Communication and Functional Models

Slides:



Advertisements
Similar presentations
Test Case Generation for testing SNMP agents
Advertisements

Chapter 5 SNMPv1: Communication and Functional Models.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Factors, Primes & Composite Numbers
What's a Proxy Printer Provider? PWG WIMS-CIM Working Group Rick Landau Dell, CTO Office 2008/08/08 v0.2.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Year 6 mental test 5 second questions
ZMQS ZMQS
SNMP (Simple Network Management Protocol) Overview Draft Version.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
ABC Technology Project
9.5 Counting Subsets of a Set: Combinations
Squares and Square Root WALK. Solve each problem REVIEW:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
1 Unit 1 Kinematics Chapter 1 Day
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Chapter 11 Telecommunications Management Network Chapter 11 Network Management: Principles and Practice © Mani Subramanian
Chapter 6 SNMPv2 6-1 Network Management: Principles and Practice
Organization and Information Models
Chapter 8 RMON Chapter 8 Network Management: Principles and Practice © Mani Subramanian
How Cells Obtain Energy from Food
1 1/15/ :37 Chapter 14Network Management1 Rivier College CS575: Advanced LANs Chapter 14: Network Management.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
1 Pertemuan 07 Model Komunikasi Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
COMP4690, by Dr Xiaowen Chu, HKBU
SNMP PROTOCOL Copyright © 2001 by Aiko Pras These sheets may be used for educational purposes.
SNMP Simple Network Management Protocol
Network Management: SNMP
Chapter 6 Overview Simple Network Management Protocol
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
SNMP Communication and Functional Models
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
Lec8: SNMP v1.
Communication and Functional Models
POSTECH DP&NM Lab 1 Simple Network Management Protocol (SNMP) Mi-Jung Choi Dept. of Computer Science KNU
Simple Network Management Protocol (SNMP) SNMP v1 (RFC 1157) UDP Port 161 Operation supported by SNMP – Get: retrieves a scalar object value – Set: updates.
CITA 440 Week 6 SNMPv1. Internet SNMP Management Internet Engineering Task Force (IETF) –1990SNMPv1 –1996SNMPv2 –1998SNMPv3 Internet documents: –Request.
Common Management Protocol W.lilakiatsakun. Topics SNMP (Widely used) SNMP (Widely used) Command Line Interface (CLI) Command Line Interface (CLI) Syslog.
Extra Lecture and examples
Network management Communication model
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP)
Network Management: SNMP
SNMPv1 Network Management: Communication and Functional Models
SNMPv1 Network Management: Communication and Functional Models
Chapter 4 Network Management Standards and Models
Chapter 4 Network Management Standards and Models
CT1305 Computer Network Management Dr. Mostafa H. Dahshan
Presentation transcript:

Communication and Functional Models Chapter 5 Chapter 5 SNMPv1: Communication and Functional Models Network Management: Principles and Practice © Mani Subramanian 2000 5-1

SNMP Architecture Notes Truly simple network management protocol Chapter 5 SNMP Architecture Notes Truly simple network management protocol Five messages, three from manager and two from agent Network Management: Principles and Practice © Mani Subramanian 2000 5-2

SNMP Messages Notes Get-Request Get-Next-Request Set-Request Chapter 5 SNMP Messages Get-Request Get-Next-Request Set-Request Get-Response Trap Generic trap Specific trap Time stamp Notes Generic trap coldStart warmStart linkDown linkUp authenticationfailure egpNeighborLoss enterpriseSpecific Specific trap for special measurements such as statistics Time stamp: Time since last initialization Network Management: Principles and Practice © Mani Subramanian 2000 5-3

Administrative Model Notes Based on community profile and policy Chapter 5 Administrative Model Based on community profile and policy SNMP Entities: SNMP application entities - Reside in management stations and network elements - Manager and agent SNMP protocol entities - Communication processes (PDU handlers) - Peer processes that support application entities Notes Network Management: Principles and Practice © Mani Subramanian 2000 5-4

SNMP Community Notes Security in SNMPv1 is community-based Chapter 5 SNMP Community Notes Security in SNMPv1 is community-based Authentication scheme in manager and agent Community: Pairing of two application entities Community name: String of octets Two applications in the same community communicate with each other Application could have multiple community names Communication is not secured in SNMPv1 - no encryption Network Management: Principles and Practice © Mani Subramanian 2000 5-5

Community Profile Notes MIB view Chapter 5 Community Profile Notes MIB view An agent is programmed to view only a subset of managed objects of a network element Access mode Each community name is assigned an access mode:: read-only and read-write Community profile: MIB view + access mode Operations on an object determined by community profile and the access mode of the object Total of four access privileges Some objects, such as table and table entry are non-accessible Network Management: Principles and Practice © Mani Subramanian 2000 5-6

Administration Model Notes Administration model is SNMP access policy Chapter 5 Administration Model Administration model is SNMP access policy SNMP community paired with SNMP community profile is SNMP access policy Notes Parameters: Community / communities Agent / Agents Manager / managers Network Management: Principles and Practice © Mani Subramanian 2000 5-7

Chapter 5 Access Policy Notes Manager manages Community 1 and 2 network components via Agents 1 and 2 Agent 1 has only view of Community Profile 1, e.g. Cisco components Agent 2 has only view of Community Profile 2, e.g. 3Com components Manager has total view of both Cisco and 3Com components Network Management: Principles and Practice © Mani Subramanian 2000 5-8

Generalized Administration Model Chapter 5 Generalized Administration Model Notes Manager 1 manages community 1, manager 2 community 2,and manager 3 (MoM) both communities 1 and 2 Network Management: Principles and Practice © Mani Subramanian 2000 5-9

Proxy Access Policy Notes Chapter 5 Proxy Access Policy Notes Proxy agent enables non-SNMP community elements to be managed by an SNMP manager. An SNMP MIB is created to handle the non-SNMP objects Network Management: Principles and Practice © Mani Subramanian 2000 5-10

Protocol Entities Notes Protocol entities support application entities Chapter 5 Protocol Entities Notes Protocol entities support application entities Communication between remote peer processes Message consists of Version identifier Community name Protocol Data Unit Message encapsulated and transmitted Network Management: Principles and Practice © Mani Subramanian 2000 5-11

Get and Set PDU Notes VarBindList: multiple instances of VarBind pairs Chapter 5 Get and Set PDU Notes VarBindList: multiple instances of VarBind pairs PDU Types: enumerated INTEGER Network Management: Principles and Practice © Mani Subramanian 2000 5-12

Error in Response Notes Chapter 5 Error in Response Error Index: No. of VarBind that the first error occurred Notes Network Management: Principles and Practice © Mani Subramanian 2000 5-13

Chapter 5 Trap PDU Notes Enterprise and agent address pertain to the system generating the trap Seven generic traps specified by enumerated INTEGER Specific trap is a trap not covered by enterprise specific trap time stamp indicates elapsed time since last re- initialization Network Management: Principles and Practice © Mani Subramanian 2000 5-14

SNMP Operations 5-15 Chapter 5 Network Management: Principles and Practice © Mani Subramanian 2000 5-15

MIB for Get-Next-Request Chapter 5 MIB for Get-Next-Request Notes Network Management: Principles and Practice © Mani Subramanian 2000 5-16

Lexicographic Order Notes Procedure for ordering: Chapter 5 Lexicographic Order Notes Procedure for ordering: Start with leftmost digit as first position Before increasing the order in the first position, select the lowest digit in the second position Continue the process till the lowest digit in the last position is captured Increase the order in the last position until all the digits in the last position are captured Move back to the last but one position and repeat the process Continue advancing to the first position until all the numbers are ordered Tree structure for the above process Network Management: Principles and Practice © Mani Subramanian 2000 5-17

MIB Lexicographic Order Chapter 5 MIB Lexicographic Order Notes A 3.1 B 3.2 T Z E 1.1 1.2 2.1 2.2 Network Management: Principles and Practice © Mani Subramanian 2000 5-18

A More Complex MIB Example Chapter 5 A More Complex MIB Example Notes Network Management: Principles and Practice © Mani Subramanian 2000 5-19

Get-Next-Request Operation Chapter 5 Get-Next-Request Operation Network Management: Principles and Practice © Mani Subramanian 2000 5-20

Get-Next-Request Operation Chapter 5 Get-Next-Request Operation Network Management: Principles and Practice © Mani Subramanian 2000 5-21

Chapter 5 Sniffer Data Network Management: Principles and Practice © Mani Subramanian 2000 5-22

Chapter 5 SNMP MIB Note: Most of the MIB objects were not used and hence deprecated in SNMPv2 Network Management: Principles and Practice © Mani Subramanian 2000 5-23