Advanced Network Management

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Network Management - Introduction. References Communications Network Management, Kornel Terplan Prentice Hall 1992, 2 nd ed. Managing Inter networks with.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Module 5: Configuring Access for Remote Clients and Networks.
Network Management Functions
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Overview of Network Management. Outline Describe responsibilities of a network manager Define network management vocabulary Discuss network management.
Chapter 19: Network Management Business Data Communications, 4e.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
Network Management Definition "...deploying and coordinating resources in order to plan, operate, administer, analyze, evaluate, design and expand communication.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Network Management Computer Networks. 2 OSI Network Management Model Performance Management e.g. utilization Fault Management e.g. SNMP traps Configuration.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Fault Management * * Mani Subramanian “Network Management: Principles and practice”, Addison-Wesley, 2000.
Common Devices Used In Computer Networks
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Management  Network Monitoring  Configuration Management Documentation.
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lec4: TCP/IP, Network management model, Agent architectures
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
CS 453 Computer Networks Lecture 22 Network Management.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Chapter 19: Network Management Business Data Communications, 4e.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter 3  Network Implementation and Management Strategies 1 Chapter 3 Overview  Why is a network implementation strategy necessary?  Why is network.
Network Management Security
Ch 9. Network Management Myungchul Kim
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Chapter 9 Network Management
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Lec 2: Infrastructure of Network Management Part1 from : Computer Networking: A Top Down Approach 6 th edition – Chapter 9 1 Organized by: Nada Alhirabi.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer and Information Security
Chapter 19: Network Management
Layered Architectures
Network Management Computer Networks.
Network Management Functions
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Data and Computer Communications by William Stallings Eighth Edition
Fundamentals of Network Management
Lecture 3: Secure Network Architecture
CS4470 Computer Networking Protocols
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
TELE9752: Network Operations and Control
Standards, Models and Language
Presentation transcript:

Advanced Network Management Prof. Chadi Assi assi@ciise.concordia.ca EV7.635

Text Books and References Network Management: Principles and Practice: Mani Subramanian, Addison Wesley, ISBN: 0-201-35742-9 SNMP, SNMPv2, SNMPv3 and RMON1 and 2: William Stallings, 3rd edition, Addison Wesley, ISBN: 0-201-48534-6 Network Management: A Practical Perspective Leinwand, A. and Fang K., Addison Wesley Essential SNMP Douglas Mauro and Kevin Schmidt, O’Reilly online version: http://www.unix.org.ua/orelly/networking_2ndEd/snmp/ Other RFCs and Research papers

Course Outline Network Management: Principles, Standards and Models. Computer Networks and the Internet Application, Transport and Network layer Network Management Protocols and Abstract Syntax Notation One (ASN.1). Simple Network Management Protocol (SNMP) Structure of Management Information (SMI), Management Information Base (MIB). SNMPv2 SNMPv3 Remote Monitoring (RMON), RMON 1 and 2.

Course Outline OSI Systems management, Telecommunications Management Network (TMN), and ATM Network Management. . Network Management Applications (Configuration, Performance, Fault and Security management). Distributed Management Framework (management by delegation, mobile agent based management, etc.) CORBA based management, web based management, JMX and DMTF.

Course Outline Marking Scheme: Midterm1         35% Midterm2         35% Project                         25% Assignments 5% More info: www.ciise.concordia.ca/~assi/courses/inse7120.htm

Background Today’s “Information Infrastructure” (or simply the Internet) is increasingly growing large number of interconnected heterogeneous sub-networks and a wide range of distributed applications (100s or 1000s of interacting hardware/software components) Other complex systems requiring monitoring, control jet airplane nuclear power plant Others In such a large network, many things can go wrong therefore disabling the network or a portion of it and degrading performance to an unacceptable level!

Background During the old days, a network can be managed by using only human efforts! In a small system, running few “pings” may help locating the problem As the Internet becomes a large global infrastructure, automated network management tools are essential Standardized tools that can be used across a broad spectrum of product types are also needed Therefore, a network management system (NMS) is a collection of tools for network monitoring and control Just as an airplane cockpit allows a pilot to monitor, control, analyze, configure, etc.

Network Management Failure of Interface Card A network admin by monitoring and analyzing network traffic may detect problems in any interface card and replace it e.g., increase in checksum errors in frames sent out by this interface; Host Monitoring A network admin periodically checks to see if all hosts are operational

Network Management Monitoring traffic/resource deployment By monitoring link utilization, a network admin may determine system bottleneck and provision higher bandwidth link instead, to avoid congestion

Network Management Rapid changes in routing tables If detected may prevent instabilities in routing and hence prevent a network from going down Intrusion detection Network admin requests to be notified when traffic is destined to/arrives from a suspicious source Detect the existence of a certain type of traffic (e.g., security attacks)

What is Network Management?* "Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost." *T.Saydam, T. Magendaz “From Networks and Network Management into Service and Service Management” Journal of Networks and System Management, Vol.4, No.4, Dec. 1996

What is Network Management? ISO (International Organization for Standardization) has created a network management model. 5 areas of network management are classified Performance Management Fault Management Configuration Management Security Management Accounting Management This classification has gained broad acceptance by vendors of both standardized and proprietary NMS

Performance Management Goal: Quantify, measure, report, analyze, and control the performance of different network components (such as routers, hosts, as well as end to end abstractions, such as a path through the network) Two functional categories Monitoring (ability to monitor and track activities on the network) Controlling (ability to make adjustments to improve network performance). Measuring Performance Throughput (whether reduced to unacceptable level!) Response time (i.e. network delays) Utilization Error rates (identify bottlenecks) Availability

Fault Management Goal: Log, detect, and respond to fault conditions in the network Immediate* handling of transient network failures (link, host, router hardware or software outages) Faults are to be distinguished from Errors A fault is an abnormal condition and requires management attention to repair (e.g. link cut) An Error is a single event! (e.g. single bit error on a line) *performance management takes longer term view in the face of varying traffic demands and occasional network device failures.

Illustrative scenario A client application exchanges data over a TCP connection with a DB server Distinct domains each administered by a different organization

Illustrative scenario Problem scenario A clock at an interface in WAN2 that supports T3 link loses SYNC 4 times a second for 0.25 ms  intermittent noise causing loss of 0.1% of T3 capacity  this small noise causes bit errors in a large number of packets routed over C-D  Bit errors cause packet losses, either at routers (if IP header corrupted) or at destinations

Illustrative scenario  performance of TCP connection degrades due to packet loss  TCP sender interprets this as congestion and hence reduces its window TCP increases its window gradually until new packet loss However due to the noise, the TCP window will not increase DB transactions by client will last longer DB server performance will degrade due to records lock-out, causing frequent aborts for remote transactions

Configuration Management Consists of the following steps: Gather information about current network, maintain an up-to-date inventory of all network components Use that data to modify the configuration of the network device (reconfiguration*) Goal: Allow a network manager to track which devices are on the network and the hardware and software configurations of these devices. * Reconfiguration of a network is often desired in response to performance evaluation or in support of network upgrade, fault recovery, or security checks.

Security Management Goal: Security at different levels Physical & Data Link Levels  Encryption Network Level  packet filters Application Level  (host, user and key) authentication Popular Level  Firewalls & VPNs Goal: Control access to network resources according to well defined policy. Identifying sensitive information (e.g., network management information) and protecting it

Accounting Management A network manager should track the use of network resources A user may be abusing his access privilege and burdening the network at the expense of other users. (e.g., a user may be violating his service contract) Planning for network growth Goal: Specify, log, and control user and device access to network resources …usage quotas, usage-based charging, the allocation of resource-access privileges… …Accounting reports should be generated periodically

Infrastructure for Network Management definitions: managing entity agent data managing entity data managed devices contain managed objects whose data is gathered into a Management Information Base (MIB) managed device agent data network management protocol managed device agent data agent data managed device managed device