Con’t) Pros of a dedicated management network (Con’t) Interference avoidance Interference avoidance –Compete with production traffic –data or voice traffic –Not high volume but bursty characteristics may interfere high QoS services (voice,video streaming) Ease of network planning Ease of network planning –No need to consider on management traffic Security Security –Hard to attack and more secure

The Management network (7) Cons of a dedicated management network Cons of a dedicated management network Cost and overhead Cost and overhead –Addition cost for a management network No reasonable alternative No reasonable alternative –Some devices do not provide a physical connection for another usage –DSL router cannot be connected with two physical links

The Management network (7) Cost is the huge disadvantage Cost is the huge disadvantage So, the management network is needed only critical area So, the management network is needed only critical area –Backbone of service providers or big enterprises Hybrid solution Hybrid solution –Generally, it shares over production networks –Only critical segments are used as dedicated networks

The Management Support Organization: (1) In term of Network – Network Operation Center (NOC) In term of Network – Network Operation Center (NOC) Telecommunication service provide refer to management system as Operation Support System Telecommunication service provide refer to management system as Operation Support System The management support Org. is responsible for making sure that the network is being run efficiently and effectively The management support Org. is responsible for making sure that the network is being run efficiently and effectively

The Management Support Organization (2) Management tasks (not limited to these) (1) Management tasks (not limited to these) (1) –Monitoring the network for failures –Diagnosing failures and communication outages –Planning and carrying out repairs –Provisioning new services and adding/removing users

The Management Support Organization: (3) Management tasks (2) Management tasks (2) –Keeping an eye on performance of the network and taking preventive measures –Planning network upgrade To increase capacity and distribution of software patches To increase capacity and distribution of software patches –Planning network topology and network buildout Ensure that the network will meet future demands Ensure that the network will meet future demands

The Management Support Organization: (4) Organization structure Organization structure –Network planning - analyzing network usage and traffic patterns and planning network buildout and service rollout –Network operation - keeping the network running and monitoring the network failures –Network administration – Deploying the network and services on it –Customer (user) management -Interacting with the customers

The Management Support Organization: (5) Needed Activities (1) –Establishment of process and operational policies, documentation of operational procedures Help management of the network consistent and efficient and facilitates meeting a consistently high standard of operations Help management of the network consistent and efficient and facilitates meeting a consistently high standard of operations Well-defined workflow to ensure that things that are supposed to happen do not fall through cracks Well-defined workflow to ensure that things that are supposed to happen do not fall through cracks Well-defined escalation procedures to ensure responsiveness Well-defined escalation procedures to ensure responsiveness

The Management Support Organization: (6) Needed Activities (2) –Collection of audit trails Automatically logging the activities of operations Automatically logging the activities of operations make it easier to reproduce what happened and recover from situation in which human error make it easier to reproduce what happened and recover from situation in which human error –Network documentation Must be accurate and up-to-date Must be accurate and up-to-date Important for network planning and software upgrades Important for network planning and software upgrades

The Management Support Organization: (7) Needed Activities (3) –Reliable backup and restore procedures Bring network back to live again in case of disaster and emergencies Bring network back to live again in case of disaster and emergencies –Security emphasis Networks potentially most vulnerable from the inside Networks potentially most vulnerable from the inside Limit the damage that can cause by one person Limit the damage that can cause by one person