Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Management Lecture 3. Network Faults Hardware Software.

Similar presentations


Presentation on theme: "Network Management Lecture 3. Network Faults Hardware Software."— Presentation transcript:

1 Network Management Lecture 3

2 Network Faults Hardware Software

3 Gathering Information to Identify a problem The two methods are: Critical network events are transmitted by a network device when a fault condition occurs.e.g failure of a link, restart of a device. A completely failed device can not send critical network events. Occasional polling of network devices can help find faults in a timely manner. There is a tradeoff between the bandwidth used for polling versus the notification time.

4 Fault Management on a network management system A simple tool can point out the existence of a problem but can not indicate its cause. E.g. ping A more complex tool can inform you when it detects a problem, by logging network events or by polling; provided the network devices are sophisticated enough to report network events.

5

6 Fault Management of a network Management System continued…. An Advance Tool performs quite a bit of fault management but it doesn’t perform the final step: correcting the problem. If the basic steps will not find the fault for us than we have to isolate the issues. Example: A mail not reaching the destination.

7

8 Impact of Fault on the Network A fault management tool must be capable of analyzing how a fault can affect other areas of the data network. Only then could it provide you with a complete fault analysis. E.g. “LINK FAILURE between Europe Node and United States Node.”

9 Impact of Fault on the Network E.g. “LINK FAILURE between Europe Node and United States Node. STOPS DECnet and IBM SNA traffic between Europe and United States.” E.g. “LINK FAILURE between Europe Node and United States Node. IMPACT ON DECnet and IBM SNA traffic between Europe and United States.”

10 Fault Management Process 1. Collect alarms / Detection 2. Filter and correlate alarms / Verification 3. Diagnose faults / Isolation 4. Restoration and repair 5. Evaluate effectiveness

11 1. Collect Alarms Types of alarms Physical: Failure in communication e.g. loss of signal, CRC failure Logical: Statistical values exceed threshold e.g. number of packets dropped Communication with components Control protocol: Simple Network Management Protocol (SNMP) Data format: Management Information Base (MIB- II, 1990) has ~170 manageable objects

12 Fault Detection CC (Continuity Check) Heartbeat message sent periodically Sender does not expect acknowledgement Receiver starts timer to expect periodic CC from sender Loss of n consecutive CCs results in failure detection Failures detected include: Hard and soft failures

13 2. Filter and Correlate Alarms Filter Eliminate redundant alarms Suppress noncritical alarms Inhibit low-priority alarms in presence of high-priority alarms Correlate Analyze and interpret multiple alarms to assign new meaning (derived alarm)

14 Fault Verification Non-intrusive Unicast Loopback Verify the detected fault Sender sends a request to receiver and expects a response Receiver will typically be the one from whom CCs stop Verification is done via the response

15 3. Diagnose Faults May require additional tests/diagnostics on circuits or components Automated or manual Analyze all info from alarms, tests, performance monitoring Identify smallest system module that needs to be repaired or replaced

16 4. Restoration and Repair Restoration: Continue service in presence of fault Switch over to spares Reroute around trouble spot Restore software or data from backup Repair Replace parts Repair cables Debug software Retest to verify fault is eliminated

17 5. Evaluate Effectiveness Questions to answer : How often do faults occur? How many faults affect service? How long is service interrupted? How long to repair? Provides assessment of: Performance of fault management system Reliability of equipment

18 Event Correlation Techniques Basic elements Detection and filtering of events Correlation of observed events using AI Localize the source of the problem Identify the cause of the problem Techniques Rule-based reasoning Model-based reasoning Case-based reasoning Codebook correlation model State transition graph model Finite state machine model

19 Rule-Based Reasoning

20 Rule-based paradigm is an iterative process RBR is “brittle” if no precedence exists An exponential growth in knowledge base poses problem in scalability Problem with instability if packet loss 10% 15%alarm red Solution using fuzzy logic

21 Configuration for RBR Example

22 RBR Example

23 Model-Based Reasoning Object-oriented model Model is a representation of the component it models Model has attributes and relations to other models Relationship between objects reflected in a similar relationship between models

24 MBR Event Correlator Example: Recognized by Hub 1 model Hub 1 model queries router model Hub 1 fails Router model declares failure Hub 1 model declares NO failure Router model declares no failure Hub 1 model declares Failure

25 Case-Based Reasoning Unit of knowledge RBRrule CBRcase CBR based on the case experienced before; extend to the current situation by adaptation Three adaptation schemes Parameterized adaptation Abstraction / re-specialization adaptation Critic-based adaptation

26 CBR: Matching Trouble Ticket Example: File transfer throughput problem

27 CBR: Parameterized Adaptation A = f(F) A’ = f(F’) Functional relationship f(x) remains the same

28 CBR: Abstraction / Re-specialization Two possible resolutions A = f(F)Adjust network load level B = g(F)Adjust bandwidth Resolution based on constraint imposed

29 CBR: Critic-Based Adaptation Human expertise introduces a new case N (network load) is an additional parameter added to the functional relationship

30 CBR-Based Critter

31 Codebook Correlation Model: Generic Architecture Yemini, et.al. proposed this model Monitors capture alarm events Configuration model contains the configuration of the network Event model represents events and their causal relationships Correlator correlates alarm events with event model and determines the problem that caused the events

32 Codebook Approach Correlation algorithms based upon coding approach to even correlation Problem events viewed as messages generated by a system and encoded in sets of alarms Correlator decodes the problem messages to identify the problems Approach: Two phases: 1. Codebook selection phase: Problems to be monitored identified and the symptoms they generate are associated with the problem. This generates codebook (problem-symptom matrix) 2. Correlator compares alarm events with codebook and identifies the problem.

33 Causality Graph Each node is an event An event may cause other events Directed edges start at a causing event and terminate at a resulting event Picture causing events as problems and resulting events as symptoms

34 Labeled Causality Graph Ps are problems and Ss are symptoms P1 causes S1 and S2 Note directed edge from S1 to S2 removed; S2 is caused directly or indirectly (via S1) by P1 S2 could also be caused by either P2 or P3

35 Codebook Codebook is problem-symptom matrix It is derived from causality graph after removing directed edges of propagation of symptoms Number of symptoms => number of problems 2 rows are adequate to identify uniquely 3 problems

36 Correlation Matrix Correlation matrix is reduced codebook

37 Generalized Causality Graph Causality graph has 11 events - problems and symptoms Mark all nodes that have only emerging directed edges as problems - Nodes 1, 2, and 11 Other nodes are symptoms

38 P-S Causality Graph To reduce causality graph to correlation graph: Symptoms 3, 4, and 5 are cyclical: replace with one symptom, say 3 S7 and S10 are caused by S3 and S5 and hence ignored S8 causes S9. Keep S9 and eliminate S8; reason for this would be more obvious if we go through reduction of codebook to correlation matrix

39 Correlation Graph and Matrix Note that problems 1 and 11 produce identical symptoms Correlation Matrix

40 State Transition Model Used in Seagate’s NerveCenter correlation system Integrated in NMS, such as OpenView Used to determine the status of a node

41 State Transition Model Example NMS pings hubs every minute Failure indicated by the absence of a response

42 State Transition Graph

43 Finite State Machine Model Finite state machine model is a passive system; state transition graph model is an active system An observer agent is present in each node and reports abnormalities, such as a Web agent A central system correlates events reported by the agents Failure is detected by a node entering an illegal state

44 Reporting Goals of data collections and reporting: operational management trend analysis of traffic volumes monitor levels of delivered service monitor usage patterns

45 Reporting Balance of cost of data collection and analysis against benefit of resultant data sets Data collection points affect ability to gather data

46 Network Reports weekly report of 15 minute link load levels

47 Network Reports monthly reports quarterly trend reports and projections


Download ppt "Network Management Lecture 3. Network Faults Hardware Software."

Similar presentations


Ads by Google