Download presentation
Presentation is loading. Please wait.
Published byOwen Grant Modified over 9 years ago
1
Basic component of Network Management Woraphon Lilakiatsakun
2
Basic components Fig 3-1 Fig 3-1
3
The Network devices It is also called “Network Element” It is also called “Network Element” NE must offer a management interface to allow managing system to communicate with NE must offer a management interface to allow managing system to communicate with So, NEs. have to run a “Management Agent” So, NEs. have to run a “Management Agent” Management communication Management communication –Manager - a managing application who in charge of the management –(Management) Agent – support the manager by responding to its requests and notifying unexpected events
4
Manager-agent communication Fig 3-2 Fig 3-2
5
Management agent A management interface – handle management communication A management interface – handle management communication A Management Information Base (MIB)- conceptual data store (management information) that contain management view of the device being managed A Management Information Base (MIB)- conceptual data store (management information) that contain management view of the device being managed The core agent logic – translates between the operation of the management interface, the MIB and the actual device The core agent logic – translates between the operation of the management interface, the MIB and the actual device
6
Management interface Support a management protocol that defines the rules of conversation for communication between the managed network element Support a management protocol that defines the rules of conversation for communication between the managed network element For example For example –Allow MA to open (and tear down) management session with the NE –Allow MA to make management requests to the NE (requests to retrieve statistical data) –Allow NE to send unsolicited event messages to MA
7
Management Information Base (MIB) (1) Management operations are directed against the conceptual view Management operations are directed against the conceptual view –Ex. The network ports of a NE could be represented as a table in an imaginary database with each port having a corresponding entry in the table MIB is not a real database,it works as a proxy of the NE that affects to the actual device MIB is not a real database,it works as a proxy of the NE that affects to the actual device –EX. When MA modifies entry in the conceptual table, the actual configuration of device is also changed MIB does not always have to resemble a conceptual table depending on the management agent MIB does not always have to resemble a conceptual table depending on the management agent –Extended Markup Language (XML) –Set of Command-line parameters
8
Management Information Base (MIB) (2)
9
Management Information Base (MIB) (3) MIB related standard MIB related standard RFC 1155 RFC 1155 –Structure and Identification of Management Information for TCP/IP based internets RFC 1157 RFC 1157 –Simple Network Management Protocol RFC 1213 RFC 1213 –Management Information Base for Network Management of TCP/IP-based internets
10
Management Information Base (MIB) (4) OID = 1.3.6.1 (internet) OID = 1.3.6.1.4.1.2682.1 (dpsAlarmControl) MIB – OID Tree
11
Core agent logic Translates between the operation of the management interface, MIB, and actual device Translates between the operation of the management interface, MIB, and actual device –Ex. Translate the request to “retrieve a counter” into an internal operation that reads out a device hardware register. Additionally, it can include more management functions (embedded management intelligence) that offload the processing required by management app. Additionally, it can include more management functions (embedded management intelligence) that offload the processing required by management app. –Pre-correlated raw events before sent out –Schedule a periodic test function instead of sending new test request each time.
12
An anatomy of management agent Fig 3-4 Fig 3-4
13
Management information, MOs, MIBs, and Real Resources (1) Management information provides an abstraction of the real-world aspects for management purposes Management information provides an abstraction of the real-world aspects for management purposes –The version of installed software - to decide which devices need to have new software –Utilization of port - whether capacity upgrades are necessary –Fans - what is causing the temperature to rise –Packet counter for different interfaces – indicate that a network is under attack (DoS)
14
Management information, MOs, MIBs, and Real Resources (2) We refer a chunk of management information that expose of these real- world aspects as a managed object (MO) We refer a chunk of management information that expose of these real- world aspects as a managed object (MO) –a device fan along with its operational state –A port on a line card along with a set of statistical data
15
Management information, MOs, MIBs, and Real Resources (3)
16
Management information, MOs, MIBs, and Real Resources (4) An MO could be An MO could be –a MIB object in SNMP –A parameter in a command line interface (CLI) –An element of an XML document in a web- based management interface
17
Management information, MOs, MIBs, and Real Resources (5) Not all aspects in the real world are modeled Not all aspects in the real world are modeled –Color of devices Real world object that MO represents is referred to as the “real resource” Real world object that MO represents is referred to as the “real resource” Since management information in MIB represents real resource Since management information in MIB represents real resource –When querying the MIB for MO representing a packet counter 3 times, the value returned will be different –When modifying information in the MIB to perform certain updates, it will affect the real world.
18
Basic parts of network management - refined Fig 3-6 Fig 3-6
19
The Management System (1) Tools to manage the network Tools to manage the network –monitor the network –Service provisioning system –Craft terminal In fact, management system is different from management applications In fact, management system is different from management applications –Management system can run one or more management apps. –But often we can use both as the same meaning A management system can run one or more hosts A management system can run one or more hosts –Distributed across several hosts –Scalability –More robust
20
The Management System (2) Fig 3-8 Fig 3-8 Manager/agent reference diagram
21
The Management System (3) Fig 3-9 Fig 3-9 Caching MIB
22
The Management System (4) Pros for caching MIB Pros for caching MIB –avoid having to go back to the NE repeatedly for the same information Cons for caching MIB Cons for caching MIB –The cache is stale
23
The Management network (1) Networks for carrying traffic of subscriber or end user are referred as “production network” Networks for carrying traffic of subscriber or end user are referred as “production network” Networks for carrying management traffic are referred as “management network” Networks for carrying management traffic are referred as “management network” Both can be physically separate networks or they can share the same physical network Both can be physically separate networks or they can share the same physical network
24
The Management network (2) Connecting a craft terminal to a managed device and use CLI to configure and troubleshoot the network device
25
The Management network (3) Fig 3-11 Fig 3-11 Connecting to multiple devices through a terminal server
26
The Management network (4) Fig 3-12 Fig 3-12 Dedicated Vs Shared Management and Production networks
27
The Management network (5) Pros of a dedicated management network Pros of a dedicated management network Reliability Reliability –Congestion or network failure occurs somewhere in the network, it makes the devices hard to reach Management traffic will be impacted Management traffic will be impacted Hard to find out what it is happenning Hard to find out what it is happenning Interference avoidance Interference avoidance –Compete with production traffic –data or voice traffic –Not high volume but bursty characteristics may interfere high QoS services (voice,video streaming) Ease of network planning Ease of network planning –No need to consider on management traffic Security Security –Hard to attack and more secure
28
The Management network (6) Cons of a dedicated management network Cons of a dedicated management network Cost and overhead Cost and overhead –Addition cost for a management network No reasonable alternative No reasonable alternative –Some devices do not provide a physical connection for another usage –DSL router cannot be connected with two physical links
29
The Management network (7) Cost is the huge disadvantage Cost is the huge disadvantage So, the management network is needed only critical area So, the management network is needed only critical area –Backbone of service providers or big enterprises Hybrid solution Hybrid solution –Generally, it shares over production networks –Only critical segments are used as dedicated networks
30
The Management Support Organization: NOC (1) The management support org. is responsible for making sure that the network is being run efficiently and effectively The management support org. is responsible for making sure that the network is being run efficiently and effectively Management tasks (1) Management tasks (1) –Monitoring the network for failures –Diagnosing failures and communication outages –Planning and carrying out repairs –Provisioning new services and adding/removing users
31
The Management Support Organization: NOC (2) Management tasks (2) Management tasks (2) –Keeping an eye on performance of the network and taking preventive measures –Planning network upgrade To increase capacity and distribution of software patches To increase capacity and distribution of software patches –Planning network topology and network buildout Ensure that the network will meet future demands Ensure that the network will meet future demands
32
The Management Support Organization: NOC (3) Organization structure Organization structure –Network planning - analyzing network usage and traffic patterns and planning network buildout and service rollout –Network operation - keeping the network running and monitoring the network failures –Network administration – Deploying the network and services on it –Customer (user) management -Interacting with the customers
33
The Management Support Organization: NOC (4) Other things are needed (1) Other things are needed (1) –Establishment of process and operational policies, documentation of operational procedures Help management of the network consistent and efficient and facilitates meeting a consistently high standard of operations Help management of the network consistent and efficient and facilitates meeting a consistently high standard of operations Well-defined workflow to ensure that things that are supposed to happen do not fall through cracks Well-defined workflow to ensure that things that are supposed to happen do not fall through cracks Well-defined escalation procedures to ensure responsiveness Well-defined escalation procedures to ensure responsiveness
34
The Management Support Organization: NOC (5) Other things are needed (2) Other things are needed (2) –Collection of audit trails Automatically logging the activities of operations Automatically logging the activities of operations make it easier to reproduce what happened and recover from situation in which human error make it easier to reproduce what happened and recover from situation in which human error –Network documentation Must be accurate and up-to-date Must be accurate and up-to-date Important for network planning and software upgrades Important for network planning and software upgrades
35
The Management Support Organization: NOC (6) Other things are needed (3) Other things are needed (3) –Reliable backup and restore procedures Bring network back to live again in case of disaster and emergencies Bring network back to live again in case of disaster and emergencies –Security emphasis Networks potentially most vulnerable from the inside Networks potentially most vulnerable from the inside Limit the damage that can cause by one person Limit the damage that can cause by one person
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.