Download presentation
Presentation is loading. Please wait.
Published byImogen Shields Modified over 9 years ago
1
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Applications
2
2 Network and Systems Management
3
3 Management Applications OSI Model Configuration Fault Performance Security Accounting Reports Service Level Management Policy-based management
4
4 Configuration Management Inventory Management Equipment Facilities Network Topology
5
5 Manual Auto-discovery by NMS using Broadcast ping ARP table in devices Mapping of network Layout Layering Views Physical Logical
6
6 Network Topology Discovery 163.25.147.0 163.25.145.0163.25.145.0 163.25.146.0 163.25.146.128 192.168.12.0 192.168.13.0 140.112.5.0 140.112.8.0140.112.8.0 140.112.6.0
7
7 Discovery In a Network What to be discovered in a network ? Node Discovery The network devices in each network segment Network Discovery The topology of networks of interest Service Discovery The network services provided Network Topology Discovery Network Topology Discovery Network Discovery + Node Discovery
8
8 Node Discovery Given an IP Address, find the nodes in the same network. Two Major Approaches: Use Ping to query the possible IP addresses. Use SNMP to retrieve the ARP Cache of a known node.
9
9 Use ICMP ECHO Eg: IP address: 163.25.147.12 Subnet mask: 255.255.255.0 All possible addresses: 163.25.147.1 ~ 163.25.147.254 For each of the above addresses, use ICMP ECHO to inquire the address If a node replies (ICMP ECHO Reply), then it is found. Broadcast Ping
10
10 Use SNMP Find a node which supports SNMP The given node, default gateway, or router Or try a node arbitrarily ipNetToMediaTable Query the ipNetToMediaTable in MIB-II IP group (ARP Cache) ipNetToMediaIfIndex ipNetToMediaNetAddress 1 00:80:43:5F:12:9A163.25.147.10 dynamic(3) 200:80:51:F3:11:DE163.25.147.11 dynamic(3) ipNetToMediaPhysAddressipNetToMediaType
11
11 Network Discovery Find the networks of interest with their interconnections Key Issue: Given a network, what are the networks directly connected with it ? Major Approach Use SNMP to retrieve the routing table of a router.
12
12 Default Router Routing table
13
13 Service Discovery Given a node, find out the network services provided by the node. Recall that each network service will use a dedicated TCP/UDP port. Standard TCP/UDP Ports: 0 ~ 1023 Two Approaches Use TCP Connection Polling (Port Scan) Use SNMP
14
14 Use SNMP If the node supports SNMP tcpConnTable Use SNMP to query tcpConnTable udpTable Use SNMP to query udpTable tcpConnRemPort listen(2)0.0.0.0800.0.0.00 established(5)163.25.149.25423163.25.146.221234 tcpConnState tcpConnLocalAddress tcpConnLocalPort tcpConnRemAddress udpLocalPort 0.0.0.0111 0.0.0.0161 udpLocalAddress
15
15 Use TCP Connection Polling First specify the TCP services (i.e., TCP port numbers) to be discovered. For each TCP service to be discovered, use a TCP connection to try to connect to the corresponding TCP port of the node. If the connection is successfully established, then the service is found. Note that it is difficult to discover the UDP services following the same way.
16
16 Mapping of network
17
17 Traditional LAN Configuration Physical Logical
18
18 Virtual LAN Configuration Physical Logical
19
19 Fault Management Fault is a failure of a network component Results in loss of connectivity Fault management involves: Fault detection Polling Traps: linkDown, egpNeighborLoss Fault location Detect all components failed and trace down the tree topology to the source Fault isolation by network and SNMP tools Use artificial intelligence / correlation techniques Restoration of service Identification of root cause of the problem Problem resolution
20
20 Performance Management Tools Protocol analyzers RMON MRTG Performance Metrics Data Monitoring Problem Isolation Performance Statistics
21
21 Performance Metrics Macro-level Throughput Response time Availability Reliability Micro-level Bandwidth Utilization Error rate Peak load Average load
22
22 Performance Statistics Traffic statistics Error statistics Used in QoS tracking Performance tuning Validation of SLA (Service Level Agreement) Trend analysis Facility planning Functional accounting
23
23 Event Correlation Techniques Basic elements Detection and filtering of events Correlation of observed events using AI Localize the source of the problem Identify the cause of the problem Techniques Rule-based reasoning Model-based reasoning Case-based reasoning Codebook correlation model State transition graph model Finite state machine model
24
24 Security Management Security threats Policies and Procedures Resources to prevent security breaches Firewalls Cryptography Authentication and Authorization Client/Server authentication system Message transfer security Network protection security
25
25 Security Threats Modification of informationModification of information: Contents modified by unauthorized user, does not include address change MasqueradeMasquerade: change of originating address by unauthorized user Message Stream ModificationMessage Stream Modification: Fragments of message altered by an unauthorized user to modify the meaning of the message DisclosureDisclosure Eavesdropping Disclosure does not require interception of message Denial of service and traffic analysis are not considered as threats.
26
26 Security Threats
27
27 Polices and Procedures
28
28 Secured Communication Network Firewall secures traffic in and out of Network A Security breach could occur by intercepting the message going from B to A, even if B has permission to access Network A Most systems implement authentication with user id and password Authorization is by establishment of accounts No Security Breaches ?
29
29 Firewalls Protects a network from external attacks Controls traffic in and out of a secure network Could be implemented in a router, gateway, or a special host Benefits Reduces risks of access to hosts Controlled access Eliminates annoyance to the users Protects privacy Hierarchical implementation of policy and and technology
30
30 Packet Filtering Firewall
31
31 Packet Filtering Uses protocol specific criteria at DLC, network, and transport layers Implemented in routers - called screening router or packet filtering routers Filtering parameters: Source and/or destination IP address Source and/or destination TCP/UDP port address, such as ftp port 21 Multistage screening - address and protocol Works best when rules are simple
32
32 Application Level Gateway DMZ (De-Militarized Zone)
33
33 Authentication Server
34
34 Authentication Server Architecture of Novell LAN Authentication server does not issue ticket Login and password not sent from client workstation User sends id to central authentication server Authentication server acts as proxy agent to the client and authenticates the user with the application server Process transparent to the user
35
35 Accounting Management Least developed Usage of resources Hidden cost of IT usage (libraries) Functional accounting Business application
36
36 Report Management
37
37
38
38 Policy-Based Management
39
39 Policy-Based Management Domain space consists of objects (alarms with attributes) Rule space consists of rules (if-then) Policy Driver controls action to be taken Distinction between policy and rule; policy assigns responsibility and accountability Action Space implements actions
40
40 Service Level Management SLA management of service equivalent to QoS of network SLA defines Identification of services and characteristics Negotiation of SLA Deployment of agents to monitor and control Generation of reports SLA characteristics Service parameters Service levels Component parameters Component-to-service mappings
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.