Enterprise Network Management Chapter 2 By: Yilma Tefera May 2006.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

1 Chapter 22 Network layer Delivery, Forwarding and Routing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Implementing a Highly Available Network
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
COMP4690, by Dr Xiaowen Chu, HKBU
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Chapter 2: SNMPv3 and Network Management 1 Enterprise Network Management Chapter 2 SNMPv3 and Network Management Jiun January 2005.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
Communication and Functional Models
1. 2 Managing Enterprise Networks The necessary minimal components required for making a system manageable are: MBIs Agents/entities-host on network devices.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Internet Standard Management Framework
Network Management Security
SNMP V2 & V3 W.lilakiatsakun. SNMP V2 Protocol RFC types of access to management information – Manager–agent request-response – Manager-Manager.
SNMP Simple Network Management Protocol A Standard Protocol for Systems and Network Management.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
K. Salah1 Security Protocols in the Internet IPSec.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network Management Security in distributed and remote network management protocols.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Computer and Information Security
Network Management: SNMP
SNMPv1 Network Management: Communication and Functional Models
Telemedicine.
CS4470 Computer Networking Protocols
Chapter 6: Network Layer
CHAPTER 8 Network Management
Chapter 8: Monitoring the Network
Network Core and QoS.
Network Layer I have learned from life no matter how far you go
SNMP (Simple Network Management Protocol) based Network Management
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Exceptions and networking
Network Management Security
Network Core and QoS.
Presentation transcript:

Enterprise Network Management Chapter 2 By: Yilma Tefera May 2006

Network Element 1.High loading can occur when: 1.Many voice calls are in transit through a PABX 2.Large numbers of ATM virtual circuits are transporting many ATM cells. 3.Large numbers of IP packets are in transit a router. 4.Network topology changes result in routing protocol convergence.

Introducing MPLS: First chunck 1.On a more general note, a good understanding of MPLS is important for appreciating issues such as traffic engineering, network-Qos, and connection oriented IP networks.

The Trend towards IP 1.MPLS allows traffic engineering. 2.MPLS integrates IP Qos with layer 2 Qos 3.Many vendors are providing MPLS capability in their devices-for example, Cisco,Juniper, Nortel Networks,and Marconi.

MPLS concepts 1.MPLS is forwarding technology. Its purpose is to receive an incoming traffic type(layer 2 or 3 )at the network edge, it encapsulate it, and then transmit it through an MPLS core or cloud.

MPLS Concept 1. The LSP is created manually or via a signaling protocol 2.The path taken by the LSP may be either user- specified or computed by LER1. 3.The LSP may have reserved resources, such as bandwidth, along the path.

SNMPv3 Message 1.The BEGIN keyword indicates the start of the MIB 2.The IMPORTS keyword introduce descriptors from external MIBs in a similar way to #include in C and import in Java. The IMPORTS statement identifies the descriptor and the module in which it is defined. 3.The DESCRIPTION keyword provides details about the MIB contente 4.The REVISION Keyword provides details about the MIB

SNMPv3 Message Exchanges SNMPv3 get request SNMPv3 get-NextRequest SNMPv3 getBulkrequest SNMPv3 setRequest SNMPv3 Notifications Access Rights Message Size SNMPv3 Security

SNMPv3 Structure 1.SNMPv3 entity consists of two main components: 2.An SNMP engine 3.A collection of SNMP applications

The SNMPv3 engine 1.It made up of four subcomponents: 1.Dispatcher handles message sending and receiving 2.Message subsystem handles message processing for SNMPv3, SNMPv2c, SNMPv1, and any other models. 3.Security subsystem handles security processing for SNMPv3 user-based security model(USM), SNMPv1/v2c community-based security model, and any additional (newly defined) models. 4.Access control subsystem handles the granting/ rejecting of access to specific managed objects.

The two important of engine subcomponents are. 1.Can hand off the message processing to each other as required. 2.Are themselves extensible entities.

There are five SNMPv3 application 1.Command generators, create SNMP messages. 2.Command reponders, respond to SNMP messages. 3.Notification originators, send trap or inform messages. 4.Notification receivers, receive and process trap or inform messages. 5.Proxy forwarders, forward messages between SNMP entity components.

The message format divided into four section. 1.Common data: These fields occur in all SNMPv3 messages. 2.Security model data: This area has three subsections one general, one for authentication, and one for privacy data. 3.Context: These two fields are used to provide the correct context in which the protocol data unit (PDU) should be processed. 4.PDU: This area contains an SNMPv2c PDU.

Common Data 1.Message Version 2.Message ID 3.MaxMessageSize 4.MessageFlags 5.MessageSecurity

Security Model Data 1.General 2.EngineID 3.Engine Boots 4.Engine Time 5.UserName

Authentication Protocol 1.MD5 (Message Digest) 2.SHA (Secure Hash Algorithm)

Privacy Protocol 1.DES Key(Data Encryption Standard)

Context 1.Context Name 2.ContextID

PDU 1.MessagesFlags

Problems with SNMP: 1.SNMP is not transaction-oriented but instead offers an all-or-nothing style of execution. It is difficult to manipulate very large data sets. 2.Scalability issues where tables grow to include thousands of rows. 3.Notifications are not guaranteed to arrive at their destination. Management operations (such as get or set) can time out if the network is congested or the agent host is heavily loaded. 4.SNMP messages use the UDP protocol (best- effort datagram service).

The Different Versions of SNMP. 1.SNMPv1 2.SNMPv2c 3.SNMPv3

SNMP Applications: MIB Browsers 1.MIB browsers are specialized tools used to examine the values of MIB object instances on a given agent. A MIB browser can be a fully integerated GUI- based application or a simple text-based one.

Managed Objects: 1.Managed objects are the basic unit of exchange between an NMS and Nes. The managed objects are defined in theMIB and deployed in the network.

There is only one MIB: 1.One merit of a standard MIB is ease of extension. As new technologies are invented and deployed, the associated managed objects must be defined in new MIB modules. The latter can then be added to the standard MIB in an orderly fashion, Ex: by using enterprise specific numbers.

Some characteristics of intelligent line cards include the following 1.They can extend the lifespan of the host adding advanced functions such as SNMP and VoIP for a PABX. 2.They can take a long time to develop. 3.Operators like to extract the maximum performance from them. Ex: port bandwidth. 4.They increasingly incorporate numerous layer 1,2, and 3 protocols.

Network Elements 1.An example of an NE is an intelligent line card, which is hosted inside another system, such as a PABX, ATM/MPLS switch, or IP router Command generators create SNMP messages.

Analogy for an NMS 1.MIB modules 2.Applications-agents and managers 3.Devices-remote Nes 4.Soft objects-connections, paths, interfaces, and so on.

Analogy for an NMS 1.In the case of operating systems, some of the abstract objects are: 2.Files 3.Applications 4.Processes 5.Devices, such as hard disks and network interfaces 6.Soft objects, such as print jobs and semaphores.