Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 1: Introduction to Scaling Networks
Chapter 19: Network Management Business Data Communications, 5e.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CSCI 4550/8556 Computer Networks Comer, Chapter 15: Networking Ownership, Service Paradigm.
Business Data Communications Chapter Six Backbone and Metropolitan Area Network Fundamentals.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Connecting LANs, Backbone Networks, and Virtual LANs
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
1 Introducing the Specifications of the Metro Ethernet Forum.
1/28/2010 Network Plus Unit 5 Section 2 Network Management.
Chapter 4: Managing LAN Traffic
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Common Devices Used In Computer Networks
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Connectivity Devices Hakim S. ADICHE, MSc
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 High-Level Carrier Requirements for Cross Layer Optimization Dave McDysan Verizon.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Chapter 6 – Connectivity Devices
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Computer Networks with Internet Technology William Stallings
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Management of the LHCb DAQ Network Guoming Liu * †, Niko Neufeld * * CERN, Switzerland † University of Ferrara, Italy.
William Stallings Data and Computer Communications
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
PART3 Data collection methodology and NM paradigms 1.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Network Management Mechanisms Two major network management protocols: Simple Network Management Protocol (SNMP) Common Management Information Protocol.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
HP Openview NNM: Scalability and Distribution. Reference  “HP Openview NNM: A Guide to Scalability and Distribution”,
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
PART1 Data collection methodology and NM paradigms 1.
Chapter 19: Network Management
Lec 5: SNMP Network Management
Networking Devices.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Data collection methodology and NM paradigms
An Introduction to Computer Networking
Data collection methodology and NM paradigms
CT 1306 Communication Networks Management Lab
Network Architecture By Dr. Shadi Masadeh 1.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1

Background Network management (NM) consists of the set of functions to control, plan, allocate, deploy, coordinate, and monitor network resources. NM architecture begins with the requirements and flow analyses. Areas addressed during the analysis process include: Which network management protocol to apply Implementing high-level asset management as part of the network management architecture Network Management Architecture

 Reconfiguring the network often to meet various different requirements.  The need to monitor the entire system from a single location or device.  Testing service-provider compliance with SLAs and policies.  The need for proactive monitoring (discovering performance problems before users, applications, and devices are impacted by them).  Requirements for out-of-band access. Network Management Architecture

Defining Network Management NM can be viewed as a top-down approach structure consisting of multiple layers of managements: Business Management: budgets/resources, planning, and agreements. Service Management: delivery of services to users (for service providers this would include the management of access bandwidth, data storage, and application delivery) Network Management: network devices across the entire network. Element Management: collection of similar network devices (access routers or subscriber management systems) Network-Element Management: individual network devices (a single router, switch, or hub) Network Management Architecture

Defining Network Management NM can be divided into two basic functions: The transport of management information across the system The management of NM information elements Variety of tasks (monitoring, configuring, troubleshooting, and planning) Define what network management really means to the organizations There are four categories of network management tasks: Monitoring for event notification Monitoring for trend analysis and planning Configuration of network parameters Troubleshooting the network Network Management Architecture

Network Devices and Characteristics A network device is an individual component of the network that participates at one or more of the protocol layers. (end devices, routers, switches, data service units DSUs, hubs, and NICs) Network devices have characteristics that can be measured. They are grouped into: End-to-end Per-link Per-network Per-element characteristics Network Management Architecture

 End-to-end characteristics: can be measured across multiple network devices in the path of one or more traffic flows, and may be extended across the entire network or between devices.  Examples: Availability, Capacity, Delay, Delay variation (jitter), Throughput, Error rates and Network utilization  These characteristics may be modified or added to, depending on the types of traffic on the network.

Network Devices and Characteristics Per-link/per-network and per-element characteristics : Specific to the type of element or connection between elements May be used individually, or combined to form an end-to-end characteristic. Examples of per-link characteristics: Propagation delay Link utilization Examples of per-element characteristics: IP forwarding rates (IP packets/second) Buffer utilization for the router Logs of authentication failures. Network Management Architecture

 Management of network devices and networks includes:  Network planning (e.g., cell site planning for wireless)  Initial resource allocation (e.g., frequency or bandwidth allocations)  From the telecommunication network management model: FCAPS Fault, Configuration, Accounting, Performance, and Security management.

Network Management Mechanisms Two major network management protocols: Simple Network Management Protocol (SNMP) Common Management Information Protocol (CMIP). CMIP includes CMIP over TCPIP (CMOT). Management protocols provide mechanism for retrieving, changing, and transport of network management data across the network. Network Management Architecture

Architectural Considerations NM process consists of: choosing which characteristics to monitor/manage Instrumenting network devices to collect necessary data Processing data for: viewing, storage, and/or reporting; displaying a subset of the results storing or archiving some subset of the data. Capturing of other features; using the FCAPS management model: Fault management processing of events and alarms problem identification, isolation, troubleshooting, and resolution; returning the network to an operational state. Configuration management setting system parameters for turn-up provisioning the network; configuration and system backups and restores developing and operating system databases. Accounting management monitoring and managing subscriber service usage service billing. Network Management Architecture

Architectural Considerations Capturing of other features; using the FCAPS management model : Performance management implementing performance controls, based on the IP services architecture collecting network performance data Analyzing performance data generating short- and long-term reports from this data controlling network and system performance parameters. Security management implementing security controls collecting and analyzing security data Generating security reports and logs from this data. Network Management Architecture

 The NM process and management model both provide input to the network management architecture.  Network management needs to consider the following in the architecture:  In-band and out-of-band management  Centralized, distributed, and hierarchical management  Scaling network management traffic  Checks and balances  Managing network management data  MIB selection  Integration into OSS

In-Band and Out-of-Band Management In-band management occurs when the traffic flows for network management follow the same network paths as the traffic flows for users and their applications. simplifies the network management architecture (Figure 7.8). Management flows can be impacted by same problems that impact user traffic flows If management is most needed, it may not be available If management data flows delayed or blocked hard to perform event monitoring when network under stress (congested) network hardware/software configuration problems under security attacks Network Management Architecture

In-Band and Out-of-Band Management Out-of-band management occurs when different paths are provided for network management data flows and user traffic flows. allowing the management system to continue to monitor the network during most network events, even when such events disable the network. Can allow monitoring portions of the network that are unreachable through normal paths (i.e., user data flow paths). usually provided via a separate network, such as. (Figure 7.9): frame relay plain old telephone service (POTS) connections. Having separate network for management: additional security features Network Management Architecture

In-Band and Out-of-Band Management Out-of-band can be used to troubleshoot and configure remote devices saves time and resources when: the user data network is down No enough human resources Regular availability checking is needed. added expense and complexity to reduce expenses: provide out-of-band monitoring at a low level of performance (phone lines) For some networks a combination of in-band and out-of-band could used, when: performance of user data network is needed to support network management data flows the expense of a separate network is still incurred. security issues on the user data network still need to be addressed. the separate, out-of-band network is needed when the user data network is down. Network Management Architecture

Centralized, Distributed, and Hierarchical Management Centralized management: all management data (e.g., pings, SNMP polls/responses, Traceroute, etc.) radiate from a single management system (Figure 7.8). advantage : only one management system is needed simplifying the architecture and reducing costs has a variety of management tools associated with it. Trade-offs: single point of failure causing congestion or failure on the Network Interface. Network Management Architecture

Centralized, Distributed, and Hierarchical Management Distributed : multiple separate components to the management system, placed across the network, localizing network management and distributing management domains. (Fig.7.11) multiple local element management systems are used to distribute management functions across several domains. the components either provide: all management functions (monitoring, display, storage, and processing) the distributed components are the monitoring devices Example: distributed management may take the form of having multiple management systems on the network (e.g., one management system per campus or per management domain, Figure 7.11) single management system with several monitoring nodes, Figure Network Management Architecture

Centralized, Distributed, and Hierarchical Management Example: distributed management may take the form of having multiple management systems on the network (e.g., one management system per campus or per management domain, Figure 7.11) single management system with several monitoring nodes, Figure Network Management Architecture

Centralized, Distributed, and Hierarchical Management Hierarchical : management functions (monitoring, display, storage, and processing) are separated and placed on separate devices. separated functions considered as layers communicating in hierarchical fashion. ( Fig.7.13) localized monitoring devices: collect management data pass data to display and storage devices when data passed on to display and storage devices without processing the monitoring devices act as they did in distributed management localizing the data collection and reducing the amounts of management data that transit the network. Network Management Architecture

Centralized, Distributed, and Hierarchical Management Hierarchical : When data are processed before being sent to display and storage devices: the monitoring devices act as local filters sending only relevant data Can reduce amount of management data in the network Advantages: every component can be made redundant every component can be independent of the other components can be tailored to the specific needs of the network several display devices several processing devices several storage devices A trade-off: Cost Complexity Overhead Network Management Architecture