Chapter 6 SNMPv2 6-1 Network Management: Principles and Practice

Slides:



Advertisements
Similar presentations
Test Case Generation for testing SNMP agents
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 3 CPUs.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1A - Adult Chapter 3.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
Custom Services and Training Provider Details Chapter 4.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
Yong Choi School of Business CSU, Bakersfield
2 |SharePoint Saturday New York City
VOORBLAD.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Essential Cell Biology
Communication and Functional Models
Organization and Information Models
Immunobiology: The Immune System in Health & Disease Sixth Edition
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Energy Generation in Mitochondria and Chlorplasts
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Pertemuan 10 Perbedaan antar versi SNMP
MJ08/07041 Session 08 SNMPv2 Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used for Network Management course.
1 Based on Behzad Akbari Fall 2011 Network Management lectures.
Network Management: Principles and Practice
1 SNMPv2 by Behzad Akbari Fall 2008 In the Name of the Most High.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
SNMPv2 These slides are based in parts upon slides of Prof. Dssouli (Concordia university)
Chapter 6 SNMPv2 6-1 Network Management: Principles and Practice
Presentation transcript:

Chapter 6 SNMPv2 6-1 Network Management: Principles and Practice © Mani Subramanian 2000 6-1

Major Changes Notes Bulk data transfer Manager-to-manager message Enhancements to SMI: SMIv2 Module definitions: MODULE-IDENTITY macro Object definitions: OBJECT-TYPE macro Trap definitions: NOTIFICATION-TYPE macro Textual conventions Conformance statements Row creation and deletion in table MIB enhancements Transport mappings Notes Security features, originally to be in SNMPv2 moved to SNMPv3 SNMPv2, like SNMPv1, is community-based administrative framework Network Management: Principles and Practice © Mani Subramanian 2000 6-2

SNMPv2 Internet Group Notes Objects added to System group Extensive modification of the SNMP group Additional SNMPv2 group added Security group is a placeholder Network Management: Principles and Practice © Mani Subramanian 2000 6-3

SNMPv2 NM Architecture 6-4 Network Management: Principles and Practice © Mani Subramanian 2000 6-4

SNMPv2 New Messages Notes inform-request manager-to-manager message get-bulk-request transfer of large data report not used Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-5

Module Identity Macro Notes Module is a group of related assignments MODULE-IDENTITY macro defines the module definitions Network Management: Principles and Practice © Mani Subramanian 2000 6-6

OBJECT ?? OBJECT IDENTIFIER defines the administrative identification of a node in the MIB OBJECT-IDENTITY macro assigns an object identifier to an object identifier in the MIB OBJECT-TYPE macro defines the type of a managed object Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-7

OBJECT-IDENTITY / OBJECT-TYPE OBJECT-IDENTITY is high level description OBJECT-TYPE details description needed for implementation Network Management: Principles and Practice © Mani Subramanian 2000 6-8

Table Expansion Augmentation of a table (dependent table) adds additional columns to an existing table (base table) Dense table enables addition of more rows to base table Sparse table supplements less rows to a base table Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-9

Augmentation of Tables Network Management: Principles and Practice © Mani Subramanian 2000 6-10

Augmentation of Tables: Example Network Management: Principles and Practice © Mani Subramanian 2000 6-11

Textual Convention Notes Enables defining new data types Makes semantics of data types consistent and human readable Creates new data types using existing ones and applies restrictions to them An important textual convention in SNMPv2, RowStatus creates and deletes rows Notes SNMPV1: SNMPv2: Network Management: Principles and Practice © Mani Subramanian 2000 6-12

Creation of Row: RowStatus Notes Status: A new column is added to the conceptual table SYNTAX of Status is RowStatus Value of RowStatus is Enumerated INTEGER Network Management: Principles and Practice © Mani Subramanian 2000 6-13

Row Creation and Deletion Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-14

Create-and-Go Row Creation Network Management: Principles and Practice © Mani Subramanian 2000 6-15

Create-and-Wait: Row Creation Network Management: Principles and Practice © Mani Subramanian 2000 6-16

Row Deletion 6-17 Network Management: Principles and Practice © Mani Subramanian 2000 6-17

SNMPv2 MIB Notes Security is a placeholder System group: A table sysORTable added that lists resources that the agent controls; NMS configures NE through the agents. Most of the objects in the SNMPv1 obsoleted Object Groups and Notification Groups defined for conformance specifications. Network Management: Principles and Practice © Mani Subramanian 2000 6-18

Conformance: OBJECT-GROUP Conformance defined by OBJECT-GROUP macro NOTIFICATION-GROUP macro OBJECT-GROUP Compiled during implementation, not at run time OBJECTS clause names each object Every object belongs to an OBJECT-GROUP Access defined by MAX-ACCESS, the maximum access privilege for the object Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-19

Conformance: NOTIFICATION-GROUP Contains trap entities defined in SMIv1 NOTIFICATIONS clause identifies the notifications in the group NOTIFICATIONS-GROUP macro compiled during implementation, not at run time Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-20

Compliance Notes Compliance has two classes of groups MANDATORY-GROUPS ... Required GROUP …Optional Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-21

Agent Capabilities Notes AGENT-CAPABILITIES macro SUPPORTS modules and includes groups VARIATION identifies additional features Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-22

SNMPv2 SNMP MIB Notes 6-23 Network Management: Principles and Practice © Mani Subramanian 2000 6-23

snmpMIBObjects MIB Notes 6-24 Network Management: Principles and Practice © Mani Subramanian 2000 6-24

SNMPv2 PDU Notes Standardized format for all messages Interpretation of error status and error index fields; In v1, if error occurs status and index field filled, but varBindList blank Interpretation Status Index varBindList ignored x varBind of index field ignored x x Network Management: Principles and Practice © Mani Subramanian 2000 6-25

SNMPv2 PDU and Error Status Network Management: Principles and Practice © Mani Subramanian 2000 6-26

SNMPv2 GetBulkRequest PDU Notes Error status field replaced by Non-repeaters Error index field replaced by Max repetitions No one-to-one relationship between request and response Network Management: Principles and Practice © Mani Subramanian 2000 6-27

Get-Bulk-Request: Generic MIB Network Management: Principles and Practice © Mani Subramanian 2000 6-28

Get-Next-Request Operation Network Management: Principles and Practice © Mani Subramanian 2000 6-29

Get-Bulk-Request Operation Network Management: Principles and Practice © Mani Subramanian 2000 6-30

Get-Bulk-Request Example Notes Network Management: Principles and Practice © Mani Subramanian 2000 6-31

SNMPv2 Trap Notes Addition of NOTIFICATION-TYPE macro OBJECTS clause, if present, defines order of variable bindings Positions 1 and 2 in VarBindList are sysUpTime and snmpTrapOID Network Management: Principles and Practice © Mani Subramanian 2000 6-32

Inform-Request Notes Inform-Request behaves as trap in that the message goes from one manager to another unsolicited The receiving manager sends response to the sending manager Network Management: Principles and Practice © Mani Subramanian 2000 6-33

Bilingual Manager Notes Compatibility with SNMPv1 Bilingual Manager Proxy Server Bilingual Manager expensive in resource and operation Network Management: Principles and Practice © Mani Subramanian 2000 6-34

SNMP Proxy Server 6-35 Network Management: Principles and Practice © Mani Subramanian 2000 6-35